Sciweavers

236 search results - page 4 / 48
» Model of primary and secondary context
Sort
View
BIOCOMP
2006
13 years 8 months ago
The Use of Context-Sensitive Grammar For Modeling RNA Pseudoknots
- In this study, a context-sensitive grammar is suggested to model various forms of RNA secondary structures, especially pseudoknots. Comparing with a conventional context-free gra...
Keum-Young Sung
ICC
2008
IEEE
203views Communications» more  ICC 2008»
14 years 1 months ago
Spectrum Leasing via Distributed Cooperation in Cognitive Radio
Abstract— The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resour...
Igor Stanojev, Osvaldo Simeone, Yeheskel Bar-Ness,...
AIPS
2004
13 years 8 months ago
Fault Tolerant Planning: Toward Probabilistic Uncertainty Models in Symbolic Non-Deterministic Planning
Symbolic non-deterministic planning represents action effects as sets of possible next states. In this paper, we move toward a more probabilistic uncertainty model by distinguishi...
Rune M. Jensen, Manuela M. Veloso, Randal E. Bryan...
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway
Abstract--We consider power control in cognitive radio networks where secondary users identify and exploit instantaneous and local spectrum opportunities without causing unacceptab...
Wei Ren, Qing Zhao, Ananthram Swami
ICC
2009
IEEE
233views Communications» more  ICC 2009»
14 years 2 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi