Frequency Rendezvous and Physical Layer Network Coding for Distributed Wireless Networks
暂无分享,去创建一个
[1] Honggang Zhang,et al. Achievements and the Road Ahead: The First Decade of Cognitive Radio , 2010, IEEE Trans. Veh. Technol..
[2] Kin K. Leung,et al. Achievable Rates for Network Coding on the Exchange Channel , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[3] Jing Wang,et al. Distributed wireless communication system: a new architecture for future public wireless access , 2003, IEEE Commun. Mag..
[4] Alexander M. Wyglinski,et al. A frequency rendezvous approach for decentralized dynamic spectrum access networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[5] Linda Doyle,et al. Cognitive radio: value creation and value migration , 2006 .
[6] Sencun Zhu,et al. Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.
[7] Samuel Cheng,et al. Wireless full-duplex communications based on network coding , 2007 .
[8] R. Ercole. Innovation, spectrum regulation, and DySPAN technologies access to markets , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[9] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[10] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[11] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .
[12] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] L.A. DaSilva,et al. Sequence-Based Rendezvous for Dynamic Spectrum Access , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[14] Damla Turgut,et al. Performance Analysis of Link Rendezvous Protocol for Cognitive Radio Networks , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[15] Feniosky Peña-Mora,et al. Robust Mobile Ad Hoc Space for Collaboration to Support Disaster Relief Efforts Involving Critical Physical Infrastructure , 2006 .
[16] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[17] Tao Cui,et al. Some results on relay strategies for memoryless two-way relay channels , 2008, 2008 Information Theory and Applications Workshop.
[18] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[19] Xia Wang,et al. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[20] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[21] Steven A. Borbash,et al. Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks , 2001, MobiHoc '01.
[22] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[23] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[24] Lili Qiu,et al. Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.
[25] Kay Römer. Time synchronization in ad hoc networks , 2001, MobiHoc '01.
[26] Issa M. Khalil,et al. LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.
[27] Chong Luo,et al. Natural Network Coding in Multi-Hop Wireless Networks , 2008, 2008 IEEE International Conference on Communications.
[28] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[29] Milind M. Buddhikot,et al. DIMSUMnet: new directions in wireless networking using coordinated dynamic spectrum , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[30] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[31] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[32] Soung Chang Liew,et al. Hot topic: physical-layer network coding , 2006, MobiCom '06.
[33] Rabia Latif,et al. Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs) , 2009, ISA.
[34] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[35] Danijela Cabric,et al. White paper: Corvus: A cognitive radio approach for usage of virtual unlicensed spectrum , 2004 .
[36] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[37] Jie Gao,et al. Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[38] Kwang-Cheng Chen,et al. Distribution of the Node Degree for Wireless Ad Hoc Networks in Shadow Fading Environments , 2007, IEICE Trans. Commun..
[39] Yi Wang,et al. Conceptual platform of distributed wireless communication system , 2002, Vehicular Technology Conference. IEEE 55th Vehicular Technology Conference. VTC Spring 2002 (Cat. No.02CH37367).
[40] Saurabh Bagchi,et al. MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.
[41] Brian M. Sadler,et al. A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.
[42] Sachin Katti,et al. Embracing wireless interference: analog network coding , 2007, SIGCOMM.
[43] Yoichi Shinoda,et al. A Node's Number of Neighbors in Wireless Mobile Ad Hoc Networks: A Statistical View , 2009, 2009 Eighth International Conference on Networks.
[44] Aura Ganz,et al. IEEE 802.16 based last mile broadband wireless military networks with quality of service support , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[45] Shilpa Achaliya,et al. Cognitive radio , 2010 .
[46] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[47] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[48] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[49] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[50] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[51] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .
[52] Matthew J. Zieniewicz,et al. The Evolution of Army Wearable Computers , 2002, IEEE Pervasive Comput..
[53] Alexander M. Wyglinski,et al. An Analysis of Frequency Rendezvous for Decentralized Dynamic Spectrum Access , 2010, IEEE Transactions on Vehicular Technology.
[54] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.