Sciweavers

COMSNETS
2012
222views more  COMSNETS 2012»
12 years 8 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
COMSNETS
2012
205views more  COMSNETS 2012»
12 years 8 months ago
RODEO: Robust and rapidly deployable TDM mesh with QoS differentiation
Abstract—We present RODEO, a RObust and rapidly DEplOyable wireless mesh network designed for applications such as disaster management. Natural disasters often destroy existing c...
Aniesh Chawla, Vinay Yadav, Vasu Dev Sharma, Jitin...
COMSNETS
2012
199views more  COMSNETS 2012»
12 years 8 months ago
Varanus: More-with-less fault localization in data centers
Abstract—Detecting and localizing performance faults is crucial for operating large enterprise data centers. This problem is relatively straightforward to solve if each entity (a...
Vaishali P. Sadaphal, Maitreya Natu, Harrick M. Vi...
COMSNETS
2012
163views more  COMSNETS 2012»
12 years 8 months ago
Steptacular: An incentive mechanism for promoting wellness
Abstract—This paper describes Steptacular, an online interactive incentive system for encouraging people to walk more. A trial offering Steptacular to the employees of Accenture-...
Naini Gomes, Deepak Merugu, Gearoid O'Brien, Chinm...
COMSNETS
2012
176views more  COMSNETS 2012»
12 years 8 months ago
Capacity of Byzantine consensus in capacity limited point-to-point networks
—In this paper, we investigate the problem of maximizing the throughput, i.e., achieving capacity, of Byzantine consensus in point-to-point networks, in which each link has a cap...
Guanfeng Liang, Nitin H. Vaidya
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 8 months ago
Exploring the design space of social network-based Sybil defenses
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
Bimal Viswanath, Mainack Mondal, Allen Clement, Pe...
COMSNETS
2012
183views more  COMSNETS 2012»
12 years 8 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
COMSNETS
2012
182views more  COMSNETS 2012»
12 years 8 months ago
Hierarchy-aware distributed overlays in data centers using DC2
—Popular online services such as social networks, e-commerce and bidding are routinely hosted in large-scale data centers. Group communication systems (e.g., multicast) and distr...
Karthik Nagaraj, Hitesh Khandelwal, Charles Edwin ...
COMSNETS
2012
297views more  COMSNETS 2012»
12 years 8 months ago
Optimizing cloud resources for delivering IPTV services through virtualization
—Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings to the operator. However, achieving simila...
Vaneet Aggarwal, Vijay Gopalakrishnan, Rittwik Jan...
COMSNETS
2012
168views more  COMSNETS 2012»
12 years 8 months ago
Limitations of scanned human copresence encounters for modelling proximity-borne malware
—Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. We ...
James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geof...