Sciweavers

INFOCOM
2011
IEEE
13 years 2 months ago
Optimal Sybil-resilient node admission control
—Most existing large-scale networked systems on the Internet such as peer-to-peer systems are vulnerable to Sybil attacks where a single adversary can introduce many bogus identi...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
INFOCOM
2011
IEEE
13 years 2 months ago
Novasky: Cinematic-quality VoD in a P2P storage cloud
—In this paper, we present Novasky, a real-world Video-on-Demand (VoD) system capable of delivering cinematicquality video streams to end users. The foundation of the Novasky des...
Fangming Liu, Shijun Shen, Bo Li, Baochun Li, Hao ...
INFOCOM
2011
IEEE
13 years 2 months ago
Converge-cast with MIMO
—This paper investigates throughput and delay based on a newly predominant traffic pattern, called converge-cast, where each of the n nodes in the network act as a destination w...
Luoyi Fu, Yi Qin, Xinbing Wang, Xue Liu
INFOCOM
2011
IEEE
13 years 2 months ago
Connectivity maintenance in mobile wireless networks via constrained mobility
—We explore distributed mechanisms for maintaining the physical layer connectivity of a mobile wireless network while still permitting significant area coverage. Moreover, we re...
Joshua Reich, Vishal Misra, Dan Rubenstein, Gil Zu...
INFOCOM
2011
IEEE
13 years 2 months ago
A robust optimization approach to backup network design with random failures
—This paper presents a scheme in which a dedicated backup network is designed to provide protection from random link failures. Upon a link failure in the primary network, traffi...
Matthew Johnston, Hyang-Won Lee, Eytan Modiano
INFOCOM
2011
IEEE
13 years 2 months ago
A nearly-optimal index rule for scheduling of users with abandonment
—We analyze a comprehensive model for multi-class job scheduling accounting for user abandonment, with the objective of minimizing the total discounted or time-average sum of lin...
Urtzi Ayesta, Peter Jacko, Vladimir Novak
INFOCOM
2011
IEEE
13 years 2 months ago
Sampling vs sketching: An information theoretic comparison
—The main approaches to high speed measurement in routers are traffic sampling, and sketching. However, it is not known which paradigm is inherently better at extracting informa...
Paul Tune, Darryl Veitch
INFOCOM
2011
IEEE
13 years 2 months ago
Connected coverage in wireless networks with directional antennas
—In this paper, we address a new unexplored problem - what are the optimal patterns to achieve connected coverage in wireless networks with directional antennas. As their name im...
Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weiji...
INFOCOM
2011
IEEE
13 years 2 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
INFOCOM
2011
IEEE
13 years 2 months ago
SigSag: Iterative detection through soft message-passing
—The multiple-access framework of ZigZag decoding [1] is a useful technique for combating interference via multiple repeated transmissions, and is known to be compatible with dis...
Arash Saber Tehrani, Alexandros G. Dimakis, Michae...