default search action
46th LCN 2021: Edmonton, AB, Canada
- 46th IEEE Conference on Local Computer Networks, LCN 2021, Edmonton, AB, Canada, October 4-7, 2021. IEEE 2021, ISBN 978-1-6654-1886-7
- Quinten Stokkink, Georgy Ishmaev, Dick H. J. Epema, Johan A. Pouwelse:
A Truly Self-Sovereign Identity System. 1-8 - Elias Rohrer, Florian Tschorsch:
Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations. 9-16 - Afaf Taïk, Hajar Moudoud, Soumaya Cherkaoui:
Data-Quality Based Scheduling for Federated Edge Learning. 17-23 - Youssouf Drif, Emmanuel Lavinal, Emmanuel Chaput, Pascal Berthou, Boris Tiomela Jou, Olivier Grémillet, Fabrice Arnal:
Slice Aware Non Terrestrial Networks. 24-31 - Alexander Brundiers, Timmy Schüller, Nils Aschenbruck:
On the Benefits of Loops for Segment Routing Traffic Engineering. 32-40 - Ekaterina Volodina, Erwin P. Rathgeb:
Impact of ACK Scaling Policies on QUIC Performance. 41-48 - Dominic Laniewski, Nils Aschenbruck:
On the Potential of Rate Adaptive Point Cloud Streaming on the Point Level. 49-56 - Arman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili:
Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks. 57-64 - Xiang Zhang, Yuan Yang, Mingwei Xu, Jing Luo:
ASER: Scalable Distributed Routing Protocol for LEO Satellite Networks. 65-72 - Nurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer:
SDN-based Self-Configuration for Time-Sensitive IoT Networks. 73-80 - Fabian Marquardt, Lennart Buhl:
Déjà Vu? Client-Side Fingerprinting and Version Detection of Web Application Software. 81-89 - Nooshin Eghbal, Paul Lu:
Low-Variance Latency Through Forward Error Correction on Wide-Area Networks. 90-98 - Dimitar Minovski, Christer Åhlund, Karan Mitra, Irina Cotanis:
Anomaly Detection for Discovering Performance Degradation in Cellular IoT Services. 99-106 - Oliver Harms, Olaf Landsiedel:
Opportunistic Routing and Synchronous Transmissions Meet TSCH. 107-114 - Rainer Hofmann, David Grubmair, Carlo Alberto Boano, Kay Römer:
X-Sync: Cross-Technology Clock Synchronization Among Off-the-Shelf Wireless IoT Devices. 115-122 - Stefanie Thieme, Bertram Schütz, Nils Aschenbruck:
Less Is More: Choosing Fair Network Coding Parameters. 123-131 - Kariem Fahmi, Douglas J. Leith, Stepán Kucera, Holger Claussen:
Understanding MPTCP in Multi-WAN Routers: Measurements and System Design. 132-139 - Muriel Figueredo Franco, Jan von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues, Eder J. Scheid, Lisandro Zambenedetti Granville, Burkhard Stiller:
SecGrid: a Visual System for the Analysis and ML-based Classification of Cyberattack Traffic. 140-147 - Mehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk:
Adaptive Warden Strategy for Countering Network Covert Storage Channels. 148-153 - Joyanta Biswas, Jit Gupta, Krishna Kant, Amitangshu Pal, Dave Minturn:
Provisioning Differentiated QoS for NVMe over Fabrics. 154-161 - Farzad Tashtarian, Abdelhak Bentaleb, Reza Farahani, Minh Nguyen, Christian Timmerer, Hermann Hellwagner, Roger Zimmermann:
A Distributed Delivery Architecture for User Generated Content Live Streaming over HTTP. 162-169 - Andriy Panchenko, Asya Mitseva, Sara Knabe:
WhisperChord: Scalable and Secure Node Discovery for Overlay Networks. 170-177 - Oscar G. Bautista, Kemal Akkaya, Soamar Homsi:
Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification. 178-184 - Anouar Rkhami, Yassine Hadjadj Aoul, Gerardo Rubino, Abdelkader Outtagarts:
MonGNN: A neuroevolutionary-based solution for 5G network slices monitoring. 185-192 - Jing Li, Weifa Liang, Yuchen Li, Zichuan Xu, Xiaohua Jia:
Delay-Aware DNN Inference Throughput Maximization in Edge Computing via Jointly Exploring Partitioning and Parallelism. 193-200 - Gourish Goudar, Suvadip Batabyal, Özgür Erçetin:
To Forward or Not to Forward: Optimal Message Scheduling in Mobile Opportunistic Networks. 201-208 - Mostafa Abdollahi, Kousar Malekinasab, Wanqing Tu, Mozafar Bag-Mohammadi:
An Efficient Metric for Physical-layer Jammer Detection in Internet of Things Networks. 209-216 - Yilin Xiao, Ruimin Hu, Dengshi Li, Junhang Wu, Yu Zhen, Lingfei Ren:
Multi-level Graph Attention Network based Unsupervised Network Alignment. 217-224 - Junmei Chen, Hao Chen, Zongpeng Li:
Iterative Soft Decoding of Single Parity Check Convolutional Concatenated Code. 225-232 - Mozhgan Nasr Azadani, Azzedine Boukerche:
Toward Driver Intention Prediction for Intelligent Vehicles: A Deep Learning Approach. 233-240 - Wang Guo, Yanhong Huang, Jianqi Shi, Zhe Hou, Yang Yang:
A Formal Method for Evaluating the Performance of TSN Traffic Shapers using UPPAAL. 241-248 - Ahmad M. Nagib, Hatem Abou-Zeid, Hossam S. Hassanein:
Transfer Learning-Based Accelerated Deep Reinforcement Learning for 5G RAN Slicing. 249-256 - Hyunmin Noh, Gi Seok Park, Hwangjun Song:
Progressive Mesh-based HTTP Adaptive Augmented Reality Streaming System. 257-264 - Nour Smaoui, Milad Heydariaan, Omprakash Gnawali:
Anchor-oriented Time and Phase-based Concurrent Self-localization using UWB Radios. 265-272 - Amine Abouaomar, Zoubeir Mlika, Abderrahime Filali, Soumaya Cherkaoui, Abdellatif Kobbane:
A Deep Reinforcement Learning Approach for Service Migration in MEC-enabled Vehicular Networks. 273-280 - David Monschein, Oliver P. Waldhorst:
SPCAuth: Scalable and Privacy-Preserving Continuous Authentication for Web Applications. 281-286 - Tanvir Ishtaique ul Huque, Frank T. H. den Hartog:
Protecting Software-Defined Enterprise Networks from Packet Injection Attacks. 287-292 - Haya Elayan, Moayad Aloqaily, Haythem Bany Salameh, Mohsen Guizani:
Intelligent Cooperative Health Emergency Response System in Autonomous Vehicles. 293-298 - Nassima Toumi, Miloud Bagaa, Adlen Ksentini:
Hierarchical Multi-Agent Deep Reinforcement Learning for SFC Placement on Multiple Domains. 299-304 - Kevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo:
Suitability of Graph Representation for BGP Anomaly Detection. 305-310 - Hongyu Liu, Bo Lang:
Network Traffic Classification Method Supporting Unknown Protocol Detection. 311-314 - Qi Wang, Jianmin Liu, Cunzhuang Liu, Jianhui Huang, Chentao He, Yongjun Xu:
MPRdeep: Multi-Objective Joint Optimal Node Positioning and Resource Allocation for FANETs with Deep Reinforcement learning. 315-318 - Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking. 319-322 - Anees Al-Najjar, Nageswara S. V. Rao, Neena Imam, Thomas J. Naughton, Seth Hitefield, Lawrence Sorrillo, James Kohl, Wael R. Elwasif, Jean-Christophe Bilheux, Hassina Z. Bilheux, Swen Boehm, Jason Kincl:
Virtual Framework for Development and Testing of Federation Software Stack. 323-326 - Weixuan Xiao, Nancy El Rachkidy, Alexandre Guitton:
Recovering Colliding LoRa Frames from Uncertainties Using LoRa Coding. 327-330 - Klemens Schneider, Friedrich Wiegel, Dominik Schulz, Veit Hagenmeyer, Marc Hiller, Roland Bless, Martina Zitterbart:
Designing the Interplay of Energy Plane and Communication Plane in the Energy Packet Grid. 331-334 - Frédéric Guidec, Yves Mahéo, Camille Noûs:
Delta-State-Based Synchronization of CRDTs in Opportunistic Networks. 335-338 - Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo:
Maintenance of Structural Hole Spanners in Dynamic Networks. 339-342 - Ali Kabeel, Amr El Mougy:
KDST: K-Anonymous Node Discovery Using Separation of Trust. 343-346 - Harrison Kurunathan, Kai Li, Wei Ni, Eduardo Tovar, Falko Dressler:
