Sciweavers

105 search results - page 13 / 21
» Opportunistic Transient-Fault Detection
Sort
View
ACSAC
2007
IEEE
15 years 3 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
VTC
2008
IEEE
185views Communications» more  VTC 2008»
15 years 3 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
GLOBECOM
2010
IEEE
14 years 7 months ago
Is High Quality Sensing Really Necessary for Opportunistic Spectrum Usage?
The major requirement for Cognitive Radio (CR) based opportunistic spectrum re-usage is reliable protection of the primary communication. This calls for a reliable detection of the...
Christian Dombrowski, Daniel Willkomm, Adam Wolisz
WCNC
2008
IEEE
15 years 3 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
92
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Collaborative Opportunistic Spectrum Access in the Presence of Multiple Transmitters
Abstract— We present a collaborative algorithm to enable opportunistic spectrum access for cognitive radios in the presence of multiple co-channel transmitters. A spectrum hole d...
Ahmed O. Nasif, Brian L. Mark