-
2
-
-
0035465830
-
DTV coverage and service prediction, measurement and performance indices
-
DOI 10.1109/11.969370, PII S0018931601106037
-
Bendov, O., Browne, J., Rhodes, C., Wu, Y., Bouchard, P.: Dtv coverage and service prediction, measurement and performance indices. IEEE Transactions on Broadcasting 47(3), 207-217 (2001) (Pubitemid 34035537)
-
(2001)
IEEE Transactions on Broadcasting
, vol.47
, Issue.3
, pp. 207-217
-
-
Bendov, O.1
Browne, J.F.X.2
Rhodes, C.W.3
Wu, Y.4
Bouchard, P.5
-
3
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
Dong, L., Han, Z., Petropulu, A., Poor, H.: Cooperative jamming for wireless physical layer security. In: IEEE/SP 15th Workshop on Statistical Signal Processing, SSP 2009, pp. 417-420 (2009)
-
(2009)
IEEE/SP 15th Workshop on Statistical Signal Processing, SSP 2009
, pp. 417-420
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
4
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Dong, L., Han, Z., Petropulu, A., Poor, H.: Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing 58(3), 1875-1888 (2010)
-
(2010)
IEEE Transactions on Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
5
-
-
80053152170
-
Clearing the rf smog: Making 802.11n robust to cross-technology interference
-
ACM, New York
-
Gollakota, S., Adib, F., Katabi, D., Seshan, S.: Clearing the rf smog: making 802.11n robust to cross-technology interference. In: Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM 2011, pp. 170-181. ACM, New York (2011)
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM 2011
, pp. 170-181
-
-
Gollakota, S.1
Adib, F.2
Katabi, D.3
Seshan, S.4
-
6
-
-
57349128927
-
A geometric interpretation of fading in wireless networks: Theory and applications
-
Haenggi, M.: A geometric interpretation of fading in wireless networks: Theory and applications. IEEE Transactions on Information Theory 54(12), 5500-5510 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.12
, pp. 5500-5510
-
-
Haenggi, M.1
-
7
-
-
70450159053
-
Revenue generation for truthful spectrum auction in dynamic spectrum access
-
ACM, New York
-
Jia, J., Zhang, Q., Zhang, Q., Liu, M.: Revenue generation for truthful spectrum auction in dynamic spectrum access. In: Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, pp. 3-12. ACM, New York (2009)
-
(2009)
Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009
, pp. 3-12
-
-
Jia, J.1
Zhang, Q.2
Zhang, Q.3
Liu, M.4
-
8
-
-
70450164034
-
Spectrum auction framework for access allocation in cognitive radio networks
-
ACM, New York
-
Kasbekar, G.S., Sarkar, S.: Spectrum auction framework for access allocation in cognitive radio networks. In: Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, pp. 13-22. ACM, New York (2009)
-
(2009)
Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009
, pp. 13-22
-
-
Kasbekar, G.S.1
Sarkar, S.2
-
10
-
-
84858154918
-
Detecting anomalous spectrum usage in dynamic spectrum access networks
-
Special Issue on Cognitive Radio Ad Hoc Networks
-
Liu, S., Greenstein, L.J., Trappe, W., Chen, Y.: Detecting anomalous spectrum usage in dynamic spectrum access networks. Ad Hoc Networks 10(5), 831-844 (2012); Special Issue on Cognitive Radio Ad Hoc Networks
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.5
, pp. 831-844
-
-
Liu, S.1
Greenstein, L.J.2
Trappe, W.3
Chen, Y.4
-
11
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
Liu, Y., Ning, P., Dai, H.: Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 286-301 (2010)
-
(2010)
2010 IEEE Symposium on Security and Privacy (SP)
, pp. 286-301
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
12
-
-
84931425598
-
Secret communication using artificial noise
-
VTC-2005-Fall
-
Negi, R., Goel, S.: Secret communication using artificial noise. In: 2005 IEEE 62nd Vehicular Technology Conference, VTC-2005-Fall, Vol. 3, pp. 1906-1910 (2005)
-
(2005)
2005 IEEE 62nd Vehicular Technology Conference
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
15
-
-
65549120073
-
A technical framework for light-handed regulation of cognitive radios
-
Sahai, A., Woyach, K.A., Atia, G., Saligrama, V.: A technical framework for light-handed regulation of cognitive radios. Comm. Mag. 47(3), 96-102 (2009)
-
(2009)
Comm. Mag.
, vol.47
, Issue.3
, pp. 96-102
-
-
Sahai, A.1
Woyach, K.A.2
Atia, G.3
Saligrama, V.4
-
16
-
-
84879544324
-
Counter-jamming using mixed mechanical and software interference cancellation
-
ACM, New York
-
Vo-Huu, T.D., Blass, E.-O., Noubir, G.: Counter-jamming using mixed mechanical and software interference cancellation. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 31-42. ACM, New York (2013)
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013
, pp. 31-42
-
-
Vo-Huu, T.D.1
Blass, E.-O.2
Noubir, G.3
-
17
-
-
84881223293
-
Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time
-
IEEE Computer Society
-
Shen, W., Ning, P., He, X., Dai, H.: Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 2013. IEEE Computer Society (2013)
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 2013
-
-
Shen, W.1
Ning, P.2
He, X.3
Dai, H.4
-
19
-
-
84863553166
-
Enforcing dynamic spectrum access with spectrum permits
-
ACM, New York
-
Yang, L., Zhang, Z., Zhao, B.Y., Kruegel, C., Zheng, H.: Enforcing dynamic spectrum access with spectrum permits. In: Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2012, pp. 195-204. ACM, New York (2012)
-
(2012)
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2012
, pp. 195-204
-
-
Yang, L.1
Zhang, Z.2
Zhao, B.Y.3
Kruegel, C.4
Zheng, H.5
|