Default Cover Image

IEEE Local Computer Network Conference

Oct. 10 2010 to Oct. 14 2010

Denver, CO

Table of Contents

Papers
Message from the General ChairFreely available from IEEE.pp. 1-2
Papers
P2MNet 2010 Organizing and Program CommitteesFreely available from IEEE.pp. 1-1
Papers
Author indexFreely available from IEEE.pp. 1-20
Papers
SenseApp 2010 reviewersFreely available from IEEE.pp. 1
Papers
Towards peer-to-peer-based cryptanalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1005-1012
Papers
An aggregation friendly information model for demand side resourcesFull-text access may be available. Sign in or learn about subscription options.pp. 1019-1023
Papers
Table of contentsFreely available from IEEE.pp. 1-16
Papers
Message from the Program ChairsFreely available from IEEE.pp. 1-2
Papers
SGNI 2010 organizing and Program CommitteeFreely available from IEEE.pp. 1-1
Papers
Open Cyber-Architecture for electrical energy marketsFull-text access may be available. Sign in or learn about subscription options.pp. 1024-1031
Papers
Welcome message from the ON-MOVE 2010 co-chairsFreely available from IEEE.pp. 1
Papers
SICK 2010 organizing and Program CommitteeFreely available from IEEE.pp. 1-1
Papers
Welcome message from the P2MNet 2010 co-chairsFreely available from IEEE.pp. 1
Papers
LCN 2010 keynotesFreely available from IEEE.pp. 1-3
Papers
SenseApp 2010 organizing and Program CommitteeFreely available from IEEE.pp. 1-1
Papers
Enabling real-time charging for smart grid infrastructures using in-memory databasesFull-text access may be available. Sign in or learn about subscription options.pp. 1040-1045
Papers
Welcome message from the SGNI 2010 co-chairsFreely available from IEEE.pp. 1
Papers
LCN 2010 organizing committeeFreely available from IEEE.pp. 1-4
Papers
Characterizing traffic generated with laptop computers and mobile handsets in GPRS/UMTS core networksFull-text access may be available. Sign in or learn about subscription options.pp. 1046-1053
Papers
WISe 2010 organizing and Program CommitteeFreely available from IEEE.pp. 1-1
Papers
Welcome message from the SICK 2010 co-chairsFreely available from IEEE.pp. 1
Papers
Index recommendation tool for optimized information discovery over distributed hash tablesFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Papers
WLN 2010 organizing and Program CommitteeFreely available from IEEE.pp. 1-1
Papers
Welcome message from the SenseApp 2010 co-chairsFreely available from IEEE.pp. 1
Papers
Understanding opinion leaders in bulletin board systems: Structures and algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1062-1067
Papers
WNM 2010 organizing and Program CommitteeFreely available from IEEE.pp. 1-1
Papers
Link failure monitoring via network codingFull-text access may be available. Sign in or learn about subscription options.pp. 1068-1075
Papers
Welcome message from the WISe 2010 co-chairsFreely available from IEEE.pp. 1
Papers
Welcome message from the WLN 2010 co-chairsFreely available from IEEE.pp. 1
Papers
Welcome message from the WNM 2010 co-chairsFreely available from IEEE.pp. 1
Papers
On a decentralized approach to tree construction in hybrid P2P networksFull-text access may be available. Sign in or learn about subscription options.pp. 112-119
Papers
A brinkmanship game theory model for competitive wireless networking environmentFull-text access may be available. Sign in or learn about subscription options.pp. 120-127
Papers
APPCCM: Adaptive per-user per-object cache consistency management for mobile client-server applications in wireless mesh networksFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Papers
Topology preserving maps from virtual coordinates for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 136-143
Papers
Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 152-159
Papers
Mitigating the effect of interference in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 160-167
Papers
A business process aware semantic QoS provisioning schemeFull-text access may be available. Sign in or learn about subscription options.pp. 16-23
Papers
CoSenS: A collecting and sending burst scheme for performance improvement of IEEE 802.15.4Full-text access may be available. Sign in or learn about subscription options.pp. 172-175
Papers
Group key agreement performance in wireless mesh networksFull-text access may be available. Sign in or learn about subscription options.pp. 176-179
Papers
CWMP extensions for enhanced management of domestic network servicesFull-text access may be available. Sign in or learn about subscription options.pp. 180-183
Papers
Observation-based cooperation in mobile sensor networks: A bio-inspired approach for fault tolerant coverageFull-text access may be available. Sign in or learn about subscription options.pp. 184-187
Papers
TestbedProfiler: A validation tool for wireless sensor network testbed deploymentFull-text access may be available. Sign in or learn about subscription options.pp. 188-191
Papers
Scalable encryption of variable length coded video bit streamsFull-text access may be available. Sign in or learn about subscription options.pp. 192-195
Papers
Energy implication of various VoIP codecs in portable devicesFull-text access may be available. Sign in or learn about subscription options.pp. 196-199
Papers
Performance analysis of a high-performance real-time application with several AL-FEC schemesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Papers
Strategies and approaches for multicast tree stabilityFull-text access may be available. Sign in or learn about subscription options.pp. 200-203
Papers
Joint optimization of monitor location and network anomaly detectionFull-text access may be available. Sign in or learn about subscription options.pp. 204-207
Papers
Dynamic and distributed routing control for virtualized local area networksFull-text access may be available. Sign in or learn about subscription options.pp. 212-215
Papers
An efficient and highly resilient key management scheme for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 216-219
Papers
Credit scheduling and prefetching in hypervisors using Hidden Markov ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 224-227
Papers
Efficient searching with parallel TCAM chipsFull-text access may be available. Sign in or learn about subscription options.pp. 228-321
Papers
A novel cooperative image transmission scheme in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 240-243
Papers
Modeling signal strength of body-worn devicesFull-text access may be available. Sign in or learn about subscription options.pp. 244-247
Papers
A gossip-based asynchronous aggregation protocol for P2P systemsFull-text access may be available. Sign in or learn about subscription options.pp. 248-251
Papers
Mitigating selfish misbehavior in multi-hop networks using stochastic game theoryFull-text access may be available. Sign in or learn about subscription options.pp. 232-235
Papers
Towards efficient and reliable context data distribution in disaster area scenariosFull-text access may be available. Sign in or learn about subscription options.pp. 252-255
Papers
A scalable secure overlay framework for heterogeneous embedded systemsFull-text access may be available. Sign in or learn about subscription options.pp. 236-239
Papers
Secure access control protocol for WSNs with inter-network roamingFull-text access may be available. Sign in or learn about subscription options.pp. 256-259
Papers
A trust management architecture for hierarchical wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 264-267
Improved coexistence and loss tolerance for delay based TCP congestion controlFull-text access may be available. Sign in or learn about subscription options.pp. 24-31
Papers
Characterizing 10 Gbps network interface energy consumptionFull-text access may be available. Sign in or learn about subscription options.pp. 268-271
Papers
Bandwidth reservations in home networks: Performance assessment of UPnP-QoS V3Full-text access may be available. Sign in or learn about subscription options.pp. 272-275
Papers
Delay-efficient geodynamic group-based authentication in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 280-283
Papers
Towards a knowledge-based intelligent handover in heterogeneous wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 284-287
Papers
Dynamic implementation of network selection policiesFull-text access may be available. Sign in or learn about subscription options.pp. 292-295
Papers
An evaluation of parallel optimization for OpenSolaris® network stackFull-text access may be available. Sign in or learn about subscription options.pp. 296-299
Papers
Design of adaptive real queue control algorithm supporting TCP flowsFull-text access may be available. Sign in or learn about subscription options.pp. 300-303
Papers
Research testbed for field testing of Multi-hop Cellular Networks using Mobile RelaysFull-text access may be available. Sign in or learn about subscription options.pp. 304-307
Papers
Adaptive routing algorithms and implementation for interconnection network TESH for parallel processingFull-text access may be available. Sign in or learn about subscription options.pp. 308-311
Papers
Distributed delivery system for time-shifted streaming systemsFull-text access may be available. Sign in or learn about subscription options.pp. 276-279
Papers
The rise and fall of the AODV protocol: A testbed study on practical routing attacksFull-text access may be available. Sign in or learn about subscription options.pp. 316-319
Papers
Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlaysFull-text access may be available. Sign in or learn about subscription options.pp. 320-323
Papers
Multimedia QoE optimized management using prediction and statistical learningFull-text access may be available. Sign in or learn about subscription options.pp. 324-327
Papers
In-network server-directed client authentication and packet classificationFull-text access may be available. Sign in or learn about subscription options.pp. 328-331
Papers
Video transport over VANETs: Multi-stream coding with multi-path and network codingFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
Papers
Impact of Internet exchange points on Internet topology evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 332-335
Papers
Migrating to IPv6: A game-theoretic perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 344-347
Papers
Scalability of the Locator Identity Split Mapping Infrastructure to support end-host mobilityFull-text access may be available. Sign in or learn about subscription options.pp. 352-355
Papers
Optimizing dynamic composition of Bayesian Networks for context sensing and inferenceFull-text access may be available. Sign in or learn about subscription options.pp. 312-315
Papers
Optimally using the Bluetooth subband codecFull-text access may be available. Sign in or learn about subscription options.pp. 356-359
Papers
Network selection for heterogeneous multi-service wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 360-363
Papers
Listening to Everyone's Voice Enhances Learning (LEVEL)Full-text access may be available. Sign in or learn about subscription options.pp. 364-367
Papers
TreeClimber: A network-driven push-pull hybrid scheme for peer-to-peer video live streamingFull-text access may be available. Sign in or learn about subscription options.pp. 368-371
Papers
A pull model IPv6 Duplicate Address DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 372-375
Papers
QMS-Quality of Multimedia Streaming metric for soft-handover in heterogeneous wireless environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 376-379
Papers
Modeling spatial and temporal behavior of Internet traffic anomaliesFull-text access may be available. Sign in or learn about subscription options.pp. 384-391
Papers
Failure-resilient vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 336-339
Papers
A novel hybrid probing technique for end-to-end available bandwidth estimationFull-text access may be available. Sign in or learn about subscription options.pp. 400-407
Papers
Statistical response time bounds in randomly deployed wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 340-343
Papers
Lightweight DDoS flooding attack detection using NOX/OpenFlowFull-text access may be available. Sign in or learn about subscription options.pp. 408-415
Papers
An inconvenient truth about tunneled authenticationsFull-text access may be available. Sign in or learn about subscription options.pp. 416-423
Papers
FlexTDMA for delay-stable communications in asynchronous industrial control networksFull-text access may be available. Sign in or learn about subscription options.pp. 348-351
Papers
A network reconfiguration scheme against misbehaving nodesFull-text access may be available. Sign in or learn about subscription options.pp. 424-431
Papers
RMLCC: Recovery-based multi-layer connected chain mechanism for multicast source authenticationFull-text access may be available. Sign in or learn about subscription options.pp. 432-439
Showing 100 out of 212