Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJuly 2013
Near-optimal truthful spectrum auction mechanisms with spatial and temporal reuse in wireless networks
MobiHoc '13: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computingPages 237–240https://doi.org/10.1145/2491288.2491313In this work, we study spectrum auction problem where each spectrum usage request has spatial, temporal, and spectral features. After receiving bid requests from secondary users, and possibly reserve price from primary users, our goal is to design ...
- research-articleJuly 2013
CSMA over time-varying channels: optimality, uniqueness and limited backoff rate
MobiHoc '13: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computingPages 137–146https://doi.org/10.1145/2491288.2491303Recent studies on MAC scheduling have shown that carrier sense multiple access (CSMA) algorithms can be throughput optimal for arbitrary wireless network topology. However, these results are highly sensitive to the underlying assumption on `static' or `...
- research-articleJuly 2013
Informative counting: fine-grained batch authentication for large-scale RFID systems
MobiHoc '13: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computingPages 21–30https://doi.org/10.1145/2491288.2491299Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address the scalability issue in batch authentications. Deterministic approaches verify them one by one, ...