Sciweavers

WIMOB
2008
IEEE
14 years 6 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
WIMOB
2008
IEEE
14 years 6 months ago
Improving User Satisfaction in a Ubiquitous Computing Application
—The Smart Party is a ubiquitous computing application based on the Panoply middleware. The Smart Party allows attendees at a party to transparently participate in the selection ...
Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L...
WIMOB
2008
IEEE
14 years 6 months ago
Rate Allocation with Lifetime Maximization and Fairness for Data Aggregation in Sensor Networks
—We consider the rate allocation problem for data aggregation in wireless sensor networks with two objectives: 1) maximizing the lifetime of a local aggregation cluster and, 2) a...
Shouwen Lai, Binoy Ravindran, Hyeonjoong Cho
WIMOB
2008
IEEE
14 years 6 months ago
Proportional Fairness for MIMO Multi-user Schedulers with Traffic Arrival Process
—Packet scheduling at the data link layer may impact significantly the overall performance of a wireless system using multiple antennas. In this paper, we propose a novel packet ...
Masoomeh Torabzadeh, Wessam Ajib
WIMOB
2008
IEEE
14 years 6 months ago
Authentication in a Multi-access IMS Environment
– The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. Thi...
Do Van Thanh, Ivar Jørstad, Paal E. Engelst...
WIMOB
2008
IEEE
14 years 6 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
WIMOB
2008
IEEE
14 years 6 months ago
Movement and Connectivity Algorithms for Location-Based Mobile Social Networks
In this paper we present a novel algorithm aiming at connecting members of a community equipped with mobile devices based on their location. Initially, these users are far from ea...
Bayrem Chelly, Naceur Malouch
WIMOB
2008
IEEE
14 years 6 months ago
A Multi-Sensing-Range Method for Position Estimation of Passive RFID Tags
— Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the ...
Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Norie Uc...
WIMOB
2008
IEEE
14 years 6 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao