-
1
-
-
34247229185
-
Decentralized cognitive mac for opportunistic spectrum access in ad hoc networks: A pomdp framework
-
Q. Zhao, L. Tong, A. Swami, and Y. Chen, "Decentralized cognitive mac for opportunistic spectrum access in ad hoc networks: A pomdp framework," IEEE JSAC, vol. 25, no. 3, pp. 589-600, 2007.
-
(2007)
IEEE JSAC
, vol.25
, Issue.3
, pp. 589-600
-
-
Zhao, Q.1
Tong, L.2
Swami, A.3
Chen, Y.4
-
2
-
-
69449100462
-
Optimality of myopic sensing in multi-channel opportunistic access
-
S. H. A. Ahmad, M. Liu, T. Javidi, Q. Zhao, and B. Krishnamachari, "Optimality of myopic sensing in multi-channel opportunistic access,"IEEE Transactions on Information Theory, vol. 55, no. 9, pp. 4040-4050, 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.9
, pp. 4040-4050
-
-
Ahmad, S.H.A.1
Liu, M.2
Javidi, T.3
Zhao, Q.4
Krishnamachari, B.5
-
3
-
-
77951183517
-
Dynamic multichannel access with imperfect channel state detection
-
K. Liu, Q. Zhao, and B. Krishnamachari, "Dynamic multichannel access with imperfect channel state detection," IEEE Transactions on Signal Processing, vol. 58, no. 5, pp. 2795-2808, 2010.
-
(2010)
IEEE Transactions on Signal Processing
, vol.58
, Issue.5
, pp. 2795-2808
-
-
Liu, K.1
Zhao, Q.2
Krishnamachari, B.3
-
4
-
-
74949140186
-
Algorithms for dynamic spectrum access with learning for cognitive radio
-
J. Unnikrishnan and V. V. Veeravalli, "Algorithms for dynamic spectrum access with learning for cognitive radio," IEEE Transactions on Signal Processing, vol. 58, no. 2, pp. 750-760, 2010.
-
(2010)
IEEE Transactions on Signal Processing
, vol.58
, Issue.2
, pp. 750-760
-
-
Unnikrishnan, J.1
Veeravalli, V.V.2
-
5
-
-
77958597180
-
A restless bandit formulation of multi-channel opportunistic access: Indexablity and index policy
-
K. Liu and Q. Zhao, "A restless bandit formulation of multi-channel opportunistic access: Indexablity and index policy," IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5547-5567, 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.11
, pp. 5547-5567
-
-
Liu, K.1
Zhao, Q.2
-
7
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, C. Pöpper, S. Capkun, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. of IEEE Security and Privacy, May 2008.
-
Proc. of IEEE Security and Privacy, May 2008
-
-
Strasser, M.1
Pöpper, C.2
Capkun, S.3
Cagalj, M.4
-
9
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
ACM
-
D. Slater, P. Tague, R. Poovendran, and B. J. Matt, "A coding-theoretic approach for efficient message verification over insecure channels," in Proc. of ACM WISEC'09. ACM, 2009.
-
(2009)
Proc. of ACM WISEC'09
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.J.4
-
10
-
-
78650975080
-
USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure
-
A. Liu, P. Ning, H. Dai, and Y. Liu, "USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure," in Proc. of MASS'10, 2010.
-
Proc. of MASS'10, 2010
-
-
Liu, A.1
Ning, P.2
Dai, H.3
Liu, Y.4
-
11
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," in Proc. of IEEE INFOCOM'10, 2010.
-
Proc. of IEEE INFOCOM'10, 2010
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
12
-
-
78449306498
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part i: Known channel statistics
-
H. Li and Z. Han, "Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part i: Known channel statistics," IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3566-3577, 2010.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.11
, pp. 3566-3577
-
-
Li, H.1
Han, Z.2
-
13
-
-
78651520951
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems - Part ii: Unknown channel statistics
-
-, "Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems - part ii: Unknown channel statistics," IEEE Transactions on Wireless Communications, vol. 10, no. 1, pp. 274-283, 2011.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.1
, pp. 274-283
-
-
Li, H.1
Han, Z.2
-
14
-
-
84055171131
-
A stochastic anti-jamming game in cognitive radio networks
-
to appear
-
B. Wang, Y. Wu, K. J. R. Liu, and T. C. Clancy, "A stochastic anti-jamming game in cognitive radio networks," IEEE JSAC, 2011, to appear.
-
(2011)
IEEE JSAC
-
-
Wang, B.1
Wu, Y.2
Liu, K.J.R.3
Clancy, T.C.4
-
15
-
-
34548691894
-
-
Springer Publishing Company, Incorporated
-
A. O. Hero, D. A. Castan, D. Cochran, and K. Kastella, Foundations and Applications of Sensor Management. Springer Publishing Company, Incorporated, 2007.
-
(2007)
Foundations and Applications of Sensor Management
-
-
Hero, A.O.1
Castan, D.A.2
Cochran, D.3
Kastella, K.4
-
16
-
-
0001043843
-
Restless bandits: Activity allocation in a changing world
-
P. Whittle, "Restless bandits: activity allocation in a changing world,"Journal of Applied Probability, vol. 25A, pp. 287-298, 1988.
-
(1988)
Journal of Applied Probability
, vol.25 A
, pp. 287-298
-
-
Whittle, P.1
-
18
-
-
0037709910
-
The non-stochastic multiarmed bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "The non-stochastic multiarmed bandit problem," SIAM J. Comput., 2002.
-
(2002)
SIAM J. Comput.
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
19
-
-
4544345025
-
Adaptive routing with end-to-end feedback: Distributed learning and geometric approaches
-
B. Awerbuch and R. D. Kleinberg, "Adaptive routing with end-to-end feedback: distributed learning and geometric approaches," in Proc. of ACM STOC'04, 2004, pp. 45-53.
-
Proc. of ACM STOC'04, 2004
, pp. 45-53
-
-
Awerbuch, B.1
Kleinberg, R.D.2
-
20
-
-
35948943542
-
The on-line shortest path problem under partial monitoring
-
A. György, T. Linder, G. Lugosi, and G. Ottucsák, "The on-line shortest path problem under partial monitoring," J. Mach. Learn. Res., 2007.
-
(2007)
J. Mach. Learn. Res.
-
-
György, A.1
Linder, T.2
Lugosi, G.3
Ottucsák, G.4
-
21
-
-
0029513526
-
Gambling in a rigged casino: The adversarial multi-arm bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "Gambling in a rigged casino: The adversarial multi-arm bandit problem," in Proc. of IEEE FOCS'95, 1995, pp. 322-331.
-
Proc. of IEEE FOCS'95, 1995
, pp. 322-331
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
|