WINSYS 2010 Abstracts


Area 1 - Wireless Information Networks

Full Papers
Paper Nr: 15
Title:

QoS Scheduling for IEEE 802.16e mesh mode using Genetic Algorithms

Authors:

Neila Krichene and Noureddine Boudriga

Abstract: IEEE 802.16e amendments for the mesh mode do not specify particular QoS mechanisms. However, each Mesh Subscriber Station (MSS) transmits its own traffic and forwards the traffic of its children while each traffic flow has its particular QoS constraints. As all forwarded traffics use the same link, one MSS may experience starvation or act selfishly. Besides, the MSS’s mobility adds important complexity as all the affected flows need to be re-routed, re-admitted and rescheduled while respecting their original QoS requirements. In this paper, we adopt the concept of assigning five virtual nodes to each MSS reflecting the five QoS classes of IEEE 802.16e and we propose scheduling the uplink transmissions of the real-time Polling Service(rtPS) traffic class by adopting the Genetic Algorithms concept. We define the priority assigner component which communicates with the scheduler of the mesh BS in order to set and update flows’ priority and we optimize the time spent by a flow in the queue while implementing the mobility constraints within the mutation function.
Download

Paper Nr: 53
Title:

Achieving low end-to-end latency with a Handoff-based Deterministic Routing Protocol (HDRP) in Delay-Tolerant Networking

Authors:

Anika Aziz and Shigeki Yamada

Abstract: DTN is able to adapt any mobility environment where any mobile routers and terminals are combined owing to the DTN’s flexible hop-by-hop routing schemes. The existing DTN protocols like Epidemic, Prophet and Spray-and-Wait protocols rely on the message distribution mechanism where each DTN node produces one or more message copies. They can naturally adapt to the mobile situation where the destination node moves from an old connection endpoint to a new connection endpoint because any message copy may luckily be able to reach the new connection endpoint where the mobile node is newly connected. These protocols suffer from long latencies because message copies are not immediately forwarded until any suitable condition for forwarding is met. To solve these problems, we propose a Handoff–based Deterministic Routing Protocol (HDRP) that makes the best use of general handoff mechanisms intended for the IP network. This handoff mechanism includes the registration of locations by mobile nodes and backward propagation and caching of these locations over the experienced route. Our simulation results indicate that HDRP outperforms other existing protocols especially in terms of end-to-end latency.
Download

Paper Nr: 67
Title:

Network Layer based Secure Routing Protocol for Wireless Ad Hoc Sensor Networks in Urban Environments

Authors:

Mohammad S. Obaidat

Abstract: Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages. Although a lot of security measures have been proposed for application and transport layer, we have found that there is not enough research geared towards securing the network at the routing layer. In this paper, we propose a novel solution for securing against external as well as internal attacks. The protocol maintains a working network by using redundant multiple paths despite attacks at one route. It also identifies and removes the malicious nodes from the system. Since the system is totally distributed and does not require a central server as required in some of the other protocols, there is no single point of failure. We also keep in mind the limited computing resources and network bandwidth of the wireless sensor nodes. Finally the paper quantifies the protocol's effectiveness against some of the existing secure routing protocols namely QDV and SNEP using simulation studies.
Download

Short Papers
Paper Nr: 42
Title:

Enterprise WiMAX - Building Next Generation Enterprise Wireless Infrastructure with WiMAX

Authors:

Kai Miao

Abstract: As an all-IP broadband wireless technology, WiMAX uniquely integrates well with existing enterprise network infrastructure. An enterprise can directly host a WiMAX network, i.e. to have a private WiMAX network for mobile enterprise service access and delivery. Alternatively, an enterprise can use a public WiMAX network hosted by a network service provider for its enterprise services. In this paper, we will discuss these two different network hosting models for the enterprise and architecture details and key issues associated with each model. Several questions natually arise when we consider an enterprise wireless infrastructure built with WiMAX: 1) What the WiMAX network architecture should look; 2) How can the security models of WiMAX be made stronger to serve the needs of enterprise users; 3) How WiMAX and WiFi can work together seamlessly to give the user a unified experience. This paper will address these questions based on research we have done recently.
Download

Paper Nr: 44
Title:

MOBILE SENSORGROUP WITH SMART PATH FOR DETECTING TARGET AREA

Authors:

Kuen-Liang Sue and Jing-Wei Lin

Abstract: The aim of this study is to design an intelligent mechanism for exploring unknown target areas in a plant, such as oil pollution in ocean. To explore the target area efficiently, a smart sensing mechanism based on Incremental Clustering algorithm is proposed to cooperate with a small sensing network structure named Centralized SensorGroup (CSG). The operation processes and detection phases are provided and verified in the investigation. System performance is evaluated by observing the detection completeness and accuracy in different scenarios within a square experimental area of 100m*100m. No matter when large or small scenarios are explored, simulation results demonstrate that CSG cooperated with the smart sensing mechanism has quite good detection accuracy and efficiency and can achieve the purpose of exploring target area efficiently and effectively.
Download

Paper Nr: 52
Title:

A RESOURCE DISCOVERY STRATEGY FOR MOBILE PEER-TO-PEER NETWORKS

Authors:

Hao Wu and ZD Zhong

Abstract: Resource discovery is one of the key issues in mobile P2P studies. Nonetheless, in existing schemes there are still some deficiencies, such as the lake of flexibility, proportionality and adaptability. In this paper, we present a resource discovery model Mobile-Tapestry (M-Tapestry) for mobile P2P networks based on the P2P Tapestry strategy. The philosophy of this model is to make the network architecture layered , and only a small number of super nodes are chosen instead of all nodes to access the Tapestry system. This measure may reduce the cost of ordinary nodes and solve the reliability problems caused, when the routing table is updated frequently. Additionally, we partition the nodes according to their geographical location, this may avoid the problem that the distance between the nodes having adjacent IDs is actually large due to the Hash operation. Finally, our simulation results and analysis shows that the M-Tapestry strategy has an improved lookup efficiency for mobile P2P networks compared to the Tapestry strategy.
Download

Paper Nr: 57
Title:

Anova-Based RF DNA Analysis: Identifying Significant Parameters for Device Classification

Authors:

Randall W. Klein, Kevin Kuciapinski, Michael Temple and Randall Klein

Abstract: Analysis of variance (ANOVA) is applied to RF DNA fingerprinting techniques to ascertain the most significant signal characteristics that can be used to form robust statistical fingerprint features. The goal is to find features that enable reliable identification of like-model communication devices having different serial numbers. Once achieved, these unique physical layer identities can be used to augment existing bit-level protection mechanisms and overall network security is improved. ANOVA experimentation is generated using a subset of collected signal characteristics (amplitude, phase, frequency, signal-to-noise ratio, etc.) and post-collection processing parameters (bandwidth, fingerprint regions, statistical features, etc.). The ANOVA input is percent correct device classification as obtained from MDA/ML discrimination using three like-model devices from a given manufacturer. Full factorial design experiments and ANOVA are used to determine the significance of individual parameters, and interactions thereof, in achieving higher percentages of correct classification. ANOVA is shown to be well-suited for the task and reveals parametric interactions that are otherwise unobservable using conventional graphical and tabular data representations.
Download

Paper Nr: 11
Title:

PLANNING OF A BROADBAND WIRELESS NETWORK BASED IN OFDM General Considerations

Authors:

Benigno Rodríguez

Abstract: In this paper several hints to be considered in the design of a commercial broadband wireless network are presented. The case of study is based in Worldwide Interoperability for Microwave Access (WiMAX) networks, but the general concepts are also valid for Long Term Evolution (LTE). The information presented here is not only valid for the task of designing a broadband wireless network, but also it can be useful to focus research in the economically most sensitive areas.
Download

Paper Nr: 31
Title:

A BLUETOOTH SENSOR NETWORK BASED ON THE IEEE 1451 STANDARD

Authors:

Javier Sanchez Cubillo, Maider Larburu Lopez, Jesus Murgoitio and Beñat Arejita Larrinaga

Abstract: The use of sensors is very widespread in a lot of different environments and applications. Each situation needs a different solution and for that reason the use of a scalable and easily manageable sensor network is a must as applications are becoming increasingly complex. In many cases the perfect solution is the one based on a wireless sensor network; it provides flexibility, ease of management of the system and expandability. But in order to provide interoperability between different sensor manufacturers and to give a transparent and independent interface, the use of a standard is mandatory. This standard system is provided by the IEEE 1451 family of standard protocols. In this project a Bluetooth based sensor network has been implemented using the IEEE 1451 family of standard protocols. The goal of this network is to aid data acquisition from a number of sensors within a car, in order to monitor the wellbeing of the passengers and improve safety and comfort.
Download

Paper Nr: 33
Title:

Fuzzy Logic Based Dynamic Pricing Scheme for Provision of QoS in Cellular Networks

Authors:

Pamela O. Aloo and Marcel O. O.

Abstract: Accurate forecasting of demand for cellular services is essential. The high infrastructure implementation costs involved plus overestimation of demand can be very costly. In addition the difference between peak and off-peak demands for wireless services can be very significant, both temporary and spatially. Gearing the network to meet peak demand would result in under-utilised network capacity most of the time. It has been suggested that real-time or dynamic pricing (variation of tariff according to network utilization) could provide an additional strategy for encouraging more efficient use of available resources. The aim of this research work is to investigate the implementation a Fuzzy Logic Controlled Dynamic Pricing (FLCDP) in a simulated cellular network for improved quality of service (QoS). Improvement in revenue collection is also investigated. Simulations were carried out using MATLAB. The results show that the network utilization is improved and an increase in the system availability and reliability: which are the two major parameters for QoS measurement. The revenue collected under FLCDP is greater than under flat rate pricing.
Download

Paper Nr: 47
Title:

ATC:An Asymmetric Topology Control Algorithm for Heterogeneous Wireless Sensor Networks

Authors:

Mohsen Nickray and Ali Afzali-Kusha

Abstract: In this paper, we present an asymmetric topology control (ATC) algorithm for wireless sensor networks. In this algorithm, the sensor nodes incrementally adjust their transmission. The algorithm had three phases of Neighbor Discovery, Construct Topology, and Data Transmission. In the phase of Neighbor Discovery, the nodes exchanged their positions and maximum transmission powers. In phase II, each sensor node collaboratively adjusted its transmission range (power) while keeping the network connectivity the same as that of the case of transmitting with the maximum power. In phase III, all the nodes transmit data with the adjusted transmission power. To assess the efficiency of the proposed algorithm, its performance is compared to those of previously published works. Our algorithm not only preserve power and average node degree and average link length, it has privileges which enable it to work properly even in the absence of conventional error handling mechanisms.
Download

Paper Nr: 48
Title:

A competing algorithm for Gradient based routing in wireless sensor networks

Authors:

Lusheng Miao, Karim Djouani, Anish Kurien and Guillaume Noel

Abstract: The energy consumption is a key design criterion for the routing protocol in wireless sensor networks. Some routing protocols deliver the message by point to point like wire networks, which may not be optimal to maximise the lifetime of the network. In this paper, a competing algorithm for GBR in wireless sensor networks is proposed. This algorithm is referred to as GBR-C. The proposed scheme is compared with the GBR protocol. Simulation results show that the proposed scheme gives better results than GBR in terms of energy efficiency.
Download

Paper Nr: 51
Title:

A SURVEY ON REPUTATION-BASED COOPERATION ENFORCEMENT SCHEMES IN WIRELESS AD HOC NETWORKS

Authors:

Malamati Louta, Stylianos Kraounakis and Angelos Michalas

Abstract: Mobile ad hoc networks rely on node cooperation to perform and support basic functions like packet forwarding, routing and network management. In general, nodes’ misbehaviour (attributed either to selfishness or maliciousness) can significantly degrade the performance of the network, resulting to decreased throughput or even network partitioning. Cooperation enforcement schemes are seen as a lightweight alternative to conventional security techniques that involve cryptographically signed certificates exchange, providing a “softer” security layer to protect basic networking operations. Cooperation enforcement schemes fall within two broad categories: trust establishment by means of reputation systems, which is based on building reputation of the network nodes and pricing and credit-based schemes, which provide economic incentives. The aim of this paper is to survey representative cooperation enforcement schemes exploiting a reputation system proposed in related research literature. Their distinct features are analyzed and the authors discuss on their relative merits and weaknesses.
Download

Paper Nr: 55
Title:

COOPERATIVE APPROACH TO SELF-MANAGED VANETS

Authors:

Jezabel Molina-Gil, C. Caballero-Gil and Pino Caballero-Gil

Abstract: Vehicular networks are becoming more and more important in our society because of the great benefits that can be obtained from them. Most research contributions propose specific mechanisms where the presence of a Certification Authority is necessary, which implies a centralized system in charge of certification and revocation services. In our work we propose a more realistic view of what will be the beginning of these networks, where privacy and integrity are required and where misbehaving or faulty nodes have to be detected and prevented from disrupting the network operation in a self-organized way.
Download

Paper Nr: 58
Title:

FFDA: A TREE BASED ENERGY AWARE DATA AGGREGATION PROTOCOL IN WIRELESS SENSOR NETWORKS

Authors:

Hamed Inanlou, Komail S. Shourmasti, Hooman Marjani and Nima A. Rezaei

Abstract: In wireless sensor networks (WSN's), data aggregation is used to increase energy efficiency by means of eliminating redundancy and forwarding the collected abstract data of sensor nodes toward the sink. One of the most important challenges in WSN is to keep the remaining energy of nodes high and balanced to achieve longer system lifetime. In this article we propose an energy efficient data aggregation protocol named FFDA (Feed Forward Data Aggregation) for constructing the spanning tree, we also represent a new parameter called EAT (Energy After Transmission). This protocol considers EAT as the main parameter to select a node as root for spanning tree in the beginning of each round of data aggregation. Using this new parameter the remaining energy of nodes remain more balanced thus the first node die is delayed significantly and it also improves the system's lifetime as indicated by simulation results.
Download

Area 2 - Wireless Networking Technologies

Full Papers
Paper Nr: 9
Title:

Modulation-Mode Assignment for SVD-assisted and Iteratively Detected Downlink Multiuser MIMO Transmission Schemes

Authors:

Andreas Ahrens and César Benavente-Peces

Abstract: In this contribution we jointly optimize the number of multiple-input multiple-output (MIMO) layers and the number of bits per symbol within an iteratively-detected multiuser MIMO downlink (DL) transmission scheme under the constraint of a given fixed data throughput and integrity. Instead of treating all the users jointly as in zero-forcing (ZF) multiuser transmission techniques, the investigated singular value decomposition (SVD) assisted DL multiuser MIMO system takes the individual user's channel characteristics into account. In analogy to bit-interleaved coded irregular modulation, we introduce a MIMO-BICM scheme, where different user-specific signal constellations and mapping arrangement were used within a single codeword. Extrinsic information transfer (EXIT) charts are used for analyzing and optimizing the convergence behaviour of the iterative demapping and decoding. Our results show that in order to achieve the best bit-error rate, not necessarily all user-specific MIMO layers have to be activated.
Download

Paper Nr: 16
Title:

IMPROVEMENT OF WIRELESS NETWORK PERFORMANCE BY POLARISATION DIVERSITY

Authors:

Iñigo Cuiñas and Manuel García Sánchez

Abstract: The use of polarisation diversity techniques in reception could be adequate to improve the performance of the wireless networks operating in deep multipath fading environments. This paper explores this possibility, and presents a procedure to estimate the received cross-polarised power from wide band measurements performed at just one polarisation. Three different strategies have been tested, and the results are presented and analysed, detecting improvements even when the multipath is low in the channel. In highly multipath rooms, the improvement in terms of received power reaches 21%.
Download

Paper Nr: 40
Title:

EXPERIMENTAL PERFORMANCE EVALUATION OF A GBPS FSO LINK: A CASE STUDY

Authors:

José R. Pacheco de Carvalho, N. Marques, Hugo Veiga, C. R. Pacheco and Antonio Reis

Abstract: Wireless communications have been increasingly important. Besides Wi-Fi, FSO plays a very relevant technological role in this context. Performance is essential, resulting in more reliable and efficient communications. A FSO medium range link has been successfully implemented for high requirement applications at Gbps. An experimental performance evaluation of this link has been carried out at OSI layers 1, 4 and 7, through a specifically planned field test arrangement. Several results are presented and discussed, as obtained from simultaneous measurements of powers received by the laser heads, TCP, UDP and FTP experiments, resulting in determinations of TCP throughput, jitter, percentage datagram loss and FTP transfer rate. Conclusions are drawn about link performance.
Download

Short Papers
Paper Nr: 17
Title:

MANAGING ‘TRAIN-TO-EARTH’ HEAVY COMMUNICATIONS: A Middleware Software to Manage Broadband Wireless Communications in the Railway Scope

Authors:

Roberto Carballedo, Itziar Salaberria, Asier Perallos and Unai Gutierrez

Abstract: This paper describes the work done during the last 3 years in the field of wireless communications for the railway industry. Specifically illustrates the strategy followed for the management of broadband wireless communications in a hybrid network (mobile/radio). This management allows the optimization of both bandwidth and transmission rate of the applications deployed in the ground control stations (terrestrial applications) and on-board systems (train applications). It also describes the general aspects of a ‘train-to-earth’ communications architecture, which allows an easy and standard integration of applications and services both new and legacy.
Download

Paper Nr: 19
Title:

BLIND DETECTION IN IDMA SYSTEMS

Authors:

Hamza Abdelkrim, Ali kazem, Salut Gerard, Chitroub Salim and Touhami Rachida

Abstract: Interleaved Division Multiple Access (IDMA) is a new access scheme that has been proposed in the literature to increase the capacity of wireless channels. The performance of such systems depends on the accuracy of the channel state information (CSI) at the receiver. In this paper, a Noisy-Independent Component Analysis (N- ICA) based IDMA receiver for multiple access communication channels is proposed and compared to classical receivers. The N-ICA component is applied as a post processor. The estimation of CSI will often have some measurement errors, which degrade the accuracy of symbol detection. Using blind methods, this overhead can be eliminated. Simulation results demonstrate that N-ICA post processor provides an improvement in performance in terms of bit error rate (BER) in loaded systems and it offers an efficient alternative to systems with block channel estimation. When the system is not loaded, the proposed post processor presents the same performance as conventional IDMA receiver with less iterations leading to a complexity reduction.
Download

Paper Nr: 27
Title:

ROBUST MULTIMEDIA TRANSMISSION OVER WIRELESS AND MOBILE NETWORKS

Authors:

Charalampos Patrikakis, Rui Cruz, Mario Nunes and Nikolaos Papaoulakis

Abstract: In this paper, an analysis of the different techniques for supporting robust multimedia transmission over wireless media is given. The analysis includes Radio Resource Management techniques on the Physical layer, transmission techniques on the Network (IP) layer, optimisation techniques on the Transport layer and techniques focusing on the Application layer. Also there is a report on the selection of the most efficient solutions and the way these can be combined in an integrated solution is presented. The paper has been prepared following the results of the research performed in the context of the ICT project my-eDirector 2012 in order to support the robust transmission of live streaming services for the coverage of athletic events for large numbers of heterogeneous users.
Download

Paper Nr: 32
Title:

Effect of rainfall on link quality in an outdoor forest deployment

Authors:

Niki Trigoni, Andrew Markham, Andrew Markham, Niki Trigoni and Stephen Ellwood

Abstract: Existing work has shown that rainfall has an effect on link quality. Some authors report a positive effect in moist conditions, whereas others demonstrate a significant decrease in link throughput as a result of rainfall or fog. The precise cause of these variations has not yet been conclusively established. This paper reports on long term (26 day) link quality results from 12 nodes deployed in a forest. We found that rainfall has the effect of decreasing the performance of 28% of good links (classified as those having above 90% packet reception), but simultaneously increasing the performance of 34% of poor links (those having below 50% packet reception). In addition, it was found that variations in link quality persisted for a few days after rainfall. This suggests that link variations are not a result of rain induced fading, but rather due to water sitting on node packaging. We present experimental evidence which demonstrates that changes in link quality (both positive and negative) are indeed due to the presence of water, capacitively loading the antenna, altering its radiation pattern.
Download

Paper Nr: 36
Title:

PARTIAL FEEDBACK MULTI-USER SCHEDULING IN MULTI-ANTENNA SYSTEMS

Authors:

Ahmad Salim

Abstract: In this paper we consider the greedy scheduling algorithm that routes transmission of users’ packets based on their reported CSI in the uplink channel to the user with the best instantaneous channel conditions. We propose a scheduling scheme that relies on reporting partial feedback of the CSI. We compare the proposed scheme to the one that uses perfect channel information at the base station, we will see from the results we got that the proposed scheme has significantly less complexity at the expense of a loss in the system’s capacity.
Download

Paper Nr: 37
Title:

A Numerical Comparison between LSSTC and VBLAST in Wireless Systems

Authors:

Ahmad Salim, Salam Zummo and Samir Al-Ghadhban

Abstract: In this work we evaluate a recently proposed multiple-input multiple-output (MIMO) system called the Layered Steered Space-Time Codes (LSSTC) that combines the benefits of vertical Bell Labs space-time (VBLAST) scheme, space-time block codes (STBC) and beamforming. This evaluation is done by comparing the capacity and the error rate of LSSTC to the well-known MIMO system, known as VBLAST. For that, we derive a formula for the instantaneous capacity of single-user LSSTC. In addition, an adaptive scheme that is based on LSSTC and VBLAST systems is proposed. This scheme selects the configuration and the modulation scheme in order to improve the performance.
Download

Paper Nr: 63
Title:

A CONTRIBUTION TO LABORATORY PERFORMANCE MEASUREMENTS OF IEEE 802.11 B,G WEP POINT-TO-POINT LINKS

Authors:

José R. Pacheco de Carvalho, Hugo Veiga, N. Marques, C. R. Pacheco and Antonio Reis

Abstract: Wireless communications using microwaves are increasingly important, e.g. Wi-Fi. Performance is a fundamental issue, resulting in more reliable and efficient communications. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11b, g) WEP point-to-point links using available access points from Enterasys Networks (RBTR2). Through OSI levels 4 and 7, detailed results are presented and discussed from TCP, UDP and FTP experiments, namely: TCP throughput, jitter, percentage datagram loss and FTP transfer rate.
Download

Area 3 - Mobile Software and Services

Full Papers
Paper Nr: 24
Title:

FORMAL SPECIFICATION AND VERIFICATION OF THE OMA LICENSE CHOICE ALGORITHM IN THE OTS/CAFEOBJ METHOD

Authors:

Panayiotis Frangos, Nikolaos Triantafyllou and Iakovos Ouranos

Abstract: OMA-Digital Rights Management System is a standard proposed by the Open Mobile Alliance (OMA) for protecting digital content distribution via mobile networks. To solve the decision problem, in the case that multiple licenses refer to the same content, OMA suggests a license choice algorithm. This algorithm ensures the fine grained consumption of contents. CafeOBJ is a new generation algebraic specification language. We apply the OTS/CafeOBJ method to formally model, specify and verify the above mentioned license choice algorithm. More specifically, we develop the mathematical model of the OMA decision algorithm as an OTS, a kind of transition system expressed in an equational CafeOBJ specification style. Finally, we verify that this algorithm fulfills the following safety property: Whenever a license is chosen for a given content, then the license is valid at that specific time.
Download

Short Papers
Paper Nr: 43
Title:

BUSINESS MODEL FOR EMERGING REAL-TIME LOCATION-BASED SERVICES: A TECHNICAL PERSPECTIVE

Authors:

Farag Sallabi, George Ditsa, Ezedin Barka and Hazem El Khatib

Abstract: Recently, new and sophisticated mobile commerce applications, especially location-based services applications, have been emerging very fast, which demands a closer attention to their use, technology and business models. As a result, new business models designed specifically for the mobile arena have started to emerge. Moreover, mobile commerce is generating considerable interest and has led to the design and development of new mobile web-based services. However these services lack a suitable business model. Brokerage firms have already setup novel and profitable business models for wired web-based services. Converting these wired web-based services into mobile services introduces new challenges. In this paper, we present a business model for dynamic location-based services. We find it very useful to introduce this novel approach to define a business model for such an application. Our focus is on the value proposition for each stakeholder involved in the application. We highlight the technical perspective and analyze the different technologies used in this application.
Download

Paper Nr: 62
Title:

AUTOMATIC CONTEXT DETECTION OF A MOBILE USER

Authors:

Karl-Heinz Krempels, Janno von Stülpnagel, Christoph Terwelp and Uta Christoph

Abstract: Mobile devices have obtained a significant role in our life providing a large variety of useful functionalities and features. It is desirable to have an automated adaptation of the behavior of a mobile device depending on a change of user context to fulfill expectations towards practical usefulness. To enable mobile devices to adapt their behavior automatically there is a need to determine the mobile user's context. In this paper we introduce an integrated approach for the automatic detection of a user's context. Therefore, we summarize and discuss existing approaches and technologies and describe a service architecture that takes into account information from the interaction of the mobile device with communication networks and positioning systems, from integrated sensors, and planned behavior of the user from e.g his calendar or activity list. Additionally it considers the social network of the user to derive further information about his context and finally it takes into account his customs through a behavior model.
Download

Paper Nr: 66
Title:

EVALUATION OF AN INDOOR NAVIGATION APPROACH BASED ON APPROXIMATE POSITIONS

Authors:

Christoph Terwelp, Karl-Heinz Krempels, Uta Christoph and Ory Chowaw-Liebman

Abstract: Until now navigation aids have primarily focused on outdoor scenarios, whether driving on highways or, more recently, walking through cities. These systems use the Global Positioning System (GPS) for position infor- mation. Indoor navigation however cannot rely on GPS data, as the signals do not penetrate building structure. Thus other techniques are required to provide position information indoors. In this article the approach to an indoor navigation system based on the position information provided by the device whispering technique is presented. The position information acquired by device whispering is less precise than information acquired by the Fingerprinting technique but more robust. To compensate the deficit of precision the position informa- tion is combined with a movement model. This movement model is automatically generated from the maps which are already required for navigation.
Download

Paper Nr: 26
Title:

ON BOARD COMMUNICATIONS PLATFORM FOR SERVICES DEPLOYMENT IN VEHICLES. Bottom-up approach for Intelligent Transport Systems deployment

Authors:

Unai Hernández-Jayo, Asier Perallos, Ignacio Angulo and Nekane Sainz

Abstract: This paper reflects the advances and results of two research projects supported by the Basque Government. The objective of this work is to build a device which allows the driver to communicate with his vehicle, with other vehicles and the infrastructure on the road. This Intelligent On Board Unit will be able to learnt from driver behavior and the environment. Based on this knowledge, the I-OBU could advise the driver on actions to take while driving. The modules implemented and the test scenario that has been built to validate the proposed architecture, are shown in this article.
Download