Sciweavers

INFOCOM
2010
IEEE
13 years 10 months ago
SlideOR: Online Opportunistic Network Coding in Wireless Mesh Networks
—Opportunistic routing significantly increases unicast throughput in wireless mesh networks by effectively utilizing the wireless broadcast medium. With network coding, opportun...
Yunfeng Lin, Ben Liang, Baochun Li
INFOCOM
2010
IEEE
13 years 10 months ago
Reliable Adaptive Multipath Provisioning with Bandwidth and Differential Delay Constraints
Abstract— Robustness and reliability are critical issues in network management. To provide resiliency, a popular protection scheme against network failures is the simultaneous ro...
Weiyi Zhang, Jian Tang, Chonggang Wang, Shanaka de...
INFOCOM
2010
IEEE
13 years 10 months ago
First-Fit Scheduling for Beaconing in Multihop Wireless Networks
—Beaconing is a primitive communication task in which every node locally broadcasts a packet to all its neighbors within a fixed distance. Assume that all communications proceed...
Peng-Jun Wan, Zhu Wang, Hongwei Du, Scott C.-H. Hu...
INFOCOM
2010
IEEE
13 years 10 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot
INFOCOM
2010
IEEE
13 years 10 months ago
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding
—Wireless mesh networks have been widely deployed to provide broadband network access, and their performance can be significantly improved by using a new technology called netwo...
Tingting Chen, Sheng Zhong
INFOCOM
2010
IEEE
13 years 10 months ago
Stable Maximum Throughput Broadcast in Wireless Fading Channels
—This research considers network coded broadcast system with multi-rate transmission and dual queue stability constraints. Existing network coded broadcast systems consider singl...
Wei Pu, Hao Cui, Chong Luo, Feng Wu, Chang Wen Che...
INFOCOM
2010
IEEE
13 years 10 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
INFOCOM
2010
IEEE
13 years 10 months ago
Survivable Distributed Storage with Progressive Decoding
Yunghsiang Han, Oluwasoji Omiwade, Rong Zheng
INFOCOM
2010
IEEE
13 years 10 months ago
Transition from Heavy to Light Tails in Retransmission Durations
— Retransmissions serve as the basic building block that communication protocols use to achieve reliable data transfer. Until recently, the number of retransmissions were thought...
Jian Tan, Ness B. Shroff
INFOCOM
2010
IEEE
13 years 10 months ago
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks
—In Multi-User MIMO networks, receivers decode multiple concurrent signals using Successive Interference Cancellation (SIC). With SIC a weak target signal can be deciphered in th...
Ece Gelal, Konstantinos Pelechrinis, Tae-Suk Kim, ...