Abstract – A number of algorithmic and protocol assumptions taken for granted in the design of existing wireless communication technologies need to be revisited in extending their scope to the new cognitive radio (CR) paradigm. The fact that channel availability can rapidly change over time and the need for coordinated quiet periods in order to quickly and robustly detect the presence of incumbents, are just some of the examples of the unique challenges in protocol and algorithm design for CR networks and, in particular, in the medium access control (MAC) layer. With this in mind, in this paper we introduce a novel cognitive MAC (C-MAC) protocol for distributed multi-channel wireless networks. C-MAC operates over multiple channels, and henc...
Abstract — The cognitive radio (CR) paradigm calls for open spectrum access according to a predeterm...
New wireless network paradigms will demand higher spectrum use and availability to cope with emergin...
Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless n...
Cognitive Radio (CR) exploits underutilized licensed spectrums to improve its bandwidth availability...
[[abstract]]With rapid development of wireless technology, the fixed resource allocation strategies ...
Cognitive Radio (CR) exploits underutilized\ud licensed spectrums to improve its bandwidth availabil...
A cognitive radio (CR) network should be able to sense its environment and adapt communication to ut...
Abstract—We propose the cross-layer based opportunistic multi-channel medium access control (MAC) pr...
Multichannel media access control (MAC) protocols have been widely considered for future mobile ad h...
Dynamic spectrum policies combined with software defined radio are powerful means to improve the ove...
Existing wireless networks are characterized by a fixed spectrum assignment policy. However, the sca...
Wireless Sensor Networks WSNs deliver smart communication paradigm which can set up intelligent netw...
Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum sca...
In this paper, we propose a semi-distributed cooperative spectrum sensing (SDCSS) and channel access...
Cognitive radio (CR) has drawn extensive attention as a promising technique to enable dynamic spectr...
Abstract — The cognitive radio (CR) paradigm calls for open spectrum access according to a predeterm...
New wireless network paradigms will demand higher spectrum use and availability to cope with emergin...
Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless n...
Cognitive Radio (CR) exploits underutilized licensed spectrums to improve its bandwidth availability...
[[abstract]]With rapid development of wireless technology, the fixed resource allocation strategies ...
Cognitive Radio (CR) exploits underutilized\ud licensed spectrums to improve its bandwidth availabil...
A cognitive radio (CR) network should be able to sense its environment and adapt communication to ut...
Abstract—We propose the cross-layer based opportunistic multi-channel medium access control (MAC) pr...
Multichannel media access control (MAC) protocols have been widely considered for future mobile ad h...
Dynamic spectrum policies combined with software defined radio are powerful means to improve the ove...
Existing wireless networks are characterized by a fixed spectrum assignment policy. However, the sca...
Wireless Sensor Networks WSNs deliver smart communication paradigm which can set up intelligent netw...
Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum sca...
In this paper, we propose a semi-distributed cooperative spectrum sensing (SDCSS) and channel access...
Cognitive radio (CR) has drawn extensive attention as a promising technique to enable dynamic spectr...
Abstract — The cognitive radio (CR) paradigm calls for open spectrum access according to a predeterm...
New wireless network paradigms will demand higher spectrum use and availability to cope with emergin...
Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless n...