Table of Contents
|
Advances in Communication Networking Thomas Bauschert (Eds.)
|
Front Matter |
Network Modeling and Design
|
Dynamic Resource Operation and Power Model for IP-over-WSON Networks Uwe Bauknecht, Frank Feller |
1-12 |
A Generic Multi-layer Network Optimization Model with Demand Uncertainty Uwe Steglich, Thomas Bauschert, Christina Büsing, Manuel Kutschka |
13-24 |
Modeling and Quantifying the Survivability of Telecommunication Network Systems under Fault Propagation Lang Xie, Poul Heegaard, Yuming Jiang |
25-36 |
Traffic Analysis
|
Analysis of Elephant Users in Broadband Network Traffic Péter Megyesi, Sándor Molnár |
37-45 |
Evaluation of the Aircraft Distribution in Satellite Spotbeams Christoph Petersen, Maciej Mühleisen, Andreas Timm-Giel |
46-53 |
Network and Traffic Management
|
Self-management of Hybrid Networks – Hidden Costs Due to TCP Performance Problems Giovane Moura, Aiko Pras, Tiago Fioreze, Pieter-Tjerk Boer |
54-65 |
A Revenue-Maximizing Scheme for Radio Access Technology Selection in Heterogeneous Wireless Networks with User Profile Differentiation Elissar Khloussy, Xavier Gelabert, Yuming Jiang |
66-77 |
Services over Mobile Networks
|
Mobile SIP: An Empirical Study on SIP Retransmission Timers in HSPA 3G Networks Joachim Fabini, Michael Hirschbichler, Jiri Kuthan, Werner Wiedermann |
78-89 |
Addressing the Challenges of E-Healthcare in Future Mobile Networks Safdar Marwat, Thomas Pötsch, Yasir Zaki, Thushara Weerawardane, Carmelita Görg |
90-99 |
Monitoring and Measurement
|
Evaluation of Video Quality Monitoring Based on Pre-computed Frame Distortions Dominik Klein, Thomas Zinner, Kathrin Borchert, Stanislav Lange, Vlad Singeorzan, Matthias Schmid |
100-111 |
QoE Management Framework for Internet Services in SDN Enabled Mobile Networks Marcus Eckert, Thomas Knoll |
112-123 |
A Measurement Study of Active Probing on Access Links Bjørn Villa, Poul Heegaard |
124-135 |
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement Petr Velan, Tomáš Jirsík, Pavel Čeleda |
136-147 |
Security Concepts
|
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices Florent Fourcot, Laurent Toutain, Stefan Köpsell, Frédéric Cuppens, Nora Cuppens-Boulahia |
148-160 |
Balanced XOR-ed Coding Katina Kralevska, Danilo Gligoroski, Harald Øverby |
161-172 |
Application of ICT in Smart Grid and Smart Home Environments
|
Architecture and Functional Framework for Home Energy Management Systems Kornschnok Dittawit, Finn Aagesen |
173-184 |
Interdependency Modeling in Smart Grid and the Influence of ICT on Dependability Jonas Wäfler, Poul Heegaard |
185-196 |
Development and Calibration of a PLC Simulation Model for UPA-Compliant Networks Ievgenii Tsokalo, Stanislav Mudriievskyi, Ralf Lehnert |
197-208 |
Data Dissemination in Ad-Hoc and Sensor Networks
|
Efficient Data Aggregation with CCNx in Wireless Sensor Networks Torsten Teubler, Mohamed Hail, Horst Hellbrück |
209-220 |
EpiDOL: Epidemic Density Adaptive Data Dissemination Exploiting Opposite Lane in VANETs Irem Nizamoglu, Sinem Ergen, Oznur Ozkasap |
221-232 |
Services and Applications
|
Advanced Approach to Future Service Development Tetiana Kot, Larisa Globa, Alexander Schill |
233-244 |
DOMINO – An Efficient Algorithm for Policy Definition and Processing in Distributed Environments Based on Atomic Data Structures Joachim Zeiß, Peter Reichl, Jean-Marie Bonnin, Jürgen Dorn |
257-269 |
Poster Papers
|
Poster Abstract: Performance Evaluation of Machine-to-Machine Communication on Future Mobile Networks in Disaster Scenarios Thomas Pötsch, Safdar Marwat, Yasir Zaki, Carmelita Görg |
270-273 |
Notes on the Topological Consequences of BGP Policy Routing on the Internet AS Topology Dávid Szabó, András Gulyás |
274-281 |
Graph-Theoretic Roots of Value Network Quantification Patrick Zwickl, Peter Reichl |
282-286 |
A Publish-Subscribe Scheme Based Open Architecture for Crowd-Sourcing Róbert Szabó, Károly Farkas |
287-291 |
A Testbed Evaluation of the Scalability of IEEE 802.11s Light Sleep Mode Marco Porsch, Thomas Bauschert |
292-297 |
HTTP Traffic Offload in Cellular Networks via WLAN Mesh Enabled Device to Device Communication and Distributed Caching Chris Drechsler, Marco Porsch, Gerd Windisch |
298-303 |
Protocol-Independent Detection of Dictionary Attacks Martin Drašar |
304-309 |
Distributing Key Revocation Status in Named Data Networking Giulia Mauri, Giacomo Verticale |
310-313 |
Test-Enhanced Life Cycle for Composed IoT-Based Services Daniel Kuemper, Eike Reetz, Daniel Hölker, Ralf Tönjes |
314-319 |