-
1
-
-
33745648091
-
Next eneration/ dynamic spectrum access/cognitive radio wireless networks: A survey
-
I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S. Mohanty, "Next eneration/ dynamic spectrum access/cognitive radio wireless networks: a survey," Computer Networks (Elsevier) Journal, September 2006.
-
(2006)
Computer Networks (Elsevier) Journal, September
-
-
Akyildiz, I.F.1
Lee, W.Y.2
Vuran, M.C.3
Mohanty, S.4
-
2
-
-
60149101747
-
Ebay in the sky: Strategyproof wireless spectrum auctions
-
X. Zhou, S. Gandhi, S. Suri, and H. Zheng, "Ebay in the sky: Strategyproof wireless spectrum auctions," Proc. of ACM MobiCom'08, 2008.
-
(2008)
Proc. of ACM MobiCom'08
-
-
Zhou, X.1
Gandhi, S.2
Suri, S.3
Zheng, H.4
-
3
-
-
84893327463
-
-
Spectrum Bridge, Inc
-
Spectrum Bridge, Inc.[online]. Available: http://www.spectrumbridge. com/.
-
-
-
-
4
-
-
77953208706
-
Revenue generation for truthful spectrum auction in dynamic spectrum access
-
J. Jia, Q. Zhang, Q. Zhang, and M. Liu, "Revenue generation for truthful spectrum auction in dynamic spectrum access," Proc. of ACM Mobihoc'09, 2009.
-
(2009)
Proc. of ACM Mobihoc'09
-
-
Jia, J.1
Zhang, Q.2
Zhang, Q.3
Liu, M.4
-
5
-
-
84861644883
-
Tahes: A truthful double auction mechanism for heterogeneous spectrum
-
X. Feng, Y. Chen, J. Zhang, Q. Zhang, and B. Li, "Tahes: a truthful double auction mechanism for heterogeneous spectrum," Proc. of IEEE INFOCOM'12, 2012.
-
(2012)
Proc. of IEEE INFOCOM'12
-
-
Feng, X.1
Chen, Y.2
Zhang, J.3
Zhang, Q.4
Li, B.5
-
6
-
-
79960851161
-
Preempt of not tackling bid and time based cheating in online spectrum auction
-
L. Deek, X. Zhou, K. Almeroth, and H. Zheng, "Preempt of not tackling bid and time based cheating in online spectrum auction," Proc. of IEEE INFOCOM'11, 2011.
-
(2011)
Proc. of IEEE INFOCOM'11
-
-
Deek, L.1
Zhou, X.2
Almeroth, K.3
Zheng, H.4
-
7
-
-
79953196531
-
Purging the back-room dealing secure spectrum auction leveraging paillier cryptosystem
-
M. Pan, J. Sun, and Y. Fang, "Purging the back-room dealing secure spectrum auction leveraging paillier cryptosystem," IEEE JSAC, Vol. 29, No. 4, pp. 866-876, 2011.
-
(2011)
IEEE JSAC
, vol.29
, Issue.4
, pp. 866-876
-
-
Pan, M.1
Sun, J.2
Fang, Y.3
-
8
-
-
79960667240
-
Non-identical objects auction for spectrum sharing in TV white spaces-The perspective of service providers as secondary users
-
M. Parzy and H. Bogucka, "Non-identical objects auction for spectrum sharing in TV white spaces-the perspective of service providers as secondary users", Proc. of IEEE DySPAN'11, 2011.
-
(2011)
Proc. of IEEE DySPAN'11
-
-
Parzy, M.1
Bogucka, H.2
-
9
-
-
34548759763
-
A general framework for wireless spectrum auction
-
S. Gandhi, C. Buragohain, L. Cao, H. Zheng, S. and Suri, "A general framework for wireless spectrum auction," Proc. of IEEE DySPAN'07, 2007.
-
(2007)
Proc. of IEEE DySPAN'07
-
-
Gandhi, S.1
Buragohain, C.2
Cao, L.3
Zheng S, H.4
Suri5
-
10
-
-
84861631795
-
Location privacy preservation in collaborative spectrum sensing
-
S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing, and X. Shen, "Location privacy preservation in collaborative spectrum sensing," Proc. of INFOCOM'12, 2012.
-
(2012)
Proc. of INFOCOM'12
-
-
Li, S.1
Zhu, H.2
Gao, Z.3
Guan, X.4
Xing, K.5
Shen, X.6
-
11
-
-
77953310348
-
SafeQ: Secure and efficient query processing in sensor networks
-
F. Chen, and A.X. Liu, "SafeQ: Secure and efficient query processing in sensor networks," Proc. of IEEE INFOCOM'11, 2011.
-
(2011)
Proc. of IEEE INFOCOM'11
-
-
Chen, F.1
Liu, A.X.2
-
12
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," Proc. of ACM SIGMOD'04, 2004.
-
(2004)
Proc. of ACM SIGMOD'04
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
13
-
-
80051968910
-
Quantifying location privacy
-
R. Shokri, G. Theodorakopoulos, J. Le Boudec, and J. Hubaux, "Quantifying location privacy," Proc. of IEEE S&P'11, 2011.
-
(2011)
Proc. of IEEE S&P'11
-
-
Shokri, R.1
Theodorakopoulos, G.2
Le Boudec, J.3
Hubaux, J.4
-
14
-
-
84883081776
-
Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
-
Z. Gao, H. Zhu, Y. Liu, M. Li. and Z. Cao, "Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures," Proc. of IEEE INFOCOM'13, 2013.
-
(2013)
Proc. of IEEE INFOCOM'13
-
-
Gao, Z.1
Zhu, H.2
Liu, Y.3
Li., M.4
Cao, Z.5
-
15
-
-
0035278163
-
Algorithm for packet classification
-
P. Gupta and N. McKeown, "Algorithm for packet classification, "IEEE Network, Vol. 15, No. 2, pp. 24-32, 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.2
, pp. 24-32
-
-
Gupta, P.1
McKeown, N.2
-
16
-
-
84555187531
-
Senseless: A database-driven white spaces network
-
R. Murty, R. Chandra, T. Moscibroda and P. Bahl, "Senseless: A database-driven white spaces network," IEEE TMC, Vol. 11, No. 2, pp. 189-203, 2012.
-
(2012)
IEEE TMC
, vol.11
, Issue.2
, pp. 189-203
-
-
Murty, R.1
Chandra, R.2
Moscibroda, T.3
Bahl, P.4
-
17
-
-
84893240234
-
-
March
-
"TV Fool", March 2012.[Online]. Available: http://www.tvfool. com
-
(2012)
-
-
-
18
-
-
84883071415
-
YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing
-
S. Li, H. Zhu, Z. Gao, X. Guan and K. Xing, "YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing," Proc. of IEEE INFOCOM'13, 2013.
-
(2013)
Proc. of IEEE INFOCOM'13
-
-
Li, S.1
Zhu, H.2
Gao, Z.3
Guan, X.4
Xing, K.5
-
19
-
-
84877664235
-
An adaptive deviation-tolerant secure scheme for distributed cooperative spectrum sensing
-
S. Liu, H. Zhu, S. Li, X. Li, C. Chen, and X. Guan, "An Adaptive Deviation-tolerant Secure Scheme for Distributed Cooperative Spectrum Sensing," Proc. of IEEE GLOBECOM'12, 2012.
-
(2012)
Proc. of IEEE GLOBECOM'12
-
-
Liu, S.1
Zhu, H.2
Li, S.3
Li, X.4
Chen, C.5
Guan, X.6
|