The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Conference on Local Computer Networks (LCN) (lcn)
2006 (conf/lcn/2006)


  1. Transport-Layer Design Perspectives for Heterogeneous Networks. [Citation Graph (, )][DBLP]


  2. Large-Scale Urban Mesh Networks: from Deployment to Applications. [Citation Graph (, )][DBLP]


  3. In Search of the Next Big Thing. [Citation Graph (, )][DBLP]


  4. The BehaviorScope Project: Experiences from the Design, Implementation and Deployment of a Camera Sensor Network. [Citation Graph (, )][DBLP]


  5. LEMA: Localized Energy-Efficient Multicast Algorithm based on Geographic Routing. [Citation Graph (, )][DBLP]


  6. Energy-efficient Interleaving for Error Recovery in Broadcast Networks. [Citation Graph (, )][DBLP]


  7. Performance Study of Power Saving Classes of Type I and II in IEEE 802.16e. [Citation Graph (, )][DBLP]


  8. Ethernet Adaptive Link Rate: System Design and Performance Evaluation. [Citation Graph (, )][DBLP]


  9. Performance Aware Design of Communication Systems. [Citation Graph (, )][DBLP]


  10. Minimizing Cache Misses in an Event-driven Network Server: A Case Study of TUX. [Citation Graph (, )][DBLP]


  11. Buffer Management for 3D Image-based Rendering over Wireless Network with QoS Adaptation. [Citation Graph (, )][DBLP]


  12. Efficient Packet Processing in User-Level OSes: A Study of UML. [Citation Graph (, )][DBLP]


  13. Fair Scheduling over multiple servers with flow-dependent server rate. [Citation Graph (, )][DBLP]


  14. An Adaptive Non-preemptive Scheduling Framework for Delay Bounded Traffic in Cellular Networks. [Citation Graph (, )][DBLP]


  15. Bandwidth Aware Slot Allocation in Hybrid MAC. [Citation Graph (, )][DBLP]


  16. A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc Networks. [Citation Graph (, )][DBLP]


  17. Computing Real Time Jobs in P2P Networks. [Citation Graph (, )][DBLP]


  18. Achieving Resilient and Efficient Load Balancing in DHT-based P2P Systems. [Citation Graph (, )][DBLP]


  19. Content-based Packet Marking for Application-Aware Processing in Overlay Networks. [Citation Graph (, )][DBLP]


  20. Considerations of SCTP Retransmission Delays for Thin Streams. [Citation Graph (, )][DBLP]


  21. A New Stable AQM Algorithm Exploiting RTT Estimation. [Citation Graph (, )][DBLP]


  22. Adapting TCP for Vertical Handoffs in Wireless Networks. [Citation Graph (, )][DBLP]


  23. Emulating TCP (A Reliable Internet Protocol) Using a Fixed Point Algorithm. [Citation Graph (, )][DBLP]


  24. An Interior Path Vector Routing Protocol. [Citation Graph (, )][DBLP]


  25. Maximum Data Collection Least-Cost Routing in Energy Constrained Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  26. On Cache Prefetching Strategies For Integrated Infostation-Cellular Network. [Citation Graph (, )][DBLP]


  27. Detecting Botnets with Tight Command and Control. [Citation Graph (, )][DBLP]


  28. Can CRLs Provide Bandwidth-Efficient Online Certificate Status? [Citation Graph (, )][DBLP]


  29. Modelling Voice Communication in Disaster Area Scenarios. [Citation Graph (, )][DBLP]


  30. Security for FTTx Optical Access Networks. [Citation Graph (, )][DBLP]


  31. Clustered Mobility Model for Scale-Free Wireless Networks. [Citation Graph (, )][DBLP]


  32. Landscape-3D; A Robust Localization Scheme for Sensor Networks over Complex 3D Terrains. [Citation Graph (, )][DBLP]


  33. Adaptive Location Update Area Design for PCS Networks under 2D Markov Walk Model. [Citation Graph (, )][DBLP]


  34. Design of a Giga-bit Hardware Accelerator for the iSCSI Initiator. [Citation Graph (, )][DBLP]


  35. Efficient Java Communication Protocols on High-speed Cluster Interconnects. [Citation Graph (, )][DBLP]


  36. An Integrated Hardware Solution for MAC Address Translation, MPLS, and Traffic Management in Access Networks. [Citation Graph (, )][DBLP]


