Sciweavers

INFOCOM
2009
IEEE
14 years 6 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
INFOCOM
2009
IEEE
14 years 6 months ago
Impairment-Aware Offline RWA for Transparent Optical Networks
—We consider the offline version of the routing and wavelength assignment (RWA) problem in transparent all-optical networks. In such networks and in the absence of regenerators, ...
Konstantinos Manousakis, Kostas Christodoulopoulos...
INFOCOM
2009
IEEE
14 years 6 months ago
On Leveraging Partial Paths in Partially-Connected Networks
Abstract—Mobile wireless network research focuses on scenarios at the extremes of the network connectivity continuum where the probability of all nodes being connected is either ...
Simon Heimlicher, Merkourios Karaliopoulos, Hanoch...
INFOCOM
2009
IEEE
14 years 6 months ago
Passive Loss Inference in Wireless Sensor Networks Based on Network Coding
Abstract—The highly stochastic nature of wireless environments makes it desirable to monitor link loss rates in wireless sensor networks. In this paper, we study the loss inferen...
Yunfeng Lin, Ben Liang, Baochun Li
INFOCOM
2009
IEEE
14 years 6 months ago
Distributed Non-Autonomous Power Control through Distributed Convex Optimization
— We consider the uplink power control problem where mobile users in different cells are communicating with their base stations. We formulate the power control problem as the min...
Sundhar Srinivasan Ram, Venugopal V. Veeravalli, A...
INFOCOM
2009
IEEE
14 years 6 months ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang
INFOCOM
2009
IEEE
14 years 6 months ago
On the Exploitation of CDF Based Wireless Scheduling
—Channel-aware scheduling strategies - such as the CDF Scheduler (CS) algorithm for the CDMA/HDR systems provide an effective mechanism for utilizing the channel data rate for im...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
INFOCOM
2009
IEEE
14 years 6 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
INFOCOM
2009
IEEE
14 years 6 months ago
Network Pricing and Rate Allocation with Content Provider Participation
Abstract—Pricing content-providers for connectivity to endusers and setting connection parameters based on the price is an evolving model on the Internet. The implications are he...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
INFOCOM
2009
IEEE
14 years 6 months ago
To Cache or Not To Cache?
—We address cooperative caching in mobile ad hoc networks where information is exchanged in a peer-to-peer fashion among the network nodes. Our objective is to devise a fully-dis...
Marco Fiore, Francesco Mininni, Claudio Casetti, C...