The Community for Technology Leaders
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (2009)
Macau
Oct. 12, 2009 to Oct. 15, 2009
ISBN: 978-1-4244-5114-2
TABLE OF CONTENTS

Contention-aware data caching in wireless multihop ad hoc networks (PDF)

Xiaopeng Fan , Department of Computing, Hong Kong Polytechnic University, Kowloon, Hong Kong
Jiannong Cao , Department of Computing, Hong Kong Polytechnic University, Kowloon, Hong Kong
Weigang Wu , Department of Computer Science, Sun Yat-sen University, Guangzhou, China
pp. 1-9

Hierarchical distributed data classification inwireless sensor networks (PDF)

Xu Cheng , School of Computing Science, Simon Fraser University, British Columbia, Canada
Ji Xu , School of Computing Science, Simon Fraser University, British Columbia, Canada
Jian Pei , School of Computing Science, Simon Fraser University, British Columbia, Canada
Jiangchuan Liu , School of Computing Science, Simon Fraser University, British Columbia, Canada
pp. 10-19

Cooperative download in urban vehicular networks (PDF)

Marco Fiore , Université de Lyon, INRIA, INSA-Lyon, CITI, F-69621, France
Jose M. Barcelo-Ordinas , Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya, Barcelona, Spain
pp. 20-29

On accuracy of Region-Based Localization algorithms for Wireless Sensor Networks (PDF)

Zhang Shigeng , State Key Laboratory for Novel Software Technology, Nanjing University, China
Cao Jiannong , Internet and Mobile Computing Lab, Hong Kong Polytechnic University, Hong Kong
Chen Lijun , State Key Laboratory for Novel Software Technology, Nanjing University, China
Chen DaoXu , State Key Laboratory for Novel Software Technology, Nanjing University, China
pp. 30-39

Ratio-based zero-profiling indoor localization (PDF)

Xiaoyan Li , Department of Computer Science, Lafayette College, Easton, PA 18042, USA
pp. 40-49

Surviving holes and barriers in geographic data reporting for Wireless Sensor Networks (PDF)

Yangfan Zhou , Dept. of Computer Science & Engineering, The Chinese Univ. of Hong Kong, Shatin, Hong Kong
Michael R. Lyu , Dept. of Computer Science & Engineering, The Chinese Univ. of Hong Kong, Shatin, Hong Kong
Jiangchuan Liu , School of Computing Science, Simon Fraser Univ., Burnaby, BC, Canada
pp. 50-59

A mobility and congestion resilient data management system for distributed mobile networks (PDF)

Ze Li , Department of Electrical and Computer Engineering, Clemson University, Clemson, SC 29631, USA
Haiying Shen , Department of Electrical and Computer Engineering, Clemson University, Clemson, SC 29631, USA
pp. 60-69

Throughput capacity of mobility-assisted data collection in Wireless Sensor Networks (PDF)

Wang Liu , Department of Computer Science, University of Science and Technology of China, Hefei, China
Jianping Wang , Department of Computer Science, City University of Hong Kong, Hong Kong
Guoliang Xing , Department of Computer Science and Engineering, Michigan State University, USA
Liusheng Huang , Department of Computer Science, University of Science and Technology of China, Hefei, China
pp. 70-79

Mobile relay configuration in data-intensive Wireless Sensor Networks (PDF)

Fatme El-Moukaddem , Department of Computer Science and Engineering, Michigan State University, East Lansing, U.S.A.
Eric Torng , Department of Computer Science and Engineering, Michigan State University, East Lansing, U.S.A.
Guoliang Xing , Department of Computer Science and Engineering, Michigan State University, East Lansing, U.S.A.
Sandeep Kulkarni , Department of Computer Science and Engineering, Michigan State University, East Lansing, U.S.A.
pp. 80-89

Who, when, where: Timeslot assignment to mobile clients (PDF)

Fangfei Chen , Department of Computer Science and Engineering, The Pennsylvania State University, USA
Matthew P. Johnson , Department of Computer Science, The City University of New York Graduate Center, USA
Yosef Alayev , Department of Computer Science, The City University of New York Graduate Center, USA
Amotz Bar-Noy , Department of Computer Science, The City University of New York Graduate Center, USA
Thomas F. La Porta , Department of Computer Science and Engineering, The Pennsylvania State University, USA
pp. 90-99

A multi-rate based router placement scheme for wireless mesh networks (PDF)

Junfang Wang , Center of Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, OH,45221-0030, USA
Kan Cai , Department of Computer Science, University of British Columbia, Vancouver, V6T1N4, Canada
Dharma R. Agrawal , Center of Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, OH,45221-0030, USA
pp. 100-109

Molecular MAC for multichannel wireless mesh networks (PDF)

Mohammad Nassiri , Grenoble Informatics Laboratory, Saint Martin d'Hères, France
Fabrice Theoleyre , Grenoble Informatics Laboratory, Saint Martin d'Hères, France
Martin Heusse , Grenoble Informatics Laboratory, Saint Martin d'Hères, France
Andrzej Duda , Grenoble Informatics Laboratory, Saint Martin d'Hères, France
pp. 110-119

Almost optimal distributed M2M multicasting in Wireless Mesh Networks (PDF)

Qin Xin , Simula Research Laboratory, Oslo, Norway
Fredrik Manne , Department of Informatics, The University of Bergen, Norway
Yan Zhang , Simula Research Laboratory, Oslo, Norway
Jianping Wang , Department of Computer Science, City University of Hong Kong, China
Zeyu Zheng , Department of Computer Science, City University of Hong Kong, China
pp. 120-129

A generalized Markov chain model for effective analysis of slotted IEEE 802.15.4 (PDF)

Pangun Park , ACCESS Linnaeus Center, Electrical Engineering, Royal Institute of Technology, Stockholm, Sweden
Piergiuseppe Di Marco , ACCESS Linnaeus Center, Electrical Engineering, Royal Institute of Technology, Stockholm, Sweden
Pablo Soldati , ACCESS Linnaeus Center, Electrical Engineering, Royal Institute of Technology, Stockholm, Sweden
Carlo Fischione , ACCESS Linnaeus Center, Electrical Engineering, Royal Institute of Technology, Stockholm, Sweden
Karl Henrik Johansson , ACCESS Linnaeus Center, Electrical Engineering, Royal Institute of Technology, Stockholm, Sweden
pp. 130-139

Scalable emulation of TinyOS applications in heterogeneous network scenarios (PDF)

Yi-Tao Wang , Department of Computer Science, University of California, Los Angeles, USA
Rajive Bagrodia , Department of Computer Science, University of California, Los Angeles, USA
pp. 140-149

A MAC protocol for real-time sensing applications using asymmetric transceivers (PDF)

Raghuram S Sudhaakar , Computer Science and Engineering, University at Buffalo, NY, USA
Chunming Qiao , Computer Science and Engineering, University at Buffalo, NY, USA
Seokhoon Yoon , Computer Science and Engineering, University at Buffalo, NY, USA
Jia Zhao , Computer Science and Engineering, University at Buffalo, NY, USA
pp. 150-159

Reprogramming with Minimal Transferred Data on Wireless Sensor Network (PDF)

Jingtong Hu , Department of Computer Science, University of Texas at Dallas, Richardson, USA
Chun Jason Xue , Department of Computer Science, City University of Hong Kong, Tat Chee Ave, Kowloon, Hong Kong
Yi He , Department of Computer Science, University of Texas at Dallas, Richardson, USA
Edwin H.-M. Sha , Department of Computer Science, University of Texas at Dallas, Richardson, USA
pp. 160-167

Erasure-coding based utility routing in multi-hop wireless networks (PDF)

Mingming Lu , School of Information Science and Engineering, Central South University, China
Jie Wu , Department of Computer and Information Sciences, Temple University, USA
pp. 168-177

On interest locality in content-based routing for large-scale MANETs (PDF)

Yang Zhang , Department of Computer Science and Engineering, The Pennsylvania State University, USA
Jing Zhao , Department of Computer Science and Engineering, The Pennsylvania State University, USA
Guohong Cao , Department of Computer Science and Engineering, The Pennsylvania State University, USA
Chita R. Das , Department of Computer Science and Engineering, The Pennsylvania State University, USA
pp. 178-187

Scalable integrated routing using prefix labels and distributed hash tables for MANETs (PDF)

J.J. Garcia-Luna-Aceves , Palo Alto Research Center, 3333 Coyote Hill Road, CA 94304, USA
Dhananjay Sampath , Computer Engineering Department, University of California, Santa Cruz, 95064, USA
pp. 188-198

PaMeLA: A Joint Channel Assignment and Routing algorithm for multi-radio multi-channel Wireless Mesh Networks with grid topology (PDF)

C. Cicconetti , Dipartimento di Ingegneria dell'Informazione - University of Pisa, Via Diotisalvi, 2 - 56122, ITALY
V. Gardellin , Dipartimento di Ingegneria dell'Informazione - University of Pisa, Via Diotisalvi, 2 - 56122, ITALY
L. Lenzini , Dipartimento di Ingegneria dell'Informazione - University of Pisa, Via Diotisalvi, 2 - 56122, ITALY
E. Mingozzi , Dipartimento di Ingegneria dell'Informazione - University of Pisa, Via Diotisalvi, 2 - 56122, ITALY
pp. 199-207

Level the buffer wall: Fair channel assignment in wireless sensor networks (PDF)

Yanyan Yang , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China
Yunhuai Liu , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China
Lionel M. Ni , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, China
pp. 208-216

Adaptive and distributed scheduling in heterogeneous MIMO-based ad hoc networks (PDF)

Shan Chu , Department of Electrical and Computer Engineering, Stony Brook University, New York 11794, USA
Xin Wang , Department of Electrical and Computer Engineering, Stony Brook University, New York 11794, USA
pp. 217-226

Packet scheduling with joint design of MIMO and network coding (PDF)

Miao Zhao , Department of Electrical and Computer Engineering, State University of New York, Stony Brook, 11794, USA
Yuanyuan Yang , Department of Electrical and Computer Engineering, State University of New York, Stony Brook, 11794, USA
pp. 227-236

How to break LU matrix based key predistribution schemes for Wireless Sensor Networks (PDF)

Bo Zhu , Department of Computer Science and Engineering, Shanghai Jiao Tong University, 200240 China
Yanfei Zheng , School of Information Security Engineering, Shanghai Jiao Tong University, 200240 China
Yaowei Zhou , School of Information Security Engineering, Shanghai Jiao Tong University, 200240 China
Kefei Chen , Department of Computer Science and Engineering, Shanghai Jiao Tong University, 200240 China
pp. 237-245

Enlighten me! secure key assignment in wireless sensor networks (PDF)

Matthias Gauger , Universität Bonn, Germany
Olga Saukh , Structural Engineering Research, Laboratory, EMPA, Switzerland
Pedro Jose Marron , Universität Bonn, Germany
pp. 246-255

Secure autoconfiguration and public-key distribution for Mobile Ad-hoc Networks (PDF)

Hongbo Zhou , Dept. of Computer Science, Slippery Rock University, PA, USA
Matt W. Mutak , Dept. of Computer Science & Engineering, Michigan State University, East Lansing, USA
Lionel M. Ni , Dept. of Computer Science, Hong Kong University of Science & Technology, Hong Kong SAR, China
pp. 256-263

ChainFarm: A novel authentication protocol for high-rate any source probabilistic broadcast (PDF)

Ying Huang , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Wenbo He , Department of Computer Science, University of New Mexico, USA
Klara Nahrstedt , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
pp. 264-273

Multicast capacity of multihop cognitive networks (Abstract)

Cheng Wang , Dept. of Comput. Sci., Tongji Univ., Shanghai, China
Shaojie Tang , Dept. of Comput. Sci., Illinois Inst. of Technol., Chicago, IL, USA
Xiang-Yang Li , Dept. of Comput. Sci., Illinois Inst. of Technol., Chicago, IL, USA
Changjun Jiang , Dept. of Comput. Sci., Tongji Univ., Shanghai, China
pp. 274-283

Minimum maintenance cost routing in Cognitive Radio Networks (PDF)

Ilario Filippini , Politecnico di Milano, Milan, Italy
Eylem Ekici , The Ohio State University, Columbus, USA
Matteo Cesana , Politecnico di Milano, Milan, Italy
pp. 284-293

Joint QoS-aware admission control, channel assignment, and power allocation for cognitive radio cellular networks (PDF)

Qin Xin , Simula Research Laboratory, Oslo, Norway
Jie Xiang , Simula Research Laboratory, Oslo, Norway
pp. 294-303

Performance impact of and protocol interdependencies of IEEE 802.15.4 security mechanisms (PDF)

Feng Chen , Dept. of Computer Science, University of Erlangen, Germany
Xiaolong Yin , Dept. of Computer Science, University of Erlangen, Germany
Reinhard German , Dept. of Computer Science, University of Erlangen, Germany
Falko Dressler , Dept. of Computer Science, University of Erlangen, Germany
pp. 1036-1041

Intrusion detection in Gaussian distributed Wireless Sensor Networks (PDF)

Yun Wang , Department of Computer Science, Southern Illinois University Edwardsville, USA
Weihuang Fu , Department of Computer Science, University of Cincinnati, USA
Dharma P. Agrawal , Department of Computer Science, University of Cincinnati, USA
pp. 313-321

Measuring location privacy in V2X communication systems with accumulated information (PDF)

Zhendong Ma , Institute of Media Informatics, Ulm University, Germany
Frank Kargl , Institute of Media Informatics, Ulm University, Germany
Michael Weber , Institute of Media Informatics, Ulm University, Germany
pp. 322-331

Multigrade security monitoring for ad-hoc wireless networks (PDF)

Matthew Beaman , School of Electrical and Computer Engineering, Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
Zhiyuan Li , School of Electrical and Computer Engineering, Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
pp. 342-352

