Sciweavers

INFOCOM
2009
IEEE
14 years 6 months ago
On Cooperative Wireless Network Secrecy
—Given that wireless communication occurs in a shared and inherently broadcast medium, the transmissions are vulnerable to undesired eavesdropping. This occurs even when a point-...
Etienne Perron, Suhas N. Diggavi, Emre Telatar
INFOCOM
2009
IEEE
14 years 6 months ago
Cooperative Relay for Cognitive Radio Networks
—Cognitive radio has been proposed in recent years to promote the spectrum utilization by exploiting the existence of spectrum holes. The heterogeneity of both spectrum availabil...
Juncheng Jia, J. Jun Jun Zhang, Qian Zhang
INFOCOM
2009
IEEE
14 years 6 months ago
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks
—In this paper, we study the problem of constructing full-coverage three dimensional networks with multiple connectivity. We design a set of patterns for full coverage and two re...
Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia
INFOCOM
2009
IEEE
14 years 6 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
INFOCOM
2009
IEEE
14 years 6 months ago
Barrier Information Coverage with Wireless Sensors
Abstract—Sensor networks have been deployed for many barrier coverage applications such as intrusion detection and border surveillance. In these applications, it is critical to o...
Guanqun Yang, Daji Qiao
INFOCOM
2009
IEEE
14 years 6 months ago
On the Impact of Heterogeneity and Back-End Scheduling in Load Balancing Designs
—Load balancing is a common approach for task assignment in distributed architectures. In this paper, we show that the degree of inefficiency in load balancing designs is highly...
Ho-Lin Chen, Jason R. Marden, Adam Wierman
INFOCOM
2009
IEEE
14 years 6 months ago
Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket Reception
—This paper considers a slotted ALOHA random access system where users send packets to a common receiver with multipacket reception capability. A collection of m users access the...
Paolo Minero, Massimo Franceschetti
INFOCOM
2009
IEEE
14 years 6 months ago
Shadow Prices vs. Vickrey Prices in Multipath Routing
Parthasarathy Ramanujam, Zongpeng Li, Lisa Higham
INFOCOM
2009
IEEE
14 years 6 months ago
Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks
Abstract— Sum rate maximization by power control is an important, challenging, and extensively studied problem in wireless networks. It is a nonconvex optimization problem and ac...
Chee-Wei Tan, Mung Chiang, R. Srikant
INFOCOM
2009
IEEE
14 years 6 months ago
Using Failure Models for Controlling Data Availability in Wireless Sensor Networks
— This paper presents Pirrus, a replica management system that addresses the problem of providing data availability on a wireless sensor network. Pirrus uses probabilistic failur...
Riccardo Crepaldi, Mirko Montanari, Indranil Gupta...