37th Annual IEEE Conference on Local Computer Networks
Final Technical Program [v.2012-10-03]
Sunday, October 21
16:00 - 19:00
Wine&Cheese Reception and Early Registration
Monday, October 22
08:00 - 08:30
Registration
08:45 - 09:00
SenseApp: Welcome and Introductions
09:00 - 09:55
SenseApp: Practical Aspects of Wireless Communications
- 09:00 Challenges for RF Two-Way Time-of-Flight Ranging in Wireless Sensor Networks
- pp. 912-920
- 09:25 Firmware for Ensuring Realtime Radio Regulations Compliance in WSN
- pp. 921-924
- 09:40 Improved Tools for Indoor ZigBee Warwalking
- pp. 925-928
10:00 - 10:30
Coffee break
10:30 - 11:30
SenseApp Keynote: Prof. Andreas Terzis, John Hopkins University, USA
Abstract: In this talk I will present our experiences from designing and deploying three very different applications in the general domain of Wireless Health Care. The first one is the MEDiSN system designed to monitor the vital signs of ambulatory patients in hospitals' Emergency Rooms. Three generations of the MEDiSN system have been deployed for multiple months at the Johns Hopkins Hospital supporting three clinical studies. The second system, is an "exer-game" based on the Nintendo Wii, designed to motivate low-income, older adults to improve their balance through low intensity exercises. The game application is supplemented by a cellphone application that delivers customized alerts and questionnaires to the system's participants. This application was deployed in 20 homes in Baltimore and demonstrated quantitative improvement in lower-body strength and general well-being for the study's participants. Finally, I will present a system that we developed recently to estimate the caloric expenditure of bicyclists using cellphones. The system demonstrates that "virtual" sensors (i.e., estimated of calories burned through models of the biker's effort as a function of speed and terrain incline) can achieve equal accuracy as physical sensors while significantly reducing the system's complexity. I will use these three examples to present lessons learned and outstanding challenges in this application domain. -
Biography: Andreas Terzis is an Associate Professor in the Department of Computer Science at Johns Hopkins University, where he heads the Hopkins InterNetworking Research (HiNRG) Group. His research interests are in the broad area of wireless sensor networks, including protocol design, system support, and data management. Dr. Terzis is a recipient of the NSF CAREER award.
11:30 - 12:20
SenseApp: Testbeds and Tools
- 11:30 Visualizing Large Sensor Network Data Sets in Space and Time with Vizzly
- pp. 929-937
- 11:55 Diagnosing the Weakest Link in WSN Testbeds: A Reliability and Cost Analysis of the USB Backchannel
- pp. 938-946
12:30 - 13:30
Lunch break
13:30 - 15:00
SenseApp: Protocols and Security
- 13:30 O-CTP: Hybrid Opportunistic Collection Tree Protocol for Wireless Sensor Networks
- pp. 947-955
- 13:55 On Link Estimation in Dense RPL Deployments
- pp. 956-959
- 14:10 A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication
- pp. 960-967
- 14:35 End-to-end Security for Sleepy Smart Object Networks
- pp. 968-976
13:30 - 13:35
WASA-NGI: Opening
SICK: Opening
13:35 - 15:00
WASA-NGI: Content- and Information-Centric Networking
- 13:35 Content Discovery in Opportunistic Content-Centric Networks
- pp. 1048-1056
- 14:03 Content Routing Algorithms to Support Publish/Subscribe in Mobile Ad Hoc Networks
- pp. 1057-1064
- 14:31 OpenNetInf - Prototyping an Information-Centric Network Architecture
- pp. 1065-1073
13:35 - 14:10
SICK Keynote: Deborah Monks, Director Portfolio Strategy, Motorola Solutions, Inc.
Abstract: It is vital for first responders arriving at a scene of a crime, fire, natural disaster or terrorist attack to quickly set up a public safety communication network for accessing critical information and to better coordinate their efforts. Such first responders would benefit from accessing video images of a crime in progress, streaming video from and to emergency vehicles, downloading building plans of a burning building, and accessing national crime data bases for accurate information about a subject.
Emergencies like 9/11 and Hurricane Katrina have painfully illustrated the lack of such solutions, especially in terms of interoperability, when different law enforcement agencies could not talk to each other. This keynote will discuss the challenges for efficiently and securely establishing group communications across multiple agencies at a scene when power and communication infrastructures are destroyed or unavailable. Any solution needs to take into account the unique security requirements of public safety communications that need to be met even in the harshest and most time-critical environments.
14:10 - 15:00
SICK: Key Distribution and Watermarking
- 14:10 DSKE: Dynamic Set Key Encryption
- pp. 1010-1017
- 14:35 A Fragile Watermarking Scheme Using Prediction Modes for H.264/AVC Content Authentication
- pp. 1018-1025
15:00 - 15:30
Tea break
15:30 - 17:10
SenseApp: Applications and Experience
- 15:30 CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt
- pp. 977-985
- 15:55 Where's the Mote? Ask the MoteHunter!
- pp. 986-994
- 16:20 Follow @grandma: Long-Term Device-Free Localization for Residential Monitoring
- pp. 995-1002
- 16:45 Electric Appliance Classification Based on Distributed High Resolution Current Sensing
- pp. 1003-1009
15:30 - 16:15
WASA-NGI Keynote: Prof. Thomas Magedanz, Fraunhofer FOKUS, Germany
Abstract: Thanks to the ongoing convergence of telecommunications, Internet and entertainment, and the increasing adoption of Internet technologies in our daily lives, we are moving rapidly into a world of total interconnection of humans and machines. This means that after fixed mobile convergence (FMC) and voice data integration, which has coined the evolution of telecommunication infrastructures in the last decade, we are now witnessing the start of a much broader convergence of quite different application domains with different value chains and technologies. This convergence is driven by the adoption and extension of Internet technologies in various application domains under the banner of the Future Internet (FI), which today is getting a lot of attention by the increasing notion of Smart Cities, the Internet of services (IoS), Internet of Things (IoT) and Machine to Machine (M2M) communications. Thus different transport and control platforms need to be integrated into a future Internet service platform enabling an open set of application domains by so-called common or generic enablers on top of different fixed and mobile network infrastructures.
This talk will provide a review of relevant control platforms and the related standards in the context of fixed and mobile Next Generation Network (NGN) evolution towards the Future Internet (FI). Starting from Intelligent Networks (IN) we will look at the 3GPP IP Multimedia Subsystem (IMS), the 3GPP Evolved Packet Core (EPC) and emerging 3GPP Machine Type Communications (MTC) platforms. In addition, we will review relevant Service Delivery Platform (SDP) concepts and related service enablers and Application Programming Interfaces (APIs) as defined by ETSI, 3GPP, GSMA and OMA for enabling seamlessly various applications on top of fixed and mobile networks. Also we briefly touch the current state of the art in international Future Internet research, particularly looking at the European FI PPP Initiative.
Finally, the talk terminates with a short introduction to relevant toolkits and laboratories from Fraunhofer FOKUS and Technical University Berlin, enabling rapid prototyping for academic and industry research in the context of Smart Cities. Thus we will briefly look at the Open IMS Core (www.openimscore.org), OpenEPC (www.openepc.net), and the new OpenMTC (www.open-MTC.org) toolkits, as well as the FUSECO-Playground (www.fuseco-playground.org) enabling comprehensive prototyping in the context of smart city infrastructures and applications.
15:30 - 16:30
SICK Panel: Secure Group Communications
A diverse panel of experts will explore government, standardization, public safety, research, and industry aspects of “Secure Group Communications”. The panelists include Dr. Lily Chen (National Institute of Standards and Technology), Dr. Tim Strayer (BBN), Ms. Deborah Monks (Motorola Solutions), and Mr. William Supernor (KoolSpan). After the panelists present their own views and experience on the topic, the panel will be opened for a Q&A session.
16:30 - 17:30
WASA-NGI: Routing and Internet Topology
- 16:30 Node-oriented Internet Protocol: A Novel Concept for Enhancement of Mobility and Multi-homing in Future Internet
- pp. 1074-1081
- 17:00 Analysing Global Triangle Inequality Violations Due to Internet eXchange Points for Future Overlay Networks
- pp. 1082-1089
16:30 - 17:45
SICK: Network Security
- 16:30 A Prediction Based Approach to IP Traceback
- pp. 1026-1033
- 16:55 Bio-Inspired, Cross-Layer Protocol Design for Intrusion Detection and Identification in Wireless Sensor Networks
- pp. 1034-1041
- 17:20 Malicious WiFi Networks: A First Look
- pp. 1042-1047
17:10 - 17:20
SenseApp: Wrap-Up and Conclusion
18:00 - 18:00
Workshops Monday - End of the technical program
Tuesday, October 23
08:00 - 08:20
Registration
08:20 - 08:40
Opening: Heather Kenyon, Tampa Bay Technology Forum, CEO and President
08:40 - 09:00
LCN Chair messages
09:00 - 10:00
Keynote 1: Dr. Kevin Fall, Qualcomm
Abstract: Delay-Tolerant Networking and Information-Centric Networking represent two new approaches to networking that have been proposed by the research community over the last few years. DTN has explored methods to interconnect networks with various naming, routing and delivery semantics with store-carry-forward delay-tolerant operations, while several ICN-related projects are exploring the naming of data objects instead of nodes, in-network caching and routing, and support for a form of delay-tolerance as a byproduct.
In this talk I will cover the basic goals and results of each style of networking, and highlight common lessons learned that contrast the benefits of these approaches with the current IP-based Internet architecture.
10:00 - 10:30
Coffee break
10:30 - 12:00
1A: Plenary session: Best Paper Candidates
- 10:30 Facilitating Non-Collocated Coexistence for WiFi and 4G Wireless Networks
- pp. 1-9
- 11:00 A Privacy-Preserving Reputation System for Participatory Sensing
- pp. 10-18
- 11:30 Secure Sensor Network SUM Aggregation with Detection of Malicious Nodes
- pp. 19-27
12:00 - 13:20
Lunch break
13:20 - 15:00
2A: Mobility Modeling and Management in Wireless Networks
- 13:20 Interconnecting Disjoint Network Segments Using a Mix of Stationary and Mobile Nodes
- pp. 28-35
- 13:45 Modeling Visitor Movement in Theme Parks
- pp. 36-43
- 14:10 Comparison of Anchor Selection Algorithms for Improvement of Position Estimation During the Wi-Fi Localization Process in Disaster Scenario
- pp. 44-49
- 14:35 TOMP: Opportunistic Traffic Offloading Using Movement Predictions
- pp. 50-58
2B: Network Traffic Measurement and Characterization
- 13:20 Monitoring Traffic Activity Graphs with Low-rank Matrix Approximation
- pp. 59-67
- 13:45 Sub-flow Packet Sampling for Scalable ML Classification of Interactive Traffic
- pp. 68-75
- 14:10 Decoupling Non-Stationary and Stationary Components in Long Range Network Time Series in the Context of Anomaly Detection
- pp. 76-84
- 14:35 Rapid and Generalized Identification of Packetized Voice Traffic Flows
- pp. 85-92
2C: Security, Privacy and Anonymity
- 13:20 Multi-Resolution Elliptic Curve Digital Signature
- pp. 93-101
- 13:45 Applicability of Crypto-based Security Approaches in Tactical Wireless Multi-hop Networks
- pp. 102-110
- 14:10 3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for Network Security
- pp. 111-118
- 14:35 Efficient Construction of Directed Redundant Steiner Trees
- pp. 119-127
Demonstration setup
15:00 - 17:00
Demonstrations with Coffee
- Knowledge-Based Admission Control: A Real-Time Performance Analysis
- Demonstration of the DYAMAND Framework
- Dynamic Load Routing/Path Diversity in a Network of ARP-Path NetFPGA Switches
- Demonstration on Fairness Among Heterogeneous TCP Variants Over 10Gbps High-speed Networks
- A Mobile Sensor Network Testbed Using iRobots
- OpenMTC Framework - M2M Solutions for Smart Cities and the Internet of Things
- A Component System with Automatic Service Composition for Spontaneous Virtual Networks
- Demonstration: Where's the Mote? Ask the MoteHunter!
Posters with Tea
- Intrusion Detection in Computer Networks Using Optimum-Path Forest Clustering
- pp. 128-131
- A Study of P2P Traffic Localization by Network Delay Insertion
- pp. 132-135
- Automatic Generation of Extended Dependency Graphs for Network Security
- pp. 136-139
- A Key Distribution Protocol for Wireless Sensor Networks
- pp. 140-143
- On Bandwidth Reservation for Optimal Resource Utilization in High-performance Networks
- pp. 144-147
- HydroNode: a Low Cost, Energy Efficient, Multi Purpose Node for Underwater Sensor Networks
- pp. 148-151
- On the Distribution of Inter Contact Time for DTNs
- pp. 152-155
- Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna
- pp. 156-159
- A New Design of the IEEE 802.11 MAC Layer to Enhance the Scalability of the DMS Service
- pp. 160-163
- A Secure Monitoring and Control System for Wireless Sensor Networks
- pp. 164-167
- Timed Redirection: HTTP Request Coalescing to Reduce Energy Use of Hybrid Web Servers
- pp. 168-171
- Application-aware Adaptive Duty Cycle-based Medium Access Control for Energy Efficient Wireless Data Transmissions
- pp. 172-175
- A Context-aware Cross-layer Energy-efficient Adaptive Routing Algorithm for WLAN Communications
- pp. 176-179
- A Wireless Mesh Sensor Network for Hazard and Safety Monitoring At the Port of Brisbane
- pp. 180-183
- Active Breadcrumbs: Aggressive Distribution Method of In-network Guidance Information for Content-Oriented Networks
- pp. 184-187
- Information Fusion Techniques Applied to Shared Sensor and Actuator Networks
- pp. 188-191
- DYAMAND: DYnamic, Adaptive MAnagement of Networks and Devices
- pp. 192-195
- Strategies for Automatic Labelling of Web Traffic Traces
- pp. 196-199
- On the Impact of Wireless Network Traffic Location and Access Technology on Mobile Device Energy Consumption
- pp. 200-203
- Applying Temporal Feedback to Rapid Identification of BitTorrent Traffic
- pp. 204-207
- Decision Centric Identification and Rank Ordering of Security Metrics
- pp. 208-211
- DELTA: Delta Encoding for Less Traffic for Apps
- pp. 212-215
- LT-OLSR: Attack-Tolerant OLSR Against Link Spoofing
- pp. 216-219
- Modelling Packet Loss in RTP-based Streaming Video for Residential Users
- pp. 220-223
- Protecting IEEE 802.11s Wireless Mesh Networks Against Insider Attacks
- pp. 224-227
- On the Feasibility of Secure Application-Layer Communications on the Web of Things
- pp. 228-231
- A Cross Layer Approach to the Novel Distributed Scheduling Protocol and Event-triggered Controller Design for Cyber Physical Systems
- pp. 232-235
- A Differential Game Theoretic Model for Real-Time Spectrum Pricing in Cognitive Radio Networks
- pp. 236-239
- Cache Isolation and Thin Provisioning of Hypervisor Caches
- pp. 240-243
- Flow-Path: An AllPath Flow-based Protocol
- pp. 244-247
- Plugging the Leaks Without Unplugging Your Network in the Midst of Disaster
- pp. 248-251
- An Optimised Dynamic Resource Allocation Algorithm for Cloud's Backbone Network
- pp. 252-255
- Distributed Data Filtering in Logistics Wireless Sensor Networks Based on Transmission Relevance
- pp. 256-259
- Towards an Architecture for Mobile Healthcare
- pp. 260-263
- TDMA for Wireless Passive Backscatter Networks: An Information Theoretic Approach
- pp. 264-267
- Autonomous Dynamic Transmission Scheduling Based on Neighbor Node Behavior for Multihop Wireless Networks
- pp. 268-271
- Power-Aware Routing in Networks with Delay and Link Utilization Constraints
- pp. 272-275
- Resource and Query Aware, Peer-to-Peer-Based Multi-Attribute Resource Discovery
- pp. 276-279
- Detecting Protocol Switching Covert Channels
- pp. 280-283
- Time Series Matrix Factorization Prediction of Internet Traffic Matrices
- pp. 284-287
- An Opportunistic Multicast Routing Protocol for Wireless Mesh Networks
- pp. 288-291
- Performance Evaluation of Sub 1 GHz Wireless Sensor Networks for the Smart Grid
- pp. 292-295
- (Paper not presented)
- pp. 296-299
- Distributed Client-Server Assignment
- pp. 300-303
- Detecting Covert Communication on Android
- pp. 304-307
- A Modular and Power-Intelligent Architecture for Wireless Sensor Nodes
- pp. 308-311
