Sciweavers

274 search results - page 27 / 55
» infocom 2010
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
67
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Buffer Management for Aggregated Streaming Data with Packet Dependencies
Abstract—In many applications the traffic traversing the network has inter-packet dependencies due to application-level encoding schemes. For some applications, e.g., multimedia...
Gabriel Scalosub, Peter Marbach, Jörg Liebehe...
INFOCOM
2010
IEEE
14 years 8 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou
INFOCOM
2010
IEEE
14 years 8 months ago
Efficient Continuous Scanning in RFID Systems
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous sca...
Bo Sheng, Qun Li, Weizhen Mao
108
Voted
INFOCOM
2010
IEEE
14 years 7 months ago
Optimal Control of Wireless Networks with Finite Buffers
This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achie...
Long Bao Le, Eytan Modiano, Ness B. Shroff