Sciweavers

126 search results - page 20 / 26
» INFOCOM 2012
Sort
View
INFOCOM
2012
IEEE
12 years 26 days ago
Truthful spectrum auction design for secondary networks
Abstract—Opportunistic wireless channel access by nonlicensed users has emerged as a promising solution for addressing the bandwidth scarcity challenge. Auctions represent a natu...
Yuefei Zhu, Baochun Li, Zongpeng Li
INFOCOM
2012
IEEE
12 years 26 days ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
INFOCOM
2012
IEEE
12 years 26 days ago
SageShift: Managing SLAs for highly consolidated cloud
– Maximizing consolidation ratio, the number of virtual machines (VMs) in a physical machine, without violating customers’ SLAs is an important goal in the cloud. We show that ...
Orathai Sukwong, Akkarit Sangpetch, Hyong S. Kim
INFOCOM
2012
IEEE
12 years 26 days ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
INFOCOM
2012
IEEE
12 years 26 days ago
Approximate convex decomposition based localization in wireless sensor networks
—Accurate localization in wireless sensor networks is the foundation for many applications, such as geographic routing and position-aware data processing. An important research d...
Wenping Liu, Dan Wang, Hongbo Jiang, Wenyu Liu, Ch...