Sciweavers

562 search results - page 106 / 113
» Controlled random access MAC for network utility maximizatio...
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
WCNC
2008
IEEE
14 years 2 months ago
Proportional Fair Scheduling: Analytical Insight under Rayleigh Fading Environment
—This paper provides analytical expressions to evaluate the performance of a random access wireless network in terms of user throughput and network throughput, subject to the con...
Erwu Liu, Kin K. Leung
JSAC
2011
219views more  JSAC 2011»
13 years 2 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
INFOCOM
2011
IEEE
12 years 11 months ago
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets
Abstract—Secondary spectrum access is emerging as a promising approach for mitigating the spectrum scarcity in wireless networks. Coordinated spectrum access for secondary users ...
Ajay Gopinathan, Zongpeng Li, Chuan Wu
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 7 months ago
Truthful Unsplittable Flow for Large Capacity Networks
The unsplittable flow problem is one of the most extensively studied optimization problems in the field of networking. An instance of it consists of an edge capacitated graph and ...
Yossi Azar, Iftah Gamzu, Shai Gutner