A Markov-Based Packet Dropout Model for UAV Wireless Communications
暂无分享,去创建一个
Camille Alain Rabbath | Yifeng Zhou | Jun Li | Louise Lamont | C. Rabbath | Yifeng Zhou | L. Lamont | Jun Li
[1] Shirley Radack,et al. Guidelines for Securing Wireless Local Area Networks (WLANs) , 2012 .
[2] Saifur Rahman,et al. Wireless Mesh Networking: A Key Solution for Emergency & Rural Applications , 2009, 2009 Second International Conference on Advances in Mesh Networks.
[3] K. Sam Shanmugan,et al. An equivalent Markov model for burst errors in digital channels , 1995, IEEE Trans. Commun..
[4] Xin Wang,et al. Analyzing and Optimizing Adaptive Modulation Coding Jointly With ARQ for QoS-Guaranteed Traffic , 2006, IEEE Transactions on Vehicular Technology.
[5] Wayne F. Boyer,et al. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues , 2009 .
[6] Daniel Cygan,et al. The land mobile satellite communication channel-recording, statistics, and channel model , 1991 .
[7] Donald F. Towsley,et al. Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[8] Shu Lin,et al. Automatic-repeat-request error-control schemes , 1984, IEEE Communications Magazine.
[9] Axel W. Krings,et al. Dynamic Hybrid Fault Modeling and Extended Evolutionary Game Theory for Reliability, Survivability and Fault Tolerance Analyses , 2011, IEEE Transactions on Reliability.
[10] Ali Abdi,et al. On the estimation of the K parameter for the Rice fading distribution , 2001, IEEE Communications Letters.
[11] Scott L. Feld,et al. PROVING A DISTRIBUTION-FREE GENERALIZATION OF THE CONDORCET JURY THEOREM* , 1989 .
[12] Georgios B. Giannakis,et al. Cross-Layer combining of adaptive Modulation and coding with truncated ARQ over wireless links , 2004, IEEE Transactions on Wireless Communications.
[13] G. Owen,et al. Thirteen theorems in search of the truth , 1983 .
[14] Thilo Sauter,et al. End-to-End Communication Architecture for Smart Grids , 2011, IEEE Transactions on Industrial Electronics.
[15] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[16] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[17] Michael K. Reiter,et al. Byzantine quorum systems , 1997, STOC '97.
[18] Wei Zhang,et al. Stability of networked control systems , 2001 .
[19] William Turin,et al. Performance Analysis and Modeling of Digital Transmission Systems (Information Technology: Transmission, Processing and Storage) , 2004 .
[20] Debin Gao,et al. Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance , 2009, IEEE Transactions on Dependable and Secure Computing.
[21] Mark D. Hadley,et al. A Survey of Wireless Communications for the Electric Power System , 2010 .
[22] David John Leversage,et al. Estimating a System's Mean Time-to-Compromise , 2008, IEEE Security & Privacy.
[23] Joon S. Park,et al. Cooperative Component Testing Architecture in Collaborating Network Environment , 2007, ATC.
[24] Jaume Ramis,et al. Cross-Layer Design of Adaptive Multirate Wireless Networks Using Truncated HARQ , 2011, IEEE Transactions on Vehicular Technology.
[25] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.
[26] Morteza Mardani,et al. Cross-layer link adaptation design for relay channels with cooperative ARQ protocol , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.
[27] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[28] Mario Poggioni,et al. Analyzing Performance of Multi-User Scheduling Jointly with AMC and ARQ , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[29] Performance characteristics of cellular systems with different link adaptation strategies , 2003, IEEE Trans. Veh. Technol..
[30] J. Weibull,et al. The Condorcet Jury Theorem and Heterogeneity , 2010 .
[31] Nicolas de Condorcet. Essai Sur L'Application de L'Analyse a la Probabilite Des Decisions Rendues a la Pluralite Des Voix , 2009 .
[32] Philip Schniter,et al. Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel , 2008, IEEE Transactions on Wireless Communications.
[33] Futai Zou,et al. A Survey on Security in Wireless Mesh Networks , 2010 .
[34] Hong Chang,et al. Super-resolution through neighbor embedding , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..
[35] L. Shapley,et al. Optimizing group judgmental accuracy in the presence of interdependencies , 1984 .
[36] Anna Scaglione,et al. For the Grid and Through the Grid: The Role of Power Line Communications in the Smart Grid , 2010, Proceedings of the IEEE.
[37] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[38] Taesoo Kwon,et al. Adaptive-Modulation-and-Coding-Based Transmission of Control Messages for Resource Allocation in Mobile Communication Systems , 2009, IEEE Transactions on Vehicular Technology.
[39] Vallipuram Muthukkumarasamy,et al. Securing Wireless Mesh Networks , 2008, IEEE Internet Computing.
[40] John V. Howard,et al. Cooperation in the Prisoner's Dilemma , 1988 .
[41] Dario Vlah,et al. A location-dependent runs-and-gaps model for predicting TCP performance over a UAV wireless channel , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[42] Wade Trappe,et al. A Comparative Study of AODV and OLSR on the ORBIT Testbed , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[43] Hong Shen Wang,et al. Finite-state Markov channel-a useful model for radio communication channels , 1995 .
[44] E. O. Elliott. Estimates of error rates for codes on burst-noise channels , 1963 .
[45] Ben Y. Zhao,et al. A Markov-Based Channel Model Algorithm for Wireless Networks , 2001, MSWIM '01.
[46] Fan Bai,et al. Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications , 2006, 2006 IEEE Intelligent Transportation Systems Conference.
[47] Mainak Chatterjee,et al. Trust based fusion over noisy channels through anomaly detection in cognitive radio networks , 2011, SIN '11.
[48] Michel Daoud Yacoub,et al. Bivariate nakagami-m distribution with arbitrary correlation and fading parameters , 2008, IEEE Transactions on Wireless Communications.
[49] Fumio Ishizaki,et al. Cross-Layer Design and Analysis of Wireless Networks Using the Effective Bandwidth Function , 2007, IEEE Transactions on Wireless Communications.
[50] Laurence B. Milstein,et al. A Markov model for block errors on fading channels , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.
[51] Jie Wu,et al. Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[52] Shangping Ren,et al. Analysis of binary voting algorithms for use in fault-tolerant and secure computing , 2010, The 2010 International Conference on Computer Engineering & Systems.
[53] Giovanni Pau,et al. CORNER: a realistic urban propagation model for VANET , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[54] Peter F. Al-Hokayem. Stability Analysis of Networked Control Systems , 2003 .
[55] Göran N Ericsson,et al. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.
[56] Antonio Capone,et al. MobiMESH: An Experimental Platform for Wireless MESH Networks with Mobility Support , 2006 .
[57] Bruce D. Fritchman,et al. A binary channel characterization using partitioned Markov chains , 1967, IEEE Trans. Inf. Theory.
[58] E. Gilbert. Capacity of a burst-noise channel , 1960 .
[59] Yi Yu,et al. A statistical approach to developing channel models for network simulations , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[60] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[61] Kenneth C. Budka,et al. Communication network architecture and design principles for smart grids , 2010, Bell Labs Technical Journal.
[62] Daniel D. Stancil,et al. Efficient simulation of Ricean fading within a packet simulator , 2000, Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152).
[63] G. Mailath,et al. Repeated Games and Reputations: Long-Run Relationships , 2006 .
[64] Nicolas Lechevin,et al. Safety And Reliability In Cooperating Unmanned Aerial Systems , 2010 .
[65] Dongfeng Yuan,et al. Performance analysis and comparison of HARQ schemes in cross layer design , 2009, 2009 Fourth International Conference on Communications and Networking in China.
[66] Jean-Yves Chouinard,et al. Estimation of Gilbert's and Fritchman's models parameters using the gradient method for digital mobile radio channels , 1988 .
[67] Georgios B. Giannakis,et al. Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design , 2005, IEEE Transactions on Wireless Communications.
[68] Takeo Kanade,et al. Limits on super-resolution and how to break them , 2000, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662).
[69] Kevin A. Kwiat,et al. Optimal voting strategy against rational attackers , 2011, 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[70] Theodore S. Rappaport,et al. Wireless Communications -- Principles and Practice, Second Edition. (The Book End) , 2002 .
[71] M. Motani,et al. Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.
[72] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[73] Song Ci,et al. Cross-Layer Design for Combining Adaptive Modulation and Coding with Hybrid ARQ to Enhance Spectral Efficiency , 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems.
[74] Marc Moonen,et al. Adaptive link adaptation , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[75] Jin Woo Kim,et al. Design of Adaptive Modulation and Coding Scheme for Truncated HARQ , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.
[76] Sheldon M. Ross,et al. Introduction to probability models , 1975 .
[77] Radu State,et al. Applying game theory to analyze attacks and defenses in virtual coordinate systems , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[78] Eric Rescorla,et al. Is finding security holes a good idea? , 2005, IEEE Security & Privacy.
[79] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[80] The Persuasiveness of Democratic Majorities , 2004 .
[81] Salvatore D. Morgera,et al. Parameter estimation for a burst-noise channel , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.
[82] R. Myerson. Extended Poisson Games and the Condorcet Jury Theorem , 1998 .
[83] Bruce H. Pillman. Super-Resolution Imaging , 2013, J. Electronic Imaging.
[84] Gerhard Haßlinger,et al. The Gilbert-Elliott Model for Packet Loss in Real Time Services on the Internet , 2011, MMB.
[85] Sabine Süsstrunk,et al. A Frequency Domain Approach to Registration of Aliased Images with Application to Super-resolution , 2006, EURASIP J. Adv. Signal Process..
[86] Seunghyeon Rhee,et al. Discrete cosine transform based regularized high-resolution image reconstruction algorithm , 1999 .
[87] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[88] Joon S. Park,et al. Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems , 2005, SEC.
[89] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[90] Miles A. McQueen,et al. Time-to-Compromise Model for Cyber Risk Reduction Estimation , 2006, Quality of Protection.
[91] Scott L. Miller,et al. Probability and Random Processes : With Applications to Signal Processing and Communications , 2012 .
[92] Linda Bushnell,et al. Stability analysis of networked control systems , 2002, IEEE Trans. Control. Syst. Technol..
[93] William T. Freeman,et al. Example-Based Super-Resolution , 2002, IEEE Computer Graphics and Applications.
[94] Niki Pissinou,et al. Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy , 2011, 2011 IEEE International Conference on Communications (ICC).
[95] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.