This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-04-24
Creation time: 01-20-19
--- Number of references
31
inproceedings
200912BitschSimBetAge
SimBetAge: Dealing with Change in Social Networks for Pocket Switched Networks
2009
12
1
13--18
In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and egocentric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.
RatPack
fileadmin/papers/2009/2009-12-Bitsch-SimBetAge.pdf
http://portal.acm.org/citation.cfm?id=1659029.1659034&coll=DL&dl=GUIDE&CFID=6806120&CFTOKEN=29162094
http://conferences.sigcomm.org/co-next/2009/workshops/unet/papers/Link.pdf
Online
Paulo Mendes, Oliver Marcé
ACM
New York City, NY, USA
U-NET '09
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities, Rome, Italy
ACM
Rome, Italy
1st ACM workshop on User-provided networking: challenges and opportunities
1 Dec. 2009
en
978-1-60558-750-9
http://doi.acm.org/10.1145/1659029.1659034
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
inproceedings
2009-sensys-alizai-burstytraffic
Bursty Traffic over Bursty Links
2009
11
71-84
wld
fileadmin/papers/2009/2009-alizai-sensys-bre.pdf
ACM
New York, NY, USA
Proceeding of 7th ACM Conference on Embedded Networked Sensor Systems (Sensys 09), Berkeley, CA, USA
Berkley, California
Sensys 09
November 2009
en
978-1-60558-519-2
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
conference
2009-q2swinet-samad-REALISM
REALISM: Rendering Anonymity and Lightweight Security with Mobility in Wireless Ad hoc and Mesh Networks
ACM International Symposium on QoS and Security for Wireless and Mobile Networks
2009
10
26
97-102
Online
ACM New York, NY, USA
The 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, The Canary Islands, Spain
Tenerife, The Canary Islands, Spain
ACM International Symposium on QoS and Security for Wireless and Mobile Networks
26-30 October, 2009
en
978-1-60558-619-9
FahadSamad
SadeqAli Makram
techreport
draft-ietf-hip-cert-02
<prt>Host Identity Protocol Certificates</prt>
2009
10
1
draft-ietf-hip-cert-02.txt
<prt>expires: April 29, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
inproceedings
2009-kunz-mascots-horizon
Poster Abstract: Horizon - Exploiting Timing Information for Parallel Network Simulation
2009
9
21
575-577
This paper presents Horizon, an extension to network simulation that enables the efficient and detailed simulation of wireless networks. Our contributions are two-fold as Horizon provides i) an API for accurately modeling processing time of discrete event simulation models by augmenting events with time spans and ii) a lightweight parallelization scheme that utilizes timing information to guide the parallel execution of simulations on multi-core computers. In this paper we primarily focus on the latter.
horizon
fileadmin/papers/2009/2009-kunz-mascots-horizon.pdf
Poster
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09), London, UK
London, Great Britain
17th Annual Meeting of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'09)
September 21-32, 2009
en
978-1-4244-4926-2
1526-7539
10.1109/MASCOT.2009.5366710
1
GeorgKunz
OlafLandsiedel
KlausWehrle
conference
2009-ngmast-samad-pcwmn
Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks
2009
9
15
1
487-493
IEEE
Misc
IEEE NGMAST 2009
Cardiff, U.K.
International Conference and Exhibition on Next Generation Mobil Applications, Services and Technologies
en
978-0-7695-3786-3
FahadSamad
SadeqAli Makram
techreport
200908munawarfgsndynamictinyos
Remote Incremental Adaptation of Sensor Network Applications
2009
9
9-12
fileadmin/papers/2009/2009-08-munawar-fgsn-dynamic-tinyos.pdf
http://doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
Technical University Hamburg
en
WaqaasMunawar
OlafLandsiedel
Muhammad HamadAlizai
KlausWehrle
techreport
200908alizaifgsnburstyrouting
Routing Over Bursty Wireless Links
2009
9
63-66
Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing, leaving out a potentiality large set of intermediate links offering significant routing progress. Fine-grained analysis of link qualities reveals that such intermediate links are bursty, i.e., stable in the short term. In this paper, we use short-term estimation of wireless links to accurately identify short-term stable periods of transmission on bursty links. Our approach allows a routing protocol to forward packets over bursty links if they offer better routing progress than long-term stable links. We integrate a Short Term Link Estimator and its associated routing strategy with a standard routing protocol for sensor networks. Our evaluation reveals an average of 22% reduction in the overall transmissions when routing over long-range bursty links. Our approach is not tied to any special routing protocol and integrates seamlessly with existing routing protocols and link estimators.
wld
fileadmin/papers/2009/2009-08-alizai-fgsn-bursty-routing.pdf
doku.b.tu-harburg.de/volltexte/2009/581/pdf/proceedings.pdf
Print
Technical University Hamburg
Technical University Hamburg
Proceedings of the 8th GI/ITG KuVS Fachgespräch "Wireless Sensor Networks", Hamburg, Germany
en
1
Muhammad HamadAlizai
OlafLandsiedel
Jó AgilaBitsch Link
StefanGötz
KlausWehrle
inproceedings
2009-landsiedel-visa-vipe
A Virtual Platform for Network Experimentation
2009
8
17
45--52
Although the diversity of platforms for network experimentation is a boon to the development of protocols and distributed systems, it is challenging to exploit its benefits. Implementing or adapting the systems under test for such heterogeneous environments as network simulators, network emulators, testbeds, and end systems is immensely time and work intensive.
In this paper, we present VIPE, a unified virtual platform for network experimentation, that slashes the porting effort. It allows to smoothly evolve a single implementation of a distributed system or protocol from its design up into its deployment by leveraging any form of network experimentation tool available.
deployment, network experimentation, resource virtualization, simulation
fileadmin/papers/2009/2009-landsiedel-visa-vipe.pdf
Print
ACM Press
New York, NY, USA
Proceedings of the 1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures, Barcelona, Spain
Barcelona, Spain
1st ACM SIGCOMM Workshop on Virtualized Infastructure Systems and Architectures
August 17, 2009
en
978-1-60558-595-6
10.1145/1592648.1592657
1
OlafLandsiedel
GeorgKunz
StefanGötz
KlausWehrle
proceedings
2009-aktas-maple-ModeldrivenSupportforSourceCodeVariabilityinAutomotiveSoftwareEngineering-Workshop
Model-driven Support for Source Code Variability in Automotive Software Engineering
2009
8
44-51
Variability on source code level in automotive soft- ware engineering is handled by C/C++ preprocessing directives. It provides fine-grained definition of variation points, but brings highly complex structures into the source code. The software gets more difficult to understand, to maintain and to integrate changes. Current approaches for modeling and managing vari- ability on source code do not consider the specific requirements of the automotive domain. To close this gap, we propose a model- driven approach to support software engineers in handling source code variability and configuration of software variants. For this purpose, a variability model is developed that is linked with the source code. Using this approach, a software engineer can shift work steps to the variability model in order to model and manage variation points and implement their variants in the source code.
automotive software engineering; programming; model-driven engineering; variability modeling;
Online
CEUR
1st International Workshop on Model-driven Approaches in Software Product Line Engineering (MAPLE), San Francisco, CA, USA
1613-0073
1
CemMengi
ChristianFuß
RubenZimmermann
IsmetAktas
inproceedings
securityforpervasivemedicalsensornetworks
Security for Pervasive Medical Sensor Networks
2009
7
13
1
http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-garcia-mobiq.pdf
Print
IEEE Press
Washington, DC, USA
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto
ICST/IEEE
Toronto, CAN
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)
en
978-963-9799-59-2
10.4108/ICST.MOBIQUITOUS2009.6832
1
OscarGarcia-Morchon
ThomasFalck
TobiasHeer
KlausWehrle
inproceedings
200907BitschMOBIQUITOUS09SimBetAge
SimBetAge: Utilizing Temporal Changes in Social Networks for Delay/Disconnection Tolerant Networking
2009
7
13
1--2
In this paper, we present SimBetAge, an extension to SimBet taking into account the gradual aging of connections in social networks which thereby increases the performance by an order of magnitude, especially in evolving network structures. For this purpose, we redefine similarity and betweenness to make use of weighted social network graphs.
poster and abstract
RatPack
fileadmin/papers/2009/2009-07-Bitsch-Mobiquitous09-SimBetAge.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5326363
Online
IEEE
New York City, NY, USA
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009), Toronto, ON, Canada
ICST/IEEE
Toronto, ON, Canada
6th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2009)
July 13-16, 2009
en
978-963-9799-59-2
10.4108/ICST.MOBIQUITOUS2009.7017
1
Jó AgilaBitsch Link
NicolaiViol
AndréGoliath
KlausWehrle
conference
2009-iscc-samad-NNCQ
Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks
2009
7
5
763-769
Online
IEEE
IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia
Sousse, Tunisia
IEEE Symposium on Computers and Communications
en
978-1-4244-4671-1
SadeqAli Makram
FahadSamad
MesutGuenes
techreport
draft-ietf-hip-cert-01
<prt>Host Identity Protocol Certificates</prt>
2009
6
1
draft-ietf-hip-cert-01.txt
<prt>expires: January 2, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
conference
2009-mwns-samad-hsvc
Handling Security Vulnerabilities in Clustered Wireless Mesh Networks
2009
5
15
51-62
Print
Shaker Verlag
The 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP NETWORKING 2009, Aachen, Germany.
Aachen, Germany
International Workshop on Mobile and Wireless Networks Security (MWNS 2009)
en
978-3-8322-8177-9
FahadSamad
Sadeq AliMakram
poster
2009-kunz-nsdi-profab
Poster Abstract: Protocol Factory: Reuse for Network Experimentation
2009
4
22
fileadmin/papers/2009/2009-kunz-nsdi-protocolFactory.pdf
Poster
Online
USENIX Association
Berkeley, CA, USA
6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)
en
1
GeorgKunz
OlafLandsiedel
StefanGötz
KlausWehrle
article
200803WeingaertnerPromox
ProMoX: A protocol stack monitoring framework
Electronic Communications of the EASST
2009
3
17
2009
1-10
In this paper, we present a preliminary glance on our framework for protocol stack monitoring using Xen (ProMoX). ProMoX uses the Xen hypervisor to virtualize entire instances of operating systems which may execute any arbitrary protocol implementation. By utilizing system virtualization for external monitoring, ProMoX can transparently inspect any protocol state and performance metrics of protocol implementations carried by a guest operating system. This way, ProMoX supports both the indentification of faults within early prototypes as well as the evaluation of new protocol designs.
Accepted for publication
online
EASST
Kassel, Germany
Proceedings of the GI/ITG KIVS Workshop on Overlay and Network Virtualization 2009
en
1863-2122
1
EliasWeingaertner
ChristophTerwelp
KlausWehrle
article
2009AlizaiPIKtimingenergy
Modelling Execution Time and Energy Consumption in Sensor Node Simulation
PIK Journal, Special Issue on Energy Aware Systems
2009
2
32
2
127-132
fileadmin/papers/2009/2009-2-alizai-modeling-energy.pdf
Print
en
0930-5157
1
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
article
2009-pik-heer-leicht
Leichtgewichtge Sicherheitsmechanismen für das Host Identity Protocol
PIK Journal
2009
1
32
1/09
48-52
Diploma Thesis Award Article
Print
K.G. Saur Verlag
Munich, Germany
de
0930-5157
TobiasHeer
inproceedings
DBLP:conf/icaart/ChristophKW09
JamochaAgent - A Rule-based Programmable Agent
2009
1
447-454
Print
Joaquim Filipe and Ana L. N. Fred and Bernadette Sharp
INSTICC Press
ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal
en
978-989-8111-66-1
UtaChristoph
Karl-HeinzKrempels
AlexanderWilden
article
Gross09a
<prt>Enhancing IEEE 802.11a/n with Dynamic Single-User OFDM Adaptation</prt>
Elsevier Performance Evaluation Journal
2009
66
3-5
240--257
JamesGross
MarcEmmelmann
OscarPuñal
AdamWolisz
article
2009-thissen-JICWI-replication
Improving Quality of Web Services by using Replication
IADIS International Journal on WWW/Internet
2009
7
1
26-43
Online
IADIS Press
en
1645-7641
DirkThißen
ThomasBrambring
article
inproceedingsreference200903099502213244
Time accurate integration of software prototypes with event-based network simulations
Proceedings of the 11th Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS/Performance 2009)
2009
37
2
49-50
Accepted as poster presentation.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-time-accurate-sigmetrics09.pdf
Print
ACM SIGMETRICS
New York, NY, USA
ACM
en
0163-5999
10.1145/1639562.1639580
1
EliasWeingaertner
FlorianSchmidt
TobiasHeer
KlausWehrle
proceedings
2009-Weingaertner-ICC-NetworkSimulator-Comparison
A performance comparison of recent network simulators
2009
A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. While ns-2 has established itself as virtually the standard network simulation tool, other network simulators have gained more and more attention during the last years. In this paper, we briefly survey new developments in the field of network simulation and conduct a performance comparison study by implementing an identical simulation set-up in five simulators, namely ns-2, OMNet++, ns-3, SimPy and JiST/SWANS. Our results reveal large differences according to both run-time performance and memory usage.
