Loading…
Privacy-preserving RFID authentication based on cryptographical encoding
Get full text
Conference Proceeding
Loading…
Block permutations in Boolean Space to minimize TCAM for packet classification
Get full text
Conference Proceeding
Loading…
SybilDefender: Defend against sybil attacks in large social networks
Get full text
Conference Proceeding
Loading…
Guiding internet-scale video service deployment using microblog-based prediction
Zhi Wang, Lifeng Sun, Chuan Wu, Shiqiang Yang
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Approximately optimal adaptive learning in opportunistic spectrum access
Get full text
Conference Proceeding
Loading…
Proactive seeding for information cascades in cellular networks
Malandrino, F., Kurant, M., Markopoulou, A., Westphal, C., Kozat, U. C.
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Semi-structured and unstructured data aggregation scheduling in wireless sensor networks
Bagaa, M., Derhab, A., Lasla, N., Ouadjaout, A., Badache, N.
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Get full text
Conference Proceeding
Loading…
Secure top-k query processing via untrusted location-based service providers
Get full text
Conference Proceeding
Loading…
Exploiting constructive interference for scalable flooding in wireless networks
Yin Wang, Yuan He, Xufei Mao, Yunhao Liu, Zhiyu Huang, Xiangyang Li
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Get full text
Conference Proceeding
Loading…
Connectivity of large-scale Cognitive Radio Ad Hoc Networks
Dianjie Lu, Xiaoxia Huang, Pan Li, Jianping Fan
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Enhanced wireless channel authentication using time-synched link signature
Get full text
Conference Proceeding
Loading…
Asymptotically optimal downlink scheduling over Markovian fading channels
Get full text
Conference Proceeding
Loading…
A unifying model and analysis of P2P VoD replication and scheduling
Get full text
Conference Proceeding
Loading…
Cooperative cognitive radio networking using quadrature signaling
Bin Cao, Cai, L. X., Hao Liang, Mark, J. W., Qinyu Zhang, Poor, H. V., Weihua Zhuang
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Upward Max Min Fairness
Danna, E., Hassidim, A., Kaplan, H., Kumar, A., Mansour, Y., Raz, D., Segalov, M.
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Published in 2012 Proceedings IEEE INFOCOM (01.03.2012)
Get full text
Conference Proceeding