Abstract is missing.
- Organizing Committee [doi]
- Program Committee [doi]
- Reviewers [doi]
- TSPUC 2005 Workshop Organization [doi]
- Message from the Workshop Co-Chairs [doi]
- ACC 2005 Workshop Organization [doi]
- ACC 2005 Workshop [doi]
- Message from the General Chairs [doi]
- Message from the Program Chairs [doi]
- Message from the Workshop Co-Chairs [doi]
- TSPUC 2005 Workshop [doi]
- Interference-Limited MAC Protocol for MANETs with Directional AntennasAman Arora, Marwan Krunz. 2-10 [doi]
- An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional AntennasGentian Jakllari, Wenjie Luo, Srikanth V. Krishnamurthy. 11-21 [doi]
- Exploiting Path Diversity in the Link Layer in Wireless Ad Hoc NetworksShweta Jain, Samir R. Das. 22-30 [doi]
- A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc NetworksManoj Pandey, Daniel Zappala. 31-41 [doi]
- An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer NetworksLuca Gatani, Giuseppe Lo Re, Salvatore Gaglio. 44-50 [doi]
- Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc NetworksLeonardo B. Oliveira, Isabela G. Siqueira, Daniel F. Macedo, Antonio Alfredo Ferreira Loureiro, Hao Chi Wong, José Marcos S. Nogueira. 51-56 [doi]
- Stable, Congestion-Controlled Application-Layer Multicasting in Pedestrian Ad-Hoc NetworksPeter Baumung. 57-64 [doi]
- Application Rate Adaptation for Mobile StreamingIgor D. D. Curcio, David Leon. 66-71 [doi]
- An Agent-Based Architecture for Handover Initiation and Decision in 4G NetworksVassilis Zafeiris, Emmanouel A. Giakoumakis. 72-77 [doi]
- DIMSUMNet: New Directions in Wireless Networking Using Coordinated Dynamic Spectrum AccessMilind M. Buddhikot, Paul Kolodzy, Scott Miller, Kevin Ryan, Jason Evans. 78-85 [doi]
- Performance Analysis of the IEEE 802.11 MAC and Physical Layer ProtocolMohammad Hossein Manshaei, Gion Reto Cantieni, Chadi Barakat, Thierry Turletti. 88-97 [doi]
- Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANsManoj K. Panda, Anurag Kumar, S. H. Srinivasan. 98-108 [doi]
- What is Wrong in Multimedia Messaging?Olli-Pekka Pohjola, Kalevi Kilkki. 109-117 [doi]
- Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic ApproachVincent Lenders, Martin May, Bernhard Plattner. 120-130 [doi]
- An Agile Approach to Distributed Information Dissemination in Mobile Ad Hoc NetworksNicholas Bauer, Michael Colagrosso, Tracy Camp. 131-141 [doi]
- Lightweight Replication Middleware for Data and Service Components in Dense MANETsPaolo Bellavista, Antonio Corradi, Eugenio Magistretti. 142-152 [doi]
- Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded SystemsKevin A. Kwiat, Kaliappa Nadar Ravindran, P. Hurley. 153-162 [doi]
- Design and Evaluation of iMesh: An Infrastructure-Mode Wireless Mesh NetworkVishnu Navda, Anand Kashyap, Samir R. Das. 164-170 [doi]
- High Throughput Routing in Hybrid Cellular and Ad-Hoc NetworksIoannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru. 171-176 [doi]
- On the Clustering Properties of Exponential Random NetworksNikhil Karamchandani, D. Manjunath, Srikanth K. Iyer. 177-182 [doi]
- Adaptive Routing for Intermittently Connected Mobile Ad Hoc NetworksMirco Musolesi, Stephen Hailes, Cecilia Mascolo. 183-189 [doi]
- Modeling and Analysis of Robust Header Compression PerformanceChia Yuan Cho, Yong Huat Chew, Winston Khoon Guan Seah. 192-197 [doi]
- A Joint Coding at Neighbor Network LayersEvgenii Krouk, Sergei Semenov. 198-204 [doi]
- Cross-Layer Design of Dynamic Resource Allocation with Diverse QoS Guarantees for MIMO-OFDM Wireless NetworksJia Tang, Xi Zhang. 205-212 [doi]
- A Generalized Algorithm for the Generation of Correlated Rayleigh Fading EnvelopesLe Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, Alfred Mertins. 213-218 [doi]
- Temporal Fairness Provisioning in Multi-Rate Contention-Based 802.11e WLANsIlenia Tinnirello, Sunghyun Choi. 220-230 [doi]
- The Wireless Hierarchical Token Bucket: A Channel Aware Scheduler for 802.11 NetworksRosario Giuseppe Garroppo, Stefano Giordano, Stefano Lucetti, E. Valori. 231-239 [doi]
- Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 NetworksIlenia Tinnirello, Sunghyun Choi, Youngsoo Kim. 240-248 [doi]
- Adaptive Resource Management for Multimedia Applications in Wireless NetworksNilanjan Banerjee, Kalyan Basu, Sajal K. Das. 250-257 [doi]
- Personalized Service Composition for Ubiquitous Multimedia DeliverySwaroop Kalasapur, Mohan Kumar, Behrooz Shirazi. 258-263 [doi]
- Supporting Semantic-Based Multimedia Data Access in Ad Hoc NetworksBo Yang, Ali R. Hurson. 264-269 [doi]
- A System Structure for Adaptive Mobile ApplicationsVincenzo De Florio, Chris Blondia. 270-275 [doi]
- A High-Throughput MAC Strategy for Next-Generation WLANsSeongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyunghun Jang, Jin-Bong Chang. 278-285 [doi]
- PARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate RadiosSuli Zhao, Zhibin Wu, Arup Acharya, Dipankar Raychaudhuri. 286-292 [doi]
- Ad-Hoc Extensions to the 802.15.3 MAC ProtocolSamir Datta, Ivan Seskar, Mustafa Demirhan, Siun-Chuon Mau, Dipankar Raychaudhuri. 293-298 [doi]
- Packet Delay Distribution of the IEEE 802.11 Distributed Coordination FunctionPaschalis Raptis, Vasileios Vitsas, Konstantinos Paparrizos, P. Chatzimisios, Anthony C. Boucouvalas. 299-304 [doi]
- Energy-Aware Routing in Wireless Ad-Hoc NetworksPanagiotis C. Kokkinos, Christos A. Papageorgiou, Emmanouel A. Varvarigos. 306-311 [doi]
- On Maximizing Lifetime of a Sensor ClusterSamar Agnihotri, Pavan Nuggehalli, H. S. Jamadagni. 312-317 [doi]
- On Topology Control of Wireless Peer-to-Peer File Sharing Networks: Energy Efficiency, Fairness and IncentiveAndrew Ka Ho Leung, Yu-Kwong Kwok. 318-323 [doi]
- Game Theoretic Power Aware Wireless Data AccessMark Kai Ho Yeung, Yu-Kwong Kwok. 324-329 [doi]
- Fast IP Handoff Support for VoIP and Multimedia Applications in 802.11 WLANsIoanna Samprakou, Christos Bouras, Theodore Karoubalis. 332-337 [doi]
- Exploiting MAC Flexibility in WiMAX for Media StreamingShamik Sengupta, Mainak Chatterjee, Samrat Ganguly, Rauf Izmailov. 338-343 [doi]
- Dynamic QoS Negotiation and Adaptation for Networked Virtual Reality ServicesLea Skorin-Kapov, Maja Matijasevic. 344-351 [doi]
- Hello Protocols for Ad-Hoc Networks: Overhead and Accuracy TradeoffsVenkata C. Giruka, Mukesh Singhal. 354-361 [doi]
- A Generic Algorithm to Improve the Performance of Proactive Ad Hoc MechanismsMona Ghassemian, Vasilis Friderikos, A. Hamid Aghvami. 362-367 [doi]
- Comparisons of Inter-Domain Routing Schemes for Heterogeneous Ad Hoc NetworksWenbin Ma, Mooi Choo Chuah. 368-373 [doi]
- Real-Time Intrusion Detection for Ad Hoc NetworksIoanna Stamouli, Patroklos G. Argyroudis, Hitesh Tewari. 374-380 [doi]
- A Friis-Based Calibrated Model for WiFi Terminals PositioningFrederic Lassabe, Philippe Canalda, Pascal Chatonnay, François Spies, Oumaya Baala. 382-387 [doi]
- Precise Distributed Localization Algorithms for Wireless NetworksSaad Biaz, Yiming Ji. 388-394 [doi]
- A Hidden Environment Model for Constructing Indoor Radio MapsZhe Xiang, Hangjin Zhang, Jian Huang, Song Song, Kevin C. Almeroth. 395-400 [doi]
- Mobile Terminal Location Discovery Schemes for a Beyond 3G Inter-Worked NetworkDaniel Morris, Paul Pangalos, A. Hamid Aghvami. 401-406 [doi]
- Flexible Power Modeling for Wireless Systems: Power Modeling and Optimization of two Bluetooth ImplementationsLuca Negri, Mariagiovanna Sami, Que Dung Tran, Davide Zanetti. 408-416 [doi]
- Power Control is not Required for Wireless Networks in the Linear RegimeBozidar Radunovic, Jean-Yves Le Boudec. 417-427 [doi]
- Integrated Power Control and Rate Allocation for Radio Resource Management in Uplink Wideband CDMA SystemsLian Zhou, Jon W. Mark. 428-436 [doi]
- A Power Allocation Algorithm for Throughput Maximization in Mobile NetworksEnzo Baccarelli, Mauro Biagi, Cristian Pelizzoni, Nicola Cordeschi, Fabio Garzia. 437-445 [doi]
- Java-Based Proactive Buffering for Multimedia Streaming Continuity in the Wireless InternetPaolo Bellavista, Antonio Corradi, Luca Foschini. 448-450 [doi]
- Unicast, Multicast and Hybrid Architectures for Error Resilient Video StreamingStefania Colonnese, Gianpiero Panci, Gaetano Scarano. 451-453 [doi]
- VARS: A Vehicle Ad-Hoc Network Reputation SystemFlorian Dotzer, Lars Fischer, Przemyslaw Magiera. 454-456 [doi]
- Service Discovery in Mobile Ad Hoc NetworksZhong Fan, Eduardo Guerreiro Ho. 457-459 [doi]
- Adaptive Scheduling of MPEG Video Frames during Real-Time Wireless Video StreamingSergei Kozlov, Peter van der Stok, Johan Lukkien. 460-462 [doi]
- Bridging the Gap between Multimedia Applications and Heterogeneous Networks Using a Market-Based MiddlewareJohan Kristiansson, Jeremiah Scholl, Peter Parnes. 463-465 [doi]
- FR-MAC: A Frame Relay MAC for Capacity and Throughput Enhancements in Multi-Rate Wireless LANsDong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh. 466-468 [doi]
- Handoff Prediction by Mobility Characteristics in Wireless Broadband NetworksLi-Liann Lu, Jean-Lien C. Wu. 469-471 [doi]
- nk-Nearest Neighbor Algorithm for Estimation of Symbolic User Location in Pervasive Computing EnvironmentsTeddy Mantoro, C. W. Johnson. 472-474 [doi]
- ALCA: A New Scheme for Power Control on 802.11 Ad Hoc NetworksAlexandre Andrade Pires, José Ferreira de Rezende, Carlos de M. Cordeiro. 475-477 [doi]
- Context-Aware Service Discovery in Heterogeneous NetworksPierre-Guillaume Raverdy, Valérie Issarny. 478-480 [doi]
- Towards an Asynchronous Dissemination and a Safe Deployment of Lightweight Programs in Mobile NetworksHervé Roussain, Nicolas Le Sommer, Frédéric Guidec. 481-483 [doi]
- Provisioning Radio Access Networks for Effective QoS Management: Capacity Gains of Service Differentiation in UTRANDavid Soldani, Kari Sipilä, Achim Wacker. 484-486 [doi]
- Message Ferrying for Constrained ScenariosRamesh Viswanathan, Jing (Tiffany) Li, Mooi Choo Chuah. 487-489 [doi]
- Providing Throughput Guarantees in WLANs Using ACKSLuca Vollero. 490-492 [doi]
- Autonomic and Load-Adaptive Optimization of Beacon Exchange Rate for Proactive Configuration in Ubiquitous MANETsMudasser Iqbal, Iqbal Gondal, Laurence Dooley. 497-501 [doi]
- A Self-Managed Scheme for Free Citywide Wi-FiElias C. Efstathiou, George C. Polyzos. 502-506 [doi]
- Reducing Inter-Cluster TDMA Interference by Adaptive MAC Allocation in Sensor NetworksTao Wu, Subir K. Biswas. 507-511 [doi]
- An Efficient and Reliable Routing Protocol for Wireless Sensor NetworksLoh Keong, Long Huan, Pan Yi. 512-516 [doi]
- QoS and Routing in the Cognitive Packet NetworkErol Gelenbe, Peixiang Liu. 517-521 [doi]
- Autonomic Resource Management for Extensible Control PlanesBushar Yousef, Doan B. Hoang, Glynn Rogers. 522-526 [doi]
- A Framework for Dynamic Service CompositionParamai Supadulchai, Finn Arve Aagesen. 527-531 [doi]
- Intuitive Human Governance of Autonomic Pervasive Computing EnvironmentsTony O Donnell, David Lewis, Vincent Wade. 532-536 [doi]
- An Autonomic Approach to Denial of Service DefenceErol Gelenbe, Michael Gellman, George Loukas. 537-541 [doi]
- Robust Distributed Systems Achieving Self-Management through InferenceWillem de Bruijn, Herbert Bos, Henri E. Bal. 542-546 [doi]
- Reputation Management for Collaborative Content DistributionAnurag Garg, Roberto G. Cascella. 547-552 [doi]
- Adaptive Runtime Verification for Autonomic Communication InfrastructuresGiovanni Denaro, Leonardo Mariani, Mauro Pezzè, Davide Tosi. 553-557 [doi]
- The Mobility Service Packs of the European Space Agency (Invited talk)Stefano Zatti. 563-564 [doi]
- Policy Conflict Analysis Using Tableaux for On Demanc VPN FrameworkHiroaki Kamoda, Akihiro Hayakawa, Masaki Yamaoka, Shigeyuki Matsuda, Krysia Broda, Morris Sloman. 565-569 [doi]
- The Wireless Opaque Channel to Contrast Information LeakageMarco Domenico Aime, Andrea S. Atzeni, Antonio Lioy. 570-575 [doi]
- An Efficient Group Key Agreement Protocol for Ad Hoc NetworksDaniel Augot, Raghav Bhaskar, Valérie Issarny, Daniele Sacchetti. 576-580 [doi]
- Hybrid Key Establishment for Multiphase Self-Organized Sensor NetworksPanayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos. 581-587 [doi]
- On Using Peer Profiles to Create Self-Organizing P2P NetworksElizabeth M. Daly, Alan Gray, Mads Haahr. 588-592 [doi]
- Small Worlds and the Security of Ubiquitous ComputingHarald Vogt. 593-597 [doi]
- A Statistical Matching Approach to Detect Privacy Violation for Trust-Based CollaborationsMohamed Ahmed, Daniele Quercia, Stephen Hailes. 598-602 [doi]
- Incremental Trust: Building Trust from Past ExperienceMarco Domenico Aime, Antonio Lioy. 603-608 [doi]
- How Trusted Computers can Enhance for Privacy Preserving Mobile ApplicationsSiani Pearson. 609-613 [doi]
- Location Privacy through Secret Sharing TechniquesGiannis F. Marias, C. Delakouridis, L. Kazatzopoulos, Panagiotis Georgiadis. 614-620 [doi]