-
1
-
-
85019170297
-
-
May Online
-
(2004, May). [Online]. Available: http://www.wikidevi.com/files/Atheros/specsheets/AR5005GS-(AR2414).pdf
-
(2004)
-
-
-
2
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
I. Akyildiz, W. Y. Lee, M. Vuran, and S. Mohanty, "Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey," Comput. Netw., vol. 50, no. 13, pp. 2127-2159, 2006.
-
(2006)
Comput. Netw.
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.1
Lee, W.Y.2
Vuran, M.3
Mohanty, S.4
-
3
-
-
79960857311
-
Truthful spectrum auctions with approximate revenue
-
M. Al-Ayyoub and H. Gupta, "Truthful spectrum auctions with approximate revenue," in Proc. IEEE INFOCOM, 2011, pp. 2813-2821.
-
(2011)
Proc. IEEE INFOCOM
, pp. 2813-2821
-
-
Al-Ayyoub, M.1
Gupta, H.2
-
4
-
-
85013990027
-
Incentive compatible multi unit combinatorial auctions
-
Y. Bartal, R. Gonen, and N. Nisan, "Incentive compatible multi unit combinatorial auctions," in Proc. 9th Conf. Theoretical Aspects Rationality knowl., 2003, pp. 72-87.
-
(2003)
Proc. 9th Conf. Theoretical Aspects Rationality Knowl.
, pp. 72-87
-
-
Bartal, Y.1
Gonen, R.2
Nisan, N.3
-
5
-
-
0032661701
-
Utility max-min: An application-oriented bandwidth allocation scheme
-
Z. Cao and E. W. Zegura, "Utility max-min: An application-oriented bandwidth allocation scheme," in Proc. IEEE INFOCOM, 1999, pp. 793-801.
-
(1999)
Proc. IEEE INFOCOM
, pp. 793-801
-
-
Cao, Z.1
Zegura, E.W.2
-
7
-
-
33645117025
-
Demand reduction in multi-unit auctions with varying numbers of bidders: Theory and field experiments
-
R. Engelbrecht-Wiggans, J. List, and D. Reiley, "Demand reduction in multi-unit auctions with varying numbers of bidders: Theory and field experiments," Int. Econ. Rev., vol. 47, no. 1, pp. 203-231, 2006.
-
(2006)
Int. Econ. Rev.
, vol.47
, Issue.1
, pp. 203-231
-
-
Engelbrecht-Wiggans, R.1
List, J.2
Reiley, D.3
-
8
-
-
84897676732
-
Sustenance against RLbased Sybil attacks in cognitive radio networks using dynamic reputation systems
-
K. Ezirim, E. Troja, and S. Sengupta, "Sustenance against RLbased Sybil attacks in cognitive radio networks using dynamic reputation systems," in Proc. IEEE Military Commun. Conf., 2013, pp. 1789-1794.
-
(2013)
Proc. IEEE Military Commun. Conf.
, pp. 1789-1794
-
-
Ezirim, K.1
Troja, E.2
Sengupta, S.3
-
9
-
-
1542299160
-
Impact of interference on multi-hop wireless network performance
-
K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu, "Impact of interference on multi-hop wireless network performance," in Proc. 9thACMAnnu. Int. Conf. Mobile Comput. Netw., 2003, pp. 66-80.
-
(2003)
Proc. 9thACMAnnu. Int. Conf. Mobile Comput. Netw.
, pp. 66-80
-
-
Jain, K.1
Padhye, J.2
Padmanabhan, V.N.3
Qiu, L.4
-
10
-
-
0003773445
-
A quantitative measure of fairness and discrimination for resource allocation in shared computer systems
-
Digital Equipment Corporation, Hudson, MA, USA, Tech. Rep. DEC-TR-301
-
R. Jain, D. Chiu, and W. Hawe, "A quantitative measure of fairness and discrimination for resource allocation in shared computer systems," Eastern Research Laboratory, Digital Equipment Corporation, Hudson, MA, USA, Tech. Rep. DEC-TR-301, 1984.
-
(1984)
Eastern Research Laboratory
-
-
Jain, R.1
Chiu, D.2
Hawe, W.3
-
11
-
-
70450159053
-
Revenue generation for truthful spectrum auction in dynamic spectrum access
-
J. Jia, Q. Zhang, Q. Zhang, and M. Liu, "Revenue generation for truthful spectrum auction in dynamic spectrum access," in Proc. 10th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2009, pp. 3-12.
-
(2009)
Proc. 10th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 3-12
-
-
Jia, J.1
Zhang, Q.2
Zhang, Q.3
Liu, M.4
-
13
-
-
84880886896
-
Robust multi-unit auction protocol against false-name bids
-
S. Matsubara, M. Yokoo, and Y. Sakurai, "Robust multi-unit auction protocol against false-name bids," in Proc. 17th Int. Joint Conf. Artificial Intell., 2001, pp. 1089-1094.
-
(2001)
Proc. 17th Int. Joint Conf. Artificial Intell.
, pp. 1089-1094
-
-
Matsubara, S.1
Yokoo, M.2
Sakurai, Y.3
-
14
-
-
0035422448
-
Robust combinatorial auction protocol against false-name bids
-
S. Matsubara, M. Yokoo, and Y. Sakurai, "Robust combinatorial auction protocol against false-name bids," Artificial Intell., vol. 130, no. 1, pp. 167-181, 2002.
-
(2002)
Artificial Intell.
, vol.130
, Issue.1
, pp. 167-181
-
-
Matsubara, S.1
Yokoo, M.2
Sakurai, Y.3
-
16
-
-
57849120176
-
Chicago spectrum occupancy measurements & analysis and a long-term studies proposal
-
M. McHenry, P. Tenhula, D. McCloskey, D. Roberson, and C. Hood, "Chicago spectrum occupancy measurements & analysis and a long-term studies proposal," in Proc. 1st Int. Workshop Technol. Policy Accessing Spectrum, 2006, Art. no. 1.
-
(2006)
Proc. 1st Int. Workshop Technol. Policy Accessing Spectrum
-
-
McHenry, M.1
Tenhula, P.2
McCloskey, D.3
Roberson, D.4
Hood, C.5
-
18
-
-
84867932159
-
A note on greedy algorithms for the maximum weighted independent set problem
-
S. Sakai, M. Togasaki, and K. Yamazaki, "A note on greedy algorithms for the maximum weighted independent set problem," Discrete Appl. Math., vol. 126, no. 2, pp. 313-322, 2003.
-
(2003)
Discrete Appl. Math.
, vol.126
, Issue.2
, pp. 313-322
-
-
Sakai, S.1
Togasaki, M.2
Yamazaki, K.3
-
19
-
-
80052169490
-
Spectrum stealing via Sybil attacks in DSA networks: Implementation and defense
-
Y. Tan, S. Sengupta, and K. Subbalakshmi, "Spectrum stealing via Sybil attacks in DSA networks: Implementation and defense," in Proc. IEEE Int. Conf. Commun., 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun.
, pp. 1-5
-
-
Tan, Y.1
Sengupta, S.2
Subbalakshmi, K.3
-
20
-
-
1142280946
-
False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values
-
K. Terada and M. Yokoo, "False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values," in Proc. 2nd Int. Joint Conf. Autonomous Agents Multiagent Syst., 2003, pp. 337-344.
-
(2003)
Proc. 2nd Int. Joint Conf. Autonomous Agents Multiagent Syst.
, pp. 337-344
-
-
Terada, K.1
Yokoo, M.2
-
21
-
-
84899851269
-
Characterizing false-name-proof allocation rules in combinatorial auctions
-
T. Todo, A. Iwasaki, M. Yokoo, and Y. Sakurai, "Characterizing false-name-proof allocation rules in combinatorial auctions," in Proc. 8th Int. Conf. Autonomous Agents Multiagent Syst., 2009, pp. 265-272.
-
(2009)
Proc. 8th Int. Conf. Autonomous Agents Multiagent Syst.
, pp. 265-272
-
-
Todo, T.1
Iwasaki, A.2
Yokoo, M.3
Sakurai, Y.4
-
22
-
-
84907189432
-
A truthful qos-aware spectrum auction with spatial reuse for large-scale networks
-
Q. Wang, B. Ye, S. Lu, and S. Guo, "A truthful qos-aware spectrum auction with spatial reuse for large-scale networks," IEEE Trans. Parallel Distrib. Syst., vol. 46, no. 1, pp. 2499-2508, 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.46
, Issue.1
, pp. 2499-2508
-
-
Wang, Q.1
Ye, B.2
Lu, S.3
Guo, S.4
-
23
-
-
85034071213
-
ALETHEIA: Robust large-scale spectrum auctions against false-name bids
-
Q. Wang, et al., "ALETHEIA: Robust large-scale spectrum auctions against false-name bids," in Proc. 16th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2015, pp. 27-36.
-
(2015)
Proc. 16th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 27-36
-
-
Wang, Q.1
-
24
-
-
79960850364
-
SMALL: A strategy-proof mechanism for radio spectrum allocation
-
F. Wu and N. Vaidya, "SMALL: A strategy-proof mechanism for radio spectrum allocation," in Proc. IEEE INFOCOM, 2011, pp. 81-85.
-
(2011)
Proc. IEEE INFOCOM
, pp. 81-85
-
-
Wu, F.1
Vaidya, N.2
-
25
-
-
72949090674
-
A scalable collusion-resistant multi-winner cognitive spectrum auction game
-
Dec.
-
Y. Wu, B.Wang, K. Liu, and T. Clancy, "A scalable collusion-resistant multi-winner cognitive spectrum auction game," IEEE Trans. Commun., vol. 57, no. 12, pp. 3805-3816, Dec. 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.12
, pp. 3805-3816
-
-
Wu, Y.1
Wang, B.2
Liu, K.3
Clancy, T.4
-
26
-
-
0033720647
-
The effect of false-name declarations in mechanism design: Towards collective decision making on the internet
-
M. Yokoo, Y. Sakurai, and S. Matsubara, "The effect of false-name declarations in mechanism design: Towards collective decision making on the internet," in Proc. IEEE 20th Int. Conf. Distrib. Comput. Syst., 2000, pp. 146-453.
-
(2000)
Proc. IEEE 20th Int. Conf. Distrib. Comput. Syst.
, pp. 146-453
-
-
Yokoo, M.1
Sakurai, Y.2
Matsubara, S.3
-
27
-
-
0347031344
-
The effect of false-name bids in combinatorial auctions: New fraud in internet auctions
-
M. Yokoo, Y. Sakurai, and S. Matsubara, "The effect of false-name bids in combinatorial auctions: New fraud in internet auctions," Games Econ. Behavior, vol. 46, no. 1, pp. 174-188, 2004.
-
(2004)
Games Econ. Behavior
, vol.46
, Issue.1
, pp. 174-188
-
-
Yokoo, M.1
Sakurai, Y.2
Matsubara, S.3
-
28
-
-
10444275085
-
Robust double auction protocol against false-name bids
-
M. Yokoo, Y. Sakurai, and S. Matsubara, "Robust double auction protocol against false-name bids," Decision Support Syst., vol. 39, no. 2, pp. 241-252, 2005.
-
(2005)
Decision Support Syst.
, vol.39
, Issue.2
, pp. 241-252
-
-
Yokoo, M.1
Sakurai, Y.2
Matsubara, S.3
-
29
-
-
60149101747
-
EBay in the sky: Strategy-proof wireless spectrum auctions
-
X. Zhou, S. Gandhi, S. Suri, and H. Zheng, "eBay in the sky: Strategy-proof wireless spectrum auctions," in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., 2008, pp. 2-13.
-
(2008)
Proc. 14th ACM Int. Conf. Mobile Comput. Netw.
, pp. 2-13
-
-
Zhou, X.1
Gandhi, S.2
Suri, S.3
Zheng, H.4
-
30
-
-
70349694010
-
Trust: A general framework for truthful double spectrum auctions
-
X. Zhou and H. Zheng, "Trust: A general framework for truthful double spectrum auctions," in Proc. IEEE INFOCOM, 2009, pp. 999-1007.
-
(2009)
Proc. IEEE INFOCOM
, pp. 999-1007
-
-
Zhou, X.1
Zheng, H.2
|