By Topic

2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications

Date 12-14 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 94
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (510 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • WiMob 2009 Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Workshops Table of contents

    Publication Year: 2009, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chair

    Publication Year: 2009, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the TPC Co-chairs

    Publication Year: 2009, Page(s):xiv - xvi
    Request permission for commercial reuse | PDF file iconPDF (160 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the Workshop Organizing Co-chairs

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (90 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Program Committee and Reviewers

    Publication Year: 2009, Page(s):xx - xxiii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2009, Page(s): xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    There has been growing interest in vehicle to vehicle communications for a broad range of applications ranging from safe driving to content distribution, advertising, commerce and games. One relatively new application is urban sensing. Vehicles monitor the environment, classify the events, e.g., license plates, pollution readings, etc. and exchange metadata with neighbors in a peer-to-peer fashion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2009, Page(s): xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB)

    Over the last two decades, wireless communications has witnessed an explosive growth and without any doubt has revolutionized many aspects of our daily lives. In this short time period, wireless networks have advanced through three generations (1G, 2G, and 3G), and many licensed or license-free wireless technologies such as WiMAX and WiFi have also emerged to complement the capabilities of cellula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calibrating RSS-Based Indoor Positioning Systems

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    Location estimation based on received signal strength (RSS) is the prevalent method in indoor positioning. For RSS-based methods a massive collection of training RSS samples is needed to calibrate the positioning system and to achieve a high positioning quality. The quality of these methods is directly related to the placement of the wireless sensors in the workspace and the radio map used to comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Model Analysis for a Dual-Polarized Indoor and Industrial MIMO System

    Publication Year: 2009, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Little results exist in the literature regarding modelling the 'real world' industrial MIMO channel. This study models a dual-polarized MIMO channel using the Kronecker and Weichselberger models for two different indoor environments. The author's contribution here is based on a measurement campaign employing dual-polarized 8times8 patch arrays, and is analyzed at 2.4 and 5.2 GHz, where measurement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case

    Publication Year: 2009, Page(s):13 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear eac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Time-Reversal Space-Time Chip Semiblind Receiver for TR-STBC Downlink MIMO MC-CDMA Systems

    Publication Year: 2009, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    In this paper, a time-reversal based space-time block code (TR-STBC) downlink multi-carrier code division multiple access (MC-CDMA) scheme for multiple-input multiple-output (MIMO) array antenna is presented. A TR space-time chip semiblind multiuser receiver with mixing parameterisation is proposed. The TR space-time shifted receive signal matrix using the diversity from space-time technique and m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Training Interval Length Optimization for MIMO Flat Fading Channels Using Decision-Directed Channel Estimation

    Publication Year: 2009, Page(s):24 - 29
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    In this paper, we address the problem of optimization of the training sequence interval for MIMO (multiple-input multiple-output) flat fading channels when an iterative receiver composed of a likelihood generator and a maximum a posteriori (MAP) decoder is used. At each iteration of the receiver, the channel is estimated using the hard decisions on the transmitted symbols at the output of the deco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-criterion Data Aggregation Scheme for WSN

    Publication Year: 2009, Page(s):30 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    The basic role of a wireless sensor network (WSN) is to collect information from the environment by many sensor nodes (SNs). The SN typically has a finite battery life and nodes' failures can lead to network partition. Therefore, it is important to minimize the energy usage of each sensor node and to manage the power of SN in critical position that their failure could divide the network. The curre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sink-Anonymity Mobility Control in Wireless Sensor Networks

    Publication Year: 2009, Page(s):36 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    As the technology of mobile sensors advances, mobility control becomes a viable option that can be utilized to minimize energy consumption in wireless sensor networks (WSNs). A mobility control protocol re-deploys mobile sensors to optimal positions to minimize energy consumption for communication. We identify a unique privacy issue in mobility control protocols that discloses the physical locatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial Coverage in Homological Sensor Networks

    Publication Year: 2009, Page(s):42 - 47
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    We present a solid study on the performance of a homological sensor network in partial sensing coverage, which means the network has at least one sensing coverage hole and we demonstrate that when sacrificing a little coverage the system lifetime can be prolonged significantly. In particular, we showed that when there is one sensing coverage hole (with a coverage rate of 97%) the system lifetime c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending k-Coverage Lifetime of Wireless Sensor Networks Using Mobile Sensor Nodes

    Publication Year: 2009, Page(s):48 - 54
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    One of the important issues in wireless sensor network (WSN) is to k-cover the target sensing field and to extend its lifetime. We propose a method to k-cover the field and maximize the WSN lifetime by moving mobile sensor nodes to appropriate positions for a WSN consisting of both static and mobile sensor nodes which periodically collect environmental information. Our target problem is NP-hard. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selfish Misbehavior Detection in CSMA Cooperative Networks with HARQ

    Publication Year: 2009, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In wireless cooperative transmissions, nodes may deviate from the cooperative protocol to reduce energy consumption while still reaping the benefits of other nodes' cooperation. Misbehavior is implemented by refraining from responding to cooperation request, mimicking adverse channel conditions. From time to time (with a given percentage) cooperations requests are accepted in order to avoid being ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Aware Middleware-Level Solution towards a Ubiquitous Healthcare System

    Publication Year: 2009, Page(s):61 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Recent advances in wireless technology, sensors and portable devices offer interesting opportunities to enable ubiquitous assistance to individuals in need of prompt help. Providing healthcare services to mobile users, such as, patients, elders, or potential drug abusers, is a rather challenging task. Novel middleware-level supports are required to integrate sensor infrastructures capable of detec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Service Provisioning Middleware for Multihomed Devices

    Publication Year: 2009, Page(s):67 - 72
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1865 KB) | HTML iconHTML

    Recent years have witnessed growing interest in using mobile devices to host services. The move from service consumer to service provider has been enabled by advances in mobile device hardware. Many contemporary devices also come equipped with multihoming, which allows a device to connect to heterogeneous networks, such as GPRS, WiFi and Bluetooth. To help leverage these new capabilities, we have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.