Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCN
LCN 2016
Generate Citations
2016 IEEE 41st Conference on Local Computer Networks (LCN)
Nov. 7 2016 to Nov. 10 2016
Dubai, United Arab Emirates
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xiv
Message from the General Chairs
Freely available from IEEE.
pp. xv-xvi
Message from the Program Chairs
Freely available from IEEE.
pp. xvii-xvii
Message from Demonstrations Chair
Freely available from IEEE.
pp. xviii-xviii
LCN Organizing Committee
Freely available from IEEE.
pp. xix-xix
LCN Program Committee, Demo Board and Additional Reviewers
Freely available from IEEE.
pp. xx-xxvii
LCN Steering Committee
Freely available from IEEE.
pp. xxviii-xxviii
List of Accepted Demonstrations
Freely available from IEEE.
pp. xxix-xxix
LCN Best Paper Awards for Prior IEEE Local Computer Networks Conferences
Freely available from IEEE.
pp. xxxi-xxxii
Keynote - Intelligent Adaptive Management in Local Wireless Networking
Freely available from IEEE.
pp. xxxiii-xxxiii
by
Adam Wolisz
Keynote - 30 years of Internet Security and the winner is ...
Freely available from IEEE.
pp. xxxiv-xxxiv
by
Marc Dacier
Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Michael Lass
,
Dominik Leibenger
,
Christoph Sorge
Even Lower Latency, Even Better Fairness: Logistic Growth Congestion Control in Datacenters
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-18
by
Peyman Teymoori
,
David Hayes
,
Michael Welzl
,
Stein Gjessing
A Measurement Study on the Distribution Disparity of BGP Instabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-27
by
Meng Chen
,
Mingwei Xu
,
Yuan Yang
,
Qing Li
Third-Party Tracking on the Web: A Swedish Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-34
by
Joel Purra
,
Niklas Carlsson
On Assisted Packet Filter Conflicts Resolution: An Iterative Relaxed Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-42
by
Anis Yazidi
,
Adel Bouhoula
The Small, the Fast, and the Lazy (SFL): A General Approach for Fast and Flexible Packet Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-51
by
Sven Hager
,
Samuel Brack
,
Björn Scheuermann
Convex Hull Watchdog: Mitigation of Malicious Nodes in Tree-Based P2P Monitoring Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-60
by
Andreas Disterhöft
,
Kalman Graffi
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Zainab Abaid
,
Dilip Sarkar
,
Mohamed Ali Kaafar
,
Sanjay Jha
An Efficient MAC Layer Packet Fragmentation Scheme with Priority Queuing for Real-Time Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-77
by
Byoungheon Shin
,
Jalil Abdullayev
,
Dongman Lee
Improving the Fairness of Alternative Backoff with ECN (ABE)
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-86
by
Naeem Khademi
,
Michael Welzl
,
Grenville Armitage
,
Stein Gjessing
Dynamic Link Adaptation in IEEE 802.11ac: A Distributed Learning Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-94
by
Raja Karmakar
,
Samiran Chattopadhyay
,
Sandip Chakraborty
On an Efficient Random Access Scheme for Capillary Machine Type Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-103
by
Kazi Ashrafuzzaman
,
Abraham O. Fapojuwo
A System Level Solution for DSA Systems: From Low-Cost Sensing to Spectrum Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Osama A.H. Al-Tameemi
,
Mainak Chatterjee
Scalable and Cost Efficient Algorithms for Virtual CDN Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-120
by
Hatem Ibn-Khedher
,
Makhlouf Hadji
,
Emad Abd-Elrahman
,
Hossam Afifi
,
Ahmed E. Kamal
The Impact of Active Queue Management on DASH-Based Content Delivery
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-128
by
Jonathan Kua
,
Grenville Armitage
,
Philip Branch
100 Gbit/s End-to-End Communication: Designing Scalable Protocols with Soft Real-Time Stream Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-137
by
Steffen Büchner
,
Lukasz Lopacinski
,
Jörg Nolte
,
Rolf Kraemer
MP-ALM: Exploring Reliable Multipath Multicast Streaming with Multipath TCP
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-146
by
Anwaar Ali
,
Junaid Qadir
,
Arjuna Sathiaseelan
,
Kok-Lim Alvin Yau
,
Jon Crowcroft
TransFetch: A Viewing Behavior Driven Video Distribution Framework in Public Transport
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-155
by
Fangzhou Jiang
,
Zhi Liu
,
Kanchana Thilakarathna
,
Zhenyu Li
,
Yusheng Ji
,
Aruna Seneviratne
Towards Path Quality Metrics for Overlay Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-159
by
Andri Lareida
,
Daniel Meier
,
Thomas Bocek
,
Burkhard Stiller
Setting Up a High-Speed TCP Benchmarking Environment - Lessons Learned
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-163
by
Thomas Lukaseder
,
Leonard Bradatsch
,
Benjamin Erb
,
Frank Kargl
Latency and Lifetime-Aware Clustering and Routing in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-167
by
Chuanyao Nie
,
Hui Wu
,
Wenguang Zheng
A-LMST: An Adaptive LMST Local Topology Control Algorithm for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-171
by
Luciana B. Abiuzi
,
Cecilia De A.C. Cesar
,
Carlos H.C. Ribeiro
Experimental Performance Study of Multipath TCP over Heterogeneous Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-175
by
Atef Abdrabou
,
Monika Prakash
Graph Partitioning in Parallelization of Large Scale Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-179
by
Sima Das
,
Jennifer Leopold
,
Susmita Ghosh
,
Sajal K. Das
A Time and Energy Efficient Protocol for Locating Coverage Holes in WSNs
Freely available from IEEE.
