By Topic

2009 First International Conference on Ubiquitous and Future Networks

Date 7-9 June 2009

Filter Results

Displaying Results 1 - 25 of 57
  • [Front cover]

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (1505 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (500 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (375 KB)
    Freely Available from IEEE
  • Message from general co-chairs

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (595 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from TPC co-chairs

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (1162 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (821 KB)
    Freely Available from IEEE
  • ICUFN 2009 program at a glance

    Publication Year: 2009, Page(s): vi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference maps

    Publication Year: 2009, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (4196 KB)
    Freely Available from IEEE
  • Venue

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (479 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome reception map

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (1513 KB)
    Freely Available from IEEE
  • Technical sessions

    Publication Year: 2009, Page(s):x - xiii
    Request permission for commercial reuse | PDF file iconPDF (1263 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cognitive UWB pulse design using co-basis expansion method

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB) | HTML iconHTML

    A co-basis is a special orthonormal basis, of the Hilbert function space, whose base functions are shape-invariant to Fourier transform except for phase shifts known a priori. A notable advantage of the co-basis orthonormal-expansion method lies in that it essentially conceals the difference between time- and frequency-domains expansions, such that expanding the UWB spectra (frequency domain) is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MCR-MAC: Multi-channel cognitive radio MAC protocol for cooperative incumbent system protection in wireless ad-hoc network

    Publication Year: 2009, Page(s):6 - 11
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    MAC protocol design for cognitive radio (CR) should provide access control for unused spectrum without or with minimal interference to primary users. On this basis, considering how to improve the throughput can make CR MAC protocol more meaningful. To achieve these goals, in this paper a TDMA based multi-channel cognitive radio MAC (MCR-MAC) protocol is proposed for wireless ad hoc network that pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic SLA negotiation using bandwidth broker for femtocell networks

    Publication Year: 2009, Page(s):12 - 15
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    The satisfaction level of femtocell users depends on the availability of requested bandwidth. But, the xDSL line that can be used for the backhauling of femtocell traffic cannot always provide sufficient bandwidth due to the inequality between the xDSL capacity and demanded bandwidth of home applications, like IPTV, PC, Wi-Fi, and others. A service level agreement (SLA) between xDSL and the femtoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to reduce multi-access interference in DS-CDMA

    Publication Year: 2009, Page(s):16 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Direct sequence code division multiple access (DSCDMA) is mainly an interference limited channel. When several users are accessed in a common channel and since signature sequences assigned to users are not perfectly orthogonal, so interference is introduced in each user's desired signal. Several interference cancellation methods were proposed to reduce multi-access interference. In this paper, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the reliability of backbone-assisted end-to-end transmissions in WSNs

    Publication Year: 2009, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. Since transmission range of sensors is quite limited, to achieve higher end-to-end transmission reliability, WSNs generally employ intermediate backbone links (wired or wireless) that can deliver packets at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality assurance for data acquisition in error prone WSNs

    Publication Year: 2009, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    This paper proposes a data acquisition scheme which supports probabilistic data quality assurance in an error-prone wireless sensor network (WSN). Given a query and a statistical model of real-world data which is highly correlated, the aim of the scheme is to find a sensor selection scheme which is used to deal with inaccurate data and probabilistic guarantee on the query result. Since most sensor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provisioning geographic data-centric dissemination in Wireless Sensor Networks

    Publication Year: 2009, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    In this paper, we propose to enhance a data-centric dissemination framework with geographic information and network-level caching in wireless sensor networks. The proposed framework enhances data-centric routing with three principal components: (1) publish/subscribe paradigm to coordinate sources and sinks; (2) geographic diffusion to mitigate unnecessary data forwarding; (3) network-level caching... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power-aware location-based anti-collision protocol for RFID-sensor networks

    Publication Year: 2009, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (582 KB) | HTML iconHTML

    Radio frequency identification (RFID) is a promising technology for ubiquitous computing. To improve its function and capability, it is necessary to integrate RFID with wireless sensor networks (WSNs). Although organized well, the reader collision problem is still one of the critical problems in these networks. In this paper, we propose a collision avoidance protocol called power-aware location-ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heterogeneous peer-to-peer network testbed

    Publication Year: 2009, Page(s):46 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    In this paper, we describe a heterogeneous peer-to-peer network testbed, which is developed as part of a joint research project to investigate novel resource discovery and content distribution protocols in a heterogeneous wired/wireless environment. We describe the testbed requirements, the testbed architecture, the multi-functional wireless node, and the software architecture. We also describe so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural model and service scenario of dynamic service overlay network (DSON)

    Publication Year: 2009, Page(s):52 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1413 KB) | HTML iconHTML

    With the growing number of service application, need for service platform has appeared. Various solutions were proposed to serve the applications through the existing physical network. Service overlay network is one of the solutions that provide application adaptations and service reliabilities. With this solution, we propose an architecture that composes a service overlay network dynamically to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relay node selection in large-scale VoIP overlay networks

    Publication Year: 2009, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    Relay path selection is one of the critical components of VoIP overlay systems. This paper looks at the choice of relay nodes and its impact on the performance of VoIP overlay paths in interdomain environment. We model the network at the autonomous system level and simulate different scenarios of relay path selection. For the optimal relay path performance, we recommend to select relay nodes whose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Gossip Based Overlay Network For Peer-To-Peer Networks

    Publication Year: 2009, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    Overlay networks have emerged as a means to enhance end-to-end application performance and availability. Network topology plays an important role in utilizing resources in peer-to-peer systems. Epidemic algorithms are potentially effective solutions for disseminating information in large scale and dynamic systems. P2P networks are popular for their dynamicity, but they are easy to deploy, robust a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grey-box mechanism design in peer-to-peer cooperative networking

    Publication Year: 2009, Page(s):68 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    This paper presented the need and the position on human-centric mechanism design. In the design, the paper identified situations where human intervention impact social welfare, and incorporated the design framework for peer-to-peer grey-box systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subband power allocation for tightly coordinated cellular systems

    Publication Year: 2009, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Transmission power allocation scheme for soft frequency reuse (SFR) is proposed in tightly coordinated cells where neighboring cells are controlled by a central scheduler. Also fast adaptive SFR scheme is proposed. While SFR is the effective technique to increase cell edge user throughput, it costs the degradation of cell average throughput. The cost increases when SFR fails to be fast adaptive in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.