Sciweavers

INFOCOM
2011
IEEE
13 years 3 months ago
Reconciling privacy preservation and intrusion detection in sensory data aggregation
—When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actua...
Chuang Wang, Guiling Wang, Wensheng Zhang 0001, Ta...
INFOCOM
2011
IEEE
13 years 3 months ago
Opportunistic spectrum access for mobile cognitive radios
—Cognitive radios (CRs) can mitigate the impending spectrum scarcity problem by utilizing their capability of accessing licensed spectrum bands opportunistically. While most exis...
Alexander W. Min, Kyu-Han Kim, Jatinder Pal Singh,...
INFOCOM
2011
IEEE
13 years 3 months ago
A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks
Abstract—We propose a routing metric for enabling highthroughput reliable multicast in multi-rate wireless mesh networks. This new multicast routing metric, called expected multi...
Xin Zhao, Jun Guo, Chun Tung Chou, Archan Misra, S...
INFOCOM
2011
IEEE
13 years 3 months ago
Multi-path routing and rate allocation for multi-source video on-demand streaming in wireless mesh networks
Abstract—We study the multi-source video on-demand application in multi-channel multi-radio wireless mesh networks. When a user initiates a new video request, the application can...
Yong Ding, Yang Yang, Li Xiao
INFOCOM
2011
IEEE
13 years 3 months ago
Content management in a mobile ad hoc network: Beyond opportunistic strategy
Abstract—We study the challenging problem of strategic content placement in a dynamic MANET. Existing content placement techniques cannot cope with such network dynamics since th...
Suk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Son...
INFOCOM
2011
IEEE
13 years 3 months ago
Optimal sampling algorithms for frequency estimation in distributed data
—Consider a distributed system with n nodes where each node holds a multiset of items. In this paper, we design sampling algorithms that allow us to estimate the global frequency...
Zengfeng Huang, Ke Yi, Yunhao Liu, Guihai Chen
INFOCOM
2011
IEEE
13 years 3 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
INFOCOM
2011
IEEE
13 years 3 months ago
Optimal power control in Rayleigh-fading heterogeneous networks
—Heterogeneous wireless networks employ varying degrees of network coverage using power control in a multi-tier configuration, where low-power femtocells are used to enhance per...
Chee Wei Tan
INFOCOM
2011
IEEE
13 years 3 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
INFOCOM
2011
IEEE
13 years 3 months ago
Making sense of customer tickets in cellular networks
—Effective management of large-scale cellular data networks is critical to meet customer demands and expectations. Customer calls for technical support provide direct indication ...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...