Difference between revisions of "Pubs:2008"

From Pel
Jump to navigation Jump to search
Line 1: Line 1:
 
 
<bibtex>
 
<bibtex>
 
@proceedings {
 
@proceedings {

Revision as of 17:45, 4 March 2012

<bibtex> @proceedings { type={proceedings }, cite={237}, title={An Adaptive Vehicle Route Management Solution Enabled by Wireless Vehicular Networks}, year={2008}, month={21/09/2008}, abstract={In order to accommodate the constantly growing number of vehicles on the road with which infrastructure provision is failing to cope, new means of optimizing the available road space are required. This paper presents a novel adaptive vehicle routing algorithm for TraffCon - an innovative Traffic Management System enabled by wireless vehicular networks. The algorithm combats the vehicular traffic congestion problem by seeking to optimize the usage of existing road capacity, while also minimising vehicle fuel consumption and emissions. Results demonstrate that the algorithm significantly increases road utilisation, reduces congestion, average journey times and fuel consumption in comparison with existing approaches.}, keywords={Wireless networking, Vehicular Communication, Road Traffic Congestion}, author={Kevin Collins, Gabriel-Miro Muntean}, </bibtex> <bibtex> @proceedings { type={proceedings }, cite={236}, title={Route-based Vehicular Traffic Management for Wireless Access in Vehicular Environments}, year={2008}, month={21/09/2008}, address={Calgary, Canada}, abstract={Traffic congestion is a very serious problem which is becoming ever worse as the growth in the number of cars on the road significantly out-paces the provision of road capacity. This paper presents a novel vehicle routing algorithm for TraffCon - an innovative Traffic Management System for wireless vehicular networks - and discusses its complexity. The algorithm combats the traffic congestion problem by seeking to optimize the usage of the existing road capacity, reduce vehicle trip times and decrease fuel consumption and the consequent gas emissions. Results demonstrate that the algorithm significantly increases road capacity utilisation and consequently reduces traffic congestion in comparison with an existing approach.}, keywords={Wireless networking, Vehicular Communication, Road Traffic Congestion}, author={Kevin Collins, Gabriel-Miro Muntean}, </bibtex> <bibtex> @proceedings { type={proceedings }, cite={247}, title={Analysis of Random Data Hopping in Distributed Multihop Wireless Networks}, year={2008}, month={18 November}, publisher={IEEE}, address={Hyderabad, India}, abstract={Spatial reuse TDMA (time division multiple access)}, </bibtex> <bibtex> @proceedings { type={proceedings }, cite={235}, title={A Vehicle Route Management Solution for Wireless Vehicular Networks}, year={2008}, month={14/04/2008}, address={Phoenix, AZ, USA}, abstract={Traffic Congestion is a very serious problem which is growing worse as the number of cars on the road continues to increase, out-pacing the provision of road capacity. This paper presents a novel vehicle routing algorithm for TraffCon - an innovative Traffic Management System for Wireless Vehicular Networks. The algorithm tackles the traffic congestion problem by seeking to optimize the usage of the existing road capacity, reduce vehicle trip times and decrease fuel consumption and the consequent gas emissions. Results demonstrate that the algorithm significantly reduces congestion, journey times and fuel consumption and emissions in comparison with an existing approach.}, keywords={Wireless networking, Vehicular Communication, Road Traffic Congestion}, author={Kevin Collins, Gabriel-Miro Muntean}, </bibtex> <bibtex> @article { type={article }, cite={220}, title={Analysis of a Large-Scale VOD Architecture for Broadband Operators: A P2P-Based Solution}, journal={IEEE Communications Magazine}, volume={46}, year={2008}, month={12/2008}, pages={47-55}, publisher={IEEE}, abstract={VOD services distribution is gaining unprecedented interest from the consumer communication industry due to its growing success in both the Internet and residential broadband market. In this article we present a scalable VOD distribution architecture for broadband operators. The solution is based on a P2P streaming concept in which a VOD streaming session requested by a given STB (Set-Top-Box) is actually provisioned via a multisource streaming session. This solution has the advantage of scaling naturally with the number of STBs in the network. In this article we focus on efficiently translating the popularity distribution into content availability in the network. Different aspects related to this issue are analyzed and challenges highlighted.}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={183}, title={A Learner, is a Learner, is a User, is a Customer - QoS-based Experience-aware Adaptation}, booktitle={ACM Multimedia}, year={2008}, month={10/2008}, abstract={This paper describes an outline of the doctoral thesis work}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={162}, title={Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems}, booktitle={ICT Mobile Summit}, year={2008}, month={06/2008}, publisher={IEEE}, organization={IEEE}, abstract={This paper focuses on analysing the variation in IEEE802.11k channel load measurements for neighbouring WLAN systems. The channel load functionality was implemented in the QualNet simulation tool, and several scenarios were configured for testing. The effects of different numbers of active systems with different traffic patterns were examined. The results obtained indicate significant variation in channel load values calculated by different stations experiencing different levels of interference. This variation leads us to question the usefulness of a single channel load measurement; hence considerable care must be taken when using and interpreting such measurements. }, keywords={IEEE802.11k, Channel Load Measurements, Interference}, author={C. Thorpe and S. Murphy and L. Murphy}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={223}, title={A Clustering Approach to Planning Base Station and Relay Station Locations in IEEE 802.16j Multi-hop Relay Networks}, booktitle={Proc. IEEE International Conference on Communications (ICC 2008)}, year={2008}, month={05/2008}, abstract={In this paper, a clustering approach to solve a network planning problem for 802.16j relay networks is considered. Our clustering approach consists of three basic steps: (1) divide the nodes into k distinct clusters, (2) solve the planning problem separately for each cluster, and (3) perform a final optimization to reduce issues arising at cluster boundaries. Simulation results show that our approach is more efficient than existing approaches: solutions of equivalent quality can be found in 40% of the time. Thus our technique can be used to solve larger problems with similar hardware, or similar size problems in less time.}, keywords={network planning,802.16j,Wimax,relay network,clustering}, author={Yang Yu and Sean Murphy and Liam Murphy}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={187}, title={User-centric Utility-based Data Replication in Heterogeneous Networks.}, booktitle={IEEE International Conference on Communications, Workshop on Digital Television and Mobile Multimedia Broadcasting (ICC 2008)}, year={2008}, month={05/2008}, abstract={Information overload and convergence of devices aggravate the difficulties of accessing data distributed among various user devices especially when this is performed by mobile users and over heterogeneous wireless networks. Existing data replication systems help increase the performance of the distributed data system, but they do not consider users different levels of interest in various pieces of data and neither heterogeneous wireless connectivity issues. This paper presents the Smart Personal Information Network (Smart PIN), a performance and cost-aware personal information network which uses a novel usercentric utility-based data replication scheme to exchange content automatically, based on both network performance and user interests. The proposed user-centric data replication scheme s evaluation, through simulation, shows improved results in comparison with existing solutions.}, keywords={Data replication, Utility Function, Heterogeneous Network}, author={Seung-Bum Lee and Gabriel-Miro Muntean and Alan F. Smeaton}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={186}, title={Smart PIN: Utility-based Replication and Delivery of Multimedia Content to Mobile Users in Wireless Networks.}, booktitle={IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2008: Mobile and Handheld Systems for Entertainment on the Go}, year={2008}, month={04/2008}, abstract={Next generation wireless networks rely on heterogeneous connectivity technologies to support various rich media services such as personal information storage, file sharing and multimedia streaming. Due to users mobility and dynamic characteristics of wireless networks, data availability in collaborating devices is a critical issue. In this context Smart PIN was proposed as a personal information network which focuses on performance of delivery and cost efficiency. Smart PIN uses a novel data replication scheme based on individual and overall system utility to best balance the requirements for static data and multimedia content delivery with variable device availability due to user mobility. Simulations show improved results in comparison with other general purpose data replication schemes in terms of data availability.}, keywords={Content management, Non-real-time service, Interactive systems, Mobile systems, Portable and handheld devices}, author={Seung-Bum Lee and Gabriel-Miro Muntean and Alan F. Smeaton}, </bibtex> <bibtex> @article { type={article }, cite={221}, title={Performance Analysis of Multi-homed Transport Protocols with Network Failure Tolerance}, journal={IET Communications}, volume={2}, year={2008}, month={02/2008}, pages={336-345}, publisher={IET}, abstract={This paper studies the performance of multi-homed transport protocols tolerant of network failure. It evaluates the performance of different retransmission policies combined with path failure detection thresholds, infinite or finite receive buffers for various path bandwidths, delays and loss rate conditions through SCTP simulation. The results show that retransmission policies perform differently with different path failure detection threshold configurations. It identifies that retransmission of all data on an alternate path with the path failure detection threshold set to zero performs best in symmetric path conditions but its performance degrades acutely in asymmetric path conditions even when the alternate path delay is shorter than the primary path delay. It illustrates that retransmission of all data on the same path with the path failure detection threshold set to one or zero gives the most stable performance in all path configurations.}, </bibtex> <bibtex> @article { type={article }, cite={222}, title={Forward Error Correction Strategies for Media Streaming over Wireless Networks}, journal={IEEE Communications Magazine}, volume={46}, year={2008}, month={01/2008}, pages={72-79}, publisher={IEEE}, abstract={The success of next-generation mobile communication systems depends on the ability of service providers to engineer new added-value multimedia-rich services, which impose stringent constraints on the underlying delivery/transport architecture. The reliability of real-time services is essential for the viability of any such service offering. The sporadic packet loss typical of wireless channels can be addressed using appropriate techniques such as the widely-used packet-level Forward Error Correction. In designing channel-aware media streaming applications, two interrelated and challenging issues should be tackled: accuracy of characterizing channel fluctuations and effectiveness of application-level adaptation. The first challenge requires thorough insight into channel fluctuations and their manifestations at the application level, while the second concerns the way those fluctuations are interpreted and dealt with by adaptive mechanisms such as FEC. In this article we review the major issues that arise when designing a reliable media streaming system for wireless networks.}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={224}, title={Planning Base Station and Relay Station Locations in IEEE 802.16j Multi-hop Relay Networks}, booktitle={Proc. 2nd IEEE Broadband Wireless Access Workshop, colocated with IEEE CCNC 2008}, year={2008}, month={01/2008}, abstract={In this paper, a problem formulation for determining optimal node location for Base Stations (BSs) and Relay Stations (RSs) in relay-based 802.16 networks is developed. The formulation results in an Integer Programming problem. A small modification to the original model is also considered in which the state space is reduced by limiting which nodes can be associated with which. Standard branch and bound techniques are used to solve the problem. The key findings of the paper are that standard techniques can be used to find solutions to problems of small metropolitan scale or for areas within a larger city.}, keywords={network planning,802.16j,Wimax,relay network}, author={Yang Yu and Sean Murphy and Liam Murphy}, </bibtex> <bibtex> @article { type={article }, cite={455}, title={Advanced Solutions for Quality-Oriented Multimedia Broadcasting}, journal={IEEE Trans. on Broadcasting}, volume={54}, year={2008}, pages={494-498}, publisher={IEEE}, abstract={Multimedia content is increasingly being delivered}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={109}, title={A Learner, is a Learner, is a User, is a Customer - So what exactly do you mean by Quality of Experience?}, booktitle={Adaptive Hypermedia and Adaptive Web-based Systems}, year={2008},

abstract={An e-learner’s Quality of Experience (QoE) is informed by previous experiences as a learner, a user of computer/web-based systems, and a customer. This paper surveys different concepts for Quality of Experience (QoE) from different areas such as psychology, internet marketing, web engineering, systems and product development as well as philosophy of education. They are summarized into a proposal for a definition of Learner QoE in adaptive multimedia e-learning systems. A number of factors are identified that are likely to impact on QoE. We propose a <st1:place w:st="on">Delphi</st1:place> study to be used to provide an initial ranking of the importance of these factors. Additional user testing will be required to confirm the findings of this study.

 

},

keywords={adaptive hypermedia, quality of experience, educational philosophy}, author={Sabine Moebs and Jennifer McManis}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={184}, title={ADAPTIVE SOCIAL CONNECTEDNESS IN A MULTIMEDIA E-LEARNING ENVIRONMENT}, booktitle={China-Ireland Conference on ICT (CIICT)}, year={2008}, abstract={Adaptive hypermedia systems are beneficial to e-learners in}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={230}, title={An Interference-Aware Analytical Model for Performance Analysis of Transparent Mode 802.16j Systems}, booktitle={Broadband Wireless Access Workshop co-located with GLOBECOM}, year={2008}, abstract={In this paper, an interference-aware analytical model of IEEE 802.16j systems operating in transparent mode is described. The model can be used to determine the throughput gain that can be achieved by 802.16j relay- based systems under a max-min fairness constraint in which the difference between the data rate delivered to all subscribers is minimized. Two variants of the model are considered – one in which there is no spatial reuse and one in which there is spatial reuse. The study finds that this variant of 802.16j system can deliver significant gains over traditional single-hop access systems: 40% in the case in which there is no spatial reuse and up to 80% when spatial reuse is realised.}, keywords={IEEE 802.16j, optimisation problem, performance gain, transparent multihop relay}, author={Vasken Genc and Sean Murphy and John Murphy}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={335}, title={An Analysis of the Performance of an MIH Based Switch Strategy for Heterogenous Network Mobility}, booktitle={IEEE 17th IST Mobile & Wireless Communications Summit}, year={2008}, publisher={Performance Engineering Lab}, organization={Performance Engineering Lab}, abstract={The increasingly ubiquitous deployment of wireless networks has created}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={446}, title={A Balanced Tree-based Strategy for Unstructured Media Distribution in P2P Networks}, booktitle={IEEE International Conference on Communication}, year={2008}, abstract={Most research on P2P multimedia streaming assumes}, </bibtex> <bibtex> @proceedings { type={proceedings }, cite={404}, title={An Analysis of Alterations to the SCTP RTO Calculation Mechanism for WLAN Environments}, year={2008}, address={France}, abstract={As a connection oriented transport layer protocol the Stream Control}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={448}, title={Comparitive Study of Real-Time Multimedia Transmission over Multi-Homing Transport Protocols}, booktitle={IEEE /IFIP International Conference on Management of Multimedia Networks & Services}, year={2008}, abstract={The availability of multimedia applications suitable for deployment}, </bibtex> <bibtex> @article { type={article }, cite={336}, title={Detecting Performance Antipatterns in Component Based Enterprise Systems}, journal={Journal of Optical Technology}, volume={7(3)}, year={2008}, pages={55-90(36 pages)}, publisher={Bertrand Meyer}, abstract={We introduce an approach for automatic detection of performance antipatterns. The approach is based on a number of advanced monitoring and analysis techniques. The advanced analysis is used to identify relationships and patterns in the monitored data. This information is subsequently used to reconstruct a design model of the underlying system, which is loaded into a rule engine in order to identify predefined antipatterns. We give results of applying this approach to identify a number of antipatterns in two JEE applications. Finally, this work also categorises JEE antipatterns into categories based on the data needed to detect them.}, keywords={Component Systems,Antipatterns}, author={Parsons,T. and Murphy,J.}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={332}, title={Development of an IEEE 802.11s Simulation Model for QualNet}, booktitle={Networking & Electronic Commerce Research Conference}, year={2008}, publisher={Performance Engineering Lab}, organization={Performance Engineering Lab}, abstract={In this work, an initial variant of an 802.11s simulation model for the QualNet}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={447}, title={DONET-VOD:A Hybrid Overlay Solution for Efficient Peer-to-Peer Video on Demand Services}, booktitle={IEEE International Conference on Multimedia & Expo(ICME)}, year={2008}, abstract={The existing DONet-based approach uses successfully a}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={218}, title={ECHO: A Quality of Service based Endpoint Centric Handover scheme for VoIP}, booktitle={Wireless Communications and Networking Conference (WCNC)}, year={2008}, abstract={Existing terminal oriented handover mechanisms}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={331}, title={Extracting Interactions in Component Based Systems}, booktitle={IEEE Transactions on Software Engineering}, year={2008}, publisher={IEEE}, organization={IEEE}, abstract={Monitoring, analysing and understanding component}, </bibtex> <bibtex> @article { type={article }, cite={405}, title={Interference Mitigation in License-exempt 802.16 systems:a distributed approach}, journal={Unlicensed Mobile Access Technology}, volume={August }, year={2008}, pages={49-50}, publisher={Auerbach Publications,Taylor & Francis Group}, abstract={Operating in license-exempt IEEE 802.16 wireless spectrum is a challenging research issue. The}, </bibtex> <bibtex> @article { type={article }, cite={425}, title={Improving Learner Quality of Experience by Content Adaptation based on Network Conditions}, journal={Computers in Human Behaviour}, volume={24}, year={2008}, pages={1452-1472}, publisher={Science Direct}, abstract={Apart from user characteristics, properties of the network over which the content is delivered and}, </bibtex> <bibtex> @article { type={article }, cite={228}, title={IEEE 802.16j Relay-based Wireless Access Networks: An Overview}, volume={15}, year={2008}, pages={56-63}, publisher={IEEE}, abstract={Multihop wireless systems have the potential to offer improved coverage and capacity over single-hop radio access systems. Standards development organizations are considering how to incorporate such techniques into new standards. One such initiative is the IEEE 802.16j standardization activity, adding relay capabilities to IEEE 802.16 systems. This article provides an overview of this relay-based technology, focusing on some of the most pertinent aspects. In particular, the different modes of operation (transparent and non-transparent), framing structures, and network entry procedures are described. Some consideration of the issues in designing such systems is then given, which highlights when different features within the standard are most appropriate. As these systems are very new, many open issues remain to be resolved.}, keywords={802.16j, overview, design}, author={Vasken Genc and Sean Murphy and Yang Yu and John Murphy}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={193}, title={M3S - Multimedia Mobility Management and Load Balancing in Wireless Broadcast Networks}, booktitle={China-Ireland International Conference on Information and Communications Technologies 2008 (CIICT 2008)}, year={2008}, pages={515-521}, abstract={Wireless local-area networks represent a viable broadband Internet access solution for enterprise, residential and public areas. Due to its short range radio, multiple wireless access points are necessary to cover a certain physical area. The tendency of mobile users to group in certain areas of interest and of mobile devices to connect to the access point with the highest signal strength determines the overall network load to be highly unbalanced. To overcome this issues which drastically affects user bandwidth share as well as the efficiency of network resource utilization, special load balancing techniques has to be employed. This paper presents the Multimedia Mobility Management System (M3S), a quality oriented mobility management framework which aims at maximizing user perceived multimedia quality by efficiently distributing the traffic load over all the communication resources available. Simulation based testing results are presented, outlining the performance of M3S against other load balancing techniques which rely on mobile device re-association with least congested access points.}, keywords={wireless broadcast networks, load balance, mobility management}, author={Bogdan Ciubotaru and Gabriel-Miro Muntean}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={436}, title={M3S-Multimedia Mobility Management & Load Balancing in Wireless Broadcast Networks}, booktitle={IET Chine-Ireland International Conference on Information & Communications Technology}, year={2008}, abstract={Wireless local-area networks represent a viable broadband Internet access solution for enterprise, residential and public areas. Due to its short range radio, multiple wireless access points are necessary to cover a certain physical area. The tendency of mobile users to group in certain areas of interest and of mobile devices to connect to the access point with the highest signal strength determines the overall network load to be highly unbalanced. To overcome this issues which drastically affects user bandwidth share as well as the efficiency of network resource utilization, special load balancing techniques has to be employed. This paper presents the multimedia mobility management system (M3S), a quality oriented mobility management framework which aims at maximizing user perceived multimedia quality by efficiently distributing the traffic load over all the communication resources available. Simulation based testing results are presented, outlining the performance of M3S against other load balancing techniques which rely on mobile device re-association with least congested access points}, keywords={Multimedia,Wireless Networks,Mobile Communication}, author={B.Ciubotaru and Gabriel-Miro Muntean}, </bibtex> <bibtex> @article { type={article }, cite={453}, title={Open Corpus Architecture for Personalised Ubiquitous e-Learning}, journal={Personal & Ubiquitous Computing}, volume={13}, year={2008}, pages={197-205}, publisher={Springer Verlag}, abstract={As the e-learning area matures, there are a}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={231}, title={Performance Analysis of Transparent Relays in 802.16j MMR Networks}, booktitle={WiOpt}, year={2008}, abstract={A simulation study of the performance of transparent mode relay-based 802.16j systems is described. The study focuses on the gain in throughput that is possible in omnidirectional relay systems and increases in signalling requirements that arise due to the multihop network architecture. The study finds that the introduction of transparent mode relays cannot deliver improved throughput for a substantial part of the coverage area of a Base Station (BS) – only approximately half of the total area covered by the BS can benefit from throughput enhancement. Further, the study shows that 802.16j based systems require significant signalling overhead, with almost twice that of 802.16e in the cases studied. Finally, the study demonstrates that in a topology with users uniformly distributed within the BS cell coverage, the maximum throughput increase on the downlink that can be achieved is relatively low. Much further work is necessary to realise useful gains from these systems.}, keywords={MMR, transparent multihop relay, performance, omnidirectional antenna}, author={Vasken Genc and Sean Murphy and John Murphy}, </bibtex> <bibtex> @inproceedings { type={inproceedings }, cite={333}, title={Path Selection of SCTP Fast Retransmission in Multi-Homed Wireless Environments}, booktitle={13th IFIP International Conference on Personal Wireless Communications}, year={2008}, publisher={Performance Engineering Lab}, organization={Performance Engineering Lab}, abstract={In heterogeneous wireless network environments, network connections}, </bibtex> <bibtex> @article { type={article }, cite={454}, title={Region of Interest-based Adaptive Multimedia Streaming Scheme}, journal={IEEE Trans. on Broadcasting}, volume={54}, year={2008}, pages={296-303}, publisher={IEEE}, abstract={Adaptive multimedia streaming aims at adjusting}, </bibtex> <bibtex> @article { type={article }, cite={334}, title={Static Verification of Component Composition in Contextual Composition Frameworks}, journal={International Journal on Software Tools for Technology Transfers}, volume={10(3)}, year={2008}, pages={247-261(15 pages)}, publisher={Springer Berlin / Heidelberg}, abstract={Contextual component frameworks, such as Enterprise JavaBeans (EJB), allow for components to specify boundary conditions for the runtime context. These conditions are satisfied at runtime by services of the underlying platform, thus ensuring that the context in which components run exhibits properties that allow them to operate correctly. Depending on how components call each other, it is possible that satisfying such conditions lead to problems such as reduced performance due to redundant service execution, or permanent errors (composition mismatches), due to incompatible boundary conditions. Currently, the semantics of these boundary conditions are expressed in natural language only, making it impossible to incorporate them into an automatic analysis tool. Furthermore, early understanding of how components call each other would be necessary, but it is currently difficult to achieve by means of a tool, as the method dispatch rules in a component system differ from the dispatch rules of the programming language(s) in which they were developed. We have developed a metamodel, $${\mathbb{M}}$$ , for describing boundary conditions, an analysis method, $${\mathbb{A}}$$ , and a static component-level call graph extraction method for EJB applications, CHA EJB . $${\mathbb{A}}$$ uses $${\mathbb{M}}$$ models to analyze inter-component call graphs, and thus detect problems such as composition mismatches or redundancies, thus allowing for remedial action to take place. We present $${\mathbb{M}},{\mathbb{A}}$$ and CHA EJB in this article, show that $${\mathbb{A}}$$ produces correct results, and describe a prototype analysis tool implementing the three, which we used to validate our approach on two popular EJB applications. }, keywords={Software components - Contextual composition - Static analysis - Enterprise Java }, author={Trofin,M. and Murphy,J.}, </bibtex> <bibtex> @proceedings { type={proceedings }, cite={406}, title={SCTP Switchover Performance Issues in WLAN Environments}, year={2008}, publisher={Performance Engineering Lab}, address={Las Vegas,Nevada}, abstract={The increased number and diversity of underlying}, </bibtex> <bibtex> @proceedings { type={proceedings }, cite={478}, title={Service quality improvement based on Network Attachment Subsystem extensions and Service Enhancement Function - Mesh Networks as an example}, year={2008}, abstract={...}, keywords={WMN, Security}, author={Andreas Roos and Sebastian Robitzsch and Bangnan Xu and Sabine Wieland and Andreas Schwarzbacher}, </bibtex> <bibtex> @proceedings { type={proceedings }, cite={477}, title={Wireless Mesh Network Coverage with QoS Differentiation for Rural Areas}, year={2008}, abstract={...}, keywords={WMN}, author={Mathias Kretschmer and Sebastian Robitzsch and Christian Niephaus and Karl Jonas and Gheorghita Ghinea}, </bibtex>