Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCNW
LCNW 2012
Generate Citations
2012 IEEE 37th Annual Conference on Local Computer Networks (LCN 2012)
Oct. 22 2012 to Oct. 25 2012
Clearwater, FL
Table of Contents
Keynote by Kevin Fall, Qualcomm
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxiii-xxxiii
by
Kevin Fall
Keynote by Prof. Mark Crovella, Boston University
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxiv-xxxiv
Welcome messages
Freely available from IEEE.
pp. xxxv-xxxv
Best Paper Awards for prior IEEE local computer networks conferences
Freely available from IEEE.
pp. xxxix-xxxix
Workshops
Freely available from IEEE.
pp. lxxiii-lxxiii
Welcome message from the goSMART chairs
Freely available from IEEE.
pp. lxxiv-lxxv
by
Satoko Itaya
,
Salil Kanhere
,
Stefan Aust
Welcome message from the ON-MOVE chairs
Freely available from IEEE.
pp. lxxvi-lxxvi
by
Soumaya Cherkaoui
,
Robert Brännström
Welcome message from the P2MNET chairs
Freely available from IEEE.
pp. lxxvii-lxxviii
by
Albert Y. Zomaya
,
Mohamed Younis
,
Javid Taheri
Welcome message from the SenseApp chairs
Freely available from IEEE.
pp. lxxix-lxxx
by
Salil Kanhere
,
Matthias Hollick
Welcome message from the WASA-NGI-V chairs
Freely available from IEEE.
pp. lxxxi-lxxxii
by
Roland Bless
,
Boris Koldehofe
,
Oliver Waldhorst
Welcome message from the SICK chairs
Freely available from IEEE.
pp. lxxxiii-lxxxiv
by
Katrin Hoeper
,
Charles Clancy
Welcome message from the WLN chairs
Freely available from IEEE.
pp. lxxxv-lxxxvi
by
Hazem Refai
,
Fadi Al-Turjman
EpidemicSim: Epidemic simulation system with realistic mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 659-665
by
Steven Kopman
,
Mustafa Ilhan Akbaş
,
Damla Turgut
Handoff in mobile WiMAX: Forced handoff scheme with load balancing in mobile WiMAX networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 666-672
by
Shahab Hussain
,
Syed Rashid Zaidi
,
Roger Dorsinville
,
Mohamed A. Ali
,
Georgios Ellinas
An enhanced media independent handover framework for vertical handover decision making based on networks' reputation
Full-text access may be available. Sign in or learn about subscription options.
pp. 673-678
by
Mariem Zekri
,
Badii Jouaber
,
Djamal Zeghlache
Performance evaluation of a real long term evolution (LTE) network
Full-text access may be available. Sign in or learn about subscription options.
pp. 679-685
by
Volkan Sevindik
,
Jiao Wang
,
Oguz Bayat
,
Jay Weitzen
Evaluation of performance and scalability of routing protocols for VANETs on the Manhattan Mobility Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 686-693
by
Michael Taynnan Barros
,
Reinaldo Gomes
,
Anderson Costa
,
Runxin Wang
Performance evaluation of video dissemination protocols over Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 694-701
by
Farahnaz Naeimipoor
,
Cristiano Rezende
,
Azzedine Boukerche
Research and simulation of transport protocols optimization on wireless multi-hop networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 702-709
by
Weifeng Sun
,
Haotian Wang
,
Mingchu Li
,
Mengci Zhou
,
Zhenquan Qin
Efficient movement control actor relocation for honing connected coverage in wireless sensor and actor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 710-717
by
Muhammad Imran
,
Noman Haider
,
Mohammed Alnuem
The implementation of novel idea of translation matrix to maintain QoS for a roaming user between heterogeneous 4G wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 718-725
by
Mohsin Iftikhar
,
Mansour Zuair
,
Abdul Malik Bacheer Rahhal
,
Mohamad Mahmoud Alrahhal
,
Javid Taheri
,
Albert Y. Zomaya
,
Bjorn Landfeldt
DSS: Dynamic Switching Sets for prolonging network lifetime in sensor nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 726-731
by
Amjed Majeed
,
Tanveer A Zia
Impact weighted uptime in hierarchical LTE networks: Application and measurement
Full-text access may be available. Sign in or learn about subscription options.
pp. 732-736
by
Yaakov Kogan
,
Jeremy Palmer
,
Ron Reiswig
,
David Smith
Designing and predicting QoS of a wireless system for medical telemetry
Full-text access may be available. Sign in or learn about subscription options.
pp. 737-744
by
Juyoung Park
,
Jaemyoun Lee
,
Kyungtae Kang
Flexible polling-based scheduling with QoS capability for Wireless Body Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 745-752
by
Shusaburo Motoyama
Wireless sensor network for habitat monitoring: A counting heuristic
Full-text access may be available. Sign in or learn about subscription options.
pp. 753-760
by
Erick Stattner
,
Nicolas Vidot
,
Philippe Hunel
,
Martine Collard
Adaptive channel selection control saving its redundant usage based on hidden stations in wireless access networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 761-766
by
Yosuke Tanigawa
,
Shintaro Matsuda
,
Hideki Tode
Energy and terrain aware connectivity restoration in disjoint Mobile Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 767-774
by
Izzet Senturk
,
Kemal Akkaya
RFID tags authentication by unique hash sequence detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 775-781
by
Abdallah Y. Alma'aitah
,
Hossam S. Hassanein
,
Mohamed Ibnkahla
Argumentation based negotiation in cognitive radio networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 782-789
by
Brent Horine
,
Ladislau Bölöni
,
Damla Turgut
Characterization of a 3G EV-DO network - A measurement study
Full-text access may be available. Sign in or learn about subscription options.
pp. 790-798
by
Zhe Zhou
,
Mark Claypool
,
Robert Kinicki
Unified channel assignment for unicast and broadcast traffic in Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 799-806
by
Adil Kamal Mir
,
Ahmed Akram
,
Ejaz Ahmed
,
Junaid Qadir
,
Adeel Baig
Long-term proportional fairness over multiple cells
Full-text access may be available. Sign in or learn about subscription options.
pp. 807-813
by
Hatem Abou-zeid
,
Stefan Valentin
,
Hossam S. Hassanein
Mobile e-services using HTML5
Full-text access may be available. Sign in or learn about subscription options.
pp. 814-819
by
Karl Andersson
,
Dan Johansson
RSSI-based localization in cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 820-826
by
Lei Wang
,
Maciej Zawodniok
A pricing scheme for porter based delivery in integrated RFID-Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 827-834
by
Ashraf E. Al-Fagih
,
Sharief M. A. Oteafy
,
Hossam S. Hassanein
Towards provisioning vehicle-based rural information services
Full-text access may be available. Sign in or learn about subscription options.
pp. 835-842
by
Sherin Abdel Hamid
,
Mervat Abu-Elkheir
,
Hossam S. Hassanein
,
Glen Takahara
A new stability based clustering algorithm (SBCA) for VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 843-847
by
Ahmed Ahizoune
,
Abdelhakim Hafid
Performance and fairness analysis of range control algorithms in cooperative vehicle safety networks at intersections
Full-text access may be available. Sign in or learn about subscription options.
pp. 848-855
by
Neda Nasiriani
,
Yaser P. Fallah
Smart City: The smart sewerage
Full-text access may be available. Sign in or learn about subscription options.
pp. 856-859
by
Daniel Granlund
,
Robert Brännström
On the interplay of open data, cloud services and network providers towards electric mobility in smart cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 860-867
by
Nikolay Tcholtchev
,
Lena Farid
,
Florian Marienfeld
,
Ina Schieferdecker
,
Benjamin Dittwald
,
Evanela Lapi
Smart city surveillance: Leveraging benefits of cloud data stores
Full-text access may be available. Sign in or learn about subscription options.
pp. 868-876
by
Swarnava Dey
,
Ankur Chakraborty
,
Soumitra Naskar
,
Prateep Misra
Remote subscription management of M2M terminals in 4G cellular wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 877-885
by
Isam Abdalla
,
Subbarayan Venkatesan
Towards Smart Berlin - an experimental facility for heterogeneous Smart City infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 886-892
by
Felix Juraschek
,
Anatolij Zubow
,
Oliver Hahm
,
Markus Scheidgen
,
Bastian Blywis
,
Robert Sombrutzki
,
Mesut Günes
,
Joachim Fischer
Symbiotic Service Guidance and its application to transport services
Full-text access may be available. Sign in or learn about subscription options.
pp. 893-899
by
Satoko Itaya
,
Naoki Yoshinaga
,
Rie Tanaka
,
Taku Konishi
,
Shin-ichi Doi
,
Keiji Yamada
,
Peter Davis
Role-based urban post-disaster mobility model for search and rescue operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 900-907
by
Diego Costantini
,
Mathieu Münch
,
Alessandro Leonardi
,
Válter Rocha
,
Parag S. Mogre
,
Ralf Steinmetz
Challenges for RF two-way time-of-flight ranging in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 908-916
by
Sebastian Bader
,
Bengt Oelmann
,
Michael Brünig
Firmware for ensuring realtime radio regulations compliance in WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 917-920
by
Mitko Tanevski
,
Alexis Boegli
,
Pierre-André Farine
Improved tools for indoor ZigBee warwalking
Full-text access may be available. Sign in or learn about subscription options.
pp. 921-924
by
Benjamin W. Ramsey
,
Barry E. Mullins
,
Edward D. White
Visualizing large sensor network data sets in space and time with vizzly
Full-text access may be available. Sign in or learn about subscription options.
pp. 925-933
by
Matthias Keller
,
Jan Beutel
,
Olga Saukh
,
Lothar Thiele
Diagnosing the weakest link in WSN testbeds: A reliability and cost analysis of the USB backchannel
Full-text access may be available. Sign in or learn about subscription options.
pp. 934-942
by
Pablo E. Guerrero
,
Iliya Gurov
,
Alejandro Buchmann
,
Kristof Van Laerhoven
O-CTP: Hybrid opportunistic collection tree protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 943-951
by
Joakim Flathagen
,
Erlend Larsen
,
Paal E. Engelstad
,
Øivind Kure
On link estimation in dense RPL deployments
Full-text access may be available. Sign in or learn about subscription options.
pp. 952-955
by
Sébastien Dawans
,
Simon Duquennoy
,
Olivier Bonaventure
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 956-963
by
Thomas Kothmayr
,
Corinna Schmitt
,
Wen Hu
,
Michael Brünig
,
Georg Carle
End-to-end security for sleepy smart object networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 964-972
by
Mohit Sethi
,
Jari Arkko
,
Ari Keränen
CachedSensing: Exploring and documenting the environment as a treasure hunt
Full-text access may be available. Sign in or learn about subscription options.
pp. 973-981
by
Delphine Christin
,
Carsten Büttner
,
Nicolas Repp
Where's the mote? Ask the MoteHunter!
Full-text access may be available. Sign in or learn about subscription options.
pp. 982-990
by
Csaba Kiraly
,
Gian Pietro Picco
Follow @grandma: Long-term device-free localization for residential monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 991-998
by
Ossi Kaltiokallio
,
Maurizio Bocca
,
Neal Patwari
Electric appliance classification based on distributed high resolution current sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 999-1005
by
Andreas Reinhardt
,
Dominic Burkhardt
,
Manzil Zaheer
,
Ralf Steinmetz
DSKE: Dynamic Set Key Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 1006-1013
by
Galen E. Pickard
,
Roger I. Khazan
,
Benjamin W. Fuller
,
Joseph A. Cooley
A fragile watermarking scheme using prediction modes for H.264/AVC content authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1014-1021
by
Nasir Mehmood
,
Mubashar Mushtaq
A prediction based approach to IP traceback
Full-text access may be available. Sign in or learn about subscription options.
pp. 1022-1029
by
Ankunda R. Kiremire
,
Matthias R. Brust
,
Vir V. Phoha
Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1030-1037
by
William S. Hortos
Malicious WiFi networks: A first look
Full-text access may be available. Sign in or learn about subscription options.
pp. 1038-1043
by
Andrew Zafft
,
Emmanuel Agu
Content discovery in opportunistic content-centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1044-1052
by
Carlos Anastasiades
,
Arian Uruqi
,
Torsten Braun
Content routing algorithms to support Publish/Subscribe in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1053-1060
by
Stephan Schnitzer
,
Hugo Miranda
,
Boris Koldehofe
OpenNetInf - prototyping an information-centric Network Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1061-1069
by
Christian Dannewitz
,
Matthias Herlich
,
Holger Karl
Node-oriented Internet Protocol: A novel concept for enhancement of mobility and multi-homing in Future Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1070-1077
by
Alexander Gladisch
,
Robil Daher
,
Djamshid Tavangarian
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1078-1085
by
Mohammad Zubair Ahmad
,
Ratan Guha
Showing 69 out of 69