Sciweavers

274 search results - page 21 / 55
» infocom 2010
Sort
View
114
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
103
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
The Impact of Virtualization on Network Performance of Amazon EC2 Data Center
Abstract--Cloud computing services allow users to lease computing resources from large scale data centers operated by service providers. Using cloud services, users can deploy a wi...
Guohui Wang, T. S. Eugene Ng
INFOCOM
2010
IEEE
14 years 8 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
INFOCOM
2010
IEEE
14 years 8 months ago
Resource Allocation in Multi-cell OFDMA-based Relay Networks
Abstract— Cooperative relay networks combined with Orthogonal Frequency Division Multiplexing Access (OFDMA) technology has been widely recognized as a promising candidate for fu...
Yao Hua, Qian Zhang, Zhisheng Niu
INFOCOM
2010
IEEE
14 years 8 months ago
An Optimal Key Distribution Scheme for Secure Multicast Group Communication
Abstract— Many IP multicast-based applications, such as multimedia conferencing, multiplayer games, require controlling the group memberships of senders and receivers. One common...
Zhibin Zhou, Dijiang Huang