Sciweavers

150
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
A prior-free revenue maximizing auction for secondary spectrum access
—Dynamic spectrum allocation has proven promising for mitigating the spectrum scarcity problem. In this model, primary users lease chunks of under-utilized spectrum to secondary ...
Ajay Gopinathan, Zongpeng Li
145
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Finite-horizon energy allocation and routing scheme in rechargeable sensor networks
Abstract—In this paper, we investigate the problem of maximizing the throughput over a finite-horizon time period for a sensor network with energy replenishment. The finite-horiz...
Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changh...
162
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Ubiquitous data collection for mobile users in wireless sensor networks
Abstract—We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data....
Zhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao
156
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
User-centric data dissemination in disruption tolerant networks
Abstract—Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user...
Wei Gao, Guohong Cao
157
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
140
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
On the throughput scaling of Cognitive Radio ad hoc networks
Abstract—Due to the emergence of Cognitive Radio, a special type of heterogeneous networks attracts increasing interest recently, in which a secondary network composed of cogniti...
Chengzhi Li, Huaiyu Dai
171
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Reconciling privacy preservation and intrusion detection in sensory data aggregation
—When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actua...
Chuang Wang, Guiling Wang, Wensheng Zhang 0001, Ta...
162
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Opportunistic spectrum access for mobile cognitive radios
—Cognitive radios (CRs) can mitigate the impending spectrum scarcity problem by utilizing their capability of accessing licensed spectrum bands opportunistically. While most exis...
Alexander W. Min, Kyu-Han Kim, Jatinder Pal Singh,...
188
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks
Abstract—We propose a routing metric for enabling highthroughput reliable multicast in multi-rate wireless mesh networks. This new multicast routing metric, called expected multi...
Xin Zhao, Jun Guo, Chun Tung Chou, Archan Misra, S...
151
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Multi-path routing and rate allocation for multi-source video on-demand streaming in wireless mesh networks
Abstract—We study the multi-source video on-demand application in multi-channel multi-radio wireless mesh networks. When a user initiates a new video request, the application can...
Yong Ding, Yang Yang, Li Xiao