Stealing from an ongoing flow


In this poster, we present a protocol to enable secondary users to harness residual capacity in a frequency band with primary users. The key contribution of the proposed protocol is that it does not require any knowledge of primary network traffic or topology.

DOI: 10.1145/1530748.1530801

3 Figures and Tables

Cite this paper

@inproceedings{Novich2009StealingFA, title={Stealing from an ongoing flow}, author={Scott D. Novich and Ashutosh Sabharwal}, booktitle={MobiHoc}, year={2009} }