Welcome to the Second ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH'2004). We take great pleasure in presenting you with a workshop on a very hot, timely, and challenging topic.
In a very rapid evolution of wireless networks, characterized by sudden rise and fall of technologies and solutions, the success of public WLAN Hot-Spots is continuing unabated. We recall that, last year, the first edition of this workshop was motivated by the attempt to tackle, in a timely manner, the emergence of the public WLAN phenomenon. This year, we are continuing to witness a great and massive interest from both the research community as well as from operators and hotspots deployers on public WLANs. We thus felt the need to maintain WMASH alive, and make it become a forum for the research community to convene and discuss technical and business challenges behind the evolution of WLAN from cable replacement to public access mean.
This year, WMASH has had a success well beyond our best expectations. The number of submissions has grown of about 50% with respect to last year's edition. We received a total of 47 submissions from 23 countries. The workshop program includes 15 excellent papers by authors from 7 countries, and many high quality submissions could not be accommodated for the space limitation. In addition to the presentation of accepted papers, the program also contains an exciting panel discussion on technical and business issues behind the evolution of WLAN hot-spots and hot-zones.
Behind a successful workshop, there is the tireless effort of many people which have smoothly and silently contributed to its organization. We would like to sincerely thank Dr. Parviz Kermani and Dr. Sung-Ju Lee, former organizers of WMASH 2003, for their expert suggestions and support "behind the scene." A depth of gratitude is owed to Dr. Anand Balachandran, our publicity chair, to Prof. Javier Gomez-Castellanos, our publication chair, and to Dr. Milind Buddhikot, our Panel Chair. They helped us with their invaluable talent and time to make this Workshop a reality. Many thanks is owed to the Technical Program Committee members and reviewers who thoroughly helped us select quality papers amongst many submitted manuscript. We had a well-balanced TPC with 28 members in total, with 16 from North America, 1 from Central America, 8 from Europe, and 3 from Asia. 14 members are in academia while 14 members are from the industry.
Proceeding Downloads
SOWER: self-organizing wireless network for messaging
Short Message Service (SMS) has become extremely popular in many countries, and represents a ~multi-billion dollars market. Yet many consumers consider that the price charged by the cellular network operators is too high. In this paper, we explain that ...
Supporting real-time speech on wireless ad hoc networks: inter-packet redundancy, path diversity, and multiple description coding
We consider the problem of supporting real-time traffic over packetized wireless ad hoc networks. Our specific emphasis is on speech, since this is a critical application in many scenarios such as emergency deployment of ad hoc networks. Standard ...
Stateful publish-subscribe for mobile environments
The Publish-Subscribe paradigm has become an important architectural style for designing distributed systems. In the recent years, we have been witnessing an increasing demand for supporting publish-subscribe for mobile systems in wireless environments. ...
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet users access to email, web or other Internet service. However, two major ...
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media has created a paradigm shift in media processing resulting in a complete ...
Fast authentication methods for handovers between IEEE 802.11 wireless LANs
Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, ...
Proactive context transfer in WLAN-based access networks
In recent years, many protocols have been developed to support mobility of wireless network nodes, e.g. Mobile IP suite of protocols designed to support IP routing to mobile nodes. However, support for truly seamless mobility requires more than just ...
Secure universal mobility for wireless internet
- Ashutosh Dutta,
- Tao Zhang,
- Sunil Madhani,
- Kenichi Taniuchi,
- Kensaku Fujimoto,
- Yasuhiro Katsube,
- Yoshihiro Ohba,
- Henning Schulzrinne
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and GPRS. An enterprise user desires to be reachable while outside one's ...
Network selection and discovery of service information in public WLAN hotspots
In a public WLAN hotspot, a roaming mobile terminal (MT) may be within radio range of more than one access point (AP), each of which may or may not have roaming agreements with the service provider of the user of the MT. In this case, the MT may need to ...
A scalable framework for wireless network monitoring
The advent of small form-factor devices, falling hardware prices, and the promise of untethered communication is driving the prolific deployment of wireless networks. The monitoring of such networks is crucial for their robust operation. To this end, ...
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services based on the users' location information. Thus, location awareness and user ...
Extracting places from traces of locations
Location-aware systems are proliferating on a variety of platforms from laptops to cell phones. Locations are expressed in two principal ways: coordinates and landmarks. However, users are often more interested in "places" rather than locations. A place ...
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the development of applications that require a large amount of run-time memory space. ...
Interoperability of Wi-Fi hotspots and cellular networks
The widespread deployment of Wi-Fi hotspots and wide area cellular networks opens up the exciting possibility of interoperability between these types of networks. Interoperability allows a mobile device to dynamically use the multiple net-work ...
A user-centric analysis of vertical handovers
To implement seamless mobility inside an integrated, multiple (e.g. GPRS/WiFi) access system, a vertical handover policy has to be devised. This is usually done at the mobile terminal, allowing it to be customized from a end-user perspective, in order ...
- Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots