{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T06:01:26Z","timestamp":1723615286689},"publisher-location":"New York, NY, USA","reference-count":128,"publisher":"Association for Computing Machinery and Morgan & Claypool","isbn-type":[{"value":"9781627054744","type":"print"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,16]]},"DOI":"10.1145\/2611390","type":"monograph","created":{"date-parts":[[2014,6,18]],"date-time":"2014-06-18T09:44:49Z","timestamp":1403084689000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Embracing Interference in Wireless Systems"],"prefix":"10.1145","author":[{"given":"Shyamnath","family":"Gollakota","sequence":"first","affiliation":[{"name":"University of Washington"}]}],"member":"320","published-online":{"date-parts":[[2014,6,16]]},"reference":[{"key":"e_1_4_1_1_1","volume-title":"White paper C11-44927.1-00","year":"2007","unstructured":"Cisco. 20 myths of Wi-Fi interference: Dispel myths to gain high-performing and reliable wireless , White paper C11-44927.1-00 , 2007 . Cisco. 20 myths of Wi-Fi interference: Dispel myths to gain high-performing and reliable wireless, White paper C11-44927.1-00, 2007."},{"key":"e_1_4_1_3_1","volume-title":"Technical Note","author":"Farpoint Group","year":"2010","unstructured":"Farpoint Group . Evaluating interference in wireless LANs: Recommended practice, White paper FPG 2010-135.1 . Technical Note , 2010 . Farpoint Group. Evaluating interference in wireless LANs: Recommended practice, White paper FPG 2010-135.1. Technical Note, 2010."},{"key":"e_1_4_1_5_1","volume-title":"White paper C11-609300-00.","year":"2010","unstructured":"Cisco. Wireless RF interference customer survey result , White paper C11-609300-00. 2010 . Cisco. Wireless RF interference customer survey result, White paper C11-609300-00. 2010."},{"key":"e_1_4_1_6_1","volume-title":"Proc. Symp. Integrated Observing and Assimilation Systems for Atmosphere, Oceans, and Land Surface. American Meterological Society","author":"Akerberg J.","year":"2004","unstructured":"J. Akerberg . State-of-the-art radiosonde telemetry . In Proc. Symp. Integrated Observing and Assimilation Systems for Atmosphere, Oceans, and Land Surface. American Meterological Society , 2004 . J. Akerberg. State-of-the-art radiosonde telemetry. In Proc. Symp. Integrated Observing and Assimilation Systems for Atmosphere, Oceans, and Land Surface. American Meterological Society, 2004."},{"key":"e_1_4_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_4_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2005.1421925"},{"key":"e_1_4_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860019"},{"key":"e_1_4_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592573"},{"key":"e_1_4_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.71"},{"key":"e_1_4_1_12_1","volume-title":"Bandspeed White Paper, 2010","year":"2014","unstructured":"Bandspeed. Understanding the effects of radio frequency (RF) interference on WLAN performance and security . Bandspeed White Paper, 2010 . Available from http:\/\/www.bandspeed.com\/technology\/docs\/BSP_RF+WLAN_WP.pdf; last retrieved May 2014 . Bandspeed. Understanding the effects of radio frequency (RF) interference on WLAN performance and security. Bandspeed White Paper, 2010. Available from http:\/\/www.bandspeed.com\/technology\/docs\/BSP_RF+WLAN_WP.pdf; last retrieved May 2014."},{"key":"e_1_4_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190334"},{"key":"e_1_4_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_12"},{"key":"e_1_4_1_15_1","first-page":"1530","article-title":"On the maximal signal-to-noise ratio realizable from several noisy signals","volume":"43","author":"Brennan D. G.","year":"1955","unstructured":"D. G. Brennan . On the maximal signal-to-noise ratio realizable from several noisy signals . Proc. IRE , 43 : 1530 , 1955 . D. G. Brennan. On the maximal signal-to-noise ratio realizable from several noisy signals. Proc. IRE, 43:1530, 1955.","journal-title":"Proc. IRE"},{"key":"e_1_4_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.23"},{"key":"e_1_4_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457889"},{"key":"e_1_4_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.11"},{"key":"e_1_4_1_19_1","volume-title":"Multiuser Detection in CDMA Mobile Terminals","author":"Castoldi P.","year":"2002","unstructured":"P. Castoldi . Multiuser Detection in CDMA Mobile Terminals . Artech house Publishers , 2002 . P. Castoldi. Multiuser Detection in CDMA Mobile Terminals. Artech house Publishers, 2002."},{"key":"e_1_4_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402975"},{"key":"e_1_4_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159920"},{"key":"e_1_4_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"e_1_4_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1859997"},{"key":"e_1_4_1_24_1","volume-title":"Isl3873: Wireless LAN integrated medium access controller with baseband processor","author":"Intersil Corporation","year":"2000","unstructured":"Intersil Corporation . Isl3873: Wireless LAN integrated medium access controller with baseband processor , 2000 . Available from http:\/\/pdf1.alldatasheetpt.com\/datasheet-pdf\/view\/109039\/INTERSIL\/ISL3873.html; last retrieved May 2014. Intersil Corporation. Isl3873: Wireless LAN integrated medium access controller with baseband processor, 2000. Available from http:\/\/pdf1.alldatasheetpt.com\/datasheet-pdf\/view\/109039\/INTERSIL\/ISL3873.html; last retrieved May 2014."},{"key":"e_1_4_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_4_1_26_1","volume-title":"Proc. 3rd USENIX Workshop on Hot Topics in Security, Article 5","author":"Denning T.","year":"2008","unstructured":"T. Denning , K. Fu , and T. Kohno . Absence makes the heart grow fonder: New directions for implantable medical device security . In Proc. 3rd USENIX Workshop on Hot Topics in Security, Article 5 , 2008 . T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proc. 3rd USENIX Workshop on Hot Topics in Security, Article 5, 2008."},{"key":"e_1_4_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_4_1_28_1","volume-title":"Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2(2): 107\u2013125","author":"Diffie W.","year":"1992","unstructured":"W. Diffie , P. C. van Oorschot , and M. J. Wiener . Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2(2): 107\u2013125 , 1992 . DOI: 10.1007\/BF00124891. 10.1007\/BF00124891 W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2(2): 107\u2013125, 1992. DOI: 10.1007\/BF00124891."},{"key":"e_1_4_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757799"},{"key":"e_1_4_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/248157.248178"},{"key":"e_1_4_1_31_1","first-page":"839","volume":"301","author":"European Telecommunications Standard Institute","year":"2009","unstructured":"European Telecommunications Standard Institute . ETSI EN 301 839 - 831 V1.3.1, 2009 . European Telecommunications Standard Institute. ETSI EN 301 839-1 V1.3.1, 2009.","journal-title":"ETSI EN"},{"key":"e_1_4_1_32_1","volume-title":"Medical Design Tech.","author":"Falcon C.","year":"2004","unstructured":"C. Falcon . Inside implantable devices . Medical Design Tech. , 2004 . C. Falcon. Inside implantable devices. Medical Design Tech., 2004."},{"key":"e_1_4_1_33_1","volume-title":"FCC 47CFR95.601-95.673 Subpart E\/I Rules for MedRadio Services. Available from http:\/\/www.fcc.gov\/encyclopedia\/medical-device-radiocommunications-service-medradio","author":"Federal Communications Commission","year":"2014","unstructured":"Federal Communications Commission . MICS Medical Implant Communication Services , FCC 47CFR95.601-95.673 Subpart E\/I Rules for MedRadio Services. Available from http:\/\/www.fcc.gov\/encyclopedia\/medical-device-radiocommunications-service-medradio ; last retrieved May 2014 . Federal Communications Commission. MICS Medical Implant Communication Services, FCC 47CFR95.601-95.673 Subpart E\/I Rules for MedRadio Services. Available from http:\/\/www.fcc.gov\/encyclopedia\/medical-device-radiocommunications-service-medradio; last retrieved May 2014."