Default Cover Image

2012 IEEE 37th Annual Conference on Local Computer Networks (LCN 2012)

Oct. 22 2012 to Oct. 25 2012

Clearwater, FL

Table of Contents

Keynote by Kevin Fall, QualcommFull-text access may be available. Sign in or learn about subscription options.pp. xxxiii-xxxiii
Keynote by Prof. Mark Crovella, Boston UniversityFull-text access may be available. Sign in or learn about subscription options.pp. xxxiv-xxxiv
Welcome messagesFreely available from IEEE.pp. xxxv-xxxv
WorkshopsFreely available from IEEE.pp. lxxiii-lxxiii
Welcome message from the SenseApp chairsFreely available from IEEE.pp. lxxix-lxxx
Welcome message from the SICK chairsFreely available from IEEE.pp. lxxxiii-lxxxiv
Welcome message from the WLN chairsFreely available from IEEE.pp. lxxxv-lxxxvi
EpidemicSim: Epidemic simulation system with realistic mobilityFull-text access may be available. Sign in or learn about subscription options.pp. 659-665
Performance evaluation of a real long term evolution (LTE) networkFull-text access may be available. Sign in or learn about subscription options.pp. 679-685
Performance evaluation of video dissemination protocols over Vehicular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 694-701
Research and simulation of transport protocols optimization on wireless multi-hop networksFull-text access may be available. Sign in or learn about subscription options.pp. 702-709
DSS: Dynamic Switching Sets for prolonging network lifetime in sensor nodesFull-text access may be available. Sign in or learn about subscription options.pp. 726-731
Impact weighted uptime in hierarchical LTE networks: Application and measurementFull-text access may be available. Sign in or learn about subscription options.pp. 732-736
Designing and predicting QoS of a wireless system for medical telemetryFull-text access may be available. Sign in or learn about subscription options.pp. 737-744
Flexible polling-based scheduling with QoS capability for Wireless Body Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 745-752
Wireless sensor network for habitat monitoring: A counting heuristicFull-text access may be available. Sign in or learn about subscription options.pp. 753-760
Energy and terrain aware connectivity restoration in disjoint Mobile Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 767-774
RFID tags authentication by unique hash sequence detectionFull-text access may be available. Sign in or learn about subscription options.pp. 775-781
Argumentation based negotiation in cognitive radio networksFull-text access may be available. Sign in or learn about subscription options.pp. 782-789
Characterization of a 3G EV-DO network - A measurement studyFull-text access may be available. Sign in or learn about subscription options.pp. 790-798
Unified channel assignment for unicast and broadcast traffic in Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 799-806
Long-term proportional fairness over multiple cellsFull-text access may be available. Sign in or learn about subscription options.pp. 807-813
Mobile e-services using HTML5Full-text access may be available. Sign in or learn about subscription options.pp. 814-819
RSSI-based localization in cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 820-826
A pricing scheme for porter based delivery in integrated RFID-Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 827-834
Towards provisioning vehicle-based rural information servicesFull-text access may be available. Sign in or learn about subscription options.pp. 835-842
A new stability based clustering algorithm (SBCA) for VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 843-847
Smart City: The smart sewerageFull-text access may be available. Sign in or learn about subscription options.pp. 856-859
Smart city surveillance: Leveraging benefits of cloud data storesFull-text access may be available. Sign in or learn about subscription options.pp. 868-876
Remote subscription management of M2M terminals in 4G cellular wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 877-885
Symbiotic Service Guidance and its application to transport servicesFull-text access may be available. Sign in or learn about subscription options.pp. 893-899
Challenges for RF two-way time-of-flight ranging in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 908-916
Firmware for ensuring realtime radio regulations compliance in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 917-920
Improved tools for indoor ZigBee warwalkingFull-text access may be available. Sign in or learn about subscription options.pp. 921-924
Visualizing large sensor network data sets in space and time with vizzlyFull-text access may be available. Sign in or learn about subscription options.pp. 925-933
O-CTP: Hybrid opportunistic collection tree protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 943-951
On link estimation in dense RPL deploymentsFull-text access may be available. Sign in or learn about subscription options.pp. 952-955
End-to-end security for sleepy smart object networksFull-text access may be available. Sign in or learn about subscription options.pp. 964-972
CachedSensing: Exploring and documenting the environment as a treasure huntFull-text access may be available. Sign in or learn about subscription options.pp. 973-981
Where's the mote? Ask the MoteHunter!Full-text access may be available. Sign in or learn about subscription options.pp. 982-990
Follow @grandma: Long-term device-free localization for residential monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 991-998
Electric appliance classification based on distributed high resolution current sensingFull-text access may be available. Sign in or learn about subscription options.pp. 999-1005
DSKE: Dynamic Set Key EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 1006-1013
A fragile watermarking scheme using prediction modes for H.264/AVC content authenticationFull-text access may be available. Sign in or learn about subscription options.pp. 1014-1021
A prediction based approach to IP tracebackFull-text access may be available. Sign in or learn about subscription options.pp. 1022-1029
Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1030-1037
Malicious WiFi networks: A first lookFull-text access may be available. Sign in or learn about subscription options.pp. 1038-1043
Content discovery in opportunistic content-centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 1044-1052
Content routing algorithms to support Publish/Subscribe in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1053-1060
OpenNetInf - prototyping an information-centric Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 1061-1069
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networksFull-text access may be available. Sign in or learn about subscription options.pp. 1078-1085
Showing 69 out of 69