Sciweavers

GLOBECOM
2010
IEEE
13 years 2 months ago
Maximize Secondary User Throughput via Optimal Sensing in Multi-Channel Cognitive Radio Networks
In a cognitive radio network, the full-spectrum is usually divided into multiple channels. However, due to the hardware and energy constraints, a cognitive user (also called second...
Shimin Gong, Ping Wang, Wei Liu, Wei Yuan
GLOBECOM
2010
IEEE
13 years 2 months ago
Compact Wakeup Scheduling in Wireless Sensor Networks
In a traditional wakeup scheduling, sensor nodes start up numerous times to communicate in a period, thus consuming extra energy due to state transitions (e.g. from the sleep state...
Junchao Ma, Wei Lou
GLOBECOM
2010
IEEE
13 years 2 months ago
Cross-Layer Attack and Defense in Cognitive Radio Networks
The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily re...
Wenkai Wang, Yan Sun, Husheng Li, Zhu Han
GLOBECOM
2010
IEEE
13 years 2 months ago
Trusted Storage over Untrusted Networks
We consider distributed storage over two untrusted networks, whereby coding is used as a means to achieve a prescribed level of confidentiality. The key idea is to exploit the alge...
Paulo F. Oliveira, Luísa Lima, Tiago T. V. ...
GLOBECOM
2010
IEEE
13 years 2 months ago
A Tunnel-Aware Language for Network Packet Filtering
While in computer networks the number of possible protocol encapsulations is growing day after day, network administrators face ever increasing difficulties in selecting accurately...
Luigi Ciminiera, Marco Leogrande, Ju Liu, Fulvio R...
GLOBECOM
2010
IEEE
13 years 2 months ago
Information Theoretic Optimal Broadband Matching for Communication Systems
We present an information theoretic perspective on optimal broadband matching. Most of the broadband matching and communication theory literature assumes a frequencyflat reflection...
Pawandeep S. Taluja, Brian L. Hughes
GLOBECOM
2010
IEEE
13 years 2 months ago
Statistical Framework for Source Anonymity in Sensor Networks
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal framework, we propose a new model for analyzing and evalua...
Basel Alomair, Andrew Clark, Jorge Cuéllar,...
GLOBECOM
2010
IEEE
13 years 2 months ago
Mixed Time-Scale Generalized Fair Scheduling for Amplify-and-Forward Relay Networks
Abstract--We devise an optimization framework for generalized proportional fairness (GPF) under different time scales for amplify-and-forward (AF) relay networks. In GPF scheduling...
Alireza Sharifian, Petar Djukic, Halim Yanikomerog...
GLOBECOM
2010
IEEE
13 years 2 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...