Default Cover Image

2015 IEEE 40th Conference on Local Computer Networks (LCN 2015)

Oct. 26 2015 to Oct. 29 2015

Clearwater Beach, FL, USA

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 1-1
Technical program of LCN 2015 and adjunct workshopsFreely available from IEEE.pp. 1-25
LCN 2015 keynotesFreely available from IEEE.pp. 1-1
Welcome messagesFreely available from IEEE.pp. 1-1
Message from the general chairFreely available from IEEE.pp. 1-1
Message from the program chairsFreely available from IEEE.pp. 1-1
Message from the Demonstrations chairFreely available from IEEE.pp. 1-1
LCN 2015 organizing and program committeeFreely available from IEEE.pp. 1-1
LCN program committee and demo boardFreely available from IEEE.pp. 1-7
LCN organizing committeeFreely available from IEEE.pp. 1-2
LCN steering committeeFreely available from IEEE.pp. 1-1
LCN 2015 workshopsFreely available from IEEE.pp. 1-1
CloudNA 2015Freely available from IEEE.pp. 1-2
On-move 2015Freely available from IEEE.pp. 1-1
P2MNET 2015Freely available from IEEE.pp. 1-2
SenseApp 2015Freely available from IEEE.pp. 1-2
WLN 2015Freely available from IEEE.pp. 1-1
WNM 2015Freely available from IEEE.pp. 1-2
Author indexFreely available from IEEE.pp. 1-23
Exploring interconnect energy savings under east-west traffic pattern of mapreduce clustersFull-text access may be available. Sign in or learn about subscription options.pp. 10-18
Collaborative On-demand Wi-Fi sharingFull-text access may be available. Sign in or learn about subscription options.pp. 19-27
Content discovery in wireless information-centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 28-36
Modelling the Pending Interest Table occupancy in CCN with interest timeout and retransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 37-45
Performance analysis of probabilistic caching scheme using Markov chainsFull-text access may be available. Sign in or learn about subscription options.pp. 46-54
Joint optimization of content replication and Traffic Engineering in ICNFull-text access may be available. Sign in or learn about subscription options.pp. 55-63
Persistent caching in information-centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 64-72
Coordination supports security: A new defence mechanism against interest flooding in NDNFull-text access may be available. Sign in or learn about subscription options.pp. 73-81
ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDNFull-text access may be available. Sign in or learn about subscription options.pp. 82-90
Growing a Web of TrustFull-text access may be available. Sign in or learn about subscription options.pp. 100-108
Using fake sinks and deceptive relays to boost base-station anonymity in Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 109-116
Toward a robust sparse data representation for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
Animal monitoring with unmanned aerial vehicle-aided wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
Reliable surveillance in ring deployed Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 133-140
C-SDF: Practical solar-aware distributed flow controlFull-text access may be available. Sign in or learn about subscription options.pp. 141-148
Scheduling multiple mobile sinks in Underwater Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 149-156
D-RPL: Overcoming memory limitations in RPL point-to-multipoint routingFull-text access may be available. Sign in or learn about subscription options.pp. 157-160
JitVector: Just-in-time code generation for network packet classificationFull-text access may be available. Sign in or learn about subscription options.pp. 161-164
Towards identifying Large-scale BGP EventsFull-text access may be available. Sign in or learn about subscription options.pp. 165-168
SDN shim: Controlling legacy devicesFull-text access may be available. Sign in or learn about subscription options.pp. 169-172
An analytical model to achieve elasticity for cloud-based firewallsFull-text access may be available. Sign in or learn about subscription options.pp. 173-176
Tracemax: A novel single packet IP traceback strategy for data-flow analysisFull-text access may be available. Sign in or learn about subscription options.pp. 177-180
Coverage preservation in energy harvesting wireless sensor networks for rare eventsFull-text access may be available. Sign in or learn about subscription options.pp. 181-184
Incorporating multiple cluster models for network traffic classificationFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Using a mobile vehicle for road condition surveillance by energy harvesting sensor nodesFull-text access may be available. Sign in or learn about subscription options.pp. 189-192
Towards exploring the benefits of scope-flooding in Information-Centric NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 193-196
Fossa: Using genetic programming to learn ECA rules for adaptive networking applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
An analytical model for bounded WSNs with unreliable cluster heads and linksFull-text access may be available. Sign in or learn about subscription options.pp. 201-204
Mobile data collection using multi-channel network coding in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 205-208
Viterbi algorithm for detecting DDoS attacksFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Characterizing performance and fairness of big data transfer protocols on long-haul networksFull-text access may be available. Sign in or learn about subscription options.pp. 213-216
Avatar mobility and network condition-aware 3D game over wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 217-220
Towards a method of estimating one-way delays under delay asymmetry and unknown relative clock offsetFull-text access may be available. Sign in or learn about subscription options.pp. 221-224
Towards a Context Aware Multipath-TCPFull-text access may be available. Sign in or learn about subscription options.pp. 225-228
Topology control with application constraintsFull-text access may be available. Sign in or learn about subscription options.pp. 229-232
Efficient multi-group formation and communication protocol for Wi-Fi DirectFull-text access may be available. Sign in or learn about subscription options.pp. 233-236
Channel assignment in mobile networks based on geometric prediction and random coloringFull-text access may be available. Sign in or learn about subscription options.pp. 237-240
Participatory-sensing-enabled efficient Parking Management in modern citiesFull-text access may be available. Sign in or learn about subscription options.pp. 241-244
Dependency-aware distributed video transcoding in the cloudFull-text access may be available. Sign in or learn about subscription options.pp. 245-252
Chance-constrained QoS satisfaction for predictive video streamingFull-text access may be available. Sign in or learn about subscription options.pp. 253-260
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streamingFull-text access may be available. Sign in or learn about subscription options.pp. 261-269
An ITS solution providing real-time visual overtaking assistance using smartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 270-278
FLOWER - Fuzzy Lower-than-Best-Effort transport protocolFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Improving TCP performance in data center networks with Adaptive Complementary CodingFull-text access may be available. Sign in or learn about subscription options.pp. 295-302
Frugal topologies for saving energy in IP networksFull-text access may be available. Sign in or learn about subscription options.pp. 303-311
Caching on the move: Towards D2D-based information centric networking for mobile content distributionFull-text access may be available. Sign in or learn about subscription options.pp. 312-320
Data bundling for energy efficient communication of wearable devicesFull-text access may be available. Sign in or learn about subscription options.pp. 321-328
DLINK: Dual link based radio frequency fingerprinting for wearable devicesFull-text access may be available. Sign in or learn about subscription options.pp. 329-337
Predictive mobile IP handover for vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 338-346
Augmenting home routers for socially-aware traffic managementFull-text access may be available. Sign in or learn about subscription options.pp. 347-355
FRoDO: Friendly routing over dunbar-based overlaysFull-text access may be available. Sign in or learn about subscription options.pp. 356-364
Competitive equilibrium and stable coalition in overlay environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 365-372
Energy-efficient overlay networks for mobile devices with buffered relaying and push notificationsFull-text access may be available. Sign in or learn about subscription options.pp. 373-381
Measuring and modeling performance of WLAN communication for multistatic sonar applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 382-385
VirtualStack: A framework for protocol stack virtualization at the edgeFull-text access may be available. Sign in or learn about subscription options.pp. 386-389
Reference equipment of cross-layer control for live video transmission on various physical linksFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
ULLA-X: a unified programmatic middleware for on-demand network reconfigurationFull-text access may be available. Sign in or learn about subscription options.pp. 394-397
Cooperative spectrum mobility in heterogeneous opportunistic networks using cognitive radioFull-text access may be available. Sign in or learn about subscription options.pp. 402-405
Method for providing secure and private fine-grained access to outsourced dataFull-text access may be available. Sign in or learn about subscription options.pp. 406-409
O-ACK: An adaptive wireless MAC protocol exploiting opportunistic token-passing and ack piggybackingFull-text access may be available. Sign in or learn about subscription options.pp. 410-413
SEARS: Space efficient and reliable storage system in the cloudFull-text access may be available. Sign in or learn about subscription options.pp. 418-421
LAC: Introducing latency-aware caching in Information-Centric NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 422-425
Cache coherence in Machine-to-Machine Information Centric NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 430-433
A partial-decentralized coflow scheduling scheme in data center networksFull-text access may be available. Sign in or learn about subscription options.pp. 434-437
Can Multipath TCP save energy? A measuring and modeling study of MPTCP energy consumptionFull-text access may be available. Sign in or learn about subscription options.pp. 442-445
Performance of a tiered architecture to support end-host mobility in a locator identity split environmentFull-text access may be available. Sign in or learn about subscription options.pp. 446-449
Content retrieval method in cooperation with CDN and ICN-based in-network guidance over IP networkFull-text access may be available. Sign in or learn about subscription options.pp. 454-457
Evaluation of topology optimization objectivesFull-text access may be available. Sign in or learn about subscription options.pp. 458-461
Cooperative traffic management for co-existing overlaysFull-text access may be available. Sign in or learn about subscription options.pp. 466-469
Showing 100 out of 120