No abstract available.
Proceeding Downloads
IEEE 802.11 networks with dormant mode support: an IP paging approach and its performance analysis
IEEE802.11 networks are changing its primary role of extension of private LANs to become an access technology in competition or collaboration with current cellular networks. In addition, large-scale IEEE802.11 deployments are a reality that mesh ...
Clustering techniques for dynamic mobility management
This paper presents a new approach based on clustering algorithms in combination with the location area scheme to solve the mobile location management problem. Mobile users' past movement patterns are used in making future paging decisions by the ...
Diagnosing mobile ad-hoc networks: two distributed comparison-based self-diagnosis protocols
In emergency/rescue applications mobile ad-hoc networks (MANETs) play an important role as a self-organizable and rapidly deployable infrastructure. Consequently, reliable break MANETs are necessary for this type of applications. One of the key problem ...
Capacity upgrading in mobile ad hoc access networks (MAHANs) using CSMA/CAPA
From recent trends, mobile ad hoc access networks (MAHANs) have attracted high attention to be adopted in future 4G networks. The gateway in a typical MAHAN provides Internet access service for mobile nodes. In order to guarantee ubiquitous Internet ...
Design of wireless mesh networks for aggregating traffic of fast moving users
In this paper, we examine wireless mesh networks and present a theoretical model for evaluating the expected throughput for fast moving users. We propose intelligent techniques for improving the throughput: distribution of neighbour nodes over the ...
Evaluation of multi-radio extensions to AODV for wireless mesh networks
Due to their self-configuring and self-healing capabilities, as well as their low equipment and deployment cost, Wireless Mesh Networks (WMNs) based on commodity hardware present a promising technology for a wide range of applications. Currently, one of ...
Sink mobility protocols for data collection in wireless sensor networks
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly related to ambient intelligence) and as a first step towards introducing ...
Quick convergecast in ZigBee/IEEE 802.15.4 tree-based wireless sensor networks
Convergecast is a fundamental operation in wireless sensor networks. Existing convergecast solutions have focused on reducing latency and energy consumption. However, a good design should be compliant to standards, in addition to considering these ...
An adaptive and low-latency power management protocol for wireless sensor networks
Energy conservation in wireless sensor networks is a critical issue. An efficient method to reduce power consumption consists in powering off the nodes' wireless transceiver when communication is not needed. Under this approach sleep/wakeup schedules of ...
Efficient proximity detection among mobile targets with dead reckoning
Proximity detection is defined as the capability of a Location-based Service (LBS) to automatically detect when a pair of mobile targets approaches each other closer than a pre-defined proximity distance. For realizing this function the targets have to ...
Fuzzy location and tracking on wireless networks
This paper describes user location and tracking on indoor scenarios through a wireless network. We propose a fuzzy location algorithm, using fuzzy inference systems, in order to deal with imprecise location based on radio-frequency trilateration ...
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration procedures are applied in a great number of proposed location techniques and ...
Ad hoc routing based on the stability of routes
Some reactive ad hoc protocols allow the discovery and/or storage of multiple paths to the same destination node. The selection of the path to utilize is commonly based on the criterion of the minimum number of hops. However, some other strategies could ...
Proactive crossover router discovery with FMIPv6
This paper presents an enhanced fast handover scheme in Mobile IPv6 named Cross based Fast handover Mobile IPv6 (X-FMIPv6). We propose Proactive Crossover Router Discovery scheme that allow us to locate Crossover Router in advance, before MN actually ...
Better CCI mitigation with optimized frequency reuse in multi-cell OFDMA systems
In this paper, we investigate subcarrier assignment in downlink multi-cell Orthogonal Frequency Division Multiple Access (OFDMA) systems. As user bit rates are in continuous increase, the limitation of the available spectrum requires more and more ...
A weighted center of mass based trilateration approach for locating wireless devices in indoor environment
This paper presents a weighted center of mass based trilateration approach for locating a wireless device based on the signal strength received from the access points at known locations. This approach mainly consists of two phases: (1) The calculation ...
A totally decentralized document sharing system for mobile ad hoc networks
Many research projects have defined applications that are claimed to operate in a MANet environment. Consider for instance these software tools that make it possible to share information (files, databases, etc.). It appears that most of the proposed ...
Indoor tracking in WLAN location with TOA measurements
Authors presented recently an indoor location technique based on Time Of Arrival (TOA) obtained from Round-Trip-Time (RTT) measurements at data link level and trilateration. This new approach uses the existing IEEE 802.11 WLAN infrastructure with minor ...
Evolution of cooperation in ad hoc networks under game theoretic model
In this paper, we present a new approach to evolve a cooperative behavior in ad hoc networks. We propose an environment composed of four elements: a game theory based model of the network, trust evaluation mechanism, strategy that defines the behavior ...
Performance evaluation of OFDMA wireless systems using WM-SIM platform
Orthogonal Frequency-Division Multiple Access (OFDMA) is becoming a very promising candidate for Long Term Evolution (LTE) and future Forth Generation (4G) technology specifications. This paper presents the work-in-progress development of an OFDMA ...
An end-to-end simulator for an open broadband access network
- Alessandro Basile,
- Stefano Conti,
- Fabio Galliano,
- Fred Daneshgaran,
- Marina Mondin,
- Massimiliano Laddomada
The Open Broadband Access Network (OBAN)1 project introduces an innovative approach to establish a broadband mobile network in line with present B3G visions.This paper describes the end-to-end OBAN simulator that has been developed with the aim to ...
Quality of service control mechanisms for multimedia services
The new applications coming up in third generation mobile networks combine media types such as real-time audio and video. It is needed to assure the Quality of Service (QoS) by providing the right mechanisms that allow to processing the different media ...
On the performance of DCCP in wireless mesh networks
The Datagram Congestion Control Protocol (DCCP) has been recently proposed as a new transport protocol, suitable for use by applications such as multimedia streaming. Wireless mesh networks have promising commercial potential for a large variety of ...
Multi-user session control in the next generation wireless system
Next generation IP wireless systems are envisioned to be heterogeneous and to provide ubiquitous services to mobile users with different quality of service requirements. Furthermore, in order to attract and keep customers, mobile operators are expanding ...
A buffer management technique for 3D image-based rendering on mobile devices
In order to utilize 3D image-based rendering technology on mobile devices, an efficient local buffer management schema is required to cope with the large set of data used by image-based rendering algorithms, communication errors, communication latency, ...
Hoarding location-based data using clustering
The proliferation of mobile devices and the fact that high-bandwidth and continuous connectivity is not available everywhere, has led to the creation of hoarding algorithms that attempt to mitigate the problems related with disconnected operation and ...
Analysis of rnging process in IEEE 802.16e wireless access systems
Ranging process is proposed for the coordination between mobile station and base station in IEEE 802.16e OFDMA systems. It consists of ranging detection process (RDP), uplink resource allocation, and registration. Among them, RDP is the first step of ...
An analytical model based on G/M/1 with self-similar input to provide end-to-end QoS in 3G networks
The dramatic increase in demand for wireless Internet access has lead to the introduction of new wireless architectures and systems including 3G, Wi-Fi and WiMAX. 3G systems such as UMTS and CDMA2000 are leaning towards an all-IP architecture for ...
Performance analysis of cross-layered multipath routing and MAC layer solutions for multi-hop ad hoc networks
Multipath routing schemes could exploit multiple disjoint routes between any source and destination node, in order to provide aggregate bandwith, fault-tolerance and load-balancing properties. In this paper, we propose a multipath routing scheme for ...
Index Terms
- Proceedings of the 4th ACM international workshop on Mobility management and wireless access
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
MobiWac '22 | 50 | 16 | 32% |
MobiWac '15 | 37 | 12 | 32% |
MobiWac '14 | 57 | 16 | 28% |
MobiWac '13 | 68 | 21 | 31% |
MobiWac '06 | 60 | 18 | 30% |
Overall | 272 | 83 | 31% |