Author image not provided
 Alessandro Mei

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article7.42
Citation Count371
Publication count50
Publication years1997-2016
Available for download18
Average downloads per article650.39
Downloads (cumulative)11,707
Downloads (12 Months)315
Downloads (6 Weeks)31
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


50 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 50
Result page: 1 2 3

Sort by:

1
October 2016 Journal of Parallel and Distributed Computing: Volume 96 Issue C, October 2016
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 0

This paper challenges the belief that reliable broadcasting and efficient routing primitives are not possible when DTNs are involved. Firstly, we present COM, a reliable broadcasting mechanism for hybrid networks where nodes can rarely use long-range and costly communication links (e.g.ź3G) to complete missing opportunistic links. COM is based on ...
Keywords: Efficient multi-hop routing, Social mobile networks, Reliable Broadcast

2
November 2015 CLOUDCOM '15: Proceedings of the 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Mobile Cloud Computing (MCC) combines mobile computing and cloud computing aiming to aid performance of mobile devices. The idea is simple: thin devices offload heavy methods to resource-rich servers in the clouds. We believe that in the near future MCC will adopt more advanced offloading techniques. In particular, in this ...

3 published by ACM
April 2014 PaPEC '14: Proceedings of the First Workshop on Principles and Practice of Eventual Consistency
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 20,   Downloads (Overall): 121

Full text available: PDFPDF
In these days, we are witnessing the evolution of cloud storage systems. One of the most intriguing research branches is focusing on merging these systems with peer-to-peer (P2P) networks, absorbing their benefits and thus creating new hybrid architectures. In this work, we present Triton, a peer-assisted cloud storage system designed ...
Keywords: P2P networks, cloud storage, convergence consistency

4
March 2014 PAM 2014: Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

In this work, we discuss a technique for identifying users in cellular networks that exploits the effect that RRC state machine transitions have on the measured round-trip time of mobile devices. Our preliminary experiments performed in a controlled environment, show that it is possible to leverage popular real-time messaging apps, ...
Keywords: Cellular Networks, Security, Privacy

5
January 2014 IEEE Transactions on Mobile Computing: Volume 13 Issue 1, January 2014
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 3

This paper presents small world in motion (SWIM), a new mobility model for ad hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real--synthetic traces have the same statistical properties of real traces in terms of intercontact times, contact ...
Keywords: Mobility model, small world, simulations, forwarding protocols in mobile networks

6 published by ACM
November 2013 SenSys '13: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 16,   Downloads (Overall): 310

Full text available: PDFPDF
The Internet of the future will be of things: Large scale IoT systems integrating various technologies (tracking, wired and wireless sensor and actuator networks, enhanced communication protocols, distributed intelligence for smart objects) will change the way we live and interact with the environment. Unfortunately, a standardization for IoT systems that ...

7 published by ACM
October 2013 IMC '13: Proceedings of the 2013 conference on Internet measurement conference
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 11,   Downloads (12 Months): 127,   Downloads (Overall): 426

Full text available: PDFPDF
The ever increasing ubiquitousness of WiFi access points, coupled with the diffusion of smartphones, suggest that Internet every time and everywhere will soon (if not already has) become a reality. Even in presence of 3G connectivity, our devices are built to switch automatically to WiFi networks so to improve user ...
Keywords: Wi-Fi probe requests, social networks, smartphones

8
July 2012 IEEE Transactions on Dependable and Secure Computing: Volume 9 Issue 4, July 2012
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 7

In this paper, we present two forwarding protocols for mobile wireless networks of selfish individuals. We assume that all the nodes are selfish and show formally that both protocols are strategy proof, that is, no individual has an interest to deviate. Extensive simulations with real traces show that our protocols ...
Keywords: Delay tolerant networks, pocket switched networks, social mobility, selfishness, forwarding protocols.

9
June 2012 ICDCS '12: Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

We derive a consensus protocol for a hybrid failure model. In this model, clients are Byzantine faulty and servers are crash faulty. We argue that this model is well suited to environments where the servers run within one administrative domain, and the clients run outside of this domain. Our consensus ...
Keywords: Byzantine Fault Tolerance, Consensus, Paxos

10
April 2012 Journal of Parallel and Distributed Computing: Volume 72 Issue 4, April, 2012
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 1

In this paper we address the problem of local balancing in multi-hop wireless networks. We introduce the notion of proactive routing: after a short pre-processing phase in which nodes build their routing tables by exchanging messages with neighbors, we require that nodes decide the relay of each message without any ...
Keywords: Multi-hop wireless networks, Security, Energy efficient, Routing, Load balancing, Sensor networks

11 published by ACM
September 2011 ExtremeCom '11: Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 64

Full text available: PDFPDF
Pocket Switched Networks (PSN) whose main feature is the social-guided movement of users/devices, have attracted the attention of many researchers in the last years, mostly for the common belief to be a key technology in providing innovative services without the need of a fixed network infrastructure. However, the opportunistic and ...
Keywords: pocket switched networks, DTNs, anonymous routing

12
September 2011 DISC'11: Proceedings of the 25th international conference on Distributed computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0


13
September 2011 IEEE Transactions on Dependable and Secure Computing: Volume 8 Issue 5, September 2011
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 12

Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. A few distributed solutions to address this fundamental problem have ...
Keywords: Wireless sensor networks security, node replication attack detection, distributed protocol, resilience, efficiency.

14 published by ACM
October 2010 MobiWac '10: Proceedings of the 8th ACM international workshop on Mobility management and wireless access
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 135

Full text available: PDFPDF
Mobile Ad Hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A few solutions have already been proposed to address this problem; however, those solutions ...
Keywords: social network, efficiency, node revocation, resilience, ad hoc network security, distributed protocol, node capture attack detection

15 published by ACM
September 2010 WiNTECH '10: Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 334

Full text available: PdfPdf
Despite recent improvements of the capabilities of Wireless Sensor Networks (WSN) nodes, network protocol support for key management is still lagging behind. While in traditional networks well known protocol suites (e.g., IPsec IKE and the TLS handshake), are commonly used for flexible negotiation of the cryptographic and key exchange protocols, ...
Keywords: sensor network security, identity based encryption, secure communication architecture

16
September 2010 Journal of Computer Security: Volume 18 Issue 5, September 2010
Publisher: IOS Press
Bibliometrics:
Citation Count: 1

This work considers key management for secure multicast in the Logical Key Hierarchy (LKH) model and proposes a methodology to establish the minimal key bit length that guarantees a specified degree of confidentiality for the multicast communications managed within this model. We also introduce the concepts of information lifetime and ...
Keywords: key length, Secure multicast communications, group key management, security

17
June 2010 ICDCS '10: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

In this paper we present two forwarding protocols for mobile wireless networks of selfish individuals. We assume that all the nodes are selfish and show formally that both protocols are Nash equilibria, that is, no individual has an interest to deviate. Extensive simulations with real traces show that our protocols ...
Keywords: Delay tolerant networks, pocket switched networks, social mobility, selfishness, forwarding protocols

18
December 2009 Algorithmic Aspects of Wireless Sensor Networks: 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

This paper concerns sensor network key distribution schemes (KDS) based on symmetric-key techniques. We analyze the problem of active attacks against such schemes. By active attacks we mean those attacks, where the adversary can maliciously disturb the communication between the sensors. We observe that the active adversary that captured even ...

19
October 2009 Information Fusion: Volume 10 Issue 4, October, 2009
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

In-network data aggregation is favorable for wireless sensor networks (WSNs): It allows in-network data processing while reducing the network traffic and hence saving the sensors energy. However, due to the distributed and unattended nature of WSNs, several attacks aiming at compromising the authenticity of the collected data could be perpetrated. ...
Keywords: Securing data fusion, Clone detection, Distributed protocol, Wireless sensor networks

20
June 2009 IEEE Transactions on Computers: Volume 58 Issue 6, June 2009
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

In this paper, we consider security-related and energy efficiency issues in multihop wireless networks. We start our work from the observation, known in the literature, that shortest path routing creates congested areas in multihop wireless networks. These areas are critical—they generate both security and energy efficiency issues. We attack these ...
Keywords: Multihop wireless networks, routing, analysis, energy efficiency, load balancing, simulations., analysis, load balancing, routing, energy efficiency, simulations., Multihop wireless networks



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us