Sciweavers

1756 search results - page 281 / 352
» Cognitive Network Interference
Sort
View
OSDI
2000
ACM
14 years 11 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
PIMRC
2010
IEEE
14 years 7 months ago
A secrecy game with an informed jammer relay
A four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is investigated when the jammer relay is causally given the source message....
Melda Yuksel, Xi Liu, Elza Erkip
ICASSP
2011
IEEE
14 years 1 months ago
Dynamic spectrum management in DSL with asynchronous crosstalk
Dynamic spectrum management (DSM) aims to optimally allocate per-user transmit spectra so that the effect of multiuser interference (crosstalk) is minimized and the capabilities o...
Rodrigo B. Moraes, Paschalis Tsiaflakis, Marc Moon...
MOBICOM
2009
ACM
15 years 4 months ago
Capacity of large-scale CSMA wireless networks
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schem...
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
SPAA
2003
ACM
15 years 3 months ago
On local algorithms for topology control and routing in ad hoc networks
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any fixed infrastructure. Indeed, an important task of an ad hoc network...
Lujun Jia, Rajmohan Rajaraman, Christian Scheidele...