Sciweavers

INFOCOM
2010
IEEE
13 years 2 months ago
Non-Preemptive Buffer Management for Latency Sensitive Packets
—The delivery of latency sensitive packets is a crucial issue in real time applications of communication networks. Such packets often have a firm deadline and a packet becomes u...
Moran Feldman, Joseph Naor
INFOCOM
2010
IEEE
13 years 2 months ago
Maximizing the Contact Opportunity for Vehicular Internet Access
Abstract—With increasing popularity of media enabled handhelds, the need for high data-rate services for mobile users is evident. Large-scale Wireless LANs (WLANs) can provide su...
Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kum...
INFOCOM
2010
IEEE
13 years 2 months ago
Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks
Abstract—Spectrum sensing is one of the key enabling technologies in Cognitive Radio Networks (CRNs). In CRNs, secondary users (SUs) are allowed to exploit the spectrum opportuni...
Yanyan Yang, Yunhuai Liu, Qian Zhang, Lionel M. Ni
INFOCOM
2010
IEEE
13 years 2 months ago
High Performance Dictionary-Based String Matching for Deep Packet Inspection
—Dictionary-Based String Matching (DBSM) is used in network Deep Packet Inspection (DPI) applications virus scanning [1] and network intrusion detection [2]. We propose the Pipel...
Yi-Hua Edward Yang, Hoang Le, Viktor K. Prasanna
INFOCOM
2010
IEEE
13 years 2 months ago
Effective Carrier Sensing in CSMA Networks under Cumulative Interference
—This paper proposes and investigates the concept of a safe carrier-sensing range that guarantees interference-safe (also termed hidden-node-free) transmissions in CSMA networks ...
Liqun Fu, Soung Chang Liew, Jianwei Huang
INFOCOM
2010
IEEE
13 years 2 months ago
Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply Uncertainty
Abstract—This paper presents the first analytical study of optimal investment and pricing decisions of a cognitive mobile virtual network operator (C-MVNO) under spectrum supply...
Lingjie Duan, Jianwei Huang, Biying Shou
INFOCOM
2010
IEEE
13 years 2 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
INFOCOM
2010
IEEE
13 years 2 months ago
Information Quality Aware Routing in Event-Driven Sensor Networks
—Upon the occurrence of a phenomenon of interest in a wireless sensor network, multiple sensors may be activated, leading to data implosion and redundancy. Data aggregation and/o...
Hwee-Xian Tan, Mun-Choon Chan, Wendong Xiao, Peng ...
INFOCOM
2010
IEEE
13 years 2 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...