-
1
-
-
79960855950
-
Delay-bounded adaptive ufhbased anti-jamming wireless communication
-
Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Delay-bounded adaptive ufhbased anti-jamming wireless communication," in Proc. IEEE INFOCOM' 11, 2011, pp. 1413-1421.
-
(2011)
Proc. IEEE INFOCOM' 11
, pp. 1413-1421
-
-
Wang, Q.1
Xu, P.2
Ren, K.3
Li, X.-Y.4
-
2
-
-
70349111445
-
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
-
L. Lazos, S. Liu, and M. Krunz, "Mitigating control-channel jamming attacks in multi-channel ad hoc networks," in Proc. ACM WISEC'09, 2009, pp. 169-180.
-
(2009)
Proc. ACM WISEC'09
, pp. 169-180
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
3
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
D. Slater, P. Tague, R. Poovendran, and B. J. Matt, "A coding-theoretic approach for efficient message verification over insecure channels," in Proc. ACM WISEC'09, 2009, pp. 151-160.
-
(2009)
Proc. ACM WISEC'09
, pp. 151-160
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.J.4
-
4
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM MobiHoc'05, 2005, pp. 46-57. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
6
-
-
70450192514
-
Efficient uncoordinated fhss anti-jamming communication
-
M. Strasser, C. Pöpper, and S. Capkun, "Efficient uncoordinated fhss anti-jamming communication," in Proc. ACM MobiHoc'09, 2009, pp. 207-218.
-
(2009)
Proc. ACM MobiHoc'09
, pp. 207-218
-
-
Strasser, M.1
Pöpper, C.2
Capkun, S.3
-
7
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, C. Pöpper, S. Capkun, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE S&P'08, 2008, pp. 64-78.
-
(2008)
Proc. IEEE S&P'08
, pp. 64-78
-
-
Strasser, M.1
Pöpper, C.2
Capkun, S.3
Cagalj, M.4
-
8
-
-
85034799271
-
Jamming-resistant broadcast communication without shared keys
-
C. Pöpper, M. Strasser, and S. Capkun, "Jamming-resistant broadcast communication without shared keys," in Proc. USENIX'09 Security Symposium, 2009, pp. 231-248.
-
(2009)
Proc. USENIX'09 Security Symposium
, pp. 231-248
-
-
Pöpper, C.1
Strasser, M.2
Capkun, S.3
-
9
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. MobiHoc'09, 2009, pp. 219-228.
-
(2009)
Proc. MobiHoc'09
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
10
-
-
77953306472
-
Randomized differential dsss: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential dsss: Jamming-resistant wireless broadcast communication," in Proc. IEEE INFOCOM'10, 2010, pp. 695-703.
-
(2010)
Proc. IEEE INFOCOM'10
, pp. 695-703
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
12
-
-
70450257659
-
Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors
-
T. Shu and M. Krunz, "Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors," in Proc. MobiCom'09, 2009, pp. 37-48.
-
(2009)
Proc. MobiCom'09
, pp. 37-48
-
-
Shu, T.1
Krunz, M.2
-
14
-
-
0001043843
-
Restless bandits: Activity allocation in a changing world
-
P. Whittle, "Restless bandits: activity allocation in a changing world," Journal of Applied Probability, vol. 25A, pp. 287-298, 1988.
-
(1988)
Journal of Applied Probability
, vol.25 A
, pp. 287-298
-
-
Whittle, P.1
-
15
-
-
0029513526
-
Gambling in a rigged casino: The adversarial multi-arm bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "Gambling in a rigged casino: The adversarial multi-arm bandit problem," in Proc. IEEE FOCS'95, 1995, pp. 322-331.
-
(1995)
Proc. IEEE FOCS'95
, pp. 322-331
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
16
-
-
0037709910
-
The nonstochastic multiarmed bandit problem
-
-, "The nonstochastic multiarmed bandit problem," SIAM J. Comput., vol. 32, no. 1, pp. 48-77, 2002.
-
(2002)
SIAM J. Comput.
, vol.32
, Issue.1
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
17
-
-
9444243189
-
Efficient algorithms for online decision problems
-
Learning Theory and Kernel Machines
-
A. Kalai and S. Vempala, "Efficient algorithms for online decision problems," in Proc. COLT'03, 2003, pp. 26-40. (Pubitemid 37053193)
-
(2003)
Lecture Notes in Computer Science
, Issue.2777
, pp. 26-40
-
-
Kalai, A.1
Vempala, S.2
-
18
-
-
4544345025
-
Adaptive routing with end-to-end feedback: Distributed learning and geometric approaches
-
B. Awerbuch and R. D. Kleinberg, "Adaptive routing with end-to-end feedback: distributed learning and geometric approaches," in Proc. ACM STOC'04, 2004, pp. 45-53.
-
(2004)
Proc. ACM STOC'04
, pp. 45-53
-
-
Awerbuch, B.1
Kleinberg, R.D.2
-
19
-
-
9444257628
-
Online geometric optimization in the bandit setting against an adaptive adversary
-
Learning Theory
-
H. B. McMahan and A. Blum, "Online geometric optimization in the bandit setting against an adaptive adversary," in Proc. COLT'04, 2004, pp. 109-123. (Pubitemid 38940329)
-
(2004)
Lecture Notes in Computer Science
, Issue.3120
, pp. 109-123
-
-
McMahan, H.B.1
Blum, A.2
-
20
-
-
35948943542
-
The on-line shortest path problem under partial monitoring
-
A. György, T. Linder, G. Lugosi, and G. Ottucsák, "The on-line shortest path problem under partial monitoring," J. Mach. Learn. Res., vol. 8, pp. 2369-2403, 2007. (Pubitemid 350064071)
-
(2007)
Journal of Machine Learning Research
, vol.8
, pp. 2369-2403
-
-
Gyorgy, A.1
Linder, T.2
Lugosi, G.3
Ottucsak, G.4
-
21
-
-
24644463787
-
Efficient algorithms for online decision problems
-
DOI 10.1016/j.jcss.2004.10.016, PII S0022000004001394
-
A. T. Kalai and S. Vempala, "Efficient algorithms for online decision problems," Journal of Computer System and Sciences, vol. 71, no. 3, pp. 291-307, 2005. (Pubitemid 41278182)
-
(2005)
Journal of Computer and System Sciences
, vol.71
, Issue.3
, pp. 291-307
-
-
Kalai, A.1
Vempala, S.2
-
22
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
September
-
M. Strasser, B. Danev, and S. Čapkun, "Detection of reactive jamming in sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 7, pp. 16:1-16:29, September 2010.
-
(2010)
ACM Transactions on Sensor Networks (TOSN)
, vol.7
, pp. 1601-1629
-
-
Strasser, M.1
Danev, B.2
Čapkun, S.3
-
23
-
-
84946840347
-
Short signatures from the Weil pairing
-
Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," in Proc. ASIACRYPT'01. Springer-Verlag, pp. 514-532.
-
Proc. ASIACRYPT'01
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
24
-
-
76249105714
-
Multiple round random ball placement: Power of second chance
-
X.-Y. Li, Y. Wang, and W. Feng, "Multiple round random ball placement: Power of second chance," in Proc. COCOON '09, 2009, pp. 439- 448.
-
(2009)
Proc. COCOON '09
, pp. 439-448
-
-
Li, X.-Y.1
Wang, Y.2
Feng, W.3
-
26
-
-
0030671783
-
Practical loss-resilient codes
-
M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Spielman, and V. Stemann, "Practical loss-resilient codes," in Proc. ACM STOC'97, 1997, pp. 150-159.
-
(1997)
Proc. ACM STOC'97
, pp. 150-159
-
-
Luby, M.G.1
Mitzenmacher, M.2
Shokrollahi, M.A.3
Spielman, D.A.4
Stemann, V.5
-
29
-
-
33745166587
-
Raptor codes
-
DOI 10.1109/TIT.2006.874390
-
A. Shokrollahi, "Raptor codes," IEEE/ACM Trans. Netw., vol. 14, no. SI, pp. 2551-2567, 2006. (Pubitemid 43898908)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2551-2567
-
-
Shokrollahi, A.1
|