This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-25 Creation time: 21-51-32 --- Number of references 35 inproceedings goetz2008adapt ADAPT: A Semantics-Oriented Protocol Architecture 2008 12 10 5343/2008 287-292 Although modularized protocol frameworks are flexible and adaptive to the increasing heterogeneity of networking environments, it remains a challenge to automatically compose communication stacks from protocol modules. The typical static classification into network layers or class hierarchies cannot appropriately accommodate cross-cutting changes such as overlay routing or cross-layer signaling. In this paper, we discuss how protocol composition can be driven by functionality and demand at runtime based on extensible semantic models of protocols and their execution environment. Such an approach allows to reason about the functionality and quality of automatically composed and adapted protocol compounds and it is open to existing and future protocols. https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-goetz-mobiarch-adapt.pdf Print Karin Anna Hummel and James P. G. Sterbenz Springer-Verlag
Tiergartenstraße 17, 69121 Heidelberg, Germany
Lecture Notes in Computer Science Proceedings of the 3rd International Workshop on Self-Organizing Systems, Vienna, Austria Vienna, Austria 3rd International Workshop on Self-Organizing Systems (IWSOS) 2008-12-10 en 978-3-540-92156-1 10.1007/978-3-540-92157-8\_27 1 StefanGötz ChristianBeckel TobiasHeer KlausWehrle
inproceedings heer-2008-conext-alpha ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication 2008 12 1 23:1--23:12 http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-conext-alpha.pdf Print ACM
New York, NY, USA
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference, Madrid, Spain Madrid, Spain ACM Conext 2008 December 2008 en 978-1-60558-210-8 10.1145/1544012.1544035 1 TobiasHeer StefanGötz OscarGarcia-Morchon KlausWehrle
conference 2008-ntms-samad-RFID Controlling Physical Objects with Privacy using Secure RFID System 2008 11 5 1-5 Online IEEE 2nd International Conference on New Technologies, Mobility, and Security (NTMS 2008), Tangier, Morocco Tangier, Morocco International Conference on New Technologies, Mobility and Security 5-7 Nov. 2008 en 978-2-9532443-0-4 FahadSamad SadeqAli Makram inproceedings 2008-sensys-sasnauskas-kleenet Poster Abstract: KleeNet - Automatic Bug Hunting in Sensor Network Applications 2008 11 425--426 We present KleeNet, a Klee based bug hunting tool for sensor network applications before deployment. KleeNet automatically tests code for all possible inputs, ensures memory safety, and integrates well into TinyOS based application development life cycle, making it easy for developers to test their applications. bug finding, memory safety, tinyos, type safety kleenet fileadmin/papers/2008/2008-11-Sasnauskas-SenSys08-KleeNet.pdf Print ACM
New York, NY, USA
Proceedings of the 6th ACM conference on Embedded network sensor systems (SenSys'08), Raleigh, NC, USA en 978-1-59593-990-6 http://doi.acm.org/10.1145/1460412.1460485 1 RaimondasSasnauskas Jó AgilaBitsch Link Muhammad HamadAlizai KlausWehrle
inproceedings 200810ThieleSensors08RatPack Smart Sensors for Small Rodent Observation 2008 10 26 709 -- 711 Working towards the observation of rats (and other small rodents) in the wild we have developed tools that will enable us to study their behavior using a wireless network of wearable sensor nodes. The space and weight constraints resulting from the size of the animals have led to simple but functional approaches for vocalization classification and position estimation. For the resulting data we have developed novel, delay-tolerant routing and collection strategies. These are expected to be used in a sparse, dynamic network resulting from various rats being tagged with our nodes and running around freely - an area that will eventually be too big to be covered solely by stationary data sinks. Furthermore, the system is designed to extract information on the social interactions between animals from the routing data. It currently works in an indoor environment and we are preparing it for tests in a controlled outdoor setup. RatPack fileadmin/papers/2008/2008-10-Thiele-Sensors08-RatPack.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4716540 Online IEEE
New York City, NY, USA
Proceedings of IEEE Sensors 2008, Lecce, Italy IEEE Lecce, Italy IEEE Sensors 2008 26-29 Oct. 2008 en 978-1-4244-2580-8 1930-0395 10.1109/ICSENS.2008.4716540 1 JohannesThiele OkuaryOsechas Jó AgilaBitsch Link KlausWehrle
conference 200810riechelcncerco Range Queries and Load Balancing in a Hierarchically Structured P2P System 2008 10 14 28-35 Structured Peer-to-Peer (P2P) systems are highly scalable, self-organizing, and support efficient lookups. Furthermore, Distributed Hash Tables (DHTs), due to their features, are used more and more for file-sharing and content distribution applications. However, a major weakness of traditional DHTs is the search for stored content, as data is assigned to nodes based on hash functions, and the very nature of hash tables allows only exact pattern matches. We present Cerco, a solution for the problem of range queries by using the principles of order-preserving DHTs and a hierarchically structured P2P approach. To guarantee an efficient routing and load balancing, Cerco uses a dynamic hierarchy of DHTs by creating subrings on demand and two explicit load balancing strategies. Our evaluation shows that Cerco is able to achieve the goals of supporting range queries, logarithmic-hop routing, and efficient load balancing. RWTH Aachen University - Distributed Systems Group http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4664131&arnumber=4664148&count=180&index=16 http://web.informatik.uni-bonn.de/IV/Mitarbeiter/matthew/Mirror_LCN2008_Website/www.ieeelcn.org/ Print IEEE Press Proceedings of 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008) IEEE Montreal, Canada 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008) 14-17 Oct. 2008 en 978-1-4244-2412-2 10.1109/LCN.2008.4664148 1 SimonRieche Bui TheVinh KlausWehrle techreport draft-ietf-hip-cert-00 <prt>Host Identity Protocol Certificates</prt> 2008 10 1 draft-ietf-hip-cert-00.txt <prt>expires: January 2, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-00 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-00 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen inproceedings DugosijaEHVHM2008 Online Gaming as Tool for Career Development 2008 9 16 386 Gaming has undergone a transition from a niche hobby to a part of everyday culture, with the most prominent examples of professional gaming in Korea and the success of World of Warcraft. This transition alongside with the advance of use of the Internet has created a new kind of social environment, commonly known as virtual life. This paper presents an excerpt of the results of a survey investigating this environment with particular regard to the interaction between gaming and career, relationships as well as social groups. “Man only plays when in the full meaning of the word he is a man, and he is only completely a man when he plays. ” Schiller 1 https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-steg-vaegs-gaming.pdf http://www.slideshare.net/vaegs/online-gaming-as-tool-for-career-development-presentation Ralf Klamma, Nalin Sharda, Baltasar Fernández-Manjón, Harald Kosch and Marc Spaniol CEUR Workshop Proceedings Proceedings of the First International Workshop on Story-Telling and Educational Games (STEG'08) Maastricht School of Management, Maastricht, The Netherlands First International Workshop on Story-Telling and Educational Games (STEG'08) September 16, 2008 en DarkoDugosija VadiEfe StephanHackenbracht TobiasVaegs AnnaHannemann techreport 2008-fgsn-sasnauskas-kleenet Bug Hunting in Sensor Network Applications 2008 9 Testing sensor network applications is an essential and a difficult task. Due to their distributed and faulty nature, severe resource constraints, unobservable interactions, and limited human interaction, sensor networks, make monitoring and debugging of applications strenuous and more challenging. In this paper we present KleeNet - a Klee based platform independent bug hunting tool for sensor network applications before deployment - which can automatically test applications for all possible inputs, and hence, ensures memory safety for TinyOS based applications. Upon finding a bug, KleeNet generates a concrete test case with real input values identifying a specific error path in a program. Additionally, we show that KleeNet integrates well into TinyOS application development life cycle with minimum manual effort, making it easy for developers to test their applications. kleenet fileadmin/papers/2008/2008-09-Sasnauskas-FGSN08-BugHunting.pdf ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf Print Freie Universität Berlin, Institute of Computer Science
Berlin, Germany
Proceedings of the 7th GI/ITG Fachgespraech Wireless Sensor Networks, Berlin, Germany Chair of Communication and Distributed Systems (ComSys) en 1 RaimondasSasnauskas Jó AgilaBitsch Link Muhammad HamadAlizai KlausWehrle
inproceedings 200808OsechasEMBC08RatPack Ratpack: Wearable Sensor Networks for Animal Observation 2008 8 20 538--541 The goal of our project is to describe the behavior of rats. For this purpose we are using wireless sensor networks, monitoring various quantities that yield important information to complement current knowledge on the behavioral repertoire of rats. So far, on the sensing and processing side we have developed innovative, minimalist approaches pointing in two directions: vocalization analysis and movement tracking. On the data collection and routing side we have adapted to the known burrowing habits of rats by developing new methods for synchronization and data aggregation under the paradigm of sporadic connectivity in a sparse, dynamic network. Animals;Behavior, Animal;Clothing;Equipment Design;Equipment Failure Analysis;Miniaturization;Monitoring, Ambulatory;Rats;Reproducibility of Results;Sensitivity and Specificity;Transducers; ratpack fileadmin/papers/2008/2008-08-Osechas-EMBC08-RatPack.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4649209 Online The Printing House
Stoughton, WI, USA
Proceedings of the 30th Annual International IEEE Engineering in Medicine and Biology Conference, Vancouver, BC, Canada IEEE EMBS Vancouver, BC, Canada Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE 20-25 Aug. 2008 en 978-1-4244-1814-5 1557-170X 10.1109/IEMBS.2008.4649209 1 OkuaryOsechas JohannesThiele Jó AgilaBitsch Link KlausWehrle
inproceedings 200808BitschSIGCOMM08RatPack RatPack: Communication in a Sparse Dynamic Network 2008 8 17 467--468 The goal of this pro ject is to investigate the behavior of wild living rats using sensor networks. The main challenge with respect to communication is the sparse and very dynamic network determined by the burrow dwelling behavior of rats, which makes delay tolerant data transmission schemes a necessity. The physical and computional restrictions in embedded devices make routing an interesting challenge for which we are currently developing new strategies. ratpack fileadmin/papers/2008/2008-08-Bitsch-SIGCOMM08-RatPack.pdf http://conferences.sigcomm.org/sigcomm/2008/posters.php http://www.worldcat.org/title/sigcomm-08-proceedings-of-the-2008-sigcomm-conference-and-co-located-workshops-nsdr08-wosn08-mobiarch08-netecon08-presto08-seattle-wa-usa-august-17-22-2008/oclc/300481768 Online ACM
New York City, NY, USA
ACM SIGCOMM 2008 Poster Proceedings, Seattle, WA, USA ACM Seattle, WA, USA ACM SIGCOMM 2008 August 17-22, 2008 en 978-1-60558-175-0 1 Jó AgilaBitsch Link KlausWehrle OkuaryOsechas JohannesThiele
techreport draft-varjonen-hip-cert-01 <prt>Host Identity Protocol Certificates</prt> 2008 7 1 draft-varjonen-hip-cert-01.txt <prt>expires: January 15, 2009 (work in progress)</prt> http://tools.ietf.org/html/draft-varjonen-hip-cert-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen techreport 2008-fgsn-alizai-stle Challenges in Short-term Wireless Link Quality Estimation 2008 7 27-30 wld fileadmin/papers/2008/2008-08-alizai-fgsn-stle.pdf ftp://ftp.inf.fu-berlin.de/pub/reports/tr-b-08-12.pdf Print Fachbereich Mathematik und Informatik
Berlin, Germany
Proceedings of the 7th GI/ITG Workshop on Wireless Sensor Networks FGSN 08 September 2010 en 1 Muhammad HamadAlizai OlafLandsiedel KlausWehrle AlexanderBecher
conference 2008-heer-pisa-full Secure Wi-Fi Sharing at Global Scales 2008 6 16 1 1-7 The proliferation of broadband Internet connections has lead to an almost pervasive coverage of densely populated areas with private wireless access points. To leverage this coverage, sharing of access points as Internet uplinks among users has first become popular in communities of individuals and has recently been adopted as a business model by several companies. However, existing implementations and proposals suffer from the security risks of directly providing Internet access to strangers. In this paper, we present the P2P Wi-Fi Internet Sharing Architecture PISA, which eliminates these risks by introducing secure tunneling, cryptographic identities, and certificates as primary security concepts. Thus, PISA offers nomadic users the same security that they expect from a wired Internet connection at home. Based on its three fundamental mechanisms, PISA achieves a flexibility which opens significant advantages over existing systems. They include user mobility, anonymity, service levels with different performance and availability characteristics, and different revenue models for operators. With this combination of key features, PISA forms an essential basis for global, seamless, and secure Wi-Fi sharing for large communities. mobile_access http://www.comsys.rwth-aachen.de/fileadmin/papers/2008/2008-heer-ict-secure-wifi.pdf Print IEEE
Washington, DC, USA
Proc. of 15th International Conference on Telecommunication (ICT), St. Petersburg, Russian Federation St. Petersburg, Russian Federation 15th International Conference on Telecommunication (ICT) 16-19 June 2008 en 978-1-4244-2035-3 1 TobiasHeer StefanGötz EliasWeingaertner KlausWehrle
inproceedings 200809WeingaertnerSyncNetworkEmulation Synchronized Network Emulation 2008 6 3 1 1 1-2 Awarded with ACM SIGMETRICS Best Student Panelist Award. The corresponding Abstract was included on the USB Stick of the 2007 SIGMETRICS conference. https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/sigmetrics-thesis-panel.pdf Online
Annapolis, MD
Proceedings of the ACM SIGMETRICS 2008 Student Thesis Panel, Annapolis, MD ACM en 1 EliasWeingaertner
inproceedings 2008-becher-hotemnets-linkestimation Towards Short-Term Wireless Link Quality Estimation 2008 6 3 1--5 Commonly, routing in sensor networks is limited to longterm stable links. Unstable links, although often promising to be of large routing progress, are not considered for packet forwarding as link estimators typically cannot handle their dynamics. In this paper we introduce short-term link estimation to capture link dynamics at a high resolution in time and to identify when these render a link temporarily reliable or unreliable. We identify such dynamics based on packet overhearing, predict short-term availability and unavailability, and adapt neighbor tables, thereby enlarging the set of links useable by any routing algorithm. Additionally, we show that short-term link estimation integrates seamlessly into today's sensor network link estimators and routing protocols. wld fileadmin/papers/2008/2008-becher-hotemnets-linkestimation.pdf Online ACM Press
New York, NY, USA
Proceedings of Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08), Charlottesville, VA, USA Chalottesville, USA Fifth Workshop on Embedded Networked Sensors (Hot EmNets'08) June 2-3, 2008 en 978-1-60558-209-2 1 AlexanderBecher OlafLandsiedel GeorgKunz KlausWehrle
conference 200803riechemmvecluster Clustering Players for Load Balancing in Virtual Worlds 2008 3 18 9-13 Massively Multiplayer Online Games (MMOGs) have become increasingly popular in the last years. So far the distribution of load, caused by the players in these games, is not distributed dynamically. After the launch of a new game, the introduction of new content, during special ingame events, or also during normal operations, players tend to concentrate in certain regions of the game worlds and cause overload conditions. Therefore we propose the use of structured P2P technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas; however this approach often split a group of players to different servers, causing additional overhead. This work presents a cluster-based Peer-to-Peer approach, which can be used for load balancing in MMOGs or in other virtual worlds. The system is able to dynamically adapt to the current state of the game and handle uneven distributions of the players in the game world. We show through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based systems, which split the world in rectangular areas. RWTH Aachen University - Distributed Systems Group http://www.pap.vs.uni-due.de/MMVE08/papers/proceedings.pdf http://www.pap.vs.uni-due.de/MMVE08/ Online Gregor Schiele, Daniel Weiskopf, Ben Leong, Shun-Yun Hu Proceedings of 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008) Reno, Nevada, USA 1st International Workshop on Massively Multiuser Virtual Environments at IEEE Virtual Reality 2008 (MMVE 2008) March 8th, 2008 en 1 SimonRieche KlausWehrle MarcFouquet HeikoNiedermayer TimoTeifel GeorgCarle techreport draft-varjonen-hip-cert-00 <prt>Host Identity Protocol Certificates</prt> 2008 2 1 draft-varjonen-hip-cert-01.txt <prt>expires: August 21, 2008 (work in progress)</prt> http://tools.ietf.org/html/draft-varjonen-hip-cert-00 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-varjonen-hip-cert-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en TobiasHeer SamuVarjonen article 200808WeingaertnerSIGMETRICSPERSyncNetWorkEmulation Synchronized network emulation: matching prototypes with complex simulations SIGMETRICS Performance Evaluation Review 2008 36 2 58-63 Network emulation, in which real systems interact with a network simulation, is a common evaluation method in computer networking research. Until now, the simulation in charge of representing the network has been required to be real-time capable, as otherwise