Sciweavers

INFOCOM
2008
IEEE
13 years 11 months ago
Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh Networks
Ehsan Aryafar, Omer Gurewitz, Edward W. Knightly
INFOCOM
2008
IEEE
13 years 11 months ago
Robust Planarization of Unlocalized Wireless Sensor Networks
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
Fenghui Zhang, Anxiao Jiang, Jianer Chen
INFOCOM
2008
IEEE
13 years 11 months ago
Turbo King: Framework for Large-Scale Internet Delay Measurements
—Distance estimation and topological proximity in the Internet have recently emerged as important problems for many distributed applications [1], [10], [11], [19], [29], [31], [4...
Derek Leonard, Dmitri Loguinov
INFOCOM
2008
IEEE
13 years 11 months ago
Opportunistic Spectrum Access in Cognitive Radio Networks
Senhua Huang, Xin Liu, Zhi Ding
INFOCOM
2008
IEEE
13 years 11 months ago
Minimum Cost Data Aggregation with Localized Processing for Statistical Inference
—The problem of minimum cost in-network fusion of measurements, collected from distributed sensors via multihop routing is considered. A designated fusion center performs an opti...
Animashree Anandkumar, Lang Tong, Ananthram Swami,...
INFOCOM
2008
IEEE
13 years 11 months ago
On Wireless Social Community Networks
—Wireless social community networks are emerging as a new alternative to provide wireless data access in urban areas. By relying on users in the network deployment, a wireless co...
Mohammad Hossein Manshaei, Julien Freudiger, M&aac...
INFOCOM
2008
IEEE
13 years 11 months ago
Maximizing Restorable Throughput in MPLS Networks
Abstract—MPLS recovery mechanisms are increasing in popularity because they can guarantee fast restoration and high QoS assurance. Their main advantage is that their backup paths...
Reuven Cohen, Gabi Nakibly
INFOCOM
2008
IEEE
13 years 11 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang
INFOCOM
2008
IEEE
13 years 11 months ago
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming
—This paper presents a systematic in-depth study on the existence, importance, and application of stable nodes in peerto-peer live video streaming. Using traces from a real large...
Feng Wang, Jiangchuan Liu, Yongqiang Xiong
INFOCOM
2008
IEEE
13 years 11 months ago
Decentralized Rate Regulation in Random Access Channels
—We consider a time-slotted multipacket reception channel, shared by a finite number of mobile users who transmit to a common base station. Each user is allocated a fixed data ...
Ishai Menache, Nahum Shimkin