Sciweavers

Share
INFOCOM
2012
IEEE
7 years 26 days ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee
INFOCOM
2012
IEEE
7 years 26 days ago
Sharing the cost of backbone networks: Simplicity vs. precision
—Internet backbone operators face a trade-off in quantifying the costs that their customers inflict on their infrastructure since the precision of these methods depends on the r...
László Gyarmati, Michael Sirivianos,...
INFOCOM
2012
IEEE
7 years 26 days ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
INFOCOM
2012
IEEE
7 years 26 days ago
Approximate convex decomposition based localization in wireless sensor networks
—Accurate localization in wireless sensor networks is the foundation for many applications, such as geographic routing and position-aware data processing. An important research d...
Wenping Liu, Dan Wang, Hongbo Jiang, Wenyu Liu, Ch...
INFOCOM
2012
IEEE
7 years 26 days ago
Towards energy-fairness in asynchronous duty-cycling sensor networks
Abstract—In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. ...
Zhenjiang Li, Mo Li, Yunhao Liu
INFOCOM
2012
IEEE
7 years 26 days ago
Maximizing capacity with power control under physical interference model in duplex mode
—This paper addresses the joint selection and power assignment of a largest set of given links which can communicate successfully at the same time under the physical interference...
Peng-Jun Wan, Dechang Chen, Guojun Dai, Zhu Wang, ...
INFOCOM
2012
IEEE
7 years 26 days ago
Locating malicious nodes for data aggregation in wireless networks
—Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable ...
XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan,...
INFOCOM
2012
IEEE
7 years 26 days ago
HAWK: An unmanned mini helicopter-based aerial wireless kit for localization
—This paper presents a fully functional and highly portable mini Unmanned Aerial Vehicle (UAV) system, HAWK, for conducting aerial localization. HAWK is a programmable mini helic...
Zhongli Liu, Yinjie Chen, Benyuan Liu, Chengyu Cao...
INFOCOM
2012
IEEE
7 years 26 days ago
Quality-assured cloud bandwidth auto-scaling for video-on-demand applications
—There has been a recent trend that video-on-demand (VoD) providers such as Netflix are leveraging resources from cloud services for multimedia streaming. In this paper, we cons...
Di Niu, Hong Xu, Baochun Li, Shuqiao Zhao
INFOCOM
2012
IEEE
7 years 26 days ago
Scaling laws for cognitive radio network with heterogeneous mobile secondary users
—We study the capacity and delay scaling laws for cognitive radio network (CRN) with static primary users and heterogeneous mobile secondary users coexisting in the unit planar a...
Yingzhe Li, Xinbing Wang, Xiaohua Tian, Xue Liu
books