Show simple item record

dc.contributor.authorFernández Anta, Antonioen
dc.contributor.authorGeorgiou, Chryssisen
dc.contributor.authorZavou, Ellien
dc.contributor.editorKim D.en
dc.contributor.editorWu W.en
dc.contributor.editorDu D.-Z.en
dc.contributor.editorLu Z.en
dc.contributor.editorLi W.en
dc.creatorFernández Anta, Antonioen
dc.creatorGeorgiou, Chryssisen
dc.creatorZavou, Ellien
dc.date.accessioned2019-11-13T10:40:03Z
dc.date.available2019-11-13T10:40:03Z
dc.date.issued2015
dc.identifier.issn0302-9743
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/53930
dc.description.abstractWe consider a wireless channel between a single pair of stations (sender and receiver) that is being “watched” and disrupted by a malicious, adversarial jammer. The sender’s objective is to transmit as much useful data as possible, over the channel, despite the jams that are caused by the adversary. The data is transmitted as the payload of packets, and becomes useless if the packet is jammed. In this work, we develop deterministic scheduling algorithms that decide the lengths of the packets to be sent, in order to maximize the total payload successfully transmitted over period T in the presence of up to f packet jams, useful payload. We first consider the case where all packets must be of the same length and compute the optimal packet length that leads to the best possible useful payload. Then, we consider adaptive algorithmsen
dc.description.abstractones that change the packet length based on the feedback on jammed packets received. We propose an optimal scheduling algorithm that is essentially a recursive algorithm that calculates the length of the next packet to transmit based on the packet errors that have occurred up to that point. We make a thorough non trivial analysis for the algorithm and discuss how our solutions could be used to solve a more general problem than the one we consider. © Springer International Publishing Switzerland 2015.en
dc.source9th International Conference on Combinatorial Optimization and Applications, COCOA 2015en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84952015833&doi=10.1007%2f978-3-319-26626-8_20&partnerID=40&md5=9b9eb38737903d30fd2b66a07a8fc9d7
dc.subjectOptimizationen
dc.subjectAlgorithmsen
dc.subjectRecursive algorithmsen
dc.subjectJammingen
dc.subjectWireless channelen
dc.subjectAdaptive algorithmsen
dc.subjectCombinatorial optimizationen
dc.subjectPacket schedulingen
dc.subjectUnreliable communicationen
dc.subjectAdaptive schedulingen
dc.subjectAdversarial jammingen
dc.subjectDeterministic schedulingen
dc.subjectOptimal packet lengthsen
dc.subjectOptimal scheduling algorithmen
dc.subjectScheduling algorithmsen
dc.subjectSender and receiversen
dc.titleAdaptive scheduling over a wireless channel under constrained jammingen
dc.typeinfo:eu-repo/semantics/article
dc.identifier.doi10.1007/978-3-319-26626-8_20
dc.description.volume9486
dc.description.startingpage261
dc.description.endingpage278
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeArticleen
dc.description.notes<p>Sponsors:en
dc.description.notesConference code: 158749</p>en
dc.source.abbreviationLect. Notes Comput. Sci.en
dc.contributor.orcidGeorgiou, Chryssis [0000-0003-4360-0260]
dc.contributor.orcidFernández Anta, Antonio [0000-0001-6501-2377]
dc.gnosis.orcid0000-0003-4360-0260
dc.gnosis.orcid0000-0001-6501-2377


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record