Papers by Nicholas Maxemchuk
Anonymous Credit Cards and its Collusion Analysis
Abstract Communications networks are traditionally used to bring information together. In this pa... more Abstract Communications networks are traditionally used to bring information together. In this paper, we use them to keep information apart in order to protect personal privacy. We show how to implement anonymous credit cards using simple building blocks and standard ...
Is there life beyond linear topologies? A comparison of DQDB and the Manhattan street network
IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings, 2000
Abstract The performance and reliability comparison of two networks that have been proposed for u... more Abstract The performance and reliability comparison of two networks that have been proposed for use as high-speed metropolitan area networks (MANs)-the Manhattan street network (MS Net) and the distributed-queue dual-bus (DQDB) network-are compared. ...
Proceedings 1997 International Conference on Network Protocols, 2000
In this paper we describe a protocol that improves the quality of multicast video or audio transm... more In this paper we describe a protocol that improves the quality of multicast video or audio transmissions by recovering lost packets. The protocol is applied to a corporate intranet, and measurements indicate that significant improvements in audio/video quality are achieved.
Proceedings of ICC'97 - International Conference on Communications, 2000
The Internet is being used to carry voice conversations. Sometimes the quality is acceptable, and... more The Internet is being used to carry voice conversations. Sometimes the quality is acceptable, and at other times the voice is unintelligible. In this paper, we describe the results of a set of measurements on intrastate, cross country, and international Internet connections.
Proceedings of International Conference on Image Processing, 2000
Electronic documents are more easily copied and redistributed than paper documents. This is a maj... more Electronic documents are more easily copied and redistributed than paper documents. This is a major impediment to electronic publishing. Illegal redistribution can be discouraged by placing unique marks in each copy and registering the copy with the original recipient. If an illegal copy is discovered, the original recipient can be identified.
The Role of Communications in Cyber-Physical Vehicle Applications
Principles in Vehicular Networks and Data Exchange, 2000
Reliable Collaborative Decision Making in Mobile Ad Hoc Networks
Lecture Notes in Computer Science, 2004
Modeling cryptographic protocols and their collusion analysis
Lecture Notes in Computer Science, 1996
Systems and methods for modeling a mobile ad hoc wireless network
A packet encoding algorithm for network coding with multiple next hop neighbor consideration and its integration with delta routing
2013 Ieee 14th International Symposium on a World of Wireless Mobile and Multimedia Networks, 2013
ABSTRACT
Fair, Real-Time Control of a Traffic Signal
Document copying deterrent method
Anonymous credit card transactions
Anonymous Internet Mercantile Protocol
Page 1. Anonymous Internet Mercantile Protocol David M. Kristol Steven H. Low Nicholas F. Maxemch... more Page 1. Anonymous Internet Mercantile Protocol David M. Kristol Steven H. Low Nicholas F. Maxemchuk AT&T Bell Laboratories, Murray Hill, NJ 07974 February 24, 1994 Abstract Security and privacy protection become increasingly ...
An architecture for collaborative driving systems
2012 20th Ieee International Conference on Network Protocols, 2012
ABSTRACT Vehicle automation has progressed from systems that monitor the operation of a vehicle a... more ABSTRACT Vehicle automation has progressed from systems that monitor the operation of a vehicle and assist a driver, with functions such as antilock braking and cruise control, to systems that detect the operation of adjacent vehicles, to implement emergency braking and intelligent cruise control. The next generation of systems will share sensor readings and collaborate to control braking operations by looking several cars ahead or by creating safe gaps for merging vehicles. The rules that control the interaction between automobiles are protocols.
Conference on Information Sciences and Systems, 1994
Consider 2 distinct document pages which we label A and B. The pages are sufficiently similar tha... more Consider 2 distinct document pages which we label A and B. The pages are sufficiently similar that they are indistinguishable upon visual inspection, even when compared "side-by-side." However in one of the pages the locations of certain text words have been shifted horizontally by an imperceptible amount. Suppose that either page is selected at random and is reproduced, possibly recursively,

13TH IEEE International Conference on Network Protocols (ICNP'05), 2005
Position-based routing protocols in ad hoc networks combine a forwarding strategy with a recovery... more Position-based routing protocols in ad hoc networks combine a forwarding strategy with a recovery algorithm. The former fails when there are void regions or physical obstacles that prevent transmission. Then, the recovery algorithm is used to detour the obstacles. To explore the obstacles and find a path around them, the earlier recovery approaches construct a planar graph to avoid routing loops. Distributed algorithms that find planar graphs require accurate knowledge on the location of nodes. The number of nodes on a recovery path increases as the node density increases. Our novel recovery technique operates on a grid model of a network. Obstacles are approximated by adjacent grid elements. We adopt the righthand rule, which is common in robotics, to follow the perimeter of the discretized obstacle. We do not construct a planar graph. The grid structure reduces the positional accuracy required for nodes, and the recovery path length is independent of the node density.

Proceedings of GLOBECOM '95, 1995
A n important application of future communications networks will be electronic publishing and dig... more A n important application of future communications networks will be electronic publishing and digital library, provided copyright can be protected. A way to discourage illicit copying and distribution of documents is to uniquely mark each document copy b y shifting certain lines or words slightly so that the original registered recipient can be identified from an illicit copy b y detecting its mark. I n this paper we present two techniques f o r reliable document identification, the centroid and the correlation detection. B y analyzing the noise characteristics, we obtain the maximum likelihood detectors for both methods and their probabilities of error. W e have applied these results to implement a marking and identification strategy proposed earlier, which marks a line both vertically b y line shift and horizontally b y word shift to make the marking robust against distortions in either direction. Preliminary experimental results are presented.
The fair distribution of power to electric vehicles: An alternative to pricing
2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2014
Network Protocols and Algorithms, 2011
Flow control in mobile ad hoc networks (MANETs) encounters more challenges than flow control in c... more Flow control in mobile ad hoc networks (MANETs) encounters more challenges than flow control in conventional wired networks, such as channel bandwidth variation, medium contention, and frequent re-routing. Without proper flow control, serious network performance degradation in MANETs has been reported in recent studies. In this paper, we introduce a distributed bottleneck flow control technique in MANETs. The proposed scheme uses a distributed flow control mechanism that has been used in both bottleneck flow control and bandwidth balancing in Distributed-Queue-Dual-Bus (DQDB) in wired networks. It extends bandwidth balancing to operate in a mobile wireless environment. Extensive simulations demonstrate that our flow control scheme is effective and can provide max-min fairness as well as improve Quality of Service (QoS) for flows in MANETs.
Uploads
Papers by Nicholas Maxemchuk