a time drift between the simulation and the real network devices may occur and corrupt the results. In this paper, we present our work on synchronized network emulation. By adding a central synchronization entity and by virtualizing real systems for means of control, we can build-up network emulations which contain both unmodified x86 systems and network simulations of any complexity. This is a revised version of a paper originally presented at the ACM HotMetrics 2008 workshop. print en 0163-5999 10.1145/1453175.1453185 1 EliasWeingaertner FlorianSchmidt TobiasHeer KlausWehrle article 200812riecheIJAMCcluster Clustering Players for Load Balancing in Virtual Worlds International Journal of Advanced Media and Communication (IJAMC) 2008 2 4 351-363 In current Massively Multiplayer Online Games (MMOGs) the distribution of load is not distributed dynamically. But players tend to concentrate in certain regions of the game world and cause overload conditions. Therefore we propose the use of structured Peer-to-Peer technology for the server infrastructure of the MMOGs to improve the reliability and scalability. Previous work segmented the game work into rectangular areas but often split a group of players to different servers. This work presents a cluster-based P2P approach, which is able to dynamically adapt to the current state of the game and handle uneven distributions of players.Weshow through simulation, also with traces from real online games, that the cluster-based approach performs better than the previous P2P-based system. RWTH Aachen University - Distributed Systems Group http://www.inderscience.com/browse/index.php?journalID=67 print en 1462-4613 1 SimonRieche KlausWehrle MarcFouquet HeikoNiedermayer TimoTeifel GeorgCarle inbook 2008-thissen-LNCS-multimedia Multimedia and VR Support for Direct Communication of Designers 2008 268-299 Print M. Nagl, W. Marquardt Springer Lecture Notes in Computer Science 4970 Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support en 978-3-540-70551-2 AndréSchüppen OttoSpaniol DirkThißen IngoAssenmacher EdmundHaberstroh ThorstenKuhlen inbook 2008-thissen-LNCS-management Service Management for Development Tools 2008 401-429 Print M. Nagl, W. Marquardt Springer Lecture Notes in Computer Science 4970 Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support en 978-3-540-70551-2 YuriBabich OttoSpaniol DirkThißen inbook 2008-thissen-LNCS-synergy Synergy by Integrating New Functionality 2008 519-526 Print M. Nagl, W. Marquardt Springer Lecture Notes in Computer Science 4970 Collaborative and Distributed Chemical Engineering, From Understanding to Substantial Design Process Support en 978-3-540-70551-2 SimonBecker MarkusHeller MatthiasJarke WolfgangMarquardt ManfredNagl OttoSpaniol DirkThißen inbook 2008-heer-hipbook-lhip Lightweight HIP 2008 1 121-163 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470997907.html Print Andrei Gurtov Wiley and Sons
West Sussex, England, UK
8 Host Identity Protocol (HIP): Towards the Secure Mobile Internet en 978-0-470-99790-1 TobiasHeer
inbook 2008-heer-hipbook-security Introduction to Network Security 2008 1 13-42 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470997907.html Print Andrei Gurtov Wiley and Sons
West Sussex, England, UK
2 Host Identity Protocol (HIP): Towards the Secure Mobile Internet en 978-0-470-99790-1 TobiasHeer
inproceedings wessel2008GMDS Software-Engineering in Multidisciplinary Teams in Health Informatics: Quality Assurance with GREME Reviews 2008 665-667 German Medical Science GMS Publishing House 53. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie (gmds). Brückenschlag von Medizinischer Informatik, Biometrie und Epidemiologie zur Medizintechnik, Stuttgart, Germany en ChristaWeßel SandraGeisler UtaChristoph inproceedings 2008-thissen-ICEB-replication Replication of Web Services for QoS Guarantees in Web Service Composition 2008 155-160 CD-ROM INSTICC Proceedings of the International Conference on e-Business (ICE-B 2008), Porto, Portugal Porto, Portugal International Conference on e-Business (ICE-B 2008) en 978-989-8111-58-6 1 DirkThißen ThomasBrambring inproceedings 2008-thissen-NGMAST-IMS A SIP Application Router for Presence-Driven Composition of IMS Service 2008 207-212 Print IEEE Proceedings of the 2nd IEEE Conference and Exhibition on Next Generation Mobile Applications, Services and Technologies (NGMAST 2008), Cardiff, UK Cardiff, UK Next Generation Mobile Applications, Services and Technologies (NGMAST 2008) en 978-0-7695-3333-9 1 Juan MiguelEspinosa Carlín DirkThißen inproceedings 2008-thissen-MWCN-IMS Validation of the Signaling Procedures of a Delivery Platform for IMS Services 2008 259-270 Print Springer Proceedings of the 10th IFIP International Conference on Mobile and Wireless Communications Networks (MWCN 2008), Toulouse, France Toulouse, France 10th IFIP International Conference on Mobile and Wireless Communications Networks (MWCN 2008) en 978-0-387-84838-9 1 Juan MiguelEspinosa Carlín DirkThißen inproceedings 2008-thissen-ICWI-replication Improving Quality of Web Services by using Replication 2008 283-290 CD-ROM IADIS Press Proceedings of the IADIS International Conference on WWW and Internet (ICWI 2008), Freiburg, Germany Freiburg IADIS International Conference on WWW and Internet (ICWI 2008) 2008 en 978-972-8924-68-3 1 DirkThißen ThomasBrambring inproceedings 200804landsiedelIPSN08TimingMatters When Timing Matters: Enabling Time Accurate &amp; Scalable Simulation of Sensor Network Applications 2008 344-354 The rising complexity of data processing algorithms in sensor networks combined with their severely limited computing power necessitates an in-depth understanding of their temporal behavior. However, today only cycle accurate emulation and test-beds provide a detailed and accurate insight into the temporal behavior of sensor networks. In this paper we introduce fine grained, automated instrumentation of simulation models with cycle counts derived from sensor nodes and application binaries to provide detailed timing information. The presented approach bridges the gap between scalable but abstracting simulation and cycle accurate emulation for sensor network evaluation. By mapping device-specific code with simulation models, we can derive the time and duration a certain code line takes to get executed on a sensor node. Hence, eliminating the need to use expensive instruction-level emulators with limited speed and restricted scalability. Furthermore, the proposed design is not bound to a specific hardware platform, a major advantage compared to existing emulators. Our evaluation shows that the proposed technique achieves a timing accuracy of 99% compared to emulation while adding only a small overhead. Concluding, it combines essential properties like accuracy, speed and scalability on a single simulation platform. fileadmin/papers/2008/2008-04-IPSN-2008-landsiedel-Timing-Matters.pdf Print IEEE Computer Society
Washington, DC, USA
Proceedings of the 7th ACM International Conference on Information Processing in Sensor Networks (IPSN 2008), St. Louis, MO, USA en 978-0-7695-3157-1 1 OlafLandsiedel Muhammad HamadAlizai KlausWehrle
techreport 200807VOMLEHNAIB200816NetworkSimulatorComparison Comparing recent network simulators: A performance evaluation study Aachener Informatik Berichte 2008 2008-16 AIB 2008-16 1-28 Ranging from the development of new protocols to validating analytical performance metrics, network simulation is the most prevalent methodology in the field of computer network research. While the well known ns-2 toolkit has established itself as the quasi standard for network simulation, the successors are on their way. In this paper, we first survey recent contributions in the field of network simulation tools as well as related aspects such as parallel network simulation. Moreover, we present preliminary results which compare the resource demands for ns-3, JiST, SimPy and OMNeT++ by implementing the identical simulation scenario in all these network simulation tools. https://www.comsys.rwth-aachen.de/fileadmin/papers/2008/AIB-2008-16.pdf Online
Ahornstr. 55, Aachen, Germany
RWTH Aachen University Technical Report 0935-3232 Hendrikvom Lehn EliasWeingaertner KlausWehrle
techreport 2008-heer-draft-cert-2 HIP Certificates (Version 0) 2008 This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates. Work in progress Internet Engineering Task Force Internet-Draft SamuVarjonen TobiasHeer techreport 2008-heer-draft-midauth End-Host Authentication for HIP Middleboxes (Version 1) 2008 draft-heer-hip-midauth-01 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer MiikaKomu KlausWehrle techreport 2008-heer-draft-cert HIP Certificates (Version 1) 2008 This document specifies a certificate parameter called CERT for the Host Identity Protocol (HIP). The CERT parameter is a container for Simple Public Key Infrastructure (SPKI) and X.509 certificates. It is used for carrying these certificates in HIP control messages. Additionally, this document specifies the representations of Host Identity Tags in SPKI certificates. draft-varjonen-hip-cert-01.txt. Work in progress. Internet Engineering Task Force Internet-Draft SamuVarjonen TobiasHeer