Efficient data aggregation in multi-hop wireless sensor networks under physical interference model (Abstract)

Xiang-Yang Li , Inst. of Comput. Applic. Tech., Hangzhou Dianzi Univ., Hangzhou, China
XiaoHua Xu , Dept. of Comput. Sci., Illinois Inst. of Tech., Chicago, IL, USA
ShiGuang Wang , Dept. of Comput. Sci., Illinois Inst. of Tech., Chicago, IL, USA
ShaoJie Tang , Dept. of Comput. Sci., Illinois Inst. of Tech., Chicago, IL, USA
GuoJun Dai , Inst. of Comput. Applic. Tech., Hangzhou Dianzi Univ., Hangzhou, China
JiZhong Zhao , Sch. of Sci. & Technol., Xi'an JiaoTong Univ., Xi'an, China
Yong Qi , Sch. of Sci. & Technol., Xi'an JiaoTong Univ., Xi'an, China
pp. 353-362

Multi-channel scheduling algorithms for fast aggregated convergecast in sensor networks (PDF)

Amitabha Ghosh , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, 90089, USA
Ozlem Durmaz Incel , NETLAB, Department of Computer Engineering, Bogazici University, 34342 Bebek, Istanbul, Turkey
V.S. Anil Kumar , Department of Computer Science and Virginia Bio-Informatics Institute, Virginia Tech, Blacksburg, 24061, USA
Bhaskar Krishnamachari , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, 90089, USA
pp. 363-372

Bounded relay hop mobile data gathering in wireless sensor networks (PDF)

Miao Zhao , Department of Electrical and Computer Engineering, State University of New York, Stony Brook, 11794, USA
Yuanyuan Yang , Department of Electrical and Computer Engineering, State University of New York, Stony Brook, 11794, USA
pp. 373-382

Energy-efficient On-demand Active Contour Service for sensor networks (PDF)

Yangfan Zhou , Dept. of Computer Science & Engineering, The Chinese Univ. of Hong Kong, Shatin, Hong Kong
Junjie Xiong , Dept. of Computer Science & Engineering, The Chinese Univ. of Hong Kong, Shatin, Hong Kong
Michael R. Lyu , Dept. of Computer Science & Engineering, The Chinese Univ. of Hong Kong, Shatin, Hong Kong
Jiangchuan Liu , School of Computing Science, Simon Fraser Univ., Burnaby, BC, Canada
Kam-Wing Ng , Dept. of Computer Science & Engineering, The Chinese Univ. of Hong Kong, Shatin, Hong Kong
pp. 383-392

Cross-layer approach for energy efficient routing in WANETs (PDF)

Khoriba Ghada , Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba Science City, Ibaraki, Japan 305-8573
Jie Li , Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba Science City, Ibaraki, Japan 305-8573
Yusheng Ji , National Institute of Informatics, The Graduate University for Advanced Studies, Tokyo, Japan 101-8430
Guojun Wang , School of Information Science and Engineering, Central South University, Changsha, Hunan Province, China, 410083
pp. 393-402

An analytical study of subdividing hexagon-clustered WSN for power saving (PDF)

Dajin Wang , Department of Computer Science, Montclair State University, Upper Montclair, NJ 07043, USA
pp. 403-412

Message forwarding in Cyclic MobiSpace: the multi-copy case (PDF)

Cong Liu , Shenzhen Institute of Advanced Technology, Chinese Academy of Science, China
Jie Wu , Dept. of Computer & Information Sciences, Temple University, USA
Ionut Cardei , Dept. of Computer & Engineering, Florida Atlantic University, USA
pp. 413-422

Probabilistic estimation of end-to-end path latency in Wireless Sensor Networks (PDF)

Ramon Serna Oliver , Real-Time Systems, Technische Universtät Kaiserslautern, Germany
Gerhard Fohler , Real-Time Systems, Technische Universtät Kaiserslautern, Germany
pp. 423-431

Probabilistic-based message dissemination in ad-hoc and sensor networks using directional antennas (PDF)

Xueli An , Faculty of Electrical Engineering, Mathematics, and Computer Science, Delft University of Technology, The Netherlands
Ramin Hekmat , Faculty of Electrical Engineering, Mathematics, and Computer Science, Delft University of Technology, The Netherlands
pp. 432-438

Cooperation helps power saving (PDF)

Guanfeng Liang , Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA
Nitin Vaidya , Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, USA
pp. 439-447

An improved lightweight synchronisation primitive for sensornets (PDF)

Jonathan Tate , Department of Computer Science, University of York, United Kingdom
Iain Bate , Department of Computer Science, University of York, United Kingdom
pp. 448-457

TPSS: A two-phase sleep scheduling protocol for object tracking in sensor networks (PDF)

Qianqian Ren , School of Computer Science and Technology, Harbin Institute of Technology, China
Jianzhong Li , School of Computer Science and Technology, Harbin Institute of Technology, China
Hong Gao , School of Computer Science and Technology, Harbin Institute of Technology, China
pp. 458-465

Focused-coverage by mobile sensor networks (Abstract)

Xu Li , SITE, University of Ottawa, Canada
Hannes Frey , CS, University of Paderborn, Germany
Nicola Santoro , SCS, Carleton University, Canada
Ivan Stojmenovic , SITE, University of Ottawa, Canada
pp. 466-475

Directed coverage in wireless sensor networks: Concept and quality (PDF)

Xiaole Bai , Dept. of CSE, The Ohio State Univ., Columbus, USA
Lei Ding , Dept. of CSE, The Ohio State Univ., Columbus, USA
Jin Teng , Dept. of EE, Shanghai Jiao Tong Univ., China
Sriram Chellappan , Dept. of CS, Missouri Univ. of Science and Technology, Rolla, USA
Changqing Xu , Dept. of EE, Shanghai Jiao Tong Univ., China
Dong Xuan , Dept. of CSE, The Ohio State Univ., Columbus, USA
pp. 476-485

Target coverage problem in wireless sensor networks: A column generation based approach (PDF)

Yu Gu , Dept. of Computer Science and Technology, Univ. of Science and Technology of China, Hefei, Anhui, 230027, China
Jie Li , Dept. of Computer Science, Univ. of Tsukuba, Tsukuba Science City, Ibaraki 305-8573, Japan
Baohua Zhao , Dept. of Computer Science and Technology, Univ. of Science and Technology of China, Hefei, Anhui, 230027, China
Yusheng Ji , Information Systems Architecture Science Research Division, National Institute of Informatics, Tokyo, Japan
pp. 486-495

Performance analysis of stochastic network coverage with limited mobility (PDF)

Chris Y. T. Ma , Purdue University, West Lafayette, IN, USA
David K. Y. Yau , Purdue University, West Lafayette, IN, USA
Nung Kwan Yip , Purdue University, West Lafayette, IN, USA
Nageswara S. V. Rao , Oak Ridge National Lab, TN, USA
Jiming Chen , Zhejiang University, Hangzhou, China
pp. 496-505

Reliable multicast in wireless networks using network coding (PDF)

Cheng Zhan , Department of Computer Science, University of Science & Technology of China, Hefei, China
Yinlong Xu , Department of Computer Science, University of Science & Technology of China, Hefei, China
Jianping Wang , Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong
Victor Lee , Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong
pp. 506-515

Interference and power constrained Broadcasting and Multicasting in wireless ad hoc networks with directional antennas (PDF)

Zheng Li , Key Laboratory of Data Engineering and Knowledge, Engineering(Renmin University of China), MOE, School of Information, China
Deying Li , Key Laboratory of Data Engineering and Knowledge, Engineering(Renmin University of China), MOE, School of Information, China
Ming Liu , School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China, 610054
pp. 516-525

Fast group communications in multihop wireless networks subject to physical interference (PDF)

Peng-Jun Wan , Department of Computer Science, Illinois Institute of Technology, USA
Lixin Wang , Department of Computer Science, Illinois Institute of Technology, USA
Ophir Frieder , Department of Computer Science, Illinois Institute of Technology, USA
pp. 526-533

OppCast: Opportunistic broadcast ofwarning messages in VANETs with unreliable links (PDF)

Ming Li , Dept. of ECE, WPI, U.S.A.
Wenjing Lou , Dept. of ECE, WPI, U.S.A.
Kai Zeng , Dept. of CS, UC Davis, U.S.A.
pp. 534-543

FOCUS: A cost-effective approach for large-scale crop monitoring with sensor networks (PDF)

Yuan Yuan , Dept. of Computer Science, National University of Defense Technology, Changsha, China
Shanshan Li , Dept. of Computer Science, National University of Defense Technology, Changsha, China
Kui Wu , Dept. of Computer Science, University of Victoria, B.C. Canada
Weijia Jia , Dept. of Computer Science, City University of Hong Kong, Hong Kong SAR, China
Yuxing Peng , Dept. of Computer Science, National University of Defense Technology, Changsha, China
pp. 544-553

Dynamic linking and loading in networked embedded systems (PDF)

Wei Dong , Zhejiang Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, China
Chun Chen , Zhejiang Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, China
Xue Liu , School of Computer Science, McGill University, Canada
Jiajun Bu , Zhejiang Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, China
Yunhao Liu , Department of Computer Science, HKUST, China
pp. 554-562

DMRC: Distortion-minimizing rate control for Wireless Multimedia Sensor Networks (PDF)

Scott Pudlewski , Wireless Networks and Embedded Systems Laboratory, Department of Electrical Engineering, State University of New York (SUNY) at Buffalo, USA
Tommaso Melodia , Wireless Networks and Embedded Systems Laboratory, Department of Electrical Engineering, State University of New York (SUNY) at Buffalo, USA
pp. 563-572

On the minimum number of neighbours for good routing performance in MANETs (PDF)

Oday D. Jerew , School of Engineering, CECS, The Australian National University, Canberra ACT 0200, Australia
Haley M. Jones , School of Engineering, CECS, The Australian National University, Canberra ACT 0200, Australia
Kim L. Blackmore , School of Engineering, CECS, The Australian National University, Canberra ACT 0200, Australia
pp. 573-582

OWL: Towards scalable routing in MANETs using depth-first search on demand (PDF)

Stephen Dabideen , Department of Computer Engineering, University of California, Santa Cruz, 95064, USA
J.J. Garcia-Luna-Aceves , Palo Alto Research Center, 3333 Coyote Hill Road, CA 94304, USA
pp. 583-592

BDP: A Bloom Filters Based Dissemination Protocol in Wireless Sensor Networks (PDF)

Tao Chen , College of Information Systems and Management, National University of Defense Technology, Changsha, China
Deke Guo , College of Information Systems and Management, National University of Defense Technology, Changsha, China
Xue Liu , School of Computer Science, McGill University, Montreal, Quebec, Canada
Honghui Chen , College of Information Systems and Management, National University of Defense Technology, Changsha, China
Xueshan Luo , College of Information Systems and Management, National University of Defense Technology, Changsha, China
Junxian Liu , College of Information Systems and Management, National University of Defense Technology, Changsha, China
pp. 593-602

Two Ray or not Two Ray this is the price to pay (PDF)

Eugenio Giordano , Computer Science Department - University of California, Los Angeles, 90095, US
Raphael Frank , Dept. of Computer Science, University of Luxembourg, Luxembourg
Abhishek Ghosh , Computer Science Department - University of California, Los Angeles, 90095, US
Giovanni Pau , Computer Science Department - University of California, Los Angeles, 90095, US
Mario Gerla , Computer Science Department - University of California, Los Angeles, 90095, US
pp. 603-608

Ticket-based reliable routing in VANET (PDF)

Gongjun Yan , Computer Science Department, Old Dominion University, Norfolk, VA 23529, USA
Danda B. Rawat , Electrical and Computer Engineering Department, Old Dominion University, Norfolk, VA 23529, USA
Samy El-Tawab , Computer Science Department, Old Dominion University, Norfolk, VA 23529, USA
pp. 609-614

Analysis of aggregated power level and rate-power control designs for status update messages in VANETs (PDF)

Ching-Ling Huang , Institute of Transportation Studies, University of California, Berkeley, 94720-1720, USA
Yaser P. Fallah , Institute of Transportation Studies, University of California, Berkeley, 94720-1720, USA
Raja Sengupta , Institute of Transportation Studies, University of California, Berkeley, 94720-1720, USA
pp. 615-620

RF-GPS: RFID assisted localization in VANETs (PDF)

Eun-Kyu Lee , Department of Computer Science, University of California, Los Angeles, USA
Sungwon Yang , Department of Computer Science, University of California, Los Angeles, USA
Soon Y. Oh , Department of Computer Science, University of California, Los Angeles, USA
Mario Gerla , Department of Computer Science, University of California, Los Angeles, USA
pp. 621-626

Real-time weather notification system using intelligent vehicles and smart sensors (PDF)

Samy El-Tawab , Department of Computer Science, Old Dominion University, Norfolk, Virginia, USA
Mahmoud Abuelela , Department of Computer Science, Old Dominion University, Norfolk, Virginia, USA
Yan Gongjun , Department of Computer Science, Old Dominion University, Norfolk, Virginia, USA
pp. 627-632

LICP: A look-ahead intersection control policy with intelligent vehicles (PDF)

Minjie Zhu , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Xu Li , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Hongyu Huang , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Linghe Kong , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Minglu Li , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Min-You Wu , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
pp. 633-638

Design & implementation of IEEE 802.11s mesh nodes with enhanced features (PDF)

Pranjal Pandey , Centre for Electronics Design and Technology, Indian Insitute of Science, Bangalore, India
S. Satish , Centre for Electronics Design and Technology, Indian Insitute of Science, Bangalore, India
Joy Kuri , Centre for Electronics Design and Technology, Indian Insitute of Science, Bangalore, India
Haresh Dagale , Centre for Electronics Design and Technology, Indian Insitute of Science, Bangalore, India
pp. 639-644

