Sciweavers

83 search results - page 3 / 17
» ton 2010
Sort
View
TON
2010
119views more  TON 2010»
13 years 9 months ago
Thwarting zero-day polymorphic worms with network-level length-based signature generation
—It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that we can prevent worms from propagating at their early phase...
Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li
TON
2010
125views more  TON 2010»
13 years 5 months ago
Computational analysis and efficient algorithms for micro and macro OFDMA downlink scheduling
OFDMA is one of the most important modulation and access methods for the future mobile networks. Before transmitting a frame on the downlink, an OFDMA base station has to invoke an...
Reuven Cohen, Liran Katzir
TON
2010
87views more  TON 2010»
13 years 5 months ago
Measuring Transmission Opportunities in 802.11 Links
Abstract-- We propose a powerful MAC/PHY cross-layer approach to measuring 802.11 transmission opportunities in WLAN networks on a per-link basis. Our estimator can operate at a si...
Domenico Giustiniano, David Malone, Douglas J. Lei...
TON
2010
93views more  TON 2010»
13 years 5 months ago
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
When heterogeneous congestion control protocols that react to different pricing signals share the same network, the current theory based on utility maximization fails to predict th...
Ao Tang, X. Wei, Stephen H. Low, Mung Chiang
TON
2010
168views more  TON 2010»
13 years 5 months ago
Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control, and Rate Adaptation
Abstract--We present a number of significant engineering insights on what makes a good configuration for medium- to largesize wireless mesh networks (WMNs) when the objective funct...
Jun Luo, Catherine Rosenberg, André Girard