WISARD 2009 Final Programme

 

Monday 05 January 2009 – Invited Programme

 

Session 1: Fundamental limits

Chair: Bhaskar Krishnamachari

9:00 to 9:30

Onkar Dabeer

O. Dabeer, "On the single-slot capacity of random access over a Gaussian MAC,'' ITA Workshop, 2008

9:30 to 10:00

Ayalavadi Ganesh

A. Ganesh and F. Xue, "On the connectivity and diameter of small world networks," Journal of Applied Probability, 2007

10:00 to 10:30

P. Vijay Kumar

DMT, diversity, degrees of freedom for cooperative relay networks

K. Sreeram, S. Birenjith, and P. Vijay Kumar "DMT of multihop cooperative networks: Part 1 & Part 2", ISIT 2008

 

10:30 to 11:00

Venugopal V. Veeravalli

V.S. Annapureddy and V.V. Veeravalli. "Gaussian interference networks : Sum capacity in the low interference regime," ISIT 2008

 

 

11:00 – 11:30                                                          COFFEE BREAK

 

Session 2: Hide, sense, and smoke out

Chair: Ashok Kumar Das

11:30 to 12:00

Raghupathy Sivakumar

S. Lakshmanan, C.-L. Tsao, R. Sivakumar, and K. Sundaresan, "Securing wireless data networks against eavesdropping using smart antennas," ICDCS, June 2008.

12:00 to 12:30

David Kotz

C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, “AnonySense: Privacy-Aware People-Centric Sensing,MobiSys, June, 2008

12:30 to 1:00

Pavan Nuggehalli, Vanu Inc.

P. Nuggehalli, M. Sarkar, K. Kulkarni, R. R. Rao, "A game-theoretic analysis of QoS in wireless MAC," Infocom 2008

 

 

1:00 – 2:00                                                              LUNCH

 

Session 3: Application-specific algorithms

Chair: Arzad Alam Kherani

2:00 to 2:30

Sharad Jaiswal

S. Deb, S. Jaiswal, and K. Nagaraj, "Real-time video multicast in WiMAX networks," Infocom 2008

2:30 to 3:00

Ramachandran Ramjee

P. Mohan; V. N. Padmanabhan; R. Ramjee, “Nericell: Rich monitoring of road and traffic conditions using mobile smartphones," ACM SenSys, Raleigh, NC, USA, Nov 2008

 

 

3:00 – 3:30                                                              COFFEE BREAK

 

Session 4: Optimisations

Chair: Venugopal V. Veeravalli

3:30 to 4:00

Prasanna Chaporkar

P. Chaporkar and A. Proutiere, “Adaptive network coding and scheduling for maximizing throughput in wireless networks,” MOBICOM 2007

4:00 to 4:30

Bhaskar Krishnamachari

Maximizing Network Utilization in Wireless Sensor Networks

A. Sridharan and B. Krishnamachari, "Maximizing network utilization with max-min fairness in wireless sensor networks," Wireless Networks, 2008

4:30 to 5:00

Alexandre Proutiere

P. Chaporkar and A. Proutiere, "Joint-optimal probing and scheduling in wireless systems," WiOpt 2008

 

 

 

Tuesday 06 January 2009 – Contributed Programme

 

Session 5: Algorithms

Chair: Alexandre Proutiere

9:00 to 9:30

Experiences with WM: A centralised scheduling approach for performance management of IEEE 802.11 wireless LANs

M. Hegde, P. Kumar, K. R. Vasudev, S. V. R. Anand, A. Kumar, J. Kuri

9:30 to 10:00

REEF: A reliable and energy efficient framework for wireless sensor networks

K. S. Arun Kumar, V. J. Ribeiro

10:00 to 10:30

Spectrally efficient sensing protocol for cognitive relay systems

Y. Han, A. Pandharipande, Y. Wang, S. H. Ting

 

10:30 to 11:00

Scalable power selection method for wireless mesh networks

T. O. Olwal, B.J. van Wyk, Y. Hamam, N. Ntlatlapa

 

 

11:00 – 11:30                                                          COFFEE BREAK

 

Session 6: Performance evaluation

Chair: Vinay Ribeiro

11:30 to 12:00

Exploiting multiple paths and diversity in wireless networks for high goodput and low latency

V. Sharma, K. Kar, S. Kalyanaraman, K. K. Ramakrishnan

12:00 to 12:30

Performance study of IEEE 802.11n WLANs

T. Selvam, S. Srikanth

12:30 to 1:00

WiMAX system design and evaluation methodology using the NS-2 simulator

X. Guo, R. Rouil, C. Soin, S. Parekh, B. Sikdar, S. Kalyanaraman

 

 

1:00 – 2:00                                                              LUNCH

 

Session 7: Security and authentication

Chair: David Kotz

2:00 to 2:30

An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks

A. K. Das

2:30 to 3:00

Performance of broadcast authentication for secure V2V safety applications: A holistic view

A. A. Kherani, A. Iyer, A. Varghese, R. Shorey

 

 

3:00 – 3:30                                                              COFFEE BREAK