Starvation effect study in IEEE 802.11 mesh networks (PDF)

Andrey Lyakhov , Institute for Information Transmission Problems, Russian Academy of Science, Moscow, Russia
Ivan Pustogarov , Institute for Information Transmission Problems, Russian Academy of Science, Moscow, Russia
Alexander Safonov , Institute for Information Transmission Problems, Russian Academy of Science, Moscow, Russia
Mikhail Yakimov , Institute for Information Transmission Problems, Russian Academy of Science, Moscow, Russia
pp. 651-656

Evaluation of a potential energy methodology for joint routing and scheduling in wireless mesh networks (PDF)

Leonardo Badia , IMT Lucca Institute for Advanced Studies, Piazza S. Ponziano 6, 55100 Lucca, Italy
pp. 657-662

Route selection for capacity maximization in multi-rate TDMA-based wireless ad hoc networks (PDF)

Raffaele Bruno , ITT-CNR, Via G. Moruzzi 1, 56124 Pisa - Italy
Vania Conan , Thales Communications, 160 Boulevard de Valmy BP82 92704 Colombes Cedex -France
Stephane Rousseau , Thales Communications, 160 Boulevard de Valmy BP82 92704 Colombes Cedex -France
pp. 663-669

Optimal forwarder list selection in opportunistic routing (PDF)

Yanhua Li , University of Minnesota, Minneapolis, USA
Wei Chen , University of Electronic Science and Technology of China, Chengdu, China
Zhi-Li Zhang , University of Minnesota, Minneapolis, USA
pp. 670-675

Multicast routing and channel assignment in wireless mesh networks (PDF)

Chia-Sheng Chou , Department of Computer Science, National Chiao Tung University, HSINCHU 30050, TAIWAN, ROC
Chien Chen , Department of Computer Science, National Chiao Tung University, HSINCHU 30050, TAIWAN, ROC
Ying-Yu Chen , Department of Computer Science, National Chiao Tung University, HSINCHU 30050, TAIWAN, ROC
Rong-Hong Jan , Department of Computer Science, National Chiao Tung University, HSINCHU 30050, TAIWAN, ROC
Cheng-Chung Hsieh , Department of Computer Science, Networks and Multimedia Institute, Institute for Information Industry, TAIPEI 106, TAIWAN, ROC
pp. 676-681

Performance evaluation of a WiMAX multi-hop relay system to support multicast/broadcast service (PDF)

Chengxuan He , School of Information Technology and Engineering, University of Ottawa, Ontario, Canada, K1N 6N5
Oliver Yang , School of Information Technology and Engineering, University of Ottawa, Ontario, Canada, K1N 6N5
pp. 682-687

Quality-aware multiple backbone construction on multi-interface Wireless Mesh Networks for P2P streaming (PDF)

Tzu-Chieh Tsai , Department of Computer Science, National Chengchi University, Taipei, Taiwan
pp. 688-693

Detecting privacy infractions in applications: A framework and methodology (PDF)

Michael Smit , Department of Computing Science, University of Alberta, Edmonton, Canada
Kelly Lyons , Faculty of Information Studies, University of Toronto, Ontario, Canada
Michael McAllister , Faculty of Computer Science, Dalhousie University, Halifax, Nova Sotia, Canada
Jacob Slonim , Faculty of Computer Science, Dalhousie University, Halifax, Nova Sotia, Canada
pp. 694-701

Extended attribute based encryption for private information retrieval (PDF)

Shan Yinan , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Zhenfu Cao , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
pp. 702-707

A fuzzy comprehensive evaluation model for harms of computer virus (PDF)

Cong Zheng , Laboratory for Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
Lansheng Han , Laboratory for Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
Jihang Ye , Laboratory for Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
Mengsong Zou , Laboratory for Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
Qiwen Liu , Laboratory for Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
pp. 708-713

A study on read-write protection of a digital document by cryptographic techniques (PDF)

Yasuo Hatano , Hitachi, Ltd., Systems Development Laboratory., 292, Yoshida-cho, Totsuka-ku, Yokohama-shi, Kanagawa-ken, 244-0817, Japan
Kunihiko Miyazaki , Hitachi, Ltd., Systems Development Laboratory., 292, Yoshida-cho, Totsuka-ku, Yokohama-shi, Kanagawa-ken, 244-0817, Japan
Toshinobu Kaneko , Faculty of Science and Technology, Tokyo University of Science., 2641, Yamazaki, Noda-shi, Chiba-ken, 278-8510, Japan
pp. 714-721

Security considerations on pervasive real-time collaboration (PDF)

Fuwen Liu , Brandenburg University of Technology Cottbus, Department of Computer Science, PF 10 13 44, 03013, Germany
Hartmut Koenig , Brandenburg University of Technology Cottbus, Department of Computer Science, PF 10 13 44, 03013, Germany
pp. 722-727

A strategy-proof trust mechanism for pervasive computing environments (PDF)

Zhiqiang Wei , College of Information Science and Engineering, Ocean University of China, Qingdao, Shandong, China
Wei Zhou , College of Information Science and Engineering, Ocean University of China, Qingdao, Shandong, China
Mijun Kang , College of Information Science and Engineering, Ocean University of China, Qingdao, Shandong, China
Michael Collins , Department of Computer Science, University College Dublin, UCD Belfield, 4, Ireland
Paddy Nixon , Department of Computer Science, University College Dublin, UCD Belfield, 4, Ireland
pp. 728-733

Computational model for trust management in RFID supply chains (PDF)

Manmeet Mahinderjit-Singh , School of Information Technology and Electrical Engineering, The University of Queensland, Australia
Xue Li , School of Information Technology and Electrical Engineering, The University of Queensland, Australia
pp. 734-740

A new high-performance approach for offline replacement attack prevention in trusted clients (PDF)

Hossein Rezaei Ghaleh , Department of Computer Engineering and Information Technology, Amirkabir University, Tehran, Iran
Siavash Khorsandi , Department of Computer Engineering and Information Technology, Amirkabir University, Tehran, Iran
pp. 741-746

A-Kad: an anonymous P2P protocol based on Kad network (PDF)

YongQing Ni , Information Security Research Lab, Inha University, Incheon 402-751, Korea
DaeHun Nyang , Information Security Research Lab, Inha University, Incheon 402-751, Korea
Xu Wang , Information Security Research Lab, Inha University, Incheon 402-751, Korea
pp. 747-752

Intelligent honeypot agent for blackhole attack detection in Wireless Mesh Networks (PDF)

Anoosha Prathapani , Department of ECE, University of Cincinnati, OH, USA
Lakshmi Santhanam , Department of CS, University of Cincinnati, OH, USA
Dharma P. Agrawal , Department of CS, University of Cincinnati, OH, USA
pp. 753-758

A directed acyclic graph based detection for rbac based secure interoperation (PDF)

Xiyuan Chen , College of Computer Science, Zhejiang University, Hangzhou, China
Miaoliang Zhu , College of Computer Science, Zhejiang University, Hangzhou, China
pp. 759-764

