the CoP protocol and takes into account context in-
formation sensed through the environment. In fact,
the devices representing the tree nodes are chosen
by considering their physical location, available en-
ergy, computational resources and expected mobility
rate. Once the tree overlay network is built, the pub-
lish/subscribe system can act as in the case of the typi-
cal structured environment. This allows to apply such
an approach to any publish/subscribe system that re-
lies on a tree overlay network. It is of main interest
to study both the theoretical feasibility and the effec-
tiveness of our proposal. Moreover, our methodol-
ogy might be also applied to other distributed systems
rather than just the publish/subscribe ones (e.g., peer-
to-peer) and to build other topology overlay networks.
REFERENCES
Capkun, S., Cagalj, M., and Srivastava, M. (2006). Se-
cure localization with hidden and mobile base sta-
tions. In Proc. of the 25
th
Annual Joint Conf. of the
IEEE Computer and Communications Societies (IN-
FOCOM). IEEE Computer Society.
Caporuscio, M., Carzaniga, A., and Wolf, A. L. (2003). De-
sign and evaluation of a support service for mobile,
wireless publish/subscribe applications. IEEE Trans-
actions on Software Engineering, 29(12):1059–1071.
Caruso, A., Chessa, S., De, S., and Urpi, A. (2005). GPS
free coordinate assignment and routing in wireless
sensor networks. In Proc. of the 24
th
Annual Joint
Conf. of the IEEE Computer and Communications So-
cieties (INFOCOM), pages 150–160. IEEE Computer
Society.
Carzaniga, A., Rosenblum, D. S., and Wolf, A. L. (2001).
Design and evaluation of a wide-area event notifica-
tion service. ACM Transactions on Computer Systems,
19(3):332–383.
Carzaniga, A. and Wolf, A. L. (2001). Content-based net-
working: A new communication infrastructure. In
NSF Workshop on an Infrastructure for Mobile and
Wireless Systems, number 2538 in Lecture Notes in
Computer Science, pages 59–68, Scottsdale, Arizona.
Springer-Verlag.
Cugola, G., Nitto, E. D., and Fuggetta, A. (2001). The
JEDI event-based infrastructure and its application to
the development of the OPSS WFMS. IEEE Transac-
tions on Software Engineering, 27(9):827–850.
Fiege, L., Grtner, F. C., Kasten, O., and Zeidler, A.
(2003). Supporting mobility in content-based pub-
lish/subscribe middleware. In Lecture Notes in Com-
puter Science, volume 2672, pages 103 – 122.
Flammini, M. and Navarra, A. (2009). Layouts for mobil-
ity management in wireless atm networks. Discrete
Applied Mathematics (DAM), 157(1):98–111.
Huang, Y. and Garcia-Molina, H. (2003). Publish/subscribe
tree construction in wireless ad-hoc networks. In Proc.
of the 4
th
Int. Conf. on Mobile Data Management
(MDM), pages 122–140.
Huang, Y. and Garcia-Molina, H. (2004). Publish/subscribe
in a mobile environment. Wireless Networks,
10(6):643–652.
Malpani, N., Welch, J. L., and Vaidya, N. H. (2000). Leader
election algorithms for mobile ad hoc networks. In
Proc. of ACM Joint Work. on Foundations of Mobile
Computing (DIALM-POMC).
McCann, J. A., Navarra, A., and Papadopoulos, A. A.
(2005). Connectionless Probabilistic (CoP) routing:
an efficient protocol for Mobile Wireless Ad-Hoc
Sensor Networks. In Proc. of the 24
th
IEEE Int.
Performance Computing and Communications Conf.
(IPCCC), pages 73–77.
Meier, R. and Cahill, V. (2002). Steam: Event-based mid-
dleware for wireless ad hoc networks. In Proc. of
the 1
st
Int. Work. on Distributed Event-Based Systems
(DEBS), Vienna, Austria.
Mostarda, L. and Navarra, A. (2008). Distributed idss
for enhancing security in mobile wireless sensor net-
works. Int. Journal of Distributed Sensor Networks
(IJDSN), 4(2):83–109.
Mottola, L., Cugola, G., and Picco, G. P. (2008). A self-
reparing tree topology enabling content-based routing
in mobile ad hoc networks. Transaction on Mobile
Computing, 7(8):946–960.
Object Management Group (OMG) (2004). Notification
service version 1.1.
Pietzuch, P. R. and Bacon., J. (2002). Hermes: A dis-
tributed event-based middleware architecture. In Proc.
of the 1
st
Int. Work. on Distributed Event-Based Sys-
tems (DEBS), pages 611–618, Vienna, Austria.
Raab, M. and Steger, A. (1998). “Balls into bins” - a sim-
ple and tight analysis. In Proc. of the 2
nd
Int. Work.
on Randomization and Approximation Techniques in
Computer Science (RANDOM), pages 159–170.
Royer, E. and Perkins, C. (2000). Multicast Ad hoc On-
Demand Distance Vector (MAODV) Routing. IETF,
Internet Draft: draft-ietf-manet-maodv-00.txt.
Segall, B. and Arnold., D. (1997). Elvin has left the build-
ing: A publish/subscribe notification service with
quenching. In Proc. of the Australian UNIX User
Group, pages 243–255, Brisbane, Australia.
Sun Microsystems, Inc., Mountain View, California (1999).
Java message service.
TIBCO Inc., Palo Alto, CA (1996). TIBR+: a WAN router
for global data distribution.
ICINCO 2009 - 6th International Conference on Informatics in Control, Automation and Robotics
310