skip to main content
10.1145/1134680acmconferencesBook PagePublication PagesmobisysConference Proceedingsconference-collections
MobiSys '06: Proceedings of the 4th international conference on Mobile systems, applications and services
ACM2006 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MobiSys06: The 4th International Conference on Mobile Systems, Applications and Services 2006 Uppsala Sweden June 19 - 22, 2006
ISBN:
978-1-59593-195-5
Published:
19 June 2006
Sponsors:
Next Conference
Bibliometrics
Skip Abstract Section
Abstract

Welcome to MobiSys 2006: The Fourth International Conference on Mobile Systems, Applications and Services. This is an exciting time in the history of the conference -- the first time that MobiSys has gone truly mobile, travelling outside the US to Scandinavia.MobiSys 2006 has also seen a significant increase in the number of submissions to the conference. This year we received 123 full submissions -- a 46% increase on 2005.The reviewing process closely followed that used by David Kotz and Brian Noble last year. Each full paper was assigned to three Program Committee members to review in the first round. Based on these reviews we then selected 52 papers for discussion at the PC meeting. All of these papers were assigned to at least two additional PC members for shorter, skim reviews. Most PC members reviewed approximately 30 papers -- a massive undertaking for which we thank everyone on the committee. The committee met in Pittsburgh in early March to discuss these papers and eventually selected 19 papers for inclusion in the proceedings (an acceptance rate of 15%). Each accepted paper was shepherded by a PC member before appearing in these proceedings. In addition to the technical sessions, the program features keynote speakers, a work-in-progress session, a session devoted to demos and posters, and ample unstructured time for technical interactions with colleagues.

Skip Table Of Content Section
SESSION: Security
Article
Enhancing the security of corporate Wi-Fi networks using DAIR

We present a framework for monitoring enterprise wireless networks using desktop infrastructure. The framework is called DAIR, which is short for Dense Array of Inexpensive Radios. We demonstrate that the DAIR framework is useful for detecting rogue ...

Article
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks

The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are unable to leverage key distribution centers (KDCs) to assist them with key ...

SESSION: Applications
Article
FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments

In this paper we present FireWxNet, a multi-tiered portable wireless system for monitoring weather conditions in rugged wildland fire environments. FireWxNet provides the fire fighting community the ability to safely and easily measure and view fire and ...

Article
Context-aware interactive content adaptation

Automatic adaptation of content for mobile devices is a challenging problem because optimal adaptation often depends on the usage semantics of content, as well as the context of users (e.g., screen size of device being used, network connectivity, ...

Article
Efficient and transparent dynamic content updates for mobile clients

We introduce a novel infrastructure supporting automatic updates for dynamic content browsing on resource constrained mobile devices. Currently, the client is forced to continuously poll for updates from potentially different data sources, such as, e-...

SESSION: Mesh networks
Article
Feasibility study of mesh networks for all-wireless offices

There is a fair amount of evidence that mesh (static multihop wireless) networks are gaining popularity, both in the academic literature and in the commercial space. Nonetheless, none of the prior work has evaluated the feasibility of applications on ...

Article
Fast handoff for seamless wireless mesh networks

This paper presents the architecture and protocols of SMesh, a completely transparent wireless mesh system that offers seamless, fast handoff, supporting VoIP and other real-time application traffic for any unmodified 802.11 device. In SMesh, the entire ...

Article
Measurement driven deployment of a two-tier urban mesh access network

Multihop wireless mesh networks can provide Internet access over a wide area with minimal infrastructure expenditure. In this work, we present a measurement driven deployment strategy and a data-driven model to study the impact of design and topology ...

SESSION: Research tools
Article
SATIRE: a software architecture for smart AtTIRE

Personal instrumentation and monitoring services that collect and archive the physical activities of a user have recently been introduced for various medical, personal, safety, and entertainment purposes. A general software architecture is needed to ...

Article
MiNT-m: an autonomous mobile wireless experimentation platform

Limited fidelity of software-based wireless network simulations has prompted many researchers to build testbeds for developing and evaluating their wireless protocols and mobile applications. Since most testbeds are tailored to the needs of specific ...

Article
Pegboard: a framework for developing mobile applications

Tool support for mobile application development can significantly improve programmer productivity and software quality. Pegboard is a novel tooling framework that extends the Eclipse integrated development environment to support the development of ...

SESSION: Location sensing
Article
ARIADNE: a dynamic indoor signal map construction and localization system

Location determination of mobile users within a building has attracted much attention lately due to its many applications in mobile networking including network intrusion detection problems. However, it is challenging due to the complexities of the ...

Article
PinPoint: An Asynchronous Time-Based Location Determination System

This paper presents the design, implementation and evaluation of the PinPoint location determination system. PinPoint is a distributed algorithm that enables a set of $n$ nodes to determine the RF propagation delays between every pair of nodes, from ...

Article
Building realistic mobility models from coarse-grained traces

In this paper we present a trace-driven framework capable of building realistic mobility models for the simulation studies of mobile systems. With the goal of realism, this framework combines coarse-grained wireless traces, i.e., association data ...

SESSION: Wireless troubleshooting
Article
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs

Deployments of wireless LANs consisting of hundreds of 802.11 access points with a large number of users have been reported in enterprises as well as college campuses. However, due to the unreliable nature of wireless links, users frequently encounter ...

Article
WiFiProfiler: cooperative diagnosis in wireless LANs

While 802.11-based wireless hotspots are proliferating, users often have little recourse when the network does not work or performs poorly for them. They are left trying to manually debug the problem, which can be a frustrating and disruptive process. ...

SESSION: Smart wireless association
Article
CoolSpots: reducing the power consumption of wireless mobile devices with multiple radio interfaces

CoolSpots enable a wireless mobile device to automatically switch between multiple radio interfaces, such as WiFi and Bluetooth, in order to increase battery lifetime. The main contribution of this work is an exploration of the policies that enable a ...

Article
Improved access point selection

This paper presents Virgil, an automatic access point discovery and selection system. Unlike existing systems that select access points based entirely on received signal strength, Virgil scans for all available APs at a location, quickly associates to ...

Article
Using smart triggers for improved user performance in 802.11 wireless networks

The handoff algorithms in the current generation of 802.11 networks are primarily reactive in nature, because they wait until the link quality degrades substantially to trigger a handoff. They further rely on instantaneous signal strength measurements ...

Contributors
  • Uppsala University
  • Uppsala University
  • Carnegie Mellon University
  • School of Computing and Communications, Lancaster University

Recommendations

Acceptance Rates

Overall Acceptance Rate274of1,679submissions,16%
YearSubmittedAcceptedRate
MobiSys '231984121%
MobiSys '211663622%
MobiSys '171883418%
MobiSys '161973116%
MobiSys '152192913%
MobiSys '141852514%
MobiSys '132113316%
MobiSys '041622214%
MobiSys '031532315%
Overall1,67927416%