% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-16 % Creation time: 19-37-14 % --- Number of references % 35 % @Inproceedings { goetz2008adapt, title = {ADAPT: A Semantics-Oriented Protocol Architecture}, year = {2008}, month = {12}, day = {10}, volume = {5343/2008}, pages = {287-292}, abstract = {Although modularized protocol frameworks are flexible and adaptive to the increasing heterogeneity of networking environments, it remains a challenge to automatically compose communication stacks from protocol modules. The typical static classification into network layers or class hierarchies cannot appropriately accommodate cross-cutting changes such as overlay routing or cross-layer signaling. In this paper, we discuss how protocol composition can be driven by functionality and demand at runtime based on extensible semantic models of protocols and their execution environment. Such an approach allows to reason about the functionality and quality of automatically composed and adapted protocol compounds and it is open to existing and future protocols.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-goetz-mobiarch-adapt.pdf}, misc2 = {Print}, editor = {Karin Anna Hummel and James P. G. Sterbenz}, publisher = {Springer-Verlag}, address = {Tiergartenstra{\ss}e 17, 69121 Heidelberg, Germany}, series = {Lecture Notes in Computer Science}, booktitle = {Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria}, event_place = {Vienna, Austria}, event_name = {3rd International Workshop on Self-Organizing Systems (IWSOS)}, event_date = {2008-12-10}, language = {en}, ISBN = {978-3-540-92156-1}, DOI = {10.1007/978-3-540-92157-8\textbackslash_27}, reviewed = {1}, author = {G{\"o}tz, Stefan and Beckel, Christian and Heer, Tobias and Wehrle, Klaus} } @Inproceedings { heer-2008-conext-alpha, title = {ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication}, year = {2008}, month = {12}, volume = {1}, pages = {23:1--23:12}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-conext-alpha.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, series = {CoNEXT '08}, booktitle = {Proceedings of the 2008 ACM CoNEXT Conference, Madrid, Spain}, event_place = {Madrid, Spain}, event_name = {ACM Conext 2008}, event_date = {December 2008}, language = {en}, ISBN = {978-1-60558-210-8}, DOI = {10.1145/1544012.1544035}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Garcia-Morchon, Oscar and Wehrle, Klaus} } @Conference { 2008-ntms-samad-RFID, title = {Controlling Physical Objects with Privacy using Secure RFID System}, year = {2008}, month = {11}, day = {5}, pages = {1-5}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2nd International Conference on New Technologies, Mobility, and Security (NTMS 2008), Tangier, Morocco}, event_place = {Tangier, Morocco}, event_name = {International Conference on New Technologies, Mobility and Security}, event_date = {5-7 Nov. 2008}, language = {en}, ISBN = {978-2-9532443-0-4}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Inproceedings { 2008-sensys-sasnauskas-kleenet, title = {Poster Abstract: KleeNet - Automatic Bug Hunting in Sensor Network Applications}, year = {2008}, month = {11}, pages = {425--426}, abstract = {We present KleeNet, a Klee based bug hunting tool for sensor network applications before deployment. KleeNet automatically tests code for all possible inputs, ensures memory safety, and integrates well into TinyOS based application development life cycle, making it easy for developers to test their applications.}, keywords = {bug finding, memory safety, tinyos, type safety}, tags = {kleenet}, url = {fileadmin/papers/2008/2008-11-Sasnauskas-SenSys08-KleeNet.pdf}, misc2 = {Print}, publisher = {ACM}, address = {New York, NY, USA}, booktitle = {Proceedings of the 6th ACM conference on Embedded network sensor systems (SenSys'08), Raleigh, NC, USA}, language = {en}, ISBN = {978-1-59593-990-6}, DOI = {http://doi.acm.org/10.1145/1460412.1460485}, reviewed = {1}, author = {Sasnauskas, Raimondas and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { 200810ThieleSensors08RatPack, title = {Smart Sensors for Small Rodent Observation}, year = {2008}, month = {10}, day = {26}, pages = {709 -- 711}, abstract = {Working towards the observation of rats (and other small rodents) in the wild we have developed tools that will enable us to study their behavior using a wireless network of wearable sensor nodes. The space and weight constraints resulting from the size of the animals have led to simple but functional approaches for vocalization classification and position estimation. For the resulting data we have developed novel, delay-tolerant routing and collection strategies. These are expected to be used in a sparse, dynamic network resulting from various rats being tagged with our nodes and running around freely - an area that will eventually be too big to be covered solely by stationary data sinks. Furthermore, the system is designed to extract information on the social interactions between animals from the routing data. It currently works in an indoor environment and we are preparing it for tests in a controlled outdoor setup.}, tags = {RatPack}, url = {fileadmin/papers/2008/2008-10-Thiele-Sensors08-RatPack.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4716540}, misc2 = {Online}, publisher = {IEEE}, address = {New York City, NY, USA}, booktitle = {Proceedings of IEEE Sensors 2008, Lecce, Italy}, organization = {IEEE}, event_place = {Lecce, Italy}, event_name = {IEEE Sensors 2008}, event_date = {26-29 Oct. 2008}, language = {en}, ISBN = {978-1-4244-2580-8}, ISSN = {1930-0395}, DOI = {10.1109/ICSENS.2008.4716540}, reviewed = {1}, author = {Thiele, Johannes and Osechas, Okuary and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Conference { 200810riechelcncerco, title = {Range Queries and Load Balancing in a Hierarchically Structured P2P System}, year = {2008}, month = {10}, day = {14}, pages = {28-35}, abstract = {Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, are used more and more for file-sharing and content distribution applications. However, a major weakness of traditional DHTs is the search for stored content, as data is assigned to nodes based on hash functions, and the very nature of hash tables allows only exact pattern matches. We present Cerco, a solution for the problem of range queries by using the principles of order-preserving DHTs and a hierarchically structured P2P approach. To guarantee an efficient routing and load balancing, Cerco uses a dynamic hierarchy of DHTs by creating subrings on demand and two explicit load balancing strategies. Our evaluation shows that Cerco is able to achieve the goals of supporting range queries, logarithmic-hop routing, and efficient load balancing.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4664131\&arnumber=4664148\&count=180\&index=16}, web_url = {http://web.informatik.uni-bonn.de/IV/Mitarbeiter/matthew/Mirror_LCN2008_Website/www.ieeelcn.org/}, misc2 = {Print}, publisher = {IEEE Press}, booktitle = {Proceedings of 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)}, organization = {IEEE}, event_place = {Montreal, Canada}, event_name = {33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)}, event_date = {14-17 Oct. 2008}, language = {en}, ISBN = {978-1-4244-2412-2}, DOI = {10.1109/LCN.2008.4664148}, reviewed = {1}, author = {Rieche, Simon and Vinh, Bui The and Wehrle, Klaus} } @Techreport { draft-ietf-hip-cert-00, title = {{Host Identity Protocol Certificates}}, year = {2008}, month = {10}, volume = {1}, number = {draft-ietf-hip-cert-00.txt}, note = {{expires: January 2, 2010 (work in progress)}}, url = {http://tools.ietf.org/html/draft-ietf-hip-cert-00}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-00}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Inproceedings { DugosijaEHVHM2008, title = {Online Gaming as Tool for Career Development}, year = {2008}, month = {9}, day = {16}, volume = {386}, abstract = {Gaming has undergone a transition from a niche hobby to a part of everyday culture, with the most prominent examples of professional gaming in Korea and the success of World of Warcraft. This transition alongside with the advance of use of the Internet has created a new kind of social environment, commonly known