Stealing from an ongoing flow

  • Authors:
  • Scott D. Novich;Ashutosh Sabharwal

  • Affiliations:
  • Rice University, Houston, TX, USA;Rice University, Houston, TX, USA

  • Venue:
  • Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this poster, we present a protocol to enable secondary users to harness residual capacity in a frequency band with primary users. The key contribution of the proposed protocol is that it does not require any knowledge of primary network traffic or topology.