


default search action
37th LCN 2012: Clearwater Beach, Florida, USA
- 37th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, October 22-25, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1565-4
- Kevin R. Fall:
Comparing Information-Centric and Delay-Tolerant Networking. - Mark Crovella:
A fine-grained distance metric for analyzing Internet topology. - Punit Rathod, Abhay Karandikar, Anirudha Sahoo:
Facilitating Non-collocated coexistence for WiFi and 4G wireless networks. 1-9 - Kuan Lun Huang, Salil S. Kanhere
, Wen Hu
:
A privacy-preserving reputation system for participatory sensing. 10-18 - Sunoh Choi, Gabriel Ghinita, Elisa Bertino:
Secure sensor network SUM aggregation with detection of malicious nodes. 19-27 - Ahmad Abbas, Mohamed F. Younis
:
Interconnecting disjoint network segments using a mix of stationary and mobile nodes. 28-35 - Gürkan Solmaz, Mustafa Ilhan Akbas
, Damla Turgut:
Modeling visitor movement in theme parks. 36-43 - Oleksandr Artemenko, Tobias Simon, Andreas Mitschele-Thiel, Dominik Schulz, Rheza Satria Ta:
Comparison of Anchor Selection algorithms for improvement of position estimation during the Wi-Fi localization process in disaster scenario. 44-49 - Patrick Baier, Frank Dürr
, Kurt Rothermel:
TOMP: Opportunistic traffic offloading using movement predictions. 50-58 - Yang Liu, Wenji Chen, Yong Guan:
Monitoring Traffic Activity Graphs with low-rank matrix approximation. 59-67 - Sebastian Zander, Thuy T. T. Nguyen, Grenville J. Armitage:
Sub-flow packet sampling for scalable ML classification of interactive traffic. 68-75 - Cyriac James, Hema A. Murthy:
Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection. 76-84 - Philip Branch, Jason But:
Rapid and generalized identification of packetized voice traffic flows. 85-92 - Panoat Chuchaisri, Richard E. Newman:
Multi-Resolution Elliptic Curve digital Signature. 93-101 - Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz:
Applicability of crypto-based security approaches in tactical wireless multi-hop networks. 102-110 - Troy J. Nunnally, A. Selcuk Uluagac
, John A. Copeland, Raheem A. Beyah
:
3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security. 111-118 - Yigal Bejerano, Suman Jana, Pramod V. Koppol:
Efficient construction of directed Redundant Steiner trees. 119-127 - Kelton A. P. Costa, Clayton R. Pereira
, Rodrigo Nakamura, João Paulo Papa:
Intrusion detection in computer networks using Optimum-Path Forest clustering. 128-131 - HyunYong Lee, Akihiro Nakao:
A study of P2P traffic localization by network delay insertion. 132-135 - Heiko Günther, Marko Jahnke:
Automatic generation of extended dependency graphs for network security. 136-139 - Adrian Herrera, Wen Hu
:
A key distribution protocol for Wireless Sensor Networks. 140-143 - Poonam Dharam, Qishi Wu, Mengxia Zhu:
On bandwidth reservation for optimal resource utilization in high-performance networks. 144-147 - David Pinto, Sadraque S. Viana, José Augusto Miranda Nacif, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira, Alex Borges Vieira, Antônio Otávio Fernandes:
HydroNode: A low cost, energy efficient, multi purpose node for underwater sensor networks. 148-151 - Yuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang:
On the distribution of inter contact time for DTNs. 152-155 - Kai Li
, Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Reliable communications in aerial sensor networks by using a hybrid antenna. 156-159 - Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed
:
A new design of the IEEE 802.11 MAC layer to enhance the scalability of the DMS service. 160-163 - Michael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick:
A secure monitoring and control system for Wireless Sensor Networks. 164-167 - Mehrgan Mostowfi, Ken Christensen, Sanghak Lee, Jungmee Yun:
Timed redirection: HTTP request coalescing to reduce energy use of hybrid web servers. 168-171 - Yang Song, Bogdan Ciubotaru, Gabriel-Miro Muntean
:
Application-aware adaptive duty cycle-based Medium Access Control for energy efficient wireless data transmissions. 172-175 - Ruiqi Ding, Gabriel-Miro Muntean
:
A context-aware cross-layer energy-efficient adaptive routing algorithm for WLAN communications. 176-179 - Amin Ahmadi, Abbas Bigdeli, Mahsa Baktashmotlagh
, Brian C. Lovell
:
A wireless mesh sensor network for hazard and safety monitoring at the Port of Brisbane. 180-183 - Masayuki Kakida, Yosuke Tanigawa, Hideki Tode:
Active breadcrumbs: Aggressive distribution method of in-network guidance information for content-oriented networks. 184-187 - Claudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Igor Leão dos Santos
, Albert Y. Zomaya
:
Information fusion techniques applied to Shared Sensor and Actuator Networks. 188-191 - Jelle Nelis, Tom Verschueren, Dieter Verslype, Chris Develder
:
DYAMAND: DYnamic, Adaptive MAnagement of Networks and Devices. 192-195 - Luis Miguel Torres, Eduardo Magaña
, Mikel Izal
, Daniel Morató
:
Strategies for automatic labelling of web traffic traces. 196-199 - Ramona Trestian
, Olga Ormond, Gabriel-Miro Muntean
:
On the impact of wireless network traffic location and access technology on mobile device energy consumption. 200-203 - Jason But, Philip Branch:
Applying temporal feedback to rapid identification of BitTorrent traffic. 204-207 - Moazzam Khan, Mohammad Omer, John A. Copeland:
Decision centric identification and rank ordering of security metrics. 208-211 - Nikolai Samteladze, Ken Christensen:
DELTA: Delta encoding for less traffic for apps. 212-215 - Yuseok Jeon, Tae-Hyung Kim, Yuna Kim, Jong Kim:
LT-OLSR: Attack-tolerant OLSR against link spoofing. 216-219 - Martin Ellis
, Dimitrios P. Pezaros
, Theodore Kypraios
, Colin Perkins
:
Modelling packet loss in RTP-based streaming video for residential users. 220-223 - Andreas Reinhardt, Daniel Seither, André König, Ralf Steinmetz
, Matthias Hollick:
Protecting IEEE 802.11s wireless mesh networks against insider attacks. 224-227 - Jorge Granjal
, Edmundo Monteiro
, Jorge Sá Silva
:
On the feasibility of secure application-layer communications on the Web of Things. 228-231 - Hao Xu, Sarangapani Jagannathan:
A cross layer approach to the novel distributed scheduling protocol and event-triggered controller design for Cyber Physical Systems. 232-235 - Dong Hao, Atsushi Iwasaki, Makoto Yokoo
:
A differential game theoretic model for real-time spectrum pricing in cognitive radio networks. 236-239 - Vidya Suryanarayana, Karthik Mylar Balasubramanya, Ravi Pendse:
Cache isolation and thin provisioning of hypervisor caches. 240-243 - Elisa Rojas
, Guillermo Ibáñez, Diego Rivera, Juan A. Carral
:
Flow-Path: An AllPath flow-based protocol. 244-247 - Aaron D. Goldman, A. Selcuk Uluagac
, Raheem A. Beyah
, John A. Copeland:
Plugging the leaks without unplugging your network in the midst of Disaster. 248-251 - Ilhem Fajjari, Nadjib Aitsaadi, Guy Pujolle, Hubert Zimmermann:
An optimised dynamic resource allocation algorithm for Cloud's backbone network. 252-255 - Sebastian Zöller, Andreas Reinhardt, Ralf Steinmetz
:
Distributed data filtering in logistics wireless sensor networks based on transmission relevance. 256-259 - Paul Joseph Dillon, Taieb Znati:
Towards an architecture for mobile healthcare. 260-263 - Aditya V. Padaki, Maciej J. Zawodniok
:
TDMA for wireless passive backscatter networks: An information theoretic approach. 264-267 - Daiki Nobayashi, Yutaka Fukuda, Takeshi Ikenaga
:
Autonomous dynamic transmission scheduling based on neighbor node behavior for multihop wireless networks. 268-271 - Gongqi Lin, Sieteng Soh
, Mihai M. Lazarescu
, Kwan-Wu Chin
:
Power-aware routing in networks with delay and link utilization constraints. 272-275 - H. M. N. Dilum Bandara
, Anura P. Jayasumana:
Resource and query aware, peer-to-peer-based multi-attribute Resource Discovery. 276-279 - Steffen Wendzel
, Sebastian Zander:
Detecting protocol switching covert channels. 280-283 - Yunlong Song, Min Liu, Shaojie Tang, XuFei Mao:
Time series matrix factorization prediction of internet traffic matrices. 284-287 - Abdoulmenim Bilh, Chun Tung Chou
:
An opportunistic multicast routing protocol for wireless mesh networks. 288-291 - Stefan Aust, R. Venkatesha Prasad, Ignas G. Niemegeers:
Performance evaluation of Sub 1 GHz wireless sensor networks for the smart grid. 292-295 - Thuan Duong-Ba, Thinh P. Nguyen:
Distributed client-server assignment. 296-299 - Michael Hansen, Raquel Hill, Seth Wimberly:
Detecting covert communication on Android. 300-303 - David Riley, Mohamed F. Younis:
A modular and power-intelligent architecture for wireless sensor nodes. 304-307 - Antonio R. de Carvalho, Afonso D. Ribas, Vilar Fiuza da Camara Neto, Eduardo Freire Nakamura
, Carlos Maurício S. Figueiredo:
An RSSI-based navigation algorithm for a mobile robot in Wireless Sensor Networks. 308-311 - Xuefeng Ma, Jinpeng Huai, Bo Li, Hanwen Wang, Ye Jiao:
Models and algorithms for elastic-demand network equilibrium problems in communication networks with multicast sessions. 312-315 - Fuliang Li, Changqing An
, Jiahai Yang, Jianping Wu, Zejia Chen:
Unravel the characteristics and development of current IPv6 network. 316-319 - Noureddine Lasla
, Abdelouahid Derhab, Abdelraouf Ouadjaout
, Miloud Bagaa
, Adlen Ksentini, Nadjib Badache:
Half-Symmetric Lens based localization algorithm for wireless sensor networks. 320-323 - Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, Apostolos A. Kountouris:
Resiliency taxonomy of routing protocols in Wireless Sensor Networks. 324-327 - Amr H. El Mougy, Mohamed Ibnkahla:
Achieving end-to-end goals of WSN using Weighted Cognitive Maps. 328-331 - Ioan Sorin Comsa, Sijing Zhang, Mehmet Aydin, Pierre Kuonen, Jean-Frédéric Wagen:
A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networks. 332-335 - Izzet F. Senturk
, Kemal Akkaya:
On the performance of sensor node repositioning under realistic terrain constraints. 336-339 - Yousef Ebrahimi, Mohamed F. Younis:
Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks. 340-343 - Lin Xue, Suman Kumar, Cheng Cui, Seung-Jong Park
:
An evaluation of fairness among heterogeneous TCP variants over 10Gbps high-speed networks. 344-347 - Qinghua Wu, Zhenyu Li, Jianhua Yang, Gaogang Xie, Kavé Salamatian
:
Efficient traffic flow measurement for ISP networks. 348-351 - Chunhe Xia, Dong Liang, Haiquan Wang, Min Luo, Weifeng Lv:
Characterization and modeling in large-scale urban DTNs. 352-359 - Johann Márquez-Barja
, Carlos Miguel Tavares Calafate
, Juan-Carlos Cano
, Pietro Manzoni
:
A geolocation-based Vertical Handover Decision Algorithm for Vehicular Networks. 360-367 - Hikmat El Ajaltouni, Azzedine Boukerche, Richard W. Pazzi
:
Mobility based dynamic TXOP for vehicular communication. 376-383 - Daqing Yun, Qishi Wu, Patrick Brown, Mengxia Zhu:
Modeling and optimizing transport-support workflows in high-performance networks. 384-391 - Laila Daniel
, Markku Kojo:
Enhancing TCP with cross-layer notifications and capacity estimation in heterogeneous access networks. 392-400 - Tomas Kupka, Pål Halvorsen, Carsten Griwodz:
Performance of on-off traffic stemming from live adaptive segmented HTTP video streaming. 401-409 - Aniket Mahanti, Niklas Carlsson, Martin F. Arlitt, Carey Williamson:
Characterizing cyberlocker traffic flows. 410-418 - Wei Yin, Peizhao Hu, Jadwiga Indulska
, Marius Portmann
, Jonathan Guerin:
Robust MAC-layer rate control mechanism for 802.11 wireless networks. 419-427 - Hao Zhou, Yusheng Ji, Yu Gu, Baohua Zhao:
Network coding based SVC multicast over broadband wireless networks. 428-435 - Chris Walsh, Douglas Hakkarinen, Tracy Camp:
Distributed Decode and Forward Beamforming. 436-444 - Xin Zhao, Sanjay Jha
:
Flexible resource allocation for multicast in OFDMA based wireless networks. 445-452 - Cuong Truong, Kay Römer
:
Efficient geocasting to multiple regions in large-scale wireless sensor networks. 453-461 - Venkat Pulimi, Tuhin Paul, Kevin G. Stanley, Derek L. Eager:
Near-optimal routing for contour detection in wireless sensor networks. 462-469 - Raphael Ernst, Peter Martini:
Adaptive HELLO for the Neighborhood Discovery Protocol. 470-478 - Xu Xu, Weifa Liang
, Tim Wark, Jaein Jeong:
Maximizing network lifetime via 3G gateway assignment in dual-radio sensor networks. 479-486 - Dilip Kumar Krishnappa, Eric Lyons, David E. Irwin, Michael Zink
:
Network capabilities of cloud services for a real time scientific application. 487-495 - Mohan Gurusamy
, Tho Ngoc Le, Dinil Mon Divakaran:
An integrated resource allocation scheme for multi-tenant data-center. 496-504 - Weisheng Si, Javid Taheri, Albert Y. Zomaya
:
A distributed energy saving approach for Ethernet switches in data centers. 505-512 - Sebastian Meiling, Thomas C. Schmidt
, Matthias Wählisch
:
Large-scale measurement and analysis of one-way delay in hybrid multicast networks. 513-520 - Murad Kaplan, Mihajlo Zeljkovic, Mark Claypool, Craig E. Wills:
How's My Network? Predicting performance from within a Web browser sandbox. 521-528 - Mauricio Iturralde
, Tara Ali-Yahiya, Anne Wei, André-Luc Beylot:
A real-time services performance and interference mitigation for femtocell scenarios in LTE networks. 529-536 - Doreid Ammar, Thomas Begin, Isabelle Guérin Lassous, Ludovic Noirie:
KBAC: Knowledge-Based Admission Control. 537-544 - David A. Miller, Ahmed E. Kamal:
Impact of network conditions on delay-stable communications in closed industrial control networks. 545-550 - Wei Zhao, Yao Liang:
Inference in wireless sensor networks based on information structure optimization. 551-558 - Hyunbum Kim, Jorge Arturo Cobb:
Optimization trade-offs in the design of wireless sensor and actor networks. 559-567 - Xiaohui Lin, Hui Wang:
On using game theory to balance energy consumption in heterogeneous wireless sensor networks. 568-576 - Louai Al-Awami
, Hossam S. Hassanein:
Energy efficient data survivability for WSNs via Decentralized Erasure Codes. 577-584 - Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms:
An approach for bounding breach path detection reliability in wireless sensor networks. 585-592 - Zakwan Al-Arnaout
, Jonathan Hart, Qiang Fu
, Marcus Frean:
MP-DNA: A novel distributed replica placement heuristic for WMNs. 593-600 - Song Zhang, Niklas Carlsson, Derek L. Eager, Zongpeng Li, Anirban Mahanti:
Dynamic file bundling for large-scale content distribution. 601-609 - Varun Khare, Beichuan Zhang:
CDN Request Routing to reduce network access cost. 610-617 - Mohammad Zubair Ahmad, Ratan Guha:
A tale of nine Internet exchange points: Studying path latencies through major regional IXPs. 618-625 - Jaime Ballesteros, Mahmudur Rahman, Bogdan Carbunar, Naphtali Rishe:
Safe cities. A participatory sensing approach. 626-634 - Dingwen Yuan, Michael Riecker, Matthias Hollick:
HOPSCOTCH: An adaptive and distributed channel hopping technique for interference avoidance in Wireless Sensor Networks. 635-642 - Raphael M. Guedes, Marcel William Rocha da Silva, Pedro S. Coutinho, José Ferreira de Rezende
:
Agnostic broadcast rendezvous for cognitive radio networks using channel hopping. 643-650 - Olga Goussevskaia, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira:
Wireless multi-rate scheduling: From physical interference to disk graphs. 651-658

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.