Default Cover Image

2013 IEEE 38th Conference on Local Computer Networks Workshops (LCN Workshops)

Oct. 21 2013 to Oct. 24 2013

Sydney, Australia

Table of Contents

[Copyright notice]Freely available from IEEE.pp. i-i
Technical program of LCN 2013 and adjunct workshopsFreely available from IEEE.pp. ii-xxix
LCN 2013 keynotesFreely available from IEEE.pp. xxx-xxx
Welcome messagesFreely available from IEEE.pp. xxxiii-xxxiii
Message from the general chairFreely available from IEEE.pp. xxxiv-xxxiv
Message from the program chairsFreely available from IEEE.pp. xxxv-xxxv
Message from the demonstrations chairFreely available from IEEE.pp. xxxvi-xxxvi
LCN program committee and demo boardFreely available from IEEE.pp. xxxix-xlv
LCN organizing committeeFreely available from IEEE.pp. xlvi-xlvii
LCN steering committeeFreely available from IEEE.pp. xlviii-xlviii
LCN 2013 workshopsFreely available from IEEE.pp. xlix-xlix
goSMART 2013Freely available from IEEE.pp. l-li
M2MCIP 2013Freely available from IEEE.pp. lii-liii
On-Move 2013Freely available from IEEE.pp. liv-liv
P2MNET 2013Freely available from IEEE.pp. lv-lvi
SenseApp 2013Freely available from IEEE.pp. lvii-lviii
WNS 2013Freely available from IEEE.pp. lix-lix
WLN 2013Freely available from IEEE.pp. lx-lx
PADE 2013Freely available from IEEE.pp. lxi-lxii
WNM 2013Freely available from IEEE.pp. lxiii-lxiv
Author indexFreely available from IEEE.pp. lxvi-xci
Predicting short 802.11 sessions from RADIUS usage dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A performance study of hybrid protocols for opportunistic communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
QoS analysis and evaluations: Improving cellular-based distance educationFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
Sharing risk-awareness for reliable resource management in smart buildingsFull-text access may be available. Sign in or learn about subscription options.pp. 31-38
HazeWatch: A participatory sensor system for monitoring air pollution in SydneyFull-text access may be available. Sign in or learn about subscription options.pp. 56-64
Grassmannian beamforming for Coordinated Multipoint transmission in multicell systemsFull-text access may be available. Sign in or learn about subscription options.pp. 65-69
Model-free HVAC control using occupant feedbackFull-text access may be available. Sign in or learn about subscription options.pp. 84-92
A framework for massive access and radio resource management in urban WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 93-99
Wireless underwater power and data transferFull-text access may be available. Sign in or learn about subscription options.pp. 104-107
EE-MAC: Energy efficient sensor MAC layer protocolFull-text access may be available. Sign in or learn about subscription options.pp. 116-119
Estimating contention of IEEE 802.11 broadcasts based on inter-frame idle slotsFull-text access may be available. Sign in or learn about subscription options.pp. 120-127
All eyes on code: Using call graphs for WSN software optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 137-145
PROVIZ: An integrated visualization and programming framework for WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
Supporting user mobility with peer-to-peer-based application mobility in heterogeneous networksFull-text access may be available. Sign in or learn about subscription options.pp. 150-153
North-American speed limit sign detection and recognition for smart carsFull-text access may be available. Sign in or learn about subscription options.pp. 154-161
Protocol of change pseudonyms for VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
A novel route guidance algorithm using beamforming techniques for vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 168-174
Multi-user-type travel simulator based on open travel dataFull-text access may be available. Sign in or learn about subscription options.pp. 175-178
Enhancing safety messages dissemination over 802.11p/DSRCFull-text access may be available. Sign in or learn about subscription options.pp. 179-187
SNOWWEB - Wirelessly connected weather stations in AntarcticaFull-text access may be available. Sign in or learn about subscription options.pp. 194-202
Toward a rapidly deployable radio tomographic imaging system for tactical operationsFull-text access may be available. Sign in or learn about subscription options.pp. 203-210
Electrocardiagram monitoring on OpenMTC platformFull-text access may be available. Sign in or learn about subscription options.pp. 843-847
A contextual-adaptive Location Disclosure Agent for general devices in the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 848-855
Mobile tracking system using OpenMTC platform based on event driven methodFull-text access may be available. Sign in or learn about subscription options.pp. 856-860
Rapid tag collision resolution using enhanced continuous wave absence detectionFull-text access may be available. Sign in or learn about subscription options.pp. 861-867
Discrete power-based Distance Clustering for anti-collision schemes in RFID systemsFull-text access may be available. Sign in or learn about subscription options.pp. 868-873
A value-based cache replacement approach for Information-Centric NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 874-881
Impact of wireless devices over real-time applications: An empirical test-bed analysisFull-text access may be available. Sign in or learn about subscription options.pp. 882-889
IoT service platform enhancement through ‘in-situ’ machine learning of real-world knowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 896-903
Open M2M data - Position paperFull-text access may be available. Sign in or learn about subscription options.pp. 904-911
Privacy in overlay-based smart traffic systemsFull-text access may be available. Sign in or learn about subscription options.pp. 912-917
The Global Changing Privacy LandscapeFull-text access may be available. Sign in or learn about subscription options.pp. 924-929
Optimization of the OpenFlow controller in wireless environments for enhancing mobilityFull-text access may be available. Sign in or learn about subscription options.pp. 930-935
Developing an application based on OpenFlow to enhance mobile IP networksFull-text access may be available. Sign in or learn about subscription options.pp. 936-940
Performance evaluation for scientific workflow interoperabilityFull-text access may be available. Sign in or learn about subscription options.pp. 941-947
Insights of file-sharing system forumsFull-text access may be available. Sign in or learn about subscription options.pp. 948-955
Measuring the accuracy of open-source payload-based traffic classifiers using popular Internet applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 956-963
MaPIR: Mapping-based private information retrieval for location privacy in LBISsFull-text access may be available. Sign in or learn about subscription options.pp. 964-971
On resource management and context-awareness in LTE-based networks for Public SafetyFull-text access may be available. Sign in or learn about subscription options.pp. 972-979
Interference-aware multipath routing protocols for mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 980-986
Enabling technologies of energy efficient cooperative M2M networks: Benefits and challengesFull-text access may be available. Sign in or learn about subscription options.pp. 987-993
Formal verification of mobile agent based anomaly detection in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1001-1009
Estimating IPv4 address space usage with capture-recaptureFull-text access may be available. Sign in or learn about subscription options.pp. 1010-1017
An investigation into teredo and 6to4 transition mechanisms: Traffic analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1018-1024
Link quality prediction for multimedia streaming based on available bandwidth and latencyFull-text access may be available. Sign in or learn about subscription options.pp. 1025-1032
Showing 81 out of 81