Tom La Porta

Learn More
Images/videos are often uploaded in situations like disasters. This can tax the network in terms of increased load and thereby upload latency, and this can be critical for response activities. In such scenarios, prior work has shown that there is significant redundancy in the content e.g., similar photos taken by users transferred. By intelligently(More)
In sensor networks, nodes may malfunction due to the hostile environment. Therefore, dealing with node failure is a very important research issue. In this paper, we study distributed cooperative failure detection techniques. In the proposed techniques, the nodes around a suspected node collaborate with each other to reach an agreement on whether the suspect(More)
Most existing mobility-assisted data access techniques in delay tolerant mobile ad hoc networks (DT-MANETs) are designed to disseminate data to one or several particular destinations. Different from these works, we study the data diffusion problem which diffuses data among all moving nodes so that the nodes that are interested in this data item can get it(More)
Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OSN). However, most of the existing community detection algorithms focus on binary networks. Since most networks are naturally weighted such as DTN or OSN, in(More)
Network Utility Maximization (NUM) techniques, which cast resource sharing problems as one of distributed utility maximization, have been investigated for a variety of optimization problems in wireless and wired networks. Our recent work has extended the NUM framework to consider the case of resource sharing by multiple competing missions in a(More)
We present a framework for non-asymptotic analysis of realworld wireless networks that captures protocol overhead, congestion bottlenecks, traffic heterogeneity and other real-world concerns. The framework introduces the definition of symptotic 1 scalability, and a metric called change impact value (CIV) for comparing the impact of underlying system(More)
We consider the problem of efficient tag identification in RFID networks. Among the solutions recently proposed for tag identification, a variant of the Framed Slotted Aloha protocol, called Tree Slotted Aloha (TSA), has been shown to achieve the lowest identification delay and highest time system efficiency. However, in case of a large number of tags, this(More)
ing exponentially due to an increased subscriber base and new applications. Wide area wireless networks are also experiencing rapid growth in terms of subscribers. Currently, there are many efforts underway to provide data services on wireless access networks. The Internet Protocol (IP) is the dominant internetworking protocol in operation today. The(More)
In this paper, we study the application of the network utility maximization (NUM) framework for joint resource allocation in multi-hop single-radio wireless sensor networks with explicit consideration of sensors’ energy constraint. Traditional NUM frameworks allocate network resources aiming at maximizing the network utility as a monotonically increasing(More)