Default Cover Image

2008 33rd IEEE Conference on Local Computer Networks (LCN)

Oct. 14 2008 to Oct. 17 2008

Montreal, Que

Table of Contents

LCN Organizing CommitteeFreely available from IEEE.
LCN Program CommitteeFreely available from IEEE.
Range queries and load balancing in a hierarchically structured P2P systemFull-text access may be available. Sign in or learn about subscription options.
Constructing low-latency overlay networks: Tree vs. mesh algorithmsFull-text access may be available. Sign in or learn about subscription options.
IP address assignment in wireless mesh networksFull-text access may be available. Sign in or learn about subscription options.
Reducing network cost of many-to-many communication in unidirectional WDM rings with network codingFull-text access may be available. Sign in or learn about subscription options.
Improving information availability in storage-centric sensor networksFull-text access may be available. Sign in or learn about subscription options.
Delay constrained placement of mobile data collectors in underwater acoustic sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 91-97
Efficient power management for Wireless Sensor Networks: A data-driven approachFull-text access may be available. Sign in or learn about subscription options.
Neighborhood aware power saving mechanisms for ad hoc networksFull-text access may be available. Sign in or learn about subscription options.
Energy efficient Ethernet encodingsFull-text access may be available. Sign in or learn about subscription options.
Energy-saving scheduling in IEEE 802.16e networksFull-text access may be available. Sign in or learn about subscription options.
Scalability considerations for an anomaly-free iBGP routingFull-text access may be available. Sign in or learn about subscription options.
Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networksFull-text access may be available. Sign in or learn about subscription options.
Single-path routing for life time maximization in multi-hop wireless networksFull-text access may be available. Sign in or learn about subscription options.
DiCAP: Distributed Packet Capturing architecture for high-speed network linksFull-text access may be available. Sign in or learn about subscription options.
An analysis on error servers for stochastic network calculusFull-text access may be available. Sign in or learn about subscription options.
Signal strength sensitivity and its effects on routing in maritime wireless networksFull-text access may be available. Sign in or learn about subscription options.
A new approach for network vulnerability analysisFull-text access may be available. Sign in or learn about subscription options.
Covert channels in multiplayer first person shooter online gamesFull-text access may be available. Sign in or learn about subscription options.
Decision process for automated selection of security protocolsFull-text access may be available. Sign in or learn about subscription options.
Evaluation and parameterization of voice traffic models for disaster area scenariosFull-text access may be available. Sign in or learn about subscription options.
Reliability of wireless sensor gridsFull-text access may be available. Sign in or learn about subscription options.
Optimal distance-based clustering for tag anti-collision in RFID systemsFull-text access may be available. Sign in or learn about subscription options.pp. 266-273
A hybrid MAC with prioritization for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Real-time performance analysis of Adaptive Link RateFull-text access may be available. Sign in or learn about subscription options.
Modeling of two-flow interactions under SINR model in Multi-hop Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.
Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networksFull-text access may be available. Sign in or learn about subscription options.
The design of a secure key management system for mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.
Key management in wireless sensor networks with inter-network sensor roamingFull-text access may be available. Sign in or learn about subscription options.
Avoidance of multicast incapable branching nodes for multicast routing in WDM networksFull-text access may be available. Sign in or learn about subscription options.
Cost-efficient backup-plane architecture for single-hop WDM networkFull-text access may be available. Sign in or learn about subscription options.
Routing and buffer placement optimization in optical burst switched networksFull-text access may be available. Sign in or learn about subscription options.
Multi-criteria p-cycle network designFull-text access may be available. Sign in or learn about subscription options.
Towards a zero configuration authentication scheme for 802.11 based networksFull-text access may be available. Sign in or learn about subscription options.
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networksFull-text access may be available. Sign in or learn about subscription options.
A time multiplexing coordination mechanism on top of the IEEE 802.11 MAC layerFull-text access may be available. Sign in or learn about subscription options.
Intelligent Mobility Support for IPv6Full-text access may be available. Sign in or learn about subscription options.
Receiver access control and secured handoff in mobile multicast using IGMP-ACFull-text access may be available. Sign in or learn about subscription options.
A collaborative peer-to-peer architecture to defend against DDoS attacksFull-text access may be available. Sign in or learn about subscription options.
Supporting geographical queries onto DHTsFull-text access may be available. Sign in or learn about subscription options.
Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing GamesFull-text access may be available. Sign in or learn about subscription options.
Distributed and scalable control plane for next generation routers: A case study of OSPFFull-text access may be available. Sign in or learn about subscription options.
Optimized resource allocation for the uplink of SFBC-CDMA systemsFull-text access may be available. Sign in or learn about subscription options.
Smart Spanning Tree Bridging for Metro EthernetsFull-text access may be available. Sign in or learn about subscription options.
A distributed mobility management scheme for large-scale Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.
Resource assignment for adaptively modulated interconnected WLANsFull-text access may be available. Sign in or learn about subscription options.
P2P directory search: Signature Array Hash TableFull-text access may be available. Sign in or learn about subscription options.
Managing energy use in a network with a new SNMP Power State MIBFull-text access may be available. Sign in or learn about subscription options.
Channel assignment and scheduling in multichannel wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Graph theory based aggregation of sensor readings in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Probabilistic packet dropping for load control in multihop wireless networksFull-text access may be available. Sign in or learn about subscription options.
Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA)Full-text access may be available. Sign in or learn about subscription options.
Cross-Layer analysis and enhancement of fast MIPv6 in the real IEEE 802.11 based WLANsFull-text access may be available. Sign in or learn about subscription options.
TCP computational energy cost within wireless Mobile Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.
Mitigate DDoS attack using TTL buckets and host threatening indexFull-text access may be available. Sign in or learn about subscription options.
On selfish behavior using asymmetric carrier sensing in IEEE 802.11 wireless networksFull-text access may be available. Sign in or learn about subscription options.
End-to-end diagnosis of QoS violations with neural networkFull-text access may be available. Sign in or learn about subscription options.
A cross-domain framework for coordinated end-to-end QoS adaptationFull-text access may be available. Sign in or learn about subscription options.
A CGA based IP source address authentication method in IPv6 access networkFull-text access may be available. Sign in or learn about subscription options.
Performance of opportunistic scheduling schemes for MIMO-OFDM wireless LANsFull-text access may be available. Sign in or learn about subscription options.
A graph theoretic approach in achieving robust peer-to-peer networking paradigmFull-text access may be available. Sign in or learn about subscription options.
Queue-based contention control for congested multihop wireless networksFull-text access may be available. Sign in or learn about subscription options.
Self-adjusting scheme for high speed routersFull-text access may be available. Sign in or learn about subscription options.pp. 542-543
Optimizing router locations for minimum-energy wireless networksFull-text access may be available. Sign in or learn about subscription options.
Short-term QoS provisioning in MPLS ingress nodesFull-text access may be available. Sign in or learn about subscription options.
A forwarding protocol with relay acknowledgement for vehicular ad-hoc networksFull-text access may be available. Sign in or learn about subscription options.
Connectivity-driven flow recovery for time-sensitive transport servicesFull-text access may be available. Sign in or learn about subscription options.
Showing 100 out of 175