Sciweavers

INFOCOM
2008
IEEE
14 years 6 months ago
Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints
—A fundamental problem in wireless networks is to estimate its throughput capacity - given a set of wireless nodes, and a set of connections, what is the maximum rate at which da...
Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marat...
INFOCOM
2008
IEEE
14 years 6 months ago
Searching for Rare Objects Using Index Replication
—Searching for objects is a fundamental problem for popular peer-to-peer file-sharing networks that contribute to much of the traffic on today’s Internet. While existing prot...
Krishna Puttaswamy, Alessandra Sala, Ben Y. Zhao
INFOCOM
2008
IEEE
14 years 6 months ago
Design of a Channel Characteristics-Aware Routing Protocol
Abstract—Radio channel quality of real-world wireless networks tends to exhibit both short-term and long-term temporal variations that are in general difficult to model. To maxi...
Rupa Krishnan, Ashish Raniwala, Tzi-cker Chiueh
INFOCOM
2008
IEEE
14 years 6 months ago
Circular Sailing Routing for Wireless Networks
Abstract—Routing in wireless networks has been heavily studied in the last decade and numerous routing protocols were proposed in literature. The packets usually follow the short...
Fan Li, Yu Wang 0003
ICCCN
2008
IEEE
14 years 6 months ago
Multi-Hop RFID Wake-Up Radio: Design, Evaluation and Energy Tradeoffs
Abstract—Energy efficiency is a central challenge in batteryoperated sensor networks. Current energy-efficient mechanisms employ either duty cycling, which reduces idle listeni...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
ICCCN
2008
IEEE
14 years 6 months ago
Localized Access Point Association in Wireless LANs with Bounded Approximation Ratio
— The current access point (AP) association schemes in wireless LANs, such as IEEE 802.11, cause an unbalanced load which reduces the performance of both the entire network and i...
Mingming Lu, Jie Wu
ICCCN
2008
IEEE
14 years 6 months ago
Modeling and Adapting JPEG to the Energy Requirements of VSN
—We address the problem of modeling and adapting JPEG to the energy requirements of Visual Sensor Networks (VSN). For JPEG modeling purposes, we develop a simplified high-level ...
Abdelhamid Mammeri, Ahmed Khoumsi, Djemel Ziou, Br...
ICCCN
2008
IEEE
14 years 6 months ago
Work-Conserving Fair-Aggregation with Rate-Independent Delay
—Flow aggregation has been proposed as a technique to improve the scalability of QoS scheduling in the core of the Internet, by reducing the amount of per-flow state necessary a...
Jorge Arturo Cobb
ICCCN
2008
IEEE
14 years 6 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...
ICCCN
2008
IEEE
14 years 6 months ago
The RNA Metaprotocol
— The Recursive Network Architecture (RNA) explores the relationship of layering to protocol and network architecture. RNA examines the implications of using a single, tunable pr...
Joseph D. Touch, Venkata K. Pingali