Sciweavers

Share
INFOCOM
2012
IEEE
7 years 19 days ago
L2P2: Location-aware location privacy protection for location-based services
Abstract—Location privacy has been a serious concern for mobile users who use location-based services provided by the thirdparty provider via mobile networks. Recently, there hav...
Yu Wang 0003, Dingbang Xu, Xiao He, Chao Zhang, Fa...
INFOCOM
2012
IEEE
7 years 19 days ago
Approximately optimal adaptive learning in opportunistic spectrum access
—In this paper we develop an adaptive learning algorithm which is approximately optimal for an opportunistic spectrum access (OSA) problem with polynomial complexity. In this OSA...
Cem Tekin, Mingyan Liu
INFOCOM
2012
IEEE
7 years 19 days ago
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks
—In this work we develop a distributed boundary detection algorithm, dubbed Coconut, for 3D wireless sensor networks. It first constructs a tetrahedral structure to delineate th...
Hongyu Zhou, Hongyi Wu, Miao Jin
INFOCOM
2012
IEEE
7 years 19 days ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
INFOCOM
2012
IEEE
7 years 19 days ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
INFOCOM
2012
IEEE
7 years 19 days ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
INFOCOM
2012
IEEE
7 years 19 days ago
Energy-efficient collaborative sensing with mobile phones
Xiang Sheng, Jian Tang, Weiyi Zhang
INFOCOM
2012
IEEE
7 years 19 days ago
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
—Location sharing is a fundamental component of mobile online social networks (mOSNs), which also raises significant privacy concerns. The mOSNs collect a large amount of locati...
Wei Wei, Fengyuan Xu, Qun Li
INFOCOM
2012
IEEE
7 years 19 days ago
CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks
—A cardinal prerequisite for the system design of a sensor network, is to understand the geometric environment where sensor nodes are deployed. The global topology of a largescal...
Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, C...
INFOCOM
2012
IEEE
7 years 19 days ago
Achievable transmission capacity of cognitive mesh networks with different media access control
—Spectrum sharing is an emerging mechanism to resolve the conflict between the spectrum scarcity and the growing demands for the wireless broadband access. In this paper we inve...
Tao Jing, Xiuying Chen, Yan Huo, Xiuzhen Cheng
books