Sciweavers

INFOCOM
2010
IEEE
13 years 7 months ago
Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply Uncertainty
Abstract—This paper presents the first analytical study of optimal investment and pricing decisions of a cognitive mobile virtual network operator (C-MVNO) under spectrum supply...
Lingjie Duan, Jianwei Huang, Biying Shou
INFOCOM
2010
IEEE
13 years 7 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
INFOCOM
2010
IEEE
13 years 7 months ago
Information Quality Aware Routing in Event-Driven Sensor Networks
—Upon the occurrence of a phenomenon of interest in a wireless sensor network, multiple sensors may be activated, leading to data implosion and redundancy. Data aggregation and/o...
Hwee-Xian Tan, Mun-Choon Chan, Wendong Xiao, Peng ...
INFOCOM
2010
IEEE
13 years 7 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
INFOCOM
2010
IEEE
13 years 7 months ago
Reliable Broadcasting in Random Networks and the Effect of Density
Nikolaos Fountoulakis, Anna Huber, Konstantinos Pa...
INFOCOM
2010
IEEE
13 years 7 months ago
Delay Performance of Scheduling with Data Aggregation in Wireless Sensor Networks
—In-network aggregation has become a promising technique for improving the energy efficiency of wireless sensor networks. Aggregating data at various nodes in the network result...
Changhee Joo, Jin-Ghoo Choi, Ness B. Shroff
INFOCOM
2010
IEEE
13 years 7 months ago
Queuing Analysis in Multichannel Cognitive Spectrum Access: A Large Deviation Approach
Abstract—The queueing performance of a (secondary) cognitive user is investigated for a hierarchical network where there are N independent and identical primary users. Each prima...
Amine Laourine, Shiyao Chen, Lang Tong
INFOCOM
2010
IEEE
13 years 7 months ago
Making the Case for Random Access Scheduling in Wireless Multi-hop Networks
—This paper formally establishes that random access scheduling schemes, and, more specifically CSMA-CA, yields exceptionally good performance in the context of wireless multihop...
Apoorva Jindal, Ann Arbor, Konstantinos Psounis
INFOCOM
2010
IEEE
13 years 7 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
INFOCOM
2010
IEEE
13 years 7 months ago
BGP Churn Evolution: a Perspective from the Core
—The scalability limitations of BGP have been a major concern in the networking community lately. An important issue in this respect is the rate of routing updates (churn) that B...
Ahmed Elmokashfi, Amund Kvalbein, Constantine Dovr...