


default search action
7th WOWMOM 2006: Niagara-Falls, Buffalo, NY, USA
- 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings. IEEE Computer Society 2006, ISBN 0-7695-2593-8

Introduction
- Message from the General Chairs.

- Message from the TPC Chairs.

- Organizing Committee.

- Program Committee.

- Reviewers.

- Message from the Workshop Chair.

- Message from the Workshop Organizers - ACC 2006.

- ACC 2006 Workshop Organization.

- Message from the Workshop Organizer - EXPONWIRELESS 2006.

- EXPONWIRELESS 2006 Workshop Organization.

- Message from the Workshop Organizers - MDC 2006.

- MDC 2006 Workshop Organization.

- MDC Reviewers.

- Message from the Workshop Organizers - TSPUC 2006.

- TSPUC 2006 Workshop Organization.

Session 1: Sensor Networks I
- Swaroop Venkatesh, R. Michael Buehrer:

Multiple-Access Insights from Bounds on Sensor Localization. 3-12 - Zehua Zhou, Xiaojing Xiang, Xin Wang:

An Energy-Efficient Data-Dissemination Protocol inWireless Sensor Networks. 13-22 - Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon:

Entrapping Adversaries for Source Protection in Sensor Networks. 23-34
Session 2A: Next-Generation Wireless LANs
- Zakhia G. Abichar, J. Morris Chang, Daji Qiao:

Group-Based Medium Access for Next-GenerationWireless LANs. 35-41 - Claudio Casetti, Carla-Fabiana Chiasserini

, Roberta Fracchia, Michela Meo
:
AISLE: Autonomic Interface SeLEction for Wireless Users. 42-48 - Yong Huang, Weibo Gong, Dev Gupta:

MCMSDA: A Multi-Channel Multi-Sector Directional Antenna Wireless LAN. 49-58
Session 2B: Wireless Muliticast
- Qinghe Du, Xi Zhang:

Cross-Layer Resource-Consumption Optimization for Mobile Multicast in Wireless Networks. 59-65 - Antonios G. Alexiou, Dimitrios Antonellis, Christos Bouras:

Evaluating Different One to Many Packet Delivery Schemes for UMTS. 66-72 - Xiaojing Xiang, Xin Wang, Zehua Zhou:

An Efficient Geographic Multicast Protocol for Mobile Ad Hoc Networks. 73-82
Session 3: Data Routing and Encoding Strategies
- Yaoyao Gu, Doruk Bozdag, Eylem Ekici

:
Mobile Element Based Differentiated Message Delivery in Wireless Sensor Networks. 83-92 - Khaled A. Harras

, Kevin C. Almeroth:
Inter-Regional Messenger Scheduling in Delay Tolerant Mobile Networks. 93-102 - Anwar Al Hamra, Chadi Barakat

, Thierry Turletti:
Network Coding for Wireless Mesh Networks: A Case Study. 103-114
Session 4A: Energy-Efficient Networking
- Prachee Sharma, Asheq Khan, Ashok Narasimhan, Ramalingam Sridhar, Satish K. Tripathi:

Energy Conservation in Sensor Networks through Selective Node Activation. 115-124 - Marcel Busse, Thomas Haenselmann, Wolfgang Effelsberg:

Energy-Efficient Forwarding Schemes for Wireless Sensor Networks. 125-133 - Song Guo, Victor C. M. Leung

, Oliver W. W. Yang:
A Distributed Minimum Energy Multicast Algorithm in MANETs. 134-142
Session 4B: Multi-Hop and Mesh Networks
- Jaya Shankar Pathmasuntharam, Amitabha Das, Prasant Mohapatra:

A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks. 143-149 - Xiaoxin Wu, Cristina Nita-Rotaru:

Po^2V Network Layer Position Verification in Multi-HopWireless Networks. 150-158 - Carles Gomez

, P. Salvatella, O. Alonso, Josep Paradells
:
Adapting AODV for IEEE 802.15.4 Mesh Sensor Networks: Theoretical Discussion and Performance Evaluation in a Real Environment. 159-170
Session 5: MAC Enhancements
- Tianji Li, Qiang Ni, David Malone

, Douglas J. Leith
, Yang Xiao
, Thierry Turletti:
A New MAC Scheme for Very High-Speed WLANs. 171-180 - Yong Liao, Lixin Gao:

Practical Schemes for Smooth MAC Layer Handoff in 802.11Wireless Networks. 181-190 - Mansi Ramakrishnan Thoppian, Subbarayan Venkatesan, Ravi Prakash

, R. Chandrasekaran:
MAC-Layer Scheduling in Cognitive Radio based Multi-Hop Wireless Networks. 191-202
Session 6A: Next-Generation Networks
- Thomas Springer, Kay Kadner, Frank Steuer, Ming Yin:

Middleware Support for Context-Awareness in 4G Environments. 203-211 - Christian Vogt:

A Comprehensive and Efficient Handoff Procedure for IPv6 Mobility Support. 212-218 - Dênio Mariz, Igor Cananéa, Djamel Sadok, Gábor Fodor

:
Simulative Analysis of Access Selection Algorithms for Multi-Access Networks. 219-227 - Peng Lin, Hung Q. Ngo, Chunming Qiao, Xin Wang, Ting Wang, DaYou Qian:

Minimum Cost Wireless Broadband Overlay Network Planning. 228-236
Sessin 6B: Sensor Networks II
- Pradip De, Yonghe Liu, Sajal K. Das

:
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory. 237-243 - Hang Su, Xi Zhang:

Optimal Transmission Range for Cluster-Based Wireless Sensor Networks With Mixed Communication Modes. 244-250 - Ratnabali Biswas, Vivek Jain

, Chittabrata Ghosh, Dharma P. Agrawal:
On-Demand Reliable Medium Access in Sensor Networks. 251-257 - Natalija Vlajic, David Xia:

Wireless Sensor Networks: To Cluster or Not To Cluster?. 258-268
Session 7: Multimedia Traffic and Wireless Scheduling
- Ki-Dong Lee, Victor C. M. Leung

:
Rate Scheduling of Multimedia Streams over ParallelWireless Data Channels with Heterogeneous Reliability. 269-278 - Ahmed K. F. Khattab

, Khaled M. F. Elsayed
:
Opportunistic Scheduling of Delay Sensitive Traffic in OFDMA-BasedWireless. 279-288 - Young-June Choi, Saewoong Bahk:

Selective Channel Feedback Mechanisms for Wireless Multichannel Scheduling. 289-300
Session 8A: Testbeds and Experimental Results
- Seongkwan Kim, Sekyu Park, Sunghyun Choi

, Jaehwan Lee, Hanwook Jung:
Management and Diagnosis Architecture for a Large-Scale Public WLAN. 301-307 - Sangki Yun, Hyogon Kim, Inhye Kang:

Squeezing 100+ VoIP calls out of 802.11b WLANs. 308-314 - Miroslaw Narbutt, Mark Davis:

Gauging VoIP Call Quality from 802.11 WLAN Resource Usage. 315-324
Session 8B: Higher-Layer Protocols
- Azzedine Boukerche, Jing Feng, Regina Borges de Araujo:

3D Image-Based Rendering Technique for Mobile Handheld Devices. 325-331 - Bo Yang, Ali R. Hurson

, Yu Jiao, Thomas E. Potok
:
Multimedia Correlation Analysis in Unstructured Peer-to-Peer Networks. 332-338 - Carsten Burmeister, Ulrich Killat, Jens Bachmann:

TCP over Rate-Adaptive WLAN - An Analytical Model and its Simulative Verification. 339-348
Session 9: QoS and Performance of Next Generation Cellular Networks
- Thorsten Lohmar, Zhaoyi Peng, Petri Mähönen:

Performance Evaluation of a File Repair Procedure Based on a Combination of MBMS and Unicast Bearers. 349-357 - Xiang Yu, Chunming Qiao, Xin Wang, Dahai Xu:

Performance Analysis and Enhancement of the Next Generation Cellular Networks. 358-367 - Qinghe Du, Xi Zhang:

Cross-Layer Resource-Consumption Optimization for Mobile Multicast in Wireless Networks. 368-376
Session 10A: Link Models and Optimization
- Chengzhi Li, Hao Che, San-qi Li, Dapeng Wu

:
A New Wireless Channel Fade Duration Model for Exploiting Multi-User Diversity Gain and Its Applications. 377-383 - Enzo Baccarelli, Mauro Biagi

, Nicola Cordeschi, Cristian Pelizzoni, Roberto Sabella:
Fast Downloading of Large Files over Fading Wireless Channels. 384-390 - Tong-Lee Lim, Vineet Srivastava, Mehul Motani

