Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCN
LCN 2008
Generate Citations
2008 33rd IEEE Conference on Local Computer Networks (LCN)
Oct. 14 2008 to Oct. 17 2008
Montreal, Que
Table of Contents
2nd IEEE LCN workshop on user mobility and vehicular networks - ON-MOVE 2008
Freely available from IEEE.
4th IEEE international workshop on performance and management of wireless and mobile networks - P2MNET 2008
Freely available from IEEE.
3rd international workshop on practical issues in building sensor network applications - SENSEAPP 2008
Freely available from IEEE.
8th international workshop on wireless local networks - WLN 2008
Freely available from IEEE.
3rd IEEE LCN workshop on network measurements - WNM 2008
Freely available from IEEE.
4th IEEE LCN workshop on network security - WNS 2008
Freely available from IEEE.
LCN Organizing Committee
Freely available from IEEE.
LCN Program Committee
Freely available from IEEE.
GENI - global environment for network innovations
Freely available from IEEE.
by
Chip Elliott
Distributed search revisited: Resolving the conflict of flexibility and efficiency
Freely available from IEEE.
by
Raouf Boutaba
Cooperative caching: The case for P2P traffic
Freely available from IEEE.
by
Mohamed Hefeeda
,
Behrooz Noorizadeh
Experimental comparison of peer-to-peer streaming overlays: An application perspective
Full-text access may be available. Sign in or learn about subscription options.
by
Jeff Seibert
,
David Zage
,
Sonia Fahmy
,
Cristina Nita-Rotaru
Range queries and load balancing in a hierarchically structured P2P system
Full-text access may be available. Sign in or learn about subscription options.
by
Simon Rieche
,
Bui The Vinh
,
Klaus Wehrle
Constructing low-latency overlay networks: Tree vs. mesh algorithms
Full-text access may be available. Sign in or learn about subscription options.
by
Knut-Helge Vik
,
Carsten Griwodz
,
Pal Halvorsen
IP address assignment in wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
by
Alexander Zimmermann
,
Volker Bohme
,
Arnd Hannemann
An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh Protocol
Full-text access may be available. Sign in or learn about subscription options.
by
Won-Ju Yoon
,
Sang-Hwa Chung
,
Seong-Joon Lee
,
Yun-Sung Lee
CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH mode
Full-text access may be available. Sign in or learn about subscription options.
by
Parag S. Mogre
,
Nico d'Heureuse
,
Matthias Hollick
,
Ralf Steinmetz
Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding
Full-text access may be available. Sign in or learn about subscription options.
by
Long Long
,
Ahmed E. Kamal
Reconstructing the Plenoptic function from wireless multimedia sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Azzedine Boukerche
,
Jing Feng
,
Richard Pazzi Werner
,
Yan Du
,
Ying Huang
Improving information availability in storage-centric sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Nam Nguyen
,
Sudha Krishnamurthy
,
Peng Xie
,
Douglas Jones
Delay constrained placement of mobile data collectors in underwater acoustic sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-97
by
Waleed Alsalih
,
Hossam Hassanein
,
Selim Akl
Path guiding mechanisms for a mobile anchor improving or balancing location accuracies of static sensors in WSNs
Full-text access may be available. Sign in or learn about subscription options.
by
Chih-Yung Chang
,
Chao-Tsun Chang
,
Sheng-Wen Chang
,
Yu-Chieh Chen
,
Ming-Hsien Li
Efficient power management for Wireless Sensor Networks: A data-driven approach
Full-text access may be available. Sign in or learn about subscription options.
by
MingJian Tang
,
Jinli Cao
,
Xiaohua Jia
Neighborhood aware power saving mechanisms for ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Abdelfettah Belghith
,
Wafa Akkari
Energy efficient Ethernet encodings
Full-text access may be available. Sign in or learn about subscription options.
by
Yanpei Chen
,
Tracy Xiaoxiao Wang
,
Randy H. Katz
Energy-saving scheduling in IEEE 802.16e networks
Full-text access may be available. Sign in or learn about subscription options.
by
Chia-Yen Lin
,
Hsi-Lu Chao
Scalability considerations for an anomaly-free iBGP routing
Full-text access may be available. Sign in or learn about subscription options.
by
Uli Bornhauser
,
Peter Martini
,
Martin Horneffer
Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Shao Tao
,
A. L. Ananda
,
Mun Choon Chan
A new approach for the construction of multiple multicast trees using multiple description video for wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Osamah Badarneh
,
Michel Kadoch
,
Ahmed Elhakeem
Single-path routing for life time maximization in multi-hop wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Yigal Bejerano
,
Seung-Jae Han
,
Keon-Taek Lee
,
Amit Kumar
DiCAP: Distributed Packet Capturing architecture for high-speed network links
Full-text access may be available. Sign in or learn about subscription options.
by
Cristian Morariu
,
Burkhard Stiller
TCP mechanisms for improving the user experience for time-dependent thin-stream applications
Full-text access may be available. Sign in or learn about subscription options.
by
Andreas Petlund
,
Kristian Evensen
,
Carsten Griwodz
,
Pal Halvorsen
An analysis on error servers for stochastic network calculus
Full-text access may be available. Sign in or learn about subscription options.
by
Jing Xie
,
Yuming Jiang
Signal strength sensitivity and its effects on routing in maritime wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Chee-Wei Ang
,
Su Wen
A new approach for network vulnerability analysis
Full-text access may be available. Sign in or learn about subscription options.
by
Hai L. Vu
,
Kenneth K. Khaw
,
TY Chen
,
Fei-Ching Kuo
On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks
Full-text access may be available. Sign in or learn about subscription options.
by
Pascal Schottle
,
Thomas Dreibholz
,
Erwin P. Rathgeb
Covert channels in multiplayer first person shooter online games
Full-text access may be available. Sign in or learn about subscription options.
by
Sebastian Zander
,
Grenville Armitage
,
Philip Branch
Decision process for automated selection of security protocols
Full-text access may be available. Sign in or learn about subscription options.
by
Lars Volker
,
Christoph Werle
,
Martina Zitterbart
Implementation and performance evaluation of Selective Repeat ARQ for WiMAX NS-2 model
Full-text access may be available. Sign in or learn about subscription options.
by
Michael Hempel
,
Wei Wang
,
Hamid Sharif
,
Ting Zhou
,
Puttipong Mahasukhon
Evaluation and parameterization of voice traffic models for disaster area scenarios
Full-text access may be available. Sign in or learn about subscription options.
by
Nils Aschenbruck
,
Peter Martini
Performance evaluation of optimal sized cluster based wireless sensor networks with correlated data aggregation consideration
Full-text access may be available. Sign in or learn about subscription options.
by
Fan Bai
,
Abbas Jamalipour
Reliability of wireless sensor grids
Full-text access may be available. Sign in or learn about subscription options.
by
Hosam M.F. AboElFotoh
,
Ehab S. Elmallah
Monitoring the spatial-temporal effect of internet traffic based on Random Matrix Theory
Full-text access may be available. Sign in or learn about subscription options.
by
Jia Liu
,
Wenzhu Zhang
,
Jian Yuan
,
Depeng Jin
,
Lieguang Zeng
Optimal distance-based clustering for tag anti-collision in RFID systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-273
by
Waleed Alsalih
,
Kashif Ali
,
Hossam Hassanein
A hybrid MAC with prioritization for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Ines Slama
,
Bharat Shrestha
,
Badii Jouaber
,
Djamal Zeghlache
Real-time performance analysis of Adaptive Link Rate
Full-text access may be available. Sign in or learn about subscription options.
by
Baoke Zhang
,
Karthikeyan Sabhanatarajan
,
Ann Gordon-Ross
,
Alan George
A medium access control protocol for UWB sensor networks with QoS support
Full-text access may be available. Sign in or learn about subscription options.
by
Jicong Tan
,
Mun-Choon Chan
,
Hwee-Xian Tan
,
Peng-Yong Kong
,
Chen-Khong Tham
Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Saquib Razak
,
Nael B. Abu-Ghazaleh
,
Vinay Kolar
Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Junhai Luo
,
Xue Liu
,
Yi Zhang
,
Danxia Ye
,
Zhong Xu
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
Full-text access may be available. Sign in or learn about subscription options.
by
Harald Widiger
,
Stephan Kubisch
,
Peter Danielis
,
Jens Schulz
,
Dirk Timmermann
,
Thomas Bahls
,
Daniel Duchow
The design of a secure key management system for mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Azzedine Boukerche
,
Yonglin Ren
Key management in wireless sensor networks with inter-network sensor roaming
Full-text access may be available. Sign in or learn about subscription options.
by
S. Choi
,
V. Sarangan
,
S. Trost
Avoidance of multicast incapable branching nodes for multicast routing in WDM networks
Full-text access may be available. Sign in or learn about subscription options.
