Reliable distributed computing on unreliable radio channels
Proceedings of the 2009 MobiHoc S3 workshop on MobiHoc S3, 2009•dl.acm.org
Much of the future of wireless networking will unfold in the unlicensed bands of the radio
spectrum. These bands are increasingly crowded and vulnerable. Designers of protocols in
this setting must take into account a variety of interference sources, including selfish devices,
malicious jammers, and incidental electromagnetic radiation (radar, microwaves, etc.). This
paper surveys results from our recent research that models this adversarial interference and
aims to answer fundamental questions about what can be solved reliably (and efficiently) in …
spectrum. These bands are increasingly crowded and vulnerable. Designers of protocols in
this setting must take into account a variety of interference sources, including selfish devices,
malicious jammers, and incidental electromagnetic radiation (radar, microwaves, etc.). This
paper surveys results from our recent research that models this adversarial interference and
aims to answer fundamental questions about what can be solved reliably (and efficiently) in …
Much of the future of wireless networking will unfold in the unlicensed bands of the radio spectrum. These bands are increasingly crowded and vulnerable. Designers of protocols in this setting must take into account a variety of interference sources, including selfish devices, malicious jammers, and incidental electromagnetic radiation (radar, microwaves, etc.). This paper surveys results from our recent research that models this adversarial interference and aims to answer fundamental questions about what can be solved reliably (and efficiently) in this increasingly relevant yet difficult environment.

Showing the best result for this search. See all results