This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
Existing work on testing NoC-based systems advocates to reuse the on-chip network itself as test access mechanism (TAM) to transport test data to/from embedded cores. While this m...
—In this paper, we present an interference model for cognitive radio (CR) networks employing power control or contention control scheme. The probability density functions (PDFs) ...
Zengmao Chen, Cheng-Xiang Wang, Xuemin Hong, John ...
Recent advances in Software Defined Radio (SDR), wide band spectrum sensing, and environment aware real-time spectrum allocation [13, 10, 4] show promise of enabling the new para...
Milind M. Buddhikot, Paul Kolodzy, Scott Miller, K...
—in this paper, we present a new policy for admitting Voice over IP (VoIP) sessions over wireless networks. Our proposed policy receives the admission information advertised by t...