Sciweavers

405 search results - page 74 / 81
» Securing cognitive radio networks
Sort
View
ICC
2008
IEEE
169views Communications» more  ICC 2008»
14 years 4 months ago
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access
—We consider opportunistic communications over multiple channels where the state (“good” or “bad”) of each channel evolves as independent and identically distributed Mark...
Tara Javidi, Bhaskar Krishnamachari, Qing Zhao, Mi...
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 4 months ago
On The Rate-Distance Adaptability of Slotted Aloha
—In wireless communication systems, the signal strength/quality generally varies with the distances between transmitters and receivers. As a consequence, the throughput in the MA...
Chih-Cheng Tseng, Shao-Yu Lien, Kwang-Cheng Chen, ...
INFOCOM
2008
IEEE
14 years 4 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu
DATE
2006
IEEE
171views Hardware» more  DATE 2006»
14 years 4 months ago
4G applications, architectures, design methodology and tools for MPSoC
transistors the design of the SoC needs to be moved to a higher level of abstraction. We need to think in processors and interconnects rather than gates and wires. We discuss the n...
CORR
2010
Springer
187views Education» more  CORR 2010»
13 years 10 months ago
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit
We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. In this problem, at each time, a player chooses K out of N (N > K) arms to play. The state of ...
Haoyang Liu, Keqin Liu, Qing Zhao