as virtual life. This paper presents an excerpt of the results of a survey investigating this environment with particular regard to the interaction between gaming and career, relationships as well as social groups. “Man only plays when in the full meaning of the word he is a man, and he is only completely a man when he plays. ” Schiller 1}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-steg-vaegs-gaming.pdf}, web_url = {http://www.slideshare.net/vaegs/online-gaming-as-tool-for-career-development-presentation}, editor = {Ralf Klamma, Nalin Sharda, Baltasar Fern{\'a}ndez-Manj{\'o}n, Harald Kosch and Marc Spaniol}, series = {CEUR Workshop Proceedings}, booktitle = {Proceedings of the First International Workshop on Story-Telling and Educational Games (STEG'08)}, event_place = {Maastricht School of Management, Maastricht, The Netherlands}, event_name = {First International Workshop on Story-Telling and Educational Games (STEG'08)}, event_date = {September 16, 2008}, language = {en}, author = {Dugosija, Darko and Efe, Vadi and Hackenbracht, Stephan and Vaegs, Tobias and Hannemann, Anna} } @Techreport { 2008-fgsn-sasnauskas-kleenet, title = {Bug Hunting in Sensor Network Applications}, year = {2008}, month = {9}, abstract = {Testing sensor network applications is an essential and a difficult task. Due to their distributed and faulty nature, severe resource constraints, unobservable interactions, and limited human interaction, sensor networks, make monitoring and debugging of applications strenuous and more challenging. In this paper we present KleeNet - a Klee based platform independent bug hunting tool for sensor network applications before deployment - which can automatically test applications for all possible inputs, and hence, ensures memory safety for TinyOS based applications. Upon finding a bug, KleeNet generates a concrete test case with real input values identifying a specific error path in a program. Additionally, we show that KleeNet integrates well into TinyOS application development life cycle with minimum manual effort, making it easy for developers to test their applications.}, tags = {kleenet}, url = {fileadmin/papers/2008/2008-09-Sasnauskas-FGSN08-BugHunting.pdf}, web_url = {ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf}, misc2 = {Print}, publisher = {Freie Universit{\"a}t Berlin, Institute of Computer Science}, address = {Berlin, Germany}, booktitle = {Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany}, institution = {Chair of Communication and Distributed Systems (ComSys)}, language = {en}, reviewed = {1}, author = {Sasnauskas, Raimondas and Bitsch Link, J{\'o} Agila and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Inproceedings { 200808OsechasEMBC08RatPack, title = {Ratpack: Wearable Sensor Networks for Animal Observation}, year = {2008}, month = {8}, day = {20}, pages = {538--541}, abstract = {The goal of our project is to describe the behavior of rats. For this purpose we are using wireless sensor networks, monitoring various quantities that yield important information to complement current knowledge on the behavioral repertoire of rats. So far, on the sensing and processing side we have developed innovative, minimalist approaches pointing in two directions: vocalization analysis and movement tracking. On the data collection and routing side we have adapted to the known burrowing habits of rats by developing new methods for synchronization and data aggregation under the paradigm of sporadic connectivity in a sparse, dynamic network.}, keywords = {Animals;Behavior, Animal;Clothing;Equipment Design;Equipment Failure Analysis;Miniaturization;Monitoring, Ambulatory;Rats;Reproducibility of Results;Sensitivity and Specificity;Transducers;}, tags = {ratpack}, url = {fileadmin/papers/2008/2008-08-Osechas-EMBC08-RatPack.pdf}, web_url2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4649209}, misc2 = {Online}, publisher = {The Printing House}, address = {Stoughton, WI, USA}, booktitle = {Proceedings of the 30th Annual International IEEE Engineering in Medicine and Biology Conference, Vancouver, BC, Canada}, organization = {IEEE EMBS}, event_place = {Vancouver, BC, Canada}, event_name = {Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE}, event_date = {20-25 Aug. 2008}, language = {en}, ISBN = {978-1-4244-1814-5}, ISSN = {1557-170X}, DOI = {10.1109/IEMBS.2008.4649209}, reviewed = {1}, author = {Osechas, Okuary and Thiele, Johannes and Bitsch Link, J{\'o} Agila and Wehrle, Klaus} } @Inproceedings { 200808BitschSIGCOMM08RatPack, title = {RatPack: Communication in a Sparse Dynamic Network}, year = {2008}, month = {8}, day = {17}, pages = {467--468}, abstract = {The goal of this pro ject is to investigate the behavior of wild living rats using sensor networks. The main challenge with respect to communication is the sparse and very dynamic network determined by the burrow dwelling behavior of rats, which makes delay tolerant data transmission schemes a necessity. The physical and computional restrictions in embedded devices make routing an interesting challenge for which we are currently developing new strategies.}, tags = {ratpack}, url = {fileadmin/papers/2008/2008-08-Bitsch-SIGCOMM08-RatPack.pdf}, web_url2 = {http://conferences.sigcomm.org/sigcomm/2008/posters.php}, misc = {http://www.worldcat.org/title/sigcomm-08-proceedings-of-the-2008-sigcomm-conference-and-co-located-workshops-nsdr08-wosn08-mobiarch08-netecon08-presto08-seattle-wa-usa-august-17-22-2008/oclc/300481768}, misc2 = {Online}, publisher = {ACM}, address = {New York City, NY, USA}, booktitle = {ACM SIGCOMM 2008 Poster Proceedings, Seattle, WA, USA}, organization = {ACM}, event_place = {Seattle, WA, USA}, event_name = {ACM SIGCOMM 2008}, event_date = {August 17-22, 2008}, language = {en}, ISBN = {978-1-60558-175-0}, reviewed = {1}, author = {Bitsch Link, J{\'o} Agila and Wehrle, Klaus and Osechas, Okuary and Thiele, Johannes} } @Techreport { draft-varjonen-hip-cert-01, title = {{Host Identity Protocol Certificates}}, year = {2008}, month = {7}, volume = {1}, number = {draft-varjonen-hip-cert-01.txt}, note = {{expires: January 15, 2009 (work in progress)}}, url = {http://tools.ietf.org/html/draft-varjonen-hip-cert-01}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, reviewed = {1}, author = {Heer, Tobias and Varjonen, Samu} } @Techreport { 2008-fgsn-alizai-stle, title = {Challenges in Short-term Wireless Link Quality Estimation}, year = {2008}, month = {7}, pages = {27-30}, tags = {wld}, url = {fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf}, web_url = {ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf}, misc2 = {Print}, publisher = {Fachbereich Mathematik und Informatik}, address = {Berlin, Germany}, booktitle = {Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks}, event_name = {FGSN 08}, event_date = {September 2010}, language = {en}, reviewed = {1}, author = {Alizai, Muhammad Hamad and Landsiedel, Olaf and Wehrle, Klaus and Becher, Alexander} } @Conference { 2008-heer-pisa-full, title = {Secure Wi-Fi Sharing at Global Scales}, year = {2008}, month = {6}, day = {16}, volume = {1}, pages = {1-7}, abstract = {The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet uplinks among users has first become popular in communities of individuals and has recently been adopted as a business model by several companies. However, existing implementations and proposals suffer from the security risks of directly providing Internet access to strangers. In this paper, we present the P2P Wi-Fi Internet Sharing Architecture PISA, which eliminates these risks by introducing secure tunneling, cryptographic identities, and certificates as primary security concepts. Thus, PISA offers nomadic users the same security that they expect from a wired Internet connection at home. Based on its three fundamental mechanisms, PISA achieves a flexibility which opens significant advantages over existing systems. They include user mobility, anonymity, service levels with different performance and availability characteristics, and different revenue models for operators. With this combination of key features, PISA forms an essential basis for global, seamless, and secure Wi-Fi sharing for large communities.}, tags = {mobile_access}, url = {http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-ict-secure-wifi.pdf}, misc2 = {Print}, publisher = {IEEE}, address = {Washington, DC, USA}, booktitle = {Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation}, event_place = {St. Petersburg, Russian Federation}, event_name = {15th International Conference on Telecommunication (ICT)}, event_date = {16-19 June 2008}, language = {en}, ISBN = {978-1-4244-2035-3}, reviewed = {1}, author = {Heer, Tobias and G{\"o}tz, Stefan and Weingaertner, Elias and Wehrle, Klaus} } @Inproceedings { 200809WeingaertnerSyncNetworkEmulation, title = {Synchronized Network Emulation}, year = {2008}, month = {6}, day = {3}, volume = {1}, number = {1}, pages = {1-2}, note = {Awarded with ACM SIGMETRICS Best Student Panelist Award. The corresponding Abstract was included on the USB Stick of the 2007 SIGMETRICS conference.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/sigmetrics-thesis-panel.pdf}, misc2 = {Online}, address = {Annapolis, MD}, booktitle = {Proceedings of the ACM SIGMETRICS 2008 Student Thesis Panel, Annapolis, MD}, organization = {ACM}, language = {en}, reviewed = {1}, author = {Weingaertner, Elias} } @Inproceedings { 2008-becher-hotemnets-linkestimation, title = {Towards Short-Term Wireless Link Quality Estimation}, year = {2008}, month = {6}, day = {3}, pages = {1--5}, abstract = {Commonly, routing in sensor networks is limited to longterm stable links. Unstable links, although often promising to be of large routing progress, are not considered for packet forwarding as link estimators typically cannot handle their dynamics. In this paper we introduce short-term link estimation to capture link dynamics at a high resolution in time and to identify when these render a link temporarily reliable or unreliable. We identify such dynamics based on packet overhearing, predict short-term availability and unavailability, and adapt neighbor tables, thereby enlarging the set of links useable by any routing algorithm. Additionally, we show that short-term link estimation integrates seamlessly into today's sensor network link estimators and routing protocols.}, tags = {wld}, url = {fileadmin/papers/2008/2008-becher-hotemnets-linkestimation.pdf}, misc2 = {Online}, publisher = {ACM Press}, address = {New York, NY, USA}, booktitle = {Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Charlottesville, VA, USA}, event_place = {Chalottesville, USA}, event_name = {Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08)}, event_date = {June 2-3, 2008}, language = {en}, ISBN = {978-1-60558-209-2}, reviewed = {1}, author = {Becher, Alexander and Landsiedel, Olaf and Kunz, Georg and Wehrle, Klaus} } @Conference { 200803riechemmvecluster, title = {Clustering Players for Load Balancing in Virtual Worlds}, year = {2008}, month = {3}, day = {18}, pages = {9-13}, abstract = {Massively Multiplayer Online Games (MMOGs) have become increasingly popular in the last years. So far the distribution of load, caused by the players in these games, is not distributed dynamically. After the launch of a new game, the introduction of new content, during special ingame events, or also during normal operations, players tend to concentrate in certain regions of the game worlds and cause overload conditions. Therefore we propose the use of structured P2P technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas; however this approach often split a group of players to different servers, causing additional overhead. This work presents a cluster-based Peer-to-Peer approach, which can be used for load balancing in MMOGs or in other virtual worlds. The system is able to dynamically adapt to the current state of the game and handle uneven distributions of the players in the game world. We show through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based systems, which split the world in rectangular areas.