{"title":"Fast computation of schedules for dynamic traffic in wireless mesh networks","authors":"Peng Wang, S. Bohacek","doi":"10.1109/WOWMOM.2010.5534997","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534997","url":null,"abstract":"A large number of algorithms focus on using scheduling to maximize the stability region. However, this goal does not necessarily result in good performance in terms of supporting a large number of users where users' average time to transfer a file meets a target. This paper develops several computationally efficient schemes for computing schedules for time-varying offered load. Two important findings are that when the traffic is time-varying, the computational complexity can be substantially reduced by using the previous schedule as an initial starting point of the optimization (i.e., warm start). Furthermore, very few iterations (e.g., one iteration) are needed to get a suitable schedule, that is, there is no need to wait for the optimization to converge. A second finding is that there is no need to repeatedly solve the maximum weighted independent set (MWIS) problem. Instead, the MWIS problem is only solved during initialization. Because of the computational efficiency, the schemes presented can be used to frequently update schedules, allowing schedules to quickly adapt to changes in the offered load. Consequently, as compared to other scheduling schemes, the schemes developed support a larger number of users for a given average service time.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic diagnosis of anomalous network traffic","authors":"Angelos K. Marnerides, D. Hutchison, D. Pezaros","doi":"10.1109/WOWMOM.2010.5534933","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534933","url":null,"abstract":"Network traffic abnormalities pose one of the greatest threats for networked environments. Autonomic communications offer a solution: it should be possible to design network mechanisms that behave adaptively and respond to any anomalous phenomenon that threatens normal network behaviour. In this paper we present the design of an adaptive anomaly detection component that has been built as part of an autonomic network system. We have implemented an entropy estimator to predict the onset of anomalous traffic behaviour within an autonomic resilience framework, and a Supervised Naive Bayesian classifier which synergistically empower the core properties of self-adaptation, self-learning and self-protection for next generation networks. Being part of an always-on, automated measurement and control infrastructure, such mechanism enforces the adaptive system reaction to suboptimal network operation and its subsequent restoration, while requiring minimal static (re)configuration and operator intervention.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"17 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114110655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstration of seamless multimedia session transfer to support pervasive mobile computing","authors":"Robert Gazda, D. Purkayastha, Xin Feng, F. Samimi","doi":"10.1109/WOWMOM.2010.5534934","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534934","url":null,"abstract":"In today's media environment, multimedia content is accessed by mobile users in a silo fashion, with content locked to individual point devices and networks. Content, available on one device or one network, may not be accessed from other devices, or over other networks. Users cannot easily share multimedia sessions across devices, such as smartphones and laptops. Media content does not adapt with user mobility. Specifically, users cannot take advantage of the multitude of media devices that they encounter as they move, in order to achieve a \"best\" possible multimedia experience. In the future, media will transition seamlessly between devices, networks, and access technologies with the user, as the user moves. Session continuity technologies, driven by global standards bodies, will make seamless media mobility possible. Media content will be optimized based on the real-time conditions of the user, including: available networks and bandwidth, available device configurations and rendering capabilities, battery consumption, memory and processing power, location, cost, etc. Our demonstration allows a user to transfer a streaming video session across a collection of laptop and smartphone devices. Specifically, the demonstration includes: a MAC Pro laptop, a MacBook Air laptop, Android Gl / G2 smartphones, and a Blackberry Bold 9000 smartphone. Each terminal device runs a small media application, which presents the user with a set of video clips for viewing. When the user selects a clip, the application server commands the media server to stream the requested video. Each video may be viewed to completion; or, the user may transfer the video session to any of the other terminal devices in the demonstration. With a click or touch of the screen, the media application presents the user with a list of available devices to engage in media transfer sessions. With another click or touch, the user may trigger a media session transfer: • The application server dynamically configures the media server and triggers the target device to get engaged in the streaming session. • The target device initializes its media player, which begins to buffer the video stream. During buffering time, which lasts a few seconds, an advertisement image is displayed (pre-roll canvas). • The originating device continues to play the video, until the video session begins playing on the target device. • The target device notifies the originating device as soon as its initialization is complete and it starts playing the video. Upon receiving the notification, the originating device tears down the video session and returns to the media application home screen.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121733902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust flooding algorithm in multi-radio multi-channel wireless mesh networks","authors":"Youndo Lee, Kideok Cho, T. Kwon, Yanghee Choi","doi":"10.1109/WOWMOM.2010.5534955","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534955","url":null,"abstract":"Flooding, that is to deliver a packet from one node to all other nodes in the network, is an integral part of many wireless protocols. Flooding is often implemented by a series of broadcasts of each node and this causes some problems such as the broadcast storm and low reliability, by being engaged with the effects of radio signal propagation, e.g., multipath fading and interference. Many researchers have studied these problems over the years, however, most of these studies have been carried out assuming that all nodes in the network are equipped with a single radio interface and utilize only a single channel. This implies that most of the existing mechanisms that enhance the performance of flooding in wireless networks will not work in multi-radio multi-channel wireless mesh networks (MR-MC WMNs). Motivated by this, in this paper, we propose a flooding mechanism that works well in MR-MC WMNs. Our flooding mechanism, which can operate with an arbitrary number of radio interfaces and channels, increases the reliability of flooding while alleviates the broadcast storm problem, using only local information. Through a detailed simulation study, we demonstrate that our flooding mechanism improves both the reliability and the efficiency of flooding in MR-MC WMNs.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133124167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of distributed and asynchronous wireless group communication mechanisms","authors":"Surendar Chandra, Xuwen Yu","doi":"10.1109/WOWMOM.2010.5534935","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534935","url":null,"abstract":"Asynchronous group communication systems propagate updates from each group member to every other member. Contemporary users are wireless and operate from a variety of locations. Hence, we investigate the propagation performance for these users. An analysis of wireless users in academia, corporation and in a city-wide hotspot federation shows that the availability durations and the duration between sessions depends on the locale. A longer term analysis shows that the user session lengths are becoming smaller while the duration between sessions are becoming larger with significant user churn. We show that the propagation performance depends on the locale. New users incur a heavy cost in receiving updates from prior users; applications need to develop expiration mechanisms to reduce this overhead. Also, since users regularly leave the system, practical communication mechanisms need to choose their propagation periodicity in order to respond to scenarios when the user abruptly leaves the system without propagating their updates to other users.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy for mobile electronic health monitoring and recording systems","authors":"Johannes Barnickel, Hakan Karahan, Ulrike Meyer","doi":"10.1109/WOWMOM.2010.5534981","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534981","url":null,"abstract":"In this paper we detail the security and privacy architecture and implementation of the HealthNet mobile electronic health monitoring and data collection system. HealthNet consists of a body sensor network embedded in clothing that communicates wirelessly to the wearer's mobile phone. The mobile phone is used to manage, store and transfer the data in a secure way. Data may be transferred to other parties, such as medical experts, emergency care and private parties trusted by the wearer himself, e.g. his family. The patient controls who may access his data. Only emergency physicians nearby the patient may access vital data without the patient's individual consent. We describe the unique security and privacy features of our architecture which may also be used to improve other telemonitoring solutions.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114251097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chang Liu, K. Holroyd, Qing Zhu, K. Shen, Wenqi Zhou
{"title":"Design and implementation of a behavioral migraine management iPhone app for adolescents with migraine","authors":"Chang Liu, K. Holroyd, Qing Zhu, K. Shen, Wenqi Zhou","doi":"10.1109/WOWMOM.2010.5534985","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534985","url":null,"abstract":"Our recent feasibility study of a telephone-administrated Behavioral Migraine Management (BMM) program for teens revealed that while learning and improvements in migraine were encouraging, experience for teens could be further improved with on-demand access to BMM instruction and materials. To meet this demand, an iPhone application was developed to help adolescent migraine patients and their counselors manage migraine with our behavioral migraine management approach. This application provides on-demand access to audio, video and animated instructions to guide the learning and application of behavioral migraine management skills as well as a headache diary that allows adolescents and their counselors to monitor key migraine and medication use variables. The design, implementation, current status, and future plan of this BMM iPhone App for adolescents are described in this paper.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial ants for efficient data forwarding in wireless mesh networks","authors":"Fawaz S. Bokhari","doi":"10.1109/WOWMOM.2010.5534974","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534974","url":null,"abstract":"We present our initial work on the design and implementation of an efficient routing architecture for wireless mesh networks (WMNs). We have proposed two routing schemes namely AMIRA and AntMesh, which provide efficient data forwarding for improved load-balancing and reduced interference in single and multi-radio infrastructure mesh networks. Both of our proposed schemes are derived from the principle of Ant Colony Optimization (ACO) in which artificial ants (agents) perform the routing and data forwarding to stochastically solve a dynamic network optimization problem. The main focus in our work is to take advantage of the particular characteristics of ACO framework and exploit them in designing routing schemes for WMNs keeping in view the unique characteristics and requirements of these infrastructure mesh networks.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Chowdhury, H. Chien, Sourabh Khire, S. Fan, Xianfeng Tang, N. Jayant, G. Chang
{"title":"Next-generation E-health communication infrastructure using converged super-broadband optical and wireless access system","authors":"A. Chowdhury, H. Chien, Sourabh Khire, S. Fan, Xianfeng Tang, N. Jayant, G. Chang","doi":"10.1109/WOWMOM.2010.5534984","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534984","url":null,"abstract":"Delivering affordable high-quality E-health care services requires effective telecommunication and multimedia technologies in conjunction with medical expertise. In this paper, we propose and demonstrate a telecommunication and networking architecture for implementing next generation Telemedicine and Telehealth systems. Our integrated optical-wireless based network provides super broadband, ultra low-latency connectivity for voice, video, image and data across various telemedicine modalities to facilitate real-time and near real-time communication of remote health care information.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game theory for channel assignment of cognitive radios","authors":"Amiotosh Ghosh, W. Hamouda","doi":"10.1109/WOWMOM.2010.5534939","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534939","url":null,"abstract":"We propose channel selection algorithm for cognitive ad-hoc radios using noncooperative game theory and present simulation results that show, the proposed algorithm distributes cognitive nodes according to the bandwidth ratio of the channels.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"335 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120895482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}