By Topic

Applications and Services in Wireless Networks, 2008. ASWN '08. Eighth International Workshop on

Date 9-10 Oct. 2008

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2249 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Title page iv - Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (108 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • IMS vs. P2P and Web 2.0 - Understanding the Role of the IP Multimedia System (IMS) in Face of a Converging Telco and Internet Service World

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    This tutorial will introduce the notion of network convergence and next generation networks by looking at the evolution of telecommunication services and Internet services and the related infrastructure. Special emphasis will be placed on describing the principles and architecture of the IP multimedia subsystem (IMS), a common service platform standard defined by IETF, 3GPP, ETSI TISPAN, and Cable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends and Challenges of Wireless Sensor Networks

    Publication Year: 2008, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Summary form only given: The interest for sensor networks has been rapidly growing in the last years and the number of applications using sensor networks is increasing rapidly. However, the adoption of wireless sensor network technology has been hindered by the difficulty to program them in a simple and efficient way. In this key note we will talk about trends of development of sensor networks and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The OtaSizzle Project: Large-Scale Service Experimentation Testbed

    Publication Year: 2008, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Summary form only given. The recently started OtaSizzle project is designed to study these issues. We plan to build services following the above principles, focusing on service initiation; hooking the user; and building a durable relation. We will test the services them with sufficiently large user populations and over sufficiently long time to see the dynamics of service diffusion and the impact ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Context Monitoring Service for Adaptive and Context-Aware Applications

    Publication Year: 2008, Page(s):11 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    The contribution of this paper is a novel service architecture for facilitating the development of context-aware applications in heterogeneous distributed environments. The requirements, architecture and functional validation of the architecture are contributed. The research problem addressed in the paper is dynamic acquisition and representation of context information and its efficient provisioni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DAGR – DAG Based Context Reasoning: An Architecture for Context Aware Applications

    Publication Year: 2008, Page(s):20 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Pervasive computing includes the vision of small but intelligent devices around us. While the hardware of such devices is available in the market for years,they are still not intelligent in our every day life. For the success of the idea of pervasive computing a unified programming model is needed. Without a standard way of composing intelligent applications for pervasive computing, especially con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Context-Aware Service Development under MUPE Platform

    Publication Year: 2008, Page(s):26 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    Context-awareness indicates that a computer system is linked with changes in the real world. Context information can be used for numerous different purposes, but the real break through is still pending. Context information is useful only when it is not static, and hence in desktop computers there is very limited need for context awareness. In mobile phones situation is different. MUPE is an Open S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative Transmission in Wireless Sensor Networks by a (1 + 1)-EA

    Publication Year: 2008, Page(s):37 - 46
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    With collaborative transmission we propose a novel transmission scheme that utilizes constructive interference between transmitted signals of wireless sensor nodes. Similar to cooperative transmission approaches we are able to drastically extend the transmission range of a wireless sensor network. We show that synchronization of received signal components is feasible without inter-node communicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • USEME: A Service-Oriented Framework for Wireless Sensor and Actor Networks

    Publication Year: 2008, Page(s):47 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (877 KB) | HTML iconHTML

    We are in the presence of a new and powerful technology called wireless sensor and actor networks. There are many fields where we can apply this technology to develop varied and interesting applications: high security environments, environmental monitoring,industrial monitoring, medicine, precision agriculture. This technology brings the need to develop new frameworks in order to make easier the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A P2P-Based Middleware for Wide-Area Service Discovery

    Publication Year: 2008, Page(s):57 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1487 KB) | HTML iconHTML

    Several service discovery protocols are deployed in local-area networks allowing users to be informed about the services in their vicinities. However, these local-area discovery protocols are incapable of exposing the services to remote users. This paper proposes a P2P-based naming system to ensure wide-area service discovery for communications between devices and services often remotely located. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Services in a Distributed Environment

    Publication Year: 2008, Page(s):66 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    The dynamically changing nature of distributed service environments requires a computing model in which services modify their behavior in order to adapt to changes and fulfill new requirements in the environment. This paper describes design and implementation of the autonomic communication element (ACE) component model with main focus on service adaptability. Autonomic Communication Element (ACE) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delivering RSS-Feeds over SIP

    Publication Year: 2008, Page(s):76 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Delivering RSS news feeds to clients is a simple technology, but it results in great amount of news duplication. Tests show that in ordinary situations the duplication rate can approach 99% of the delivered news items. This duplication is the result of the pull-style delivering mechanism used to transmit the news from the server to the clients. Using a different type of delivery mechanism, i.e. pu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Passive Autoconfiguration and Anomaly-Based Intrusion Detection in Ad Hoc Networks

    Publication Year: 2008, Page(s):87 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Two essential services of ad-hoc networks are IP address autoconfiguration and intrusion detection systems. Since both autoconfiguration and intrusion detection may base their decisions on routing protocol anomalies, their interdependencies can cause problems. In this paper, we present our approach to efficiently combine autoconfiguration and intrusion detection, and present our enhancements in at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tandem Smart Cards: Enforcing Trust for TLS-Based Network Services

    Publication Year: 2008, Page(s):96 - 104
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    This paper presents a new concept, called tandem, dedicated to smart cards that control TLS-based applications. The originality of this approach is to introduce a collaborative process between a smart card and its docking host. This technology enables the secure downloading of a huge amount of data, in untrustworthy computers. We present software paradigms and APIs that facilitate the practical de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2008, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Roster]

    Publication Year: 2008, Page(s): 106
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE