This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-04-24 Creation time: 01-20-19 --- Number of references 31 inproceedings 200912BitschSimBetAge SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks 2009 12 1 13--18 In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet. RatPack fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf http://portal.acm.org/citation.cfm?id=1659029.1659034&coll=DL&dl=GUIDE&CFID=6806120&CFTOKEN=29162094 http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf Online Paulo Mendes, Oliver Marcé ACM
New York City, NY, USA
U-NET '09 Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy ACM Rome, Italy 1st ACM workshop on User-provided networking: challenges and opportunities 1 Dec. 2009 en 978-1-60558-750-9 http://doi.acm.org/10.1145/1659029.1659034 1 Jó AgilaBitsch Link NicolaiViol AndréGoliath KlausWehrle
inproceedings 2009-sensys-alizai-burstytraffic Bursty Traffic over Bursty Links 2009 11 71-84 wld fileadmin/papers/2009/2009-alizai-sensys-bre.pdf ACM
New York, NY, USA
Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA Berkley, California Sensys 09 November 2009 en 978-1-60558-519-2 1 Muhammad HamadAlizai OlafLandsiedel Jó AgilaBitsch Link StefanGötz KlausWehrle
conference 2009-q2swinet-samad-REALISM REALISM: Rendering Anonymity and Lightweight Security with Mobility in Wireless Ad hoc and Mesh Networks ACM International Symposium on QoS and Security for Wireless and Mobile Networks 2009 10 26 97-102 Online ACM New York, NY, USA The 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, The Canary Islands, Spain Tenerife, The Canary Islands, Spain ACM International Symposium on QoS and Security for Wireless and Mobile Networks 26-30 October, 2009 en 978-1-60558-619-9 FahadSamad SadeqAli Makram techreport draft-ietf-hip-cert-02 <prt>Host Identity Protocol Certificates</prt> 2009 10 1 draft-ietf-hip-cert-02.txt <prt>expires: April 29, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-02 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-02 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen inproceedings 2009-kunz-mascots-horizon Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation 2009 9 21 575-577 This paper presents Horizon, an extension to network simulation that enables the efficient and detailed simulation of wireless networks. Our contributions are two-fold as Horizon provides i) an API for accurately modeling processing time of discrete event simulation models by augmenting events with time spans and ii) a lightweight parallelization scheme that utilizes timing information to guide the parallel execution of simulations on multi-core computers. In this paper we primarily focus on the latter. horizon fileadmin/papers/2009/2009-kunz-mascots-horizon.pdf Poster Online IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), London, UK London, Great Britain 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09) September 21-32, 2009 en 978-1-4244-4926-2 1526-7539 10.1109/MASCOT.2009.5366710 1 GeorgKunz OlafLandsiedel KlausWehrle
conference 2009-ngmast-samad-pcwmn Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks 2009 9 15 1 487-493 IEEE Misc IEEE NGMAST 2009 Cardiff, U.K. International Conference and Exhibition on Next Generation Mobil Applications, Services and Technologies en 978-0-7695-3786-3 FahadSamad SadeqAli Makram techreport 200908munawarfgsndynamictinyos Remote Incremental Adaptation of Sensor Network Applications 2009 9 9-12 fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf Print Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany Technical University Hamburg en WaqaasMunawar OlafLandsiedel Muhammad HamadAlizai KlausWehrle
techreport 200908alizaifgsnburstyrouting Routing Over Bursty Wireless Links 2009 9 63-66 Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators. wld fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf Print Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany en 1 Muhammad HamadAlizai OlafLandsiedel Jó AgilaBitsch Link StefanGötz KlausWehrle
inproceedings 2009-landsiedel-visa-vipe A Virtual Platform for Network Experimentation 2009 8 17 45--52 Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive. In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available. deployment, network experimentation, resource virtualization, simulation fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf Print ACM Press
New York, NY, USA
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain Barcelona, Spain 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures August 17, 2009 en 978-1-60558-595-6 10.1145/1592648.1592657 1 OlafLandsiedel GeorgKunz StefanGötz KlausWehrle
proceedings 2009-aktas-maple-ModeldrivenSupportforSourceCodeVariabilityinAutomotiveSoftwareEngineering-Workshop Model-driven Support for Source Code Variability in Automotive Software Engineering 2009 8 44-51 Variability on source code level in automotive soft- ware engineering is handled by C/C++ preprocessing directives. It provides fine-grained definition of variation points, but brings highly complex structures into the source code. The software gets more difficult to understand, to maintain and to integrate changes. Current approaches for modeling and managing vari- ability on source code do not consider the specific requirements of the automotive domain. To close this gap, we propose a model- driven approach to support software engineers in handling source code variability and configuration of software variants. For this purpose, a variability model is developed that is linked with the source code. Using this approach, a software engineer can shift work steps to the variability model in order to model and manage variation points and implement their variants in the source code. automotive software engineering; programming; model-driven engineering; variability modeling; Online CEUR 1st International Workshop on Model-driven Approaches in Software Product Line Engineering (MAPLE), San Francisco, CA, USA 1613-0073 1 CemMengi ChristianFuß RubenZimmermann IsmetAktas inproceedings securityforpervasivemedicalsensornetworks Security for Pervasive Medical Sensor Networks 2009 7 13 1 http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-garcia-mobiq.pdf Print IEEE Press
Washington, DC, USA
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto ICST/IEEE Toronto, CAN 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009) en 978-963-9799-59-2 10.4108/ICST.MOBIQUITOUS2009.6832 1 OscarGarcia-Morchon ThomasFalck TobiasHeer KlausWehrle
inproceedings 200907BitschMOBIQUITOUS09SimBetAge SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking 2009 7 13 1--2 In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs. poster and abstract RatPack fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363 Online IEEE
New York City, NY, USA
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada ICST/IEEE Toronto, ON, Canada 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009) July 13-16, 2009 en 978-963-9799-59-2 10.4108/ICST.MOBIQUITOUS2009.7017 1 Jó AgilaBitsch Link NicolaiViol AndréGoliath KlausWehrle
conference 2009-iscc-samad-NNCQ Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks 2009 7 5 763-769 Online IEEE IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia Sousse, Tunisia IEEE Symposium on Computers and Communications en 978-1-4244-4671-1 SadeqAli Makram FahadSamad MesutGuenes techreport draft-ietf-hip-cert-01 <prt>Host Identity Protocol Certificates</prt> 2009 6 1 draft-ietf-hip-cert-01.txt <prt>expires: January 2, 2010 (work in progress)</prt> http://tools.ietf.org/html/draft-ietf-hip-cert-01 Online <prt>IETF Trust</prt> An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-01 Internet Drafts <prt>Internet Engineering Task Force</prt> Internet Engineering Task Force en 1 TobiasHeer SamuVarjonen conference 2009-mwns-samad-hsvc Handling Security Vulnerabilities in Clustered Wireless Mesh Networks 2009 5 15 51-62 Print Shaker Verlag The 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP NETWORKING 2009, Aachen, Germany. Aachen, Germany International Workshop on Mobile and Wireless Networks Security (MWNS 2009) en 978-3-8322-8177-9 FahadSamad Sadeq AliMakram poster 2009-kunz-nsdi-profab Poster Abstract: Protocol Factory: Reuse for Network Experimentation 2009 4 22 fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf Poster Online USENIX Association
Berkeley, CA, USA
6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09) en 1 GeorgKunz OlafLandsiedel StefanGötz KlausWehrle
article 200803WeingaertnerPromox ProMoX: A protocol stack monitoring framework Electronic Communications of the EASST 2009 3 17 2009 1-10 In this paper, we present a preliminary glance on our framework for protocol stack monitoring using Xen (ProMoX). ProMoX uses the Xen hypervisor to virtualize entire instances of operating systems which may execute any arbitrary protocol implementation. By utilizing system virtualization for external monitoring, ProMoX can transparently inspect any protocol state and performance metrics of protocol implementations carried by a guest operating system. This way, ProMoX supports both the indentification of faults within early prototypes as well as the evaluation of new protocol designs. Accepted for publication online EASST
Kassel, Germany
Proceedings of the GI/ITG KIVS Workshop on Overlay and Network Virtualization 2009 en 1863-2122 1 EliasWeingaertner ChristophTerwelp KlausWehrle
article 2009AlizaiPIKtimingenergy Modelling Execution Time and Energy Consumption in Sensor Node Simulation PIK Journal, Special Issue on Energy Aware Systems 2009 2 32 2 127-132 fileadmin/papers/2009/2009-2-alizai-modeling-energy.pdf Print en 0930-5157 1 Muhammad HamadAlizai OlafLandsiedel KlausWehrle article 2009-pik-heer-leicht Leichtgewichtge Sicherheitsmechanismen für das Host Identity Protocol PIK Journal 2009 1 32 1/09 48-52 Diploma Thesis Award Article Print K.G. Saur Verlag
Munich, Germany
de 0930-5157 TobiasHeer
inproceedings DBLP:conf/icaart/ChristophKW09 JamochaAgent - A Rule-based Programmable Agent 2009 1 447-454 Print Joaquim Filipe and Ana L. N. Fred and Bernadette Sharp INSTICC Press ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal en 978-989-8111-66-1 UtaChristoph Karl-HeinzKrempels AlexanderWilden article Gross09a <prt>Enhancing IEEE 802.11a/n with Dynamic Single-User OFDM Adaptation</prt> Elsevier Performance Evaluation Journal 2009 66 3-5 240--257 JamesGross MarcEmmelmann OscarPuñal AdamWolisz article 2009-thissen-JICWI-replication Improving Quality of Web Services by using Replication IADIS International Journal on WWW/Internet 2009 7 1 26-43 Online IADIS Press en 1645-7641 DirkThißen ThomasBrambring article inproceedingsreference200903099502213244 Time accurate integration of software prototypes with event-based network simulations Proceedings of the 11th Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance 2009) 2009 37 2 49-50 Accepted as poster presentation. https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-time-accurate-sigmetrics09.pdf Print ACM SIGMETRICS
New York, NY, USA
ACM en 0163-5999 10.1145/1639562.1639580 1 EliasWeingaertner FlorianSchmidt TobiasHeer KlausWehrle
proceedings 2009-Weingaertner-ICC-NetworkSimulator-Comparison A performance comparison of recent network simulators 2009 A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. While ns-2 has established itself as virtually the standard network simulation tool, other network simulators have gained more and more attention during the last years. In this paper, we briefly survey new developments in the field of network simulation and conduct a performance comparison study by implementing an identical simulation set-up in five simulators, namely ns-2, OMNet++, ns-3, SimPy and JiST/SWANS. Our results reveal large differences according to both run-time performance and memory usage. http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-simulator_comparison.pdf Print IEEE Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009) Dresden, Germany en 1 EliasWeingaertner Hendrikvom Lehn KlausWehrle inproceedings Gross09 <prt>Multi-User OFDMA Frame Aggregation for Future Wireless Local Area Networking</prt> 2009 220--233 Proc. of the 8th International IFIP Networking Conference (NETWORKING'09) JamesGross OscarPuñal MarcEmmelmann inproceedings 2009-thissen-GI-IMS Evaluating the Performance of an IMS/NGN Deployment 2009 2561-2573 Print S. Fischer, E. Maehle, R. Reischuk Gesellschaft für Informatik Lecture Notes in Informatics 154 Informatik 2009 - Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI) en 978-3-88579-248-2 DirkThißen Juan MiguelEspinosa Carlín RenéHerpertz inproceedings 200906MobiArchgoetzprotocolorchestration Protocol Orchestration: A Semantic Approach to Communication Stacks 2009 43-50 The diversity of today's networking environments, such as wired, wireless, cell-based, or multi-hop, is matched by an equally large amount and heterogeneity of specialized protocols, e.g., overlays, Wi-Fi positioning, MANET routing, cross-layer signaling. However, communication is typically performed with a static set of protocols selected at design time based on simplified assumptions ignoring the environment's heterogeneity. In this paper, we argue that protocols can be orchestrated as software components driven purely by their functionality and the demands of the execution environment. Our end-system protocol framework Adapt bases on extensible ontological models that semantically describe protocol and environment properties. At runtime, each connection receives a custom-tailored protocol stack that Adapt orchestrates from the requirements derived from the application, user, and environment. With this approach, end-systems can reason about the functionality and quality of automatically composed and adapted protocol compounds while remaining open to existing and future protocols. https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-goetz-mobiarch-protocol-orchestration.pdf print Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca ACM
New York, NY, USA
print Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09) ACM Sigcomm/Sigmobile Krakow, Poland Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09), Krakow, Poland 2009-06-22 en 1 StefanGötz TobiasHeer KlausWehrle
inproceedings 2009morchonpodckeyagreementwsn Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks 2009 1 326-327 Brief Announcement Print ACM
New York, NY, USA
Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), Calgary Calgary, CN 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009) en 978-963-9799-59-2 10.1145/1582716.1582791 1 OscarGarcia-Morchon TobiasHeer LudoTolhuizen KlausWehrle
inproceedings 2009-icc-heer-middleboxes End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace 2009 1 791-796 Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards. mobile_access http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf Print Piscataway, NJ, USA
Dresden, Germany
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany IEEE Dresden, Germany IEEE International Conference on Communications 2009 (ICC 2009) en 978-1-4244-3435-0 1938-1883 10.1109/ICC.2009.5198984 1 TobiasHeer RenéHummen MiikaKomu StefanGötz KlausWehrle
techreport 2009-heer-draft-midauth End-Host Authentication for HIP Middleboxes (Version 2) 2009 draft-heer-hip-midauth-02 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer MiikaKomu KlausWehrle techreport 2009-heer-draft-service-id Service Identifiers for HIP 2009 draft-heer-hip-service-00 The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables HIP end-hosts and HIP-aware middleboxes to announce services to HIP hosts during a HIP Base EXchange (BEX) or HIP update. Service providers are able to specify the type and requirements of a service; clients can then decide to agree on the terms of service. This allows the service provider to verify the accordance of the client with the service conditions while the client is able to verify the authenticity of the used service. Work in progress Internet Engineering Task Force Internet-Draft TobiasHeer SamuVarjonen HannoWirtz