University Carlos III of Madrid

Displaying 1-12 of 12 results

  • White Papers // Mar 2012

    Control Theoretic Optimization of 802.11 WLANs: Implementation and Experimental Evaluation

    In 802.11 WLANs, adapting the contention parameters to network conditions results in substantial performance improvements. Even though the ability to change these parameters has been available in standard devices for years, so far no adaptive mechanism using this functionality has been validated in a realistic deployment. In this paper, the...

    Provided By University Carlos III of Madrid

  • White Papers // Feb 2012

    Distributed Opportunistic Scheduling: A Control Theoretic Approach

    Distributed Opportunistic Scheduling (DOS) techniques have been recently proposed to improve the throughput performance of wireless networks. With DOS, each station contends for the channel with a certain access probability. If a contention is successful, the station measures the channel conditions and transmits in case the channel quality is above...

    Provided By University Carlos III of Madrid

  • White Papers // Nov 2011

    Cooperation in Ad Hoc Network Security Services: Classification and Survey

    Since ad hoc networks are infrastructureless and self-organized, their nodes have to cooperate in order to provide a particular service such as privacy or node incentives. In this paper, the authors elaborate on the cooperation role and management within the cooperation-based security services available in the literature. Furthermore, they present...

    Provided By University Carlos III of Madrid

  • White Papers // Sep 2011

    Towards a Comparable Evaluation for VANET Protocols: NS-2 Experiments Builder Assistant and Extensible Test Bed

    In order to validate an Intelligent Transportation System (ITS) application or service, simulation techniques are usually employed. Now-a-days, there are two problems associated to this kind of validation: the relative complexity of existing simulators and the lack of common criteria in the creation of simulation experiments. The first one makes...

    Provided By University Carlos III of Madrid

  • White Papers // Aug 2011

    A Security Pattern for Untraceable Secret Handshakes

    A security pattern describes a particular recurring security problem that arises in specific contexts and presents a well-proven generic solution for it. This paper describes an Untraceable Secret Handshake, a protocol that allows two users to mutually verify another's properties without revealing their identity. The complex security solution is split...

    Provided By University Carlos III of Madrid

  • White Papers // Jun 2011

    IEEE 802.21: A Shift in the Media Independence

    In this paper, the authors present their vision on future uses of the Media Independence paradigm developed within the IEEE 802.21. They argue that this specification is an excellent starting point for future applications that require the handling of heterogeneous technologies. The current IEEE 802.21 standard facilitates media independent handovers...

    Provided By University Carlos III of Madrid

  • White Papers // Jun 2011

    Do Credit Rating Agencies Piggyback? Evidence From Sovereign Debt Ratings

    The author argues that when more than one credit rating agency rates an asset, each one has the incentive to put a weight on the competitors rating. This piggybacking allows an agency to increase the precision of its own rating while doing less monitoring. The author tests this hypothesis, using...

    Provided By University Carlos III of Madrid

  • White Papers // May 2011

    The Tragedy of the Internet Routing Commons

    Over the last years, the research community has been deeply concerned about the scalability issues that the Internet routing is facing. In this paper, the authors study the economic incentives for the Global Routing Table (GRT) explosive growth by considering a commons model in which the GRT is a public...

    Provided By University Carlos III of Madrid

  • White Papers // May 2011

    Artificial Immunity-Based Correlation System

    Security Information Event Management (SIEM) technologies focus on developing effective methods and tools to assist network administrators during the whole network security management. Though there is a vast number of novel initiatives and contributions in providing adaptiveness and intelligence in this research field, there are still many problems that need...

    Provided By University Carlos III of Madrid

  • White Papers // Feb 2011

    Deep Diving Into BitTorrent Locality

    A substantial amount of work has recently gone into localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs. Several architectures and systems have been proposed and the initial results from specific ISPs and a few torrents have been encouraging. In this work...

    Provided By University Carlos III of Madrid

  • White Papers // Jul 2009

    A Control Theoretic Approach to Distributed Optimal Configuration of 802.11 WLANs

    The optimal configuration of the contention parameters of a WLAN depends on the network conditions in terms of number of stations and the traffic they generate. Following this observation, a considerable effort in the literature has been devoted to the design of distributed algorithms that optimally configure the WLAN parameters...

    Provided By University Carlos III of Madrid

  • White Papers // Jan 2009

    Nozzilla: A Peer-to-Peer IPTV Distribution Service for an IMS-Based NGN

    During the last years Next Generation Networks (NGNs) have gained attention, as an increasing number of network operators moved toward triple-play services: telephony, Internet and IPTV. Unfortunately, from the service provider perspective, IPTV usually comes at a high cost in terms of equipment and/or necessary bandwidth. In this paper, the...

    Provided By University Carlos III of Madrid

  • White Papers // Feb 2011

    Deep Diving Into BitTorrent Locality

    A substantial amount of work has recently gone into localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs. Several architectures and systems have been proposed and the initial results from specific ISPs and a few torrents have been encouraging. In this work...

    Provided By University Carlos III of Madrid

  • White Papers // Jun 2011

    Do Credit Rating Agencies Piggyback? Evidence From Sovereign Debt Ratings

    The author argues that when more than one credit rating agency rates an asset, each one has the incentive to put a weight on the competitors rating. This piggybacking allows an agency to increase the precision of its own rating while doing less monitoring. The author tests this hypothesis, using...

    Provided By University Carlos III of Madrid

  • White Papers // Jul 2009

    A Control Theoretic Approach to Distributed Optimal Configuration of 802.11 WLANs

    The optimal configuration of the contention parameters of a WLAN depends on the network conditions in terms of number of stations and the traffic they generate. Following this observation, a considerable effort in the literature has been devoted to the design of distributed algorithms that optimally configure the WLAN parameters...

    Provided By University Carlos III of Madrid

  • White Papers // Jun 2011

    IEEE 802.21: A Shift in the Media Independence

    In this paper, the authors present their vision on future uses of the Media Independence paradigm developed within the IEEE 802.21. They argue that this specification is an excellent starting point for future applications that require the handling of heterogeneous technologies. The current IEEE 802.21 standard facilitates media independent handovers...

    Provided By University Carlos III of Madrid

  • White Papers // May 2011

    The Tragedy of the Internet Routing Commons

    Over the last years, the research community has been deeply concerned about the scalability issues that the Internet routing is facing. In this paper, the authors study the economic incentives for the Global Routing Table (GRT) explosive growth by considering a commons model in which the GRT is a public...

    Provided By University Carlos III of Madrid

  • White Papers // Nov 2011

    Cooperation in Ad Hoc Network Security Services: Classification and Survey

    Since ad hoc networks are infrastructureless and self-organized, their nodes have to cooperate in order to provide a particular service such as privacy or node incentives. In this paper, the authors elaborate on the cooperation role and management within the cooperation-based security services available in the literature. Furthermore, they present...

    Provided By University Carlos III of Madrid

  • White Papers // Aug 2011

    A Security Pattern for Untraceable Secret Handshakes

    A security pattern describes a particular recurring security problem that arises in specific contexts and presents a well-proven generic solution for it. This paper describes an Untraceable Secret Handshake, a protocol that allows two users to mutually verify another's properties without revealing their identity. The complex security solution is split...

    Provided By University Carlos III of Madrid

  • White Papers // Feb 2012

    Distributed Opportunistic Scheduling: A Control Theoretic Approach

    Distributed Opportunistic Scheduling (DOS) techniques have been recently proposed to improve the throughput performance of wireless networks. With DOS, each station contends for the channel with a certain access probability. If a contention is successful, the station measures the channel conditions and transmits in case the channel quality is above...

    Provided By University Carlos III of Madrid

  • White Papers // May 2011

    Artificial Immunity-Based Correlation System

    Security Information Event Management (SIEM) technologies focus on developing effective methods and tools to assist network administrators during the whole network security management. Though there is a vast number of novel initiatives and contributions in providing adaptiveness and intelligence in this research field, there are still many problems that need...

    Provided By University Carlos III of Madrid

  • White Papers // Sep 2011

    Towards a Comparable Evaluation for VANET Protocols: NS-2 Experiments Builder Assistant and Extensible Test Bed

    In order to validate an Intelligent Transportation System (ITS) application or service, simulation techniques are usually employed. Now-a-days, there are two problems associated to this kind of validation: the relative complexity of existing simulators and the lack of common criteria in the creation of simulation experiments. The first one makes...

    Provided By University Carlos III of Madrid

  • White Papers // Jan 2009

    Nozzilla: A Peer-to-Peer IPTV Distribution Service for an IMS-Based NGN

    During the last years Next Generation Networks (NGNs) have gained attention, as an increasing number of network operators moved toward triple-play services: telephony, Internet and IPTV. Unfortunately, from the service provider perspective, IPTV usually comes at a high cost in terms of equipment and/or necessary bandwidth. In this paper, the...

    Provided By University Carlos III of Madrid

  • White Papers // Mar 2012

    Control Theoretic Optimization of 802.11 WLANs: Implementation and Experimental Evaluation

    In 802.11 WLANs, adapting the contention parameters to network conditions results in substantial performance improvements. Even though the ability to change these parameters has been available in standard devices for years, so far no adaptive mechanism using this functionality has been validated in a realistic deployment. In this paper, the...

    Provided By University Carlos III of Madrid