


default search action
21st MobiHoc 2020: Virtual Event, USA
- Tommaso Melodia, Eylem Ekici, Alhussein Abouzeid, Minghua Chen:

Mobihoc '20: The Twenty-first ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Virtual Event, USA, October 11-14, 2020. ACM 2020, ISBN 978-1-4503-8015-7 - Salvatore D'Oro

, Leonardo Bonati
, Francesco Restuccia, Michele Polese
, Michele Zorzi, Tommaso Melodia
:
Sl-edge: network slicing at the edge. 1-10 - Erfan Meskar

, Ben Liang
:
Fair multi-resource allocation in mobile edge computing with multiple access points. 11-20 - Ruozhou Yu

, Guoliang Xue, Yinxin Wan, Jian Tang, Dejun Yang
, Yusheng Ji:
Robust resource provisioning in time-varying edge networks. 21-30 - Ang Li, Chunpeng Wu, Yiran Chen, Bin Ni:

MVStylizer: an efficient edge-assisted video photorealistic style transfer system for mobile phones. 31-40 - Ping-Chun Hsieh

, Xi Liu, I-Hong Hou:
Fresher content or smoother playback?: a brownian-approximation framework for scheduling real-time wireless video streams. 41-50 - Ahmed M. Bedewy, Yin Sun, Rahul Singh, Ness B. Shroff:

Optimizing information freshness using low-power status updates via sleep-wake scheduling. 51-60 - Waqas Tariq Toor, Jun-Bae Seo, Hu Jin:

Online control of random access with splitting. 61-70 - Benjie Miao, Shuaiqi Wang, Luoyi Fu, Xiaojun Lin:

De-anonymizability of social network: through the lens of symmetry. 71-80 - Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang

, Ben Niu:
Towards compression-resistant privacy-preserving photo sharing on social networks. 81-90 - Meng Zhang, Brian Swenson, Jianwei Huang, H. Vincent Poor:

Truthful mobile crowd sensing with interdependent valuations. 91-100 - Chi Zhang, Haisheng Tan, Haoqiang Huang

, Zhenhua Han, Shaofeng H.-C. Jiang
, Nikolaos M. Freris, Xiang-Yang Li:
Online dispatching and scheduling of jobs with heterogeneous utilities in edge computing. 101-110 - Qin Zhang, Ruiting Zhou, Chuan Wu

, Lei Jiao
, Zongpeng Li:
Online scheduling of heterogeneous distributed machine learning jobs. 111-120 - Sherif ElAzzouni, Fei Wu, Ness B. Shroff, Eylem Ekici

:
Predictive caching at the wireless edge using near-zero caches. 121-130 - Konstantinos Poularakis, Jaime Llorca

, Antonia M. Tulino
, Leandros Tassiulas:
Approximation algorithms for data-intensive service chain embedding. 131-140 - Jiin Woo, Jungseul Ok, Yung Yi:

Iterative learning of graph connectivity from partially-observed cascade samples. 141-150 - Yanjun Pan

, Alon Efrat
, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, Esther M. Arkin:
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach. 151-160 - Haoran Yu, Ermin Wei, Randall A. Berry:

Learning to price vehicle service with unknown demand. 161-170 - Suhan Jiang, Jie Wu:

A game-theoretic approach to storage offloading in PoC-based mobile blockchain mining. 171-180 - Shaojie Tang, Jing Yuan

, Vijay S. Mookerjee:
Optimizing ad allocation in mobile advertising. 181-190 - Linqing Gui, Fu Xiao, Yang Zhou, Feng Shu, Shui Yu

:
Performance analysis of indoor localization based on channel state information ranging model. 191-200 - Shamik Sarkar, Aniqua Baset, Harsimran Singh, Phillip Smith

, Neal Patwari, Sneha Kumar Kasera, Kurt Derr, Samuel Ramirez:
LLOCUS: learning-based localization using crowdsourcing. 201-210 - Shigeng Zhang, Xuan Liu, Song Guo, Albert Y. Zomaya, Jianxin Wang:

Why queue up?: fast parallel search of RFID tags for multiple users. 211-220 - Youngwook Son

, Kanghyun Lee, Seongwon Kim, Jinmyeong Lee, Sunghyun Choi, Saewoong Bahk:
REFRAIN: promoting valid transmission in high-density modern wi-fi networks. 221-230 - Bin Li

, Atilla Eryilmaz, R. Srikant:
Emulating round-robin for serving dynamic flows over wireless fading channels. 231-240 - Xiaolong Zheng, Dan Xia, Xiuzhen Guo, Liang Liu, Yuan He, Huadong Ma:

Portal: transparent cross-technology opportunistic forwarding for low-power wireless networks. 241-250 - Adnan Quadri, Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Huacheng Zeng:

TCCI: taming co-channel interference for wireless lans. 251-260 - Xin Zhang, Minghong Fang, Jia Liu, Zhengyuan Zhu

:
Private and communication-efficient edge learning: a sparse differential gaussian-masking distributed SGD approach. 261-270 - Francesco Restuccia, Tommaso Melodia

:
PolymoRF: polymorphic wireless receivers through physical-layer deep learning. 271-280 - Shuqin Gao, Costas Courcoubetis, Lingjie Duan

:
Distributed double auctions for large-scale device-to-device resource trading. 281-290 - Richard T. B. Ma:

Internet transport economics: model and analysis. 291-300 - Aditya Dhananjay

, Kai Zheng, Marco Mezzavilla
, Dennis E. Shasha, Sundeep Rangan:
Fully-digital beamforming demonstration with Pi-Radio mmWave SDR platform. 301-302 - Andrea Coletta

, Gaia Maselli
, Mauro Piva, Domenicomichele Silvestri:
DANGER: a drones aided network for guiding emergency and rescue operations. 303-304 - Johannes Mols

, Emmanouil Vasilomanolakis
:
Visualizing the Bitcoin's OP_RETURN operator. 305-306 - Jorge Baranda, Josep Mangues-Bafalluy, Luca Vettori, Ricardo Martínez

:
Scaling composite NFV-network services. 307-308 - Navin V. Keizer, Onur Ascigil, Ioannis Psaras, George Pavlou:

Rewarding relays for decentralised NAT traversal using smart contracts. 309-314 - Vikas Hassija, Vatsal Gupta, Vinay Chamola

, Salil S. Kanhere:
A blockchain-based framework for energy trading between solar powered base stations and grid. 315-320 - Uzair Javaid, Muhammad Naveed Aman, Biplab Sikdar

:
Defining trust in IoT environments via distributed remote attestation using blockchain. 321-326 - Dilip Krishnaswamy:

Quantum blockchain networks. 327-332 - Alessandro Bazzi, Claudia Campolo, Barbara M. Masini, Antonella Molinaro:

How to deal with data hungry V2X applications? 333-338 - Fuxi Wen, Tommy Svensson:

Tensor completion-based 5G positioning with partial channel measurements. 339-344 - Benjamin Sliwa, Rick Adam, Christian Wietfeld

:
Acting selfish for the good of all: contextual bandits for resource-efficient transmission of vehicular sensor data. 345-350 - Seyhan Ucar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Jérôme Härri

, Onur Altintas:
Vehicular knowledge networking and application to risk reasoning. 351-356 - Alperen Gündogan, H. Murat Gürsu, Volker Pauli, Wolfgang Kellerer

:
Distributed resource allocation with multi-agent deep reinforcement learning for 5G-V2V communication. 357-362 - Zana Limani Fazliu

, Carla-Fabiana Chiasserini, Francesco Malandrino, Alessandro Nordio:
Graph-based model for beam management in Mmwave vehicular networks. 363-367 - Luis Sequeira, Toktam Mahmoodi:

The role of machine learning for trajectory prediction in cooperative driving. 368-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














