Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCN
LCN 2015
Generate Citations
2015 IEEE 40th Conference on Local Computer Networks (LCN 2015)
Oct. 26 2015 to Oct. 29 2015
Clearwater Beach, FL, USA
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Technical program of LCN 2015 and adjunct workshops
Freely available from IEEE.
pp. 1-25
LCN 2015 keynotes
Freely available from IEEE.
pp. 1-1
LCN 2015 keynote by Bob Metcalfe, UTAustin professor of Innovation, Ethernet Inventor, 3Com Founder
Freely available from IEEE.
pp. 1-1
by
Bob Metcalfe
LCN 2015 keynote by Prof. Muriel MÙdard, professor at MIT, USA
Freely available from IEEE.
pp. 1-1
by
Muriel Medard
Welcome messages
Freely available from IEEE.
pp. 1-1
Message from the general chair
Freely available from IEEE.
pp. 1-1
by
Nils Aschenbruck
Message from the program chairs
Freely available from IEEE.
pp. 1-1
by
Salil Kanhere
,
Jens Tolle
Message from the Demonstrations chair
Freely available from IEEE.
pp. 1-1
by
Olivier Mehani
Best Paper Awards for prior IEEE Local Computer Networks conferences
Freely available from IEEE.
pp. 1-2
LCN 2015 organizing and program committee
Freely available from IEEE.
pp. 1-1
LCN program committee and demo board
Freely available from IEEE.
pp. 1-7
LCN organizing committee
Freely available from IEEE.
pp. 1-2
LCN steering committee
Freely available from IEEE.
pp. 1-1
LCN 2015 workshops
Freely available from IEEE.
pp. 1-1
CloudNA 2015
Freely available from IEEE.
pp. 1-2
by
Khaled Salah
,
Sherali Zeadally
On-move 2015
Freely available from IEEE.
pp. 1-1
by
Karl Andersson
,
Soumaya Cherkaoui
P2MNET 2015
Freely available from IEEE.
pp. 1-2
by
Azzedine Boukerche
,
Abdelhamid Mammeri
,
Samia Loucif
SenseApp 2015
Freely available from IEEE.
pp. 1-2
by
Csaba Kiraly
,
Andreas Reinhardt
WLN 2015
Freely available from IEEE.
pp. 1-1
by
Sharief Oteafy
,
Mervat Abu-Elkheir
WNM 2015
Freely available from IEEE.
pp. 1-2
by
Aniket Mahanti
,
Emir Halepovic
Author index
Freely available from IEEE.
pp. 1-23
Beware of the hidden! How cross-traffic affects quality assurances of competing real-time Ethernet standards for in-car communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Till Steinbach
,
Hyung-Taek Lim
,
Franz Korf
,
Thomas C. Schmidt
,
Daniel Herrscher
,
Adam Wolisz
Exploring interconnect energy savings under east-west traffic pattern of mapreduce clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-18
by
Renan Fischer e Silva
,
Paul M. Carpenter
Collaborative On-demand Wi-Fi sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-27
by
Hanno Wirtz
,
Torsten Zimmermann
,
Martin Serror
,
Klaus Wehrle
Content discovery in wireless information-centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-36
by
Carlos Anastasiades
,
Arun Sittampalam
,
Torsten Braun
Modelling the Pending Interest Table occupancy in CCN with interest timeout and retransmission
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-45
by
Amuda James Abu
,
Brahim Bensaou
Performance analysis of probabilistic caching scheme using Markov chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-54
by
Saran Tarnoi
,
Vorapong Suppakitpaisarn
,
Wuttipong Kumwilaisak
,
Yusheng Ji
Joint optimization of content replication and Traffic Engineering in ICN
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-63
by
Zhen Feng
,
Mingwei Xu
,
Yuan Yang
,
Qi Li
,
Yu Wang
,
Qing Li
,
Borje Ohlman
,
Meng Chen
Persistent caching in information-centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-72
by
Carlos Anastasiades
,
Andre Gomes
,
Rene Gadow
,
Torsten Braun
Coordination supports security: A new defence mechanism against interest flooding in NDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-81
by
Hani Salah
,
Julian Wulfheide
,
Thorsten Strufe
ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-90
by
Zhiwei Xu
,
Bo Chen
,
Ninghan Wang
,
Yujun Zhang
,
Zhongcheng Li
Rebound: Decoy routing on asymmetric routes via error messages
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-99
by
Daniel Ellard
,
Christine Jones
,
Victoria Manfredi
,
W. Timothy Strayer
,
Bishal Thapa
,
Megan Van Welie
,
Alden Jackson
Growing a Web of Trust
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-108
by
Benjamin Schiller
,
Thorsten Strufe
,
Dirk Kohlweyer
,
Jan Seedorf
Using fake sinks and deceptive relays to boost base-station anonymity in Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
Nikolaos Baroutis
,
Mohamed Younis
Toward a robust sparse data representation for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
Mohammad Abu Alsheikh
,
Shaowei Lin
,
Hwee-Pink Tan
,
Dusit Niyato
Animal monitoring with unmanned aerial vehicle-aided wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-132
by
Jun Xu
,
Gurkan Solmaz
,
Rouhollah Rahmatizadeh
,
Damla Turgut
,
Ladislau Boloni
Reliable surveillance in ring deployed Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-140
by
Mohammed Elmorsy
,
Ehab S. Elmallah
C-SDF: Practical solar-aware distributed flow control
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-148
by
Immanuel Schweizer
,
Tobias Petry
,
Max Muhlhauser
Scheduling multiple mobile sinks in Underwater Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-156
by
Fahad Ahmad Khan
,
Saad Ahmad Khan
,
Damla Turgut
,
Ladislau Boloni
D-RPL: Overcoming memory limitations in RPL point-to-multipoint routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-160
by
Csaba Kiraly
,
Timofei Istomin
,
Oana Iova
,
Gian Pietro Picco
JitVector: Just-in-time code generation for network packet classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-164
by
Samuel Brack
,
Sven Hager
,
Bjorn Scheuermann
Towards identifying Large-scale BGP Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-168
by
Meng Chen
,
Mingwei Xu
,
Xirui Song
,
Yuan Yang
SDN shim: Controlling legacy devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-172
by
Daniel J. Casey
,
Barry E. Mullins
An analytical model to achieve elasticity for cloud-based firewalls
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-176
by
Khaled Salah
Tracemax: A novel single packet IP traceback strategy for data-flow analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-180
by
Peter Hillmann
,
Frank Tietze
,
Gabi Dreo Rodosek
Coverage preservation in energy harvesting wireless sensor networks for rare events
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-184
by
David C. Harrison
,
Winston K. G. Seah
,
Ramesh K. Rayudu
Incorporating multiple cluster models for network traffic classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Anil Kumar
,
Jinoh Kim
,
Sang C. Suh
,
Ganho Choi
Using a mobile vehicle for road condition surveillance by energy harvesting sensor nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-192
by
Abbas Mehrabi
,
Kiseon Kim
Towards exploring the benefits of scope-flooding in Information-Centric Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-196
by
Andriana Ioannou
,
Stefan Weber
Fossa: Using genetic programming to learn ECA rules for adaptive networking applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
Alexander Frommgen
,
Robert Rehner
,
Max Lehn
,
Alejandro Buchmann
An analytical model for bounded WSNs with unreliable cluster heads and links
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-204
by
Fredrick A. Omondi
,
Purav Shah
,
Orhan Gemikonakli
,
Enver Ever
Mobile data collection using multi-channel network coding in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-208
by
Mansour Abdulaziz
,
Robert Simon
Viterbi algorithm for detecting DDoS attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Wilson Bongiovanni
,
Adilson E. Guelfi
,
Elvis Pontes
,
A. A. A. Silva
,
Fen Zhou
,
Sergio Takeo Kofuji
Characterizing performance and fairness of big data transfer protocols on long-haul networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-216
by
Se-young Yu
,
Nevil Brownlee
,
Aniket Mahanti
Avatar mobility and network condition-aware 3D game over wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-220
by
Donghyeok Ho
,
Hyungnam Kim
,
Hwangjun Song
Towards a method of estimating one-way delays under delay asymmetry and unknown relative clock offset
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-224
by
Jun Liu
Towards a Context Aware Multipath-TCP
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-228
by
Richard Withnell
,
Christopher Edwards
Topology control with application constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-232
by
Michael Stein
,
Geza Kulcsar
,
Immanuel Schweizer
,
Gergely Varro
,
Andy Schurr
,
Max Muhlhauser
Efficient multi-group formation and communication protocol for Wi-Fi Direct
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-236
by
Ahmed A. Shahin
,
Mohamed Younis
Channel assignment in mobile networks based on geometric prediction and random coloring
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-240
by
Subhankar Ghosal
,
Sasthi C. Ghosh
Participatory-sensing-enabled efficient Parking Management in modern cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-244
by
Sanket Gupte
,
Mohamed Younis
Dependency-aware distributed video transcoding in the cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-252
by
Mohammad Reza Zakerinasab
,
Mea Wang
Chance-constrained QoS satisfaction for predictive video streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-260
by
Ramy Atawia
,
Hatem Abou-zeid
,
Hossam S. Hassanein
,
Aboelmagd Noureldin
RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-269
by
Giang Nguyen
,
Stefanie Roos
,
Thorsten Strufe
,
Mathias Fischer
An ITS solution providing real-time visual overtaking assistance using smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-278
by
Subhadeep Patra
,
Carlos T. Calafate
,
Juan-Carlos Cano
,
Pietro Manzoni
FLOWER - Fuzzy Lower-than-Best-Effort transport protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Si Quoc Viet Trang
,
Emmanuel Lochin
,
Cedric Baudoin
,
Emmanuel Dubois
,
Patrick Gelard
Latency and fairness trade-off for thin streams using redundant data bundling in TCP
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-294
by
Bendik R. Opstad
,
Jonas Markussen
,
Iffat Ahmed
,
Andreas Petlund
,
Carsten Griwodz
,
Palvorsen
Improving TCP performance in data center networks with Adaptive Complementary Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-302
by
Jiyan Sun
,
Yan Zhang
,
Ding Tang
,
Shuli Zhang
,
Zhen Xu
,
Jingguo Ge
Frugal topologies for saving energy in IP networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-311
by
Mohammed Hussein
,
Gentian Jakllari
,
Beatrice Paillassa
Caching on the move: Towards D2D-based information centric networking for mobile content distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-320
by
G. Chandrasekaran
,
N. Wang
,
R. Tafazolli
Data bundling for energy efficient communication of wearable devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-328
by
Jung-Woong Sung
,
Seung-Jae Han
DLINK: Dual link based radio frequency fingerprinting for wearable devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-337
by
Girish Revadigar
,
Chitra Javali
,
Wen Hu
,
Sanjay Jha
Predictive mobile IP handover for vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-346
by
Alexander Magnano
,
Xin Fei
,
Azzedine Boukerche
Augmenting home routers for socially-aware traffic management
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-355
by
Andri Lareida
,
George Petropoulos
,
Valentin Burger
,
Michael Seufert
,
Sergios Soursos
,
Burkhard Stiller
FRoDO: Friendly routing over dunbar-based overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-364
by
Tobias Amft
,
Barbara Guidi
,
Kalman Graffi
,
Laura Ricci
Competitive equilibrium and stable coalition in overlay environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-372
by
Shan Jiang
,
Jianxin Liao
,
Jun Gong
,
Jingyu Wang
,
Tonghong Li
Energy-efficient overlay networks for mobile devices with buffered relaying and push notifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-381
by
Thomas Bocek
,
Nico Rutishauser
,
Burkhard Stiller
Measuring and modeling performance of WLAN communication for multistatic sonar applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-385
by
Sascha A. Jopen
,
Arne Schulz
,
Raphael Ernst
VirtualStack: A framework for protocol stack virtualization at the edge
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-389
by
Jens Heuschkel
,
Immanuel Schweizer
,
Max Muhlhauser
Reference equipment of cross-layer control for live video transmission on various physical links
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-393
by
Shuhei Oda
,
Kurozumi Masaaki
,
Yosuke Endo
ULLA-X: a unified programmatic middleware for on-demand network reconfiguration
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-397
by
Avishek Patra
,
Andreas Achtzehn
,
Petri Mahonen
Challenges for 100 Gbit/s end to end communication: Increasing throughput through parallel processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-401
by
Steffen Buchner
,
Jorg Nolte
,
Rolf Kraemer
,
Lukasz Lopacinski
,
Reinhardt Karnapke
Cooperative spectrum mobility in heterogeneous opportunistic networks using cognitive radio
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-405
by
Avirup Das
,
Sasthi C. Ghosh
,
Nabanita Das
,
Abhirup Das Barman
Method for providing secure and private fine-grained access to outsourced data
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-409
by
Mosarrat Jahan
,
Mohsen Rezvani
,
Aruna Seneviratne
,
Sanjay Jha
O-ACK: An adaptive wireless MAC protocol exploiting opportunistic token-passing and ack piggybacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-413
by
Shegufta Bakht Ahsan
,
Nitin Vaidya
a-kTC: Integrating topology control into the stack
Freely available from IEEE.
pp. 414-417
by
Immanuel Schweizer
,
Ralf Zimmermann
,
Michael Stein
,
Max Mühlhäuser
SEARS: Space efficient and reliable storage system in the cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-421
by
Ying Li
,
Katherine Guo
,
Xin Wang
,
Emina Soljanin
,
Thomas Woo
LAC: Introducing latency-aware caching in Information-Centric Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-425
by
Giovanna Carofiglio
,
Leonce Mekinda
,
Luca Muscariello
Performance evaluation of Joint Transmission Coordinated-Multipoint in dense Very High Throughput WLANs scenario
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-429
by
Iyad Lahsen Cherif
,
Lynda Zitoune
,
Veronique Veque
Cache coherence in Machine-to-Machine Information Centric Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-433
by
Maroua Meddeb
,
Amine Dhraief
,
Abdelfettah Belghith
,
Thierry Monteil
,
Khalil Drira
A partial-decentralized coflow scheduling scheme in data center networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-437
by
Shuli Zhang
,
Yan Zhang
,
Ding Tang
,
Zhen Xu
,
Jingguo Ge
,
Zhijun Zhao
OrLiOn: Optimized Route Planning for the Localization of Indoor Nodes from Outdoor environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-441
by
Alina Rubina
,
Oleksandr Artemenko
,
Andreas Mitschele-Thiel
Can Multipath TCP save energy? A measuring and modeling study of MPTCP energy consumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-445
by
Fabian Kaup
,
Matthias Wichtlhuber
,
Stefan Rado
,
David Hausheer
Performance of a tiered architecture to support end-host mobility in a locator identity split environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-449
by
Avinash Mungur
,
Christopher Edwards
Revisiting the controller placement problem
Freely available from IEEE.
pp. 450-453
by
Md. Tanvir Ishtaique ul Huque
,
Guillaume Jourjon
,
Vincent Gramoli
Content retrieval method in cooperation with CDN and ICN-based in-network guidance over IP network
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-457
by
Yutaro Inaba
,
Yosuke Tanigawa
,
Hideki Tode
Evaluation of topology optimization objectives
Full-text access may be available. Sign in or learn about subscription options.
pp. 458-461
by
Y. Sinan Hanay
,
Shin'ichi Arakawa
,
Masayuki Murata
A step towards a protocol-independent measurement framework for dynamic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-465
by
Nils Richerzhagen
,
Tao Li
,
Dominik Stingl
,
Bjorn Richerzhagen
,
Ralf Steinmetz
,
Silvia Santini
Cooperative traffic management for co-existing overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-469
by
Ziteng Cui
,
Jianxin Liao
,
Jingyu Wang
,
Qi Qi
,
Jing Wang
Showing 100 out of 120
Load More
Load All