Search

Your search keyword '"Wade Trappe"' showing total 97 results

Search Constraints

Start Over You searched for: Author "Wade Trappe" Remove constraint Author: "Wade Trappe" Publisher ieee Remove constraint Publisher: ieee
97 results on '"Wade Trappe"'

Search Results

3. A Multiple Access Channel Game Using Latency Metric

4. A Power Control Problem for a Dual Communication-Radar System Facing a Jamming Threat

5. A Switching Transmission Game with Latency as the User’s Communication Utility

6. A Power Control Game Involving Jamming and Eavesdropping Defense

7. SC2 CIL: Evaluating the Spectrum Voxel Announcement Benefits

8. A Power Control Game with Uncertainty On the Type of the Jammer

9. Combating Jamming in Wireless Networks: A Bayesian Game with Jammer’s Channel Uncertainty

10. An Eavesdropping and Jamming Dilemma when the Adversary might be Subjective

11. A Prospect Theoretical Extension of a Communication Game Under Jamming

12. TO COMMUNICATE OR TO SCAN: PROSPECT THEORY EXTENSION OF A STOCHASTIC GAME

13. A dual radar and communication system facing uncertainty about a jammer’s capability

14. Optimal Design of a Dual-Purpose Communication-Radar System in the Presence of a Jammer

15. ROSTER: Radio Context Attestation in Cognitive Radio Network

16. Poster abstract: A practical secret communication system by perturbing focused phases among distributed transmitters

17. Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming

18. The rival might be not smart: Revising a CDMA jamming game

20. Stability of fair trade-off solution between radar and communication objectives on hostile interference

21. Stability of communication link connectivity against hostile interference

22. Spectrum attacks aimed at minimizing spectrum opportunities

23. Equilibrium strategies for an OFDM network that might be under a jamming attack

24. A practical wireless reciprocity-aware key establishment protocol

25. Bargaining over secrecy and reliability for low SNR OFDM communications

27. Maintaining throughput network connectivity in ad hoc networks

28. Impact of incomplete knowledge on scanning strategy

29. Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks

30. Jammer forensics: Localization in peer to peer networks based on Q-learning

31. Spectrum scanning when the intruder might have knowledge about the scanner's capabilities

33. Distance-Aware Overlay Routing with AODV in Large Scale Ad Hoc Networks

34. Emulating co-channel interference in wireless networks using equivalent low-tap filters

35. Resilient Leadership Delegation in Tactical Systems

36. Efficient OFDM Denial in the Absence of Channel Information

37. Welcome message

38. Equivalent Tapped Delay Line Channel Responses with Reduced Taps

39. Secure Name Resolution for Identifier-to-Locator Mappings in the Global Internet

40. The eavesdropping and Jamming Dilemma in multi-channel communications

41. Dependence of optimal monitoring strategy on the application to be protected

42. Association attacks: Identifying association protocols

43. Securing Mobile Location-based Services through position verification leveraging key distribution

44. Improving Access Point Association Protocols through Channel Utilization and Adaptive Switching

45. PHY-Authentication Protocol for Spoofing Detection in Wireless Networks

46. Reactive on-board regulation of cognitive radios

47. Cross-Layer Link Adaptation for Wireless Video

48. Adapting MIMO transmission mode along paths in urban environments

49. Physical Layer Techniques for Enhanced Situational Awareness

50. P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks

Catalog

Books, media, physical & digital resources