callback( { "result":{ "query":":facetid:stream:\"streams/journals/mca\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"73.02" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"118", "@dc":"118", "@oc":"118", "@id":"43365285", "text":":facetid:stream:streams/journals/mca" } }, "hits":{ "@total":"118", "@computed":"118", "@sent":"118", "@first":"0", "hit":[{ "@score":"1", "@id":"193055", "info":{"authors":{"author":[{"@pid":"360/3926","text":"Louis Obi Chenke"},{"@pid":"360/3935","text":"Charles Nche"},{"@pid":"360/4328","text":"Éric Michel Deussom Djomadji"},{"@pid":"360/3910","text":"Emmanuel Tanyi Bety"}]},"title":"Review of 5G C-RAN Resource Allocation.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"4","pages":"e5","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/ChenkeNDB23","doi":"10.4108/EETMCA.V7I4.3263","ee":"https://doi.org/10.4108/eetmca.v7i4.3263","url":"https://dblp.org/rec/journals/mca/ChenkeNDB23"}, "url":"URL#193055" }, { "@score":"1", "@id":"193056", "info":{"authors":{"author":[{"@pid":"329/3567","text":"Abi Abate Dejen"},{"@pid":"84/1516","text":"Anna Förster"},{"@pid":"260/1615","text":"Yihenew Wondie"}]},"title":"Distributed Joint Channel Assignment and Power Control for Sum Rate Maximization of D2D-Enabled Massive MIMO System.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"3","pages":"e1","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/DejenFW23","doi":"10.4108/EETMCA.V7I3.2028","ee":"https://doi.org/10.4108/eetmca.v7i3.2028","url":"https://dblp.org/rec/journals/mca/DejenFW23"}, "url":"URL#193056" }, { "@score":"1", "@id":"193057", "info":{"authors":{"author":[{"@pid":"281/5081","text":"Hai Do"},{"@pid":"64/1505","text":"Hoa Nguyen"},{"@pid":"00/6661","text":"Cuong Nguyen"},{"@pid":"338/7521","text":"Mui Nguyen"},{"@pid":"83/2833","text":"Minh Nguyen"}]},"title":"Formation control of multiple unmanned vehicles based on graph theory: A Comprehensive Review.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"3","pages":"e3","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/DoNNNN23","doi":"10.4108/EETMCA.V7I3.2416","ee":"https://doi.org/10.4108/eetmca.v7i3.2416","url":"https://dblp.org/rec/journals/mca/DoNNNN23"}, "url":"URL#193057" }, { "@score":"1", "@id":"193058", "info":{"authors":{"author":[{"@pid":"318/4824","text":"Dahua Fan"},{"@pid":"318/5180","text":"Jianghong Ou"},{"@pid":"69/9987","text":"Bowen Lu"},{"@pid":"259/5932","text":"Shiwei Lai"},{"@pid":"07/6077","text":"Yajuan Tang"},{"@pid":"58/2994","text":"Tao Cui"},{"@pid":"321/6664","text":"Chengyuan Fan"}]},"title":"Intelligent Reflecting Surface Aided Cloud Access Networks with Federated Learning.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"4","pages":"e1","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/FanOLLTCF23","doi":"10.4108/EETMCA.V7I4.2903","ee":"https://doi.org/10.4108/eetmca.v7i4.2903","url":"https://dblp.org/rec/journals/mca/FanOLLTCF23"}, "url":"URL#193058" }, { "@score":"1", "@id":"193059", "info":{"authors":{"author":[{"@pid":"184/6542","text":"Omar Faruq"},{"@pid":"360/3780","text":"Kazi Rubaiyat Shahriar Rahman"},{"@pid":"214/0558","text":"Nusrat Jahan"},{"@pid":"360/4008","text":"Sakib Rokoni"},{"@pid":"337/3760","text":"Mosa Rabeya"}]},"title":"Li-Fi Technology Based Long Range Free-Space Optics Data Transmit System Evaluation.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"4","pages":"e3","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/FaruqRJRR23","doi":"10.4108/EETMCA.V7I4.2940","ee":"https://doi.org/10.4108/eetmca.v7i4.2940","url":"https://dblp.org/rec/journals/mca/FaruqRJRR23"}, "url":"URL#193059" }, { "@score":"1", "@id":"193060", "info":{"authors":{"author":[{"@pid":"69/9987","text":"Bowen Lu"},{"@pid":"259/5932","text":"Shiwei Lai"},{"@pid":"07/6077","text":"Yajuan Tang"},{"@pid":"58/2994","text":"Tao Cui"},{"@pid":"321/6664","text":"Chengyuan Fan"},{"@pid":"318/5180","text":"Jianghong Ou"},{"@pid":"318/4824","text":"Dahua Fan"}]},"title":"Deep Model Training and Deployment in Heterogeneous IoT Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"3","pages":"e5","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/LuLTCFOF23","doi":"10.4108/EETMCA.V7I3.2899","ee":"https://doi.org/10.4108/eetmca.v7i3.2899","url":"https://dblp.org/rec/journals/mca/LuLTCFOF23"}, "url":"URL#193060" }, { "@score":"1", "@id":"193061", "info":{"authors":{"author":[{"@pid":"69/9987","text":"Bowen Lu"},{"@pid":"259/5932","text":"Shiwei Lai"},{"@pid":"07/6077","text":"Yajuan Tang"},{"@pid":"58/2994","text":"Tao Cui"},{"@pid":"321/6664","text":"Chengyuan Fan"},{"@pid":"318/5180","text":"Jianghong Ou"},{"@pid":"318/4824","text":"Dahua Fan"}]},"title":"Intelligent Reflecting Surface Aided Secure Communication with Federated Learning.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"4","pages":"e2","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/LuLTCFOF23a","doi":"10.4108/EETMCA.V7I4.2900","ee":"https://doi.org/10.4108/eetmca.v7i4.2900","url":"https://dblp.org/rec/journals/mca/LuLTCFOF23a"}, "url":"URL#193061" }, { "@score":"1", "@id":"193062", "info":{"authors":{"author":{"@pid":"272/3077","text":"Sachin Nayak"}},"title":"ns-3 Simulation Based Exploration of LTE Handover Optimization.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"4","pages":"e4","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/Nayak23","doi":"10.4108/EETMCA.V7I4.2967","ee":"https://doi.org/10.4108/eetmca.v7i4.2967","url":"https://dblp.org/rec/journals/mca/Nayak23"}, "url":"URL#193062" }, { "@score":"1", "@id":"193063", "info":{"authors":{"author":[{"@pid":"338/5539","text":"Dahua Ouyang"},{"@pid":"338/7502","text":"Pingzhi Shangguan"},{"@pid":"338/5469","text":"Xinyong Huangfu"},{"@pid":"338/6333","text":"Zenggang Linghu"},{"@pid":"338/6454","text":"Haiyang Zhuge"},{"@pid":"338/6727","text":"Haoliang Situ"},{"@pid":"338/7248","text":"Shangwu Sima"},{"@pid":"338/5637","text":"Junning Shentu"},{"@pid":"338/6777","text":"Yuanrui Xiahou"},{"@pid":"338/5518","text":"Zhengtao Helan"},{"@pid":"338/7533","text":"Zhaoyao Dongfang"},{"@pid":"338/6397","text":"Kunlun Dongfang"},{"@pid":"338/6358","text":"Zhengzhi Wanyan"},{"@pid":"338/6180","text":"Qingrong Murong"},{"@pid":"338/7056","text":"Hanming Yuchi"},{"@pid":"338/7547","text":"Zhongchun Zhangsun"},{"@pid":"338/7128","text":"Bingyun Helan"},{"@pid":"338/6274","text":"Haida Xiahou"},{"@pid":"338/6860","text":"Yifan Shentu"},{"@pid":"338/7137","text":"Weiye Sima"},{"@pid":"338/6793","text":"Zhengfeng Situ"},{"@pid":"338/7443","text":"Fengqi Zhuge"},{"@pid":"338/5974","text":"Jiayi Linghu"},{"@pid":"338/6183","text":"Zhili Huangpu"},{"@pid":"338/6385","text":"Weiyi Shangguan"},{"@pid":"338/6365","text":"Shanshan Ouyang"},{"@pid":"338/7465","text":"Xiatian Ouyang"},{"@pid":"338/7256","text":"Zhimo Shangguan"},{"@pid":"338/7408","text":"Dechang Huangpu"},{"@pid":"338/6951","text":"Bozhong Linghu"},{"@pid":"338/5551","text":"Houjue Zhuge"},{"@pid":"338/5924","text":"Yunfei Situ"},{"@pid":"338/6448","text":"Bobo Sima"},{"@pid":"338/6745","text":"Zelong Shentu"},{"@pid":"338/6543","text":"Kunlun Xiahou"},{"@pid":"338/5979","text":"Zhaohui Helan"},{"@pid":"338/6760","text":"Siyu Wanyan"},{"@pid":"338/5903","text":"Desheng Murong"},{"@pid":"338/7285","text":"Yingxiong Yunchi"},{"@pid":"338/7512","text":"Baoqiang Zhangsun"},{"@pid":"338/7363","text":"Jinshang Dongfang"},{"@pid":"206/8629","text":"Xiazhi Lai"},{"@pid":"127/7258","text":"Yinghao Guo"},{"@pid":"69/9987","text":"Bowen Lu"}]},"title":"Deep Non-Orthogonal Multiple Access Network Assisted by Intelligent Reflecting Surface.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"3","pages":"e4","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/OuyangSHLZSSSXH23","doi":"10.4108/EETMCA.V7I3.2750","ee":"https://doi.org/10.4108/eetmca.v7i3.2750","url":"https://dblp.org/rec/journals/mca/OuyangSHLZSSSXH23"}, "url":"URL#193063" }, { "@score":"1", "@id":"193064", "info":{"authors":{"author":[{"@pid":"313/2734","text":"Huu Q. Tran"},{"@pid":"338/5628","text":"Nguyen Trong Duy"},{"@pid":"338/5666","text":"Huynh Phan Hieu Nghia"}]},"title":"Collaborative Relay Radio Network Using Reconfigurable Intelligent Surface.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"3","pages":"e2","year":"2023","type":"Journal Articles","access":"open","key":"journals/mca/TranDN23","doi":"10.4108/EETMCA.V7I3.2716","ee":"https://doi.org/10.4108/eetmca.v7i3.2716","url":"https://dblp.org/rec/journals/mca/TranDN23"}, "url":"URL#193064" }, { "@score":"1", "@id":"689348", "info":{"authors":{"author":[{"@pid":"207/9396","text":"Sulaiman Olaniyi Abdulsalam"},{"@pid":"236/1847","text":"Jumoke Falilat Ajao"},{"@pid":"301/7611","text":"Bukola Fatimah Balogun"},{"@pid":"207/9254","text":"Micheal Olaolu Arowolo"}]},"title":"A Churn Prediction System for Telecommunication Company Using Random Forest and Convolution Neural Network Algorithms.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"21","pages":"e4","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/AbdulsalamABA22","doi":"10.4108/EETMCA.V6I21.2181","ee":"https://doi.org/10.4108/eetmca.v6i21.2181","url":"https://dblp.org/rec/journals/mca/AbdulsalamABA22"}, "url":"URL#689348" }, { "@score":"1", "@id":"689349", "info":{"authors":{"author":[{"@pid":"41/4201","text":"Muhammad Azam"},{"@pid":"181/7698","text":"Muhammad Nouman"}]},"title":"The similarity between Disease and Drug Network in Link Prediction.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"2","pages":"e5","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/AzamN22","doi":"10.4108/EETMCA.V7I2.2667","ee":"https://doi.org/10.4108/eetmca.v7i2.2667","url":"https://dblp.org/rec/journals/mca/AzamN22"}, "url":"URL#689349" }, { "@score":"1", "@id":"689350", "info":{"authors":{"author":[{"@pid":"00/7514","text":"Jorge C. S. Cardoso"},{"@pid":"320/4827","text":"Jorge M. Ribeiro"}]},"title":"Marker-based Tangible Interfaces for Smartphone-based Virtual Reality.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"20","pages":"e4","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/CardosoR22","doi":"10.4108/EAI.11-4-2022.173802","ee":"https://doi.org/10.4108/eai.11-4-2022.173802","url":"https://dblp.org/rec/journals/mca/CardosoR22"}, "url":"URL#689350" }, { "@score":"1", "@id":"689351", "info":{"authors":{"author":{"@pid":"311/2563","text":"Nguyen Cong Danh"}},"title":"Outage Performance of Underlay Multihop Cognitive Relay Networks with the use of the highest Power Beacon among Power Beacons.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"20","pages":"e2","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/Danh22","doi":"10.4108/EAI.5-11-2021.171999","ee":"https://doi.org/10.4108/eai.5-11-2021.171999","url":"https://dblp.org/rec/journals/mca/Danh22"}, "url":"URL#689351" }, { "@score":"1", "@id":"689352", "info":{"authors":{"author":[{"@pid":"318/1908","text":"Arebu Dejen"},{"@pid":"247/0140","text":"Murad Ridwan"},{"@pid":"20/2798","text":"Jaume Anguera"},{"@pid":"299/5777","text":"Jeevani W. Jayasinghe"}]},"title":"Millimeter Wave Cellular Communication Performances and Challenges: A Survey.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"21","pages":"e5","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/DejenRAJ22","doi":"10.4108/EETMCA.V7I21.2424","ee":"https://doi.org/10.4108/eetmca.v7i21.2424","url":"https://dblp.org/rec/journals/mca/DejenRAJ22"}, "url":"URL#689352" }, { "@score":"1", "@id":"689353", "info":{"authors":{"author":[{"@pid":"329/3567","text":"Abi Abate Dejen"},{"@pid":"260/1615","text":"Yihenew Wondie"},{"@pid":"84/1516","text":"Anna Förster"}]},"title":"Survey on D2D Resource Scheduling and Power Control Techniques: State-of-art and Challenges.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"21","pages":"e1","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/DejenWF22","doi":"10.4108/EAI.4-5-2022.173977","ee":"https://doi.org/10.4108/eai.4-5-2022.173977","url":"https://dblp.org/rec/journals/mca/DejenWF22"}, "url":"URL#689353" }, { "@score":"1", "@id":"689354", "info":{"authors":{"author":{"@pid":"184/4112","text":"Abdolbast Greede"}},"title":"Realistic Human Mobility Model for Opportunistic Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"20","pages":"e5","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/Greede22","doi":"10.4108/EAI.2-5-2022.173976","ee":"https://doi.org/10.4108/eai.2-5-2022.173976","url":"https://dblp.org/rec/journals/mca/Greede22"}, "url":"URL#689354" }, { "@score":"1", "@id":"689355", "info":{"authors":{"author":[{"@pid":"65/4298","text":"Mohamed Hassan"},{"@pid":"225/8141","text":"Manwinder Singh"},{"@pid":"293/5889","text":"Khalid Hamid"}]},"title":"BER Performance of NOMA Downlink for AWGN and Rayleigh Fading Channels in (SIC).","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"21","pages":"e3","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/HassanSH22","doi":"10.4108/EAI.20-6-2022.174227","ee":"https://doi.org/10.4108/eai.20-6-2022.174227","url":"https://dblp.org/rec/journals/mca/HassanSH22"}, "url":"URL#689355" }, { "@score":"1", "@id":"689356", "info":{"authors":{"author":{"@pid":"163/5087","text":"Haythem Hayouni"}},"title":"E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"20","pages":"e1","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/Hayouni22","doi":"10.4108/EAI.29-9-2021.171189","ee":"https://doi.org/10.4108/eai.29-9-2021.171189","url":"https://dblp.org/rec/journals/mca/Hayouni22"}, "url":"URL#689356" }, { "@score":"1", "@id":"689357", "info":{"authors":{"author":[{"@pid":"329/3557","text":"Pascal Muam Mah"},{"@pid":"87/18","text":"Iwona Skalna"},{"@pid":"329/3419","text":"Eric Munyeshuri"},{"@pid":"329/3364","text":"John Akoko"}]},"title":"Influence of Internet of things on human psychology (internet of thoughts) for education, healthcare, and businesses.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"2","pages":"e1","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/MahSMA22","doi":"10.4108/EETMCA.V7I2.2627","ee":"https://doi.org/10.4108/eetmca.v7i2.2627","url":"https://dblp.org/rec/journals/mca/MahSMA22"}, "url":"URL#689357" }, { "@score":"1", "@id":"689358", "info":{"authors":{"author":[{"@pid":"329/3402","text":"Ravi Mancharla"},{"@pid":"329/3424","text":"Yaka Bulo"}]},"title":"A Comparative Analysis of the various Power Allocation Algorithm in NOMA-MIMO Network Using DNN and DLS Algorithm.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"2","pages":"e3","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/MancharlaB22","doi":"10.4108/EETMCA.V7I2.2651","ee":"https://doi.org/10.4108/eetmca.v7i2.2651","url":"https://dblp.org/rec/journals/mca/MancharlaB22"}, "url":"URL#689358" }, { "@score":"1", "@id":"689359", "info":{"authors":{"author":[{"@pid":"293/5014","text":"G. Oladeji-Atanda"},{"@pid":"20/6551","text":"Dimane Mpoeleng"}]},"title":"Topology characterizing using packet forwarding distance dissimilarity in multi-greedy geographic routing.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"20","pages":"e3","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/Oladeji-AtandaM22","doi":"10.4108/EAI.11-1-2022.172815","ee":"https://doi.org/10.4108/eai.11-1-2022.172815","url":"https://dblp.org/rec/journals/mca/Oladeji-AtandaM22"}, "url":"URL#689359" }, { "@score":"1", "@id":"689360", "info":{"authors":{"author":[{"@pid":"191/4501","text":"Kaoutar Ourouss"},{"@pid":"27/9057","text":"Najib Naja"},{"@pid":"25/9057","text":"Abdellah Jamali"}]},"title":"Performance Analysis of RACODSR Protocol in Smart Grayhole Attacks on VANets.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"21","pages":"e2","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/OuroussNJ22","doi":"10.4108/EAI.1-6-2022.174088","ee":"https://doi.org/10.4108/eai.1-6-2022.174088","url":"https://dblp.org/rec/journals/mca/OuroussNJ22"}, "url":"URL#689360" }, { "@score":"1", "@id":"689361", "info":{"authors":{"author":[{"@pid":"07/6077","text":"Yajuan Tang"},{"@pid":"259/5932","text":"Shiwei Lai"},{"@pid":"202/1100","text":"Yanyi Rao"},{"@pid":"87/6026","text":"Wen Zhou"},{"@pid":"119/4034","text":"Fusheng Zhu"},{"@pid":"32/7029","text":"Liming Chen"},{"@pid":"15/753","text":"Dan Deng"},{"@pid":"02/736","text":"Jing Wang"},{"@pid":"58/2994","text":"Tao Cui"},{"@pid":"95/8351-2","text":"Yuwei Zhang 0002"},{"@pid":"95/3736","text":"Jun Liu"},{"@pid":"52/328","text":"Di Wu"},{"@pid":"61/590","text":"Zhusong Liu"},{"@pid":"17/712","text":"Huang Huang"},{"@pid":"32/3943","text":"Xuan Zhou"},{"@pid":"86/981","text":"Zhao Wang"},{"@pid":"260/1450","text":"Zichao Zhao"},{"@pid":"66/190","text":"Chao Li"},{"@pid":"181/2839","text":"Kai Chen"},{"@pid":"69/5011","text":"Wei Zhou"},{"@pid":"87/6284","text":"Yun Li"},{"@pid":"327/2290","text":"Kaimeno Dube"},{"@pid":"327/2505","text":"Abbarbas Muazu"},{"@pid":"327/2481","text":"Nakilavai Rono"},{"@pid":"327/2295","text":"Sunli Feng"},{"@pid":"50/2634","text":"Jiayin Qin"},{"@pid":"25/1146","text":"Haige Xiang"},{"@pid":"11/3799","text":"Zhigang Cao"},{"@pid":"44/681","text":"Lieguang Zeng"},{"@pid":"79/1231","text":"Zhixing Yang"}]},"title":"Intelligent Distributed Data Storage for Wireless Communications in B5G Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"2","pages":"e2","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/TangLRZZCDWCZLW22","doi":"10.4108/EETMCA.V7I2.2415","ee":"https://doi.org/10.4108/eetmca.v7i2.2415","url":"https://dblp.org/rec/journals/mca/TangLRZZCDWCZLW22"}, "url":"URL#689361" }, { "@score":"1", "@id":"689362", "info":{"authors":{"author":[{"@pid":"07/6077","text":"Yajuan Tang"},{"@pid":"259/5932","text":"Shiwei Lai"},{"@pid":"260/1450","text":"Zichao Zhao"},{"@pid":"202/1100","text":"Yanyi Rao"},{"@pid":"87/6026","text":"Wen Zhou"},{"@pid":"119/4034","text":"Fusheng Zhu"},{"@pid":"32/7029","text":"Liming Chen"},{"@pid":"15/753","text":"Dan Deng"},{"@pid":"02/736","text":"Jing Wang"},{"@pid":"58/2994","text":"Tao Cui"},{"@pid":"95/8351-2","text":"Yuwei Zhang 0002"},{"@pid":"95/3736","text":"Jun Liu"},{"@pid":"52/328","text":"Di Wu"},{"@pid":"61/590","text":"Zhusong Liu"},{"@pid":"17/712","text":"Huang Huang"},{"@pid":"32/3943","text":"Xuan Zhou"},{"@pid":"86/981","text":"Zhao Wang"},{"@pid":"66/190","text":"Chao Li"},{"@pid":"181/2839","text":"Kai Chen"},{"@pid":"69/5011","text":"Wei Zhou"},{"@pid":"87/6284","text":"Yun Li"},{"@pid":"327/2290","text":"Kaimeno Dube"},{"@pid":"327/2505","text":"Abbarbas Muazu"},{"@pid":"327/2481","text":"Nakilavai Rono"},{"@pid":"327/2295","text":"Sunli Feng"},{"@pid":"50/2634","text":"Jiayin Qin"},{"@pid":"25/1146","text":"Haige Xiang"},{"@pid":"11/3799","text":"Zhigang Cao"},{"@pid":"44/681","text":"Lieguang Zeng"},{"@pid":"79/1231","text":"Zhixing Yang"}]},"title":"Energy-efficient and high-spectrum-efficiency wireless transmission.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"7","number":"2","pages":"e4","year":"2022","type":"Journal Articles","access":"open","key":"journals/mca/TangLZRZZCDWCZL22","doi":"10.4108/EETMCA.V7I2.2417","ee":"https://doi.org/10.4108/eetmca.v7i2.2417","url":"https://dblp.org/rec/journals/mca/TangLZRZZCDWCZL22"}, "url":"URL#689362" }, { "@score":"1", "@id":"1162221", "info":{"authors":{"author":[{"@pid":"298/5906","text":"Iflah Aijaz"},{"@pid":"235/8566","text":"Sheikh Mohammad Idrees"}]},"title":"Performance Evaluation of Multi-protocol Label Switching-Traffic Engineering Schemes.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"19","pages":"e3","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/AijazI21","doi":"10.4108/EAI.8-10-2020.166550","ee":"https://doi.org/10.4108/eai.8-10-2020.166550","url":"https://dblp.org/rec/journals/mca/AijazI21"}, "url":"URL#1162221" }, { "@score":"1", "@id":"1162222", "info":{"authors":{"author":[{"@pid":"23/2176","text":"Ibrahim Al-Surmi"},{"@pid":"172/9921","text":"Ali Mohammed Mansoor"},{"@pid":"293/4489","text":"Aqeel Abdullah Ahmed"}]},"title":"Toward 5G High Utilizations: A survey on OFDMA-based Resource Allocation Techniques in Next-Generation Broadband Wireless Access Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"18","pages":"e3","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/Al-SurmiMA21","doi":"10.4108/EAI.10-2-2021.168713","ee":"https://doi.org/10.4108/eai.10-2-2021.168713","url":"https://dblp.org/rec/journals/mca/Al-SurmiMA21"}, "url":"URL#1162222" }, { "@score":"1", "@id":"1162223", "info":{"authors":{"author":[{"@pid":"286/1741","text":"Tea Qaula Ferbia"},{"@pid":"208/9624","text":"Albertus Joko Santoso"},{"@pid":"61/6447","text":"Suyoto"}]},"title":"Analysis of Implementation "Jogja Istimewa" Based on Mobile Application Using UTAUT2 Model in Development Jogja Smart Province.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"17","pages":"e5","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/FerbiaSS21","doi":"10.4108/EAI.29-1-2021.168508","ee":"https://doi.org/10.4108/eai.29-1-2021.168508","url":"https://dblp.org/rec/journals/mca/FerbiaSS21"}, "url":"URL#1162223" }, { "@score":"1", "@id":"1162224", "info":{"authors":{"author":[{"@pid":"293/4701","text":"Karuna Samuel Finch"},{"@pid":"156/0306","text":"Srikant Manas Kala"},{"@pid":"126/2518","text":"Vanlin Sathya"}]},"title":"The Review of Mobile Applications and Wireless Technologies in Sustaining K-12 Schools during COVID-19.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"18","pages":"e1","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/FinchKS21","doi":"10.4108/EAI.29-1-2021.168509","ee":"https://doi.org/10.4108/eai.29-1-2021.168509","url":"https://dblp.org/rec/journals/mca/FinchKS21"}, "url":"URL#1162224" }, { "@score":"1", "@id":"1162225", "info":{"authors":{"author":[{"@pid":"214/0228","text":"Emmanuel Onwuka Ibam"},{"@pid":"74/5103","text":"Olutayo Kehinde Boyinbode"},{"@pid":"286/1204","text":"I. O. Ayelabowo"}]},"title":"Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"17","pages":"e1","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/IbamBA21","doi":"10.4108/EAI.13-7-2018.160978","ee":"https://doi.org/10.4108/eai.13-7-2018.160978","url":"https://dblp.org/rec/journals/mca/IbamBA21"}, "url":"URL#1162225" }, { "@score":"1", "@id":"1162226", "info":{"authors":{"author":[{"@pid":"276/4862","text":"Kirti Keshav"},{"@pid":"177/5797","text":"Ashish Kumar Pradhan"},{"@pid":"70/4421","text":"T. Srinivas"},{"@pid":"69/2592","text":"Pallapa Venkataram"}]},"title":"Dynamic QoS Management for Interactive Multimedia in Integrated 4G/5G Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"19","pages":"e2","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/KeshavPSV21","doi":"10.4108/EAI.23-6-2021.170243","ee":"https://doi.org/10.4108/eai.23-6-2021.170243","url":"https://dblp.org/rec/journals/mca/KeshavPSV21"}, "url":"URL#1162226" }, { "@score":"1", "@id":"1162227", "info":{"authors":{"author":[{"@pid":"31/1396","text":"Vanessa C. Klaas"},{"@pid":"43/7416","text":"Alberto Calatroni"},{"@pid":"286/1395","text":"Matea Pavic"},{"@pid":"64/10615","text":"Matthias Guckenberger"},{"@pid":"202/4209","text":"Gudrun Theile"},{"@pid":"50/1065","text":"Gerhard Tröster"}]},"title":"Monitoring Patients in Ambulatory Palliative Care: a Design for an Observational Study.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"17","pages":"e3","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/KlaasCPGTT21","doi":"10.4108/EAI.31-1-2019.163306","ee":"https://doi.org/10.4108/eai.31-1-2019.163306","url":"https://dblp.org/rec/journals/mca/KlaasCPGTT21"}, "url":"URL#1162227" }, { "@score":"1", "@id":"1162228", "info":{"authors":{"author":[{"@pid":"298/6604","text":"M. Moneesh"},{"@pid":"298/6247","text":"T. Sai Tejaswi"},{"@pid":"298/5663","text":"T. Sai Yeshwanth"},{"@pid":"298/5727","text":"M. Sai Harshitha"},{"@pid":"298/5952","text":"G. Chakravarthy"}]},"title":"Cooperative Spectrum Sensing using DQN in CRN.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"19","pages":"e4","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/MoneeshTYHC21","doi":"10.4108/EAI.14-7-2021.170290","ee":"https://doi.org/10.4108/eai.14-7-2021.170290","url":"https://dblp.org/rec/journals/mca/MoneeshTYHC21"}, "url":"URL#1162228" }, { "@score":"1", "@id":"1162229", "info":{"authors":{"author":[{"@pid":"293/4475","text":"Marco Mongi"},{"@pid":"293/5053","text":"Jonathan Giacri"},{"@pid":"293/5005","text":"Ezequiel Tardivo"},{"@pid":"293/4577","text":"Noelia Veglia"},{"@pid":"293/4387","text":"Federico Aguirre"}]},"title":"Design of 5G-oriented patch antennas, a comprehensive survey.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"18","pages":"e4","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/MongiGTVA21","doi":"10.4108/EAI.16-3-2021.169031","ee":"https://doi.org/10.4108/eai.16-3-2021.169031","url":"https://dblp.org/rec/journals/mca/MongiGTVA21"}, "url":"URL#1162229" }, { "@score":"1", "@id":"1162230", "info":{"authors":{"author":[{"@pid":"293/5014","text":"G. Oladeji-Atanda"},{"@pid":"20/6551","text":"Dimane Mpoeleng"},{"@pid":"293/5012","text":"F. J. Ogwu"}]},"title":"Multi-greedy geographic packets forwarding using flow-based indicators.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"18","pages":"e5","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/Oladeji-AtandaM21","doi":"10.4108/EAI.13-5-2021.169914","ee":"https://doi.org/10.4108/eai.13-5-2021.169914","url":"https://dblp.org/rec/journals/mca/Oladeji-AtandaM21"}, "url":"URL#1162230" }, { "@score":"1", "@id":"1162231", "info":{"authors":{"author":[{"@pid":"293/4370","text":"Ashley Rajoo"},{"@pid":"54/4637","text":"Kavi Kumar Khedo"},{"@pid":"59/8147","text":"Utam Avinash Einstein Mungur"}]},"title":"Mobile Participatory Sensing Systems: A Comprehensive Review.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"18","pages":"e2","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/RajooKM21","doi":"10.4108/EAI.29-1-2021.168510","ee":"https://doi.org/10.4108/eai.29-1-2021.168510","url":"https://dblp.org/rec/journals/mca/RajooKM21"}, "url":"URL#1162231" }, { "@score":"1", "@id":"1162232", "info":{"authors":{"author":[{"@pid":"03/8972","text":"Anwar Saif"},{"@pid":"06/635","text":"Mohamed Othman"},{"@pid":"23/2176","text":"Ibrahim Alsurmi"},{"@pid":"250/6807","text":"Mukhtar Ghilan"},{"@pid":"286/1826","text":"Algabri Malek"}]},"title":"CBA-TCP: A cross-layer TCP transmission rate adaptation scheme based on the compressed block ACK bitmap of IEEE 802.11n networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"17","pages":"e2","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/SaifOAGM21","doi":"10.4108/EAI.31-1-2019.162735","ee":"https://doi.org/10.4108/eai.31-1-2019.162735","url":"https://dblp.org/rec/journals/mca/SaifOAGM21"}, "url":"URL#1162232" }, { "@score":"1", "@id":"1162233", "info":{"authors":{"author":[{"@pid":"286/0989","text":"Shilpi"},{"@pid":"259/7504","text":"Danish Raza Rizvi"}]},"title":"E-CREDND Scheme for Detection of malevolent nodes in Ad-hoc Network.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"17","pages":"e4","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/ShilpiR21","doi":"10.4108/EAI.13-7-2018.163971","ee":"https://doi.org/10.4108/eai.13-7-2018.163971","url":"https://dblp.org/rec/journals/mca/ShilpiR21"}, "url":"URL#1162233" }, { "@score":"1", "@id":"1162234", "info":{"authors":{"author":[{"@pid":"153/6069","text":"Sandro Weber"},{"@pid":"298/6782","text":"Marian Ludwig"},{"@pid":"k/GudrunKlinker","text":"Gudrun Klinker"}]},"title":"Ubi-Interact: A modular approach to connecting systems.