


default search action
42nd LCN 2017: Singapore
- 42nd IEEE Conference on Local Computer Networks, LCN 2017, Singapore, October 9-12, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6523-3

1: Plenary Session: Best Paper Candidates
- Enhuan Dong, Mingwei Xu, Xiaoming Fu

, Yu Cao:
LAMPS: A Loss Aware Scheduler for Multipath TCP over Highly Lossy Networks. 1-9 - Felipe de Moraes Modesto, Azzedine Boukerche:

Utility-Gradient Implicit Cache Coordination Policy for Information-Centric Ad-Hoc Vehicular Networks. 10-17 - Hang Yu

, Bryan C. K. Ng, Winston K. G. Seah
:
Pulse Arrival Scheduling for Nanonetworks Under Limited IoT Access Bandwidth. 18-26
2A: Content-Centric Networking
- Cesar Ghali, Gene Tsudik, Christopher A. Wood:

Mitigating On-Path Adversaries in Content-Centric Networks. 27-34 - Ivan Oliveira Nunes, Gene Tsudik, Christopher A. Wood:

Namespace Tunnels in Content-Centric Networks. 35-42 - Hani Salah, Mohammed Alfatafta, Saed SayedAhmed, Thorsten Strufe:

CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively. 43-51 - The An Binh Nguyen, Pratyush Agnihotri

, Christian Meurisch, Manisha Luthra, Rahul Chini Dwarakanath, Jeremias Blendin, Doreen Böhnstedt, Michael Zink
, Ralf Steinmetz
:
Efficient Crowd Sensing Task Distribution Through Context-Aware NDN-Based Geocast. 52-60 - Hatem Ibn-Khedher, Emad Abd-Elrahman

, Hossam Afifi, Michel Marot:
Optimal and Cost Efficient Algorithm for Virtual CDN Orchestration. 61-69
2B: Realtime and Multimedia Communications
- Xuepei Wu, Lihua Xie

:
End-to-End Delay Evaluation of Industrial Automation Systems Based on EtherCAT. 70-77 - Florian Lehner, Wojciech Mazurczyk

, Jörg Keller, Steffen Wendzel
:
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach. 78-85 - Julian Wulfheide, Julius Rückert, David Hausheer:

Stop Screaming at Me: Avoiding Duplicates in Mesh/Push-Based Live Video Streaming. 86-94 - Ahmed Khalid

, Ahmed H. Zahran
, Cormac J. Sreenan:
mCast: An SDN-Based Resource-Efficient Live Video Streaming Architecture with ISP-CDN Collaboration. 95-103 - Liang Zhang, Phil DeMar, Bockjoo Kim, Wenji Wu:

MDTM: Optimizing Data Transfer Using Multicore-Aware I/O Scheduling. 104-111
2C: SDN and Data Centers
- Mohamed E. Najd, Craig A. Shue:

DeepContext: An OpenFlow-Compatible, Host-Based SDN for Enterprise Networks. 112-119 - Liang Yang, Bryan C. K. Ng, Winston K. G. Seah

, Lindsay Groves:
Deterministic Confidence Interval Estimation of Networking Traffic in SDN. 120-127 - Ahmed Mohamed Abdelmoniem

, Brahim Bensaou:
Enforcing Transport-Agnostic Congestion Control in SDN-Based Data Centers. 128-136 - Vignesh Sridharan, Mohan Gurusamy

, Tram Truong Huu:
Multi-controller Traffic Engineering in Software Defined Networks. 137-145 - Victoria Huang, Qiang Fu

, Gang Chen, Elliott Wen, Jonathan Hart:
BLAC: A Bindingless Architecture for Distributed SDN Controllers. 146-154
Poster Session 1
- Nazhatul Hafizah Kamarudin

, Yusnani Mohd Yussoff, Nurhaflyza Marbukhari, Mustaffa Samad, Habibah Hashim:
Development of Unique Identity for E-Health Sensor Node in EHEART Passwordless Authentication Protocol. 155-158 - Fernando Rodrigues de Sa

, Adilson Marques da Cunha
, Cecília de Azevedo Castro César:
Effective AP Association in SDWN Based on Signal Strength and Occupancy Rate. 159-162 - Jakob Pfender

, Winston K. G. Seah
:
Leveraging Localisation Techniques for In-Network Duplicate Event Data Detection and Filtering. 163-166 - Christian A. Hammerschmidt, Sebastián García

, Sicco Verwer, Radu State:
Reliable Machine Learning for Networking: Key Issues and Approaches. 167-170 - Cheng Zhan, Zhe Wen:

Repair Scheme for Wireless Coded Storage Networks. 171-174 - Cheng Zhan, Guo Yao:

Optimizing Caching Placement for Mobile Users in Heterogeneous Wireless Network. 175-178 - Edoardo Biagioni:

A Diagnostic Tool for Ad-Hoc and Delay-Tolerant Networks. 179-182 - Isabel Wagner

:
Measuring Privacy in Vehicular Networks. 183-186 - Guangshuo Chen, Sahar Hoteit

, Aline Carneiro Viana
, Marco Fiore, Carlos Sarraute
:
The Spatiotemporal Interplay of Regularity and Randomness in Cellular Data Traffic. 187-190 - Fabian Rump, Timm Behner, Raphael Ernst:

Distributed and Collaborative Malware Analysis with MASS. 191-194 - Florian Kohnhäuser, Milan Stute

, Lars Baumgärtner
, Lars Almon, Stefan Katzenbeisser, Matthias Hollick
, Bernd Freisleben
:
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios. 195-198 - Bing Jia, Baoqi Huang, Hepeng Gao, Wuyungerile Li:

On the Dimension Reduction of Radio Maps with a Supervised Approach. 199-202 - Andreas Disterhöft, Kalman Graffi

:
Minicamp: Prototype for Partial Participation in Structured Peer-to-Peer Monitoring Protocols. 203-206 - Robert Bauer, Hauke Heseding

, Matthias Flittner:
EarlyDrop: A Trade-off Driven DDoS Defense Mechanism for Software-Defined Infrastructures. 207-210 - H. Robert H. Andersson

, Andreas de Blanche, Thomas Lundqvist:
Flipping the Data Center Network: Increasing East-West Capacity Using Existing Hardware. 211-214 - Mario Hock, Felix Neumeister

, Martina Zitterbart, Roland Bless
:
TCP LoLa: Congestion Control for Low Latencies and High Throughput. 215-218 - Shantanu Pal, Michael Hitchens

, Vijay Varadharajan
:
Towards a Secure Access Control Architecture for the Internet of Things. 219-222 - Xiaoli Wang, Kale Rahul Vishwanath, Bharadwaj Veeravalli:

Simultaneous Optimization of User-Centric Security-Conscious Data Storage on Cloud Platforms. 223-226 - Haibo Wang, Jilong Wang, Jing'an Xue:

Impact of Development and Governance Factors on IPv4 Address Ownership. 227-230 - Steffen Büchner, Jörg Nolte, Alireza Hasani, Rolf Kraemer:

100 Gbit/s End-to-End Communication: Low Overhead On-Demand Protocol Replacement in High Data Rate Communication Systems. 231-234 - Xuepei Wu, Lihua Xie

:
On the Wireless Extension of EtherCAT Networks. 235-238 - Suraiya Tairin

, A. B. M. Alim Al Islam:
Propagation Loss Aware Routing in Wireless Nanosensor Networks Having Directional Nano-Antennas. 239-242
3A: Performance Evaluation
- Sebastian Zander, David Murray

:
Share or Not: Investigating the Presence of Large-Scale Address Sharing in the Internet. 243-251 - Kevin Ong, Sebastian Zander, David Murray

, Tanya Jane McGill
:
Experimental Evaluation of Less-Than-Best-Effort TCP Congestion Control Mechanisms. 252-260 - Jun Xu, Rouhollah Rahmatizadeh, Ladislau Bölöni, Damla Turgut:

A Sequence Learning Model with Recurrent Neural Networks for Taxi Demand Prediction. 261-268 - Daqing Yun, Chase Q. Wu, Nageswara S. V. Rao, Qiang Liu, Rajkumar Kettimuthu, Eun-Sung Jung

:
Data Transfer Advisor with Transport Profiling Optimization. 269-277 - Rasool Al-Saadi

, Grenville Armitage, Jason But:
Characterising LEDBAT Performance Through Bottlenecks Using PIE, FQ-CoDel and FQ-PIE Active Queue Management. 278-285
3B: Internet of Things
- Bertram Schütz, Jan Bauer, Nils Aschenbruck:

Improving Energy Efficiency of MQTT-SN in Lossy Environments Using Seed-Based Network Coding. 286-293 - Jan Bauer, Nils Aschenbruck:

Measuring and Adapting MQTT in Cellular Networks for Collaborative Smart Farming. 294-302 - Martina Brachmann, Olaf Landsiedel, Silvia Santini:

Keep the Beat: On-The-Fly Clock Offset Compensation for Synchronous Transmissions in Low-Power Networks. 303-311 - Abhijit Mondal, Sourav Bhattacharjee, Sandip Chakraborty:

Viscous: An End to End Protocol for Ubiquitous Communication Over Internet of Everything. 312-320 - Harini Kolamunna

, Jagmohan Chauhan, Yining Hu, Kanchana Thilakarathna
, Diego Perino, Dwight J. Makaroff, Aruna Seneviratne
:
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables. 321-329
3C: Security and Privacy
- Matthias Wübbeling, Michael Meier

:
Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec Tunnels. 330-338 - Hrishikesh B. Acharya, Sambuddho Chakravarty, Devashish Gosain:

Few Throats to Choke: On the Current Structure of the Internet. 339-346 - Imdad Ullah

, Babil Golam Sarwar, Roksana Boreli, Salil S. Kanhere
, Stefan Katzenbeisser, Matthias Hollick
:
Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval. 347-355 - Samuel Brack, Stefan Dietzel, Björn Scheuermann:

ANONUS: Anonymous Bonus Point System with Fraud Detection. 356-364 - Sajeda Akter, Tusher Chakraborty, Taslim Arefin Khan, Sriram Chellappan, A. B. M. Alim Al Islam:

Can You Get into the Middle of Near Field Communication? 365-373
4A: Mobility and Location Dependent Services
- Thomas Hänel, Nils Aschenbruck:

Accelerating Yield Mapping at Low Data Rates Using Compressive Field Estimate. 374-382 - Amitangshu Pal, Krishna Kant:

Magnetic Induction Based Sensing and Localization for Fresh Food Logistics. 383-391 - Raja Karmakar, Samiran Chattopadhyay

, Sandip Chakraborty:
IEEE 802.11ac Link Adaptation Under Mobility. 392-400 - Yanzhen Ye, Bang Wang:

On Building an Indoor Radio Map from Crowdsourced Samples with Annotation Errors. 401-408 - Patrick Lieser, Nils Richerzhagen, Tim Feuerbach, Leonhard Nobach, Doreen Böhnstedt, Ralf Steinmetz

:
Take it or Leave it: Decentralized Resource Allocation in Mobile Networks. 409-417
4B: Security
- Felix Erlacher, Falko Dressler

:
High Performance Intrusion Detection Using HTTP-Based Payload Aggregation. 418-425 - Ramtin Aryan, Anis Yazidi, Paal Einar Engelstad, Øivind Kure:

A General Formalism for Defining and Detecting OpenFlow Rule Anomalies. 426-434 - Dominik Leibenger, Christoph Sorge:

Triviback: A Storage-Efficient Secure Backup System. 435-443 - Lars Almon, Michael Riecker, Matthias Hollick

:
Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited. 444-452
4C - Ad Hoc, Sensor and Mobile Networks
- Ashanie Gunathillake, Marjan Moradi, Kanchana Thilakarathna

, Anura P. Jayasumana, Andrey V. Savkin:
Topology Maps for 3D Millimeter Wave Sensor Networks with Directional Antennas. 453-461 - Kumar Ayush

