Sciweavers

TON
2016
51views more  TON 2016»
10 years 13 days ago
Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation
—We consider a distributed multi-user system where individual entities possess observations or perceptions of one another, while the truth is only known to themselves and they mi...
Parinaz Naghizadeh, Mingyan Liu
TON
2016
44views more  TON 2016»
10 years 13 days ago
A Difference Resolution Approach to Compressing Access Control Lists
—Access Control Lists (ACLs) are the core of many networking and security devices. As new threats and vulnerabilities emerge, ACLs on routers and firewalls are getting larger. T...
James Daly, Alex X. Liu, Eric Torng
TON
2016
51views more  TON 2016»
10 years 13 days ago
Understanding RFID Counting Protocols
Counting the number of RFID tags, or RFID counting, is needed by a wide array of important wireless applications. Motivated by its paramount practical importance, researchers have...
Ziling Zhou, Binbin Chen, Haifeng Yu
TON
2016
46views more  TON 2016»
10 years 13 days ago
Migration Towards Cloud-Assisted Live Media Streaming
—Live media streaming has become one of the most popular applications over the Internet. We have witnessed the successful deployment of commercial systems with CDN- or peerto-pee...
Feng Wang, Jiangchuan Liu, Minghua Chen, Haiyang W...
TON
2016
44views more  TON 2016»
10 years 13 days ago
Multipath TCP: Analysis, Design, and Implementation
—Multi-path TCP (MP-TCP) has the potential to greatly improve application performance by using multiple paths transparently. We propose a fluid model for a large class of MP-TCP...
Qiuyu Peng, Anwar Walid, Jaehyun Hwang, Steven H. ...