Sciweavers

INFOCOM
2008
IEEE
15 years 7 months ago
Robust Distributed Spectrum Sensing in Cognitive Radio Networks
Abstract—Distributed spectrum sensing (DSS) enables a Cognitive Radio (CR) network to reliably detect licensed users and avoid causing interference to licensed communications. Th...
Ruiliang Chen, Jung Min Park, Kaigui Bian
54
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
A Trust and Reputation based Anti-SPIM Method
—Instant Messaging (IM) service is a killer application in the Internet. Due to the problem of IM spam (SPIM), building an effective anti-spim method is an important research top...
Jun Bi, Jianping Wu, Wenmao Zhang
65
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks
Chenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han H...
76
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
A Practical SNR-Guided Rate Adaptation
—Rate adaptation is critical to the system performance of wireless networks. Typically, rate adaptation is considered as a
Jiansong Zhang, Kun Tan, Jun Zhao, Haitao Wu, Yong...
114
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation
Abstract— In this paper we use an information-theoretic formulation for characterizing the minimum routing overhead of link state routing in a mobile ad hoc network. We formulate...
Di Wang, Alhussein A. Abouzeid
77
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Border Effects, Fairness, and Phase Transition in Large Wireless Networks
—We characterize the fairness of decentralized medium access control protocols based on CSMA/CA, such as IEEE 802.11, in large multi-hop wireless networks. In particular, we show...
Mathilde Durvy, Olivier Dousse, Patrick Thiran
115
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
A Scalable Method for Access Control in Location-Based Broadcast Services
Abstract. One important problem for such public broadcast LBS is to enforce access control on a large number of subscribers. In such a system a user typically subscribes to a LBS f...
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Li...
100
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
On the Performance of IEEE 802.11 under Jamming
—In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We study two chann...
Emrah Bayraktaroglu, Christopher King, Xin Liu, Gu...
107
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
65
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Routing in Outer Space
Alessandro Mei, Julinda Stefa