


default search action
15th WOWMOM 2014: Sydney, Australia
- Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, Sydney, Australia, June 19, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4786-7

- Francisco Carriedo, Marta Beltrán

, Jose Maria Recio:
Extending the JCR standard to work efficiently in mobile RCS environments. 1-3 - Yohaan Yoon, Myungchul Kim, Ben Lee, Kyungmin Go:

Temporal Synchronization Scheme in live 3D video streaming over IEEE 802.11 wireless networks. 1-7 - Pouria Zand, Kallol Das, Emi Mathews, Paul J. M. Havinga:

D-MHR: A distributed management scheme for hybrid networks to provide real-time industrial wireless automation. 1-3 - Gek Hong Sim, Jörg Widmer

, Balaji Rengarajan:
Opportunistic beamforming for finite horizon multicast. 1-9 - Josephina Antoniou

, Vicky Papadopoulou Lesta, Lavy Libman, Andreas Pitsillides, Hooman Reisi Dehkordi:
Cooperation among access points for enhanced quality of service in dense wireless environments. 1-6 - Oscar Puñal, Ismet Aktas, Cai-Julian Schnelke, Gloria Abidin, Klaus Wehrle

, James Gross:
Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation. 1-10 - Sheen Sam, Shashika Biyanwilage, Upul Gunawardana, Ranjith Liyanapathirana

:
RF interference to DVB-T reception from multiple LTE devices in adjacent bands. 1-3 - Wassim Drira, Fethi Filali

:
A Pub/Sub extension to NDN for efficient data collection and dissemination in V2X networks. 1-7 - Carlo Brandolese, Luigi Rucco, William Fornaciari

:
An optimal model to partition the evolution of periodic tasks in wireless sensor networks. 1-9 - Zakwan Al-Arnaout

, Qiang Fu
, Marcus Frean:
On the local popularity impact on object replica placement over WMNs. 1-3 - Jan Medved, Robert Varga, Anton Tkacik, Ken Gray:

OpenDaylight: Towards a Model-Driven SDN Controller architecture. 1-6 - Ahmad Abadleh

, Sangyup Han, Soon J. Hyun, Ben Lee, Myungchul Kim:
ILPS: Indoor localization using physical maps and smartphone sensors. 1-6 - Christoph Frenzel, Tsvetko Tsvetkov, Henning Sanneck, Bernhard Bauer, Georg Carle:

Detection and resolution of ineffective function behavior in Self-Organizing Networks. 1-3 - Angelo Cenedese

, Andrea Zanella, Lorenzo Vangelista
, Michele Zorzi:
Padova Smart City: An urban Internet of Things experimentation. 1-6 - Manoj K. Panda

, Trung Hoang, Hai Le Vu
:
Improving broadcast efficiency of irresponsible forwarding with random linear coding at source. 1-3 - Francesco Restuccia, Sajal K. Das

:
FIDES: A trust-based framework for secure user incentivization in participatory sensing. 1-10 - Chia-Han Lee:

Wireless information and power transfer for communication recovery in disaster areas. 1-4 - Parag Kulkarni, Raul Martinez Oviedo:

Should operators switch-off their legacy infrastructure or re-purpose it for M2M? 1-6 - Chetna Singhal

, Ramona Trestian
, Swades De
, Gabriel-Miro Muntean
:
eSMART: Energy-efficient Scalable Multimedia Broadcast for heterogeneous users. 1-6 - Chen Zhou, Xiaoping Zhang:

Toward the Internet of Things application and management: A practical approach. 1-6 - Muhammad Usman:

Agent-enabled anomaly detection in resource constrained wireless sensor networks. 1-2 - Haibo Ye, Tao Gu

, XianPing Tao, Jian Lu:
Crowdsourced smartphone sensing for localization in metro trains. 1-9 - Louisa Harutyunyan:

On placement of multiple sinks in wireless sensor networks. 1-4 - Hien P. Luong, Suong H. Nguyen

, Hai Le Vu
, Bao Quoc Vo:
One-hop vs. multi-hop broadcast protocol for DSRC safety applications. 1-3 - Adrian Loch, Matthias Hollick, Alexander Kuehne, Anja Klein:

Corridor-based routing: Opening doors to PHY-layer advances for Wireless Multihop Networks. 1-3 - Kamanashis Biswas

:
Lightweight security protocol for Wireless Sensor Networks. 1-2 - Hanno Wirtz, Torsten Zimmermann, Matteo Ceriotti

, Klaus Wehrle
:
CA-Fi: Ubiquitous mobile wireless networking without 802.11 overhead and restrictions. 1-9 - Dongyao Jia

, Kejie Lu, Jianping Wang
:
Improving beacon dissemination in VANETs - A cyber-physical system based design. 1-3 - Honghai Wu, Huadong Ma:

Opportunistic routing for live video streaming in vehicular ad hoc networks. 1-3 - Seungmin Yoo, Yeonchul Shin, Seongwon Kim, Sunghyun Choi

:
Toward realistic WiFi simulation with smartphone "Physics". 1-6 - Yao Hua Ho

, William W. Y. Hsu:
Disaster resilient communication for tunnels and bridges. 1-4 - Denis do Rosário

, Zhongliang Zhao, Torsten Braun
, Eduardo Cerqueira, Aldri Luiz dos Santos
, Islam Alyafawi:
Opportunistic routing for multi-flow video dissemination over Flying Ad-Hoc Networks. 1-6 - Giulio Ministeri, Lorenzo Vangelista

:
Channel impulse response estimation in IEEE 802.11p via data fusion and group orthogonal matching pursuit. 1-6 - Ilya Nikolaevskiy, Dmitry G. Korzun

, Andrei V. Gurtov
:
Security for medical sensor networks in mobile health systems. 1-6 - Quang-My Tran, Arek Dadej

:
Proactive routing overhead in Mobile Ad-hoc Networks. 1-6 - Pouria Zand, Emi Mathews, Kallol Das, Arta Dilo

, Paul J. M. Havinga:
ISA100.11a∗: The ISA100.11a extension for supporting energy-harvested I/O devices. 1-8 - Alireza Izaddoost, Shahram Shah-Heydari:

Proactive risk mitigation for communication network resilience in disaster scenarios. 1-4 - Eisa Zarepour

:
Adaptive protocols for Nano-scale Sensor Networks over composition varying channels. 1-2 - Evangelia Kokolaki, Merkourios Karaliopoulos, Ioannis Stavrakakis

:
Trading public parking space. 1-6 - Narges Shojaedin, Majid Ghaderi, Ashwin Sridharan:

TCP-aware scheduling in LTE networks. 1-9 - Emilio Ancillotti, Raffaele Bruno

, Marco Conti
, Enzo Mingozzi, Carlo Vallati
:
Trickle-L2: Lightweight link quality estimation through Trickle in RPL networks. 1-9 - Mehrab Shahriar, Sajal K. Das

:
CONNECT: Consociating opportunistic network neighbors for constructing a consistent and connected virtual backbone. 1-9 - Fatima Furqan, Doan B. Hoang, Iain B. Collings

:
LTE-Advanced fair intelligent admission control LTE-FIAC. 1-4 - Mingyang Zhong, Peizhao Hu, Jadwiga Indulska

:
Revisited: Bandwidth estimation methods for mobile networks. 1-6 - Panos Kampanakis, Harry G. Perros, Tsegereda Beyene:

SDN-based solutions for Moving Target Defense network protection. 1-6 - Mariamma Antony, Arobinda Gupta:

Finding a small set of high degree nodes in time-varying graphs. 1-6 - Chien-Cheng Wu, Li-Ping Tung, Chih-Yu Lin, Bao-Shuh Paul Lin, Yu-Chee Tseng:

On local cache management strategies for Mobile Augmented Reality. 1-3 - Malisa Vucinic

, Bernard Tourancheau, Franck Rousseau
, Andrzej Duda
, Laurent Damon, Roberto Guizzetti:
OSCAR: Object security architecture for the Internet of Things. 1-10 - Fehmi Ben Abdesslem, Anders Lindgren:

Large scale characterisation of YouTube requests in a cellular network. 1-9 - Sk. Kajal Arefin Imon, Adnan Rahath Khan, Sajal K. Das

:
EFFECT: An energy efficient framework for data compression in tree-based wireless sensor networks. 1-9 - Kaliappa Ravindran:

Autonomic control of network sensing quality with situational assessment. 1-6 - Qing Wang

, Balaji Rengarajan, Joerg Widmer
:
Increasing opportunistic gain in small cells through base station-driven traffic spreading. 1-9 - Ghada Gharbi, Nawal Guermouche, Thierry Monteil:

Temporal verification of mobile publish/subscribe machine-to-machine communications. 1-3 - Lijun He, Guizhong Liu, Xin Chen:

Playback continuity driven cross-layer design for HTTP streaming in LTE systems. 1-6 - Ying Dai, Jie Wu, Andrew Daniels:

Channel dynamics matter: Forwarding node set selection in cognitive radio networks. 1-6 - Milosh Stolikj, Richard Verhoeven, Pieter J. L. Cuijpers

, Johan J. Lukkien:
Proxy support for service discovery using mDNS/DNS-SD in low power networks. 1-6 - Hyunwoo Nam, Kyung-Hwa Kim, Bong-Ho Kim, Doru Calin, Henning Schulzrinne:

Towards dynamic QoS-aware over-the-top video streaming. 1-9 - Parastoo Golmohammadi, Payam Mokhtarian, Farzad Safaei

, Raad Raad:
An analytical model of network connectivity in Vehicular Ad Hoc Networks using spatial point processes. 1-6 - Yinghui Guo, Sebastian Schildt

, Tobias Pögel, Stephan Rottmann, Lars C. Wolf:
Mitigating Blackhole attacks in a hybrid VDTN. 1-6 - Deguo Li, Li Ruan, Limin Xiao, Mingfa Zhu, Wenbo Duan, Yuanhao Zhou, Mengxi Chen, Yinben Xia, Mingming Zhu:

High availability for Non-stop network controller. 1-5 - Victor Ramiro, Emmanuel Lochin

, Patrick Sénac, Thierry Rakotoarivelo:
Temporal random walk as a lightweight communication infrastructure for opportunistic networks. 1-6 - Debashish Ghosh, Lineker Tomazeli, Fan Jin, Muthucumaru Maheswaran:

SpaceOS: Operating system services for smart computing environments. 1-6 - Ozlem Bilgir Yetim, Margaret Martonosi:

Adaptive delay-tolerant scheduling for efficient cellular and WiFi usage. 1-7 - Ethiopia Nigussie, Antti Hakkala, Seppo Virtanen

, Jouni Isoaho
:
Energy-aware adaptive security management for wireless sensor networks. 1-4 - Tristan Gaugel, Jens Mittag, Hannes Hartenstein, Erik G. Ström:

Understanding differences in MAC performance. 1-6 - Claude Roy, Jean-Charles Grégoire:

Multihop backpressure scheduling for IEEE 802.11s multiradio cognitive wireless mesh networks. 1-4 - Madhusanka Liyanage

, Mika Ylianttila
, Andrei V. Gurtov
:
Securing the control channel of software-defined mobile networks. 1-6 - Wonbo Lee

, Jonghoe Koo, Sunghyun Choi
, Yongseok Park:
E$PA: Energy, usage ($), and performance-aware LTE-WiFi adaptive activation scheme for smartphones. 1-9 - Silvia Krug

, Matias Federico Siracusa, Sebastian Schellenberg, Peggy Begerow, Jochen Seitz, Thomas Finke, Juergen Schroeder:
Movement patterns for mobile networks in disaster scenarios. 1-6 - Kun-Chan Lan, Chien-Ming Chou, Cheng-Yuan Li:

Collaborative bandwidth sharing for resilient communication during a disaster. 1-5 - Bernhard Distl, Theus Hossmann:

Privacy in opportunistic network contact graphs. 1-3 - Iraklis Leontiadis, Refik Molva

, Melek Önen
:
A P2P based usage control enforcement scheme resilient to re-injection attacks. 1-8 - Andreas Reinhardt, Christian Renner:

Remote node reconfiguration in opportunistic data collection wireless sensor networks. 1-3 - Ismael Arroyo, Francesc Giné, Concepció Roig

, Marc González:
User experience on heterogenous Liquid Galaxy cluster display walls. 1-3 - Wonsang Song, Jae Woo Lee

, Byung Suk Lee, Henning Schulzrinne:
Finding 9-1-1 callers in tall buildings. 1-9 - Meng Hou, Fengyuan Ren, Chuang Lin, Mao Miao:

HEIR: Heterogeneous interference recognition for wireless sensor networks. 1-9 - Gérôme Bovet, Jean Hennebert:

A distributed web-based naming system for smart buildings. 1-6 - Dennis Cai, Anna Wielosz, Songbin Wei:

Evolve carrier ethernet architecture with SDN and segment routing. 1-6 - Mingyang Zhong, Peizhao Hu, Jadwiga Indulska

, Mohan J. Kumar:
ColStream: Collaborative streaming of on-demand videos for mobile devices. 1-7 - Eisa Zarepour

, Mahbub Hassan, Chun Tung Chou
, Adesoji A. Adesina:
Frequency hopping strategies for improving terahertz sensor network performance over composition varying channels. 1-9 - Adrian Loch, David Meier, Matthias Hollick:

How did you get here? PHY-layer path signatures. 1-3 - Long Qu, Jiaming He, Chadi Assi:

Distributed link scheduling in wireless networks with interference cancellation capabilities. 1-7 - Rui Wang, Zhipeng Jiang, Suixiang Gao, Wenguo Yang, Yinben Xia, Mingming Zhu:

Energy-aware routing algorithms in Software-Defined Networks. 1-6 - Thuong Van Vu, Nadia Boukhatem, Thi Mai Trang Nguyen, Guy Pujolle:

Dynamic coding for TCP transmission reliability in multi-hop wireless networks. 1-6 - Waldir Aranha Moreira Junior

, Paulo Mendes:
Social-aware forwarding in opportunistic wireless networks: Content awareness or obliviousness? 1-6 - Liang-Yu Chen, Hsin-Yi Chen, Chi-Sheng Shih

, Ling-Jyh Chen
, Kate Ching-Ju Lin, Wei-Ho Chung
:
Runtime service recovery for open information gateway. 1-6 - Vasilios A. Siris

, Xenofon Vasilakos
, George C. Polyzos
:
Efficient proactive caching for supporting seamless mobility. 1-6 - Petter Sandvik:

SPECTA: A formal specification language for content transfer algorithms. 1-4 - Stefan Dietzel, Rens W. van der Heijden

, Hendrik Decke, Frank Kargl:
A flexible, subjective logic-based framework for misbehavior detection in V2V networks. 1-6 - Yuanhuizi Xu, Kwan-Wu Chin

, Raad Raad, Sieteng Soh
:
A novel queue length aware distributed link scheduler for multi-transmit receive Wireless Mesh Networks. 1-3 - Saeed Bastani, Lavy Libman, S. Travis Waller

:
Impact of beaconing policies on traffic density estimation accuracy in traffic information systems. 1-6 - Wei Quan, Changqiao Xu, Jianfeng Guan, Hongke Zhang, Luigi Alfredo Grieco:

Social cooperation for information-centric multimedia streaming in highway VANETs. 1-6 - Hemant Kumar Rath, Vishvesh Revoori, S. M. Nadaf, Anantha Simha:

Optimal controller placement in Software Defined Networks (SDN) using a non-zero-sum game. 1-6 - Adrian Loch, Thomas Nitsche, Alexander Kuehne, Matthias Hollick, Joerg Widmer, Anja Klein:

Practical Interference alignment in the frequency domain for OFDM-based wireless access networks. 1-9 - Esther Palomar

, Zhiming Liu, Jonathan P. Bowen
, Yan Zhang, Sabita Maharjan:
Component-based modelling for sustainable and scalable smart meter networks. 1-6 - Hassan Habibi Gharakheili

, Jacob Bass, Luke Exton, Vijay Sivaraman:
Personalizing the home network experience using cloud-based SDN. 1-6 - Honghai Wu, Huadong Ma:

Quality-oriented incentive mechanism for video delivery in opportunistic networks. 1-6 - Hanno Wirtz, Matteo Ceriotti

, Benjamin Grap, Klaus Wehrle
:
Pervasive content-centric wireless networking. 1-9 - Yu-Jia Chen

, Feng-Yi Lin, Li-Chun Wang
, Bao-Shuh Paul Lin:
A dynamic security traversal mechanism for providing deterministic delay guarantee in SDN. 1-6 - Fengrui Shi, Theus Hossmann:

Staying within the budget: Efficient probing strategies in opportunistic networks. 1-6 - Leonardo Badia

, Daniele Munaretto
, Alberto Testolin
, Andrea Zanella, Marco Zorzi
, Michele Zorzi:
Cognition-based networks: Applying cognitive science to multimedia wireless networking. 1-6 - Anisur Rahman:

The effect of in-situ underwater acoustic speed on localization of submerged sensors. 1-2 - Jirí Danihelka, Domenico Giustiniano

, Theus Hossmann:
HyCloud: A system for device-to-device content distribution controlled by the cloud. 1-5 - Leonardo Badia

, Anna V. Guglielmi
:
A Markov analysis of automatic repeat request for video traffic transmission. 1-9 - Sabih ur Rehman

, M. Arif Khan
, Tanveer A. Zia
:
Cross layer routing for VANETs. 1-4 - Riccardo Pozza

, Michele Nati
, Stylianos Georgoulas, Alexander Gluhak, Klaus Moessner
, Srdjan Krco:
CARD: Context-Aware Resource Discovery for mobile Internet of Things scenarios. 1-10 - Madhusanka Liyanage

, Julia Chirkova
, Andrei V. Gurtov
:
Access Point selection game for mobile wireless users. 1-6 - Jean-Charles Grégoire, Angèle M. Hamel:

On scheduling live media streaming in the cloud - A study. 1-6 - Xiaoxiao Jiang, Xiang Cao, David H. C. Du:

Multihop transmission and retransmission measurement of real-time video streaming over DSRC devices. 1-9 - Giacomo Ghidini, Stephen P. Emmons, Farhad Ahani Kamangar, Jeffrey O. Smith:

Advancing M2M communications management: A cloud-based system for cellular traffic analysis. 1-6 - Bandar Alqahtani, Lavy Libman, Salil S. Kanhere

:
A distributed mechanism for dynamic resource trading in cooperative mobile video streaming. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














