Sciweavers

INFOCOM
2011
IEEE
12 years 7 months ago
A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface
Abstract—Triangulation serves as the basis for many geometrybased algorithms in wireless sensor networks. In this paper we propose a distributed algorithm that produces a triangu...
Hongyu Zhou, Hongyi Wu, Su Xia, Miao Jin, Ning Din...
INFOCOM
2011
IEEE
12 years 7 months ago
Does wireless sensor network scale? A measurement study on GreenOrbs
Yunhao Liu, Yuan He, Mo Li, Jiliang Wang, Kebin Li...
INFOCOM
2011
IEEE
12 years 7 months ago
Optimal control of epidemic evolution
—Epidemic models based on nonlinear differential equations have been extensively applied in a variety of systems as diverse as infectious outbreaks, marketing, diffusion of belie...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
INFOCOM
2011
IEEE
12 years 7 months ago
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets
Abstract—Secondary spectrum access is emerging as a promising approach for mitigating the spectrum scarcity in wireless networks. Coordinated spectrum access for secondary users ...
Ajay Gopinathan, Zongpeng Li, Chuan Wu
INFOCOM
2011
IEEE
12 years 7 months ago
SMALL: A Strategy-proof Mechanism for radio spectrum allocation
Abstract—With the growing deployment of wireless communication technologies, radio spectrum is becoming a scarce resource. Thus mechanisms to efficiently allocate the available ...
Fan Wu, Nitin H. Vaidya
INFOCOM
2011
IEEE
12 years 7 months ago
Aggregation capacity of wireless sensor networks: Extended network case
—A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a s...
Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang...
INFOCOM
2011
IEEE
12 years 7 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi
INFOCOM
2011
IEEE
12 years 7 months ago
Forwarding anomalies in Bloom filter-based multicast
Abstract—Several recently proposed multicast protocols use inpacket Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-fl...
Mikko Särelä, Christian Esteve Rothenber...
INFOCOM
2011
IEEE
12 years 7 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
INFOCOM
2011
IEEE
12 years 7 months ago
Optimal channel assignment and power allocation for dual-hop multi-channel multi-user relaying
Abstract—We consider the problem of jointly optimizing channel pairing, channel-user assignment, and power allocation in a single-relay multiple-access system. The optimization o...
Mahdi Hajiaghayi, Min Dong, Ben Liang