Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCN
LCN 2009
Generate Citations
2009 IEEE 34th Conference on Local Computer Networks
Oct. 20 2009 to Oct. 23 2009
Zurich
Table of Contents
The 34th annual IEEE conference on Local Computer Networks (LCN)
Freely available from IEEE.
Message from the general chair
Freely available from IEEE.
pp. 1-2
by
Ehab Elmallah
LCN 2009 Organizing Committee
Freely available from IEEE.
ICT as enabler of smart infrastructures
Freely available from IEEE.
pp. 12-12
by
Alberto Leon-Garcia
Green networks: Opportunities and challenges
Freely available from IEEE.
pp. 13-13
by
Ken Christensen
The 3rd IEEE LCN Workshop on User MObility and Vehicular Networks (ON-MOVE 2009)
Freely available from IEEE.
by
Soumaya Cherkaoui
,
Christer Ahlund
ON-MOVE 2009 organization
Freely available from IEEE.
The 3rd IEEE LCN Workshop on User MObility and Vehicular Networks (ON-MOVE 2009)
Freely available from IEEE.
The 5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet 2009)
Freely available from IEEE.
pp. 714-714
by
A. Boukerche
,
L. Mokdad
,
S. Samarah
P2MNet organizing committee
Freely available from IEEE.
The 5th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet 2009)
Freely available from IEEE.
The 4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2009)
Freely available from IEEE.
by
Salil Kanhere
,
Kay Roemer
SenseApp 2009 organizing and program committees
Freely available from IEEE.
SenseApp 2009 reviewers
Freely available from IEEE.
The 4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2009)
Freely available from IEEE.
The 5th LCN Workshop on Security in Communications Networks (SICK 2009)
Freely available from IEEE.
pp. 890-891
by
Nils Aschenbruck
,
Jeff Boleng
,
Jens Tölle
The 2nd IEEE Workshop on Wireless and Internet Services (WISe 2009)
Freely available from IEEE.
pp. 953
by
Farid Naït-Abdesselam
,
Michael Salaun
WISe 2009 organization
Freely available from IEEE.
The 9th IEEE international workshop on Wireless Local Networks (WLN 2009)
Freely available from IEEE.
by
Abd-Elhamid M. Taha
,
Jalel Ben-Othman
WLN 2009 organization
Freely available from IEEE.
The 9th IEEE international workshop on Wireless Local Networks (WLN 2009)
Freely available from IEEE.
The 4th IEEE LCN Workshop on Network Measurements (WNM 2009)
Freely available from IEEE.
by
Nischal M. Piratla
,
Anura P. Jayasumana
WNM 2009 organization
Freely available from IEEE.
The 4th IEEE LCN Workshop on Network Measurements (WNM 2009)
Freely available from IEEE.
Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-21
by
Bastian Könings
,
Florian Schaub
,
Frank Kargl
,
Stefan Dietzel
Stealthy dissemination in intruder tracking sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-29
by
Damla Turgut
,
Begümhan Turgut
,
Ladislau Bölöni
IMAPS: Imbricated authentication protocol suite for mobile users and groups
Full-text access may be available. Sign in or learn about subscription options.
by
Nidal Aboudagga
,
Giacomo de Meulenaer
,
Mohamed Eltoweissy
,
Jean-Jacques Quisquater
Evaluation of authentication signaling loads in 3GPP LTE/SAE networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Chan-Kyu Han
,
Hyoung-Kee Choi
,
Jung Woo Baek
,
Ho Woo Lee
A localized and distributed channel assignment scheme for wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
by
K N Sridhar
,
Claudio Casetti
,
Carla-Fabiana Chiasserini
Cluster-based channel assignment in multi-radio multi-channel wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
by
Anjum Naveed
,
Salil S. Kanhere
Algorithms to minimize channel interference in multiple channels multiple interfaces environments
Full-text access may be available. Sign in or learn about subscription options.
by
Trung-Tuan Luong
,
Bu-Sung Lee
,
Chai-Kiat Yeo
,
Ming-Shiunn Wong
,
Shigeki Goto
Distributed receiving in RFID systems
Full-text access may be available. Sign in or learn about subscription options.
by
Kashif Ali
,
Hossam Hassanein
Backbone MAC for energy-constrained wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-84
by
Markus Wälchli
,
Reto Zurbuchen
,
Thomas Staub
,
Torsten Braun
PiRAT: Pivot Routing for Alarm Transmission in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Nancy El Rachkidy
,
Alexandre Guitton
,
Bassem Bakhache
,
Michel Misson
An energy efficient and QoS aware multipath routing protocol for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Bashir Yahya
,
Jalel Ben-Othman
CSR: Convex Subspace Routing protocol for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Dulanjalie C. Dhanapala
,
Anura P. Jayasumana
Deploying a real IEEE 802.11e testbed to validate simulation results
Full-text access may be available. Sign in or learn about subscription options.
by
Alvaro Torres
,
Carlos T. Calafate
,
Juan-Carlos Cano
,
Pietro Manzoni
VoIP capacity analysis in IEEE 802.11 WLAN
Full-text access may be available. Sign in or learn about subscription options.
by
Kewin O. Stoeckigt
,
Hai L. Vu
A self-configured handoff scheme for IEEE 802.11-based wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Azzedine Boukerche
,
Zhenxia Zhang
,
Richard W. Pazzi
A polling method using orthogonal signalling for Wireless Local Area Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Jae Hoon Ko
,
Soonmok Kwon
,
Cheeha Kim
LOP_RE: Range encoding for low power packet classification
Full-text access may be available. Sign in or learn about subscription options.
by
Xin He
,
Jorgen Peddersen
,
Sri Parameswaran
An inherently anomaly-free iBGP architecture
Full-text access may be available. Sign in or learn about subscription options.
by
Uli Bornhauser
,
Peter Martini
,
Martin Horneffer
Building cost effective lower layer VPNs: The ILEC/CLEC paradox
Full-text access may be available. Sign in or learn about subscription options.
by
Aref Meddeb
,
Abdelwahed Berguiga
,
Habib Youssef
A scalable cluster distributed BGP architecture for next generation routers
Full-text access may be available. Sign in or learn about subscription options.
by
Wissam Hamzeh
,
Abdelhakim Hafid
Reliable transmission over covert channels in first person shooter multiplayer games
Full-text access may be available. Sign in or learn about subscription options.
by
Sebastian Zander
,
Grenville Armitage
,
Philip Branch
Multimedia group synchronization approach for one-way cluster-to-cluster applications
Full-text access may be available. Sign in or learn about subscription options.
by
Fernando Boronat
,
Mario Montagud
,
Juan C. Guerri
Optimization bandwidth sharing for multimedia transmission supporting scalable video coding
Full-text access may be available. Sign in or learn about subscription options.
by
Mohammad S. Talebi
,
Ahmad Khonsari
,
Mohammad H. Hajiesmaili
Parametric speech quality models for measuring the perceptual effect of network delay jitter
Full-text access may be available. Sign in or learn about subscription options.
by
Sofiene Jelassi
,
Habib Youssef
,
Guy Pujolle
On optimizing survivable multihoming
Full-text access may be available. Sign in or learn about subscription options.
by
Hamid Hajabdolali Bazzaz
,
Sajjad Zarifzadeh
,
Ahmad Khonsari
,
Amir Nayyeri
Enhancements for IEEE 802.11 networks with directional antennas
Full-text access may be available. Sign in or learn about subscription options.
by
Tamer Nadeem
Supporting multipoint-to-point communications in all-optical WDM networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Fen Zhou
,
Mohand Yazid Saidi
,
Miklós Molnár
,
Bernard Cousin
A generalised prediction model of first person shooter game traffic
Full-text access may be available. Sign in or learn about subscription options.
by
Antonio L. Cricenti
,
Philip A. Branch
Proxy-based MOBIKE fast handoff for femtocell integrated mobile network
Full-text access may be available. Sign in or learn about subscription options.
by
Tsunehiko Chiba
,
Satoshi Komorita
,
Hidetoshi Yokota
A performance evaluation of warning message dissemination in 802.11p based VANETs
Full-text access may be available. Sign in or learn about subscription options.
by
Francisco J. Martinez
,
Juan-Carlos Cano
,
Carlos T. Calafate
,
Pietro Manzoni
Validating GrADAR - an Approach for graph-based automated DoS attack response
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-228
by
Marko Jahnke
,
Jens Tölle
,
Christian Thul
,
Peter Martini
Performance analysis of a fibre channel switch supporting node port identifier virtualization: Preliminary results
Full-text access may be available. Sign in or learn about subscription options.
