


default search action
17. MobiHoc 2017: Chennai, India
- Sharayu Moharir, Aditya Gopalan:

Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Chennai, India, July 10-14, 2017. ACM 2017, ISBN 978-1-4503-4912-3
Full papers
- Haiming Jin, Lu Su, Klara Nahrstedt:

Theseus: Incentivizing Truth Discovery in Mobile Crowd Sensing Systems. 1:1-1:10 - Xinzhe Fu, Zhiying Xu, Qianyang Peng, Jie You

, Luoyi Fu, Xinbing Wang, Songwu Lu:
ConMap: A Novel Framework for Optimizing Multicast Energy in Delay-constrained Mobile Wireless Networks. 2:1-2:10 - Abhishek Sinha, Eytan H. Modiano:

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions. 3:1-3:10 - Yanjiao Chen, Yuxuan Xiong, Qian Wang

, Xiaoyan Yin, Baochun Li:
Stable Matching for Spectrum Market with Guaranteed Minimum Requirement. 4:1-4:10 - Cong Shi

, Jian Liu, Hongbo Liu
, Yingying Chen
:
Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT. 5:1-5:10 - Kun Qian

, Chenshu Wu, Zheng Yang, Yunhao Liu, Kyle Jamieson
:
Widar: Decimeter-Level Passive Tracking via Velocity Monitoring with Commodity Wi-Fi. 6:1-6:10 - Jiemin Zeng, Gaurish Telang, Matthew P. Johnson, Rik Sarkar, Jie Gao, Esther M. Arkin, Joseph S. B. Mitchell:

Mobile r-gather: Distributed and Geographic Clustering for Location Anonymity. 7:1-7:10 - Rajat Talak, Sertac Karaman, Eytan H. Modiano:

Capacity and delay scaling for broadcast transmission in highly mobile wireless networks. 8:1-8:10 - Xu Zhang, Edward W. Knightly:

CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs. 9:1-9:10 - Yasaman Ghasempour

, Edward W. Knightly:
Decoupling Beam Steering and User Selection for Scaling Multi-User 60 GHz WLANs. 10:1-10:10 - Yonglong Zhang, Konstantinos Psounis:

Efficient MU-MIMO via Switched-beam Antennas. 11:1-11:10 - Longbo Huang, Minghua Chen

, Yunxin Liu:
Learning-aided Stochastic Network Optimization with Imperfect State Prediction. 12:1-12:10 - Shengling Wang, Jian-Hui Huang, Luyun Li, Liran Ma

, Xiuzhen Cheng:
Quantum Game Analysis of Privacy-Leakage for Application Ecosystems. 13:1-13:10 - Amr Al-Anwar

, Henrique Ferraz, Kevin Hsieh, Rohit Thazhath, Paul Martin, João Pedro Hespanha, Mani B. Srivastava
:
D-SLATS: Distributed Simultaneous Localization and Time Synchronization. 14:1-14:10 - Zhenzhi Qian, Fei Wu, Zizhan Zheng, Kannan Srinivasan, Ness B. Shroff:

Concurrent Channel Probing and Data Transmission in Full-duplex MIMO Systems. 15:1-15:10 - Ping-Chun Hsieh

, Xi Liu, Jian Jiao, I-Hong Hou, Yunlong Zhang, P. R. Kumar:
Throughput-Optimal Scheduling for Multi-Hop Networked Transportation Systems With Switch-Over Delay. 16:1-16:10 - Haipeng Dai

, Huizhen Ma, Alex X. Liu:
Radiation Constrained Scheduling of Wireless Charging Tasks. 17:1-17:10 - Kai Han, Yuntian He, Haisheng Tan, Shaojie Tang, He Huang, Jun Luo

:
Online Pricing for Mobile Crowdsourcing with Multi-Minded Users. 18:1-18:10 - Yunze Zeng, Ioannis Pefkianakis, Kyu-Han Kim, Prasant Mohapatra:

MU-MIMO-Aware AP Selection for 802.11ac Networks. 19:1-19:10 - Zhiyi Zhou, Dongning Guo:

1000-Cell Global Spectrum Management. 20:1-20:10 - Bin Li

, Atilla Eryilmaz, R. Srikant:
Emulating Round-Robin in Wireless Networks. 21:1-21:10 - Jing Yuan

, Shaojie Tang:
Adaptive Discount Allocation in Social Networks. 22:1-22:10 - Li Qiu, Guohong Cao:

Maintaining Social Links through Amplify-and-Forward in Wireless Networks. 23:1-23:10 - Samta Shukla, Onkar Bhardwaj, Alhussein A. Abouzeid, Theodoros Salonidis, Ting He:

Hold'em Caching: Proactive Retention-Aware Caching with Multi-path Routing for Wireless Edge Networks. 24:1-24:10 - Miguel B. Costa, Nuno O. Duarte, Nuno Santos

, Paulo Ferreira
:
TrUbi: A System for Dynamically Constraining Mobile Devices within Restrictive Usage Scenarios. 25:1-25:10 - Zhenzhe Zheng, Yanqing Peng

, Fan Wu, Shaojie Tang, Guihai Chen
:
An Online Pricing Mechanism for Mobile Crowdsensing Data Markets. 26:1-26:10 - Magnús M. Halldórsson

, Tigran Tonoyan:
Wireless Link Capacity under Shadowing and Fading. 27:1-27:10
Posters
- Jiayu Pan, Yuhang Yao, Luoyi Fu, Xinbing Wang:

Core Percolation in Coupled Networks. 28:1-28:2 - Jiaqi Liu, Yuhang Yao, Xinzhe Fu, Luoyi Fu, Xiao-Yang Liu, Xinbing Wang:

Evolving K-Graph: Modeling Hybrid Interactions in Networks. 29:1-29:2 - Zhice Yang

, Jiansong Zhang, Zeyu Wang, Qian Zhang
:
Lightweight Display-to-device Communication using Electromagnetic Radiation and FM Radio. 30:1-30:2 - Magnús M. Halldórsson

, Tigran Tonoyan:
Aggregation Rate for Compressible Functions. 31:1-31:2 - Pavan Kumar Pedapolu, Pradeep Kumar, Vaidya Harish, Satvik Venturi, Sushil Kumar Bharti, Vinay Kumar

, Sudhir Kumar
:
Mobile Phone User's Speed Estimation using WiFi Signal-to-Noise Ratio. 32:1-32:2 - Christian Meurisch, The An Binh Nguyen, Stefan Wullkotte, Stefan Niemczyk, Florian Kohnhäuser, Max Mühlhäuser:

NICER911: Ad-hoc Communication and Emergency Services Using Networking Smartphones and Wireless Home Routers. 33:1-33:2 - Paramita Dey

, Saikat Pyne, Sarbani Roy
:
Information spreading in Online Social Networks: A case study on Twitter network. 34:1-34:2 - Samarth Gupta, Sharayu Moharir:

Effect of Recommendations on Serving Content with Unknown Demand. 35:1-35:2 - Subhrendu Chattopadhyay

, Sukumar Nandi
, Samar Shailendra
, Sandip Chakraborty:
Primary Path Effect in Multi-Path TCP: How Serious Is It for Deployment Consideration? 36:1-36:2 - Nikumani Choudhury

, Rakesh Matam, Mithun Mukherjee, Lei Shu
:
Adaptive Duty Cycling in IEEE 802.15.4 Cluster Tree Networks Using MAC Parameters. 37:1-37:2 - Dikshith Reddy, Vickram Parthasarathy, Sethuraman N. Rao:

Modeling and Analysis of the Effects of Oceanic Wave-Induced Movements of a Boat on the Wireless Link Quality. 38:1-38:2 - J. P. Dhivvya, Sethuraman N. Rao, S. Simi:

Towards Maximizing Throughput and Coverage of a Novel Heterogeneous Maritime Communication Network. 39:1-39:2 - Samar Shailendra

, K. Aniruddh, Bighnaraj Panigrahi, Anantha Simha:
Multipath TCP Path Scheduler for Drones: A Segregation of Control and User Data. 40:1-40:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