by
Fen Zhou
,
Miklos Molnar
,
Bernard Cousin
Cost-efficient backup-plane architecture for single-hop WDM network
Full-text access may be available. Sign in or learn about subscription options.
by
Noriaki Kamiyama
Routing and buffer placement optimization in optical burst switched networks
Full-text access may be available. Sign in or learn about subscription options.
by
Jorge C. S. Castro
,
Joao M. F. Pedro
,
Paulo P. Monteiro
Multi-criteria p-cycle network design
Full-text access may be available. Sign in or learn about subscription options.
by
Hamza Drid
,
Bernard Cousin
,
Samer Lahoud
,
Miklos Molnar
Towards a zero configuration authentication scheme for 802.11 based networks
Full-text access may be available. Sign in or learn about subscription options.
by
Carolin Latze
,
Ulrich Ultes-Nitsche
,
Florian Baumgartner
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Mingzhe Li
,
Mark Claypool
,
Robert Kinicki
A time multiplexing coordination mechanism on top of the IEEE 802.11 MAC layer
Full-text access may be available. Sign in or learn about subscription options.
by
Alexander Leonovich
,
Huei-Wen Ferng
QoE-based network selection for multimedia users in IEEE 802.11 wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Kandaraj Piamrat
,
Adlen Ksentini
,
Cesar Viho
,
Jean-Marie Bonnin
On supporting handoff management for multi-source video streaming in mobile communication systems
Full-text access may be available. Sign in or learn about subscription options.
by
Tarik Taleb
,
Tomoyuki Nakamura
,
Kazuo Hashimoto
Intelligent Mobility Support for IPv6
Full-text access may be available. Sign in or learn about subscription options.
by
Shengling Wang
,
Yong Cui
,
Sajal K. Das
Receiver access control and secured handoff in mobile multicast using IGMP-AC
Full-text access may be available. Sign in or learn about subscription options.
by
Salekul Islam
,
J. William Atwood
A client-based vertical handoff approach for seamless mobility in next generation wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Yong-Sung Kim
,
Dong-Hee Kwon
,
Young-Joo Suh
A collaborative peer-to-peer architecture to defend against DDoS attacks
Full-text access may be available. Sign in or learn about subscription options.
by
Radwane Saad
,
Farid Nait-Abdesselam
,
Ahmed Serhrouchni
Supporting geographical queries onto DHTs
Full-text access may be available. Sign in or learn about subscription options.
by
Jordi Pujol Ahullo
,
Pedro Garcia Lopez
,
Marc Sanchez Artigas
,
Antonio F. Gomez Skarmeta
Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing Games
Full-text access may be available. Sign in or learn about subscription options.
by
Xinbo Jiang
,
Farzad Safaei
A loosely synchronized gossip-based algorithm for aggregate information computation
Full-text access may be available. Sign in or learn about subscription options.
by
Dongsheng Peng
,
Weidong Liu
,
Chuang Lin
,
Zhen Chen
,
Jiaxing Song
An ant based rate allocation algorithm for media streaming in peer to peer networks
Full-text access may be available. Sign in or learn about subscription options.
by
Amir Hesam Salavati
,
Hadi Goudarzi
,
Mohammad Reza Pakravan
Distributed and scalable control plane for next generation routers: A case study of OSPF
Full-text access may be available. Sign in or learn about subscription options.
by
Kim-Khoa Nguyen
,
Brigitte Jaumard
Online control techniques for optimal management of bandwidth over shared infrastructure networks
Full-text access may be available. Sign in or learn about subscription options.
by
Kaliappa Ravindran
,
Mohammad Rabby
Optimized resource allocation for the uplink of SFBC-CDMA systems
Full-text access may be available. Sign in or learn about subscription options.
by
Taimour Aldalgamouni
,
Ahmed Elhakeem
Efficient bandwidth management in Broadband Wireless Access Systems using CAC-based dynamic pricing
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-491
by
Bader Al-Manthari
,
Nidal Nasser
,
Najah Abu Ali
,
Hossam Hassanein
Smart Spanning Tree Bridging for Metro Ethernets
Full-text access may be available. Sign in or learn about subscription options.
by
Aref Meddeb
A distributed mobility management scheme for large-scale Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Keita Kawano
,
Kazuhiko Kinoshita
,
Nariyoshi Yamai
Resource assignment for adaptively modulated interconnected WLANs
Full-text access may be available. Sign in or learn about subscription options.
by
Amiotosh Ghosh
,
Ahmed K. Elhakeem
Analysis and evaluation of a scalable QoS device for broadband access to multimedia services
Full-text access may be available. Sign in or learn about subscription options.
by
Wenyu Zhu
,
Thomas Dreibholz
,
Erwin P. Rathgeb
P2P directory search: Signature Array Hash Table
Full-text access may be available. Sign in or learn about subscription options.
by
Miguel Jimeno
,
Ken Christensen
Managing energy use in a network with a new SNMP Power State MIB
Full-text access may be available. Sign in or learn about subscription options.
by
Francisco Blanquicet
,
Ken Christensen
Channel assignment and scheduling in multichannel wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Yuanyuan Zeng
,
Naixue Xiong
,
Tai-hoon Kim
Graph theory based aggregation of sensor readings in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Tatiana Bokareva
,
Nirupama Bulusu
,
Sanjay Jha
Probabilistic packet dropping for load control in multihop wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Daewon Jung
,
Hyuk Lim
Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA)
Full-text access may be available. Sign in or learn about subscription options.
by
Segla Kpodjedo
,
Samuel Pierre
,
Makan Pourzandi
Cross-Layer analysis and enhancement of fast MIPv6 in the real IEEE 802.11 based WLANs
Full-text access may be available. Sign in or learn about subscription options.
by
Yilin Song
,
Yi Sun
TCP computational energy cost within wireless Mobile Ad Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
by
Alaa Seddik-Ghaleb
,
Yacine Ghamri-Doudane
,
Sidi-Mohammed Senouci
Mitigate DDoS attack using TTL buckets and host threatening index
Full-text access may be available. Sign in or learn about subscription options.
by
Xi Chen
,
Gaogang Xie
,
Jianhua Yang
On selfish behavior using asymmetric carrier sensing in IEEE 802.11 wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Eunho Yang
,
Jaehyuk Choi
,
Sunglim Lee
End-to-end diagnosis of QoS violations with neural network
Full-text access may be available. Sign in or learn about subscription options.
by
LiFeng Zhou
,
Lei Chen
,
Hung Keng Pung
,
Lek Heng Ngoh
A cross-domain framework for coordinated end-to-end QoS adaptation
Full-text access may be available. Sign in or learn about subscription options.
by
LiFeng Zhou
,
Hung Keng Pung
,
Lek Heng Ngoh
A CGA based IP source address authentication method in IPv6 access network
Full-text access may be available. Sign in or learn about subscription options.
by
Guang Yao
,
Jun Bi
Performance of opportunistic scheduling schemes for MIMO-OFDM wireless LANs
Full-text access may be available. Sign in or learn about subscription options.
by
Mikael Gidlund
,
Per Ahag
A graph theoretic approach in achieving robust peer-to-peer networking paradigm
Full-text access may be available. Sign in or learn about subscription options.
by
H. Shafiei
,
F. Hoseini
,
A. Khonsari
,
M. Ould-Khaoua
Queue-based contention control for congested multihop wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Jaeseon Hwang
,
Hyuk Lim
Self-adjusting scheme for high speed routers
Full-text access may be available. Sign in or learn about subscription options.
pp. 542-543
by
Nizar Ben Neji
,
Adel Bouhoula
Optimizing router locations for minimum-energy wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Sungsoon Cho
,
John P. Hayes
TabooQMR: A Taboo-based search algorithm improving Mamcra for multicast routing
Full-text access may be available. Sign in or learn about subscription options.
by
Adel Ben Mnaouer
,
Abdelfettah Belghith
,
Naouel Ben Ali
,
Miklos Molnar
Short-term QoS provisioning in MPLS ingress nodes
Full-text access may be available. Sign in or learn about subscription options.
by
Masoomeh Torabzadeh
,
Wessam Ajib
A forwarding protocol with relay acknowledgement for vehicular ad-hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Inhyeok Jang
,
Wooyeol Choi
,
Hyuk Lim
Connectivity-driven flow recovery for time-sensitive transport services
Full-text access may be available. Sign in or learn about subscription options.
by
Michio Honda
,
Jin Nakazawa
,
Yoshifumi Nishida
,
Hideyuki Tokuda
A proactive secure routing algorithm defense against node compromise in sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Xiangqian Chen
,
Kia Makki
,
Kang Yen
,
Niki Pissinou
,
Zhihua Liu
Showing 100 out of 175
Load More
Load All