2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services最新文献

筛选
英文 中文
Interference based Call Admission Control for Wireless Ad Hoc Networks 基于干扰的无线自组网呼叫接纳控制
Sridhar K N, M. Chan
{"title":"Interference based Call Admission Control for Wireless Ad Hoc Networks","authors":"Sridhar K N, M. Chan","doi":"10.1109/MOBIQ.2006.340398","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340398","url":null,"abstract":"In this paper, we propose a call admission control mechanism for wireless ad hoc networks called interference-based call admission control (iCAC). iCAC is unique in that it does not treat interference uniformly instead classifies interference based on estimates of the position of the interfering nodes. iCAC relies on two novel techniques: (1) estimation of position of the interfering nodes (2) fair allocation using bandwidth acquisition and rate control. By incorporating these techniques, iCAC is able to increase the estimated available bandwidth substantially without overloading the network. We compare iCAC with perceptive admission control (PAC) and IEEE 802.11 without admission control. Simulation results show that iCAC is able to admit substantially more requests than PAC, achieves more than 80% of the throughput of IEEE 802.11 and at the same time maintains very low packet loss rate and average delay comparable to PAC","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Method for Sharing Traffic Jam Information using Inter-Vehicle Communication 一种基于车际通信的交通阻塞信息共享方法
N. Shibata, T. Terauchi, T. Kitani, K. Yasumoto, M. Ito, T. Higashino
{"title":"A Method for Sharing Traffic Jam Information using Inter-Vehicle Communication","authors":"N. Shibata, T. Terauchi, T. Kitani, K. Yasumoto, M. Ito, T. Higashino","doi":"10.1109/mobiq.2006.340428","DOIUrl":"https://doi.org/10.1109/mobiq.2006.340428","url":null,"abstract":"In this paper, we propose a method for cars to autonomously and cooperatively collect traffic jam statistics to estimate arrival time to destination for each car using inter-vehicle communication. In the method, the target geographical region is divided into areas, and each car measures time to pass through each area. Traffic information is collected by exchanging information between cars using inter-vehicle communication. In order to improve accuracy of estimation, we introduce several mechanisms to avoid same data to be repeatedly counted. Since wireless bandwidth usable for exchanging statistics information is limited, the proposed method includes a mechanism to categorize data, and send important data prior to other data. In order to evaluate effectiveness of the proposed method, we implemented the method on a traffic simulator NETSTREAM developed by Toyota Central R&D Labs conducted some experiments and confirmed that the method achieves practical performance in sharing traffic jam information using inter-vehicle communication","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123781211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Generic Large Scale Simulator for Ubiquitous Computing 泛在计算的通用大规模模拟器
Miquel Martin, P. Nurmi
{"title":"A Generic Large Scale Simulator for Ubiquitous Computing","authors":"Miquel Martin, P. Nurmi","doi":"10.1109/MOBIQ.2006.340388","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340388","url":null,"abstract":"The complexity associated to gathering and processing contextual data makes testing mobile context-aware applications and services difficult. Furthermore, the lack of standard data sets and simulation tools makes the evaluation of machine learning algorithms in context-aware settings an even harder task. To ease the situation, we introduce a generic simulator that has been designed with the above mentioned purposes in mind. The simulator has also proven to be a good demonstration tool for mobile services and applications that are aimed at groups. The simulator is highly customizable and it can output context information of individual entities both through an interactive GUI and as data streams consisting of comma separated values. To support a wide range of tasks and scenarios, we have separated the three main information sources: behavior of agents, the scenario being simulated and the used context variable. The simulator has been implemented using Java, and the data streams have been made available through a Web service interface","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
A Framework to Provide Anonymity in Reputation Systems 在信誉系统中提供匿名性的框架
Hugo M. Miranda, L. Rodrigues
{"title":"A Framework to Provide Anonymity in Reputation Systems","authors":"Hugo M. Miranda, L. Rodrigues","doi":"10.1109/mobiq.2006.340391","DOIUrl":"https://doi.org/10.1109/mobiq.2006.340391","url":null,"abstract":"In ubiquitous networks, the multiple devices carried by an user may unintentionally expose information about her habits or preferences. This information leakage can compromise the users' right to privacy. A common approach to increase privacy is to hide the user real identity under a pseudonym. Unfortunately, pseudonyms may interfere with the reputation systems that are often used to assert the reliability of the information provided by the participants in the network. This paper presents a framework for combining anonymity with reputation and shows that it can be configured to provide a desired degree of balance between these two conflicting goals. The proposed solution leverages on well-known cryptographic techniques, such as public key infrastructure and blind signatures","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
TinySIP: Providing Seamless Access to Sensor-based Services TinySIP:提供无缝访问基于传感器的服务
S. Krishnamurthy
{"title":"TinySIP: Providing Seamless Access to Sensor-based Services","authors":"S. Krishnamurthy","doi":"10.1109/MOBIQW.2006.361779","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361779","url":null,"abstract":"In this paper, we propose TinySIP as a communication abstraction for accessing sensor-based services. TinySIP is based on the session initiation protocol (SIP), which is a standard application-level signaling mechanism. Users on traditional networks remotely interact with a sensor network service by sending SIP messages. A gateway maps the SIP abstractions to the corresponding TinySIP abstractions and propagates the messages to the sensor nodes. We are currently planning on deploying the SIP-based solution that we propose on a research testbed to enable users on a wireless mesh to access the in-network storage and event correlation services offered by a sensor network consisting of 20 MicaZ sensor nodes","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127599283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Bridging the Gap between Privacy and Security in Multi-Domain Federations with Identity Tokens 用身份令牌弥合多域联合中隐私和安全之间的差距
D. Lutz, Ruth del Campo
{"title":"Bridging the Gap between Privacy and Security in Multi-Domain Federations with Identity Tokens","authors":"D. Lutz, Ruth del Campo","doi":"10.1109/MOBIQW.2006.361744","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361744","url":null,"abstract":"In this paper we introduce the concept of identity tokens in multi-domain service environments and show how it is used to bridge between authentication/authorization and users' privacy. This token provides, together with further authentication and authorization techniques, a high level of privacy without anonymity","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Cross-layer Decentralized BitTorrent for Mobile Ad hoc Networks 用于移动自组织网络的跨层分散BitTorrent
Sundaram Rajagopalan, Chien-Chung Shen
{"title":"A Cross-layer Decentralized BitTorrent for Mobile Ad hoc Networks","authors":"Sundaram Rajagopalan, Chien-Chung Shen","doi":"10.1109/MOBIQ.2006.340400","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340400","url":null,"abstract":"In recent years, a number of P2P systems, for instance, Gnutella, KaZaA, Napster, and BitTorrent, have been proposed for the wired Internet. However, these protocols are not immediately applicable to the mobile ad hoc networks (MANETs) owing to the extreme conditions MANETs operate under. Of the above protocols, although BitTorrent has several features which make it an ideal candidate for adapting to MANETs, the current specification of BitTorrent has several drawbacks which make a straightforward implementation of BitTorrent for MANETs an undesirable solution. In this paper, we investigate a straightforward implementation of BitTorrent in MANETs, termed BTI, and compare its performance with a cross-layer adaptation of BitTorrent for MANETs, termed BTM. We resolve the issues of centralized control and single point of failure in BTI by proposing mechanisms to decentralize the BitTorrent model for MANETs and provide resource/data redundancy to improve the protocol performance. In addition, the cross-layer model of BTM is more suited for use in a MANET. Our performance comparison studies show that BTM is able to outperform BTI in terms of goodput, and the number of pieces delivered, in the context of amortizing the client download expenses over more connections (that is, BTM has a higher average peer degree)","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Pervaho: A Development & Test Platform for Mobile Ad hoc Applications perhoho:移动Ad hoc应用程序的开发和测试平台
P. Eugster, B. Garbinato, A. Holzer
{"title":"Pervaho: A Development & Test Platform for Mobile Ad hoc Applications","authors":"P. Eugster, B. Garbinato, A. Holzer","doi":"10.1109/MOBIQ.2006.340386","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340386","url":null,"abstract":"This paper introduces Pervaho, a platform for developing and testing mobile ad hoc applications. The Pervaho platform is founded on a location-based publish/subscribe service, which allows mobile peers to interact in a flexible and anonymous manner, based on their collocation at the time of the interaction. To validate the semantics of location-based criteria-a general issue in mobile ad hoc applications-we also propose a phone motion simulator as second cornerstone of our platform. Finally, we evaluate the usability of Pervaho by developing a concrete application with and without Pervaho","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Location-Based Flooding Techniques for Vehicular Emergency Messaging 基于位置的车辆紧急信息泛洪技术
Sangho Oh, Jaewon Kang, M. Gruteser
{"title":"Location-Based Flooding Techniques for Vehicular Emergency Messaging","authors":"Sangho Oh, Jaewon Kang, M. Gruteser","doi":"10.1109/MOBIQW.2006.361769","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361769","url":null,"abstract":"This paper analyzes the scalability of message flooding protocols in networks with various node densities, which can be expected in vehicular scenarios. Vehicle safety applications require reliable delivery of warning messages to nearby and approaching vehicles. Due to potentially large distances and shadowing, the delivery protocol must forward messages over multiple hops, thereby increasing network congestion and packet collisions. In addition to application-layer backoff delay and duplicate message suppression mechanisms, location-based backoff techniques have been proposed for vehicular networks. We propose a new hybrid method of location-based and counter-based method, and study several variants through simulations. Our preliminary results in the various density scenarios indicate that the proposed hybrid methods outperform conventional backoff delay techniques and adaptively operate in extremely congested network condition","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Strategies for Context-Adaptive Message Dissemination in Vehicular Ad Hoc Networks 车载Ad Hoc网络中上下文自适应消息传播策略
S. Eichler, C. Schroth, T. Kosch, M. Strassberger
{"title":"Strategies for Context-Adaptive Message Dissemination in Vehicular Ad Hoc Networks","authors":"S. Eichler, C. Schroth, T. Kosch, M. Strassberger","doi":"10.1109/MOBIQW.2006.361745","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361745","url":null,"abstract":"In future deployments of vehicular ad hoc networks (VANETs) safety-related applications such as local danger warning (LDW) will use broadcast-based communication schemes to transmit information to other vehicles within the network. The unlimited flooding of a message throughout the whole network however, is neither feasible nor intended. The high resulting traffic load would congest the shared wireless medium and prevent other, potentially highly relevant and time-critical messages from getting access to the medium. Existing strategies to limit redundant packet retransmissions manage to make broadcast-based data packet dissemination more efficient and reliable. However, they do not take into account the individual network's nodes interest in information. In fact, the static mechanisms proposed are not adequate to leverage the limited network resources as efficiently as possible in varying network conditions and to transport information to where it is needed as fast as possible. Therefore, we propose an altruistic communication scheme which differentiates data traffic according to the benefit it is likely to provide to potential recipients. A system for calculating and leveraging message benefit and two different node architectures are presented. With the help of a comprehensive simulation environment, the performance of our concept is analyzed. Comparative simulative studies show that an improvement of the benefit provided to all the participants in a VANET is also possible with the help of the readily available IEEE 802.11e standard, but to a lower extent","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133852347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信