pp. 180-183
by
Phi Le Nguyen
,
Khanh-Van Nguyen
,
Vu Quoc Huy
,
Yusheng Ji
Organization-Level Control of Excessive Internet Downloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-187
by
Saad Y. Sait
,
Hema A. Murthy
,
Krishna M. Sivalingam
Hardware Modules for Packet Interarrival Time Monitoring for Software Defined Measurements
Freely available from IEEE.
pp. 188-191
by
Racyus Pacífico
,
Pablo Goulart
,
Alex B. Vieira
,
Marcos A.M. Vieira
,
José Augusto M. Nacif
Using Probabilistic Multipath Routing to Improve Route Stability in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-195
by
Fabian Rump
,
Sascha Alexander Jopen
,
Matthias Frank
Improved Energy-Aware Routing Algorithm in Software-Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-199
by
Adriana Fernández-Fernández
,
Cristina Cervelló-Pastor
,
Leonardo Ochoa-Aday
Carving Software-Defined Networks for Scientific Applications with SpateN
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-203
by
Celio Trois
,
Luis Bona
,
Marcos D. Fabro
,
Magnos Martinello
An Efficiency Pipeline Processing Approach for OpenFlow Switch
Freely available from IEEE.
pp. 204-207
by
Zhenwei Wu
,
Yong Jiang
,
Shu Yang
Joint Resource Reservation and Flow Scheduling for Ultra-Low-Latency Transmission
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-211
by
Guolin Sun
,
Dawit Kefyalew
,
Guisong Liu
Performance Model for 4G/5G Networks Taking into Account Intra- and Inter-Cell Mobility of Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-215
by
Bruno Baynat
,
Narcisse Nya
Opportunistic Geographic Forwarding in Wireless Sensor Networks for Critical Rare Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-219
by
David C. Harrison
,
Winston K.G. Seah
,
Hang Yu
,
Ramesh K. Rayudu
Bandwidth-Aware Service Placement in Community Network Micro-Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-223
by
Mennan Selimi
,
Llorenç Cerdà-Alabern
,
Liang Wang
,
Arjuna Sathiaseelan
,
Luís Veiga
,
Felix Freitag
On Periodic Scheduling of Bandwidth Reservations with Deadline Constraint for Big Data Transfer
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-227
by
Yongqiang Wang
,
Chase Q. Wu
,
Aiqin Hou
A Resources Sharing Architecture for Heterogeneous Wireless Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-231
by
Rafael Kunst
,
Leandro Avila
,
Edison Pignaton
,
Sergio Bampi
,
Juergen Rochol
Experiments with ODYSSE: Opportunistic Duty cYcle Based Routing for Wireless Sensor nEtworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-235
by
Ichrak Amdouni
,
Cedric Adjih
,
Nadjib Aitsaadi
,
Paul Muhlethaler
An Approach to Improve the Cooperation between Heterogeneous SDN Overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-239
by
Ziteng Cui
,
Jianxin Liao
,
Jingyu Wang
,
Qi Qi
,
Jing Wang
Silence Coding for RFID Tag Anti-Collision
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-243
by
Ming-Kuei Yeh
,
Yung-Liang Lai
,
Jehn-Ruey Jiang
Inferring Future Links in Large Scale Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-252
by
Sima Das
,
Sajal K. Das
,
Susmita Ghosh
Meta-Heuristic Solution for Dynamic Association Control in Virtualized Multi-Rate WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-261
by
Dawood Sajjadi
,
Maryam Tanha
,
Jianping Pan
Topology Preserving Map to Physical Map - A Thin-Plate Spline Based Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-270
by
Ali F. Buoud
,
Anura P. Jayasumana
Distributed Cluster-Topology Maintenance for Mobile Collaborative Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-279
by
Jan Gäbler
,
Hartmut König
Revisiting the So-Called Constructive Interference in Concurrent Transmission
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-288
by
Chun-Hao Liao
,
Yuki Katsumata
,
Makoto Suzuki
,
Hiroyuki Morikawa
User-Centric Network Provisioning in Software Defined Data Center Environment
Freely available from IEEE.
