Sciweavers

INFOCOM
2007
IEEE
14 years 6 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina
INFOCOM
2007
IEEE
14 years 6 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
INFOCOM
2007
IEEE
14 years 6 months ago
On the Performance of Multiple-Tree-Based Peer-to-Peer Live Streaming
— In this paper we propose and analyze a generalized multiple-tree-based overlay architecture for peer-to-peer live streaming that employs multipath transmission and forward erro...
György Dán, Viktória Fodor, Ili...
INFOCOM
2007
IEEE
14 years 6 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim
INFOCOM
2007
IEEE
14 years 6 months ago
A New Search Algorithm using Autonomous and Cooperative Multiple Sensor Nodes
— In this paper, we study search algorithms for using a set of autonomous and cooperative mobile sensor nodes (MSN) with limited sensing and communication ranges to search a larg...
Seokhoon Yoon, Chunming Qiao
INFOCOM
2007
IEEE
14 years 6 months ago
Stream: Low Overhead Wireless Reprogramming for Sensor Networks
— Wireless reprogramming of a sensor network is useful for uploading new code or for changing the functionality of existing code. Through the process, a node should remain recept...
Rajesh Krishna Panta, Issa Khalil, Saurabh Bagchi
INFOCOM
2007
IEEE
14 years 6 months ago
Packet Loss Characterization in WiFi-Based Long Distance Networks
— Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, ...
Anmol Sheth, Sergiu Nedevschi, Rabin K. Patra, Son...
INFOCOM
2007
IEEE
14 years 6 months ago
Paging Mobile Users Efficiently and Optimally
Amotz Bar-Noy, Yi Feng 0002, Mordecai J. Golin
INFOCOM
2007
IEEE
14 years 6 months ago
Randomized k-Coverage Algorithms For Dense Sensor Networks
— We propose new algorithms to achieve k-coverage in dense sensor networks. In such networks, covering sensor locations approximates covering the whole area. However, it has been...
Mohamed Hefeeda, M. Bagheri
INFOCOM
2007
IEEE
14 years 6 months ago
Point-Casting Service in Wireless Networks
— The broadcast nature of existing wireless LANs can produce excessive radio coverage which is often undesirable for applications like wireless IPTV or location-based service. To...
Zhengrong Ji, Maneesh Varshney, Junlan Zhou, Rajiv...