Technical Program
The following table shows the preliminary schedule of the AIMS 2009 event.
Tuesday (June 30)
|
Wednesday (July 1)
|
Thursday (July 2)
|
|
|
|
The registration desk opens Tuesday June 30th at 8:45.
On Friday, 3rd July, there will be an EMANICS internal meeting (WP2).
The agenda is available here (members only).
-
Cross-layer design in autonomous networks - why is the influence only one-way?
Joe Sventek, University of Glasgow, Scotland
There is a substantial body of work on cross-layer design in wireless networks.
Most of these efforts are with regards to the passing of physical layer information
to higher layers. The typical approach is for the network layer to exploit physical
layer information when determining routes between nodes. As such, the network layer
autonomously modifies the paths that packets take between nodes to account for signal
strength, remaining battery power, and many other physical layer metrics. One can say
that the physical layer informs the higher layers.
There has been surprisingly little work in which the higher layers, especially the
networking layer, inform the operation of the lower layers. There is no reason
to believe that cross-layers design is not a two-way street, with each layer
affecting/informing the other. This talk will discuss recent work in which knowledge
of routes at the network layer can be used to positively affect the operation of the
MAC layer in resource-constrained, wireless networks. (more)
-
Management of highly dynamic, infrastructureless radio networks
Frank Eyermann, Universität der Bundeswehr, Germany
Infrastructureless radio networks are the means for communication in all
cases in which a communication infrastructure is not present or can not be
used. Such situations can be found after natural catastrophes (e.g.,
Hurricane Katrina), which destroyed the previously existing infrastructure
and thus can not be used by first responders. Other examples are
humanitarian missions in less developed areas, where no comprehensive
communication infrastructure does exist. Last but not least during crisis
operations or hot wars the troops in-theater need to provide their own
communication infrastructure as of security issues existing infrastructure
can not be used.
The tutorial will first introduce to these networks and make the participants familiar
with the technologies, their parameters, and the terms used. In the second part the
requirements of a management system are described. In a third part the concepts and solutions
addressing the before mentioned requirements are shown. As this research topic is quite
new and not wide spread, many problems are not yet satisfactorily solved. The tutorial will
close with naming some of the most prominent problems inspiring the participants possibly
to contribute to this exciting research topic. (more)
- Panel: How to manage your PhDs
Aiko Pras, Juergen Schoenwaelder, Burkhard Stiller et al.
- IEEE 802.15.4 and IPv6 over 802.15.4 (6LowPAN)
Juergen Schoenwaelder, Iyad Tumar, Jacobs University Bremen, Germany
- Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management
Bob Hulsebosch, Robert de Groote, and Martin Snijders
- A Statistical Analysis of Network Parameters for the Self-management of Lambda-Connections
Tiago Fioreze, Lisandro Granville, Ramin Sadre, and Aiko Pras
- Dynamics of Resource Closure Operators
Alva L. Couch and Marc Chiarini
- NETCONF Interoperability Testing
Ha Manh Tran, Iyad Tumar, and Jürgen Schönwälder
- Knowledge Management and Promises
Mark Burgess
- A Policy-Driven Network Management System for the Dynamic Configuration of Military Networks
Wei Koong Chai, Kin-Hon Ho, Marinos Charalambides, and George Pavlou
After the coffee break:
- A Strategy for Multi-Agent Based Wireless Sensor Network Optimization
Ahmad Sardouk, Rana Rahim-Amoud, Leïla Merghem-Boulahia, and Dominique Gaïti
- Flow Monitoring in Wireless MESH Networks
Cristian Popi and Olivier Festor
- Visualization of Node Interaction Dynamics in Network Traces
Petar Dobrev, Sorin Stancu-Mara, and Jürgen Schönwälder
- Churn Tolerance Improvement Techniques in an Algorithm-Neutral DHT
Kazuyuki Shudo
- PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems
Thomas Bocek, Dalibor Peric, Fabio Hecht, David Hausheer, and Burkhard Stiller
- Evaluation of Sybil Attacks Protection Schemes in KAD
Thibault Cholez, Isabelle Chrisment, and Olivier Festor
- Towards Energy Efficient Change Management in a Cloud Computing Environment
Hady AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, and David Kaminsky
- A Market-Based Pricing Scheme for Grid Networks
Peng Gao, Xingyao Wu, Tao Liu, and David Hausheer
- Consistency of Network Traffic Repositories: An Overview
Elmer Lastdrager and Aiko Pras
- A P2P-Based Approach to Cross-Domain Network and Service Management
Adriano Fiorese, Paulo Simes, and Fernando Boavida
- PeerCollaboration
Thomas Bocek and Burkhard Stiller
- Fast Learning Neural Network Intrusion Detection System
Robert Koch and Gabi Dreo
- Design of an Autonomous Framework for Efficient Large Scale Management of Next Generation Web Service Mashups
Anna Hristoskova and Filip De Turck
- Scalable Detection and Isolation of Phishing
Giovane C.M. Moura and Aiko Pras
- Multi-agent Reinforcement Learning in Network Management
Ricardo Bagnasco and Joan Serrat
- Answering Queries Using Cooperative Semantic Caching
Andrei Vancea and Burkhard Stiller
- Towards Cost-Aware Multipath Routing
João Taveira Araújo, Miguel Rio, and George Pavlou
|