Sciweavers

1102 search results - page 21 / 221
» Interference and Communications among Active Network Applica...
Sort
View
98
Voted
GLOBECOM
2008
IEEE
15 years 1 months ago
Cooperative Spectrum Allocation in Centralized Cognitive Networks Using Bipartite Matching
—Conflict free spectrum allocation for secondary users in cognitive networks is a challenging problem, since the accessible spectrum is shared among users. The problem becomes to...
Chengshi Zhao, Mingrui Zou, Bin Shen, Bumjung Kim,...
122
Voted
TSP
2010
14 years 7 months ago
Randomized and distributed self-configuration of wireless networks: two-layer Markov random fields and near-optimality
Abstract--This work studies the near-optimality versus the complexity of distributed configuration management for wireless networks. We first develop a global probabilistic graphic...
Sung-eok Jeon, Chuanyi Ji
CORR
2010
Springer
76views Education» more  CORR 2010»
14 years 7 months ago
Power Control with Imperfect Exchanges and Applications to Spectrum Sharing
In various applications, the effect of errors in gradient-based iterations is of particular importance when seeking saddle points of the Lagrangian function associated with constra...
Nikolaos Gatsis, Georgios B. Giannakis
127
Voted
CODASPY
2011
14 years 4 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
NETWORK
2006
177views more  NETWORK 2006»
15 years 10 days ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang