By Topic

Distributed Computing Systems Workshops, 2007. ICDCSW '07. 27th International Conference on

22-29 June 2007

Filter Results

Displaying Results 1 - 25 of 113
  • 27th International Conference on Distributed Computing Systems Workshops - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • 27th International Conference on Distributed Computing Systems Workshops-Title

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • 27th International Conference on Distributed Computing Systems Workshops-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • 27th International Conference on Distributed Computing Systems Workshops -T OC

    Publication Year: 2007, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from MDC Workshop Chairs

    Publication Year: 2007, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (20 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Quorum Based IP Address Autoconfiguration in Mobile Ad Hoc Networks

    Publication Year: 2007, Page(s): 1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    IP address autoconfiguration poses a challenge for mobile ad hoc networks (MANETs) since it has to be done to ensure correct routing. Protocols for IP address autoconfiguration can be classified into two categories. In the stateless category, nodes in the network do not keep IP allocation information, thus duplicate address detection (DAD) is used to resolve possible address conflicts. Protocols i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive Directional Greedy Routing in Vehicular Ad hoc Networks

    Publication Year: 2007, Page(s): 2
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    VANETs (vehicle ad hoc networks) are highly mobile wireless ad hoc networks targeted to support vehicular safety and other commercial applications. Conventional routing protocols in MANETs (mobile ad hoc networks) are unable to fully address the unique characteristics in vehicular networks. On the other hand, some characteristics in VANETs, like mobility constraints and predicable mobility, can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Stabilizing Algorithms of Constructing Spanning Tree and Weakly Connected Minimal Dominating Set

    Publication Year: 2007, Page(s): 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    In this paper, we present a self-stabilizing algorithm that computes the breadth first spanning tree in arbitrary graph, with 0(n3) time complexity using the unfair central daemon. We then propose a self-stabilizing algorithm to compute the weakly connected minimal dominating set in a graph using the same model and provide its correctness and complexity analysis; as far as we know, this is the fir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service Supplier Database for Location-Based Mobile Commerce

    Publication Year: 2007, Page(s): 4
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Dynamic development and improvement of mobile devices in nowadays enforces more attention to the manner in which information is handled (storage and management) among participating components in mobile commerce environment. Many are times tourists become strangers in foreign countries and become worried about available services in each and every place they visit. These services which are known as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Building a Multi-level Robust Intrusion Detection Architecture for Distributed Mobile Networks

    Publication Year: 2007, Page(s): 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    A robust intrusion detection architecture for a distributed wireless mobile network is of significant importance as it is necessary to secure these networks against malicious attacks and sustain availability of services to various applications. In this paper, we examine the limitations of a layered approach to security in mobile networks. We consider a detection framework that encompasses multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative analysis of VoIP support for HT transmission mechanisms in WLAN

    Publication Year: 2007, Page(s): 6
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    The high throughput (HT) 802.11n architecture is mainly aimed at exchanging large chunks of data using bit rates of 216 Mbps in 20 MHz and 432 Mbps (or even higher) in 40 MHz bandwidth respectively. However, for real-time data streams with small payloads like VoIP the performance of 802.11n is not very impressive and performs worse than 802.11a, as we show in this report. In order to overcome this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-Swapping for Resource-Constrained Devices

    Publication Year: 2007, Page(s): 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be freed. This must be performed while preserving referential integrity in object-oriented applications and without permanently losing data. We propose a novel approach to object swapping in constrained devices, that favors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Distance Filter-based Traffic Reduction for Mobile Grid

    Publication Year: 2007, Page(s): 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    The mobile grid introduces various research challenges distinguished from existing grid computing systems. They are low bandwidth, low processing power, low battery capacity, frequent disconnectivity, and mobility. Mobility of the grid node increases the system load of the mobile grid in a constrained operating environment by increasing the number of communication messages required to confirm the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Middleware Support for Agent-Based Application Mobility in Pervasive Environments

    Publication Year: 2007, Page(s): 9
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    Application mobility is an efficient way to mask uneven conditioning and reduce users' distractions in pervasive environments. However, since mobility brings more dynamism and uncertainty, it also raises new research issues in developing pervasive applications, including underlying application models, adaptive resource rebinding mechanisms, synchronization and fault tolerance techniques, etc. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems

    Publication Year: 2007, Page(s): 10
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Peer-to-peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems generate new challenges in scalability, fairness, and quality of service. Current systems often approach these challenges through incentive-based solutions and structured system design. Incentive-based solutions appeal to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from WWASN Workshop Chairs

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Reception-Aware Routing for Energy Conservation in Ad Hoc Networks

    Publication Year: 2007, Page(s): 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (730 KB) | HTML iconHTML

    Energy is a scarce resource in ad hoc mobile networks, making energy-aware communication crucial. In the absence of a central controlling entity and due to its dynamic network topology, the problem of controlling the network communications in an energy-efficient way is non-trivial in ad hoc networks. The problem is elevated due to the wireless nature of the communication, where a large amount of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Multipath Routing Protocol for Wireless Sensor Networks

    Publication Year: 2007, Page(s): 12
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    One important issue when designing wireless sensor network (WSN) is the routing protocol that makes the best use of the severely limited resource presented by WSN, especially the energy limitation. Another import factor required attention from researchers is providing as much security to the application as possible. In this paper, we propose a new routing protocol called SEER: secure and energy-ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysing the Impact of Topology Update Strategies on the Performance of a Proactive MANET Routing Protocol

    Publication Year: 2007, Page(s): 13
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4708 KB) | HTML iconHTML

    This paper presents an analysis of several topology update strategies for proactive MANET routing protocols. Although there have been a number of performance studies of proactive MANET routing protocols, little attention has been paid to the impacts of topology update strategies on routing performance. The goal of this paper is to better understand how topology update strategies can contribute to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group-aware Stream Filtering

    Publication Year: 2007, Page(s): 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    In this paper we are concerned with disseminating high-volume data streams to many simultaneous context-aware applications over a low-bandwidth wireless mesh network. For bandwidth efficiency, we propose a group-aware stream filtering approach, used in conjunction with multicasting, that exploits two overlooked, yet important, properties of these applications: 1) many applications can tolerate som... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Guaranteed QoS in Mesh Networks: EmulatingWiMAX Mesh over WiFi Hardware

    Publication Year: 2007, Page(s): 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Currently deployed wireless mesh networks are based on 802.11, WiFi, technology, which is not efficient in multihop scenarios. We present a method for embedding 802.16 packets into 802.11 broadcast packets and padding the 802.11 broadcast payload, so that the broadcasts are aligned to 802.16 TDMA frame boundaries. Our method requires only software changes on the nodes using 802.11a for mesh commun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.