% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-26 % Creation time: 15-16-11 % --- Number of references % 15 % @Inproceedings { 2010-krebs-Globecom10-clustering-mesh-conference, title = {Topology Stability-Based Clustering for Wireless Mesh Networks}, year = {2010}, month = {12}, volume = {1}, pages = {1-5}, abstract = {In the past, many clustering algorithms for ad-hoc networks have been proposed. Their main objective is to solve the scalability issue of ad-hoc networks by grouping nodes into clusters. The challenge in MANETs for those clustering algorithms is to cope with the high node mobility which affects the stability of the cluster structures. Wireless mesh networks consist of a static backbone and a number of mobile nodes. In the backbone of a wireless mesh network the topology is relatively static. However, topology changes occur due to frequent link losses and temporary link instability. Due to the static nature of the backbone, mobility-based approaches are not suitable in this case. In this paper, we state the important aspects for stable clustering in wireless mesh networks with unidirectional links based on the investigation of a 45-node wireless mesh testbed. We analyze well-known clustering algorithms and their performance in a large-scale testbed. Finally, we propose a new clustering algorithm called Stable Link Clustering Algorithm (SLCA).}, url = {fileadmin/papers/2010/2010-lora-clustering-MESH.pdf}, web_url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5683417}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, USA}, event_place = {Miami, FL, USA}, event_name = {IEEE Global Telecommunications Conference, GLOBECOM 2010}, event_date = {6 - 10 December 2010}, language = {en}, ISBN = {978-1-4244-5636-9}, DOI = {10.1109/GLOCOM.2010.5683417}, reviewed = {1}, author = {Krebs, Martin and Stein, Andr{\'e} and Lora Gir{\'o}n, M{\'o}nica Alejandra} } @Inproceedings { 2010-sensys-alizai-tinywifi, title = {Poster Abstract: TinyOS Meets Wireless Mesh Networks}, year = {2010}, month = {11}, pages = {429-430}, abstract = {We present TinyWifi, a nesC code base extending TinyOS to support Linux powered network nodes. It enables developers to build arbitrary TinyOS applications and protocols and execute them directly on Linux by compiling for the new TinyWifi platform. Using TinyWifi as a TinyOS platform, we expand the applicability and means of evaluation of wireless protocols originally designed for sensornets towards inherently similar Linux driven ad hoc and mesh networks.}, affiliation = {Received Best Poster Award}, url = {fileadmin/papers/2010/2010-11-alizai-tinywifi-sensys.pdf}, web_url = {http://portal.acm.org/citation.cfm?id=1870058\&preflayout=flat}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4503-0344-6}, DOI = {10.1145/1869983.1870058}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kirchen, Bernhard and Bitsch Link, J{\'o} Agila and Wirtz, Hanno and Wehrle, Klaus} } @Inproceedings { 5646775, title = {{Indoor Navigation Approach Based on Approximate Positions}}, year = {2010}, month = {9}, pages = {778--784}, misc2 = {Print}, editor = {Mautz, R., Kunz, M. and Ingensand, H.}, publisher = {IEEE}, booktitle = {Proceedings of the 2010 International Conference on Indoor Positioning and Indoor Navigation (IPIN 2010), Zurich, Switzerland}, language = {en}, ISBN = {978-1-4244-5864-6}, DOI = {10.1109/IPIN.2010.5646775}, author = {Chowaw-Liebman, Ory and Christoph, Uta and Krempels, Karl-Heinz and Terwelp, Christoph} } @Inproceedings { 2010-kunz-mascots-horizon, title = {Expanding the Event Horizon in Parallelized Network Simulations}, year = {2010}, month = {8}, day = {18}, pages = {172-181}, abstract = {The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.}, tags = {horizon}, url = {fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf}, misc2 = {Online}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, booktitle = {Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA}, event_place = {Miami, FL, USA}, event_name = {18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)}, event_date = {August 17-19, 2010}, language = {en}, ISBN = {978-0-7695-4197-6}, ISSN = {1526-7539}, DOI = {10.1109/MASCOTS.2010.26}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Gross, James and G{\"o}tz, Stefan and Naghibi, Farshad and Wehrle, Klaus} } @Inproceedings { DBLP:conf/winsys/Chowaw-LiebmanCKT10, title = {Evaluation of an Indoor Navigation Approach based on Approximate Positions}, year = {2010}, month = {7}, pages = {195-201}, misc2 = {Print}, editor = {Rafael F. S. Caldeirinha and Mohammad S. Obaidat}, publisher = {SciTePress}, booktitle = {WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, language = {en}, ISBN = {978-989-8425-24-9}, author = {Chowaw-Liebman, Ory and Christoph, Uta and Krempels, Karl-Heinz and Terwelp, Christoph} } @Inproceedings { DBLP:conf/winsys/ChristophKST10a, title = {Automatic Context Detection of a Mobile user}, year = {2010}, month = {7}, pages = {189-194}, misc2 = {Print}, editor = {Rafael F. S. Caldeirinha and Mohammad S. Obaidat}, publisher = {SciTePress}, booktitle = {WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, language = {en}, ISBN = {978-989-8425-24-9}, author = {Christoph, Uta and Krempels, Karl-Heinz and von St{\"u}lpnagel, Janno and Terwelp, Christoph} } @Inproceedings { icc2010vpsim, title = {Towards Network Centric Development of Embedded Systems}, year = {2010}, month = {5}, day = {23}, pages = {1-6}, abstract = {Nowadays, the development of embedded system hardware and related system software is mostly carried out using virtual platform environments. The high level of modeling detail (hardware elements are partially modeled in a cycle-accurate fashion) is required for many core design tasks. At the same time, the high computational complexity of virtual platforms caused by the detailed level of simulation hinders their application for modeling large networks of embedded systems. In this paper, we propose the integration of virtual platforms with network simulations, combining the accuracy of virtual platforms with the versatility and scalability of network simulation tools. Forming such a hybrid toolchain facilitates the detailed analysis of embedded network systems and related important design aspects, such as resource effectiveness, prior to their actual deployment.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-schuermans-weingaertner-network_centric.pdf}, misc2 = {Online}, publisher = {IEEE}, booktitle = {Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23-27}, language = {en}, ISBN = {978-1-4244-6402-9}, ISSN = {1550-3607}, DOI = {10.1109/ICC.2010.5502185}, reviewed = {1}, author = {Sch{\"u}rmanns, Stefan and Weingaertner, Elias and Kempf, Torsten and Ascheid, Gerd and Wehrle, Klaus and Leupers, Rainer} } @Inproceedings { 2010-ipsn-sasnauskas-kleenet, title = {KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment}, year = {2010}, month = {4}, day = {12}, pages = {186--196}, abstract = {Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.}, keywords = {automated protocol testing, experimentation, failure detection, wireless sensor networks}, tags = {kleenet}, url = {fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden}, language = {en}, ISBN = {978-1-60558-988-6}, DOI = {http://doi.acm.org/10.1145/1791212.1791235}, reviewed = {1}, author = {Sasnauskas, Raimondas and Landsiedel, Olaf and Alizai, Muhammad Hamad and Weise, Carsten and Kowalewski, Stefan and Wehrle, Klaus} } @Inbook { 2010-aktas-modeling-application-traffic-bookchapter, title = {Modeling Application Traffic}, year = {2010}, month = {4}, pages = {397-426}, publisher = {Springer}, chapter = {18}, booktitle = {Modeling and Tools for Network Simulation}, ISBN = {978-3-642-12330-6}, author = {Aktas, Ismet and Mengi, Cem and King, Thomas} } @Incollection { 2010-kunz-simtools-parallelDES, title = {Parallel Discrete Event Simulation}, year = {2010}, month = {4}, pages = {121-131}, misc2 = {Print}, editor = {Klaus Wehrle and Mesut G{\"u}nes and James Gross}, publisher = {Springer}, address = {Berlin, Germany}, chapter = {8}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Kunz, Georg} } @Incollection { 2010-kunz-simtools-deployments, title = {From Simulations to Deployments}, year = {2010}, month = {4}, pages = {83-97}, misc2 = {Print}, editor = {Klaus Wehrle and Mesut G{\"u}nes and James Gross}, publisher = {Springer}, address = {Berlin, Germany}, chapter = {6}, booktitle = {Modeling and Tools for Network Simulation}, language = {en}, ISBN = {978-3-642-12330-6}, reviewed = {1}, author = {Kunz, Georg and Landsiedel, Olaf and Wittenburg, Georg} } @Inproceedings { DBLP:conf/webist/ChristophGK10, title = {Efficient Literature Research based on Semantic Tagnets - Implemented and Evaluated for a German Text-corpus}, year = {2010}, month = {4}, volume = {2}, pages = {48-54}, misc2 = {Print}, editor = {Joaquim Filipe and Jos{\'e} Cordeiro}, publisher = {INSTICC Press}, booktitle = {WEBIST 2010, Proceedings of the 6th International Conference on Web Information Systems and Technologies, Valencia, Spain}, language = {en}, ISBN = {978-989-674-025-2}, author = {Christoph, Uta and G{\"o}tten, Daniel and Krempels, Karl-Heinz} } @Inbook { 2010-02-book-alizai-hardware-and-systems, title = {Tools and Modeling Approaches for Simulating Hardware and Systems}, year = {2010}, month = {2}, volume = {1}, pages = {99-117}, url = {http://www.network-simulation.info/}, web_url = {http://www.amazon.com/Modeling-Tools-Network-Simulation-Wehrle/dp/3642123309}, misc2 = {Print}, publisher = {Springer LNCS}, chapter = {Chapter 7}, booktitle = {Modeling and Tools for Network Simulation}, language = {EN}, ISBN = {978-3-642-12330-6}, author = {Alizai, Muhammad Hamad and Gao, Lei and Kempf, Torsten and Landsiedel, Olaf} } @Inproceedings { 2010-ARCS-alizai-promotingpower, title = {Promoting Power to a First Class Metric in Network Simulations}, year = {2010}, pages = {387-392}, abstract = {Accurate prediction of energy consumption early in the design process is essential to efficiently optimize algorithms and protocols. However, despite energy efficiency gathering significant attention in networking research, limited effort has been invested in providing requisite evaluation tools and models. Hence, developers demand powerful evaluation tools to assist them in comparing new communication paradigms in terms of energy efficiency, and minimizing the energy requirements of algorithms. In this paper, we argue for promoting energy to a first class metric in network simulations. We explore the challenges involved in modelling energy in network simulations and present a detailed analysis of different modelling techniques. Finally, we discuss their applicability in high-level network simulations.}, url = {fileadmin/papers/2010/2010-2-ARCS-alizai-promoting-power.pdf}, misc2 = {Print}, publisher = {VDE-VERLAG}, address = {Berlin, Germany}, booktitle = {Proceedings of the Workshop on Energy Aware Systems and Methods, in conjunction with GI/ITG ARCS 2010 Hannover, Feb. 21-23}, language = {en}, ISBN = {978-3-8007-3222-7}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Kunz, Georg and Landsiedel, Olaf and Wehrle, Klaus} } @Inproceedings { 201006GarciaIFIPTM, title = {On Applications of Cooperative Security in Distributed Networks}, year = {2010}, abstract = {ManyapplicationsrunningontheInternetoperateinfullyor semi-distributed fashion including P2P networks or social networks. Dis- tributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability. In particular, faulty or mis- behaving nodes cannot collude to subvert the system operation. This paper addresses the above threats by applying cooperative security techniques to relevant distributed systems in the Internet. Our goal is to present methods that allow the peers to bootstrap basic trust relation- ships at the time of joining a distributed network and remove the peers if trust is lost. We consider the specific security caveats of the analyzed sys- tems, investigate the applicability of existing cooperative security-based protocols, and propose general design guidelines for cooperative-security protocol in described distributed systems.}, misc2 = {Print}, publisher = {Springer}, address = {Berlin}, booktitle = {Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management}, event_place = {Morioka, Japan}, event_name = {4th International Conference on Trust Management}, language = {en}, ISBN = {978-3-642-13445-6}, reviewed = {1}, author = {Kuptsov, Dmitriy and Garcia-Morchon, Oscar and Wehrle, Klaus and Gurtov, Andrei} }