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"19","pages":"e5","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/WeberLK21","doi":"10.4108/EAI.14-7-2021.170291","ee":"https://doi.org/10.4108/eai.14-7-2021.170291","url":"https://dblp.org/rec/journals/mca/WeberLK21"}, "url":"URL#1162234" }, { "@score":"1", "@id":"1162235", "info":{"authors":{"author":[{"@pid":"298/6135","text":"Meyo Zongo"},{"@pid":"161/4569","text":"Jean Michel Nlong II"},{"@pid":"30/2787","text":"René Ndoundam"},{"@pid":"84/1516","text":"Anna Förster"}]},"title":"DSRC Applicability in Cameroon Road Traffic: A Simulation Study.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"6","number":"19","pages":"e1","year":"2021","type":"Journal Articles","access":"open","key":"journals/mca/ZongoNNF21","doi":"10.4108/EAI.11-6-2021.170233","ee":"https://doi.org/10.4108/eai.11-6-2021.170233","url":"https://dblp.org/rec/journals/mca/ZongoNNF21"}, "url":"URL#1162235" }, { "@score":"1", "@id":"2047249", "info":{"authors":{"author":[{"@pid":"210/8256","text":"Stewart Blakeway"},{"@pid":"58/8190","text":"Anna Kirpichnikova"},{"@pid":"250/2078","text":"M. Schaeffer"},{"@pid":"90/751","text":"Emanuele Lindo Secco"}]},"title":"Transmission Power and Effects on Energy Consumption and Performance in MANET.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"5","number":"16","pages":"e2","year":"2019","type":"Journal Articles","access":"open","key":"journals/mca/BlakewayKSS19","doi":"10.4108/EAI.13-7-2018.159336","ee":"https://doi.org/10.4108/eai.13-7-2018.159336","url":"https://dblp.org/rec/journals/mca/BlakewayKSS19"}, "url":"URL#2047249" }, { "@score":"1", "@id":"2047250", "info":{"authors":{"author":[{"@pid":"89/5615-10","text":"Bo Chen 0010"},{"@pid":"46/2311-3","text":"Xi Li 0003"},{"@pid":"53/2969","text":"Xuehai Zhou"}]},"title":"Power Optimization of WiFi Networks based on RSSI-awareness.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"5","number":"16","pages":"e1","year":"2019","type":"Journal Articles","access":"open","key":"journals/mca/ChenLZ19","doi":"10.4108/EAI.14-12-2018.159335","ee":"https://doi.org/10.4108/eai.14-12-2018.159335","url":"https://dblp.org/rec/journals/mca/ChenLZ19"}, "url":"URL#2047250" }, { "@score":"1", "@id":"2047251", "info":{"authors":{"author":[{"@pid":"242/7328","text":"Nnabuike N. Eya"},{"@pid":"203/3428","text":"George A. Oguntala"},{"@pid":"48/10609","text":"R. A. Abd-Alhameed"}]},"title":"Investigation on FOG Computing for 5G- Enabled Software Defined Multicast Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"5","number":"16","pages":"e5","year":"2019","type":"Journal Articles","access":"open","key":"journals/mca/EyaOA19","doi":"10.4108/EAI.3-9-2019.159948","ee":"https://doi.org/10.4108/eai.3-9-2019.159948","url":"https://dblp.org/rec/journals/mca/EyaOA19"}, "url":"URL#2047251" }, { "@score":"1", "@id":"2047252", "info":{"authors":{"author":[{"@pid":"250/2130","text":"Abdullah Lakhan"},{"@pid":"35/6350","text":"Xiaoping Li"}]},"title":"Mobility and Fault Aware Adaptive Task Offloading in Heterogeneous Mobile Cloud Environments.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"5","number":"16","pages":"e4","year":"2019","type":"Journal Articles","access":"open","key":"journals/mca/LakhanL19","doi":"10.4108/EAI.3-9-2019.159947","ee":"https://doi.org/10.4108/eai.3-9-2019.159947","url":"https://dblp.org/rec/journals/mca/LakhanL19"}, "url":"URL#2047252" }, { "@score":"1", "@id":"2047253", "info":{"authors":{"author":{"@pid":"245/0536","text":"Mobasshir Mahbub"}},"title":"Automated control signal reception acknowledgement system using nRF24L01P wireless transceiver module and Arduino.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"5","number":"16","pages":"e3","year":"2019","type":"Journal Articles","access":"open","key":"journals/mca/Mahbub19","doi":"10.4108/EAI.14-12-2018.159337","ee":"https://doi.org/10.4108/eai.14-12-2018.159337","url":"https://dblp.org/rec/journals/mca/Mahbub19"}, "url":"URL#2047253" }, { "@score":"1", "@id":"2452061", "info":{"authors":{"author":[{"@pid":"144/3227","text":"Jawad Ali"},{"@pid":"218/9553","text":"Muhammad Shoaib Shoukat"},{"@pid":"81/7083","text":"Muhammad Faisal"}]},"title":"Determining Interdependencies among NFRs in Agile Environment to Reduce Conflicts.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"13","pages":"e3","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/AliSF18a","doi":"10.4108/EAI.22-3-2018.154384","ee":"https://doi.org/10.4108/eai.22-3-2018.154384","url":"https://dblp.org/rec/journals/mca/AliSF18a"}, "url":"URL#2452061" }, { "@score":"1", "@id":"2452062", "info":{"authors":{"author":[{"@pid":"218/9571","text":"Adams Addison Kobla Azameti"},{"@pid":"195/4253","text":"Ferdinand Apietu Katsriku"},{"@pid":"43/4035","text":"Peter H. J. Chong"},{"@pid":"29/3579","text":"Jamal-Deen Abdulai"}]},"title":"The Effect of Congestion Control Model on Congested Traffic Flow in Vehicular Ad Hoc Networks (VANETs).","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"13","pages":"e1","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/AzametiKCA18a","doi":"10.4108/EAI.22-3-2018.154371","ee":"https://doi.org/10.4108/eai.22-3-2018.154371","url":"https://dblp.org/rec/journals/mca/AzametiKCA18a"}, "url":"URL#2452062" }, { "@score":"1", "@id":"2452063", "info":{"authors":{"author":[{"@pid":"235/8918","text":"Patrick Dasilva"},{"@pid":"235/8816","text":"Anuja Ghising"},{"@pid":"48/1320","text":"Siddharth Patil"},{"@pid":"70/5417","text":"Honggang Wang"}]},"title":"Implementation of Cognitive Radio Network Testbed for Multimedia Communications.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"15","pages":"e2","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/DasilvaGPW18","doi":"10.4108/EAI.10-7-2018.156087","ee":"https://doi.org/10.4108/eai.10-7-2018.156087","url":"https://dblp.org/rec/journals/mca/DasilvaGPW18"}, "url":"URL#2452063" }, { "@score":"1", "@id":"2452064", "info":{"authors":{"author":[{"@pid":"213/5246","text":"Saida Driouache"},{"@pid":"282/5657","text":"Najob Naja"},{"@pid":"25/9057","text":"Abdellah Jamali"}]},"title":"Rank Average for handover decision making in heterogeneous wireless networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"12","pages":"e3","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/DriouacheNJ18a","doi":"10.4108/EAI.10-1-2018.153555","ee":"https://doi.org/10.4108/eai.10-1-2018.153555","url":"https://dblp.org/rec/journals/mca/DriouacheNJ18a"}, "url":"URL#2452064" }, { "@score":"1", "@id":"2452065", "info":{"authors":{"author":[{"@pid":"138/1550","text":"Joydev Ghosh"},{"@pid":"58/10067","text":"Zoltán Jakó"}]},"title":"MAC Protocol Operation in Energy Harvesting for 5G Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"12","pages":"e2","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/GhoshJ18a","doi":"10.4108/EAI.10-1-2018.153554","ee":"https://doi.org/10.4108/eai.10-1-2018.153554","url":"https://dblp.org/rec/journals/mca/GhoshJ18a"}, "url":"URL#2452065" }, { "@score":"1", "@id":"2452066", "info":{"authors":{"author":[{"@pid":"213/2690","text":"Inam Ullah Khan"},{"@pid":"45/386","text":"Ijaz Mansoor Qureshi"},{"@pid":"198/8335","text":"Syed Bilal Hussain Shah"},{"@pid":"218/9551","text":"Muhammad Hamza Akhlaq"},{"@pid":"218/9465","text":"Alamgir Safi"},{"@pid":"218/9536","text":"Muhammad Asghar Khan"},{"@pid":"218/9620","text":"Anjum Nazir"}]},"title":"Comparative Analysis and Route Optimization of State of the Art Routing Protocols.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"13","pages":"e4","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/KhanQSASKN18a","doi":"10.4108/EAI.22-3-2018.154385","ee":"https://doi.org/10.4108/eai.22-3-2018.154385","url":"https://dblp.org/rec/journals/mca/KhanQSASKN18a"}, "url":"URL#2452066" }, { "@score":"1", "@id":"2452067", "info":{"authors":{"author":[{"@pid":"50/3402","text":"Bo Li"},{"@pid":"57/4280","text":"Weidong Wang"},{"@pid":"07/887","text":"Yinghai Zhang"},{"@pid":"73/8605","text":"Chaowei Wang"},{"@pid":"174/9927","text":"Shuaijun Liu"},{"@pid":"213/5294","text":"Zhaojun Qian"}]},"title":"Interference Assessment for the Spectrum Sharing between IMT-2020 and Inter-Satellite Service.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"12","pages":"e4","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/LiWZWLQ18a","doi":"10.4108/EAI.10-1-2018.153556","ee":"https://doi.org/10.4108/eai.10-1-2018.153556","url":"https://dblp.org/rec/journals/mca/LiWZWLQ18a"}, "url":"URL#2452067" }, { "@score":"1", "@id":"2452068", "info":{"authors":{"author":[{"@pid":"74/9549","text":"Ioana M. Marcu"},{"@pid":"197/7428","text":"Carmen Voicu"},{"@pid":"42/2497","text":"Simona Viorica Halunga"},{"@pid":"173/6863","text":"Radu Ovidiu Preda"}]},"title":"LDPC encoding performances for fading suppression in MIMO-CDMA wireless networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"14","pages":"e1","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/MarcuVHP18a","doi":"10.4108/EAI.10-7-2018.155052","ee":"https://doi.org/10.4108/eai.10-7-2018.155052","url":"https://dblp.org/rec/journals/mca/MarcuVHP18a"}, "url":"URL#2452068" }, { "@score":"1", "@id":"2452069", "info":{"authors":{"author":[{"@pid":"223/2219","text":"James Kweku Nkrumah Nyarko"},{"@pid":"223/2228","text":"Christian Ango Mbom"}]},"title":"Optimal ZF Precoder for MU massive MIMO Systems over Ricean Channel with per Antenna Power Allocation.