by
Suresh Muknahallipatna
,
Joseph Miles
,
Howard Johnson
Improving uplink bandwidth management in 802.16 networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-236
by
Andrés Arcia
,
Nicolas Montavont
,
Alejandro Paltrineri
,
David Ros
P-OLSR: Position-based optimized link state routing for mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Sachin Sharma
A new self-detection scheme for sensor network boundary recognition
Full-text access may be available. Sign in or learn about subscription options.
by
I. Khan
,
H. Mokhtar
,
M. Merabti
Private handshakes with optional accountability
Full-text access may be available. Sign in or learn about subscription options.
by
Yanjiang Yang
,
Feng Bao
,
Jian Weng
TCP Feno: Enhancement for higher accuracy of loss differentiation over small buffer heterogeneous networks
Full-text access may be available. Sign in or learn about subscription options.
by
Jae-Hyun Hwang
,
See-Hwan Yoo
,
Chuck Yoo
Performance comparison of content-oriented networking alternatives: A tree versus a distributed hash table
Full-text access may be available. Sign in or learn about subscription options.
by
Jaeyoung Choi
,
Jinyoung Han
,
Eunsang Cho
,
Hyunchul Kim
,
Taekyoung Kwon
,
Yanghee Choi
Performance of handover for multiple users in heterogeneous wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Mădălina Fiterău
,
Olga Ormond
,
Gabriel-Miro Muntean
Probabilistic routing for multiple flows in wireless multi-hop networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-264
by
Yong Cui
,
Wenjie Hu
,
Sasu Tarkoma
,
Antti Ylä-Jääski
A common API for hybrid group communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-268
by
Matthias Wählisch
,
Thomas C. Schmidt
,
Georg Wittenburg
Practical security in p2p-based social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-272
by
Kalman Graffi
,
Patrick Mukherjee
,
Burkhard Menges
,
Daniel Hartung
,
Aleksandra Kovacevic
,
Ralf Steinmetz
Statistics-based ID management for load balancing in structured P2P networks
Full-text access may be available. Sign in or learn about subscription options.
by
Daniel Warneke
,
Christian Dannewitz
A divide-and-conquer scheme for assigning roles in multi-channel wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-280
by
Benoît Darties
,
Fabrice Theoleyre
,
Andrzej Duda
Power control for multiple access communication systems with multi-packet reception capability
Full-text access may be available. Sign in or learn about subscription options.
by
Wooyeol Choi
,
Daewon Jung
,
Heung-No Lee
,
Hyuk Lim
Network-layer soft vertical handoff schemes without packet reordering
Full-text access may be available. Sign in or learn about subscription options.
by
Tong Shu
,
Min Liu
,
Zhongcheng Li
,
Kun Zheng
A novel extension of Kruskal's algorithm in multicast routing
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed Aissa
,
Adel Ben Mnaouer
,
Abdelfettah Belghith
Feedback based distributed admission control in 802.11 WLANs
Full-text access may be available. Sign in or learn about subscription options.
by
Preetam Patil
,
Vipul Mathur
,
Varsha Apte
,
Kannan Moudgalya
Signal Strength-based Adaptive Multimedia Delivery Mechanism
Full-text access may be available. Sign in or learn about subscription options.
by
Ramona Trestian
,
Gabriel-Miro Muntean
,
Olga Ormond
Distributed bandwidth reservation strategies to support efficient bandwidth utilization and QoS on a per-link basis in IEEE 802.16 Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Parag S. Mogre
,
Matthias Hollick
,
Ralf Steinmetz
,
Viraj Dadia
,
Somnath Sengupta
Understanding the role of multi-rate retry mechanism for effective rate control in 802.11 wireless LANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-308
by
Neda[ Kocç
,
Mahesh K. Marina
On providing QoS in optical burst switched networks using feedback control
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed Faten Zhani
,
Wael Hosny Fouad Aly
,
Halima Elbiaze
Performance of a multi-channel MAC protocol based on IEEE 802.15.4 radio
Full-text access may be available. Sign in or learn about subscription options.
by
P Gireesan Namboothiri
,
Krishna M. Sivalingam
Performance of cooperative relaying with ARQ in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Stephen Culver
,
Gang Wang
,
Mikael Gidlund
P2P storage systems: How much locality can they tolerate?