:
Selective Cooperation Based on Link Distance Estimations in Wireless Ad-Hoc Networks. 391-400
Session 10B: 802.11 Enhancements
- John C. Lin, Sampath Rangarajan:

LIHP: A Low Latency Layer-3 Handoff Scheme for 802.11Wireless Networks. 401-409 - Jean Cao, Yujing Wu, Carey L. Williamson:

A Station-Based Adaptation Algorithm to Improve Robustness of IEEE 802.11. 410-418 - Vasilios A. Siris

, Costas Courcoubetis:
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks. 419-428
Poster Session
- Xiaoyong Su, Chi-Cheng Peter Chu, B. S. Prabhu, Rajit Gadh:

Enabling Engineering Document in Mobile Computing Environment. 429-431 - Bo Yan, Hamid Gharavi:

Power Control in Multihop CSMA. 432-434 - Arlen Nascimento, Alexandre Passito, Edjair de Souza Mota

, Edson Nascimento Silva Jr., Leandro S. G. de Carvalho
:
Can I Add a Secure VoIP Call?. 435-437 - Tony Dean, Dennis Schaeffer, Weimin Xiao, Fan Wang:

HRPD-A Downlink Voice/IP and Data Throughput and Delay Analysis. 438-440 - Jie Qin, Bingzhang Liu, Xin Zhang, Dacheng Yang:

A Real-Time Smoothing Scheme of MPEG-4 Video for CDMA Systems. 441-443 - Yuhong Luo, Jianxin Wang, Songqiao Chen:

An Energy-Efficient DSR Routing Protocol Based on Mobility Prediction. 444-446 - Murat Demirbas, Muzammil Hussain:

A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks. 447-449 - Gianluca Dini

, Ida Maria Savino:
An Efficient Key Revocation Protocol for Wireless Sensor Networks. 450-452 - Rajagopal Iyengar, Vicky Sharma, Koushik Kar, Biplab Sikdar

:
Analysis of Contention-Based Multi-Channel Wireless MAC for Point-to-Multipoint Networks. 453-455 - Jiang Wu, Kaliappa Nadar Ravindran, Ali Sabbir

, Kevin A. Kwiat:
Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery. 456-458 - Taojun Wu, Yuan Xue, Yi Cui:

Preserving Traffic Privacy in Wireless Mesh Networks. 459-461 - Azzedine Boukerche, Firas Kazem:

An Adaptive Rate Control Algorithm for Real-time Streaming of 3D Image-Based Rendering over Heterogeneous Wireless Networks. 462-468
Workshop on Autonomic Communications and Computing (ACC'06)
- Paskorn Champrasert, Junichi Suzuki:

SymbioticSphere: A Biologically-Inspired Autonomic Architecture for Self-Adaptive and Self-Healing Server Farms. 469-474 - Raphael M. Bahati, Michael A. Bauer, Elvis M. Vieira, O. K. Baek:

Using Policies to Drive Autonomic Management. 475-479 - Eleni Patouni, Nancy Alonistioti:

A Framework for the Deployment of Self-Managing and Self-Configuring Components in Autonomic Environments. 480-484 - Lukas Kencl

, Christian Schwarzer:
Traffic-Adaptive Packet Filtering of Denial of Service Attacks. 485-489 - Sajal K. Das

, Diane J. Cook:
Designing and Modeling Smart Environments (Invited Paper). 490-494 - Mirco Musolesi

, Cecilia Mascolo
:
Evaluating Context Information Predictability for Autonomic Communication. 495-499 - David Lewis

, Declan O'Sullivan
, John Keeney:
Towards the Knowledge-Driven Benchmarking of Autonomic Communications. 500-505 - Christophe Taton, Sara Bouchenak, Noel De Palma, Daniel Hagimont, Sylvain Sicard:

Self-Sizing of Clustered Databases. 506-512
Workshop on Advanced Experimental Activities on Wireless Networks (EXPONWIRELESS'06)
- Antonio Di Stefano, Giovanni Terrazzino, Luca Scalia, Ilenia Tinnirello

, Giuseppe Bianchi
, G. Costantino Giaconia
:
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards. 513-518 - Vincent Lenders

, Jörg Wagner, Martin May:
Measurements from an 802.11b Mobile Ad Hoc Network. 519-524 - Giuseppe Bianchi

, Fabrizio Formisano, Domenico Giustiniano
:
802.11b/g Link Level Measurements for an Outdoor Wireless Campus Network. 525-530 - David Soldani:

Means and Methods for Collecting and Analyzing QoE Measurements in Wireless Networks. 531-535 - Maria Papadopouli, Michael Moudatsos, Merkourios Karaliopoulos:

Modeling Roaming in Large-scaleWireless Networks Using Real Measurements. 536-541 - Tiago Sousa, Paulo Mendes

, Edmundo Monteiro
:
Experimental Evaluation of the Source Specific Multicast Model in Mobile Environments. 542-547 - Jyh-Cheng Chen, Jui-Chi Liang, Siao-Ting Wang, Shin-Ying Pan, Yin-Shin Chen, Ying-Yu Chen:

Fast Handoff in Mobile Virtual Private Networks. 548-552 - Murat Demirbas, Ken Yian Chow, Chieh Shyan Wan:

INSIGHT: Internet-Sensor Integration for Habitat Monitoring. 553-558 - Rajendra V. Boppana, Saman Desilva:

Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks. 559-563 - Murat Demirbas, Youngwhan Song:

An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. 564-570
Workshop on Mobile Distributed Computing (MDC'06)
- Dimitrios Katsaros, Yannis Manolopoulos:

The Geodesic Broadcast Scheme for Wireless Ad Hoc Networks. 571-575 - Giovanni Di Crescenzo, Mariusz A. Fecko, Renwei Ge, Gonzalo R. Arce:

Securing Weakly-Dominating Virtual Backbones in Mobile Ad Hoc Networks. 576-580 - Brian Braunstein, Troy Trimble, Rajesh Mishra, B. S. Manoj

, Ramesh R. Rao:
On The Traffic Behavior of Distributed Wireless Mesh Networks. 581-586 - Sanem Kabadayi, Adam Pridgen, Christine Julien

:
Virtual Sensors: Abstracting Data from Physical Sensors. 587-592 - Franca Delmastro

, Marco Conti
, Enrico Gregori:
P2P Common API for Structured Overlay Networks: A Cross-Layer Extension. 593-597 - Nuno Santos

, Paulo Ferreira
:
Making Distributed Transactions Resilient to Intermittent Network Connections. 598-602 - Maurizio A. Bonuccelli, Francesca Lonetti, Francesca Martelli:

Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks. 603-608 - Emerson Loureiro, Frederico Bublitz, Nadia Barbosa, Angelo Perkusich

, Hyggo Oliveira de Almeida
, Glauber Ferreira:
A Flexible Middleware for Service Provision Over Heterogeneous Pervasive Networks. 609-614 - Jaroslaw Domaszewicz, Michal Rój, Aleksander Pruszkowski, M. Golanski, K. Kacperski:

ROVERS: Pervasive Computing Platform for Heterogeneous Sensor-Actuator Networks. 615-620 - Danny Hughes, Phil Greenwood, Geoff Coulson, Gordon S. Blair

:
GridStix: Supporting Flood Prediction using Embedded Hardware and Next Generation Grid Middleware. 621-626 - Mélanie Bouroche

, Barbara Hughes, Vinny Cahill:
Building Reliable Mobile Applications with Space-Elastic Adaptation. 627-632 - Sergio Ilarri

, Raquel Trillo, Eduardo Mena
:
SPRINGS: A Scalable Platform for Highly Mobile Agents in Distributed Computing Environments. 633-637 - Francesca Lo Piccolo, Giuseppe Bianchi

, Stefano Salsano
:
Measurement Study of the Mobile Agent JADE Platform. 638-646
Workshop on Trust, Security and Privacy for Ubiquitous Computing (TSPUC'06)
- Stefano Campadello:

The Green Card Protocol: An Identification Protocol for Decentralized Systems. 647-651 - Li Bai:

A Strong Ramp Secret Sharing Scheme Using Matrix Projection. 652-656 - Erhan J. Kartaltepe, Shouhuai Xu:

Towards Blocking Outgoing Malicious Impostor Emails. 657-661 - Andrea Bottoni, Gianluca Dini

, Evangelos Kranakis
:
Credentials and Beliefs in Remote Trusted Platforms Attestation. 662-667 - Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya:

PHONEY: Mimicking User Response to Detect Phishing Attacks. 668-672 - Uche M. Mbanaso, G. S. Cooper, David W. Chadwick

, Seth Proctor:
Privacy Preserving Trust Authorization Framework Using XACML. 673-678

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














