Sciweavers

242 search results - page 22 / 49
» infocom 2007
Sort
View
INFOCOM
2007
IEEE
14 years 5 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
INFOCOM
2007
IEEE
14 years 5 months ago
Joint Channel Allocation, Interface Assignment and MAC Design for Multi-Channel Wireless Mesh Networks
— In a wireless mesh network (WMN) with a number of stationary wireless routers, the aggregate capacity can be increased when each router is equipped with multiple network interf...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong
INFOCOM
2007
IEEE
14 years 5 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
INFOCOM
2007
IEEE
14 years 5 months ago
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure
—It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their application...
Yao Zhao, Yan Chen
INFOCOM
2007
IEEE
14 years 5 months ago
Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
—802.11a, b, and g standards were designed for deployment in cooperative environments, and hence do not include mechanisms to protect from jamming attacks. In this paper, we expl...
Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, Dan...