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-323
by
Frédéric Giroire
,
Julian Monteiro
,
Stéphane Pérennes
CARP: A context-aware routing protocol for delay-constrained traffic in sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Abdelmounaam Rezgui
,
Mohamed Eltoweissy
Optimal cluster head election for efficient resource discovery mechanism in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Muhammad Raza
,
Ali Akbar
,
Waqar Mahmood
Stochastic traffic and connectivity dynamics for vehicular ad-hoc networks in signalized road systems
Full-text access may be available. Sign in or learn about subscription options.
by
Ivan Wang-Hei Ho
,
Kin K. Leung
,
John W. Polak
Data fusion latency in Internet-based sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Panho Lee
,
Anura P. Jayasumana
,
Saket Doshi
,
V. Chandrasekar
Optimizing link weight in OSPF routing under unknown traffic matrices
Full-text access may be available. Sign in or learn about subscription options.
by
Xiao-mei Cheng
,
Sheng Wang
,
Xiong Wang
Framework for multi-class and dynamic flow-aware admission control
Full-text access may be available. Sign in or learn about subscription options.
by
Brikena Statovci-Halimi
,
Vincent Chimaobi Emeakaroha
A Deterministic approach to evaluate path loss exponents in large-scale outdoor 802.11 WLANs
Full-text access may be available. Sign in or learn about subscription options.
by
Ting Zhou
,
Hamid Sharif
,
Michael Hempel
,
Puttipong Mahasukhon
,
Wei Wang
,
Tao Ma
Boundary recognition in sensor networks by building relative contours
Full-text access may be available. Sign in or learn about subscription options.
by
Kai Li
,
Yun Wang
Battery-aware localization in wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Ali Saidi
,
Chuntao Zhang
,
Silviu Chiricescu
,
Loren J. Rittle
,
Yang Yu
Modeling multi-path routing and congestion control under FIFO and fair queuing
Full-text access may be available. Sign in or learn about subscription options.
by
Luca Muscariello
,
Diego Perino
Offered-load model for Pareto inter-arrival network traffic
Full-text access may be available. Sign in or learn about subscription options.
by
Rakesh Singhai
,
Shiv Dutt Joshi
,
Rajendra K. P. Bhatt
An architecture for scalable network defense
Full-text access may be available. Sign in or learn about subscription options.
by
Tim Strayer
,
Walter Milliken
,
Ronald Watro
,
Walt Heimerdinger
,
Steve Harp
,
Robert P. Goldman
,
Dustin Spicuzza
,
Beverly Schwartz
,
David Mankins
,
Derrick Kong
,
Peiter Mudge Zatko
BIDIR-SAM: Large-scale content distribution in structured overlay networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-375
by
Matthias Wählisch
,
Thomas C. Schmidt
,
Georg Wittenburg
Efficient medium access control design for autonomous wireless networks - A game theoretic approach
Full-text access may be available. Sign in or learn about subscription options.
by
Lin Chen
,
Jean Leneutre
Incorporating spatial reuse into algorithms for bandwidth management and scheduling in IEEE 802.16j relay networks
Full-text access may be available. Sign in or learn about subscription options.
by
Parag S. Mogre
,
Matthias Hollick
,
Stefan Dimitrov
,
Ralf Steinmetz
A Single radio based channel datarate-aware parallel rendezvous MAC protocol for cognitive radio networks
Full-text access may be available. Sign in or learn about subscription options.
by
Lei Jiao
,
Frank Y. Li
Medium access control scheme design for MANETs: A collision classification approach
Full-text access may be available. Sign in or learn about subscription options.
by
Qifei Zhang
,
Baolin Sun
,
Chao Gui
,
Zhifeng Dai
An Optimization based approach to maximizing QoS assurance for IPTV triple play services on the internet backbone
Full-text access may be available. Sign in or learn about subscription options.
by
Gajaruban Kandavanam
,
Dmitri Botvich
,
Sasitharan Balasubramaniam
Topology control for enhanced QoS on infrastructure-less heterogeneous radio networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Amir Djouama
,
Lynda Mokdad
,
Marwen Abdennebi
,
Samir Tohmé
Adaptive video compression rate optimization in wireless access networks
Full-text access may be available. Sign in or learn about subscription options.
by
Xiaoling Qiu
,
Haiping Liu
,
Dipak Ghosal
,
Biswanath Mukherjee
,
John Benko
,
Wei Li
,
Rashmi Bajaj
Preemption mechanisms for push-to-talk in ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-435
by
Erlend Larsen
,
Lars Landmark
,
Vinh Pham
,
Paal E. Engelstady
,
Øivind Kure
Showing 100 out of 194
Load More
Load All