بحث بسيط
السجلات المعروضة 61 -- 70 من 81
Detecting the greedy spectrum occupancy threat in cognitive radio networks
(
IEEE Computer Society
, 2014 , Conference Paper)
Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ...
Design and implementation of credit-based resource allocation protocol for DSA systems
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper designs, implements, and evaluates an efficient dynamic spectrum access (DSA) protocol for cognitive radio networks. The proposed protocol relies on the concept of credit value to allocate resources among users ...
Cloud of things for sensing as a service: sensing resource discovery and virtualization
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We propose Cloud of Things for Sensing as a Service: a global architecture that scales up cloud computing by exploiting the global sensing resources of the highly dynamic and growing Internet of Things (IoT) to enable ...
Copy limited flooding over opportunistic networks
(2013 , Conference Paper)
Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ...
A survey on communication infrastructure for micro-grids
(2013 , Conference Paper)
A micro-grid is a small scale power supply network that is designed to provide electricity to a small community with its own renewable energy sources. Due to distributed generation variability, security and load sharing ...
Social interaction increases capacity of wireless networks
(2013 , Conference Paper)
A network model with both social and communication characteristics is considered. Different capacity regions are computed as a function of the social network size for each node. It has been shown that as the social ...
A novel mechanism for restoring actor connected coverage in wireless sensor and actor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Provisioning network survivability is especially crucial in wireless sensor and actor network (WSAN) because nodes deployed in hostile environments are prone to frequent failures. Failure of an actor significantly impact ...
Routing and channel assignment in wireless cooperative networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In recent years, cooperative communication has attracted researchers' attention as it showed a good capability to increase network performance. On the other hand, a cooperative transmission may cause more interference. ...
Power allocation analysis for dynamic power utility in cognitive radio systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The focus of this paper is to investigate the fundamental limits of power allocation when taking into account a dynamic power pricing scheme. This paper proposes an optimal power allocation analysis for wireless systems ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...