|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 238 occurrences of 149 keywords
|
|
|
Results
Found 3765 publication records. Showing 3765 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
137 | Lei Zhang 0025, Tongtong Li |
Spectrally Efficient Frequency Hopping System Design under Hostile Jamming. |
WASA |
2009 |
DBLP DOI BibTeX RDF |
physical layer security, message-driven frequency hopping, Anti-jamming |
137 | Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang, Timothy Wood 0001 |
The feasibility of launching and detecting jamming attacks in wireless networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
jammer detection, denial of service, jamming |
125 | Hans Jonas Fossum Moen, Stein Kristoffersen |
Multi-resistant radar jamming using genetic algorithms. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
Digital RF Memory, constant false alarm rate, jamming technique design, multi-resistant optimization, pulse-doppler radar, genetic algorithm, multi-objective optimization |
119 | John P. McDermott, David M. Goldschlag |
Towards a model of storage jamming. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
storage jamming model, cryptographic techniques, detection mechanism, Unity logic, high-level operators, rate of jamming, persistent values, access control, access controls, cryptography, security of data, susceptibility |
113 | Clayton W. Commander, Panos M. Pardalos, Valeriy Ryabchenko, Oleg V. Shylo, Stan Uryasev, Grigoriy Zrazhevsky |
Jamming communication networks under complete uncertainty. |
Optim. Lett. |
2008 |
DBLP DOI BibTeX RDF |
Network interdiction, Network jamming, Optimization, Bounds |
113 | XueSong Wang, JianCheng Liu, Wenming Zhang, QiXiang Fu, Zhong Liu, XiaoXia Xie |
Mathematic principles of interrupted-sampling repeater jamming (ISRJ). |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
interrupted-sampling, repeater jamming, ambiguity function, pulse compression, linear frequency modulated signal |
101 | Mario Strasser, Christina Pöpper, Srdjan Capkun |
Efficient uncoordinated FHSS anti-jamming communication. |
MobiHoc |
2009 |
DBLP DOI BibTeX RDF |
wireless security, frequency hopping, anti-jamming |
95 | Jerry T. Chiang, Yih-Chun Hu |
Cross-layer jamming detection and mitigation in wireless broadcast networks. |
MobiCom |
2007 |
DBLP DOI BibTeX RDF |
key tree, CDMA, cross-layer, jamming, spread spectrum, anti-jamming |
95 | Sandeep Bhadra, Shreeshankar Bodas, Sanjay Shakkottai, Sriram Vishwanath |
Communication Through Jamming Over a Slotted ALOHA Channel. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
95 | Daniel Meltz, Yizhar Or, Elon Rimon |
Experimental Verification and Graphical Characterization of Dynamic Jamming in Frictional Rigid-Body Mechanics. |
ICRA |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Anthony D. Wood, John A. Stankovic, Gang Zhou |
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks. |
SECON |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen 0001 |
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Li-Der Jeng, Jen-Hou Huang, Chung-Hsuan Wang |
Performance of low-density parity-check coded FFH/BFSK systems under band multitone jamming. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
FFH/BFSK, band multitone jamming, LDPC |
83 | Leonard E. Lightfoot, Lei Zhang 0025, Jian Ren 0001, Tongtong Li |
Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems. |
EIT |
2009 |
DBLP DOI BibTeX RDF |
|
83 | Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa |
On the Performance of IEEE 802.11 under Jamming. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Wenyuan Xu 0001, Ke Ma 0004, Wade Trappe, Yanyong Zhang |
Jamming sensor networks: attack and defense strategies. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
77 | Timothy X. Brown, Jesse E. James, Amita Sethi |
Jamming and sensing of encrypted wireless ad hoc networks. |
MobiHoc |
2006 |
DBLP DOI BibTeX RDF |
ad hoc networks, encryption, traffic analysis, sensing, jamming |
77 | Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, clustering, MAC protocols, jamming, denial-of-service attacks |
77 | Vera P. Behar, Christo A. Kabakchiev, Lyubka Doukovska |
Adaptive CFAR PI Processor for Radar Target Detection in Pulse Jamming. |
J. VLSI Signal Process. |
2000 |
DBLP DOI BibTeX RDF |
CFAR API processor, detection in pulse jamming, target detection performance calculation, parallel algorithms, systolic architecture |
71 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
71 | Chi Chung Ko, Hung Nguyen-Le, Lei Huang |
ML-based follower jamming rejection in slow FH/MFSK systems with an antenna array. |
IEEE Trans. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks. |
MobiQuitous |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Wei Chen 0006, Danwei Chen, Guozi Sun, Yingzhou Zhang |
Defending Against Jamming Attacks in Wireless Local Area Networks. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
71 | Koichi Ichige, Mitsuharu Imai, Hiroyuki Arai, Masayuki Nakano, Masafumi Hirono |
Direction of Arrival Detection System for Radio Surveillance: Frequency Spectrum Analysis of CDMA and Jamming Waves. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
71 | Chulho Won, Jong-Hoon Youn, Hesham H. Ali |
Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Ivan Martinovic, Paul Pichota, Jens B. Schmitt |
Jamming for good: a fresh approach to authentic communication in WSNs. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, authentication, jamming |
65 | Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang |
Anti-jamming timing channels for wireless networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
jamming, timing channel, radio interference |
60 | Guevara Noubir, Guolong Lin |
Low-power DoS attacks in data wireless LANs and countermeasures. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Erik Steltz, Annan Mozeika, Nick Rodenberg, Eric Brown 0001, Heinrich M. Jaeger |
JSEL: Jamming Skin Enabled Locomotion. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
59 | Jerry T. Chiang, Yih-Chun Hu |
Dynamic Jamming Mitigation for Wireless Broadcast Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Korporn Panyim, Prashant Krishnamurthy |
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Wenyuan Xu |
On Adjusting Power to Defend Wireless Networks from Jamming. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Ashwin Sampath, Hui Dai, Haitao Zheng 0001, Ben Y. Zhao |
Multi-channel Jamming Attacks using Cognitive Radios. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Jang-Wook Moon, John M. Shea, Tan F. Wong |
Collaborative mitigation of partial-time jamming on nonfading channels. |
IEEE Trans. Wirel. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Jang-Wook Moon, Tan F. Wong, John M. Shea |
Pilot-Assisted and Blind Joint Data Detection and Channel Estimation in Partial-Time Jamming. |
IEEE Trans. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Ivan Garvanov, Christo A. Kabakchiev, Plamen Daskalov |
Systolic Architecture of Adaptive Post Detection Integration CFAR Processor in Binomial Distribution Pulse Jamming. |
LSSC |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Myung-Jin Chung, Jung-Su Han, Hyung-Jin Choi, Seok-Joong Kim |
An enhanced ECCM method using OFCDM in WiBro system. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
ECCM, IEEE 802.16e WiBro, OFCDM, jamming |
53 | Robert D. Miller, Wade Trappe |
Subverting MIMO wireless systems by jamming the channel estimation procedure. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
denial of service, jamming, mimo |
53 | Loukas Lazos, Sisi Liu, Marwan Krunz |
Mitigating control-channel jamming attacks in multi-channel ad hoc networks. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
ad hoc networks, denial of service, multi channel, jamming, control channel |
53 | Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj |
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Wireless Security, Key Establishment, Frequency Hopping, Anti-jamming |
53 | Clayton W. Commander, Panos M. Pardalos, Valeriy Ryabchenko, Stan Uryasev, Grigoriy Zrazhevsky |
The wireless network jamming problem. |
J. Comb. Optim. |
2007 |
DBLP DOI BibTeX RDF |
Network interdiction, Percentile constraints, Integer programming, NP-hard, Jamming |
53 | Eitan Altman, Konstantin Avrachenkov, Andrey Garnaev |
A Jamming Game in Wireless Networks with Transmission Cost. |
NET-COOP |
2007 |
DBLP DOI BibTeX RDF |
Non-zero-sum games, Wireless networks, Nash Equilibrium, Jamming, Water-filling |
53 | Li-Der Jeng, Shun-Sheng Lee, Chung-Hsuan Wang, Fang-Biau Ueng |
Low-density parity-check codes for FFH/BFSK systems with partial-band noise jamming. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
FFH/BFSK, diversity combining, partial-band noise jamming, LDPC |
48 | Reza Nikjah, Norman C. Beaulieu |
On Antijamming in General CDMA Systems-Part II: Antijamming Performance of Coded Multicarrier Frequency-Hopping Spread Spectrum Systems. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Kuzman Ganchev, Alex Kulesza, Jinsong Tan, Ryan Gabbard, Qian Liu, Michael J. Kearns |
Empirical Price Modeling for Sponsored Search. |
WINE |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran |
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. |
IEEE Trans. Mob. Comput. |
2010 |
DBLP DOI BibTeX RDF |
jamming detection and mitigation, wireless multiple access, security, wireless sensor network, optimization, Jamming |
47 | Miroslav Pajic, Rahul Mangharam |
Anti-jamming for embedded wireless networks. |
IPSN |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Abhinav Roongta, Jang-Wook Moon, John M. Shea |
Reliability-based hybrid ARQ as an adaptive response to jamming. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Jie Zhang, Gang Wu, Xiaowei Yan |
Comparative Analysis of Sweeping Frequency Jamming and Non-sweeping Frequency Jamming in Partial-band Jamming Based on Projectile-carried Communication Jamming. |
ICCT |
2020 |
DBLP DOI BibTeX RDF |
|
42 | David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt |
A coding-theoretic approach for efficient message verification over insecure channels. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
insecure channels, insertion attacks, message verification, jamming |
42 | Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux |
Wormhole-Based Antijamming Techniques in Sensor Networks. |
IEEE Trans. Mob. Comput. |
2007 |
DBLP DOI BibTeX RDF |
jamming DoS attacks, security, simulations, Wireless sensor networks, probabilistic analysis, wormholes |
42 | Jin Myoung Kim, Tae Ho Cho |
Genetic Algorithm Based Routing Method for Efficient Data Transmission in Sensor Networks. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
radio-jamming zone, Genetic algorithm, sensor network, shortest path |
42 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
42 | Markus Breitbach, Hideki Imai |
On Channel Capacity and Modulation of Watermarks in Digital Still Images. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Watermarking, Fingerprinting, Copyright protection, Modulation, Jamming, Channel Capacity |
42 | Hideki Imai |
Information Security Aspects of Spread Spectrum Systems. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Spread Spectrum System, Information Security, CDMA, Jamming, Cellular System, Untraceability |
41 | Yee Wei Law, Marimuthu Palaniswami, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. |
ACM Trans. Sens. Networks |
2009 |
DBLP DOI BibTeX RDF |
clustering, MAC protocols, expectation maximization, jamming, denial-of-service attacks |
36 | Pramod Abichandani, Hande Y. Benson, Moshe Kam |
Multi-vehicle path coordination in support of communication. |
ICRA |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, Hamid Sharif |
An approach to secure wireless communications using randomized eigenvector-based jamming signals. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
physical layer security, secrecy capacity |
35 | Annan Mozeika, Erik Steltz, Heinrich M. Jaeger |
The first steps of a robot based on jamming skin enabled locomotion. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Maria Greco 0001, Fulvio Gini, Alfonso Farina |
Radar Detection and Classification of Jamming Signals Belonging to a Cone Class. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Patrick Tague, Sidharth Nabar, James A. Ritcey, David Slater, Radha Poovendran |
Throughput optimization for multipath unicast routing under probabilistic jamming. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jiliang Zhang 0003, Kah Chan Teh, Kwok Hung Li |
Rejection of Multitone Jamming for FFH/MFSK Spread-Spectrum Systems over Frequency-Selective Rayleigh-Fading Channels. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
35 | H. X. Yang, F. M. Chen, Z. M. Li, Z. Q. Wu |
Study on the Engineering Factors of Jamming Effect of the Laser Blinding and Computer Simulation. |
CSSE (4) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ghada Alnifie, Robert Simon |
A multi-channel defense against jamming attacks in wireless sensor networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Wayne G. Phoel |
Iterative demodulation and decoding of frequency-hopped PSK in partial-band jamming. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Guevara Noubir |
On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility. |
WWIC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Ivan Garvanov, Vera P. Behar, Christo A. Kabakchiev |
CFAR Processors in Pulse Jamming. |
Numerical Methods and Application |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Yoshiki Kashimori, Satoru Inoue, Takeshi Kambara |
A neural mechanism of hyperaccurate detection of phase advance and delay in the jamming avoidance response of weakly electric fish. |
Biol. Cybern. |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Lin Chen 0002, Jean Leneutre |
Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy. |
Comput. Networks |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Eduard Garcia Villegas, Moisés Gómez, Elena López-Aguilera, Jordi Casademont |
Detecting and mitigating the impact of wideband jammers in IEEE 802.11 WLANs. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
resource management, jamming, IEEE 802.11 WLANs |
30 | Siddharth Maru, Timothy X. Brown |
Denial of service vulnerabilities in the 802.16 protocol. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access |
30 | Jin Myoung Kim, Tae Ho Cho |
Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
radio-jamming zone, Genetic algorithm, sensor network, fuzzy logic, shortest path |
30 | S. Ananthi, R. Hariprakash, V. Vidya Devi, K. Padmanabhan |
Spread Spectrum Communication Using Wavelets of Signal for More Security. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
Wavelet synthesis, Wavelet analysis, jamming, Spread spectrum |
29 | Kanghee Lee 0001, Tooran Emami, Yazan Ibdah, Yu Bi, Lun Li |
Cooperative Distributed MISO Wireless Relay Networks Under Jamming Environments with Power Constraints. |
CICSyN |
2011 |
DBLP DOI BibTeX RDF |
Amplify-and-forward, amplifying relay matrix, broadband noise jamming, minimum mean square error, power constraint |
29 | Qi Dong 0001, Donggang Liu |
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing. |
ICDCS |
2010 |
DBLP DOI BibTeX RDF |
Jamming Attacks, Wireless Networks |
29 | Shui Cao, Xueguang Zhou, Yan Sun, Huanguo Zhang |
Research on Chinese Key Words Mining with Malicious Jamming in English. |
IFITA (3) |
2009 |
DBLP DOI BibTeX RDF |
keyword mining, malicious jamming in English, Chinese information processing, data base technology, network security |
29 | Sushil Kumar Jain, Kumkum Garg |
A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks. |
CICSyN |
2009 |
DBLP DOI BibTeX RDF |
Jamming Attack, Denial of Service (DoS), Multipath Routing |
29 | Wenyuan Xu, Wade Trappe, Yanyong Zhang |
Channel surfing: defending wireless sensor networks from jamming and interference. |
SenSys |
2006 |
DBLP DOI BibTeX RDF |
channel surfing, jamming, radio interference |
29 | Hank Rausch |
Jamming Commercial Satellite Communications During Wartime: An Empirical Study. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
commercial satellite communications, hostile interference, jamming, denial of service attack |
29 | Hande Y. Benson, David F. Shanno, Robert J. Vanderbei |
Interior-point methods for nonconvex nonlinear programming: Jamming and numerical testing. |
Math. Program. |
2004 |
DBLP DOI BibTeX RDF |
nonlinear programming, interior-point methods, jamming, nonconvex optimization |
24 | Rajgopal Kannan, Shuangqing Wei, Costas Busch, Athanasios V. Vasilakos |
Online Algorithms for Maximizing Quality of Link Transmissions over a Jammed Wireless Channel. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Hongbo Liu 0002, Wenyuan Xu 0001, Yingying Chen 0001, Zhenhua Liu 0005 |
Localizing Jammers in Wireless Networks. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Eitan Altman, Konstantin Avrachenkov, Andrey Garnaev |
Alpha-Fair Resource Allocation under Incomplete Information and Presence of a Jammer. |
NET-COOP |
2009 |
DBLP DOI BibTeX RDF |
Wireless networks, Power Control, Nash Equilibrium, Incomplete Information, Saddle Point |
24 | Andrew R. Brown, Steve Dillon, Thorin Kerr, Andrew Sorensen |
Evolving interactions: agile design for networked media performance. |
OZCHI |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Reza Nikjah, Norman C. Beaulieu |
On antijamming in general CDMA systems-part I: multiuser capacity analysis. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Qing Zhao 0001, Bhaskar Krishnamachari, Keqin Liu |
On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Tara Javidi, Bhaskar Krishnamachari, Qing Zhao 0001, Mingyan Liu |
Optimality of Myopic Sensing in Multi-Channel Opportunistic Access. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Keqin Liu, Qing Zhao 0001 |
Link throughput of multi-channel opportunistic access with limited sensing. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Shahrokh Farahmand, Alfonso Cano, Georgios B. Giannakis |
Anti-jam distributed MIMO decoding using wireless sensor networks. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
24 | M. M. Galib Asadullah, Gordon L. Stüber |
Joint EM Channel and Covariance Estimation with Sufficient-Statistic Chip Combining for a SIMO MC-CDMA Antijam System. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wei Chen, Yingzhou Zhang, Yuanchun Wei |
The Feasibility of Launching Reduction of Quality (RoQ) Attacks in 802.11 Wireless Networks. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Ajmal S. Mian |
Realtime Visual Tracking of Aircrafts. |
DICTA |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Lie-Liang Yang |
Joint Transmitter-Receiver Design in TDD Multiuser MIMO Systems: An Egocentric/Altruistic Optimization Approach. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dino Schweitzer, Leemon C. Baird III, William L. Bahn |
Visually Understanding Jam Resistant Communication. |
VizSEC |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Umit Ayvaz, Murat Dere, Yao Ming Tiah |
Using the MANA agent-based simulation tool to evaluate and compare the effectiveness of ground-based and airborne communications jammers in countering the IED threat to ground convoys. |
SpringSim (2) |
2007 |
DBLP BibTeX RDF |
Counter-IED, MANA, communications jammers, nearly orthogonal Latin hypercube, IED |
24 | Garud Iyengar, David J. Phillips, Clifford Stein 0001 |
Models of malicious behavior in sponsored search. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
approximation algorithms, sponsored search, auction theory |
24 | Chi Chung Ko, Hung Nguyen-Le, Lei Huang |
Joint Interference Suppression and Symbol Detection in Slow FH/MFSK Systems with an Antenna Array. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
24 | R. C. Chakinala, Abishek Kumarasubramanian, R. Manokaran, Guevara Noubir, C. Pandu Rangan, Ravi Sundaram |
Steganographic Communication in Ordered Channels. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3765 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|