center of excellence in wireless and information technology · 2018-09-09 · ibm t.j. watson...

52
Center of Excellence in Wireless and Information Technology 2008 INTERNATIONAL CONFERENCE Cutting Edge Wireless and Information Technology PROCEEDINGS www.cewit.org October 16, 2008 Charles B. Wang Center Stony Brook

Upload: others

Post on 09-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Center of Excellence in Wireless and Information Technology

2 0 0 8 I N T E R N AT I O N A L C O N F E R E N C EC u t t i n g E d g e W i r e l e s s a n d I n f o r m a t i o n Te c h n o l o g y

P R O C E E D I N G S

www.cewit.org

October 16, 2008Charles B. Wang Center

Stony Brook

Page 2: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Conference Papers

Track 1 - Emerging Technologies

1. On The Implementation of a User-Model Based Benchmark for Voice-over-IP, Charles Wright et al., IBM Research . . . . . . . . . . . . . . . 4

2. Future Internet - Looking 4WARD, Andreas Timm-Giel et al., University of Bremen, Germany . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

3. Unification of Tomlinson-Harashima Precoding, Dirty Paper Coding and Vector Perturbation, Jun Niu et al., Polytechnic University . . . . . 6

4. Efficient Signal Sampling Using Compression Techniques, Dave Mesecher et al., Northrop Grumman and Duke University . . . . . . . . . 7

5. Channel Estimation for WCDMA-HSDPA Systems, I-Tai Lu et al., Polytechnic University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

6. Power-Aware Topology Control for Mobile Ad Hoc Networks, Oliviero Riganelli et al.,University of Camerino, Italy and Stony Brook University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

7. Design Drivers for a 3.5G Cellular Modem Optimized for High Performance Mobile Broadband Communication, Robert DiFazio, InterDigital . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

8. AirScope: A USN-based, Micro-scale Air Quality Management System, Sang-Boem Lim et al., Konkuk University, Korea . . . . . . . . . . 11

9. Managing Flow-Based End-to-End QoS Paths Through Modern Hybrid WANs, Dantong Yu et al., Brookhaven National Lab . . . . . . . . 12

10. Real-Time Scalable Monitoring System for Adaptive Ubiquitous Smart Space, Bong-Won Jang et al., Ajou University, Korea . . . . . . . . 13

11. BlueStar Mobile Management Services, Leslie Liu et al., IBM Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Track 2 - Solutions and Services1. The WEARIT@WORK Authentic User Tests In Wearable Computing of a Healthcare Application,

Otthein Herzog et al., University of Bremen, Germany . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2. Novel Nanocomposites for Health Monitors and Implants, Perena Gouma, Stony Brook University . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

3. Index Based u-Home Healthcare System(IHHS), Yoosuk Jung et al., Ajou University, Korea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

4. Prostate Segmentation for Virtual Prostate Cancer Screening, Joseph Marino et al., Stony Brook University . . . . . . . . . . . . . . . . . . . . . 18

5. u-Health Aide System for Ubiquitous Wellbeing Lifecare Service, Peom Park et al., Ajou University, Korea . . . . . . . . . . . . . . . . . . . . . 19

6. iFortress: Reducing Carbon Footprints and Supporting Data Center Efficiency, Bob Venero, Future Tech Enterprise . . . . . . . . . . . . . . 20

7. Sensing and Communication Services for Food Transport Logistics, Markus Becker et al., University of Bremen, Germany . . . . . . . . . 21

8. NATO Force Tracking System, Paul Knudsen et al., Globecomm Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

9. SATCELL GSM, Keith Hall et al., Globecomm Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

10. Wireless Cyber Assets Discovery Visualization, Ken Prole et al., Secure Decisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

11. Enhanced Interoperability During Natural Hazards, Ron Pirich et al., Northrop Grumman . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

2

CONTENTS

Page 3: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Research Posters

1. Low Complexity and Similar Performance to QRD-M Detection Scheme for MIMO-OFDM System, Sejong University, Korea. . . . . . . . 25

2. Enhanced Schemes for Hierarchical Modulation Based Cooperative Systems, Sejong University, Korea . . . . . . . . . . . . . . . . . . . . . . . 26

3. A Robust Car Number Plate Detection Using Mathematical Morphology, Ajou University, Korea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

4. Simple Cooperative Transmission Based on Cyclic Delay Diversity Scheme, Sejong University, Korea . . . . . . . . . . . . . . . . . . . . . . . . . 28

5. Information Inconsistency Analysis of Large Scale Autonomous Tracking Systems with Redundancy, Ajou University, Korea . . . . . . . 29

6. Illustrative Parallel Coordinates: A More Effective Means to Glean Insight from High-Dimensional Data, Stony Brook University, USA . . . . . 30

7. Physical-Space Refraction-Corrected Transmission Ultrasound Computed Tomography for Breast Mammography, Stony Brook University and Yale University, USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

8. Model Driven Visual Analytics, Stony Brook University, USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

9. A High-Performance Architecture for the Lydia Text Analysis System, Stony Brook University, USA. . . . . . . . . . . . . . . . . . . . . . . . . . . 33

10. Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks, Stony Brook University, USA. . . . . . . . . . . . . . . . . . . 34

11. An EM-based Low Complexity Semi-blind Channel Estimation for OFDM Systems, Sejong University, Korea. . . . . . . . . . . . . . . . . . . . 35

12. Carrier Frequency Offset Reduction Using MSE-OFDM in Cooperative Systems, Sejong University, Korea. . . . . . . . . . . . . . . . . . . . . . 36

13. Exact Phrases in Information Retrieval for Question Answering, Stony Brook University, USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

14. Construction of Robust and Efficient Wireless Backbone Network with Algebraic Connectivity, Stony Brook University, USA. . . . . . . . 38

15. Composition in Incrementalization and Application to Constrained RBAC, Stony Brook University, USA . . . . . . . . . . . . . . . . . . . . . . . 38

16. SpaceSafari – Bringing Arcade Game Excitement to Learning About the Solar System, Stony Brook University, USA . . . . . . . . . . . . . 39

17. Security Policy Enforcement in Enterprise Systems, Stony Brook University, USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

18. Reputation and Trust Management in Agent Based Ad Hoc Networks Using Auctions, IIT, Kharagpur, India . . . . . . . . . . . . . . . . . . . 40

19. High-resolution Optical Imaging Diagnosis of Biological Tissue Morphology, Physiology and Functions, Stony Brook University, USA. . . . . 41

20. On the Threat to SIP-based Applications and Corresponding Counteract Mechanisms, Ajou University, Korea . . . . . . . . . . . . . . . . . . 42

21. Secure Authentication Scheme based on Digital Signatures and Secure Key Storage, Sogang University, Korea . . . . . . . . . . . . . . . . . 43

22. End-to-end QoS Architecture for Ubiquitous Military Tactical Networks in AJOU-TNRC, Ajou University, Korea. . . . . . . . . . . . . . . . . . 44

23. Dice Mix: a New Mix Reordering, Ajou University, Korea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

24. Self-Powered Wireless Health Monitoring System, Stony Brook University, USA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

25. A Glance at Quality of Service Models for Mobile Ad Hoc Networks, Kurukshetra University, India . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

26. Information Sharing and Searching Application for Mobile Devices, VJTI, Mumbai, India . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

27. Meru Networks – Fulfilling the Promise of 802.11n Without Compromise, Meru Networks, USA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

28. Deconstructing Wi-Fi, Stony Brook University, USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

29. Adaptive Channelization Using Software Defined Radios, Stony Brook University, USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

30. Accessing Urban WiFi Networks fromMoving Vehicles, Stony Brook University, USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3

CONTENTS

Page 4: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

On The Implementation of a User-Model Based Benchmark for Voice-over-IP

Charles P. Wright and Erich Nahum

IBM T.J. Watson Research Center, Hawthorne, NY 10532cpwright,[email protected]

Voice-over-IP (VoIP) is an increasingly important workload for serv-er systems, achieving broad penetration in both the serviceprovider space (e.g., Vonage or various offerings from cableproviders) and the enterprise. Session Initiation Protocol (SIP) is acommon control-path signaling protocol for VoIP, which supportsthe setup, tear down, and manipulation of the call media path. Thecurrent state of SIP benchmarking revolves around micro-bench-marks in which simple call flows are repeated without respect tothe behavior of real users. Recently, the Standard PerformanceEvaluation Corporation (SPEC) has formed a subcommittee todevelop SIP benchmarks, with the initial focus on VoIP.

The SPEC SIP workload is centered around the concept of a virtu-al user. The virtual user is designed to approximate the load exert-ed on a system-under-test by an actual user. This has two keyadvantages over micro-benchmarks: (1) the workload more close-ly matches what a server would see in the real world; and (2) thenumber of users that a system can support is more informativewhen making decisions on the provisioning and dimensioning ofservers for VoIP workloads. Each virtual user models the behaviorof a user independent of the underlying protocol that is used forsignaling. In addition to the user-model a device-model providesSIP-specific behavior of the user’s device (e.g., a soft phone).

Extensive modifications were made to the Open-Source workloadgenerator, SIPp, which is the de facto standard for SIP workloadgeneration to support user-model based benchmarking. SIPp’s sin-gle threaded event-loop architecture (of interest to anyone empiri-cally evaluating SIP server systems) and the challenges we facedto support user-model based benchmarking will be presented:

• Support for a variety of systems-under-test, including back-to-back user agents (B2BUAs) which do not preserve SIP head-ers as calls pass through them.

• Providing simple control structures in SIPp’s XML driven callengine that allow looping, complex branching, and more.

• Support for a variety of statistical distributions for pauses andcontrol decisions.

Performance problems include:

• Providing adequate performance for long-lived calls withinSIPp.

• Support for thousands of concurrent calls each with a TCPconnection in SIPp’s single threaded event loop

Charles Wright is a Research Staff Member at IBM's T.J. Watson ResearchCenter in Hawthorne, NY. He is interested in the performance evaluationof systems software including network server software, file systems, andoperating systems. He is currently a maintainer of the SIPp open sourceSIP workload generator and is focusing on realistic SIP workload genera-tion. He received is BS in Computer Science and Applied Mathematics aswell as his Ph.D. in computer science from Stony Brook University.

Erich Nahum is a Research Staff Member at IBM's T.J. Watson ResearchCenter in Hawthorne, NY. He is interested in all aspects of networked sys-tem performance, including SIP, HTTP, Instant Messaging, TCP/IP, work-load characterization, workload generation, dynamic content, clusters, mul-tiprocessors, operating systems, and security. He received his BA inComputer Science from the Univesity of Wisconsin-Madison and his Ph.Din Computer Science from the University of Massachusetts at Amherst.

4

CONFERENCE PAPERS

Page 5: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Future Internet - Looking 4WARD

Andreas Timm-Giel, Carmelita Görg

University of Bremen, TZI/ikom/ComNets, Otto-Hahn-Allee NW1,28359 Bremen, Germanyatg, [email protected]

This paper is presenting the work and approaches of the Europeanfunded project 4WARD. Within 4WARD 37 partners institutionsresearch on architectures and approaches for the Future Internet.

Driven by the insight that today’s IP based Internet is not capableof supporting future application and services requiring innovativenetwork architectures and integration of heterogeneous technolo-gy, 4WARD is working on a radically new network architecture. Itis based on self- and In Network Management, new information-centered addressing schemes replacing the host based address-ing, and network virtualization to enable coexistence of multiplenetworks on common platforms. The Generic Paths concept allowsthe support of network coding and multipath transmissions.

This paper will give an overview on the vision and the approachtaken in the 4WARD project. The aspects of the future networkarchitecture, the network virtualization, new addressing schemesand the Generic Path concept will be highlighted. Particular focusis laid on the network virtualization, including approaches to allowvirtual networks to interconnect via folding points, the virtualizationof the (wireless) network resources etc.

The project is designed for multiple phases; the first one will estab-lish the core concepts and technologies and last for two years. Theplanned effort of about 2200 person months corresponds to thestrategic importance of this endeavour.

Dr.-Ing. Andreas Timm-Giel received his PhD degree at the University ofBremen in 1999 and his diploma degree in Electrical Engineering in 1994from the University of Bremen, both on mobile radio channel modeling.From 1994 – 1999 he led a group at the University of Bremen for „MobileSystems“, that participated in several European R&D projects on mobileand satellite communications. Dr. Timm-Giel was the technical projectleader of TOMAS and represented MOEBIUS in the RACE Mobile ProjectLine. Starting in January 2000 Dr. Timm-Giel continued his work in theSATISFY2000 project as technical project leader at MediaMobilCommunication GmbH. At MediaMobil he was involved in the technical andcommercial set up of the mobile satellite network and service providerM2sat Ltd., and he wa Technical Product Manager and Manager NetworkOperations for M2sat. He is leading several industry, national and EC fund-ed research projects. Since October 2006 he is additionally leading theinterdisciplinary concerted activity “Adaptive Communications” of theinterdisciplinary Center for Computing Technologies in Bremen His researchinterests are focused on mobile communication systems, services andapplications.

Prof. Dr. Carmelita Görg received her diploma degree from the Departmentof Computer Science, University of Karlsruhe and the Dr. rer. nat. degreeand the appointment as lecturer from the Department of ElectricalEngineering, Aachen University of Technology. From 198 until 1989 sheworked as a consultant in the field of communication networks. Since 1989she has been working as a group leader and since 1997 as an AssociateProfessor at the Communication Networks Institute, Aachen University ofTechnology. C. Görg was core task leader and partner manager for the RACEII project Mobilise (R2003) and the ACTS project CAMELEON (AC341). In1996 and 1997 she was an evaluator/auditor in the ACT programme. Since1999 Prof. Görg is leading the Communication Networks group at theUniversity of Bremen, which is part of the tzi/ikom (Center for ComputingTechnology / Center for Communication and Information Technology) andthe Mobile Research Center in Bremen. The group has been and is activein many national and European projects (see grou profile above). Prof. Görghas published over 100 scientific papers mainly in the field of communi-cation networks and performance evaluation. She is a speaker of the ITGworking group 5.2.1 on "System Architecture and Traffic Engineering" andmember of the ITG board.

5

CONFERENCE PAPERS

Page 6: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Unification of Tomlinson-Harashima Precoding,Dirty Paper Coding and Vector Perturbation

Jun Niu and I-Tai Lu

Department of Electrical and Computer EngineeringPolytechnic University, Brooklyn, New York [email protected], [email protected]

Keywords: Multiuser MIMO, MIMO broadcast, MIMO precoding,Tomlinson-Harashima precoding , Vector Perturbation

In summary, we analyze Tomlinson-Harashima and Dirty PaperPrecoding techniques in MIMO multiuser broadcast scenario andpresent them new explanations in vector forms, and then we uni-fied three precoding strategies, Tomlinson-Harashima Precoding(THP), Dirty Paper Coding (DPC) and Vector PerturbationPrecoding (VPP), in terms of the mathematic expression and phys-ical meaning: transmit power reduction.

Recently, MIMO broadcast system has been of particular interest,where the receiving elements belong to physically separate usersof the communication system, which makes receiver-side cooper-ation impossible. In this scenario, all processing is required to beperformed at the transmitter. For MIMO systems where perfectchannel state information is available at transmitter, the so-calledMIMO precoding methods were discussed. In general, MIMOPrecoding has been utilized to assist inter-user interference can-cellation and receiver detection in the multiuser MIMO broadcastscenarios, where base station applies multiple antennas to servemultiple non-cooperating users. We will consider the nonlineartransmitter side concept for interference mitigation by precoding,and show how MIMO precoding can be implemented by a spatialvariant of the well-known THP method, a special form of DPC andthe more general VPP.

THP, a nonlinear pre-equalization technique, was initially proposedfor intersymbol interference mitigation. Now it is applied in themultiuser downlink scenario to pre-cancel interferences amongmultiple users. THP allows for very power efficient communicationover the multiuser MIMO broadcast channels. Specifically, THP isbased on channel QR decomposition, where the lower triangularmatrix forms the feedback structure. Since the feedback structureis now applied at the transmitter side where all transmit symbolsare well known, there is no error propagation. Unfortunately, thisstrategy would increase the transmit power significantly. To reducethe channel symbols into the boundary region of constellation,modulo operation at the transmitter side is introduced. We derivedthe equivalent vector form of modulo operation. In this paper, wecan show that a special form of DPC is exactly the same as THP.

With perfect channel information at transmitter, interference freetransmission to each user is achieved by using zero forcing pre-coding. The major problem of plain Zero Forcing precoding is thepower enhancement in the unnormalized transmit signal. This per-formance degradation can be combated very effectively by using

the VPP technique, in which a perturbation vector whose elementsare complex integers is required and fixed real valued scaling fac-tor is appropriately chosen. A promising algorithm to solve vectorperturbation is the sphere decoding algorithm.

By doing the mathematic derivation for VPP, we found out thatTHP, DPC and VPP all carry out the transmit power reduction in thesame vector form, except minimization operation is taken in VPPcase. In other words, THP or DPC can also be seen as suboptimalmethods to find out the perturbation vector to reduce the transmitpower, while, sphere decoding based vector perturbation providesthe Maximum Likelihood solution.

Jun Niu received the B.S. degree in Electrical and Computer Engineeringfrom Ocean University of China, Qingdao, in 1996, and the M.S. degree inElectrical and Computer Engineering from Xidian University, Xi'an, China,in 2000. And he received the M.S.E.E degree and Ph.D. degree inElectrical Engineering from Polytechnic University, Brooklyn, in 2008. Hisresearch interests include lattice-reduction-aided MIMO transceivers, tree-search-based MIMO ML detection, MIMO multiuser broadcast, coded coop-eration for OFDMA and SC-FDMA systems, channel estimation for MIMOOFDM systems.

I-Tai Lu received the B.S.E.E. degree from National Chiao-Tung Universityin 1976, the M.S.E.E. degree from National Taiwan University in 1978,and the Ph.D.E.E. degree from Polytechnic University in 1985. Presently,he is a Professor and the Director on Online program of the Department ofElectrical and Computer Engineering at Polytechnic University. His currentresearch interests are wireless communications, underwater acoustic com-munications, electromagnetic waves, inverse problems, and signal process-ing. He has published over 50 journal papers, 10 book chapters/technicalreports, and 120 proceeding papers. He has given over 40 invited lectures;and conducted over 150 conference/workshop/seminar presentations. He isa member of Sigma Xi, Commission B of URSI, The Institute for Theory andComputation of THE ELECTROMAGNETIC ACADEMY, Who's Who AmongAsian Americans, Who's Who in Science and Engineer, IEEE, andAcoustical Society of America.

6

CONFERENCE PAPERS

Page 7: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Efficient Signal Sampling Using Compression Techniques

Dave Mesecher1, Larry Carin2, Ron Pirich1, Ivan Kadar1

1Northrop Grumman Corporation, 2Duke University

In traditional signal sampling, the finite bandwidth of a signal isexploited to allow all of the information of the signal to be capturedwhen it is sampled at intervals of 1/(2*bandwidth), referred to asthe Nyquist sampling rate. After being sampled at this Nyquistrate, the original signal can be reconstructed. It has been recog-nized, however, that almost all physical signals posses a certainproperty - beyond having finite bandwidth - that can be exploitedin order to capture the information of a signal while sampling it atwell below the traditional Nyquist rate. This property, referred to assparseness, or compressibility, is that the signal can be trans-formed into some basis in which most of the transform coefficientsare negligible. For example, the signal may be sparse in theFourier domain, in which case only a few of the Fourier coefficientswould be non-zero. Often, wavelet transformations provide a basisin which the signal is sparse, which is in fact the foundation of mostmodern compression techniques. As such, exploiting the sparse-ness of a signal in order to capture its information with samplingrates below Nyquist has come to be known as compressive sam-pling (CS). CS theory dictates that there must be some random-ness to the sampling process. This randomness can be introducedat the sensor – running an A/C converter at random sampling inter-vals, for example – or may occur naturally, such as the random-ness introduced by multipath. CS-sampled signals can then berecovered with high reliability by finding a minimized set of coeffi-cients (typically using the l1 norm) in the known orthonormal basiswhose inverse transform matches the samples of the signal taken.This presentation will provide an overview of CS theory and imple-mentation, examples of applications of CS, and simulation results.

Dave Mesecher is involved in investigating and developing wireless commu-nications, antenna processing, target tracking and ID, and precision geolo-cation concepts supporting Network-Centric Intelligence, Surveillance, andRecognizance (ISR). Dave is a Senior Member of both the IEEE and theAIAA, and is the Chairman of the Long Island Chapter of the IEEECommunications Society. He holds 26 US patents and several foreignpatents for signal processing techniques in the areas of wireless communi-cations, adaptive antenna arrays, and real-time location systems, and hasauthored several papers in the areas of adaptive signal processing, targetlocation, and communications. Dave holds a BSEE from RensselaerPolytechnic Institute, an MSEE from Polytechnic University, and an MBAfrom Adelphi University.

Lawrence Carin earned the BS, MS, and PhD degrees in electrical engineer-ing at the University of Maryland, College Park, in 1985, 1986, and 1989,respectively. In 1989 he joined the Electrical Engineering Department atPolytechnic University (Brooklyn) as an Assistant Professor, and became an

Associate Professor there in 1994. In September 1995 he joined theElectrical and Computer Engineering Department at Duke University, wherehe is now the William H. Younger Distinguished Professor. Dr. Carin hasbeen the principal investigator on several large research programs, includ-ing two Multidisciplinary University Research Initiative (MURI) programs.He was an Associate Editor of the IEEE Transactions on Antennas andPropagation from 1996-2001. His current research interests include signalprocessing and machine learning for sensing applications. He is an IEEEFellow and a member of the Tau Beta Pi and Eta Kappa Nu honor societies.

Dr. Pirich is responsible for electromagnetic interference mitigation, chem-ical, biological, nuclear, radiological and explosives (CBNRE) warfaredefense and advanced coatings at Northrop Grumman’s Integrated SystemsAdvanced Capabilities Development/Technology Development Center. Hiscurrent efforts include advanced fiber optics, electromagnetic interferencemitigation, multi-mission sensor integration, threat/vulnerability/riskassessment, development of point and standoff sensors for the detectionand classification of various CBNRE threats and associated wireless com-munications, modeling and simulation. Dr. Pirich has over thirty years insolid state research technology, which includes nanofabrication and char-acterization of nano and microstructures for sensors, materials for signaturemanagement, Program Manager for DARPA Unconventional PathogenCountermeasures program and US Army Chem/Bio Detection programs Heis a key contributor to Northrop Grumman’s Bio-Hazard Detector System forthe United States Postal Service and is a holder of ten patents and authorof 130 technical papers and presentations. Dr. Pirich received his BS inPhysics/Mathematics, MS and PhD in Physics from the State University ofNew York and a Post-Doctoral Research Fellowship from the University ofCincinnati.

Ivan Kadar earned the B.E.E. degree from City College of CUNY, theM.S.E.E. degree from Columbia University and the Ph.D. degree in electri-cal engineering from Polytechnic Institute of New York. Since 2005 he isemployed at Northrop Grumman Corporation - Integrated Systems EasternRegion, Bethpage, NY. As an Associate Fellow - Systems, he serves asTechnical Advisor in the broad area of Information Fusion and related tech-nologies in the Advanced Concepts and Integrated Solutions TechnologyDevelopment Department. In 2000 he founded Interlink Systems Sciences,Inc., providing scientific and technical consulting services in systems, sen-sors and algorithms with applications to multi-source information/sensor/data fusion and related signal and image processing technologies,and currently also consults part-time to private industry and universities.As key contributor/initiator he was principal investigator/manager for sever-al ONR/NAVAIR, AFRL and DARPA sponsored programs for hands-onresearch and development in all levels of information/sensor/data fusion,tracking, uncertainty management, signal and image processing, automat-ed target/pattern recognition, knowledge-based intelligent systems, com-munications, multipath channel and sensors modeling for 19 years. He alsoworked for IBM T. J. Watson Research Center as a Research Staff Memberin the Systems Analysis, Algorithms, Networking and SatelliteCommunications Group of Computer Sciences. Dr. Kadar has authored/co-authored over 120 papers, five book chapters, edited two books and seven-teen volumes of the SPIE “Signal Processing, Sensor Fusion and TargetRecognition” conference which he organizes and chairs. He is recipient ofthe IEEE Region I award, two IEEE AES M. Barry Carlton Best PaperAwards, and the AIAA Space Shuttle Flag Service Award as an AssociateFellow of AIAA. He is reviewer for several journals. He was elected in 2005to serve on the Board of Directors of the International Society of InformationFusion (ISIF) (2006-2008), and elected as SPIE Fellow in 2007. He isSenior Member of the IEEE, and a member of Sigma Xi. He is holder ofthree patents.

