Abstract is missing.
- Message from the Workshop Organizers - TSPUC 2006 [doi]
- MDC 2006 Workshop Organization [doi]
- Message from the Workshop Organizers - MDC 2006 [doi]
- Message from the TPC Chairs [doi]
- Message from the Workshop Organizer - EXPONWIRELESS 2006 [doi]
- Reviewers [doi]
- TSPUC 2006 Workshop Organization [doi]
- Program Committee [doi]
- Message from the Workshop Chair [doi]
- Message from the Workshop Organizers - ACC 2006 [doi]
- Message from the General Chairs [doi]
- Organizing Committee [doi]
- MDC Reviewers [doi]
- ACC 2006 Workshop Organization [doi]
- EXPONWIRELESS 2006 Workshop Organization [doi]
- Multiple-Access Insights from Bounds on Sensor LocalizationSwaroop Venkatesh, R. Michael Buehrer. 3-12 [doi]
- An Energy-Efficient Data-Dissemination Protocol inWireless Sensor NetworksZehua Zhou, Xiaojing Xiang, Xin Wang. 13-22 [doi]
- Entrapping Adversaries for Source Protection in Sensor NetworksYi Ouyang, Zhengyi Le, Guanling Chen, James Ford, Fillia Makedon. 23-34 [doi]
- Group-Based Medium Access for Next-GenerationWireless LANsZakhia G. Abichar, J. Morris Chang, Daji Qiao. 35-41 [doi]
- AISLE: Autonomic Interface SeLEction for Wireless UsersClaudio Casetti, Carla-Fabiana Chiasserini, Roberta Fracchia, Michela Meo. 42-48 [doi]
- MCMSDA: A Multi-Channel Multi-Sector Directional Antenna Wireless LANYong Huang, Weibo Gong, Dev Gupta. 49-58 [doi]
- Cross-Layer Resource-Consumption Optimization for Mobile Multicast in Wireless NetworksQinghe Du, Xi Zhang. 59-65 [doi]
- Evaluating Different One to Many Packet Delivery Schemes for UMTSAntonios G. Alexiou, Dimitrios Antonellis, Christos Bouras. 66-72 [doi]
- An Efficient Geographic Multicast Protocol for Mobile Ad Hoc NetworksXiaojing Xiang, Xin Wang, Zehua Zhou. 73-82 [doi]
- Mobile Element Based Differentiated Message Delivery in Wireless Sensor NetworksYaoyao Gu, Doruk Bozdag, Eylem Ekici. 83-92 [doi]
- Inter-Regional Messenger Scheduling in Delay Tolerant Mobile NetworksKhaled A. Harras, Kevin C. Almeroth. 93-102 [doi]
- Network Coding for Wireless Mesh Networks: A Case StudyAnwar Al Hamra, Chadi Barakat, Thierry Turletti. 103-114 [doi]
- Energy Conservation in Sensor Networks through Selective Node ActivationPrachee Sharma, Asheq Khan, Ashok Narasimhan, Ramalingam Sridhar, Satish K. Tripathi. 115-124 [doi]
- Energy-Efficient Forwarding Schemes for Wireless Sensor NetworksMarcel Busse, Thomas Haenselmann, Wolfgang Effelsberg. 125-133 [doi]
- A Distributed Minimum Energy Multicast Algorithm in MANETsSong Guo, Victor C. M. Leung, Oliver W. W. Yang. 134-142 [doi]
- A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop NetworksJaya Shankar Pathmasuntharam, Amitabha Das, Prasant Mohapatra. 143-149 [doi]
- Po^2V Network Layer Position Verification in Multi-HopWireless NetworksXiaoxin Wu, Cristina Nita-Rotaru. 150-158 [doi]
- Adapting AODV for IEEE 802.15.4 Mesh Sensor Networks: Theoretical Discussion and Performance Evaluation in a Real EnvironmentCarles Gomez, P. Salvatella, O. Alonso, Josep Paradells. 159-170 [doi]
- A New MAC Scheme for Very High-Speed WLANsTianji Li, Qiang Ni, David Malone, Douglas J. Leith, Yang Xiao, Thierry Turletti. 171-180 [doi]
- Practical Schemes for Smooth MAC Layer Handoff in 802.11Wireless NetworksYong Liao, Lixin Gao. 181-190 [doi]
- MAC-Layer Scheduling in Cognitive Radio based Multi-Hop Wireless NetworksMansi Ramakrishnan Thoppian, Subbarayan Venkatesan, Ravi Prakash, R. Chandrasekaran. 191-202 [doi]
- Middleware Support for Context-Awareness in 4G EnvironmentsThomas Springer, Kay Kadner, Frank Steuer, Ming Yin. 203-211 [doi]
- A Comprehensive and Efficient Handoff Procedure for IPv6 Mobility SupportChristian Vogt. 212-218 [doi]
- Simulative Analysis of Access Selection Algorithms for Multi-Access NetworksDênio Mariz, Igor Cananéa, Djamel Sadok, Gábor Fodor. 219-227 [doi]
- Minimum Cost Wireless Broadband Overlay Network PlanningPeng Lin, Hung Q. Ngo, Chunming Qiao, Xin Wang, Ting Wang, DaYou Qian. 228-236 [doi]
- Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic TheoryPradip De, Yonghe Liu, Sajal K. Das. 237-243 [doi]
- Optimal Transmission Range for Cluster-Based Wireless Sensor Networks With Mixed Communication ModesHang Su, Xi Zhang. 244-250 [doi]
- On-Demand Reliable Medium Access in Sensor NetworksRatnabali Biswas, Vivek Jain, Chittabrata Ghosh, Dharma P. Agrawal. 251-257 [doi]
- Wireless Sensor Networks: To Cluster or Not To Cluster?Natalija Vlajic, David Xia. 258-268 [doi]
- Rate Scheduling of Multimedia Streams over ParallelWireless Data Channels with Heterogeneous ReliabilityKi-Dong Lee, Victor C. M. Leung. 269-278 [doi]
- Opportunistic Scheduling of Delay Sensitive Traffic in OFDMA-BasedWirelessAhmed K. F. Khattab, Khaled M. F. Elsayed. 279-288 [doi]
- Selective Channel Feedback Mechanisms for Wireless Multichannel SchedulingYoung-June Choi, Saewoong Bahk. 289-300 [doi]
- Management and Diagnosis Architecture for a Large-Scale Public WLANSeongkwan Kim, Sekyu Park, Sunghyun Choi, Jaehwan Lee, Hanwook Jung. 301-307 [doi]
- Squeezing 100+ VoIP calls out of 802.11b WLANsSangki Yun, Hyogon Kim, Inhye Kang. 308-314 [doi]
- Gauging VoIP Call Quality from 802.11 WLAN Resource UsageMiroslaw Narbutt, Mark Davis. 315-324 [doi]
- 3D Image-Based Rendering Technique for Mobile Handheld DevicesAzzedine Boukerche, Jing Feng, Regina Borges de Araujo. 325-331 [doi]
- Multimedia Correlation Analysis in Unstructured Peer-to-Peer NetworksBo Yang, Ali R. Hurson, Yu Jiao, Thomas E. Potok. 332-338 [doi]
- TCP over Rate-Adaptive WLAN - An Analytical Model and its Simulative VerificationCarsten Burmeister, Ulrich Killat, Jens Bachmann. 339-348 [doi]
- Performance Evaluation of a File Repair Procedure Based on a Combination of MBMS and Unicast BearersThorsten Lohmar, Zhaoyi Peng, Petri Mähönen. 349-357 [doi]
- Performance Analysis and Enhancement of the Next Generation Cellular NetworksXiang Yu, Chunming Qiao, Xin Wang, Dahai Xu. 358-367 [doi]
- Cross-Layer Resource-Consumption Optimization for Mobile Multicast in Wireless NetworksQinghe Du, Xi Zhang. 368-376 [doi]
- A New Wireless Channel Fade Duration Model for Exploiting Multi-User Diversity Gain and Its ApplicationsChengzhi Li, Hao Che, San-qi Li, Dapeng Wu. 377-383 [doi]
- Fast Downloading of Large Files over Fading Wireless ChannelsEnzo Baccarelli, Mauro Biagi, Nicola Cordeschi, Cristian Pelizzoni, Roberto Sabella. 384-390 [doi]
- Selective Cooperation Based on Link Distance Estimations in Wireless Ad-Hoc NetworksTong-Lee Lim, Vineet Srivastava, Mehul Motani. 391-400 [doi]
- LIHP: A Low Latency Layer-3 Handoff Scheme for 802.11Wireless NetworksJohn C. Lin, Sampath Rangarajan. 401-409 [doi]
- A Station-Based Adaptation Algorithm to Improve Robustness of IEEE 802.11Jean Cao, Yujing Wu, Carey L. Williamson. 410-418 [doi]
- Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e NetworksVasilios A. Siris, Costas Courcoubetis. 419-428 [doi]
- Enabling Engineering Document in Mobile Computing EnvironmentXiaoyong Su, Chi-Cheng Peter Chu, B. S. Prabhu, Rajit Gadh. 429-431 [doi]
- Power Control in Multihop CSMABo Yan, Hamid Gharavi. 432-434 [doi]
- Can I Add a Secure VoIP Call?Arlen Nascimento, Alexandre Passito, Edjair de Souza Mota, Edson Nascimento, Leandro S. G. de Carvalho. 435-437 [doi]
- HRPD-A Downlink Voice/IP and Data Throughput and Delay AnalysisTony Dean, Dennis Schaeffer, Weimin Xiao, Fan Wang. 438-440 [doi]
- A Real-Time Smoothing Scheme of MPEG-4 Video for CDMA SystemsJie Qin, Bingzhang Liu, Xin Zhang, Dacheng Yang. 441-443 [doi]
- An Energy-Efficient DSR Routing Protocol Based on Mobility PredictionYuhong Luo, Jianxin Wang, Songqiao Chen. 444-446 [doi]
- A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc NetworksMurat Demirbas, Muzammil Hussain. 447-449 [doi]
- An Efficient Key Revocation Protocol for Wireless Sensor NetworksGianluca Dini, Ida Maria Savino. 450-452 [doi]
- Analysis of Contention-Based Multi-Channel Wireless MAC for Point-to-Multipoint NetworksRajagopal Iyengar, Vicky Sharma, Koushik Kar, Biplab Sikdar. 453-455 [doi]
- Engineering of Replica Voting Protocols for Energy-Efficiency in Data DeliveryJiang Wu, Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat. 456-458 [doi]
- Preserving Traffic Privacy in Wireless Mesh NetworksTaojun Wu, Yuan Xue, Yi Cui. 459-461 [doi]
- An Adaptive Rate Control Algorithm for Real-time Streaming of 3D Image-Based Rendering over Heterogeneous Wireless NetworksAzzedine Boukerche, Firas Kazem. 462-468 [doi]
- SymbioticSphere: A Biologically-Inspired Autonomic Architecture for Self-Adaptive and Self-Healing Server FarmsPaskorn Champrasert, Junichi Suzuki. 469-474 [doi]
- Using Policies to Drive Autonomic ManagementRaphael M. Bahat, Michael A. Bauer, Elvis M. Vieira, O. K. Baek. 475-479 [doi]
- A Framework for the Deployment of Self-Managing and Self-Configuring Components in Autonomic EnvironmentsEleni Patouni, Nancy Alonistioti. 480-484 [doi]
- Traffic-Adaptive Packet Filtering of Denial of Service AttacksLukas Kencl, Christian Schwarzer. 485-489 [doi]
- Designing and Modeling Smart Environments (Invited Paper)Sajal K. Das, Diane J. Cook. 490-494 [doi]
- Evaluating Context Information Predictability for Autonomic CommunicationMirco Musolesi, Cecilia Mascolo. 495-499 [doi]
- Towards the Knowledge-Driven Benchmarking of Autonomic CommunicationsDavid Lewis, Declan O Sullivan, John Keeney. 500-505 [doi]
- Self-Sizing of Clustered DatabasesChristophe Taton, Sara Bouchenak, Noel De Palma, Daniel Hagimont, Sylvain Sicard. 506-512 [doi]
- An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network CardsAntonio Di Stefano, Giovanni Terrazzino, Luca Scalia, Ilenia Tinnirello, Giuseppe Bianchi, Costantino Giaconia. 513-518 [doi]
- Measurements from an 802.11b Mobile Ad Hoc NetworkVincent Lenders, Jorg Wagner, Martin May. 519-524 [doi]
- 802.11b/g Link Level Measurements for an Outdoor Wireless Campus NetworkGiuseppe Bianchi, Fabrizio Formisano, Domenico Giustiniano. 525-530 [doi]
- Means and Methods for Collecting and Analyzing QoE Measurements in Wireless NetworksDavid Soldani. 531-535 [doi]
- Modeling Roaming in Large-scaleWireless Networks Using Real MeasurementsMaria Papadopouli, Michael Moudatsos, Merkourios Karaliopoulos. 536-541 [doi]
- Experimental Evaluation of the Source Specific Multicast Model in Mobile EnvironmentsTiago Sousa, Paulo Mendes, Edmundo Monteiro. 542-547 [doi]
- Fast Handoff in Mobile Virtual Private NetworksJyh-Cheng Chen, Jui-Chi Liang, Siao-Ting Wang, Shin-Ying Pan, Yin-Shin Chen, Ying-Yu Chen. 548-552 [doi]
- INSIGHT: Internet-Sensor Integration for Habitat MonitoringMurat Demirbas, Ken Yian Chow, Chieh Shyan Wan. 553-558 [doi]
- Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc NetworksRajendra V. Boppana, Saman Desilva. 559-563 [doi]
- An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor NetworksMurat Demirbas, Youngwhan Song. 564-570 [doi]
- The Geodesic Broadcast Scheme for Wireless Ad Hoc NetworksDimitrios Katsaros, Yannis Manolopoulos. 571-575 [doi]
- Securing Weakly-Dominating Virtual Backbones in Mobile Ad Hoc NetworksGiovanni Di Crescenzo, Mariusz A. Fecko, Renwei Ge, Gonzalo R. Arce. 576-580 [doi]
- On The Traffic Behavior of Distributed Wireless Mesh NetworksBrian Braunstein, Troy Trimble, Rajesh Mishra, B. S. Manoj, Ramesh R. Rao. 581-586 [doi]
- Virtual Sensors: Abstracting Data from Physical SensorsSanem Kabadayi, Adam Pridgen, Christine Julien. 587-592 [doi]
- P2P Common API for Structured Overlay Networks: A Cross-Layer ExtensionFranca Delmastro, Marco Conti, Enrico Gregori. 593-597 [doi]
- Making Distributed Transactions Resilient to Intermittent Network ConnectionsNuno Santos, Paulo Ferreira. 598-602 [doi]
- Tree Slotted Aloha: a New Protocol for Tag Identification in RFID NetworksMaurizio A. Bonuccelli, Francesca Lonetti, Francesca Martelli. 603-608 [doi]
- A Flexible Middleware for Service Provision Over Heterogeneous Pervasive NetworksEmerson Loureiro, Frederico Bublitz, Nadia Barbosa, Angelo Perkusich, Hyggo Oliveira de Almeida, Glauber Ferreira. 609-614 [doi]
- ROVERS: Pervasive Computing Platform for Heterogeneous Sensor-Actuator NetworksJaroslaw Domaszewicz, Michal Rój, A. Pruszkowski, M. Golanski, K. Kacperski. 615-620 [doi]
- GridStix: Supporting Flood Prediction using Embedded Hardware and Next Generation Grid MiddlewareDanny Hughes, Phil Greenwood, Geoff Coulson, Gordon S. Blair. 621-626 [doi]
- Building Reliable Mobile Applications with Space-Elastic AdaptationMélanie Bouroche, Barbara Hughes, Vinny Cahill. 627-632 [doi]
- SPRINGS: A Scalable Platform for Highly Mobile Agents in Distributed Computing EnvironmentsSergio Ilarri, Raquel Trillo, Eduardo Mena. 633-637 [doi]
- Measurement Study of the Mobile Agent JADE PlatformFrancesca Lo Piccolo, Giuseppe Bianchi, Stefano Salsano. 638-646 [doi]
- The Green Card Protocol: An Identification Protocol for Decentralized SystemsStefano Campadello. 647-651 [doi]
- A Strong Ramp Secret Sharing Scheme Using Matrix ProjectionLi Bai. 652-656 [doi]
- Towards Blocking Outgoing Malicious Impostor EmailsErhan J. Kartaltepe, Shouhuai Xu. 657-661 [doi]
- Credentials and Beliefs in Remote Trusted Platforms AttestationAndrea Bottoni, Gianluca Dini, Evangelos Kranakis. 662-667 [doi]
- PHONEY: Mimicking User Response to Detect Phishing AttacksMadhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya. 668-672 [doi]
- Privacy Preserving Trust Authorization Framework Using XACMLUche M. Mbanaso, G. S. Cooper, David W. Chadwick, Seth Proctor. 673-678 [doi]