-
1
-
-
33847674846
-
On the energy detection of unknown signals over fading channels
-
Digham, F.F., Alouini, M.-S., Simon, M.: On the energy detection of unknown signals over fading channels. In: Proceedings of the IEEE International Conference on Communications, vol. 55(1), pp. 21-24 (2003)
-
(2003)
Proceedings of the IEEE International Conference on Communications
, vol.55
, Issue.1
, pp. 21-24
-
-
Digham, F.F.1
Alouini, M.-S.2
Simon, M.3
-
3
-
-
36949015142
-
Understanding and mitigating the impact of RF interference on 802.11 networks
-
Gummadi, R., Wetherall, D., Greenstein, B., Seshan, S.: Understanding and mitigating the impact of RF interference on 802.11 networks. ACM SIGCOMM Computer Communication Review 37(4), 385-396 (2007)
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.4
, pp. 385-396
-
-
Gummadi, R.1
Wetherall, D.2
Greenstein, B.3
Seshan, S.4
-
4
-
-
77954940195
-
Random Linear Coding Based Anti-Jamming Coding Techniques for Cognitive Radio Systems
-
Kadhe, S., Chandra, M.G., Janakiram, B.: Random Linear Coding Based Anti-Jamming Coding Techniques for Cognitive Radio Systems. In: Proc. IEEE International Conference on Communications, pp. 1-6 (2010)
-
(2010)
Proc. IEEE International Conference on Communications
, pp. 1-6
-
-
Kadhe, S.1
Chandra, M.G.2
Janakiram, B.3
-
5
-
-
84923172059
-
Modeling of the channelhopping anti-jamming defense in multi-radio wireless networks
-
Khattab, S., Mosse, D., Melhem, R.: Modeling of the channelhopping anti-jamming defense in multi-radio wireless networks. In: Proc. 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous), pp. 1-10 (2008)
-
(2008)
Proc. 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous)
, pp. 1-10
-
-
Khattab, S.1
Mosse, D.2
Melhem, R.3
-
6
-
-
34548307187
-
Using channelhopping to increase 802.11 resilience to jamming attacks
-
Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channelhopping to increase 802.11 resilience to jamming attacks. In: IEEE 26th Conference on Computer Communications (INFOCOM), pp. 2526-2530 (2007)
-
(2007)
IEEE 26th Conference on Computer Communications (INFOCOM)
, pp. 2526-2530
-
-
Navda, V.1
Bohra, A.2
Ganguly, S.3
Rubenstein, D.4
-
7
-
-
33745943760
-
On connectivity in ad hoc network under jamming using directional antennas and mobility
-
Noubir, G.: On connectivity in ad hoc network under jamming using directional antennas and mobility. In: International Conference on Wired Wireless Internet Communications, pp. 186-200 (2004)
-
(2004)
International Conference on Wired Wireless Internet Communications
, pp. 186-200
-
-
Noubir, G.1
-
8
-
-
78349245906
-
Adaptive ε-Greedy Exploration in Reinforcement Learning Based on Value Differences
-
Dillmann, R., Beyerer, J., Hanebeck, U.D., Schultz, T. (eds.) KI 2010. Springer, Heidelberg
-
Tokic, M.: Adaptive ε-Greedy Exploration in Reinforcement Learning Based on Value Differences. In: Dillmann, R., Beyerer, J., Hanebeck, U.D., Schultz, T. (eds.) KI 2010. LNCS, vol. 6359, pp. 203-210. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6359
, pp. 203-210
-
-
Tokic, M.1
-
9
-
-
33646406807
-
Multi-Armed Bandit Algorithms and Empirical Evaluation
-
Gama, J., Camacho, R., Brazdil, P.B., Jorge, A.M., Torgo, L. (eds.) ECML 2005. Springer, Heidelberg
-
Vermorel, J., Mohri, M.: Multi-Armed Bandit Algorithms and Empirical Evaluation. In: Gama, J., Camacho, R., Brazdil, P.B., Jorge, A.M., Torgo, L. (eds.) ECML 2005. LNCS (LNAI), vol. 3720, pp. 437-448. Springer, Heidelberg (2005)
-
(2005)
LNCS (LNAI)
, vol.3720
, pp. 437-448
-
-
Vermorel, J.1
Mohri, M.2
-
10
-
-
79953200186
-
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
-
Wang, B., Wu, Y., Liu, K.J.R., Clancy, T.C.: An Anti-Jamming Stochastic Game for Cognitive Radio Networks. IEEE Journal on Selected Areas in Communications 29(4), 877-889 (2011)
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.4
, pp. 877-889
-
-
Wang, B.1
Wu, Y.2
Liu, K.J.R.3
Clancy, T.C.4
-
11
-
-
0001043843
-
Restless bandits: Activity allocation in a changing world
-
Whittle, P.: Restless bandits: Activity allocation in a changing world. Appl. Prob. 25(A), 287-298 (1988)
-
(1988)
Appl. Prob.
, vol.25
, Issue.A
, pp. 287-298
-
-
Whittle, P.1
-
12
-
-
45749134626
-
DEEJAM: Defeating energyefficient jamming in IEEE 802.15.4-based wireless networks
-
Wood, A.D., Stankovic, J.A., Zhou, G.: DEEJAM: defeating energyefficient jamming in IEEE 802.15.4-based wireless networks. In: Proc. 4th IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 60-69 (2007)
-
(2007)
Proc. 4th IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
, pp. 60-69
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
13
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54-62 (2002)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
14
-
-
11244260535
-
Channel surfacing and spatialretreats: Defenses against wireless denial of service
-
Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfacing and spatialretreats: defenses against wireless denial of service. In: Proc. 3rd ACMWorkshop onWireless Security (WiSe), pp. 80-89 (2004)
-
(2004)
Proc. 3rd ACMWorkshop OnWireless Security (WiSe)
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
|