Sciweavers

INFOCOM
2010
IEEE
13 years 8 months ago
Retiring Replicants: Congestion Control for Intermittently-Connected Networks
Abstract—The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These in...
Nathanael Thompson, Samuel C. Nelson, Mehedi Bakht...
INFOCOM
2010
IEEE
13 years 8 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
INFOCOM
2010
IEEE
13 years 8 months ago
Reliability in Layered Networks with Random Link Failures
—We consider network reliability in layered networks where the lower layer experiences random link failures. In layered networks, each failure at the lower layer may lead to mult...
Kayi Lee, Hyang-Won Lee, Eytan Modiano
INFOCOM
2010
IEEE
13 years 8 months ago
P-Coding: Secure Network Coding against Eavesdropping Attacks
Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, X...
INFOCOM
2010
IEEE
13 years 8 months ago
DPLC: Dynamic Packet Length Control in Wireless Sensor Networks
—Previous packet length optimizations for sensor networks often employ a fixed optimal length scheme, while in this study we present DPLC, a Dynamic Packet Length Control scheme...
Wei Dong, Xue Liu, Chun Chen, Yuan He, Gong Chen, ...
INFOCOM
2010
IEEE
13 years 8 months ago
ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
—Online advertising is a rapidly growing industry currently dominated by the search engine ’giant’ Google. In an attempt to tap into this huge market, Internet Service Provid...
Gabriel Maciá-Fernández, Yong Wang, ...
INFOCOM
2010
IEEE
13 years 8 months ago
Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph Theory
—Efficient operation of wireless networks and switches requires using simple (and in some cases distributed) scheduling algorithms. In general, simple greedy algorithms (known a...
Berk Birand, Maria Chudnovsky, Bernard Ries, Paul ...
INFOCOM
2010
IEEE
13 years 8 months ago
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces
In this paper we show that complex (scale-free) network topologies naturally emerge from hyperbolic metric spaces. The hyperbolic geometry can be used to facilitate maximally ef...
Fragkiskos Papadopoulos, Dmitri V. Krioukov, Mari&...
INFOCOM
2010
IEEE
13 years 8 months ago
Cooperative Resource Management in Cognitive WiMAX with Femto Cells
Abstract—WiMAX with femto cells is a cost-effective nextgeneration broadband wireless communication system. Cognitive Radio (CR) has recently emerged as a promising technology to...
Jin Jin, Baochun Li