|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PRELIMINARY PROGRAM SENSORCOMM 2007 // SECURWARE 2007 Conferences take place at Address: Sunday, October 14
Monday, October 15
Tuesday, October 16
Wednesday, October 17
Thursday, October 18
Friday, October 19
DETAILED PROGRAM SENSORCOMM 2007 SENSOR 1 (SECSED 1) Analytical Model of SAW Gas Sensor with Viscoelastic Layer Portable High Resolution LFM-CW Radar Sensor in Millimeter-Wave Band Novel Process for the Electrodes of Microbolometer Active Laplacian Electrode to Enhance Surface EEnG Recordings SENSOR 2 (SECSED 2) Passive mm-wave Sensor for In-Door and Out-Door Homeland Security Applications Magnetic Field Sensor Based on Giant Magnetoimpedance A New Wireless Sensor for Intravenous Dripping Detection Multispectral Structures for Imaging Applications SENSOR 3 (SECSED 3) Off Stoichiometric Silicon Oxide Applied to Enhance the Silicon Responsivity up to UV Region Development of a Multi-point Multi-parametric Sensor for Structural Health Monitoring Microwave Non-contact Sensor for On-Line Moisture Measurement of Laminate Paper Non-invasive Microwave Sensors for the Monitoring of the state of Liquids Used in the Polyurethane Industry SENSOR 4 (APASN 1) An Adaptive TDMA based MAC Protocol for Mobile Wireless Sensor Networks A Communication Paradigm for Wireless Sensor/Actuator Networks Improvement of Counter-based Broadcasting by Random Assessment Delay Extension for Wireless Sensor Networks A Step towards Standardization of Wireless Sensor Networks: A Layered Protocol Architecture Perspective A Survey and Classification of Distributed Scheduling Algorithms for Sensor Networks SENSOR 5 (APASN 2) Collaborative Localization in Wireless Sensor Networks An Ant Colony Algorithm for Data Aggregation in Wireless Sensor Networks Knowledge-Based Analysis of Directed Diffusion IEEE 802.15.4 Based QoS Support Slotted CSMA/CA MAC for Wireless Sensor Networks Prioritizing Bad Links for Fast and Efficient Flooding in Wireless Sensor Networks SENSOR 6 (APASN 3) A Complexity Study of Garbage Collection for Small Devices Two-Phase Stochastic Optimization to Sensor Network Localization MuMHR: Multi-path, Multi-hop Hierarchical Routing Wireless Sensors Self-Location in an Indoor WLAN Environment Hierarchical Clustering for a Sensor Network of Satellites in Space SENSOR 7 (SEMOSN 1) Analysis of Anomalies in IBRL Data from a Wireless Sensor Network Deployment Simulation Based Analysis of Spreading Dynamics of Malware in Wireless Sensor Networks Resources Implications for Data Security in Wireless Sensor Network Nodes SENSOR 8 (SEMOSN 2) Trust-Aware Query Processing in Data Intensive Sensor Networks Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks On the Formal Verification of the SNEP Key Agreement Protocol for Wireless Sensor Networks SENSOR 9 (UNWAT 1) ANTARES: A System of Underwater Sensors Looking for Neutrinos The Optical Beacon Calibration System of the ANTARES Neutrino Telescope Coral Reef Sensor Network Deployment for Collecting Real Time 3-D Temperature Data with Correlation to Plankton Assemblages The Underwater Acoustic Station NEMO-OνDE (Ocean Noise Detection Experiment) SENSOR 10 (UNWAT 2) Design and Analysis of a GPS-free Routing Protocol for Underwater Wireless Sensor Networks in Deep Water The Acoustic Detection System of the ANTARES Neutrino Telescope in the Mediterranean Sea Design Considerations for Deploying Underwater Sensor Networks SENSOR 11 (UNWAT 3) Acoustic Antennas for On-Line Monitoring in Very Deep Sea Novel, MEMS-Fabricated, Reserve, Galvanic Cells for Deployable Underwater Sensors: Depth-Sensitive Activation & In-Situ Generation of Electron-Acceptors Species Acoustic Positioning System for the Deep-Sea ANTARES Neutrino Telescope Km3NeT, a Deep Sea Challenge for Neutrino Astronomy SENSOR 12 (RIWISN) Yagi-Like Printed Antennas for Wireless Sensor Networks Improvement on LEACH Protocol of Wireless Sensor Network An RSS Localization Method Based on Parametric Channel Models Coin: A COverage INcreasing Algorithm in Mixed Sensor Network SENSOR 13 (RASQOFT) Wireless Sensor Network Performance Monitoring An Adaptive and Flexible Fault Tolerance Mechanism Designed on Multi-behavior Agents for Wireless Sensor/Actuator Network FT-CoWiseNets: A Fault Tolerance Framework for Wireless Sensor Networks SENSOR 14 (PESMOSN) Optimal Passive Source Localization An Adaptive MAC Protocol for Infrastructure Wireless Sensor Networks 3D Wireless Sensor Network Modeling and Simulation SENSOR 15 (ENOPT 1) Evaluation of the Trade-Off between Power Consumption and Performance in Bluetooth Bounds on the Error in Estimating Redundancy in Randomly Deployed Wireless Sensor Networks Runtime Extension of Autonomous Sensors Using Battery-Capacitor Storage Passive Remote Triggering the Activity Cycle of a Wireless Sensor Node: A Method to Adapt the Use of Energy of the Node to the Application Set up of a Microbalance to Measure Very Low Masses SENSOR 16 (ENOPT 2) Cross-Layer Design for Low-Power Wireless Sensor Node Using Long-Wave Hierarchical Geographic Multicast Routing for Wireless Sensor Networks An Exponential Energy Saving Strategy to Wireless Sensor Network Optical Image and Color Recognition Using Monolithic Tandem Pinip and Pinpin Heterojunctions: A Comparison Human Body Energy Harvesting Thermogenerator for Sensing Applications From a Genetic Fuzzy Rule-Based System to a Intelligent Sensor Network SENSOR 17 (ENOPT 3) Adaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks Connectivity-Aware Routing in Sensor Networks A Hybrid Method in Driver and Multisensor Data Fusion, Using a Fuzzy Logic Supervisor for Vehicle Intelligence System-Level Simulation of a Self-Powered Sensor with Piezoelectric Energy Harvesting Radio Frequency- Wireless Level Detection System by Using Spatial Field Attenuation SENSOR 18 (ENOPT 4) Towards the Integration of Heterogeneous Wireless Sensor Platforms: A generic API Approach Relay Node Selection in Randomly Deployed Homogeneous Clustered Wireless Sensor Networks SENSORIA: A New Simulation Platform for Wireless Sensor Networks An Empirical Evaluation of Embedded Link Quality Multiplexed Frequency Spectrum Analyzer Instrumentation for the Characterization of Multiple QCM-Based Biosensors SENSOR 19 (SAPSN 1) ScatterEditor: An Eclipse based Tool for Programming, Testing and Managing Wireless Sensor Networks A Process Calculus Approach to Sensor Network Programming A Kernel-Level Monitor over Multiprocessor Architectures for High-Performance Network Analysis with Commodity Hardware SENSOR 20 (SAPSN 2) Specifying WSN Applications through Agents Based on Events and States Ultra Low Power Wireless Weather Station Composing μSIC: A Lightweight Service Model for Wireless Sensor Networks Hydrological Monitoring with Hybrid Sensor Networks SENSOR 21 (DISN 1) Towards a Reconfigurable Wireless Sensor Network for Biomedical Applications Design and Implementation of a Real-Time Wireless Sensor Network REALnet: An environmental WSN Testbed Wireless Sensor Network for Soil Moisture Applications SENSOR 22 (DISN 2) A Wireless Sensor Network for Monitoring Water Treatment The Approach of European Network of ExcellenceCRUISE to Heterogeneous Wireless Sensor Networks Design and Integration Topology Optimization in Wireless Sensor Networks for Precision Agriculture Applications SENSOR 23 (MECSN 1) A Complete Energy Dissipation Model forWireless Sensor Networks Energy-Efficient Strategies for Cooperative Communications in Wireless Sensor Networks OBMAC: An Overhearing Based MAC Protocol for Wireless Sensor Networks SENSOR 24 (MECSN 2) Co-Ordinated Adaptive Power (CAP) Managemet for Wireless Sensor Networks Energy Driven Choice of Error Recovery Protocols in Embedded Sensor Network Systems The Need for Cooperation and Relaying in Short-Range High Path Loss Sensor Networks SENSOR 25 (DAIPSN) Automatic Forest Surveillance Based on Infrared Sensors Gossip-based Computation of Average: a Closest Point Search Approach Energy-Efficient Aggregation Forwarding for Wireless Sensor Networks Detecting Patterns for Assisted Living Using Sensor Networks: A Case Study Collaborative Data Gathering in Wireless Sensor Networks Using Measurement Co-Occurrence
SECURWARE 2007 SECUR 1 (SECMAN) Evaluating a New Reputation Algorithm With Consideration for Fairness Four Security Certification Levels for IT Managers and Staff in the Public Sector A Survey of User-centric Identity Management Technologies SemID: Combining Semantics with Identity Management SECUR 2 (SYSSEC and THREATS) Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections Trustworthily Forwarding Sensor Networks Information to the Internet Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats A Formal Approach to prevent Attacks on Mobile Agent Systems SECUR 3 (INFOSEC 1) Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms A Scheme for Protecting the Information Leakage Via Portable Devices A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation Classification of Privacy Enhancing Technologies on Life-cycle of Information Chaos-Based Cryptography: End of the Road? SECUR 4 ( INFOSEC 2 , PRODAM and SECTECH) Long-Term Storage and Management of Encrypted Biomedical Data in Real Scenarios Semantically Supported Authentication and Privacy in Social Networks Data Preparation for User Profiling from Traffic Log SECUAREA: Security in Physical and Logical Areas SECUR 5 (ARCH 1 and SECHOME) Robust Sensor Self-Initialization: Whispering to Avoid Intruders Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System A Low-Cost Embedded IDS to Monitor and Prevent Man-in-the-Middle Attacks on Wired LAN Environments Dynamic Environment Evaluation for Reliable AmI Applications Based on Untrusted Sensors SECUR 6 (ARCH 2) Distributed Identity Management Model for Digital Ecosystems Security Made Easy: Achieving User-Friendly Communication Protection in Ad-Hoc situations Adding Value to TCP/IP Based Information Exchange Security by Specialised Hardware Migrating a Honeypot to Hardware SECUR 7 (ARCH 3) Automatic Configuration of Ad-Hoc Networks: Establishing Unique IP Link-Local Addresses Route Investigation for Secure Routing in Mobile Ad-hoc Networks A Proposal to Improve IKEv2 negotiation Temporal Verification in Secure Group Communication System Design Towards a Comprehensive View of Secure Software Engineering SECUR 8 (ARCH 4) A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles Formal Verification of Business Workflows and Role Based Access Control Systems A Fast and Elastic Fingerprint Matching Algorithm Using Minutiae-Centered Circular Regions AmTRUE: Authentication Management and Trusted Role-Based Authorization in Multi-Application and Multi-User Environment |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006, IARIA