Sciweavers

INFOCOM
2008
IEEE
14 years 6 months ago
Robust Distributed Spectrum Sensing in Cognitive Radio Networks
Abstract—Distributed spectrum sensing (DSS) enables a Cognitive Radio (CR) network to reliably detect licensed users and avoid causing interference to licensed communications. Th...
Ruiliang Chen, Jung Min Park, Kaigui Bian
INFOCOM
2008
IEEE
14 years 6 months ago
A Trust and Reputation based Anti-SPIM Method
—Instant Messaging (IM) service is a killer application in the Internet. Due to the problem of IM spam (SPIM), building an effective anti-spim method is an important research top...
Jun Bi, Jianping Wu, Wenmao Zhang
INFOCOM
2008
IEEE
14 years 6 months ago
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks
Chenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han H...
INFOCOM
2008
IEEE
14 years 6 months ago
A Practical SNR-Guided Rate Adaptation
—Rate adaptation is critical to the system performance of wireless networks. Typically, rate adaptation is considered as a
Jiansong Zhang, Kun Tan, Jun Zhao, Haitao Wu, Yong...
INFOCOM
2008
IEEE
14 years 6 months ago
Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation
Abstract— In this paper we use an information-theoretic formulation for characterizing the minimum routing overhead of link state routing in a mobile ad hoc network. We formulate...
Di Wang, Alhussein A. Abouzeid
INFOCOM
2008
IEEE
14 years 6 months ago
Border Effects, Fairness, and Phase Transition in Large Wireless Networks
—We characterize the fairness of decentralized medium access control protocols based on CSMA/CA, such as IEEE 802.11, in large multi-hop wireless networks. In particular, we show...
Mathilde Durvy, Olivier Dousse, Patrick Thiran
INFOCOM
2008
IEEE
14 years 6 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
INFOCOM
2008
IEEE
14 years 6 months ago
On the Performance of IEEE 802.11 under Jamming
—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We study two chann...
Emrah Bayraktaroglu, Christopher King, Xin Liu, Gu...
INFOCOM
2008
IEEE
14 years 6 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
INFOCOM
2008
IEEE
14 years 6 months ago
Routing in Outer Space
Alessandro Mei, Julinda Stefa