Sciweavers

INFOCOM
2007
IEEE
14 years 6 months ago
Revenue Focused Protection for VOD in DWDM Rings
—New protection schemes for video on demand (VOD) in a DWDM ring network are proposed that employ information per customer. Unlike prior schemes that rely on fixed priorities, th...
Ornan Ori Gerstel, Galen H. Sasaki, Ashok Balasubr...
INFOCOM
2007
IEEE
14 years 6 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
INFOCOM
2007
IEEE
14 years 6 months ago
On the Stability-Scalability Tradeoff of DHT Deployment
— Distributed hash tables (DHTs) provide efficient data naming and location with simple hash-table-like primitives, upon which sophisticated distributed applications can be buil...
Chih-Chiang Wang, Khaled Harfoush
INFOCOM
2007
IEEE
14 years 6 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
INFOCOM
2007
IEEE
14 years 6 months ago
Using Low-Power Modes for Energy Conservation in Ethernet LANs
—Most Ethernet interfaces available for deployment in switches and hosts today can operate in a variety of different low power modes. However, currently these modes have very lim...
Maruti Gupta, Suresh Singh
INFOCOM
2007
IEEE
14 years 6 months ago
How Optimal are Wireless Scheduling Protocols?
— In wireless networks mutual interference impairs the quality of received signals and might even prevent the correct reception of messages. It is therefore of paramount importan...
Thomas Moscibroda, Yvonne Anne Oswald, Roger Watte...
INFOCOM
2007
IEEE
14 years 6 months ago
A Multipath Background Network Architecture
— Background transfers, or transfers that humans do not actively wait on, dominate the Internet today. In today’s best-effort Internet, background transfers can interfere with ...
Ravi Kokku, Aniruddha Bohra, Samrat Ganguly, Arun ...
INFOCOM
2007
IEEE
14 years 6 months ago
Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN
Abstract—An emerging killer application for enterprise wireless LANs (WLANs) is voice over IP (VoIP) telephony, which promises to greatly improve the reachability and mobility of...
Fanglu Guo, Tzi-cker Chiueh
INFOCOM
2007
IEEE
14 years 6 months ago
End-to-End Flow Fairness Over IEEE 802.11-Based Wireless Mesh Networks
—Economies of scale make IEEE 802.11 an attractive technology for building wireless mesh networks (WMNs). However, the IEEE 802.11 protocol exhibits serious link-layer unfairness...
Ashish Raniwala, Pradipta De, Srikant Sharma, Rupa...
INFOCOM
2007
IEEE
14 years 6 months ago
Randomized Decentralized Broadcasting Algorithms
— We consider the problem of broadcasting a live stream of data in an unstructured network. Broadcasting has been studied extensively for networks with capacity constraints at th...
Laurent Massoulié, Andrew Twigg, Christos G...