Sciweavers

INFOCOM
2006
IEEE
13 years 11 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
INFOCOM
2006
IEEE
13 years 11 months ago
Information Dissemination in Power-Constrained Wireless Networks
— Dissemination of common information through broadcasting is an integral part of wireless network operations such as query of interested events, resource discovery and code upda...
Rong Zheng
INFOCOM
2006
IEEE
13 years 11 months ago
Locating Sensors in Concave Areas
Abstract— In sensor network localization, multihop based approaches were proposed to approximate the shortest paths to Euclidean distances between pairwise sensors. A good approx...
Chen Wang, Li Xiao
INFOCOM
2006
IEEE
13 years 11 months ago
Proportional Replication in Peer-to-Peer Networks
— We recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages....
Saurabh Tewari, Leonard Kleinrock
INFOCOM
2006
IEEE
13 years 11 months ago
A Compound TCP Approach for High-Speed and Long Distance Networks
—Many applications require fast data transfer over high speed and long distance networks. However, standard TCP fails to fully utilize the network capacity due to the limitation ...
Kun Tan, Jingmin Song, Qian Zhang, Murari Sridhara...
INFOCOM
2006
IEEE
13 years 11 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
INFOCOM
2006
IEEE
13 years 11 months ago
The Case for Non-Cooperative Multihoming of Users to Access Points in IEEE 802.11 WLANs
— In many cases, a mobile user has the option of connecting to one of several IEEE 802.11 access points (APs), each using an independent channel. User throughput in each AP is de...
Srinivas Shakkottai, Eitan Altman, Anurag Kumar
INFOCOM
2006
IEEE
13 years 11 months ago
On the Interaction Between Dynamic Routing in Native and Overlay Layers
Srinivasan Seetharaman, Mostafa H. Ammar
INFOCOM
2006
IEEE
13 years 11 months ago
Seeing the Difference in IP Traffic: Wireless Versus Wireline
Julien Ridoux, Antonio Nucci, Darryl Veitch