RPROB - a family of binomial-mix-based anonymous communication systems (PDF)

Minh-Triet Tran , University of Science, 227 Nguyen Van Cu, Dist.5, Hochiminh City, Vietnam
Anh-Duc Duong , University of Science, 227 Nguyen Van Cu, Dist.5, Hochiminh City, Vietnam
Isao Echizen , National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan
pp. 765-770

Towards neutral trust management framework in unstructured networks (PDF)

Ruidong Li , National Institute of Information and Communications Technology, Japan
Jie Li , Graduate School of Systems and Information Engineering, University of Tsukuba, Japan
pp. 771-776

Strong authentication with mobile phone as security token (PDF)

Do van Thanh , Telenor & NTNU, Norway
Ivar Jorstad , Ubisafe, Norway
Tore Jonvik , Olso University College, Norway
Do van Thuan , Linus, Norway
pp. 777-782

Operating system mechanisms for TPM-based lifetime measurement of process integrity (PDF)

Xiao Li , Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University), Ministry of Education, Beijing 100872, China
Wenchang Shi , Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University), Ministry of Education, Beijing 100872, China
Zhaohui Liang , Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University), Ministry of Education, Beijing 100872, China
Bin Liang , Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University), Ministry of Education, Beijing 100872, China
Zhiyong Shan , Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University), Ministry of Education, Beijing 100872, China
pp. 783-789

Design of a trust model and finding key-nodes in rumor spreading based on Monte-Carlo method (PDF)

Lina Wang , Computer School of Wuhan University, China, 430079
Yuntao Yue , Computer School of Wuhan University, China, 430079
Chi Guo , Computer School of Wuhan University, China, 430079
Xiaoying Zhang , Computer School of Wuhan University, China, 430079
pp. 790-795

Requirements for evidential value for the assessment of the trustworthiness of digital records over time (PDF)

Jianqiang Ma , Department of Computer and Information Science, Norwegian University of Science and Technology, Trondheim, Norway
Habtamu Abie , Norwegian Computing Center, Oslo, Norway
Torbjorn Skramstad , Department of Computer and Information Science, Norwegian University of Science and Technology, Trondheim, Norway
Mads Nygard , Department of Computer and Information Science, Norwegian University of Science and Technology, Trondheim, Norway
pp. 796-803

An efficient geographic location-based security mechanism for vehicular adhoc networks (PDF)

Gongjun Yan , Computer Science Department, Old Dominion University, Norfolk, VA 23529-0162, USA
Stephan Olariu , Computer Science Department, Old Dominion University, Norfolk, VA 23529-0162, USA
pp. 804-809

Adaptive security and trust management for autonomic message-oriented middleware (PDF)

Habtamu Abie , Norwegian Computing Center, Department of Applied Research in Information Technology (DART), Oslo, Norway
pp. 810-817

Strengthening Class1 Gen2 RFID tags (PDF)

Jihoon Cho , Information Security Group, Royal Holloway University of London, Egham Surrey TW20 0EX, United Kingdom
pp. 818-824

Improving the reliability of embedded systems with cache and SPM (PDF)

Meng Wang , Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
Yi Wang , Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
Duo Liu , Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
Zili Shao , Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong
pp. 825-830

A heuristic policy-based system call interposition in Dynamic Binary Translation (PDF)

Deen Zheng , School of Software, Shanghai Jiao Tong University, China
Zhengwei Qi , School of Software, Shanghai Jiao Tong University, China
Alei Liang , School of Software, Shanghai Jiao Tong University, China
Hongbo Yang , Department of Computer Science, Shanghai Jiao Tong University, China
Haibing Guan , Department of Computer Science, Shanghai Jiao Tong University, China
Liang Liu , IBM China Research Lab, Beijing, China
pp. 831-835

Pervasive service access with SIM-based VPN (PDF)

van Thanh Do , Telenor & NTNU, Norway
Ivar Jorstad , Ubisafe, Norway
Tor Anders Johansen , Ubisafe, Norway
Elias Bakken , Ubisafe, Norway
van Thuan Do , Linus, Norway
pp. 836-841

QoS-aware optimization strategy for security ranking in SSL protocol (PDF)

Fang Qi , School of Information Science and Engineering, Central South University, Changsha, China, 410083
Zhe Tang , School of Information Science and Engineering, Central South University, Changsha, China, 410083
Guojun Wang , School of Information Science and Engineering, Central South University, Changsha, China, 410083
Jie Wu , Department of Computer and Information Sciences, Temple University, Philadelphia, 19122, USA
pp. 842-847

CENDA: Camouflage Event Based Malicious Node Detection Architecture (PDF)

Kanthakumar Pongaliur , Department of Computer Science and Engineering, Michigan State University, East Lansing, 48824, U.S.A.
Li Xiao , Department of Computer Science and Engineering, Michigan State University, East Lansing, 48824, U.S.A.
Alex X. Liu , Department of Computer Science and Engineering, Michigan State University, East Lansing, 48824, U.S.A.
pp. 848-855

A low-frequency RFID to challenge security and privacy concerns (PDF)

Tim Good , Dept. of Electrical and Electronic Engineering, University of Sheffield, S1 3JD, UK
Mohammed Benaissa , Dept. of Electrical and Electronic Engineering, University of Sheffield, S1 3JD, UK
pp. 856-863

Secure localization and location verification inwireless sensor networks (PDF)

Yingpei Zeng , State Key Laboratory for Novel Software Technology, Nanjing University, China
Jiannong Cao , Department of Computing, Hong Kong Polytechnic University, Hong Kong
Jue Hong , State Key Laboratory for Novel Software Technology, Nanjing University, China
Li Xie , State Key Laboratory for Novel Software Technology, Nanjing University, China
pp. 864-869

Distributed lightweight target tracking for wireless sensor networks (PDF)

Sheng Wang , State Key Laboratory of Precision Measurement Technology and Instruments, Department of Precision Instruments, Tsinghua University, Beijing 100084, China
Xue Wang , State Key Laboratory of Precision Measurement Technology and Instruments, Department of Precision Instruments, Tsinghua University, Beijing 100084, China
Yong Wang , State Key Laboratory of Precision Measurement Technology and Instruments, Department of Precision Instruments, Tsinghua University, Beijing 100084, China
Xinyao Sun , State Key Laboratory of Precision Measurement Technology and Instruments, Department of Precision Instruments, Tsinghua University, Beijing 100084, China
pp. 870-875

RRDD: Receiver-oriented robust data delivery in mobile sensor networks (PDF)

Weiwei Fang , Sino-German Joint Software Institute, Beihang University, Beijing 100191, China
Xin Zhao , Sino-German Joint Software Institute, Beihang University, Beijing 100191, China
Tianshu Chu , Sino-German Joint Software Institute, Beihang University, Beijing 100191, China
Yuan An , Graduate University of the Chinese Academy of Sciences, Beijing 100190, China
Yi Liu , Sino-German Joint Software Institute, Beihang University, Beijing 100191, China
Depei Qian , Sino-German Joint Software Institute, Beihang University, Beijing 100191, China
pp. 876-881

A new broadcast-key management scheme for distributed wireless sensor networks (PDF)

YingZhi Zeng , School of Computer, National University of Defense Technology, ChangSha Hunan, China
Yan Xia , School of Computer, National University of Defense Technology, ChangSha Hunan, China
JinShu Su , School of Computer, National University of Defense Technology, ChangSha Hunan, China
BaoKang Zhao , School of Computer, National University of Defense Technology, ChangSha Hunan, China
WanRong Yu , School of Computer, National University of Defense Technology, ChangSha Hunan, China
pp. 882-887

A price-based adaptive task allocation for Wireless Sensor Network (PDF)

Neda Edalat , Department of Electrical and Computer Engineering, National University of Singapore, Singapore
Wendong Xiao , Institute for Infocomm Research, Singapore
Chen-Khong Tham , Institute for Infocomm Research, Singapore
Ehsan Keikha , Department of Electrical and Computer Engineering, National University of Singapore, Singapore
Lee-Ling Ong , Department of Electrical and Computer Engineering, National University of Singapore, Singapore
pp. 888-893

Anti-sensornet: Intruders and countermeasure (PDF)

Min-You Wu , Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, China
pp. 894-899

Practical location-based routing in vehicular ad hoc networks (PDF)

Zhi Li , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Yanmin Zhu , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
Minglu Li , Department of Computer Science and Engineering, Shanghai Jiao Tong University, China
pp. 900-905

EUCOW: Energy-efficient boundary monitoring for unsmoothed continuous objects in wireless sensor network (PDF)

Jiehui Chen , GITS, Waseda University, 1-104 Totsukamachi, Shinjuku-ku, Tokyo, 169-8050, JAPAN
Mitsuji Matsumoto , GITS, Waseda University, 1-104 Totsukamachi, Shinjuku-ku, Tokyo, 169-8050, JAPAN
pp. 906-911

On efficient deployment of high-end sensors in large-scale Heterogeneous WSNs (PDF)

Yi Gu , Department of Computer Science, University of Memphis, TN 38152, USA
Qishi Wu , Department of Computer Science, University of Memphis, TN 38152, USA
Xiaoshan Cai , Department of Computer Science, University of Memphis, TN 38152, USA
Jeremy Bond , Department of Computer Science, University of Memphis, TN 38152, USA
pp. 912-917

UD-TDMA: A distributed TDMA protocol for underwater acoustic sensor network (PDF)

Zhengbao Li , Department of Computer Science, College of Information Science and Engineering Ocean University of China, Qingdao, China
Zhongwen Guo , Department of Computer Science, College of Information Science and Engineering Ocean University of China, Qingdao, China
Haipeng Qu , Department of Computer Science, College of Information Science and Engineering Ocean University of China, Qingdao, China
Feng Hong , Department of Computer Science, College of Information Science and Engineering Ocean University of China, Qingdao, China
Pengpeng Chen , Department of Computer Science, College of Information Science and Engineering Ocean University of China, Qingdao, China
Meng Yang , Department of Computer Science, College of Information Science and Engineering Ocean University of China, Qingdao, China
pp. 918-923

A Proportional Fair Backoff scheme for wireless sensor networks (PDF)

Yuanfang Chen , School of Software, Dalian University of Technology, China
Mingchu Li , School of Software, Dalian University of Technology, China
Lei Wang , School of Software, Dalian University of Technology, China
Zhuxiu Yuan , School of Software, Dalian University of Technology, China
Weiping Sun , School of Software, Dalian University of Technology, China
Chunsheng Zhu , School of Software, Dalian University of Technology, China
Ming Zhu , School of Software, Dalian University of Technology, China
Lei Shu , Digital Enterprise Research Institute, National University of Ireland, Galway, Ireland
pp. 971-976

A real-time high-precision localization algorithm for wireless sensor networks (PDF)

Wen Ouyang , Department of Computer Science and Information Engineering, Chung Hua University Hsin-Chu, 300, Taiwan
Ying Tsao , Department of Computer Science and Information Engineering, Chung Hua University Hsin-Chu, 300, Taiwan
pp. 924-928

An enhanced query tree protocol for RFID tag collision resolution with progressive population estimation (PDF)

Xinqing Yan , School of Information Engineering, North China University of Water Conservancy and Electric Power, Zhengzhou, 450011, China
Guiliang Zhu , School of Information Engineering, North China University of Water Conservancy and Electric Power, Zhengzhou, 450011, China
pp. 935-940

Throughput and delay analysis of the IEEE 802.15.3 CSMA/CA mechanism considering the suspending events in unsaturated traffic conditions (PDF)

Xin Liu , Software School, Fudan University, Shanghai, China
Wenjun Zeng , Dept. of Computer Sciences, University of Missouri, Columbia, USA
pp. 947-952

A cross-layer design for dynamic resource block allocation in 3G Long Term Evolution system (PDF)

Hossam Fattah , Department of Electrical & Computer Engineering, Texas A&M University, USA
Hussein Alnuweiri , Department of Electrical & Computer Engineering, Texas A&M University, USA
pp. 929-934

An Enhanced Synchronization Approach for RFID private authentication (PDF)

Qingsong Yao , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Yong Qi , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Jizhong Zhao , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
Jinsong Han , School of Electronic and Information Engineering, Xi'an Jiaotong University, China
pp. 959-964

A note on the study of Bluetooth networks' distributed algorithms (PDF)

Ahmed Jedda , University of Ottawa, Canada
Nejib Zaguia , University of Ottawa, Canada
Guy-Vincent Jourdan , University of Ottawa, Canada
pp. 953-958

A kNN search protocol using a Voronoi diagram in wireless broadcast environments (PDF)

Wei-Chi Yeh , Department of Computer Science and Information Engineering, National Taipei University of Technology, 106, TAIWAN
Chuan-Ming Liu , Department of Computer Science and Information Engineering, National Taipei University of Technology, 106, TAIWAN
Kai-Yun Ho , Department of Computer Science and Information Engineering, National Taipei University of Technology, 106, TAIWAN
pp. 965-970

Delay and energy efficiency tradeoffs for data collections and aggregation in large scale wireless sensor networks (PDF)

Chao Ren , School of CS, Northwestern Polytechnical University, China
Xufei Mao , Dept. of Computer Science, Illinois Institute of Technology, Chicago, USA
Ping Xu , Dept. of Computer Science, Illinois Institute of Technology, Chicago, USA
GuoJun Dai , Institute of Computer Application Technology, Hangzhou Dianzi Univ. China
ZhanHuai Li , School of CS, Northwestern Polytechnical University, China
pp. 977-982

A force-driven evolutionary approach for multi-objective 3D differentiated sensor network deployment (PDF)

Liang-Che Wei , Department of Computer Science and Information Engineering, Chung-Hua University, Hsin-Chu 300, Taiwan
Chih-Wei Kang , Department of Computer Science and Information Engineering, Chung-Hua University, Hsin-Chu 300, Taiwan
Jian-Hung Chen , Department of Computer Science and Information Engineering, Chung-Hua University, Hsin-Chu 300, Taiwan
pp. 983-988

A new group key management scheme based on DMST for Wireless Sensor Networks (PDF)

YingZhi Zeng , School of Computer, National University of Defense Technology, ChangSha Hunan, China
Yan Xia , School of Computer, National University of Defense Technology, ChangSha Hunan, China
JinShu Su , School of Computer, National University of Defense Technology, ChangSha Hunan, China
pp. 989-994

Design and implementation of a Security Manager for WirelessHART networks (PDF)

Shahid Raza , Swedish Institute of Computer Science (SICS), SE-16429 Kista Stockholm, Sweden
Thiemo Voigt , Swedish Institute of Computer Science (SICS), SE-16429 Kista Stockholm, Sweden
Adriaan Slabbert , Swedish Institute of Computer Science (SICS), SE-16429 Kista Stockholm, Sweden
Krister Landernas , ABB Corporate Research, SE-72178 Västerås, Sweden
pp. 995-1004

A per-hop security scheme for highly dynamic wireless sensor networks (PDF)

Syed Taha Ali , School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, 2052, Australia
Vijay Sivaraman , School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, 2052, Australia
Ashay Dhamdhere , School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, 2052, Australia
pp. 1005-1011

DiffUser: Differentiated user access control on smartphones (PDF)

Xudong Ni , Department of Computer Science and Engineering, The Ohio State University, Columbus, USA
Zhimin Yang , Department of Computer Science and Engineering, The Ohio State University, Columbus, USA
Xiaole Bai , Department of Computer Science and Engineering, The Ohio State University, Columbus, USA
Adam C. Champion , Department of Computer Science and Engineering, The Ohio State University, Columbus, USA
Dong Xuan , Department of Computer Science and Engineering, The Ohio State University, Columbus, USA
pp. 1012-1017

Cooperative anonymity authentication in Vehicular Networks (PDF)

Jianmin Chen , Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, 33431, USA
Jie Wu , Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, 33431, USA
pp. 1018-1023

Quantum communication in distributed wireless sensor networks (PDF)

Jung-Shian Li , Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, Taiwan, R.O.C.
Ching-Fang Yang , Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, Taiwan, R.O.C.
pp. 1024-1029

Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks (PDF)

Zhijun Li , Department of Electrical and Computer Engineering, University of Waterloo, Ontario, Canada
Guang Gong , Department of Electrical and Computer Engineering, University of Waterloo, Ontario, Canada
pp. 1030-1035

A principal-agent method to prevent selfish MAC layer behavior in wireless networks (PDF)

Kai Shi , Department of Computer Science, Tianjin University, 300072, China
Yantai Shu , Department of Computer Science, Tianjin University, 300072, China
Chunfeng Liu , Department of Computer Science, Tianjin University, 300072, China
Oliver Yang , School of Information Technology and Engineering, University of Ottawa, Ontario, Canada, K1N 6N5
pp. 1042-1047

Private cluster head election in wireless sensor networks (PDF)

Levente Buttyan , Laboratory of Cryptography and Systems Security (CrySyS), Budapest University of Technology and Economics, Hungary
Tamas Holczer , Laboratory of Cryptography and Systems Security (CrySyS), Budapest University of Technology and Economics, Hungary
pp. 1048-1053

SecMCL: A Secure Monte Carlo Localization algorithm for mobile sensor networks (PDF)

Yingpei Zeng , State Key Laboratory for Novel Software Technology, Nanjing University, China
Jiannong Cao , Department of Computing, Hong Kong Polytechnic University, Hong Kong
Jue Hong , State Key Laboratory for Novel Software Technology, Nanjing University, China
Shigeng Zhang , State Key Laboratory for Novel Software Technology, Nanjing University, China
Li Xie , State Key Laboratory for Novel Software Technology, Nanjing University, China
pp. 1054-1059

Demo abstract: Accurate power profiling of sensornets with the COOJA/MSPsim simulator (PDF)

Joakim Eriksson , Swedish Institute of Computer Science, England
Fredrik Osterlind , Swedish Institute of Computer Science, England
Thiemo Voigt , Swedish Institute of Computer Science, England
Niclas Finne , Swedish Institute of Computer Science, England
Shahid Raza , Swedish Institute of Computer Science, England
Nicolas Tsiftes , Swedish Institute of Computer Science, England
Adam Dunkels , Swedish Institute of Computer Science, England
pp. 1060-1061

Design and implementation of non-autonomous mobile wireless sensor for debris flow monitoring (PDF)

Huang-Chen Lee , Department of Computer Science, National Tsing Hua University, Taiwan
Chuan-Yu Cho , Department of Computer Science, National Tsing Hua University, Taiwan
Chung-Ta King , Department of Computer Science, National Tsing Hua University, Taiwan
Yao-Min Fang , Geographic Information Systems Research Center, Feng Chia University, Taiwan
Bing-Jean Lee , Geographic Information Systems Research Center, Feng Chia University, Taiwan
pp. 1062-1064

iTracking: Accurate light-based location-tracking in wireless sensor networks (PDF)

Andong Zhan , State Key Laboratory for Novel Software Technology, Nanjing University, China
Shen Li , State Key Laboratory for Novel Software Technology, Nanjing University, China
Tao Li , State Key Laboratory for Novel Software Technology, Nanjing University, China
Lubin Guan , State Key Laboratory for Novel Software Technology, Nanjing University, China
Panlong Yang , Institute of Communication Engineering, Nanjing, China
Xiaobing Wu , State Key Laboratory for Novel Software Technology, Nanjing University, China
Guihai Chen , State Key Laboratory for Novel Software Technology, Nanjing University, China
pp. 1065-1067

Quality estimation based data fusion in wireless sensor networks (PDF)

Frederik Hermans , Institute of Computer Science, Freie Universität Berlin, Germany
Norman Dziengel , Institute of Computer Science, Freie Universität Berlin, Germany
Jochen Schiller , Institute of Computer Science, Freie Universität Berlin, Germany
pp. 1068-1070

VS3: A Vehicular Surveillance and Sensing System for security applications (PDF)

Lien-Wu Chen , Department of Computer Science, National Chiao-Tung University, Hsin-Chu, 300, Taiwan
Kun-Ze Syue , Department of Computer Science, National Chiao-Tung University, Hsin-Chu, 300, Taiwan
Yu-Chee Tseng , Department of Computer Science, National Chiao-Tung University, Hsin-Chu, 300, Taiwan
pp. 1071-1073

Pattern formation using multiple robots (PDF)

Jun Zeng , School of Software, Shanghai Jiao Tong University, China
Daoyong Liu , School of Software, Shanghai Jiao Tong University, China
Alei Liang , School of Software, Shanghai Jiao Tong University, China
Haibing Guan , Department of Computer, Science & Engineering, Shanghai Jiao Tong University, China
pp. 1074-1076
90 ms
(Ver 3.3 (11022016))