Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Qingsi Wang"'
Autor:
Wei He, Shu Lin, Jiang Hu, Kun Zhang, Qingsi Wang, Fangjia Li, Fei Wang, Fang Tang, Chunyi Xu, Xiaoxue Li, Jingrong Xiao
Publikováno v:
Annals of Palliative Medicine. 10:9820-9829
Lumbar degenerative disease (LDD) is a narrowing of the spinal canal and intervertebral foramina caused by aging and degeneration of lumbar spine tissue. Minimally invasive internal lumbar spine fixation is emerging in the treatment of LDD. However,
Publikováno v:
Signal Processing. 156:191-207
Group testing is applied to recover a small defective subset of items by a number of tests much smaller than the total population. In this paper, we study group testing from the Bayesian perspective. The state of all the items is manipulated as a ran
Publikováno v:
IEEE Signal Processing Letters. 25:605-609
This letter addresses multisensor data fusion under the Gaussian noise. Under the Gauss-Markov model assumptions, data fusion based on maximum likelihood estimation (MLE) is the minimum variance unbiased estimator. Nonetheless, we propose a linear fu
Publikováno v:
IEEE Transactions on Wireless Communications. 15:1703-1715
Sniffer channel assignment (SCA) is a fundamental building block for wireless data capture, which is essential for traffic monitoring and network forensics. Most of the existing SCA approaches for cognitive radio networks (CRNs) adopt optimization-ba
In a cognitive radio network, a secondary user learns the spectrum environment and dynamically accesses the channel, where the primary user is inactive. At the same time, a primary user emulation (PUE) attacker can send falsified primary user signals
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9bb89c413ca7cd13fb46d19123920250
http://arxiv.org/abs/1709.10128
http://arxiv.org/abs/1709.10128
Autor:
Qingsi Wang, Mingyan Liu
Publikováno v:
IEEE Transactions on Mobile Computing. 12:2470-2482
We observe that in a multichannel wireless system, an opportunistic channel/spectrum access scheme that solely focuses on channel quality sensing measured by received SNR may induce users to use channels that, while providing better signals, are more
Publikováno v:
IEEE/ACM Transactions on Networking. 21:440-454
In this paper, we investigate the connectivity for large-scale clustered wireless sensor and ad hoc networks. We study the effect of mobility on the critical transmission range for asymptotic connectivity in k-hop clustered networks and compare to ex
Publikováno v:
CNS
In a cognitive radio (CR) network, a secondary user learns the spectrum environment and dynamically accesses the channel where the primary user is inactive. At the same time, a primary user emulation (PUE) attacker can send falsified primary user sig
Publikováno v:
SmartGridComm
The capabilities of electric loads participating in load curtailment programs are often unknown until the loads have been told to curtail (i.e., deployed) and observed. In programs in which payments are made each time a load is deployed, we aim to pi
Publikováno v:
2014 IEEE Military Communications Conference.
Secondary user data capturing is a fundamental building block for cognitive radio network forensics. It faces great challenges mainly due to the unknown secondary user behavior, wide spectrum, and packet capturing uncertainty. There is a lack of fund