Sciweavers

PIMRC
2010
IEEE
13 years 6 months ago
An interference aware throughput maximizing scheduler for centralized cognitive radio networks
In this paper, we propose an interference aware throughput maximizing scheduler for cognitive radio networks (CRNs) as part of a MAC layer resource allocation framework. In the con...
Didem Gozupek, Fatih Alagöz
PIMRC
2010
IEEE
13 years 6 months ago
A green software-defined communication processor for dynamic spectrum access
Abstract--Dynamic spectrum access (DSA) supporting opportunistic transmission without extra spectrum bandwidth is attractive for future wireless communication. To facilitate such D...
Ching-Kai Liang, Kwang-Cheng Chen
PIMRC
2010
IEEE
13 years 6 months ago
The role of channel states in secret key generation
In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delaybased attack, that observing its own channel states is not the only ...
Xiang He, Aylin Yener
PIMRC
2010
IEEE
13 years 6 months ago
A secrecy game with an informed jammer relay
A four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is investigated when the jammer relay is causally given the source message....
Melda Yuksel, Xi Liu, Elza Erkip
P2P
2010
IEEE
136views Communications» more  P2P 2010»
13 years 6 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
P2P
2010
IEEE
140views Communications» more  P2P 2010»
13 years 6 months ago
PeerDedupe: Insights into the Peer-Assisted Sampling Deduplication
As the digital data rapidly inflates to a world-wide storage crisis, data deduplication is showing its increasingly prominent function in data storage. Driven by the problems behin...
Yuanjian Xing, Zhenhua Li, Yafei Dai
P2P
2010
IEEE
127views Communications» more  P2P 2010»
13 years 6 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
P2P
2010
IEEE
182views Communications» more  P2P 2010»
13 years 6 months ago
Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks
Abstract--As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, we carry out empir...
Seungbae Kim, Xiaofei Wang, Hyunchul Kim, Taekyoun...
P2P
2010
IEEE
167views Communications» more  P2P 2010»
13 years 6 months ago
Boosting Gossip for Live Streaming
Gossip protocols are considered very effective to disseminate information in a large scale dynamic distributed system. Their inherent simplicity makes them easy to implement and de...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
NOMS
2010
IEEE
228views Communications» more  NOMS 2010»
13 years 7 months ago
DA VINCI: A tool to improve VoIP call routing configurations
As IP telephony becomes a critical part of the enterprise network infrastructure, there is an increasing need for tools to help manage VoIP systems. In this paper, we introduce DA ...
Kunwadee Sripanidkulchai, Shu Tao, Zon-Yin Shae