By Topic

2011 IEEE 36th Conference on Local Computer Networks

4-7 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 180
  • [Front matter]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):iii - xl
    Request permission for commercial reuse | PDF file iconPDF (1270 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2011, Page(s):xli - xlii
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2011, Page(s):xliii - xliv
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the demonstrations chair

    Publication Year: 2011, Page(s):xlv - xlvii
    Request permission for commercial reuse | PDF file iconPDF (139 KB) | HTML iconHTML
    Freely Available from IEEE
  • Best paper awards for prior IEEE local computer networks conferences

    Publication Year: 2011, Page(s):xlviii - xlix
    Request permission for commercial reuse | PDF file iconPDF (115 KB) | HTML iconHTML
    Freely Available from IEEE
  • LCN 2011 Organizing and Program Committee

    Publication Year: 2011, Page(s):l - lviii
    Request permission for commercial reuse | PDF file iconPDF (356 KB)
    Freely Available from IEEE
  • On-move 2011: Message from the on-move 2011 workshop chairs

    Publication Year: 2011, Page(s):lix - lx
    Request permission for commercial reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • WLN 2011: Message from the WLN 2011 workshop chairs

    Publication Year: 2011, Page(s):lxi - lxii
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • P2MNET 2011: Message from the P2MNET 2011 workshop chairs

    Publication Year: 2011, Page(s):lxiii - lxiv
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • WNM 2011: Message from the WNM 2011 workshop chairs

    Publication Year: 2011, Page(s):lxv - lxvi
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • SenseApp 2011: Message from the SenseApp 2011 workshop chairs

    Publication Year: 2011, Page(s):lxvii - lxviii
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • WISe 2011: Message from the WISe 2011 workshop chairs

    Publication Year: 2011, Page(s):lxix - lxx
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • WASA-NGI-IV 2011: Message from the WASA-NGI-IV 2011 workshop chairs

    Publication Year: 2011, Page(s):lxxi - lxxii
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Botnets — Detection, classification and countermeasures

    Publication Year: 2011, Page(s):lxxiii - lxxiv
    Request permission for commercial reuse | PDF file iconPDF (129 KB) | HTML iconHTML
    Freely Available from IEEE
  • Resource allocation in cooperative networks: The role of games

    Publication Year: 2011, Page(s): lxxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    Summary form only given. Cooperative communication is becoming a promising technology to increase the channel capacity of wireless networks. The assignment of relay nodes to users plays a critical role to the resulting channel capacity. A significant challenge is how to make the assignment scheme robust to selfish and cheating behavior of users while guaranteeing the social optimal system capacity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling flexible packet filtering through the K-map priority elimination technique

    Publication Year: 2011, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The process of packet filtering becomes time consuming as filtering policies become larger and more complex. New firewall designs are needed to meet the challenges associated with the high-speed networks. For this reason, access control lists in firewalls need to be flexible enough to give us the possibility to implement efficiently new high-performance filtering strategies. The precedence relatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PFS: Probabilistic filter scheduling against distributed denial-of-service attacks

    Publication Year: 2011, Page(s):9 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    Distributed denial-of-service (DDoS) attacks continue to pose an important challenge to current networks. DDoS attacks can cause victim resource consumption and link congestion. A filter-based DDoS defense is considered as an effective approach, since it can defend against both attacks: victim resource consumption and link congestion. However, existing filter-based approaches do not address necess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using roadmap profiling to enhance the warning message dissemination in vehicular environments

    Publication Year: 2011, Page(s):18 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (582 KB) | HTML iconHTML

    In recent years, new applications, architectures and technologies have been proposed for Vehicular ad hoc networks (VANETs). Regarding traffic safety applications for VANETs, warning messages have to be quickly disseminated in order to reduce the required dissemination time and to increase the number of vehicles receiving the traffic warning information. In the past, several approaches have been p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User- and application-centric multihomed flow management

    Publication Year: 2011, Page(s):26 - 34
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    We consider the problem of network selection and flow distribution for a multihomed mobile device. We argue the benefits of a holistic approach which considers user- and application-centric metrics such as quality, energy consumption and monetary cost, rather than the commonly used network-centric metrics. We thus introduce the multihomed flow management problem which combines network selection, f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-centric quality of service provisioning

    Publication Year: 2011, Page(s):35 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Current Internet traffic includes a combination of peer to peer, web, and real time traffic which leads to unfair treatment for users or, when policed, an uneven distribution of resources to applications. This paper presents a novel extension to the Assured Forwarding per-hop-behaviour for a Diffserv-based network, enabling a more user-centric approach when provisioning for Quality of Service over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to provision and manage off-the-shelf SIP phones in domestic and SOHO environments

    Publication Year: 2011, Page(s):42 - 49
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Integrated services delivered over broadband connections are becoming the norm in domestic households, as it is the case with triple-play bundles which offer combined Voice, Television and Data services delivered using IP-based technologies and protocols. As a result, the usage of SIP-based (Session Initiation Protocol) VoIP devices has known a significant growth in domestic environments, either i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate equalization: A new approach to fairness in deterministic quality of service

    Publication Year: 2011, Page(s):50 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Scheduling protocols that provide both rate and fairness guarantees, such as Weighted Fair Queuing, distribute the unused capacity among the flows in proportion to the reserved rate of the flows. Thus, flows whose reserved rate is the largest will receive a larger share of the unused capacity. We present a scheduling algorithm that first distributes unused capacity to those flows whose reserved ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MapCorrect: Automatic correction and validation of road maps using public sensing

    Publication Year: 2011, Page(s):58 - 66
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    With the increasing proliferation of small and cheap GPS receivers, a new way of generating road maps could be witnessed over the last few years. Participatory mapping approaches like OpenStreetMap introduced a way to generate road maps collaboratively from scratch. Moreover, automatic mapping algorithms were proposed, which automatically infer road maps from a set of given GPS traces. Nevertheles... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.