CTS Events
SEMINAR
November 14, 2012

Dr. Nebiyou Tilahun, UPP, presents a seminar entitled "An agent based model of origin destination estimation (ADOBE)" Wednesday, November 14th at 4:00 pm in Rm 1127 SEO

read more...

SEMINAR
November 7, 2012

Mr. Thomas Murtha, CMAP, will address the CTS-IGERT community at 4:00 p.m. in Room 1127 SEO.

read more...

SEMINAR
October 24, 2012

Please join us in welcoming Dr. Bo Zou, CME, on Wednesday, October 24th, Room 1127 SEO, 4:00 p.m.

read more...

CTS Happenings
September 25, 2012

Award Received by Joshua Auld, CTS-IGERT alumnus.

read more...

April 20, 2012

Congratulations to James Biagioni, CTS Fellow and CS PhD candidate, winner of the Dean's Scholar award.

read more...

January 2, 2012

James Biagioni, CTS Fellow, receives "Best Presentation Award" at SenSys2011

read more...

July 30, 2010

Dr. Ouri Wolfson, Dr. Phillip Yu, and Leon Stenneth, CS student and CTS Associate, recently had a paper accepted to the 6th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010).

read more...

April 9, 2009

The CTS-IGERT weekly seminar will take place on Thursday, April 9th at 2:00 pm in SEO 1000. We are honored to have Katya Kisyova present, "Applied Access Control For Vehicular Networks". All Welcome.

Download: Applied Access Control For Vehicular Networks



Abstract: Vehicular ad-hoc networks are built from both mobile and stationary Devices that collaborate to provide its members with a set of services. Vehicular networks main objectives are to provide its members with traffic information, real time route planning tools and collision avoidance warning systems. Major challenge in developing an access control mechanism for vehicular networks is their dynamic nature: members are not known in advance, they can join or leave at any point and their location could change rapidly due to high mobility. In addition, the lack of a central control authority makes it challenging to enforce access control policies. My work focuses on identifying access control models and frameworks that conform to VANETs characteristics and identifying flexible, efficient methods for implementing the access control framework.