Default Cover Image

2009 IEEE 34th Conference on Local Computer Networks

Oct. 20 2009 to Oct. 23 2009

Zurich

Table of Contents

Message from the general chairFreely available from IEEE.pp. 1-2
LCN 2009 Organizing CommitteeFreely available from IEEE.
ICT as enabler of smart infrastructuresFreely available from IEEE.pp. 12-12
ON-MOVE 2009 organizationFreely available from IEEE.
P2MNet organizing committeeFreely available from IEEE.
SenseApp 2009 reviewersFreely available from IEEE.
WISe 2009 organizationFreely available from IEEE.
WLN 2009 organizationFreely available from IEEE.
WNM 2009 organizationFreely available from IEEE.
Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standardFull-text access may be available. Sign in or learn about subscription options.pp. 14-21
Stealthy dissemination in intruder tracking sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 22-29
Evaluation of authentication signaling loads in 3GPP LTE/SAE networksFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Cluster-based channel assignment in multi-radio multi-channel wireless mesh networksFull-text access may be available. Sign in or learn about subscription options.
Distributed receiving in RFID systemsFull-text access may be available. Sign in or learn about subscription options.
Backbone MAC for energy-constrained wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 77-84
An energy efficient and QoS aware multipath routing protocol for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
CSR: Convex Subspace Routing protocol for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Deploying a real IEEE 802.11e testbed to validate simulation resultsFull-text access may be available. Sign in or learn about subscription options.
VoIP capacity analysis in IEEE 802.11 WLANFull-text access may be available. Sign in or learn about subscription options.
A self-configured handoff scheme for IEEE 802.11-based wireless networksFull-text access may be available. Sign in or learn about subscription options.
A polling method using orthogonal signalling for Wireless Local Area NetworksFull-text access may be available. Sign in or learn about subscription options.
LOP_RE: Range encoding for low power packet classificationFull-text access may be available. Sign in or learn about subscription options.
An inherently anomaly-free iBGP architectureFull-text access may be available. Sign in or learn about subscription options.
Building cost effective lower layer VPNs: The ILEC/CLEC paradoxFull-text access may be available. Sign in or learn about subscription options.
A scalable cluster distributed BGP architecture for next generation routersFull-text access may be available. Sign in or learn about subscription options.
Multimedia group synchronization approach for one-way cluster-to-cluster applicationsFull-text access may be available. Sign in or learn about subscription options.
On optimizing survivable multihomingFull-text access may be available. Sign in or learn about subscription options.
Enhancements for IEEE 802.11 networks with directional antennasFull-text access may be available. Sign in or learn about subscription options.
Supporting multipoint-to-point communications in all-optical WDM networksFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
A generalised prediction model of first person shooter game trafficFull-text access may be available. Sign in or learn about subscription options.
Proxy-based MOBIKE fast handoff for femtocell integrated mobile networkFull-text access may be available. Sign in or learn about subscription options.
Validating GrADAR - an Approach for graph-based automated DoS attack responseFull-text access may be available. Sign in or learn about subscription options.pp. 225-228
Improving uplink bandwidth management in 802.16 networksFull-text access may be available. Sign in or learn about subscription options.pp. 233-236
P-OLSR: Position-based optimized link state routing for mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.
A new self-detection scheme for sensor network boundary recognitionFull-text access may be available. Sign in or learn about subscription options.
Private handshakes with optional accountabilityFull-text access may be available. Sign in or learn about subscription options.
Performance of handover for multiple users in heterogeneous wireless networksFull-text access may be available. Sign in or learn about subscription options.
Probabilistic routing for multiple flows in wireless multi-hop networksFull-text access may be available. Sign in or learn about subscription options.pp. 261-264
A common API for hybrid group communicationFull-text access may be available. Sign in or learn about subscription options.pp. 265-268
Practical security in p2p-based social networksFull-text access may be available. Sign in or learn about subscription options.pp. 269-272
Statistics-based ID management for load balancing in structured P2P networksFull-text access may be available. Sign in or learn about subscription options.
A divide-and-conquer scheme for assigning roles in multi-channel wireless mesh networksFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Network-layer soft vertical handoff schemes without packet reorderingFull-text access may be available. Sign in or learn about subscription options.
A novel extension of Kruskal's algorithm in multicast routingFull-text access may be available. Sign in or learn about subscription options.
Feedback based distributed admission control in 802.11 WLANsFull-text access may be available. Sign in or learn about subscription options.
Signal Strength-based Adaptive Multimedia Delivery MechanismFull-text access may be available. Sign in or learn about subscription options.
Understanding the role of multi-rate retry mechanism for effective rate control in 802.11 wireless LANsFull-text access may be available. Sign in or learn about subscription options.pp. 305-308
On providing QoS in optical burst switched networks using feedback controlFull-text access may be available. Sign in or learn about subscription options.
Performance of a multi-channel MAC protocol based on IEEE 802.15.4 radioFull-text access may be available. Sign in or learn about subscription options.
Performance of cooperative relaying with ARQ in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
P2P storage systems: How much locality can they tolerate?Full-text access may be available. Sign in or learn about subscription options.pp. 320-323
CARP: A context-aware routing protocol for delay-constrained traffic in sensor networksFull-text access may be available. Sign in or learn about subscription options.
Data fusion latency in Internet-based sensor networksFull-text access may be available. Sign in or learn about subscription options.
Optimizing link weight in OSPF routing under unknown traffic matricesFull-text access may be available. Sign in or learn about subscription options.
Framework for multi-class and dynamic flow-aware admission controlFull-text access may be available. Sign in or learn about subscription options.
Boundary recognition in sensor networks by building relative contoursFull-text access may be available. Sign in or learn about subscription options.
Battery-aware localization in wireless networksFull-text access may be available. Sign in or learn about subscription options.
Modeling multi-path routing and congestion control under FIFO and fair queuingFull-text access may be available. Sign in or learn about subscription options.
Offered-load model for Pareto inter-arrival network trafficFull-text access may be available. Sign in or learn about subscription options.
BIDIR-SAM: Large-scale content distribution in structured overlay networksFull-text access may be available. Sign in or learn about subscription options.pp. 372-375
Efficient medium access control design for autonomous wireless networks - A game theoretic approachFull-text access may be available. Sign in or learn about subscription options.
A Single radio based channel datarate-aware parallel rendezvous MAC protocol for cognitive radio networksFull-text access may be available. Sign in or learn about subscription options.
Medium access control scheme design for MANETs: A collision classification approachFull-text access may be available. Sign in or learn about subscription options.
Topology control for enhanced QoS on infrastructure-less heterogeneous radio networksFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
Preemption mechanisms for push-to-talk in ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 428-435
Showing 100 out of 194