Sciweavers

Share
INFOCOM
2012
IEEE
6 years 11 months ago
Low-stretch greedy embedding heuristics
—Greedy embedding is a graph embedding that makes the simple greedy packet forwarding scheme successful for every source-destination pair. It is desirable that graph embeddings a...
Andrej Cvetkovski, Mark Crovella
INFOCOM
2012
IEEE
6 years 11 months ago
Coding and replication co-design for interactive multiview video streaming
—Multiview video refers to the simultaneous capturing of multiple video views with an array of closely spaced cameras. In an interactive multiview video streaming (IMVS) system, ...
Huan Huang, Bo Zhang, S.-H. Gary Chan, Gene Cheung...
INFOCOM
2012
IEEE
6 years 11 months ago
Combinatorial auction with time-frequency flexibility in cognitive radio networks
—In this paper, we tackle the spectrum allocation problem in cognitive radio (CR) networks with time-frequency flexibility consideration using combinatorial auction. Different f...
Mo Dong, Gaofei Sun, Xinbing Wang, Qian Zhang
INFOCOM
2012
IEEE
6 years 11 months ago
Comparing alternative approaches for networking of named objects in the future Internet
Abstract—This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme prop...
Akash Baid, Tam Vu, Dipankar Raychaudhuri
INFOCOM
2012
IEEE
6 years 11 months ago
Robust multi-source network tomography using selective probes
—Knowledge of a network’s topology and internal characteristics such as delay times or losses is crucial to maintain seamless operation of network services. Network tomography ...
Akshay Krishnamurthy, Aarti Singh
INFOCOM
2012
IEEE
6 years 11 months ago
Enhanced wireless channel authentication using time-synched link signature
Abstract— Wireless link signature is a physical layer authentication mechanism, which uses the unique wireless channel characteristics between a transmitter and a receiver to pro...
Yao Liu, Peng Ning
INFOCOM
2012
IEEE
6 years 11 months ago
Truthful prioritization schemes for spectrum sharing
Abstract—As the rapid expansion of smart phones and associated data-intensive applications continues, we expect to see renewed interest in dynamic prioritization schemes as a way...
Victor Shnayder, Jeremy Hoon, David C. Parkes, Vik...
INFOCOM
2012
IEEE
6 years 11 months ago
STROBE: Actively securing wireless communications using Zero-Forcing Beamforming
Abstract—We present the design and experimental evaluation of Simultaneous TRansmission with Orthogonally Blinded Eavesdroppers (STROBE). STROBE is a cross-layer approach that ex...
Narendra Anand, Sung-Ju Lee, Edward W. Knightly
INFOCOM
2012
IEEE
6 years 11 months ago
Maximizing system throughput by cooperative sensing in Cognitive Radio Networks
—Cognitive Radio Networks allow unlicensed users to opportunistically access the licensed spectrum without causing disruptive interference to the primary users (PUs). One of the ...
Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shro...
INFOCOM
2012
IEEE
6 years 11 months ago
LBA: Lifetime balanced data aggregation in low duty cycle sensor networks
—This paper proposes LBA, a lifetime balanced data aggregation scheme for asynchronous and duty cycle sensor networks under an application-specific requirement of end-to-end dat...
Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang
books