|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PRELIMINARY PROGRAM SENSORCOMM 2008 - SECURWARE 2008 - MESH 2008 DEPEND 2008 - UNWAT 2008 - ENOPT 2008 Monday, August 25
Tuesday, August 26
Wednesday, August 27
Thursday, August 28
Friday, August 29
Saturday, August 30
DETAILED PROGRAM SENSOR 1: Architectures, Protocols and Algorithms I A Fast Distributed Target Tracking Algorithm for Low Density Binary Sensor Networks Designing Redundancy toward Building Easily Manageable Wireless Sensor Networks for Humans Efficient Medium Access Protocol for Wireless Sensor Networks A Collision-Free Scheduling Scheme for Sensor Networks Arranged in Linear Topologies and Using Directional Antennas SENSOR 2: Architectures, Protocols and Algorithms II Efficient Multiplexing for Multichannel Data Dissemination with Delay Guarantees in Wireless Sensor Networks TDMA Protocol Requirements for Wireless Sensor Networks Experimental Applications of Hierarchical Mapping Services in Wireless Sensor Networks An Optimized RFID-Based Academic Library SENSOR 3: Architectures, Protocols and Algorithms III Low Energy Consumption MAC Protocol for Wireless Sensor Networks Virtual Full Replication for Scalable and Adaptive Real-Time Communication in Wireless Sensor Networks Localized Topology Control Algorithm with No Geometric Information for Ad Hoc Sensor Networks GPS-Free Disaster-Scale Mapping and Energy-Efficient Alerting Scheme in a Wireless Sensor Network Key Management Mechanisms in Wireless Sensor Networks SENSOR 4: Architectures, Protocols and Algorithms IV A Case for an Overlay Routing on Top of MAC Layer for WSN Accuracy-Driven Synchronization Protocol RFID Transponder in X-Band and Its Feasibility Slotted Beacon Scheduling Using ZigBee Cskip Mechanism SENSOR 5: Architectures, Protocols and Algorithms V PL-MAC: ProLonging Network Lifetime with a MAC Layer Approach in Wireless Sensor Networks Performance Analysis of CGS, a k-Coverage Algorithm Based on One-Hop Neighboring Knowledge Selective Pulse Coupling Synchronicity for Sensor Network A Multi-agent Geosimulation Approach for Sensor Web Management Lightweight Particle Filters Based Localization Algorithm for Mobile Sensor Networks SENSOR 6: Architectures, Protocols and Algorithms VI Configuration of Sensor Networks by Energy Minimisation A Combined Routing Layer for Wireless Sensor Networks and Mobile Ad-Hoc Networks Using MANET Protocols in Wireless Sensor and Actor Networks Optimal Beacon Scheduling Scheme for Cluster-Tree WPANs SENSOR 7: Architectures, Protocols and Algorithms VII Exploiting and Handling Delayed Measurements in Sensor Systems AMoQoSA: Adaptive Modular QoS Architecture for Wireless Sensor Networks A Fault Tolerant Wired/Wireless Sensor Network Architecture for Monitoring Pipeline Infrastructures A New Multi Level Clustering Model to Increase Lifetime in Wireless Sensor Networks SENSOR 8: Deployments and Implementations I Experiments in Data Management for Wireless Sensor Networks Human-Assisted Calibration of an Angulation Based Indoor Location System Wireless Sensor Network in Environmental Monitoring - Case Foxhouse A Wireless Sensor Network Application Requirements Taxonomy SENSOR 9: Deployments and Implementations II Communication-Aware Deployment for Wireless Sensor Networks An Experimental Study on Home-Wireless Passive Positioning Sensor Networks for Transient Public Events ZigBee Sensor Network for Patient Localization and Air Temperature Monitoring During Emergency Response to Crisis A Topology-Oriented Solution Providing Accuracy for Outdoors RSS-Based Tracking in WSNs SENSOR 10: Deployments and Implementations III Building Sensor Networks with Distributed Intelligence Using Java RMI Wireless Sensor Networks Power-Aware Deployment Wireless Sensor Networks for Off-shore Oil and Gas Installations Deployment and Implementation of an Agricultural Sensor Network SENSOR 11: Deployments and Implementations IV A Multisensor Proposal for Wireless Sensor Networks Real-Time Relative Positioning with WSN Using WSN Technology for Industrial Monitoring: A Real Case Development & Demonstration of the Utility of Wireless Environmental Sensors Incorporating a Multi-hop Protocol SENSOR 12: Energy, Management and Control I Decentralized Node Selection for Localization in Wireless Unattended Ground Sensor Networks A Balanced Parallel Clustering Protocol for Wireless Sensor Networks Using K-Means Techniques Energy-Efficient Predictive Jamming Holes Detection Protocol for Wireless Sensor Networks Energy Efficient Selection of Computing Elements in Wireless Sensor Networks SENSOR 13: Energy, Management and Control II A Survey on System-Level Techniques for Power Reduction in Field Programmable Gate Array (FPGA)-Based Devices A Rule Learning Approach to Energy Efficient Clustering in Wireless Sensor Networks Improving Lifetime and Coverage through Mobile Beacon for High Density Sensor Networks Improving Reliability in Multi-hop Body Sensor Networks SENSOR 14: Energy, Management and Control III Design and Analysis of Intelligent Sink for the Information Retrieval in Sensor Networks Goals and Policies for Sensor Network Management Self-Adapating Maxflow Routing for Autonomous Wireless Sensor Networks Advanced Concentric-Clustering Routing Scheme Adapted to Large-Scale Sensor Networks SENSOR 15: Sensor Circuits and Sensor Devices I Surface-Trace Feasibility for IR-Based Position-Sensing Devices Surface Plasmon Resonance Gas Sensors Using Au-WO3-x Nanocomposite Films Using Preemption in Event Driven Systems with a Single Stack Deformation Reduction of a MEMS Sensor by Stress Balancing of Multilayer SENSOR 16: Sensor Circuits and Sensor Devices II A Novel Interface Circuit for Capacitive Sensors Using Correlated Double Sampling Demodulation Technique Experimental Analysis of Wireless Sensor Nodes Current Consumption Design and Analysis of a Novel Wireless Passive Microsensor Based on the SAW Theory Co-design of Antenna Element and Ground Plane for Printed Monopoles Embedded in Wireless Sensors SENSOR 17: Data Allocation and Information I Broadening the Concept of Aggregation in Wireless Sensor Networks Finding Aggregation Tree with Genetic Algorithm for Network Correlated Data Gathering Cross-Layer Design for Distributed Source Coding in Wireless Sensor Networks SENSOR 18: Data Allocation and Information II Query’s Reply Generating from Sensors Regarding the Consumer’s Constraints. Application Using MAS An Algorithm for Estimating the ICA Model Based on the Cebysev Coefficients Semantic Sensor Information Description and Processing SENSOR 19: Performance, Simulation and Modeling I SDMA: A Simulation-Driven Dynamic Memory Allocator for Wireless Sensor Networks Survey of Standardized ISO 18000-6 RFID Anti-collision Protocols Performance Enhancement in a Low Rate Wireless PAN Min Loading Max Reusability Fusion Classifiers for Sensor Data Model Energy Efficiency Analysis of p-Persistent CSMA and the Effect of Sleeping Periods in a Distributed Sensor Topology SENSOR 20: Performance, Simulation and Modeling II Performance Evaluation of Priority Packet for Wireless Sensor Network Performance Evaluation of Synchronous and Asynchronous MAC Protocols for Wireless Sensor Networks Modeling Power in Multi-functionality Sensor Network Applications Towards the Implementation of an Awareness Tool Based in a Collaborative Model for WSNs, Using XML SENSOR 21: Software, Applications and Programming I A Method of Advertisement Selection in Multiple RFID-Tags Sensor Network for a Ubiquitous Wide-Area Advertising Service Coarse-Grain Data Gathering in Continuous Query for Periodical Phenomena in Wireless Sensor Networks Medical Asset Tracking Application with Wireless Sensor Networks Rethinking Link-Level Abstractions for Sensor Networks Global Accessible Objects (GAOs) in the Ambicomp Distributed Java Virtual Machine SENSOR 22: Software, Applications and Programming II Using Mobile Agents as Enabling Technology for Wireless Sensor Networks Using a .NET Checkability Profile to Limit Interactions between Embedded Controllers A Web Services-Based Infrastructure for Traffic Monitoring Using ZigBee Back-Propagation of Constraints from Consumer to Producer SENSOR 23: Software, Applications and Programming III A Survey on Sensor Webs Simulation Tools Rule Execution and Event Distribution Middleware for PROSEN-WSN Application Scenario for NFC: Mobile Tool for Industrial Worker CMT: An Equivalent Circuit Modeling Tool for Ultrasonic Transducer Anatomy of RTOS and Analyze the Best-Fit for Small, Medium and Large Footprint Embedded Devices in Wireless Sensor Network SENSOR 24: Radio Issues in Wireless Sensor Networks RF Propagation Simulation in Sensor Networks Interference Management in Wireless Sensor Networks, Part I: Dynamic Semi-distributed Mechanisms Efficient Wireless Level Identification Technique Based on Discrete Electromagnetic Coupling and Radiation Real-World Performance of Clear Channel Assessment in 802.15.4 Wireless Sensor Networks SENSOR 25: Security and Monitoring I Storage Requirements for Key Distribution in Sensor Networks TLA: A Tow Level Architecture for Key Management in Wireless Sensor Networks An Enhanced Misused Key Detection Mechanism in Wireless Sensor Networks DVD: A Secure Unicast Based Pairwise Key Generation Scheme for Wireless Sensor Networks SENSOR 26: Security and Monitoring II Simple Dynamic User Authentication Protocols for Wireless Sensor Networks TSCD: A Novel Secure Localization Approach for Wireless Sensor Networks Area-Efficient Processor for Public-Key Cryptography in Wireless Sensor Networks On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack SENSOR 27: UNWAT I Modeling Underwater Communication Links The Acoustic Detection System AMADEUS as Part of the ANTARES Neutrino Telescope Estimating the Number and Distribution of the Neighbors in an Underwater Communication Network Transmission Capacity of Underwater Sensor Networks: A Case for Fixed Distance SENSOR 28: UNWAT II System of Reciprocal Acoustic Sensors for Monitoring Sea Currents Multi Stage Underwater Sensor Localization Using Mobile Beacons Underwater Acoustic Communications and Networks for the US Navy's Seaweb Program SENSOR 29: ENOPT Non-uniform Entropy Compression for Uniform Energy Distribution in Wireless Sensor Networks Energy Efficient Motion Detection of Elderly Living at Home Energy Minimization for Flat Routing and Hierarchical Routing for Wireless Sensor Networks MESH I Opportunistic Protocols in Multi-rate Environments Effect of Propagation Models on Ad Hoc Networks Routing Protocols A Non-TPC Based Enhanced Topology Control Process for Multi-radio Wireless Mesh Networks A Distributed Coordination Protocol for the Connectivity Maintenance in a Network of Mobile Units Secure & Rapid Composition of Infrastructure Services in the Cloud MESH II Routing Fairness Model for QoS Optimization in Wireless Network Performance and Complexity Evaluation of Multi-path Routing Algorithms for MPLS-TE Applied on Large Scales Topologies A Distributed QoS MAC Protocol for Wireless Mesh Performance Evaluation of Structured P2P over Wireless Multi-hop Networks MESH III Architecture for the Internet of Things (IoT): API and Interconnect A Path Selection Method in IEEE 802.16j Mobile Multi-hop Relay Networks Applications and Challenges of Multi-band Gigabit Mesh Networks A Reverse Engineering Approach for the Web Service Modeling Ontology Specifications Dynamic Multipath Allocation in Ad Hoc Networks MESH IV Fast Handover Solution Using Multi-tunnel in HMIPv6 (FM-HMIPv6) Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Swift Start TCP, Problems, Modification, Analytical and Simulation Studies SECURWARE 1: Frameworks, Architectures and Protocols I Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques A Secure Task Delegation Model for Workflows Formal Modeling of Authentication in SIP Registration Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments SECURWARE 2: Frameworks, Architectures and Protocols II A New Approach for Secure and Portable OS Distack - A Framework for Anomaly-Based Large-Scale Attack Detection Team-Based MAC Policy over Security-Enhanced Linux Prototyping a New Identity Authentication Framework for IP Telephony Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets SECURWARE 3: Frameworks, Architectures and Protocols III Security Patterns for Capturing Encryption-Based Access Control to Sensor Data Security Policy Management for Peer Group Meetings FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks Proving Trust Locally A Security Framework for Input Validation SECURWARE 4: System Security Defending E-Banking Services: Antiphishing Approach Preventing Insider Information Leakage for Enterprises Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic Scalable Detection of SIP Fuzzing Attacks Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack SECURWARE 5: Malware & Security The Automatic Discovery, Identification and Measurement of Botnets A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy Email Worm Mitigation by Controlling the Name Server Response Rate Anti-counterfeiting with a Random Pattern Efficient Anomaly Detection System for Mobile Handsets SECURWARE 6: Ecosystem Security and Trust Providing Secure Access to Unsecure Web Services Towards Decentralised Security Policies for e-Health Collaborations Rating Agencies Interoperation for Peer-to-Peer Online Transactions Optimal Trust Network Analysis with Subjective Logic From Monitoring Templates to Security Monitoring and Threat Detection SECURWARE 7: Cryptography A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks Family of Parameterized Hash Algorithms Public Key Cryptography: A Dynamical Systems Perspective A Related-Key Attack on TREYFER SECURWARE 8: Information Security I Security and Adoption of Internet Payment Systems Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001 Generic and Complete Three-Level Identity Management Model A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography A New Anti-phishing Method in OpenID SECURWARE 9: Information Security II Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality Designing an Undergraduate Software Security Course High-Speed Private Information Retrieval Computation on GPU Vulnerability Dependencies in Antivirus Software SECURWARE 10: Information Security III Security Governance for Enterprise VoIP Communication ToLeRating UR-STD Collaborative Approach to Automatic Classification of Heterogeneous Information Security Infusing Information Assurance into an Undergraduate CS Curriculum SECURWARE 11: Profiling Data Mining On the Portability of Trained Machine Learning Classifiers for Early Application Identification Activity- and Inactivity-Based Approaches to Analyze an Assisted Living Environment Analysis of Computer Infection Risk Factors Based on Customer Network Usage DEPEND I Design-Time Learning for Operational Planning Improvement Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems Generation of Diagnostic Plans for Large ICT Systems DEPEND II Dependability Analysis of Information Systems with Hierarchical Reconfiguration of Services Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation Towards the Definition of a Web Service Based Management Framework Dependability and Security Metrics in Controlling Infrastructure DEPEND III Advanced Rule-Based Techniques in Mission Critical Systems Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates Event-Driven Architecture for Intrusion Detection Systems Based on Patterns Agent Based Approach to Events Monitoring in Complex Information Systems DEPEND IV A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols On System Security Metrics and the Definition Approaches Policy-Driven System Configuration for Dependability A Dependability Case Approach to the Assessment of IP Networks |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA