Scheduled System Maintenance
On Tuesday, January 22, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

29th Annual IEEE International Conference on Local Computer Networks

16-18 Nov. 2004

Filter Results

Displaying Results 1 - 25 of 143
  • [Cover page]

    Publication Year: 2004, Page(s): c1
    Request permission for reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Proceedings. 29th Annual IEEE International Conference on Local Computer Networks. LCN 2004

    Publication Year: 2004
    Request permission for reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):v - xiii
    Request permission for reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Welcome from the Dean of USF

    Publication Year: 2004, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (48 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2004, Page(s): xv
    Request permission for reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee Chair's Message for LCN 2004

    Publication Year: 2004, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from EmNetS-I Chairs

    Publication Year: 2004, Page(s): xvii
    Request permission for reuse | PDF file iconPDF (21 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the WLN Co-Chairs

    Publication Year: 2004, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the HSLN Chairs

    Publication Year: 2004, Page(s): xix
    Request permission for reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • LCN 2004 Organizing Committee

    Publication Year: 2004, Page(s):xx - xxii
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • EmNetS-I Organizing Committee

    Publication Year: 2004, Page(s): xxiii
    Request permission for reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • WLN 2004 Organizing and Program Committees

    Publication Year: 2004, Page(s):xxiv - xxv
    Request permission for reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • HSLN 2004 Workshop Committee

    Publication Year: 2004, Page(s): xxvi
    Request permission for reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • LCN 2004 Reviewers

    Publication Year: 2004, Page(s):xxvii - xxx
    Request permission for reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Opportunities and challenges in high-rate wireless sensor networking

    Publication Year: 2004
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (49 KB) | HTML iconHTML

    Summary form only given. The first wave of embedded wireless sensor networks has generally been characterized by applications whose data rate requirements are quite low, usually less than tens of kilobits per second. The author believes that the next wave, characterized by applications in industrial process control, fabrication plants, structural health monitoring, fluid pipelining monitoring, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bringing efficient advanced queries to distributed hash tables

    Publication Year: 2004, Page(s):6 - 14
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Interest in distributed storage is fueled by demand for reliability and resilience combined with ubiquitous availability. Peer-to-peer (P2P) storage networks are known for their decentralized control, self-organization, and adaptation. Advanced searching for documents and resources remains an open problem. The flooding approach favored by some P2P networks is inefficient in resource usage, but mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A thermal-dissipation-based approach for balancing data load in distributed hash tables

    Publication Year: 2004, Page(s):15 - 23
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    A major objective of peer-to-peer (P2P) systems is the management of large amounts of data distributed across many systems. Distributed hash tables (DHT) are designed for highly scalable, self-organizing, and efficient distribution and lookup of data, whereby data is stored globally persistent. The range of values of the corresponding hash function is partitioned and each interval is assigned to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application layer multicasting for mobile ad-hoc networks with network layer support

    Publication Year: 2004, Page(s):24 - 31
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    An ad hoc network is composed of mobile nodes without any infrastructure. Mobile nodes dynamically form a temporary network to communicate with each other Applications of mobile ad hoc networks require group oriented services. Hence multicast support is a critical feature for ad hoc networks. In this paper we present an efficient application layer multicast solution suitable for medium mobility ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel hierarchical mobility management scheme in complicated structured networks

    Publication Year: 2004, Page(s):34 - 41
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Micromobility management is a key issue for achieving enhanced mobile Internet services. Many micromobility management schemes supporting fast handover, e.g., Hierarchical Mobile IPv6 (HMIPv6), have been proposed to minimize the packet loss during handover and the handover latency. We have previously proposed a multilevel hierarchical mobility management scheme that enhances HMIPv6 mobility manage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing a hybrid Fast and Hierarchical MIPv6 scheme in a UMTS-IP converged architecture

    Publication Year: 2004, Page(s):42 - 49
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    IP technology will play a key role in beyond 3G systems, which face the great challenge of integration so as to provide seamless services to users anywhere and anytime. Apart from its natural role as a unifier, IP also comprises the main drive for network evolution towards all-IP network infrastructures. In this regard, we exploit IP as an enabler for the evolution of the UMTS packet-switched core... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility-aware cache replacement for users of location-dependent services

    Publication Year: 2004, Page(s):50 - 58
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Recent advances in wireless communication and global positioning technologies have led to increasing interest in location dependent information services. As mobile users move between locations utilising such services, their access patterns not only exhibit temporal locality, but also spatial locality. Traditional cache replacement policies were designed to deal with temporal locality, as a result,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ELECTION: energy-efficient and low-latency scheduling technique for wireless sensor networks

    Publication Year: 2004, Page(s):60 - 67
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    We propose ELECTION, a new sleep scheduling scheme that adaptively schedules the sleep cycles of both communication radios and sensors in wireless active sensor networks. Taking advantage of spatial and temporal correlations in the underlying physical phenomenon, our scheme controls sleeping schedules of radios and sensors, and adaptively meets the energy efficiency, latency and responsiveness nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating coverage holes and enhancing coverage in mixed sensor networks

    Publication Year: 2004, Page(s):68 - 76
    Cited by:  Papers (65)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Area coverage is one of the most fundamental problems in ad hoc wireless sensor networks because it directly relates to optimization of resources in a sensing field. Maximizing the coverage area while maintaining a lower cost of deployment has always been a challenge, especially when the monitoring region is unknown and possibly hazardous. In this paper, we present a method to deterministically es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A partial-range-aware localization algorithm for ad-hoc wireless sensor networks

    Publication Year: 2004, Page(s):77 - 83
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    Current wireless sensor network localization algorithms are categorized either as range-free or range-aware algorithms based on whether they use the range (i.e., distance) information. Although wireless sensor systems usually have available received signal strength (RSS) readings, this useful information has not been effectively used in the existing localization algorithms. The existing range-free... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CineMA: cooperation enhancement in MANETs

    Publication Year: 2004, Page(s):86 - 93
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Mobile ad hoc networks are based on the assumption that all participants of the network cooperate and forward packets towards destinations. Unfortunately, there are no mechanisms to enforce cooperation. Thus, altruism and trust are two of the most important characteristics in mobile ad hoc networks. However what happens if there are selfish or even malicious nodes? Those nodes do not forward all p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.