30.01.2014 Views

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Lora, M.A. (<strong>2010</strong>): QoE in Cooperative Wireless Networks. In: DFG Research Training<br />

Group 1298 “AlgoSyn”, <strong>RWTH</strong> <strong>Aachen</strong> University (Ed.), Proc. of the Joint Workshop of the<br />

Germ<strong>an</strong> Research Training Groups in Computer Science, Dagstuhl, Germ<strong>an</strong>y, Jun <strong>2010</strong>,<br />

pp.20.<br />

Munawar, W.; Alizai, M.H.; L<strong>an</strong>dsiedel, O.; Wehrle, K (<strong>2010</strong>): Dynamic TinyOS: Modular<br />

<strong>an</strong>d Tr<strong>an</strong>sparent Incremental Code-Updates for Sensor Networks. Proc. of the IEEE<br />

International Conference on Communications (ICC), Cape Town, South Africa, May.<br />

Österlind, F.; Sasnauskas, R.; Dunkels, A.; Dustm<strong>an</strong>n, O.S.; Wehrle, K. (<strong>2010</strong>): Demo<br />

Abstract: Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug<br />

Finding. In: Proceedings of the 8th ACM Conference on Embedded Networked Sensor<br />

Systems (SenSys), Zurich, Switzerl<strong>an</strong>d.<br />

Samad, F.; Makram, S.A. (2009): Protection based on neighborhood-trust in clustered<br />

wireless mesh networks. In: Porc. of the 3rd International Conference on Next Generation<br />

Mobile Applications, Services <strong>an</strong>d Technologies (NGMAST ’09), Cardiff, Wales, U.K., pp.<br />

487 –493.<br />

Samad, F.; Makram, S.A. (2009): REALISM: REn<strong>der</strong>ing Anonymity <strong>an</strong>d LIghtweight Security<br />

with Mobility in wireless ad hoc <strong>an</strong>d mesh networks. In proceedings of the 5th ACM<br />

symposium on QoS <strong>an</strong>d security for wireless <strong>an</strong>d mobile networks (Q2SWinet ’09), C<strong>an</strong>ary<br />

Isl<strong>an</strong>ds, Spain, pp. 97-102.<br />

Samad, F.; Makram, S.A. (<strong>2010</strong>): Adaptive security established on the requirements <strong>an</strong>d<br />

resource abilities of network nodes. In proceedings of the 10th International Workshop on<br />

Wireless Local Networks (IEEE WLN ’10) held in conjunction with the 35th International<br />

Conference on Local Computer Networks (IEEE LCN), Oct. 11-14, <strong>2010</strong>, Denver, Colorado,<br />

United States, pp. 768-771.<br />

Samad, F.; Makram, S.A. (<strong>2010</strong>): PiCAT: Palliating Ch<strong>an</strong>nel Assignment Assaults using<br />

Adjustable Trust in Wireless Mesh Networks. In proceedings of the 19th International<br />

Conference on Computer Communications <strong>an</strong>d Networks (ICCCN’10), IEEE, Zurich,<br />

Switzerl<strong>an</strong>d, pp. 1-7.<br />

Sasnauskas, R.; L<strong>an</strong>dsiedel, O.; Alizai, M.H.; Weise, C.; Kowalewski, S.; Wehrle, K. (<strong>2010</strong>):<br />

KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before<br />

Deployment. In: Proceedings of the 9th ACM/IEEE International Conference on Information<br />

Processing in Sensor Networks (IPSN).<br />

Sasnauskas, R.; Weingärtner, E. (<strong>2010</strong>): Modeling Tr<strong>an</strong>sport Layer Protocols. In: Modeling<br />

<strong>an</strong>d Tools for Network Simulation, ed. by Klaus Wehrle, Mesut Günes, James Gross.<br />

Springer, chap. 17, pp. 389-399.<br />

Schleinzer, B.; Yoshioka, N. (<strong>2010</strong>): A Security Pattern for Data Integrity in P2P Systems. In:<br />

Proceedings of the 17th Conference on Pattern L<strong>an</strong>guages of Programs.<br />

Schürm<strong>an</strong>s, S.; Weingärtner, E.; Kempf, T.; Ascheid, G.; Wehrle, K,; Leupers, R. (<strong>2010</strong>):<br />

Towards Network Centric Development of Embedded Systems. In: Proceedings of the IEEE<br />

International Conference on Communications (ICC), Cape Town, South Africa, May 23-27.<br />

Thiele, J.; Bitsch Link, J.A.; Osechas, O.; Mallot, H.; Wehrle, K. (<strong>2010</strong>): Dynamic Wireless<br />

Sensor Networks for Animal Behavior Research. In: Recent Adv<strong>an</strong>ces in Biomedical<br />

Engineering, ed. by Domenico Campolo. INTECH, Vienna, Austria, chap. 32, pp. 629--644.<br />

Thißen, D.; Brambring, T. (2009): Improving Quality of Web Services by using Replication.<br />

In: IADIS International Journal on WWW/Internet, Vol. 7, No. 1, S. 26-43.<br />

181

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!