


default search action
40th LCN 2015: Clearwater Beach, FL, USA
- Salil S. Kanhere, Jens Tölle, Soumaya Cherkaoui:

40th IEEE Conference on Local Computer Networks, LCN 2015, Clearwater Beach, FL, USA, October 26-29, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-6770-7 - Till Steinbach, Hyung-Taek Lim, Franz Korf, Thomas C. Schmidt

, Daniel Herrscher, Adam Wolisz:
Beware of the hidden! How cross-traffic affects quality assurances of competing real-time Ethernet standards for in-car communication. 1-9 - Renan Fischer e Silva

, Paul M. Carpenter
:
Exploring interconnect energy savings under east-west traffic pattern of mapreduce clusters. 10-18 - Hanno Wirtz, Torsten Zimmermann, Martin Serror, Klaus Wehrle

:
Collaborative On-demand Wi-Fi sharing. 19-27 - Carlos Anastasiades, Arun Sittampalam, Torsten Braun

:
Content discovery in wireless information-centric networks. 28-36 - Amuda James Abu

, Brahim Bensaou:
Modelling the Pending Interest Table occupancy in CCN with interest timeout and retransmission. 37-45 - Saran Tarnoi, Vorapong Suppakitpaisarn, Wuttipong Kumwilaisak, Yusheng Ji:

Performance analysis of probabilistic caching scheme using Markov chains. 46-54 - Zhen Feng, Mingwei Xu, Yuan Yang, Qi Li, Yu Wang, Qing Li

, Börje Ohlman, Meng Chen:
Joint optimization of content replication and Traffic Engineering in ICN. 55-63 - Carlos Anastasiades, Andre S. Gomes

, Rene Gadow, Torsten Braun
:
Persistent caching in information-centric networks. 64-72 - Hani Salah, Julian Wulfheide, Thorsten Strufe:

Coordination supports security: A new defence mechanism against interest flooding in NDN. 73-81 - Zhiwei Xu, Bo Chen, Ninghan Wang, Yujun Zhang, Zhongcheng Li:

ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN. 82-90 - Daniel Ellard, Christine E. Jones, Victoria Manfredi, W. Timothy Strayer, Bishal Thapa, Megan Van Welie, Alden W. Jackson:

Rebound: Decoy routing on asymmetric routes via error messages. 91-99 - Benjamin Schiller, Thorsten Strufe, Dirk Kohlweyer, Jan Seedorf:

Growing a Web of Trust. 100-108 - Nikolaos Baroutis, Mohamed F. Younis

:
Using fake sinks and deceptive relays to boost base-station anonymity in Wireless Sensor Network. 109-116 - Mohammad Abu Alsheikh

, Shaowei Lin, Hwee Pink Tan, Dusit Niyato
:
Toward a robust sparse data representation for wireless sensor networks. 117-124 - Jun Xu, Gürkan Solmaz, Rouhollah Rahmatizadeh, Damla Turgut, Ladislau Bölöni:

Animal monitoring with unmanned aerial vehicle-aided wireless sensor networks. 125-132 - Mohammed Elmorsy, Ehab S. Elmallah:

Reliable surveillance in ring deployed Wireless Sensor Networks. 133-140 - Immanuel Schweizer, Tobias Petry, Max Mühlhäuser:

C-SDF: Practical solar-aware distributed flow control. 141-148 - Fahad Ahmad Khan, Saad Ahmad Khan, Damla Turgut, Ladislau Bölöni:

Scheduling multiple mobile sinks in Underwater Sensor Networks. 149-156 - Csaba Király

, Timofei Istomin, Oana Iova, Gian Pietro Picco:
D-RPL: Overcoming memory limitations in RPL point-to-multipoint routing. 157-160 - Samuel Brack, Sven Hager, Björn Scheuermann:

JitVector: Just-in-time code generation for network packet classification. 161-164 - Meng Chen, Mingwei Xu, Xirui Song, Yuan Yang:

Towards identifying Large-scale BGP Events. 165-168 - Daniel J. Casey, Barry E. Mullins:

SDN shim: Controlling legacy devices. 169-172 - Khaled Salah

:
An analytical model to achieve elasticity for cloud-based firewalls. 173-176 - Peter Hillmann

, Frank Tietze
, Gabi Dreo Rodosek:
Tracemax: A novel single packet IP traceback strategy for data-flow analysis. 177-180 - David C. Harrison, Winston K. G. Seah

, Ramesh Kumar Rayudu
:
Coverage preservation in energy harvesting wireless sensor networks for rare events. 181-184 - Anil Kumar, Jinoh Kim, Sang C. Suh, Ganho Choi:

Incorporating multiple cluster models for network traffic classification. 185-188 - Abbas Mehrabi

, Kiseon Kim:
Using a mobile vehicle for road condition surveillance by energy harvesting sensor nodes. 189-192 - Andriana Ioannou, Stefan Weber

:
Towards exploring the benefits of scope-flooding in Information-Centric Networks. 193-196 - Alexander Frömmgen, Robert Rehner, Max Lehn, Alejandro P. Buchmann:

Fossa: Using genetic programming to learn ECA rules for adaptive networking applications. 197-200 - Fredrick A. Omondi, Purav Shah

, Orhan Gemikonakli
, Enver Ever
:
An analytical model for bounded WSNs with unreliable cluster heads and links. 201-204 - Mansour Abdulaziz

, Robert Simon:
Mobile data collection using multi-channel network coding in wireless sensor networks. 205-208 - Wilson Bongiovanni, Adilson Eduardo Guelfi, Elvis Pontes, Anderson Aparecido Alves da Silva

, Fen Zhou, Sergio Takeo Kofuji
:
Viterbi algorithm for detecting DDoS attacks. 209-212 - Se-Young Yu

, Nevil Brownlee
, Aniket Mahanti
:
Characterizing performance and fairness of big data transfer protocols on long-haul networks. 213-216 - Donghyeok Ho, Hyungnam Kim, Hwangjun Song:

Avatar mobility and network condition-aware 3D game over wireless networks. 217-220 - Jun Liu:

Towards a method of estimating one-way delays under delay asymmetry and unknown relative clock offset. 221-224 - Richard Withnell, Christopher Edwards:

Towards a Context Aware Multipath-TCP. 225-228 - Michael Stein, Géza Kulcsár, Immanuel Schweizer, Gergely Varró, Andy Schürr, Max Mühlhäuser:

Topology control with application constraints. 229-232 - Ahmed A. Shahin

, Mohamed F. Younis:
Efficient multi-group formation and communication protocol for Wi-Fi Direct. 233-236 - Subhankar Ghosal

, Sasthi C. Ghosh:
Channel assignment in mobile networks based on geometric prediction and random coloring. 237-240 - Sanket Gupte

, Mohamed F. Younis
:
Participatory-sensing-enabled efficient Parking Management in modern cities. 241-244 - Mohammad Reza Zakerinasab, Mea Wang:

Dependency-aware distributed video transcoding in the cloud. 245-252 - Ramy Atawia, Hatem Abou-zeid, Hossam S. Hassanein

, Aboelmagd Noureldin
:
Chance-constrained QoS satisfaction for predictive video streaming. 253-260 - Giang Nguyen

, Stefanie Roos, Thorsten Strufe, Mathias Fischer:
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming. 261-269 - Subhadeep Patra

, Carlos T. Calafate
, Juan-Carlos Cano, Pietro Manzoni
:
An ITS solution providing real-time visual overtaking assistance using smartphones. 270-278 - Si Quoc Viet Trang, Emmanuel Lochin

, Cédric Baudoin, Emmanuel Dubois, Patrick Gelard:
FLOWER - Fuzzy Lower-than-Best-Effort transport protocol. 279-286 - Bendik R. Opstad, Jonas Markussen

, Iffat Ahmed, Andreas Petlund, Carsten Griwodz, Pål Halvorsen:
Latency and fairness trade-off for thin streams using redundant data bundling in TCP. 287-294 - Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhen Xu, Jingguo Ge:

Improving TCP performance in data center networks with Adaptive Complementary Coding. 295-302 - Mohammed Hussein

, Gentian Jakllari
, Béatrice Paillassa:
Frugal topologies for saving energy in IP networks. 303-311 - Ganesh Chandrasekaran, Ning Wang, Rahim Tafazolli

