


default search action
38th LCN 2013: Sydney, Australia
- 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-0537-9

- Kevin Bloch:

Software defined networks (SDN) - Enabling virtualised, programmable infrastructure. - Aruna Seneviratne:

Challenges of data access and transport in a truly mobile world. - Anura P. Jayasumana:

Message from the general chair. - Damla Turgut, Nils Aschenbruck:

Message from the Program chairs. - Kemal Akkaya:

Message from the demonstrations chair. - Fatih Senel, Kemal Akkaya, Turgay Yilmaz:

Autonomous deployment of sensors for maximized coverage and guaranteed connectivity in Underwater Acoustic Sensor Networks. 211-218 - Dingwen Yuan, Matthias Hollick

:
Let's talk together: Understanding concurrent transmission in wireless sensor networks. 219-227 - Ya-Ju Yu, Ching-Chih Chuang, Hsin-Peng Lin, Ai-Chun Pang:

Efficient multicast delivery for wireless data center networks. 228-235 - Kalika Suksomboon, Saran Tarnoi, Yusheng Ji, Michihiro Koibuchi, Kensuke Fukuda, Shunji Abe, Motonori Nakamura, Michihiro Aoki, Shigeo Urushidani, Shigeki Yamada:

PopCache: Cache more or less based on content popularity for information-centric networking. 236-243 - Ranjana Pathak, Peizhao Hu, Jadwiga Indulska

, Marius Portmann
:
Protocol for efficient opportunistic communication. 244-247 - Pål Grønsund, Paal E. Engelstad, Przemyslaw Pawelczak, Ole Grøndalen

, Per H. Lehne, Danijela Cabric:
Spectrum sensing aided long-term spectrum management in cognitive radio networks. 248-251 - Christian Gross, Fabian Kaup, Dominik Stingl, Björn Richerzhagen, David Hausheer

, Ralf Steinmetz
:
EnerSim: An energy consumption model for large-scale overlay simulators. 252-255 - Sara A. Abd El Hamid, Haitham S. Hamza

, Imane Aly Saroit:
Alleviating the Domino Effect in Wireless Sensor Networks. 256-259 - You Wang, Jun Bi

:
GRS: Global Resolution Service for mobility support in the Internet. 260-263 - Sebastian Zander, Grenville J. Armitage:

Minimally-intrusive frequent round trip time measurements using Synthetic Packet-Pairs. 264-267 - Yasutaka Sakajiri, Yosuke Tanigawa, Hideki Tode:

Adaptive QoS control adjusting receive buffer sizes and parallel TCP connections on information gathering server. 268-271 - Isra Al-Qasem, Sumaya Al-Qasem, Ahmad T. Al-Hammouri

:
Leveraging online social networks for a real-time malware alerting system. 272-275 - Manuel Fogué, Francisco J. Martinez

, Piedad Garrido, Marco Fiore
, Carla-Fabiana Chiasserini
, Claudio Casetti, Juan-Carlos Cano
, Carlos Miguel Tavares Calafate
, Pietro Manzoni
:
On the use of a Cooperative Neighbor Position Verification scheme to secure warning message dissemination in VANETs. 276-279 - Sayan Kumar Ray

, Harsha R. Sirisena, Devatanu Deka:
LTE-Advanced handover: An orientation matching- based fast and reliable approach. 280-283 - Peizhong Shi, Yun Wang, Kai Li, Alvin T. S. Chan:

Delay-Constrained and Energy-Balanced broadcasts for low duty-cycled wireless sensor networks. 284-287 - Denis Martin, Hans Wippel:

Evaluating a framework for different networking paradigms. 288-291 - Se-Young Yu

, Nevil Brownlee
, Aniket Mahanti:
Comparative performance analysis of high-speed transfer protocols for big data. 292-295 - Bipul Sen, Lavy Libman, Xin Zhao, Sanjay Jha

:
An end-to-end delay metric for multi-rate wireless mesh networks with cooperative retransmission. 296-299 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:

Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand. 300-303 - Yogita Chapre, Prasant Mohapatra, Sanjay Jha

, Aruna Seneviratne
:
Received signal strength indicator and its analysis in a typical WLAN system (short paper). 304-307 - Kiattikul Sooksomsatarn, Ian Welch, Winston Khoon Guan Seah

:
Security analysis of a protocol for pollution attack detection. 308-311 - Yang Song, Bogdan Ciubotaru, Gabriel-Miro Muntean

:
STELA: A transceiver duty cycle management strategy for energy efficiency in wireless communications. 312-315 - Hyok An, Heejo Lee, Adrian Perrig:

UAS: Universal anti-spoofing by incorporating existing mechanisms. 316-319 - Marc Koerner

:
The OFELIA TUB-island an Europe-wide connected OpenFlow testbed. 320-323 - Juan Pou, Sebastià Galmés

:
A genetic algorithm for spanning tree optimization in sensor networks. 324-327 - Max Lehn, Robert Rehner, Alejandro P. Buchmann:

Distributed optimization of event dissemination exploiting interest clustering. 328-331 - Baoqi Huang, Wei Wu, Tao Zhang:

An improved connectivity-based boundary detection algorithm in wireless sensor networks. 332-335 - Christian Haas, Joachim Wilke, Fabian Knittel:

Evaluating the energy-efficiency of the Rich Uncle key exchange protocol in WSNs. 336-339 - André Egners, Patrick Herrmann, Tobias Jarmuzek, Ulrike Meyer:

Experiences from security research using a Wireless Mesh Network testbed. 340-343 - Jianxin Liao, Yang Liu, Xiaomin Zhu, Jingyu Wang

, Qi Qi:
Accurate QoS-based service selection algorithm for service composition. 344-347 - Babak Behsaz, Mike H. MacGregor:

Near optimal design of multi-level WSNs for environmental monitoring. 348-355 - Alaa Awad, Ramy Hussein, Amr Mohamed

, Amr A. El-Sherif
:
Energy-aware cross-layer optimization for EEG-based wireless monitoring applications. 356-363 - Ming-Yuan Cheng, Yan-Bin Chen, Hung-Yu Wei

, Winston Khoon Guan Seah
:
Event-driven energy-harvesting wireless sensor network for structural health monitoring. 364-372 - Dominik Stingl, Christian Gross, Leonhard Nobach, Ralf Steinmetz

, David Hausheer
:
BlockTree: Location-aware decentralized monitoring in mobile ad hoc networks. 373-381 - HyunYong Lee, Akihiro Nakao:

Approaches for practical BitTorrent traffic control. 382-389 - Lautaro Dolberg, Jérôme François

, Thomas Engel:
Multi-dimensional aggregation for DNS monitoring. 390-398 - Akihiro Fujimoto, Yusuke Hirota, Hideki Tode, Koso Murakami:

High quality streaming system with hierarchical cache servers based on inter-stream FEC function. 399-406 - Dilip Kumar Krishnappa, Divyashri Bhat

, Michael Zink
:
DASHing YouTube: An analysis of using DASH in YouTube video service. 407-415 - Raghunandan M. Narasiodeyar, Anura P. Jayasumana:

Improvement in packet-reordering with limited re-sequencing buffers: An analysis. 416-424 - Muhammad Junaid Farooq

, Muddassar Hussain, Junaid Qadir
, Adeel Baig
:
A game-theoretic spectrum allocation framework for mixed unicast and broadcast traffic profile in cognitive radio networks. 425-432 - Mohammed Elmorsy, Ehab S. Elmallah, Hosam M. F. AboElFotoh

:
On path exposure in probabilistic wireless sensor networks. 433-440 - Sebastian Zöller, Christian Vollmer, Markus Wachtel, Ralf Steinmetz

, Andreas Reinhardt:
Data filtering for wireless sensor networks using forecasting and value of information. 441-449 - Thuy T. Truong, Kenneth N. Brown

, Cormac J. Sreenan:
Autonomous discovery and repair of damage in Wireless Sensor Networks. 450-458 - Normalia Samian

, Winston Khoon Guan Seah
, Gang Chen:
Quantifying selfishness and fairness in wireless multihop networks. 459-467 - Samaneh Movassaghi, Mahyar Shirvanimoghaddam

, Mehran Abolhasan
, David B. Smith:
An energy efficient network coding approach for Wireless Body Area Networks. 468-475 - Golam Sarwar, Pierre-Ugo Tournoux, Roksana Boreli, Emmanuel Lochin

:
eCMT-SCTP: Improving performance of multipath SCTP with erasure coding over lossy links. 476-483 - Kai Zhang, Junchang Wang, Bei Hua, Li Lu:

DHash: A cache-friendly TCP lookup algorithm for fast network processing. 484-491 - Renaud Sallantin, Cédric Baudoin, Emmanuel Chaput, Fabrice Arnal, Emmanuel Dubois, André-Luc Beylot:

Initial spreading: A fast Start-Up TCP mechanism. 492-499 - Runa Barik, Dinil Mon Divakaran:

Evolution of TCP's initial window size. 500-508 - Grenville Armitage, Naeem Khademi:

Using delay-gradient TCP for multimedia-friendly 'background' transport in home networks. 509-515 - Shiori Yoshioka, Yosuke Tanigawa, Hideki Tode:

Packet transmission scheduling for enhancing total throughput against channel fading in wireless LAN. 516-522 - Tiansi Hu, Yunsi Fei

:
DSH-MAC: Medium Access Control based on Decoupled and Suppressed Handshaking for long-delay Underwater Acoustic Sensor Networks. 523-531 - Jeferson L. R. Souza

, José Rufino:
Analysing and reducing network inaccessibility in IEEE 802.15.4 wireless communications. 532-540 - Tong Shu, Chase Qishi Wu, Daqing Yun:

Advance bandwidth reservation for energy efficiency in high-performance networks. 541-548 - Suong H. Nguyen

, Ihsan Ayyub Qazi
, Lachlan L. H. Andrew, Hai Le Vu
:
Rate equilibria in WLANs with block ACKs. 549-556 - Lifeng Zhang, Beihong Jin, Keqin Li, Fusang Zhang:

An adaptive channel coordination mechanism for Vehicular Ad hoc Networks. 557-564 - Rubén Martínez-Vidal, Ramon Martí

, Joan Borrell
:
Characterization of a transoceanic aircraft delay tolerant network. 565-572 - Sergio Martínez Tornell, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni:

Assessing the effectiveness of DTN techniques under realistic urban environments. 573-580 - Aysha Al Hinai, Haibo Zhang

:
Probabilistic routing based on fine-grained contact characterization in delay tolerant networks. 581-588 - Qiufen Xia, Weifa Liang

, Wenzheng Xu:
Throughput maximization for online request admissions in mobile cloudlets. 589-596 - Guilherme Sperb Machado, Thomas Bocek, Michael Ammann, Burkhard Stiller:

A Cloud Storage overlay to aggregate heterogeneous Cloud services. 597-605 - Ramon Marques Ramos, Magnos Martinello

, Christian Esteve Rothenberg
:
SlickFlow: Resilient source routing in Data Center Networks unlocked by OpenFlow. 606-613 - Chathuranga Widanapathirana, Jonathan C. Li

, Milosh V. Ivanovich
, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu
:
Automated diagnosis of known and unknown soft-failure in user devices using transformed Signatures and single classifier architecture. 614-621 - Pinaki Sarkar, Sarbajit Mukherjee:

Secure connected scalable combinatorial KPS in WSN: Deterministic merging, localization. 622-629 - Alberto Compagno, Mauro Conti

, Paolo Gasti, Gene Tsudik:
Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. 630-638 - Abdulmohsen Almalawi

, Zahir Tari
, Ibrahim Khalil
, Adil Fahad:
SCADAVT-A framework for SCADA security testbed based on virtualization technology. 639-646 - Georg Wicherski, Florian Weingarten, Ulrike Meyer:

IP agnostic real-time traffic filtering and host identification using TCP timestamps. 647-654 - Wen Hu

, Damien O'Rourke, Branislav Kusy, Tim Wark:
A virtual sensor scheduling framework for heterogeneous wireless sensor networks. 655-658 - Wen-Kang Jia, Gen-Hen Liu, Yaw-Chung Chen:

Performance evaluation of IEEE 802.1Qbu: Experimental and simulation results. 659-662 - Felix Dobslaw, Tingting Zhang, Mikael Gidlund

:
QoS assessment for mission-critical Wireless Sensor Network applications. 663-666 - HyunYong Lee, Akihiro Nakao:

Topology-aware PEX for improving BitTorrent. 667-670 - Xuejun Tian, Takumi Sanada, Takashi Okuda, Tetsuo Ideguchi:

A novel MAC protocol of wireless LAN with high throughput and fairness. 671-674 - Kenji Hori, Tomohiko Ogishi, Ming-Yee Lai, Dana Chee, Kaustubh Sinkar:

Automatic over-the-air provisioning for Wi-Fi equipped M2M devices. 675-678 - Hakan Coskun, Tom Pfeifer:

Time division configuration multiplexing of wireless interfaces. 679-682 - Rogerio V. Nunes, Raphael L. Pontes, Dorgival O. Guedes

:
Virtualized network isolation using Software Defined Networks. 683-686 - Phani C. Polina, Tuan T. Tran, Bin Xie, Anup Kumar:

SOS: Social network-based distributed data storage. 687-690 - Md. Mamunur Rashid

, Iqbal Gondal
, Joarder Kamruzzaman
:
ACSP-tree: A tree structure for mining behavioral patterns from wireless sensor networks. 691-694 - Deval Bhamare, Ashwin Gumaste, Prachi Srivastava, Mohan Krishnamoorthy

:
Multi-layer optimization for service provider transport networks. 695-698 - Saran Tarnoi, Kalika Suksomboon, Wuttipong Kumwilaisak, Yusheng Ji:

Cooperative routing protocol for Content-Centric Networking. 699-702 - Y. Sinan Hanay

, Shin'ichi Arakawa, Masayuki Murata
:
Virtual topology control with multistate neural associative memories. 703-706 - Sumudu Wijetunge, U. Gunawardana, R. Liyanapathirana

:
IEEE 802.15.4 based hybrid MAC protocol for hybrid monitoring WSNs. 707-710 - Florian Klingler

, Shaojie Tang, Xuefeng Liu, Falko Dressler
, Christoph Sommer
, Jiannong Cao
:
Faster distributed localization of large numbers of nodes using clustering. 711-714 - Cristiano G. Rezende, Mohammed Almulla, Azzedine Boukerche:

The use of Erasure Coding for video streaming unicast over Vehicular Ad Hoc Networks. 715-718 - Leandro A. Villas

, Azzedine Boukerche, Daniel L. Guidoni, Guilherme Maia, Antonio A. F. Loureiro:
A joint 3D localization and synchronization solution for Wireless Sensor Networks using UAV. 719-722 - Nico Saputro

, Kemal Akkaya:
An efficient ARP for large-scale IEEE 802.11s-based Smart Grid networks. 723-726 - Antoine Desmet, Erol Gelenbe:

Reactive and proactive congestion management for emergency building evacuation. 727-730 - Garth V. Crosby

, Farzam Vafa:
Wireless sensor networks and LTE-A network convergence. 731-734 - Sharief M. A. Oteafy

, Hossam S. Hassanein
:
Component-based Wireless Sensor Networks: A dynamic paradigm for synergetic and resilient architectures. 735-738 - Nabil Benothman, Jean-Frederic Clere, Eryk Schiller, Peter G. Kropf

, Remy Maucherat:
Network performance of the JBoss Application Server. 739-742 - Dennis Ong, Tim Moors:

Deferred discard for improving the quality of video sent across congested networks. 743-746 - Mauricio Iturralde

, Steven Martin, Tara Ali-Yahiya:
Resource allocation by pondering parameters for uplink system in LTE Networks. 747-750 - Chang Su, Youtian Du

, Xiaohong Guan, Chenhe Wu:
Maximizing topic propagation driven by multiple user nodes in micro-blogging. 751-754 - Suong H. Nguyen

, Lachlan L. H. Andrew, Hai Le Vu
:
Performance of multi-channel IEEE 802.11 WLANs with bidirectional flow control. 755-758 - Mathieu Cunche, Cédric Lauradoux, Marine Minier, Roksana Boreli:

Private and resilient data aggregation. 759-762 - Rajesh Narayanan, Geng Lin, Affan A. Syed, Saad Shafiq, Fahd Gilani:

A framework to rapidly test SDN use-cases and accelerate middlebox applications. 763-770 - Tiago Cruz

, Paulo Simões
, Pedro Cabaco, Edmundo Monteiro
, Fernando Bastos:
On the use of thin-client Set-Top Boxes for IPTV services. 771-778 - Mehdi Khabazian, Nizar Zorba, Hossam S. Hassanein

:
Can dynamic pricing make femto users and service providers happy? 779-784 - Saad Saleh

, Zawar Shah
, Adeel Baig
:
Capacity analysis of combined IPTV and VoIP over IEEE 802.11n. 785-792 - Ruidong Li

, Hitoshi Asaeda
:
A community-oriented route coordination using information centric networking approach. 793-800 - Shiraz Qayyum, Mehrab Shahriar, Mohan Kumar, Sajal K. Das

:
PCV: Predicting contact volume for reliable and efficient data transfers in opportunistic networks. 801-809 - Fadi M. Al-Turjman, Hossam S. Hassanein

:
Enhanced Data Delivery framework for dynamic Information-Centric Networks (ICNs). 810-817 - Delphine Christin

, Andreas Reinhardt, Matthias Hollick
:
On the efficiency of privacy-preserving path hiding for mobile sensing applications. 818-826 - David Eckhoff, Falko Dressler

, Christoph Sommer
:
SmartRevoc: An efficient and privacy preserving revocation system using parked vehicles. 827-834 - Xinyu Jin, Niki Pissinou, Sitthapon Pumpichet, Charles A. Kamhoua, Kevin A. Kwiat:

Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory. 835-842

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














