IEEE Conference on Local Computer Networks 2010 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


35th LCN 2010: Denver, Colorado, USA

jump to- Keynotes
- Wireless Mesh Networks
- Ad-hoc & Sensor Networks (1)
- Security
- Local Area Networks
- Wireless LAN
- The 10th IEEE International Workshop on Wireless Local Networks (WLN 2010)
- The 3rd IEEE Workshop on Wireless and Internet Services (WISe 2010)
- The 5th IEEE LCN Workshop on Network Measurements (WNM 2010)

- > Home > Conferences and Workshops > LCN
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. IEEE Computer Society 2010, ISBN 978-1-4244-8387-7
Keynotes

Andry Rakotonirainy:
Keynote address: On the use of communication-based cooperative systems to improve situation awareness. 1
Mohamed F. Younis:
Keynote address: Restoring connectivity of partially damaged wireless sensor networks. 1
Neal Patwari:
Keynote address: Building RF sensor networks. 1
Tim Yardley:
Keynote address: Developing a testbed for the smart grid. 1
Performance Evaluation

Kazuhisa Matsuzono, Jonathan Detchart, Mathieu Cunche, Vincent Roca, Hitoshi Asaeda
:
Performance analysis of a high-performance real-time application with several AL-FEC schemes. 1-7
Giovanna Carofiglio, Luca Muscariello, Dario Rossi, Claudio Testa:
A hands-on assessment of transport protocols with lower than best effort priority. 8-15
Patrick-Benjamin Bök, Dennis Pielken, York Tüchelmann:
A business process aware semantic QoS provisioning scheme. 16-23
David A. Hayes
, Grenville J. Armitage:
Improved coexistence and loss tolerance for delay based TCP congestion control. 24-31
DTN and VANET

Abdul Razzaq, Ahmed Mehaoua:
Video transport over VANETs: Multi-stream coding with multi-path and network coding. 32-39
Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb:
Look-ahead routing and Message Scheduling in delay-tolerant networks. 40-47
Ahmed Ahizoune, Abdelhakim Hafid, Racha Ben Ali:
A contention-free broadcast protocol for periodic safety messages in vehicular Ad-hoc networks. 48-55
Shabbir Ahmed, Salil S. Kanhere
:
Characterization of a large-scale Delay Tolerant Network. 56-63
Wireless Mesh Networks

Jihene Rezgui, Abdelhakim Hafid, Racha Ben Ali, Michel Gendreau:
A variable neighborhood search method for multi-objective channel assignment problem in Multi-Radio WMNs. 64-71
Geir Egeland, Paal E. Engelstad:
The reliability performance of wireless multi-hop networks with apparent link-failures. 72-79
Carlos Henrique Pereira Augusto, Celso Barbosa Carvalho, Marcel William Rocha da Silva, José Ferreira de Rezende
:
The impact of joint routing and link scheduling on the performance of wireless mesh networks. 80-87
Fariborz Azimi, Peter Bertók
:
An analytical model of TCP flow in multi-hop wireless networks. 88-95
Overlay Networks

Dragan Milic, Torsten Braun
:
NetICE9: A stable landmark-less network positioning system. 96-103
Faraz Ahmed Memon, Frank Dürr, Kurt Rothermel:
Index recommendation tool for optimized information discovery over distributed hash tables. 104-111
Xukang Lu, Qishi Wu, Yunyue Lin, Runzhi Li:
On a decentralized approach to tree construction in hybrid P2P networks. 112-119
Wireless Network Services and Management

Jahan Hassan
, Mahbub Hassan, Sajal K. Das
:
A brinkmanship game theory model for competitive wireless networking environment. 120-127
Yinan Li, Ing-Ray Chen:
APPCCM: Adaptive per-user per-object cache consistency management for mobile client-server applications in wireless mesh networks. 128-135
Dulanjalie C. Dhanapala, Anura P. Jayasumana:
Topology preserving maps from virtual coordinates for wireless sensor networks. 136-143
Ad-hoc & Sensor Networks (1)

Matthias R. Brust
, Carlos H. C. Ribeiro, Damla Turgut, Steffen Rothkugel:
LSWTC: A local small-world topology control algorithm for backbone-assisted mobile ad hoc networks. 144-151
Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning. 152-159
Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Mitigating the effect of interference in Wireless Sensor Networks. 160-167
LCN Poster Presentation

P. Gireesan Namboothiri, Krishna M. Sivalingam:
Capacity analysis of multi-hop wireless sensor networks using multiple transmission channels: A case study using IEEE 802.15.4 based networks. 168-171
Bilel Nefzi, Ye-Qiong Song
:
CoSenS: A collecting and sending burst scheme for performance improvement of IEEE 802.15.4. 172-175
Andreas Noack, Jörg Schwenk:
Group key agreement performance in wireless mesh networks. 176-179
Tiago Cruz
, Paulo Simões
, Patricio Batista, João Almeida, Edmundo Monteiro
, Fernando Bastos:
CWMP extensions for enhanced management of domestic network services. 180-183
Briana Lowe Wellman, Shameka Dawson, Aparna Veluchamy, Monica Anderson
:
Observation-based cooperation in mobile sensor networks: A bio-inspired approach for fault tolerant coverage. 184-187
S. Metcalf Chad, Tracy Camp, Michael Colagrosso, Oliver Chase:
TestbedProfiler: A validation tool for wireless sensor network testbed deployment. 188-191
Fadi Almasalha, Ashfaq A. Khokhar, Rogelio Hasimoto-Beltrán
:
Scalable encryption of variable length coded video bit streams. 192-195
Muhammad Naeem, Vinod Namboodiri, Ravi Pendse:
Energy implication of various VoIP codecs in portable devices. 196-199
Mohamed Aissa, Adel Ben Mnaouer
, Abdelfettah Belghith
:
Strategies and approaches for multicast tree stability. 200-203
Emna Salhi, Samer Lahoud
, Bernard Cousin
:
Joint optimization of monitor location and network anomaly detection. 204-207
Kevin Collins, Gabriel-Miro Muntean
, Stefan Mangold:
Evaluation of dual transceiver approaches for scalable WLAN communications: Exploring the wireless capacity in entertainment parks. 208-211
Toshio Hirotsu, Satoshi Kurihara, Kensuke Fukuda, Osamu Akashi, Hirotake Abe, Toshiharu Sugawara
:
Dynamic and distributed routing control for virtualized local area networks. 212-215
Walid Bechkit, Yacine Challal
, Abdelmadjid Bouabdallah, Ahlem Bencheikh:
An efficient and highly resilient key management scheme for wireless sensor networks. 216-219
Fadi M. Al-Turjman, Hossam S. Hassanein, Mohamed Ibnkahla
:
Quantifying connectivity of grid-based Wireless Sensor Networks under practical errors. 220-223
Vidya Suryanarayana, Amarnath Jasti, Ravi Pendse:
Credit scheduling and prefetching in hypervisors using Hidden Markov Models. 224-227
Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li:
Efficient searching with parallel TCAM chips. 228-321
Charles A. Kamhoua, Niki Pissinou:
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory. 232-235
Stefan Kraxberger:
A scalable secure overlay framework for heterogeneous embedded systems. 236-239
Tao Ma, Michael Hempel
, Kun Hua
, Dongming Peng, Hamid Sharif:
A novel cooperative image transmission scheme in Wireless Sensor Networks. 240-243
Alexander Kurusingal, Ashay Dhamdhere, Vijay Sivaraman:
Modeling signal strength of body-worn devices. 244-247
Imran Rao
, Aaron Harwood
, Shanika Karunasekera
:
A gossip-based asynchronous aggregation protocol for P2P systems. 248-251
Mario Fanelli, Luca Foschini
, Antonio Corradi
, Azzedine Boukerche:
Towards efficient and reliable context data distribution in disaster area scenarios. 252-255
Sejin Choi, Venkatesh Sarangan, Johnson P. Thomas, Sridhar Radhakrishnan:
Secure access control protocol for WSNs with inter-network roaming. 256-259
Burak Kantarci, Hussein T. Mouftah:
Availability and cost constrained fast planning of Passive Optical Networks under various survivability policies. 260-263
Junqi Zhang, Rajan Shankaran
, Mehmet A. Orgun
, Vijay Varadharajan
, Abdul Sattar
:
A trust management architecture for hierarchical wireless sensor networks. 264-267
Ripduman Sohan, Andrew C. Rice, Andrew W. Moore
, Kieran Mansley:
Characterizing 10 Gbps network interface energy consumption. 268-271
Jelle Nelis, Dieter Verslype, Chris Develder
, Lukasz Brewka, Henrik Wessing
, Lars Dittmann
:
Bandwidth reservations in home networks: Performance assessment of UPnP-QoS V3. 272-275
Yaning Liu, Gwendal Simon
:
Distributed delivery system for time-shifted streaming systems. 276-279
Marshall Riley, Kemal Akkaya, Kenny Fong:
Delay-efficient geodynamic group-based authentication in VANETs. 280-283
Atiq Ahmed, Leïla Merghem-Boulahia, Dominique Gaïti, Rana Rahim-Amoud:
Towards a knowledge-based intelligent handover in heterogeneous wireless networks. 284-287
Thais R. M. Braga Silva, Linnyer Beatrys Ruiz, Antonio Alfredo Ferreira Loureiro:
How to conciliate conflicting users' interests for different collective, ubiquitous and context-aware applications? 288-291
Syed Qutub, Tricha Anjali:
Dynamic implementation of network selection policies. 292-295
Hongbo Zou, Wenji Wu
, Xian-He Sun, Phil DeMar, Matt Crawford:
An evaluation of parallel optimization for OpenSolaris® network stack. 296-299
Hao Wang
, Ou Li, Chenda Liao, Zuohua Tian:
Design of adaptive real queue control algorithm supporting TCP flows. 300-303
Jonatan Munoz, Baldomero Coll-Perales
, Javier Gozálvez
:
Research testbed for field testing of Multi-hop Cellular Networks using Mobile Relays. 304-307
Yasuyuki Miura, Masahiro Kaneko, Shigeyoshi Watanabe:
Adaptive routing algorithms and implementation for interconnection network TESH for parallel processing. 308-311
Korbinian Frank, Matthias Röckl, Tom Pfeifer:
Optimizing dynamic composition of Bayesian Networks for context sensing and inference. 312-315
Christian Gottron, Pedro Larbig, André König, Matthias Hollick, Ralf Steinmetz
:
The rise and fall of the AODV protocol: A testbed study on practical routing attacks. 316-319
Daniel Marks, Florian Tschorsch, Björn Scheuermann:
Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlays. 320-323
Muslim Elkotob, Daniel Granlund, Karl Andersson
, Christer Åhlund
:
Multimedia QoE optimized management using prediction and statistical learning. 324-327
Muhammad Jamshed, José Carlos Brustoloni:
In-network server-directed client authentication and packet classification. 328-331
Mohammad Zubair Ahmad, Ratan Guha:
Impact of Internet exchange points on Internet topology evolution. 332-335
Yao Hua Ho
, Kien A. Hua:
Failure-resilient vehicular networks. 336-339
Steffen Bondorf
, Jens B. Schmitt:
Statistical response time bounds in randomly deployed wireless sensor networks. 340-343
Tuan Anh Trinh, László Gyarmati, Gyula Sallai:
Migrating to IPv6: A game-theoretic perspective. 344-347
David A. Miller, Ahmed E. Kamal:
FlexTDMA for delay-stable communications in asynchronous industrial control networks. 348-351
Avinash Mungur
, Christopher Edwards:
Scalability of the Locator Identity Split Mapping Infrastructure to support end-host mobility. 352-355
Christian Hoene, Mansoor Hyder:
Optimally using the Bluetooth subband codec. 356-359
Jun Seok Kang, Seung-Jae Han:
Network selection for heterogeneous multi-service wireless networks. 360-363
Kerri Stone, Doug Hakkarinen, Tracy Camp:
Listening to Everyone's Voice Enhances Learning (LEVEL). 364-367
Xiangyang Zhang, Hossam S. Hassanein
:
TreeClimber: A network-driven push-pull hybrid scheme for peer-to-peer video live streaming. 368-371
Guang Yao, Jun Bi
, Sen Wang, Yueran Zhang, Yitian Li:
A pull model IPv6 Duplicate Address Detection. 372-375
Bogdan Ciubotaru, Gabriel-Miro Muntean
:
QMS-Quality of Multimedia Streaming metric for soft-handover in heterogeneous wireless environments. 376-379
Linoh A. Magagula, H. Anthony Chan, Olabisi Emmanuel Falowo:
Handover coordination with a relay-based design for heterogeneous wireless networks. 380-383
Network Traffic Measurements and Characterization

Vidarshana W. Bandara, Ali Pezeshki, Anura P. Jayasumana:
Modeling spatial and temporal behavior of Internet traffic anomalies. 384-391
Anne Nevin, Peder J. Emstad:
MBAC: The measurement error with non-homogeneous flows. 392-399
Hui Lin, Min Liu, Anfu Zhou, Huasha Liu, Zhongcheng Li:
A novel hybrid probing technique for end-to-end available bandwidth estimation. 400-407
Rodrigo Braga, Edjard de Souza Mota
, Alexandre Passito:
Lightweight DDoS flooding attack detection using NOX/OpenFlow. 408-415
Security

Katrin Hoeper, Lidong Chen:
An inconvenient truth about tunneled authentications. 416-423
Daiki Nobayashi, Takashi Sera, Takeshi Ikenaga
, Yutaka Nakamura, Yoshiaki Hori:
A network reconfiguration scheme against misbehaving nodes. 424-431
Hamdi Eltaief
, Habib Youssef:
RMLCC: Recovery-based multi-layer connected chain mechanism for multicast source authentication. 432-439
Ad-hoc & Sensor Networks (2)

Jie Feng, Derek L. Eager, Dwight J. Makaroff:
Coverage preserving aggregation protocols for dense sensor networks. 440-447
Can Basaran, Kyoung-Don Kang, Mehmet H. Suzer
:
Hop-by-hop congestion control and load balancing in wireless sensor networks. 448-455
Mustafa Ilhan Akbas
, Matthias R. Brust
, Damla Turgut:
SOFROP: Self-organizing and fair routing protocol for wireless networks with mobile sensors and stationary actors. 456-463
Andrew Newell, Kemal Akkaya, Enes Yildiz:
Providing multi-perspective event coverage in wireless multimedia sensor networks. 464-471
Core Networks

Wissam Hamzeh, Abdelhakim Hafid:
A distributed parallel approach for BGP routing table partitioning in next generation routers. 472-479
Uli Alexander Bornhauser, Peter Martini, Martin Horneffer:
Root causes for iBGP routing anomalies. 480-487
Scheduling in Wireless Networks

Jeremy Gribben, Azzedine Boukerche:
Localization scheduling in wireless ad hoc networks. 512-519
Rukhsana Ruby, Amr Mohamed
, Victor C. M. Leung
:
Utility-based uplink scheduling algorithm for enhancing throughput and fairness in relayed LTE networks. 520-527
Lucas Vespa, Ning Weng:
Quality-aware scheduling metrics for adaptive sensor networks. 528-535
Peer-to-peer Networks

Jason But, Philip Branch, Tung Le:
Rapid Identification of BitTorrent traffic. 536-543
Shun Kit Kwan, Jogesh K. Muppala:
Bag-of-Tasks applications scheduling on volunteer desktop grids with adaptive information dissemination. 544-551
Anupam Das, Mohammad Mahfuzul Islam:
A novel feedback based fast adaptive trust model for P2P networks. 552-559
Wireless LAN

Jing Xie, Yuming Jiang
:
A network calculus approach to delay evaluation of IEEE 802.11 DCF. 560-567
Zhe Wang, Mahbub Hassan, Tim Moors:
A study of spatial packet loss correlation in 802.11 wireless networks. 568-575
Hyeonmok Ko, Jongmin Shin, Dongho Kwak, Cheeha Kim:
A joint approach to bandwidth allocation and AP-client association for WLANs. 576-581
Energy Efficiency in Wireless Networks

Khaled Almiani
, Anastasios Viglas, Lavy Libman:
Energy-efficient data gathering with tour length-constrained mobile elements in wireless sensor networks. 582-589
Anwar Al-Khateeb, Luciano Lavagno:
MEOW: Model-based design of an energy-optimized protocol stack for wireless sensor networks. 590-597
Andreas Reinhardt
, Parag S. Mogre, Tobias Koenig, Ralf Steinmetz
:
SFHC.KOM: Stateful header compression for wireless sensor networks. 598-605
The 4th IEEE LCN Workshop On User MObility and VEhicular Networks (ON-MOVE 2010)
On-Move Vehicular Communications Applications

Ramon Bauza, Javier Gozálvez
, Joaquín Sánchez-Soriano
:
Road traffic congestion detection through cooperative Vehicle-to-Vehicle communications. 606-612
Annette Böhm, Kristoffer Lidström, Magnus Jonsson, Tony Larsson:
Evaluating CALM M5-based vehicle-to-vehicle communication in various road settings through field trials. 613-620
On-Move Posters, Demos and Coffee

Fadel M. Adib, Hazem M. Hajj:
VSpyware: Spyware in VANETs. 621-624
Karel De Vogeleer, Selim Ickin, David Erman, Markus Fiedler:
PERIMETER: A user-centric mobility framework. 625-626
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker
:
Active radar - A cooperative approach using multicarrier communication. 627-630
On-Move Vehicular Communications Protocols

Mohammad S. Almalag, Michele C. Weigle:
Using traffic flow for cluster formation in vehicular ad-hoc networks. 631-636
Sarah Sharafkandi, David H. C. Du:
A new MAC layer protocol for safety communication in dense vehicular networks. 637-644
On-Move Mobile Users Localization

Xin Liu, Carey Williamson, Jon G. Rokne:
Physics-based modeling of skier mobility and avalanche rescue in mountainous terrain. 645-652
Stefan Aust, Tetsuya Ito, Peter Davis:
Seamless indoor/outdoor location cognition with confidence in wireless systems. 653-657
On-Move Mobility Management

Satoko Itaya, Naoki Yoshinaga, Hirohiko Ito, Rie Tanaka, Taku Konishi, Shinichi Doi, Keiji Yamada:
Proposal of user-collaborative mobile object assignment system. 658-662
Selim Ickin
, Karel De Vogeleer, Markus Fiedler, David Erman:
The effects of Packet Delay Variation on the perceptual quality of video. 663-668
The 10th IEEE International Workshop on Wireless Local Networks (WLN 2010)
WLN Wireless Networks 1

Almudena Konrad:
Realistic link modeling and simulation using WiLinkSim. 669-675
Yonglin Ren, Azzedine Boukerche, Lynda Mokdad:
A novel framework of secure network management for wireless and mobile networks. 676-683
Zhenxia Zhang, Richard W. Pazzi, Azzedine Boukerche:
A fast MAC layer handoff protocol for WiFi-based wireless networks. 684-690
Ahmed Hasswa, Hossam S. Hassanein
:
Managing Presence and Policies in Social Network dependent systems. 691-698
WLN Wireless Sensor Networks

Shanthi Vemulapalli, Kemal Akkaya:
Mobility-based self route recovery from multiple node failures in mobile sensor networks. 699-706
Sanjaya Gajurel, Mark Heiferling:
Swarm intelligent routing solution for Wireless Sensor Networks. 707-714
Fadi M. Al-Turjman, Ashraf E. Al-Fagih, Hossam S. Hassanein, Mohamed Ibnkahla
:
Deploying fault-tolerant grid-based wireless sensor networks for environmental applications. 715-722
Namita Sapre, Mohamed F. Younis, Tim Oates:
Energy efficient node engagement strategies for achieving data fidelity in wireless sensor networks. 723-729
WLN Wireless Networks 2

Lei Zhao, Xiaoyan Hong, Bo Gu:
Handshake time and transmission rate of 802.11g measurement in vehicular networks. 730-736
Youngpo Lee, Chonghan Song, Seung Goo Kang, Junhwan Kim, Seokho Yoon:
An asynchronous cooperative transmission scheme. 737-740
Murali Krishna Kadiyala, Santosh Paradi, Ravi Pendse:
The impact of Medium Access Delays on the packet service-time in saturated ad hoc networks. 741-744
WLN Short Papers and Posters

Ahmed Iyanda Sulyman, Yousef Abdullah Al-Zahrani, Saeed Al-Dosari
, Abdulhameed M. Al-Sanie, Saleh Al-Shebeili:
A two-stage constellation partition algorithm for reduced-complexity MIMO-MLD systems. 745-748
Ahmed Iyanda Sulyman:
Using threshold-based PUSC for throughput enhancement in WiMAX OFDMA. 749-751
Fahad Samad, Sadeq Ali Makram:
Adaptive security established on the requirements and resource abilities of network nodes. 752-755
Youngyoon Lee, Dahae Chong, Chonghan Song, Seokho Yoon:
A frequency ambiguity resolution for digital video broadcasting-terrestrial service. 756-759
Andre R. Hirakawa, Moacyr Martucci, Thomas C. G. Vilhena, Silvio M. Amancio, Jose C. V. Lemos:
Wireless image transmission in electric power hostile environment. 760-763
The 6th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet 2010)
P2MNET Wireless Networks