http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-weingaertner-simulator_comparison.pdf
Print
IEEE
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009)
Dresden, Germany
en
1
EliasWeingaertner
Hendrikvom Lehn
KlausWehrle
inproceedings
Gross09
<prt>Multi-User OFDMA Frame Aggregation for Future Wireless Local Area Networking</prt>
2009
220--233
Proc. of the 8th International IFIP Networking Conference (NETWORKING'09)
JamesGross
OscarPuñal
MarcEmmelmann
inproceedings
2009-thissen-GI-IMS
Evaluating the Performance of an IMS/NGN Deployment
2009
2561-2573
Print
S. Fischer, E. Maehle, R. Reischuk
Gesellschaft für Informatik
Lecture Notes in Informatics 154
Informatik 2009 - Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI)
en
978-3-88579-248-2
DirkThißen
Juan MiguelEspinosa Carlín
RenéHerpertz
inproceedings
200906MobiArchgoetzprotocolorchestration
Protocol Orchestration: A Semantic Approach to Communication Stacks
2009
43-50
The diversity of today's networking environments, such as wired, wireless, cell-based, or multi-hop, is matched by an equally large amount and heterogeneity of specialized protocols, e.g., overlays, Wi-Fi positioning, MANET routing, cross-layer signaling. However, communication is typically performed with a static set of protocols selected at design time based on simplified assumptions ignoring the environment's heterogeneity. In this paper, we argue that protocols can be orchestrated as software components driven purely by their functionality and the demands of the execution environment. Our end-system protocol framework Adapt bases on extensible ontological models that semantically describe protocol and environment properties. At runtime, each connection receives a custom-tailored protocol stack that Adapt orchestrates from the requirements derived from the application, user, and environment. With this approach, end-systems can reason about the functionality and quality of automatically composed and adapted protocol compounds while remaining open to existing and future protocols.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-goetz-mobiarch-protocol-orchestration.pdf
print
Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca
ACM
New York, NY, USA
print
Proceedings of the Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09)
ACM Sigcomm/Sigmobile
Krakow, Poland
Fourth ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch '09), Krakow, Poland
2009-06-22
en
1
StefanGötz
TobiasHeer
KlausWehrle
inproceedings
2009morchonpodckeyagreementwsn
Lightweight Key Agreement and Digital Certificates for Wireles Sensor Networks
2009
1
326-327
Brief Announcement
Print
ACM
New York, NY, USA
Proceedings of the 28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009), Calgary
Calgary, CN
28th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2009)
en
978-963-9799-59-2
10.1145/1582716.1582791
1
OscarGarcia-Morchon
TobiasHeer
LudoTolhuizen
KlausWehrle
inproceedings
2009-icc-heer-middleboxes
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace
2009
1
791-796
Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, detect network intrusion, control access to network resources, and enforce different levels of quality of service. The cornerstones for these security-related network services are end-host authentication and authorization. Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity. The Host Identity Protocol (HIP) is a key-exchange protocol that introduces such a cryptographic namespace for secure end-to-end communication. Although HIP was designed with middleboxes in mind, these cannot securely use its namespace because the on-path identity verification is susceptible to replay attacks. Moreover, the binding between HIP as an authentication protocol and IPsec as payload transport is insufficient because on-path middleboxes cannot securely map payload packets to a HIP association. In this paper, we propose to prevent replays attack by treating packet-forwarding middleboxes as first-class citizens that directly interact with end-hosts. Also we propose a method for strengthening the binding between the HIP authentication process and its payload channel with hash-chain-based authorization tokens for IPsec. Our solution allows on-path middleboxes to efficiently leverage cryptographic end-host identities and integrates cleanly into existing protocol standards.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2009/2009-heer-icc-end-host-authentication.pdf
Print
Piscataway, NJ, USA
Dresden, Germany
Proceedings of the IEEE International Conference on Communications 2009 (ICC 2009), Dresden, Gemany
IEEE
Dresden, Germany
IEEE International Conference on Communications 2009 (ICC 2009)
en
978-1-4244-3435-0
1938-1883
10.1109/ICC.2009.5198984
1
TobiasHeer
RenéHummen
MiikaKomu
StefanGötz
KlausWehrle
techreport
2009-heer-draft-midauth
End-Host Authentication for HIP Middleboxes (Version 2)
2009
draft-heer-hip-midauth-02
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming. It achieves these properties by introducing a new cryptographic namespace. This document specifies an extension for HIP that enables middleboxes to unambiguously verify the identities of hosts that communicate across them. This extension enables middleboxes to verify the liveness and freshness of a HIP association and, thus, enables reliable and secure access control in middleboxes.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
MiikaKomu
KlausWehrle
techreport
2009-heer-draft-service-id
Service Identifiers for HIP
2009
draft-heer-hip-service-00
The Host Identity Protocol is a signaling protocol for secure communication, mobility, and multihoming that introduces a cryptographic namespace. This document specifies an extension for HIP that enables HIP end-hosts and HIP-aware middleboxes to announce services to HIP hosts during a HIP Base EXchange (BEX) or HIP update. Service providers are able to specify the type and requirements of a service; clients can then decide to agree on the terms of service. This allows the service provider to verify the accordance of the client with the service conditions while the client is able to verify the authenticity of the used service.
Work in progress
Internet Engineering Task Force
Internet-Draft
TobiasHeer
SamuVarjonen
HannoWirtz