Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCN-WORKSHOPS
LCN-WORKSHOPS 2013
Generate Citations
2013 IEEE 38th Conference on Local Computer Networks Workshops (LCN Workshops)
Oct. 21 2013 to Oct. 24 2013
Sydney, Australia
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. i-i
Technical program of LCN 2013 and adjunct workshops
Freely available from IEEE.
pp. ii-xxix
LCN 2013 keynotes
Freely available from IEEE.
pp. xxx-xxx
Software defined networks (SDN) - Enabling virtualised, programmable infrastructure
Freely available from IEEE.
pp. xxxi-xxxi
by
Kevin Bloch
Challenges of data access and transport in a truly mobile world
Freely available from IEEE.
pp. xxxii-xxxii
by
Aruna Seneviratne
Welcome messages
Freely available from IEEE.
pp. xxxiii-xxxiii
Message from the general chair
Freely available from IEEE.
pp. xxxiv-xxxiv
by
Anura Jayasumana
Message from the program chairs
Freely available from IEEE.
pp. xxxv-xxxv
by
Damla Turgut
,
Nils Aschenbruck
Message from the demonstrations chair
Freely available from IEEE.
pp. xxxvi-xxxvi
by
Kemal Akkaya
Best paper awards for prior IEEE local computer networks conferences
Freely available from IEEE.
pp. xxxvii-xxxviii
LCN program committee and demo board
Freely available from IEEE.
pp. xxxix-xlv
LCN organizing committee
Freely available from IEEE.
pp. xlvi-xlvii
LCN steering committee
Freely available from IEEE.
pp. xlviii-xlviii
LCN 2013 workshops
Freely available from IEEE.
pp. xlix-xlix
goSMART 2013
Freely available from IEEE.
pp. l-li
M2MCIP 2013
Freely available from IEEE.
pp. lii-liii
On-Move 2013
Freely available from IEEE.
pp. liv-liv
P2MNET 2013
Freely available from IEEE.
pp. lv-lvi
SenseApp 2013
Freely available from IEEE.
pp. lvii-lviii
WNS 2013
Freely available from IEEE.
pp. lix-lix
WLN 2013
Freely available from IEEE.
pp. lx-lx
PADE 2013
Freely available from IEEE.
pp. lxi-lxii
WNM 2013
Freely available from IEEE.
pp. lxiii-lxiv
Author index
Freely available from IEEE.
pp. lxvi-xci
Predicting short 802.11 sessions from RADIUS usage data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Anisa Allahdadi
,
Ricardo Morla
,
Ana Aguiar
,
Jaime S. Cardoso
A performance study of hybrid protocols for opportunistic communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Ranjana Pathak
,
Peizhao Hu
,
Jadwiga Indulska
,
Marius Portmann
,
Saaidal Azzuhri
QoS analysis and evaluations: Improving cellular-based distance education
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Farnaz Farid
,
Seyed Shahrestani
,
Chun Ruan
SocialCycle what can a mobile app do to encourage cycling?
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-30
by
Karla Felix Navarro
,
Valerie Gay
,
Loic Golliard
,
Benjamin Johnston
,
Peter Leijdekkers
,
Ewan Vaughan
,
Xun Wang
,
Mary-Anne Williams
Sharing risk-awareness for reliable resource management in smart buildings
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-38
by
Satoko Itaya
,
Rie Tanaka
,
Shin-ichi Doi
,
Keiji Yamada
,
Peter Davis
Going all the way - Detecting and transmitting events with wireless sensor networks in logistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-47
by
Sebastian Zoller
,
Markus Wachtel
,
Fabian Knapp
,
Ralf Steinmetz
Processing and visualizing traffic pollution data in Hanoi City from a wireless sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-55
by
Dang Hai Hoang
,
Thorsten Strufe
,
Quang Duc Le
,
Phong Thanh Bui
,
Thieu Nga Pham
,
Nguyet Thi Thai
,
Thuy Duong Le
,
Immanuel Schweizer
HazeWatch: A participatory sensor system for monitoring air pollution in Sydney
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-64
by
Vijay Sivaraman
,
James Carrapetta
,
Ke Hu
,
Blanca Gallego Luxan
Grassmannian beamforming for Coordinated Multipoint transmission in multicell systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-69
by
Nizar Zorba
,
Hossam S. Hassanein
Implementation and validation of Multimedia Broadcast Multicast Service for LTE/LTE-advanced in OpenAirInterface platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-76
by
Ngoc-Duy Nguyen
,
Raymond Knopp
,
Navid Nikaein
,
Christian Bonnet
HOF: A History-based Offloading Framework for LTE networks using mobile small cells and Wi-Fi
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-83
by
Mahmoud H. Qutqut
,
Fadi M. Al-Turjman
,
Hossam S. Hassanein
Model-free HVAC control using occupant feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-92
by
Sean Purdon
,
Branislav Kusy
,
Raja Jurdak
,
Geoffrey Challen
A framework for massive access and radio resource management in urban WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-99
by
Stefan Aust
,
R. Venkatesha Prasad
,
Ignas G.M.M. Niemegeers
A smart data forwarding method based on adaptive levels in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-103
by
Dang Hai Hoang
,
Thorsten Strufe
,
Thieu Nga Pham
,
Hong Ngoc Hoang
,
Chung Tien Nguyen
,
Van Tho Tran
,
Immanuel Schweizer
Wireless underwater power and data transfer
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-107
by
Neil W. Bergmann
,
Jonathan Juergens
,
Liqun Hou
,
Yunlong Wang
,
Jarrod Trevathan
Rethinking connectivity restoration in WSNs using feedback from a low-cost mobile sensor network testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-115
by
Shadi Janansefat
,
Kemal Akkaya
,
Izzet F. Senturk
,
Michael Gloff
EE-MAC: Energy efficient sensor MAC layer protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-119
by
Afraa Attiah
,
Mustafa Ilhan Akbas
,
Mainak Chatterjee
,
Damla Turgut
Estimating contention of IEEE 802.11 broadcasts based on inter-frame idle slots
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Quincy Tse
,
Weisheng Si
,
Javid Taheri
CREST: An epoch-oriented routing control plane for Low-Power and Lossy Networks
Freely available from IEEE.
pp. 128-136
by
James Pope
,
Robert Simon
All eyes on code: Using call graphs for WSN software optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-145
by
Wolf-Bastian Pottner
,
Daniel Willmann
,
Felix Busching
,
Lars Wolf
PROVIZ: An integrated visualization and programming framework for WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-149
by
Ramalingam K. Chandrasekar
,
A. Selcuk Uluagac
,
Raheem Beyah
Supporting user mobility with peer-to-peer-based application mobility in heterogeneous networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-153
by
Dan Johansson
,
Karl Andersson
,
Christer Ahlund
North-American speed limit sign detection and recognition for smart cars
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-161
by
Abdelhamid Mammeri
,
Azzedine Boukerche
,
Jingwen Feng
,
Renfei Wang
Protocol of change pseudonyms for VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Adetundji Adigun
,
Boucif Amar Bensaber
,
Ismail Biskri
A novel route guidance algorithm using beamforming techniques for vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-174
by
Ismehene Chahbi
,
Dorra Ben Amara
,
Abdelfettah Belghith
Multi-user-type travel simulator based on open travel data
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-178
by
Rie Tanaka
,
Satoko Itaya
,
Naoki Yoshinaga
,
Taku Konishi
,
Shinichi Doi
,
Keiji Yamada
,
Peter Davis
Enhancing safety messages dissemination over 802.11p/DSRC
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-187
by
Omar Chakroun
,
Soumaya Cherkaoui
Mobile computing application for industrial field service engineering: A case for ABB service engineers
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Welderufael B. Tesfay
,
Markus Aleksy
,
Karl Andersson
,
Marko Lehtola
SNOWWEB - Wirelessly connected weather stations in Antarctica
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-202
by
Ben Jolly
,
Andreas Willig
,
Adrian McDonald
,
Matthew Pannell
,
Graeme Plank
Toward a rapidly deployable radio tomographic imaging system for tactical operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-210
by
Dustin Maas
,
Joey Wilson
,
Neal Patwari
Electrocardiagram monitoring on OpenMTC platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 843-847
by
Vera Suryani
,
Achmad Rizal
,
Anton Herutomo
,
Maman Abdurohman
,
Thomas Magedanz
,
Asma Elmangoush
A contextual-adaptive Location Disclosure Agent for general devices in the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 848-855
by
Mahmoud Elkhodr
,
Seyed Shahrestani
,
Hon Cheung
Mobile tracking system using OpenMTC platform based on event driven method
Full-text access may be available. Sign in or learn about subscription options.
pp. 856-860
by
Maman Abdurohman
,
Anton Herutomo
,
Vera Suryani
,
Asma Elmangoush
,
Thomas Magedanz
Rapid tag collision resolution using enhanced continuous wave absence detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 861-867
by
Abdallah Y. Alma'aitah
,
Hossam S. Hassanein
,
Mohamed Ibnkahla
Discrete power-based Distance Clustering for anti-collision schemes in RFID systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 868-873
by
Waleed Alsalih
A value-based cache replacement approach for Information-Centric Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 874-881
by
Fadi M. Al-Turjman
,
Ashraf E. Al-Fagih
,
Hossam S. Hassanein
Impact of wireless devices over real-time applications: An empirical test-bed analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 882-889
by
Mohib A. Shah
,
Jinman Kim
,
Dagan Feng
,
Dagan Feng
Towards a simple, versatile, distributed low-power wireless M2M infrastructure
Freely available from IEEE.
pp. 890-895
by
Jeffrey Dungen
,
Traian Antonescu
,
Pier-Olivier Genest
IoT service platform enhancement through ‘in-situ’ machine learning of real-world knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 896-903
by
Marc Roelands
Open M2M data - Position paper
Full-text access may be available. Sign in or learn about subscription options.
pp. 904-911
by
Hakan Coskun
,
Tom Pfeifer
,
Asma Elmangosh
,
Adel Al-Hezmi
Privacy in overlay-based smart traffic systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 912-917
by
Martin Florian
,
Ingmar Baumgart
What's the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 918-923
by
Delphine Christin
,
Christian Buchner
,
Niklas Leibecke
The Global Changing Privacy Landscape
Full-text access may be available. Sign in or learn about subscription options.
pp. 924-929
by
Chong Shao
,
Annelies Moens
,
Malcolm Crompton
Optimization of the OpenFlow controller in wireless environments for enhancing mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 930-935
by
Abdallah AL Sabbagh
,
Pakawat Pupatwibul
,
Ameen Banjar
,
Robin Braun
Developing an application based on OpenFlow to enhance mobile IP networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 936-940
by
Pakawat Pupatwibul
,
Ameen Banjar
,
Abdallah AL Sabbagh
,
Robin Braun
Performance evaluation for scientific workflow interoperability
Full-text access may be available. Sign in or learn about subscription options.
pp. 941-947
by
Ahmed Alqaoud
Insights of file-sharing system forums
Full-text access may be available. Sign in or learn about subscription options.
pp. 948-955
by
Guillaume Jourjon
,
Olivier Mehani
,
Thierry Rakotoarivelo
Measuring the accuracy of open-source payload-based traffic classifiers using popular Internet applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 956-963
by
Shane Alcock
,
Richard Nelson
MaPIR: Mapping-based private information retrieval for location privacy in LBISs
Full-text access may be available. Sign in or learn about subscription options.
pp. 964-971
by
P. M. Wightman
,
M. Zurbaran
,
M. Rodriguez
,
M. A. Labrador
On resource management and context-awareness in LTE-based networks for Public Safety
Full-text access may be available. Sign in or learn about subscription options.
pp. 972-979
by
Amr El-Mougy
,
Hussein Mouftah
Interference-aware multipath routing protocols for mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 980-986
by
Eman S. Alwadiyeh
,
Ala' F A Aburumman
Enabling technologies of energy efficient cooperative M2M networks: Benefits and challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 987-993
by
Najah AbuAli
Performance analysis of mixed polling schemes with multiple classes of self-similar traffic input to build comprehensive SLAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 994-1000
by
Mohsin Iftikhar
,
Muhammad Imran
,
Ghazi Al-Naymat
,
Mohammad A. Alnuem
,
Hassan Mathkour
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1001-1009
by
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
Estimating IPv4 address space usage with capture-recapture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1010-1017
by
Sebastian Zander
,
Lachlan L. H. Andrew
,
Grenville Armitage
,
Geoff Huston
An investigation into teredo and 6to4 transition mechanisms: Traffic analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1018-1024
by
Martin Elich
,
Petr Velan
,
Tomas Jirsik
,
Pavel Celeda
Link quality prediction for multimedia streaming based on available bandwidth and latency
Full-text access may be available. Sign in or learn about subscription options.
pp. 1025-1032
by
Lim Su Jin
,
Lee Sze Wei
,
Simon Lau
,
Ettikan Karuppiah
Showing 81 out of 81