Efficient power control via pricing in wireless data networks CU Saraydar, NB Mandayam, DJ Goodman IEEE transactions on Communications 50 (2), 291-303, 2002 | 1780 | 2002 |
Power control for wireless data D Goodman, N Mandayam IEEE Personal Communications 7 (2), 48-54, 2000 | 941 | 2000 |
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel S Mathur, W Trappe, N Mandayam, C Ye, A Reznik Proceedings of the 14th ACM international conference on Mobile computing and …, 2008 | 925 | 2008 |
Information-theoretically secret key generation for fading wireless channels C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010 | 507 | 2010 |
Pricing and power control in a multicell wireless data network CU Saraydar, NB Mandayam, DJ Goodman IEEE Journal on selected areas in communications 19 (10), 1883-1892, 2001 | 488 | 2001 |
Using the physical layer for wireless authentication in time-variant channels L Xiao, LJ Greenstein, NB Mandayam, W Trappe IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008 | 446 | 2008 |
Demand responsive pricing and competitive spectrum allocation via a spectrum server O Ileri, D Samardzija, T Sizer, NB Mandayam First IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2005 | 442 | 2005 |
An energy-efficient approach to power control and receiver design in wireless data networks F Meshkati, HV Poor, SC Schwartz, NB Mandayam IEEE transactions on communications 53 (11), 1885-1894, 2005 | 407 | 2005 |
Decision theoretic framework for NLOS identification J Borras, P Hatrack, NB Mandayam VTC'98. 48th IEEE Vehicular Technology Conference. Pathway to Global …, 1998 | 403 | 1998 |
Infostations: A new system model for data and messaging services DJ Goodman, J Borras, NB Mandayam, RD Yates 1997 IEEE 47th vehicular technology conference. Technology in motion 2, 969-973, 1997 | 355 | 1997 |
Principles of cognitive radio E Biglieri Cambridge University Press, 2013 | 337 | 2013 |
Fingerprints in the ether: Using the physical layer for wireless authentication L Xiao, L Greenstein, N Mandayam, W Trappe 2007 IEEE International conference on communications, 4646-4651, 2007 | 319 | 2007 |
Power control for wireless data based on utility and pricing V Shah, NB Mandayam, DJ Goodman Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio …, 1998 | 309 | 1998 |
Proximate: proximity-based secure pairing using ambient wireless signals S Mathur, R Miller, A Varshavsky, W Trappe, N Mandayam Proceedings of the 9th international conference on Mobile systems …, 2011 | 304 | 2011 |
Frontiers of wireless and mobile communications D Raychaudhuri, NB Mandayam Proceedings of the IEEE 100 (4), 824-840, 2012 | 302 | 2012 |
Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud T Nishio, R Shinkuma, T Takahashi, NB Mandayam Proceedings of the first international workshop on Mobile cloud computing …, 2013 | 216 | 2013 |
Pricing for enabling forwarding in self-configuring ad hoc networks O Ileri, SC Mau, NB Mandayam IEEE Journal on Selected Areas in Communications 23 (1), 151-162, 2005 | 215 | 2005 |
Scheduling variable rate links via a spectrum server C Raman, RD Yates, NB Mandayam First IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2005 | 206 | 2005 |
A new framework for power control in wireless data networks: Games, utility, and pricing D Famolari, N Mandayam, D Goodman, V Shah Wireless Multimedia Network Technologies, 289-309, 2002 | 189 | 2002 |
Channel-based detection of sybil attacks in wireless networks L Xiao, LJ Greenstein, NB Mandayam, W Trappe IEEE Transactions on Information Forensics and Security 4 (3), 492-503, 2009 | 186 | 2009 |