},{"issue":"6","key":"e_1_4_1_34_1","first-page":"25","article-title":"Reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care","volume":"52","author":"K. Fu.","year":"2009","unstructured":"K. Fu. Inside risks : Reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care . Comm. ACM , 52 ( 6 ): 25 \u2013 27 , 2009 . K. Fu. Inside risks: Reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care. Comm. ACM, 52(6): 25\u201327, 2009.","journal-title":"Comm. ACM"},{"key":"e_1_4_1_35_1","volume-title":"Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report","author":"K. Fu.","year":"2011","unstructured":"K. Fu. Trustworthy medical device software. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report . IOM (Institute of Medicine), National Academies Press , 2011 . K. Fu. Trustworthy medical device software. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report. IOM (Institute of Medicine), National Academies Press, 2011."},{"key":"e_1_4_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263137"},{"key":"e_1_4_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057022"},{"key":"e_1_4_1_38_1","unstructured":"M. Gast. 802.11 Wireless Networks. O'Reilly 2005.  M. Gast. 802.11 Wireless Networks. O'Reilly 2005."},{"key":"e_1_4_1_39_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511841224","volume-title":"Wireless Communications","author":"Goldsmith A.","year":"2005","unstructured":"A. Goldsmith . Wireless Communications . Cambridge University Press , 2005 . A. Goldsmith. Wireless Communications. Cambridge University Press, 2005."},{"key":"e_1_4_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018456"},{"key":"e_1_4_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028083"},{"key":"e_1_4_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"e_1_4_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402977"},{"key":"e_1_4_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"e_1_4_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592588"},{"key":"e_1_4_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"e_1_4_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282424"},{"key":"e_1_4_1_49_1","volume-title":"Life as a Healthcare CIO","author":"Halamka J. D.","year":"2010","unstructured":"J. D. Halamka . Telemonitoring for the home , Life as a Healthcare CIO , 10 April 2010 . Available from http:\/\/geekdoctor.blogspot.ca\/2010\/04\/telemonitoring-for-home.html; last retrieved May 2014. J. D. Halamka. Telemonitoring for the home, Life as a Healthcare CIO, 10 April 2010. Available from http:\/\/geekdoctor.blogspot.ca\/2010\/04\/telemonitoring-for-home.html; last retrieved May 2014."},{"key":"e_1_4_1_50_1","volume-title":"Proc. 7th ACM Workshop on Hot Topics in Networks","author":"Halperin D.","year":"2007","unstructured":"D. Halperin , J. Ammer , T. Anderson , and D. Wetherall . Interference cancellation: Better receivers for a new wireless MAC . In Proc. 7th ACM Workshop on Hot Topics in Networks , 2007 . D. Halperin, J. Ammer, T. Anderson, and D. Wetherall. Interference cancellation: Better receivers for a new wireless MAC. In Proc. 7th ACM Workshop on Hot Topics in Networks, 2007."},{"key":"e_1_4_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409983"},{"key":"e_1_4_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"e_1_4_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_4_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851271"},{"key":"e_1_4_1_55_1","volume-title":"OFDM Wireless LANs: A Theoretical and Practical Guide","author":"Heiskala J.","year":"2001","unstructured":"J. Heiskala and J. Terry . OFDM Wireless LANs: A Theoretical and Practical Guide . Sams Publishing , 2001 . J. Heiskala and J. Terry. OFDM Wireless LANs: A Theoretical and Practical Guide. Sams Publishing, 2001."},{"key":"e_1_4_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1593551"},{"key":"e_1_4_1_57_1","volume-title":"Personal area networks","author":"IEEE.","year":"2002","unstructured":"IEEE. 802.15.1 specification : Personal area networks , 2002 . IEEE. 802.15.1 specification: Personal area networks, 2002."},{"key":"e_1_4_1_58_1","volume-title":"Amendent 6: MAC security enhancements","author":"IEEE.","year":"2004","unstructured":"IEEE. 802.11i specification : Amendent 6: MAC security enhancements , 2004 . IEEE. 802.11i specification: Amendent 6: MAC security enhancements, 2004."