7

CONFERENCE PAPERS

Page 8: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Channel Estimation for WCDMA-HSDPA Systems

I-Tai Lu and Enoch Lu

Polytechnic University, 105 Maxess Road, Melville, NY 11747

The MIMO WCDMA-HSDPA system (Multiple Input MultipleOutput Wide Band Code Division Multiple Access system equippedwith High Speed Data Packet Access terminals) has certain advan-tages but also certain disadvantages. For example, compared to itspredecessor (CDMA), it has higher data rate but also has increaseddifficulty in dealing with time-varying multipath fading environ-ments. Multipath fading leads to distortion, particularly InterSymbol Interference (ISI), in the received signal. This distortionleads to not being able to properly determine what the original datawas. WCDMA relies on orthogonal codes in order to distinguishbetween different components. This orthogonality of the codes isalso affected (weakened) by multipath which then contributes,along with other factors, to Multiple Access Interference.

So what to do? We focus on the root of these problems, i.e., multi-path. We design equalizers to try to undo the effects of multipathon our received signal to recover our desired data. We could divideequalizers into two categories, equalizers that explicitly need andequalizers that implicitly need channel information.

For the ones that explicitly need channel information, we use chan-nel estimation methods. One popular channel estimation methodis the Correlator based approach which depends heavily on theorthogonality of the codes. But as we just mentioned, the orthogo-nality of the codes is weakened by multipath and so, we explorewhether some other channel estimation methods outperform theCorrelator approach in this environment. In addition to weakenedorthogonality, these methods will also need to deal with relativelylow pilot powers as compared with other systems since the trans-mit signal is composed of the desired data, interference (otherusers’ data), and pilot. And so, we will be looking at the NormalizedLeast Mean Square Channel Estimation Method, the Least SquaresChannel Estimation Method, and the Kalman Channel EstimationMethod.

After employing a channel estimation method, tuning (averagingand shifting) of the channel estimate is necessary. We propose touse the Error Vector Measurement to find the approximate neigh-borhood of these tuning parameters and then the Bit Error Rate(applying the tuning parameters to the channel estimate and thenusing this channel estimate for data detection) to determine thespecific ones. But are the tuning parameters found from one chan-nel realization still quite optimal for other realizations? Yes (wefound the Bit Error Rate to be reasonably insensitive to the tuningparameters), and so, let’s use each of the channel estimationmethods to estimate the channel for many channel realizations,use a data detection method to calculate the Bit Error Rate (BER),and then calculate and compare the mean BER’s for the differentchannel estimation methods. Following this procedure for two ITUchannel models with Rayleigh fading, one for a vehicular speed of30 km/hr and the other for 250 km/hr, and for Signal to NoiseRatios (SNR’s) of 0, 5, 10, and 15 dB, we found the mean BER’sfor the different channel estimation methods to be essentially thesame. Therefore, further work is needed to fulfill our goals.

I-Tai Lu received the Ph.D.E.E. degree from Polytechnic University in1985. Presently, he is a Professor and the Director on Online program ofthe Department of Electrical and Computer Engineering at PolytechnicInstitute of NYU. He has developed various techniques for source localiza-tion and medium inversion in underwater acoustics, structure acoustics,seismology, non-destructive detection and electromagnetic. He has firstintroduced OFDM technologies into underwater acoustics communications.His current research activities include the development and standardizationof future wireless communications systems.

Enoch Lu received both his Bachelor and Masters degrees in ElectricalEngineering from Polytechnic University in June 2008 and will begin hisPh.D. studies in Electrical Engineering at the Polytechnic Institute of NYUin Fall 2008. His Masters thesis is titled “Channel Estimation and DataDetection for WCDMA-HSDPA MIMO Systems” and his current researchinterests are in wireless communications.

8

CONFERENCE PAPERS

Page 9: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Power-Aware Topology Control for Mobile Ad Hoc Networks

Oliviero Riganelli1, Radu Grosu2, Samir R. Das2,C. R. Ramakrishnan2 and Scott A. Smolka2

1 Diapartimento di Matematica e Infomatica, University of Camerino, 62032 Camerino, Italy [email protected]

2 Department of Computer Science, Stony Brook University, Stony Brook, NY 11794-4400, USA grosu, samir, cram, [email protected]

Keywords: Mobile Ad Hoc Network, Sensor Network, TopologyControl, Power Optimization, k-connectivity

In this paper, we investigate the transmission-power assignmentproblem for k-connected mobile ad hoc networks (MANETs), theproblem of optimizing the lifetime of a MANET at a given degree kof connectivity by minimizing power consumption. Our proposedsolution is fully distributed and uses a model-based transmissionpower adaptation strategy based on model-predictive control.Specifically, a stochastic model of the network is used by a stateestimator to predict the network’s future degree of connectivity andremaining energy. The predicted states are used by an optimizer toderive an optimal transmission power assignment sequence whichtracks the desired connectivity level k while minimizing energy con-sumption. Our experimental results on a simulated mobile ad hocsensor network comprising 100 nodes reveals that our localizedtopology control algorithm provides an almost identical control pol-icy to that of a globalized scheme which is solving a fully observ-able problem. The difference, of course, is in the scalability of ourlocalized solution, which requires much less communication band-width and energy than the globalized approach.

Oliviero Riganelli is received M.Sc. degree in Computer Science, summacum laude, from the University of Camerino. He is currently working towardthe Ph.D. degree in Computer Science and Complex Systems at theUniversity of Camerino. His current research interests include methodolo-gies and technologies for online public service delivery, mobile ad hoc net-works and model-based decision support using discrete abstractions andtemporal logics.

Radu Grosu obtained his Ph.D. from the Technical University of München,Germany in 1994. After receiving his Ph. D. he worked at both TechnicalUniversity of München and University of Pennsylvania. He is currentlyemployed at Stony Brook University as an associate professor where he isthe Information Systems Program Director. His research interests includemodel-based design and verification of embedded software systems, modelchecking, abstract interpretation, logic and automata theory, type theory,computational methods in systems biology and applied formal methods,software and systems engineering, and UML

Scott Smolka is a Professor of Computer Science at Stony Brook University.He has over 100 refereed publications in the area of verification and vali-dation of concurrent, embedded, and biological systems. He is also presi-dent and co-founder of Reactive Systems, Inc.

Samir R. Das is currently an associate professor in the Computer ScienceDepartment in the State University of New York at Stony Brook. He receivedhis Ph.D. in Computer Science from Georgia Institute of Technology,Atlanta, in 1994. His research interests are in wireless networking andmobile computing, focusing on protocols, systems and performance evalu-ation. He received the U.S. National Science Foundation’s CAREER awardin 1998 and the best paper award in ACM MobiSys conference in 2007.He has been a speaker in the Distinguished Visitor program of the IEEEComputer Society during 2001-03. He co-chaired the technical programcommittee for the ACM MobiHoc Symposium in 2001 and ACM MobiComConference in 2004. He currently serves or has served on the editorialboard of the IEEE/ACM Transactions on Networking, IEEE Transactions onMobile Computing, ACM/Kluwer Wireless Networks Journal and Ad HocNetworks journal. More information about him and his research can befound at http://www.cs.sunysb.edu/~samir.

C.R. Ramakrishnan is an Assistant Professor of Computer Science at SUNYStony Brook. He received his PhD from Stony Brook in 1995. His researchinterests include verification of concurrent systems, workflow systems, pro-gram analysis, and logic programming. Along with I.V. Ramakrishnan, ScottSmolka and David Warren, he coordinates the 15-member LMC group atStony Brook doing research on model checking based on logic program-ming. He has given a number of lectures on logic programming-basedmodel checking, including a series at the 1998 GULP Summer School inAcquafredda, Italy.

9

CONFERENCE PAPERS

Page 10: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Design Drivers for a 3.5G Cellular ModemOptimized for High Performance MobileBroadband Communications

Robert A. DiFazio

InterDigital, Inc. 2 Huntington Quadrangle Melville, New York, USA, 11747 [email protected]

Keywords: 3GPP, 3G, UMTS, HSDPA, HSUPA

Third generation (3G) digital cellular systems became availableearly this century and are in wide use, including what many wouldcall 3.5G. The WCDMA system, standardized by the ThirdGeneration Partnership Project (3GPP), has evolved to include thepacket data modes known as High Speed Downlink Packet Access(HSDPA) and High Speed Uplink Packet Access (HSUPA), the for-mer available in hundreds of networks worldwide and the latterrecently becoming available and planned for many networks in thenear future. Typical networks offer peak data rates of 3.6 Mbps inthe downlink and 1.5 Mbps in the uplink. Near term enhance-ments promise 10 Mbps and 5.8 Mbps in the downlink and uplinkrespectively. Looking forward, HSPA+ targets 42 Mbps/11 Mbps,the Long Term Evolution (LTE) Project eyes 300 Mbps/75 Mbps,and LTE Advanced looks at as much as 1 Gbps/500 Mbps.

Continuing improvements impose many challenges on the mobileterminal design. Each new generation brings not only higher datarates, but also lower latency, wider bandwidths, multiband support,multi-antenna operation and, of course, backwards compatibilitywith previous versions. All of these features need to be providedtogether with size, cost, and power dictated by market require-ments for high volume portable devices.

We provide a brief overview of the latest cellular standards andthen focus on design considerations for a 3.5G cellular modemcompliant with the 3GPP Release 6 requirements that includeHSDPA and HSUPA. InterDigital’s SlimChipTM will provide theframework for the presentation, and show optimizing performance,size, cost, and power across the baseband ASIC, protocol stacksoftware, and overall reference design. Some features, such asadvanced receiver algorithms that enable high HSDPA rates, areprimarily in the baseband. Others, such as power management forlong battery life and receive diversity for improved cell edge datarates, impact the baseband and the full reference design.

The architecture of the baseband modem will be presented alongwith the performance advantages provided by advanced designfeatures. The reference platform benefits from the modem fea-tures, but brings key features of its own, will also be described.The platform is a critical part of the process in that it must estab-lish the conformance of the end product to industry standards,highlight the competitive features of the baseband solution, anddemonstrate the feasibility of meeting standard form factors. Theprototype ExpressCard 34 device will be presented along with evo-lution to smaller packages that meet the needs of Ultra-Mobile PCs(UMPCs) and Mobile Internet Devices (MIDs).

Dr. Robert A. DiFazio is a Fellow at InterDigital, Inc. (the highest technicalstaff position in the company) and manages the Chief Technology Office.In these roles, he contributes to the design of advanced 3G and 4G cellu-lar modems, maintains technology and product roadmaps, assists in theexpansion and evaluation of the company’s patent portfolio, and partici-pates in collaborative research with universities. Dr. DiFazio has over twen-ty-eight years experience in research, design, implementation, and testingof new technologies for commercial and military wireless systems. Prior toInterDigital, he spent more than twenty years at BAE Systems (previouslyGEC Marconi-Hazeltine) working on numerous projects including softwaredefined radios, smart antenna systems, jam resistant modems, and lowprobability of intercept communication and navigation systems. He has aPh.D. from Polytechnic Institute of NYU (Brooklyn, NY) where he is current-ly an adjunct professor. He serves on the Industry Advisory Committee forthe Polytechnic Department of Electrical Engineering and ComputerScience and also serves on the Industry Advisory Board for New YorkInstitute of Technology. He is a Senior Member of the IEEE and holdseleven issued and over fifteen pending US patents.

10

CONFERENCE PAPERS

Page 11: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

AirScope : A USN-based, Micro-scale Air Quality Management System

Jung-Hun Woo1, HyungSeok Kim2, Sang-Boem Lim1,Karp-Joo Jeong1

1 Dept. of Advanced Technology Fusion, Konkuk University, 1 Hwayang-dong, Gwangjin-gu, Seou1 143-707, Korea [email protected], sblim, [email protected]

2 Dept. of Internet and Multimedia Engineering, Konkuk University 1 Hwayang-dong, Gwangjin-gu, Seou1 143-707, Korea [email protected]

Most air pollution issues have focused on global to urban scale,such as climate change, yellow sand, and ground-level O3. InSeoul, 27 air quality monitoring stations have been measuringurban scale air quality. However, the spatial resolution of this“urban-scale” monitoring network is not fine enough to representmicro-scale air quality problems such as, fugitive dust pollutionfrom a construction site or paved/unpaved roads. Moreover, thelocal-to-global scale air quality modeling practices are not quiteadequate to understand such small scale air pollution. Micro-scaleair quality problems, which are not well covered by the scalesdescribed above, are the typical sources of public complaints in ametropolitan areas. The effect of high-rise buildings, from airflowand from receptor perspective, can’t be well represented by anylarger scale. Current monitoring equipments, however, is too bigand expensive to be widely installed in a micro-scale domain.

To solve those problems, it is necessary to establish USN-based,micro-scale air quality monitoring system and CFD-based air qual-ity modeling system. We are planning to monitor micro-scale airquality with small, cheap and light-weight ubiquitous sensors, andto simulate air quality with CFD-based air quality model nearKonkuk University Complex - our testbed (~4?). We are planning toget high-resolution air quality information and support micro-scaleair pollution modeling. In this system, we are dealing with thou-sands and hundred-thousands of ubiquitous sensors which willproduce a huge amount of data daily. Management of largeamounts of data produced from light-weight ubiquitous sensors isone of the most important parts of USN-based, micro-scale airquality monitoring system. Currently, we are doing research ontransfer, store, and search mechanisms of ubiquitous sensorsdata. This includes building a 3-dimensional GIS field in support ofair quality monitoring and modeling. The modeled and monitoreddata will be presented to the public using multimodal mobiledevices along with large-scale gesture-based interactive displays.Core technical issues such as modeling and manipulating hugeamoung of data, multimodal presentation of information for elder-ly people, and design of semi-realtime air-model, will beaddressed. The integrated system in support of micro-scale airquality management, which we named as AirScope, is the goal ofthe project.

HyungSeok Kim is an assistant professor at the department of internet &multimedia engineering, Konkuk University, Korea from the year 2006.Before joining Konkuk University, he was a senior researcher at MIRALab,University of Geneva being involved in various research activities on virtualreality. He received his PhD in Computer Science in February 2003 atVRLab, KAIST. His major research field is real-time interaction in virtualenvironments, more specifically multi-resolution modeling of shape andtexture and multi-modal interaction mechanisms. His current researchactivities are focused on topics of shape modeling, evoking believable expe-riences in the virtual environment and managing multimedia contents inubiquitous environment.

Karpjoo Jeong is a professor at the department of technology fusion,Konkuk University, Korea from the year 2006. He was assistance professorat the department of computer engineering from Aug. 1997. Before joiningKonkuk University, He was a senior researcher at University of Florida beinginvolved in various research activities on distributed computing. Hereceived this PhD in Computer Science in February 1996 at New YorkUniversity. His major research field is distributed computing, semantic dataintegration, and Grid Computing. His current research activities are focusedon developing U-City based on USN(Ubiquitous Sensor Network) andDistributed Computing in ubiquitous environment.

Prof. Sang Boem Lim received his PhD degree from the Florida StateUniversity at the Department of Computer Science in 2003. He is currently working at Konkuk University as Assistant Professor ofDepartment of Advanced Technology Fusion. His research interests are e-Science, Grid computing, distributed software systems, and high-perform-ance computing.

Jung-Hun Woo is an assistant professor at the department of advancedtechnology fusion, Konkuk University, Korea from the year 2007.Beforejoining Konkuk University, he was an environmental scientist atNESCAUM, Boston, USA, being involved in various research activities onair quality and emissions modeling. He also worked at CGRER, Universityof Iowa, USA, as a post-doctoral research fellow and had participated vari-ous international research activities on regional air pollution. He receivedhis PhD in Environmental Engineering in August 1999 at Graduate Schoolof Environmental Studies, Seoul National university. His major researchinterests are air pollution modeling, emissions modeling/processing, andenvironmental information systems. His current research activities arefocused on urban air quality management using ET/IT fusion and air quality impact from climate change using climate-chemistry-emissionsmodeling.

11

CONFERENCE PAPERS

Page 12: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Managing Flow-Based End-to-End QoS Pathsthrough Modern Hybrid WANs

Dimitrios Katramatos, Dantong Yu, Kunal ShroffBrookhaven National Laboratory, Upton, New York 11973dkat, dtyu, [email protected]

Thomas RobertazziDepartment of Electrical and Computer EngineeringStony Brook University, Stony Brook, New York [email protected]

Shawn McKeeUniversity of Michigan, Department of Physics, 2477 Randall Laboratory, Ann Arbor, MI 48109-1040 [email protected]

Keywords — hybrid networks, MPLS, network virtualization, andEnd-to-end QoS management and provisioning.

TeraPaths is a Department of Energy funded network researchproject to support efficient, predicable, and prioritized peta-scaledata replication in modern high-speed networks. This paper pres-ents the TeraPaths end-to-end network management framework,which enables the dedication of network resources to specific dataflows across multiple administrative network domains. The primarymotivation behind this work comes from the world of modern highenergy and nuclear physics (Large Hadron Collider - LHC,Relativistic Heavy Ion Collider - RHIC), where extremely largequantities of experimental and analysis data need to be sharedacross the globe among scientists participating in various interna-tional experiments. The default best-effort behavior of these net-works may easily cause users/applications to suffer interruptionsand other adverse effects. New network resource managementcapabilities are necessary to guarantee the success of long-termtransfers and ensure the timely delivery of priority data.

To address the new requirements, modern Wide Area Networks(WAN), such as ESnet and Internet2, recently started offeringdynamic bandwidth reservation capabilities via their domain con-trol systems. The TeraPaths framework utilizes DifferentiatedServices-based QoS and Policy-Based Routing techniques in com-bination with automated invocation of WAN domain control servic-es to create and manage on-demand, true end-to-end QoS-awarenetwork paths dedicated to data flows of authorized users/applica-tions in a transparent and scalable manner. Such flows are steeredinto their “own” virtual network paths via dynamic reconfigurationof network devices. This ensures that flows receive a pre-deter-mined level of QoS in terms of bandwidth, jitter, delay, etc.

Virtual network paths coexist with the best-effort network paradigmwithin the same network infrastructure, but are transparent to net-work traffic passing through them. Such paths can comprise sev-eral physical network segments and span multiple administrativedomains that need to coordinate to establish the particular network

virtual path. TeraPaths utilizes end-site domain controllers, whichinteroperate and coordinate with each other through a set of webservices. TeraPaths controllers further interoperate with also webservices-based WAN domain controllers. The coordination of mul-tiple network domains through web services, as described in thispaper, essentially creates a loosely coupled Service Oriented net-work architecture.

The paper examines several issues raised by the new end-to-endresource reservation-based networking paradigm and the implica-tions/benefits for end users and applications. Such issues includepath creation overhead, combination and coordination of multiple-layer network technologies across multiple network domains, effec-tiveness of bandwidth utilization, and scalability with increasingnumbers of network domains and reservations. The TeraPathsframework utilizes a cost-effective scheduling scheme to improvebandwidth utilization and intelligent reservation consolidation techniques to reduce path creation overhead and minimizeresource waste.

Our experiments demonstrate the effective prioritization and pro-tection from interference of select data transfers between threeLHC experiment institutes -- Brookhaven National Laboratory, theUniversity of Michigan, and Boston University -- through guaran-teed bandwidth virtual paths at the presence of intensive best-effort IP traffic sharing the same network resources. TheTeraPaths framework is a practical and economical end-to-endnetwork resource reservation system, extending new capabilities tousers/applications of end sites without requiring additional, expen-sive network infrastructure components.

Dimitrios Katramatos is a Sr. Technology Engineer and researcher with theRHIC/ATLAS Computing Facility at Brookhaven National Laboratory. Hisresearch interests include cluster/grid computing and QoS in high perform-ance networking. He is the chief designer and software architect of theTeraPaths project. He received a BS in Mechanical Engineering from theNational Technical University of Athens, Greece, in 1988, an MS inComputer Science from Kent State University in 1996, and a PhD inComputer Science from the University of Virginia, in 2005.

Dantong Yu received the BS degree in Computer Science, from BeijingUniversity, China, in 1995, and the Ph.D. degree in Computer Science fromState University of New York at Buffalo, USA, in 2001. He joinedBrookhaven National Lab in 2001 as part of the Open Science Grid Group.He coordinates the Grid computing group in BNL USATLAS/RHICComputing Facility. His research interests include high-speed network per-formance, network Quality of Service, cluster/grid Computing, informationretrieval, data mining, database, and data warehouse. He led the large vol-ume WAN data transfer between CERN, BNL, ATLAS and RHIC collabora-tion institutes over high-speed network with Grid middlewares. Dr. Yu haspublished papers in leading technical journal and conferences. Dr. Yu ini-tiated and led the TeraPaths network to bring cutting-edge network tech-nologies into the unprecedented LHC/Nuclear Physics data transfer.

12

CONFERENCE PAPERS

Page 13: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Real-Time Scalable Monitoring System forAdaptive Ubiquitous Smart Space

Bong-Won Jang1, Byoung-Hoon Lee1, Dong-Wook Lee1,Jai-Hoon Kim1 and We-Duke Cho2

1 Graduate School of Information and CommunicationAjou University, Republic of Koreabictory7, componer, dwlee, [email protected]

2 Center of Excellence for Ubiquitous SystemAjou University, Republic of [email protected]

In the ubiquitous environment, the monitoring on function and per-formance of large scale of service objects is essential to guaranteethe function of service and to improve the reliability. Monitoring theubiquitous space is also required to provide high level services.Service pattern for the user is analyzed by the real-time monitor forthe sensor node. Result of the monitoring system is used for serv-ices supplied for the customer. Monitoring technique can beapplied to estimate resource requirement and to gain behavioralinformation of hardware devices. Real-time monitoring is one of themost important requirements to supply the smart service to cus-tomer on time.

We propose a scalable real-time monitoring method to aggregatelarge amounts of data from various sensor devices distributed overdifferent domain areas. Our real-time monitoring scheme meetsthe deadline for real time data from the sensor devices while con-sidering the scalability to equip a number of sensor devices. It isimpossible for the monitoring agent to monitor a large number ofsensor devices in real-time. However, the scalability for the moni-toring can be improved by employing the hierarchical sub monitor-ing agent for sensor devices while satisfying the deadline of datafrom sensor devices. Sensor devices have various deadlines alongwith the device property. Monitoring agent collects the real-timedata with short deadline directly while collecting non real-time dataor the real-time data with relatively long deadline indirectly by usingsub-monitoring agents. If deadline of data from the sensor deviceis longer than the monitoring delay induced by sub monitoringagent which aggregates and filters, then the sub-monitoring agentcan improve the scalability of monitoring devices while meeting thedeadline.

To provide users useful services satisfying individual demands, it isalso necessary to monitor and analyze the individual desire foreach user. Many types of context information are generated andprocessed in ubiquitous smart space environments consisted ofmany kinds of ubiquitous objects, which provide more convenientand intelligent services for users through the cooperation amongdiverse ubiquitous objects of wide range of networking, computing,context, and services.

Bong-Won Jang received the B.S. degree in Computer Engineering, InhaNational University, South Korea, in 2007. He is currently a MS student ofthe Graduate School of Information and Communication at Ajou University.His research interests include ubiquitous computing and real-time systems.

Byoung-Hoon Lee received the B.S. and M.S. degree in ComputerEngineering, Chungbuk National University, Cheongju, South Korea, in1998 and 2000, respectively. He is currently a Ph.D. student of theGraduate School of Information and Communication at Ajou University. Hisresearch interests include ubiquitous computing, distributed system andembedded programming

Dong-Wook Lee received the BS and MS degrees in computer engineeringfrom Ajou University, South Korea, in 2004 and 2006, respectively. He iscurrently a PhD student of the Graduate School of Information andCommunication at Ajou University. His research interests include Wirelesssensor network and ubiquitous computing.

Jai-Hoon Kim received the B.S. degree in Control and InstrumentationEngineering, Seoul National University, Seoul, South Korea, in 1984, M.S.degree in Computer Science, Indiana University, Bloomington, IN, U.S.A.,in 1993, and his Ph.D. degree in Computer Science, Texas A&M University,College Station, TX., U.S.A., in 1997. He is currently an associate profes-sor of the Information and Communication department at Ajou University,South Korea. His research interests include Distributed Systems, Real-TimeSystems, Mobile Computing and Ubiquitous Computing.

We-Duke Cho recieved a B.S. in 1981 from Sogang University, and his M.S.and Ph.D. from Korea Advanced Institute of Science and Technology(KAIST) in 1983 and 1987. Currently he is a professor of department ofElectronics Engineering College of Information Technology at AjouUniversity in Korea. His research interests included UbiquitousComputing/network, Sensor network, Post-PC(Next Generation PC SmartPDA), Interactive DTV Broadcasting Technology, High-level Home Serverand Gateway, Digital Broadcasting and Mobile Convergence PlatformTechnology, Wireless network.

13

CONFERENCE PAPERS

Page 14: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

BlueStar Mobile Management Services

Steve Mastrianni1, David F. Bantz1, Tom Chefalas1, Dong JunLan1, Gary Leonardi1, Leslie S. Liu1, Pei Ni Liu1, Randy Moulic1,Dennis G. Shea1, Drew Wyskida1 and Terrence Buechner2

1IBM Research Divisionstevemas, dfbantz, chefalas, tbuechne, landj, leonardi, lesliu, liupeini, rmoulic, dgshea, [email protected]

2 IBM Global [email protected]

Mobile device with wireless communication capabilities havebecome a viable and efficient platform to conduct many activitiesin enterprise world. However, how to manage a large-scale corpo-rate mobile task force in an efficient, cost-effective and secure wayremains a challenge today. In this paper, we present the design ofBlueStar, a managed enterprise mobility solution that provides crit-ical components to enable a secure and scalable management. Wedesigned our prototype system for a mobile claim process with oneclient in property and casualty insurance industry. We showed thatthrough simplification, integration and automation, BlueStar is apromising mobile management platform.

Dr. Mastrianni is a senior software engineer currently writing autonomic andservices software. He holds a B.S. degree in business administration andM.S. and Ph.D. degrees in computer science. He joined IBM Research afterrunning his own software development and consulting company for a num-ber of years, where he specialized in operating systems development,device drivers, real-time applications, data acquisition, and 3D graphics.Dr. Mastrianni is the author of three programming books, numerous confer-ence papers, and has written over 100 articles for industry trade publica-tions such as Byte and PC Magazine. He has 27 issued patents.

Dr. Bantz was a research staff member from 1972 to 2005 after a shortstint with a startup. He graduated from Columbia University School ofEngineering and Applied Science in 1970 with an Eng.Sc.D. degree andtaught there and at the University of Southern Maine as an adjunct profes-sor for over 30 years. He has 29 issued patents. His technical interests havealways been in personal computing applications and technology, and he iscurrently working on automated systems management.

Mr. Buechner is currently the Insurance Segment Manager for Japan. Mr.Buechner has worked with many of IBM’s top clients around the world, uti-lizing his broad business experience in insurance, health care and strategyconsulting to help them define and achieve their goals. Mr. Buechner holdsa BA in government from Georgetown University and an MBA from the NewYork University Stern School of Business.

Mr. Chefalas is a Senior Technical Staff Member in services technologies.He received a B.S. degree in computer science in 1988 and a M.S. degreein computer science in 1992 from New York University. He joined IBM in1987. Mr. Chefalas is currently working on desktop management, autonom-ic computing, and end-user services.

Mr. Lan is a researcher in the High Performance Solution team at the IBMChina Research Laboratory. He received his M.S. degree in electrical engi-neering from Tsinghua University, Beijing, China. Mr. Lan has publishedmore than ten papers in international conferences and holds five patents.

Mr. Leonardi is a Staff Software Engineer with 12 years of experience in thefields of information technology and services. His current responsibilitiesinclude the development and deployment of advanced wireless, remoteaccess solutions, and operating systems support for IBM.

Dr. Liu is a Research Staff Member at the IBM Thomas J. Watson ResearchCenter. Before joining IBM Research, he co-founded a small startup withseed funding from an NSF SBIR grant. Dr. Liu?s interests include peer-to-peer streaming, large-scale interactive applications, and mobile systems.Dr. Liu graduated from the USC Viterbi School of Engineering in 2007 witha PhD on computer science and has authored many technical papers inmultimedia and scalable systems design. He is also co-author of a bookchapter on peer-to-peer streaming.

Ms. Liu is a research & development engineer in the IT ServiceManagement team at the IBM China Research Laboratory. She received herM.S. degree in systems engineering in 2005 from Xi'an Jiaotong University,Xi'an, China. Her current focus is IT service management and device man-agement.

Dr. Moulic is an IEEE Fellow and Research Staff Member at the IBMThomas J. Watson Research Center. He participated in the development ofmany high performance and personal computing systems, including theRS/6000/Scalable Parallel supercomputers, IntelliStation, and Cell/B.E.processor graphics workstations, ThinkPad „„TransNote?? laptop, andQS20 Cell/B.E. processor server. He founded, organized, and directed theDeep Blue computer chess project, initiating the first exhibition matchevents with World Champions Gary Kasparov and Anotoly Karpov. He hasauthored many technical papers, holds many patents, and is an AdjunctProfessor at Columbia and Polytechnic Universities.

Dr. Shea is a Senior Manager in the Services Research department. Heholds B.E. and M.E. degrees in electrical engineering from RensselaerPolytechnic Institute, an M.A.S. degree from Florida Atlantic University,and a Ph.D. in computer science from the University of Pennsylvania. Hebegan his career at IBM Boca Raton working on small systems and his tech-nical interests have revolved around connectivity, mobile solutions, andclient management services. Dr. Shea’s current interest is in the area ofservices research and its application to solving customer problems.

Mr. Wyskida is a Senior Network Engineer with 18 years of experience inthe fields of information technology and services. His current responsibili-ties include the development and deployment of advanced wireless andremote access solutions for IBM. His current focus

14

CONFERENCE PAPERS

Page 15: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

The WEARIT@WORK Authentic User Tests inWearable Computing of a Healthcare Application

Otthein Herzog, Michael Lawo TZI and MRC, Universitaet Bremenherzog,[email protected]

Keywords: Wearable Computing, industrial applications, healthcare, exploitation of scientific results

The state of technology and new developments with a focus onwearable computing applications—wearable computing means aparadigm shift: instead of working at the computer users are sup-ported by computing systems in their primary tasks. It is shownhow future wearable and mobile computing solutions will minimizeadministrative effort and improve service quality and the time nurs-es and doctors can spend with patients. The importance of inter-personal communication and interaction is a challenge.

The paper reports experiences with a user-centric design approachin the wearIT@work project, actually the worldwide largest projectin the field of wearable computing. In this project the EuropeanCommission and 42 partners from 16 countries invested into a newtechnology with the goal of empowering mobile workers. The firstfour (of five) years of this project are over and industrial demonstra-tors, evaluations and results as well as an exploitation strategy areavailable. Beside the four application domains of maintenance,production, healthcare and emergency response further domainslike cultural heritage, a rural living lab for the prevention of environ-mental disasters and eInclusion are first extensions to new appli-cation domains.

The focus is on the healthcare application domain: Concreteresults are shown how wearable computing solutions allow forfocusing on the patient and on medicine, for enabling to spendmore time with patients and more attention to caretaking.Furthermore, sometimes “less is more.” We had the requirementof an easy to use system for the physicians. Often, the user is tech-nologically challenged, with little time to train. We have reducedthe number of necessary technical components in a complexcyclic Living Lab type innovation. At the end there was just a userinterface integrated in the white coat. Capacity sensors, RFID tech-nology and a Bluetooth interface for communication and can beeasily removed for cleaning purposes. Two kinds of interactiondevices were developed: a big one to be controlled by hand and asmaller one to be controlled by one or two fingers. The set-up willbe explained in detail and a report on the performed user tests willbe given. The devices were used in a real hospital environment andthe physicians used the system twice every day. In most cases,they were satisfied with the system, and the patients were alsohappy to take a look at their own documents easily from the bed.As a specific result the system will be further used and the hospi-tal management plans a roll-out of the system to other hospitals,too. Furthermore, a general outline of the exploitation strategy willbe presented as a good practice example.

Prof. Dr. Otthein Herzog is a chaired full professor on “Foundations ofArtificial Intelligence“ at the Universität Bremen since 1993. There hefounded and directs the TZI – Center for Computing Technologies and theMRC- Mobile Research Center in 1995 and 2004 respectively with togeth-er more than 300 full-time researchers. From 1977 to 1993 he worked forIBM in international R&D. He received his PhD in Informatics from theUniversität Dortmund in 1977, and graduated in Applied Mathematics atthe Universität Bonn in 1972. Dr. Herzog serves on several advisory boardsand as the CEO of the mobile solution group GmbH which specializes inadvanced mobile solutions. He is an elected member of the GermanAcademy of Science and Engineering and has (co-) published 24 books andmore than 135 refereed scientific papers on software engineering, Artificial Intelligence, content-based image and video processing, andwearable computing.

Prof. Dr. Michael Lawo is with the TZI at the Universität Bremen since2004 as the Technical Manager of the European Union funded IntegratedProject 2004-004216 wearIT@work after being the CEO of a group of SMEin the IT domain since 1999. From 1996 to 2000 he was CEO of an ITconsulting firm and from 1991 to 1995 the executive information systemsmanager with the Bremer Vulkan group. Michael Lawo was consultantbefore joining the Nuclear Research Centre in Karlsruhe from 1987 to1991 as the head of the industrial robotics department. He is a 1975 grad-uate of structural engineering of Ruhr Universität Bochum, received hisPhD from the Universität Essen in 1981 and became professor in structur-al optimization there in 1992. In 2000 he was appointed as professor ofhonour of the Harbin/China College of Administration & Management. He isauthor, co-author and co-publisher of seven books and more than 120papers on numerical methods and computer applications, optimization, IT-security and wearable computing.

15

CONFERENCE PAPERS

Page 16: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Novel Nanocomposites for Health Monitors and Implants

P. Gouma

Center for Nanomaterials and Sensor DevelopmentStony Brook University Stony Brook, NY, 11794-2275, [email protected]

Keywords: nanocomposites, electronic olfaction, non-invasivediagnostics, bio-mimicking scaffolds, 3D implants

This presentation involves two key applications of functionalnanocomposite materials; i) selective chemical sensors for signal-ing metabolites (NO, NH3, etc.) in exhaled human breath, and ii)tissue engineering scaffolds. For the former application, metaloxide (such as MoO3, WO3) nanostructures were prepared byelectrospinning and used to detect a variety of gaseous analyteswith high selectivity. These are single crystal polymorphicnanowires of high aspect ratio made from sol-gel and polymericprecursors [1]; the sensors made from single crystal nanowiresexhibit improved stability, extreme sensitivity (below ppb levels)and rapid response (msec) to the chemicals of interest. These arepromising for portable breath analysis devices used for non-inva-sive disease diagnosis. Furthermore, nanocomposite materialsbased on natural polymers were used to build scaffolds for boneand tissue engineering that enable cell growth and proliferation,while supporting cell differentiation, and these are also presented.The degree of cell attachment to the scaffold has a direct influenceon cell proliferation rate and control of phenotype. In this presen-tation, the nature of osteoblast attachment to electrospun nanos-tructured fibers of pure cellulose acetate (CA) and cellulose acetatereinforced with hydroxyapatite nanoparticles (CA-HA) is beingreported. CA/HA composite scaffolds appeared to favor cellspreading, with hydroxyapatite nanoparticle aggregates enhancedcell attachment to the fibers by providing anchoring sites. Thusthese scaffolds are considered as viable bone growth implants.These examples are given to highlight the importance of nanotech-nology to the bio-medical fields and to define the concept ofnanomedicine.

Dr. Gouma is a tenured Associate Professor in the Department of MaterialsScience & Engineering at the State University of New York (SUNY) StonyBrook. She is also the Director of the Center for Nanomaterials and SensorDevelopment. Her research focuses on selective chemical detectors,biosensors and hybrid nanoprobes for electronic olfaction systems. Dr.Gouma is a Fulbright Scholar. She holds Visiting Faculty positions at ETHZurich and at the University of Cyprus, she has been a Visiting Scientistwith NIMS (Japan), Univ. of Brescia (Italy) and she also has guest facultystatus at Lawrence Berkeley and Brookhaven National Laboratories. Havingseveral patents granted or pending and over 90 peer-reviewed publications,she serves as an Associate Editor for JACERS and in the editorial board ofNanomedicine and Sensor Letters journals. Dr. Gouma holds a B.S. degreein Applied Physics form the Aristotelian University of Thessaloniki, Greece,a M.S. in “Advanced Engineering Materials” and an M. Phil. in“Organizational Management”, both from the University of Liverpool (UK),and a Ph.D. in Materials Science & Engineering from the University ofBirmingham (UK). Prior to joining SUNY Stony Brook, she was a ResearchScientist at the Ohio State University. She can be reached at: SUNY StonyBrook, 314 Old Eng. Bldg, Stony Brook, NY, 11794-2275; Ph: +1 (631)632 4537 (office); (631) 632 8497 (lab); Fax: +1 (631) 632 8052;

16

CONFERENCE PAPERS

Page 17: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Index based u-Home Healthcare System(IHHS)

Yoosuk Jung, Weduke Cho

Center of Excellence for Ubiquitous System, Ajou University408 Paldal Hall, Ajou University, San 5, Woncheon-dong,Yeongtong-gu, Suwon-si, Kyeonggi-do, 443-749 Koreaj8508, chowd @ajou.ac.kr

Keywords: ubiquitous, healthcare, index, ontology, communitycomputing

A u-Health system means a system in which people can receivehealthcare service anywhere, anytime.

Index-based u-home healthcare system(IHHS) of CUS(center ofexcellence for ubiquitous system) is a kind of u-Health systems. Itcan measure various attributes about users and users’ environ-ments by cooperation of USPi(Ubiquitous Smart space Platforminitiative) and smart sensors. From those attributes, the system cancalculate quality of life at 6 indexes. It can also recommend or exe-cute proper services to user from those indexes. At this time, userpreferences are used to choose those services. The attributes, theindexes and the recommended services may be used in otherdomains like hospital, fitness center and restaurant. USPi which isthe core of IHHS can control various sensors and services in well-being home domain by three key methods; ontology-based contextawareness, dynamic community computing and index based serv-ice recommendation.

Ontology-based context awareness has been developed for a con-text broker and a service discoverer for awareness of context in acertain smart space. The context broker collects raw data fromsensors and generates context from the data. It can let USPi knowan occurrence of a context if the context was predefined. To gen-erate a context easily, the context is saved in form of ontology. Theservice discoverer can register or unregister services and searchusable services in a smart space for USPi.

Dynamic community computing is a cooperative technologyamong services in which various computing object can cooperateand can be adapted to their environment to achieve a commongoal. It includes a meaning-based community configuration and apolicy-based community execution. A meaning-based communityconfiguration has been developed for meta-service library, at whichroles of communities are described. During an execution of a com-munity, USPi can bind usable services by using meta-servicelibrary. A Policy-based community execution has been developedfor community manager, which can create, execute and break upa community by policies. Policies that are written by humandesigner are transformed by CCPL Parser. Transformed policiesare loaded by Policy Loader and are managed by Policy Manager.If a conflict between policies occurs, Conflict Manager controls theconflict. At IHHS, an Index agent calculates 6 indexes, a ServiceRecommender recommends proper services and a ServiceInvocator executes them.

Yoosuk Jung ([email protected]) received a B.S and M.S. in 1999 and2001 from Ajou University. He is currently a Research Engineer in theCenter of Excellence in Ubiquitous System. His research interests includedUbiquitous Computing/network, Sensor network, Security and Privacy,Mobile Convergence Platform Technology.

We-Duke Cho ([email protected]) recieved a B.S. in 1981 from SogangUniversity, and his M.S. and Ph.D. from Korea Advanced Institute ofScience and Technology (KAIST) in 1983 and 1987. Currently he is a pro-fessor of department of Electronics Engineering College of InformationTechnology at Ajou University in Korea. His research interests includedUbiquitous Computing/network, Sensor network, Post-PC(Next GenerationPC Smart PDA), Interactive DTV Broadcasting Technology, High-level HomeServer and Gateway, Digital Broadcasting and Mobile Convergence PlatformTechnology, Wireless network.

17

CONFERENCE PAPERS

Page 18: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Prostate Segmentation for Virtual ProstateCancer Screening

Joseph Marino, Arie Kaufman

Center for Visual Computing, Department of Computer ScienceStony Brook University, Stony Brook, NY 11794-4400jmarino, [email protected]

Keywords: Prostate Cancer, Segmentation, Volume Visualization,MRI, GPU

Prostate cancer (CaP) is the second leading cause of cancer-relat-ed deaths among males in the United States. Current techniquesof diagnosing CaP rely on inexact methodologies, and so magnet-ic resonance imaging (MRI) is being considered as a non-invasiveimaging modality that might allow more precise diagnoses to bemade. Our research aims to develop a system to allow for volumevisualization of the MRI prostate data and automatic localization ofareas with high suspicion for CaP. The first step is the difficult taskof segmenting the prostate from the surrounding anatomy in theMRI images.

Though several automatic methods have been proposed, none aresatisfactory for all different cases. A confounding problem is thatseveral different types of MRI can be performed (T1, T2, etc.),each of which can result in varying voxel intensities for both theprostate itself and the surrounding structures. Our aim is not todevelop an automatic segmentation system, but we have been per-forming manual segmentation of the datasets and focusing on ourprimary goals. A tool for manual segmentation of medical images,called 3D Slicer, is freely available.

However, it can be a difficult task using this program to get exactresults. Because of this, we have developed our own program toallow the user to quickly and easily segment areas from the MRIimages. The user is able to “paint” labels on areas, notating themas belonging to the prostate’s peripheral zone or central gland, orthe user can erase the current label. The size of the painting“brush” can be adjusted so fine detail and coarse areas can bepainted. The user can draw an outline for a label that can then befilled in, so that large areas need not be painted in a time consum-ing manner.

Four display windows are provided to give different views of thecurrent slice of data. Two of the windows display the entire sliceimage; the first of these always displays the original slice with nosegmentation, while the second displays an overlay (in differentcolors for different labels) on areas that have been segmented.The other two windows display only the portion of the current slicethat has been segmented; the first displaying just the segmentedslice, while the second displays a colored overlay showing whichareas are segmented. The user is able to control the brightness ofboth the original slice intensities and the overlay intensities. Inorder to allow for rapid assessment of the segmentation in 3D, avolume renderer is built in, which allows for 3D visualization of thesegmentation at any time. The graphical rendering is performedusing OpenGL and takes advantage of the GPU to provide real-timeinteraction. While created with the prostate specifically in mind,the program can be easily adapted for use in the manual segmen-tation and basic visualization of any volume dataset.

Joseph Marino is a PhD candidate in the Computer Science Department atthe State University of New York at Stony Brook. He performs research atthe Center of Visual Computing (CVC) under the guidance of his advisor,Prof. Arie Kaufman. His main research interests include studies in theareas of graphics, visualization, and medical imaging. His focus is on usingvisualization techniques for the detection and localization of cancer fromradiological images. He received a BS in Computer Science and AppliedMathematics & Statistics from SUNY Stony Brook in 2006.

Arie E. Kaufman is the Chairman of the Computer Science Department, theDirector of the Center of Visual Computing (CVC), Chief Scientist of theCenter of Excellence in Wireless and Information Technology (CEWIT), anda Distinguished Professor of Computer Science and Radiology at the StateUniversity of New York at Stony Brook. Kaufman has conducted researchfor over 35 years in computer graphics, visualization, user interfaces, virtu-al reality, and multimedia and their applications especially in biomedicine.He is a Fellow of IEEE and the recipient of the IEEE Visualization CareerAward (2005). He received a BS in Mathematics and Physics from theHebrew University of Jerusalem, in 1969, an MS in Computer Science fromthe Weizmann Institute of Science, Rehovot, Israel, in 1973, and a PhD inComputer Science from the Ben-Gurion University, Israel, in 1977.

18

CONFERENCE PAPERS

Page 19: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

u-Health Aide System for Ubiquitous WellbeingLifecare Service

Hee Eun Lee, Peom Park

Department of Industrial and Information Engr. & HumintecAjou University, Wonchun-dong, Youngtong-ku, Suwon, Kyunggi-do 443-749, South [email protected] [email protected]

In developed countries individual medical expenses are increasingand medical access is becoming limited. Therefore, u-Health tech-nology (where the user monitors their own vital signs) is on the rise.The purpose of this study is to develop a u-Healthcare systemwhich helps each member of society to manage their wellcare bythemselves. Our “u-Health Aide” system is a general medicalhealth examination and management system which analyzes andadvises the bio-signal that the user has measured, and connectsto a medical expert if necessary. Also, it offers the services that arerelated to wellcare, not to the medical activity, because it is madeas an accessory scoring system of Clinical Decision Supportingrather than direct prediction of the diseases.

This system consists of three modules: Sensing, Analysis andManagement.

1. Sensing Module is in charge of the measurement, transfer andreception of the bio-signal. The sensor consists of medic4AllWristClinic (Israel) and Boispace Inbody J10 (Korea). It canmeasure the user’s blood pressure, pulse, temperature, electro-cardiogram (ECG), SpO2, weight, height, and body fat. Thereception of the bio-signal is based on Zigbee and serial com-munication method.

2. Analysis Module analyses and predicts the diseases, and calcu-lates the health index. The disease prediction algorism?Stroke,CHD, and COPD?is secured through the intimate relationshipwith the medical workers. This module consists of the sub-mod-ules: Disease Analysis Module, Meal analysis Module, CaloricIntake Analysis Module and Activity Analysis Module.

3. Management Module offers the services for user-medical work-er-manager. Inquiry and analysis, offer of the results, diet andexercise prescription service, and Interactive preliminary med-ical examinations are supported. It consists of DiseasePrediction Module, Meal Recommendation Module andExercise Recommendation Module.

The u-Health Aide System is significant in that it is based on theuser-centered notion and users can consistently monitor the con-dition of their health at the various places where they often visit intheir daily life. Therefore, this study has taken the first step for U-Health system to achieve the goal: prevention. However, it stillneeds the improvement through more profound study in terms ofsecurity, universality and utility values, for it is for all ages and dealswith private information in public places. This is one of the subjectsof my next study.