  37. Effect of Hash Collisions on the Performance of LAN Switching Devices and Networks. [Citation Graph (, )][DBLP]


  38. Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  39. Link availability and its effects on the capacity of mobile ad hoc wireless networks an analytical approach. [Citation Graph (, )][DBLP]


  40. Toward a Seamless Communication Architecture for In-building Networks at the 60 GHz band. [Citation Graph (, )][DBLP]


  41. Hybrid Distributed Coordination Function for Next-Generation High-Bandwidth WLANs. [Citation Graph (, )][DBLP]


  42. A Transceiver Saving Auxiliary Graph Model for Dynamic Traffic Grooming in WDM Mesh Networks. [Citation Graph (, )][DBLP]


  43. Integration of Differentiated Services in Optical Burst Switching Metro Ring Networks. [Citation Graph (, )][DBLP]


  44. Traffic Grooming in Statistically Shared Optical Networks. [Citation Graph (, )][DBLP]


  45. Optical CDMA Code Collision and Translation Performance Analysis. [Citation Graph (, )][DBLP]


  46. Ontology Modeling of a Dynamic Protocol Stack. [Citation Graph (, )][DBLP]


  47. Towards Semantic Modeling for QoS Specification. [Citation Graph (, )][DBLP]


  48. Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks. [Citation Graph (, )][DBLP]


  49. Biologically-Inspired Adaptive Data Aggregation for Multi-Modal Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  50. Real-Time Communication in 802.11 Networks: The Virtual Token Passing VTP-CSMA Approach. [Citation Graph (, )][DBLP]


  51. Experimental investigation on VoIP performance and the resource utilization in 802.11b WLANs. [Citation Graph (, )][DBLP]


  52. Delay Distribution Analysis of the RTS/CTS mechanism of IEEE 802.11. [Citation Graph (, )][DBLP]


  53. Maximizing Differentiated Throughput in IEEE 802.11e Wireless LANs. [Citation Graph (, )][DBLP]


  54. Performance Limits and Analysis of Contention-based IEEE 802.11 MAC. [Citation Graph (, )][DBLP]


  55. Residual Admission Capacity in Optical Burst Switching Networks and its Application in Routing Loss-Guaranteed Flows. [Citation Graph (, )][DBLP]


  56. Embedding Hypercube Communications on Optical Chordal Ring Networks. [Citation Graph (, )][DBLP]


  57. Delay Constrained Traffic Grooming in WDM Ring Networks. [Citation Graph (, )][DBLP]


  58. Rerouting Schemes with Inter-layer Backup Resource Sharing for Differentiated Survivability in IP-over-WDM Optical Networks. [Citation Graph (, )][DBLP]


  59. An Efficient MAC Protocol For Optical WDM Networks with Simulation Evaluation. [Citation Graph (, )][DBLP]


  60. Protecting Multicast Sessions in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  61. The Internet Group Management Protocol with Access Control (IGMP-AC). [Citation Graph (, )][DBLP]


  62. Making Application Layer Multicast Reliableis Feasible. [Citation Graph (, )][DBLP]


  63. Performance of multicast over bidirectional slotted ring networks. [Citation Graph (, )][DBLP]


  64. Detecting Malicious Peers in Overlay Multicast Streaming. [Citation Graph (, )][DBLP]


  65. Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System. [Citation Graph (, )][DBLP]


  66. Performance of Constant Quality VideoApplications using the DCCP Transport Protocol. [Citation Graph (, )][DBLP]


  67. BEAM: An Efficient Peer to Peer Media Streaming Framework. [Citation Graph (, )][DBLP]


  68. MPLS Based Approach for Heterogeneous and Scalable Multicast in DiffServ. [Citation Graph (, )][DBLP]


  69. Power-Proxying on the NIC: A Case Study with the Gnutella File-Sharing Protocol. [Citation Graph (, )][DBLP]


  70. Dynamic Programming-based Energy-Efficient Rate Adaptation for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  71. A Multicast Tree Reconstruction Method for Many-to-Many Mobile Communications with Delay Constraint. [Citation Graph (, )][DBLP]


  72. Achieving Fairness in IEEE 802.11 Ad Hoc Networks. [Citation Graph (, )][DBLP]


  73. A Traffic Shaping Heuristic for Congestion Control in Optical Burst-Switched Networks. [Citation Graph (, )][DBLP]


  74. The Design of Efficient Hashing Techniques for IP Address Lookup. [Citation Graph (, )][DBLP]


  75. Ethernet Adaptive Link Rate (ALR): Analysis of a MAC Handshake Protocol. [Citation Graph (, )][DBLP]


  76. An Enhancement of TCP Veno over High Bandwidth-Delay Product Networks. [Citation Graph (, )][DBLP]


  77. HYDRA: A Novel Framework for Making High-Performance Computing Offload Capable. [Citation Graph (, )][DBLP]


  78. Characterization of Layer-2 Unique Topologies in Multisubnet Local Area Networks. [Citation Graph (, )][DBLP]


  79. Data Aggregation System for Distributing Inter-Vehicle Warning Messages. [Citation Graph (, )][DBLP]


  80. TA2I: Time Slot Access with Acknowledge Insertion. [Citation Graph (, )][DBLP]


  81. Towards Minimizing Service Degradation during MIPv6 Handovers. [Citation Graph (, )][DBLP]


  82. VoIP Capacity over Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  83. Traffic Shaping and Dimensioning of an External Overload Controller in Service Architectures. [Citation Graph (, )][DBLP]


  84. Mitigating Worm Propagation on Virtual LANs. [Citation Graph (, )][DBLP]


  85. QoS Differentiation Provisioning & Management System Exploiting Mobile Agent Technology. [Citation Graph (, )][DBLP]


  86. A New Bandwidth Access Framework in Slotted-OPS Networks. [Citation Graph (, )][DBLP]


  87. Improved Collaborative Environment Control Using Mote-based Sensor/Actuator Networks. [Citation Graph (, )][DBLP]


  88. Communication-assisted Topology Control of Semi-autonomous Robots. [Citation Graph (, )][DBLP]


  89. Scalability of Location Sensor Data Fusion. [Citation Graph (, )][DBLP]


  90. Port-based Multihomed Mobile IPv6 for Heterogeneous Networks. [Citation Graph (, )][DBLP]


  91. Performance of TCP with Directional Antennas. [Citation Graph (, )][DBLP]


  92. Needles in Haystacks: Practical Intrusion Detection from Theoretical Results. [Citation Graph (, )][DBLP]


  93. Viral IP Address Assignment. [Citation Graph (, )][DBLP]


  94. ROADNet: A network of SensorNets. [Citation Graph (, )][DBLP]


  95. Car-Park Management using Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  96. Wireless Sensor Networks: The Quest for Planetary Field Sensing. [Citation Graph (, )][DBLP]


  97. Animal Behaviour Understanding using Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  98. Practical Design of A Sensor Network for Understanding Nursing Activities. [Citation Graph (, )][DBLP]


  99. Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks. [Citation Graph (, )][DBLP]


  100. Atlas: A Service-Oriented Sensor Platform: Hardware and Middleware to Enable Programmable Pervasive Spaces. [Citation Graph (, )][DBLP]


  101. Cross-Level Sensor Network Simulation with COOJA. [Citation Graph (, )][DBLP]


  102. Service-Driven Query Routing in Sensor Networks. [Citation Graph (, )][DBLP]


  103. RMD: Reliable Multicast Data Dissemination within Groups of Collaborating Objects. [Citation Graph (, )][DBLP]


  104. Routing Performance in CDMA-based Sensor Networks for Different Energy Metrics. [Citation Graph (, )][DBLP]


  105. Identification of Network Bricks in Heterogeneous Scenarios. [Citation Graph (, )][DBLP]


  106. Enhanced Network-State Estimation using Change Detection. [Citation Graph (, )][DBLP]


  107. Multi-Channel Interference Measurements for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  108. Flexible Flow Aggregation for Adaptive Network Monitoring. [Citation Graph (, )][DBLP]


  109. Experimental and Analytical Evaluation of Available Bandwidth Estimation Tools. [Citation Graph (, )][DBLP]


  110. Packet Dispersion in IEEE 802.11 Wireless Networks. [Citation Graph (, )][DBLP]


  111. Accuracy-Speedup Tradeoffs for a Time-Parallel Simulation of Wireless Ad hoc Networks. [Citation Graph (, )][DBLP]


  112. Optimal Multi-hop Cellular Architecture for Wireless Communications. [Citation Graph (, )][DBLP]


  113. SCTP Extension for EGPRS/WLAN Handover Data. [Citation Graph (, )][DBLP]


  114. DMAP: A Scalable and Efficient Integrated Mobility and Service Management Scheme for Mobile IPv6 Systems. [Citation Graph (, )][DBLP]


  115. Intelligent Multiple-Criteria Broadcasting in Mobile Ad-hoc Networks. [Citation Graph (, )][DBLP]


  116. A Novel Data Mining Technique for Extracting Events and Inter Knowledge based Information from Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  117. On Measuring Anonymity For Wireless Mobile Ad-hoc Networks. [Citation Graph (, )][DBLP]


  118. Efficient Algorithms for Secure Multicast key Management. [Citation Graph (, )][DBLP]


  119. Impact of Stochastic Traffic Characteristics on Effective Capacity in CDMA Networks. [Citation Graph (, )][DBLP]


  120. Performance Analysis of MANET Routing Protocols in the Presence of Self-Similar Traffic. [Citation Graph (, )][DBLP]


  121. Performance Analysis of Tunneling Protocols used in a Mobile Network with Mobile Router. [Citation Graph (, )][DBLP]


  122. Energy Characterization of Reed-Solomon Decoding in 3G Broadcasting. [Citation Graph (, )][DBLP]


  123. Adaptive Antennas for Interference Mitigation of Barker/CCK Spread Wi-Fi Signals. [Citation Graph (, )][DBLP]


  124. A Wireless Actor and Sensor Networks QoS-Aware Routing Protocol for the Emergency Preparedness Class of Applications. [Citation Graph (, )][DBLP]


  125. Architectural and Management Schemes for Efficient Data Collection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  126. A Delay-bounded Multi-Channel Routing Protocol for Wireless Mesh Networks using Multiple Token Rings: Extended Summary. [Citation Graph (, )][DBLP]


  127. Measuring User Experience Accurately in Wireless Networks. [Citation Graph (, )][DBLP]


  128. Hybrid Broadcast-Unicast distribution of Mobile TV over 3G Networks. [Citation Graph (, )][DBLP]


  129. Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks. [Citation Graph (, )][DBLP]


  130. Utility-based Packet Scheduler for Wireless Communications. [Citation Graph (, )][DBLP]


  131. Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Exposed-Node Problems in Large-Scale Wi-Fi Networks. [Citation Graph (, )][DBLP]


  132. On Access Point Selection in IEEE 802.11 Wireless Local Area Networks. [Citation Graph (, )][DBLP]


  133. Transport Protocol Behavior and Energy-Saving Potential. [Citation Graph (, )][DBLP]


  134. Using Quick-Start to Improve TCP Performance with Vertical Hand-offs. [Citation Graph (, )][DBLP]


  135. Design and Implementation of a Rate Control Mechanism for Image-based Virtual Exploration over Wireless Networks. [Citation Graph (, )][DBLP]


  136. An Efficient Dynamic Multicast Protocol for Mobile IPv6 Networks. [Citation Graph (, )][DBLP]


  137. ZONER: A ZONE-based Sensor Relocation Protocol for Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  138. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  139. Linux Implementation and Evaluation of a Cooperation Mechanism for Hybrid Wireless Networks. [Citation Graph (, )][DBLP]


  140. Wireless Multi-hop Network Scenario Emulation with MinMax Error. [Citation Graph (, )][DBLP]


  141. Performance improvement for cross flows in ad hoc wireless networks using 802.11. [Citation Graph (, )][DBLP]


  142. Sensor Networks Routing via Bayesian Exploration. [Citation Graph (, )][DBLP]


  143. Detecting Selective Dropping Attacks in BGP. [Citation Graph (, )][DBLP]


  144. Using Machine Learning Techniques to Identify Botnet Traffic. [Citation Graph (, )][DBLP]


  145. Privacy-Preserving Quick Authentication in Fast Roaming Networks. [Citation Graph (, )][DBLP]


  146. The Effect of Rebalancing on the Performance of a Group Key Agreement Protocol. [Citation Graph (, )][DBLP]


  147. Simultaneous Support of Multiple Security Protocols in a Group Communication Gateway. [Citation Graph (, )][DBLP]


  148. Integrated Security Verification and Validation: Case Study. [Citation Graph (, )][DBLP]


  149. A Model-based Approach to the Security Testing of Network Protocol Implementations. [Citation Graph (, )][DBLP]


  150. Indicator Random Variables in Traffic Analysis and the Birthday Problem. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002