Mariem Zekri, Badii Jouaber, Djamal Zeghlache
:
Context aware vertical handover decision making in heterogeneous wireless networks. 764-768
Pandeli Kolomitro, Abd-Elhamid M. Taha, Hossam S. Hassanein
:
A performance comparison of frame structures in WiMax relay networks. 769-776
Ben Pearre:
Model-free trajectory optimisation for wireless data ferries. 777-784
P2MNET Wireless Mesh and Sensor Networks

Jalel Ben-Othman
, Lynda Mokdad, Mohamed Ould Cheikh:
On improving the performance of IEEE 802.11s based wireless mesh networks using directional antenna. 785-790
Jean-Charles Grégoire, Stéphane Davy:
Performance of multi-radio wireless mesh networks: An experimental approach. 791-798
Nathalie Dessart, Philippe Hunel, Hacène Fouchal
, Nicolas Vidot:
Population protocol over Wireless Sensor Networks. 799-805
Mustafa Ilhan Akbas
, Matthias R. Brust
, Damla Turgut:
Local positioning for environmental monitoring in wireless sensor and actor networks. 806-813
W3C: P2MNET Mobile Ad-hoc and Ubiquitous Networks

Mohammad Asadul Hoque, Xiaoyan Hong, Md. Ashfakul Islam, Kazi Zunnurhain:
Delay analysis of Wireless Ad Hoc networks: Single vs. multiple radio. 814-820
Bashir Yahya, Jalel Ben-Othman
:
A peer-to-peer based naming system for Mobile Ad Hoc Networks. 821-826
Fatma Outay
, Véronique Vèque, Ridha Bouallegue
:
An efficient performance comparison of two cross-layer service discovery designs in MANET: BF-SD-ZRP versus SD-OLSR. 827-834
Vitalis G. Ozianyi, Neco Ventura
:
Real-time resource sharing through service outsourcing. 835-842
P2MNET Ubiquitous and Multimedia Networks

Martin Kennedy, Hrishikesh Venkataraman, Gabriel-Miro Muntean
:
Battery and Stream-Aware Adaptive Multimedia Delivery for wireless devices. 843-846
Muhammad Waheed, Anni Cai:
Low complexity algorithms for transmit antenna selection in cognitive MIMO system. 847-850
Alexander García Dávalos
, Lina Escobar, Andrés Navarro Cadavid
, Adriana Arteaga
, Fabio G. Guerrero
, Carlos Salazar:
Performance evaluation of Vertical Handoff Algorithms. 851-857
Kaouther Abrougui, Azzedine Boukerche, Richard Werner Nelem Pazzi
:
Context-aware and location-based service discovery protocol for Vehicular Networks: Proof of correctness. 858-865
The 5th IEEE International Workshop on Practical Issues In Building Sensor Network Applications (SenseApp 2010)
SenseApp Applications

Asis Nasipuri, Robert Cox, James Conrad, Luke Van der Zel, Bienvenido Rodriguez, Ralph McKosky:
Design considerations for a large-scale wireless sensor network for substation monitoring. 866-873
Yuyan Xue, Byrav Ramamurthy, Mark Burbach:
A two-tier Wireless Sensor Network infrastructure for large-scale real-time groundwater monitoring. 874-881
Tomasz Naumowicz, Robin Freeman
, Holly Kirk
, Ben Dean, Martin Calsyn, Achim Liers, Alexander Brändle, Tim Guilford, Jochen H. Schiller
:
Wireless Sensor Network for habitat monitoring on Skomer Island. 882-889
Farid Zaid, Diego Costantini, Parag S. Mogre, Andreas Reinhardt
, Johannes Schmitt, Ralf Steinmetz
:
WBroximity: Mobile participatory sensing for WLAN- and Bluetooth-based positioning. 890-896
SenseApp Algorithms and Protocols

Morten Tranberg Hansen, Edoardo Biagioni
:
BTP: A Block Transfer Protocol for delay tolerant wireless sensor networks. 897-904
Eugen Berlin, Kristof Van Laerhoven
:
An on-line piecewise linear approximation technique for wireless sensor networks. 905-912
Jong Hyun Lim, Andreas Terzis, I-Jeng Wang:
Tracking a non-cooperative mobile target using low-power pulsed Doppler radars. 913-920
Giorgio Quer, Davide Zordan, Riccardo Masiero, Michele Zorzi, Michele Rossi:
WSN-Control: Signal reconstruction through Compressive Sensing in Wireless Sensor Networks. 921-928
SenseApp Poster Session, Coffee and Tea

JaeJun Yoo, DoHyun Kim, JongHyun Park:
Design and implementation of magnetic sensor network for detecting automobiles. 929-932
Yin Chen, Qiang Wang
, Jayant Gupchup, Andreas Terzis:
Tempo: An energy harvesting mote resilient to power outages. 933-934
Sebastian Zöller, Andreas Reinhardt
, Marek Meyer, Ralf Steinmetz
:
A concept for cross-layer optimization of wireless sensor networks in the logistics domain by exploiting business knowledge. 935-937
SenseApp Experimentation and Hardware

Ashay Dhamdhere, Hao Chen, Alexander Kurusingal, Vijay Sivaraman, Alison J. Burdett:
Experiments with wireless sensor networks for real-time athlete monitoring. 938-945
Stephan Sommer, Alois C. Knoll
, Christian Buckl, Gerd Bauer, Jens Schulz:
MultiNet: An intelligent sensor cable. 946-952
Marcel Baunach
:
Collaborative memory management for reactive sensor/actor systems. 953-960
Mateus A. S. Santos, Cíntia B. Margi
, Marcos A. Simplício Jr.
, C. C. F. Pereira Geovandro, Bruno Trevizan de Oliveira:
Implementation of data survival in unattended Wireless Sensor Networks using cryptography. 961-967
The 3rd IEEE Workshop on Wireless and Internet Services (WISe 2010)

Andrzej Szwabe
, Pawel Misiorek
, Adam Nowak, Jacek Marchwicki:
Implementation of backpressure-based routing integrated with Max-Weight Scheduling in a wireless multi-hop network. 983-988
Youcef Begriche, Ahmed Serhrouchni:
Bayesian statistical analysis for spams. 989-992
Eun-Sung Kim, Yu-Seok Lee, Wang-Cheol Song:
JXTA based content-sharing application. 993-996
The 6th LCN Workshop on Security in Communications Networks (SICK 2010)

André Egners, Ulrike Meyer:
Wireless Mesh Network security: State of affairs. 997-1004
Matthäus Wander, Arno Wacker, Torben Weis
:
Towards peer-to-peer-based cryptanalysis. 1005-1012
The 1st Workshop on Smart Grid Networking Infrastructure (SGNI 2010)
SGNI Underlying Architecture for Smart Grid
SGNI PHEV Charging and Real-time Energy Billing

Melike Erol-Kantarci
, Hussein T. Mouftah:
Prediction-based charging of PHEVs from the smart grid with dynamic pricing. 1032-1039
Matthieu-P. Schapranow
, Ralph Kühne, Alexander Zeier, Hasso Plattner:
Enabling real-time charging for smart grid infrastructures using in-memory databases. 1040-1045
The 5th IEEE LCN Workshop on Network Measurements (WNM 2010)

Takeshi Kitahara, Antti Riikonen, Heikki Hämmäinen:
Characterizing traffic generated with laptop computers and mobile handsets in GPRS/UMTS core networks. 1046-1053
Varun Vora, Timothy Brown:
High rate video streaming over 802.11n in dense Wi-Fi environments. 1054-1061
Yu Xiao, Lin Xia:
Understanding opinion leaders in bulletin board systems: Structures and algorithms. 1062-1067
Mohammad Hamed Firooz, Sumit Roy, Linda Bai, Christopher Lydick:
Link failure monitoring via network coding. 1068-1075
Archi Delphinanto, Ton Koonen
, Shuang Zhang, Frank T. H. den Hartog:
Path capacity estimation in heterogeneous, best-effort, small-scale IP networks. 1076-1083

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







