Technical Program
Technical Program of LCN 2015 and Adjunct Workshops
Sunday, October 25
16:00 - 19:00
Welcome Reception and Early Registration in "Island 2"
Monday, October 26
08:30 - 09:00
Registration
09:00 - 10:00
CloudNA: Keynote: Data Foundries: The Cauldron of the IoT, Clouds and Datacenters
Abstract: The datacenters that form the core engines for transporting, persisting and transforming data are not merely the major building blocks of the "Cloud". They are more akin to "alchemical" data foundries that transform raw bits of data to the gold of information, content and the derived knowledge services that we have come to expect and desire so voraciously. These services help extend our minds and our cognitive powers so we can construct and live in "smarter" learning and living environments. Societies that learn and live smarter will advance faster to give higher meaning to human life and endeavours. How did these data foundries come into being? What forces gave rise to them? What special problems do they solve? Why are they necessary? What are the limits and challenges they face? How will science, technology and other human institutions color the advance of the datacenters, and will be colored by them? Studying possible answers to these questions and exploring possible future scenarios will help us see what lies around the corner from where we are today.The challenges of networking, data storage, computing and power efficiency and effective user interface remain core to the design of data foundries. Other challenges which are much harder to comprehend and resolve have to do with the interaction of these new technologies with social and economic realities. Advances are required in a multitude of dimensions to produce next-generation datacenter systems and architectures.Bio: Dr. Masood Mortazavi is a distinguished engineer and the senior director of IT Research Department at Huawei Technologies, US R&D Center. Earlier, Masood was senior principle architect at Yahoo's Cloud Infrastructure Group. He led multiple advanced projects related to automatic elasticity systems, cloud services architecture, automatic and adaptive controllers for salability of infrastructure services, multi-petabyte distributed databases, structured and unstructured storage, scalable messaging and application container services. He has published and spoken internationally on NoSQL databases, multi-tenancy, big data and privacy. Masood led an international group of engineers at Sun Microsystems, focused on the development of open-source software, including databases such as Apache Derby, PostgreSQL and MySQL. At Huawei's Innovation Center in Santa Clara, Masood leads a team of researchers focused on next-generation data centers, distributed systems, databases, file systems and digital archives.
09:00 - 09:15
SenseApp: Welcome
09:00 - 10:30
WNM: Session 1
- Measuring Broadband Access Network Performance in Pakistan: A Comparative Study
- Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior
- Feature Selection for Robust Backscatter DDoS Detection
09:15 - 10:30
SenseApp: Session 1
- A Testbed for Fine-Grained Tracing of Time Sensitive Behavior in Wireless Sensor Networks
- Accelerated Clock Drift Estimation for High-Precision Wireless Time-Synchronization
- A Heterogeneous System Architecture for Low-Power Wireless Sensor Nodes in Compute-intensive Distributed Applications
10:00 - 10:30
CloudNA: Session 1: Inter-Cloud Data
- Inter-Cloud Data Persistence in DIL Networks
10:30 - 11:00
Coffee break
11:00 - 12:30
CloudNA: Session 2: Cloud-based Networking
- Flexible Advance Reservation Models for Virtual Network Scheduling
- Evaluation of a Cloud Federation Approach Based on Software Defined Networking
- IGOD: Identification of Geolocation of Cloud Datacenters
11:00 - 11:50
SenseApp Keynote: Practical Issues in Building Smart Home Applications
Homes are rich with information about people's health, energy consumption, and personal or family functions. This talk will discuss the practical challenges of deploying large-scale smart home applications. The talk will draw on experiences deploying over 2000 devices in over 60 homes and will highlight a phase transition where deployments become dramatically more difficult as they scale up in terms of 1) the number of nodes, 2) the length of time, and 3) the number of houses. The talk will distill these experiences down to a set of guidelines and design principles to help future deployments avoid the potential pitfalls of large-scale sensing in homes, and conclude with open questions and challenges that we still face today.
11:00 - 12:30
WNM: Session 2
- An Analysis of the YouNow Live Streaming Platform
- An Analysis of Friend Circles of Facebook Users
- Understanding Evolution and Adoption of Top-level Domain Names
11:50 - 12:30
SenseApp: Session 2
- Estimating Memory Requirements in Wireless Sensor Networks Using Social Tie Strengths
- Understanding Spatial and Temporal Coverage in Participatory Sensor Networks
12:30 - 13:30
Lunch break
13:30 - 15:00
CloudNA: Session 3: Cloud Resource Scheduling
- Spark on Entropy: A Reliable & Efficient Scheduler for Low-latency Parallel Jobs in Heterogeneous Cloud
- Leveraging Checkpoint/Restore to Optimize Utilization of Cloud Compute Resources
- Secure Access Control for Multi-Cloud Resources
SenseApp: Session 3
- Systemic Support for Transaction-Based Spatial-Temporal Programming of Mobile Robot Swarms
- Rogue Z-Wave Controllers: A Persistent Attack Channel
- Automatic Protocol Configuration for Dependable Internet of Things Applications
- ProFuN TG: A Tool for Programming and Managing Performance-Aware Sensor Network Applications
13:30 - 14:30
WNM Keynote: Lessons learned on analyzing one-way network traffic
The rapid growth in size, and complexity of computer systems, and networks make network measurement and monitoring tasks increasingly important, and extremely challenging. The rate at which digital data is accumulated from such systems far exceeds the human ability to make sense of it, i.e., to interpret and attach meaning to it. Major challenges include data volume and diversity, data dependency, and system dynamics. The goal of this talk is to explore some of these challenges in the context of one-way traffic, while presenting research taken to mitigate the impact of these factors using (semi)automatic and intelligent systems.
14:30 - 15:00
WNM: Session 3
- Hybrid Community-Based Forwarding: A Complete Energy Efficient Algorithm for Pocket Switched Networks
15:00 - 15:30
Coffee Break
15:30 - 17:00
Cloud NA: Session 4: Green Cloud Infrastructure
- Thermal-Aware, Power Efficient, and Makespan Realized Pareto Front for Cloud Scheduler
- Power-aware Server Selection in Nano Data Center
- An Efficient MAC Scheme in Wireless Sensor Network with Energy Harvesting (EHWSN) for Cloud Based Applications
15:30 - 16:20
SenseApp: Session 4
- On Design and Deployment of Fuzzy-Based Metric for Routing in Low-Power and Lossy Networks
- Estimating Node Lifetime in Interference Environments
16:20 - 16:40
SenseApp: Conclusions and best paper award
17:00 - 17:30
Workshops Monday - End of the technical program
Tuesday, October 27
08:30 - 09:00
Registration
09:00 - 09:30
Opening and Welcome
09:30 - 10:30
Keynote 1: Ethervation: Innovation of and on the Ethernet platform
Abstract: Innovation sometimes advances in leaps and bounds when robust "platforms" appear. Ethernet's story going back 42 years involves two robust platforms: CMOS according to Moore's Law and TCP/IP/Ethernet according to, well OK yes, Metcalfe's Law. Ethernet began as a Local Computer Network (later LAN) in 1973. Back then it ran at 2.94Mbps and coaxially connected PCs in a building. Now it runs up to 100Gbps in the LAN, has returned to its Alohanet wireless roots as Wi-Fi, and is moving down to serve the coming Internet of Things. Ethernet platform innovation is paced by semiconductors. But then there are the many innovations that have taken place on top of the evolving Ethernet platform. The TCP/IP/Ethernet Internet has gone web, video, mobile, social, cloud, embedded — from mainframes to minicomputers to workstations to PCs to cellphones to things. Some of this innovation can be attributed to the venerable Ethernet business model, which is based on packet switching, de jure standards (IEEE), owned implementations, fierce competition, interoperability, rapid evolution, backward compatibility, build it and they will come. Ethernet is the answer; what is the question?
10:30 - 11:00
Coffee Break
11:00 - 12:30
1: Plenary session: Best Paper Candidates
- Beware of the Hidden! How Cross-traffic Affects Quality Assurances of Competing Real-time Ethernet Standards for In-Car Communication
- Exploring Interconnect Energy Savings Under East-West Traffic Pattern of MapReduce Clusters
- Collaborative On-demand Wi-Fi Sharing
12:30 - 13:30
Lunch
13:30 - 15:30
2A: Information Centric Networks
- Content Discovery in Wireless Information-Centric Networks
- Modelling the Pending Interest Table Occupancy in CCN with Interest Timeout and Retransmission
- Performance Analysis of Probabilistic Caching Scheme Using Markov Chains
- Joint Optimization of Content Replication and Traffic Engineering in ICN
- Persistent Caching in Information-Centric Networks
2B: Security
- Coordination Supports Security: A New Defence Mechanism Against Interest Flooding in NDN
- ELDA: Towards Efficient and Lightweight Detection of Cache Pollution Attacks in NDN
- Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
- Growing a Web of Trust
- Using Fake Sinks and Deceptive Relays to Boost Base-station Anonymity in Wireless Sensor Network
2C: Wireless Sensor Networks
- Toward a Robust Sparse Data Representation for Wireless Sensor Networks
- Animal Monitoring with Unmanned Aerial Vehicle-Aided Wireless Sensor Networks
- Reliable Surveillance in Ring Deployed Wireless Sensor Networks
- C-SDF: Practical Solar-aware Distributed Flow Control
- Scheduling Multiple Mobile Sinks in Underwater Sensor Networks
15:30 - 17:00
Demonstrations with Coffee
- Video-Based Overtaking Assistance Now A Reality
- ProFuN TG: Programming Sensornets with Task Graphs for Increased Reliability and Energy-Efficiency
- WiFi Offloading and Socially Aware Prefetching on Augmented Home Routers
- Live Demonstration of Application Layer Traffic Monitoring At 100 Gbps
- Demonstration of Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
- Demo: Prototyping Next-Generation In-Car Backbones Using System-Level Network Simulation
- DEMO: The Need for Wireless Clock Drift Estimation and Its Acceleration on a Heterogeneous Sensor Node
- WiFi Multicast to Very Large Groups - Experimentation on the ORBIT Testbed
- Demonstration of A Novel Storage Covert Channel on Android Smartwatch Using Status Bar Notifications
Posters with Tea
- D-RPL: Overcoming Memory Limitations in RPL Point-To-Multipoint Routing
- JitVector: Just-in-Time Code Generation for Network Packet Classification
- Towards Identifying Large-scale BGP Events
- SDN Shim: Controlling Legacy Devices
- An Analytical Model to Achieve Elasticity for Cloud-based Firewalls
- Tracemax: A Novel Single Packet IP Traceback Strategy for Data-Flow Analysis
- Coverage Preservation in Energy Harvesting Wireless Sensor Networks for Rare Events
- Incorporating Multiple Cluster Models for Network Traffic Classification
- Using a Mobile Vehicle for Road Condition Surveillance by Energy Harvesting Sensor Nodes
- Towards Exploring the Benefits of Scope-Flooding in Information-Centric Networks
- Fossa: Using Genetic Programming to Learn ECA Rules for Adaptive Networking Applications
- An Analytical Model for Bounded WSNs with Unreliable Cluster Heads and Links
- Mobile Data Collection Using Multi-Channel Network Coding in Wireless Sensor Networks
- Viterbi Algorithm for Detecting DDoS Attacks
- Characterizing Performance and Fairness of Big Data Transfer Protocols on Long-haul Networks
- Avatar Mobility and Network Condition-aware 3D Game Over Wireless Networks
- Towards A Method of Estimating One-Way Delays Under Delay Asymmetry and Unknown Relative Clock Offset
- Towards a Context Aware Multipath-TCP
- Topology Control with Application Constraints
- Efficient Multi-Group Formation and Communication Protocol for Wi-Fi Direct
- Channel Assignment in Mobile Networks Based on Geometric Prediction and Random Coloring
- Participatory-sensing-enabled Efficient Parking Management in Modern Cities
16:30 - 17:30
40th Anniversary Panel: LCN Today, Tomorrow, and Network Technologies Introduced
The LCN40 Conference is pleased to host an expert panel session titled "LCN Today, Tomorrow, and Network Technologies Introduced" with four of the conference's — and the industry's — notable pioneers. LCN is the oldest continually running computer networking conference in the world, so come hear from of the conference's pioneers. Topics will include LCN planning then and now, and a recollection of the network technologies introduced and discussed at LCN over the years. And, of course, a lively discussion with the audience! Our expert panel members will be: (i) Bob Metcalfe was the co-founder of 3Com Corporation, best known for its computer network infrastructure products utilizing IEEE 802.3 Ethernet technology, where he was CEO from 1979-2010. Dr. Metcalfe was the keynote speaker at LCN-3 and LCN-7, and will give the plenary keynote address at LCN40. (ii) Harvey Freeman was the founder of LANWORKS, a network equipment supplier in the 1980s and 1990s, where he was president from 1987-1997. Harvey was an LCN leader and organizer from LCN-3 to LCN-22. (iii) Howard Salwen was the founder of Proteon Networks, a Token-Ring LAN vendor in the earliest days of local computer networking; while at Proteon, he was Chairman from 1972-1999, CEO from 1972-1984, and CTO from 1984-1999. Howard was an LCN leader and participant from LCN-10 to LCN-30. (iv) Peter Martini is a Professor of Communication and Networked Systems at the University of Bonn. Dr. Martini has been an LCN leader and participant since LCN-14 and was a keynote speaker at LCN-36.
18:00 - 21:00
Conference Banquet
Wednesday, October 28
08:30 - 09:00
Registration
09:00 - 10:30
3A: Video Streaming and Applications
- Dependency-Aware Distributed Video Transcoding in the Cloud
- Chance-Constrained QoS Satisfaction for Predictive Video Streaming
- RBCS: A Resilient Backbone Construction Scheme for Hybrid Peer-to-Peer Streaming
- An ITS Solution Providing Real-Time Visual Overtaking Assistance Using Smartphones
3B: Transport Protocols and Energy Efficiency
- FLOWER - Fuzzy Lower-than-Best-Effort Transport Protocol
- Latency and Fairness Trade-Off for Thin Streams Using Redundant Data Bundling in TCP
- Improving TCP Performance in Data Center Networks with Adaptive Complementary Coding
- Frugal Topologies for Saving Energy in IP Networks
10:30 - 11:00
Coffee
11:00 - 12:30
4A: Wireless and Mobile Networks
- Caching on the Move: Towards D2D-based Information Centric Networking for Mobile Content Distribution
- Data Bundling for Energy Efficient Communication of Wearable Devices
- DLINK: Dual Link Based Radio Frequency Fingerprinting for Wearable Devices
- Predictive Mobile IP Handover for Vehicular Networks
4B: Overlay Networks
- Augmenting Home Routers for Socially-Aware Traffic Management
- FRoDO: Friendly Routing Over Dunbar-based Overlays
- Competitive Equilibrium and Stable Coalition in Overlay Environments
- Energy-efficient Overlay Networks for Mobile Devices with Buffered Relaying and Push Notifications
12:30 - 13:29
Lunch Break
13:30 - 14:30
Keynote 2: Stormy Clouds - Security in Distributed Cloud Systems
As massively distributed storage becomes the norm in cloud networks, they contend with new vulnerabilities imputed by the presence of data in different, possibly untrusted nodes. In this talk, we consider two such types of vulnerabilities. The first one is the risk posed to data stored at nodes that are untrusted. We show that coding alone can be substituted to encryption, with coded portions of data in trusted nodes acting as keys for coded data in untrusted ones. In general, we may interpret keys as representing the size of the list over which an adversary would need to generate guesses in order to recover the plaintext, leading to a natural connection between list decoding and secrecy. Under such a model, we show that algebraic block maximum distance separable (MDS) codes can be constructed so that lists satisfy certain secrecy criteria, which we define to generalize common perfect secrecy and weak secrecy notions. The second type of vulnerability concerns the risk of passwords' being guessed over some nodes storing data, as illustrated by recent cloud attacks. In this domain, the use of guesswork as a metric shows that the dominant effect on vulnerability is not necessarily from a single node, but that it varies in time according to the number of guesses issued. We also introduce the notion of inscrutability, as the growth rate of the average number of probes that an attacker has to make, one at a time, using his best strategy, until he can correctly guess one or more secret strings from multiple randomly chosen strings. Joint work with Ahmad Beirami, Joao Barros, Robert Calderbank, Mark Christiansen, Ken Duffy, Flavio du Pin Calmon, Luisa Lima, Paulo Oliveira, Stefano Tessaro, Mayank Varia, Tiago Vinhoza, Linda Zeger.
14:30 - 15:00
Invitation to LCN 2016
15:00 - 16:30
Posters with Coffee
- Measuring and Modeling Performance of WLAN Communication for Multistatic Sonar Applications
- VirtualStack: A Framework for Protocol Stack Virtualization At the Edge
- Reference Equipment of Cross-Layer Control for Live Video Transmission on Various Physical Links
- ULLA-X: A Unified Programmatic Middleware for On-Demand Network Reconfiguration
- Challenges for 100 Gbit/s End to End Communication: Increasing Throughput Through Parallel Processing
- Cooperative Spectrum Mobility in Heterogeneous Opportunistic Networks Using Cognitive Radio
- Method for Providing Secure and Private Fine-grained Access to Outsourced Data
- O-ACK: An Adaptive Wireless MAC Protocol Exploiting Opportunistic Token-Passing and Ack Piggybacking
- a-kTC: Integrating Topology Control Into the Stack
- SEARS: Space Efficient and Reliable Storage System in the Cloud
- LAC: Introducing Latency-Aware Caching in Information-Centric Networks
- Performance Evaluation of Joint Transmission Coordinated-MultiPoint in Dense Very High Throughput WLANs Scenario
- Cache Coherence in Machine-to-Machine Information Centric Networks
- A Partial-decentralized Coflow Scheduling Scheme in Data Center Networks
- OrLiOn: Optimized Route Planning for the Localization of Indoor Nodes From Outdoor Environment
- Can Multipath TCP Save Energy? A Measuring and Modeling Study of MPTCP Energy Consumption
- Performance of a Tiered Architecture to Support End-Host Mobility in a Locator Identity Split Environment
- Revisiting the Controller Placement Problem
- Content Retrieval Method in Cooperation with CDN and ICN-based In-network Guidance Over IP Network
- Evaluation of Topology Optimization Objectives
- A Step Towards a Protocol-Independent Measurement Framework for Dynamic Networks
- Cooperative Traffic Management for Co-existing Overlays
- Efficient Camera Selection for Maximized Target Coverage in Underwater Acoustic Sensor Networks
- Performance Evaluation of Delay-Tolerant Wireless Friend-to-Friend Networks for Undetectable Communication
- Publish-Subscribe-Based Control Mechanism for Scheduling Integration in Mobile IPv6
- Group Key Establishment for Secure Multicasting in IoT-enabled Wireless Sensor Networks
- A Reputation-Based Method for Detection of Attacks in Virtual Coordinate Based Wireless Sensor Networks
- Real-time Streaming with Millisecond Granularity
- SSIDs in the Wild: Extracting Semantic Information From WiFi SSIDs
- Exploring Energy Consumption Issues for Multimedia Streaming in LTE HetNet Small Cells
- The (in)security of Topology Discovery in Software Defined Networks
- Unknown Pattern Extraction for Statistical Network Protocol Identification
16:30 - 18:30
5A: Routing
- An Experimental Study on Inter-domain Routing Dynamics Using IP-level Path Traces
- Efficient One-to-Many Broadcasting for Resource-constrained Wireless Networks
- COSC: Paths with Combined Optimal Stability and Capacity in Opportunistic Networks
- Fast Detection of Compact Topology Representation for Wireless Networks
- Congestion Modeling and Management Techniques for Predictable Disruption Tolerant Networks
5B: Large Scale Networks and Big Data
- A Lossless Switch for Data Acquisition Networks
- RODA: A Reconfigurable Optical Data Center Network Architecture
- Capacitated Cloudlet Placements in Wireless Metropolitan Area Networks
- Leveraging Network Structure in Centrality Evaluation of Large Scale Networks
- On Periodic Scheduling of Fixed-Slot Bandwidth Reservations for Big Data Transfer
18:30 - 19:00
LCN Wednesday - End of the technical program
Thursday, October 29
08:30 - 09:00
Registration
09:00 - 10:30
WLN: Session 1
- Software-Defined Wireless Network Architectures for the Internet-of-Things
- A Survey: Spoofing Attacks in Physical Layer Security
- Data Dissemination for Heterogeneous Transmission Ranges in VANets
- Software Defined Networking for Wireless Local Networks in Smart Grid
09:00 - 10:00
ON-MOVE Keynote: Security and Privacy Considerations in Vehicular Communications for Smart Grid Applications
Plug-in Electric Vehicles (PEVs) have recently received increasing popularity to promote adoption of intermittent renewable energy sources by acting as energy storage systems. In this way, PEVs can inject power to the Smart Grid during periods of reduced production to balance demand. The US Department of Energy expects that about one million PEVs will be on the roads by the end of 2016. These PEVs will typically be equipped with wireless communication capabilities (e.g., DSRC or LTE) to coordinate charging and injection among themselves and the Smart Grid. Such communication, however, exposes information such as the PEVs' locations, their parking duration, the battery status, etc. which can be misused. Long-term analysis of schedule and location information may expose user's driving patterns and whereabouts that can be used by marketers. In addition, the coordinated charging system needs to securely bill the drivers for their payments which necessitates the design of secure protocols. This talk will first focus on the privacy and security aspects of vehicle-to-grid (V2G) and vehicle-to-vehicle (V2V) communications in general. In particular, privacy, authentication and confidentiality challenges will be discussed. We will then present a framework for privacy-preserving power injection protocol for the PEVs that sell power to the grid. The talk will conclude with the future issues in V2G and V2V communications.
09:15 - 09:30
P2MNET: Welcome and Opening Remark
09:30 - 10:30
P2MNET Keynote: Multi connectivity and energy efficiency in future 5G ultra dense deployment scenarios
In upcoming 5G networks, ultra dense deployment (UDN) is ascenario where the base stations are extremely dense in an area andenables extreme capacity per area ideally. Multi-connectivity is a way forconnecting to several base stations at the same time both for performanceand robustness reasons and enables to direct traffic to certain basestations and enable some sort of sleep mode for non used base stations.This enables energy efficiency in networks. The keynote addresses suitablesmart energy efficiency algorithms that still enables robustness.
10:00 - 10:30
ON-MOVE: Session 1
- Caching and Forwarding Assistance for Vehicular Information Services with Mobile Requesters
10:30 - 11:00
Coffee Break
11:00 - 12:30
P2MNET: Session 2: Performance Evaluation of Wireless and Mobile Networks
- A Convex Optimization Method for Improved Coverage in Mobile Ad Hoc Networks
- A Spatial Correlation Aware Scheme for Efficient Data Aggregation in Wireless Sensor Networks
- Exploring Markov Models for the Allocation of Resources for Proactive Handover in a Mobile Environment
11:00 - 11:30
WLN: Session 2
- An Energy-Efficient Service Discovery Protocol for the IoT based on a Multi-Tier WSN Architecture
ON-MOVE: Invited Talk
With the fast advances of technology, there is a concerted determination to improve existing Driver Assistant Systems in order to increase the safety of drivers and road-users, while reducing the Transportation's environmental impacts. Advanced Driver Assistant Systems are a set of hardware and software components used to assist drivers and increase their aptitudes. Examples of such systems include object localization and avoidance systems, such as pedestrians or large animals, or lane detection and tracking systems. In this talk, the design and challenges of such systems are properly addressed. Particular attention is given to vision-based Advanced Driver Assistant Systems because they are the most reliable low-cost systems.
11:30 - 12:30
ON-MOVE: Session 2
- Optimization of Vehicular Applications and Communication Properties with Connectivity Maps
- Visualization and Cell Data Analysis Tool Based on XML Log Files
WLN Keynote: Carrots and Sticks - Incentives That Make Mobile Corwdsensing Work
Crowdsourcing offers a cost-effective approach to distributed problem solving and data collection by soliciting contributions (solutions, ideas, data, etc.) from a large group of people. Recently, due to the burgeoning smartphone industry and the surging demand for sensing data, a new mobile computing and sensing paradigm called mobile crowdsensing has emerged. It collects data through crowdsourcing and has created significant momentum in both industry and academia. Key to the viability of mobile crowdsensing is providing incentives to attain a sufficient level of user participation. This talk will present a primer on designing incentive mechanisms for ensuring successful crowdsourcing campaigns. In the first part, we take a socio-economic approach to connect participants into a social network via a relationship called endorsement, which is overlaid by economic incentives. The (dual) objective is to incentivize trustworthy crowdsensing. Next we focus on heterogeneous crowdsensing, where not only the player types (abilities, costs) but also the beliefs about their respective types are different. We cast the problem as an asymmetric all-pay contest and use a series of reward functions to achieve optimal mechanism design. Finally, we propose to use Tullock contents as an alternative framework to design incentive mechanisms for crowdsensing. We explore a new dimension of optimal Tullock contents design by provisioning the prize as a function.
12:30 - 13:30
Lunch Break
12:30 - 14:00
N2Women Meeting
13:30 - 15:00
P2MNET: Session 3: Vehicular Networks and Multimedia
- Trajectory-Based Data Forwarding with Future Neighbor Prediction in Autonomous Driving Vehicular Environments
- A Channel Variation-aware Algorithm for Enhanced Video Streaming Quality
- An Intelligent Vehicular Traffic Prediction (ITP) Protocol
15:00 - 15:30
Coffee Break
15:30 - 16:30
P2MNET: Session 4: Privacy and Safety Solutions for Wireless Networks
- Privacy-aware Communication Protocol for Hybrid IEEE 802.11s/LTE Smart Grid Architectures
- Multi-hop and D2D Communications for Extending Coverage in Public Safety Scenarios