2008 The Fourth International Conference on Wireless and Mobile Communications最新文献

筛选
英文 中文
2D-Hierarchical Radiosity Model for Indoor Propagation Prediction 用于室内传播预测的二维层次辐射模型
N. Torjemen, M. Ayadi, S. Tabbane
{"title":"2D-Hierarchical Radiosity Model for Indoor Propagation Prediction","authors":"N. Torjemen, M. Ayadi, S. Tabbane","doi":"10.1109/ICWMC.2008.29","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.29","url":null,"abstract":"The need for efficient design of wireless LANs coverage and quality becomes an important issue due to their increasing deployments. Planning problems of WLAN require computation of a coverage map that satisfies signal level constraints and it is based on an accurate propagation model. Many indoor propagation models have been proposed in literature and can be classified into empirical and deterministic propagation ones. Radiosity has been introduced a couple of years ago as a new model for indoor propagation prediction. This method requires a huge computer memory and CPU processing. In this paper, we present two-dimension radiosity which helps save time and memory space. An implementation of this method is done to evaluate its performance, and then compared to results derived from real measurement processing.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128477883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stateless and Controlled Reservation Based DiffServ Model for Mobile Ad Hoc Networks 基于无状态和受控保留的移动Ad Hoc网络DiffServ模型
M.O. Farooq, S. Aziz
{"title":"Stateless and Controlled Reservation Based DiffServ Model for Mobile Ad Hoc Networks","authors":"M.O. Farooq, S. Aziz","doi":"10.1109/ICWMC.2008.72","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.72","url":null,"abstract":"The basic DiffServ model lacks the mechanism to prevent itself from being overload; it does not have any capability to inform the edge nodes about the internal traffic load in the network. Thus, injecting more QoS sensitive traffic into the network will not only degrade the performance of the current flow but it will also degrade the performance of already established flows. In this research paper we present an admission control mechanism that establishes QoS enabled Label Switched Paths in-order to provide rigorous QoS provisioning within the DiffServ enabled mobile ad-hoc network. We have presented a scheme that works by merging the signaling overhead with routing. We have performed extensive simulations to measure the effectiveness of our presented idea and we have observed that our scheme meets stringent QoS requirements of real time flows compared to some existent QoS models. Each admitted flow gets low delay, low jitter and almost guaranteed bandwidth. We have also observed that in most of the cases our scheme provides load balancing if multiple path exists to the destination.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proposal, Implementation, and Evaluation of a QoS-Aware Routing Mechanism for Multi-channel Multi-interface Ad-Hoc Networks 多通道多接口Ad-Hoc网络qos感知路由机制的提议、实现和评估
Shinsuke Kajioka, N. Wakamiya, Masayuki Murata, Hiroki Satoh, K. Monden, Masato Hayashi, S. Matsui
{"title":"Proposal, Implementation, and Evaluation of a QoS-Aware Routing Mechanism for Multi-channel Multi-interface Ad-Hoc Networks","authors":"Shinsuke Kajioka, N. Wakamiya, Masayuki Murata, Hiroki Satoh, K. Monden, Masato Hayashi, S. Matsui","doi":"10.1109/ICWMC.2008.37","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.37","url":null,"abstract":"Without any control mechanism, a wireless ad-hoc network is easily congested and the perceived quality of applications considerably deteriorates. Therefore, we need QoS control mechanisms to accommodate real-time multimedia application such as video conferencing, VoIP (voice over IP), and remote monitoring while satisfying application QoS requirements. In this paper, we propose a new routing mechanism to support real-time multimedia communication by efficiently utilize the limited wireless network capacity. Our mechanism considers a wireless ad-hoc network composed of nodes equipped with multiple network interfaces to each of which a different wireless channel can be assigned. By embedding information about channel usage in control messages of OLSRv2, each node obtains a view of topology and bandwidth information of the whole network. Then, a source node determines a logical path on which application QoS requirements are satisfied. Through experiments on a simulator, our mechanism could achieve the packet delivery ratio of about 95 % at the end-to-end delay of about 10 ms. In addition, real-time traffic was more evenly distributed over the whole network.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twofold Constructions of Multilevel Coset Codes 多层协集码的双重结构
Shang-Chih Ma
{"title":"Twofold Constructions of Multilevel Coset Codes","authors":"Shang-Chih Ma","doi":"10.1109/ICWMC.2008.13","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.13","url":null,"abstract":"A twofold multilevel concatenated coding scheme is proposed. The multilevel coding structure is based on set partitioning of an expanded set of interlevel-correlated multilevel coset codes. We can design a variety of binary linear block codes with high coding gain and low decoding complexity.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116964064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CA Based RFID Authentication Protocol for Privacy and Anonymity 基于CA的RFID隐私和匿名认证协议
Kang-Joong Seo, J. Jeon, Sang-Ho Shin, K. Yoo
{"title":"CA Based RFID Authentication Protocol for Privacy and Anonymity","authors":"Kang-Joong Seo, J. Jeon, Sang-Ho Shin, K. Yoo","doi":"10.1109/ICWMC.2008.32","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.32","url":null,"abstract":"Okubo et al. proposed a hash-chain based authentication protocol which protects users' location privacy and anonymity with strong forward security. However, Li et al. claimed that the hash-chain calculation must be a burden on low-cost RFID tags and gives back-end servers heavy calculation loads since the numbers for hash computation are required in a hash chaining technique. Thus, the non-group cellular automata chaining technique is adopted composed only of logical bitwise operations, in order to maintain both security guarantees and a low-cost construction.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128945950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-Sensitive Service Discovery for Mobile Commerce Applications 移动商务应用的上下文敏感服务发现
C. Atkinson, P. Bostan, T. Butter
{"title":"Context-Sensitive Service Discovery for Mobile Commerce Applications","authors":"C. Atkinson, P. Bostan, T. Butter","doi":"10.1109/ICWMC.2008.33","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.33","url":null,"abstract":"Over the last few years the number of services for mobile devices that are connected to the internet via UMTS or wireless 802.11 hotspots has grown tremendously. However, only a small proportion of these applications or services, has been successfully adopted and none has yet turned out to be the hoped-for killer application. We believe that context-sensitive service discovery is the key success factor for mobile applications and could have the same impact and level of success as search engines on desktop computers. Keyword-based searches using typical search engines or portals for browsing services with a mobile device often do not provide satisfying results within a reasonable period of time and they are cumbersome to use because of the restricted and limited input capabilities of mobile devices. In this paper we present a hybrid service discovery approach that uses context information to reduce human device interaction and delivers precise, personalized search results for service requests in a changing environment.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrating Mobile Devices into Semantic Services Environments 将移动设备集成到语义服务环境中
Josef Noll, Sarfraz Alam, M. Chowdhury
{"title":"Integrating Mobile Devices into Semantic Services Environments","authors":"Josef Noll, Sarfraz Alam, M. Chowdhury","doi":"10.1109/ICWMC.2008.77","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.77","url":null,"abstract":"This paper addresses mobile service provisioning in a mobile supported sensor network. The challenges of secure service provisioning in such a network is tackled through a two-layer approach, using the encryption on the radio layer and policies for device capabilities and service access. This paper suggests the mobile phone acting as control centre for the sensors. The implementation is based on a distributed semantic service repository, allowing the mobile services to become part of a semantic service composition. The semantic policy server connects the device capabilities, the user preferences and the service functionality. The papers provides the functional architecture and implementations of key elements of this architecture.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131246087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Wireless Sensor Networks for Surveillance Applications – A Comparative Survey of MAC Protocols 用于监视应用的无线传感器网络- MAC协议的比较调查
Mahmood Ali, Annette Böhm, Magnus Jonsson
{"title":"Wireless Sensor Networks for Surveillance Applications – A Comparative Survey of MAC Protocols","authors":"Mahmood Ali, Annette Böhm, Magnus Jonsson","doi":"10.1109/ICWMC.2008.53","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.53","url":null,"abstract":"Wireless sensor nodes are made up of small electronic devices which are capable of sensing, computing and transmitting data from harsh physical environments. These sensor nodes depend on batteries for energy, which get depleted at a fast rate because of the computation and communication operations these nodes have to perform. A well designed MAC (Medium Access Control) protocol can prolong the network life. A set of previously reported MAC layer protocols has abilities to achieve some energy efficiency. In this paper, we first describe some assumptions made for the specific application area of surveillance applications. Then, we compare a set of MAC protocols in terms of their suitability to be used in wireless sensor networks for this type of applications. In addition to energy efficiency, keeping the delays reasonably low is a crucial factor when sensing and reporting an event.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132645983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Using Spatial Abstractions in Industrial Environments 在工业环境中使用空间抽象
Clemens Holzmann, A. Ferscha, M. Hechinger, Johannes Kepler, Andreas Zeidler, M. D. S. Rocha
{"title":"Using Spatial Abstractions in Industrial Environments","authors":"Clemens Holzmann, A. Ferscha, M. Hechinger, Johannes Kepler, Andreas Zeidler, M. D. S. Rocha","doi":"10.1109/ICWMC.2008.30","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.30","url":null,"abstract":"The invisible integration of technology in literally everything, which is the fundamental of research on pervasive and ubiquitous computing, leads to huge quantities of smart objects which are distributed in physical space. They should operate autonomously, namely with as little human intervention as possible, and interact with humans in a more implicit way. Spatial properties and relations are important context information in this regard, as they allow them to automatically adapt to spatial changes in their environment in a semantically meaningful way. We propose novel concepts and a framework for exploiting qualitative abstractions of relationships between smart objects, which are specific to an application domain and facilitate the development of spatially-aware applications, and demonstrate their use with four industrial application scenarios.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data-Centric Density Control for Wireless Sensor Networks 以数据为中心的无线传感器网络密度控制
J.C. Melo, L. B. Ruiz
{"title":"Data-Centric Density Control for Wireless Sensor Networks","authors":"J.C. Melo, L. B. Ruiz","doi":"10.1109/ICWMC.2008.56","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.56","url":null,"abstract":"The unplanned and random deployment of a Wireless Sensor Network (WSN) may impose a high node density on a specific region. This concentration can be exploited by density control mechanisms to increase network lifetime, by deactivating temporarily redundant sensor nodes. Previous approaches for density control in WSN focus in guaranteeing full sensing coverage of monitoring area. This work presents a new data-centric approach where density control is performed to increase network lifetime preserving precision of sampled data. Using statistical techniques, density is determined according to sampling. The results show that this approach achieved an improvement of 3 times of network lifetime, while it guarantees a data precision defined by a user.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信