[e2e] LCN 2006 - Call for Participation
Chun Tung Chou
ctchou at cse.unsw.edu.au
Wed Sep 13 09:49:49 PDT 2006
Call for Participation (LCN 2006)
The 31st IEEE Conference on Local Computer Networks (LCN)
Tampa, Florida, U.S.A.
14-16 November 2006
http://www.ieeelcn.org/
The IEEE Conference on Local Computer Networks (LCN), sponsored by the
IEEE Computer Society, is one of the networking industry's oldest,
continuously running conferences.
This year's LCN features:
* Keynote Addresses by
-- Dr. Bob Iannucci, Senior Vice President and Head of Nokia Research
Center
-- Prof. Edward Knightly, Rice University
* 61 regular papers in 15 parallel sessions
* 31 posters
* 5 Workshops on the first day of the conference
=================
Technical Program
=================
=================
Tuesday 14 November
=================
The following 5 workshops will take place:
* Sixth International IEEE Workshop on Wireless Local Networks (WLN)
http://www.cse.unsw.edu.au/~wln2006/
-- Keynote: Prof Vassilis Tsaoussidis (Democritus University of
Thrace, Greece)
-- 11 regular papers and 5 posters
* First IEEE International Workshop on Practical Issues in Building
Sensor Network Applications
http://www.cse.unsw.edu.au/~senseapp/
-- Keynote: Prof. A. Savvides, Yale University, USA
-- 11 regular papers
* The 2nd IEEE LCN Network Security workshop
http://www.cs.ucf.edu/~czou/IEEE-WoNS.htm
-- 8 regular papers
* Second IEEE International Workshop on Performance and Management of
Wireless and Mobile Networks
http://137.122.93.16/perf/about.html
-- 16 Regular papers
* First IEEE LCN Workshop on Network Measurements
http://www.cnrl.colostate.edu/IEEELCN-WNM2006/cfp.html
Featuring a Panel Discussion and 5 regular papers
===================
Wednesday 15 November
===================
Keynote: Dr. Bob Iannucci, Senior Vice President and Head of Nokia
Research Center
***** 10:30 - 12:10 Session #1 (Tracks A, B, and C)
Track A – Energy efficiency
LEMA: Localized Energy-Efficient Multicast Algorithm based on
Geographic Routing by Juan Sanchez and Pedro Ruiz
Energy-efficient Interleaving for Error Recovery in Broadcast Networks
by Kyungtae Kang and Yongwoo Cho
Performance Study of Power Saving Classes of Type I and II in IEEE
802.16e by Lei Kong and Danny H. K. Tsang
Ethernet Adaptive Link Rate: System Design and Performance Evaluation
by Ken Christensen and Chamara Gunaratne
Track B – Performance evaluation
Performance Aware Design of Communication Systems by Lukas Pustina,
Michael Gerharz, Peter Martini, Volker Deichmann, and Simon Schwarzer
Minimizing Cache Misses in an Event-Driven Network Server: A Case Study
of TUX by Sapan Bhatia, Charles Consel, and Julia Lawall
An Efficient Buffer Management Technique for Remote 3D Image-based
Rendering by Azzedine Boukerche and Jing Feng
Efficient Packet Processing in User-Level OSes: A Study of UML by
Younggyun Koh, Calton Pu, Sapan Bhatia, and Charles Consel
Track C – Scheduling and MAC layer
Fair Scheduling over Multiple Servers with Flow-Dependent Server Rates
by Satya Mohanty and Laxmi Bhuyan
An Adaptive Non-preemptive Scheduling Framework for Delay Bounded
Traffic by Yaser Khamayseh and Ehab Elmallah
Bandwidth Aware Slot Allocation in Hybrid MAC by Yuvraj Rana, Bao Hua
Liu, Alfandika Nyandoro, and Sanjay Jha
A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc
Networks by Timo Zauner, Luke Haslett, Wen Hu, Sanjay Jha, and Cormac
Sreenan
***** 1:30 - 3:10 Session #2 (Tracks A, B, and C)
Track A – P2P and overlay networks
Computing Real Time Jobs in P2P Networks by Jingnan Yao, Jian Zhou, and
Laxmi Bhuyan
Achieving Resilient and Efficient Load Balancing in DHT-based P2P
Systems by Di Wu, Ye Tian and Kamwing Ng
Content-based Packet Marking for Application-Aware Processing in
Overlay Networks by Panho Lee, Tarun Banka, Anura Jayasumana, and
Chandra V Chandrasekar
Track B – Transport layer
Considerations of SCTP Retransmission Delays for Thin Streams by Jon
Pedersen, Carsten Griwodz, and Pål Halvorsen
A New Stable AQM exploiting RTT Estimation by Hayato Hoshihara
Adapting TCP for Vertical Handoffs in Wireless Networks by Laila Daniel
and Markku Kojo
Emulating TCP Using the Fixed Point Algorithm by Debessay Kassa
Track C – Routing and caching
An Interior Path Vector Protocol by Conor Creagh and Cormac Sreenan
Maximum Data Collection Least-Cost Routing in Energy Constrained
Wireless Sensor Networks by Ka Lok Hung, Brahim Bensaou, Junhua Zhu,
and Farid Nait-Abdesselam
On Cache Prefetching Strategy for Integrated Infostation-Cellular
Network by Jerry Chun-Ping Wang, Hossam Elgindy, and Justin Lipman
***** 3:30 - 5:00 Poster Session
Cerco: Supporting Range Queries with a Hierarchically Structured
Peer-to-Peer System by Simon Rieche, Klaus Wehrle, Leo Petrak, and
Clemens Wrzodek
Performance of Constant Quality Video Applications using the DCCP
Transport Protocol by Jeroen Van Velthoven, Kathleen Spaey, and Chris
Blondia
BEAM: An Efficient Peer to Peer Media Streaming Framework by Darshan
Purandare
MPLS Based Approach for Heterogeneous and Scalable Multicast in
DiffServ by Mohamed El Hachimi and Abdelhafid Abouaissa
Power-Proxying on the NIC: A Case Study with the Gnutella File-Sharing
Protocol by Pradeep Purushothaman, Mukund Navada Kanyana, Rajagopal
Subramaniyan, Casey Reardon, and Alan George
Energy-Efficient Rate Adaptation and Congestion Control Protocol for
Wireless Ad Hoc Networks by Maciej Zawodniok and Sarangapani
Jagannathan
A Multicast Tree Reconstuction Method for Many-to-Many Mobile
Communications with Delay Constraint by Tsuyoshi Yamada, Shoji
Yoshimura, Keita Kawano, Kazuhiko Kinoshita, and Koso Murakami
Achieving Fairness in IEEE 802.11 Ad Hoc Networks by Fanilo Harivelo
A Traffic Shaping Heuristic for Congestion Control in Optical
Burst-Switched Networks by Mushi Jin and Oliver Yang
The Design of Efficient Hashing Techniques for IP Address Lookup by
Devang Pandya, Christopher Martinez, Wei-Ming Lin, and Parimal Patel
Adaptive Link Rate (ALR) for Ethernet: Analysis of a MAC Handshake
Protocol by Himanshu Anand, Casey Reardon, Rajagopal Subramaniyan, and
Alan George
Hydra: A Novel Framework for Making High-Performance Computing Offload
Capable by Danny Dolev, Pete Wyckoff, Tal Anker, and Yaron Weinsberg
Characterization of Layer-2 Unique Topologies in Multisubnet Local Area
Networks by Hassan Gobjuka and Yuri Breitbart
Data Aggregation System for Distributing Inter-Vehicle Warning Messages
by Stephan Eichler, Markus Strassberger, and Christian Merkle
TA2I: Time Slot Access with Acknowledge Insertion by Marcel Wille and
Harald Richter
Towards Minimizing Service Degradation during MIPv6 Handoffs by Yan
Cheng and J. William Atwood
VoIP Capacity over Wireless Mesh Networks by Alex Lee, Guanyan Cai, Yu
Ge, and Winston Seah
Traffic shaping and dimensioning of an external overload controller in
service architectures by Jens Andersson, Christian Nyberg, and Maria
Kihl
Mitigating Worm Propagation on Virtual LANs by Saeed Rajput, Xiaoguang
Sun, and Sam Hsu
QoS Differentiation Provisioning & Management System Exploiting Mobile
Agent Technology by Angelos Michalas
A New Bandwidth Access Framework in Slotted-OPS Networks by Akbar
Ghaffar Pour Rahbar and Oliver Yang
Improved Collaborative Environment Control Using Mote-based
Sensor/Actuator Networks by Masayuki Nakamura, Atsushi Sakurai, Toshio
Watanabe, Jiro Nakamura, and Hiroshi Ban
Communication-assisted Topology Control of Semi-autonomous Robots by
Venkatesh Ramarathinam and Miguel Labrador
Scalability of Location Sensor Data Fusion by Tom Pfeifer and Kieran
Sullivan
Port-based Multihomed Mobile IPv6 for Heterogeneous Networks by
Christer Ahlund, Robert Brannstrom, Karl Andersson, and Orjan
Tjernstrom
Performance of TCP with Load-sensitive Routing by Sivaram Cheekiralla
and Daniel Engels
Needles in Haystacks: Practical Intrusion Detection from Theoretical
Results by Gerald Marin and William Allen
Viral IP Address Assignment by Sivaram Cheekiralla and Daniel Engels
===================
Thursday 16 November
===================
Keynote: Dr. Edward Knightly, Rice University, USA (Title of talk:
“Large-Scale Urban Mesh Networks: from Deployment to Applications”)
***** 10:30 - 12:10 Session #3 (Tracks A, B, and C)
Track A – Security and disaster management
Detecting Botnets with Tight Command and Control by Tim Strayer
Can CRLs Provide Bandwidth-Efficient Online Certificate Status? by
Anantharaman Lakshminarayanan, Aditya Liviandi, Tong Lee Lim, and
William Chui
Modelling Voice Communication in Disaster Area Scenarios by Nils
Aschenbruck, Michael Gerharz, Matthias Frank, and Peter Martini
Security for FTTx Optical Access Networks by Walid Shawbaki and Ahmed
Kamal
Track B – Clustering and localization
Clustered Mobility Model for Scale-Free Wireless Networks by Sunho Lim,
Chansu Yu, and Chita Das
Landscape-3D: A Robust Localization Scheme for Sensor Networks over
Complex 3D Terrains Liqiang Zhang, Xiaobo Zhou, and Qiang Cheng
Adaptive Location Update Area Design for PCS Networks under 2D Markov
Walk Model by Jun Zheng, Yan Zhang, and Ling Wang
Track C – High-speed interconnects and hardware
Design of a Giga-bit Hardware Accelerator for the iSCSI Initiator by
Chung-Ho Chen, Yi-Cheng Chung, Chen-Hua Wang, and Han-Chiang Chen
Efficient Java Communication Protocols on High-speed Cluster
Interconnects by Guillermo Taboada, Juan Touriño, and Ramón Doallo
An integrated Hardware Solution for MAT, MPLS-UNI, and TM in Access
Networks by Harald Widiger, Stephan Kubisch, Thomas Bahls, and Dirk
Timmermann
Effect of Hash Collisions on the Performance of LAN Switching Devices
and Networks by Chris Huntley, Galina Antonova, and Paul Guinand
***** 1:30 - 3:10 Session #4 (Tracks A, B, and C)
Track A – Wireless and ad hoc
Exploiting Rate Diversity for Broadcasting in Wireless Mesh Networks by
Junaid Qadir, Chun Tung Chou, and Archan Misra
Analysis of Link Availability and the Capacity of Mobile Ad Hoc
Networks by Ruchi Sharma and Ravi Pendse
Toward a Seamless Communication Architecture for In-building Networks
at the 60 GHz band by Bao Linh Dang, Venkatesha Prasad, and Ignas
Niemegeers
A Hybrid Distributed Coordination Function for Scalability and
Inter-operability in Large-Scale WLANs by Nakjung Choi, Seongil Han,
Yongho Seok, Yanghee Choi, and Taekyoung Kwon
Track B – Optical networks 1
A Transceiver Saving Auxiliary Graph Model for Dynamic Traffic Grooming
in WDM Mesh Networks by Huaxiong Yao
Traffic Grooming in Statistically Shared Optical Networks by Srivatsan
Balasubramanian and Arun Somani
Optical CDMA Code Collision and Translation Performance Analysis by Anh
Nguyen and Deniz Gurkan
Track C – Modeling and advanced techniques
Ontology Modeling of a Dynamic Protocol Stack by Lifeng Zhou
Towards Semantic Modeling for QoS Specification by Lifeng Zhou
Training on Multiple Sub-Flows to Optimise the use of Machine Learning
Classifiers in Real-World IP Networks by Thuy Nguyen and Grenville
Armitage
Biologically-Inspired Data Aggregation for Multi-Modal Wireless Sensor
Networks by Pruet Boonma and Junichi Suzuki
***** 3:30 - 5:35 Session #5 (Tracks A, B, and C)
Track A – IEEE 802.11
Delay Distribution Analysis of the RTS/CTS mechanism of IEEE 802.11 by
Paschalis Raptis, Albert Banchs, Vassileios Vitsas, Konstantinos
Paparrizos, and Periklis Chatzimisios
Maximizing differentiated throughput in IEEE 802.11e wireless LANs by
Jongwon Yoon, Sangki Yun, and Hyogon Kim
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC by
Shao-Cheng Wang and Ahmed Helmy
Track B – Optical networks 2
Residual Admission Capacity in Optical Burst Switching Networks and its
Application in Routing Loss-Guaranteed Flows by Qian Chen, Mohan
Gurusamy, and Kee Chaing Chua
Embedding Hypercube Communications on Optical Chordal Ring Networks of
Degree 4 by Yawen Chen
Delay Constrained Traffic Grooming in WDM Ring Networks by Arun
Vishwanath and Weifa Liang
Rerouting Schemes with Inter-layer Backup Resource Sharing for
Differentiated Survivability in IP-over-WDM Optical Networks by
Krishanthmohan Ratnam, Mohan Gurusamy, and Luying Zhou
An Efficient MAC Protocol for Optical WDM Networks with Simulation
Evaluation by Ge Nong, S. Zhang, and XiaoLa Lin
Track C – Multicast
Protecting Multicast Sessions in Wireless Mesh Networks by Xin Zhao,
Chun Tung Chou, Jun Guo, and Sanjay Jha
The Internet Group Management Protocol with Access Control (IGMP-AC) by
Salekul Islam and J. William Atwood
Making Application Layer Multicast Reliable is Feasible by Bin Rong
Detecting Malicious Peers in Overlay Multicast Streaming by Samarth
Shetty, Patricio Galdames, Wallapak Tavanapong, and Ying Cai
--
Chun Tung Chou
Senior Lecturer / Head of Networks Group
School of Computer Science and Engineering
The University of New South Wales
Sydney, NSW 2052, Australia
Phone: +61-2-9385 7203
Fax:+61-2-9385 5995
Email: ctchou at cse.unsw.edu.au
WWW: http://www.cse.unsw.edu.au/~ctchou/
Legal disclaimer: http://www.eng.unsw.edu.au/emaildis.htm
The CRICOS Provider Code for UNSW is 00098G.
More information about the end2end-interest
mailing list