Sciweavers

INFOCOM
2008
IEEE
14 years 6 months ago
Information Concealing Games
— Consider the situation in which a decision maker (Actor) has to decide which of several available resources to use in the presence of an adversary (called Controller) that can ...
Saswati Sarkar, Eitan Altman, Rachid El Azouzi, Ye...
INFOCOM
2008
IEEE
14 years 6 months ago
A Distributed Minimum-Distortion Routing Algorithm with In-Network Data Processing
—In many wired and wireless networks, nodes process input traffic to satisfy a network constraint (e.g. capacity constraints) and to increase the utility of data in the output ...
Ramin Khalili, James F. Kurose
INFOCOM
2008
IEEE
14 years 6 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu
INFOCOM
2008
IEEE
14 years 6 months ago
Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method
Chengchen Hu, Sheng Wang, Jia Tian, Bin Liu, Yu Ch...
INFOCOM
2008
IEEE
14 years 6 months ago
Utility-Driven Spatiotemporal Sampling Using Mobile Sensors
Many real-world applications for sensor networks require event sampling with sufficient resolution over both spatial and temporal dimensions. When the deployed nodes are insuffi...
Yang Yu, Loren J. Rittle
INFOCOM
2008
IEEE
14 years 6 months ago
How Bad is Suboptimal Rate Allocation?
Abstract—Not too bad. A rate allocation that is suboptimal with respect to a utility maximization formulation still maintains the maximum flow-level stability when the utility g...
Tian Lan, Xiaojun Lin, Mung Chiang, Ruby B. Lee
INFOCOM
2008
IEEE
14 years 6 months ago
DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile Networks
—The publish/subscribe (pub/sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extending a pub/sub system in ...
Quan Yuan, Jie Wu
INFOCOM
2008
IEEE
14 years 6 months ago
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks
Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Gu...
INFOCOM
2008
IEEE
14 years 6 months ago
On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm
Abstract—Energy efficiency is critical for wireless sensor networks. The data gathering process must be carefully designed to conserve energy and extend the network lifetime. Fo...
Yan Wu, Sonia Fahmy, Ness B. Shroff