Sciweavers

32028 search results - page 6382 / 6406
» Experimenting a
Sort
View
INFOCOM
2012
IEEE
12 years 9 days ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
INFOCOM
2012
IEEE
12 years 9 days ago
Spectrum trading with insurance in cognitive radio networks
—Market based spectrum trading has been extensively studied to realize efficient spectrum utilization in cognitive radio networks (CRNs). In this paper, we utilize the concept o...
Haiming Jin, Gaofei Sun, Xinbing Wang, Qian Zhang
INFOCOM
2012
IEEE
12 years 9 days ago
Robust multi-source network tomography using selective probes
—Knowledge of a network’s topology and internal characteristics such as delay times or losses is crucial to maintain seamless operation of network services. Network tomography ...
Akshay Krishnamurthy, Aarti Singh
INFOCOM
2012
IEEE
12 years 9 days ago
TurfCast: A service for controlling information dissemination in wireless networks
—Recent years have witnessed mass proliferation of mobile devices with rich wireless communication capabilities as well as emerging mobile device based information dissemination ...
Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champi...
INFOCOM
2012
IEEE
12 years 9 days ago
Threshold compression for 3G scalable monitoring
—We study the problem of scalable monitoring of operational 3G wireless networks. Threshold-based performance monitoring in large 3G networks is very challenging for two main fac...
Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Io...
« Prev « First page 6382 / 6406 Last » Next »