Sciweavers

INFOCOM
2010
IEEE
13 years 10 months ago
BitTorrent Darknets
Abstract—A private BitTorrent site (also known as a “BitTorrent darknet”) is a collection of torrents that can only be accessed by members of the darknet community. The priva...
Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, ...
INFOCOM
2010
IEEE
13 years 10 months ago
Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks
We study the problem of finding the least-priced path (LPP) between a source and a destination in opportunistic spectrum access (OSA) networks. This problem is motivated by econo...
Tao Shu, Marwan Krunz
INFOCOM
2010
IEEE
13 years 10 months ago
Buffer Management for Aggregated Streaming Data with Packet Dependencies
Abstract—In many applications the traffic traversing the network has inter-packet dependencies due to application-level encoding schemes. For some applications, e.g., multimedia...
Gabriel Scalosub, Peter Marbach, Jörg Liebehe...
INFOCOM
2010
IEEE
13 years 10 months ago
Energy-Conserving Scheduling in Multi-hop Wireless Networks with Time-Varying Channels
Abstract— MaxWeight algorithm, a.k.a., back-pressure algorithm, has received much attention as a viable solution for dynamic link scheduling in multi-hop wireless networks. The b...
Yang Song, Chi Zhang, Yuguang Fang, Zhisheng Niu
INFOCOM
2010
IEEE
13 years 10 months ago
Evaluating Potential Routing Diversity for Internet Failure Recovery
—As the Internet becomes a critical infrastructure component of our global information-based society, any interruption to its availability can have significant economical and so...
Chengchen Hu, Kai Chen, Yan Chen, Bin Liu
INFOCOM
2010
IEEE
13 years 10 months ago
Extending Access Point Connectivity through Opportunistic Routing in Vehicular Networks
—Nowadays, the navigation systems available on cars are becoming more and more sophisticated. They greatly improve the experience of drivers and passengers by enabling them to re...
Ilias Leontiadis, Paolo Costa, Cecilia Mascolo
INFOCOM
2010
IEEE
13 years 10 months ago
Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy
Bozidar Radunovic, Prasanna Chaporkar, Alexandre P...
INFOCOM
2010
IEEE
13 years 10 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
INFOCOM
2010
IEEE
13 years 10 months ago
Dynamic Power Allocation Under Arbitrary Varying Channels - The Multi-User Case
Abstract—We consider the power control problem in a timeslotted wireless channel, shared by a finite number of mobiles that transmit to a common base station. The channel betwee...
Niv Buchbinder, Liane Lewin-Eytan, Ishai Menache, ...
INFOCOM
2010
IEEE
13 years 10 months ago
Opportunistic Spectrum Access with Multiple Users: Learning under Competition
Abstract—The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initi...
Animashree Anandkumar, Nithin Michael, Ao Tang