Sciweavers

236 search results - page 3 / 48
» Model of primary and secondary context
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
WCNC
2008
IEEE
14 years 1 months ago
Modeling an Opportunistic Spectrum Sharing System with a Correlated Arrival Process
— In an opportunistic spectrum sharing (OSS) wireless network there are two types of users: primary users and secondary users. The primary users own the license for the system ba...
Shensheng Tang, Brian L. Mark
SECON
2007
IEEE
14 years 1 months ago
Self-Learning Repeated Game Framework for Distributed Primary-Prioritized Dynamic Spectrum Access
Dynamic spectrum access has become a promising approach to fully utilize the scarce spectrum resources. In a dynamically changing spectrum environment, it is very important to desi...
Beibei Wang, Zhu Ji, K. J. Ray Liu
MOBICOM
2009
ACM
14 years 1 months ago
Revenue maximization and distributed power allocation in cognitive radio networks
Cognitive radio is an enabling technology that allows unlicensed users to opportunistically access the spectrum in order to enhance the spectrum efficiency. In this paper, we cons...
Shaolei Ren, Mihaela van der Schaar
WD
2010
13 years 5 months ago
Coexistence of radio networks using Aloha
: In this paper we use an analytical model to study how two radio networks : a primary network and a secondary network can coexist within the same area. We use a very simple protoc...
Bartlomiej Blaszczyszyn, Paul Mühlethaler, Sk...