This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2023-09-24
Creation time: 23-04-23
--- Number of references
63
inproceedings
Dombrowski2010GC
Is High Quality Sensing Really Necessary for Opportunistic Spectrum Usage?
2010
12
6
1--6
IEEE
Proc. of IEEE Global Telecommunications Conference (GLOBECOM'10)
Miami, FL, USA
IEEE Global Telecommunications Conference (GLOBECOM'10)
06/12/2010
ChristianDombrowski
DanielWillkomm
AdamWolisz
inproceedings
2010-krebs-Globecom10-clustering-mesh-conference
Topology Stability-Based Clustering for Wireless Mesh Networks
2010
12
1
1-5
In the past, many clustering algorithms for ad-hoc networks have been proposed. Their main objective is to solve the scalability issue of ad-hoc networks by grouping nodes into clusters. The challenge in MANETs for those clustering algorithms is to cope with the high node mobility which affects the stability of the cluster structures. Wireless mesh networks consist of a static backbone and a number of mobile nodes. In the backbone of a wireless mesh network the topology is relatively static. However, topology changes occur due to frequent link losses and temporary link instability. Due to the static nature of the backbone, mobility-based approaches are not suitable in this case. In this paper, we state the important aspects for stable clustering in wireless mesh networks with unidirectional links based on the investigation of a 45-node wireless mesh testbed. We analyze well-known clustering algorithms and their performance in a large-scale testbed. Finally, we propose a new clustering algorithm called Stable Link Clustering Algorithm (SLCA).
fileadmin/papers/2010/2010-lora-clustering-MESH.pdf
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5683417
Print
IEEE
Proceedings of the IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, USA
Miami, FL, USA
IEEE Global Telecommunications Conference, GLOBECOM 2010
6 - 10 December 2010
en
978-1-4244-5636-9
10.1109/GLOCOM.2010.5683417
1
MartinKrebs
AndréStein
Mónica AlejandraLora Girón
inproceedings
2010-lora-CoNEXTStudent-ELA-Workshop
Experience Level Agreements in Wireless Metropolitan Area Sharing Networks
2010
11
1
Nowadays, mobile wireless users are in constant demand of connectivity.
Satisfying the connectivity requirements of the users requires a large amount of Access Points (APs) in order to enlarge the wireless service coverage. Wireless Metropolitan Area Sharing Networks (WMSN) are a low cost alternative that fulfill this high degree of user requirements.
On WMSN certain places will experiment congestion when a large number of users are associated with the same device. For this reason, new mechanisms are required with the aim of satisfy the Quality of User Experience (QoE).
The Experience Level Agreements (ELA) definition for WMSN is a formal way to characterize the requirements of the users and permits having measuring functions for this kind of network, which helps to improve the QoE.
fileadmin/papers/2010/2010-lora-agreements-WMSN.pdf
http://portal.acm.org/citation.cfm?doid=1921206.1921215
Digital
ACM
New York, NY, USA
Proceedings of the ACM CoNEXT 2010 Student Workshop, Philadelphia, USA
Philadelphia, PA, USA
Proceedings of the ACM CoNEXT 2010 Student Workshop
November 30 - December 03, 2010
en
978-1-4503-0468-9
10.1145/1921206.1921215
1
Mónica AlejandraLora Girón
inproceedings
2010-sensys-alizai-tinywifi
Poster Abstract: TinyOS Meets Wireless Mesh Networks
2010
11
429-430
We present TinyWifi, a nesC code base extending TinyOS to support Linux powered network nodes. It enables developers to build arbitrary TinyOS applications and protocols and execute them directly on Linux by compiling for the new TinyWifi platform. Using TinyWifi as a TinyOS platform, we expand the applicability and means of evaluation of wireless protocols originally designed for sensornets towards inherently similar Linux driven ad hoc and mesh networks.
Received Best Poster Award
fileadmin/papers/2010/2010-11-alizai-tinywifi-sensys.pdf
http://portal.acm.org/citation.cfm?id=1870058&preflayout=flat
Print
ACM
New York, NY, USA
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland
en
978-1-4503-0344-6
10.1145/1869983.1870058
1
Muhammad HamadAlizai
BernhardKirchen
Jó AgilaBitsch Link
HannoWirtz
KlausWehrle
inproceedings
2010-sensys-sasnauskas-coojakleenet
Demo Abstract: Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding
2010
11
383--384
High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the limited set of available tools. We integrate the KleeNet symbolic execution engine with the COOJA network simulator to allow for straight-forward and intuitive high-coverage testing initiated from a simulation environment. A tight coupling of simulation and testing helps detect, narrow down, and fix complex interaction bugs in an early development phase. We demonstrate the seamless transition between COOJA simulation and KleeNet symbolic execution. Our framework enables future research in how high-coverage testing tools could be used in cooperation with simulation tools.
kleenet
fileadmin/papers/2010/2010-osterlind_sasnauskas-sensys-coojakleenet.pdf
Print
ACM
New York, NY, USA
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys 2010), Zurich, Switzerland
en
978-1-4503-0344-6
http://doi.acm.org/10.1145/1869983.1870034
1
FredrikÖsterlind
RaimondasSasnauskas
AdamDunkels
OscarSoria Dustmann
KlausWehrle
techreport
draft-ietf-hip-cert-06
<prt>Host Identity Protocol Certificates</prt>
2010
11
1
draft-ietf-hip-cert-06.txt
<prt>expires: May 23, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-06
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-06
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
draft-ietf-hip-cert-05
<prt>Host Identity Protocol Certificates</prt>
2010
11
1
draft-ietf-hip-cert-05.txt
<prt>expires: May 12, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-05
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-05
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
inproceedings
schleinzer10
A Security Pattern for Data Integrity in P2P Systems
2010
10
16
Online
ACM
PLoP 2010, Reno, NV, USA
Reno
PLoP 2010
unpublished
en
1
BenjaminSchleinzer
NobukazuYoshioka
conference
2010-08-lcn-samad-ASSA
Adaptive Security Established on the Requirements and Resource Abilities of Network Nodes
2010
10
11
1
752-755
Online
IEEE
The 10th IEEE Wireless Local Networks(WLN 2010) in the 35th IEEE Local Computer Networks (LCN 2010), Denver, Colorado, U.S.A.
Denver, Colorado, United States
IEEE Local Computer Networks (IEEE LCN 2010)
11-14 Oct. 2010
en
978-1-4244-8388-4
FahadSamad
SadeqAli Makram
proceedings
2010-wirtz-kuvs-service-overlay
A Generic Service Overlay for Wireless Mesh Networks
2010
10
Service discovery in traditional networks is realized either by broadcasting requests in the network or by a central entity that holds the necessary information of every service in the network. These techniques are applicable in wireless networks as well, however, only under certain limiting conditions. The authors present a generic overlay that caters to the special requirements of providing and discovering services in wireless mesh networks. The focus of the approach lies on maintaining scalability in large-scale dynamic networks as well as routing efficiency with regard to the communication characteristics of the underlying network.
RWTH Aachen University - ComSys
/fileadmin/papers/2010/2010-wirtz-kuvs-service-overlay.pdf
Gesellschaft für Informatik KuVS
Berlin, Germany
3rd GI/ITG KuVS Fachgespräch on NG SDPs, Berlin, Germany
Berlin, Germany
3rd GI/ITG KuVS Fachgespräch on NG SDPs
October 14, 2010
english
HannoWirtz
TobiasHeer
KlausWehrle
techreport
rfc5201-bis-03
<prt>Host Identity Protocol Version 2</prt>
2010
10
1
draft-ietf-hip-rfc5201-bis-03.txt
<prt>expires: April 26, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
inproceedings
2010softcomweingaertnerprotocolanalysis
Flexible Analysis of Distributed Protocol Implementations using Virtual Time
2010
9
23
225 - 229
available in IEEE Xplore
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-weingaertner-softcom-analysis.pdf
Online
FESB
Split, Croatia
Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2010)
Hvar, Croatia
en
978-1-4244-8663-2
1
EliasWeingaertner
MarkoRitter
RaimondasSasnauskas
KlausWehrle
inproceedings
5646775
<prt>Indoor Navigation Approach Based on Approximate Positions</prt>
2010
9
778--784
Print
Mautz, R., Kunz, M. and Ingensand, H.
IEEE
Proceedings of the 2010 International Conference on Indoor Positioning and Indoor Navigation (IPIN 2010), Zurich, Switzerland
en
978-1-4244-5864-6
10.1109/IPIN.2010.5646775
OryChowaw-Liebman
UtaChristoph
Karl-HeinzKrempels
ChristophTerwelp
techreport
draft-ietf-hip-cert-04
<prt>Host Identity Protocol Certificates</prt>
2010
9
1
draft-ietf-hip-cert-04.txt
<prt>expires: March 27, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-04
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-04
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
techreport
rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
9
1
draft-ietf-hip-rfc5201-bis-01.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
inproceedings
2010-kunz-mascots-horizon
Expanding the Event Horizon in Parallelized Network Simulations
2010
8
18
172-181
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the properties of advanced transmission technologies. Such detailed models typically lead to a high computational load per simulation event that accumulates to extensive simulation runtimes. Reducing runtimes through parallelization is challenging since it depends on detecting causally independent events that can execute concurrently. Most existing approaches base this detection on lookaheads derived from channel propagation latency or protocol characteristics. In wireless networks, these lookaheads are typically short, causing the potential for parallelization and the achievable speedup to remain small. This paper presents Horizon, which unlocks a substantial portion of a simulation model's workload for parallelization by going beyond the traditional lookahead. We show how to augment discrete events with durations to identify a much larger horizon of independent simulation events and efficiently schedule them on multi-core systems. Our evaluation shows that this approach can significantly cut down the runtime of simulations, in particular for complex and accurate models of wireless networks.
horizon
fileadmin/papers/2010/2010-kunz-mascots-horizon.pdf
Online
IEEE Computer Society
Los Alamitos, CA, USA
Proceedings of the 18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10), Miami, FL, USA
Miami, FL, USA
18th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'10)
August 17-19, 2010
en
978-0-7695-4197-6
1526-7539
10.1109/MASCOTS.2010.26
1
GeorgKunz
OlafLandsiedel
JamesGross
StefanGötz
FarshadNaghibi
KlausWehrle
conference
2010-08-icccn-samad-PiCAT
PiCAT: Palliating Channel Assignment Assaults using Adjustable Trust in Wireless Mesh Networks
IEEE ICCCN 2010
2010
8
2
1
1 - 7
Online
IEEE
Medienkombination
The 19th International Conference on Computer Communications and Networks (ICCCN 2010), Zurich, Switzerland
Zurich, Switzerland
19th International Conference on Computer Communications and Networks (ICCCN 2010)
August 2–5, 2010
en
978-1-4244-7114-0
1095-2055
10.1109/ICCCN.2010.5560076
FahadSamad
SadeqAli Makram
inproceedings
2010-heer-pisa-sa
PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing
2010
8
2
1
588-593
With the goal of providing ubiquitous wireless services (e.g., tourist guides, environmental information, pedestrian navigation), municipal wireless networks are currently being established all around the world. For municipalities, it is often challenging to achieve the bandwidth and coverage that is necessary for many of the envisioned network services. At the same time, Wi-Fi-sharing communities achieve high bandwidth and good coverage at a very low cost by capitalizing on the dense deployment of private access points in urban areas. However, from a technical, conceptual, and security perspective, Wi-Fi sharing community networks resemble a patchwork of heterogeneous networks instead of one well-planned city-wide network. This patchwork character stands in stark contrast to a uniform, secure platform for public and commercial services desirable for the economic success of such a network. Hence, despite its cost-efficiency, the community-based approach cannot be adopted by municipalities easily. In this paper, we show how to realize municipal wireless services on top of a Wi-Fi-sharing infrastructure in a technically sound and economically attractive fashion. In particular, we focus on how to securely provide services to mobile clients with and without client-side software support. Our solution cleanly separates the roles of controlling and administering the network from providing bandwidth and wireless access. With this separation, commercial ISPs and citizens with their private Wi-Fi can contribute to the network infrastructure. This allows municipalities in turn to focus their resources on municipal wireless services.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-icc-pisa-sa.pdf
Print
IEEE Press
Washington, DC, USA
International Conference on Computer Communication Networks, ICCCN 2010, Zurich
Zurich, Switzerland
International Conference on Computer Communication Networks, ICCCN 2010
en
978-1-4244-7114-0
10.1109/ICCCN.2010.5560103
1
TobiasHeer
ThomasJansen
RenéHummen
HannoWirtz
StefanGötz
EliasWeingaertner
KlausWehrle
inproceedings
DBLP:conf/winsys/Chowaw-LiebmanCKT10
Evaluation of an Indoor Navigation Approach based on Approximate Positions
2010
7
195-201
Print
Rafael F. S. Caldeirinha and Mohammad S. Obaidat
SciTePress
WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications
en
978-989-8425-24-9
OryChowaw-Liebman
UtaChristoph
Karl-HeinzKrempels
ChristophTerwelp
inproceedings
DBLP:conf/winsys/ChristophKST10a
Automatic Context Detection of a Mobile user
2010
7
189-194
Print
Rafael F. S. Caldeirinha and Mohammad S. Obaidat
SciTePress
WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications
en
978-989-8425-24-9
UtaChristoph
Karl-HeinzKrempels
Jannovon Stülpnagel
ChristophTerwelp
techreport
moskowitz-rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-moskowitz-hip-rfc5201-bis-02.txt
<prt>expires: January 2, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
techreport
rfc5201-bis-02
<prt>Host Identity Protocol Version 2</prt>
2010
7
1
draft-ietf-hip-rfc5201-bis-02.txt
<prt>expires: March 7, 2011 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-rfc5201-bis-02
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz
PetriJokela
ThomasR. Henderson
TobiasHeer
inbook
2010-simtools-sasnauskas-transport
Modeling Transport Layer Protocols
2010
6
389-399
Print
Klaus Wehrle, Mesut Guenes, James Gross
Springer
Germany
17
Modeling and Tools for Network Simulation
en
978-3-642-12330-6
1
RaimondasSasnauskas
EliasWeingaertner
inproceedings
2010-lora-algosyn-QoE-dagstuhl
QoE in Cooperative Wireless Networks
2010
6
1
20
Cooperative Wireless Networks (CWN) have become an attrac- tive alternative for providing ubiquitous and inexpensive connectivity for the mobile users. In CWN certain public and popular spaces may facilitate the appearance of the problem of sporadic user congestion; the occurrence of this local congestion adversely impacts the network and the user, degrading the application throughput, therefore the Quality of User Experience (QoE).
fileadmin/papers/2010/2010-lora-Dagstuhl-Proposal-QoE.pdf
Print
DFG Research Training Group 1298 "AlgoSyn"
DFG Research Training Group 1298 "AlgoSyn"
Proceeedings of the Joint Workshop of the German Research Training Groups in Computer Science Dagstuhl 2010
RWTH Aachen University
Dagstuhl, Germany
Workshop of the German Research Training Groups in Computer Science
May 31 - June 2, 2010
en
3-86130-146-6
Mónica AlejandraLora Girón
inproceedings
icc2010vpsim
Towards Network Centric Development of Embedded Systems
2010
5
23
1-6
Nowadays, the development of embedded system hardware and related system software is mostly carried out using virtual platform environments. The high level of modeling detail (hardware elements are partially modeled in a cycle-accurate fashion) is required for many core design tasks. At the same time, the high computational complexity of virtual platforms caused by the detailed level of simulation hinders their application for modeling large networks of embedded systems. In this paper, we propose the integration of virtual platforms with network simulations, combining the accuracy of virtual platforms with the versatility and scalability of network simulation tools. Forming such a hybrid toolchain facilitates the detailed analysis of embedded network systems and related important design aspects, such as resource effectiveness, prior to their actual deployment.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-schuermans-weingaertner-network_centric.pdf
Online
IEEE
Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa, May 23-27
en
978-1-4244-6402-9
1550-3607
10.1109/ICC.2010.5502185
1
StefanSchürmanns
EliasWeingaertner
TorstenKempf
GerdAscheid
KlausWehrle
RainerLeupers
inproceedings
201004vaegsieeestudentpad
Probabilistic Addressing in Wireless Networks
2010
5
20
5-8
The lack of permanent network infrastructure and often unplanned deployments in many multihop wireless communication scenarios restrict nodes to determine their own addresses based on the underlying connectivity in the network. However, due to unreliable connectivity and rapidly changing link qualities in wireless networks, establishing uniform addressing and stable point-to-point routing is challenging. In this paper, we present Statistical Vector Routing (SVR), a virtual coordinates based addressing and routing mechanism that efficiently deals with dynamic communication links in wireless networks. It assigns stable probabilistic addresses to nodes without the need to pessimistically estimate links over longer periods of time. The routing metric predicts the current location of a node in its address distribution. Our prototype implementation over real testbeds indicates that SVR, when compared to current approaches, achieves 3 times more stable addressing, reduces the magnitude of change in addresses by 2-10 times, and minimizes the hop distance and transmissions in the network by 10-15%.
wld
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-vaegs-wehrle-probabilistic_addressing.pdf
Print
Hamburg University of Technology
Hamburg, Germany
Proceedings of the 2nd IEEE Student Conference, Hamburg University of Technology, Hamburg, Germany
Hamburg, Germany
2nd IEEE Student Conference, Hamburg University of Technology
May 20-21, 2010
en
TobiasVaegs
Muhammad HamadAlizai
KlausWehrle
inproceedings
2010-lora-COOP-Cooperative-WLAN-Workshop
A Proposal for QoE in Cooperative Wireless Local Networks
2010
5
7 number 1
151-161
Cooperative Wireless Networks (CWN) have become an attractive alternative for providing ubiquitous and inexpensive connectivity to mobile users. In a CWN, some hot-spot areas may experience the problem of sporadic congestions. The appearance of this localized congestion adversely impacts the network performance in terms of effective throughput, leading to a Quality of User Experience (QoE) degradation.
The challenge then is how to ensure the QoE for the access to services, in this unplanned type of networks.
This paper proposes a QoE for CWN with no centralized entities, which is based on the IEEE 802.11e amendment to the IEEE 802.11 Standard, and employs a game theory approach. The proposed scheme permits the distribution of the load between different Access Points. It also provides to the users a mechanism for the selection of the best Access Point in order to satisfy their requirements, and to guarantee the equilibrium in the network.
fileadmin/papers/2010/2010-lora-QoE-Cooperative.pdf
Online
Gunnar Stevens, Volkmar Pipek and Markus Rohde
IISI - International Institute for Socio-Informatics
Bonn, Germany
Workshop Proceedings of 9th International Conference on the Design of Cooperative Systems, International reports on socio-informatics, Aix - en - Provence, France
Aix-en-Provence, France
Mobile Collaboration Systems: Challenges for design, work practice, infrastructure, and business
May 2010
en
1861-4280
1
Mónica AlejandraLora Girón
inproceedings
2010-ipsn-sasnauskas-kleenet
KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment
2010
4
12
186--196
Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the uIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.
automated protocol testing, experimentation, failure detection, wireless sensor networks
kleenet
fileadmin/papers/2010/2010-04-ipsn-sasnauskas-KleeNet.pdf
Print
ACM
New York, NY, USA
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
en
978-1-60558-988-6
http://doi.acm.org/10.1145/1791212.1791235
1
RaimondasSasnauskas
OlafLandsiedel
Muhammad HamadAlizai
CarstenWeise
StefanKowalewski
KlausWehrle
inproceedings
201004IPSNbitschratmote
Demo Abstract: RatMote - A Sensor Platform for Animal Habitat Monitoring
2010
4
12
432--433
In this work, we present RatMote, a new wireless sensor node for subterranean animal habitat monitoring. RatMote has been developed for project RatPack, which aims at creating a new method for behavioral research on rats in their natural environment using wireless sensor nodes. Recent development in microcontroller architecture allowed us to design a sensor node which calculates up to 22 times more operations per mAh than the widely used TelosB node. This significant performance and efficiency increase allows us to perform computationally demanding algorithms inside the node, needed for vocalization analysis, localization, and mapping.
Demo Abstract
RatPack
fileadmin/papers/2010/2010-04-IPSN-bitsch-ratmote.pdf
http://doi.acm.org/10.1145/1791212.1791291
Online
ACM
New York City, NY, USA
IPSN '10
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
ACM
Stockholm, Sweden
9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
April 12-16, 2010
en
978-1-60558-988-6
http://doi.acm.org/10.1145/1791212.1791291
1
Jó AgilaBitsch Link
ThomasBretgeld
AndréGoliath
KlausWehrle
inproceedings
20104-IPSN-alizai-svr
Poster Abstract: Statistical Vector based Point-to-Point Routing in Wireless Networks
2010
4
12
366-367
We present Statistical Vector Routing (SVR), a protocol that efficiently deals with communication link dynamics in wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.
wld
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf
http://portal.acm.org/citation.cfm?id=1791257
Print
ACM
New York, NY, USA
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010), Stockholm, Sweden
Stockholm, Sweden
9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2010)
April 12-16, 2010
en
978-1-60558-988-6
1
Muhammad HamadAlizai
TobiasVaegs
OlafLandsiedel
RaimondasSasnauskas
KlausWehrle
inproceedings
201004vaegsjscsvr
Poster: A Statistical Vector based Routing Protocol for Wireless Networks
2010
4
7
279-280
We present Statistical Vector Routing (SVR), a protocol that efficiently deals with the dynamics shown by communication links of wireless networks. It assigns virtual coordinates to nodes based on the statistical distribution of their distance from a small set of beacons. The distance metric predicts the current location of a node in its address distribution. Our initial results from a prototype implementation over real testbeds demonstrate the feasibility of SVR.
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-alizai-ipsn-pad.pdf
Poster
Print
Hans K. Kaiser and Raimund Kirner
Vienna University of Technology
Karlsplatz 13, 1040 Vienna, Austria
Proceedings of the Junior Scientist Conference 2010, Vienna, Austria
Vienna, Austria
The Junior Scientist Conference
April 7-9, 2010
en
978-3-200-01797-9
TobiasVaegs
KlausWehrle
inproceedings
2010-percomws-heer-munifi
Collaborative Municipal Wi-Fi Networks - Challenges and Opportunities
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), IEEE.
2010
4
2
1
588 - 593
Municipal Wi-Fi networks aim at providing Internet access and selected mobile network services to citizens, travelers, and civil servants. The goals of these networks are to bridge the digital divide, stimulate innovation, support economic growth, and increase city operations efficiency. While establishing such urban networks is financially challenging for municipalities, Wi-Fi-sharing communities accomplish good coverage and ubiquitous Internet access by capitalizing on the dense deployment of private access points in urban residential areas. By combining Wi-Fi communities and municipal Wi-Fi, a collaborative municipal Wi-Fi system promises cheap and ubiquitous access to mobile city services. However, the differences in intent, philosophy, and technical realization between community and municipal Wi-Fi networks prevent a straight-forward combination of both approaches. In this paper, we highlight the conceptual and technical challenges that need to be solved to create collaborative municipal Wi-Fi networks.
mobile_access
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-heer-percomws-collaborative-municipal-wi-fi.pdf
Print
IEEE Press
Washington, DC, USA
Proceedings of the Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010), Mannheim, Germany.
Mannheim, Germany
Sixth IEEE PerCom Workshop on Pervasive Wireless Networking (PWN 2010)
April 02, 2010
en
978-1-4244-6605-4
10.1109/PERCOMW.2010.5470505
TobiasHeer
RenéHummen
NicolaiViol
HannoWirtz
StefanGötz
KlausWehrle
inbook
2010-aktas-modeling-application-traffic-bookchapter
Modeling Application Traffic
2010
4
397-426
Springer
18
Modeling and Tools for Network Simulation
978-3-642-12330-6
IsmetAktas
CemMengi
ThomasKing
incollection
2010-kunz-simtools-parallelDES
Parallel Discrete Event Simulation
2010
4
121-131
Print
Klaus Wehrle and Mesut Günes and James Gross
Springer
Berlin, Germany
8
Modeling and Tools for Network Simulation
en
978-3-642-12330-6
1
GeorgKunz
incollection
2010-kunz-simtools-deployments
From Simulations to Deployments
2010
4
83-97
Print
Klaus Wehrle and Mesut Günes and James Gross
Springer
Berlin, Germany
6
Modeling and Tools for Network Simulation
en
978-3-642-12330-6
1
GeorgKunz
OlafLandsiedel
GeorgWittenburg
inproceedings
DBLP:conf/webist/ChristophGK10
Efficient Literature Research based on Semantic Tagnets - Implemented and Evaluated for a German Text-corpus
2010
4
2
48-54
Print
Joaquim Filipe and José Cordeiro
INSTICC Press
WEBIST 2010, Proceedings of the 6th International Conference on Web Information Systems and Technologies, Valencia, Spain
en
978-989-674-025-2
UtaChristoph
DanielGötten
Karl-HeinzKrempels
techreport
draft-ietf-hip-cert-03
<prt>Host Identity Protocol Certificates</prt>
2010
4
1
draft-ietf-hip-cert-03.txt
<prt>expires: October 30, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-ietf-hip-cert-03
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-ietf-hip-cert-03
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
TobiasHeer
SamuVarjonen
inproceedings
2010-bitsch-link-iq2s-burrowview
BurrowView - Seeing the world through the eyes of rats
2010
3
29
56 -- 61
For a long time, life sciences were restricted to look at animal habitats only post-factum. Pervasive computing puts us in the novel position to gain live views. In this paper we present BurrowView, an application that tracks the movement of rats in their natural habitat and reconstructs the underground tunnel system. To make reliable statements, special consideration has been taken with regard to the information quality. Our system is able to reconstruct paths up to a resolution of 20 cm, the length of a rat without its tail.
RatPack
fileadmin/papers/2010/2010-03-IQ2S-link-burrowview.pdf
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5470603
Online
IEEE
New York City, NY, USA
Proceedings of the Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010), Mannheim, Germany
IEEE
Mannheim, Germany
Second IEEE International Workshop on Information Quality and Quality of Service for Pervasive Computing (IQ2S 2010)
March 29 to April 2, 2010
en
978-1-4244-6605-4
10.1109/PERCOMW.2010.5470603
1
Jó AgilaBitsch Link
GregorFabritius
Muhammad HamadAlizai
KlausWehrle
inproceedings
inproceedingsreference201001221179332027
Towards a Flexible and Versatile Cross-Layer-Coordination Architecture
2010
3
15
1-5
In wireless and mobile networking, volatile environ- mental conditions are a permanent challenge, resulting in a demand for cross-layer optimizations. To further increase flexibility, we believe cross-layer architectures should adapt themselves to these changing conditions, just as they adapt the network stack, devices, and applications. In this paper, we propose CRAWLER, a novel cross-layer architecture that combines three core properties: signaling between all layers and system components; extensibility and adaptability at runtime; and high usability for cross-layer developers. CRAWLER increases flexibility, as well as expediting and simplifying cross- layer development.
Work in Progress session
crawler
fileadmin/papers/2010/2010-03-infocom-aktas-crawler.pdf
Print
IEEE
Proceedings of the 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA
en
978-1-4244-6739-6
1
IsmetAktas
JensOtten
FlorianSchmidt
KlausWehrle
techreport
moskowitz-rfc5201-bis-01
<prt>Host Identity Protocol Version 2</prt>
2010
3
1
draft-moskowitz-hip-rfc5201-bis-01.txt
<prt>expires: September 10, 2010 (work in progress)</prt>
http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Online
<prt>IETF Trust</prt>
An online version is available at: http://tools.ietf.org/html/draft-moskowitz-hip-rfc5201-bis-01
Internet Drafts
<prt>Internet Engineering Task Force</prt>
Internet Engineering Task Force
en
1
RobertMoskowitz Pekka Nikander
PetriJokela
ThomasR. Henderson
TobiasHeer
inbook
2010-02-book-alizai-hardware-and-systems
Tools and Modeling Approaches for Simulating Hardware and Systems
2010
2
1
99-117
http://www.network-simulation.info/
http://www.amazon.com/Modeling-Tools-Network-Simulation-Wehrle/dp/3642123309
Print
Springer LNCS
Chapter 7
Modeling and Tools for Network Simulation
EN
978-3-642-12330-6
Muhammad HamadAlizai
LeiGao
TorstenKempf
OlafLandsiedel
inproceedings
inproceedingsreference201001227195395138
Iterative Source-Channel Decoding with Cross-Layer Support for Wireless VoIP
2010
1
18
1
1-6
This paper presents a cross-layer approach for iterative source-channel decoding (ISCD) in wireless VoIP networks. The novelty of the proposed method is the incorporation of both, speech bits as well as protocol header bits, into the ISCD process. The header bits take the role of pilot bits having perfect reliability. These bits are distributed over the frame as strong supporting points for the MAP decoder which results in a significant enhancement of the output speech quality compared to the benchmark scheme using ISCD for speech only. For this approach, we exploit new cross-layer concepts that support the direct communication between non-adjacent layers. These concepts enable the iterative exchange of extrinsic information between the source decoder located on the application layer and the channel decoder located on the physical layer. This technique can also be applied to audio and video transmission.
refector
fileadmin/papers/2010/2010-01-scc-breddermann-iscd.pdf
CD-ROM / DVD-ROM
Rudolf Mathar, Christoph Ruland
VDE Verlag
Berlin, Germany
Proceedings of International ITG Conference on Source and Channel Coding
Proceedings of International ITG Conference on Source and Channel Coding
ITG
Siegen
International ITG Conference on Source and Channel Coding 2010
January 18-21, 2010
en
978-3-8007-3211-1
1
TobiasBreddermann
HelgeLueders
PeterVary
IsmetAktas
FlorianSchmidt
inbook
201001ThieleINTECHRatpack
Dynamic Wireless Sensor Networks for Animal Behavior Research
2010
1
629--644
RatPack
http://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-01-Thiele-INTECH-Ratpack.pdf
http://sciyo.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research
http://www.intechopen.com/articles/show/title/dynamic-wireless-sensor-networks-for-animal-behavior-research
Online
Domenico Campolo
InTech
Vienna, Austria
32
Recent Advances in Biomedical Engineering
en
978-953-7619-57-2
1
JohannesThiele
Jó AgilaBitsch Link
OkuaryOsechas
HanspeterMallot
KlausWehrle
article
VaegsDHH2010
Learning by gaming: facts and myths
International Journal of Technology Enhanced Learning (IJTEL)
2010
2
1/2
21-40
Gaming has undergone a transition from a niche hobby to a part of everyday culture. This transition, along with the advance in the use of the internet, has created a new kind of social environment, commonly known as virtual life. This paper presents the survey results of over 1000 gamers worldwide, in which they tell us how gaming affected their lives – both virtual and real – with regard to their career, relationships and social life. The analysis of the answers disproves common stereotypes about gamers, shows areas where gaming can very well be beneficial and where there are still problems.
video games, online games, learning by playing, soft skills, transferable skills, motivation, conflicts, social skills, careers, relationships, communities, technical competence, gaming, virtual life, social life, gamers
https://www.comsys.rwth-aachen.de/fileadmin/papers/2010/2010-vaegs-JTEL-Gaming.pdf
Martin Wolpers
Inderscience Publishers
Geneva, SWITZERLAND
en
1753-5255
10.1504/IJTEL.2010.031258
1
TobiasVaegs
DarkoDugosija
StephanHackenbracht
AnnaHannemann
book
2010-kai-igi-applications
New Applications in IT Standards: Developments and Progress
2010
print
IGI Global
Hershey, PA, US
en
1
KaiJakobs
book
2010-kai-euras2
Services Standardisation. Proceedings of the 15th EURAS Conference. EURAS contributions to standardisation research, vol. 2.
2010
print
EURAS
Hamburg, DE
en
978-3-86130-245-2
1
Jean-ChristopheGraz
KaiJakobs
book
2010-kai-siit
Proceedings of the 6th Int. Conf. on Standardisation & Innovation, SIIT 2009.
EURAS contributions to standardisation research, vol. 1
2010
print
EURAS
Hamburg, DE
en
978-3-86130-243-8
1
KaiJakobs
inbook
2010-kai-igi
The European Union’s ICT Standardisation Policy - Changes Ahead!?
2010
XIV-XXVII
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
print
Kai Jakobs
IGI Global
Hershey, PA, US
Introduction
New Applications in IT Standards: Developments and Progress
en
9781605669465
KaiJakobs
inbook
2010-kai-hesser
ICT Standardisation – A Primer
2010
491-558
print
W. Hesser; A.L. Feilzer & H.J. de Vries
Helmut Schmidt University
Hamburg, DE
12
Standardisation in Companies and Markets
en
9783940385970
KaiJakobs
inbook
2010-kai-standardsedge_coordination
Coordination in ICT Standards Setting
2010
235-248
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
print
S. Bolin
The Bolin Group
San Francisco, CA, US
27
The Standards Edge - Unifier or Divider?
en
0974864854
KaiJakobs
KnutBlind
inbook
2010-kai-standardsedge_esos
ESOS, Open Standards, and New Deliverables
2010
149-158
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
print
S. Bolin
The Bolin Group
San Francisco, CA, US
17
The Standards Edge - Unifier od Divider?
en
0974864854
KaiJakobs
inbook
2010-kai-wifi
Creating a Wireless LAN Standard: IEEE 802.11
2010
53-109
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
print
W. Lemstra; J. Groenewegen; V. Hayes
Cambridge University Press
Cambridge, UK
3
The Innovation Journey of WiFi
9780521199711
KaiJakobs
WolterLemstra
VicHayes
BruceTuch
CessLinks
inproceedings
Eisenblaetter10
<prt>A Two-Stage Approach to WLAN Planning: Detailed Performance Evaluation Along the Pareto Frontier</prt>
2010
227 -236
Proc. of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'10)
AndreasEisenblätter
Hans-FlorianGeerdes
JamesGross
OscarPuñal
JonasSchweiger
inproceedings
2010-kai-webist.pdf
Shaping Standards – People and Voting Rights and the Case of IEEE802.11
2010
5-12
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
CD
Institute for Systems and Technologies of Information, Control and Communication
Setubal, PT
Proc. WebIST 2010, Valencia, Spain
en
978-989-674-025-2
1
KaiJakobs
inproceedings
2010-kai-mccsis.pdf
Standardising the IoT – Collaboration or Competition?
2010
62-66
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
CD
Sandeep Krishnamurthy, Gurmit Singh, Maggie McPherson
IADIS, International Association for Development of the Information Society
Proc. e-Democracy, Equity and Social Justice - EDEM2010, Freiburg, Germany
en
978-972-8939-24-3
1
KaiJakobs
ThomasWagner
KaiReimers
inproceedings
2010-kai-twente.pdf
Governing Future ICT Standardisation.
2010
55-57
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
online
U. of Twente
Twente, NL
Proc. Tentative governance in emerging science and technology
en
1
KaiJakobs
inproceedings
2010-kai-erima
Developing Standards for the IoT - A Collaborative Exercise!?
2010
3
108-116
https://www.comsys.rwth-aachen.de/typo3/file_list.php?id=%2Fvar%2Fwww%2Ffileadmin%2Fpapers%2F2010%2F#
Online, CD
L. Legardeur; K. North
ERIMA
Bidart, FR
Towards new challenges for innovative management practices
en
2100-0778
1
KaiJakobs
ThomasWagner
KaiReimers
inproceedings
20105munawardynamictinyos
Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks
2010
1-6
Long-term deployments of sensor networks in physically inaccessible environments make remote re-programmability of sensor nodes a necessity. Ranging from full image replacement to virtual machines, a variety of mechanisms exist today to deploy new software or to fix bugs in deployed systems. However, TinyOS - the current state of the art sensor node operating system - is still limited to full image replacement as nodes execute a statically-linked system-image generated at compilation time. In this paper we introduce Dynamic TinyOS to enable the dynamic exchange of software components and thus incrementally update the operating system and its applications. The core idea is to preserve the modularity of TinyOS, i.e. its componentization, which is lost during the normal compilation process, and enable runtime composition of TinyOS components on the sensor node. The proposed solution integrates seamlessly into the system architecture of TinyOS: It does not require any changes to the programming model of TinyOS and existing components can be reused transparently. Our evaluation shows that Dynamic TinyOS incurs a low performance overhead while keeping a smaller - upto one third - memory footprint than other comparable solutions.
fileadmin/papers/2010/2010-05-icc-munawar-DynamicTinyOS.pdf
Online
IEEE
Proceedings of the IEEE International Conference on Communications (ICC), Cape Town, South Africa
en
978-1-4244-6402-9
1550-3607
1
WaqaasMunawar
Muhammad HamadAlizai
OlafLandsiedel
KlausWehrle
inproceedings
2010-ARCS-alizai-promotingpower
Promoting Power to a First Class Metric in Network Simulations
2010
387-392
Accurate prediction of energy consumption early in the design process is essential to efficiently optimize algorithms and protocols. However, despite energy efficiency gathering significant attention in networking research, limited effort has been invested in providing requisite evaluation tools and models. Hence, developers demand powerful evaluation tools to assist them in comparing new communication paradigms in terms of energy efficiency, and minimizing the energy requirements of algorithms. In this paper, we argue for promoting energy to a first class metric in network simulations. We explore the challenges involved in modelling energy in network simulations and present a detailed analysis of different modelling techniques. Finally, we discuss their applicability in high-level network simulations.
fileadmin/papers/2010/2010-2-ARCS-alizai-promoting-power.pdf
Print
VDE-VERLAG
Berlin, Germany
Proceedings of the Workshop on Energy Aware Systems and Methods, in conjunction with GI/ITG ARCS 2010 Hannover, Feb. 21-23
en
978-3-8007-3222-7
1
Muhammad HamadAlizai
GeorgKunz
OlafLandsiedel
KlausWehrle
inproceedings
201003GarciaEffContAwareAccControlPMS
Efficient and Context-Aware Access Control for Pervasive Medical Sensor Networks
2010
Proceedings of the First IEEE PerCom Workshop on Pervasive Healthcare
OscarGarcia-Morchon
KlausWehrle
inproceedings
201006GarciaIFIPTM
On Applications of Cooperative Security in Distributed Networks
2010
ManyapplicationsrunningontheInternetoperateinfullyor semi-distributed fashion including P2P networks or social networks. Dis- tributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability. In particular, faulty or mis- behaving nodes cannot collude to subvert the system operation.
This paper addresses the above threats by applying cooperative security techniques to relevant distributed systems in the Internet. Our goal is to present methods that allow the peers to bootstrap basic trust relation- ships at the time of joining a distributed network and remove the peers if trust is lost. We consider the specific security caveats of the analyzed sys- tems, investigate the applicability of existing cooperative security-based protocols, and propose general design guidelines for cooperative-security protocol in described distributed systems.
Print
Springer
Berlin
Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management
Morioka, Japan
4th International Conference on Trust Management
en
978-3-642-13445-6
1
DmitriyKuptsov
OscarGarcia-Morchon
KlausWehrle
AndreiGurtov
inproceedings
201006GarciaSacmat
Modular Context-Aware Access Control for Medical Sensor Network
2010
Medical sensor networks allow for pervasive health monitoring of users in hospitals, at home, or on the way. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that unauthorized parties cannot retrieve confidential information. This is a great challenge due to two main reasons. First, wireless sensors are resource-constrained devices that limit the applicability of traditional solutions. Second, the access control system must be context-aware and adapt its security settings to ensure the users' safety during, e.g., medical emergencies. To solve these issues, this paper presents a modular context-aware access control system tailored to pervasive medical sensor networks in which the access control decisions and the response delay depend upon the health acuteness of a user. Our system extends traditional role-based access control systems by allowing for context-awareness in critical, emergency, and normal access control situations. We further present a lightweight encoding for our modular access control policies as well as an access control engine efficiently running on resource-constrained sensor nodes. Finally, we analyze how the proposed access control system suits existing security architectures for medical sensor networks.
Pittsburgh, USA
Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT'10)
ACM
978-1-4503-0049-0
10.1145/1809842.1809864
1
OscarGarcia-Morchon
KlausWehrle
phdthesis
2010-landsiedel-phd
Mechanisms, Models, and Tools for Flexible Protocol Development and Accurate Network Experimentation
2010
RWTH Aachen University
OlafLandsiedel