Sciweavers

INFOCOM
2011
IEEE
13 years 3 months ago
General capacity scaling of wireless networks
—We study the general scaling laws of the capacity for random wireless networks under the generalized physical model. The generality of this work is embodied in three dimensions ...
Cheng Wang, Changjun Jiang, Xiang-Yang Li, ShaoJie...
INFOCOM
2011
IEEE
13 years 3 months ago
Prevalence and mitigation of forum spamming
—Forums on the Web are increasingly spammed by miscreants in order to attract visitors to their (often malicious) websites. In this paper, we study the prevalence of forum spammi...
Youngsang Shin, Minaxi Gupta, Steven A. Myers
INFOCOM
2011
IEEE
13 years 3 months ago
SocialFilter: Introducing social trust to collaborative spam mitigation
—We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on wheth...
Michael Sirivianos, Kyungbaek Kim, Xiaowei Yang
INFOCOM
2011
IEEE
13 years 3 months ago
Adaptive algorithms for detecting community structure in dynamic social networks
—Social networks exhibit a very special property: community structure. Understanding the network community structure is of great advantages. It not only provides helpful informat...
Nam P. Nguyen, Thang N. Dinh, Ying Xuan, My T. Tha...
INFOCOM
2011
IEEE
13 years 3 months ago
The digital rights management game in peer-to-peer streaming systems
—In this paper we model the digital rights management (DRM) for peer-to-peer streaming (P2PS) systems as a game. We construct the DRM game from both content service provider (CSP...
Jin Zhang, Wei Lou
INFOCOM
2011
IEEE
13 years 3 months ago
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd
—Opportunistic ad-hoc communication enables portable devices such as smartphones to effectively exchange information, taking advantage of their mobility and locality. The nature ...
Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannid...
INFOCOM
2011
IEEE
13 years 3 months ago
Capacity of byzantine agreement with finite link capacity
—We consider the problem of maximizing the throughput of Byzantine agreement, when communication links have finite capacity. Byzantine agreement is a classical problem in distri...
Guanfeng Liang, Nitin H. Vaidya
INFOCOM
2011
IEEE
13 years 3 months ago
There's something about MRAI: Timing diversity can exponentially worsen BGP convergence
—To better support interactive applications, individual network operators are decreasing the timers that affect BGP convergence, leading to greater diversity in the timer setting...
Alex Fabrikant, Umar Syed, Jennifer Rexford
INFOCOM
2011
IEEE
13 years 3 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
INFOCOM
2011
IEEE
13 years 3 months ago
On power and throughput tradeoffs of WiFi and Bluetooth in smartphones
Abstract—This paper describes a combined power and throughput performance study of WiFi and Bluetooth usage in smartphones. The study reveals several interesting phenomena and tr...
Roy Friedman, Alex Kogan, Yevgeny Krivolapov