, Raja Karmakar, Varun Rawal, Pradyumna Kumar Bishoyi
, Samiran Chattopadhyay
, Sandip Chakraborty:
Supporting Throughput Fairness in IEEE 802.11ac Dynamic Bandwidth Channel Access: A Hybrid Approach. 462-470 - Ngoc-Tu Nguyen

, Bing-Hong Liu, Shih-Yuan Wang:
Network Under Limited Mobile Sensors: New Techniques for Weighted Target Coverage and Sensor Connectivity. 471-479 - Hagen Sparka, Roman Naumann, Stefan Dietzel, Björn Scheuermann:

Effective Lossless Compression of Sensor Information in Manufacturing Industry. 480-488 - Shuguo Zhuo, Ye-Qiong Song

:
GoMacH: A Traffic Adaptive Multi-channel MAC Protocol for IoT. 489-497
Poster Session 2
- Jiayi Liu, Qinghai Yang, Gwendal Simon

:
Delay Oriented Content Placement and Request Redirection for Mobile-CDN. 498-501 - Avirup Das

, Sasthi C. Ghosh, Nabanita Das, Abhirup Das Barman:
Q-Learning Based Co-Operative Spectrum Mobility in Cognitive Radio Networks. 502-505 - Leonard Bradatsch, Thomas Lukaseder, Frank Kargl:

A Testing Framework for High-Speed Network and Security Devices. 506-509 - Zikai Zhang

, Jigang Wu, Guiyuan Jiang, Long Chen, Siew-Kei Lam:
QoE-Aware Task Offloading for Time Constraint Mobile Applications. 510-513 - Renan Fischer e Silva

, Paul M. Carpenter:
Interconnect Energy Savings and Lower Latency Networks in Hadoop Clusters: The Missing Link. 514-517 - Benjamin Farrelly, Yiying Sun, Aniket Mahanti

, Mingwei Gong:
Video Workload Characteristics of Online Porn: Perspectives from a Major Video Streaming Service. 518-519 - William Thomson, Aniket Mahanti

, Mingwei Gong:
Understanding Uploader Motivations and Sharing Dynamics in the One-Click Hosting Ecosystem. 520-522 - Jonas Hochst

, Lars Baumgärtner
, Matthias Hollick
, Bernd Freisleben
:
Unsupervised Traffic Flow Classification Using a Neural Autoencoder. 523-526 - Paul Duggan, Stefan Weber

:
Application of Fault Management to Information-Centric Networking. 527-530 - Eugeny S. Sagatov

, Sophia V. Timofeeva, Dmitry V. Filimonov, Andrei M. Sukhov
:
Data Exchange in Self-Organizing Wireless Networks with Low Latency. 531-534 - Zhongliang Zhao, Stéphane Kuendig

, Jose Luis Carrera, Blaise Carron, Torsten Braun
, José D. P. Rolim:
Indoor Location for Smart Environments with Wireless Sensor and Actuator Networks. 535-538 - Vishnu Vardhan Paranthaman, Yonal Kirsal, Glenford Mapp, Purav Shah

, Huan Xuan Nguyen
:
Exploring a New Proactive Algorithm for Resource Management and Its Application to Wireless Mobile Environments. 539-542 - Sikder M. Kamruzzaman

, Muhammad Jaseemuddin, Xavier N. Fernando
, Peyman Moeini:
Wireless Positioning Sensor Network Integrated with Cloud for Industrial Automation. 543-546 - Chien-Fu Cheng, Sheng-Ling Lin:

A Hole-Bypassing Routing Algorithm for WANETs. 547-550 - Indika Sanjeewa Abeywickrama Dhanapala

, Ramona Marfievici, Sameera Palipana, Piyush Agrawal, Dirk Pesch
:
Modeling WiFi Traffic for White Space Prediction in Wireless Sensor Networks. 551-554 - Sebastian Zander:

Detecting Covert Channels in FPS Online Games. 555-558 - Weihong Lin, Xinggong Zhang, Yu Guan, Ken Chen, Zongming Guo:

A Caching Miss Ratio Aware Path Selection Algorithm for Information-Centric Networks. 559-562 - Jens Heuschkel, Jens Forstmann, Lin Wang, Max Mühlhäuser:

Identifying the Performance Impairment of HTTP. 563-566 - Deepak Singh, Bryan C. K. Ng, Yuan-Cheng Lai, Ying-Dar Lin, Winston K. G. Seah

:
Modelling Software-Defined Networking: Switch Design with Finite Buffer and Priority Queueing. 567-570 - Anh Huy Nguyen, Yosuke Tanigawa, Hideki Tode:

Scheduling Methods to Improve the Performance of Heterogeneous Periodic Flows in Wireless Sensor Networks. 571-574 - Depeng Chen

, Guillermo Navarro-Arribas
, Joan Borrell
:
On the Applicability of Onion Routing on Predictable Delay-Tolerant Networks. 575-578 - Alireza Montazeri, Dwight J. Makaroff:

Geographically-Distinct Request Patterns for Caching in Information-Centric Networks. 579-582 - Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon, Liming Zhu

:
Stratosphere: Dynamic IP Overlay Above the Clouds. 583-586 - Anix Anbiah, Krishna M. Sivalingam:

Funplace: A Protocol for Network Function Placement. 587-590 - Longhua Guo, Jie Wu, Wei Chang, Jun Wu, Jianhua Li:

Proposed Matching Scheme with Confidence and Prediction Uncertainty in Shared Economy. 591-594 - Lu Dai, Bang Wang:

Sensor Placement Based on an Improved Genetic Algorithm for Connected Confident Information Coverage in an Area with Obstacles. 595-598 - Lamine Amour

, M. Sajid Mushtaq
, Sami Souihi, Abdelhamid Mellouk:
QoE-Based Framework to Optimize User Perceived Video Quality. 599-602 - Daniel Vasconcelos Correa da Silva, Antônio Augusto de Aragão Rocha:

Does the Presence of Streamers Harm the Overall Performance of BitTorrent Swarms? 603-606 - Shujie Cui, Muhammad Rizwan Asghar

, Giovanni Russello:
Privacy-Preserving Content Delivery Networks. 607-610 - Mosarrat Jahan

, Aruna Seneviratne
, Sanjay Jha
:
Access Mechanism for Outsourced Data by Preserving Data Owner's Preference. 611-614 - Abbas Arghavani, Haibo Zhang

, Zhiyi Huang, Yawen Chen
:
ATPS: Adaptive Transmission Power Selection for Communication in Wireless Body Area Networks. 615-618 - Thomas Lukaseder, Alexander Hunt, Christian Stehle, Denis Wagner, Rens W. van der Heijden

, Frank Kargl:
An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-Mitigation. 619-622
5A: Cloud Computing
- Dominik Leibenger, Christoph Sorge:

sec-cs: Getting the Most out of Untrusted Cloud Storage. 623-631 - Dongyang Wang, Bei Hua, Li Lu, Heqing Zhu, Cunming Liang

:
Zcopy-vhost: Eliminating Packet Copying in Virtual Network I/O. 632-639 - Ying Cui, Wen He, Chun Ni, Chengjun Guo, Zhi Liu

:
Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing. 640-648
5B: Network Devices and Services
- Leonhard Nobach, Jeremias Blendin, Hans-Jörg Kolbe, Georg Schyguda, David Hausheer:

Bare-Metal Switches and Their Customization and Usability in a Carrier-Grade Environment. 649-657 - Daron Miller, Xin Sun:

Systematic IP Prefix Assignment for Compact Router Forwarding Tables. 658-666 - Timmy Schüller, Nils Aschenbruck, Markus Chimani, Martin Horneffer, Stefan Schnitter:

Predictive Traffic Engineering with 2-Segment Routing Considering Requirements of a Carrier IP Network. 667-675 - Zhipeng Chen, Peng Zhang, Qingyun Liu:

ProxyDetector: A Guided Approach to Finding Web Proxies. 676-682 - Eyad Taqieddin, Hiba Al-Dahoud, Moad Mowafi

, Omar Banimelhem
:
An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol. 683-689

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