pp. 289-297
by
Taimur Bakhshi
,
Bogdan Ghita
Throughput Maximization in Software-Defined Networks with Consolidated Middleboxes
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-306
by
Meitian Huang
,
Weifa Liang
,
Zichuan Xu
,
Mike Jia
,
Song Guo
Endpoint-Transparent Multipath Transport with Software-Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-315
by
Dario Banfi
,
Olivier Mehani
,
Guillaume Jourjon
,
Lukas Schwaighofer
,
Ralph Holz
Adaptive Bandwidth Allocation for Virtual Network Embedding in Optical Data Center Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-324
by
Swarnalatha Madanantha
,
Tram Truong-Huu
,
Mohan Gurusamy
Are Today's SDN Controllers Ready for Primetime?
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-332
by
Stephen Mallon
,
Vincent Gramoli
,
Guillaume Jourjon
Tri-MCL: Synergistic Localization for Mobile Ad-Hoc and Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Arne Bochem
,
Yali Yuan
,
Dieter Hogrefe
Maximum Likelihood Topology Maps for Wireless Sensor Networks Using an Automated Robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-347
by
Ashanie Gunathillake
,
Andrey V. Savkin
,
Anura P. Jayasumana
Seamless Transitions between Filter Schemes for Location-Based Mobile Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-356
by
Björn Richerzhagen
,
Nils Richerzhagen
,
Julian Zobel
,
Sophie Schönherr
,
Boris Koldehofe
,
Ralf Steinmetz
Context Aware Multi-Rate Control in Densely Deployed IEEE802.11 WLAN for Avoiding Performance Anomaly
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-370
by
Natsumi Kumatani
,
Mitomo Isomura
,
Tutomu Murase
,
Masato Oguchi
,
Shweta Segari
,
Akash Baid
,
Ivan Seskar
,
Dipankar Raychaudhuri
Breach Path Reliability for Directional Sensor Networks
Freely available from IEEE.
pp. 371-379
by
Mohammed Elmorsy
,
Ehab S. Elmallah
Error-Bounded Air Quality Mapping Using Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-388
by
Ahmed Boubrima
,
Walid Bechkit
,
Hervé Rivano
Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough?
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-397
by
Michael Stein
,
Tobias Petry
,
Immanuel Schweizer
,
Martina Brachmann
,
Max Mühlhäuser
Adaptive Data-Centric Clustering with Sensor Networks for Energy Efficient IoT Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-405
by
Sanat Sarangi
,
Srinivasu Pappula
Concurrent Transmissions for Communication Protocols in the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-414
by
Martina Brachmann
,
Olaf Landsiedel
,
Silvia Santini
Controlling Network Latency in Mixed Hadoop Clusters: Do We Need Active Queue Management?
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-423
by
Renan Fischer E Silva
,
Paul M. Carpenter
Improving the QoE in Personal Clouds with Cross-Swarm Bundling
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-432
by
Rahma Chaabouni
,
Marc Sánchez-Artigas
,
Ala Chaabouni
,
Pedro García-López
Inferring and Controlling Congestion in CCN via the Pending Interest Table Occupancy
Freely available from IEEE.
pp. 433-441
by
Amuda James Abu
,
Brahim Bensaou
,
Ahmed M. Abdelmoniem
Multipath Bandwidth Guarantees for Multi-Tenant Cloud Networking
Freely available from IEEE.
pp. 442-450
by
Wei Wang
,
Yi Sun
,
Steve Uhlig
,
Gengfa Fang
,
Nanshu Wang
,
Zhongcheng Li
Man-In-the-Middle Anycast (MIMA): CDN User-Server Assignment Becomes Flexible
Full-text access may be available. Sign in or learn about subscription options.
pp. 451-459
by
Jeffrey Lai
,
Qiang Fu
OP4: An OPPortunistic Privacy-Preserving Scheme for Crowdsensing Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 460-468
by
Delphine Reinhardt
,
Ilya Manyugin
Of Strategies and Structures: Motif-Based Fingerprinting Analysis of Online Reputation Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 469-476
by
Matthias Wichtlhuber
,
Sebastian Bücker
,
Roland Kluge
,
Mahdi Mousavi
,
David Hausheer
I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-485
by
Chitra Javali
,
Girish Revadigar
,
Kasper B. Rasmussen
,
Wen Hu
,
Sanjay Jha
Enabling a Mobility Prediction-Aware Follow-Me Cloud Model
Freely available from IEEE.
pp. 486-494
by
Bruno Sousa
,
Zhongliang Zhao
,
Morteza Karimzadeh
,
David Palma
,
Vitor Fonseca
,
Paulo Simoes
,
Torsten Braun
,
Hans Van Den Berg
,
Aiko Pras
,
Luis Cordeiro
Probr - A Generic and Passive WiFi Tracking System
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-502
by
Joel Scheuner
,
Genc Mazlami
,
Dominik Schöni
,
Sebastian Stephan
,
Alessandro De Carli
,
Thomas Bocek
,
Burkhard Stiller
Adaptive Transmission Scheme for TCP in Wireless Multi-Hop Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 503-506
by
Joon Yeop Lee
,
Hyunsoon Kim
,
Woonghee Lee
,
Hwangnam Kim
Hybrid Approach for Mobile Couriers Election in Smart-Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 507-510
by
Fadi Al-Turjman
Spatio-Temporal Coordination of Mobile Robot Swarms
Full-text access may be available. Sign in or learn about subscription options.
pp. 515-518
by
Daniel Graff
,
Reinhardt Karnapke
On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-522
by
Kallol Krishna Karmakar
,
Vijay Varadharajan
,
Udaya Tupakula
Securing ARP in Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-526
by
Talal Alharbi
,
Dario Durando
,
Farzaneh Pakzad
,
Marius Portmann
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 527-530
by
Qinwen Hu
,
Muhammad Rizwan Asghar
,
Nevil Brownlee
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-534
by
A.S. Wazan
,
R. Laborde
,
D.W. Chadwick
,
F. Barrere
,
A. Benzekri
Recharge-as-Reward Mechanism to Incentivize Cooperative Nodes in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-538
by
Normalia Samian
,
Winston K.G. Seah
,
Zuriati Ahmad Zukarnain
,
Azizol Abdullah
,
Zurina Mohd Hanapi
Improving Reliable Transmission Throughput with Systematic Random Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-542
by
Zan-Kai Chong
,
Hiroyuki Ohsaki
,
Bryan Ng
,
Bok-Min Goi
,
Hong-Tat Ewe
,
Sin-Ran Chong
Improving Network Monitoring through Aggregation of HTTP/1.1 Dialogs in IPFIX
Full-text access may be available. Sign in or learn about subscription options.
pp. 543-546
by
Felix Erlacher
,
Wolfgang Estgfaeller
,
Falko Dressler
Rapid Deployment Indoor Localization without Prior Human Participation
Full-text access may be available. Sign in or learn about subscription options.
pp. 547-550
by
Han Xu
,
Zimu Zhou
,
Longfei Shangguan
Key Factors in Industrial Control System Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 551-554
by
Jonathan P. Chapman
,
Simon Ofner
,
Piotr Pauksztelo
Identifying User Actions from HTTP(S) Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 555-558
by
Georgios Rizothanasis
,
Niklas Carlsson
,
Aniket Mahanti
Efficient Learning of Communication Profiles from IP Flow Records
Full-text access may be available. Sign in or learn about subscription options.
pp. 559-562
by
Christian Hammerschmidt
,
Samuel Marchal
,
Radu State
,
Gaetano Pellegrino
,
Sicco Verwer
Authentication and Trust in Service-Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 563-566
by
Imad Aad
,
Torsten Braun
,
Dima Mansour
Toward Coexistence of Different Congestion Control Mechanisms
Freely available from IEEE.
pp. 567-570
by
Mario Hock
,
Roland Bless
,
Martina Zitterbart
Incremental Switch Deployment for Hybrid Software-Defined Networks
Freely available from IEEE.
pp. 571-574
by
Xuya Jia
,
Yong Jiang
,
Zehua Guo
Showing 100 out of 132
Load More
Load All