Sciweavers

2500 search results - page 106 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
136
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
151
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao
TIT
2011
193views more  TIT 2011»
14 years 10 months ago
Optimal Resource Allocation for MIMO Ad Hoc Cognitive Radio Networks
—Maximization of the weighted sum-rate of secondary users (SUs) possibly equipped with multiantenna transmitters and receivers is considered in the context of cognitive radio (CR...
Seung-Jun Kim, Georgios B. Giannakis
181
Voted
CISS
2010
IEEE
14 years 7 months ago
On performance evaluation of cooperative spectrum sensing in cognitive radio networks
—This paper presents the system level performance evaluation for energy-detection based cooperative spectrum sensing in cognitive radio networks. Three performance criteria are q...
Gang Xiong, Shalinee Kishore, Aylin Yener
203
Voted
IPPS
2006
IEEE
15 years 9 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao