Sciweavers

222 search results - page 8 / 45
» infocom 2006
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
INFOCOM
2006
IEEE
14 years 3 months ago
Oscillations with TCP-Like Flow Control in Networks of Queues
—We consider a set of flows passing through a set of servers. The injection rate into each flow is governed by a flow control that increases the injection rate when all the se...
Matthew Andrews, Aleksandrs Slivkins
INFOCOM
2006
IEEE
14 years 3 months ago
Relayed Multicast Scheme in IEEE 802.11 Wireless LAN Systems
— we propose a novel multicast scheme that can provide quality-of-service (QoS) to multicast service over IEEE 802.11 wireless LANs by utilizing MAC layer relay. We develop the d...
Kang Jin Yoon, Young Yong Kim
INFOCOM
2006
IEEE
14 years 3 months ago
Contribution of Anomalies Detection and Analysis on Traffic Engineering
—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria an...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
INFOCOM
2006
IEEE
14 years 3 months ago
Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications
Abstract— Network utility maximization (NUM) problems provide an important approach to conduct network resource management such as end-to-end rate allocation. In the existing lit...
Daniel Pérez Palomar, Mung Chiang