Stealing from an ongoing flow

Scott D. Novich, Ashutosh Sabharwal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this poster, we present a protocol to enable secondary users to harness residual capacity in a frequency band with primary users. The key contribution of the proposed protocol is that it does not require any knowledge of primary network traffic or topology.

Original languageEnglish (US)
Title of host publicationMobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing
Pages335-336
Number of pages2
DOIs
StatePublished - 2009
Event10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'09 - New Orleans, LA, United States
Duration: May 18 2009May 21 2009

Publication series

NameProceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)

Conference

Conference10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'09
Country/TerritoryUnited States
CityNew Orleans, LA
Period5/18/095/21/09

Keywords

  • Protocols
  • Spectrum recycling
  • Spectrum reuse

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Stealing from an ongoing flow'. Together they form a unique fingerprint.

Cite this