Sciweavers

INFOCOM
2010
IEEE
13 years 7 months ago
Deterministic Broadcast on Multiple Access Channels
—We study broadcasting on multiple access channels by deterministic distributed protocols. Data arrivals are governed by an adversary. The power of the adversary is constrained b...
Lakshmi Anantharamu, Bogdan S. Chlebus, Dariusz R....
INFOCOM
2010
IEEE
13 years 7 months ago
Improving QoS in BitTorrent-like VoD Systems
—In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming ...
Yan Yang, Alix L. H. Chow, Leana Golubchik, Daniel...
INFOCOM
2010
IEEE
13 years 7 months ago
Bargaining and Price-of-Anarchy in Repeated Inter-Session Network Coding Games
— Most of the previous work on network coding has assumed that the users are not selfish and always follow the designed coding schemes. However, recent results have shown that s...
Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W...
INFOCOM
2010
IEEE
13 years 7 months ago
Distributed Caching Algorithms for Content Distribution Networks
—The delivery of video content is expected to gain huge momentum, fueled by the popularity of user-generated clips, growth of VoD libraries, and wide-spread deployment of IPTV se...
Sem C. Borst, Varun Gupta, Anwar Walid
INFOCOM
2010
IEEE
13 years 7 months ago
Utility Maximization for Delay Constrained QoS in Wireless
Abstract—This paper studies the problem of utility maximization for clients with delay based QoS requirements in wireless networks. We adopt a model used in a previous work that ...
I-Hong Hou, P. R. Kumar
INFOCOM
2010
IEEE
13 years 7 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
INFOCOM
2010
IEEE
13 years 7 months ago
CSMA-Based Distributed Scheduling in Multi-hop MIMO Networks under SINR Model
Dajun Qian, Dong Zheng, Junshan Zhang, Ness B. Shr...
INFOCOM
2010
IEEE
13 years 7 months ago
Netscope: Practical Network Loss Tomography
—We present Netscope, a tomographic technique that infers the loss rates of network links from unicast endto-end measurements. Netscope uses a novel combination of first- and se...
Denisa Ghita, Hung Xuan Nguyen, Maciej Kurant, Kat...
INFOCOM
2010
IEEE
13 years 7 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou