By Topic

Networks and Communications, 2009. NETCOM '09. First International Conference on

Date 27-29 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 91
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Message from the General and Program Chairs

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (137 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Secured communication in ad hoc wireless networks is primarily important, because the communication signals are openly available as they propagate through air. The lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks. As nodes in ad hoc network join or leave dynamically, the efficient key management and encryption mechanism is requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Sink Mobility on Network Performance in Wireless Sensor Networks

    Publication Year: 2009, Page(s):7 - 11
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    A wireless sensor network (WSN) consists of a large number of distributed sensors nodes, each of which is capable of performing computational operations, storage and communication capability. Extending network lifetime and energy efficiency are important objectives and challenges in wireless sensor networks. The nodes near the sink are more likely to use up their energy because they have to forwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Clustering in Wireless Sensor Networks

    Publication Year: 2009, Page(s):12 - 17
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (729 KB) | HTML iconHTML

    Minimization of the number of cluster heads in a wireless sensor network is a very important problem to reduce channel contention and to improve the efficiency of the algorithm when executed at the level of cluster-heads. In this paper, we propose an efficient method based on genetic algorithms (GAs) to solve a sensor network optimization problem. Long communication distances between sensors and a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Algorithm for Graded Precision Localization in Wireless Sensor Networks

    Publication Year: 2009, Page(s):18 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    A lot of research has been done in finding range-based methods such as computing RSSI, time of arrival, angle of arrival or time difference of arrival and range-free methods such as centroid computation, DV-hop and approximate position in triangle, for localization in wireless sensor networks. Range-based methods estimate location more precisely than range-free methods. However, range-free methods... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks

    Publication Year: 2009, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Inexpensive sensors capable of significant computation and wireless communication with limited energy resources are available. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of network. Several network lay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Efficient Wireless Sensor MAC Protocol for Collision Avoidance

    Publication Year: 2009, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    In sensor networks communication by broadcast method involves many hazards, especially collision. Several MAC layer protocols have been proposed to resolve the problem of collision namely ARBP, where the best achieved success rate is 90%. We hereby propose a MAC protocol which achieves a greater success rate (Success rate is defined as the percentage of delivered packets at the source reaching the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks

    Publication Year: 2009, Page(s):34 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Energy is a valuable resource in wireless sensor networks (WSNs). The status of energy consumption should be continuously monitored after network deployment. The information about energy status can be used to early notify both sensor nodes and network deployers about resource depletion in some parts of the network. It can also be used to perform energy-efficient routing in WSNs. In this paper, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks

    Publication Year: 2009, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (931 KB) | HTML iconHTML

    Opportunistic dissemination is a promising research domain, for more and more applications that need efficient information spreading in one area are emerging in vehicular ad-hoc networks (VANETs). The most important characteristic of vehicular networks is that they do not have a stable framework. The communication between vehicles mostly depends on the unexpected meeting. Some available data disse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh Networks

    Publication Year: 2009, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    Providing low-cost broadband internet access in rural area use either IEEE 802.11/802.16 based optimized network topology. Even using directional antenna, the point-to-point links at a transmitting node suffer from Mix-Tx-Rx interference when simultaneously receiving on another link due the presence of side lobes. Existing 2P MAC protocol allocate channels to the links assuming the network topolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Posture-Predictive Power Control in Body Sensor Networks Using Linear-Quadratic Gaussian Control

    Publication Year: 2009, Page(s):52 - 59
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    This paper presents a novel transmission power assignment mechanism for on-body wireless links formed between severely energy-constrained wearable and implanted sensors. The objective is to develop a model based framework in which RF signal strength is predicted and is regulated at a reference value. In particular, the body movement has been modeled as a stochastic linear system and a quantized Li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks

    Publication Year: 2009, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    In this paper, we propose IAMAC, an interference avoidance MAC protocol to avoid inter-node interference in dense wireless sensor networks. IAMAC interacts with routing protocol via cross-layer information sharing between the MAC and network layer. By providing information from network layer, we enable the MAC protocol to make proper decisions which result in fewer inter-node interference and lowe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vertical Handoff in Heterogeneous Wireless Mobile Networks

    Publication Year: 2009, Page(s):66 - 71
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The vision of future wireless networks is coexistence of current existing access networks. The different access networks will be bound together into a single network and the Internet Protocol (IP) will be the glue. To fulfill this vision, one of the most challenging parts is to develop sophisticated policies for vertical handovers. When and in what way the handoffs are performed affects the perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple Mobile Routers Based Seamless Handover Scheme for Next Generation Heterogeneous Networks

    Publication Year: 2009, Page(s):72 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Next generation heterogeneous networks require an effective handover scheme, optimized specially to support network mobility. The paper proposes an architecture to support seamless mobility of mobile networks across heterogeneous networks. We consider the vehicular scenario where a vehicle is provided with mobility through different Internet service providers (ISPs) and propose to use multiple mob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Approach for Planning WLAN Deployment under 3G Cellular Network

    Publication Year: 2009, Page(s):78 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    This paper deals with a practical approach for planning WLAN hotspots to be underlaid within an existing 3G network. Given the number of access points (APs) and access routers (ARs), their locations, call handling capacities of ARs as well as serving GPRS Support Nodes (SGSNs), intra-WLAN handoff costs, and 3G/WLAN inter-system handoff costs, an important consideration for a mobile telecom service... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scheduling Policy for Battery Management in Mobile Devices

    Publication Year: 2009, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    A major issue in the ad hoc networks with energy constraints is to find ways that increase their lifetime. The use of multihop radio relaying requires a sufficient number of relaying nodes to maintain network connectivity. Hence, battery power is a precious resource that must be used efficiently in order to avoid early termination of any node. In this paper, a new battery power scheduling policy b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.