Sciweavers

MSWIM
2005
ACM
14 years 5 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
WS
2006
ACM
14 years 6 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
SIGCOMM
2006
ACM
14 years 6 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
CONEXT
2006
ACM
14 years 6 months ago
Neighbor discovery analysis in wireless sensor networks
In wireless sensor networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic mo...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
SIGCOMM
2009
ACM
14 years 6 months ago
Accountability in hosted virtual networks
Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual networks...
Eric Keller, Ruby B. Lee, Jennifer Rexford
SIGCOMM
2009
ACM
14 years 6 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
IMC
2009
ACM
14 years 6 months ago
The importance of being overheard: throughput gains in wireless mesh networks
A flurry of recent work has focused on the performance gains that may be achieved by leveraging the broadcast nature of the wireless channel. In particular, researchers have obse...
Mikhail Afanasyev, Alex C. Snoeren
SENSYS
2009
ACM
14 years 7 months ago
Canopy closure estimates with GreenOrbs: sustainable sensing in the forest
Motivated by the needs of precise forest inventory and realtime surveillance for ecosystem management, in this paper we present GreenOrbs [1], a wireless sensor network system and...
Lufeng Mo, Yuan He, Yunhao Liu, Jizhong Zhao, Shao...
WWW
2010
ACM
14 years 7 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
SOSP
2005
ACM
14 years 9 months ago
Implementing declarative overlays
Overlay networks are used today in a variety of distributed systems ranging from file-sharing and storage systems to communication infrastructures. However, designing, building a...
Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein...