-
1
-
-
77953529909
-
Chicago spectrum occupancy measurements & analysis and a long-term studies proposal
-
ser. TAPAS '06. New York, NY, USA: ACM, [Online]
-
M. A. McHenry, P. A. Tenhula, D. McCloskey, D. A. Roberson, and C. S. Hood, "Chicago spectrum occupancy measurements & analysis and a long-term studies proposal," in Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum, ser. TAPAS '06. New York, NY, USA: ACM, 2006. [Online]. Available: http://doi.acm.org/10.1145/ 1234388.1234389
-
(2006)
Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum
-
-
McHenry, M.A.1
Tenhula, P.A.2
McCloskey, D.3
Roberson, D.A.4
Hood, C.S.5
-
2
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
[Online]
-
I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, "Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey," Computer Networks, vol. 50, no. 13, pp. 2127-2159, 2006. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128606001009
-
(2006)
Computer Networks
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.-Y.2
Vuran, M.C.3
Mohanty, S.4
-
3
-
-
85032751060
-
A survey of dynamic spectrum access
-
Q. Zhao and B. Sadler, "A survey of dynamic spectrum access," IEEE Signal Processing Magazine, vol. 24, no. 3, pp. 79-89, 2007.
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.3
, pp. 79-89
-
-
Zhao, Q.1
Sadler, B.2
-
4
-
-
84890061653
-
A survey on dynamic spectrum access techniques for cognitive radio
-
ABS/1201.1964
-
A. Garhwal and P. P. Bhattacharya, "A survey on dynamic spectrum access techniques for cognitive radio," CoRR, vol. abs/1201.1964, 2012.
-
(2012)
CoRR
-
-
Garhwal, A.1
Bhattacharya, P.P.2
-
5
-
-
77953766580
-
Optimal jamming attack strategies and network defense policies in wireless sensor networks
-
Aug., [Online]
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attack strategies and network defense policies in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1119-1133, Aug. 2010. [Online]. Available: http://dx.doi.org/10.1109/TMC.2010.75
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.8
, pp. 1119-1133
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
6
-
-
80052157752
-
Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
-
L. Dong, H. Yousefi'zadeh, and H. Jafarkhani, "Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper," in IEEE International Conference on Communications (ICC), 2011, pp. 1-5.
-
(2011)
IEEE International Conference on Communications (ICC)
, pp. 1-5
-
-
Dong, L.1
Yousefi'Zadeh, H.2
Jafarkhani, H.3
-
7
-
-
84873546762
-
A zero-sum power allocation game in the parallel gaussian wiretap channel with an unfriendly jammer
-
M. Ara, H. Reboredo, S. Ghanem, and M. Rodrigues, "A zero-sum power allocation game in the parallel gaussian wiretap channel with an unfriendly jammer," in IEEE International Conference on Communication Systems (ICCS), 2012, pp. 60-64.
-
(2012)
IEEE International Conference on Communication Systems (ICCS)
, pp. 60-64
-
-
Ara, M.1
Reboredo, H.2
Ghanem, S.3
Rodrigues, M.4
-
8
-
-
84877683652
-
Optimal transmission power control in the presence of a smart jammer
-
D. Yang, J. Zhang, X. Fang, A. Richa, and G. Xue, "Optimal transmission power control in the presence of a smart jammer," in IEEE Global Communications Conference (GLOBECOM), 2012, pp. 5506-5511.
-
(2012)
IEEE Global Communications Conference (GLOBECOM)
, pp. 5506-5511
-
-
Yang, D.1
Zhang, J.2
Fang, X.3
Richa, A.4
Xue, G.5
-
9
-
-
70349996116
-
MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
-
Y. Sagduyu, R. Berry, and A. Ephremides, "MAC games for distributed wireless network security with incomplete information of selfish and malicious user types," in International Conference on Game Theory for Networks, 2009, pp. 130-139.
-
(2009)
International Conference on Game Theory for Networks
, pp. 130-139
-
-
Sagduyu, Y.1
Berry, R.2
Ephremides, A.3
-
10
-
-
84865426812
-
Optimum power allocation for average power constrained jammers in the presence of non-gaussian noise
-
S. Bayram, N. D. Vanli, B. Dulek, I. Sezer, and S. Gezici, "Optimum power allocation for average power constrained jammers in the presence of non-gaussian noise," IEEE Communications Letters, vol. 16, no. 8, pp. 1153-1156, 2012.
-
(2012)
IEEE Communications Letters
, vol.16
, Issue.8
, pp. 1153-1156
-
-
Bayram, S.1
Vanli, N.D.2
Dulek, B.3
Sezer, I.4
Gezici, S.5
-
11
-
-
84855466075
-
Anti-jamming games in multichannel cognitive radio networks
-
Y. Wu, B. Wang, K. Liu, and T. Clancy, "Anti-jamming games in multichannel cognitive radio networks," IEEE Journal on Selected Areas in Communications, vol. 30, no. 1, pp. 4-15, 2012.
-
(2012)
IEEE Journal on Selected Areas in Communications
, vol.30
, Issue.1
, pp. 4-15
-
-
Wu, Y.1
Wang, B.2
Liu, K.3
Clancy, T.4
-
13
-
-
84923996598
-
-
New York, NY, USA: Cambridge University Press
-
A. Goldsmith, Wireless Communications. New York, NY, USA: Cambridge University Press, 2005.
-
(2005)
Wireless Communications
-
-
Goldsmith, A.1
-
14
-
-
0004156740
-
-
2nd ed., ser. Springer Series in Statistics. New York, NY: Springer
-
R. B. Nelsen, An Introduction to Copulas, 2nd ed., ser. Springer Series in Statistics. New York, NY: Springer, 2006.
-
(2006)
An Introduction to Copulas
-
-
Nelsen, R.B.1
-
15
-
-
33746832500
-
The colonel blotto game
-
September, [Online]
-
B. Roberson, "The colonel blotto game," Economic Theory, vol. 29, no. 1, pp. 1-24, September 2006. [Online]. Available: http://ideas.repec. org/a/spr/joecth/v29y2006i1p1-24.html
-
(2006)
Economic Theory
, vol.29
, Issue.1
, pp. 1-24
-
-
Roberson, B.1
|