Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
research-article
Privacy Preservation for Context Sensing on Smartphone

The proliferation of sensor-equipped smartphones has enabled an increasing number of context-aware applications that provide personalized services based on users' contexts. However, most of these applications aggressively collect users' sensing data ...

research-article
Offloading Massive Data Onto Passenger Vehicles: Topology Simplification and Traffic Assignment

Offloading is a promising technique for alleviating the ever-growing traffic load from infrastructure-based networks such as the Internet. Offloading consists of using alternative methods of transmission as a cost-effective solution for network ...

research-article
Making DPI Engines Resilient to Algorithmic Complexity Attacks

This paper starts by demonstrating the vulnerability of Deep Packet Inspection DPI mechanisms, which are at the core of security devices, to algorithmic complexity denial of service attacks, thus exposing a weakness in the first line of defense of ...

research-article
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their ...

research-article
Congestion Control for Vehicular Networks With Safety-Awareness

Vehicular safety applications require reliable and up-to-date knowledge of the local neighborhood. Under IEEE 802.11p, this is attained through single-hop broadcasts of safety beacons in the control channel. However, high transmission power and node ...

research-article
Towards Robust Surface Skeleton Extraction and Its Applications in 3D Wireless Sensor Networks

The in-network data storage and retrieval are fundamental functions of sensor networks. Among many proposals, geographical hash table GHT is perhaps most appealing as it is very simple yet powerful with low communication cost, where the key is to ...

research-article
Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems

Radio Frequency Identification RFID technology plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory tags. In ...

research-article
When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications

Many important network functions require online membership lookup against a large set of addresses, flow labels, signatures, and so on. This paper studies a more difficult, yet less investigated problem, called multi-set membership lookup, which ...

research-article
FUN Coding: Design and Analysis

Joint FoUntain coding and Network coding FUN is proposed to boost information spreading over multi-hop lossy networks. The novelty of our FUN approach lies in combining the best features of fountain coding, intra-session network coding, and cross-next-...

research-article
Effects of Content Popularity on the Performance of Content-Centric Opportunistic Networking: An Analytical Approach and Applications

Mobile users are envisioned to exploit direct communication opportunities between their portable devices, in order to enrich the set of services they can access through cellular or WiFi networks. Sharing contents of common interest or providing access ...

research-article
Automated Adversarial Testing of Unmodified Wireless Routing Implementations

Numerous routing protocols have been designed and subjected to model checking and simulations. However, model checking the design or testing the simulator-based prototype of a protocol does not guarantee that the implementation is free of bugs and ...

research-article
Wireless Sensor Networks Under the Random Pairwise Key Predistribution Scheme: Can Resiliency Be Achieved With Small Key Rings?

We investigate the resiliency of wireless sensor networks against sensor capture attacks when the network uses the random pairwise key distribution scheme of Chan et al. We present conditions on the model parameters so that the network is: 1 ...

research-article
Load Balancing in Two-Tier Cellular Networks With Open and Hybrid Access Femtocells

Femtocell base station BS is a low-power, low-price BS based on the cellular communication technology. It is expected to become a cost-effective solution for improving the communication performance of indoor users, whose traffic demands are large in ...

research-article
Timed Consistent Network Updates in Software-Defined Networks

Network updates, such as policy and routing changes, occur frequently in software-defined networks SDNs. Updates should be performed consistently, preventing temporary disruptions, and should require as little overhead as possible. Scalability is ...

research-article
Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement

Delay is an important metric to understand and improve system performance. While existing approaches focus on aggregated delay statistics in pre-programmed granularity and provide results such as average and deviation, those approaches may not provide ...

research-article
On the Distance-Sensitive and Load-Balanced Information Storage and Retrieval for 3D Sensor Networks

Efficient in-network information storage and retrieval is of paramount importance to sensor networks and has attracted a large number of studies while most of them focus on 2D fields. In this paper, we propose novel Reeb graph based information storage ...

research-article
Feedback-Based Path Failure Detection and Buffer Blocking Protection for MPTCP

A multipath TCP MPTCP is a promising protocol that has been standardized by the Internet Engineering Task Force to support multipath operations in the transport layer. However, although the MPTCP can provide multiple transmission paths and aggregate the ...

research-article
Scaling the Internet Routing System Through Distributed Route Aggregation

The Internet routing system faces serious scalability challenges due to the growing number of IP prefixes that needs to be propagated throughout the network. Although IP prefixes are assigned hierarchically and roughly align with geographic regions, ...

research-article
Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping

With the growth in number and significance of the emerging applications that require extremely low latencies, network operators are facing increasing need to perform latency measurement on per-flow basis for network monitoring and troubleshooting. In ...

research-article
How Good is Bargained Routing?

In the context of networking, research has focused on non-cooperative games, where the selfish agents cannot reach a binding agreement on the way they would share the infrastructure. Many approaches have been proposed for mitigating the typically ...

research-article
An Integrated Systematic Approach to Designing Enterprise Access Control

Today, the network design process remains ad hoc and largely complexity agnostic, often resulting in suboptimal networks characterized by excessive amounts of dependence and commands in device configurations. The unnecessary high configuration ...

research-article
Structural Data De-Anonymization: Theory and Practice

In this paper, we study the quantification, practice, and implications of structural data de-anonymization, including social data, mobility traces, and so on. First, we answer several open questions in structural data de-anonymization by quantifying ...

research-article
CCDN: Content-Centric Data Center Networks

Data center networks continually seek higher network performance to meet the ever increasing application demand. Recently, researchers are exploring the method to enhance the data center network performance by intelligent caching and increasing the ...

research-article
Scalable Industry Data Access Control in RFID-Enabled Supply Chain

By attaching RFID tags to products, supply chain participants can identify products and create product data to record the product particulars in transit. Participants along the supply chain share their product data to enable information exchange and ...

research-article
On Iterative Scheduling for Input-Queued Switches With a Speedup of $2-1/N$

An efficient iterative scheduling algorithm for input-queued switches, called round robin with longest queue first RR/LQF, is proposed in this paper. RR/LQF consists of three phases: report, grant, and accept. In each phase, only a single-bit message ...

research-article
Routing and Spectrum Assignment in Elastic Filterless Optical Networks

Elastic optical networking is considered a promising candidate to improve the spectral efficiency of optical networks. One of the most important planning challenges of elastic optical networks is the NP-hard routing and spectrum assignment RSA problem. ...

research-article
Exploiting Social Tie Structure for Cooperative Wireless Networking: A Social Group Utility Maximization Framework

We develop a social group utility maximization SGUM framework for cooperative wireless networking that takes into account both social relationships and physical coupling among users. Specifically, instead of maximizing its individual utility or the ...

research-article
Intra-Frame Bidirectional Transmission in Networks of Visible LEDs

The optical antenna’s directionality of nodes forming a visible light communication VLC network, i.e., their field-of-view FOV, varies greatly from device to device. This encompasses wide FOVs of ambient light infrastructure and directional FOVs of ...

research-article
Approximating Maximum Lifetime $k$ -Coverage Through Minimizing Weighted $k$ -Cover in Homogeneous Wireless Sensor Networks

Energy efficiency is an important issue in the study of wireless sensor networks. Given a set of targets and a set of sensors with bounded lifetime, the maximum lifetime \($\)-coverage problem is to schedule active/sleeping status of sensors to maximize the ...

research-article
Adaptive Lookup of Open WiFi Using Crowdsensing

Open WiFi access points APs are demonstrating that they can provide opportunistic data services to moving vehicles. We present CrowdWiFi, a novel system to look up roadside WiFi APs located outdoors or inside buildings. CrowdWiFi consists of two ...

Subjects

Comments