:
Caching on the move: Towards D2D-based information centric networking for mobile content distribution. 312-320 - Jung-Woong Sung, Seung-Jae Han:

Data bundling for energy efficient communication of wearable devices. 321-328 - Girish Revadigar, Chitra Javali, Wen Hu

, Sanjay Jha
:
DLINK: Dual link based radio frequency fingerprinting for wearable devices. 329-337 - Alexander Magnano, Xin Fei, Azzedine Boukerche:

Predictive mobile IP handover for vehicular networks. 338-346 - Andri Lareida, George P. Petropoulos

, Valentin Burger, Michael Seufert
, Sergios Soursos, Burkhard Stiller:
Augmenting home routers for socially-aware traffic management. 347-355 - Tobias Amft, Barbara Guidi, Kalman Graffi

, Laura Ricci
:
FRoDO: Friendly routing over dunbar-based overlays. 356-364 - Shan Jiang, Jianxin Liao, Jun Gong, Jingyu Wang

, Tonghong Li
:
Competitive equilibrium and stable coalition in overlay environments. 365-372 - Thomas Bocek, Nico Rutishauser, Burkhard Stiller:

Energy-efficient overlay networks for mobile devices with buffered relaying and push notifications. 373-381 - Sascha Alexander Jopen, Arne Schulz, Raphael Ernst:

Measuring and modeling performance of WLAN communication for multistatic sonar applications. 382-385 - Jens Heuschkel, Immanuel Schweizer, Max Mühlhäuser:

VirtualStack: A framework for protocol stack virtualization at the edge. 386-389 - Shuhei Oda, Kurozumi Masaaki, Yosuke Endo:

Reference equipment of cross-layer control for live video transmission on various physical links. 390-393 - Avishek Patra, Andreas Achtzehn, Petri Mähönen:

ULLA-X: a unified programmatic middleware for on-demand network reconfiguration. 394-397 - Steffen Büchner, Jörg Nolte, Rolf Kraemer, Lukasz Lopacinski, Reinhardt Karnapke:

Challenges for 100 Gbit/s end to end communication: Increasing throughput through parallel processing. 398-401 - Avirup Das

, Sasthi C. Ghosh, Nabanita Das, Abhirup Das Barman:
Cooperative spectrum mobility in heterogeneous opportunistic networks using cognitive radio. 402-405 - Mosarrat Jahan, Mohsen Rezvani, Aruna Seneviratne

, Sanjay K. Jha
:
Method for providing secure and private fine-grained access to outsourced data. 406-409 - Shegufta Bakht Ahsan, Nitin H. Vaidya:

O-ACK: An adaptive wireless MAC protocol exploiting opportunistic token-passing and ack piggybacking. 410-413 - Immanuel Schweizer, Ralf Zimmermann, Michael Stein, Max Mühlhäuser:

a-kTC: Integrating topology control into the stack. 414-417 - Ying Li, Katherine Guo, Xin Wang, Emina Soljanin

, Thomas Woo:
SEARS: Space efficient and reliable storage system in the cloud. 418-421 - Giovanna Carofiglio, Leonce Mekinda, Luca Muscariello:

LAC: Introducing latency-aware caching in Information-Centric Networks. 422-425 - Iyad Lahsen Cherif

, Lynda Zitoune, Véronique Vèque:
Performance evaluation of Joint Transmission Coordinated-Multipoint in dense Very High Throughput WLANs scenario. 426-429 - Maroua Meddeb, Amine Dhraief

, Abdelfettah Belghith
, Thierry Monteil, Khalil Drira:
Cache coherence in Machine-to-Machine Information Centric Networks. 430-433 - Shuli Zhang, Yan Zhang, Ding Tang, Zhen Xu, Jingguo Ge, Zhijun Zhao:

A partial-decentralized coflow scheduling scheme in data center networks. 434-437 - Alina Rubina, Oleksandr Artemenko, Andreas Mitschele-Thiel:

OrLiOn: Optimized Route Planning for the Localization of Indoor Nodes from Outdoor environment. 438-441 - Fabian Kaup, Matthias Wichtlhuber, Stefan Rado, David Hausheer

:
Can Multipath TCP save energy? A measuring and modeling study of MPTCP energy consumption. 442-445 - Avinash Mungur

, Christopher Edwards:
Performance of a tiered architecture to support end-host mobility in a locator identity split environment. 446-449 - Md Tanvir Ishtaique ul Huque, Guillaume Jourjon, Vincent Gramoli:

Revisiting the controller placement problem. 450-453 - Yutaro Inaba, Yosuke Tanigawa, Hideki Tode:

Content retrieval method in cooperation with CDN and ICN-based in-network guidance over IP network. 454-457 - Y. Sinan Hanay

, Shin'ichi Arakawa, Masayuki Murata
:
Evaluation of topology optimization objectives. 458-461 - Nils Richerzhagen, Tao Li, Dominik Stingl, Björn Richerzhagen, Ralf Steinmetz

, Silvia Santini:
A step towards a protocol-independent measurement framework for dynamic networks. 462-465 - Ziteng Cui, Jianxin Liao, Jingyu Wang

, Qi Qi, Jing Wang:
Cooperative traffic management for co-existing overlays. 466-469 - Bilal Gonen

, Kemal Akkaya, Fatih Senel:
Efficient camera selection for maximized target coverage in underwater acoustic sensor networks. 470-473 - Ana Barroso, Matthias Hollick

:
Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication. 474-477 - Tobias Rueckelt, Florian Jomrich

, Daniel Burgstahler, Doreen Böhnstedt, Ralf Steinmetz
:
Publish-subscribe-based control mechanism for scheduling integration in Mobile IPv6. 478-481 - Pawani Porambage, An Braeken

, Corinna Schmitt, Andrei V. Gurtov
, Mika Ylianttila
, Burkhard Stiller:
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks. 482-485 - Divyanka Bose, Anura P. Jayasumana:

A reputation-based method for detection of attacks in Virtual Coordinate based Wireless Sensor Networks. 486-489 - Simon Ofner, Matthias Frank:

Real-time streaming with millisecond granularity. 490-493 - Suranga Seneviratne, Fangzhou Jiang, Mathieu Cunche, Aruna Seneviratne:

SSIDs in the wild: Extracting semantic information from WiFi SSIDs. 494-497 - Ramona Trestian

, Quoc-Tuan Vien
, Purav Shah
, Glenford E. Mapp:
Exploring energy consumption issues for multimedia streaming in LTE HetNet Small Cells. 498-501 - Talal Alharbi, Marius Portmann

, Farzaneh Pakzad:
The (in)security of Topology Discovery in Software Defined Networks. 502-505 - Yu Wang

, Chao Chen, Yang Xiang:
Unknown pattern extraction for statistical network protocol identification. 506-509 - Nazim Ahmed, Kamil Saraç:

An experimental study on inter-domain routing dynamics using IP-level path traces. 510-517 - James Pope

, Robert Simon:
Efficient one-to-many broadcasting for resource-constrained wireless networks. 518-525 - Shiraz Qayyum, Peizhao Hu, Mohan Kumar:

COSC: Paths with Combined Optimal Stability and Capacity in opportunistic networks. 526-534 - Yigal Bejerano, Katherine Guo, Thyaga Nandagopal:

Fast detection of compact topology representation for wireless networks. 535-543 - Juan A. Fraire

, Pablo G. Madoery
, Jorge M. Finochietto
, Edward J. Birrane:
Congestion modeling and management techniques for predictable disruption tolerant networks. 544-551 - Grzegorz Jereczek

, Giovanna Lehmann Miotto, David Malone
, Miroslaw Walukiewicz:
A lossless switch for data acquisition networks. 552-560 - Amitangshu Pal, Krishna Kant:

RODA: A reconfigurable optical data center network architecture. 561-569 - Zichuan Xu, Weifa Liang

, Wenzheng Xu, Mike Jia, Song Guo
:
Capacitated cloudlet placements in Wireless Metropolitan Area Networks. 570-578 - Sima Das, Sajal K. Das

:
Leveraging network structure in centrality evaluation of large scale networks. 579-586 - Yongqiang Wang, Chase Q. Wu, Aiqin Hou, Wenyu Peng, Shuting Xu, Meng Shi:

On periodic scheduling of fixed-slot bandwidth reservations for big data transfer. 587-594

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














