Sciweavers

INFOCOM
2009
IEEE
13 years 11 months ago
Topological Data Processing for Distributed Sensor Networks with Morse-Smale Decomposition
Abstract—We are interested in topological analysis and processing of the large-scale distributed data generated by sensor networks. Naturally a large-scale sensor network is depl...
Xianjin Zhu, Rik Sarkar, Jie Gao
INFOCOM
2009
IEEE
13 years 11 months ago
Proportional Fair Frequency-Domain Packet Scheduling for 3GPP LTE Uplink
—With the power consumption issue of mobile handset taken into account, Single-carrier FDMA (SC-FDMA) has been selected for 3GPP Long-Term Evolution (LTE) uplink multiple access ...
Suk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, S...
INFOCOM
2009
IEEE
13 years 11 months ago
Blind Detection of Spread Spectrum Flow Watermarks
— Recently, the direct sequence spread-spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous pseudo-noise (PN) codes...
Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Don...
INFOCOM
2009
IEEE
13 years 11 months ago
Power-Aware Speed Scaling in Processor Sharing Systems
—Energy use of computer communication systems has quickly become a vital design consideration. One effective method for reducing energy consumption is dynamic speed scaling, whic...
Adam Wierman, Lachlan L. H. Andrew, Ao Tang
INFOCOM
2009
IEEE
13 years 11 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
INFOCOM
2009
IEEE
13 years 11 months ago
A Threshold Based MAC Protocol for Cooperative MIMO Transmissions
— This paper develops a distributed, threshold based MAC protocol for cooperative Multi Input Multi Output (MIMO) transmissions in distributed wireless systems. The protocol uses...
Haiming Yang, Hsin-Yi Shen, Biplab Sikdar, Shivkum...
INFOCOM
2009
IEEE
13 years 11 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
INFOCOM
2009
IEEE
13 years 11 months ago
BitTorrent: An Extensible Heterogeneous Model
—Peer-to-peer (P2P) systems in general, and BitTorrent (BT) specifically, have been of significant interest to researchers rnet users alike. Existing models of BT abstract away...
Alix L. H. Chow, Leana Golubchik, Vishal Misra
INFOCOM
2009
IEEE
13 years 11 months ago
Diverse Routing in Networks with Probabilistic Failures
—We develop diverse routing schemes for dealing with multiple, possibly correlated, failures. While disjoint path protection can effectively deal with isolated single link failur...
Hyang-Won Lee, Eytan Modiano