Asia Pacific University Library catalogue


Embracing interference in wireless systems (Record no. 383690)

000 -LEADER
fixed length control field 05435nam a22004577a 4500
001 - CONTROL NUMBER
control field ACM011452611390
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221028155907.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220307s2014 nyua fsb 000 0deng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627054751
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781627054768
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781627054744
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)908155883
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00404867
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Transcribing agency APU
Modifying agency SF
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK7867.2
Item number .G65 2014eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.38224
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Gollakota, Shyamnath.,
9 (RLIN) 47380
245 10 - TITLE STATEMENT
Title Embracing interference in wireless systems
Medium [electronic resource] /
Statement of responsibility, etc Shyamnath Gollakota.
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc [San Rafael] :
Name of publisher, distributor, etc Morgan & Claypool,
Date of publication, distribution, etc c2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xiv, 157 pages) :
Other physical details illustrations.
490 1# - SERIES STATEMENT
Series statement ACM books ;
Volume number/sequential designation #1
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 147-157).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 Embracing wireless interference -- 1.1.1 Decoding 802.11 collisions -- 1.1.2 Combating high-power cross-technology interference -- 1.1.3 Non-invasive approach to securing medical implants -- 1.1.4 Secure pairing without passwords or prior secrets -- 1.2 Organization --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Decoding 802.11 collisions -- 2.1 Related work -- 2.2 Scope -- 2.3 A communication primer -- 2.3.1 Practical issues -- 2.4 ZigZag decoding -- 2.4.1 Is it a collision? -- 2.4.2 Did the AP receive two matching collisions? -- 2.4.3 How does the AP decode matching collisions? -- 2.4.4 Estimating and tracking system parameters -- 2.5 Dealing with errors -- 2.6 Backward compatibility -- 2.7 Beyond two interferers -- 2.8 Complexity -- 2.9 Experimental environment -- 2.9.1 Setup -- 2.9.2 Micro-evaluation -- 2.9.3 Does ZigZag work -- 2.9.4 The impact of the SNR -- 2.9.5 Testbed throughput and loss rate -- 2.9.6 Many hidden terminals -- 2.10 Discussion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Combating high-power cross-technology interference -- 3.1 Impact of cross-technology interference on 802.11n -- 3.1.1 Digital cordless phone -- 3.1.2 Baby monitor -- 3.1.3 Microwave ovens -- 3.1.4 Frequency hopping bluetooth -- 3.1.5 Summary -- 3.2 MIMO and OFDM background -- 3.3 Problem domain -- 3.4 TIMO -- 3.5 Decoding in the presence of cross-technology interference -- 3.5.1 Computing the interferer's channel ratio -- 3.5.2 Decoding the signal of interest -- 3.5.3 Iterating to increase accuracy -- 3.5.4 Estimating the 802.11n channel functions -- 3.5.5 Finding the interference boundaries -- 3.5.6 Putting it together -- 3.5.7 Complexity -- 3.6 Ensuring the interferer can decode -- 3.7 Implementation -- 3.8 Performance evaluation -- 3.8.1 Cordless phone -- 3.8.2 Baby monitor -- 3.8.3 Microwave oven -- 3.8.4 Multiple interferers -- 3.9 Micro benchmarks -- 3.10 Related work -- 3.11 Discussion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Non-invasive approach to securing medical implants -- 4.1 IMD communication primer -- 4.2 Assumptions and threat model -- 4.2.1 Assumptions -- 4.2.2 Threat model -- 4.3 System overview -- 4.4 Jammer-cum-receiver -- 4.5 Protecting against passive eavesdroppers -- 4.6 Protecting against active adversaries -- 4.7 Implementation -- 4.8 Testing environment -- 4.9 Evaluation -- 4.9.1 Micro-benchmark results -- 4.9.2 Protecting from passive adversaries -- 4.9.3 Protecting from active adversaries -- 4.10 Coexistence -- 4.11 Related work -- 4.12 Discussion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Secure pairing without passwords or prior secrets -- 5.1 Related work -- 5.2 PBC and 802.11 background -- 5.2.1 Push button configuration -- 5.2.2 802.11 -- 5.3 Security model -- 5.3.1 Threat model -- 5.3.2 Security guarantees -- 5.4 TEP design -- 5.4.1 Tamper-evident message (TEM) -- 5.4.2 Securing PBC using TEM -- 5.4.3 Example scenarios -- 5.4.4 Making pairing faster -- 5.5 TEM on off-the-shelf hardware -- 5.5.1 Scheduling slot transmission -- 5.5.2 Energy detection at the receiver -- 5.5.3 Sending a synchronization packet -- 5.5.4 Checking for TEM while transmitting -- 5.6 Evaluation -- 5.6.1 Evaluating TEP's security -- 5.6.2 Evaluating TEP's accuracy -- 5.6.3 Evaluating TEP's performance -- 5.6.4 Performance with non-802.11 traffic -- 5.7 Discussion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6. Conclusion -- 6.1 Looking forward -- Bibliography -- Author's biography.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
520 3# - SUMMARY, ETC.
Summary, etc The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book takes an alternate approach: instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even beneficial, phenomenon.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electromagnetic interference.
9 (RLIN) 47381
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless communication systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory.
9 (RLIN) 9947
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title ACM books ;
Volume number/sequential designation #1.
9 (RLIN) 47379
856 48 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://dl-acm-org.ezproxy.apu.edu.my/doi/book/10.1145/2611390
Public note Available in ACM Digital Library. Requires Log In to view full text.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Date last seen Copy number Price effective from Koha item type
Not Withdrawn Available   Not Damaged Available for loan E-Book APU Library APU Library Online Database 07/03/2022 OTHERS   TK7867.2 .G65 2014eb 07/03/2022 1 07/03/2022 General Circulation