Default Cover Image

2016 IEEE 41st Conference on Local Computer Networks (LCN)

Nov. 7 2016 to Nov. 10 2016

Dubai, United Arab Emirates

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xiv
Message from the General ChairsFreely available from IEEE.pp. xv-xvi
Message from the Program ChairsFreely available from IEEE.pp. xvii-xvii
Message from Demonstrations ChairFreely available from IEEE.pp. xviii-xviii
LCN Organizing CommitteeFreely available from IEEE.pp. xix-xix
LCN Program Committee, Demo Board and Additional ReviewersFreely available from IEEE.pp. xx-xxvii
LCN Steering CommitteeFreely available from IEEE.pp. xxviii-xxviii
List of Accepted DemonstrationsFreely available from IEEE.pp. xxix-xxix
Even Lower Latency, Even Better Fairness: Logistic Growth Congestion Control in DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 10-18
A Measurement Study on the Distribution Disparity of BGP InstabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 19-27
Third-Party Tracking on the Web: A Swedish PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 28-34
On Assisted Packet Filter Conflicts Resolution: An Iterative Relaxed ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 35-42
Convex Hull Watchdog: Mitigation of Malicious Nodes in Tree-Based P2P Monitoring SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 52-60
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
Improving the Fairness of Alternative Backoff with ECN (ABE)Full-text access may be available. Sign in or learn about subscription options.pp. 78-86
Dynamic Link Adaptation in IEEE 802.11ac: A Distributed Learning Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 87-94
On an Efficient Random Access Scheme for Capillary Machine Type CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 95-103
A System Level Solution for DSA Systems: From Low-Cost Sensing to Spectrum DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Scalable and Cost Efficient Algorithms for Virtual CDN MigrationFull-text access may be available. Sign in or learn about subscription options.pp. 112-120
The Impact of Active Queue Management on DASH-Based Content DeliveryFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
MP-ALM: Exploring Reliable Multipath Multicast Streaming with Multipath TCPFull-text access may be available. Sign in or learn about subscription options.pp. 138-146
Towards Path Quality Metrics for Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 156-159
Setting Up a High-Speed TCP Benchmarking Environment - Lessons LearnedFull-text access may be available. Sign in or learn about subscription options.pp. 160-163
Latency and Lifetime-Aware Clustering and Routing in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 164-167
A-LMST: An Adaptive LMST Local Topology Control Algorithm for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 168-171
Experimental Performance Study of Multipath TCP over Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 172-175
Graph Partitioning in Parallelization of Large Scale NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 176-179
Organization-Level Control of Excessive Internet DownloadsFull-text access may be available. Sign in or learn about subscription options.pp. 184-187
Using Probabilistic Multipath Routing to Improve Route Stability in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 192-195
Improved Energy-Aware Routing Algorithm in Software-Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 196-199
Carving Software-Defined Networks for Scientific Applications with SpateNFull-text access may be available. Sign in or learn about subscription options.pp. 200-203
Joint Resource Reservation and Flow Scheduling for Ultra-Low-Latency TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 208-211
Performance Model for 4G/5G Networks Taking into Account Intra- and Inter-Cell Mobility of UsersFull-text access may be available. Sign in or learn about subscription options.pp. 212-215
Opportunistic Geographic Forwarding in Wireless Sensor Networks for Critical Rare EventsFull-text access may be available. Sign in or learn about subscription options.pp. 216-219
On Periodic Scheduling of Bandwidth Reservations with Deadline Constraint for Big Data TransferFull-text access may be available. Sign in or learn about subscription options.pp. 224-227
A Resources Sharing Architecture for Heterogeneous Wireless Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 228-231
An Approach to Improve the Cooperation between Heterogeneous SDN OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 236-239
Silence Coding for RFID Tag Anti-CollisionFull-text access may be available. Sign in or learn about subscription options.pp. 240-243
Inferring Future Links in Large Scale NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 244-252
Meta-Heuristic Solution for Dynamic Association Control in Virtualized Multi-Rate WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 253-261
Topology Preserving Map to Physical Map - A Thin-Plate Spline Based TransformFull-text access may be available. Sign in or learn about subscription options.pp. 262-270
Distributed Cluster-Topology Maintenance for Mobile Collaborative ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 271-279
Revisiting the So-Called Constructive Interference in Concurrent TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 280-288
Throughput Maximization in Software-Defined Networks with Consolidated MiddleboxesFull-text access may be available. Sign in or learn about subscription options.pp. 298-306
Endpoint-Transparent Multipath Transport with Software-Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 307-315
Adaptive Bandwidth Allocation for Virtual Network Embedding in Optical Data Center NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 316-324
Are Today's SDN Controllers Ready for Primetime?Full-text access may be available. Sign in or learn about subscription options.pp. 325-332
Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 333-338
Maximum Likelihood Topology Maps for Wireless Sensor Networks Using an Automated RobotFull-text access may be available. Sign in or learn about subscription options.pp. 339-347
Error-Bounded Air Quality Mapping Using Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 380-388
Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough?Full-text access may be available. Sign in or learn about subscription options.pp. 389-397
Adaptive Data-Centric Clustering with Sensor Networks for Energy Efficient IoT ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 398-405
Concurrent Transmissions for Communication Protocols in the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 406-414
Controlling Network Latency in Mixed Hadoop Clusters: Do We Need Active Queue Management?Full-text access may be available. Sign in or learn about subscription options.pp. 415-423
Improving the QoE in Personal Clouds with Cross-Swarm BundlingFull-text access may be available. Sign in or learn about subscription options.pp. 424-432
Man-In-the-Middle Anycast (MIMA): CDN User-Server Assignment Becomes FlexibleFull-text access may be available. Sign in or learn about subscription options.pp. 451-459
OP4: An OPPortunistic Privacy-Preserving Scheme for Crowdsensing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 460-468
Probr - A Generic and Passive WiFi Tracking SystemFull-text access may be available. Sign in or learn about subscription options.pp. 495-502
Adaptive Transmission Scheme for TCP in Wireless Multi-Hop NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 503-506
Hybrid Approach for Mobile Couriers Election in Smart-CitiesFull-text access may be available. Sign in or learn about subscription options.pp. 507-510
Spatio-Temporal Coordination of Mobile Robot SwarmsFull-text access may be available. Sign in or learn about subscription options.pp. 515-518
Securing ARP in Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 523-526
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate RevocationFull-text access may be available. Sign in or learn about subscription options.pp. 527-530
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 531-534
Improving Reliable Transmission Throughput with Systematic Random CodeFull-text access may be available. Sign in or learn about subscription options.pp. 539-542
Improving Network Monitoring through Aggregation of HTTP/1.1 Dialogs in IPFIXFull-text access may be available. Sign in or learn about subscription options.pp. 543-546
Rapid Deployment Indoor Localization without Prior Human ParticipationFull-text access may be available. Sign in or learn about subscription options.pp. 547-550
Key Factors in Industrial Control System SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 551-554
Identifying User Actions from HTTP(S) TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 555-558
Efficient Learning of Communication Profiles from IP Flow RecordsFull-text access may be available. Sign in or learn about subscription options.pp. 559-562
Authentication and Trust in Service-Centric NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 563-566
Showing 100 out of 132