2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services最新文献

筛选
英文 中文
GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks GrooveNet:用于车对车网络的混合模拟器
R. Mangharam, D. Weller, R. Rajkumar, P. Mudalige, F. Bai
{"title":"GrooveNet: A Hybrid Simulator for Vehicle-to-Vehicle Networks","authors":"R. Mangharam, D. Weller, R. Rajkumar, P. Mudalige, F. Bai","doi":"10.1109/MOBIQW.2006.361773","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361773","url":null,"abstract":"Vehicular networks are being developed for efficient broadcast of safety alerts, real-time traffic congestion probing and for distribution of on-road multimedia content. In order to investigate vehicular networking protocols and evaluate the effects of incremental deployment it is essential to have a topology-aware simulation and test-bed infrastructure. While several traffic simulators have been developed under the intelligent transport system initiative, their primary motivation has been to model and forecast vehicle traffic flow and congestion from a queuing perspective. GrooveNet is a hybrid simulator which enables communication between simulated vehicles, real vehicles and between real and simulated vehicles. By modeling inter-vehicular communication within a real street map-based topography it facilitates protocol design and also in-vehicle deployment. GrooveNet's modular architecture incorporates mobility, trip and message broadcast models over a variety of link and physical layer communication models. It is easy to run simulations of thousands of vehicles in any US city and to add new models for networking, security, applications and vehicle interaction. GrooveNet supports multiple network interfaces, GPS and events triggered from the vehicle's on-board computer. Through simulation, we are able to study the message latency, and coverage under various traffic conditions. On-road tests over 400 miles lend insight to required market penetration","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121663539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Learning Sensor Data Characteristics in Unknown Environments 在未知环境中学习传感器数据特性
T. Bokareva, N. Bulusu, S. Jha
{"title":"Learning Sensor Data Characteristics in Unknown Environments","authors":"T. Bokareva, N. Bulusu, S. Jha","doi":"10.1109/MOBIQ.2006.340384","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340384","url":null,"abstract":"Ad hoc wireless sensor networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations. As we begin to deploy sensor networks in real world applications, concerns are being raised about the fidelity and integrity of the sensor network data. In this paper, we motivate and propose an online algorithm that leverages competitive learning neural network for characterization of a dynamic, unknown environment. Based on the proposed characterization sensor networks can autonomously construct multimodal views of their environments and derive the conditions for verifying data integrity over time","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116596555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Challenges on providing services in a Ubiquitous, Mobile Environment 在无所不在的移动环境中提供服务的挑战
F. Anjum
{"title":"Challenges on providing services in a Ubiquitous, Mobile Environment","authors":"F. Anjum","doi":"10.1109/MOBIQ.2006.340453","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340453","url":null,"abstract":"In this paper, some challenges for the providing service in a ubiquitous, mobile environment have been described. The first challenge is to provide the performance, the security is the other important challenge where its associations are formed with particular interfaces and the privacy also needed attention in a world that provides ubiquitous services. The design and development of the services brings their own set of challenges. It has to be designed such that they can function effectively in various resources and similarly it development needs careful thought. The other challenges such as novelty, desirability, testing and evaluation are also described in this paper","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115020252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Software-as-a-Service Model for Mobile and Ubiquitous Computing Environments 移动和普适计算环境的软件即服务模型
Nikos Anerousis, A. Mohindra
{"title":"The Software-as-a-Service Model for Mobile and Ubiquitous Computing Environments","authors":"Nikos Anerousis, A. Mohindra","doi":"10.1109/MOBIQ.2006.340383","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340383","url":null,"abstract":"An area of unique opportunity for SaaS is the mobile and ubiquitous computing space. The SaaS model has a number of advantages that are uniquely suited to a resource-constrained mobile computing environment. This short paper gives a high level overview of the SaaS which brings significant opportunities in this space and further presents the architectural considerations for SaaS providers and mobile computing environments","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks 个人网络:无线个人区域网络和3G网络的覆盖网络
A. Lo, Weidong Lu, M. Jacobsson, R. V. Prasad, I. Niemegeers
{"title":"Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks","authors":"A. Lo, Weidong Lu, M. Jacobsson, R. V. Prasad, I. Niemegeers","doi":"10.1109/mobiq.2006.340446","DOIUrl":"https://doi.org/10.1109/mobiq.2006.340446","url":null,"abstract":"A personal network is an overlay network which builds on different wireless networking technologies. This overlay network is responsible of glueing the different wireless networking technologies. In this paper, we consider the cooperation of two key technologies to realize a personal network, namely, wireless personal area network and universal mobile telecommunications system (UMTS). The co-operation poses a new set of problems as these technologies were not designed to interwork with each other. In this paper, we describe each of these problems and their solutions","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128099731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptilve Data Collectilon Scheme for Trackilng Mobille Target in Wireless Sensor Networks 无线传感器网络中跟踪移动目标的自适应数据采集方案
Ling Zhou, Arunabha Sen
{"title":"Adaptilve Data Collectilon Scheme for Trackilng Mobille Target in Wireless Sensor Networks","authors":"Ling Zhou, Arunabha Sen","doi":"10.1109/MOBIQ.2006.340394","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340394","url":null,"abstract":"Tracking mobile targets is an important application of wireless sensor networks. However, mobility of the target brings new challenges to designing energy-efficient and scalable data collection schemes. A novel dynamic grid-based tracking (DGT) scheme for tracking mobile target is proposed in this paper. This scheme is distributed in nature, and can be adaptive to the mobility of the target. The underlying idea of embedding a virtual grid structure and restricting mobility-related choices to grid nodes can be generally applied to other wireless sensor networks applications, where mobility is an important consideration during protocol design","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Actuation Strategies for Sensor/Actuator Networks 传感器/执行器网络的最优驱动策略
F. Thouin, R. Thommes, M. Coates
{"title":"Optimal Actuation Strategies for Sensor/Actuator Networks","authors":"F. Thouin, R. Thommes, M. Coates","doi":"10.1109/MOBIQ.2006.340389","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340389","url":null,"abstract":"Wireless sensor-actuator networks (SANETs), in which nodes perform actions (actuation) in response to sensor measurements and shared information, have great potential in medical and agricultural applications. In this paper, we focus on the problem of using distributed sensed data to design actuation strategies in order to elicit a desired response from the environment, whilst attempting to minimize the communication in the network. Our methodology is based on batch Q-learning; we describe a distributed approach for learning dyadic regression trees to estimate the Q-functions from collected data. Analysis and simulation indicate that substantial communication savings that can be achieved through distributed learning without significant performance deterioration. The simulations also reveal that the performance of our technique depends strongly on the amount of training data available","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121831235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Controlled Epidemic-style Dissemination Middleware for Mobile Ad Hoc Networks 移动自组织网络的受控流行式传播中间件
Mirco Musolesi, C. Mascolo
{"title":"Controlled Epidemic-style Dissemination Middleware for Mobile Ad Hoc Networks","authors":"Mirco Musolesi, C. Mascolo","doi":"10.1109/mobiqw.2006.361736","DOIUrl":"https://doi.org/10.1109/mobiqw.2006.361736","url":null,"abstract":"Traditional middleware primitives offer very elementary information dissemination mechanisms, which, in the case of a decentralized and dynamic network such as a mobile ad hoc network, do not offer the ability to control the information spreading. Control over information dissemination could instead be very critical especially in terms of lifetime of the network. Gossip-based communication and epidemic-style algorithms, which are based on a store and forward approach, have been proposed to obtain message dissemination with probabilistic guarantees and lower overheads. However, epidemic algorithms have never been used to allow designers to control the spreading of the information depending on the desired reliability and the network structure. In this paper, we present a middleware for ad hoc networking, which uses epidemic-style information dissemination techniques to tune the reliability of the communication in mobile ad hoc networks. The approach is based on recent results of complex networks theory; the novelty of our idea resides in the evaluation and the exploitation of the structure of the underlying network for the automatic tuning of the dissemination process and its use in the design of the API offered by the middleware. We present a detailed analytical model supported by several simulation results","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121639758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Generalized "Yoking-Proofs" for a Group of RFID Tags 一组RFID标签的广义“横证明”
L. Bolotnyy, G. Robins
{"title":"Generalized \"Yoking-Proofs\" for a Group of RFID Tags","authors":"L. Bolotnyy, G. Robins","doi":"10.1109/MOBIQ.2006.340395","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340395","url":null,"abstract":"Recently Ari Juels suggested a \"yoking-proof\" where a pair of radio-frequency identification (RFID) tags are both read within a specified time bound, and left open for future research the problem of generating a proof for larger groups of tags. We generalize his protocol by developing a proof which ensures that a group of tags is read within a certain time period. The tags generate such a proof even if the reader is untrusted. The proof is improbable to forge, and is verifiable off-line by a trusted verifier. Juels's problem formulation does not take privacy into account and the resulting protocol offers no privacy to the tags. We modify the problem statement to require the \"yoking-proof\" to maintain privacy, and we give a protocol for this new anonymous yoking problem, along with suggestions for speed ups","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127872853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
TypeCast: Type-Based Routing in Wireless Ad-hoc Networks TypeCast:无线Ad-hoc网络中基于类型的路由
Jinsong Lin, T. Phan, R. Bagrodia
{"title":"TypeCast: Type-Based Routing in Wireless Ad-hoc Networks","authors":"Jinsong Lin, T. Phan, R. Bagrodia","doi":"10.1109/MOBIQ.2006.340410","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340410","url":null,"abstract":"Type-based communication is proposed as an effective paradigm to enable group communication in wireless ad-hoc networks (MANETs). In this paradigm, type is used as the fundamental construct for addressing and routing messages. Type hierarchies are used to dynamically control group size; and object-oriented principles such as subtyping and multiple inheritance are utilized to construct new groups from existing ones. We present the design of TypeCast, a routing protocol that directly supports type-based communication. TypeCast leverages efficiency and mobility management provided by MANET multicast protocols and extends them by adding a Bloom filter-based type encoding and routing mechanism. TypeCast is fully decentralized and supports subtyping and type-composition. We implement TypeCast on top of ODMRP and conduct a detailed performance and scalability study of TypeCast through simulation. The results show that TypeCast demonstrates good resiliency to mobility and group size. When the number of types in the network increases, TypeCast achieves good scalability thanks to type aggregation provided by Bloom filters","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124270032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信