Deep Reinforcement Learning for Persistent Cruise Control in UAV-aided Data Collection. 347-350 - Devashish Gosain, Aishwarya Jaiswal, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts. 351-354 - Yao Hu, Michihiro Koibuchi:
Accelerating MPI Communication Using Floating-point Compression on Lossy Interconnection Networks. 355-358 - Lu Chen, Degan Zhang, Jie Zhang, Ting Zhang, Jinyu Du, Hong-rui Fan:
An Incentive Approach in Mobile Crowdsensing for Perceptual User. 359-362 - Lionel Touseau, Yves Mahéo, Camille Noûs:
A Smartphone-Targeted Opportunistic Computing Environment for Decentralized Web Applications. 363-366 - Bruno Rodrigues, Lukas Müller, Eder J. Scheid, Muriel Figueredo Franco, Christian Killer, Burkhard Stiller:
LaFlector: a Privacy-preserving LiDAR-based Approach for Accurate Indoor Tracking. 367-370 - Mohamed Hamnache, Rahim Kacimi, André-Luc Beylot:
Unifying LoRaWAN Networks by Enabling the Roaming Capability. 371-374 - Md. Arifuzzaman, Shafkat Islam, Engin Arslan:
Towards Generalizable Network Anomaly Detection Models. 375-378 - Lisa Liu, Daryl Essam, Timothy M. Lynar:
On Quantifying the Complexity of IoT Traffic. 379-382 - Richard Sailer, Jörg Hähner:
Flow-Aware Low-Latency Multipath Tunnelling. 383-386 - Jeremy Van den Eynde, Chris Blondia:
A Minimal Delay Violation downlink LTE scheduler. 387-390 - Richard Sailer, Jörg Hähner:
A Comprehensive Evaluation of Different Approaches to Tunnelling over Multiple Paths. 391-394 - Massinissa Ait Aba, Maxime Elkael, Badii Jouaber, Hind Castel-Taleb, Andrea Araldo, David Olivier:
A two-stage algorithm for the Virtual Network Embedding problem. 395-398 - Cenk Gündogan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch:
Group Communication with OSCORE: RESTful Multiparty Access to a Data-Centric Web of Things. 399-402 - Omer Melih Gul:
Near-Optimal Opportunistic Spectrum Access in Cognitive Radio Networks in the 5G and IoT Era. 403-406 - Qinwen Hu, Wanqing Tu:
A Vehicle Message Scheduling Scheme For Vehicle Trust Management. 407-410 - Yuya Cui, Degan Zhang, Jie Zhang, Ting Zhang, Lixiang Cao, Lu Chen:
Distributed Task Migration Optimization in MEC by Deep Reinforcement Learning Strategy. 411-414 - Michal Boron, Anna Kobusinska:
Alternative Authentication with Smart Contracts for Online Games. 415-418 - Maryam Najafi, Lyes Khoukhi, Marc Lemercier:
A Multidimensional Trust Model for Vehicular Ad-Hoc Networks. 419-422 - Fabian A. Rincon Vija, Samuel Cregut, Georgios Z. Papadopoulos, Nicolas Montavont:
Enabling Robust Wireless Communication for BMS on Electric Vehicles. 423-426 - Jeyakumar Samantha Tharani, Eugene Yougarajah Andrew Charles, Zhé Hóu, Marimuthu Palaniswami, Vallipuram Muthukkumarasamy:
Graph Based Visualisation Techniques for Analysis of Blockchain Transactions. 427-430 - Eryk Schiller, Ramon Huber, Burkhard Stiller:
Python-Based TinyIPFIX in Wireless Sensor Networks. 431-434 - Yaqoob Ansari, Nouha Tiyal, Eduardo Feo Flushing, Saquib Razak:
Prediction of Indoor Wireless Coverage from 3D Floor Plans Using Deep Convolutional Neural Networks. 435-438 - Jonathan Kua:
Understanding the Achieved Rate Multiplication Effect in FlowQueue-based AQM Bottleneck. 439-442 - Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk:
ICN PATTA: ICN Privacy Attack Through Traffic Analysis. 443-446 - Jannis Mast, Thomas Hänel, Nils Aschenbruck:
Enhancing Adaptive Frequency Hopping for Bluetooth Low Energy. 447-454 - Farhana Afroz, Robin Braun:
QX-MAC: Improving QoS and Energy Performance of IoT-based WSNs using Q-Learning. 455-462 - Ina Berenice Fink, Martin Serror, Klaus Wehrle:
DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone Apps. 463-470 - Necati A. Ayan, Nilson Luís Damasceno, Sushil Chaskar, Peron R. de Sousa, Arti Ramesh, Anand Seetharam, Antônio Augusto de Aragão Rocha:
Characterizing Human Mobility Patterns During COVID-19 using Cellular Network Data. 471-478 - Necati A. Ayan, Sushil Chaskar, Anand Seetharam, Arti Ramesh, Antônio Augusto de Aragão Rocha:
Mobility-aware COVID-19 Case Prediction using Cellular Network Logs. 479-486 - Jesús Aguilar Armijo, Christian Timmerer, Hermann Hellwagner:
EADAS: Edge Assisted Adaptation Scheme for HTTP Adaptive Streaming. 487-494 - Ayeh Mahjoubi, Javid Taheri, Karl-Johan Grinnemo, Shuiguang Deng:
Optimal Placement of Recurrent Service Chains on Distributed Edge-Cloud Infrastructures. 495-502 - Md Ashiqur Rahman, Beichuan Zhang:
On the Analysis of Adaptive-Rate Applications in Data-Centric Wireless Ad-Hoc Networks. 503-510 - Markus Jung, Martina Zitterbart:
Hop-By-Hop: Advancing Cooperative Congestion Control for Cyber-Physical Systems. 511-518 - Mawloud Omar, Laurent George:
Toward a lightweight machine learning based solution against cyber-intrusions for IoT. 519-524 - Reza Farahani, Farzad Tashtarian, Hadi Amirpour, Christian Timmerer, Mohammad Ghanbari, Hermann Hellwagner:
CSDN: CDN-Aware QoE Optimization in SDN-Assisted HTTP Adaptive Video Streaming. 525-532 - Alvi Ataur Khalil, Mohamed Y. Selim, Mohammad Ashiqur Rahman:
CURE: Enabling RF Energy Harvesting Using Cell-Free Massive MIMO UAVs Assisted by RIS. 533-540 - Shneka Muthu Kumara Swamy, Qi Han:
Quality Preserving Voice Stream Multicast over Mobile Low Power Wireless Networks. 541-548 - Steven M. Hernandez, Deniz Erdag, Eyuphan Bulut:
Towards Dense and Scalable Soil Sensing Through Low-Cost WiFi Sensing Networks. 549-556 - Abel O. Gomez Rivera, Evan M. White, Deepak K. Tosh:
Robust Authentication and Data Flow Integrity for P2P SCADA Infrastructures. 557-564 - Martin Terneborg, Johan Karlsson Rönnberg, Olov Schelén:
Application Agnostic Container Migration and Failover. 565-572 - Roland Oruche, Vaibhav Akashe, Samaikya Valluripally, Aniket Gulhane, Prasad Calyam, Janine Stichter, Zhihai He:
A Networked Social Virtual Reality Learning Environment Platform for Special Education. 573-580 - Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DRo: A data-scarce mechanism to revolutionize the performance of DL-based Security Systems. 581-588 - Md Washik Al Azad, Susmit Shannigrahi, Nicholas Stergiou, Francisco R. Ortega, Spyridon Mastorakis:
CLEDGE: A Hybrid Cloud-Edge Computing Framework over Information Centric Networking. 589-596 - Cao Chen, Fen Zhou, Shilin Xiao:
Revenue Maximization Leveraging Elastic Service Provisioning in Flexible Optical Networks. 597-604 - Maxime Elkael, Hind Castel-Taleb, Badii Jouaber, Andrea Araldo, Massinissa Ait Aba:
Improved Monte Carlo Tree Search for Virtual Network Embedding. 605-612 - Peter Detzner, Jana Gödeke, Steffen Bondorf:
Low-Cost Search in Tree-Structured P2P Overlays: The Null-Balance Benefit. 613-620 - Simi Surendran, Maneesha Vinodini Ramesh, Alberto Montresor:
Predictive Analytics Integrated Multi-level Optimization of Offshore Connectivity in Ocean Network. 621-628 - Abdulsalam Basabaa, Ehab S. Elmallah:
Upper Bounds on Path Exposure in EH-WSNs with Variable Transmission Ranges. 629-636 - Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
Breach Path Detection Reliability in Energy Harvesting Wireless Sensor Networks. 637-644 - Junaid Haseeb, Masood Mansoori, Ian Welch:
Failure Modes and Effects Analysis (FMEA) of Honeypot-Based Cybersecurity Experiment for IoT. 645-648 - Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Catuscia Palamidessi:
Public Wireless Packets Anonymously Hurt You. 649-652 - Houda Amari, Wassef Louati, Lyes Khoukhi, Lamia Hadrich Belguith:
Securing Software-Defined Vehicular Network Architecture against DDoS attack. 653-656
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.