Search For:

Displaying 1-30 out of 30 total
Spectrum Bonding and Aggregation with Guard-Band Awareness in Cognitive Radio Networks
Found in: IEEE Transactions on Mobile Computing
By Haythem A. Bany Salameh,Marwan Krunz,David Manzi
Issue Date:March 2014
pp. 569-581
Spectrum access/sharing algorithms for dynamic spectrum access (DSA) networks are often designed without accounting for adjacent-channel interference. In practice, guard bands are needed to prevent such interference. Introducing guard bands naturally const...
 
Cluster-Based Control Channel Allocation in Opportunistic Cognitive Radio Networks
Found in: IEEE Transactions on Mobile Computing
By Sisi Liu,Loukas Lazos,Marwan Krunz
Issue Date:October 2012
pp. 1436-1449
Cognitive radio networks (CRNs) involve extensive exchange of control messages, which are used to coordinate critical network functions such as distributed spectrum sensing, medium access, and routing, to name a few. Typically, control messages are broadca...
 
Thwarting Control-Channel Jamming Attacks from Inside Jammers
Found in: IEEE Transactions on Mobile Computing
By Sisi Liu,Loukas Lazos,Marwan Krunz
Issue Date:September 2012
pp. 1545-1558
Coordination of network functions in wireless networks requires frequent exchange of control messages among participating nodes. Typically, such messages are transmitted over a universally known communication channel referred to as the control channel. Due...
 
Exploiting Microscopic Spectrum Opportunities in Cognitive Radio Networks via Coordinated Channel Access
Found in: IEEE Transactions on Mobile Computing
By Tao Shu, Marwan Krunz
Issue Date:November 2010
pp. 1522-1534
Under the current opportunistic spectrum access (OSA) paradigm, a common belief is that a cognitive radio (CR) can use a channel only when this channel is not being used by any neighboring primary radio (PR). Therefore, the existence of a spectrum opportun...
 
Interference Management and Rate Adaptation in OFDM-Based UWB Networks
Found in: IEEE Transactions on Mobile Computing
By Raed T. Al-Zubi, Marwan Krunz
Issue Date:September 2010
pp. 1267-1279
Ultrawideband (UWB) communications has emerged as a promising technology for high data rate wireless personal area networks (WPANs). Several proposals for UWB-based WPANs have been made. One widely popular proposal was standardized by ECMA-368, and is base...
 
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Found in: IEEE Transactions on Mobile Computing
By Tao Shu, Marwan Krunz, Sisi Liu
Issue Date:July 2010
pp. 941-954
Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath r...
 
Server Placement in Multiple-Description-Based Media Streaming
Found in: Data Compression Conference
By Satyajeet Ahuja, Marwan Krunz
Issue Date:March 2008
pp. 372-381
Multiple description coding (MDC) is a powerful source coding technique that involves encoding a media stream into r independently decodeable substreams. With every successful reception of a substream, decoded signal quality improves. We consider the probl...
 
Coverage Without Location Information
Found in: Network Protocols, IEEE International Conference on
By Ossama Younis, Marwan Krunz, Srinivasan Ramasubramanian
Issue Date:October 2007
pp. 51-60
When sensors are redundantly deployed, a subset of senors should be selected to actively monitor the field (referred to as a
 
Interference-Limited MAC Protocol for MANETs with Directional Antennas
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Aman Arora, Marwan Krunz
Issue Date:June 2005
pp. 2-10
Directional antennas can be significantly improve the spatial reuse of a mobile ad hoc network (MANET), leading to higher network throughput. This gain comes with a substantial energy saving that results from beamforming the transmitter and/or receiver ant...
 
Guest Editors' Introduction: Hot Interconnects
Found in: IEEE Micro
By John Lockwood, Marwan Krunz
Issue Date:January 2002
pp. 8-9
No summary available.
 
Fluid Analysis of Delay Performance for QoS Support in Wireless Networks
Found in: Network Protocols, IEEE International Conference on
By Jeong Geun Kim, Marwan Krunz
Issue Date:November 1999
pp. 254
Providing quality of service (QoS) guarantees over wireless links requires thorough understanding and quantification of the interactions among the traffic source, the wireless channel, and the underlying error control mechanisms. In this paper, we account ...
 
Exploiting the Temporal Structure of MPEG Video for the Reduction of Bandwidth Requirements
Found in: IEEE Computer and Communications Societies, Annual Joint Conference of the
By Marwan Krunz, Satish K. Tripathi
Issue Date:April 1997
pp. 67
We present a novel bandwidth allocation scheme for transporting variable-bit-rate MPEG traffic from a video server. Using time-varying envelopes to characterize the traffic, this scheme achieves significant bandwidth gain, via statistical multiplexing, whi...
 
Multicast Rendezvous in Fast-varying DSA Networks
Found in: IEEE Transactions on Mobile Computing
By Mohammad Abdel Rahman,Hanif Rahbari,Marwan Krunz
Issue Date:February 2015
pp. 1
Establishing communications between devices in a dynamic spectrum access (DSA) system requires the communicating parties to “rendezvous” before transmitting data packets. Frequency hopping (FH) is an effective rendezvous method that does not rely on a pred...
 
Time-Delayed Broadcasting for Defeating Inside Jammers
Found in: IEEE Transactions on Dependable and Secure Computing
By Sisi Liu,Loukas Lazos,Marwan Krunz
Issue Date:July 2014
pp. 1
We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a timedelayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions distributed in frequency an...
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Tao Shu,Marwan Krunz
Issue Date:June 2014
pp. 1
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by li...
 
Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing
Found in: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12)
By Tao Shu, Marwan Krunz
Issue Date:April 2012
pp. 87-98
In a multi-hop wireless ad hoc network, packet losses are attributed to harsh channel conditions and intentional packet discard by malicious nodes. In this paper, while observing a sequence of packet losses, we are interested in determining whether losses ...
     
Thwarting inside jamming attacks on wireless broadcast communications
Found in: Proceedings of the fourth ACM conference on Wireless network security (WiSec '11)
By Loukas Lazos, Marwan Krunz, Sisi Liu
Issue Date:June 2011
pp. 29-40
We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in frequency ...
     
Cross-layer design for efficient resource utilization in wimedia UWB-based WPANs
Found in: ACM Transactions on Modeling and Computer Simulation (TOMACS)
By Marwan Krunz, Raed Al-Zubi
Issue Date:December 2010
pp. 1-26
Ultra-WideBand (UWB) communications has emerged as a promising technology for high data rate Wireless Personal Area Networks (WPANs). In this article, we address two key issues that impact the performance of a multihop UWB-based WPAN: throughput and transm...
     
Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors
Found in: Proceedings of the 15th annual international conference on Mobile computing and networking (MobiCom '09)
By Marwan Krunz, Tao Shu
Issue Date:September 2009
pp. 37-48
In this paper, we exploit channel diversity for opportunistic spectrum access (OSA). Our approach uses channel quality as a second criterion (along with the idle/busy status of the channel) in selecting channels to use for opportunistic transmission. The d...
     
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
Found in: Proceedings of the second ACM conference on Wireless network security (WiSec '09)
By Loukas Lazos, Marwan Krunz, Sisi Liu
Issue Date:March 2009
pp. 1-24
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulnerability, we consider a sophisticated adversary who exploits knowledge of the...
     
Adaptive multi-antenna power control in wireless networks
Found in: Proceeding of the 2006 international conference on Communications and mobile computing (IWCMC '06)
By Alaa Muqattash, Marwan Krunz, Mohammad Z. Siam, Shuguang Cui
Issue Date:July 2006
pp. 875-880
Transmission power control has often been used in wireless packet networks to improve the channel reuse and reduce energy consumption. It has been mainly applied to single-input single-output (SISO) systems, where each node is equipped with a single antenn...
     
Power balanced coverage-time optimization for clustered wireless sensor networks
Found in: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '05)
By Marwan Krunz, Sarma Vrudhula, Tao Shu
Issue Date:May 2005
pp. 111-120
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays them to a sink node directly or through other CHs. The coverage time of the ...
     
Video transport over wireless channels: a cycle-based approach for rate control
Found in: Proceedings of the 12th annual ACM international conference on Multimedia (MULTIMEDIA '04)
By Luigi Atzori, Marwan Krunz, Mohamed Hassan
Issue Date:October 2004
pp. 916-923
We propose a novel source-rate control scheme for streaming video over wireless channels. This scheme is designed to maximize the bit rate at the encoder while guaranteeing an upper bound on the probability of starvation at the playback buffer. Channel dyn...
     
CDMA-based MAC protocol for wireless ad hoc networks
Found in: Proceedings of the fourth ACM international symposium on Mobile ad hoc networking & computing (MobiHoc '03)
By Alaa Muqattash, Marwan Krunz
Issue Date:June 2003
pp. 153-164
We propose a CDMA-based power controlled medium access protocol for mobile ad hoc networks (MANETs). Unlike previously proposed protocols, ours accounts for the multiple access interference (MAI), thereby addressing the notorious near-far problem that unde...
     
An efficient algorithm for finding a path subject to two additive constraints
Found in: Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '00)
By Marwan Krunz, Spyros Tragoudas, Turgay Korkmaz
Issue Date:June 2000
pp. 261-269
One of the key issues in providing end-to-end quality-of-service guarantees in packet networks is how to determine a feasible route that satisfies a set of constraints while simultaneously maintaining high utilization of network resources. In general, find...
     
Delay analysis of selective repeat ARQ for a Markovian source over a wireless channel
Found in: Proceedings of the 2nd ACM international workshop on Wireless mobile multimedia (WOWMOM '99)
By Jeong Geun Kim, Marwan Krunz
Issue Date:August 1999
pp. 59-66
Modern practical computing systems are much more complex than the simple programs on which we developed our models of dependability. These dependability models depend on precise specifications, but it is often impractical to obtain precise specifications o...
     
Effective bandwidth in wireless ATM networks
Found in: Proceedings of the fourth annual ACM/IEEE international conference on Mobile computing and networking (MobiCom '98)
By Jeong Geun Kim, Marwan Krunz
Issue Date:October 1998
pp. 233-241
Post-hoc worknotes is a concept demonstration, an envisionment showing how workgroup communication could be supported using a combination of existing technologies in the field of nontextual information management. We have identified a number of use-driven ...
     
On the characterization of VBR MPEG streams
Found in: Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '97)
By Marwan Krunz, Satish K. Tripathi
Issue Date:June 1997
pp. 261-269
We present a comprehensive model for variable-bit-rate MPEG video streams. This model captures the bit-rate variations at multiple time scales. Long-term variations are captured by incorporating scene changes, which are most noticeable in the fluctuations ...
     
A traffic for MPEG-coded VBR streams
Found in: Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (SIGMETRICS '95/PERFORMANCE '95)
By Herman Hughes, Marwan Krunz
Issue Date:May 1995
pp. 261-269
Compression of digital video is the only viable means to transport real-time full-motion video over BISDN/ATM networks. Traffic streams generated by video compressors exhibit complicated patterns which vary from one compression scheme to another. In this p...
     
Source-oriented topology aggregation with multiple QoS parameters in hierarchical networks
Found in: ACM Transactions on Modeling and Computer Simulation (TOMACS)
By Marwan Krunz, Turgay Korkmaz
Issue Date:January 1991
pp. 295-325
In this paper, we investigate the problem of topology aggregation (TA) for scalable, QoS-based routing in hierarchical networks. TA is the process of summarizing the topological information of a subset of network elements. This summary is flooded througho...
     
 1