A threshold of ln n for approximating set cover
Journal of the ACM (JACM)
Independent component analysis: algorithms and applications
Neural Networks
Characterizing user behavior and network performance in a public wireless LAN
SIGMETRICS '02 Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Distributions on Level-Sets with Applications to Approximation Algorithms
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
The changing usage of a mature campus-wide wireless network
Proceedings of the 10th annual international conference on Mobile computing and networking
Hardness of Max 3SAT with No Mixed Clauses
CCC '05 Proceedings of the 20th Annual IEEE Conference on Computational Complexity
An accurate technique for measuring the wireless side of wireless networks
WiTMeMo '05 Papers presented at the 2005 workshop on Wireless traffic measurements and modeling
Measurement-based characterization of 802.11 in a hotspot setting
Proceedings of the 2005 ACM SIGCOMM workshop on Experimental approaches to wireless network design and analysis
WiFiProfiler: cooperative diagnosis in wireless LANs
Proceedings of the 4th international conference on Mobile systems, applications and services
Jigsaw: solving the puzzle of enterprise 802.11 analysis
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Troubleshooting wireless mesh networks
ACM SIGCOMM Computer Communication Review
Automating cross-layer diagnosis of enterprise wireless networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Analysis of optical CDMA signal transmission: capacity limits and simulation results
EURASIP Journal on Applied Signal Processing
Optimal monitoring in multi-channel multi-radio wireless mesh networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Multi-assignment clustering for Boolean data
ICML '09 Proceedings of the 26th Annual International Conference on Machine Learning
WiserAnalyzer: A Passive Monitoring Framework for WLANs
MSN '09 Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
EURASIP Journal on Wireless Communications and Networking - Special issue on dynamic spectrum access: from the concept to the implementation
Energy efficient monitoring for intrusion detection in battery-powered wireless mesh networks
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Sniffer channel selection for monitoring wireless LANs
Computer Communications
Hi-index | 0.00 |
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource management and critical path analysis. In this paper, we introduce a quality of monitoring (QoM) metric defined by the expected number of active users monitored, and investigate the problem of maximizing QoM by judiciously assigning sniffers to channels based on knowledge of user activities in a multi-channel wireless network. Two capture models are considered. The first one, called the user-centric model assumes frame-level capturing capability of sniffers such that the activities of different users can be distinguished. The second one, called the sniffer-centric model only utilizes binary channel information (active or not) at a sniffer. For the user-centric model, we show that the implied optimization problem is NP-hard, but a constant approximation ratio can be attained via polynomial complexity algorithms. For the sniffer-centric model, we devise a stochastic inference scheme that transforms the problem into the user-centric domain, where we are able to apply our polynomial approximation algorithms. The effectiveness of our proposed scheme and algorithms is further evaluated using both synthetic data as well as real-world traces from an operational WLAN.