Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCN
LCN 2010
Generate Citations
IEEE Local Computer Network Conference
Oct. 10 2010 to Oct. 14 2010
Denver, CO
Table of Contents
Papers
Message from the General Chair
Freely available from IEEE.
pp. 1-2
Papers
P2MNet 2010 Organizing and Program Committees
Freely available from IEEE.
pp. 1-1
Papers
Author index
Freely available from IEEE.
pp. 1-20
Papers
SenseApp 2010 reviewers
Freely available from IEEE.
pp. 1
Papers
Towards peer-to-peer-based cryptanalysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1005-1012
Papers
An aggregation friendly information model for demand side resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 1019-1023
Papers
Table of contents
Freely available from IEEE.
pp. 1-16
Papers
Message from the Program Chairs
Freely available from IEEE.
pp. 1-2
Papers
SGNI 2010 organizing and Program Committee
Freely available from IEEE.
pp. 1-1
Papers
Open Cyber-Architecture for electrical energy markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1024-1031
Papers
Welcome message from the ON-MOVE 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
SICK 2010 organizing and Program Committee
Freely available from IEEE.
pp. 1-1
Papers
Welcome message from the P2MNet 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
LCN 2010 keynotes
Freely available from IEEE.
pp. 1-3
Papers
SenseApp 2010 organizing and Program Committee
Freely available from IEEE.
pp. 1-1
Papers
Enabling real-time charging for smart grid infrastructures using in-memory databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 1040-1045
Papers
Welcome message from the SGNI 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
LCN 2010 organizing committee
Freely available from IEEE.
pp. 1-4
Papers
Characterizing traffic generated with laptop computers and mobile handsets in GPRS/UMTS core networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1046-1053
Papers
WISe 2010 organizing and Program Committee
Freely available from IEEE.
pp. 1-1
Papers
Welcome message from the SICK 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
Index recommendation tool for optimized information discovery over distributed hash tables
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
Papers
WLN 2010 organizing and Program Committee
Freely available from IEEE.
pp. 1-1
Papers
Welcome message from the SenseApp 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
Understanding opinion leaders in bulletin board systems: Structures and algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1062-1067
Papers
WNM 2010 organizing and Program Committee
Freely available from IEEE.
pp. 1-1
Papers
Link failure monitoring via network coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1068-1075
Papers
Welcome message from the WISe 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
Welcome message from the WLN 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
Welcome message from the WNM 2010 co-chairs
Freely available from IEEE.
pp. 1
Papers
On a decentralized approach to tree construction in hybrid P2P networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-119
Papers
A brinkmanship game theory model for competitive wireless networking environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
Papers
APPCCM: Adaptive per-user per-object cache consistency management for mobile client-server applications in wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
Papers
Topology preserving maps from virtual coordinates for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-143
by
Dulanjalie, C. Dhanapala Dulanjalie
,
Anura, P. Jayasumana Anura
Papers
LSWTC: A local small-world topology control algorithm for backbone-assisted mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-151
by
Matthias R. Brust
,
Carlos H.C. Ribeiro
,
Damla Turgut
,
Steffen Rothkugel
Papers
Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-159
Papers
Mitigating the effect of interference in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-167
Papers
A business process aware semantic QoS provisioning scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-23
Papers
CoSenS: A collecting and sending burst scheme for performance improvement of IEEE 802.15.4
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-175
Papers
Capacity analysis of multi-hop wireless sensor networks using multiple transmission channels: A case study using IEEE 802.15.4 based networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-171
by
Namboothiri, P Gireesan Namboothiri
,
Krishna, M. Sivalingam Krishna
Papers
Group key agreement performance in wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-179
Papers
CWMP extensions for enhanced management of domestic network services
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-183
Papers
Observation-based cooperation in mobile sensor networks: A bio-inspired approach for fault tolerant coverage
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-187
Papers
TestbedProfiler: A validation tool for wireless sensor network testbed deployment
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-191
Papers
Scalable encryption of variable length coded video bit streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-195
Papers
Energy implication of various VoIP codecs in portable devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-199
Papers
Performance analysis of a high-performance real-time application with several AL-FEC schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
Papers
Strategies and approaches for multicast tree stability
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-203
Papers
Joint optimization of monitor location and network anomaly detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-207
Papers
Dynamic and distributed routing control for virtualized local area networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-215
Evaluation of dual transceiver approaches for scalable WLAN communications: Exploring the wireless capacity in entertainment parks
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-211
by
Kevin Collins
,
Gabriel-Miro Muntean
,
Stefan Mangold
Papers
An efficient and highly resilient key management scheme for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-219
Papers
Credit scheduling and prefetching in hypervisors using Hidden Markov Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-227
Papers
Quantifying connectivity of grid-based Wireless Sensor Networks under practical errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-223