},{"key":"e_1_4_1_59_1","volume-title":"Spectrum Management and Telecommunications","author":"Canada Industry","year":"2010","unstructured":"Industry Canada . Radio Standards Specification RSS-243: Medical Devices Operating in the 401\u2013406 MHz Frequency Band . Spectrum Management and Telecommunications , 2010 . Industry Canada. Radio Standards Specification RSS-243: Medical Devices Operating in the 401\u2013406 MHz Frequency Band. Spectrum Management and Telecommunications, 2010."},{"key":"e_1_4_1_60_1","volume-title":"ITU-R Recommendation RS.1346: Sharing between the meteorological aids service and medical implant communication systems (MICS) operating in the mobile service in the frequency band 401\u2013406 MHz","author":"Union International Telecommunications","year":"1998","unstructured":"International Telecommunications Union . ITU-R Recommendation RS.1346: Sharing between the meteorological aids service and medical implant communication systems (MICS) operating in the mobile service in the frequency band 401\u2013406 MHz , 1998 . International Telecommunications Union. ITU-R Recommendation RS.1346: Sharing between the meteorological aids service and medical implant communication systems (MICS) operating in the mobile service in the frequency band 401\u2013406 MHz, 1998."},{"key":"e_1_4_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282426"},{"key":"e_1_4_1_62_1","first-page":"216","volume-title":"Proc. 2nd USENIX Symp. on Networked Systems Design & Implementation","author":"Judd G.","year":"2005","unstructured":"G. Judd and P. Steenkiste . Using emulation to understand and improve wireless networks and applications . In Proc. 2nd USENIX Symp. on Networked Systems Design & Implementation , pages 203&ndash;\u2013 216 , 2005 . G. Judd and P. Steenkiste. Using emulation to understand and improve wireless networks and applications. In Proc. 2nd USENIX Symp. on Networked Systems Design & Implementation, pages 203&ndash;\u2013216, 2005."},{"key":"e_1_4_1_63_1","first-page":"140","volume-title":"Proc. 9th ARRL Computer Networking Conf.","author":"Karn P.","year":"1990","unstructured":"P. Karn . Maca\u2013a new channel access method for packet radio . Proc. 9th ARRL Computer Networking Conf. , pages 134\u2013 140 , 1990 P. Karn. Maca\u2013a new channel access method for packet radio. Proc. 9th ARRL Computer Networking Conf., pages 134\u2013140, 1990"},{"key":"e_1_4_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282425"},{"key":"e_1_4_1_65_1","volume-title":"November","author":"Research Kelton","year":"2006","unstructured":"Kelton Research . Survey: Protecting wireless network an essential element of home security , November 2006 . Kelton Research. Survey: Protecting wireless network an essential element of home security, November 2006."},{"key":"e_1_4_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.1998.727642"},{"key":"e_1_4_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSMDBS.2008.4575084"},{"key":"e_1_4_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_30"},{"key":"e_1_4_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658968"},{"key":"e_1_4_1_70_1","volume-title":"Digital Communications","author":"Lee E. A.","year":"1988","unstructured":"E. A. Lee and D. G. Messerschmitt . Digital Communications . Boston : Kluwer Academic , 1988 . E. A. Lee and D. G. Messerschmitt. Digital Communications. Boston: Kluwer Academic, 1988."},{"key":"e_1_4_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287767.1287772"},{"key":"e_1_4_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860028"},{"key":"e_1_4_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030621"},{"key":"e_1_4_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018454"},{"key":"e_1_4_1_75_1","volume-title":"Broadcom wireless LAN adapter user guide. Available from http:\/\/www.linksysinfo.org\/index.php?threads\/broadcom-wireless-lan-adapter-user-guide.15819\/","year":"2014","unstructured":"Linksys. Broadcom wireless LAN adapter user guide. Available from http:\/\/www.linksysinfo.org\/index.php?threads\/broadcom-wireless-lan-adapter-user-guide.15819\/ ; last retrieved May 2014 . Linksys. Broadcom wireless LAN adapter user guide. Available from http:\/\/www.linksysinfo.org\/index.php?threads\/broadcom-wireless-lan-adapter-user-guide.15819\/; last retrieved May 2014."},{"key":"e_1_4_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462156"},{"key":"e_1_4_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1995.483528"},{"key":"e_1_4_1_78_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.294.8.955"},{"key":"e_1_4_1_79_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1000745"},{"key":"e_1_4_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514298"},{"key":"e_1_4_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_9"},{"key":"e_1_4_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_4_1_83_1","volume-title":"Medtronic's Paradigm Veo wireless insulin pump helps prevent hypoglycemia. MedGadget\u2014Internet Journal for emerging medical technologies","author":"Ostrovsky G.","year":"2009","unstructured":"G. Ostrovsky . Medtronic's Paradigm Veo wireless insulin pump helps prevent hypoglycemia. MedGadget\u2014Internet Journal for emerging medical technologies , 2009 . Available from http:\/\/www.medgadget.com\/2009\/09\/medtronics_paradigm_veo_wireless_insulin_pump_cgm_system_helps_prevent_hypoglycemia.html; last retrieved May 2014. G. Ostrovsky. Medtronic's Paradigm Veo wireless insulin pump helps prevent hypoglycemia. MedGadget\u2014Internet Journal for emerging medical technologies, 2009. Available from http:\/\/www.medgadget.com\/2009\/09\/medtronics_paradigm_veo_wireless_insulin_pump_cgm_system_helps_prevent_hypoglycemia.html; last retrieved May 2014."},{"key":"e_1_4_1_84_1","volume-title":"Channel Estimation, and Signal Processing","author":"Meyr H.","year":"1998","unstructured":"H. Meyr , M. Moeneclaey , and S. A. Fechtel . Digital Communication Receivers: Synchronization , Channel Estimation, and Signal Processing . John Wiley & Sons , 1998 . H. Meyr, M. Moeneclaey, and S. A. Fechtel. Digital Communication Receivers: Synchronization, Channel Estimation, and Signal Processing. John Wiley & Sons, 1998."},{"key":"e_1_4_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.374435"},{"key":"e_1_4_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2008.4697032"},{"key":"e_1_4_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778434"},{"key":"e_1_4_1_88_1","volume-title":"Reference manual for the NETGEAR prosafe 802.11g wireless ap WG102. Available from http:\/\/documentation.netgear.com\/wg102\/enu\/202-10144-01\/pdfs\/FullManual.pdf","year":"2014","unstructured":"Netgear. Reference manual for the NETGEAR prosafe 802.11g wireless ap WG102. Available from http:\/\/documentation.netgear.com\/wg102\/enu\/202-10144-01\/pdfs\/FullManual.pdf ; last retrieved May 2014 . Netgear. Reference manual for the NETGEAR prosafe 802.11g wireless ap WG102. Available from http:\/\/documentation.netgear.com\/wg102\/enu\/202-10144-01\/pdfs\/FullManual.pdf; last retrieved May 2014."},{"key":"e_1_4_1_89_1","volume-title":"Proc. 2005 SIGCOMM Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication Poster, 2005","author":"Ng P. C.","year":"2005","unstructured":"P. C. Ng , S. C. Liew , K. C. Sha , and W. T. To . Experimental study of hidden node problem in IEEE 802.11 wireless networks . In Proc. 2005 SIGCOMM Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication Poster, 2005 . Available from http:\/\/conferences.sigcomm.org\/sigcomm\/ 2005 \/poster-110.pdf; last retrieved May 2014. P. C. Ng, S. C. Liew, K. C. Sha, and W. T. To. Experimental study of hidden node problem in IEEE 802.11 wireless networks. In Proc. 2005 SIGCOMM Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication Poster, 2005. Available from http:\/\/conferences.sigcomm.org\/sigcomm\/2005\/poster-110.pdf; last retrieved May 2014."},{"key":"e_1_4_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620693.1620708"},{"key":"e_1_4_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMB.2008.915488"},{"key":"e_1_4_1_92_1","unstructured":"PCTEST Engineering Labs Inc. Certificate of compliance FCC part 95 certification test report number 95.220719375.lf5 2002.  PCTEST Engineering Labs Inc. Certificate of compliance FCC part 95 certification test report number 95.220719375.lf5 2002."},{"key":"e_1_4_1_93_1","unstructured":"PCTEST Engineering Labs Inc. Certificate of compliance FCC part 95 and en 301 839-2 test report number 0703090168.med 2007.  PCTEST Engineering Labs Inc. Certificate of compliance FCC part 95 and en 301 839-2 test report number 0703090168.med 2007."},{"key":"e_1_4_1_94_1","volume-title":"USENIX Security Sym.","author":"Popper C.","year":"2009","unstructured":"C. Popper , M. Strasser , and S. Capkun . Jamming-resistant broadcast communication without shared keys . In USENIX Security Sym. , 2009 . C. Popper, M. Strasser, and S. Capkun. Jamming-resistant broadcast communication without shared keys. In USENIX Security Sym., 2009."},{"key":"e_1_4_1_95_1","volume-title":"Microsoft Research","author":"Radunovic B.","year":"2009","unstructured":"B. Radunovic , D. Gunawardena , P. Key , A. Proutiere , N. Singh , H. V. Balan , and G. Dejean . Rethinking indoor wireless: Low power, low frequency, full-duplex. Technical report , Microsoft Research , 2009 . B. Radunovic, D. Gunawardena, P. Key, A. Proutiere, N. Singh, H. V. Balan, and G. Dejean. Rethinking indoor wireless: Low power, low frequency, full-duplex. Technical report, Microsoft Research, 2009."},{"key":"e_1_4_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402976"},{"key":"e_1_4_1_97_1","first-page":"62","volume-title":"Proc. 2006 SIGCOMM Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication","author":"Reis C.","year":"2006","unstructured":"C. Reis , R. Mahajan , M. Rodrig , D. Wetherall , and J. Zahorjan . Measurement-based models of delivery and interference . In Proc. 2006 SIGCOMM Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication , pages 51\u2013 62 , 2006 . C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan. Measurement-based models of delivery and interference. In Proc. 2006 SIGCOMM Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 51\u201362, 2006."},{"key":"e_1_4_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_16"},{"key":"e_1_4_1_99_1","first-page":"235","volume-title":"Proc. 1st ACM Conf. Wireless Network Security","author":"Roth V.","year":"2008","unstructured":"V. Roth , W. Polak , E. Rieffel , and T. Turner . Simple and effective defense againgst evil twin access points . In Proc. 1st ACM Conf. Wireless Network Security , pages 220\u2013 235 , 2008 . DOI: 10.1007\/11506157_16. 10.1007\/11506157_16 V. Roth, W. Polak, E. Rieffel, and T. Turner. Simple and effective defense againgst evil twin access points. In Proc. 1st ACM Conf. Wireless Network Security, pages 220\u2013235, 2008. DOI: 10.1007\/11506157_16."},{"key":"e_1_4_1_100_1","volume-title":"Report, 2010","author":"Research Rysavy","year":"2010","unstructured":"Rysavy Research . Mobile broadband capacity constraints and the need for optimization . Report, 2010 . Available from http:\/\/www.rysavy.com\/Articles\/ 2010 _02_Rysavy_Mobile_Broadband_Capacity_Constraints.pdf; last retrieved May 2014. Rysavy Research. Mobile broadband capacity constraints and the need for optimization. Report, 2010. Available from http:\/\/www.rysavy.com\/Articles\/2010_02_Rysavy_Mobile_Broadband_Capacity_Constraints.pdf; last retrieved May 2014."},{"key":"e_1_4_1_101_1","volume-title":"Report","author":"Sagan D.","year":"2007","unstructured":"D. Sagan . Rf integrated circuits for medical applications: Meeting the challenge of ultra low power communication . Report , 2007 . D. Sagan. Rf integrated circuits for medical applications: Meeting the challenge of ultra low power communication. Report, 2007."},{"key":"e_1_4_1_102_1","volume-title":"Proc. 7th ACM Workshop on Hot Topics in Networks","author":"Santhapuri N.","year":"2008","unstructured":"N. Santhapuri , R. R. Choudhury , J. Manweiler , S. Nelakuduti , S. Sen , and K. Munagala . Message in message (MIM): A case for reordering transmissions in wireless networks . In Proc. 7th ACM Workshop on Hot Topics in Networks , 2008 . N. Santhapuri, R. R. Choudhury, J. Manweiler, S. Nelakuduti, S. Sen, and K. Munagala. Message in message (MIM): A case for reordering transmissions in wireless networks. In Proc. 7th ACM Workshop on Hot Topics in Networks, 2008."},{"key":"e_1_4_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-010-0124-y"},{"key":"e_1_4_1_104_1","volume-title":"Proc. 1st USENIX Workshop on Health Security and Privacy","author":"Schechter S.","year":"2010","unstructured":"S. Schechter . Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices . In Proc. 1st USENIX Workshop on Health Security and Privacy , 2010 . S. Schechter. Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices. In Proc. 1st USENIX Workshop on Health Security and Privacy, 2010."},{"issue":"7","key":"e_1_4_1_105_1","first-page":"26","article-title":"Wrist-wearable medical devices: Technologies and applications","volume":"14","author":"Scheffler M.","year":"2003","unstructured":"M. Scheffler , E. Hirt , and A. Caduff . Wrist-wearable medical devices: Technologies and applications . Medical Device Technology , 14 ( 7 ): 26 \u2013 30 , 2003 . M. Scheffler, E. Hirt, and A. Caduff. Wrist-wearable medical devices: Technologies and applications. Medical Device Technology, 14(7): 26\u201330, 2003.","journal-title":"Medical Device Technology"},{"key":"e_1_4_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2174461"},{"key":"e_1_4_1_107_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_4_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348551"},{"key":"e_1_4_1_110_1","volume-title":"Exchanging secrets without using cryptography. arXiv:1105.4991v1","author":"Siavoshani M. J.","year":"2011","unstructured":"M. J. Siavoshani , U. Pulleti , E. Atsan , I. Safaka , C. Fragoulia , K. Argyraki , and S. Diggavi . Exchanging secrets without using cryptography. arXiv:1105.4991v1 , 2011 . Available from http:\/\/arxiv.org\/abs\/1105.4991v1; last retrieved May 2014. M. J. Siavoshani, U. Pulleti, E. Atsan, I. Safaka, C. Fragoulia, K. Argyraki, and S. Diggavi. Exchanging secrets without using cryptography. arXiv:1105.4991v1, 2011. Available from http:\/\/arxiv.org\/abs\/1105.4991v1; last retrieved May 2014."},{"key":"e_1_4_1_111_1","first-page":"182","volume-title":"Proc. 7th Int. Workshop on Security Protocols","author":"Stajano F.","year":"1999","unstructured":"F. Stajano and R. Anderson . The Resurrecting Duckling: Security issues for ad-hoc wireless networks . In Proc. 7th Int. Workshop on Security Protocols , pages 172\u2013 182 , 1999 . F. Stajano and R. Anderson. The Resurrecting Duckling: Security issues for ad-hoc wireless networks. In Proc. 7th Int. Workshop on Security Protocols, pages 172\u2013182, 1999."},{"key":"e_1_4_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.222"},{"key":"e_1_4_1_113_1","volume-title":"MIT, 2006","author":"Tan J. K.","year":"2014","unstructured":"J. K. Tan . An adaptive orthogonal frequency division multiplexing baseband modem for wideband wireless channels. Master's thesis , MIT, 2006 . Available from http:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/37942\/144571690.pdf; last retrieved May 2014 . J. K. Tan. An adaptive orthogonal frequency division multiplexing baseband modem for wideband wireless channels. Master's thesis, MIT, 2006. Available from http:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/37942\/144571690.pdf; last retrieved May 2014."},{"key":"e_1_4_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614327"},{"key":"e_1_4_1_115_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111206"},{"key":"e_1_4_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.833347"},{"key":"e_1_4_1_117_1","volume-title":"Cambridge University Press","author":"Verdu S.","year":"1998","unstructured":"S. Verdu . Multiuser Detection . Cambridge University Press , 1998 . S. Verdu. Multiuser Detection. Cambridge University Press, 1998."},{"key":"e_1_4_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.54460"},{"key":"e_1_4_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592571"},{"key":"e_1_4_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342364"},{"key":"e_1_4_1_121_1","first-page":"163","volume-title":"IEEE Int. Conf. on Communications","volume":"1","author":"Ware C.","year":"2000","unstructured":"C. Ware , J. Judge , J. Chicharo , and E. Dutkiewicz . Unfairness and capture behavior in 802.11 adhoc networks . In IEEE Int. Conf. on Communications , Volume 1 , pages 159\u2013 163 , 2000 . DOI: 10.1109\/ICC.2000.853084. 10.1109\/ICC.2000.853084 C. Ware, J. Judge, J. Chicharo, and E. Dutkiewicz. Unfairness and capture behavior in 802.11 adhoc networks. In IEEE Int. Conf. on Communications, Volume 1, pages 159\u2013163, 2000. DOI: 10.1109\/ICC.2000.853084."},{"key":"e_1_4_1_122_1","volume-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","author":"Telecommunications IEEE.","year":"2012","unstructured":"IEEE. 802.11-2012\u2014IEEE Standard for Information technology\u2014 Telecommunications and information exchange between systems Local and metropolitan area networks\u2013Specific requirements Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications . 2012 . Available from http:\/\/standards.ieee.org\/about\/get\/802\/802.11.html; last retrieved May 2014. IEEE. 802.11-2012\u2014IEEE Standard for Information technology\u2014Telecommunications and information exchange between systems Local and metropolitan area networks\u2013Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 2012. Available from http:\/\/standards.ieee.org\/about\/get\/802\/802.11.html; last retrieved May 2014."},{"key":"e_1_4_1_123_1","volume-title":"WiFi protected setup specification, version 1.0h","author":"Alliance WiFi","year":"2006","unstructured":"WiFi Alliance . WiFi protected setup specification, version 1.0h , 2006 . WiFi Alliance. WiFi protected setup specification, version 1.0h, 2006."},{"key":"e_1_4_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287871"},{"key":"e_1_4_1_125_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_4_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"e_1_4_1_127_1","volume-title":"Ad Hoc Network Journal, 1(1): 107\u2013123","author":"Xu K.","year":"2003","unstructured":"K. Xu , M. Gerla , and S. Bae . Effectiveness of RTS\/CTS handshake in IEEE 802.11 based ad hoc networks . In Ad Hoc Network Journal, 1(1): 107\u2013123 , 2003 . DOI: 10.1109\/GLOCOM.2002.1188044. 10.1109\/GLOCOM.2002.1188044 K. Xu, M. Gerla, and S. Bae. Effectiveness of RTS\/CTS handshake in IEEE 802.11 based ad hoc networks. In Ad Hoc Network Journal, 1(1): 107\u2013123, 2003. DOI: 10.1109\/GLOCOM.2002.1188044."},{"key":"e_1_4_1_128_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855711.1855716"},{"key":"e_1_4_1_129_1","first-page":"137541","article-title":"Experimental investigation of TDD reciprocity-based zero-forcing transmit precoding. EURASIP J. Adv. Signal Process, 2011","author":"Zetterberg P.","year":"2011","unstructured":"P. Zetterberg . Experimental investigation of TDD reciprocity-based zero-forcing transmit precoding. EURASIP J. Adv. Signal Process, 2011 : Article ID 137541 , 2011 . DOI: 10.1155\/2011\/137541. 10.1155\/2011 P. Zetterberg. Experimental investigation of TDD reciprocity-based zero-forcing transmit precoding. EURASIP J. Adv. Signal Process, 2011: Article ID 137541, 2011. DOI: 10.1155\/2011\/137541.","journal-title":"Article ID"},{"key":"e_1_4_1_130_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-007-0392-0"},{"key":"e_1_4_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2010.20"},{"key":"e_1_4_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.938"}],"container-title":[],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2611390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T05:15:59Z","timestamp":1672895759000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/book\/10.1145\/2611390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,16]]},"ISBN":["9781627054744"],"references-count":128,"alternative-id":["10.1145\/2611390"],"URL":"https:\/\/doi.org\/10.1145\/2611390","relation":{},"subject":[],"published":{"date-parts":[[2014,6,16]]},"assertion":[{"value":"2014-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}