Sciweavers

222 search results - page 8 / 45
» infocom 2006
Sort
View
157
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
122
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Oscillations with TCP-Like Flow Control in Networks of Queues
—We consider a set of flows passing through a set of servers. The injection rate into each flow is governed by a flow control that increases the injection rate when all the se...
Matthew Andrews, Aleksandrs Slivkins
130
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Relayed Multicast Scheme in IEEE 802.11 Wireless LAN Systems
— we propose a novel multicast scheme that can provide quality-of-service (QoS) to multicast service over IEEE 802.11 wireless LANs by utilizing MAC layer relay. We develop the d...
Kang Jin Yoon, Young Yong Kim
115
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Contribution of Anomalies Detection and Analysis on Traffic Engineering
—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria an...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
116
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications
Abstract— Network utility maximization (NUM) problems provide an important approach to conduct network resource management such as end-to-end rate allocation. In the existing lit...
Daniel Pérez Palomar, Mung Chiang