Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2008
ZipTx: Harnessing Partial Packets in 802.11 Networks
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 351–362https://doi.org/10.1145/1409944.1409984Current wireless protocols retransmit any packet that fails the checksum test, even when most of the bits are correctly received. Prior work has recognized this inefficiency, however the proposed solutions (e.g., PPR, HARQ and SOFT) require changes to ...
- research-articleSeptember 2008
Modulation rate adaptation in urban and vehicular environments: cross-layer implementation and experimental evaluation
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 315–326https://doi.org/10.1145/1409944.1409981Accurately selecting modulation rates for time-varying channel conditions is critical for avoiding performance degradations due to rate overselection when channel conditions degrade or underselection when channel conditions improve. In this paper, we ...
- research-articleSeptember 2008
Understanding congestion control in multi-hop wireless mesh networks
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 291–302https://doi.org/10.1145/1409944.1409978Complex interference in static multi-hop wireless mesh networks can adversely affect transport protocol performance. Since TCP does not explicitly account for this, starvation and unfairness can result from the use of TCP over such networks. In this ...
- research-articleSeptember 2008
Ditto: a system for opportunistic caching in multi-hop wireless networks
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 279–290https://doi.org/10.1145/1409944.1409977This paper presents the design, implementation, and evaluation of Ditto, a system that opportunistically caches overheard data to improve subsequent transfer throughput in wireless mesh networks. While mesh networks have been proposed as a way to ...
- research-articleSeptember 2008
An adaptive, high performance mac for long-distance multihop wireless networks
- Sergiu Nedevschi,
- Rabin K. Patra,
- Sonesh Surana,
- Sylvia Ratnasamy,
- Lakshminarayanan Subramanian,
- Eric Brewer
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 259–270https://doi.org/10.1145/1409944.1409974We consider the problem of efficientMAC design for long-distance WiFi-based mesh networks. In such networks it is common to find long propagation delays, the use of directional antennas, and the presence of inter-link interference. Prior work has shown ...
-
- research-articleSeptember 2008
Horizon: balancing tcp over multiple paths in wireless mesh network
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 247–258https://doi.org/10.1145/1409944.1409973There has been extensive work on network architectures that support multi-path routing to improve performance in wireless mesh networks. However, previous work uses ad-hoc design principles that cannot guarantee any network-wide performance objectives ...
- research-articleSeptember 2008
Can CSMA/CA networks be made fair?
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 235–246https://doi.org/10.1145/1409944.1409972We demonstrate that CSMA/CA networks, including IEEE 802.11 networks, exhibit severe fairness problem in many scenarios, where some hosts obtain most of the channel's bandwidth while others starve. Most existing solutions require nodes to overhear ...
- research-articleSeptember 2008
Cabernet: vehicular content delivery using WiFi
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 199–210https://doi.org/10.1145/1409944.1409968Cabernet is a system for delivering data to and from moving vehicles using open 802.11 (WiFi) access points encountered opportunistically during travel. Using open WiFi access from the road can be challenging. Network connectivity in Cabernet is both ...
- research-articleSeptember 2008
Assessment of urban-scale wireless networks with a small number of measurements
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 187–198https://doi.org/10.1145/1409944.1409967In order to evaluate, improve, or expand a deployed, city-wide wireless mesh network, it is necessary to assess the network's spatial performance. In this paper, we present a general framework to accurately predict a network's well-served area, termed ...
- research-articleSeptember 2008
WiMAX relay networks: opportunistic scheduling to exploit multiuser diversity and frequency selectivity
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 163–174https://doi.org/10.1145/1409944.1409964We study the problem of scheduling in OFDMA-based relay networks with emphasis on IEEE 802.16j based WiMAX relay networks. In such networks, in addition to a base station, multiple relay stations are used for enhancing the throughput, and/or improving ...
- research-articleSeptember 2008
Capacity of large scale wireless networks under Gaussian channel model
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 140–151https://doi.org/10.1145/1409944.1409962In this paper, we study the multicast capacity of a large scale random wireless network. We simply consider the extended multihop network, where a number of wireless nodes vi(1 ≤ i ≤ n) are randomly located in a square region with side-length a = √n, by ...
- research-articleSeptember 2008
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 128–139https://doi.org/10.1145/1409944.1409960Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a ...
- research-articleSeptember 2008
Wireless device identification with radiometric signatures
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 116–127https://doi.org/10.1145/1409944.1409959We design, implement, and evaluate a technique to identify the source network interface card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis. This technique, called PARADIS, leverages minute imperfections of transmitter hardware ...
- research-articleSeptember 2008
Enhancing interactive web applications in hybrid networks
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 70–80https://doi.org/10.1145/1409944.1409954Mobile Internet users have several options today including high bandwidth cellular data services such as 3G, that may be the choice for many. However, the ubiquity and low cost of WiFi suggests an attractive alternative, namely, opportunistic use of ...
- research-articleSeptember 2008
Media sharing based on colocation prediction in urban transport
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 58–69https://doi.org/10.1145/1409944.1409953People living in urban areas spend a considerable amount of time on public transport, for example, commuting to/from work. During these periods, opportunities for inter-personal networking present themselves, as many members of the public now carry ...
- research-articleSeptember 2008
BreadCrumbs: forecasting mobile connectivity
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 46–57https://doi.org/10.1145/1409944.1409952Mobile devices cannot rely on a single managed network, but must exploit a wide variety of connectivity options as they travel. We argue that such systems must consider the derivative of connectivity--the changes inherent in movement between separately ...
- research-articleSeptember 2008
Challenges: wide-area wirelesss NETworks (WANETs)
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 38–45https://doi.org/10.1145/1409944.1409950A WANET is a wireless network where the wireless nodes can be located anywhere over the globe. However, the underlying design is such that the nodes believe they are part of a single-hop or multi-hop wireless network at the PHY and MAC layers. This is ...
- research-articleSeptember 2008
In-band spectrum sensing in cognitive radio networks: energy detection or feature detection?
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPages 14–25https://doi.org/10.1145/1409944.1409948In a cognitive radio network (CRN), in-band spectrum sensing is essential for the protection of legacy spectrum users, with which the presence of primary users (PUs) can be detected promptly, allowing secondary users (SUs) to vacate the channels ...
- keynoteSeptember 2008
Multi-hop mobile wireless network design: implicit cross-layer loss models and performance sensitivities
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networkingPage 1https://doi.org/10.1145/1409944.1409945We describe new methods for multi-hop mobile wireless network design, so as to meet performance specifications. We introduce an implicitly defined approximate loss model that couples the physical, MAC and routing layers' effects. The model provides ...
- proceedingSeptember 2008
MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking
Welcome to ACM MobiCom 2008, the Fourteenth Annual International Conference on Mobile Computing and Networking, in San Francisco, California, USA. Continuing the tradition as one of the premier conferences in mobile networking, we have an exciting ...