by
Fadi, M. Al-Turjman Fadi
,
Hossam, S. Hassanein Hossam
,
Mohamed, A. Ibnkahla Mohamed
Papers
Efficient searching with parallel TCAM chips
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-321
Papers
A novel cooperative image transmission scheme in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-243
Papers
Modeling signal strength of body-worn devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-247
Papers
A gossip-based asynchronous aggregation protocol for P2P systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-251
Papers
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-235
by
Charles, A. Kamhoua Charles
,
Pissinou, Niki Pissinou
Papers
Towards efficient and reliable context data distribution in disaster area scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-255
Papers
A scalable secure overlay framework for heterogeneous embedded systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-239
by
Kraxberger, Stefan Kraxberger
Papers
Secure access control protocol for WSNs with inter-network roaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-259
Papers
A trust management architecture for hierarchical wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-267
Improved coexistence and loss tolerance for delay based TCP congestion control
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-31
by
David A. Hayes
,
Grenville Armitage
Papers
Characterizing 10 Gbps network interface energy consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-271
Papers
Bandwidth reservations in home networks: Performance assessment of UPnP-QoS V3
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-275
Papers
Delay-efficient geodynamic group-based authentication in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-283
Papers
Towards a knowledge-based intelligent handover in heterogeneous wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-287
Papers
Dynamic implementation of network selection policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-295
Papers
An evaluation of parallel optimization for OpenSolaris® network stack
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-299
Availability and cost constrained fast planning of Passive Optical Networks under various survivability policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-263
by
Burak Kantarci
,
Hussein T. Mouftah
Papers
Design of adaptive real queue control algorithm supporting TCP flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-303
Papers
Research testbed for field testing of Multi-hop Cellular Networks using Mobile Relays
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-307
Papers
Adaptive routing algorithms and implementation for interconnection network TESH for parallel processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-311
Papers
Distributed delivery system for time-shifted streaming systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-279
by
Liu, Yaning Liu
,
Simon, Gwendal Simon
Papers
The rise and fall of the AODV protocol: A testbed study on practical routing attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-319
Papers
Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-323
Papers
How to conciliate conflicting users' interests for different collective, ubiquitous and context-aware applications?
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-291
by
Thais, R. M. Braga Silva Thais
,
Linnyer, B. Ruiz Linnyer
,
Antonio, A. F. Loureiro Antonio
Papers
Multimedia QoE optimized management using prediction and statistical learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-327
Papers
In-network server-directed client authentication and packet classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-331
Papers
Video transport over VANETs: Multi-stream coding with multi-path and network coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-39
Papers
Impact of Internet exchange points on Internet topology evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-335
Papers
Migrating to IPv6: A game-theoretic perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-347
Papers
Scalability of the Locator Identity Split Mapping Infrastructure to support end-host mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-355
Papers
Optimizing dynamic composition of Bayesian Networks for context sensing and inference
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-315
by
Frank, Korbinian Frank
,
Rockl, Matthias Rockl
,
Pfeifer, Tom Pfeifer
Papers
Optimally using the Bluetooth subband codec
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-359
Papers
Network selection for heterogeneous multi-service wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-363
Papers
Listening to Everyone's Voice Enhances Learning (LEVEL)
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-367
Papers
TreeClimber: A network-driven push-pull hybrid scheme for peer-to-peer video live streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-371
Papers
A pull model IPv6 Duplicate Address Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-375
Papers
QMS-Quality of Multimedia Streaming metric for soft-handover in heterogeneous wireless environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-379
Papers
Modeling spatial and temporal behavior of Internet traffic anomalies
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-391
Papers
Failure-resilient vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-339
by
Yao, H. Ho Yao
,
Kien, A. Hua Kien
Papers
A novel hybrid probing technique for end-to-end available bandwidth estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-407
Papers
Statistical response time bounds in randomly deployed wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-343
by
Bondorf, Steffen Bondorf
,
Jens, B. Schmitt Jens
Papers
Lightweight DDoS flooding attack detection using NOX/OpenFlow
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-415
Papers
An inconvenient truth about tunneled authentications
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-423
Papers
FlexTDMA for delay-stable communications in asynchronous industrial control networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-351
by
David, A. Miller David
,
Ahmed, E. Kamal Ahmed
Papers
A network reconfiguration scheme against misbehaving nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-431
Papers
RMLCC: Recovery-based multi-layer connected chain mechanism for multicast source authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-439
Showing 100 out of 212
Load More
Load All