Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2107502acmconferencesBook PagePublication PagesmobihocConference Proceedingsconference-collections
MobiHoc '11: Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MobiHoc '11: The Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing Paris France May 17 - 19, 2011
ISBN:
978-1-4503-0722-2
Published:
17 May 2011
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 25 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Routing session
research-article
Deterministic greedy routing with guaranteed delivery in 3D wireless sensor networks
Article No.: 1, Pages 1–10https://doi.org/10.1145/2107502.2107504

With both computational complexity and storage space bounded by a small constant, greedy routing is recognized as an appealing approach to support scalable routing in wireless sensor networks. However, significant challenges have been encountered in ...

research-article
O3: optimized overlay-based opportunistic routing
Article No.: 2, Pages 1–11https://doi.org/10.1145/2107502.2107505

Opportunistic routing achieves significant performance gain under lossy wireless links. In this paper, we develop a novel approach that exploits inter-flow network coding in opportunistic routing. A unique feature of our design is that it systematically ...

research-article
Neighbor discovery in wireless networks with multipacket reception
Article No.: 3, Pages 1–10https://doi.org/10.1145/2107502.2107506

Neighbor discovery is one of the first steps in configuring and managing a wireless network. Most existing studies on neighbor discovery assume a single-packet reception model where only a single packet can be received successfully at a receiver. In ...

SESSION: Applications session
research-article
Broadcasting delay-constrained traffic over unreliable wireless links with network coding
Article No.: 4, Pages 1–10https://doi.org/10.1145/2107502.2107508

There is increasing demand for using wireless networks for applications that generate packets with strict per-packet delay constraints. In addition to delay constraints, such applications also have various traffic patterns and require guarantees on ...

research-article
OmniVoice: a mobile voice solution for small-scale enterprises
Article No.: 5, Pages 1–11https://doi.org/10.1145/2107502.2107509

We consider the problem of providing mobility support for Voice-over-IP (VoIP) traffic in small-scale enterprises. There is considerable interest in providing on-the-go support for VoIP through the use of WiFi-enabled smart phones. However, existing ...

research-article
Enabling coexistence of heterogeneous wireless systems: case for ZigBee and WiFi
Article No.: 6, Pages 1–11https://doi.org/10.1145/2107502.2107510

The ISM spectrum is becoming increasingly populated by emerging wireless networks. Spectrum sharing among the same network of devices can be arbitrated by MAC protocols (e.g., CSMA), but the coexistence between heterogeneous networks remains a ...

research-article
The hare and the tortoise: taming wireless losses by exploiting wired reliability
Article No.: 7, Pages 1–11https://doi.org/10.1145/2107502.2107511

Multiple communication channels are common in today's consumer and enterprise networks. For example, a high bandwidth but unreliable wireless network might co-exist with a reliable wired link (EWLANs and neighborhood networks). In this paper, we present ...

SESSION: Cognitive radios and spectrum access session
research-article
A market-clearing model for spectrum trade in cognitive radio networks
Article No.: 8, Pages 1–9https://doi.org/10.1145/2107502.2107513

We model cognitive radio networks (CRNs) as a spectrum market where every primary user (PU) offer her subchannels with certain interference bound indicating the interference limit the PU can tolerate, and secondary users (SUs) purchase the right to ...

research-article
Truthful auction for cooperative communications
Article No.: 9, Pages 1–10https://doi.org/10.1145/2107502.2107514

On one hand, cooperative communication has been gaining more and more popularity since it has great potential to increase the capacity of wireless networks. On the other hand, the applications of cooperative communication technology are rarely seen in ...

research-article
Non-cooperative spectrum access: the dedicated vs. free spectrum choice
Article No.: 10, Pages 1–11https://doi.org/10.1145/2107502.2107515

We consider a dynamic spectrum access system in which Secondary Users (SUs) choose to either acquire dedicated spectrum or to use spectrum-holes (white spaces) which belong to Primary Users (PUs). The tradeoff incorporated in this decision is between ...

SESSION: Network coverage session
research-article
Wireless coverage with disparate ranges
Article No.: 11, Pages 1–8https://doi.org/10.1145/2107502.2107517

One of the most fundamental task of wireless networks is to provide coverage of a set of targets. Suppose that all nodes and targets lie in a plane, and all nodes have circular coverage ranges of arbitrary radii. The problem Minimum Wireless Cover (MWC) ...

research-article
Barrier coverage in camera sensor networks
Article No.: 12, Pages 1–10https://doi.org/10.1145/2107502.2107518

Barrier coverage has attracted much attention in the past few years. However, most of the previous works focused on traditional scalar sensors. We propose to study barrier coverage in camera sensor networks. One fundamental difference between camera and ...

research-article
Local connectivity tests to identify wormholes in wireless networks
Article No.: 13, Pages 1–11https://doi.org/10.1145/2107502.2107519

A wormhole attack places two radio transceivers connected by a high capacity link and retransmits wireless signals from one antenna at the other. This creates a set of shortcut paths in the network, and may attract a lot of traffic to the wormhole link. ...

research-article
UNFOLD: uniform fast on-line boundary detection for dynamic 3D wireless sensor networks
Article No.: 14, Pages 1–11https://doi.org/10.1145/2107502.2107520

A wireless sensor network becomes dynamic if it is monitoring a time-variant event (e.g., expansion of oil spill in ocean). In such applications, on-line boundary detection is a crucial function, as it allows us to track the event variation in a timely ...

SESSION: Reliability and security
research-article
Self-stabilizing leader election for single-hop wireless networks despite jamming
Article No.: 15, Pages 1–10https://doi.org/10.1145/2107502.2107522

Electing a leader is a fundamental task in distributed computations. Many coordination problems, such as the access to a shared resource, and the resulting inefficiencies, can be avoided by relying on a leader. This paper presents Select, a leader ...

research-article
Towards cheat-proof cooperative relay for cognitive radio networks
Article No.: 16, Pages 1–11https://doi.org/10.1145/2107502.2107523

In cognitive radio networks, cooperative relay is a new technology that can significantly improve spectrum efficiency and system throughput. While the existing protocols for cooperative relay are very interesting and useful, there is a crucial problem ...

SESSION: Mobility and DTNs
research-article
Dispatch-and-search: dynamic multi-ferry control in partitioned mobile networks
Article No.: 17, Pages 1–10https://doi.org/10.1145/2107502.2107525

We consider the problem of disseminating data from a base station to a sparse, partitioned mobile network by controllable data ferries with limited ferry-node and ferry-ferry communication ranges. Existing solutions to data ferry control mostly assume ...

research-article
Putting contacts into context: mobility modeling beyond inter-contact times
Article No.: 18, Pages 1–11https://doi.org/10.1145/2107502.2107526

Realistic mobility models are crucial for the simulation of Delay Tolerant and Opportunistic Networks. The long standing benchmark of reproducing realistic pairwise statistics (e.g., contact and inter-contact time distributions) is today mastered by ...

SESSION: Scheduling and optimization
research-article
Towards optimal rate allocation for data aggregation in wireless sensor networks
Article No.: 19, Pages 1–11https://doi.org/10.1145/2107502.2107528

This paper aims at achieving optimal rate allocation for data aggregation in wireless sensor networks. We first formulate this rate allocation problem as a network utility maximization problem. Due to its non-convexity, we take a couple of variable ...

research-article
Scheduling algorithms for video multicasting with channel diversity in wireless OFDMA networks
Article No.: 20, Pages 1–11https://doi.org/10.1145/2107502.2107529

The demand for real-time video services coupled with the need for increased spectral efficiencies has brought a lot of attention to video multicasting in next generation OFDMA systems. Layered video provides an efficient solution to address the channel ...

SESSION: Energy efficiency
research-article
Utility optimal scheduling in energy harvesting networks
Article No.: 21, Pages 1–11https://doi.org/10.1145/2107502.2107531

In this paper, we show how to achieve close-to-optimal utility performance in energy harvesting networks with only finite capacity energy storage devices. In these networks, nodes are capable of harvesting energy from the environment. The amount of ...

research-article
Turning off radios to save power in multi-radio wireless mesh networks
Article No.: 22, Pages 1–11https://doi.org/10.1145/2107502.2107532

Endowing mesh routers with multiple radios is a recent solution to improve the performance of wireless mesh networks (WMNs). The problem how to route flows and assign channels to radios in multi-radio WMNs has attracted a lot of attention in the recent ...

research-article
EM-MAC: a dynamic multichannel energy-efficient MAC protocol for wireless sensor networks
Article No.: 23, Pages 1–11https://doi.org/10.1145/2107502.2107533

Medium access control (MAC) protocols for wireless sensor networks face many challenges, including energy-efficient operation and robust support for varying traffic loads, in spite of effects such as wireless interference or even possible wireless ...

research-article
On optimal energy efficient convergecasting in unreliable sensor networks with applications to target tracking
Article No.: 24, Pages 1–10https://doi.org/10.1145/2107502.2107534

In this paper, we develop a mathematical framework for studying the problem of maximizing the "information" received at the sink in a data gathering wireless sensor network. We explicitly account for unreliable links, energy constraints, and in-network ...

research-article
Energy-efficient polling protocols in RFID systems
Article No.: 25, Pages 1–9https://doi.org/10.1145/2107502.2107535

Future RFID technologies will go far beyond today's widely-used passive tags. Battery-powered active tags are likely to gain more popularity due to their long operational ranges and richer on-tag resources. With integrated sensors, these tags can ...

Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate 296 of 1,843 submissions, 16%
YearSubmittedAcceptedRate
MobiHoc '211392820%
Mobihoc '171702716%
MobiHoc '152503715%
MobiHoc '142114019%
MobiHoc '132344218%
MobiHoc S3 '091212100%
MobiHoc '04275249%
MobiHoc '031922714%
MobiHoc '021342216%
MobiHoc '011442417%
MobiHoc '00821316%
Overall1,84329616%