default search action
GLOBECOM 2014: Austin, TX, USA
- IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, December 8-12, 2014. IEEE 2014, ISBN 978-1-4799-3512-3
- Abdusy Syarif, Abdelhafid Abouaissa, Lhassane Idoumghar, Riri Fitri Sari, Pascal Lorenz:
Performance analysis of evolutionary multi-objective based approach for deployment of wireless sensor network with the presence of fixed obstacles. 1-6 - Wei Chen, Ian J. Wassell:
Compressive sleeping wireless sensor networks with active node selection. 7-12 - Christopher Lindberg, Alexandre Graell i Amat, Henk Wymeersch:
Distributed compressed sensing for sensor networks with packet erasures. 13-19 - Jingyao Zhang, Srikrishna Iyer, Xiangwei Zheng, Patrick Schaumont, Yaling Yang:
Hardware-software co-design for heterogeneous multiprocessor sensor nodes. 20-25 - Lobna M. Eslim, Hossam S. Hassanein, Walid M. Ibrahim:
Location information dissemination scheme for RFID-based distributed localization systems. 26-31 - Colin Funai, Cristiano Tapparello, He Ba, Bora Karaoglu, Wendi B. Heinzelman:
Extending volunteer computing through mobile ad hoc networking. 32-38 - Hichem Sedjelmaci, Tarek Bouali, Sidi Mohammed Senouci:
Detection and prevention from misbehaving intruders in vehicular networks. 39-44 - Maram Bani Younes, Azzedine Boukerche:
A traffic balanced mechanism for path recommendations in vehicular ad-hoc networks. 45-50 - Qiang Zhang, Hongli Zhang, Xiaojiang Du, Zhigang Zhou, Shen Su, Rui Jin:
Contention-based adaptive position update for intermittently connected VANETs. 51-56 - Qiong Wu, Jun Zheng:
Performance modeling of the IEEE 802.11p EDCA mechanism for VANET. 57-63 - Chao Song, Wei-Shih Yang, Jie Wu, Ming Liu:
Red or green: Analyzing the data delivery with traffic lights in vehicular ad hoc networks. 64-69 - Jinyoun Cho, A. Selcuk Uluagac, John A. Copeland, Yusun Chang:
Efficient safety message forwarding using multi-channels in low density VANETs. 70-75 - Weisheng Si, Quincy Tse, Guoqiang Mao, Albert Y. Zomaya:
How well do Yao graph and theta graph support Greedy forwarding? 76-81 - Tarek Bouali, El-Hassane Aglzim, Sidi-Mohammed Senouci:
A secure intersection-based routing protocol for data collection in urban vehicular networks. 82-87 - Tong Meng, Fan Wu, Guihai Chen, Athanasios V. Vasilakos:
Revisiting routing in multi-hop wireless networks: Spatial reusability-aware routing. 88-93 - Georgios Z. Papadopoulos, Julien Beaudaux, Antoine Gallais, Periklis Chatzimisios, Thomas Noël:
Toward a packet duplication control for opportunistic routing in WSNs. 94-99 - Xiaoxiong Zhong, Yang Qin, Yuanyuan Yang, Li Li:
CROR: Coding-aware opportunistic routing in multi-channel cognitive radio networks. 100-105 - Gina Martinez, Shufang Li, Chi Zhou:
Multi-commodity online maximum lifetime utility routing for energy-harvesting wireless sensor networks. 106-111 - Nouri Omheni, Amina Gharsallah, Faouzi Zarai, Mohammad S. Obaidat:
Call admission control and adaptive bandwidth management approach for HWNs. 112-117 - Norie Fu, Vorapong Suppakitpaisarn, Kei Kimura, Naonori Kakimura:
Maximum lifetime coverage problems with battery recovery effects. 118-124 - Miao Pan, Hongyan Li, Yawei Pang, Rong Yu, Zaixin Lu, Wei Li:
Optimal energy replenishment and data collection in wireless rechargeable sensor networks. 125-130 - Ruiqi Wang, Qianqian Yang, Shibo He, Jiming Chen:
Towards optimal barrier coverage in wireless sensor and actor networks. 131-136 - Nahid Ebrahimi Majd, Satyajayant Misra, Reza Tourani:
Split-Cache: A holistic caching framework for improved network performance in wireless ad hoc networks. 137-142 - Huang Cheng, Xin Fei, Azzedine Boukerche, Mohammed Almulla:
Hotspot discovery algorithms in coverage selection model over VANETs. 143-148 - Hanene Gabteni, Benoît Hilt, Frédéric Drouhin, Jonathan Ledy, Michel Basset, Pascal Lorenz:
A novel predictive link state indicator for ad-hoc networks. 149-154 - Yu Wang, Jun Zheng, Nathalie Mitton:
Delivery delay analysis for roadside unit deployment in intermittently connected VANETs. 155-161 - Anderson Aparecido Alves da Silva, Elvis Pontes, Fen Zhou, Sergio Takeo Kofuji:
Grey model and polynomial regression for identifying malicious nodes in MANETs. 162-168 - Jun Tao, Limin Zhu, Xiaoxiao Wang, Jian He, Ying Liu:
RSU deployment scheme with power control for highway message propagation in VANETs. 169-174 - Qianli Zhao, Cailian Chen, Rong Du, Shumin Bi, Bo Yang:
HaTTC: An urban traffic sensing method based on tensor completion technique. 175-180 - Pham Tran Anh Quang, Kandaraj Piamrat, César Viho:
QoE-aware routing for video streaming over ad-hoc networks. 181-186 - Anthony Busson, Lynda Zitoune, Véronique Vèque, Bijan Jabbari:
Outage analysis of integrated mesh LTE femtocell networks. 187-192 - Nadia Adem, Bechir Hamdaoui:
Delay performance modeling and analysis in clustered cognitive radio networks. 193-198 - Lu Wang, Jiang Xiao, Xiaoke Qi, Kaishun Wu, Mounir Hamdi:
FC-MAC: Fine-grained cognitive MAC for wireless video streaming. 199-204 - Prashant Khanduri, Bettagere Nagaraja Bharath, Chandra R. Murthy:
Coverage analysis and training optimization for uplink cellular networks with practical channel estimation. 205-210 - Nan Cheng, Ning Lu, Ning Zhang, Xuemin Sherman Shen, Jon W. Mark:
Opportunistic WiFi offloading in vehicular environment: A queueing analysis. 211-216 - Vahid Naghshin, Amir Masoud Rabiei, Norman C. Beaulieu, Mark C. Reed, Behrouz Maham:
Interference analysis for square-shaped wireless networks with uniformly distributed nodes. 217-221 - Irfan S. Al-Anbagi, Hussein T. Mouftah:
Adaptive time slots control in wireless sensor networks for delay-aware applications. 222-227 - XiaoHua Xu, Min Song, Mansoor Alani:
Duty-cycle-aware minimum latency multiflow scheduling in multi-hop wireless networks. 228-233 - Yawei Pang, Yanru Zhang, Yunan Gu, Miao Pan, Zhu Han, Pan Li:
Efficient data collection for wireless rechargeable sensor clusters in Harsh terrains using UAVs. 234-239 - Lei Zou, Bin Liu, Chang Chen, Chang Wen Chen:
Bayesian game based power control scheme for inter-WBAN interference mitigation. 240-245 - Ahmed M. Bedewy, Karim G. Seddik, Amr A. El-Sherif:
On the stability of random access with energy harvesting and collision resolution. 246-252 - Fan Li, Zhiyuan Yin, Shaojie Tang, Chao Zhang, Yu Cheng, Yu Wang:
K-throwbox placement problem in throwbox-assisted delay tolerant networks. 253-258 - Libo Jiang, Fan Li, Chenfei Tian, Liehuang Zhu, Yu Wang:
Closeness-based routing with temporal constraint for mobile social delay tolerant networks. 259-264 - Juan Li, Yanmin Zhu, Jiadi Yu:
Load balance vs utility maximization in mobile crowd sensing: A distributed approach. 265-270 - Xin Xiao, Xiaohua Tian, Xiaoying Gan, Xinbing Wang:
Multi-class labeling with BCH codes for mobile crowdsensing. 271-276 - Xiaoli Zhou, Azzedine Boukerche:
An efficient adaptive MAC frame aggregation scheme in delay tolerant sensor networks. 277-282 - Yatish K. Joshi, Mohamed F. Younis:
Straight skeleton based reconnection in a wireless sensor network. 283-288 - Haining Mo, Zheng Peng, Zhong Zhou, Jun-Hong Cui:
A two-phase broadcast scheme for underwater acoustic networks. 289-294 - Stefan Jorgensen:
Intercluster beamforming using selection combining. 295-299 - Jonathan DeWitt, Hongchi Shi:
Maximizing lifetime for k-barrier coverage in energy harvesting wireless sensor networks. 300-304 - Jingqing Wang, Xi Zhang:
3D percolation theory-based exposure-path prevention for optimal power-coverage tradeoff in clustered wireless camera sensor networks. 305-310 - Zhijie Wang, Dijiang Huang, Huijun Wu, Yuli Deng, Ailixier Aikebaier, Yuuichi Teranishi:
QoS-constrained sensing task assignment for mobile crowd sensing. 311-316 - Tao Yang, Guoqiang Mao, Wei Zhang:
Connectivity of wireless information-theoretic secure networks. 317-323 - Guey-Yun Chang, Jen-Feng Huang, Zheng-Hua Wu:
A frequency hopping algorithm against jamming attacks under asynchronous environments. 324-329 - Ju Ren, Yaoxue Zhang, Kuan Zhang, Xuemin Sherman Shen:
Exploiting channel-aware reputation system against selective forwarding attacks in WSNs. 330-335 - Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng:
Secure key establishment for Device-to-Device communications. 336-340 - Kun Yan, Hsiao-Chun Wu, Hailin Xiao, Xiangli Zhang:
Novel measurement matrix optimization for source localization based on compressive sensing. 341-345 - Yuan Xu, Xiao Chen:
Social-Similarity-based Multicast Algorithm in impromptu mobile social networks. 346-351 - Samuel B. Wood, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:
SOCRATIC: A social approach to network coding rate control. 352-356 - Bandar Al-Ghamdi, Marwane Ayaida, Hacène Fouchal:
A dynamic slot scheduling for wireless sensors networks. 357-361 - Dhaou Said, Soumaya Cherkaoui, Lyes Khoukhi:
Scheduling protocol with load managementfor EV charging. 362-367 - Abdelli Abdelkrim, Lynda Mokdad:
Time Petri net based performance evaluation of traffic scheduling in WIMAX networks. 368-373 - Pratap Kumar Sahu, Abdelhakim Hafid, Soumaya Cherkaoui:
Inter street interference cancelation in urban vehicular networks using network coding. 374-379 - Chandrika J. Satyavolu, Mahendran Veeramani, Sridhar Radhakrishnan:
Item-level tagging sees more tags: Analyzing the performance of EPC Gen-2 protocol in large-scale RFID systems. 380-385 - Apurba Saha, Amiotosh Ghosh, Walaa Hamouda:
Learning-based relay selection for cooperative networks. 386-391 - Alireza Sheikhattar, Mehdi Kalantari:
Distributed load balancing using alternating direction method of multipliers. 392-398 - Maggie X. Cheng, Yi Ling, Brian M. Sadler:
Wireless ad hoc networks connectivity assessment and relay node deployment. 399-404 - Shiyu Liang, Ruotian Luo, Ge Chen, Songjun Ma, Weijie Wu, Li Song, Xiaohua Tian, Xinbing Wang:
Are we still friends: Kernel multivariate survival analysis. 405-410 - Yunsheng Wang, Jie Wu, Mingjun Xiao:
Hierarchical cooperative caching in mobile opportunistic social networks. 411-416 - Hong Cai, Hui Gao, Tiejun Lv, Yueming Lu, Xin Su:
Propagation controlled cooperative positioning in wireless networks using bootstrap percolation. 417-422 - Ryangsoo Kim, Hyuk Lim, Sun-Nyoung Hwang, Brownson Obaridoa Obele:
Robust indoor localization based on hybrid Bayesian graphical models. 423-429 - Jihoon Hong, Tomoaki Ohtsuki:
Device-free passive localization from signal subspace eigenvectors. 430-435 - Dong Li, Baoxian Zhang, Zheng Yao, Cheng Li:
A feature scaling based k-nearest neighbor algorithm for indoor positioning system. 436-441 - Weixiao Meng, Dekun Zhang, Yuxin Wang, Cheng Li:
An extended centroid localization algorithm based on error correction in WSN. 442-447 - Yunfei Ma, Hongqian Rong, Edwin C. Kan:
Millimeter accuracy passive tag ranging via second harmonics RF backscattering against body movement interference. 448-454 - Tom Vermeulen, Sofie Pollin:
Energy-delay analysis of full duplex wireless communication for sensor networks. 455-460 - Carolina Carrascal, Ilker Demirkol, Josep Paradells:
A novel wake-up communication system using solar panel and Visible Light Communication. 461-467 - Siyue Sun, Shuai Han, Qiyue Yu, Weixiao Meng, Cheng Li:
A survey of two kinds of complementary coded CDMA wireless communications. 468-472 - Eugenio Celada-Funes, Daniel Alonso-Roman, Cesar Asensio-Marco, Baltasar Beferull-Lozano:
A reliable CSMA protocol for high performance broadcast communications in a WSN. 473-479 - Siyang Liu, Feng Yang, Xiaoying Gan, Xiaohua Tian, Xinbing Wang, Jing Liu:
Capacity and delay tradeoff in correlated hybrid Ad-Hoc networks. 480-485 - Giirkan Solmaz, Kemal Akkaya, Danila Turgut:
Communication-constrained p-center problem for event coverage in theme parks. 486-491 - Martin K. Mwila, Karim Djouani, Anish Mathew Kurien:
An efficient approach to node localisation and tracking in wireless sensor networks. 492-497 - Javier Schloemann, R. Michael Buehrer:
On the value of collaboration in multidimensional location estimation. 498-504 - Reza Monir Vaghefi, R. Michael Buehrer:
A linear estimator for joint synchronization and localization in wireless sensor networks. 505-510 - Feng Zhu, Jia Liu, Lijun Chen:
Fast physical-layer unknown tag identification in large-scale RFID systems. 511-516 - Xin Chen, Junjun Kong, Yao Guo, Xiangqun Chen:
An empirical study of indoor localization algorithms with densely deployed APs. 517-522 - Andrew Wichmann, Turgay Korkmaz, Ali Saman Tosun:
Minimum hop and/or minimum distance robot movement with connectivity constraints in WSRNs. 523-529 - Ludovic Jacquin, Vincent Roca, Jean-Louis Roch:
Too big or too small? The PTB-PTS ICMP-based attack against IPsec gateways. 530-536 - Stefan Hommes, Radu State, Thomas Engel:
Implications and detection of DoS attacks in OpenFlow-based networks. 537-543 - Thienne M. Johnson, Loukas Lazos:
Network anomaly detection using autonomous system flow aggregates. 544-550 - Eduardo H. M. Pena, Luiz Fernando Carvalho, Sylvio Barbon, Joel J. P. C. Rodrigues, Mario Lemes Proença Jr.:
Correlational paraconsistent machine for anomaly detection. 551-556 - Yan Shi, Subir Biswas:
Website fingerprinting using traffic analysis of dynamic webpages. 557-563 - Hongzhou Sha, Qingyun Liu, Zhou Zhou, Chao Zheng:
GuidedTracker: Track the victims with access logs to finding malicious web pages. 564-569 - Roberto Alberdeston, Erich Dondyk, Cliff C. Zou:
Click-tracking blocker: Privacy preservation by disabling search engines' click-tracking. 570-575 - Xinxin Zhao, Huiji Gao, Lingjun Li, Huan Liu, Guoliang Xue:
An efficient privacy preserving location based service system. 576-581 - Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, Yuli Deng:
Towards distributed privacy-preserving mobile access control. 582-587 - Yanmin Gong, Yuanxiong Guo, Yuguang Fang:
A privacy-preserving task recommendation framework for mobile crowdsourcing. 588-593 - Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie:
Privacy-preserving ranked multi-keyword search leveraging polynomial function in cloud computing. 594-600 - Zhigang Zhou, Hongli Zhang, Qiang Zhang, Yang Xu, Panpan Li:
Privacy-preserving granular data retrieval indexes for outsourced cloud data. 601-606 - Ali Houjeij, Walid Saad, Tamer Basar:
Optimal deployment of wireless small cell base stations with security considerations. 607-612 - Peng Hao, Xianbin Wang, Aydin Behnad:
Relay authentication by exploiting I/Q imbalance in amplify-and-forward system. 613-618 - Rakpong Kaewpuang, Dusit Niyato, Ping Wang, Zhu Han, Rongxing Lu:
Optimal decentralized security software deployment in multihop wireless networks. 619-624 - Chunchun Wu, Zuying Wei, Fan Wu, Guihai Chen:
DIARY: A differentially private and approximately revenue maximizing auction mechanism for secondary spectrum markets. 625-630 - Xianghui Cao, Lu Liu, Wenlong Shen, Jin Tang, Yu Cheng:
Real-time misbehavior detection in IEEE 802.11e based WLANs. 631-636 - Michael Zuba, Michael Fagan, Zhijie Shi, Jun-Hong Cui:
A resilient pressure routing scheme for underwater acoustic networks. 637-642 - Song Tan, Wen-Zhan Song, Michael Stewart, Lang Long:
LPAttack: Leverage point attacks against state estimation in smart grid. 643-648 - Feng Ye, Yi Qian, Rose Qingyang Hu:
A security protocol for advanced metering infrastructure in smart grid. 649-654 - Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Coordinated attacks against substations and transmission lines in power grids. 655-661 - Juntao Gao, Xiuming Zhang, Hao Liang, Xuemin Sherman Shen:
Joint encryption and compressed sensing in smart grid data transmission. 662-667 - Asmaa R. Abdallah, Xuemin Sherman Shen:
A lightweight lattice-based security and privacy-preserving scheme for smart grid. 668-674 - Miao He, Kuan Zhang, Xuemin Sherman Shen:
PMQC: A privacy-preserving multi-quality charging scheme in V2G network. 675-680 - Lin Ye, Hongli Zhang, Xiaojiang Du:
Modeling Leechers attack in BitTorrent. 681-685 - Saad Saleh, Mamoon Raja, Muhammad Shahnawaz, Muhammad Usman Ilyas, Khawar Khurshid, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha, Shirish S. Karande:
Breaching IM session privacy using causality. 686-691 - Yabin Ping, Zhenfu Cao, Haojin Zhu:
Sybil-aware least cost rumor blocking in social networks. 692-697 - Xiaokuan Zhang, Haizhong Zheng, Xiaolong Li, Suguo Du, Haojin Zhu:
You are where you have been: Sybil detection via geo-location analysis in OSNs. 698-703 - Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, Xiaolin Li:
Control of photo sharing over Online Social Networks. 704-709 - Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang