By Topic

2008 33rd IEEE Conference on Local Computer Networks (LCN)

Date 14-17 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 180
  • 33rd annual IEEE conference on local computer networks - LCN 2008

    Publication Year: 2008, Page(s):i - vii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • 2nd IEEE LCN workshop on user mobility and vehicular networks - ON-MOVE 2008

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • 4th IEEE international workshop on performance and management of wireless and mobile networks - P2MNET 2008

    Publication Year: 2008, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • 3rd international workshop on practical issues in building sensor network applications - SENSEAPP 2008

    Publication Year: 2008, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • 8th international workshop on wireless local networks - WLN 2008

    Publication Year: 2008, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • 3rd IEEE LCN workshop on network measurements - WNM 2008

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • 4th IEEE LCN workshop on network security - WNS 2008

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2008, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • LCN Organizing Committee

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • LCN Program Committee

    Publication Year: 2008, Page(s):5 - 7
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • GENI - global environment for network innovations

    Publication Year: 2008, Page(s): 8
    Cited by:  Papers (8)
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Distributed search revisited: Resolving the conflict of flexibility and efficiency

    Publication Year: 2008, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • LCN 2008 sponsors

    Publication Year: 2008, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Cooperative caching: The case for P2P traffic

    Publication Year: 2008, Page(s):12 - 19
    Cited by:  Patents (3)
    Request permission for commercial reuse | PDF file iconPDF (199 KB) | HTML iconHTML
    Freely Available from IEEE
  • Experimental comparison of peer-to-peer streaming overlays: An application perspective

    Publication Year: 2008, Page(s):20 - 27
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    We compare two representative streaming systems using mesh-based and multiple tree-based overlay routing through deployments on the PlanetLab wide-area experimentation platform. To the best of our knowledge, this is the first study to compare streaming overlay architectures in real Internet settings, considering not only intuitive aspects such as scalability and performance under churn, but also l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Range queries and load balancing in a hierarchically structured P2P system

    Publication Year: 2008, Page(s):28 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (997 KB) | HTML iconHTML

    Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, are used more and more for file-sharing and content distribution applications. However, a major weakness of traditional DHTs is the search for stored content, as data is assigned to nodes based on hash functions, and the very... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing low-latency overlay networks: Tree vs. mesh algorithms

    Publication Year: 2008, Page(s):36 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Distributed interactive applications may have stringent latency requirements and dynamic user groups. These applications may benefit from a group communication system, and to improve the system support for such applications, we investigate graph algorithms that construct low-latency overlay networks for application-layer multicast. In particular, we focus on reducing the diameter and the pair-wise... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP address assignment in wireless mesh networks

    Publication Year: 2008, Page(s):44 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    The demand for wireless networks which provide high bandwidth and access to the Internet continues. In recent years, a new class of networks which fulfill these requirements evolved, wireless mesh networks (WMNs). Although WMNs satisfy the demand for high bandwidth and Internet access, there is a further, fundamental factor of success: the simple use. Except for small networks, manual configuratio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh Protocol

    Publication Year: 2008, Page(s):52 - 57
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Hybrid Wireless Mesh Protocol (HWMP) in IEEE 802.11s provides two routing modes, on-demand and proactive, for WLAN mesh networks. Although the on-demand routing mode always provides the optimum routing paths for data transmission, the initial latency can be very high when communicating with a destination in an external network. On the other hand, the proactive routing mode shows low initial latenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH mode

    Publication Year: 2008, Page(s):58 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    The IEEE 802.16 standard specifies a MeSH mode which permits the deployment of Wireless Mesh Networks (WMNs) supporting carrier-grade QoS. The network operator for such planned WMNs is interested in maximizing the traffic admitted in the WMN and simultaneously supporting QoS. Recently network coding has emerged as a promising technique for increasing the throughput in WMNs. This paper proposes COR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding

    Publication Year: 2008, Page(s):66 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    In this paper we address the problem of traffic grooming in WDM rings with all-to-all and its generalization to many-to-many service by using network coding. We consider minimizing the number of Line Terminating Equipment (LTE) on two types of unidirectional rings, namely, single-hub and un-hubbed rings, as our objective. In single-hub rings, we investigate the minimum cost provisioning of uniform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconstructing the Plenoptic function from wireless multimedia sensor networks

    Publication Year: 2008, Page(s):74 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    The development of low-cost image/video sensors has enabled wireless multimedia sensor networks (WMSN). Equipped with the ability to collect images/video streams from surrounding environments, many interesting applications will emerge through the use of WMSN. One of the key targets of a WMSN application is reconstructing the Plenoptic function by using collected images. However, due to the charact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving information availability in storage-centric sensor networks

    Publication Year: 2008, Page(s):82 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    We address the issue of improving information availability in a class of delay-tolerant sensor network applications, where the sensor nodes are deployed in disconnected environments. In such environments, since there is no continuous access to a remote base station, there is a need to leverage the collaborative resources of the sensor network to support in-network storage. The stored data can then... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay constrained placement of mobile data collectors in underwater acoustic sensor networks

    Publication Year: 2008, Page(s):91 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    We propose a scheme for routing and placement of mobile data collectors in Underwater Acoustic Sensor Networks (UASNs). The proposed scheme maximizes the lifetime of the network with an upper bound on the maximum delay. We assume a 3D architecture, in which on-the-surface data collectors gather data from underwater sensors and relay them to an on-shore sink. We divide the lifetime of the network i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.