#### Filter Results:

- Full text PDF available (8)

#### Publication Year

1980

2017

- This year (1)
- Last 5 years (9)
- Last 10 years (16)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Jorge J. Moré, David J. Thuente
- ACM Trans. Math. Softw.
- 1994

The development of software for minimization problems is often based on a line search method. We consider line search methods that satisfy sufficient decrease and curvature conditions, and formulate the problem of determining a point that satisfies these two conditions in terms of finding a point in a set <italic>T(μ)</italic>. We describe a search… (More)

It has long been recognized that complete jamming of wireless networks can be realized by generating continuous noise with sufficient power in the vicinity of the wireless network. There are many disadvantages of this approach including high energy requirements and a high probability of detection. The purpose of this paper is to show that similar jamming… (More)

It has been shown that reservation based MAC protocols such as 802.11b DCF are susceptible to Intelligent Jamming wherein a protocol aware jammer can bring down the network throughput essentially to zero by using very limited energy, see [1]. We propose and analyze intelligent jamming techniques based on “misbehaving” MAC level access timings. An additional… (More)

Total physical jamming in wireless networks can be realized by generating continuous high power noise in the vicinity of wireless receiver nodes. The purpose of this paper is to show, using OPNET simulations, that similar jamming effectiveness can be achieved with much lower total energy. In the first half of the paper, we study the effects of periodic… (More)

- Young-Hyun Oh, David J. Thuente
- 2013 22nd International Conference on Computer…
- 2013

Recently many channel hopping algorithms have been studied to guarantee rendezvous for Cognitive Radio Networks (CRNs). These algorithms propose rendezvous methods without using common control channels (CCCs) to avoid the limitations such as single point of failure, low scalability, and jamming attacks. In particular, the Jump-Stay based channel hopping… (More)

- David J. Thuente
- 2007

It has long been recognized that complete jamming of wireless networks can be realized by generating continuous noise with sufficient power in the vicinity of the wireless network. Recent work has shown that for IEEE 802.11b similar jamming effectiveness can be achieved using “intelligent” or protocol specific techniques. These techniques support jamming… (More)

- Young-Hyun Oh, David J. Thuente
- MILCOM
- 2012

- Kaiqi Xiong, David J. Thuente
- 2006 International Symposium on High Capacity…
- 2006

The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. Since it is impractical to have a GPS device on each sensor in WSN, most of the existing location discovery schemes can only be used in the trusted environment.… (More)

- David J. Thuente, Pulin Sampat
- SAC
- 1995

This paper presents two solution techniques for constructing a minimal weighted tree connecting a fixed set of n terminal vertices while alluwing extra vertices to be added to the tree to reduce the cost or length of the connection. The problem discussed is a variation of the Steiner tree problem that reduces to the classical Steiner tree problem for many… (More)

- David J. Thuente
- Operations Research
- 1980