Sciweavers

TON
2016
54views more  TON 2016»
8 years 7 months ago
Effect of Retransmission and Retrodiction on Estimation and Fusion in Long-Haul Sensor Networks
—In a long-haul sensor network, sensors are remotely deployed over a large geographical area to perform certain tasks, such as target tracking. In this work, we study the scenari...
Qiang Liu, Xin Wang, Nageswara S. V. Rao, Katharin...
TON
2016
32views more  TON 2016»
8 years 7 months ago
On Channel Failures, File Fragmentation Policies, and Heavy-Tailed Completion Times
—It has been recently discovered that heavy-tailed completion times can result from protocol interaction even when file sizes are light-tailed. A key to this phenomenon is the u...
Jayakrishnan Nair, Martin Andreasson, Lachlan L. H...
TON
2016
61views more  TON 2016»
8 years 7 months ago
Discharging the Network From Its Flow Control Headaches: Packet Drops and HOL Blocking
Abstract—Congestion control becomes indispensable in highlyutilized consolidated networks running demanding applications. In this paper, proactive congestion management schemes f...
Nikolaos Chrysos, Lydia Y. Chen, Christoforos Kach...
TON
2016
61views more  TON 2016»
8 years 7 months ago
A Scalable and Resilient Layer-2 Network With Ethernet Compatibility
—We present the architecture and protocols of ROME, a layer-2 network designed to be backwards compatible with Ethernet and scalable to tens of thousands of switches and millions...
Chen Qian, Simon S. Lam
TON
2016
41views more  TON 2016»
8 years 7 months ago
Information Source Detection in the SIR Model: A Sample-Path-Based Approach
Abstract—This paper studies the problem of detecting the information source in a network in which the spread of information follows the popular Susceptible-Infected-Recovered (SI...
Kai Zhu, Lei Ying
TON
2016
57views more  TON 2016»
8 years 7 months ago
Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and Algorithms
—Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users’ channel state diversity (induced by fast-fading), and are ...
Robert Margolies, Ashwin Sridharan, Vaneet Aggarwa...
TON
2016
41views more  TON 2016»
8 years 7 months ago
On Distributed Virtual Network Embedding With Guarantees
—To provide wide-area network services, resources from different infrastructure providers are needed. Leveraging the consensus-based resource allocation literature, we propose a ...
Flavio Esposito, Donato Di Paola, Ibrahim Matta
TON
2016
45views more  TON 2016»
8 years 7 months ago
Optimal Placement for Barrier Coverage in Bistatic Radar Sensor Networks
Xiaowen Gong, Junshan Zhang, Douglas Cochran, Kai ...
TON
2016
51views more  TON 2016»
8 years 7 months ago
Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation
—We consider a distributed multi-user system where individual entities possess observations or perceptions of one another, while the truth is only known to themselves and they mi...
Parinaz Naghizadeh, Mingyan Liu
TON
2016
44views more  TON 2016»
8 years 7 months ago
A Difference Resolution Approach to Compressing Access Control Lists
—Access Control Lists (ACLs) are the core of many networking and security devices. As new threats and vulnerabilities emerge, ACLs on routers and firewalls are getting larger. T...
James Daly, Alex X. Liu, Eric Torng