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, url = {http://www.pap.vs.uni-due.de/MMVE08/papers/proceedings.pdf}, web_url = {http://www.pap.vs.uni-due.de/MMVE08/}, misc2 = {Online}, editor = {Gregor Schiele, Daniel Weiskopf, Ben Leong, Shun-Yun Hu}, booktitle = {Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008)}, event_place = {Reno, Nevada, USA}, event_name = {1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008)}, event_date = {March 8th, 2008}, language = {en}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Fouquet, Marc and Niedermayer, Heiko and Teifel, Timo and Carle, Georg} } @Techreport { draft-varjonen-hip-cert-00, title = {{Host Identity Protocol Certificates}}, year = {2008}, month = {2}, volume = {1}, number = {draft-varjonen-hip-cert-01.txt}, note = {{expires: August 21, 2008 (work in progress)}}, url = {http://tools.ietf.org/html/draft-varjonen-hip-cert-00}, misc2 = {Online}, publisher = {{IETF Trust}}, howpublished = {An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01}, series = {Internet Drafts}, organization = {{Internet Engineering Task Force}}, institution = {Internet Engineering Task Force}, language = {en}, author = {Heer, Tobias and Varjonen, Samu} } @Article { 200808WeingaertnerSIGMETRICSPERSyncNetWorkEmulation, title = {Synchronized network emulation: matching prototypes with complex simulations}, journal = {SIGMETRICS Performance Evaluation Review}, year = {2008}, volume = {36}, number = {2}, pages = {58-63}, abstract = {Network emulation, in which real systems interact with a network simulation, is a common evaluation method in computer networking research. Until now, the simulation in charge of representing the network has been required to be real-time capable, as otherwise a time drift between the simulation and the real network devices may occur and corrupt the results. In this paper, we present our work on synchronized network emulation. By adding a central synchronization entity and by virtualizing real systems for means of control, we can build-up network emulations which contain both unmodified x86 systems and network simulations of any complexity.}, note = {This is a revised version of a paper originally presented at the ACM HotMetrics 2008 workshop.}, misc2 = {print}, language = {en}, ISSN = {0163-5999}, DOI = {10.1145/1453175.1453185}, reviewed = {1}, author = {Weingaertner, Elias and Schmidt, Florian and Heer, Tobias and Wehrle, Klaus} } @Article { 200812riecheIJAMCcluster, title = {Clustering Players for Load Balancing in Virtual Worlds}, journal = {International Journal of Advanced Media and Communication (IJAMC)}, year = {2008}, volume = {2}, number = {4}, pages = {351-363}, abstract = {In current Massively Multiplayer Online Games (MMOGs) the distribution of load is not distributed dynamically. But players tend to concentrate in certain regions of the game world and cause overload conditions. Therefore we propose the use of structured Peer-to-Peer technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas but often split a group of players to different servers. This work presents a cluster-based P2P approach, which is able to dynamically adapt to the current state of the game and handle uneven distributions of players.Weshow through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based system.}, affiliation = {RWTH Aachen University - Distributed Systems Group}, web_url = {http://www.inderscience.com/browse/index.php?journalID=67}, misc2 = {print}, language = {en}, ISSN = {1462-4613}, reviewed = {1}, author = {Rieche, Simon and Wehrle, Klaus and Fouquet, Marc and Niedermayer, Heiko and Teifel, Timo and Carle, Georg} } @Inbook { 2008-thissen-LNCS-multimedia, title = {Multimedia and VR Support for Direct Communication of Designers}, year = {2008}, pages = {268-299}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Sch{\"u}ppen, Andr{\'e} and Spaniol, Otto and Thi{\ss}en, Dirk and Assenmacher, Ingo and Haberstroh, Edmund and Kuhlen, Thorsten} } @Inbook { 2008-thissen-LNCS-management, title = {Service Management for Development Tools}, year = {2008}, pages = {401-429}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Babich, Yuri and Spaniol, Otto and Thi{\ss}en, Dirk} } @Inbook { 2008-thissen-LNCS-synergy, title = {Synergy by Integrating New Functionality}, year = {2008}, pages = {519-526}, misc2 = {Print}, editor = {M. Nagl, W. Marquardt}, publisher = {Springer}, series = {Lecture Notes in Computer Science 4970}, booktitle = {Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support}, language = {en}, ISBN = {978-3-540-70551-2}, author = {Becker, Simon and Heller, Markus and Jarke, Matthias and Marquardt, Wolfgang and Nagl, Manfred and Spaniol, Otto and Thi{\ss}en, Dirk} } @Inbook { 2008-heer-hipbook-lhip, title = {Lightweight HIP}, year = {2008}, volume = {1}, pages = {121-163}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470997907.html}, misc2 = {Print}, editor = {Andrei Gurtov}, publisher = {Wiley and Sons}, address = {West Sussex, England, UK}, chapter = {8}, booktitle = {Host Identity Protocol (HIP): Towards the Secure Mobile Internet}, language = {en}, ISBN = {978-0-470-99790-1}, author = {Heer, Tobias} } @Inbook { 2008-heer-hipbook-security, title = {Introduction to Network Security}, year = {2008}, volume = {1}, pages = {13-42}, url = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470997907.html}, misc2 = {Print}, editor = {Andrei Gurtov}, publisher = {Wiley and Sons}, address = {West Sussex, England, UK}, chapter = {2}, booktitle = {Host Identity Protocol (HIP): Towards the Secure Mobile Internet}, language = {en}, ISBN = {978-0-470-99790-1}, author = {Heer, Tobias} } @Inproceedings { wessel2008GMDS, title = {Software-Engineering in Multidisciplinary Teams in Health Informatics: Quality Assurance with GREME Reviews}, year = {2008}, pages = {665-667}, publisher = {German Medical Science GMS Publishing House}, booktitle = {53. Jahrestagung der Deutschen Gesellschaft f{\"u}r Medizinische Informatik, Biometrie und Epidemiologie (gmds). Br{\"u}ckenschlag von Medizinischer Informatik, Biometrie und Epidemiologie zur Medizintechnik, Stuttgart, Germany}, language = {en}, author = {We{\ss}el, Christa and Geisler, Sandra and Christoph, Uta} } @Inproceedings { 2008-thissen-ICEB-replication, title = {Replication of Web Services for QoS Guarantees in Web Service Composition}, year = {2008}, pages = {155-160}, misc2 = {CD-ROM}, publisher = {INSTICC}, booktitle = {Proceedings of the International Conference on e-Business (ICE-B 2008), Porto, Portugal}, event_place = {Porto, Portugal}, event_name = {International Conference on e-Business (ICE-B 2008)}, language = {en}, ISBN = {978-989-8111-58-6}, reviewed = {1}, author = {Thi{\ss}en, Dirk and Brambring, Thomas} } @Inproceedings { 2008-thissen-NGMAST-IMS, title = {A SIP Application Router for Presence-Driven Composition of IMS Service}, year = {2008}, pages = {207-212}, misc2 = {Print}, publisher = {IEEE}, booktitle = {Proceedings of the 2nd IEEE Conference and Exhibition on Next Generation Mobile Applications, Services and Technologies (NGMAST 2008), Cardiff, UK}, event_place = {Cardiff, UK}, event_name = {Next Generation Mobile Applications, Services and Technologies (NGMAST 2008)}, language = {en}, ISBN = {978-0-7695-3333-9}, reviewed = {1}, author = {Espinosa Carl{\'i}n, Juan Miguel and Thi{\ss}en, Dirk} } @Inproceedings { 2008-thissen-MWCN-IMS, title = {Validation of the Signaling Procedures of a Delivery Platform for IMS Services}, year = {2008}, pages = {259-270}, misc2 = {Print}, publisher = {Springer}, booktitle = {Proceedings of the 10th IFIP International Conference on Mobile and Wireless Communications Networks (MWCN 2008), Toulouse, France}, event_place = {Toulouse, France}, event_name = {10th IFIP International Conference on Mobile and Wireless Communications Networks (MWCN 2008)}, language = {en}, ISBN = {978-0-387-84838-9}, reviewed = {1}, author = {Espinosa Carl{\'i}n, Juan Miguel and Thi{\ss}en, Dirk} } @Inproceedings { 2008-thissen-ICWI-replication, title = {Improving Quality of Web Services by using Replication}, year = {2008}, pages = {283-290}, misc2 = {CD-ROM}, publisher = {IADIS Press}, booktitle = {Proceedings of the IADIS International Conference on WWW and Internet (ICWI 2008), Freiburg, Germany}, event_place = {Freiburg}, event_name = {IADIS International Conference on WWW and Internet (ICWI 2008)}, event_date = {2008}, language = {en}, ISBN = {978-972-8924-68-3}, reviewed = {1}, author = {Thi{\ss}en, Dirk and Brambring, Thomas} } @Inproceedings { 200804landsiedelIPSN08TimingMatters, title = {When Timing Matters: Enabling Time Accurate \& Scalable Simulation of Sensor Network Applications}, year = {2008}, pages = {344-354}, abstract = {The rising complexity of data processing algorithms in sensor networks combined with their severely limited computing power necessitates an in-depth understanding of their temporal behavior. However, today only cycle accurate emulation and test-beds provide a detailed and accurate insight into the temporal behavior of sensor networks. In this paper we introduce fine grained, automated instrumentation of simulation models with cycle counts derived from sensor nodes and application binaries to provide detailed timing information. The presented approach bridges the gap between scalable but abstracting simulation and cycle accurate emulation for sensor network evaluation. By mapping device-specific code with simulation models, we can derive the time and duration a certain code line takes to get executed on a sensor node. Hence, eliminating the need to use expensive instruction-level emulators with limited speed and restricted scalability. Furthermore, the proposed design is not bound to a specific hardware platform, a major advantage compared to existing emulators. Our evaluation shows that the proposed technique achieves a timing accuracy of 99\% compared to emulation while adding only a small overhead. Concluding, it combines essential properties like accuracy, speed and scalability on a single simulation platform.}, url = {fileadmin/papers/2008/2008-04-IPSN-2008-landsiedel-Timing-Matters.pdf}, misc2 = {Print}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, booktitle = {Proceedings of the 7th ACM International Conference on Information Processing in Sensor Networks (IPSN 2008), St. Louis, MO, USA}, language = {en}, ISBN = {978-0-7695-3157-1}, reviewed = {1}, author = {Landsiedel, Olaf and Alizai, Muhammad Hamad and Wehrle, Klaus} } @Techreport { 200807VOMLEHNAIB200816NetworkSimulatorComparison, title = {Comparing recent network simulators: A performance evaluation study}, journal = {Aachener Informatik Berichte}, year = {2008}, volume = {2008-16}, number = {AIB 2008-16}, pages = {1-28}, abstract = {Ranging from the development of new protocols to validating analytical performance metrics, network simulation is the most prevalent methodology in the field of computer network research. While the well known ns-2 toolkit has established itself as the quasi standard for network simulation, the successors are on their way. In this paper, we first survey recent contributions in the field of network simulation tools as well as related aspects such as parallel network simulation. Moreover, we present preliminary results which compare the resource demands for ns-3, JiST, SimPy and OMNeT++ by implementing the identical simulation scenario in all these network simulation tools.}, url = {https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/AIB-2008-16.pdf}, misc2 = {Online}, address = {Ahornstr. 55, Aachen, Germany}, institution = {RWTH Aachen University}, type = {Technical Report}, ISSN = {0935-3232}, author = {vom Lehn, Hendrik and Weingaertner, Elias and Wehrle, Klaus} } @Techreport { 2008-heer-draft-cert-2, title = {HIP Certificates (Version 0)}, year = {2008}, abstract = {This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Varjonen, Samu and Heer, Tobias} } @Techreport { 2008-heer-draft-midauth, title = {End-Host Authentication for HIP Middleboxes (Version 1)}, year = {2008}, number = {draft-heer-hip-midauth-01}, abstract = {The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.}, note = {Work in progress}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Heer, Tobias and Komu, Miika and Wehrle, Klaus} } @Techreport { 2008-heer-draft-cert, title = {HIP Certificates (Version 1)}, year = {2008}, abstract = {This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates.}, note = {draft-varjonen-hip-cert-01.txt. Work in progress.}, institution = {Internet Engineering Task Force}, type = {Internet-Draft}, author = {Varjonen, Samu and Heer, Tobias} }