Peom Park is a professor in the Department of Industrial & InformationSystems Engineering and is leading the Human Technology ResearchCenter (http://hci.ajou.ac.kr) at Ajou University and Human InformaticsTechnology. He worked on HCI and Telecommunication system at ETRI asa senior researcher and at CEWIT-SBU as a visiting researcher. He obtainedhis Ph.D. in Industrial and Manufacturing Systems Engineering at IowaState University on 1992. His current research interests are uT applica-tions, u-Healthcare/Telemedicine, Telematics and Ergonomic/Safety SystemDesign.

19

CONFERENCE PAPERS

Page 20: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

iFortress: Reducing Carbon Footprints andSupporting Data Center Efficiency

Bob Venero, President and CEO

Future Tech Enterprise Inc.

Future Tech Enterprise is the leading integrator for iFortress, theEast coast’s first structurally secure data center that helps organi-zations protect their most valuable asset: information. iFortressguards against smoke, water, acrid gases, fire, wind, earthquakesand ballistics. iFortress is considered a green technology for itsenergy efficiency and ability to reduce carbon footprints.

Our study was to create a one-of-a-kind solution that protects mis-sion-critical data from human intervention and natural disasters.iFortress uses wrap-around structural protection that is turnkey,scalable, mobile, stable, secure, impenetrable and reliable.Towards this end, we built different iFortress structures at severallocations, including a military testing facility. We monitored set upcosts and time lines, operated at several environmental andhuman events, sustaining no damage. iFortress not only passedevery structural test with flying colors, impressing the members ofthe Army Corps of Engineers, but it also revealed itself as a veryefficient, energy saving solution that helps reduce costs and the allimportant carbon footprint.

iFortress can be used across many other industries to protect sen-sitive information, historical documents, artwork, antiques, jewelryand other valuables. iFortress can stand alone at, above or belowgrade. It can work for most types of industry and is extremely ver-satile. Future improvements include:

• 19/i23 Rack Bunker™—a self-contained enclosure engineeredto protect remote and rack mounted technology

• iComm Intermodal iFortress™—an over-the-road intermodalcontainer that can be shipped via truck, sea, air, or rail anddeployed on an "as needed" basis.

Bob Venero has taken a start-up company from the basement of his LongIsland home in 1996 to an industry-leading end-to-end IT solutionsprovider with revenue of $65 million in 2007 and over 100 employees.Future Tech Enterprise Inc. has evolved from a traditional hardware providerto a total solutions provider – consistently proving that FTEI is a dynamicorganization with limitless capabilities. Bob is the founder of The BobVenero Children’s Foundation, a non-profit organization dedicated to pro-moting the welfare, health and happiness of children through innovativetechnologies. Bob’s humanitarian efforts include the NY Philharmonic, TheNational Center for Disabilities, The American Cancer Society, St. Jude’sChildren’s Hospital, Hofstra University, The Cradle of Aviation, The RedCross and others. Bob serves on several business advisory boards including:The Energeia Partnership; LISTnet; CEWIT; Stony Brook Deans Council;Good Samaritan Hospital; Suffolk County Wireless Commissions VARBusiness; Economic Development Team for Suffolk County; WorkforceInvestment Board for Suffolk County; Long Island Business Leader forKeySpan; Advanced Energy Research and Technology Center.

20

CONFERENCE PAPERS

Page 21: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Sensing and Communication Services for FoodTransport Logistics

Markus Becker1, Reiner Jedermann2,Andreas Timm-Giel1 and Carmelita Gorg1

1 TZI - Communication Networks, University BremenOtto-Hahn-Allee NW1, 28359 Bremen, [email protected]

2 IMSAS, University BremenOtto-Hahn-Allee NW1, 28359 Bremen, [email protected]

Keywords. Logistics, Food Transports, Communication, WirelessSensor Networks

Food transport logistics are an essential part of societies' food sup-ply. With rising prices for transport, e.g. for oil or gas, there is aninevitable need for more cost-efficient transport. Sensing and com-munication services exhibit a possibility for effective transport.Additionally, these services enable an objective of more flexibletransports and more automated logistics, leading to more cost-effi-cient transportation of goods.

Perishable goods such as fruits, if not transported according totheir characteristic environment, can be supervised by means ofwireless sensor nodes. The supervision can improve the efficiencyof the transport. For example, better regulation of the air-condition-ing system, leading to lower energy consumption and better over-all food quality. By using the sensor supervision to estimate thequality of the food, the food can even be delivered by dynamicallyassigned First Expire First Out (FEFO) strategy improving the loss-es of degraded quality.

For example, the ripening of bananas during transport in contain-ers from South and Central America to Europe can be better con-trolled. In a prototype transport surveillance, we are implementinga Wireless Sensor Network in a container, which is attached to acommunication unit and the ship's satellite communication sys-tem. This system facilitates an improved control of the containers'cooling unit, because of better spatial knowledge of the conditionsinside the container. In future even on board ripening by highertemperatures might become viable, thus reducing the need forcooling and the need for ripening facilities on land. Measurementsof the radio wave propagation conditions inside the loaded contain-er have been performed, and will be presented.

The prototype is currently in deployment for a land transport, untilthe conference experience will also be gained from the sea trans-port from Central America to Europe. Additionally simulations arecarried out about the performance of the multi-hop communica-tion in the Wireless Sensor Network and results will be presented.Concluding it can be said that an architecture consisting ofWireless Sensor Networks, RFID and external communicationfacilitating wireless mobile solutions and services for food transportis viable and ecologically reasonable.

Markus Becker received his Diploma in Electrical Engineering andInformation Technology in 2004 at the Aachen University of Technology,Germany. In September 2004 he joined the Communication NetworksGroup at the University of Bremen as a Research Assistant and a PhD can-didate. Currently he is involved in a CRC 637 transfer project bringingWireless Sensor Networks to logistics. His research interests include Sensorand Ad-hoc Networking, Simulation of Communication Networks andApplications of Telecommunication Networks. His web-page can be foundat http://www.comnets.uni-bremen.de/~mab/.

Reiner Jedermann finished his Diploma in Electrical Engineering 1990 attheUniversity of Bremen. After two employments on embedded processingof speech and audio signals he became a Research Associate in theDepartment of Electrical Engineering at the University of Bremen in 2004.He is writing his PhD thesis on automated systems for freight supervision.His tasks inside the CRC 637 research cluster comprise the analyses ofapplication fields and the development of an embedded framework for soft-ware agents. Since 2006, he has been a Member of the TechnicalCommittee of the Cool-Chain-Association.

Dr.-Ing. Andreas Timm-Giel received his PhD degree at the University ofBremen in 1999 and his diploma degree in Electrical Engineering in 1994from the University of Bremen, both on mobile radio channel modeling.From 1994 – 1999 he led a group at the University of Bremen for „MobileSystems“, that participated in several European R&D projects on mobileand satellite communications. Dr. Timm-Giel was the technical projectleader of TOMAS and represented MOEBIUS in the RACE Mobile ProjectLine. Starting in January 2000 Dr. Timm-Giel continued his work in theSATISFY2000 project as technical project leader at MediaMobilCommunication GmbH. At MediaMobil he was involved in the technical andcommercial set up of the mobile satellite network and service providerM2sat Ltd., and he wa Technical Product Manager and Manager NetworkOperations for M2sat. He is leading several industry, national and EC fund-ed research projects. Since October 2006 he is additionally leading theinterdisciplinary concerted activity “Adaptive Communications” of theinterdisciplinary Center for Computing Technologies in Bremen His researchinterests are focused on mobile communication systems, services andapplications.

Prof. Dr. Carmelita Görg received her diploma degree from the Departmentof Computer Science, University of Karlsruhe and the Dr. rer. nat. degreeand the appointment as lecturer from the Department of ElectricalEngineering, Aachen University of Technology. From 198 until 1989 sheworked as a consultant in the field of communication networks. Since 1989she has been working as a group leader and since 1997 as an AssociateProfessor at the Communication Networks Institute, Aachen University ofTechnology. C. Görg was core task leader and partner manager for the RACEII project Mobilise (R2003) and the ACTS project CAMELEON (AC341). In1996 and 1997 she was an evaluator/auditor in the ACT programme. Since1999 Prof. Görg is leading the Communication Networks group at theUniversity of Bremen, which is part of the tzi/ikom (Center for ComputingTechnology / Center for Communication and Information Technology) andthe Mobile Research Center in Bremen. The group has been and is activein many national and European projects (see grou profile above). Prof. Görghas published over 100 scientific papers mainly in the field of communi-cation networks and performance evaluation. She is a speaker of the ITGworking group 5.2.1 on "System Architecture and Traffic Engineering" andmember of the ITG board.

21

CONFERENCE PAPERS

Page 22: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

NATO Force Tracking System

Paul Knudsen, Thomas Coyle Globecomm Systems Inc., 45 Oser Avenue, Hauppauge, NY [email protected]

NATO currently provides an International Security AssistanceForce (ISAF) to conduct Peace Support Operations in Afghanistan(AFG). In line with this requirement, NATO requires a ForceTracking System (FTS) for deployment in AFG to reduce the risk offratricide, caused by more than one coalition force operating in thesame Area of Operation (AOO). ISAF requires information relatingto the identity and position of deployed forces, as well as multi-for-mat text messaging, to be automatically exchanged between aNATO procured FTS and Force XXI Battle Command Brigade andBelow (FBCB2), the system in use with CFC-A. The intent is todeliver a capability that provides ISAF and CFC-A with visibility ofall force dispositions and provides a simple means of communica-tion between deployed assets. Such a facility will allow timely iden-tification of friendly force activity in overlapping theatres and avertblue on blue engagements. To be most effective, force command-ers require a common view of the operational area that is bothtimely and accurate. They need systems to pass clear, accurateand timely information within and across national and Allianceboundaries. Moreover, information must be provided to all levels ofcommand, form the tactical to the strategic, including nationalorganizations at the component level and below.

Paul J. Knudsen has over 24 years of experience in the satellite and telecom-munications fields. Mr. Knudsen is responsible for all business aspects in theEastern Atlantic business region, which includes Europe, Africa, Middle East,Russia and CIS. Responsibilities include strategic business planning, mar-keting and sales, project implementation, and after sales support. Mr.Knudsen has developed a team of Marketing Directors, Business Managers,Project Engineers, Buyer Planners, Program Administrators, and BusinessAdministrators to support the business development and project execution forhis geographic region. As Project Engineer, Mr. Knudsen designed and imple-mented earth stations for use in Europe (Italy and Spain), several countriesin South America, as well as in the US. Mr. Knudsen has a BS ElectricalEngineering from Manhattan College.

Thomas Coyle’s current role at Globecomm is the General Management ofthe Globecomm Systems business, which includes design, provisioning,and management of complex, satellite based, communication networks andend-to-end service solutions. Mr. Coyle’s business focuses on leveraging thecombined capabilities of Globecomm Systems and Globecomm NetworkServices to implement a variety of managed network service solutions. Heis responsible for the processes and procedures for program implementa-tion, and network provisioning and transitioning networks to service opera-tions. Recent programs include a Terrestrial Radio Broadcast network andan ATM over Satellite based Voice and IP data network.

SATCELL GSM

Keith Hall, Steve Yablonski Globecomm Systems Inc., 45 Oser Avenue, Hauppauge, NY [email protected]

Our primary objective is to allow new operators to leverage a host-ed environment to achieve economies of scale and speed of imple-mentation, and also allow existing operators’ to serve new isolateduser groups or reduce the costs to serve existing isolated usergroups. Satcell GSM allows new operators’ to leverage off GSI’sinvestment to achieve economies of scale and speed of implemen-tation. No investment, time or money is required for the core net-work infrastructure. Satcell GSM allows existing operators’ to servenew Telecom Islands or reduce the costs to serve existing TelecomIslands. It can also be used to test new markets. No back haul isrequired. A single Satcell GSM installation is all that is needed.Satcell GSM allows the provision of big city services to the TelecomIslands. Once base station sites are established, it can be imple-mented in days.Globecomm Systems Inc. (GSI) has developed apatent-pending network architecture based on the concepts of theSoft Mobile Switching Center and a satellite-based IP Network thatdramatically improves the process of serving isolated user groupsor “Telecom Islands.”

This architecture creates an IP cloud in the satellite footprint,which is the internal communication bus for the distributed ele-ments of the soft switch and the signaling channel between theGSM Network elements. This same cloud can provide traffic trunksto support long-distance. This technology allows least cost routingof calls at the local level. Local calls stay local. No double hop satel-lite and no satellite links when terrestrial is available at a lower cost.

Keith Hall is Senior Vice President and General Manager of GlobecommNetwork Services (GNSC). He is responsible for the GNSC business andGlobecomm Services Maryland LLC. Mr. Hall’s responsibilities includeplanning and execution of corporate growth strategies, strategic businessdevelopment, creation of new service based solution offerings and execu-tion of service contracts through on-going operations. Over the last sixyears, Mr. Hall has led GNSC towards increased growth and profitabilitywith a focus on expanding managed service products to address the broad-cast and wireless markets.

Stephen Yablonski has over 30 years of experience in satellite communica-tions, and came to Globecomm Systems from Satellite TransmissionSystems, Inc. where he was Vice President and General Manager of theCommercial Systems and Networks Division. At Globecomm, Mr. Yablonskihas created an organization that has been the leader in the developmentand deployment of cellular networks with a “little bit of satellite” in thetransport systems. In addition, the group has led in the development ofMulti Media broadcast centers and the delivery of Multi Media over a widevariety of systems.

22

CONFERENCE PAPERS

Page 23: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Wireless Cyber Assets Discovery Visualization

Ken Prole, Ina Ghaznavi-Collins, Anita D’Amico

Secure Decisions division of Applied Visions, Inc.6 Bayview Avenue, Northport, NY [email protected]

Keywords: Visual analytics, wireless discovery, wireless security,coordinated views, geographic visualization

As wireless networking has become near ubiquitous, the ability todiscover, identify, and locate mobile cyber assets over time isbecoming increasingly important to information security auditors,penetration testers, and network administrators. We describe anew prototype called MeerCAT (Mobile Cyber Asset Tracks) forvisualizing wireless assets, including their location, security attrib-utes, and relationships. This paper highlights our latest iteration ofour prototype for visual analysis of wireless asset data, includinguser requirements and the various coordinated visualizations.

Mr. Prole is the Project Engineer for the DARPA-funded MeerCAT project atthe Secure Decision division of Applied Visions, Inc. He has over ten yearsof experience developing visualization and other software solutions for gov-ernment and commercial clients. ?Prior to leading the MeerCAT project,Ken led large scale government research projects for DARPA and theDepartment of Homeland Security, applying his extensive knowledge insecurity visualization and information assurance to help protect governmentagencies from cyber attacks. Ken was also responsible for the developmentof Reuters MetaStock, a professional technical analysis and charting soft-ware product for real-time traders. This “shrink wrapped” product has gonethrough over a decade of releases to <100,000 users and was awarded theTechnical Analysis of Stock and Commodities Magazine Reader’s ChoiceAward for 10 years in a row. Mr. Prole holds a Bachelor of Science degreein Information Systems from Marist College and a Master of Science degreein Information Systems from Long Island University, C.W. Post.

Ms. Ghaznavi is currently a Senior Analyst and Project Manager at AppliedVisions, Inc. She has over 20 years of experience in research, development,and management of software products for commercial and governmentorganizations. Ina has held product management positions at CA and theCA-acquired CapaCity Software. She was also instrumental in developingthe strategy and positioning for one of the first ‘software as a service’ secu-rity products, Vigilante’s SecureScan, which was acquired by Japanese firmNexantis.. She began her career at GTE, where she developed mission-crit-ical decision support applications for the Department of Defense. Ina hasserved as a member of a number of advisory boards including the ArmyAdvisory on Communications Requirements and the Software EngineeringIndustrial Research Center. She has published papers in the fields of arti-ficial intelligence, computer simulation and modeling. Ina earned aBachelor of Science degree in Biomedical and Electrical Engineering fromthe University of Bridgeport, and continued her graduate work inBiomedical Engineering and Management at Worcester PolytechnicInstitute.

As Director of Secure Decisions since its conception in 2000, Dr. D’Amicohas led the company’s innovative research and product development insecurity visualization. She has been dedicated to improving the perform-ance of cyber defenders through visualization, applying over 20 years ofR&D experience and expertise as a human factors psychologist and aninformation security specialist. In addition to directing Secure Decisions’business, Dr. D’Amico also serves as the principal investigator on a numberof Secure Decisions’ research efforts with the Department of Defense,including a DARPA program to create visualizations of the mission andbusiness impact of cyber security breaches. Dr. D’Amico has publisheddozens of papers on security visualization, and holds a patent in the field.Prior to joining Applied Visions, Dr. D’Amico was founder and head of theInformation Warfare team at Northrop Grumman, where she led the effortto develop a system for forecasting cyber attacks on military networks. Dr.D’Amico holds a Ph.D. and M.A. in Psychology from Adelphi University witha focus on Human Factors and Cognitive Psychology.

23

CONFERENCE PAPERS

Page 24: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Enhances Interoperability During Natural Hazards

Dr. Ronald Pirich, Mr. Praveen Anumolu and Mr. Eitan Eadan

Northrop Grumman Integrated SystemsAdvanced Concepts and Integrated Solutions/Homeland SecurityBethpage, NY [email protected]

Long Island is an “island” and prone to congestion, long responsetimes for outside aid delivery and therefore “isolation” during wide-spread natural disasters. There is a critical need to develop bettertechnologies and processes for the multi-jurisdictional and cross-disciplinary coordination of existing systems and future networksfor enhanced interoperability during natural catastrophes. Thepresent extent and scope nationwide of public safety response isconstantly being evaluated and improved. Data on current condi-tions compared to needs are necessary to develop plans forimprovement and measure progress over time.

Incidents of any level of severity originate at the community levelwith local governments and counties as the initial source of sup-port. The challenge of communications interoperability hasplagued public safety agencies for decades. Together, technologyand intelligent planning can give first responders and public safe-ty agencies the ability to exchange voice and data on demand, inreal time, when needed and authorized. State and local govern-ments play a large role in developing and implementing plans toimprove public safety agencies’ interoperability since they ownmost of the physical Infrastructure. States play a central role in managing emergency coordination while the FederalGovernment is recognized as playing the central role of harness-ing diverse Federal resources in service of the emergencyresponse community.

Northrop Grumman in partnership with NYSTAR’s LIFT and sever-al regional companies and universities will be developing new inter-operability capabilities through systems engineering and integra-tion at the NYS Center of Innovation & Excellence (COIE). The COIEwill allow for the transformation and deployment of these technolo-gies into systems of systems solution sets. Northrop Grumman andLIFT, along with the COIE tenants and public safety/first responderuser community will be defining needs, evaluating/evolving tech-nologies, creating and delivering solutions that are intuitive to use,easy to deploy and reliable, while being affordable.

This presentation will highlight several natural hazard events,including earthquakes, pandemic influenza and hurricanes andthe common elements among them which are essential to maintain communication during planning, response and recovery. Enhanced interoperability is essential to keeping ourcommunities safe.

Dr. Pirich is responsible for electromagnetic interference mitigation, chem-ical, biological, nuclear, radiological and explosives (CBNRE) warfaredefense and advanced coatings at Northrop Grumman’s Integrated SystemsAdvanced Capabilities Development/Technology Development Center. Hiscurrent efforts include advanced fiber optics, electromagnetic interferencemitigation, multi-mission sensor integration, threat/vulnerability/riskassessment, development of point and standoff sensors for the detectionand classification of various CBNRE threats and associated wireless com-munications, modeling and simulation. Dr. Pirich has over thirty years insolid state research technology, which includes nanofabrication and char-acterization of nano and microstructures for sensors, materials for signaturemanagement, Program Manager for DARPA Unconventional PathogenCountermeasures program and US Army Chem/Bio Detection programs Heis a key contributor to Northrop Grumman’s Bio-Hazard Detector System forthe United States Postal Service and is a holder of ten patents and authorof 130 technical papers and presentations. Dr. Pirich received his BS inPhysics/Mathematics, MS and PhD in Physics from the State University ofNew York and a Post-Doctoral Research Fellowship from the University ofCincinnati.

Praveen Anumolu is a research engineer in the Technology Developmentgroup of Northrop Grumman Integrated Systems. He works on a variety ofprojects involving electromagnetic modeling, fiber optics, advanced photon-ics, antenna simulation, and homeland security. Praveen is a member ofthe IEEE and the IEEE computer society and is on the technical commit-tee for the IEEE Aviation Photonics and Fiber Optics (AVFOP) conference.He is a member of the SAE AS-3 standards group and is the author or co-author of over 15 papers in areas ranging from electromagnetic simulationsto atmospheric phenomenon to archaeological analysis. He has a BS inElectrical Engineering and Geological Sciences and MS in ElectricalEngineering all from Cornell University.

Mr. Eadan has over 20 years of experience designing and implementingsoftware systems and algorithms. Designed and implemented platformindependent, network centric, agent based software and algorithms in sup-port of Dynamic Battle Management Modeling and Simulation Systems.Specific concentration in the areas of resource allocation, situation assess-ment, move/counter move probabilistic analysis, and cooperative computerassisted battle management decision making. Managed the NorthropGrumman Team for DARPA’s Self-Organizing, Cooperative Network forPrecision Targeting Program. As part of this effort, designed and imple-mented a multi-thread tracking and multi-level fusion software library. Theimplementation included multi-target tracking for each tracker thread andmulti-level attribute fusion capability. Fusion and correlation of track/trackattributes was enabled within each tracked thread and/or across multi-thread trackers. Mr. Eadan was responsible for the theory, design, andimplementation of a number of CAE tools developed by the corporateresearch center. The tools include: PROTOBLOCK, an interactive userenvironment for the simulation and analysis of dynamic systems. Employedstate-of-the-art capabilities in graphic design, user interface, transparentmulti-process communication and object oriented multi-discipline opera-tions. PROTOopt, optimization package, to be employed with PROTO-BLOCK and PROTOsim, a general-purpose nonlinear simulation environ-ment.

24

CONFERENCE PAPERS

Page 25: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Low Complexity and Similar Performance to QRD-M Detection Scheme for MIMO-OFDM System

Hun-Hee Lee, Myung-Sun Baek and Hyoung-Kyu Song

uT Communication Research Institute Sejong University, 98 Gunja-Dong, Gwangjin-GuSeoul 143-747, Korea [email protected] [email protected]@sejong.ac.kr

This paper proposes a multiple-input and multiple-output orthogo-nal frequency division multiplexing (MIMO-OFDM) detectionscheme reducing the computational complexity and providingcomparable performance to the QRD-M detection.

The proposed detection scheme checks channel condition persubcarrier, and then selects detection scheme either adaptiveQRD-M or ordered decision feedback equalization (DFE) detectionscheme according to the channel condition.

First step: We have to check the channel condition per subcarrierand define a fixed number S which is the number of using orderedDFE detection scheme. The channel condition is judged by thepost-detection SNR. The post detection SNR for i-th subcarrier iseasily obtained as following

(1)

Where G is a Moore-Penrose pseudo-inverse matrix. The zero-forc-ing (ZF) G matrix is determined as

(2)

and the minimum mean square error (MMSE) G matrix is

(3)

where I is a identity matrix. The post detection SNR depends on Gmatrix value. If G2 value is small, we can judge that the channel condition is a good. Therefore we calculate G2 per subcarrier and then sort from the smallest value to the largestvalue. The sorted subcarrier index is saved in sequence

Second step: We detect from the smallest sorted subcarrier indexto the fixed number sorted subcarrier index l1 using ordered DFEdetection scheme because the small index ls denotes better chan-nel condition. Therefore, although we use ordered DFE detection

scheme, it has even weaker influence on overall performance.Fixed number is determined by arbitrary value.

Fig 1. BER performance comparison of QRD-M (M=16), theordered DFE and the proposed schemes at fixed number of 32(Mi) define the retained symbols at i-th layer)

Final step: Remained sorted subcarrier indexes, which indicatebad channel condition, is detected by using adaptive QRD-Mdetection scheme. Adaptive QRD-M detection scheme uses vari-able parameter M to each layer according to channel condition ofeach layer. We consider a 4 4? MIMO-OFDM system with 16- QAMmodulation and set the number of subcarriers to 64. Simulationresults shows at fixed number 32 ( the number of subcarriers )

2

as Fig 1. Compared with the QRD-M (M=16), the bit error rate per-formance is better about 0.5 dB than the proposed detectionscheme. Thereby we know that the proposed scheme has similarperformance to QRD-M (M=16) while the computational complex-ity is reduced about 67 percents per subcarrier. In case of set thenumber of sub carrier to 64 then it is less complexity about 83%.

In summary, the proposed detection scheme has similar BER per-formance compared to QRD-M for MIMO-OFDM system.Moreover, the proposed scheme has less computational complex-ity than QRD-M (M=16).

Hyoung-Kyu Song is an Associate Professor with the Department ofInformation & Communications Engineering at Sejong University. Hisresearch interests include signal processing, mobile communications, wire-less communication and broadcasting in an ubiquitous environment.

25

RESEARCH POSTERS

Page 26: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Enhanced Schemes for Hierarchical ModulationBased Cooperative Systems

Jee-Hoon Kim, Jung-In Baik, Jin-Hyuk Song and Hyoung-Kyu Song

uT Communication Research Institute, Sejong University, 98 Gunja-Dong, Gwangjin-GuSeoul 143-747 KOREA

bid4u, bji0309, song020, [email protected]

As time passes, much more communication resources which arelimited are being required to provide various services, and there-fore we need to maximize their efficiency. Consequently, a methodcalled cooperative communication was developed to take theadvantages of multiple antennas only with single antenna. It con-stitutes a virtual antenna array by sharing the antennas of otherdevices with high channel quality to exploit the space diversity.However, this cooperative method has a drawback of the transmis-sion-rate loss since it requires time delay for transmitting signals tobe distinguished at the destination node. Recently, we proposed anovel use of hierarchical modulation (HM) and an adequate coop-erative space-time block code (C-STBC) to solve this weak point[1]. Even though it provided certain level of diversity gain withouttransmission-rate loss, there is room for improvement. In thispaper, we focus on the performance enhancement of the conven-tional scheme.

Since the minimum distance of the hierarchical 16-QAM and gen-eral 16-QAM are the same, the use of hierarchical 16-QAM ratherthan QPSK causes the worse error performance. Even though thecooperative diversity gain compensates this deterioration, we pro-pose a scheme that modifies the constellation points of hierarchi-cal 16-QAM to reduce the error performance gap with the QPSKmodulation based cooperative system. The hierarchical 16-QAMmapper is determined by the formula in Eq. (1) where Bk meansthe k-th input bit, j = √

__−1, and Ω is the variance of HM class 2

which is 1 for the fundamental hierarchical 16-QAM. The averagepower PA used for power normalization is calculated as 8 + 2Ω2. Itis clear that HM class 1 is more important than HM class 2 forcooperation. Therefore, we change the value of Ω for more correctestimation of HM class 1. We confirm that as the value of Ωdecreases, the minimum distance of HM class 1 is increased,while that of HM class 2 is decreased. On the other hand, cooper-ative communication does not provide better performance thannoncooperative one at all times. In other words, it may disturbdetection instead when the selected relays have bad channel qual-ity. Therefore, we adopt a SNR estimation based adaptive algorithmto attain the ultimate purpose of the cooperation.

Figure shows the bit error rate performance comparison of the pro-posed scheme according to and SNR gap (SNR gap = SNRSR –SNRSD). Even though the gain is not large, it is noticed that onlysimple effort is needed to modify the constellation points. On theother hand, if the adaptive cooperation is considered, the advan-tage of cooperation is always guaranteed regardless of SNR gap.

Hyoung-Kyu Song is an Associate Professor with the Department ofInformation & Communications Engineering at Sejong University. Hisresearch interests include signal processing, mobile communications, wire-less communication and broadcasting in an ubiquitous environment.

26

RESEARCH POSTERS

Page 27: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

A Robust Car Number Plate Detection UsingMathematical Morphology

Je Hyung Moon, Jin Heon Kim, and Tae Young Choi

School of Electrical and Computer Engineering, Ajou University, Korea San5, Woncheon-dongYeongtong-gu, Suwon 443-749, Korea [email protected]

This paper presents a robust method for car number plate detec-tion using mathematical morphology. The detection problem is cal-culating the correlation of input signal to target signal followed bydecision making. The shape, color, size, and position of numberplate are regulated by authorities for a better recognition by humanin general. Among them the relatively big intensity differencebetween the numbers and the background region within the plateand the symmetry of the rectangular shaped plate are the majordiscriminating factors used for the detection.

Morphological close and open images are acquired with the struc-turing element whose size is closely related to the width of a letterof plate and the two images are subtracted. The subtracted imageis then average filtered with the mask size of the plate. The 1-dimensional column sum of the average filtered image is calculat-ed. The x coordinate of the centroid of the plate is assumed to bethe one of local maxima in the column sum graph because themorphological preprocessing makes the region of the plate dis-criminant from the rest of image. Almost all of the captured imagesinclude the headlight area of the car. The region of the headlightsalso shows local maxima because it is inherently bright area of theimage and this fact is used for the decision. The moving centroidof the column sum using a window of width equal to the distancebetween two headlights in a car is calculated and the symmetryabout the centroid is used for the final decision. The centroid at thehighest symmetry is decided to be the x coordinate of the plate.The aspect ratio and the regulated size of the plate are also usedfor the extraction of coordinates of the plate.

More than 100,000 test images captured from speed regulationcamera are used for the experiment. The experimental resultshows that the detection rate is over 98%

Je Hyung Moon, received the B.S. and M.S. degrees in electrical and com-puter engineering from Ajou University in 2001 and 2003, respectively,and is working toward his Ph.D. degree in Multimedia Signal ProcessingLab., Graduate school of Electrical and Computer Engineering, AjouUniversity, Korea.

Jin Heon Kim, received the B.S. and M.S degrees in electrical and comput-er engineering from Chungju University in 2006, and Ajou University,Korea, in 2008, respectively.

Tae Young Choi has been a professor of Electrical and ComputerEngineering at Ajou University, Korea, since 1983. His research interestsare in signal processing and computer vision. He received the B.S. andM.S. degrees from Seoul National University in 1974 and 1978, respec-tively, and the Ph.D. degree from University of Aix-Marseille III, France, in1982.

27

RESEARCH POSTERS

Page 28: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Simple Cooperative Transmission Based on CyclicDelay Diversity Scheme

Jin-Hyuk Song, Jee-Hoon Kim, Jung-In Baik, and Hyoung-Kyu Song

uT Communication Research Institute Sejong University, Gun-Ja Dong, Gwang-Jin GuSeoul 143-747, Korea

song020, bid4u, bji0309, [email protected]

Nowadays, high data rate multimedia services for wireless commu-nications need technologies that can provide increased throughputand enhanced reliability. The multi-input multi-output (MIMO)scheme significantly improves system performance and robust-ness to channel without the use of additional bandwidth and powerconsumption. However, in practice, terminals are difficult to buildmultiple antennas due to high cost or limited size. In order to over-come these problems, cooperative diversity that the uses other ter-minals to help transmit information from a source terminal to itsdestination has recently emerged and given considerable attention.

In this paper, cyclic delay diversity (CDD) is incorporated into thewireless cooperative communication system, in which each termi-nal has single antenna. The proposed cooperative CDD scheme iscompared with a different type of transmit antenna diversity tech-nique, called cooperative orthogonal space time block coding(STBC). Cooperative CDD performs mainly worse bit error perform-ance than cooperative STBC from orthogonal design. Moreover forthe purpose of obtaining diversity, cooperative CDD must be pickedup by the forward error correction (FEC) coding. i.e. channel cod-ing is mandatory. However, the main advantages of cooperativeCDD over cooperative STBC are the avoidance of any rate loss inthe case of more than one relay and can be easily applied with anarbitrary number of relays. Furthermore, there is no quasi station-ary multipath channel assumption for transmission of a specificnumber of symbols. Lastly cooperative CDD do not require addi-tional complexity at both transmitter and receiver.

Here, a simulation result is shown to illustrate the bit error rate(BER) performance of comparing cooperative CDD with coopera-tive orthogonal STBC, where the number of relays is 1 or 2. Thissimulation is used over 8-path Rayleigh fading channel and SNRof the source-relays channels are higher about 20dB than otherchannels. From this simulation result, it is noticed that the perform-ance gap between cooperative STBC and cooperative CDDdecreases when the number of relays is increased. Because theorthogonal design of STBC suffers from rate loss when more thantwo transmit antennas.

Fig. 1. Cyclic delay diversity versus space-time block codes. 1 Rxantenna, BPSK modulation, convolution code with constraint-length of 7 and code rate of 1/3.

Hyoung-Kyu Song is an Associate Professor with the Department ofInformation & Communications Engineering at Sejong University. Hisresearch interests include signal processing, mobile communications, wire-less communication and broadcasting in an ubiquitous environment.

28

RESEARCH POSTERS

Page 29: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Information Inconsistency Analysis of Large Scale Autonomous Tracking Systems with Redundancy

Junghun Ryu1,Jinseok Lee2, Sangjin Hong2, Yunyoung Nam3,and We-Duke Cho1

1 School of Electronics Engineering, Ajou University, Korea dreami2, [email protected]

2 Department of Electrical and Computer EngineeringStony Brook University, NY, USA jselee, [email protected]

3 Center of Excellence for Ubiquitous SystemAjou University, Korea [email protected]

Tracking systems without the operation of the human require com-plete autonomous operations where the decision is made by thesystem based on available information. Contrary to the human con-trolled systems, small amount of error may cause significant incon-sistency and wrong decision can be made. Especially in the multi-ple camera environment, information inconsistency may arise dueto uncoordinated local information of the each camera as well asthe global information that collects the local information. Whenconsidering autonomous large scale, the system needs to guaran-tee that information is consistent throughout the system so thatcorrect autonomous decision can be made.

In this paper, we provide computational model dependent trackingenvironment and investigate the complexity and issues in main-taining the information consistency. The main objective of ourapproach is to analyze the inconsistency in system. For analysis ofthe inconsistency, it is necessary to have a modeling and evalua-tion methodology that can extract the system behavior. We consid-er the computational framework for object tracking in multiplecamera environment and provide an evaluation methodology withoperational models. We model the detection probability based oncamera characteristics and environment characteristics. Cameracharacteristics involve the camera placement such as the height ofa camera position, panning, zooming, and tilting which change theviewable range. Detection probability also has an influence on envi-ronment characteristics such as uneven illumination and surveil-lance area structure.

Once the detection probability based on the camera characteristicsand the environment characteristics is obtained, it needs to bemodified by the distance between neighboring objects which areviewed with the view of a camera. As the distance of the neighbor-ing objects becomes smaller, the objects are more likely over-lapped and considered to be a single object. In a physical systemmodel, objects are monitored by distributed cameras, and localand global information are estimated by each local and global pro-cessing. In order to analyze the information flow, two models arepresented: an update strategy model and a compensation strategy

model. The update strategy model considers that information isprocessed from time-instant n-1 to time-instant n. The compensa-tion strategy model considers that the global information at time-instant n flows to the local information at time-instant n.

Based on this model, we extract potential sources that cause infor-mation inconsistency. Specifically, for the possible sources, wefocus our analysis on the approaches for inconsistency detection.We investigate the detection probability and the inconsistencythroughout several applications.

Jung hun Ryu([email protected]) received a B.S. in 2007 from AjouUniversity. Currently he is a M.S in department of Electronics EngineeringCollege of Information Technology at Ajou University in Korea. His researchinterests included Ubiquitous Computing and Computer Vision.

Jinseok Lee received dual B.S. degrees in Electrical and ComputerEngineering from Stony Brook University, NY, USA and Ajou University,Korea in 2005. He is currently pursuing the Ph.D degree in the Departmentof Electrical and Computer Engineering at Stony Brook University. Hisresearch interests includes multi-modal signal processing, sensor nodearchitecture optimization, complex signal processing algorithm design, andvarious estimation problems for wireless sensor networks.

Sangjin Hong received the B.S and M.S degrees in EECS from theUniversity of California, Berkeley. He received his Ph.D in EECS from theUniversity of Michigan, Ann Arbor. He is currently with the department ofElectrical and Computer Engineering at Stony Brook University. Before join-ing SUNY, he has worked at Ford Aerospace Corp. Computer SystemsDivision as a systems engineer. He also worked at Samsung Electronics inKorea as a technical consultant. His current research interests are in theareas of low power VLSI design of multimedia wireless communications anddigital signal processing systems, reconfigurable SoC design and optimiza-tion, VLSI signal processing, and low-complexity digital circuits. Prof. Hongserved on numerous Technical Program Committees for IEEE conferences.Prof. Hong is a Senior Member of IEEE.

Yunyoung Nam ([email protected]) received the B.S, M.S. and Ph.Ddegree in computer engineering from Ajou University, Korea in 2001,2003, and 2007 respectively. He is currently a Research Engineer in theCenter of Excellence in Ubiquitous System. His research interests includemultimedia database, ubiquitous computing, image processing, patternrecognition, wearable computing, HCI, and intelligent video surveillance.

We-Duke Cho([email protected]) recieved a B.S. in 1981 from SogangUniversity, and his M.S. and Ph.D. from Korea Advanced Institute ofScience and Technology (KAIST) in 1983 and 1987. Currently he is a pro-fessor of department of Electronics Engineering College of InformationTechnology at Ajou University in Korea. His research interests includedUbiquitous Computing/network, Sensor network, Post-PC(Next GenerationPC Smart PDA), Interactive DTV Broadcasting Technology, High-level HomeServer and Gateway, Digital Broadcasting and Mobile Convergence PlatformTechnology, Wireless Network.

29

RESEARCH POSTERS

Page 30: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Illustrative Parallel Coordinates: A More Effective Means to Glean Insight from High-Dimensional Data

Kevin McDonnell1 and Klaus Mueller2

1 Department of Mathematics and Computer Science, Dowling College, NY 11769 [email protected]

2 Computer Science Department Stony Brook University, NY 11794 [email protected]

The method of Parallel Coordinates (PC) devised by Dimsdale andInselberg (1990) is a technique for the visualization of multidimen-sional data. Each dimension is drawn as a vertical line, and eachmultidimensional point is visualized as a poly-line that crosseseach axis at the appropriate position to reflect the N-D position.The PC methodology facilitates the 2D rendering of very complexdatasets in a single image. However, PC suffers from a few short-comings. For example, PC plots tend to be very cluttered, withpolylines crossing and overlapping each other. To overcome thisproblem, one may use clustering to group nearby N-D points intoa single representative N-D point, and then draw these points asheavy poly-lines on top of the PC plot, using colors to show theirmemberships in the mutually disjoint clusters. Multi-resolutiontechniques can impose a hierarchical structure on the data, anddimension reordering can restructure the datasets in an automaticor semiautomatic manner to minimize clutter. Focus+contextapproaches can also reduce clutter, enabling the analyst to gleaninsights into extremely dense datasets. Unfortunately, despite all ofthese efforts, PC plots often do not clearly convey the distributionof the data on each axis. That is, with so many overlapping lines itcan be difficult to discern how dense or sparse the data points areon each dimension.

We offer a new suite of techniques which we call Illustrative ParallelCoordinates (IPC). The overarching philosophy behind IPC is togenerate PC-style visualizations that convey a large amount ofinformation about the dataset in a relatively small area of thescreen. Our major goal is to produce abstract renderings of com-plex, multi-dimensional datasets that reveal large-scale structures.Further, it is also desirable to create aesthetically pleasing visual-izations that draw the eye to important features of the data, suchas the distribution of values and the density of the points. Weachieve these goals by devising new illustrative rendering tech-niques and by improving upon existing PC visualization methodolo-gies.

The specific benefits of our approach are as follows:

• Instead of poly-lines we render each data-point as a poly-curve,that is, a collection of end-point interpolating B-spline curves.This facilitates the creation of edge bundles and serves to de-clutter the visualization.

• Clusters are visualized as a collection of semi-transparent poly-gons bounded by spline curves, which show the extents of theclusters and which can be scaled to control the screen area theyconsume. Higher cluster opacities correspond with clusterscontaining more points.

• The distribution of the data can be viewed at different levels ofdetail by displaying the clusters in a branched, treelike manner.

• A density plot that conveys the distribution of the lines or curvesbetween axes can be used to show correlations between axes.

• The distributions along individual axes are shown as fadedquadrilateral strips and provide per-cluster histograms of thedataset for each dimension.

• Silhouettes, shadows and halos not only assist the eye in distin-guishing between overlapping clusters, but also provide aninteresting artistic effect.

Klaus Mueller received the MS degree in biomedical engineering in 1991and the PhD degree in computer science in 1998, both from Ohio StateUniversity. He is currently an associate professor in the Computer ScienceDepartment at Stony Brook University, where he also holds co-appoint-ments in the Biomedical Engineering and Radiology Departments. His cur-rent research interests are computer and volume graphics, visualization,visual analytics, medical imaging, and computer vision. He won the USNational Science Foundation CAREER award in 2001 and has served as aprogram co-chair at various conferences, such the Volume GraphicsWorkshop, IEEE Visualization, and the Symposium on Volume Visualizationand Graphics. He has authored and co-authored more than 90 journal andconference papers, and he is a senior member of the IEEE and the IEEEComputer Society.

Kevin T. McDonnell is an Assistant Professor of Computer Science atDowling College, where he has been a member of the faculty since 2004.In 2003 he received his Ph.D. in Computer Science at Stony BrookUniversity, where he also earned his M.S. degree in Computer Science. Hegraduated summa cum laude with a B.S. in both Computer Science andApplied Mathematics and Statistics from Stony Brook in 1998. That yearhe was awarded both a University Graduate Research Fellowship and aGraduate Assistance in Areas of National Need (GAANN) fellowship. He haspublished numerous peer-reviewed articles on subdivision-based modeling,visualization and haptics-based interaction. His primary research interestsinclude illustrative visualization, geometric modeling and interactive 3Dgraphics. He is a member of the IEEE Computer Society, ACM and Phi Beta Kappa.

30

RESEARCH POSTERS

Page 31: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Physical-Space Refraction-CorrectedTransmission Ultrasound Computed Tomographyfor Breast Mammography

Shengying Li1, Marcel Jackowski2, Lawrence Staib3,Donald Dione4 and Klaus Mueller1

1 Stony Brook University 2 University of Sao Paulo 3 Yale University 4 Ultrasound Detection Systems [email protected]

Ultrasound computed tomography (UCT) has a long history andparticular promise in the imaging of the breast. It is inexpensive,comfortable, and imposes no ionizing radiation to the patient.However, the reconstruction of these images poses significantchallenges. UCT is susceptible to refraction effects, making it diffi-cult to reconstruct images faithfully. The acoustic ray direction isbent when ultrasound passes from one medium to another medi-um with a change in the acoustic index of refraction, according toSnell’s law for refraction. For example, the large subcutaneous fatlayer in the breast causes a refractive effect that can significantlydistort the ultrasound ray direction and eventuallycause spatial dis-tortion and intensity artifacts in the resulting images. Diffraction isanother complication typically addressed by diffraction tomogra-phy methods but it is based on the weak scattering assumption,which is violated by the strongly refracting fat layers in the breast.In this work, we focus on correcting the artifacts stemming fromrefraction. Previous work has either not modeled bent rays at all orhas inadequately eliminated bent ray distortion effects and failed tofaithfully reproduce tissue properties in UCT. Furthermore, priormethods have been computationally expensive, limiting theirextendibility to three dimensions.

To advance the state of the art in these respects, we introduce theconcept of wave-based ray propagation models into UCT imaging,accurately taking into account the refractive phenomena. For this,we model the eikonal equation, which governs the movement of awave front from emitters to receivers, using the Fast MarchingMethod (FMM). With this method, the wave arrival time for eachgrid point can be extracted, and the accurate ray direction for anarbitrary point can be derived by searching for the minimum pathin the Time-Of-Flight field between the point and the emitter. TheFMM has become quite popular in recent years in computergraphics and computer vision, enabling accurate distance trans-forms, segmentation shape recognition, and others. In this paper,we demonstrate that the FMM also represents a promising methodfor the efficient and accurate modeling of the propagation ofacoustic waves in a refractive media.

We employ a two-phase approach by ways of an iterative method,SART, to faithfully reconstruct two tissue properties relevant in clin-ical diagnosis, such as mammography: speed of sound and soundattenuation. We demonstrate our results by ways of a newlydesigned analytical ultrasound breast phantom. A remainingobstacle is the speed of computation. Wave tracking is an expensive procedure, in particular when employed within an itera-tive framework. We show how commodity graphics hardware(GPUs) can greatly accelerate the refractive UCT framework. Our GPU-based implementation achieves speedups of nearly 2orders of magnitude over a comparable CPU-implementation,allowing a 3D reconstruction within 5 minutes, which meets theinteractive demands of clinical practice, without a loss in reconstruction quality.

Klaus Mueller received the MS degree in biomedical engineering in 1991and the PhD degree in computer science in 1998, both from Ohio StateUniversity. He is currently an associate professor in the Computer ScienceDepartment at Stony Brook University, where he also holds co-appoint-ments in the Biomedical Engineering and Radiology Departments. His cur-rent research interests are computer and volume graphics, visualization,visual analytics, medical imaging, and computer vision. He won the USNational Science Foundation CAREER award in 2001 and has served as aprogram co-chair at various conferences, such the Volume GraphicsWorkshop, IEEE Visualization, and the Symposium on Volume Visualizationand Graphics. He has authored and co-authored more than 90 journal andconference papers, and he is a senior member of the IEEE and the IEEEComputer Society.

31

RESEARCH POSTERS

Page 32: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Model Driven Visual Analytics

Supriya Garg, Julia EunJu Nam, IV Ramakrishnan, Klaus Mueller

Computer Science Department, Stony Brook University, NY 11794 sgarg, ejnam, mueller, [email protected]

Modern day enterprises, be they commerce, government, science,engineering or medical, have to cope with voluminous amounts ofdata. Effective decision making based on large, dynamic datasetswith many parameters requires a conceptual high-level under-standing of the data, an arguably difficult problem. To makeprogress on this problem one must draw on the complementarystrengths of computing machinery and human insight.Recognizing this promising human-computer synergy, VisualAnalytics (VA), defined as the science of analytical reasoning facil-itated by interactive visual interfaces, has become a major devel-opment thrust. It seeks to engage the fast visual circuitry of thehuman brain to quickly find relations in complex data, trigger cre-ative thoughts, and use these elements to steer the underlyingcomputational analysis processes towards the extraction of newinformation for further insight. VA has widespread applications,such as homeland security, the financial industry and internetsecurity among others.

However, thus far the main emphasis in VA has been mostly onvisualization, data management, and user interfaces. As far asanalytical computing goes, VA research has mainly focused on rel-atively low-level tasks, such as image and video analysis and data-base operations. In today’s VA systems, it is the human analyst whoperforms the actual reasoning and abstraction. Obviously this typeof workflow is of limited scalability in terms of reasoning chain com-plexity. Here, we present a framework that allows human analyststo off-load some of the reasoning to a computational analyst.Collaboration with this machine agent occurs by pointing out inter-esting data patterns discovered in the visual interface.

The VA infrastructure we describe is rooted on techniques inmachine learning and logic-based deductive reasoning. Theyassist analysts in making sense of large data sets by facilitating thegeneration and validation of models representing relationships inthe data. By basing the construction of models on techniques frommachine learning and logic-based deduction, the VA process isboth flexible in terms of modeling arbitrary, user-driven relation-ships in data as well as readily scale across different data domains.

To allow analysts to discover interesting patterns in the data, to bepresented to our automated reasoning system, we have devised avisual interface that allows users to point out arbitrary high-dimen-sional patterns in a direct manner. Motivated by the Grand Tourparadigm, our interface enables the user to explore hyper-space byviewing projections (in form of scatter plots) of the data onto a 2Dhyper-plane. Here, the motion parallax resulting from the quick butcontinuous transition of hyper-plane projections provides a very

compelling experience for getting a sense of the high-dimensionalstructure of the data. We also present an autonomous high-dimen-sional navigation interface augmented with intuitive navigation aidsthat allows the user to fluently control the orientation of the projec-tion hyper-plane, utilizing the resulting motion parallax to explorehigh-dimensional neighborhoods in an insightful manner.

We illustrate the operational aspects of our VA framework by build-ing models of relations in two data sets, network traffic and censusdata. These datasets are sufficiently complex to highlight all fea-tures of our system.

Klaus Mueller received the MS degree in biomedical engineering in 1991and the PhD degree in computer science in 1998, both from Ohio StateUniversity. He is currently an associate professor in the Computer ScienceDepartment at Stony Brook University, where he also holds co-appoint-ments in the Biomedical Engineering and Radiology Departments. His cur-rent research interests are computer and volume graphics, visualization,visual analytics, medical imaging, and computer vision. He won the USNational Science Foundation CAREER award in 2001 and has served as aprogram co-chair at various conferences, such the Volume GraphicsWorkshop, IEEE Visualization, and the Symposium on Volume Visualizationand Graphics. He has authored and co-authored more than 90 journal andconference papers, and he is a senior member of the IEEE and the IEEEComputer Society.

Supriya Garg is a PhD student in the Computer Science Department atStony Brook University. She finished her undergraduate studies as a BTechin Computer Science and Engineering from IIT, Bombay. Presently, she isworking in the Visualization lab under Prof. Klaus Mueller. Her researchinterests include illustrative visualization, social network analysis, vision,machine learning, and information extraction/information retrieval. Herprojects focus on analyzing and making sense of data, and presenting it tousers in simple, easy to understand formats.

32

RESEARCH POSTERS

Page 33: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

A High-Performance Architecture for the Lydia Text Analysis System

Mikhail Bautin, Charles Ward, and Steven Skiena

Department of Computer Science Stony Brook University, Stony Brook, NY 11790 mbautin,charles,[email protected]

The Lydia text analysis system [1, 2, 3, 4, 5, 6] performs namedentity recognition and analysis over text corpora. Named entityanalysis over large news corpora is extremely useful for applica-tions in a variety of areas, ranging from market research to socialscience. We describe a high-performance scalable architectureand implementation of the Lydia system based on the HadoopMap-Reduce framework. Early prototypes of the Lydia architectureshow the vast utility and flexibility of the Map-Reduce framework.After parallelizing our Lydia NLP processing pipeline we were ableto process four years of U.S. news data in one week on StonyBrook CEWIT’s 100-node cluster, and extract time series from theresulting marked-up text in less than two hours. This is a markedimprovement over the several months required to process a simi-lar amount of text using the previous centralized system.

Large scale studies pose a challenging implementation problem forthe data mining system. Our daily archive of about 1,000 U.S.newspapers, spanning approximately four years, rapidly approach-es one terabyte in size. Prior versions of the Lydia system were lim-ited in their ability to cope with such large amounts of data. Thesescaling difficulties were largely the result of an architecture builtaround a centralized relational database and sequential process-ing. By contrast, the main component of our high-performancesystem is a distributed entity database. This structure maintainsraw time series counts such as reference frequency and referencesentiment, as well as values derived from them, such as sentimen-tand juxtaposition scores. These are stored for every entity at a finelevel of time and source granularity, typically being aggregateddaily by each individual news source. The system also performs avariety of manipulations to cluster entity names into likely corefer-ential entity sets, ranging from simple text normalization to phonet-ic hashing. Most importantly, all of this data can be produced in afully parallel manner as a seriesof map-reduce jobs.

Another essential component of our system is a distributed docu-ment storage and index. All documents processed by the systemare stored in a collection of sorted files in a distributed file system,and servers are implemented to provide random access to thosedata. In addition, we maintain a distributed Lucene index and pro-vide distributed search capabilities over the document set.

Finally, the web interface of our system will provide the user withtime series data for any entity, or set of entities, including frequen-cy, sentiment score, and relation strength to other entities.Because of the flexibility of our distributed entity database, the userwill be able to easily gather statistics from custom sets of sources,and aggregate statistics at any desired level of granularity and overany set of entities.

Mikhail Bautin is a PhD student in the Department of Computer Science atSUNY Stony Brook, working under Professor Steven Skiena on the TextMapnews analysis project (http://www.textmap.com). He received his BScdegree in Mathematics from N.I.Lobachevsky State University of NizhnyNovgorod, Russia. His research interests include algorithms, natural lan-guage processing, and software engineering.

Charles Ward received his Ph.D. in Computer Science from the Universityof Alabama in 2008, where he studied language constrained shortest pathalgorithms. He is currently a postdoctoral associate in the lab of Dr. StevenSkiena at Stony Brook University. His research interests include news/textanalysis, information diffusion modelling, algorithms, and graph theory.

Steven Skiena is Professor of Computer Science at SUNY Stony Brook. Hisresearch interests include the design of graph, string, and geometric algo-rithms, and their applications (particularly to biology). He is the author offour books, including "The Algorithm Design Manual" and "Calculated Bets:Computers, Gambling, and Mathematical Modeling to Win". He is recipientof the ONR Young Investigator Award and the IEEE Computer Science andEngineering Undergraduate Teaching Award.

33

RESEARCH POSTERS

Page 34: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Opportunistic and Cooperative SpatialMultiplexing in MIMO Ad hoc Networks

Shan Chu and Xin Wang

Department of Electrical and Computer Engineering Stony Brook University Stony Brook, New York, 11794 [email protected] [email protected]

With the fast progress of MIMO technology and its growing appli-cations in networks, it is important to develop techniques to enablemore efficient MIMO network communications. However, it is verychallenging to coordinate node transmissions in a MIMO-basednetwork with meshed topology. Different nodes may have differentnumber of antennas, and the peer relationship changes as networktopology changes. The quick variation of channel condition and theinconsistency in node density would lead tomore challenges.Instead of simply extending the algorithms used in cellular net-works, an efficient algorithm is needed to better exploit the peer-to-peer nature of the network and the varying channel condition tomaximize the data rate of the network. Although there are manyrecent efforts in developing MAC protocols for applying MIMOtechnique to ad hoc networks, there is very limited work to fullyexploit the meshed topology and consider both multiuser diversityand spatial diversity to maximize network capacity. In addition, thetraffic at each node may be different and the user packets mayhave different service requirements.

In this work, we propose an integrated scheduling scheme toimprove the network throughput and transmission quality inMIMO-based ad hoc networks by jointly considering trafficdemand, service requirements, network load, multiuser diversity,and channel condition. In our scheme, a sender node can trans-mit to multiple downstream nodes using different antennas, whilea receiver node can receive packets from multiple upstreamnodes. Therefore, a group of neighboring nodes can take advan-tage of the meshed network topology to cooperate in transmissionand form a virtual MIMO array. In a transmission duration, trans-mitter nodes and antenna sets are selected opportunistically toexploit the multiuser diversity and spatial diversity to a largedegree, while supporting different transmission priorities, reducingtransmission delay and ensuring fair transmissions among nodes.

The main contributions of this work are:

• We propose a centralized algorithm to use as performancebenchmark, and a distributed algorithm for practical implemen-tation. Both algorithms take advantage of the multiuser diversi-ty and spatial diversity by opportunistically selecting the nodesand antennas with good channel conditions to form virtualtrans-mission array and maximize the spatial multiplexing gain. Ourschemes specifically consider the service requirements of theuser traffic, the transmission delay, and the fairness amongnodes.

• We form a concrete physical layer model, and provide efficientmethodologies to evaluate channel coefficients and interfer-ence, in the presence of a large number of nodes competing intransmission. This can reduce the gap between physical layertheoretical studies and practical implementation of the algo-rithm in network to improve performance.

• We propose a new MAC scheme to better work in a MIMO-based multi-packet reception network, and to support our dis-tributed algorithm design.

Our performance results demonstrate that our proposed algo-rithms are very efficient in coordinating transmissions in a MIMO-based networks. Up to eight times data rate is achieved as com-pared to the scheme of selecting only one user pair at a time asoften used in cellular networks, while the transmission delay isreduced up to 90%.

Dr. Xin Wang is currently an assistant professor of the department of elec-trical and computer engineering. Prior to joining the department, she wasan assistant professor in the department of computer science and engineer-ing of SUNY at Buffalo between 2003 and 2005, and was a Member ofTechnical Staff in the area of mobile and wireless networking at Bell LabsResearch, Lucent Technologies, New Jersey between 2001 and 2003. Shereceived the BS and MS degrees in telecommunications engineering andwireless communications engineering from Beijing University of Posts andTelecommunications, Beijing, China, respectively, and the PhD degree inelectrical engineering from Columbia University, New York, NY. Shereceived the prestigious NSF CAREER award in 2005. Her research inter-ests include mobile and ubiquitous computing, wireless networking andsystems, overlay and peer-to-peer systems, performance evaluations, andnetwork security. Her research projects are supported by National ScienceFoundation and National Institute of Justice.

34

RESEARCH POSTERS

Page 35: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

An EM-based Low Complexity Semi-blindChannel Estimation for OFDM systems

Seung-Hyun Nam, Sung-Ju Lee, and Hyoung-Kyu Song

uT Communication Research InstituteSejong University, 98 Gunja-Dong, Guangjin-GuSeoul 143-747, Koreansh, leesj, songhk @sdc.sejong.ac.kr

The orthogonal frequency division multiplexing (OFDM), whichtransforms a frequency selective channel into many parallel flatfading sub-channels, is an efficient technique to combat multipathchannel in the current wireless communication systems such aswireless local area networks (WLAN) standards like IEEE802.11a,European HIPERLAN/2, and Japanese MMAC, wireless personalarea networks (WPAN), and digital video broadcasting for hand-held (DVB-H). To estimate the channel state information (CSI) andcorrect the received signal, the pilot-based approaches inserted infrequency domain are widely used. Therefore, to recovery transmit-ted data through received data, the accuracy of CSI greatly influ-ences the overall system performance. As for channel estimation,there have been a variety of algorithms with different optimizationcriteria and levels of numerical complexity. The decision-directedestimator can be effectively used in systems with packet datatransmission mode, such as mobile wireless cellular communica-tions. However, when system is in continuous data transmissionmode, the error propagation of the decision-directed estimator willcause serious performance degradation. In this case, the pilot-aided estimation provides better performance than the decision-directed estimation because the pilot-aided frame on predeter-mined subcarriers are sent as training signals. Generally, the basicchannel estimation schemes are used linear interpolation, cubicinterpolation, and so on in pilot-aided OFDM frame. These basicinterpolation schemes for channel estimation are simple and prac-tical methods but exhibit error floor than the others. To overcomethis problem, the EM algorithm is usually used for channel estima-tion. This algorithm is a general approach to maximum likelihood(ML) estimation, rather than a specific algorithm. The commonstrand to problems where the approach is applicable is a notion of‘incomplete data’; this includes the conventional sense of ‘missingdata’ but is much broader than that. The ‘incomplete’ data actual-ly at hand are regarded as observable functions of these ‘completedata’. The resulting algorithms, while usually slow to converge, areoften extremely simple and remain practical in large problemswhere no other approaches may be feasible. This algorithm isintroduced to improve the performance of the system in frequencyselective channel. The EM algorithm is a technique for finding MLestimation of system parameters in a broad range of problemswhere observed data are incomplete. Although this algorithm canachieve good performance, the complexity of calculation is toohigh. To reduce complexity, three different algorithms have beendeveloped and compared. Although they have developed to

reduce complexity, it still high. So, we consider matrix inversion toadopt optimal algorithms for decreasing complexity. We adaptquasi-Newton methods to the EM algorithm for channel estimationin frequency selective environments. Newton's method often con-verges faster than other optimization methods. The conventionalEM algorithm is required complexity due to find inversion of matrixlike below equations. The iterative approach is the most suitable toreduce complexity. When we use many subcarriers, the complexi-ty is greatly reduced because the order of complexity is decreasedfrom cubic to quadratic. The main objective of this paper is toreduce the complexity of the EM-based channel estimation for fre-quency selective channel in OFDM system.

Hyoung-Kyu Song is an Associate Professor with the Department ofInformation & Communications Engineering at Sejong University. Hisresearch interests include signal processing, mobile communications, wire-less communication and broadcasting in an ubiquitous environment.

35

RESEARCH POSTERS

Page 36: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Carrier Frequency Offset Reduction Using MSE-OFDM in Cooperative system

Sung-Ju Lee, Jae-Seon Yoon, and Hyoung-Kyu Song

uT Communication Research Institute, Sejong University, 98 Gunja-Dong, Gwangjin-Gu, Seoul 143-747, Korea

leesj, [email protected] [email protected]

Cooperative communication is promising method to share individ-ual multi-user antennas. It creates virtual antenna array thatobtains a spatial diversity similar to multiple-input multiple-output(MIMO) to enhance bandwidth efficiency, power efficiency andreliability. Orthogonal frequency division multiplexing (OFDM) sig-nals suffer from the sensitive carrier frequency offset which leadsto inter-carrier interference (ICI) and the high peak-to-average-power ratio (PAPR). Conventional OFDM system exist only singlecarrier frequency offset between transmitter and receiver. Butcooperative communication divides stations into source, relay anddestination which generate multiple carrier frequency offset. TheOFDM-based cooperative systems(CO-OFDM) are undergonemore serious influence by these drawbacks.

Recently, a multi-symbol encapsulated orthogonal frequency divi-sion multiplexing (MSE-OFDM) scheme has been proposed. Ingeneral OFDM system, each OFDM symbol is added the cyclicprefix (CP) in the front of symbol. On the contrary, several symbolsare grouped together (M) making a frame and then add one singleCP in MSE-OFDM system. It improves the robustness to synchro-nization error and reduces PAPR since it uses small FFT blocksize. We examined the signal transmit process. To obtain coopera-tive diversity, the source broadcasts signal. In the first phase, thedestination performs proper time synchronization of the receivedsignal and then eliminates the CP. If we assume channel H isknown to the receiver perfectly, one-tap equalizer is used in fre-quency domain. The each OFDM symbol is modulated N-pointIDFT so frequency domain signal is converted back to timedomain. In the second phase, the relays perform the same processas destination. But relays modulate and forward signal to destina-tion again.

Owing to the destination receives a number of signals from sourceand relays by independent channels, it uses proper signal comb-ing technique like maximum ratio combining (MRC). We investi-gate the performance of cooperative system using MSE-OFDM withexist carrier frequency offset. When we simulated the increase thenumber of M, the system more robust bit error rate (BER) perform-ance against synchronization errors than conventional OFDM sys-tem in Fig 1.

It also obtains cooperative diversity. These advantages of coopera-tive MSE-OFDM scheme are applied to the cooperative communi-cation. The source reduces the high PAPR and destination miti-gates the carrier frequency offset.

Fig 1. The effect of the number of M on BER of cooperative MSE-OFDM with fixed carrier frequency offset (CFO : 0.1) over 8-pathRayleigh fading channel.

Hyoung-Kyu Song is an Associate Professor with the Department ofInformation & Communications Engineering at Sejong University. Hisresearch interests include signal processing, mobile communications, wire-less communication and broadcasting in an ubiquitous environment.

36

RESEARCH POSTERS

Page 37: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Exact Phrases in Information Retrieval forQuestion Answering

Svetlana Stoyanchev, Young Chol Song, Amanda Stent

Computer Science DepartmentStony Brook UniversityStony Brook, NY [email protected]

Question answering (QA) is a task of finding a concise answer to anatural language question. QA task can be viewed as a sophisticat-ed information retrieval where the system performs linguistic pro-cessing of questions, automatically generates a query, and finds aconcise answer from a set of documents. In open domain factoidquestion answering task system is designed to answers “who”,“what”, “when”, and “where” questions, for example “Who is thecreator of The Daily Show?”, or “When was Mozart born?”.

Search engines may also be used for finding answers to factoidquestions. However, in a search engine, a user chooses key wordsfor a query and an answer appears as a part of a retrieved docu-ment. Web interface of a search engine may be used for pinpoint-ing the actual answer. A QA system attempts to automate the tasksdone by a user during interaction with a search engine: 1) identi-fying key words and phrases, and 2) identifying, finding, and pre-senting actual concise answer, which may be a date, a person’sname, a country, etc.

An advantage of a question answering system over a search engineis that it may be deployed with a speech interface. A speech inter-face makes information access available to cell phone and PDAusers, as well as to visually impaired users.

We present a new question answering system StoQA. The firststage of QA involves information retrieval. Therefore, performanceof an information retrieval subsystem serves as an upper bound forthe performance of a QA system.

In this work we investigate a possibility of improving performanceof information retrieval stage by using exact phrases from a ques-tion. For example, for a question “Where was Mozart born”, aphrase “Mozart was born” is identified by a system.

Phrases are automatically identified from a question and used asexact match constituents to a search query.

In this work we compare system performance on a 3 Gigabytenews AQUAINT text corpus and on unstructured WEB dataset. Weuse questions and answer pairs from the question answering trackof the Text REtrieval Conference (TREC 2006) for evaluating thesystem.

Our results show an improvement over baseline on several docu-ment and sentence retrieval measures on the WEB dataset. We geta 20% relative improvement in Mean Reciprocal Ranking score forsentence extraction on the WEB dataset when using automaticallygenerated phrases and a further 9.5% relative improvement whenusing manually annotated phrases. Surprisingly, a separate exper-iment on the indexed AQUAINT dataset showed no effect on infor-mation retrieval performance of using exact phrases.

We currently work on speech enabled question answering and onimproving speech recognition performance for open domain ques-tions.

Svetlana Stoyanchev is a Ph.D. candidate in Computer Science at StonyBrook University. She holds a BS in Computer Science at the University ofMaryland, College Park and a MS from NYU. Her Ph.D. research focuseson task-oriented dialogue systems. She also does research on questionanswering.

Young Chol Song is an undergraduate student at Stony Brook University. Hisresearch focuses on question answering. He also worked on a vocal tractaging project predicting speakers’ age using features from speech.

Dr. Amanda Stent is an associate professor of computer science at SBU.She holds a PhD from the University of Rochester and is the author of over30 conference and journal publications. Her areas of research include spo-ken and multimodal dialog, discourse processing, and natural languagegeneration.

37

RESEARCH POSTERS

Page 38: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Construction of Robust and Efficient WirelessBackbone Network with Algebraic Connectivity

Ziyi Zhang and Xin Wang

Department of Electrical and Computer Engineering Stony Brook University Stony Brook, New York, 11794 [email protected] [email protected]

With the popularity of wireless devices and the increasing demandof network applications, developing more effective communica-tions to enable new and powerful applications, and to allow servic-es to be accessed anywhere, at anytime is important. However, itis extremely challenging to support efficient and reliable wirelesscommunications, due to the node mobility, unreliable wirelessdevices, and unstable wireless medium. The increasing communi-cation needs in pervasive computing and communications envi-ronment also lead to the increase of transmission collisions, hencetransmission delay, throughput degradation, and extra energy con-sumption. Many efforts have been made in recent years to con-struct backbone networks so that communications will be mainlycarried by a selected set of backbone nodes, with the purpose ofminimizing the number of nodes and hence reducing the total net-work transmissions and collisions. Many other important issuesneed to be considered to support pervasive communications, suchas backbone network reliability and stability, load balancing, theconstraints of the backbone route, energy level and capacity of thebackbone nodes and hence the longevity and capability of thebackbone networks.

We exploit the use and control of algebraic connectivity, an impor-tant concept introduced in spectral graph theory, and backbonenetwork design to capture some important network features and tocontrol backbone network topology for improved stability, capacityand routing efficiency. To further capture other network features,we consider the use of a cost function to capture the impact ondelay due to the node capacity, transmission error, and node dis-tribution. The total network cost is the summation of node cost.This node cost model will help balance the network loads andreduce transmission delay, which will help improve network capac-ity. Our backbone construction algorithms, however, do not con-strain the cost function format so that the proposed backbone for-mulation algorithms can be applied to meet the need of differentapplications. We further introduce a new metric, connectivity effi-ciency, as a function of algebraic connectivity and total networkcost. This metric allows the backbone design to tradeoff betweenincreasing algebraic connectivity and reducing total network cost.We formally formulate our backbone construction problem as aconnected dominating set

Dr. Xin Wang is currently an assistant professor of the department of elec-trical and computer engineering. Prior to joining the department, she wasan assistant professor in the department of computer science and engineer-ing of SUNY at Buffalo between 2003 and 2005, and was a Member of

Technical Staff in the area of mobile and wireless networking at Bell LabsResearch, Lucent Technologies, New Jersey between 2001 and 2003. Shereceived the BS and MS degrees in telecommunications engineering andwireless communications engineering from Beijing University of Posts andTelecommunications, Beijing, China, respectively, and the PhD degree inelectrical engineering from Columbia University, New York, NY. Shereceived the prestigious NSF CAREER award in 2005. Her research inter-ests include mobile and ubiquitous computing, wireless networking andsystems, overlay and peer-to-peer systems, performance evaluations, andnetwork security. Her research projects are supported by National ScienceFoundation and National Institute of Justice.

Composition in Incrementalization andApplication to Constrained RBAC

Michael Gorbovitski and Yanhong A. Liu

Stony Brook University, Stony Brook, NY 11794mickg, [email protected]

This paper describes a compositional transformational method andits application to constrained role-based access control (RBAC), toderive efficient implementations from a specification based on theANSI standard for RBAC. The method is based on the idea ofincrementally maintaining the result of expensive set expressions.We describe a fully automatable method for composing incremen-talization rules for maintaining the results of composite expres-sions. We calculate precise time complexities for both incremental-ized and straightforward implementations. We also describe suc-cessful prototypes and experiments with these implementationsand with automatically generating efficient implementations fromstraightforward implementations.

Annie Liu is a professor in the Computer Science Department at the StateUniversity of New York at Stony Brook. She received her BS from PekingUniversity, MEng from Tsinghua University, and PhD from CornellUniversity, all in Computer Science. Her primary research interests are inthe areas of languages, compilers, and software systems, particularly ingeneral and systematic methods for design and optimization. She hasstrong other interests in database, security, embedded systems, and distrib-uted computing, and has also worked on uncertainty reasoning and expertsystems. She has published over 50 articles in major journals and confer-ences and taught 18 different courses in these areas. She is a member ofIFIP WG2.1 and has served on 30 program committees and steering com-mittees.

Michael Gorbovitski is a Ph.D. student in the Computer ScienceDepartment at Stony Brook University. He received his BS from theComputer Science Department at the State University of New York at StonyBrook. His primary research is on program transformation and incrementalcomputation, with applications in database, security, distributed comput-ing, and verification. He has published over 6 publications in journals andconferences.

38

RESEARCH POSTERS

Page 39: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

SpaceSafari – Bringing Arcade Game Excitementto Learning About the Solar System

Lori Scarlatos1 and Tony Scarlatos2

1 Technology and Society, Stony Brook University Stony Brook, NY [email protected]

2 Computer Science Department, Stony Brook University Stony Brook, NY [email protected]

Recent research has demonstrated that games can greatlyenhance education, by keeping students challenged and engagedas they take on the roles such as scientist, historian, and engineer.Yet the use of games in the classroom is limited. One reason is thatlearning games do not necessarily teach the learning standardsthat the instructor is required to cover, and cannot be easily adjust-ed to meet the needs of individual students in a particular class.We address this problem by creating educational games bundledwith an administrative application that enables teachers to maketheir own games, tailored for their own students.

SpaceSafari is an interactive multimedia learning game that sendsstudents on an interplanetary treasure hunt that is created by theirteacher. The game features a real-time 3D display of the solar sys-tem that the user navigates by using an accelerometer device (sim-ilar to a Wii controller) that communicates with the computer viaBluetooth.

The software has two main components: an administrative compo-nent, and the game itself. Both are connected by a database.

The administrative component allows teachers to add students toa roster, to check their progress, and to create new missions. Themissions take the form of a quest, such as, “Fly to the planet withthe heaviest atmosphere”. Student performance is measured by how efficiently they complete their missions (in terms of dis-tance traveled).

The game component has two levels – a training level that is a tourof the planets, and the mission level where they “fly” their avatarthrough the asteroid belt and attempt to complete their missionsbefore running out of rocket fuel. The 3D display has two modes,a normal viewing mode and an enhanced anaglyph viewing modefor red/blue glasses. The avatar is controlled either by the keyboardor by the accelerometer. The relative position of the planets isaccurate and updated continually.

The software is web-based, but requires a broadband connectionto play the game. Developed in compliance with NY State learningstandards for Elementary Earth Science, the software will be field-tested in local schools through Eastern Suffolk BOCES in the 2008-2009 academic year, part of a series of educational software pilotsSBU has been conducting with BOCES over several years.

Lori Scarlatos is associate professor of educational technology in thedepartment of Technology & Society, and affiliated with Computer Science.Her research interests include computer-human interaction, computergraphics, and multimedia educational games. She has been PI on five NSFprojects, including a CAREER grant awarded in 2000. She also has indus-try experience, as a technical specialist in Grumman Data Systems’ R&Ddepartment and as a vice president at Lecht Sciences, where she oversawthe development of animated games. Lori is dedicated to improving under-graduate education, having supervised teams of undergraduate women onthree CREW (Collaborative Research Experience for Women) undergraduateprojects, and collaborations between undergraduate computer science andgraduate education students to produce educational applications. She hasalso conducted science research workshops for Erasmus STAR high schoolstudents. As PI of Brooklyn College's BPC program, she ran a summer insti-tute where 100% of the participants were either women or under-represent-ed minorities.

Tony Scarlatos is Director of the Computer Science Multimedia Lab at SBU,and has been a lecturer in the department since 1995. He was an art direc-tor for 12 years before teaching at Stony Brook, for companies such asDoubleday and Cablevision. Tony's work received numerous nationalawards, such as the Federal Design Achievement Award, and was publishedin American Artist magazine. Tony has been a developer of computer-basedtraining software for over 15 years. His work has been supported by a num-ber of grants, including a NY State Department of Education LearningTechnology grant, and a Department of Commerce Telecommunications andInformation Infrastructure Assistance Program (TIIAP) grant. Tony alsoworked with Lori Scarlatos on an NSF Combined Research CurriculumDevelopment (CRCD) grant, the focus of which has been innovative inter-faces in educational games. Prototypes produced by this project are beingtested by elementary school children through BOCES, by deaf students atthe Cleary School for the Deaf, and by teachers in Brooklyn College’s Schoolof Education. He is dedicated to undergraduate research, having supervisednumerous senior projects that were presented at URECA, and led to publi-cations. One project developed under the CRCD grant, SmartStep, is cur-rently under license to a commercial toy company.

39

RESEARCH POSTERS

Page 40: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Security Policy Enforcement in Enterprise Systems

Puneet Gupta and Scott D. Stoller

Computer Science DepartmentStony Brook Universitypgupta,[email protected]

In enterprise-scale systems, high-level security policies specifiedby managers may be mapped by technical staff to configurationsof a variety of security mechanisms, such as firewalls, VPNs,authentication and directory services, host login permissions, filepermissions, DBMS access control, and application-specific secu-rity mechanisms. Ensuring that the policies have been mappedcorrectly is a challenging problem. We are developing a frameworkin which system designers and administrators can express high-level security policies, low-level system architecture and configura-tion of all security mechanisms, and the relationship betweenthem. The framework supports verification that the architectureand configuration together enforce the high-level policies. Thealgorithm identifies paths along which requests from different cat-egories of users can flow and checks that the policy collectivelyenforced by the components on each path is at least as strict asthe high-level policy for requests from those users. The frameworkalso allows precise, fine-grained analysis of the Trusted ComputingBase (TCB). The TCB analysis algorithm identifies which parts ofthe system must be trusted for enforcement of each part of thehigh-level policy. As case studies, we are developing and analyz-ing sample security policies, system architectures, and securityconfigurations for parts of a university and a financial institution.

Puneet Gupta is a Ph.D. student in the Computer Science Department atStony Brook University, working on computer security. He received hisBacholer's degree in Computer Science from Indian Institute of Technologyat Delhi, India, where he received significant exposure to a wide range ofresearch areas, including networking, sensor networks, VLSI, and binaryinstrumentation.

Scott D. Stoller is an Associate Professor in the Computer ScienceDepartment at Stony Brook University. His primary research interests areanalysis, optimization, testing, and verification of software, with emphaseson concurrency, security, and incremental computation. He received hisBachelor's degree in Physics, summa cum laude, from Princeton Universityin 1990 and his Ph.D. degree in Computer Science from Cornell Universityin 1997. He received an NSF CAREER Award in 1999, an ONR YoungInvestigator Award in 2002, and (with two of his students) the 2005 HaifaVerification Conference Best Paper Award. He is a member of the team thatwon the NASA Turning Goals Into Reality Award for Engineering Innovationin 2003. He is the author or co-author of more than 60 refereed researchpublications.

Reputation and Trust Management in AgentBased Ad Hoc Networks Using Auctions

Pushpita Chatterjee, S.K. Ghosh, Indranil SenguptaSchool of Information TechnologyIndian Institute of TechnologyKharagpur, [email protected]

Ad-hoc networks are primarily meant for use in military, emergencyand relief scenarios where, in spite of nonexistent infrastructure, anetwork can be established. Simulating cooperation among the self-ish nodes of an ad hoc network has been an active research area forseveral years. One possibility is to provide incentive by using a rep-utation system, where a node monitors the neighbor to make surethat the neighbor forwards others’ traffic. If not, it is considered asuncooperative. Another possibility is credit exchange schemes,where nodes receive a payment every time they forward a packetand this credit can later be used by these nodes to encourage oth-ers to cooperate. In this paper we are going to propose a reactiverouting protocol a trust oriented auction based packet forwardingmodel, which uses a hybrid approach of Packet Purse Model andPacket Trade Model, as basic credit exchange mechanism for stim-ulating cooperation among the nodes. We are using two types ofauction, one is Dutch and another is Procurement. Trust is meas-ured by the past behavior of each node using a trust rating algorithmrunning on some metrics towards proper functionality of the net-work. The protocol works in two steps. In the Route Discovery phasewe are trying to find out a path with minimum number of non-trust-ed nodes. If the intermediate node finds the sender node is enoughtrustworthy that the intermediate can receive its packet with the fixedper hop charge defined by the protocol. Otherwise it will bid for high-er cost for receiving and forwarding a packet from the Source andinforms by sending a beacon. Each node replicates as an agent toall its one hop neighbors, so that the intermediate nodes need not towait for data traffic for deciding the bid. After collecting informationfrom all of its one hop neighbor the source node will run aProcurement auction and choose the lowest bidder to sell the pack-et. At the Packet Forwarding phase, forwarding a packet each nodeinforms the bid price to Central bank, it stores the information. Afterreceiving, Destination informs the successful transmission to thecentral bank and it computes the total cost of the packet informedto it and compares with the list sent by the destination node as wellas their forwarding cost. Then transfers the credit to all intermediatenodes and the total amount is deducted from source and destinationnode equally. To the best of our knowledge this is the first endeavorto incorporate trust rating as a metric of selecting bid price (auction)for forwarding a packet. Our proposed scheme provides incentive forcooperative behavior of the node and the amount of incentive isdecided by the trustworthiness of a node.

Pushpita Chatterjee, M.Sc., M.Tech (Computer Science) has been with theComputer Science and Engineering Department, School of InformationTechnology at India Instsitute of Technology since 2006 as a Lecturer.

40

RESEARCH POSTERS

Page 41: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

High-resolution Optical Imaging Diagnosis of Biological Tissue Morphology, Physiology and Functions

Z. J. Yuan, H. G. Ren, Z. C. Luo, Weiliam Chen, S. Enaiv, C. W. Du, & Y. T. Pan

Stony Brook University, Stony Brook, NY 11794

Optical coherence tomography (OCT) is an enabling high-resolu-tion optical imaging modality that has been widely explored fornoninvasive imaging of varies biological tissues. We here summa-rize the technological advances in OCT and the biomedical appli-cations in our lab. An important application of OCT is for epithelialcancer diagnosis. We pioneered endoscopic OCT (EOCT) withadvanced MEMS-mirror technology, and have optimized the tech-nique to be well suited for in vivo clinical diagnosis. Results haveshown that MEMS-based EOCT enables 2D cross-sectional imag-ing at ~10um resolution to well delineate bladder morphology anddetection of bladder cancers such as carcinoma in situ. A recentdouble-blind clinical study concluded enhanced bladder cancerdiagnosis with a sensitivity of 92% and specificity of 84%.Furthermore, to overcome limitation of EOCT for staging large blad-der cancer, we proposed to combine OCT with high-frequencyultrasound (HFUS) to enhance the diagnosis and staging of blad-der tumors and to guide tumor resections. In addition to cancerdiagnosis, we applied OCT for noninvasive in vivo assessment ofbiomaterial scaffold assisted wound healing. Both porcine burnmodel and murine transcutaneous wound model with variousbioactive implants were used, thus allowing longitudinal OCT scansto track the morphological changes during wound recovery. Then,the OCT results were correlated with corresponding histologicalevaluations to evaluate the efficacy. Results revealed that OCT wasable to image critical morphological changes during the healingprocess, e.g., re-epithelialization, granulation formation, inflamma-tion, early infection, and scaffold transformation. These uniquetechnical capabilities allowed us to monitor the assisted woundhealing in diabetic skin and the difference.

In addition to morphological imaging, we have explored the feasi-bility of optical imaging for diagnosis and monitoring of biologicaltissue physiology and functions. An important example was tostudy the mechanism behind geriatric incontinence by character-izing the dynamic morphophyiology of bladder via time-lapse OCTimaging of the motion of natural landmarks (e.g., surface folds orblood vessels) in the bladder wall induced by bladder contractilebehaviors. Results under different physiological and pharmacolog-ical challenges, e.g., temperature, electrical stimulation and drugadministration evidenced the ability OCT to detect and analyzebladder contractile wave changes, showing great potential to non-invsively diagnose bladder physiology and dysfunctions.

Our recent work includes exploiting tissue functional imaging suchas Doppler OCT to measure blood flow changes and the effects onbrain function and bladder function. We proposed a dual-imagingmodality combining DOCT and laser speckle contrast imaging(LSCI) to quantify rat cortex blood flow changes induced bycocaine, thus allowing quantitative analysis of the spatiotemporalhemodynamics crucial to understanding of neural process duringbrain activations. Inspired by the exciting results, we are develop-ing time-elapse OCT (TL-uOCT) to explore subcellular imagingcapability and combine it with other imaging modalities such asfluorescence confocal and 2 photon micro endoscopy for multi-modality imaging diagnosis of biological tissue morphology, physi-ology, and functions.

Weiliam Chen’s research is in the application of biocompatible/biodegrad-able natural carbohydrates to address various clinically relevant biomedicalproblems including wound repair, cerebral aneurysm, arteriovenous malfor-mation, abdominal aortic aneurysm endoleak and controlled delivery oftherapeutic agents (small molecules, proteins and DNA) through interdisci-plinary research efforts. Localized application provides the maximum effi-cacies of therapeutic agents while minimizing their undesirable effects.Other efforts are targeted towards enhancing the biological responses ofboth polymeric and metallic medical devices.

41

RESEARCH POSTERS

Page 42: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

On the Threat to SIP-based Applications and Corresponding Counteract Mechanisms

Jeatek Ryu, Jong Wook Kim, Byeong-hee Roh, Man Pyo Hong

Graduate School of Information and Communications, Ajou UniversitySan 5 Wonchon-Dong Youngtong-Gu, Suwon, 443-749, Korearicman, bhroh, [email protected]

Recently, SIP(Session Initiation Protocol) is paid to attention as asession control protocol of a various of multimedia communica-tions over IP and is proposed Internet Engineering TaskForce(IETF) in 2002. SIP is an application-layer signaling protocolfor creating, modifying, and terminating multimedia sessionsamong one or more participants. The structure of a SIP messageis similar to a HTTP message, and it can be either a request or anacknowledgement to a corresponding request. The message con-sists of the header fields and a message body but the body isoptional.

SIP is utilized for providing more advance services like audio con-ference, personalized call transfers, instant messaging etc. It canbe used in various fields and have already been being used in VoIP,IMS etc. SIP is expected to be used for establishing multimediasessions in both wired and wireless networks in the NextGeneration Networks(NGN) era.

However, since SIP-based applications run over the Internet, itmakes the services vulnerable not only to well known Internetattack like Distributed Denial of services(DDoS) but also to moresophisticated attacks that try to exploit vulnerabilities of the signal-ing protocol. For example, a malicious user may generate a SIP sig-naling message for illegally terminating an established connectionor canceling a session in progress, hence it is important to detectand protect a signaling attack for achieving a reliability, availability,and security in the SIP-based applications.

In this paper, we deal with security threats related to SIP-basedapplications and corresponding counteract mechanisms againstsignaling attacks like denial of service(DoS) attack, message spoof-ing attack etc. The proposed counteract mechanisms will improvesecurity of the SIP based Applications like VoIP, IMS etc

Fig. 1. The corresponding counteract mechanisms on the threatsto SIP-based applications

Jeatek Ryu, received M.S. degree in Computer Engineering from AjouUniversity, Suwon, Korea. He is currently a Ph.D. student at GraduateSchool of Information and Communication, Ajou University.

Jong Wook Kim, is a Ph.D. student at Graduate School of Information andCommunication, Ajou University.

Byeong-hee Roh, received the B.S. degree in electronics engineering fromHanyang Univeristy, Seoul, Korea, in 1987, and the M.S. and Ph.D.degrees from Korea Advanced Institute of Science and Technology (KAIST),Taejon, Korea, in 1989 and 1998, respectively. From 1989 to 1994, hewas with Telecommunication Networks Laboratory, Korea Telecom, as aresearcher. From February 1998 to March 2000, he worked with SamsungElectronics Co., Ltd., Korea. Since March 2000, he joined with theGraduate School of Information and Communication, Ajou university,Suwon, Korea. His research interests include the areas of design, analysisand security for mobile multimedia communication networks, military tac-tical networks, RFID and ubiquitous sensor networks.

Manpyo Hong is a professor in Graduate School of Information andCommunication in Ajou University, Suwon, Korea. He received the B.S,M.S., and Ph.D. in Computer Science and Statistics from Seoul NationalUniversity, Seoul, Korea, in 1981, 1983, and 1991 respectively. Hisresearch interests include security and privacy for ubiquitous computingand networks. He also has interests in wireless sensor network and itsadverse effects.

42

RESEARCH POSTERS

Page 43: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Secure Authentication Scheme based on DigitalSignatures and Secure Key Storage

Sang Guun Yoo, Keun Young Park, Tae Jun Kim, and Juho KimSogang UniversityShinsoo-dong, Mapo-gu R 906A, Seoul, 121-742, [email protected]

Keywords— Authentication, Brute force attack, Dictionary attack,Trusted Platform Module, Digital Signature

This paper presents a secure authentication scheme based on dig-ital signatures, and illustrates implementations using TrustedPlatform Module (TPM). This scheme includes User Registrationand User Authentication Processes:

A. User Registration

We assume that communication is secure between user registra-tion requester (URR) and secure authentication server (SAS). Theith request will have a username UNi, password PWi, salt Salti, anddigital signature Sigi. URR sends UNi and PWi to SAS. SAS verifiesthat UNi is not registered in the user information repository; if theuser exists an error is notified to URR, otherwise random Salti isgenerated. Then, the concatenation of Salti and PWi is signedusing the private key PRK of SAS, generating the signature Sigi.Finally, UNi, Salti and Sigi are stored in the user information repos-itory.

B. User Authentication

UAR (user authentication requester) sends a random number r1ito SAS (secure authentication server). SAS generates another ran-dom number r2i and sends it accompanied with EPRK(r1i)(encrypted r1i with private key PRK). UAR compares the r1i withDPUK(EPRK(r1i)) (decrypted value of EPRK(r1i)); if they do notmatch, the authentication process finishes unsuccessfully. Withsuccessful matching, UAR concatenates r2i, UNi and PWi, thenencrypts it with the public key (PUK), and sends it to SAS. SASdecrypts the string using PRK and gets r2i, UNi and PWi. SAScompares r2i with the decrypted r2i; if the comparison results cor-rect performs the next step, otherwise the authentication processfinishes unsuccessfully. Then, SAS verifies the existence of UNi, ifUNi is not founded in repository an error message is returned, oth-erwise Salti correspond to UNi is read. Finally, the read Salti is con-catenated to PWi for signing process and the resultant signature iscompared with the one stored in the repository. If they match, theauthentication process finishes successfully, otherwise an errormessage is sent to UAR.

In our scheme, signatures of passwords are stored instead of sim-ple hashes, creating another layer of security. The solution forsecure key storage was founded in crypto chips like AEGIS[1], IBMCryptographic Coprocessor and TPM[2],[3],[4]. This approachprovides a solution for brute force, dictionary attacks, replayattacks, server spoofing and physical access attacks. Scheme’simplementation is illustrated using TPM, and a middleware com-

prised for PAM (pluggable authentication module) module and aTrust Agent protected by Trusted Boot[5]. Time overhead testswere performed in hardware TPM and TPM Emulator.

TABLE IOVERHEAD ESTIMATION FOR SIMPLE AUTHENTICATION SYSTEM

(AFTER SIMULATE 1000 ITERATIONS)

Device type User registration Authentication process overhead overhead

Hardware TPM 1.2 811.29 ms 811.23 ms

TPM Emulator 22.39 ms 22.36 ms

TABLE IIOVERHEAD ESTIMATION FOR CENTRAL AUTHENTICATION SYSTEM

(AFTER SIMULATE 1000 ITERATIONS)

Device type User registration Authentication process overhead overhead

Hardware TPM 1.2 811.29 ms 2531.77 ms

TPM Emulator 22.39 ms 152.88 ms

Sang-Guun Yoo received the B.S degree from the Faculty of ComputerSystem Engineering from Army Polytechnic School, Ecuador, in 2002.From 2005 to 2007, he worked as a research member and professor inDepartment of Computer Science and Multimedia at InternationalUniversity of Ecuador. He is currently pursuing the M.S degree in theDepartment of Computer Science Engineering at Sogang University on ascholarship from the Overseas Koreans Foundation.

Keun-Young Park received the B.S degree from the Department ofComputer Science Engineering from Sogang University, Seoul, Korea, in2007. He is currently pursuing the M.S degree in the Department ofComputer Science Engineering at Sogang University. His interests includeMobile Security, Authentication, and SoC.

Tae-Jun Kim received the B.S degree from the Department of ComputerScience Engineering from Sogang University, Seoul, Korea, in 2008. He iscurrently pursuing the M.S degree in the Department of Computer ScienceEngineering at Sogang University. His interests include Mobile Security andForensics.

Juho Kim received Ph.D degree in 1995 at University of Minnesota. Heworked at Cadence Design System in San Jose California as a senior mem-ber of technical staff. In 1997 he joined Sogang University, Seoul, Korea.He is currently a professor and his research area includes VLSI CAD andcomputer security.

43

RESEARCH POSTERS

Page 44: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

End-to-end QoS Architecture for UbiquitousMilitary Tactical Networks in AJOU-TNRC

Hye-lim Koo, Byeong-hee Roh, and Jae Hyun Kim

Graduate School of Information and Communications, Ajou UniversitySan 5 Wonchon-Dong Youngtong-Gu, Suwon, 443-749, Korea

milkystar, bhroh, [email protected]

Recently, military tactical networks are evolving toward supportingNCW (Network Centric Warfare) paradigm. AJOU-TNRC (TacticalNetwork Research Center at Ajou University, http://tnrc.ajou.ac.kr)has been established since 2006 to research and develop IT-basedtechnologies for military tactical network in NCW paradigm. TheAJOU-TNRC is supported by Korean government. Professors, stu-dents and researchers from 7 universities, several companies indefense industry, and military organizations are joining in AJOU-TNRC.

End-to-end QoS (Quality of Services) is one of the key researchissues that are studying in AJOU-TNRC, and is essential forexchanging mission critical information in military tactical networksfor NCW. In combat situation, for example, the exact and rapiddelivery of mission critical information from a source (e.g. a com-mand headquarter) to a destination/destinations (e.g. weapon, sol-dier, and so on) may decide the victory or failure of the combat.However, since military networks consist of heterogeneous net-works with different administrative domains controlled by the Army,Air force, and Navy, even by different countries, at different layers,providing end-to-end QoS can not be easily achieved by using con-ventional QoS schemes applied in commercial domains.

Here, we deal with some issues on the end-to-end QoS architec-ture for military tactical network. First, we will give problems andrequirements for the networks. And, some existing architectures toprovide end-to-end QoS for military networks will be illustrated.Then, we will discuss about our proposed architecture to guaran-tee the delivery of mission critical information through several het-erogeneous networks including mobile soldier (sensor) networkswhile satisfying its QoS requirement.

Hye-lim Koo, received the B.S. degree in computer science from Ajou uni-versity in 2008, Korea, and is working toward M.S. and Ph.D. degrees inGraduate School of Information and Communication, Ajou University,Korea.

Byeong-hee Roh, received the B.S. degree in electronics engineering fromHanyang Univeristy, Seoul, Korea, in 1987, and the M.S. and Ph.D.degrees from Korea Advanced Institute of Science and Technology (KAIST),Taejon, Korea, in 1989 and 1998, respectively. From 1989 to 1994, hewas with Telecommunication Networks Laboratory, Korea Telecom, as aresearcher. From February 1998 to March 2000, he worked with SamsungElectronics Co., Ltd., Korea. Since March 2000, he joined with theGraduate School of Information and Communication, Ajou university,Suwon, Korea. His research interests include the areas of design, analysisand security for multimedia communication networks, ubiquitous sensornetworks and RFID networks.

Jae Hyun Kim received the B.Sc, M.Sc., and Ph.D. degrees, all in comput-er science and engineering, from Hanyang University, Ansan, Korea, in1991, 1993, and 1996,respectively. In 1996, he was with theCommunication Research Laboratory, Tokyo, Japan, as a Visiting Scholar.From April 1997 to October 1998, he was a Post-Doctoral Fellow at theDepartment of Electrical Engineering, University of California, Los Angeles.From November 1998 to February 2003, he worked as a member of tech-nical staff in Performance Modeling and QoS management Department,Bell Laboratories, Lucent Technologies, Holmdel, NJ, USA. He has beenwith the Department of Electrical Engineering, Ajou University, Suwon,Korea, as an Assistant Professor since 2003. His research interests include QoS issues and cross layer optimization for multimedia wirelesscommunication.

44

RESEARCH POSTERS

Page 45: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Dice Mix: a New Mix Reordering

Jonguk Kim Manpyo Hong

Graduate School of Information and CommunicationsAjou University San 5 Woncheon-dong Youngtong-gu, Suwon, 443-749, Korea kju, [email protected]

As the Internet grows, people are getting more and more depend-ing upon it for a daily life, such as chatting with friends, buyingsomething, and banking online. Online activities are under surveil-lance by eavesdropping or traffic analysis, which makes peopleaware of the need of anonymous communications. Since D.Chaum proposed a scheme for untraceable electronic mail, mixhas been the mainstream of modern anonymity systems[. Becauseanonymity is one of the most effective means of privacy protection,mix has played an important role in protecting privacy. Mix pro-vides the unlinkability which means that a certain adversary can-not know who sent a message and whom will receive it. Mixreceives, decrypts, and relays the message. It, however, does notrelay the message promptly, keeps some amount of messages fora while. Then it lets messages out with random order (it is calledflushing). This hinders the traffic analysis of an adversary. Thepoint of time of flushing is called round. Mix collects messages untilthe condition is satisfied. The condition to flush is called reorderingand there already exist many reordering schemes. In this paper, wewill introduce a new reordering scheme, Dice mix.

We assume that adversaries do not have an interest of the contentsof the message and adversaries are active attacker. Active attack-ers are those who can modify network traffic. Blendingattack(a.k.a. n-1 attack) is the most powerful attack for breakingunlinkability. The target message is the message of adversary’sinterest. If the path of the target message is recognized by adver-sary, attack is successful. Blending attack easily breaks simplemixes which do not use the pool. They flush all messages whenev-er the condition is satisfied.

Pool mixes do not flush all messages even if the condition is satis-fied. When flushing, pool mix saves some messages and fires therest. It is quite a simple but powerful. Blending attack is an exactand certain attack for simple mixes. However, it is not the case ofpool mixes. Although the mix is being under attack, the target mes-sage might not leave the mix. Furthermore, good messages whichhave been in pool can leave at this round. In adversary’s point ofview it is difficult to distinguish these good messages from the tar-get message. Therefore pool mixes are robuster than simple mixes.Whereas pool mixes are relatively robust against blending attack,they have a significant problem, starvation. The probability ofremaining in pool is independent at every round. It is a positive foranonymity because randomness hinders an adversary to analyzetraffic. The chance of staying long times at pool is extremely lowbut it is possible. Hence, it is almost impossible to expect the delayof the message in case of using pool mixes.

Dice mix puts up resistance to blending attack without using pool.it is deterministic whereas pool mixes are stochastic. That meansour proposed scheme is able to not only expect the maximumdelay but also endure the blending attack effectively.

Jonguk Kim is a research engineer with doctorate in Information andCommunication Technology in progress, in Computer Science at AjouUniversity, S. Korea. His current research interests include security and pri-vacy in ubiquitous computing and networks.

Manpyo Hong is a professor in Graduate School of Information andCommunication in Ajou University, Suwon, Korea. He received the B.S,M.S., and Ph.D. in Computer Science and Statistics from Seoul NationalUniversity, Seoul, Korea, in 1981, 1983, and 1991 respectively. Hisresearch interest includes security and privacy in ubiquitous computing andnetworks. He also has interests in wireless sensor network and its adverse effects.

45

RESEARCH POSTERS

Page 46: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Self-Powered Wireless Health Monitoring System

Ajay Singh1, Jaewook Yu1, Woohyung Chun2,Goldie Nejat1 and Wendy Tang2

1 Autonomous Systems Laboratory Department of Mechanical Engineering Stony Brook University Stony Brook, NY, 11794-2300 [email protected]

2 Department of Electrical and Computer Engineering Stony Brook University Stony Brook, NY, [email protected]

The quality of patient-centered care in health care facilities and inemergency response scenarios is being threatened due to the fol-lowing reasons: (i) The world’s elderly population is increasing at adramatic rate, in particular in the U.S. alone there are more than34.8 million people over the age of 65 and it is anticipated that thisnumber will more than double to 70 million in only 30 years [1], (ii)in the past decades, health care organizations in the U.S. havebeen encountering nursing shortages, where demands for nursesto fill job openings are substantially higher than the available sup-ply of qualified nurses, (iii) there has been a number of large scalenatural disasters leading to large scale casualties, and (iv) the over-all changes in public expectations of the public and emergencyresponse health systems. Despite the $1.6 trillion budget on healthcare, serious concerns still exist about preventable errors, unevenhealth care quality, and poor communication among doctors, hos-pitals, and many other healthcare providers [1]. To meet this chal-lenge, healthcare organizations need to adopt the use of advancedinformation technologies in their patient care process. In particular,the development of innovative wireless sensor networks can helpminimize the aforementioned threat, and provide measurableimprovements in patient health outcomes.

The goal of this project is to develop an ad-hoc system architecturefor a real-time self-powered wireless network sensory system uti-lized in: (i) overall health monitoring of a patient, and (ii) environ-ment monitoring, for a variety of applications including hospitals,long-term care facilities, patient’s home and emergencyresponse/disaster scenarios. In particular, we are proposing a sys-tem management approach in which monitoring will be requiredfor large scale scenarios involving several tens or hundreds of peo-ple in each or a combination of the aforementioned settings. Thelong term plan is to integrate this architecture into a telemedicinesystem to inform medical personal when life-threatening changesare occurring and/or feedback so that a patient can be remotelysupervised during recovery. The novelty of the proposed architec-ture is: (i) in the network scheme to support a large number ofusers with the integration and management of multiple and varioustypes of devices in the network, and (ii) in the proposed energyharvesting scheme using MEMS-based generators, in order for

continuous monitoring to take place.

For proof-of-concept of our proposed system, we have designed aninitial prototype for the sensory system of the wearable health mon-itoring devices in the architecture. The sensory system consists ofa wireless sensor node and a set of non-invasive physiological sen-sors. To address the significant issue of energy depletion for thedevices, which can lead to critical interruptions in monitoring, wehave proposed a flexible unique vibration-based energy harvestingscheme to support our architecture. Furthermore, for wirelesscommunications, we are investigating the use of a novel MAC(Medium Access Control) protocol, the CPR (Cayley-PseudoRandom) protocol to support simultaneous transmission of largenumber of users.

Ajay Singh graduated with an M.S. degree from SUNY at Stony Brook inMay 2008. During his graduate career, he worked in the AutonomousSystems Laboratory in the Department of Mechanical Engineering in thearea of intelligent energy harvesting for wearable devices.

Jaewook Yu is a PhD candidate in the Department of Electrical andComputer Engineering at Stony Brook University. He received his BEng andMEng in Electrical Engineering from Myungji University, Korea in 1997 and1999, respectively.

Woohyung Chun received his B.S. and M.S. in Electrical Engineering fromHongik University, Seoul, Korea, in 1999. From 1999 to 2004, he workedas a research engineer in Samsung Electronics, Corecess, and Comtec sys-tem in Korea. He is currently working toward the Ph.D. degree in theDepartment of Electrical and Computer Engineering at Stony BrookUniversity.

Goldie Nejat is an Assistant Professor in the Department of MechanicalEngineering at SUNY at Stony Brook. She is the director of the AutonomousSystems Laboratory. Her research interests include the design, develop-ment and implementation of intelligent self-powered assistive devices formedical applications, search and rescue and exploration and homelandsecurity. Her research work has been published in several prestigious inter-national journals and conference proceedings. She is an active member ofIEEE, ASME and ASEE.

Wendy Tang is an Associate Professor at the Department of Electrical andComputer Engineering, Stony Brook University. She received her B.S., M.S.and Ph. D in Electrical Engineering from the University of Rochester in1986, 1988 and 1991, respectively. Her current research interests are inWireless Sensor Networks, Communication Networks and Graph TheoryApplications, and are supported by the NSF. She and her colleagues arethe recipients of two best paper awards in 1997 and 1998. She has ded-icated considerable efforts in promoting entrepreneurship in engineeringeducation and increasing women students in engineering. She was recog-nized by an IEEE Region 1 Award in 1998, an IEEE Regional Activity BoardAchievement Award in 1998 and an IEEE Third Millennium Medal Awardin 2000. In 2004, together with Dr. Serge Luryi, Dr. Tang initiated a proj-ect that promotes engineering entrepreneurship in four institutions of high-er education across Long Island. For their efforts, the IEEE Long IslandSection them the Athanasios Papoulis Education Award in 2006.

46

RESEARCH POSTERS

Page 47: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

A Glance at Quality of Service Models for MoblieAd Hoc Networks

A.Kush1, C.Jinsong,Hwang2, P.Gupta3

1 Department of Computer Science, Kurukshetra UniversityKurukshetra, [email protected]

2 Department of Computer Science, Texas State University [email protected]

3 Department of Computer Science & EngineeringIndian Institute of Technology Kanpur, [email protected]

Keywords: Mobile ad hoc networks, routing, QoS, QoS model, met-rics, RSVP, INSIGNIA

Mobile Ad hoc networking is a challenging task due to the lack ofresources in the network as well as the frequent changes in net-work topology. Although lots of research has been done on sup-porting QoS in the Internet and other networks, they are not suit-able for mobile Ad hoc networks and still QoS support for such net-works remains an open problem. In this paper, a brief overview ofcurrent QoS support for Internet and mobile Ad hoc networks hasbeen discussed. Existing models have been studied and an analy-sis has been given for better selection and future research.

Dr. Ashwani Kush has done Ph.D. in association with Indian institute oftechnology Kanpur and Department of computer science, KUK India. He isworking at present as assistant professor in university college, KUK INDIA.He is working in the field of Ad hoc networks, Mobile computing. Ashwaniis member of ACM USA , SCRA USA and CSI INDIA.

Phalguni Gupta received the Doctoral degree from Indian Institute ofTechnology Kharagpur, India in 1986. He works in the field of data struc-tures, sequential algorithms, parallel algorithms, on-line algorithms. From1983 to 1987, he was in the Image Processing and Data Product Group ofthe Space Application Center (ISRO), Ahmedabad, India and was responsi-ble for software for correcting image data received from Indian RemoteSensing Satellite. In 1987, he joined the Department of Computer Scienceand Engineering, Indian Institute of Technology Kanpur, India. Currently heis a Professor in the department. He is responsible for several projects inthe area of Image Processing, Graph Theory and Network Flow. Dr. Gupta isa member of Association of Computing Machinery (ACM).

C.Jinsong Hwang is Professor of Computer Science in Dept. Of ComputerScience ,Texas State University, USA. He received his Ph.D from LouisianaState University, Baton Rouge, Louisiana. He is at present Director of AsianContests, ACM/ICPC.

Information Sharing and Searching Applicationfor Mobile Devices

Neil Deshpande, Sushant Dewan, Atul Karmarkar, PranayPrabhakar, Sainath Parab and Dr. S.S. Sane

Department of Computer Technology, VJTI, Mumbai, India. [email protected]

Mobile phones are becoming ubiquitous as information reposito-ries with communication abilities. By design, mobile phones arealways on the move. To tap such sources, currently, technologieslike GPRS, EDGE and Bluetooth are available. This paper focuseson using Bluetooth services for information sharing. The Bluetoothmodel works as a push-based model. The application proposed,involves a model which enables the user to “pull” required infor-mation from a remote device. This model employs a searchengine, which creates an index that resides on the searched deviceitself. This index is utilized for fast retrieval of handles to docu-ments which are deemed to be relevant in the context of thereceived query. The application is able to deliver any form of datathat is independent of the execution support available to interpretthose data. At the same time, it is intelligent enough to scout forpre-defined application programs in the searching device to runthe received file(s) The application becomes relevant in light of theburgeoning need of different classes of customers to share data. Ithas the flexibility to be adapted to the needs of different focusgroups, ranging from multimedia-savvy teenagers to corporateexecutives. Moreover, since the ISM band is utilized, communica-tion takes places sans infrastructure and hence sans cost.

Sainath Parab holds a Bachelors in Information Technology from VJTI,Mumbai(India). He is currently pursuing his Masters in Computer Scienceat Arizona State University. He is at ASU to further his research onInformation Retrieval and Information Extraction.

Sushant Dewan holds a Bachelors in Information Technology from VJTI,Mumbai(India). He is currently pursuing his Masters in Computer Scienceat the University of California at Irvine. He is at UCI to further his researchon Theory of Computer Science.

Atul Karmarkar holds a Bachelors in Information Technology from VJTI,Mumbai(India). He is currently working as an Associate Software Engineerat Accenture India Development center.

Neil Deshpande holds a Bachelors in Information Technology from VJTI,Mumbai(India). He is currently working as a Trainee Developer at LehmanBrothers (India).

Pranay Prabhakar holds a Bachelors in Information Technology from VJTI,Mumbai(India). He is currently working as a Program Manager at MicrosoftIndia Development Center.

Dr. Suneeta Sane is currently Professor and Head of Computer TechnologyDepartment, VJTI, Mumbai(India). Her research interests are DBMS,Mobile Databases, Location Dependent Databases, Wireless Technology.

47

RESEARCH POSTERS

Page 48: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Meru Networks – Fulfilling the Promise of802.11n without Compromise

Jay Chu Meru [email protected]

Gartner has called Meru’s wireless LAN a leading example of 4thGeneration technology, a generation ahead of the conventionalmicro-cell architecture of nearly all other vendors. Meru’s 4thGeneration solution offers the optimal 802.11n architecture,enabling maximum performance, and minimum upgrade costfrom legacy networks. Meru’s wireless LAN solution operates onthe basis of 4 key principles: single channel spans, virtual cell, lay-ering of channel spans and wireless backhaul built into every AP.Unlike the conventional micro-cell architecture, Meru’s approachdoes not require careful channel planning to mitigate co-channelinterference between APs. APs do not operate as stand-alone wire-less Ethernet hubs; instead, they operate as a coordinated systemof antennas, maximizing parallelism in transmission while minimiz-ing co-channel interference. This means that entire an enterprisecan be covered with a single channel span. Furthermore, Meru’sVirtual Cell technology makes the entire coverage area look like asingle cell for the mobile device. A user never sees handoffs, andnever sees multiple APs. This approach eliminates the need forcareful optimization between capacity optimization and coverageplanning, and coverage holes are seamlessly plugged by simplyadding more APs. Most importantly, there is no performance orreplanning penalty to fill in a coverage hole.

Jay Chu graduated sigma cum laude from Fairleigh Dickenson Universitywith a Bachelor of Science in Computer Science. He has worked for IBM,Bay Networks and Meru Networks. He has a broad range of knowledge inmainframes, networking, switching, security and wireless. He has helpedbuild the wireless networks at Columbia University, SUNY Fashion Instituteof Technology and SUNY Farmingdale.

Deconstructing Wi-Fi

Anand Kashyap, Utpal Kumar Paul, Samir R. DasComputer Science Department, Stony Brook [email protected]

Wireless interference is the major cause of degradation of capaci-ty in Wi-Fi networks. We present an approach to estimate the inter-ference between nodes and links in a live wireless network by pas-sive monitoring of wireless traffic using a distributed set of sniffers.This method does not require any controlled experiments or injec-tion of traffic in the network; nor does it require any access to Wi-Fi APs or clients. Thus it can be used as a third party network man-agement solution. The approach requires deploying multiple snif-fers across the network to capture wireless traffic traces. Thesetraces are then analyzed to infer the interference relations betweennodes and links. We model the 802.11 MAC as a Hidden MarkovModel (HMM), and use a machine learning approach to learn thestate transition probabilities in this model using the observed trace.This in turn helps us to deduce the interference relationships. Weshow the effectiveness of this method against a simpler heuristicthat looks for instances of saturated traffic in a window of time, anda profile-based method that requires active measurements.Experimental and simulation results demonstrate that the HMM-based approach is significantly more accurate than heuristics andquite competitive with active measurements.

Anand Kashyap is a PhD Candidate in the Computer Science departmentat Stony Brook University. He is interested in Wireless Networking. He pre-viously obtained a BTech in Computer Science and Engineering from IndianInstitute of Technology, Kanpur. He worked as an R&D Engineer at TejasNetworks, Bangalore for a year and has interned at NEC Labs and MicrosoftResearch.

Utpal Kumar Paul received the B.Sc. Engg. degree in 2004, and the M. Sc.Engg. degree in 2007, both in Computer Science and Engineering, fromBangladesh University of Engineering and Technology, Dhaka. He is cur-rently a PhD student in Stony Brook University working on topics related towireless networking.

Samir R. Das is currently an associate professor in the Computer ScienceDepartment in the State University of New York at Stony Brook. He receivedhis Ph.D. in Computer Science from Georgia Institute of Technology,Atlanta, in 1994. His research interests are in wireless networking andmobile computing, focusing on protocols, systems and performance evalu-ation. He received the U.S. National Science Foundation’s CAREER awardin 1998 and the best paper award in ACM MobiSys conference in 2007.He has been a speaker in the Distinguished Visitor program of the IEEEComputer Society during 2001-03. He co-chaired the technical programcommittee for the ACM MobiHoc Symposium in 2001 and ACM MobiComConference in 2004. He currently serves or has served on the editorialboard of the IEEE/ACM Transactions on Networking, IEEE Transactions onMobile Computing, ACM/Kluwer Wireless Networks Journal and Ad HocNetworks journal. More information about him and his research can befound at http://www.cs.sunysb.edu/~samir.

48

RESEARCH POSTERS

Page 49: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

Adaptive Channelization Using Software Defined Radios

Ritesh Maheshwari, Anand Prabhu Subramanian, Jing Cao, and Samir R. DasComputer Science Department, Stony Brook [email protected]

Current generation wireless data network technology (e.g., WiFi)uses fixed bandwidth channels. While more than one channel canbe used by a link or network, this requires simple aggregation ofchannels and often complex multichannel protocols. The fixednature of channelization can lead to inefficient use of wirelessspectrum. Changing the channel bandwidth under protocol controlcan more effectively meet the SINR requirement, improve on pro-tocol overheads, and can share the available bandwidth in a moreequitable fashion. We show how adaptive channelization can beachieved using software control using Software Defined Radios.

Ritesh Maheshwari is a PhD candidate in the Computer ScienceDepartment at Stony Brook University. His obtained his B.Tech. inComputer Science and Engineering from Indian Institute of Technology,Kharagpur in 2003. His research interests are broadly in the field ofWireless Networks with special focus on MAC layer performance issues inWireless Mesh, Ad-hoc and Sensor networks.

Anand Prabhu Subramanian received the BE degree in computer scienceand engineering from Anna University, Chennai, India, in 2004 and the MSdegree in computer science from Stony Brook University in 2007. He is aPhD student in the Computer Science Department, Stony Brook University,New York. His research interests include wireless networks, systems, andalgorithms. His current research focuses on improving capacity and connec-tivity in Wi-Fi based ubiquitous wireless access networks. More informationabout his research can be found at http://www.cs.sunysb.edu/~anandps. Hereceived the best paper award in ACM MobiSys Conference in 2007.

Jing Cao received the BS degree in computer science and technology fromBeihang University in 2004. He is currently a PhD student in the comput-er school of Beihang University, research member at State Key Laboratoryof Virtual Reality Technology and Systems, and a visiting scholar in theComputer Science Department, Stony Brook University. His research inter-ests include wireless networks, systems, and algorithms. His current workfocuses on ad hoc networking, TDMA over Wi-Fi, and mesh network.

Samir R. Das is currently an associate professor in the Computer ScienceDepartment in the State University of New York at Stony Brook. He receivedhis Ph.D. in Computer Science from Georgia Institute of Technology,Atlanta, in 1994. His research interests are in wireless networking andmobile computing, focusing on protocols, systems and performance evalu-ation. He received the U.S. National Science Foundation’s CAREER awardin 1998 and the best paper award in ACM MobiSys conference in 2007.He has been a speaker in the Distinguished Visitor program of the IEEEComputer Society during 2001-03. He co-chaired the technical programcommittee for the ACM MobiHoc Symposium in 2001 and ACM MobiComConference in 2004. He currently serves or has served on the editorialboard of the IEEE/ACM Transactions on Networking, IEEE Transactions onMobile Computing, ACM/Kluwer Wireless Networks Journal and Ad HocNetworks journal. More information about him and his research can befound at http://www.cs.sunysb.edu/~samir.

49

RESEARCH POSTERS

Page 50: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

50

RESEARCH POSTERS

Accessing Urban WiFi Networks fromMoving Vehicles

Pralhad Deshpande, Anand Kashyap, Chul Sung, Samir R. DasComputer Science Department, Stony Brook [email protected]

Recently, the “connected car” concept is gaining ground wherethe car is a node in a wireless network, enabling many applica-tions, such as safety, infotainment and various forms of monitoring.However, if high bandwidth data transfer is desired from a car – forexample, downloads from the Internet, cellular data networks arethe only available choice at this time. But cellular data is expensive.It is also unclear whether the cellular data networks will have ade-quate bandwidth if all cars are connected this way. To address thebandwidth challenge, we are pursuing technologies to access theWiFi access points (AP) in urban areas from a moving car. TheseAPs could be in public hotspots, metro WiFi networks, or even inpeople’s homes subscribed to a community network such as FON.No new deployment is needed. The idea is to take advantage of thealready existing high bandwidth WiFi connections in dense urbanareas without paying any spectrum cost. Our current research inthis space is to investigate predictive methods to improve handoffs.This includes use of “war-driving” to collect signal strength dataand using this collected information to design new handoff strate-gies. We are also exploring use of pre-fetching at APs to improvedownload speeds.

Pralhad Deshpande is a PhD student in the Computer Science Departmentat Stony Brook University. He has obtained his B.E. in Computer Scienceand Engineering from Goa University in 2005 and his M.S. in ComputerScience from Stony Brook University in 2008. He has recently been award-ed the scholarship under the Goa Scholarship scheme for academic excel-lence.

Anand Kashyap is a PhD Candidate in the Computer Science departmentat Stony Brook University. He is interested in Wireless Networking. He pre-viously obtained a BTech in Computer Science and Engineering from IndianInstitute of Technology, Kanpur. He worked as an R&D Engineer at TejasNetworks, Bangalore for a year and has interned at NEC Labs and MicrosoftResearch.

Chul Sung is pursuing Masters degree in Computer Science at Stony BrookUniversity. He works with Prof. Samir Das in the WINGS Lab. As an under-grad, he attended Yonsei University in Seoul, South Korea and studiedComputer Science. He had worked as an R&D Engineer at SystemBase inSeoul, South Korea for three years, and he moved to TechTrex Inc. inOntario, Canada in 2005. He worked as a Junior Research Assistant at LGElectronics in Seoul, South Korea from Dec, 2005 to Aug, 2007.

Samir R. Das is currently an associate professor in the Computer ScienceDepartment in the State University of New York at Stony Brook. He receivedhis Ph.D. in Computer Science from Georgia Institute of Technology,Atlanta, in 1994. His research interests are in wireless networking andmobile computing, focusing on protocols, systems and performance evalu-ation. He received the U.S. National Science Foundation’s CAREER awardin 1998 and the best paper award in ACM MobiSys conference in 2007.He has been a speaker in the Distinguished Visitor program of the IEEEComputer Society during 2001-03. He co-chaired the technical programcommittee for the ACM MobiHoc Symposium in 2001 and ACM MobiComConference in 2004. He currently serves or has served on the editorialboard of the IEEE/ACM Transactions on Networking, IEEE Transactions onMobile Computing, ACM/Kluwer Wireless Networks Journal and Ad HocNetworks journal. More information about him and his research can befound at http://www.cs.sunysb.edu/~samir.

Page 51: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

NOTES

51

Page 52: Center of Excellence in Wireless and Information Technology · 2018-09-09 · IBM T.J. Watson Research Center, Hawthorne, NY 10532 {cpwright,nahum}@us.ibm.com Voice-over-IP (VoIP)

www.cewit.org

CEWIT INTERNATIONAL CONFERENCE 2008October 16, 2008 • Charles B. Wang Center • Stony Brook University

Center Director:

Dr. Satya Sharma

Conference Chairs:

Dr. Satya Sharma and Dr. Jacob Sharony

Program Chair:

Dr. Jacob Sharony

For additional information:

CEWIT Stony Brook University

Research & Technology Park Stony Brook, NY 11794

www.cewit.org