default search action
40th LCN 2015: Clearwater Beach, FL, USA
- Salil S. Kanhere, Jens Tölle, Soumaya Cherkaoui:
40th IEEE Conference on Local Computer Networks, LCN 2015, Clearwater Beach, FL, USA, October 26-29, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-6770-7 - Till Steinbach, Hyung-Taek Lim, Franz Korf, Thomas C. Schmidt, Daniel Herrscher, Adam Wolisz:
Beware of the hidden! How cross-traffic affects quality assurances of competing real-time Ethernet standards for in-car communication. 1-9 - Renan Fischer e Silva, Paul M. Carpenter:
Exploring interconnect energy savings under east-west traffic pattern of mapreduce clusters. 10-18 - Hanno Wirtz, Torsten Zimmermann, Martin Serror, Klaus Wehrle:
Collaborative On-demand Wi-Fi sharing. 19-27 - Carlos Anastasiades, Arun Sittampalam, Torsten Braun:
Content discovery in wireless information-centric networks. 28-36 - Amuda James Abu, Brahim Bensaou:
Modelling the Pending Interest Table occupancy in CCN with interest timeout and retransmission. 37-45 - Saran Tarnoi, Vorapong Suppakitpaisarn, Wuttipong Kumwilaisak, Yusheng Ji:
Performance analysis of probabilistic caching scheme using Markov chains. 46-54 - Zhen Feng, Mingwei Xu, Yuan Yang, Qi Li, Yu Wang, Qing Li, Börje Ohlman, Meng Chen:
Joint optimization of content replication and Traffic Engineering in ICN. 55-63 - Carlos Anastasiades, Andre S. Gomes, Rene Gadow, Torsten Braun:
Persistent caching in information-centric networks. 64-72 - Hani Salah, Julian Wulfheide, Thorsten Strufe:
Coordination supports security: A new defence mechanism against interest flooding in NDN. 73-81 - Zhiwei Xu, Bo Chen, Ninghan Wang, Yujun Zhang, Zhongcheng Li:
ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN. 82-90 - Daniel Ellard, Christine E. Jones, Victoria Manfredi, W. Timothy Strayer, Bishal Thapa, Megan Van Welie, Alden W. Jackson:
Rebound: Decoy routing on asymmetric routes via error messages. 91-99 - Benjamin Schiller, Thorsten Strufe, Dirk Kohlweyer, Jan Seedorf:
Growing a Web of Trust. 100-108 - Nikolaos Baroutis, Mohamed F. Younis:
Using fake sinks and deceptive relays to boost base-station anonymity in Wireless Sensor Network. 109-116 - Mohammad Abu Alsheikh, Shaowei Lin, Hwee Pink Tan, Dusit Niyato:
Toward a robust sparse data representation for wireless sensor networks. 117-124 - Jun Xu, Gürkan Solmaz, Rouhollah Rahmatizadeh, Damla Turgut, Ladislau Bölöni:
Animal monitoring with unmanned aerial vehicle-aided wireless sensor networks. 125-132 - Mohammed Elmorsy, Ehab S. Elmallah:
Reliable surveillance in ring deployed Wireless Sensor Networks. 133-140 - Immanuel Schweizer, Tobias Petry, Max Mühlhäuser:
C-SDF: Practical solar-aware distributed flow control. 141-148 - Fahad Ahmad Khan, Saad Ahmad Khan, Damla Turgut, Ladislau Bölöni:
Scheduling multiple mobile sinks in Underwater Sensor Networks. 149-156 - Csaba Király, Timofei Istomin, Oana Iova, Gian Pietro Picco:
D-RPL: Overcoming memory limitations in RPL point-to-multipoint routing. 157-160 - Samuel Brack, Sven Hager, Björn Scheuermann:
JitVector: Just-in-time code generation for network packet classification. 161-164 - Meng Chen, Mingwei Xu, Xirui Song, Yuan Yang:
Towards identifying Large-scale BGP Events. 165-168 - Daniel J. Casey, Barry E. Mullins:
SDN shim: Controlling legacy devices. 169-172 - Khaled Salah:
An analytical model to achieve elasticity for cloud-based firewalls. 173-176 - Peter Hillmann, Frank Tietze, Gabi Dreo Rodosek:
Tracemax: A novel single packet IP traceback strategy for data-flow analysis. 177-180 - David C. Harrison, Winston K. G. Seah, Ramesh Kumar Rayudu:
Coverage preservation in energy harvesting wireless sensor networks for rare events. 181-184 - Anil Kumar, Jinoh Kim, Sang C. Suh, Ganho Choi:
Incorporating multiple cluster models for network traffic classification. 185-188 - Abbas Mehrabi, Kiseon Kim:
Using a mobile vehicle for road condition surveillance by energy harvesting sensor nodes. 189-192 - Andriana Ioannou, Stefan Weber:
Towards exploring the benefits of scope-flooding in Information-Centric Networks. 193-196 - Alexander Frömmgen, Robert Rehner, Max Lehn, Alejandro P. Buchmann:
Fossa: Using genetic programming to learn ECA rules for adaptive networking applications. 197-200 - Fredrick A. Omondi, Purav Shah, Orhan Gemikonakli, Enver Ever:
An analytical model for bounded WSNs with unreliable cluster heads and links. 201-204 - Mansour Abdulaziz, Robert Simon:
Mobile data collection using multi-channel network coding in wireless sensor networks. 205-208 - Wilson Bongiovanni, Adilson Eduardo Guelfi, Elvis Pontes, Anderson Aparecido Alves da Silva, Fen Zhou, Sergio Takeo Kofuji:
Viterbi algorithm for detecting DDoS attacks. 209-212 - Se-Young Yu, Nevil Brownlee, Aniket Mahanti:
Characterizing performance and fairness of big data transfer protocols on long-haul networks. 213-216 - Donghyeok Ho, Hyungnam Kim, Hwangjun Song:
Avatar mobility and network condition-aware 3D game over wireless networks. 217-220 - Jun Liu:
Towards a method of estimating one-way delays under delay asymmetry and unknown relative clock offset. 221-224 - Richard Withnell, Christopher Edwards:
Towards a Context Aware Multipath-TCP. 225-228 - Michael Stein, Géza Kulcsár, Immanuel Schweizer, Gergely Varró, Andy Schürr, Max Mühlhäuser:
Topology control with application constraints. 229-232 - Ahmed A. Shahin, Mohamed F. Younis:
Efficient multi-group formation and communication protocol for Wi-Fi Direct. 233-236 - Subhankar Ghosal, Sasthi C. Ghosh:
Channel assignment in mobile networks based on geometric prediction and random coloring. 237-240 - Sanket Gupte, Mohamed F. Younis:
Participatory-sensing-enabled efficient Parking Management in modern cities. 241-244 - Mohammad Reza Zakerinasab, Mea Wang:
Dependency-aware distributed video transcoding in the cloud. 245-252 - Ramy Atawia, Hatem Abou-zeid, Hossam S. Hassanein, Aboelmagd Noureldin:
Chance-constrained QoS satisfaction for predictive video streaming. 253-260 - Giang Nguyen, Stefanie Roos, Thorsten Strufe, Mathias Fischer:
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming. 261-269 - Subhadeep Patra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni:
An ITS solution providing real-time visual overtaking assistance using smartphones. 270-278 - Si Quoc Viet Trang, Emmanuel Lochin, Cédric Baudoin, Emmanuel Dubois, Patrick Gelard:
FLOWER - Fuzzy Lower-than-Best-Effort transport protocol. 279-286 - Bendik R. Opstad, Jonas Markussen, Iffat Ahmed, Andreas Petlund, Carsten Griwodz, Pål Halvorsen:
Latency and fairness trade-off for thin streams using redundant data bundling in TCP. 287-294 - Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhen Xu, Jingguo Ge:
Improving TCP performance in data center networks with Adaptive Complementary Coding. 295-302 - Mohammed Hussein, Gentian Jakllari, Béatrice Paillassa:
Frugal topologies for saving energy in IP networks. 303-311 - Ganesh Chandrasekaran, Ning Wang, Rahim Tafazolli:
Caching on the move: Towards D2D-based information centric networking for mobile content distribution. 312-320 - Jung-Woong Sung, Seung-Jae Han:
Data bundling for energy efficient communication of wearable devices. 321-328 - Girish Revadigar, Chitra Javali, Wen Hu, Sanjay Jha:
DLINK: Dual link based radio frequency fingerprinting for wearable devices. 329-337 - Alexander Magnano, Xin Fei, Azzedine Boukerche:
Predictive mobile IP handover for vehicular networks. 338-346 - Andri Lareida, George P. Petropoulos, Valentin Burger, Michael Seufert, Sergios Soursos, Burkhard Stiller:
Augmenting home routers for socially-aware traffic management. 347-355 - Tobias Amft, Barbara Guidi, Kalman Graffi, Laura Ricci:
FRoDO: Friendly routing over dunbar-based overlays. 356-364 - Shan Jiang, Jianxin Liao, Jun Gong, Jingyu Wang, Tonghong Li:
Competitive equilibrium and stable coalition in overlay environments. 365-372 - Thomas Bocek, Nico Rutishauser, Burkhard Stiller:
Energy-efficient overlay networks for mobile devices with buffered relaying and push notifications. 373-381 - Sascha Alexander Jopen, Arne Schulz, Raphael Ernst:
Measuring and modeling performance of WLAN communication for multistatic sonar applications. 382-385 - Jens Heuschkel, Immanuel Schweizer, Max Mühlhäuser:
VirtualStack: A framework for protocol stack virtualization at the edge. 386-389 - Shuhei Oda, Kurozumi Masaaki, Yosuke Endo:
Reference equipment of cross-layer control for live video transmission on various physical links. 390-393 - Avishek Patra, Andreas Achtzehn, Petri Mähönen:
ULLA-X: a unified programmatic middleware for on-demand network reconfiguration. 394-397 - Steffen Büchner, Jörg Nolte, Rolf Kraemer, Lukasz Lopacinski, Reinhardt Karnapke:
Challenges for 100 Gbit/s end to end communication: Increasing throughput through parallel processing. 398-401 - Avirup Das, Sasthi C. Ghosh, Nabanita Das, Abhirup Das Barman:
Cooperative spectrum mobility in heterogeneous opportunistic networks using cognitive radio. 402-405 - Mosarrat Jahan, Mohsen Rezvani, Aruna Seneviratne, Sanjay K. Jha:
Method for providing secure and private fine-grained access to outsourced data. 406-409 - Shegufta Bakht Ahsan, Nitin H. Vaidya:
O-ACK: An adaptive wireless MAC protocol exploiting opportunistic token-passing and ack piggybacking. 410-413 - Immanuel Schweizer, Ralf Zimmermann, Michael Stein, Max Mühlhäuser:
a-kTC: Integrating topology control into the stack. 414-417 - Ying Li, Katherine Guo, Xin Wang, Emina Soljanin, Thomas Woo:
SEARS: Space efficient and reliable storage system in the cloud. 418-421 - Giovanna Carofiglio, Leonce Mekinda, Luca Muscariello:
LAC: Introducing latency-aware caching in Information-Centric Networks. 422-425 - Iyad Lahsen Cherif, Lynda Zitoune, Véronique Vèque:
Performance evaluation of Joint Transmission Coordinated-Multipoint in dense Very High Throughput WLANs scenario. 426-429 - Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira:
Cache coherence in Machine-to-Machine Information Centric Networks. 430-433 - Shuli Zhang, Yan Zhang, Ding Tang, Zhen Xu, Jingguo Ge, Zhijun Zhao:
A partial-decentralized coflow scheduling scheme in data center networks. 434-437 - Alina Rubina, Oleksandr Artemenko, Andreas Mitschele-Thiel:
OrLiOn: Optimized Route Planning for the Localization of Indoor Nodes from Outdoor environment. 438-441 - Fabian Kaup, Matthias Wichtlhuber, Stefan Rado, David Hausheer:
Can Multipath TCP save energy? A measuring and modeling study of MPTCP energy consumption. 442-445 - Avinash Mungur, Christopher Edwards:
Performance of a tiered architecture to support end-host mobility in a locator identity split environment. 446-449 - Md Tanvir Ishtaique ul Huque, Guillaume Jourjon, Vincent Gramoli:
Revisiting the controller placement problem. 450-453 - Yutaro Inaba, Yosuke Tanigawa, Hideki Tode:
Content retrieval method in cooperation with CDN and ICN-based in-network guidance over IP network. 454-457 - Y. Sinan Hanay, Shin'ichi Arakawa, Masayuki Murata:
Evaluation of topology optimization objectives. 458-461 - Nils Richerzhagen, Tao Li, Dominik Stingl, Björn Richerzhagen, Ralf Steinmetz, Silvia Santini:
A step towards a protocol-independent measurement framework for dynamic networks. 462-465 - Ziteng Cui, Jianxin Liao, Jingyu Wang, Qi Qi, Jing Wang:
Cooperative traffic management for co-existing overlays. 466-469 - Bilal Gonen, Kemal Akkaya, Fatih Senel:
Efficient camera selection for maximized target coverage in underwater acoustic sensor networks. 470-473 - Ana Barroso, Matthias Hollick:
Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication. 474-477 - Tobias Rueckelt, Florian Jomrich, Daniel Burgstahler, Doreen Böhnstedt, Ralf Steinmetz:
Publish-subscribe-based control mechanism for scheduling integration in Mobile IPv6. 478-481 - Pawani Porambage, An Braeken, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila, Burkhard Stiller:
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks. 482-485 - Divyanka Bose, Anura P. Jayasumana:
A reputation-based method for detection of attacks in Virtual Coordinate based Wireless Sensor Networks. 486-489 - Simon Ofner, Matthias Frank:
Real-time streaming with millisecond granularity. 490-493 - Suranga Seneviratne, Fangzhou Jiang, Mathieu Cunche, Aruna Seneviratne:
SSIDs in the wild: Extracting semantic information from WiFi SSIDs. 494-497 - Ramona Trestian, Quoc-Tuan Vien, Purav Shah, Glenford E. Mapp:
Exploring energy consumption issues for multimedia streaming in LTE HetNet Small Cells. 498-501 - Talal Alharbi, Marius Portmann, Farzaneh Pakzad:
The (in)security of Topology Discovery in Software Defined Networks. 502-505 - Yu Wang, Chao Chen, Yang Xiang:
Unknown pattern extraction for statistical network protocol identification. 506-509 - Nazim Ahmed, Kamil Saraç:
An experimental study on inter-domain routing dynamics using IP-level path traces. 510-517 - James Pope, Robert Simon:
Efficient one-to-many broadcasting for resource-constrained wireless networks. 518-525 - Shiraz Qayyum, Peizhao Hu, Mohan Kumar:
COSC: Paths with Combined Optimal Stability and Capacity in opportunistic networks. 526-534 - Yigal Bejerano, Katherine Guo, Thyaga Nandagopal:
Fast detection of compact topology representation for wireless networks. 535-543 - Juan A. Fraire, Pablo G. Madoery, Jorge M. Finochietto, Edward J. Birrane:
Congestion modeling and management techniques for predictable disruption tolerant networks. 544-551 - Grzegorz Jereczek, Giovanna Lehmann Miotto, David Malone, Miroslaw Walukiewicz:
A lossless switch for data acquisition networks. 552-560 - Amitangshu Pal, Krishna Kant:
RODA: A reconfigurable optical data center network architecture. 561-569 - Zichuan Xu, Weifa Liang, Wenzheng Xu, Mike Jia, Song Guo:
Capacitated cloudlet placements in Wireless Metropolitan Area Networks. 570-578 - Sima Das, Sajal K. Das:
Leveraging network structure in centrality evaluation of large scale networks. 579-586 - Yongqiang Wang, Chase Q. Wu, Aiqin Hou, Wenyu Peng, Shuting Xu, Meng Shi:
On periodic scheduling of fixed-slot bandwidth reservations for big data transfer. 587-594
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.