|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
NetWare 2009 SENSORCOMM 2009 // SECURWARE 2009 // DEPEND 2009 // MESH 2009 // AFIN 2009 Conference rooms
Thursday, June 18
Friday, June 19
Saturday, June 20
Sunday, June 21
Monday, June 22
Tuesday, June 23
DETAILED PROGRAM
SENSORCOMM 2009 SENSORCOMM 1: PESMOSN I A Link Quality Evaluation Model in Wireless Sensor Networks Sensor Nodes Localization Algorithm in Noisy Environments CSMA-MAC Performance Evaluation for WSN Applications Distributed Source Coding for Sensor Data Model and Estimation of Cluster Head Errors Using Bayesian and K-Near Neighborhood Classifiers in Deployment of Dense Wireless Sensor Networks SENSORCOMM 2: PESMOSN II On the Relationship between Network Congestion and Local Contention in IEEE 802.15.4 Based Networks Zigbee Based Reconfigurable Clustered Home Area Network Simulink Modeling of the 802.15.4 Physical Layer for Model-Based Design of Wireless Sensor Networks Clustering with Discrete Power Control in Wireless Sensor Networks SENSORCOMM 3: PESMOSN III An Evaluation of the Cost and Energy Consumption of Security Protocols in WSNs Mobility Models for Delay-Tolerant Mobile Networks Performance Analysis of ZigBee-Based Wireless Sensor Networks with Path-Constrained Mobile Sink(s) Estimation of Mobile Trajectory in a Wireless Network: A Basis for User's Mobility Profiling for Mobile Trajectoy Based Services SENSORCOMM 4: SECSED I Cross Sensitivity Study for Ammonia Detection in Ultra Violet Region Using an Optical Fibre Sensor Fabrication of a Glucose Biosensor by Piezoelectric Inkjet Printing CMOS Nanostructures with Improved Temperature Behavior Using Double Differential Structures Smart Sensing Polymeric Foil with Integrated Optic Fiber Sensors: Fabrication and Characterization of a Polymeric Foil Sensitive to Strain SENSORCOMM 5: SECSED II Multi-sensor Embedded System for Agro-Industrial Applications Inductive Displacement Sensor for Force Measuring in Humanoid Robotic Application: Testing the Invariance on Angular Displacement ZigBee-Ready Wireless Water Leak Detector SENSORCOMM 6: SAPSN I The RUNES Architecture for Reconfigurable Embedded and Sensor Networks Mote Runner: A Multi-language Virtual Machine for Small Embedded Devices Negotiated Rational Commitment and Decommitment in Sensor Webs Energy Bucket: A Tool for Power Profiling and Debugging of Sensor Nodes SENSORCOMM 7: SAPSN II A Wireless Actuator-Sensor Neural Network for Evacuation Routing Ontological Middleware for Dynamic Wireless Sensor Data Processing Indoor Location System Using ZigBee Technology An Elderly Health Care System Using Wireless Sensor Networks at Home SENSORCOMM 8: RIWISN I Comparison between the Actual Microwave Terrestrial Links Performance and Different Models An Ultra Low Power Wakeup Receiver for Wireless Sensor Nodes Spatial Diversity for Short Range Communication in Home Care Systems Using One Antenna Element Coupling and Correlation Reduction in Compact Arrays for WSN Nodes via Pre-fractal Defected Ground Plane SENSORCOMM 9: RIWISN II Frequency Scanning Using Software Defined Radio for Localised Range Estimation Semidefinite Programming for Wireless Sensor Localization with Lognormal Shadowing A Practical RF Propagation Model for Wireless Network Sensors Coexistence Issues of 2.4GHz Sensor Networks with Other RF Devices at Home SENSORCOMM 10: RIWISN III A Study of the RF Characteristics for Wireless Sensor Deployment in Building Environment Joint TOA Estimation and NLOS Identification for UWB Localization Systems A Retransmission Cut-Off Random Access Protocol with Multi-packet Reception Capability for Wireless Networks Improving Location Identification in Wireless Ad Hoc/Sensor Networks Using GDOP Theory SENSORCOMM 11: ENOPT I Energy-Efficient Circular Sector Sensing Coverage Model for Wireless Sensor Networks Coverage Efficient Clustering with a Minimum Number of Active Sensors for Wireless Sensor Networks Scheduling Real-Time of the Synchronous Hybrid Tasks under Energy Constraint Energy Harvesting in Substations for Powering Autonomous Sensors Particle Filtering Based on Sign of Innovation for Tracking a Jump Markovian Motion in a Binary WSN SENSORCOMM 12: ENOPT II Adaptive Cluster-Based Scheduling Management for Wireless Ad-Hoc Sensor Networks Multiple Mobile Sinks Positioning in Wireless Sensor Networks for Buildings Implementation of Source and Channel Coding for Power Reduction in Medical Application Wireless Sensor Network Context-Aware Multilayer Hierarchical Protocol for Wireless Sensor Network SENSORCOMM 13: UNWAT I Experimental Study of Acoustic Forward Scattering on a Marine Shelf A Simple Time Synchronization Method for Underwater Communication Receivers An RFID Based System for the Underwater Tracking of Pebbles on Artificial Coarse Beaches SENSORCOMM 14: UNWAT II Underwater Acoustic Networks - Survey on Communication Challenges with Transmission Simulations Software Architecture for Self-Adapting Sub-sea Sensor Networks: Work in Progress Performance Results of a Prototype Board Designed for Copper Data Transmission in KM3NeT SENSORCOMM 15: MECSN Software Calibration of Wirelessly Networked Sensors A Novel Quorum Based Location Management for Wireless Sensor Network with Mobile Sinks A Variable Threats Based Self-Organization Scheme for Wireless Sensor Networks Optimization Models for Determining Performance Benchmarks in Wireless Sensor Networks Topology Control in Wireless Sensor Networks SENSORCOMM 16: RASQOFT A Technique to Identify and Substitute Faulty Nodes in Wireless Sensor Networks A Cellular Approach to Fault Detection and Recovery in Wireless Sensor Networks Definition and Evaluation of Local Path Recovery Mechanisms in Wireless Sensor and Actuator Networks A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks SENSORCOMM 17: DISN I Agricultural Monitoring Based on Wireless Sensor Network Technology: Real Long Life Deployments for Physiology and Pathogens Control Experiences of Deploying an Indoor Building Sensor Network WILLEM: A Wireless InteLLigent Evacuation Method A Wireless Multimedia Sensor Network Based Intelligent Safety and Security System (IS³) SENSORCOMM 18: DISN II Design and Implementation of Sensor Tag Middleware for Monitoring Containers in Logistics Systems Energy Efficient Sensor Network with Service Discovery for Smart Home Environments Real-Time Wireless Sensor Network for Landslide Detection Sensor Network for Gas Meter Application Real Deployments of Wireless Sensor Networks SENSORCOMM 19: SEMOSN I Secure Broadcast in Wireless Sensor Networks The ANGEL WSN Security Architecture Combined Malicious Node Discovery and Self-Destruction Technique for Wireless Sensor Networks Establishing Pairwise Keys in Heterogeneous Two-Tiered Wireless Sensor Networks SENSORCOMM 20: SEMOSN II SecSens - Security Architecture for Wireless Sensor Networks PDoS-Resilient Push Protocols for Sensor Networks A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks SENSORCOMM 21: Work in Progress Transport Layer Multipath on Wireless Sensor Network Backhaul Links BSCP: Buckup Scheduling Mecanism for Coverage Perserving in WSNs Building an Underwater Wireless Sensor Network Based on Optical: Communication: Research Challenges and Current Results SENSORCOMM 22: DAIPSN Inductive as a Support of Deductive Data Visualisation in Wireless Sensor Networks Wireless Sensor Network Testbed for Real-Time Sensor Monitoring Spatial Multiplexing Turbo Receiver with Reduced Complexity Identification and Validation of Spatio-Temporal Associations in Wireless Sensor Networks K-RLE: A New Data Compression Algorithm for Wireless Sensor Network SENSORCOMM 23: APASN I An Efficient and Scalable Prioritized MAC Protocol (PMAC) for Backbone Communication in Wireless Sensor Networks A Proportional Load Balancing for Wireless Sensor Networks Nonparametric Boxed Belief Propagation for Localization in Wireless Sensor Networks Soft Threshold Based Cluster-Head Selection Algorithm for Wireless Sensor Networks SENSORCOMM 24: APASN II Energy-Efficient Multiple Query Optimization for Wireless Sensor Networks A Location-Independent Node Scheduling for Heterogeneous Wireless Sensor Networks Processing Top-k Monitoring Queries in Wireless Sensor Networks An Information Driven Sensornet Architecture SENSORCOMM 25: APASN III A Hotline-Based Reliable Topology for Wireless Sensor Networks Multi-objective Cross-Layer Algorithm for Routing over Wireless Sensor Networks Integrity-Checking Framework: An In-situ Testing and Validation Framework for Wireless Sensor and Actuator Networks SENSORCOMM 26: APASN IV Integrating Wireless Sensor Networks into Enterprise Information Systems by Using Web Services The CBK-Neigh Protocol for Symmetric Topology Control in Ad Hoc Networks Graphical Models for Distributed Inference in Wireless Sensor Networks Energy-Efficient TDMA-Based MAC Protocol for Wireless Body Area Networks SENSORCOMM 27: APASN V Programming Wireless Sensor Networks in a Self-Stabilizing Style W-LBP: Wavelet-Based Loopy Belief Propagation for Wireless Sensor Networks MLMAC-UL and ECTS-MAC - Two MAC Protocols for Wireless Sensor Networks with Unidirectional Links Architecture Development for Efficient Sensor Tag Management SENSORCOMM 28: APASN VI A Comparison of Bayesian Filter Based Approaches for Patient Localization during Emergency Response to Crisis Non-location-based Mobile Sensor Relocation in a Hybrid Static-Mobile Wireless Sensor Network IPv6 Label Switching on IEEE 802.15.4 An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks SENSORCOMM 29: APASN VII WSN Self-Address Collision Detection and Solving Failure Tolerance Analysis of a Small Scale Underwater Sensor Network with RF Electromagnetic Communications Adaptable Probabilistic Transmission Framework for Wireless Sensor Networks Transaction Processing for Complete Reading of Semi-passive Sensor Tag SENSORCOMM 30: APASN VII Comparisons of 6LoWPAN Implementations on Wireless Sensor Networks A Fault-Tolerant Target Location Detection Algorithm in Sensor Networks On the Energy Consumption of Fast Convergecast in Wireless Networks
SECURWARE 2009 SECURWARE 1: ARCH I Integration of a Security Product in Service-Oriented Architecture A Security Pattern for Untraceable Secret Handshakes Comparison of Static Code Analysis Tools Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model SECURWARE 2: ARCH II AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems Secrecy for Bounded Security Protocols without Freshness Check Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs SECURWARE 3: ARCH III Quantification of the Effect of Security on Performance in Wireless LANs True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots Security Management with Virtual Gateway Platforms List of Criteria for a Secure Computer Architecture SECURWARE 4: ARCH IV Detecting Man-in-the-Middle Attacks by Precise Timing Security Framework for DPWS Compliant Devices Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics Towards Proactive Policies Supporting Event-Based Task Delegation SECURWARE 5: ARCH V The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes Enforcement of Security Properties for Dynamic MAC Policies Identification of Basic Measurable Security Components for a Distributed Messaging System A Two-Step Execution Mechanism for Thin Secure Hypervisors SECURWARE 6: INFOSEC I Extending Role-Based Access Control for Business Usage Survivability and Business Continuity Management System According to BS 25999 Replay Attack of Dynamic Rights within an Authorised Domain Criteria for Evaluating the Privacy Protection Level of Identity Management Services SECURWARE 7: INFOSEC II Incorporating Software Security into an Undergraduate Software Engineering Course Phishing and Countermeasures in Spanish Online Banking Modeling Role-Based Privacy in Social Networking Services Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall SECURWARE 8: SYSSEC I A New Approach to Protect the OS from Off-line Attacks Using the Smart Card Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks Simulating a Multi-domain RFID System for Replacement Part Tracking SECURWARE 9: SYSSEC II Security in Ad Hoc Networks: From Vulnerability to Risk Management Secure Routing Approach for Unstructured P2P Systems Suspicion-Driven Formal Analysis of Security Requirements Generation of Role Based Access Control Security Policies for Java Collaborative Applications SECURWARE 10: SECTECH Fingerprint Texture Feature for Discrimination and Personal Verification A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing Runtime Protection via Dataflow Flattening SECURWARE 11: MALWA Personalized Filtering of Polymorphic E-mail Spam On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks A Threat Analysis Methodology for Security Evaluation and Enhancement Planning A Survey of Botnet and Botnet Detection SECURWARE 12: CRYPTO Forward Secure ID-Based Group Key Agreement Protocol with Anonymity The Pushdown Attack on AES Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol Analysis of a Password Strengthening Technique and Its Practical Use SECURWARE 13: ECOSEC Correlation Based Node Behavior Profiling for Enterprise Network Security A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc Networks Detection of Security and Dependability Threats: A Belief Based Reasoning Approach Social Networks Security
MESH 2009 MESH 1: Architectures and Algorithms I Integration of WiFi and WiMAX-Mesh Networks A Simple Approach on Mitigating the Gray Zone Effect to Improve Throughput in IEEE802.11 Based Ad Hoc Network Time-Driven Access and Forwarding in IEEE 802.11 Mesh Networks High Speed Ethernet Interface between TE and MT in 3GPP LTE Network MESH 2: Architectures and Algorithms II Evaluation of Scalable Proxy Mobile IPv6 in Wireless Mesh Networks Stochastic Security Performance of Active Cache Based Defense against DoS Attacks in Wireless Mesh Network Voice and Data Traffic Analysis in IEEE 802.11 DCF Infrastructure WLANs Performance Evaluation Framework for Video Applications in Mobile Networks MESH 3: Architectures and Algorithms III Application of Mechanism Design in Opportunistic Scheduling under Cognitive Radio Systems Wireless Mesh Network Planning and Optimization through Genetic Algorithms IQMESH Implementation in IQRF Wireless Communication Platform Deployment and Evaluation of a Wireless Mesh Network MESH 4: Architectures and Algorithms IV Transmit Power Control in Wireless Mesh Networks Considered Harmful A WIMAX MIMO Network Architecture Exploiting Spatial Diversity of Multiple Antenna Sites System Level Performance of Multiuser Diversity in Cooperative Relay Based OFDMA Networks FastM in WMN: A Fast Mobility Support Extension for Wireless Mesh Networks Availability of Data in Locality-Aware Unreliable Networks MESH 5: Protocols I MARE: An Efficient Reservation-Based MAC Protocol for IEEE 802.11s Mesh Networks Implementation and Experiment of Publish/Subscribe System on Wireless
Mesh Networks - Word Mouth Information Distribution Service Cross-Layer Design for Multi-power, Multi-interface Routing in Wireless Mesh IEEE 802.16 Wireless Mesh Networks Capacity Estimation Using Collision Domains MESH 6: Protocols II A Testbed Implementation of Monitoring Assisted Local Route Recovery Scheme for Wireless Mesh Networks A Multiple Channel Selection and Coordination MAC Scheme A Scalable Neighborhood Discovery Protocol for Infrastructure Wireless Mesh Networks Architecture of QoS Guaranteed Joint Design of Node-Disjoint Multipath Routing and Subcarrier Allocation in OFDMA Mesh Networks MESH 7: Applications Wireless Mesh Networking: A Key Solution for Emergency & Rural Applications Describing N2R Properties Using Ideal Graphs The Challenges of Using Wireless Mesh Networks for Earthquake Early Warning Systems
DEPEND 2009 DEPEND 1: Dependability and security I A Dependable Threshold Broadcast Encryption System for Key Distribution in Mobile Ad Hoc Network Current and Emerging Security, Trust, Dependability and Privacy Challenges in Mobile Telecommunications The Design and Analysis of IN Disaster Tolerant System Based on Birth-Death Process TMAC: Taint-Based Memory Protection via Access Control DEPEND 2: Dependability and security II An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-Key Cryptography A Secure and Survivable Architecture for SCADA Systems Quantitative Assessment for Organisational Security & Dependability Planning Dependability of Virtualised Networks DEPEND 3: Dependability and security III AFPL2, an Abstract Language for Firewall ACLs with NAT Support Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) Towards a Policy-Driven Framework for Managing Service Dependability An Appraisal to Assess the Security of Database Configurations DEPEND 4: Dependability facets I Formalizing Safety Requirements Using Controlling Automata Lock-Free Synchronization of Data Flow between Time-Triggered and Event-Triggered Activities in a Dependable Real-Time System An Investigation of Fault Tolerance Behavior of 32-Bit DLX Processor Gaining Assurance in a Voter-Verifiable Voting System DEPEND 5: Dependability facets II A Logging Approach for Effective Dependability Evaluation of Complex Systems Development of Applications Based on Security Patterns Hands on Dependability Economics Extending Test-Driven Development for Robust Web Services DEPEND 6: Dependability, adaptability, and new technologies Dynamically Configurable Membership Support for Dependable Applications in Mobile Ad Hoc Networks Almost Triggerless Writeset Extraction in Multiversioned Databases Diagnosis Service for Software Component and Its Application to a Heterogeneous Sensor Data Management System Decision Support Console for System Administration Based on an Expert System Approach Managing the Impact of On-chip Temperature on the Lifetime Reliability of Reliably Overclocked Systems Session chair: Francisco de la Torre Modelling and Evaluation of a Game-Theory Approach for Airborne Conflict Resolution in Omnet++ Statistical Model Checking for Steady State Dependability Verification Compliance and Security Governance in organizations with ICT based on SOA
AFIN 2009 AFIN 1: Internet Services and Applications The Internet and the Next Legal Paradigm: A Web-Assisted Regulatory Approach toward e-Harassment Reactive TDMA Slot Assignment Protocol in Wireless Ad Hoc Networks Reliable Key Distribution for Secure Multicast by SRDP-Sign Towards Business and IT Alignment in the Future Internet: Managing Complexity in E-Business Routing and Performance Evaluation of Dual Priority Delta Networks under Hotspot Environment Full and Autonomic Mobility Management for Mobile Agents AFIN 2: Internet Mechanisms Performance Evaluation for Multistage Interconnection Networks Servicing Multicast Traffic Self Managed Security Cell, a Security Model for the Internet of Things and Services Simulation of a P2P Application Using OverSim Low Cost Softswitch Using SIP Protocol Co-WEB: A Peer-to-Peer Based, Partially Decentralized Framework for Collaborative Web-Content Publishing POSTERS & WIPs Capability-Aware, QoS Assured, Storage as a Service for Sensor Networks: An Overview Skype-based Common Gateway Architecture for Smart Home Sensor/Appliances Networks A DHTs-Based Mapping System for Identifier and Locator Separation Network PeerLearn: A Mobile e-Learning System using DRM and Smart Cards Large-area plasma induced micropatterning of polymer surfaces |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA