We consider a cognitive radio system where the secondary transmitter varies its transmit power based on all the information available from the spectrum sensor. The operation of th...
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Abstract— Data gathering is one of the most important services provided by wireless sensor networks (WSNs). Since the predominant traffic pattern in data gathering services is m...
— We consider an uplink power control problem where each mobile wishes to maximize its throughput (which depends on the transmission powers of all mobiles) but has a constraint o...
Eitan Altman, Konstantin Avrachenkov, Gregory Mill...