[AIMS2009]

3rd International Conference on

Autonomous Infrastructure, Management and Security

AIMS 2009

June 30 - July 2, 2009, University of Twente, The Netherlands

Technical Program

The following table shows the preliminary schedule of the AIMS 2009 event.

Tuesday
(June 30)
Wednesday
(July 1)
Thursday
(July 2)
09:15 Welcome
09:30 Keynote
10:30 Coffee Break
10:45 Session #1
12:00 Lunch Break
13:30 Tutorial #1
14:45 Short paper session
15:30 End of Day 1
16:00 Excursion
09:15 Session #2
10:30 Coffee Break
10:45 Session #3
12:00 Lunch Break
13:30 Tutorial #2
14:45 End of Day 2
15:00 Social Event
09:15 Session #4
10:30 Coffee Break
10:45 PhD Workshop session #1
12:00 Lunch Break
13:30 Tutorial #3
14:45 PhD Workshop session #2
16:00 Closing and Best Paper Award

The registration desk opens Tuesday June 30th at 8:45.

Co-located events

On Friday, 3rd July, there will be an EMANICS internal meeting (WP2). The agenda is available here (members only).


Keynote

  • Cross-layer design in autonomous networks - why is the influence only one-way?
    Joe Sventek, University of Glasgow, Scotland
  • There is a substantial body of work on cross-layer design in wireless networks. Most of these efforts are with regards to the passing of physical layer information to higher layers. The typical approach is for the network layer to exploit physical layer information when determining routes between nodes. As such, the network layer autonomously modifies the paths that packets take between nodes to account for signal strength, remaining battery power, and many other physical layer metrics. One can say that the physical layer informs the higher layers.

    There has been surprisingly little work in which the higher layers, especially the networking layer, inform the operation of the lower layers. There is no reason to believe that cross-layers design is not a two-way street, with each layer affecting/informing the other. This talk will discuss recent work in which knowledge of routes at the network layer can be used to positively affect the operation of the MAC layer in resource-constrained, wireless networks. (more)


Tutorial #1

  • Management of highly dynamic, infrastructureless radio networks
    Frank Eyermann, Universität der Bundeswehr, Germany
  • Infrastructureless radio networks are the means for communication in all cases in which a communication infrastructure is not present or can not be used. Such situations can be found after natural catastrophes (e.g., Hurricane Katrina), which destroyed the previously existing infrastructure and thus can not be used by first responders. Other examples are humanitarian missions in less developed areas, where no comprehensive communication infrastructure does exist. Last but not least during crisis operations or hot wars the troops in-theater need to provide their own communication infrastructure as of security issues existing infrastructure can not be used.

    The tutorial will first introduce to these networks and make the participants familiar with the technologies, their parameters, and the terms used. In the second part the requirements of a management system are described. In a third part the concepts and solutions addressing the before mentioned requirements are shown. As this research topic is quite new and not wide spread, many problems are not yet satisfactorily solved. The tutorial will close with naming some of the most prominent problems inspiring the participants possibly to contribute to this exciting research topic. (more)

Tutorial #2

  • Panel: How to manage your PhDs
    Aiko Pras, Juergen Schoenwaelder, Burkhard Stiller et al.

Tutorial #3

  • IEEE 802.15.4 and IPv6 over 802.15.4 (6LowPAN)
    Juergen Schoenwaelder, Iyad Tumar, Jacobs University Bremen, Germany

Session #1: Network Resource Management

  • Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management
    Bob Hulsebosch, Robert de Groote, and Martin Snijders
  • A Statistical Analysis of Network Parameters for the Self-management of Lambda-Connections
    Tiago Fioreze, Lisandro Granville, Ramin Sadre, and Aiko Pras
  • Dynamics of Resource Closure Operators
    Alva L. Couch and Marc Chiarini

Session #2: Network Configuration and Optimization

  • NETCONF Interoperability Testing
    Ha Manh Tran, Iyad Tumar, and Jürgen Schönwälder
  • Knowledge Management and Promises
    Mark Burgess
  • A Policy-Driven Network Management System for the Dynamic Configuration of Military Networks
    Wei Koong Chai, Kin-Hon Ho, Marinos Charalambides, and George Pavlou
After the coffee break:
  • A Strategy for Multi-Agent Based Wireless Sensor Network Optimization
    Ahmad Sardouk, Rana Rahim-Amoud, Leïla Merghem-Boulahia, and Dominique Gaïti

Session #3: Monitoring and Visualization

  • Flow Monitoring in Wireless MESH Networks
    Cristian Popi and Olivier Festor
  • Visualization of Node Interaction Dynamics in Network Traces
    Petar Dobrev, Sorin Stancu-Mara, and Jürgen Schönwälder

Session #4: Overlays and P2P Networks

  • Churn Tolerance Improvement Techniques in an Algorithm-Neutral DHT
    Kazuyuki Shudo
  • PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems
    Thomas Bocek, Dalibor Peric, Fabio Hecht, David Hausheer, and Burkhard Stiller
  • Evaluation of Sybil Attacks Protection Schemes in KAD
    Thibault Cholez, Isabelle Chrisment, and Olivier Festor

Short paper session

  • Towards Energy Efficient Change Management in a Cloud Computing Environment
    Hady AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, and David Kaminsky
  • A Market-Based Pricing Scheme for Grid Networks
    Peng Gao, Xingyao Wu, Tao Liu, and David Hausheer
  • Consistency of Network Traffic Repositories: An Overview
    Elmer Lastdrager and Aiko Pras

PhD Workshop session #1

  • A P2P-Based Approach to Cross-Domain Network and Service Management
    Adriano Fiorese, Paulo Simes, and Fernando Boavida
  • PeerCollaboration
    Thomas Bocek and Burkhard Stiller
  • Fast Learning Neural Network Intrusion Detection System
    Robert Koch and Gabi Dreo
  • Design of an Autonomous Framework for Efficient Large Scale Management of Next Generation Web Service Mashups
    Anna Hristoskova and Filip De Turck

PhD Workshop session #2

  • Scalable Detection and Isolation of Phishing
    Giovane C.M. Moura and Aiko Pras
  • Multi-agent Reinforcement Learning in Network Management
    Ricardo Bagnasco and Joan Serrat
  • Answering Queries Using Cooperative Semantic Caching
    Andrei Vancea and Burkhard Stiller
  • Towards Cost-Aware Multipath Routing
    João Taveira Araújo, Miguel Rio, and George Pavlou
Sponsored by the EC IST-EMANICS Network of Excellence (#26854)