


default search action
37th LCN 2012: Clearwater Beach, Florida, USA
- 37th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, October 22-25, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1565-4

- Kevin R. Fall:

Comparing Information-Centric and Delay-Tolerant Networking. - Mark Crovella:

A fine-grained distance metric for analyzing Internet topology. - Punit Rathod, Abhay Karandikar, Anirudha Sahoo:

Facilitating Non-collocated coexistence for WiFi and 4G wireless networks. 1-9 - Kuan Lun Huang, Salil S. Kanhere

, Wen Hu
:
A privacy-preserving reputation system for participatory sensing. 10-18 - Sunoh Choi, Gabriel Ghinita, Elisa Bertino:

Secure sensor network SUM aggregation with detection of malicious nodes. 19-27 - Ahmad Abbas, Mohamed F. Younis

:
Interconnecting disjoint network segments using a mix of stationary and mobile nodes. 28-35 - Gürkan Solmaz, Mustafa Ilhan Akbas

, Damla Turgut:
Modeling visitor movement in theme parks. 36-43 - Oleksandr Artemenko, Tobias Simon, Andreas Mitschele-Thiel, Dominik Schulz, Rheza Satria Ta:

Comparison of Anchor Selection algorithms for improvement of position estimation during the Wi-Fi localization process in disaster scenario. 44-49 - Patrick Baier, Frank Dürr

, Kurt Rothermel:
TOMP: Opportunistic traffic offloading using movement predictions. 50-58 - Yang Liu, Wenji Chen, Yong Guan:

Monitoring Traffic Activity Graphs with low-rank matrix approximation. 59-67 - Sebastian Zander, Thuy T. T. Nguyen, Grenville J. Armitage:

Sub-flow packet sampling for scalable ML classification of interactive traffic. 68-75 - Cyriac James, Hema A. Murthy:

Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection. 76-84 - Philip Branch, Jason But:

Rapid and generalized identification of packetized voice traffic flows. 85-92 - Panoat Chuchaisri, Richard E. Newman:

Multi-Resolution Elliptic Curve digital Signature. 93-101 - Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz:

Applicability of crypto-based security approaches in tactical wireless multi-hop networks. 102-110 - Troy J. Nunnally, A. Selcuk Uluagac

, John A. Copeland, Raheem A. Beyah
:
3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security. 111-118 - Yigal Bejerano, Suman Jana, Pramod V. Koppol:

Efficient construction of directed Redundant Steiner trees. 119-127 - Kelton A. P. Costa, Clayton R. Pereira

, Rodrigo Nakamura, João Paulo Papa:
Intrusion detection in computer networks using Optimum-Path Forest clustering. 128-131 - HyunYong Lee, Akihiro Nakao:

A study of P2P traffic localization by network delay insertion. 132-135 - Heiko Günther, Marko Jahnke:

Automatic generation of extended dependency graphs for network security. 136-139 - Adrian Herrera, Wen Hu

:
A key distribution protocol for Wireless Sensor Networks. 140-143 - Poonam Dharam, Qishi Wu, Mengxia Zhu:

On bandwidth reservation for optimal resource utilization in high-performance networks. 144-147 - David Pinto, Sadraque S. Viana, José Augusto Miranda Nacif, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira, Alex Borges Vieira, Antônio Otávio Fernandes:

HydroNode: A low cost, energy efficient, multi purpose node for underwater sensor networks. 148-151 - Yuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang:

On the distribution of inter contact time for DTNs. 152-155 - Kai Li

, Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Reliable communications in aerial sensor networks by using a hybrid antenna. 156-159 - Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed

:
A new design of the IEEE 802.11 MAC layer to enhance the scalability of the DMS service. 160-163 - Michael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick:

A secure monitoring and control system for Wireless Sensor Networks. 164-167 - Mehrgan Mostowfi, Ken Christensen, Sanghak Lee, Jungmee Yun:

Timed redirection: HTTP request coalescing to reduce energy use of hybrid web servers. 168-171 - Yang Song, Bogdan Ciubotaru, Gabriel-Miro Muntean

:
Application-aware adaptive duty cycle-based Medium Access Control for energy efficient wireless data transmissions. 172-175 - Ruiqi Ding, Gabriel-Miro Muntean

:
A context-aware cross-layer energy-efficient adaptive routing algorithm for WLAN communications. 176-179 - Amin Ahmadi, Abbas Bigdeli, Mahsa Baktashmotlagh

, Brian C. Lovell
:
A wireless mesh sensor network for hazard and safety monitoring at the Port of Brisbane. 180-183 - Masayuki Kakida, Yosuke Tanigawa, Hideki Tode:

Active breadcrumbs: Aggressive distribution method of in-network guidance information for content-oriented networks. 184-187 - Claudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Igor Leão dos Santos

, Albert Y. Zomaya
:
Information fusion techniques applied to Shared Sensor and Actuator Networks. 188-191 - Jelle Nelis, Tom Verschueren, Dieter Verslype, Chris Develder

:
DYAMAND: DYnamic, Adaptive MAnagement of Networks and Devices. 192-195 - Luis Miguel Torres, Eduardo Magaña

, Mikel Izal
, Daniel Morató
:
Strategies for automatic labelling of web traffic traces. 196-199 - Ramona Trestian

, Olga Ormond, Gabriel-Miro Muntean
:
On the impact of wireless network traffic location and access technology on mobile device energy consumption. 200-203 - Jason But, Philip Branch:

Applying temporal feedback to rapid identification of BitTorrent traffic. 204-207 - Moazzam Khan, Mohammad Omer, John A. Copeland:

Decision centric identification and rank ordering of security metrics. 208-211 - Nikolai Samteladze, Ken Christensen:

DELTA: Delta encoding for less traffic for apps. 212-215 - Yuseok Jeon, Tae-Hyung Kim, Yuna Kim, Jong Kim:

LT-OLSR: Attack-tolerant OLSR against link spoofing. 216-219 - Martin Ellis

, Dimitrios P. Pezaros
, Theodore Kypraios
, Colin Perkins
:
Modelling packet loss in RTP-based streaming video for residential users. 220-223 - Andreas Reinhardt

, Daniel Seither, André König, Ralf Steinmetz
, Matthias Hollick:
Protecting IEEE 802.11s wireless mesh networks against insider attacks. 224-227 - Jorge Granjal

, Edmundo Monteiro
, Jorge Sá Silva
:
On the feasibility of secure application-layer communications on the Web of Things. 228-231 - Hao Xu, Sarangapani Jagannathan:

A cross layer approach to the novel distributed scheduling protocol and event-triggered controller design for Cyber Physical Systems. 232-235 - Dong Hao, Atsushi Iwasaki, Makoto Yokoo

:
A differential game theoretic model for real-time spectrum pricing in cognitive radio networks. 236-239 - Vidya Suryanarayana, Karthik Mylar Balasubramanya, Ravi Pendse:

Cache isolation and thin provisioning of hypervisor caches. 240-243 - Elisa Rojas

, Guillermo Ibáñez, Diego Rivera, Juan A. Carral
:
Flow-Path: An AllPath flow-based protocol. 244-247 - Aaron D. Goldman, A. Selcuk Uluagac

, Raheem A. Beyah
, John A. Copeland:
Plugging the leaks without unplugging your network in the midst of Disaster. 248-251 - Ilhem Fajjari, Nadjib Aitsaadi, Guy Pujolle, Hubert Zimmermann:

An optimised dynamic resource allocation algorithm for Cloud's backbone network. 252-255 - Sebastian Zöller, Andreas Reinhardt

, Ralf Steinmetz
:
Distributed data filtering in logistics wireless sensor networks based on transmission relevance. 256-259 - Paul Joseph Dillon, Taieb Znati:

Towards an architecture for mobile healthcare. 260-263 - Aditya V. Padaki, Maciej J. Zawodniok

:
TDMA for wireless passive backscatter networks: An information theoretic approach. 264-267 - Daiki Nobayashi, Yutaka Fukuda, Takeshi Ikenaga

:
Autonomous dynamic transmission scheduling based on neighbor node behavior for multihop wireless networks. 268-271 - Gongqi Lin, Sieteng Soh

, Mihai M. Lazarescu
, Kwan-Wu Chin
:
Power-aware routing in networks with delay and link utilization constraints. 272-275 - H. M. N. Dilum Bandara

, Anura P. Jayasumana:
Resource and query aware, peer-to-peer-based multi-attribute Resource Discovery. 276-279 - Steffen Wendzel

, Sebastian Zander:
Detecting protocol switching covert channels. 280-283 - Yunlong Song, Min Liu, Shaojie Tang, XuFei Mao:

Time series matrix factorization prediction of internet traffic matrices. 284-287 - Abdoulmenim Bilh, Chun Tung Chou

:
An opportunistic multicast routing protocol for wireless mesh networks. 288-291 - Stefan Aust, R. Venkatesha Prasad

, Ignas G. Niemegeers:
Performance evaluation of Sub 1 GHz wireless sensor networks for the smart grid. 292-295 - Thuan Duong-Ba, Thinh P. Nguyen:

Distributed client-server assignment. 296-299 - Michael Hansen, Raquel Hill, Seth Wimberly:

Detecting covert communication on Android. 300-303 - David Riley, Mohamed F. Younis:

A modular and power-intelligent architecture for wireless sensor nodes. 304-307 - Antonio R. de Carvalho, Afonso D. Ribas, Vilar Fiuza da Camara Neto, Eduardo Freire Nakamura

, Carlos Maurício S. Figueiredo
:
An RSSI-based navigation algorithm for a mobile robot in Wireless Sensor Networks. 308-311 - Xuefeng Ma, Jinpeng Huai, Bo Li, Hanwen Wang, Ye Jiao:

Models and algorithms for elastic-demand network equilibrium problems in communication networks with multicast sessions. 312-315 - Fuliang Li, Changqing An

, Jiahai Yang, Jianping Wu, Zejia Chen:
Unravel the characteristics and development of current IPv6 network. 316-319 - Noureddine Lasla

, Abdelouahid Derhab, Abdelraouf Ouadjaout
, Miloud Bagaa
, Adlen Ksentini, Nadjib Badache:
Half-Symmetric Lens based localization algorithm for wireless sensor networks. 320-323 - Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, Apostolos A. Kountouris:

Resiliency taxonomy of routing protocols in Wireless Sensor Networks. 324-327 - Amr H. El Mougy, Mohamed Ibnkahla

:
Achieving end-to-end goals of WSN using Weighted Cognitive Maps. 328-331 - Ioan Sorin Comsa, Sijing Zhang, Mehmet Aydin, Pierre Kuonen, Jean-Frédéric Wagen:

A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networks. 332-335 - Izzet F. Senturk

, Kemal Akkaya:
On the performance of sensor node repositioning under realistic terrain constraints. 336-339 - Yousef Ebrahimi, Mohamed F. Younis:

Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks. 340-343 - Lin Xue, Suman Kumar, Cheng Cui, Seung-Jong Park

:
An evaluation of fairness among heterogeneous TCP variants over 10Gbps high-speed networks. 344-347 - Qinghua Wu, Zhenyu Li, Jianhua Yang, Gaogang Xie, Kavé Salamatian

:
Efficient traffic flow measurement for ISP networks. 348-351 - Chunhe Xia, Dong Liang, Haiquan Wang, Min Luo, Weifeng Lv:

Characterization and modeling in large-scale urban DTNs. 352-359 - Johann Marquez-Barja

, Carlos Miguel Tavares Calafate
, Juan-Carlos Cano
, Pietro Manzoni
:
A geolocation-based Vertical Handover Decision Algorithm for Vehicular Networks. 360-367 - Hikmat El Ajaltouni, Azzedine Boukerche, Richard W. Pazzi

:
Mobility based dynamic TXOP for vehicular communication. 376-383 - Daqing Yun, Qishi Wu, Patrick Brown, Mengxia Zhu:

Modeling and optimizing transport-support workflows in high-performance networks. 384-391 - Laila Daniel

, Markku Kojo:
Enhancing TCP with cross-layer notifications and capacity estimation in heterogeneous access networks. 392-400 - Tomas Kupka, Pål Halvorsen, Carsten Griwodz:

Performance of on-off traffic stemming from live adaptive segmented HTTP video streaming. 401-409 - Aniket Mahanti, Niklas Carlsson, Martin F. Arlitt, Carey Williamson:

Characterizing cyberlocker traffic flows. 410-418 - Wei Yin, Peizhao Hu, Jadwiga Indulska

, Marius Portmann
, Jonathan Guerin:
Robust MAC-layer rate control mechanism for 802.11 wireless networks. 419-427 - Hao Zhou, Yusheng Ji, Yu Gu, Baohua Zhao:

Network coding based SVC multicast over broadband wireless networks. 428-435 - Chris Walsh, Douglas Hakkarinen, Tracy Camp:

Distributed Decode and Forward Beamforming. 436-444 - Xin Zhao, Sanjay Jha

:
Flexible resource allocation for multicast in OFDMA based wireless networks. 445-452 - Cuong Truong, Kay Römer

:
Efficient geocasting to multiple regions in large-scale wireless sensor networks. 453-461 - Venkat Pulimi, Tuhin Paul, Kevin G. Stanley, Derek L. Eager:

Near-optimal routing for contour detection in wireless sensor networks. 462-469 - Raphael Ernst, Peter Martini:

Adaptive HELLO for the Neighborhood Discovery Protocol. 470-478 - Xu Xu, Weifa Liang

, Tim Wark, Jaein Jeong:
Maximizing network lifetime via 3G gateway assignment in dual-radio sensor networks. 479-486 - Dilip Kumar Krishnappa, Eric Lyons, David Irwin, Michael Zink

:
Network capabilities of cloud services for a real time scientific application. 487-495 - Mohan Gurusamy

, Tho Ngoc Le, Dinil Mon Divakaran:
An integrated resource allocation scheme for multi-tenant data-center. 496-504 - Weisheng Si

, Javid Taheri, Albert Y. Zomaya
:
A distributed energy saving approach for Ethernet switches in data centers. 505-512 - Sebastian Meiling, Thomas C. Schmidt

, Matthias Wählisch
:
Large-scale measurement and analysis of one-way delay in hybrid multicast networks. 513-520 - Murad Kaplan, Mihajlo Zeljkovic, Mark Claypool, Craig E. Wills:

How's My Network? Predicting performance from within a Web browser sandbox. 521-528 - Mauricio Iturralde

, Tara Ali-Yahiya, Anne Wei, André-Luc Beylot:
A real-time services performance and interference mitigation for femtocell scenarios in LTE networks. 529-536 - Doreid Ammar, Thomas Begin, Isabelle Guérin Lassous, Ludovic Noirie:

KBAC: Knowledge-Based Admission Control. 537-544 - David A. Miller, Ahmed E. Kamal:

Impact of network conditions on delay-stable communications in closed industrial control networks. 545-550 - Wei Zhao, Yao Liang:

Inference in wireless sensor networks based on information structure optimization. 551-558 - Hyunbum Kim, Jorge Arturo Cobb:

Optimization trade-offs in the design of wireless sensor and actor networks. 559-567 - Xiaohui Lin, Hui Wang:

On using game theory to balance energy consumption in heterogeneous wireless sensor networks. 568-576 - Louai Al-Awami

, Hossam S. Hassanein
:
Energy efficient data survivability for WSNs via Decentralized Erasure Codes. 577-584 - Mohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms:

An approach for bounding breach path detection reliability in wireless sensor networks. 585-592 - Zakwan Al-Arnaout

, Jonathan Hart, Qiang Fu
, Marcus Frean:
MP-DNA: A novel distributed replica placement heuristic for WMNs. 593-600 - Song Zhang, Niklas Carlsson, Derek L. Eager, Zongpeng Li, Anirban Mahanti:

Dynamic file bundling for large-scale content distribution. 601-609 - Varun Khare, Beichuan Zhang:

CDN Request Routing to reduce network access cost. 610-617 - Mohammad Zubair Ahmad, Ratan Guha:

A tale of nine Internet exchange points: Studying path latencies through major regional IXPs. 618-625 - Jaime Ballesteros, Mahmudur Rahman, Bogdan Carbunar, Naphtali Rishe

:
Safe cities. A participatory sensing approach. 626-634 - Dingwen Yuan, Michael Riecker, Matthias Hollick:

HOPSCOTCH: An adaptive and distributed channel hopping technique for interference avoidance in Wireless Sensor Networks. 635-642 - Raphael M. Guedes, Marcel William Rocha da Silva, Pedro S. Coutinho, José Ferreira de Rezende

:
Agnostic broadcast rendezvous for cognitive radio networks using channel hopping. 643-650 - Olga Goussevskaia, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira:

Wireless multi-rate scheduling: From physical interference to disk graphs. 651-658

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














