Sciweavers

INFOCOM
2009
IEEE
13 years 11 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
INFOCOM
2009
IEEE
13 years 11 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
INFOCOM
2009
IEEE
13 years 11 months ago
Tuning Skype's Redundancy Control Algorithm for User Satisfaction
—Determining how to transport delay-sensitive voice data has long been a problem in multimedia networking. The difficulty arises because voice and best-effort data are different...
Te-Yuan Huang, Kuan-Ta Chen, Polly Huang
INFOCOM
2009
IEEE
13 years 11 months ago
DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks
—Congestion control in wireless multi-hop networks is challenging and complicated because of two reasons. First, interference is ubiquitous and causes loss in the shared medium. ...
Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha...
INFOCOM
2009
IEEE
13 years 11 months ago
Capabilities of Low-Power Wireless Jammers
— In this paper, motivated by the goal of modeling the fine-grain capabilities of jammers for the context of security in low-power wireless networks, we experimentally character...
Lifeng Sang, Anish Arora
INFOCOM
2009
IEEE
13 years 11 months ago
Distributed Opportunistic Scheduling With Two-Level Channel Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
INFOCOM
2009
IEEE
13 years 11 months ago
Medium Access Control for 60 GHz Outdoor Mesh Networks with Highly Directional Links
—We investigate an architecture for multi-Gigabit outdoor mesh networks operating in the unlicensed 60 GHz “millimeter (mm) wave” band. In this band, the use of narrow beams ...
Raghuraman Mudumbai, Sumit Singh, Upamanyu Madhow
INFOCOM
2009
IEEE
13 years 11 months ago
Using NEMO to Support the Global Reachability of MANET Nodes
—Mobile Ad hoc Network (MANET) routing protocols have been the focus of an accomplished research effort for many years within the networking community and now the results of this...
Ben McCarthy, Christopher Edwards, Martin Dunmore
INFOCOM
2009
IEEE
13 years 11 months ago
Assessing the Vulnerability of the Fiber Infrastructure to Disasters
—Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such r...
Sebastian Neumayer, Gil Zussman, Reuven Cohen, Eyt...
INFOCOM
2009
IEEE
13 years 11 months ago
Minimum Maximum Degree Publish-Subscribe Overlay Network Design
—Designing an overlay network for publish/subscribe communication in a system where nodes may subscribe to many different topics of interest is of fundamental importance. For sca...
Melih Onus, Andréa W. Richa