The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Conference on Local Computer Networks (LCN) (lcn)
2008 (conf/lcn/2008)


  1. GENI - global environment for network innovations. [Citation Graph (, )][DBLP]


  2. Distributed search revisited: Resolving the conflict of flexibility and efficiency. [Citation Graph (, )][DBLP]


  3. Cooperative caching: The case for P2P traffic. [Citation Graph (, )][DBLP]


  4. Experimental comparison of peer-to-peer streaming overlays: An application perspective. [Citation Graph (, )][DBLP]


  5. Range queries and load balancing in a hierarchically structured P2P system. [Citation Graph (, )][DBLP]


  6. Constructing low-latency overlay networks: Tree vs. mesh algorithms. [Citation Graph (, )][DBLP]


  7. IP address assignment in wireless mesh networks. [Citation Graph (, )][DBLP]


  8. An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh Protocol. [Citation Graph (, )][DBLP]


  9. CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH mode. [Citation Graph (, )][DBLP]


  10. Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding. [Citation Graph (, )][DBLP]


  11. Reconstructing the Plenoptic function from wireless multimedia sensor networks. [Citation Graph (, )][DBLP]


  12. Improving information availability in storage-centric sensor networks. [Citation Graph (, )][DBLP]


  13. Delay constrained placement of mobile data collectors in underwater acoustic sensor networks. [Citation Graph (, )][DBLP]


  14. Path guiding mechanisms for a mobile anchor improving or balancing location accuracies of static sensors in WSNs. [Citation Graph (, )][DBLP]


  15. Efficient power management for Wireless Sensor Networks: A data-driven approach. [Citation Graph (, )][DBLP]


  16. Neighborhood aware power saving mechanisms for ad hoc networks. [Citation Graph (, )][DBLP]


  17. Energy efficient Ethernet encodings. [Citation Graph (, )][DBLP]


  18. Energy-saving scheduling in IEEE 802.16e networks. [Citation Graph (, )][DBLP]


  19. Scalability considerations for an anomaly-free iBGP routing. [Citation Graph (, )][DBLP]


  20. Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networks. [Citation Graph (, )][DBLP]


  21. A new approach for the construction of multiple multicast trees using multiple description video for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  22. Single-path routing for life time maximization in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  23. DiCAP: Distributed Packet Capturing architecture for high-speed network links. [Citation Graph (, )][DBLP]


  24. TCP mechanisms for improving the user experience for time-dependent thin-stream applications. [Citation Graph (, )][DBLP]


  25. An analysis on error servers for stochastic network calculus. [Citation Graph (, )][DBLP]


  26. Signal strength sensitivity and its effects on routing in maritime wireless networks. [Citation Graph (, )][DBLP]


  27. A new approach for network vulnerability analysis. [Citation Graph (, )][DBLP]


  28. On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks. [Citation Graph (, )][DBLP]


  29. Covert channels in multiplayer first person shooter online games. [Citation Graph (, )][DBLP]


  30. Decision process for automated selection of security protocols. [Citation Graph (, )][DBLP]


  31. Implementation and performance evaluation of Selective Repeat ARQ for WiMAX NS-2 model. [Citation Graph (, )][DBLP]


  32. Evaluation and parameterization of voice traffic models for disaster area scenarios. [Citation Graph (, )][DBLP]


  33. Performance evaluation of optimal sized cluster based wireless sensor networks with correlated data aggregation consideration. [Citation Graph (, )][DBLP]


  34. Reliability of wireless sensor grids. [Citation Graph (, )][DBLP]


  35. Monitoring the spatial-temporal effect of internet traffic based on Random Matrix Theory. [Citation Graph (, )][DBLP]


  36. Optimal distance-based clustering for tag anti-collision in RFID systems. [Citation Graph (, )][DBLP]


  37. A hybrid MAC with prioritization for wireless sensor networks. [Citation Graph (, )][DBLP]


  38. Real-time performance analysis of Adaptive Link Rate. [Citation Graph (, )][DBLP]


  39. A medium access control protocol for UWB sensor networks with QoS support. [Citation Graph (, )][DBLP]


  40. Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]


  41. Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. [Citation Graph (, )][DBLP]


  42. IPclip: An architecture to restore Trust-by-Wire in packet-switched networks. [Citation Graph (, )][DBLP]


  43. The design of a secure key management system for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  44. Key management in wireless sensor networks with inter-network sensor roaming. [Citation Graph (, )][DBLP]


  45. Avoidance of multicast incapable branching nodes for multicast routing in WDM networks. [Citation Graph (, )][DBLP]


  46. Cost-efficient backup-plane architecture for single-hop WDM network. [Citation Graph (, )][DBLP]


  47. Routing and buffer placement optimization in optical burst switched networks. [Citation Graph (, )][DBLP]


  48. Multi-criteria p-cycle network design. [Citation Graph (, )][DBLP]


  49. Towards a zero configuration authentication scheme for 802.11 based networks. [Citation Graph (, )][DBLP]


  50. WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks. [Citation Graph (, )][DBLP]


  51. A time multiplexing coordination mechanism on top of the IEEE 802.11 MAC layer. [Citation Graph (, )][DBLP]


  52. QoE-based network selection for multimedia users in IEEE 802.11 wireless networks. [Citation Graph (, )][DBLP]


  53. On supporting handoff management for multi-source video streaming in mobile communication systems. [Citation Graph (, )][DBLP]


  54. Intelligent Mobility Support for IPv6. [Citation Graph (, )][DBLP]


  55. Receiver access control and secured handoff in mobile multicast using IGMP-AC. [Citation Graph (, )][DBLP]


  56. A client-based vertical handoff approach for seamless mobility in next generation wireless networks. [Citation Graph (, )][DBLP]


  57. A collaborative peer-to-peer architecture to defend against DDoS attacks. [Citation Graph (, )][DBLP]


  58. Supporting geographical queries onto DHTs. [Citation Graph (, )][DBLP]


  59. Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing Games. [Citation Graph (, )][DBLP]


  60. A loosely synchronized gossip-based algorithm for aggregate information computation. [Citation Graph (, )][DBLP]


  61. An ant based rate allocation algorithm for media streaming in peer to peer networks. [Citation Graph (, )][DBLP]


  62. Distributed and scalable control plane for next generation routers: A case study of OSPF. [Citation Graph (, )][DBLP]


  63. Online control techniques for optimal management of bandwidth over shared infrastructure networks. [Citation Graph (, )][DBLP]


  64. Optimized resource allocation for the uplink of SFBC-CDMA systems. [Citation Graph (, )][DBLP]


  65. Efficient bandwidth management in Broadband Wireless Access Systems using CAC-based dynamic pricing. [Citation Graph (, )][DBLP]


  66. Smart Spanning Tree Bridging for Metro Ethernets. [Citation Graph (, )][DBLP]


  67. A distributed mobility management scheme for large-scale Mobile Networks. [Citation Graph (, )][DBLP]


  68. Resource assignment for adaptively modulated interconnected WLANs. [Citation Graph (, )][DBLP]


  69. Analysis and evaluation of a scalable QoS device for broadband access to multimedia services. [Citation Graph (, )][DBLP]


  70. P2P directory search: Signature Array Hash Table. [Citation Graph (, )][DBLP]


  71. Managing energy use in a network with a new SNMP Power State MIB. [Citation Graph (, )][DBLP]


  72. Channel assignment and scheduling in multichannel wireless sensor networks. [Citation Graph (, )][DBLP]


  73. Graph theory based aggregation of sensor readings in wireless sensor networks. [Citation Graph (, )][DBLP]


  74. Probabilistic packet dropping for load control in multihop wireless networks. [Citation Graph (, )][DBLP]


  75. Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA). [Citation Graph (, )][DBLP]


  76. Cross-Layer analysis and enhancement of fast MIPv6 in the real IEEE 802.11 based WLANs. [Citation Graph (, )][DBLP]


  77. TCP computational energy cost within wireless Mobile Ad Hoc Network. [Citation Graph (, )][DBLP]


  78. Mitigate DDoS attack using TTL buckets and host threatening index. [Citation Graph (, )][DBLP]


  79. On selfish behavior using asymmetric carrier sensing in IEEE 802.11 wireless networks. [Citation Graph (, )][DBLP]


  80. End-to-end diagnosis of QoS violations with neural network. [Citation Graph (, )][DBLP]


  81. A cross-domain framework for coordinated end-to-end QoS adaptation. [Citation Graph (, )][DBLP]


  82. A CGAbased IP source address authentication method in IPv6 access network. [Citation Graph (, )][DBLP]


  83. Performance of opportunistic scheduling schemes for MIMO-OFDM wireless LANs. [Citation Graph (, )][DBLP]


  84. A graph theoretic approach in achieving robust peer-to-peer networking paradigm. [Citation Graph (, )][DBLP]


  85. Queue-based contention control for congested multihop wireless networks. [Citation Graph (, )][DBLP]


  86. Self-adjusting scheme for high speed routers. [Citation Graph (, )][DBLP]


  87. Optimizing router locations for minimum-energy wireless networks. [Citation Graph (, )][DBLP]


  88. TabooQMR: A Taboo-based search algorithm improving Mamcra for multicast routing. [Citation Graph (, )][DBLP]


  89. Short-term QoS provisioning in MPLS ingress nodes. [Citation Graph (, )][DBLP]


  90. A forwarding protocol with relay acknowledgement for vehicular ad-hoc networks. [Citation Graph (, )][DBLP]


  91. Connectivity-driven flow recovery for time-sensitive transport services. [Citation Graph (, )][DBLP]


  92. A proactive secure routing algorithm defense against node compromise in sensor networks. [Citation Graph (, )][DBLP]


  93. Two dynamic restoration schemes for survivable traffic grooming in WDM networks. [Citation Graph (, )][DBLP]


  94. Distributed channel assignment in Wireless Mesh Networks with guaranteed connectivity. [Citation Graph (, )][DBLP]


  95. A Tag Prediction Algorithm using Upper Bit in RFID systems. [Citation Graph (, )][DBLP]


  96. Hybrid role hierarchy for the extended role based access control model. [Citation Graph (, )][DBLP]


  97. Performance measurement and queueing analysis of medium-high blocking probability of two and three parallel connection servers. [Citation Graph (, )][DBLP]


  98. Spatially Disjoint Multipath Routing protocol without location information. [Citation Graph (, )][DBLP]


  99. Video streaming with network coding and opportunistic relay in wireless mesh networks. [Citation Graph (, )][DBLP]


  100. An efficient anti-collision algorithm through division transfer of tag ID in RFID systems. [Citation Graph (, )][DBLP]


  101. Quality of service support in wireless local area network with error control protocol. [Citation Graph (, )][DBLP]


  102. Analysis of proxy MIPv6 performance compared to fast MIPv6. [Citation Graph (, )][DBLP]


  103. Interconnecting MANET and the internet a mobility approach. [Citation Graph (, )][DBLP]


  104. Innovative approach for improving access to wireless services in high occupancy vehicles. [Citation Graph (, )][DBLP]


  105. Mobility management for highly mobile users and vehicular networks in heterogeneous environments. [Citation Graph (, )][DBLP]


  106. Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks. [Citation Graph (, )][DBLP]


  107. IP address configuration in VANET using centralized DHCP. [Citation Graph (, )][DBLP]


  108. Supporting real-time data traffic in safety-critical vehicle-to-infrastructure communication. [Citation Graph (, )][DBLP]


  109. IEEE 802.11p modeling in NS-2. [Citation Graph (, )][DBLP]


  110. Service outsourcing to support virtual home environments (VHE). [Citation Graph (, )][DBLP]


  111. Achieving host mobility using DNS dynamic updating protocol. [Citation Graph (, )][DBLP]


  112. Energy-efficient transmission scheme of JPEG images over Visual Sensor Networks. [Citation Graph (, )][DBLP]


  113. A proactive distance-based flooding technique for MANETs with heterogeneous radio ranges. [Citation Graph (, )][DBLP]


  114. Scheduling optimization in multiuser detection based MAC design for Ad-Hoc networks. [Citation Graph (, )][DBLP]


  115. QoS provisioning in WCDMA cellular networks through rate and coverage adaptation. [Citation Graph (, )][DBLP]


  116. Knowledge discovery in Wireless Sensor Networks for Chronological Patterns. [Citation Graph (, )][DBLP]


  117. Performance analysis of an admission control enhancement in WIMAX networks using SAN. [Citation Graph (, )][DBLP]


  118. Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategies. [Citation Graph (, )][DBLP]


  119. Utilizing IEEE 802.11n to enhance QoS support in wireless mesh networks. [Citation Graph (, )][DBLP]


  120. A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networks. [Citation Graph (, )][DBLP]


  121. Beasties: Simple wireless sensor nodes. [Citation Graph (, )][DBLP]


  122. Designing a sensor network testbed for smart heterogeneous applications. [Citation Graph (, )][DBLP]


  123. An experimental analysis of Zigbee networks. [Citation Graph (, )][DBLP]


  124. Demonstration of bird species detection using an acoustic wireless sensor network. [Citation Graph (, )][DBLP]


  125. Priority interrupts of Duty Cycled communications in wireless sensor networks. [Citation Graph (, )][DBLP]


  126. An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networks. [Citation Graph (, )][DBLP]


  127. A service-differentiated real-time communication scheme for wireless sensor networks. [Citation Graph (, )][DBLP]


  128. What's new? Message reduction in sensor networks using events. [Citation Graph (, )][DBLP]


  129. Design and implementation of a policy-based management system for data reliability in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  130. Firewalling wireless sensor networks: Security by wireless. [Citation Graph (, )][DBLP]


  131. In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. [Citation Graph (, )][DBLP]


  132. Key pre-distribution based secure backbone formation in wireless sensor networks. [Citation Graph (, )][DBLP]


  133. Q-learning based collaborative load balancing using distributed search for unstructured P2P networks. [Citation Graph (, )][DBLP]


  134. Opportunistic Wireless Broadcast (OWB): Dynamic redundancy detection in the wireless medium. [Citation Graph (, )][DBLP]


  135. An evaluation method for delay time and its jitter of WLAN using a GSPN model. [Citation Graph (, )][DBLP]


  136. Understanding and using mobility on Publish/Subscribe based architectures for MANETs. [Citation Graph (, )][DBLP]


  137. Real-time routing for mobile sensor/actor networks. [Citation Graph (, )][DBLP]


  138. On handling weakened topologies of Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  139. Design and implementation of a generic hybrid wireless sensor network platform. [Citation Graph (, )][DBLP]


  140. A weighted RED for alleviating starvation problem in wireless mesh networks. [Citation Graph (, )][DBLP]


  141. A performance study of scheduling algorithms in Point-to-Multipoint WiMAX networks. [Citation Graph (, )][DBLP]


  142. CDMA/MPLS platforms for WIMAX mesh networks. [Citation Graph (, )][DBLP]


  143. On measuring available bandwidth in wireless networks. [Citation Graph (, )][DBLP]


  144. Evaluating "no-new-wires" home networks. [Citation Graph (, )][DBLP]


  145. Detecting changes in the Hurst parameter. [Citation Graph (, )][DBLP]


  146. Accurate real-time monitoring of bottlenecks and performance of packet trace collection. [Citation Graph (, )][DBLP]


  147. Speedo: Realistic achievable bandwidth in 802.11 through passive monitoring. [Citation Graph (, )][DBLP]


  148. Modeling of multi-resolution active network measurement time-series. [Citation Graph (, )][DBLP]


  149. Detection of anomalous network packets using lightweight stateless payload inspection. [Citation Graph (, )][DBLP]


  150. A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. [Citation Graph (, )][DBLP]


  151. Real-time intrusion prevention and security analysis of networks using HMMs. [Citation Graph (, )][DBLP]


  152. Identification of malicious web pages through analysis of underlying DNS and web server relationships. [Citation Graph (, )][DBLP]


  153. Effect of intrusion detection on secure group communications in hierarchically structured group architectures. [Citation Graph (, )][DBLP]


  154. Event-B based invariant checking of secrecy in group key protocols. [Citation Graph (, )][DBLP]


  155. Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  156. Secure and efficient authentication in Wireless Mesh Networks using merkle trees. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002