Sciweavers

INFOCOM
2007
IEEE
14 years 6 months ago
Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards
— It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as wel...
Giuseppe Bianchi, Antonio Di Stefano, Costantino G...
INFOCOM
2007
IEEE
14 years 6 months ago
Non-Cooperative Scheduling of Multiple Bag-of-Task Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper we analyze the behavior of K non-cooperative schedu...
Arnaud Legrand, Corinne Touati
INFOCOM
2007
IEEE
14 years 6 months ago
On the Performance Analysis of Network-Coded Cooperation in Wireless Networks
—In this letter, a network-coded cooperation scheme with dynamic coding mechanism (DC-NCC) is proposed. In DCNCC, the relay dynamically adapts forming the network-coded data base...
Cong Peng, Qian Zhang, Ming Zhao 0001, Yan Yao
INFOCOM
2007
IEEE
14 years 6 months ago
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks
— Channel allocation was extensively studied in the framework of cellular networks. But the emergence of new system concepts, such as cognitive radio systems, has brought this to...
Márk Félegyházi, Mario Cagalj...
INFOCOM
2007
IEEE
14 years 6 months ago
Optimal Rate-Reliability-Delay Tradeoff in Networks with Composite Links
—Networks need to accommodate diverse applications with different Quality-of-Service (QoS) requirements. New ideas at the physical layer are being developed for this purpose, suc...
Ying Li, Mung Chiang, A. Robert Calderbank, Suhas ...
INFOCOM
2007
IEEE
14 years 6 months ago
Proactive Scan: Fast Handoff with Smart Triggers for 802.11 Wireless LAN
Abstract— It has been a challenging problem to support VoIPtype delay sensitive applications in an 802.11 wireless LAN, because the standard handoff procedure implemented in many...
Haitao Wu, Kun Tan, Yongguang Zhang, Qian Zhang
INFOCOM
2007
IEEE
14 years 6 months ago
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
Abstract— We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmi...
Mingyan Li, Iordanis Koutsopoulos, Radha Poovendra...
INFOCOM
2007
IEEE
14 years 6 months ago
Transmit Power Distribution of Wireless Ad Hoc Networks with Topology Control
— Topology control and routing protocols are used by designers of wireless packet data networks to lower the node degree, simplify routing and lower the nodes’ energy consumpti...
Dan Avidor, Sayandev Mukherjee, Furuzan Atay Onat
INFOCOM
2007
IEEE
14 years 6 months ago
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC
—Known covert channel based on splitting algorithms in Medium Access Control (MAC) protocols requires the receiver’s knowledge of the sender’s identity. In this paper we pres...
Zhenghong Wang, Jing Deng, Ruby B. Lee
INFOCOM
2007
IEEE
14 years 6 months ago
Cooperating with Smartness: Using Heterogeneous Smart Antennas in Ad-Hoc Networks
Abstract— The ability of smart antennas to improve performance in a typically constrained ad-hoc network environment, has helped them garner significant attention over the last ...
Karthikeyan Sundaresan, Raghupathy Sivakumar