- An RSSI-Based Navigation Algorithm for a Mobile Robot in Wireless Sensor Networks
- pp. 312-315
- Models and Algorithms for Elastic-Demand Network Equilibrium Problems in Communication Networks with Multicast Sessions
- pp. 316-319
- Unravel the Characteristics and Development of Current IPv6 Network
- pp. 320-323
- Half-Symmetric Lens Based Localization Algorithm for Wireless Sensor Networks
- pp. 324-327
- Resiliency Taxonomy of Routing Protocols in Wireless Sensor Networks
- pp. 328-331
- Achieving End-to-End Goals of WSN Using Weighted Cognitive Maps
- pp. 332-335
- A Novel Dynamic Q-Learning-Based Scheduler Technique for LTE-Advanced Technologies Using Neural Networks
- pp. 336-339
- On the Performance of Sensor Node Repositioning Under Realistic Terrain Constraints
- pp. 340-343
- Novel Assessment Metric and Countermeasures for Traffic Attack Threats in Wireless Sensor Networks
- pp. 344-347
- An Evaluation of Fairness Among Heterogeneous TCP Variants Over 10Gbps High-speed Networks
- pp. 348-351
- Efficient Traffic Flow Measurement for ISP Networks
- pp. 352-355
17:00 - 17:00
LCN Tuesday - End of the technical program
18:45 - 19:00
Watch the Sunset at the beach
19:00 - 22:00
Conference Banquet
Wednesday, October 24
08:00 - 08:45
Registration
08:45 - 08:50
Opening
08:50 - 09:00
Welcome: Evan Butterfield, IEEE Computer Society, Director of Products and Services
09:00 - 10:00
Keynote 2: Prof. Mark Crovella, Boston University
Abstract: One of the defining properties of small worlds is the prevalence of short paths connecting node pairs. Unfortunately, as a result the usual notion of distance is not particularly helpful in distinguishing neighborhoods in such graphs. This is the case, for example, when analyzing the interdomain routing system of the Internet.
We describe a motivating problem that requires a finer-grained notion of distance. The problem is quite simple to state: how can any given network operator in the Internet determine which paths pass through its network? Surprisingly, the nature of Internet routing makes this question rather hard to answer.
To address this problem, we define a new distance metric on graph nodes. This metric has useful and interesting properties: it is easy to compute and understand, it can be used to sharply distinguish neighborhoods in networks, and it remains useful even in small-world networks. We show how we use this metric to address our motivating problem, and more generally how it can be used for visualization and dimensionality reduction of complex networks.
10:00 - 10:30
Coffee break
10:30 - 12:10
3A: Delay Tolerant Networks and VANETs
- 10:30 Characterization and Modeling in Large-scale Urban DTNs
- pp. 356-363
- 10:55 A Geolocation-based Vertical Handover Decision Algorithm for Vehicular Networks
- pp. 364-371
- 11:20 LPS and LRF: Efficient Buffer Management Policies for Delay and Disruption Tolerant Networks
- pp. 372-379
- 11:45 Mobility Based Dynamic TXOP for Vehicular Communication
- pp. 380-387
3B: Transport Protocols
- 10:30 Modeling and Optimizing Transport-Support Workflows in High-performance Networks
- pp. 388-395
- 10:55 Enhancing TCP with Cross-layer Notifications and Capacity Estimation in Heterogeneous Access Networks
- pp. 396-404
- 11:20 Performance of On-Off Traffic Stemming From Live Adaptive Segmented HTTP Video Streaming
- pp. 405-413
- 11:45 Characterizing Cyberlocker Traffic Flows
- pp. 414-422
3C: MAC and PHY
- 10:30 Robust MAC-layer Rate Control Mechanism for 802.11 Wireless Networks
- pp. 423-431
- 10:55 Network Coding Based SVC Multicast Over Broadband Wireless Networks
- pp. 432-439
- 11:20 Distributed Decode and Forward Beamforming
- pp. 440-448
- 11:45 Flexible Resource Allocation for Multicast in OFDMA Based Wireless Networks
- pp. 449-456
12:10 - 13:30
Lunch break
13:30 - 15:10
4A: Wireless Sensor Networks: Routing
- 13:30 Efficient Geocasting to Multiple Regions in Large-Scale Wireless Sensor Networks
- pp. 457-465
- 13:55 Near-Optimal Routing for Contour Detection in Wireless Sensor Networks
- pp. 466-473
- 14:20 Adaptive HELLO for the Neighborhood Discovery Protocol
- pp. 474-482
- 14:45 Maximizing Network Lifetime Via 3G Gateway Assignment in Dual-Radio Sensor Networks
- pp. 483-490
4B: Cloud Computing and Data Centers
- 13:30 Network Capabilities of Cloud Services for a Real Time Scientific Application
- pp. 491-499
- 13:55 An Integrated Resource Allocation Scheme for Multi-Tenant Data-center
- pp. 500-508
- 14:20 A Distributed Energy Saving Approach for Ethernet Switches in Data Centers
- pp. 509-516
- 14:45 Large-Scale Measurement and Analysis of One-Way Delay in Hybrid Multicast Networks
- pp. 517-524
4C: Quality of Service
- 13:30 How's My Network? Predicting Performance From Within a Web Browser Sandbox
- pp. 525-532
- 13:55 A Real-Time Services Performance and Interference Mitigation for Femtocell Scenarios in LTE Networks
- pp. 533-540
- 14:20 KBAC: Knowledge-Based Admission Control
- pp. 541-548
- 14:45 Impact of Network Conditions on Delay-Stable Communications in Closed Industrial Control Networks
- pp. 549-554
15:10 - 15:40
Tea break
15:40 - 17:45
5A: Wireless Sensor Networks: Optimization and Energy Efficiency
- 15:40 Inference in Wireless Sensor Networks Based on Information Structure Optimization
- pp. 555-562
- 16:05 Optimization Trade-Offs in the Design of Wireless Sensor and Actor Networks
- pp. 563-571
- 16:30 On Using Game Theory to Balance Energy Consumption in Heterogeneous Wireless Sensor Networks
- pp. 572-580
- 16:55 Energy Efficient Data Survivability for WSNs Via Decentralized Erasure Codes
- pp. 581-588
- 17:20 An Approach for Bounding Breach Path Detection Reliability in Wireless Sensor Networks
- pp. 589-596
15:40 - 17:20
5B: Overlay and P2P Networks
- 15:40 MP-DNA: A Novel Distributed Replica Placement Heuristic for WMNs
- pp. 597-604
- 16:05 Dynamic File Bundling for Large-scale Content Distribution
- pp. 605-613
- 16:30 CDN Request Routing to Reduce Network Access Cost
- pp. 614-621
- 16:55 A Tale of Nine Internet Exchange Points: Studying Path Latencies Through Major Regional IXPs
- pp. 622-629
5C: Performance Modeling and Evaluation
- 15:40 Safe Cities. A Participatory Sensing Approach
- pp. 630-638
- 16:05 HOPSCOTCH: An Adaptive and Distributed Channel Hopping Technique for Interference Avoidance in Wireless Sensor Networks
- pp. 639-646
- 16:30 Agnostic Broadcast Rendezvous for Cognitive Radio Networks Using Channel Hopping
- pp. 647-654
- 16:55 Wireless Multi-Rate Scheduling: From Physical Interference to Disk Graphs
- pp. 655-662
17:45 - 17:45
LCN Wednesday - End of the technical program
Thursday, October 25
08:00 - 08:30
Registration
08:30 - 08:40
OnMove: Opening
08:30 - 08:35
P2MNET: Opening
08:35 - 10:00
P2MNET: Simulation and Frameworks
- 08:35 EpidemicSim: Epidemic Simulation System with Realistic Mobility
- pp. 663-669
- 09:03 Handoff in Mobile WiMAX:Forced Handoff Scheme with Load Balancing in Mobile WiMAX Networks
- pp. 670-676
- 09:31 An Enhanced Media Independent Handover Framework for Vertical Handover Decision Making Based on Networks' Reputation
- pp. 677-682
08:40 - 09:00
OnMove: Mobility I
- 08:40 Mobile e-Services Using HTML5
- pp. 818-823
08:45 - 09:00
goSMART: Opening
WLN: Opening
09:00 - 10:00
goSMART: Cloud Services and Machine-to-Machine
- 09:00 On the Interplay of Open Data, Cloud Services and Network Providers Towards Electric Mobility in Smart Cities
- pp. 864-871
- 09:20 Smart City Surveillance: Leveraging Benefits of Cloud Data Stores
- pp. 872-880
- 09:40 Remote Subscription Management of M2M Terminals in 4G Cellular Wireless Networks
- pp. 881-889
OnMove Keynote: Prof. Huseyin Arslan, University of South Florida, USA
Abstract: Mobility is a significant problem in wireless networks that impacts the capacity and quality of service. The impact is not only in the physical layer, but also in other layers of the communication protocol stack. Historically, the networks and systems are designed to accommodate the worst-case mobility conditions, limiting the efficient usage of the communication resources and hence the performance of the overall system. Adaptive and cognitive networking strategies bring about effective approaches to handle the mobility issues in wireless communication networks. In this talk, cognitive radio and cognitive networks will be discussed as a solution to mobility issues in wireless networks.
WLN Keynote: Prof. Damla Turgut, University of Central Florida, USA
Abstract: The physical limits of the functionality of sensor networks affect more the wireless transmission than the sensing ability. To put it simply: a sensor network can collect much more data then it can transmit to its customer. In this talk, we argue that there are significant disparities in the value of different chunks of information, and techniques which choose data to transmit based on its potential value to the customer can significantly increase the utility of the network. We outline two application scenarios and approaches for value of information-based data routing. We conclude with a research agenda for future work.
10:00 - 10:30
Coffee break
10:30 - 11:25
goSMART Keynote: Prof. Balaji Prabhakar, Stanford University, USA
Abstract: In many of the challenges faced by the modern world, from overcrowded road networks to overstretched healthcare systems, large benefits for society come about from small changes by very many individuals. We survey the problems and the cost they impose on society. We then describe a series of pilot projects which aim to develop principles for inducing small changes in behavior in networks such as transportation, wellness and recycling. Pilots have been conducted with Infosys Technologies, Bangalore (commuting) and Accenture-USA (wellness), and two are ongoing: in Singapore (public transit congestion) and at Stanford (congestion and parking).
In this talk, we will describe this work and present results from the pilots. Some salient themes are the use of low-cost sensing and networking technology for sensing individual behavior, and the use incentives and social norming to influence the behavior.
Speaker Bio: Prof Balaji Prabhakar is a faculty member in the Departments of Electrical Engineering and Computer Science at Stanford University. His research interests are in computer networks; notably, in designing algorithms for the Internet and for Data Centers. Recently, he has been interested in Societal Networks: networks vital for society's functioning, such as transportation, electricity and recycling systems. He has been involved in developing and deploying incentive mechanisms to move commuters to off-peak times so that congestion, fuel and pollution costs are reduced. -
Biography: He has been a Terman Fellow at Stanford University and a Fellow of the Alfred P. Sloan Foundation. He has received the CAREER award from the U.S. National Science Foundation, the Erlang Prize, the Rollo Davidson Prize, and delivered the Lunteren Lectures. He is a co-recipient of several best paper awards. He is on the Advisory Board of the Future Urban Mobility Initiative of the World Economic Forum.
10:30 - 11:10
OnMove: Mobility II
- 10:30 RSSI-based Localization in Cellular Network
- pp. 824-830
- 10:50 A Pricing Scheme for Porter Based Delivery in Integrated RFID-Sensor Networks
- pp. 831-838
10:30 - 12:30
P2MNET: Performance Evaluation and Scheduling
- 10:30 Performance Evaluation of a Real Long Term Evolution (LTE) Network
- pp. 683-689
- 11:00 Evaluation of Performance and Scalability of Routing Protocols for VANETs on the Manhattan Mobility Model
- pp. 690-697
- 11:30 Performance Evaluation of Video Dissemination Protocols Over Vehicular Networks
- pp. 698-705
- 12:00 Research and Simulation of Transport Protocols Optimization on Wireless Multi-Hop Networks
- pp. 706-713
10:30 - 12:00
WLN: On Sensor Networks & RFIDs
- 10:30 Wireless Sensor Network for Habitat Monitoring: A Counting Heuristic
- pp. 757-764
- 10:52 Adaptive Channel Selection Control Saving Its Redundant Usage Based on Hidden Stations in Wireless Access Networks
- pp. 765-770
- 11:15 Energy and Terrain Aware Connectivity Restoration in Disjoint Mobile Sensor Networks
- pp. 771-778
- 11:37 RFID Tags Authentication by Unique Hash Sequence Detection
- pp. 779-785
11:10 - 12:10
OnMove: Vehicular Networks
- 11:10 Towards Provisioning Vehicle-Based Rural Information Services
- pp. 839-846
- 11:30 A New Stability Based Clustering Algorithm (SBCA) for VANETs
- pp. 847-851
- 11:50 Performance and Fairness Analysis of Range Control Algorithms in Cooperative Vehicle Safety Networks At Intersections
- pp. 852-859
11:25 - 12:25
goSMART: Infrastructure Services and Search and Rescue
- 11:25 Towards Smart Berlin - an Experimental Facility for Heterogeneous Smart City Infrastructures
- pp. 890-896
- 11:45 Symbiotic Service Guidance and Its Application to Transport Services
- pp. 897-903
- 12:05 Role-Based Urban Post-Disaster Mobility Model for Search and Rescue Operations
- pp. 904-911
12:10 - 12:30
OnMove: Posters and Demos
- 12:10 Smart City: The Smart Sewerage
- pp. 860-863
12:25 - 12:30
goSMART: Conclusions and Wrap-Up
12:30 - 13:30
Lunch break
13:30 - 14:30
P2MNET Keynote: Prof. Hossam Hassanein, Queen's University, Canada
Abstract: The concept of Internet of Things (IoT) is opening new horizons in systems intelligence, where physical objects (embedded with sensory, identification and networking capabilities) can interact with other objects through the global infrastructure of wireless/wired Internet. These systems can be monitored and controlled by filtering and processing collected data. Such intelligent design will naturally result is efficient and cost effective systems. Several architectures are being built to implement IoT from two different perspectives. The first, also known as sensor-oriented, is based on large-scale sensors deployment targeting the collection of accurate sensory data. Such huge sensory data are analyzed through cloud computing to deliver intelligent responses. The second architecture, also known as service-oriented, targets the association of unique identifiers with specific services. In such architecture, the service (or the appropriate response) is invoked upon receiving the unique identifier from a specific ID collecting node considering the context in which it was collected.
IoT offers many opportunities, among which are smarter solutions and spaces. The talk will also cover some of the activities at the Telecommunication Research lab at Queen's University towards the realization of true smart spaces. We introduce the design and implementation of a Smart Spaces framework that utilizes the social context. In order to manage services and sessions, we integrate our system with the IP Multimedia Subsystem. The result: SocioSpace, a system capable of delivering targeted personalized services and content to customers and end users occupying a SocioSpace-enabled environment.
13:30 - 15:00
WLN: On Cognitive & Cellular Networks
- 13:30 Argumentation Based Negotiation in Cognitive Radio Networks
- pp. 786-793
- 13:52 Characterization of a 3G EV-DO Network - a Measurement Study
- pp. 794-802
- 14:15 Unified Channel Assignment for Unicast and Broadcast Traffic in Cognitive Radio Networks
- pp. 803-810
- 14:37 Long-term Proportional Fairness Over Multiple Cells
- pp. 811-817
14:30 - 15:00
P2MNET: WSN Applications
- 14:30 Efficient Movement Control Actor Relocation for Honing Connected Coverage in Wireless Sensor and Actor Networks
- pp. 714-721
15:00 - 15:30
Tea break
15:30 - 18:00
P2MNET: WSN Applications
- 15:30 The Implementation of Novel Idea of Translation Matrix to Maintain QoS for a Roaming User Between Heterogeneous 4G Wireless Networks
- pp. 722-729
- 16:00 DSS: Dynamic Switching Sets for Prolonging Network Lifetime in Sensor Nodes
- pp. 730-735
- 16:30 Impact Weighted Uptime in Hierarchical LTE Networks: Application and Measurement
- pp. 736-740
- 17:00 Designing and Predicting QoS of a Wireless System for Medical Telemetry
- pp. 741-748
- 17:30 Flexible Polling-based Scheduling with QoS Capability for Wireless Body Sensor Network
- pp. 749-756
15:30 - 16:30
WLN Panel: IoT and Cloud Computing change phase in local communications
The advent of the Internet of Things (IoT) and Cloud Computing (CC) is changing the domain in which objects can communicate, share data, and grant access to one another. One such prominent domain is the local communication domain. Having objects networked with one another and with surrounding networking devices viz. access points, gateways, routers, satellites, etc. will have a great impact on the local communication domain and the major role it plays in today’s world; from providing rich connectivity to realizing sensory and actuary applications.