Abstract is missing.
- Dynamic Channel Assignment and Link Scheduling in Multi-Radio Multi-Channel Wireless Mesh NetworksHua Yu, Prasant Mohapatra, Xin Liu. 1-8 [doi]
- Battery-Aware Embedded GPS Receiver NodeDejan Raskovic, David Giessel. 1-6 [doi]
- Asynchronous Self-Localization of Sensor Networks with Large Clock DriftChunpeng Yan, H. Howard Fan. 1-8 [doi]
- Temporary Interconnection of ZigBee Personal Area Network (PAN)Sewook Jung, Alexander Chang, Mario Gerla. 1-5 [doi]
- An Energy Efficiency Scheme Using Local SNR for Clustered Wireless Sensor NetworksQianyu Ye, Yu Liu, Lin Zhang, Chan-Hyun Youn. 1-4 [doi]
- Optimal Relay Node Fault RecoveryFei Che, Liang Zhao, Errol L. Lloyd. 1-8 [doi]
- A Low-delay Protocol for Multihop Wireless Body Area NetworksBenoît Latré, Bart Braem, Ingrid Moerman, Chris Blondia, Elisabeth Reusens, Wout Joseph, Piet Demeester. 1-8 [doi]
- Optimistic fair exchange for secure forwardingMelek Önen, Abdullatif Shikfa, Refik Molva. 1-5 [doi]
- High Performance AODV Routing Protocol for Hybrid Wireless Mesh NetworksAsad Amir Pirzada, Marius Portmann. 1-5 [doi]
- Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop ClusteringWei Gao. 1-8 [doi]
- Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile NodesGregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Christopher B. Mayer, Rusty O. Baldwin. 1-8 [doi]
- Content Source Selection in Bluetooth NetworksLiam McNamara, Cecilia Mascolo, Licia Capra. 1-8 [doi]
- A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc NetworksMooi Choo Chuah, Peng Yang, Jianbin Han. 1-8 [doi]
- Reliable Data Gathering in Tree-Based IEEE 802.15.4 Wireless Sensor NetworksDaniele Messina, Marco Ortolani, Giuseppe Lo Re. 1-7 [doi]
- Cross Layer Design for Enhanced Quality Routing in Personal Wireless NetworkingJinglong Zhou, Martin Jacobsson, Ignas G. Niemegeers. 1-8 [doi]
- IMOGA: An Architecture for Integrating Mobile Devices into Grid ApplicationsErsan Ozturk, D. Turgay Altilar. 1-8 [doi]
- A Distributed Topology Control Algorithm in the Presence of Multipath PropagationHarish Sethu, Thomas Gerety. 1-8 [doi]
- Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc NetworksShanshan Jiang, Yuan Xue, Douglas C. Schmidt. 1-8 [doi]
- Using Semantic Policies to Reason over User AvailabilitySandford Bessler, Joachim Zeiss. 1-5 [doi]
- A Wireless Sensor Network and Incident Command Interface for Urban FirefightingJoel Wilson, Vikas Bhargava, Andrew Redfern, Paul K. Wright. 1-7 [doi]
- On Adjusting Power to Defend Wireless Networks from JammingWenyuan Xu. 1-6 [doi]
- Poster: Scalable Service-Oriented Telemetry Acquisition and DistributionJuhee Bae, Young Ju Tak, Wonil Lee, Christopher Howson, Jonathan Munson. 1-3 [doi]
- An Efficient Bi-directional Routing Protocol for Wireless Sensor NetworksInwhee Joe, Taewon Ahn. 1-4 [doi]
- DETOUR: Delay- and Energy-Aware Multi-Path Routing in Wireless Ad Hoc NetworksNadine Shillingford, David Salyers, Christian Poellabauer, Aaron Striegel. 1-8 [doi]
- Securing inter-cluster communication in Personal NetworksAssed Jehangir, Sonia M. Heemstra de Groot. 1-6 [doi]
- An Alamouti Coded Cooperative Transmission Robust to Both Timing Errors and Frequency OffsetsZheng Li, Xiang-Gen Xia. 1-5 [doi]
- Time Division Flooding Synchronization Protocol for Sensor NetworksYi Zeng, Bo Hu, Hui Feng. 1-8 [doi]
- Efficient User Controlled Inter-Domain SIP Mobility Authentication, Registration, and Call RoutingJoud Khoury, Henry N. Jerez, Chaouki T. Abdallah. 1-7 [doi]
- Bypassing Bluetooth Device Discovery Using a Multimodal User InterfaceJonathan Engelsma, James C. Ferrans. 1-9 [doi]
- Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 NetworksRafael Marín López, Ashutosh Dutta, Yoshihiro Ohba, Henning Schulzrinne, Antonio F. Gómez-Skarmeta. 1-8 [doi]
- Towards Touching Interaction: A Simple Explicit InputGabriel Chavira, Salvador W. Nava, Ramón Hervás, José Bravo, Carlos Sanchez. 1-5 [doi]
- Musicology: Bringing Personal Music into Shared SpacesTrevor Pering, Roy Want, Lamar Gardere, Kristin Vadas, Evan Welbourne. 1-8 [doi]
- Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and ReliabilityRenita Machado, Sirin Tekinay. 1-8 [doi]
- The Analysis of Publish/Subscribe Systems over Mobile Wireless Ad Hoc NetworksThadpong Pongthawornkamol, Klara Nahrstedt, Guijun Wang. 1-8 [doi]
- NORS: An Open Source Platform to Facilitate Participatory Sensing with Mobile PhonesDirk Trossen, Dana Pavel. 1-8 [doi]
- Secure Data Transmission of Wireless Sensor Network Based on Information HidingXiangrong Xiao, Xingming Sun, Lincong Yang, Minggang Chen. 1-6 [doi]
- Improving Wireless Positioning with Look-ahead Map-MatchingKipp Jones, Ling Liu, Farshid Alizadeh-Shabdiz. 1-8 [doi]
- Design and Evaluation of a Hybrid Physical Space Service for Pervasive Computing ApplicationsNancy Miller, Peter Steenkiste. 1-8 [doi]
- Using Weighted Graphs for Computationally Efficient WLAN Location DeterminationRene Hansen, Bent Thomsen. 1-5 [doi]
- Anonymous Data Collection in Sensor NetworksJames Horey, Michael M. Groat, Stephanie Forrest, Fernando Esponda. 1-8 [doi]
- Smart Tracker: Light Weight Infrastructure-less Assets Tracking solution for Ubiquitous Computing EnvironmentNilothpal Talukder, Sheikh Iqbal Ahamed, Rezaul M. Abid. 1-8 [doi]
- Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc NetworksTong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty. 1-8 [doi]
- Anomaly-Based Behavior Analysis of Wireless Network SecuritySamer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu. 1-8 [doi]
- Hierarchical Trustworthy Authentication for Pervasive ComputingHannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang. 1-3 [doi]
- Application Based Distance Measurement for Context Retrieval in Ubiquitous ComputingShaxun Chen, Tao Gu, XianPing Tao, Jian Lu. 1-7 [doi]
- Distributed Service Deployment in Mobile Ad-Hoc NetworksArtin Avanes, Johann Christoph Freytag, Christof Bornhövd. 1-8 [doi]
- Privacy Infusion in Ubiquitous ComputingGautham V. Pallapa, Mohan Kumar, Sajal K. Das. 1-8 [doi]
- An Efficient Context-Aware Coordination Model for Ubiquitous ComputingR. Sudha, M. R. Rajagopalan, S. Sridevi, S. Thamarai Selvi. 1-6 [doi]
- A User-centered Approach to Context-awareness in Mobile ComputingYaser Mowafi, Dongsong Zhang. 1-3 [doi]
- Secure Multiple Deployment in Wireless Sensor NetworksGuorui Li, Jingsha He, Yingfang Fu. 1-4 [doi]
- A new Routing & Mobility Management Solution for Wireless Mesh NetworkMehdi Sabeur, Ghazi Al Sukkar, Badii Jouaber, Djamal Zeghlache, Hossam Afifi. 1-3 [doi]
- Privacy Challenges in Context-sensitive Access Control for Pervasive Computing EnvironmentSheikh Iqbal Ahamed, Nilothpal Talukder, Munirul M. Haque. 1-6 [doi]
- Demo: Sensor Relocation with Mobile SensorsJie Teng, Guohong Cao, Thomas F. La Porta. 1-3 [doi]
- TRULLO - local trust bootstrapping for ubiquitous devicesDaniele Quercia, Stephen Hailes, Licia Capra. 1-9 [doi]
- A Framework for the Self-organization of Personal NetworksWeidong Lu, R. Venkatesha Prasad, Anthony Lo, Ignas G. Niemegeers. 1-8 [doi]
- A SpatioTemporal Placement Model for Caching Location Dependent QueriesAnand Murugappan, Ling Liu. 1-8 [doi]
- Energy-efficient Tracking of Mobile Objects with Early Distance-based ReportingTobias Farrell, Ralph Lange, Kurt Rothermel. 1-8 [doi]
- Spatial Indexing for Location-Aware SystemsRobert K. Harle. 1-8 [doi]
- On Improving Dynamic Source Routing for Intermittently Available Nodes in MANETsPramita Mitra, Christian Poellabauer, Shivajit Mohapatra. 1-5 [doi]
- Cooperative Dynamic Voltage Scaling using Selective Slack Distribution in Distributed Real-Time SystemsDinesh Rajan, Christian Poellabauer, Andrew Blanford, Bren Mochocki. 1-8 [doi]
- First experiences with Personal Networks as an enabling platform for service providersFrank T. H. den Hartog, M. A. Blom, C. R. Lageweg, M. E. Peeters, J. R. Schmidt, R. van der Veer, A. de Vries, M. R. van der Werff, Qian Tao, Raymond N. J. Veldhuis, N. H. G. Baken, F. Selgert. 1-8 [doi]
- Contextual Usage-Level Analysis of Mobile ServicesHannu Verkasalo. 1-8 [doi]
- Large Surface Area Electronic Textiles for Ubiquitous Computing: A System ApproachDavid Graumann, Giuseppe Raffa, Meghan Quirk, Braden Sawyer, Justin Chong, Mark Jones, Thomas Martin. 1-8 [doi]
- Route Discovery in Mobile Ad Hoc Networks: From Unilaterality to BilateralityRendong Bai, Mukesh Singhal. 1-8 [doi]
- Demo: Implementation of Information-Provision Service with Smart Phone and Field Trial in Shopping AreaMichiharu Takemoto, Yuki Yokohata, Tetsuro Tokunaga, Makoto Hamada, Toshirou Nakamura. 1-3 [doi]
- Securing Cooperative Transmission in Wireless CommunicationsZhu Han, Yan Lindsay Sun. 1-6 [doi]
- Lightweight and Distributed Algorithms for Efficient Data-Centric Storage in Sensor NetworksGhazi Al Sukkar, Hossam Afifi, Sidi-Mohammed Senouci. 1-3 [doi]
- A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency ApplicationsLeszek Lilien. 1-8 [doi]
- Combining GPS and GSM Cell-ID positioning for Proactive Location-based ServicesNico Deblauwe, Peter Ruppel. 1-7 [doi]
- Design and Implementation of a VIPSec Based ApplicationSpyros Kopsidas, Dimitris Zisiadis, Leandros Tassiulas. 1-6 [doi]
- Self-Managed Cell: A Middleware for Managing Body-Sensor NetworksSye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P. Twidle, Alberto E. Schaeffer Filho, Morris Sloman, Steven Heeps, Stephen Strowes, Joseph S. Sventek. 1-5 [doi]
- Key Establishment Using Secure Distance Bounding ProtocolsDave Singelée, Bart Preneel. 1-6 [doi]
- Poster: P2P search routing concepts for mobile object trackingMaximilian Michel, Zoran Despotovic, Wolfgang Kellerer, Qing Wei, Jörg Widmer, Norihiro Ishikawa, Takeshi Kato, Tomoyuki Osano. 1-3 [doi]
- Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)Albena Mihovska, Neeli R. Prasad. 1-5 [doi]
- A Ubiquitous Context-Aware Environment for Surgical TrainingPatricia Ordonez, Palanivel Balaji Kodeswaran, Vlad Korolev, Wenjia Li, Onkar Walavalkar, Ben Elgamil, Anupam Joshi, Tim Finin, Yelena Yesha, I. George. 1-6 [doi]