Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1024733acmconferencesBook PagePublication PagesmobicomConference Proceedingsconference-collections
WMASH '04: Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
ACM2004 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WMASH04: The Second ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots ( co-located with Mobicom 2004 Conference ) Philadelphia PA USA 1 October 2004
ISBN:
978-1-58113-877-1
Published:
01 October 2004
Sponsors:

Reflects downloads up to 30 Aug 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Second ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH'2004). We take great pleasure in presenting you with a workshop on a very hot, timely, and challenging topic.

In a very rapid evolution of wireless networks, characterized by sudden rise and fall of technologies and solutions, the success of public WLAN Hot-Spots is continuing unabated. We recall that, last year, the first edition of this workshop was motivated by the attempt to tackle, in a timely manner, the emergence of the public WLAN phenomenon. This year, we are continuing to witness a great and massive interest from both the research community as well as from operators and hotspots deployers on public WLANs. We thus felt the need to maintain WMASH alive, and make it become a forum for the research community to convene and discuss technical and business challenges behind the evolution of WLAN from cable replacement to public access mean.

This year, WMASH has had a success well beyond our best expectations. The number of submissions has grown of about 50% with respect to last year's edition. We received a total of 47 submissions from 23 countries. The workshop program includes 15 excellent papers by authors from 7 countries, and many high quality submissions could not be accommodated for the space limitation. In addition to the presentation of accepted papers, the program also contains an exciting panel discussion on technical and business issues behind the evolution of WLAN hot-spots and hot-zones.

Behind a successful workshop, there is the tireless effort of many people which have smoothly and silently contributed to its organization. We would like to sincerely thank Dr. Parviz Kermani and Dr. Sung-Ju Lee, former organizers of WMASH 2003, for their expert suggestions and support "behind the scene." A depth of gratitude is owed to Dr. Anand Balachandran, our publicity chair, to Prof. Javier Gomez-Castellanos, our publication chair, and to Dr. Milind Buddhikot, our Panel Chair. They helped us with their invaluable talent and time to make this Workshop a reality. Many thanks is owed to the Technical Program Committee members and reviewers who thoroughly helped us select quality papers amongst many submitted manuscript. We had a well-balanced TPC with 28 members in total, with 16 from North America, 1 from Central America, 8 from Europe, and 3 from Asia. 14 members are in academia while 14 members are from the industry.

Skip Table Of Content Section
SESSION: Applications, services, and architecture
Article
SOWER: self-organizing wireless network for messaging

Short Message Service (SMS) has become extremely popular in many countries, and represents a ~multi-billion dollars market. Yet many consumers consider that the price charged by the cellular network operators is too high. In this paper, we explain that ...

Article
Supporting real-time speech on wireless ad hoc networks: inter-packet redundancy, path diversity, and multiple description coding

We consider the problem of supporting real-time traffic over packetized wireless ad hoc networks. Our specific emphasis is on speech, since this is a critical application in many scenarios such as emergency deployment of ad hoc networks. Standard ...

Article
Stateful publish-subscribe for mobile environments

The Publish-Subscribe paradigm has become an important architectural style for designing distributed systems. In the recent years, we have been witnessing an increasing demand for supporting publish-subscribe for mobile systems in wireless environments. ...

Article
Reputation-based Wi-Fi deployment protocols and security analysis

In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet users access to email, web or other Internet service. However, two major ...

Article
Smart edge server: beyond a wireless access point

Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media has created a paradigm shift in media processing resulting in a complete ...

SESSION: Mobility, roaming, and handoff
Article
Fast authentication methods for handovers between IEEE 802.11 wireless LANs

Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, ...

Article
Proactive context transfer in WLAN-based access networks

In recent years, many protocols have been developed to support mobility of wireless network nodes, e.g. Mobile IP suite of protocols designed to support IP routing to mobile nodes. However, support for truly seamless mobility requires more than just ...

Article
Secure universal mobility for wireless internet

The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and GPRS. An enterprise user desires to be reachable while outside one's ...

Article
Network selection and discovery of service information in public WLAN hotspots

In a public WLAN hotspot, a roaming mobile terminal (MT) may be within radio range of more than one access point (AP), each of which may or may not have roaming agreements with the service provider of the user of the MT. In this case, the MT may need to ...

Article
A scalable framework for wireless network monitoring

The advent of small form-factor devices, falling hardware prices, and the promise of untethered communication is driving the prolific deployment of wireless networks. The monitoring of such networks is crucial for their robust operation. To this end, ...

SESSION: Location-awareness and interworking
Article
LOCATOR: location estimation system For wireless LANs

With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services based on the users' location information. Thus, location awareness and user ...

Article
Extracting places from traces of locations

Location-aware systems are proliferating on a variety of platforms from laptops to cell phones. Locations are expressed in two principal ways: coordinates and landmarks. However, users are often more interested in "places" rather than locations. A place ...

Article
Proximity services supporting network virtual memory in mobile devices

Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the development of applications that require a large amount of run-time memory space. ...

Article
Interoperability of Wi-Fi hotspots and cellular networks

The widespread deployment of Wi-Fi hotspots and wide area cellular networks opens up the exciting possibility of interoperability between these types of networks. Interoperability allows a mobile device to dynamically use the multiple net-work ...

Article
A user-centric analysis of vertical handovers

To implement seamless mobility inside an integrated, multiple (e.g. GPRS/WiFi) access system, a vertical handover policy has to be devised. This is usually done at the mobile terminal, allowing it to be customized from a end-user perspective, in order ...

Contributors
  • Tor Vergata University of Rome
  • Samsung Electronics Co. Ltd.
  • Google LLC
  1. Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots

    Recommendations