About the Conference
General Information
Events & Tours
Keynote / Plenary Speakers
Call for Workshop Papers
Technical Symposia
Paper Submission
Patronage Power Packages
ACCESS '07 Executive Business Forum
Design & Developers Forum
Tutorials and Workshops
Information for Authors/Speakers
Conference Program
Visa Assistance


   25 November 2007

   26 November 2007

   27 November 2007

   27 November 2007

Co-located events:
> Click here for the latest conference information, including program updates and important conference deadlines.



MONDAY, 26 November 2007 TUTORIALS
Spectrum Policy and the Wireless Engineer: Navigating the Regulatory Maze to Get New Technology from Laboratory to Market     Code Designs for Multi-Terminal Communication Networks  
A Crash Course in Wireless Meshes   Fundamentals of UWB Systems  
Key Topics in Cognitive Radio Networks: Challenges, Tasks, Algorithms, and Testbed  

The Next Generation CDMA Technologies

Standardization of MIMO-OFDM Technology   Adaptive Processing and Cross-Layer Design in Wireless Communications  
IP Multimedia Subsystem (IMS): A Platform for Convergence and Next Generation Services   Security Issues in Sensor Networks  
MONDAY, 26 November 2007 WORKSHOPS
8th International Workshop on Optical Networking Technologies   Workshop on Security and Privacy in 4G Networks  
1st IEEE Workshop on Enabling the Future Service-Oriented Internet   2nd International Workshop on Distributed Autonomous Network Management Systems (DANMS)  
Multi-Sensor Data Fusion    
FRIDAY, 30 November 2007 TUTORIALS
Cognitive Radio Networks for license-exempt use of TV Spectrum: FCC Regulation, Technical Challenges, and Emerging Standards   Next Generation Wireless Technologies: High Throughput WiFi, WiMAX, and UWB  
Multiuser MIMO Techniques for Wireless Systems   Automotive Networking and Telematics Applications  
Web Security   MIMO Detection: Theory and Practice  
WiMAX: An Advanced Broadband Wireless System   Next Generation Cellular Networks: Features and Algorithms  
Generalized MultiProtocol Label Switched (GMPLS) Networks   Routing in Delay Tolerant Mobile Ad Hoc Networks: Overview and Challenges  
On-Demand Enterprise: Virtualization and Grid-Based Mechanisms for Service Continuity   Internet Protocol Multimedia Subsystem (IMS) for New Generation Enterprise Services  
FRIDAY, 30 November 2007 WORKSHOPS
IEEE Workshop on Service Discovery and Composition in Ubiquitous and Pervasive Environments (SUPE)   2nd IEEE Automotive Networking and Applications (AutoNet) Workshop  
Wireless Mesh and Sensor Networks   Coding for Data Storage  
MONDAY, 26 November 2007 •  9:00 am – 12:00 pm TUTORIAL 

Spectrum Policy and the Wireless Engineer: Navigating the Regulatory Maze to Get New Technology from Laboratory to Market
Instructors: Dr. Michael Marcus, Marcus Spectrum Solutions
Anne Linton, Washington Federal Strategies, LLC

Wireless technology is subject to significant government regulation all over the world. Thistutorial is an overview for wireless engineers of the regulatory issues you may encounter in moving a new technology from the lab to the marketplace and how you to plan for them. These issues deal with frequency allocation, experimental licensing, licensing, unlicensed systems, and equipment authorization. Knowing what the issues are enables the developer to make realistic plans in parallel to R&D efforts.


MONDAY, 26 November 2007 • 9:00 am – 12:00 pm TUTORIAL

Code Designs for Multi-Terminal Communication Networks
Instructor: Dr. Zixiang Xiong, Texas A&M University

Multi-terminal communication networks allow transmission of multiple sources over multiple channels, offering potentially untethered communications, coordination and collaboration among different terminals. They are expected to transform science and engineering research and change the way we live, work, and communicate with better networked services. The underpinning network information theory, although still partial, generalizes Shannon's classic information theory and promises strong potential gains over conventional point-to-point communication techniques. Problems considered in network information theory include distributed source coding (Slepian-Wolf coding, Wyner-Ziv coding and multiterminal source coding), Gelfand-Pinsker/dirty-paper coding, coding for the MIMO broadcast channel, coding for the relay channel, and coding for the multiple-access channel.

Recent works on limit-approaching practical designs for distributed source coding and dirty-paper coding have set the stage for applications of network information theory to multi-terminal communication networks (e.g., distributed sensor networks and wireless cooperative networks). This tutorial will provide a comprehensive coverage of the theory, practical designs and applications of distributed source coding, dirty-paper coding, and cooperative diversity.


MONDAY, 26 November 2007 • 9:00 am – 12:00 pm TUTORIAL

A Crash Course in Wireless Meshes
Instructor: Dr. Victor Bahl, Networking Research Group

This is a fast paced tutorial on the development of practical, deployable, and low-cost wireless mesh networks. We will cover on-going research in industry and academia.  Topics that will be covered in this tutorial include:

Practical system architecture for enterprise-wide office meshes,
   city-wide meshes, and neighborhood community meshes
Increasing capacity and scalability in mesh networks
High performance multi-radio, multi-spectral systems
Network management - auto-configuration (zero configuration), fault
   diagnosis, and what-if analysis
Performance of routing and different link quality metrics
QoS and fairness support
Medium Access Control protocol for multi-channel meshes, for meshes
   with directional antennas
Privacy and security - threat analysis and some solutions
Broadcasting and multicasting
Cross-layer design and optimization
Information theoretic tools for predicting network viability
   and performance
Testbed design, measurements and deployment experience
Standards: IEEE 802.11s, IEEE 802.15.5, IEEE 802.16 mesh, IEEE
   802.20 mesh
Advanced antenna technologies (MIMO, beam forming, etc.)
Spectrum policy and etiquettes, Cognitive and frequency-agile radios
Industry landscape - which is doing what in the industry
The tutorial is designed to lay down the technological challenges for mesh networking and describe how the research community is addressing them. Issues associated with each layer of the protocol stack will be explored as well as various cross-layer approaches. There will be an emphasis on discussing the experiences and lessons learnt from various experimental testbeds. This tutorial is ideal for engineers, graduate students, executives and practitioners in the field of wide-area wireless (3G) and 802.11 LAN technologies. The level of this tutorial can be classified as Intermediate to Advanced.


MONDAY, 26 November 2007 • 9:00 am – 12:00 pm TUTORIAL

Fundamentals of UWB Systems
Instructor: Prof. Win Moe, Massachusetts Institute of Technology (MIT)

Ultra-wide bandwidth (UWB) transmission systems have gained interest in the scientific, commercial, and military sectors. Wide bandwidth provides fine delay resolution, making UWB a viable candidate for communications in dense multipath environments, such as short-range or indoor wireless communications. Currently, UWB transmission systems are under consideration for communications and sensor networks because they potentially allow low-cost production and reuse of (already occupied) spectrum. UWB also has applications for military operations because it provides low probability of detection as well as anti-jam capabilities. Recent ruling concerning UWB emission masks, by the US Federal Communications Commission (FCC), opens the way for coexistence with traditional and protected radio services and allows the potential use of UWB transmission without allocated spectrum.

This tutorial provides a basic understanding and a technical overview that encompass the fundamentals of UWB system design and analysis. It will cover relevant topics including:

Transmitted-Reference Systems
Rake Reception
Effect of Narrowband Interference
Distribution-Invariant Monotonicity Theorems
Fundamental Limits on Wide Bandwidth Signal Acquisition
Ranging and Localization


MONDAY, 26 November 2007 • 9:00 am – 12:00 pm TUTORIAL

Adaptive Processing and Cross-Layer Design in Wireless Communications
Instructor: Prof. Mohamed Ibnkahla, Queen’s University

Adaptation in wireless networks is very important as it allows the wireless communication system to adapt itself to the channel and network changing conditions. Adaptation can be made at the receiver (e.g., adaptive equalization), at the transmitter (e.g., adaptive modulation and coding), and more generally, at the different layers of the network protocol stack (e.g., adaptive radio resource management).

This tutorial covers adaptive techniques as well as cross-layer approaches and their impact on current and future wireless communications. The tutorial will be supported, in particular, with illustrations and demonstrations of adaptation in MIMO and OFDM systems, sensor and ad hoc networks, as well as heterogeneous networks.


MONDAY, 26 November 2007 9:00 am – 12:00 pm WORKSHOP

Multi-Sensor Data Fusion
Chairs: Dr. Syed Aon Mujtaba, LSI Corp.
Dr. Jack H. Winters, JWC

Multi-sensor data fusion is a concept whereby data collected from multiple sensors is processed and combined in a manner that improves the accuracy of the decision making process compared to that in a single sensor system. While the underlying principle of multi-sensor data fusion is simple (i.e., multiple information sources providing redundancy and diversity), there are several challenges associated with realizing a cost-effective and robust system, which requires a cross-disciplinary approach with joint multi-disciplinary optimization. A system leveraging multi-sensor data fusion techniques will typically consist of an array of sensors, feeding data into a central node that processes and fuses the data to make a decision or an inference. Application of the multi-sensor data fusion concept can be found in both the commercial and military sectors. The first challenge is associated with the design of sensors, which can be either homogeneous or heterogeneous. In complex systems, information may have to be gathered in a variety of forms, such as radio, optical, thermal, and acoustic. The second challenge is the reliable transfer the data from the sensor nodes to the central node. The sensors may be mobile (and perhaps power constrained) and/or not co-located. The third challenge is the fusion of data from multiple sensors, particularly when they are heterogeneous. Different sensors may experience different noise levels and different operating conditions. Hence, multi-sensor data fusion systems have three main areas of focus for cross-disciplinary research – sensors, networking, and data fusion. Joint optimization of these areas can use signal processing techniques that are well established in communication systems, such as estimation theory, error control coding, and sigma-delta processing. In this workshop, we will explore this theme by inviting subject matter experts in sensor design, network protocol design, and data fusion algorithms.


MONDAY, 26 November 2007 • 2:00 pm - 5:00 pm TUTORIAL

Key Topics in Cognitive Radio Networks: Challenges, Tasks, Algorithms, and Testbed
Instructors: Prof. Ekram Hossain, University of Manitoba
Prof. Weidong Xiang, University of Michigan-Dearborn

Cognitive Radio (CR) has emerged as a new paradigm for designing the next generation wireless communications systems. In general, it refers to an innovative dynamic spectrum management/sharing technology for wireless communications systems which can make a better use of the scarce radio spectrum. A CR transceiver can instantaneously sense and adapt to the time-varying electromagnetic environments. The technical issues involved in designing CR include: electromagnetic environment awareness, channel prediction and allocation, cooperative transmission strategy, estimation and control of mutual interference, system capacity evaluation, spectrum management for sharing and pricing, and Quality of service (QoS)-aware protocol design. Built upon software defined radio (SDR), CR combines wireless communications and mobile networking with signal processing, machine learning, optimization, and microeconomic models. CR technology is currently of big interest to researchers and practitioners involved in the design, analysis, and optimization of next generation wireless access systems and networks.

This tutorial intends to provide the audience with an in-depth introduction to the fundamental concepts, essential principles, and advanced algorithms for CR systems with a broad coverage spanning from theoretical analysis to experimental testbed results. The main contents of this tutorial include: principles of CR, key physical layer technologies for CR, dynamic spectrum management/sharing models, and results from a CR testbed. At first, the tutorial will give an overview of CR systems including the basics of CR systems and the different spectrum sharing models. Next, a spectrum estimate and prediction model, a flexible spectrum allocation scheme, and system capacity analysis under a given interference temperature will be discussed in detail. After that, with a friendly introduction to the basic game theory concepts, several game theoretic dynamic spectrum management/sharing models for cognitive radio will be introduced. Applications of these models for spectrum sharing and pricing in WiFi and WiMAX-based cognitive radio networks will be also discussed. Finally, results from a CR testbed, which integrates a fast two-stage spectrum sensing algorithm, an efficient channel allocation scheme, and a Markov channel prediction model, will be presented. In this way, an exciting multidisciplinary area of "wireless" research will be exposed to the attendees.


MONDAY, 26 November 2007 2:00 pm – 5:00 pm TUTORIAL

The Next Generation CDMA Technologies
Instructor: Prof. Hsiao-Hwa Chen, National Sun Yat-Sen University

Future wireless communication systems should be operating mainly, if not completely, for burst data services carrying multimedia traffics. The need to support high-speed burst traffic has already posed a great challenge to all currently available air-link technologies based on either TDMA or CDMA. The current CDMA technology has been widely used in both 2G and 3G mobile cellular standards and it has been suggested that it is not suitable for high-speed burst-type traffic. There are many problems with the first generation CDMA technology, such as its low spreading efficiency, interference-limited capacity and the need for precision power control, etc.

This tutorial covers various important issues about the next generation CDMA technologies as a major air-link technology for beyond 3G wireless applications. It includes the topics from next generation CDMA system modeling to analytical methodology, starting with the basics and progressing to advanced subjects. Innovative CDMA technologies will be introduced in a step-by-step approach, such as DS/CC-CDMA, OS/CC-CDMA, space-time complementary coding CDMA, M-ary CDMA, etc. As an all-in-one tutorial on next generation CDMA technologies, it is a must for telecommunications engineers, advanced R&D personnel, undergraduate and postgraduate students.


MONDAY, 26 November 2007 2:00 pm – 5:00 pm TUTORIAL

Standardization of MIMO-OFDM Technology
Instructors: Dr. Syed Aon Mujtaba, LSI Corporation
Dr. Jack Winters, AT&T Labs-Research

Standards Development Organizations around the world are making rapid advances in adopting MIMO-OFDM as the technology of choice for emerging broadband wireless standards. These include IEEE 802.11n the next generation standard for wireless local area networking, IEEE 802.16e a new standard for metropolitan area networking, and 3GPP Long Term Evolution (LTE) the next generation standard for cellular networking. When multiple antennas are deployed at the transmitter, they can be used to increase data rates and/or enhance link robustness. Data rates can be increased by using space division multiplexing, while link robustness can be enhanced through transmit beamforming and/or transmit diversity. All these techniques require varying degrees of standardization support.

This tutorial will identify the various flavors of MIMO-OFDM that are being standardized in 802.11n, 802.16e, and LTE, and describe in detail the similarities and differences of these systems. The topics covered in this tutorial include spatial multiplexing, transmit diversity, and transmit beamforming techniques.


MONDAY, 26 November 2007 2:00 pm – 5:00 pm TUTORIAL

IP Multimedia Subsystem (IMS): A Platform for Convergence and Next Generation Services
Instructor: Vijay K. Varma, Telcordia Technologies

The IP Multimedia Subsystem (IMS) is considered as the platform of choice for providing a unified session control on top of multiple access network technologies for realizing flexible multimedia applications. IMS, with its access-agnostic session layer, is also driving the concept of Fixed-Mobile Convergence by merging the fixed and mobile telecommunication networks with the Internet and the adoption of IP technologies within the telecom domain. IMS represents conceptually a combination of the traditional fixed and mobile networks from the telecom domain with emerging VoIP and Internet applications in order to implement a seamless multimedia service environment.

This tutorial will start with a brief introduction to IMS vision and its evolution from GSM/UMTS. It will then discuss IMS concepts, architectures, procedures, protocols and services. As communications networks are evolving towards packet-based infrastructures with IMS control, consistent provision of services from different access networks becomes a major challenge, particularly during the transition period from circuit-switched networks. The tutorial will discuss how the 3GPP is addressing this challenge with its on-going and emerging work on IMS centralized services (ICS), Combined Circuit-Switched and IMS (CSI), Service Level Interworking of Messaging Services, and Multimedia Session Continuity. The tutorial will also cover fixed-mobile convergence, migration scenarios, interworking with existing networks, and a survey of field trials and early deployments of IMS networks.


MONDAY, 26 November 2007 2:00 pm – 5:00 pm TUTORIAL

Security Issues in Sensor Networks
Instructor: Prof. Yang Xiao, University of Alabama

Sensor networks have many applications, and security issues in some sensor applications are very important such as monitoring applications in the battle fields. Sensor networks differ from other traditional networks with many aspects such as limited energy, limited memory space, limited computation capability, etc. Therefore, sensor network security has some unique features which do not exist in other networks.

This tutorial will provide an overview of the security issues and solutions of sensor networks including attacks, encryption, authentication, key managements, secure routing, secure aggregation, secure location, intrusion detection, privacy issues, security services, RFID security, Zigbee Security, lightweight ciphers, security in sensor and actuator networks, security in underwater sensor networks, etc.


MONDAY, 26 November 2007 9:00 am – 5:00 pm WORKSHOP

Workshop on Security and Privacy in 4G Networks
Chairs: Prof. Seung-Woo Seo, Seoul National University
Dr. Anand R. Prasad, DoCoMo Eurolabs

Workshop on Security and Privacy in 4G Networks will bring together security and privacy experts, practitioners, standards developers and others in academia, industry and government. The objective of this workshop is to identify the key issues to be addressed by future research in the areas of security and privacy in 4G networks that will constitute of a new air interface providing higher capacity and increased coverage in the form of multi-hop communication and interworking with existing radio access networks. The spectrum for a new air interface in 4G will be decided this year at WRC 2007. Since research, standardization, and development of 4G will become more focused than before, this is the perfect time to identify the research topics in 4G. The characteristics of 4G, e.g., enhanced internetworking and high mobility, will lead to added system requirements that are far more complex than what we have seen in current networks.  As the 4G network provides many new service applications, security and privacy will become one of the key issues in 4G


MONDAY, 26 November 2007 9:00 am – 5:00 pm WORKSHOP

1st IEEE Workshop on Enabling the Future Service-Oriented Internet
Chairs: Michael Devetsikiotis, North Carolina State University
George Michailidis, University of Michigan

Service- and application-oriented networks represent an area of convergence between communications and computing, based on modular, distributed and re-configurable capabilities, and blending network and service functions in a way that emphasizes end-user and business functionality. The objective of this workshop is to address network-level as well as application and service-layer topics of analysis, design, monitoring and experimentation. The top-down interplay between services and networking creates unique modeling, design and implementation challenges. The goal of this workshop is to focus the community's efforts in building up this important area by discussing perspective issues and required breakthroughs in research and development. The workshop format will be a combination of original papers, review/white papers, quick "hot topic" presentations, and a panel discussion with participants from industry, the NSF, and academia. This will allow workshop participants to obtain a global perspective of the scope of this area and of the technical challenges associated with it, in a participative and interactive manner.


MONDAY, 26 November 2007 9:00 am – 5:00 pm WORKSHOP

2nd International Workshop on Distributed Autonomous Network Management Systems (DANMS)
Chairs: Nazim Agoulmine, University of Evry Val d'Essonne
Anne-Marie Bosneag, Ericsson Ireland Research Centre
Farnam Jahanian, University of Michigan Ann Arbor
Francoise Sailhan, Ericsson Ireland Research Centre

The current age of pervasive communication, worldwide networked systems, and converged networks brings the areas of fault tolerance, fault management and quality guarantees to the forefront of today's research topics. Of special importance are cross-domain techniques, distributed fault management architectures, and autonomic protocols for improving the reliability, dependability, and manageability of network-centric systems.  

The IEEE DANMS 2007 workshop will provide an opportunity to bring together a broad range of researchers from network management, distributed systems, dependable systems, and autonomic computing, to exchange ideas and promote discussion on research topics in these areas. The workshop will be comprised of technical presentations, a panel session with representatives from industry and academia, and will provide ample opportunities for free discussions on the ideas presented.


MONDAY, 26 November 2007 2:00 pm – 5:00 pm WORKSHOP

8th International Workshop on Optical Networking Technologies
Chair: Tarek S. El-Bawab, Jackson State University

A number of developments suggest that optical networking is making a comeback to service providers' networks, and many signs point to the access segment of these networks.   Broadband access (wire-line and wireless), multimedia, Voice over Internet Protocol (VoIP), video streaming (conventional and high-definition), and IPTV are drivers thereto and are paving the way for new technology and service paradigms.   Service providers, Telcos and Cable MSOs alike, are facing the challenge of triple play (delivering voice, data, and video to their customers) and optical access solutions are enabling them to do so.

Stretching fiber towards the last mile has always been an interesting option for the industry.   However, this option was not cost effective until recently.   Today, progress in optical technologies brought down the cost of many optical components, devices, and systems, which are instrumental for optical access. Meanwhile, bandwidth-hungry services and demand for triple-play delivery are changing the economics of optical access solutions, which is making a new case for FTTx. This acronym embraces a number of optical access technologies, such as Fiber To The Curb (FTTC), Fiber To The Node (FTTN), Fiber To The Building (FTTB), Fiber To The Home (FTTH), and Fiber To The Premises (FTTP).   Today, FTTx relies on Passive Optical Network (PON) and active Optical Ethernet (OE) architectures.

In this workshop, we will discuss FTTx and examine the penetration of optical technologies into the access segment of service providers' networks.   We will examine several technical, economic, business and market aspects of this topic.


FRIDAY, 30 November 2007 9:00 am – 12.00 pm TUTORIAL

Cognitive Radio Networks for license-exempt use of TV Spectrum: FCC Regulation, Technical Challenges, and Emerging Standards
Instructors: Dr. Jianfeng Wang, Philips Research North America
Dr. Kiran Challapali, Philips Research North America

Although most of the spectrum is allocated much of it is unused. The enormous growth in the wireless industry has come from using a small part of the wireless spectrum, nominally less than 10% under 3 GHz. There is growing evidence of scarcity and overcrowding in these bands reflected for example, by price paid for cellular spectrum. However, measurements have shown other parts of the spectrum -- although allocated -- are virtually unused, and known widely as spectrum white spaces. These white spaces vary from place to place and time to time. Cognitive Radio (CR) technologies enable harnessing these spectrum white spaces, permitted by new spectrum regulation. Specifically, spectrum regulation to allow the unlicensed use of television bands is well underway in the US.

The breakthrough provided by Cognitive Radios is significant because it allows the development of new and innovative types of devices and services for businesses and consumers, without disrupting television and other authorized services. Key benefits include: (a) access to abundant new spectrum, (b) better propagation therefore reliable, low outage communication and low power operation, and (c) peaceful coexistence with other wireless networks. Cognitive Radio topic has featured in MIT Technology Review's top ten most promising emerging technologies. Accordingly, during the last few years, there has been a lot of effort by the FCC, industry and standard groups to make CRs happen. There has also been significant research effort in academia for better understanding of the technical requirements and potential solutions.

The aim of this tutorial is to bring together, and put in context, all the recent progress in addressing the various aspects of cognitive radio networks for license-exempt use of TV bands. This tutorial will cover recent relevant FCC regulation, technical challenges pertaining to communications, networking protocols and implementation, and summarize the emerging standard(s) for Cognitive Radios in TV bands.


FRIDAY, 30 November 2007 9:00 am – 12.00 pm TUTORIAL

Next Generation Wireless Technologies: High Throughput WiFi, WiMAX, and UWB
Instructor: Prof. Raj Jain,  Washington University in St. Louis

This tutorial on latest advances in wireless data networking is designed for engineers and managers involved in design and deployments of wireless equipment.  In addition to providing an overview of technology, issues, and standards, it also covers the technical details. The tutorial will focus on technological developments that enable high-speed wireless networks such as IEEE 802.11n LANs, WiMAX, and Ultra wideband and how these technologies achieve the features and what products are available. 

Technology, industry status, and products featured include:

  • Wireless PHY: CDMA, OFDM, OFDMA, Adaptive Antenna System (AAS), MIMO, Turbo Codes, Space-Time Block Codes, Software defined radios
  • Ultra Wideband: How it works, FCC Rules on UWB, Advantages, DS-UWB, Multi-Band OFDM, Applications, Products
  • IEEE 802.11n: Major Components, Status, Products, Issues
  • WiMAX Overview: Technical and Business Challenges, Prior Efforts, Spectrum Options, QoS Classes, WiBro, Products
  • Other Access Technologies: IEEE 802.11, HSDPA, HSUPA, HSPA, EV-DO, LTE, IEEE 802.20, IEEE 802.22


FRIDAY, 30 November 2007 9:00 am – 12.00 pm TUTORIAL

Multiuser MIMO Techniques for Wireless Systems
Instructor: Howard Huang, Bell Labs at Alcatel-Lucent

This tutorial will present the theoretical capacity-achieving techniques in MU MIMO networks for the multiple access (uplink) and broadcast (downlink) channels. Because of the complexity of these capacity-achieving techniques, we describe suboptimum downlink techniques including sectorization and recent beamforming techniques using limited feedback. On the uplink, we make similar comparisons considering suboptimum resource allocation and multiuser detection techniques. In the context of cellular networks, the MU MIMO performance is limited by interference from adjacent cells. We describe a class of techniques known as network MIMO for mitigating the effects of intercell interference in which spatially distributed base stations transmit and receive signals in a coordinated manner. Finally, we propose a series of guidelines for applying MIMO techniques in practical wireless systems. Given the large number of multiuser MIMO techniques, these insights in performance and complexity tradeoffs can be used by system engineers to choose the right MIMO technology for next-generation wireless systems operating in various environments.


FRIDAY, 30 November 2007 9:00 am – 12:00 pm TUTORIAL

Automotive Networking and Telematics Applications
Instructors: Prof. Wanjiun Liao, National Taiwan University
Prof. Phone Lin, National Taiwan University
Dr. T. Russell Hsing, Telcordia Technologies

In the future, each automobile may serve as a mobile node in the global communications infrastructure, and many potential applications can be supported, including road safety, advanced traffic management, passenger infotainment, and resource management in transportation and telecommunications infrastructure. Significant industrial and governmental efforts have been undertaken to enhance “passive safety” to “active safety” by employing networking functions in vehicles and infrastructures. The unique features of automotive networking and telematics applications generate many interesting research interests and activities, and are expected to foster new transportation products and services. The wireless networking among vehicles and between vehicles and the infrastructure has different characteristics from other conventional wireless networking problems. For example, due to rapidly changing topology as vehicles move around, there are resemblances to mobile ad hoc networking scenarios. However, the constraints and optimizations are very different. One such example is that power efficiency is no longer an issue for vehicle communications as it is for traditional ad hoc networking. Vehicles in general are also constrained to move within roads (and within lanes most of the time) and with higher mobility. Automotive applications also demand stringent communications performance requirements that are not seen in conventional multi-hop wireless networks.

This tutorial course is designed to address important research challenges undertaken for automotive networking and telematics applications. The focus is on network protocols, emerging communications standards, and performance modeling for active safety, telematics, and infotainment applications enabled by a vehicular-to-infrastructure and vehicle-to-vehicle wireless communications technology.

Topics of interest include:

  • Vehicular networking: an overview
  • Vehicular network architecture and protocols
  • Vehicular network MAC, routing, collision avoidance, and congestion control
  • Security for automotive networking
  • Enabling technologies for active safety applications
  • Resource management and performance modeling in vehicular networks


FRIDAY, 30 November 2007 9:00 am – 12.00 pm TUTORIAL

Web Security
Instructor: Tom Chen, Southern Methodist University

The World Wide Web has become such a predominant Internet application that many in the public think that the Web is the Internet. The Web has certainly evolved far from browsing static HTML pages. The Web is now used for e-mail, shopping, banking, socializing, multimedia 
entertainment, and even replacing traditional desktop office applications. The Web's apparent ease of use can mislead some users into a false sense of security. A Web browser is a complex software program with many capabilities, which can be used to open various avenues of attack. For example, a malicious website might download malicious software or deceive a user into disclosing private information. A malicious script might exploit a browser vulnerability to take over a user's computer. A website might install a cookie to monitor a user's browsing habits. Besides risks to Web clients, Web servers are popular targets for attacks. A compromised server could disclose private personal data, or be used as a platform to launch attacks.

This tutorial aims to raise awareness of the many security risks related to the Web. The first part gives an overview of Web protocols and technologies, including DNS, HTTP, SHTTP, SSL, Java, Javascript, ActiveX, and AJAX. The second part of the tutorial focuses on the security of Web servers. We give an overview of possible attacks on Web servers and current practices to strengthen servers against attacks. The third part of the tutorial addresses attacks on the Web client (browser). Many attacks on the user attempt social engineering, malicious downloads, data theft, or exploits of software vulnerabilities. For social engineering, we describe defenses against phishing attacks. For malicious software, we describe the limitations deliberately placed on Java, Javascript, and ActiveX for security. Additional defenses include antivirus, firewalls, and intrusion detection systems. The last part of the tutorial describes current trends and open issues in Web security that merit attention from researchers and system administrators.


FRIDAY, 30 November 2007 2:00 pm – 5.00 pm TUTORIAL

MIMO Detection: Theory and Practice
Instructor: Prof. John R. Barry, Georgia Tech

The adoption of multiple-input multiple-output (MIMO) techniques in wireless communications systems is fueled by the promises of high spectral efficiency and robustness to multipath fading. A key component of a MIMO system is the MIMO detector at the receiver, whose job is to recover the symbols that are transmitted simultaneously from multiple transmitting antennas. In practical applications, the MIMO detector is often the bottleneck for both performance and complexity.

This tutorial will present the basic principles of MIMO detection. We describe the fundamental problem, and present an overview of MIMO techniques that are used in practice. Our coverage ranges from simple linear detectors based on the zero-forcing and minimum-MSE criteria to the optimal maximum-likelihood tree-based sphere detector.  In between, we will describe successive-cancellation or decision-feedback detectors, multistage detectors, and suboptimal tree-based detectors like the MMSE sphere detector, the Fano algorithm, the M-algorithm, and the K-best algorithm. The impact of both lattice-based preprocessing and ordering on performance and complexity will be described.

This tutorial will benefit practicing engineers and researchers who are interested in understanding and doing research in MIMO and related topics, particularly those who are engaged in the design of high-speed wireless data systems.


FRIDAY, 30 November 2007 2:00 pm – 5:00 pm TUTORIAL

WiMAX: An Advanced Broadband Wireless System
Instructor: Dr. Doru Calin, Bell Labs at Alcatel-Lucent

The tutorial is primarily addressing the emerging broadband wireless solutions as specified by the IEEE 802.16 standards, often referred to as WiMAX (Worldwide Interoperability for Microwave Access) technology. WiMAX is an Orthogonal Frequency Division Multiplexing (OFDM) based system which offers promising high spectral efficiency, scalable carrier bandwidth options (e.g. from 1.25MHz to 20MHz), flexible spectrum options (e.g. 2-6 GHz), multiple duplexing options (Time Division Duplexing & Frequency Division Duplexing), various subchannelization options and users mobility thanks to its 802.16e variant, and more recently 802.16m. Technologies such as Hybrid Automatic Repeat Request (H-ARQ), Space Time Coding (STC), Advanced Antenna Systems (AAS), Multiple Input Multiple Output (MIMO) and Space Division Multiple Access (SDMA) have been enhanced to support mobile environments and to improve the broadband access speed. WiMAX supports a rich set of applications via a connection oriented service flow mechanism in both uplink and downlink directions, where service flow parameters can be dynamically managed through Medium Access Control (MAC) messages in order to meet the Quality of Service (QoS) requirements of various service classes. Examples of supported services are Unsolicited Grant Service (UGS), Real-Time Polling Service (rtPS), and Extended Real Time Polling Service (ErtPS) – particularly suitable for real time applications like speech with activity detection (VoIP). While the 802.16 standards provide a rich set of design options and a great deal of flexibility in defining the WiMAX related products, a significant challenge is often encountered in the selection of the most appropriate set of features & parameters and in finding the desirable deployment scenarios.


FRIDAY, 30 November 2007 2:00 pm – 5:00 pm TUTORIAL

Next Generation Cellular Networks: Features and Algorithms
Instructor: Dr. Harish Viswanathan, Bell Labs at Alcatel-Lucent

Motivated by the dramatically growing demand for high data rate wireless data services, cellular wireless communications standards fora such as Third generation partnership program (3GPP) in Europe and 3GPP2 in the U.S. have been actively involved in standardizing orthogonal frequency division multiple access (OFDMA) based air-interface for next generation cellular networks under the Long Term Evolution (LTE) and ultra mobile broadband (UMB) frameworks, respectively. Several novel technologies built upon OFDMA such as dynamic fractional frequency reuse (FFR), single-carrier OFDM (SC-OFDM), pre-coded code division multiple access, Supercast for broadcast services, and advanced multiple antenna (MIMO) techniques have been included in the standards.

This tutorial will start with a brief introduction on the evolution of cellular networks and then describe the novel aspects of the next generation systems. There will be an emphasis on the fundamental concepts and design tradeoffs involved and discuss relevant algorithms for maximizing the performance using the various features in the standards. In particular, some novel algorithms for achieving efficient fractional frequency reuse patterns automatically will be presented. The tutorial will end with a brief description of the evolution of the radio access network architecture.


FRIDAY, 30 November 2007 2:00 pm – 5:00 pm TUTORIAL

Generalized MultiProtocol Label Switched (GMPLS) Networks
Instructor: Prof. Malathi Veeraraghavan, University of Virginia

This tutorial combines a top-down approach, starting with applications for circuit/virtual circuit (GMPLS) networks, with a bottom-up understanding of the technological details of GMPLS data-plane and control-plane protocols. Since the early nineties, significant investment has been made in developing protocols for high-speed circuit-switched and virtual-circuit networks. The goal of the tutorial is to offer attendees an opportunity to not only learn the basic technological aspects, but also to understand opportunities for how we can enable a successful wide-scale deployment of GMPLS networks. Finally, the tutorial describes actual deployments of GMPLS networks, most of which are research testbeds for Grid computing and eScience projects. The presenter has personal experience in deploying such a research testbed, which is a wide-area network called CHEETAH.

FRIDAY, 30 November 2007 2:00 am – 5:00 pm TUTORIAL

Routing in Delay Tolerant Mobile Ad Hoc Networks: Overview and Challenges
Instructor: Zhensheng Zhang, San Diego Research Center (SDRC)

In mobile tactical ad hoc networks, nodes are constantly in motion and/or operate on limited power. When nodes are in motion, links can be obstructed by intervening objects. When nodes must conserve power, links are shut down. These result in intermittent connectivity. When no path exists between source and destination, network partition occurs. Examples of an intermittently connected network (ICN) are: (a) an inter-planet satellite communication network where satellites and ground nodes may only communicate with each other several times a day, (b) a sensor network where sensors are not powerful enough to send data to a collecting server or are scheduled to be wake/sleep periodically, and (c) a military ad hoc network where nodes (e.g. tanks, airplanes, soldiers) may move randomly and are subject to being destroyed. Applications in ICNs must tolerate delays beyond conventional IP forwarding delays and these networks are referred to as delay/disruption tolerant networks (DTN). New protocols specifically for DTNs must be developed as existing protocols designed for the Internet do not work properly. 

Recently there has been much research activity in the emerging area of intermittently connected ad hoc networks and delay/disruption tolerant networks. There are different types of DTNs depending on the nature of the network environment. Routing in DTNs is one of the key components in the DTN architecture proposed by the DTN research group. Therefore, researchers have proposed different routing protocols for different types of DTNs in the last few years.

This tutorial will review the state of the art in DTN networks, especially routing protocols. We categorize these routing protocols based on information used. For deterministic time evolving networks, three main approaches are discussed: the tree approach, the space and time approach, and the modified shortest path approach. For stochastic time evolving networks, the following approaches are reviewed: the epidemic or random forwarding approach, predication or history based approach (including per contact routing based on one-hop information only and per contact routing based on average end to end information), the model based routing approach as well as approaches which control the movement of certain special nodes. Recent developments in erasure coding and network coding applied to DTNs are also discussed.



FRIDAY, 30 November 2007 2:00 pm – 5:00 pm TUTORIAL

On-Demand Enterprise: Virtualization and Grid-Based Mechanisms for Service Continuity
Instructor: Inder Monga, Director, CTO Labs, Nortel
Siva Subramanian, Director, Strategy, Enterprise Data Networks, Nortel

Fast-paced innovation in the networking industry has addressed customer challenges like security, application delivery, compliance etc in the form of a plethora of point-function products. Introduction of such point-function products into networks has resulted in complex and ad-hoc network architectures. The same is also true for application architectures.

CIO’s today are looking for ways to reduce Total Cost of Ownership and enhance Time-to-Market for their businesses. Virtualization is one technology that presents an answer to these problems. Storage and Server virtualization technologies deliver increased utilization and enhanced agility of datacenters.

This tutorial introduces concepts of network virtualization and its interaction with computer, storage virtualization within the Data Center as well as in the context of Grid Computing within the logical boundaries of an Enterprise. The participants will learn how these virtualization techniques can be applied cost-effectively to maintain service continuity in the era of Globalization.


FRIDAY, 30 November 2007 2:00 am – 5:00 pm TUTORIAL

Internet Protocol Multimedia Subsystem (IMS) for New Generation Enterprise Services
Instructors: J-Ch. Grégoire, INRS-EMT
B. Khasnabish, Verizon Communications

This tutorial starts with a review of the session initiation protocol (SIP) and its evolution to support the IP multimedia subsystem (IMS) in Enterprise. Status of the Next-generation converged Enterprise networking using IMS is then presented. Service providers' views and the lessons from Blackberry, CENTREX, and alternatives in integration are then carefully reviewed. Finally, the instructors will present the future of service migration using IMS and service oriented architecture (SOA) concept.


FRIDAY, 30 November 2007 9:00 am – 12:00 pm WORKSHOP

IEEE Workshop on Service Discovery and Composition in Ubiquitous and Pervasive Environments (SUPE)
Chairs: Jaafar Gaber, Universite de Technolgie de Belfort-Montbeliard
Mohamed Bakhouya, George Washington University

Ubiquitous and Pervasive Computing (UPC) are new paradigms with a goal to provide computing and communication services all the time and everywhere. Automatic service composition in ubiquitous and pervasive environments requires dealing with several research issues such as service matching and selection, coordination and management, scalability, fault tolerance, and adaptiveness to users' contexts and network conditions. The service matching and selection is the first step in creating any composite service and requires a service discovery system. The discovery system should be scalable across large networks and adaptable to dynamic changes especially when services dynamically join and leave the network. Service coordination and management is the second issue to be addressed in automatic service composition. Composition platforms must have one or more brokers that coordinate and manage the different services involved in the composition. The problem of coordination and management becomes difficult when the brokers are distributed across the network and poses a scalability problem, especially when numerous users are concurrently making composite service requests. Since a composite service is dependent on many distributed elementary services, fault tolerance is another important issue to be included in service composition platforms in order to ensure its proper functioning. The platform should be able to detect and restore it. It should be noted also that in UPC environments, where services are coming up and going down frequently, the service composition platform should be able to adapt the composition by taking maximum advantage of the available services. This increases the composite service availability in dynamically changing networks.

This workshop is intended to serve as a forum and bring together researchers and engineers in both academia and industry to exchange ideas, share experiences, and report original works about all aspects of service discovery and composition in ubiquitous and pervasive environments. The main purpose is to promote discussions of research and relevant activities in the design of architectures, algorithms, and applications for UPC environments.


FRIDAY, 30 November 2007 9:00am – 5:00 pm WORKSHOP

2nd IEEE Automotive Networking and Applications (AutoNet) Workshop
Chairs: Wai Chen, Telcordia Technologies
Onur Altintas
, Toyota InfoTechnology Center

Following the success of the 1st IEEE AutoNet, this one-day workshop seeks to present the latest research results and challenges in vehicle-to-vehicle and vehicle-with-infrastructure communications technologies, and their applications including improved safety, reduced traffic congestion and pollution, smoother driving experience, among others.

Keynote Speech: Reengineering of Network towards Sensor and Automobile Communications

Prof. Tadao Saito
, CTO and Chief Scientist
Toyota InfoTechnology Center
Invited Talk: V2V Networks and Applications
Prof. Raj Rajkumar
Carnegie Mellon University
Invited Talk: DSRC Standards, Prototyping and Field Testing
Dr. Luca Delgrossi
, Vehicle IT & Services Research (REI/VP)
Mercedes-Benz Research and Technology North America Inc.
Invited Talk: Securing Vehicular Communications and Transportation Safety Cannot Be At Odds
Dr. Panagiotis (Panos) Papadimitratos
Ecole Polytechnique Federal de Lausanne (EPFL)
Morning Session:
Enhanced Perimeter Routing for Geographic Forwarding Protocols in Urban Vehicular Scenarios
K. Lee,
University of California ˆ Los Angeles
J. Harri, University of Karlsruhe
U. Lee, M. Gerla, University of California ˆ Los Angeles

Border Node Based Routing Protocol for VANETs in Sparse and Rural Areas
M. Zhang
, R. Wolff
Montana State University

Location-Based Message Aggregation in Vehicular Ad Hoc Networks
H. Saleet
, O. Basir
University of Waterloo

Local Peer Groups and Vehicle-to-Infrastructure Communications
J. Chennikara-Varghese
, W. Chen, Telcordia Technologies, Inc.
R. Onishi, T. Hikita, Toyota InfoTechnology Center

An Automobile Control Method for Alleviation of Traffic Congestions Using Inter-Vehicle Ad Hoc Communication in Lattice-Like Roads
S. Inoue
, K. Shozaki, Y. Kakuda
Hiroshima City University
Afternoon Session:
Wireless Traffic Service Communication Platform for Cars
T. Sukuvaara
, D. Stepanova, P. Urmi, Finnish Meteorological Institute
P. Eloranta, Mobisoft
E. Suutari, Sunit
K. Ylisiurunen, Infotripla

The Feasibility of a Search Engine for Metropolitan Vehicular Ad-Hoc Networks
C. Wewetzer, M. Caliskan
, A. Luebke, Volkswagen Group
M. Mauve, University of Dusseldorf

Vulnerabilities of Geocast Message Distribution
E. Schoch
, F. Kargl, UlmUniversity
T. Leinmuller, Denso Automotive

A Certificate Validation Protocol for VANETs
K. Papapanagiotou
, University of Athens
G. Marias, P. Georgiadis, Athens University of Economics & Business
P. Georgiadis, University of Athens

Illusion Attack on VANET Applications - A Message Plausibility Problem
N-W Lo,
H-C Tsai, National Taiwan University of Science and Technology, Taiwan

An Entropy Based Model for System-Level Downlink Capacity Requirements in V2R Telematic Systems
P. Belanovic
, T. Zemen, Telecommunications Research Center (FTW),

Synthesizing Realistic Vehicular Mobility for More Precise Simulation of Inter-vehicle Communication
K. Nakanishi
, T. Umedu, T. Higashino, Osaka University
H. Kitaoka,  H. Mori, Toyota Central R&D Labs

Intra-vehicular Wireless Networks
M. Ahmed
, HRL Laboratories
M. Ames, General Motors R&D
T. ElBatt, San Diego Research Center
C. Saraydar, T. Talty, General Motors R&D
J. Yin, TrellisWare Technologies



FRIDAY, 30 November 2007 9:00 am – 5:00 pm WORKSHOP

Wireless Mesh and Sensor Networks: Paving the Way to the Future or Yet Another
Chairs: Neeli R. Prasad, Center for TeleInFrastruktur (CTIF), Aalborg University
Dr. Paulo T. De Sousa, Head of Sector, Internet of the Future, in the Directorate-General Information Society, European Commission
Dr. C. Skianis, University of Aegean

Wireless systems for industry have mostly used cellular-style radio links, using point-to-point or point-to-multipoint transmission. Traditional wireless formats have liabilities in industrial applications. These include rigid structure, meticulous planning requirements, and dropped signals. In contrast, wireless mesh networks are multihop systems in which devices assist each other in transmitting packets through the network, especially in adverse conditions. You can drop these ad hoc networks into place with minimal preparation, and they provide a reliable, flexible system that can be extended to thousands of devices. Similarly, the self-configuring and self-healing capability, redundancy and scalability, diagnostic monitoring and distributed nature of wireless sensor networks place them among the most important technologies in the 21st century.

In this workshop, we will examine the technical and economic challenges for deploying wireless municipal mesh networks and wireless sensor networks.


FRIDAY, 30 November 2007 2:00 pm – 5:00 pm WORKSHOP

Coding for Data Storage
Chairs: Marcus Marrow, Link-A-Media
Bruce Wilson, Hitachi

Simple scaling of component size has been the principal engine of increased storage capacity over the last 50 years. As traditional scaling approaches physical limits of wavelength and thermal stability, the data storage industry is beginning to embrace more exotic and expensive technology to maintain a steady increase in storage density. These changes have sparked a period of renewed invention and improvement in signal processing for storage. The mass deployment of new storage technologies such as perpendicular recording and holographic storage require new coding and detection techniques and the judicious application of existing technology. The application of iterative decoding to storage offers an exciting opportunity to improve storage density across all platforms. More than ever, coding, detection, and other techniques of communications engineering have a real opportunity to improve system performance.

This workshop will provide an introduction to signal processing and coding for data storage and a forum for sharing the latest developments in this exciting field.