Sciweavers

217 search results - page 43 / 44
» infocom 2008
Sort
View
INFOCOM
2008
IEEE
13 years 11 months ago
On the Levy-Walk Nature of Human Mobility
—We report that human walks performed in outdoor settings of tens of kilometers resemble a truncated form of Levy walks commonly observed in animals such as monkeys, birds and ja...
Injong Rhee, Minsu Shin, Seongik Hong, Kyunghan Le...
INFOCOM
2008
IEEE
13 years 11 months ago
iPack: in-Network Packet Mixing for High Throughput Wireless Mesh Networks
—A major barrier for the adoption of wireless mesh networks is severe limits on throughput. Many in-network packet mixing techniques at the network layer [1], [2], [3] as well as...
Richard Alimi, Erran L. Li, Ramachandran Ramjee, H...
INFOCOM
2008
IEEE
13 years 11 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
INFOCOM
2006
IEEE
13 years 11 months ago
JetMax: Scalable Max-Min Congestion Control for High-Speed Heterogeneous Networks
Recent surge of interest towards congestion control that relies on single-link feedback (e.g., XCP, RCP, MaxNet, EMKC, VCP), suggests that such systems may offer certain benefit...
Yueping Zhang, Derek Leonard, Dmitri Loguinov
CCS
2009
ACM
14 years 19 hour ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...