Stop the war!
Остановите войну!
for scientists:
default search action
31st INFOCOM 2012: Orlando, FL, USA
- Albert G. Greenberg, Kazem Sohraby:
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012. IEEE 2012, ISBN 978-1-4673-0773-4 - Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Exact throughput capacity under power control in mobile ad hoc networks. 1-9 - Yujun Zhang, Guiling Wang, Qi Hu, Zhongcheng Li, Jie Tian:
Design and performance study of a Topology-Hiding Multipath Routing protocol for mobile ad hoc networks. 10-18 - Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zhang, Liusheng Huang:
Capacity of distributed content delivery in large-scale wireless ad hoc networks. 19-27 - Nguyen Tien Viet, François Baccelli:
On the spatial modeling of wireless networks by random packing models. 28-36 - Richard Southwell, Jianwei Huang, Xin Liu:
Spectrum mobility games. 37-45 - Yingzhe Li, Xinbing Wang, Xiaohua Tian, Xue Liu:
Scaling laws for cognitive radio network with heterogeneous mobile secondary users. 46-54 - Yao Zhao, Hongyi Wu, Miao Jin, Su Xia:
Localization in 3D surface sensor networks: Challenges and solutions. 55-63 - Chenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi:
WILL: Wireless indoor localization without site survey. 64-72 - Zhiguo Wan, Kai Xing, Yunhao Liu:
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks. 73-81 - Jayashree Subramanian, Robert Tappan Morris, Hari Balakrishnan:
UFlood: High-throughput flooding over wireless mesh networks. 82-90 - Mohsen Sardari, Ahmad Beirami, Faramarz Fekri:
Memory-assisted universal compression of network flows. 91-99 - Peng Li, Song Guo, Shui Yu, Athanasios V. Vasilakos:
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. 100-108 - Jin Teng, Junda Zhu, Boying Zhang, Dong Xuan, Yuan F. Zheng:
E-V: Efficient visual surveillance with electronic footprints. 109-117 - Junkun Li, Jiming Chen, Ten-Hwang Lai:
Energy-efficient intrusion detection with a barrier of probabilistic sensors. 118-126 - Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu:
Submodular game for distributed application allocation in shared sensor networks. 127-135 - Huai-Lei Fu, Hou-Chun Chen, Phone Lin, Yuguang Fang:
Energy-efficient reporting mechanisms for multi-type real-time monitoring in Machine-to-Machine communications networks. 136-144 - Hongkun Li, Yu Cheng, Xiaohua Tian, Xinbing Wang:
A generic framework for throughput-optimal control in MR-MC wireless networks. 145-153 - Riccardo Crepaldi, Jeongkeun Lee, Raúl H. Etkin, Sung-Ju Lee, Robin Kravets:
CSI-SF: Estimating wireless channel state using CSI sampling & fusion. 154-162 - Feng Wang, Dan Wang, Jiangchuan Liu:
EleSense: Elevator-assisted wireless sensor data collection for high-rise structure monitoring. 163-171 - Hongxing Li, Chuan Wu, Zongpeng Li, Wei Huang, Francis C. M. Lau:
Stochastic optimal multirate multicast in socially selfish wireless networks. 172-180 - Chunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei:
VDN: Virtual machine image distribution network for cloud data centers. 181-189 - Yang Song, Murtaza Zafer, Kang-Won Lee:
Optimal bidding in spot instance market. 190-198 - Feng Wang, Jiangchuan Liu, Minghua Chen:
CALMS: Cloud-assisted live media streaming for globalized demands with time/region diversities. 199-207 - Orathai Sukwong, Akkarit Sangpetch, Hyong S. Kim:
SageShift: Managing SLAs for highly consolidated cloud. 208-216 - Huan Ma, Meng Yang, Deying Li, Yi Hong, Wenping Chen:
Minimum camera barrier coverage in wireless camera sensor networks. 217-225 - Dengyuan Wu, Dechang Chen, Kai Xing, Xiuzhen Cheng:
A statistical approach for target counting in sensor-based surveillance systems. 226-234 - Nan Hua, Ashwin Lall, Baochun Li, Jun (Jim) Xu:
A simpler and better design of error estimating coding. 235-243 - Xi Fang, Dejun Yang, Guoliang Xue:
Strategizing surveillance for resource-constrained event monitoring. 244-252 - Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Multicast capacity, delay and delay jitter in intermittently connected mobile networks. 253-261 - Xiaoyu Chu, Harish Sethu:
Cooperative topology control with adaptation for improved lifetime in wireless ad hoc networks. 262-270 - Xi Chen, Wentao Huang, Xinbing Wang, Xiaojun Lin:
Multicast capacity in mobile wireless ad hoc network with infrastructure support. 271-279 - Xi Fang, Dejun Yang, Guoliang Xue:
Resource allocation in load-constrained multihopwireless networks. 280-288 - Mustafa Al-Bado, Cigdem Sengul, Ruben Merz:
What details are needed for wireless simulations? - A study of a site-specific indoor wireless model. 289-297 - Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A service for controlling information dissemination in wireless networks. 298-306 - Haopeng Li, Jiang Xie:
A low-cost channel scheduling design for multi-hop handoff delay reduction in internet-based wireless mesh networks. 307-315 - Michael J. Neely, Arash Saber Tehrani, Zhen Zhang:
Dynamic index coding for wireless broadcast networks. 316-324 - Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang Xue, Zongpeng Li:
On benefits of network coding in bidirected networks and hyper-networks. 325-333 - Hsiao-Chen Lu, Wanjiun Liao:
Cooperative multicasting in network-coding enabled multi-rate wireless relay networks. 334-342 - Anh Le, Athina Markopoulou:
On detecting pollution attacks in inter-session network coding. 343-351 - Nathaniel M. Jones, Brooke Shrader, Eytan H. Modiano:
Optimal routing and scheduling for a simple network coding scheme. 352-360 - Yongle Cao, Shuo Guo, Tian He:
Robust multi-pipeline scheduling in low-duty-cycle wireless sensor networks. 361-369 - Zhi Sun, Ian F. Akyildiz:
On capacity of magnetic induction-based wireless underground sensor networks. 370-378 - Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changhee Joo:
A simple asymptotically optimal energy allocation and routing scheme in rechargeable sensor networks. 379-387 - Xiaohui Liang, Xu Li, Qinghua Shen, Rongxing Lu, Xiaodong Lin, Xuemin Shen, Weihua Zhuang:
Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks. 388-396 - Sobia Jangsher, Syed Ali Khayam, Qasim M. Chaudhari:
Application-aware MIMO Video Rate Adaptation. 397-405 - Aneesh Reddy, Sujay Sanghavi, Sanjay Shakkottai:
On the effect of channel fading on greedy scheduling. 406-414 - Peng-Jun Wan, Dechang Chen, Guojun Dai, Zhu Wang, F. Frances Yao:
Maximizing capacity with power control under physical interference model in duplex mode. 415-423 - Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance. 424-432 - Fangfei Chen, Katherine Guo, John Lin, Thomas La Porta:
Intra-cloud lightning: Building CDNs in the cloud. 433-441 - Haiyang Wang, Feng Wang, Jiangchuan Liu, Justin Groen:
Measurement and utilization of customer-provided resources for cloud computing. 442-450 - Cong Wang, Kui Ren, Shucheng Yu, Karthik Mahendra Raje Urs:
Achieving usable and privacy-assured similarity search over outsourced cloud data. 451-459 - Di Niu, Hong Xu, Baochun Li, Shuqiao Zhao:
Quality-assured cloud bandwidth auto-scaling for video-on-demand applications. 460-468 - Michal Ficek, Lukas Kencl:
Inter-Call Mobility model: A spatio-temporal refinement of Call Data Records using a Gaussian mixture model. 469-477 - Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss bounds for authentication in constrained channels. 478-485 - Siyao Cheng, Jianzhong Li, Lei Yu:
Location Aware Peak Value Queries in sensor networks. 486-494 - Bowu Zhang, Kai Xing, Xiuzhen Cheng, Liusheng Huang, Rongfang Bie:
Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective. 495-503 - Donghyun Kim, Baraki H. Abay, R. N. Uma, Weili Wu, Wei Wang, Alade O. Tokuta:
Minimizing data collection latency in wireless sensor network with multiple mobile elements. 504-512 - Rahul Vaze:
Percolation and connectivity on the signal to interference ratio graph. 513-521 - Chi-Kin Chau, Richard J. Gibbens, Don Towsley:
Impact of directional transmission in large-scale multi-hop wireless ad hoc networks. 522-530 - Savvas Gitzenis, Georgios S. Paschos, Leandros Tassiulas:
Asymptotic laws for content replication and delivery in wireless networks. 531-539 - Andres Garcia-Saavedra, Albert Banchs, Pablo Serrano, Joerg Widmer:
Distributed Opportunistic Scheduling: A control theoretic approach. 540-548 - Xiaojun Feng, Jin Zhang, Qian Zhang, Bo Li:
Use your frequency wisely: Explore frequency domain for channel contention and ACK. 549-557 - Justin Manweiler, Peter Franklin, Romit Roy Choudhury:
RxIP: Monitoring the health of home wireless networks. 558-566 - Vinay Joseph, Gustavo de Veciana:
Jointly optimizing multi-user rate adaptation for video transport over wireless systems: Mean-fairness-variability tradeoffs. 567-575 - Liang He, Zhe Yang, Jianping Pan, Lin Cai, Jingdong Xu:
Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks. 576-584 - Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem A. Beyah:
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks. 585-593 - Liang Liu, Anlong Ming, Huadong Ma, Xi Zhang:
A binary-classification-tree based framework for distributed target classification in multimedia sensor networks. 594-602 - Jin Wang, Shaojie Tang, Baocai Yin, Xiang-Yang Li:
Data gathering in wireless sensor networks through intelligent compressive sensing. 603-611 - Shaolei Ren, Jaeok Park, Mihaela van der Schaar:
Maximizing profit on user-generated content platforms with heterogeneous participants. 612-620 - Xinggong Zhang, Yang Xu, Hao Hu, Yong Liu, Zongming Guo, Yao Wang:
Profiling Skype video calls: Rate control and video quality. 621-629 - Antonio Carzaniga, Cyrus P. Hall, Michele Papalini:
Fully decentralized estimation of some global properties of a network. 630-638 - Xun Xiao, Minming Li, Jianping Wang, Chunming Qiao:
Optimal resource allocation to defend against deliberate attacks in networking infrastructures. 639-647 - Desmond W. H. Cai, Chee Wei Tan, Steven H. Low:
Optimal max-min fairness rate control in wireless networks: Perron-Frobenius characterization and algorithms. 648-656 - Mahdi Hajiaghayi, Min Dong, Ben Liang:
Jointly optimal bit loading, channel pairing and power allocation for multi-channel relaying. 657-665 - Chunsheng Xin, Min Song:
Dynamic spectrum access as a service. 666-674 - Gesualdo Scutari, Francisco Facchinei, Jong-Shi Pang, Lorenzo Lampariello:
Equilibrium selection in power control games on the interference channel. 675-683 - Yu Wu, Chuan Wu, Bo Li, Linquan Zhang, Zongpeng Li, Francis C. M. Lau:
Scaling social media applications into geo-distributed clouds. 684-692 - Ning Cao, Shucheng Yu, Zhenyu Yang, Wenjing Lou, Y. Thomas Hou:
LT codes-based secure and reliable cloud storage service. 693-701 - Siva Theja Maguluri, R. Srikant, Lei Ying:
Stochastic models of load balancing and scheduling in cloud computing clusters. 702-710 - Di Niu, Chen Feng, Baochun Li:
A theory of cloud bandwidth pricing for video-on-demand providers. 711-719 - Narendra Anand, Sung-Ju Lee, Edward W. Knightly:
STROBE: Actively securing wireless communications using Zero-Forcing Beamforming. 720-728 - Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing, Xuemin Shen:
Location privacy preservation in collaborative spectrum sensing. 729-737 - Kaihe Xu, Qian Wang, Kui Ren:
Joint UFH and power control for effective wireless anti-jamming communication. 738-746 - Eric Graves, Tan F. Wong:
Detection of channel degradation attack by Intermediary Node in Linear Networks. 747-755 - Shangxing Wang, Youyun Xu, Xinbing Wang:
Motioncast with general Markovian mobility. 756-764 - Philippe Jacquet, Salman Malik, Bernard Mans, Alonso Silva:
On the throughput-delay trade-off in georouting networks. 765-773 - Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Toward simple criteria to establish capacity scaling laws for wireless networks. 774-782 - Gruia Calinescu, Kan Qiao:
Asymmetric topology control: Exact solutions and fast approximations. 783-791 - Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu:
Sherlock is around: Detecting network failures with local evidence fusion. 792-800 - Zhenjiang Li, Mo Li, Yunhao Liu:
Towards energy-fairness in asynchronous duty-cycling sensor networks. 801-809 - Arthur J. Friend, Vahideh H. Manshadi, Amin Saberi:
Distributed node placement algorithms for constructing well-connected sensor networks. 810-818 - Shibo He, Jiming Chen, Xu Li, Xuemin Shen, Youxian Sun:
Cost-effective barrier coverage by mobile sensor networks. 819-827 - Tzvika Hartman, Avinatan Hassidim, Haim Kaplan, Danny Raz, Michal Segalov:
How to split a flow? 828-836 - Emilie Danna, Avinatan Hassidim, Haim Kaplan, Alok Kumar, Yishay Mansour, Danny Raz, Michal Segalov:
Upward Max Min Fairness. 837-845 - Emilie Danna, Subhasree Mandal, Arjun Singh:
A practical algorithm for balancing the max-min fairness and throughput objectives in traffic engineering. 846-854 - Magnús M. Halldórsson, Pradipta Mitra:
Wireless capacity and admission control in cognitive radio. 855-863 - Wenchi Cheng, Xi Zhang, Hailin Zhang:
Full/half duplex based resource allocations for statistical quality of service provisioning in wireless relay networks. 864-872 - Yuefei Zhu, Baochun Li, Zongpeng Li:
Truthful spectrum auction design for secondary networks. 873-881 - Dejun Yang, Xi Fang, Guoliang Xue:
Channel allocation in non-cooperative multi-radio multi-channel wireless networks. 882-890 - Zaixin Lu, Yan Shi, Weili Wu, Bin Fu:
Efficient data retrieval scheduling for multi-channel wireless data broadcast. 891-899 - Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. 900-908 - Yao Liu, Peng Ning:
BitTrickle: Defending against broadband and high-power reactive jamming attacks. 909-917 - Martin Eian, Stig Fr. Mjølsnes:
A formal analysis of IEEE 802.11w deadlock vulnerabilities. 918-926 - Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen:
Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks. 927-935 - Qian Wang, Kui Ren, Xiaoqiao Meng:
When cloud meets eBay: Towards effective pricing for cloud computing. 936-944 - Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang:
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. 945-953 - Vimal Mathew, Ramesh K. Sitaraman, Prashant J. Shenoy:
Energy-aware load balancing in content delivery networks. 954-962 - Mansoor Alicherry, T. V. Lakshman:
Network aware resource allocation in distributed clouds. 963-971 - Xinxin Liu, Han Zhao, Miao Pan, Hao Yue, Xiaolin Li, Yuguang Fang:
Traffic-aware multiple mix zone placement for protecting location privacy. 972-980 - Shizhen Zhao, Xiaojun Lin:
On the design of scheduling algorithms for end-to-end backlog minimization in multi-hop wireless networks. 981-989 - Guner D. Celik, Eytan H. Modiano:
Scheduling in networks with time-varying channels and reconfiguration delay. 990-998 - Srikanth Hariharan, Ness B. Shroff:
On sample-path optimal dynamic scheduling for sum-queue minimization in trees under the K-hop interference model. 999-1007 - Shuguang Xiong, Lei Yu, Haiying Shen, Chen Wang, Wei Lu:
Efficient algorithms for sensor deployment and routing in sensor networks for network-structured environment monitoring. 1008-1016 - Zhe Yang, Lin Cai, Yu Liu, Jianping Pan:
Environment-aware clock skew estimation and synchronization for wireless sensor networks. 1017-1025 - Cheng Bo, Danping Ren, Shaojie Tang, Xiang-Yang Li, XuFei Mao, Qiuyuan Huang, Lufeng Mo, Zhiping Jiang, Yongmei Sun, Yunhao Liu:
Locating sensors in the forest: A case study in GreenOrbs. 1026-1034 - Shouling Ji, Raheem A. Beyah, Zhipeng Cai:
Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks. 1035-1043 - Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam:
Mitigating timing based information leakage in shared schedulers. 1044-1052 - Costas Courcoubetis, Antonis Dimakis:
Fair background data transfers of minimal delay impact.