The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the Organizing Committee, we would like welcome you to the Sixth Annual IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). The tremendous advances in wireless communications and mobile computing, combined with the rapid evolution in smart appliances and devices have generated new challenges and problems requiring solutions that rely...
The MIL-STD-188-220 is the military tactical wireless mobile ad-hoc communication standard which makes a smooth data and voice communication possible. This standard is known as the Interoperability Standard for Digital Message Transfer Device Subsystems. However, the standard has the problem to generate the meaningless traffic due to the failure of topology update, in the case of transmitting the...
Multiple antenna communication systems are a solution to meet the demand for pervasive computing and ubiquitous wireless communications. As multiple antenna communication systems become more broadly deployed, integrating unobtrusive antennas into various form factors is becoming increasingly important. Antennas that are flexible and transparent can ease this design constraint. In this paper, we present...
In this paper, we extends bandwidth balancing technique in wired networks to operate in mobile ad hoc networks (MANETs). In bandwidth balancing in Distributed-Queue-Dual-Bus (DQDB), different nodes occupy the same channel, and information about the bandwidth is transferred between nodes in the unused bandwidth. Similarly, in wireless networks, the capacity on a channel is shared by several sources...
Routing remains one of the key challenges in vehicular networks due to their special properties such as the high mobility and the intermittent connectivity. Almost all the efficient routing solutions proposed for VANETs are based on geographic information provided by the navigation systems widely deployed in the new generation of vehicles. Typically, in these position-based protocols, a source node...
The proliferation of networked appliances or dedicated function consumer devices with embedded processors and network connection capabilities is driving the virtual device concept, whereby such appliances can be controlled, monitored, managed, and extended beyond what they were initially designed to do. The dynamic and ad hoc nature of the discovery and composition of such devices and the services...
Recent developments in computer science and networking technologies motivate new families of applications that are sensitive to user and ambient contexts. The objective is to offer adaptive services that can be personalized to users' needs within heterogeneous, complex and dynamic environments. This requires enhanced and generic solutions for context representation and retrieval as well as for the...
In this paper, we present and analyze a Tabu Search (TS) algorithm for DSA (Dynamic Spectrum Access) in cellular networks. We study a mono-operator case where the operator is providing packet services to the end-users. The objective of the cellular operator is to maximize its reward while taking into account the trade-off between the spectrum cost and the revenues obtained from end-users. These revenue...
High level context recognition and situation detection are enabling technologies for unobtrusive mobile computing systems. Significant progress has been made in processing and managing context information, leading to sophisticated frameworks, middlewares, and algorithms. Despite great improvements, context aware systems still require a significantly increased recognition accuracy for high-level context...
With the rapid advancement of positioning and tracking capabilities (mobile phones, on-board navigation systems) location based services are rapidly increasing. Privacy in location based systems is addressed in many papers. Our work is focused on the trusted third party privacy framework that utilizes the concept of k-anonymity with or without l-diversity. In previous anonymization models k may be...
It is estimated that over 8 million cell phones are lost or stolen each year [7]; often the loss of a cell phone means the loss of personal data, time and enormous aggravation. In this paper we present machine-learning based algorithms by which a cell phone can discern that it may be lost, and take steps to enhance its chances of being successfully recovered. We use data collected from the Reality...
The Web Servers are globally accepted as the backbone of the Internet. The researchers in the area of the enterprise computing have studied, analyzed and implemented several architectures to optimize the performance of the largescale Web Servers. However, due to the convergence of the IT and the mobile communication domains, the mobile nodes now are also been viewed as the service hosting platforms...
In this paper, we investigate the effects of high-power amplifier (HPA) nonlinearity and in-phase and quadrature-phase (I/Q) imbalance on the performance of multiple-input multiple-output (MIMO) transmit beamforming (TB) systems. Specifically, we propose a compensation method for HPA nonlinearity and I/Q imbalance together in MIMO TB systems. The performance of the MIMO TB system under study is evaluated...
We consider the problem of backbone formation in ad hoc wireless networks composed of heterogeneous nodes. A virtual backbone in an ad hoc wireless network provides a hierarchical infrastructure that can be used to address important challenges such as efficient routing, multicasting/broadcasting, activity-scheduling, and energy efficiency. We model a wireless network in which nodes have different...
Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node (to its neighbors) is consistent with routing information assimilated by a node (from its neighbors). We investigate a minimal trusted computing base (TCB) for MANET nodes to ensure this requirement. We outline low complexity TCB functions which can be executed inside trustworthy boundaries...
Denial of Service (DoS) attacks on 802.11 wireless LANs can be caused by management frames sent by rogue access points. Unfortunately, such attacks can be successful even if the wireless network is protected by a high-level security protocol such as WiFi Protected Access Version 2 (WPA2). We present a novel client-based scheme for the prevention of such intrusions. By using a Medium Access Control...
Wireless Personal Area Networks (WPANs) are used for a wide variety of applications. Earlier WPANs, like Bluetooth, offer data rates only for low rate communication. Nowadays, consumer electronic devices have high demands on communication systems, e.g. for high definition video transmission. Users expect future WPANs to act like wired systems by means of reliability, that is, packet loss and distortion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.