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"15","pages":"e3","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/NyarkoM18","doi":"10.4108/EAI.13-7-2018.156088","ee":"https://doi.org/10.4108/eai.13-7-2018.156088","url":"https://dblp.org/rec/journals/mca/NyarkoM18"}, "url":"URL#2452069" }, { "@score":"1", "@id":"2452070", "info":{"authors":{"author":[{"@pid":"174/0204","text":"Elena-Madalina Oproiu"},{"@pid":"143/1367","text":"Alexandru Vulpe"},{"@pid":"79/8632","text":"Octavian Fratu"},{"@pid":"56/8685","text":"Ion Marghescu"}]},"title":"High Capacity Ethernet Radio Relay Networks in Mobile Communications.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"12","pages":"e1","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/OproiuVFM18a","doi":"10.4108/EAI.10-1-2018.153553","ee":"https://doi.org/10.4108/eai.10-1-2018.153553","url":"https://dblp.org/rec/journals/mca/OproiuVFM18a"}, "url":"URL#2452070" }, { "@score":"1", "@id":"2452071", "info":{"authors":{"author":[{"@pid":"213/5281","text":"Mujtaba Roshan"},{"@pid":"45/699","text":"John A. Schormans"},{"@pid":"213/5233","text":"Rupert Ogilvie"}]},"title":"Video-on-demand QoE Evaluation Across Different Age- Groups and Its Significance for Network Capacity.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"12","pages":"e5","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/RoshanSO18a","doi":"10.4108/EAI.10-1-2018.153557","ee":"https://doi.org/10.4108/eai.10-1-2018.153557","url":"https://dblp.org/rec/journals/mca/RoshanSO18a"}, "url":"URL#2452071" }, { "@score":"1", "@id":"2452072", "info":{"authors":{"author":[{"@pid":"218/9436","text":"Ahthasham Sajid"},{"@pid":"76/7938","text":"Khalid Hussain"}]},"title":"Expert System for Handling Congestion in Opportunistic Network.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"13","pages":"e5","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/SajidH18a","doi":"10.4108/EAI.22-3-2018.154386","ee":"https://doi.org/10.4108/eai.22-3-2018.154386","url":"https://dblp.org/rec/journals/mca/SajidH18a"}, "url":"URL#2452072" }, { "@score":"1", "@id":"2452073", "info":{"authors":{"author":{"@pid":"132/9105","text":"Iqbal H. Sarker"}},"title":"SilentPhone: Inferring User Unavailability based Opportune Moments to Minimize Call Interruptions.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"15","pages":"e1","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/Sarker18","doi":"10.4108/EAI.10-7-2018.155647","ee":"https://doi.org/10.4108/eai.10-7-2018.155647","url":"https://dblp.org/rec/journals/mca/Sarker18"}, "url":"URL#2452073" }, { "@score":"1", "@id":"2452074", "info":{"authors":{"author":[{"@pid":"235/8712","text":"Reem F. Shaibani"},{"@pid":"204/0643","text":"Ammar T. Zahary"}]},"title":"Survey of Context-Aware Video Transmission over Vehicular Ad-Hoc Networks (VANETs).","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"15","pages":"e4","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/ShaibaniZ18","doi":"10.4108/EAI.13-7-2018.156089","ee":"https://doi.org/10.4108/eai.13-7-2018.156089","url":"https://dblp.org/rec/journals/mca/ShaibaniZ18"}, "url":"URL#2452074" }, { "@score":"1", "@id":"2452075", "info":{"authors":{"author":[{"@pid":"214/8295","text":"Sahrish Khan Tayyaba"},{"@pid":"156/6018","text":"Adnan Akhunzada"},{"@pid":"39/11472","text":"Noor Ul Amin"},{"@pid":"20/10812","text":"Munam Ali Shah"},{"@pid":"42/10414","text":"Faheem Khan"},{"@pid":"90/3184","text":"Ihsan Ali"}]},"title":"NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"13","pages":"e6","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/TayyabaAASKA18a","doi":"10.4108/EAI.22-3-2018.154387","ee":"https://doi.org/10.4108/eai.22-3-2018.154387","url":"https://dblp.org/rec/journals/mca/TayyabaAASKA18a"}, "url":"URL#2452075" }, { "@score":"1", "@id":"2452076", "info":{"authors":{"author":[{"@pid":"235/8731","text":"M. Thirunavukkarasan"},{"@pid":"61/7375","text":"S. A. Sahaaya Arul Mary"}]},"title":"An Innovative Secure Approach to Detect Clone Node Intruder in Homogeneous Wireless Sensor Network.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"15","pages":"e5","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/Thirunavukkarasan18","doi":"10.4108/EAI.14-2-2019.156591","ee":"https://doi.org/10.4108/eai.14-2-2019.156591","url":"https://dblp.org/rec/journals/mca/Thirunavukkarasan18"}, "url":"URL#2452076" }, { "@score":"1", "@id":"2452077", "info":{"authors":{"author":[{"@pid":"218/9502","text":"Zaka Ullah"},{"@pid":"220/9317","text":"M. Irfan Khattak"},{"@pid":"183/4458","text":"Ejazul Haq"},{"@pid":"165/9437","text":"Sheeraz Ahmed"},{"@pid":"218/9464","text":"Amjad Khattak"}]},"title":"Design and Analysis of Compact Triple Band Microstrip Patch Antenna for Multiband Applications.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"4","number":"13","pages":"e2","year":"2018","type":"Journal Articles","access":"open","key":"journals/mca/UllahKHAK18a","doi":"10.4108/EAI.22-3-2018.154383","ee":"https://doi.org/10.4108/eai.22-3-2018.154383","url":"https://dblp.org/rec/journals/mca/UllahKHAK18a"}, "url":"URL#2452077" }, { "@score":"1", "@id":"2818872", "info":{"authors":{"author":[{"@pid":"154/3845","text":"Affoua Therese Aby"},{"@pid":"81/6619","text":"Alexandre Guitton"},{"@pid":"l/PascalLafourcade","text":"Pascal Lafourcade 0001"},{"@pid":"02/7030","text":"Michel Misson"}]},"title":"History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"3","number":"11","pages":"e5","year":"2017","type":"Journal Articles","access":"open","key":"journals/mca/AbyGLM17","doi":"10.4108/EAI.13-9-2017.153340","ee":"https://doi.org/10.4108/eai.13-9-2017.153340","url":"https://dblp.org/rec/journals/mca/AbyGLM17"}, "url":"URL#2818872" }, { "@score":"1", "@id":"2818873", "info":{"authors":{"author":[{"@pid":"162/7802","text":"Muhammad Adeka"},{"@pid":"154/4132","text":"Kelvin O. O. Anoh"},{"@pid":"162/7737","text":"Mohammad Ngala"},{"@pid":"42/2911","text":"Simon J. Shepherd"},{"@pid":"162/7720","text":"E. Ibrahim"},{"@pid":"85/10783","text":"Issa T. E. Elfergani"},{"@pid":"162/7821","text":"Ash S. Hussaini"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"48/10609","text":"R. A. Abd-Alhameed"}]},"title":"Africa: cyber-security and its mutual impacts with computerisation, miniaturisation and location-based authentication.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"3","number":"11","pages":"e4","year":"2017","type":"Journal Articles","access":"open","key":"journals/mca/AdekaANSIEHRA17","doi":"10.4108/EAI.13-9-2017.153339","ee":"https://doi.org/10.4108/eai.13-9-2017.153339","url":"https://dblp.org/rec/journals/mca/AdekaANSIEHRA17"}, "url":"URL#2818873" }, { "@score":"1", "@id":"2818874", "info":{"authors":{"author":[{"@pid":"130/1670","text":"Chulhee Cho"},{"@pid":"35/3654","text":"Byunghun Song"},{"@pid":"36/5994","text":"Jongpil Jeong"},{"@pid":"c/TMChung","text":"Tai-Myoung Chung"}]},"title":"Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"3","number":"11","pages":"e3","year":"2017","type":"Journal Articles","access":"open","key":"journals/mca/ChoSJC17","doi":"10.4108/EAI.13-9-2017.153338","ee":"https://doi.org/10.4108/eai.13-9-2017.153338","url":"https://dblp.org/rec/journals/mca/ChoSJC17"}, "url":"URL#2818874" }, { "@score":"1", "@id":"2818875", "info":{"authors":{"author":[{"@pid":"205/7646","text":"Amparito A. Morales Figueroa"},{"@pid":"96/4997","text":"Lorenzo Favalli"}]},"title":"Buffer management for scalable video streaming.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"3","number":"11","pages":"e2","year":"2017","type":"Journal Articles","access":"open","key":"journals/mca/FigueroaF17","doi":"10.4108/EAI.13-9-2017.153337","ee":"https://doi.org/10.4108/eai.13-9-2017.153337","url":"https://dblp.org/rec/journals/mca/FigueroaF17"}, "url":"URL#2818875" }, { "@score":"1", "@id":"2818876", "info":{"authors":{"author":[{"@pid":"153/0137","text":"Ahmed Abdel Moamen"},{"@pid":"93/2966","text":"Nadeem Jamali"}]},"title":"An Actor-Based Middleware for Crowd-Sourced Services.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"3","number":"11","pages":"e1","year":"2017","type":"Journal Articles","access":"open","key":"journals/mca/MoamenJ17","doi":"10.4108/EAI.13-9-2017.153070","ee":"https://doi.org/10.4108/eai.13-9-2017.153070","url":"https://dblp.org/rec/journals/mca/MoamenJ17"}, "url":"URL#2818876" }, { "@score":"1", "@id":"3153654", "info":{"authors":{"author":[{"@pid":"154/3845","text":"Affoua Thérèse Aby"},{"@pid":"81/6619","text":"Alexandre Guitton"},{"@pid":"l/PascalLafourcade","text":"Pascal Lafourcade 0001"},{"@pid":"02/7030","text":"Michel Misson"}]},"title":"History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"7","pages":"e2","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/AbyGLM16","doi":"10.4108/EAI.20-6-2016.151516","ee":"https://doi.org/10.4108/eai.20-6-2016.151516","url":"https://dblp.org/rec/journals/mca/AbyGLM16"}, "url":"URL#3153654" }, { "@score":"1", "@id":"3153655", "info":{"authors":{"author":[{"@pid":"139/5731","text":"Amir Mohammad Amiri"},{"@pid":"48/3252","text":"Giuliano Armano"},{"@pid":"41/923","text":"Amir-Mohammad Rahmani"},{"@pid":"56/10629","text":"Kunal Mankodiya"}]},"title":"PhonoSys: Mobile Phonocardiography Diagnostic System for Newborns.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"10","pages":"e1","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/AmiriARM16","doi":"10.4108/EAI.14-10-2015.2261614","ee":"https://doi.org/10.4108/eai.14-10-2015.2261614","url":"https://dblp.org/rec/journals/mca/AmiriARM16"}, "url":"URL#3153655" }, { "@score":"1", "@id":"3153656", "info":{"authors":{"author":[{"@pid":"51/10516","text":"Oleksandr Artemenko"},{"@pid":"154/6127","text":"Alina Rubina"},{"@pid":"168/4846","text":"Adarsh Harishchandra Nayak"},{"@pid":"168/4870","text":"Sanjeeth Baptist Menezes"},{"@pid":"06/6333","text":"Andreas Mitschele-Thiel"}]},"title":"Evaluation of different signal propagation models for a mixed indoor-outdoor scenario using empirical data.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"7","pages":"e5","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/ArtemenkoRNMM16","doi":"10.4108/EAI.20-6-2016.151519","ee":"https://doi.org/10.4108/eai.20-6-2016.151519","url":"https://dblp.org/rec/journals/mca/ArtemenkoRNMM16"}, "url":"URL#3153656" }, { "@score":"1", "@id":"3153657", "info":{"authors":{"author":[{"@pid":"161/8063","text":"Sébastien Bindel"},{"@pid":"38/859","text":"Serge Chaumette"},{"@pid":"16/7082","text":"Benoît Hilt"}]},"title":"F-ETX: a predictive link state estimator for mobile networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"7","pages":"e3","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/BindelCH16","doi":"10.4108/EAI.20-6-2016.151517","ee":"https://doi.org/10.4108/eai.20-6-2016.151517","url":"https://dblp.org/rec/journals/mca/BindelCH16"}, "url":"URL#3153657" }, { "@score":"1", "@id":"3153658", "info":{"authors":{"author":[{"@pid":"09/6796","text":"Almudena Díaz-Zayas"},{"@pid":"12/391","text":"Álvaro M. Recio-Pérez"},{"@pid":"167/1620","text":"Cesar A. García-Pérez"},{"@pid":"95/1885","text":"Pedro Merino 0001"}]},"title":"Extending TestelDroid to support remote control and large-scale testing in mobile networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"9","pages":"e4","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/Diaz-ZayasRGM16","doi":"10.4108/EAI.14-12-2015.2262658","ee":"https://doi.org/10.4108/eai.14-12-2015.2262658","url":"https://dblp.org/rec/journals/mca/Diaz-ZayasRGM16"}, "url":"URL#3153658" }, { "@score":"1", "@id":"3153659", "info":{"authors":{"author":[{"@pid":"134/0404","text":"Benish Fida"},{"@pid":"140/1858","text":"Daniele Bibbo"},{"@pid":"134/0444","text":"Ivan Bernabucci"},{"@pid":"186/6742","text":"Antonino Proto"},{"@pid":"59/2159","text":"Silvia Conforto"},{"@pid":"56/5690","text":"Maurizio Schmid"}]},"title":"Real time event-based segmentation to classify locomotion activities through a single inertial sensor.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"9","pages":"e5","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/FidaBBPCS16","doi":"10.4108/EAI.14-10-2015.2261695","ee":"https://doi.org/10.4108/eai.14-10-2015.2261695","url":"https://dblp.org/rec/journals/mca/FidaBBPCS16"}, "url":"URL#3153659" }, { "@score":"1", "@id":"3153660", "info":{"authors":{"author":[{"@pid":"193/1691","text":"Khajamoinuddin Syed"},{"@pid":"51/11346","text":"Bhanu K. Kamapantula"},{"@pid":"86/10607","text":"Michael L. Mayo"},{"@pid":"07/1339","text":"Edward J. Perkins"},{"@pid":"78/1478","text":"Preetam Ghosh"}]},"title":"Abundance of connected motifs in transcriptional networks, a case study using random forests regression.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"10","pages":"e3","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/KhajamoinuddinK16","doi":"10.4108/EAI.3-12-2015.2262520","ee":"https://doi.org/10.4108/eai.3-12-2015.2262520","url":"https://dblp.org/rec/journals/mca/KhajamoinuddinK16"}, "url":"URL#3153660" }, { "@score":"1", "@id":"3153661", "info":{"authors":{"author":[{"@pid":"66/603","text":"Kwangsoo Kim"},{"@pid":"193/1549","text":"Cheol-Woong Lee"},{"@pid":"88/3867","text":"Byeong-Hee Roh"},{"@pid":"42/11346","text":"Bongsoo Roh"},{"@pid":"192/9829","text":"Myoung-hun Han"}]},"title":"Routing Metric based on Slot Length of AODV on Multihop DESYNC-TDMA.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"9","pages":"e2","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/KimLRRH16","doi":"10.4108/EAI.3-12-2015.2262442","ee":"https://doi.org/10.4108/eai.3-12-2015.2262442","url":"https://dblp.org/rec/journals/mca/KimLRRH16"}, "url":"URL#3153661" }, { "@score":"1", "@id":"3153662", "info":{"authors":{"author":[{"@pid":"160/6355","text":"Eric Mayor"},{"@pid":"160/6345","text":"Liudmila Gamaiunova"}]},"title":"Mobile device-based mindfulness intervention promotes emotional regulation during anticipatory stress.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"9","pages":"e1","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/MayorG16","doi":"10.4108/EAI.14-10-2015.2261617","ee":"https://doi.org/10.4108/eai.14-10-2015.2261617","url":"https://dblp.org/rec/journals/mca/MayorG16"}, "url":"URL#3153662" }, { "@score":"1", "@id":"3153663", "info":{"authors":{"author":[{"@pid":"172/7671","text":"Tomohiro Nakao"},{"@pid":"12/2477","text":"Jun-nosuke Teramae"},{"@pid":"34/2269","text":"Naoki Wakamiya"}]},"title":"Biologically-inspired adaptive routing protocol with stochastic route exploration.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"10","pages":"e4","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/NakaoTW16","doi":"10.4108/EAI.3-12-2015.2262489","ee":"https://doi.org/10.4108/eai.3-12-2015.2262489","url":"https://dblp.org/rec/journals/mca/NakaoTW16"}, "url":"URL#3153663" }, { "@score":"1", "@id":"3153664", "info":{"authors":{"author":[{"@pid":"02/4576","text":"Yutaka Okaie"},{"@pid":"15/4179","text":"Tadashi Nakano"},{"@pid":"159/7303","text":"Takuya Obuchi"},{"@pid":"40/2808","text":"Takahiro Hara"},{"@pid":"n/ShojiroNishio","text":"Shojiro Nishio"}]},"title":"Mobility and Controllability of Bio-nanomachines.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"10","pages":"e5","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/OkaieNOHN16","doi":"10.4108/EAI.3-12-2015.2262426","ee":"https://doi.org/10.4108/eai.3-12-2015.2262426","url":"https://dblp.org/rec/journals/mca/OkaieNOHN16"}, "url":"URL#3153664" }, { "@score":"1", "@id":"3153665", "info":{"authors":{"author":[{"@pid":"139/4683","text":"Sakshi Patni"},{"@pid":"165/3439-2","text":"Aditya Hegde 0002"},{"@pid":"05/1170","text":"Krishna M. Sivalingam"}]},"title":"Load Balancing Techniques for Dynamic Gateway Selection in LTEWireless Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"7","pages":"e4","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/PatniHS16","doi":"10.4108/EAI.20-6-2016.151518","ee":"https://doi.org/10.4108/eai.20-6-2016.151518","url":"https://dblp.org/rec/journals/mca/PatniHS16"}, "url":"URL#3153665" }, { "@score":"1", "@id":"3153666", "info":{"authors":{"author":[{"@pid":"42/11346","text":"Bongsoo Roh"},{"@pid":"192/9829","text":"Myoung-hun Han"},{"@pid":"04/11345","text":"Mijeong Hoh"},{"@pid":"180/5550","text":"Hwi-Sung Park"},{"@pid":"66/603","text":"Kwangsoo Kim"},{"@pid":"88/3867","text":"Byeong-Hee Roh"}]},"title":"Distributed Call Admission Control for DESYNC-TDMA in Mobile Ad Hoc Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"9","pages":"e3","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/RohHHPKR16","doi":"10.4108/EAI.3-12-2015.2262443","ee":"https://doi.org/10.4108/eai.3-12-2015.2262443","url":"https://dblp.org/rec/journals/mca/RohHHPKR16"}, "url":"URL#3153666" }, { "@score":"1", "@id":"3153667", "info":{"authors":{"author":[{"@pid":"148/6899","text":"Manmohan Sharma"},{"@pid":"120/8633","text":"Clive Parini"},{"@pid":"75/10077","text":"Akram Alomainy"}]},"title":"UWB Sensor Nodes for Tracking of Human Motion in Medical and Rehabilitation Applications.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"10","pages":"e2","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/SharmaPA16","doi":"10.4108/EAI.14-10-2015.2261745","ee":"https://doi.org/10.4108/eai.14-10-2015.2261745","url":"https://dblp.org/rec/journals/mca/SharmaPA16"}, "url":"URL#3153667" }, { "@score":"1", "@id":"3153668", "info":{"authors":{"author":[{"@pid":"42/64","text":"Eirini-Eleni Tsiropoulou"},{"@pid":"168/4829","text":"Ioannis Ziras"},{"@pid":"62/4765","text":"Symeon Papavassiliou"}]},"title":"A Non-Cooperative Approach to the Joint Subcarrier and Power Allocation Problem in Multi-Service SCFDMA Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"7","pages":"e1","year":"2016","type":"Journal Articles","access":"open","key":"journals/mca/TsiropoulouZP16","doi":"10.4108/EAI.20-6-2016.151515","ee":"https://doi.org/10.4108/eai.20-6-2016.151515","url":"https://dblp.org/rec/journals/mca/TsiropoulouZP16"}, "url":"URL#3153668" }, { "@score":"1", "@id":"3465524", "info":{"authors":{"author":[{"@pid":"10/10783","text":"Ogbonnaya O. Anoh"},{"@pid":"48/10609","text":"R. A. Abd-Alhameed"},{"@pid":"166/9248","text":"G. N. Okorafor"},{"@pid":"10/733","text":"Jim M. Noras"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"120/6142","text":"Steve M. R. Jones"}]},"title":"Performance Evaluation of Spatial Modulation and QOSTBC for MIMO Systems.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"6","pages":"e5","year":"2015","type":"Journal Articles","access":"open","key":"journals/mca/AnohAONRJ15","doi":"10.4108/EAI.11-8-2015.150094","ee":"https://doi.org/10.4108/eai.11-8-2015.150094","url":"https://dblp.org/rec/journals/mca/AnohAONRJ15"}, "url":"URL#3465524" }, { "@score":"1", "@id":"3465525", "info":{"authors":{"author":[{"@pid":"42/6429","text":"Maurizio D'Arienzo"},{"@pid":"02/4507","text":"Simon Pietro Romano"}]},"title":"A cooperation-based approach to energy optimization in wireless ad hoc networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"6","pages":"e3","year":"2015","type":"Journal Articles","access":"open","key":"journals/mca/DArienzoR15","doi":"10.4108/EAI.11-8-2015.150092","ee":"https://doi.org/10.4108/eai.11-8-2015.150092","url":"https://dblp.org/rec/journals/mca/DArienzoR15"}, "url":"URL#3465525" }, { "@score":"1", "@id":"3465526", "info":{"authors":{"author":[{"@pid":"166/9322","text":"Farha Jahan"},{"@pid":"146/6810","text":"Ahmad Y. Javaid"},{"@pid":"78/5395","text":"Weiqing Sun"},{"@pid":"12/6439","text":"Mansoor Alam"}]},"title":"GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"6","pages":"e2","year":"2015","type":"Journal Articles","access":"open","key":"journals/mca/JahanJSA15","doi":"10.4108/EAI.11-8-2015.150091","ee":"https://doi.org/10.4108/eai.11-8-2015.150091","url":"https://dblp.org/rec/journals/mca/JahanJSA15"}, "url":"URL#3465526" }, { "@score":"1", "@id":"3465527", "info":{"authors":{"author":{"@pid":"121/0079","text":"Michail Katsigiannis"}},"title":"The Impact of Mobile Offloading on Energy Consumption and Capacity of Radio Access Networks - Case of Finland.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"6","pages":"e1","year":"2015","type":"Journal Articles","access":"open","key":"journals/mca/Katsigiannis15","doi":"10.4108/EAI.11-8-2015.150090","ee":"https://doi.org/10.4108/eai.11-8-2015.150090","url":"https://dblp.org/rec/journals/mca/Katsigiannis15"}, "url":"URL#3465527" }, { "@score":"1", "@id":"3465528", "info":{"authors":{"author":[{"@pid":"154/3997","text":"Trust Tshepo Mapoka"},{"@pid":"42/2911","text":"Simon J. Shepherd"},{"@pid":"120/6110","text":"Yousef A. S. Dama"},{"@pid":"06/9093","text":"Haider M. AlSabbagh"},{"@pid":"48/10609","text":"Raed A. Abd-Alhameed"}]},"title":"Multi-Service Group Key Management for High Speed Wireless Mobile Multicast Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"6","pages":"e4","year":"2015","type":"Journal Articles","access":"open","key":"journals/mca/MapokaSDSA15","doi":"10.4108/EAI.11-8-2015.150093","ee":"https://doi.org/10.4108/eai.11-8-2015.150093","url":"https://dblp.org/rec/journals/mca/MapokaSDSA15"}, "url":"URL#3465528" }, { "@score":"1", "@id":"3767233", "info":{"authors":{"author":[{"@pid":"119/7777","text":"Ghada Arfaoui"},{"@pid":"95/10309","text":"Guillaume Dabosville"},{"@pid":"09/2378","text":"Sébastien Gambs"},{"@pid":"46/3206","text":"Patrick Lacharme"},{"@pid":"47/5983","text":"Jean-François Lalande"}]},"title":"A Privacy-Preserving NFC Mobile Pass for Transport Systems.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"5","pages":"e4","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/ArfaouiDGLL14","doi":"10.4108/MCA.2.5.E4","ee":"https://doi.org/10.4108/mca.2.5.e4","url":"https://dblp.org/rec/journals/mca/ArfaouiDGLL14"}, "url":"URL#3767233" }, { "@score":"1", "@id":"3767234", "info":{"authors":{"author":[{"@pid":"71/4360","text":"Rachid El Azouzi"},{"@pid":"62/2911","text":"Essaid Sabir"},{"@pid":"22/9717","text":"Mohammed Raiss El-Fenni"},{"@pid":"83/9584","text":"Sujit Kumar Samanta"}]},"title":"A Unified NET-MAC-PHY Cross-layer Framework for Performance Evaluation of Multi-hop Ad hoc WLANs.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"4","pages":"e6","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/AzouziSES14","doi":"10.4108/MCA.1.4.E6","ee":"https://doi.org/10.4108/mca.1.4.e6","url":"https://dblp.org/rec/journals/mca/AzouziSES14"}, "url":"URL#3767234" }, { "@score":"1", "@id":"3767235", "info":{"authors":{"author":[{"@pid":"41/9975","text":"Manlio Bacco"},{"@pid":"98/3765","text":"Pietro Cassarà"},{"@pid":"65/4788","text":"Alberto Gotta"}]},"title":"Generalized Encoding CRDSA: Maximizing Throughput in Enhanced Random Access Schemes for Satellite.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"5","pages":"e2","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/BaccoCG14","doi":"10.4108/MCA.2.5.E2","ee":"https://doi.org/10.4108/mca.2.5.e2","url":"https://dblp.org/rec/journals/mca/BaccoCG14"}, "url":"URL#3767235" }, { "@score":"1", "@id":"3767236", "info":{"authors":{"author":[{"@pid":"76/6202","text":"Luca Caviglione"},{"@pid":"65/4788","text":"Alberto Gotta"}]},"title":"Characterizing SPDY over High Latency Satellite Channels.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"5","pages":"e3","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/CaviglioneG14","doi":"10.4108/MCA.2.5.E3","ee":"https://doi.org/10.4108/mca.2.5.e3","url":"https://dblp.org/rec/journals/mca/CaviglioneG14"}, "url":"URL#3767236" }, { "@score":"1", "@id":"3767237", "info":{"authors":{"author":[{"@pid":"52/5861","text":"Ying Dai"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"Cooperation Scheme For Distributed Spectrum Sensing In Cognitive Radio Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"4","pages":"e1","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/Dai014","doi":"10.4108/MCA.1.4.E1","ee":"https://doi.org/10.4108/mca.1.4.e1","url":"https://dblp.org/rec/journals/mca/Dai014"}, "url":"URL#3767237" }, { "@score":"1", "@id":"3767238", "info":{"authors":{"author":[{"@pid":"52/5861","text":"Ying Dai"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"Pre-phase Improvement For Distributed Spectrum Sensing in Cognitive Radio Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"4","pages":"e2","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/Dai014a","doi":"10.4108/MCA.1.4.E2","ee":"https://doi.org/10.4108/mca.1.4.e2","url":"https://dblp.org/rec/journals/mca/Dai014a"}, "url":"URL#3767238" }, { "@score":"1", "@id":"3767239", "info":{"authors":{"author":[{"@pid":"23/4245","text":"Andrey Garnaev"},{"@pid":"72/5440","text":"Wade Trappe"}]},"title":"Optimal Scanning Bandwidth Strategy Incorporating Uncertainty about Adversary's Characteristics.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"5","pages":"e6","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/GarnaevT14","doi":"10.4108/MCA.2.5.E6","ee":"https://doi.org/10.4108/mca.2.5.e6","url":"https://dblp.org/rec/journals/mca/GarnaevT14"}, "url":"URL#3767239" }, { "@score":"1", "@id":"3767240", "info":{"authors":{"author":[{"@pid":"44/7891","text":"Donglin Hu"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"54/3643-1","text":"Xin Su 0001"}]},"title":"Multicast in Femtocell Networks: A Successive Interference Cancellation Approach.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"4","pages":"e3","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/HuMS14","doi":"10.4108/MCA.1.4.E3","ee":"https://doi.org/10.4108/mca.1.4.e3","url":"https://dblp.org/rec/journals/mca/HuMS14"}, "url":"URL#3767240" }, { "@score":"1", "@id":"3767241", "info":{"authors":{"author":[{"@pid":"25/6506","text":"Rahim Kacimi"},{"@pid":"135/2687","text":"Ponia Pech"}]},"title":"Hybrid Satellite - Wireless Sensor Networks Architecture for Telemedicine Applications in the Context of Emergency Satellite Communications in Ku/Ka/Q/V Bands.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"5","pages":"e1","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/KacimiP14","doi":"10.4108/MCA.2.5.E1","ee":"https://doi.org/10.4108/mca.2.5.e1","url":"https://dblp.org/rec/journals/mca/KacimiP14"}, "url":"URL#3767241" }, { "@score":"1", "@id":"3767242", "info":{"authors":{"author":[{"@pid":"06/7838","text":"Leandros A. Maglaras"},{"@pid":"k/DimitriosKatsaros","text":"Dimitrios Katsaros 0001"}]},"title":"Delay Efficient Backpressure Routing in Wireless Ad Hoc Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"4","pages":"e5","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/MaglarasK14","doi":"10.4108/MCA.1.4.E5","ee":"https://doi.org/10.4108/mca.1.4.e5","url":"https://dblp.org/rec/journals/mca/MaglarasK14"}, "url":"URL#3767242" }, { "@score":"1", "@id":"3767243", "info":{"authors":{"author":[{"@pid":"152/5925","text":"Elke Roth-Mandutz"},{"@pid":"121/2484","text":"Stephen S. Mwanje"},{"@pid":"06/6333","text":"Andreas Mitschele-Thiel"}]},"title":"Cell Identification based on Received Signal Strength Fingerprints: Concept and Application towards Energy Saving in Cellular Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"4","pages":"e4","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/Roth-MandutzMM14","doi":"10.4108/MCA.1.4.E4","ee":"https://doi.org/10.4108/mca.1.4.e4","url":"https://dblp.org/rec/journals/mca/Roth-MandutzMM14"}, "url":"URL#3767243" }, { "@score":"1", "@id":"3767244", "info":{"authors":{"author":[{"@pid":"138/6344","text":"Andreas Weigel"},{"@pid":"138/6322","text":"Martin Ringwelski"},{"@pid":"79/156","text":"Volker Turau"},{"@pid":"51/1769","text":"Andreas Timm-Giel"}]},"title":"Route-Over Forwarding Techniques in a 6LoWPAN.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"2","number":"5","pages":"e5","year":"2014","type":"Journal Articles","access":"open","key":"journals/mca/WeigelRTT14","doi":"10.4108/MCA.2.5.E5","ee":"https://doi.org/10.4108/mca.2.5.e5","url":"https://dblp.org/rec/journals/mca/WeigelRTT14"}, "url":"URL#3767244" }, { "@score":"1", "@id":"4056098", "info":{"authors":{"author":[{"@pid":"b/PaoloBellavista","text":"Paolo Bellavista"},{"@pid":"90/2390","text":"Antonio Corradi"},{"@pid":"50/1994","text":"Andrea Reale"}]},"title":"Scalable Stream Processing with Quality of Service for Smart City Crowdsensing Applications.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e6","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/BellavistaCR13","doi":"10.4108/MCA.1.3.E6","ee":"https://doi.org/10.4108/mca.1.3.e6","url":"https://dblp.org/rec/journals/mca/BellavistaCR13"}, "url":"URL#4056098" }, { "@score":"1", "@id":"4056099", "info":{"authors":{"author":[{"@pid":"125/3559","text":"Alexandre Bouard"},{"@pid":"94/6916","text":"Dennis Burgkhardt"},{"@pid":"e/ClaudiaEckert","text":"Claudia Eckert 0001"}]},"title":"Middleware-based Security for Hyperconnected Applications in Future In-Car Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e7","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/BouardBE13","doi":"10.4108/MCA.1.3.E7","ee":"https://doi.org/10.4108/mca.1.3.e7","url":"https://dblp.org/rec/journals/mca/BouardBE13"}, "url":"URL#4056099" }, { "@score":"1", "@id":"4056100", "info":{"authors":{"author":[{"@pid":"10/837","text":"David E. Cairns"},{"@pid":"92/883","text":"Marwan Fayed"},{"@pid":"217/2530","text":"Hussein T. Mouftah"}]},"title":"The Prohibitive Link between Position-based Routing and Planarity.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e2","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/CairnsFM13","doi":"10.4108/MCA.1.3.E2","ee":"https://doi.org/10.4108/mca.1.3.e2","url":"https://dblp.org/rec/journals/mca/CairnsFM13"}, "url":"URL#4056100" }, { "@score":"1", "@id":"4056101", "info":{"authors":{"author":[{"@pid":"68/10643","text":"Wissam Chahin"},{"@pid":"77/2369","text":"Francesco De Pellegrini"},{"@pid":"71/4360","text":"Rachid El Azouzi"},{"@pid":"54/3347","text":"Amar Prakash Azad"}]},"title":"Online Algorithms for Adaptive Optimization in Heterogeneous Delay Tolerant Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e5","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/ChahinPAA13","doi":"10.4108/MCA.1.3.E5","ee":"https://doi.org/10.4108/mca.1.3.e5","url":"https://dblp.org/rec/journals/mca/ChahinPAA13"}, "url":"URL#4056101" }, { "@score":"1", "@id":"4056102", "info":{"authors":{"author":[{"@pid":"44/7891","text":"Donglin Hu"},{"@pid":"52/3003","text":"Shiwen Mao"}]},"title":"On Cooperative Relay in Cognitive Radio Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e3","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/HuM13","doi":"10.4108/MCA.1.3.E3","ee":"https://doi.org/10.4108/mca.1.3.e3","url":"https://dblp.org/rec/journals/mca/HuM13"}, "url":"URL#4056102" }, { "@score":"1", "@id":"4056103", "info":{"authors":{"author":[{"@pid":"85/1991","text":"Nathalie Mitton"},{"@pid":"s/DavidSimplotRyl","text":"David Simplot-Ryl"},{"@pid":"93/3489-2","text":"Jun Zheng 0002"}]},"title":"Guaranteed Delivery in k-Anycast Routing in Multi-SinkWireless Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e1","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/MittonSZ13","doi":"10.4108/MCA.1.3.E1","ee":"https://doi.org/10.4108/mca.1.3.e1","url":"https://dblp.org/rec/journals/mca/MittonSZ13"}, "url":"URL#4056103" }, { "@score":"1", "@id":"4056104", "info":{"authors":{"author":[{"@pid":"82/9176","text":"Sylwia Romaszko"},{"@pid":"05/8863","text":"Daniel Denkovski"},{"@pid":"26/8861","text":"Valentina Pavlovska"},{"@pid":"28/5282","text":"Liljana Gavrilovska"}]},"title":"Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e4","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/RomaszkoDPG13","doi":"10.4108/MCA.1.3.E4","ee":"https://doi.org/10.4108/mca.1.3.e4","url":"https://dblp.org/rec/journals/mca/RomaszkoDPG13"}, "url":"URL#4056104" }, { "@score":"1", "@id":"4056105", "info":{"authors":{"author":[{"@pid":"54/1634","text":"Dirk Trossen"},{"@pid":"54/2286","text":"Dana Pavel"}]},"title":"AIRS: A Mobile Sensing Platform for Lifestyle Management Research and Applications.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"3","pages":"e8","year":"2013","type":"Journal Articles","access":"open","key":"journals/mca/TrossenP13","doi":"10.4108/MCA.1.3.E8","ee":"https://doi.org/10.4108/mca.1.3.e8","url":"https://dblp.org/rec/journals/mca/TrossenP13"}, "url":"URL#4056105" }, { "@score":"1", "@id":"4334320", "info":{"authors":{"author":[{"@pid":"l/JunLi6","text":"Jun Li 0006"},{"@pid":"133/2790","text":"Mylène Toulgoat"},{"@pid":"05/3352","text":"Yifeng Zhou"},{"@pid":"33/4732","text":"Louise Lamont"}]},"title":"Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"2","pages":"e2","year":"2012","type":"Journal Articles","access":"open","key":"journals/mca/0006TZL12","doi":"10.4108/MCA.2012.07-09.E2","ee":"https://doi.org/10.4108/mca.2012.07-09.e2","url":"https://dblp.org/rec/journals/mca/0006TZL12"}, "url":"URL#4334320" }, { "@score":"1", "@id":"4334321", "info":{"authors":{"author":[{"@pid":"82/6161","text":"Surendar Chandra"},{"@pid":"50/2579","text":"Xuwen Yu"}]},"title":"A Trace-Driven Analysis of Wireless Group Communication Mechanisms.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"2","pages":"e5","year":"2012","type":"Journal Articles","access":"open","key":"journals/mca/ChandraY12","doi":"10.4108/MCA.2012.07-09.E5","ee":"https://doi.org/10.4108/mca.2012.07-09.e5","url":"https://dblp.org/rec/journals/mca/ChandraY12"}, "url":"URL#4334321" }, { "@score":"1", "@id":"4334322", "info":{"authors":{"author":[{"@pid":"43/6649","text":"Jose Oscar Fajardo"},{"@pid":"55/7647","text":"Ianire Taboada"},{"@pid":"28/3877","text":"Fidel Liberal"}]},"title":"Cross-layer cross-domain adaptation of mobile video services.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"2","pages":"e4","year":"2012","type":"Journal Articles","access":"open","key":"journals/mca/FajardoTL12","doi":"10.4108/MCA.2012.07-09.E4","ee":"https://doi.org/10.4108/mca.2012.07-09.e4","url":"https://dblp.org/rec/journals/mca/FajardoTL12"}, "url":"URL#4334322" }, { "@score":"1", "@id":"4334323", "info":{"authors":{"author":[{"@pid":"44/7891","text":"Donglin Hu"},{"@pid":"52/3003","text":"Shiwen Mao"}]},"title":"A Sensing Error Aware MAC Protocol for Cognitive Radio Networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"2","pages":"e1","year":"2012","type":"Journal Articles","access":"open","key":"journals/mca/HuM12","doi":"10.4108/MCA.2012.07-09.E1","ee":"https://doi.org/10.4108/mca.2012.07-09.e1","url":"https://dblp.org/rec/journals/mca/HuM12"}, "url":"URL#4334323" }, { "@score":"1", "@id":"4334324", "info":{"authors":{"author":[{"@pid":"52/6325","text":"Kun-Chan Lan"},{"@pid":"10/6922","text":"Chien-Ming Chou"},{"@pid":"136/7174","text":"Che-Chun Wu"},{"@pid":"89/4982","text":"Mei-Wen Li"}]},"title":"LOTIR: A Routing Protocol for Multi-hop V-to-I Communication Using Local Traffic Information.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"2","pages":"e3","year":"2012","type":"Journal Articles","access":"open","key":"journals/mca/LanCWL12","doi":"10.4108/MCA.2012.07-09.E3","ee":"https://doi.org/10.4108/mca.2012.07-09.e3","url":"https://dblp.org/rec/journals/mca/LanCWL12"}, "url":"URL#4334324" }, { "@score":"1", "@id":"4594269", "info":{"authors":{"author":[{"@pid":"35/8854","text":"Seyedali Hosseininezhad"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Reliability-based server selection for heterogeneous VANETs.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"1","pages":"e4","year":"2011","type":"Journal Articles","access":"open","key":"journals/mca/HosseininezhadL11","doi":"10.4108/ICST.TRANS.MCA.2011.E4","ee":"https://doi.org/10.4108/icst.trans.mca.2011.e4","url":"https://dblp.org/rec/journals/mca/HosseininezhadL11"}, "url":"URL#4594269" }, { "@score":"1", "@id":"4594270", "info":{"authors":{"author":[{"@pid":"o/StephanOlariu","text":"Stephan Olariu"},{"@pid":"29/1345","text":"Mohamed Eltoweissy"},{"@pid":"17/5519","text":"Mohamed F. Younis"}]},"title":"Towards autonomous vehicular clouds.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"1","pages":"e2","year":"2011","type":"Journal Articles","access":"open","key":"journals/mca/OlariuEY11","doi":"10.4108/ICST.TRANS.MCA.2011.E2","ee":"https://doi.org/10.4108/icst.trans.mca.2011.e2","url":"https://dblp.org/rec/journals/mca/OlariuEY11"}, "url":"URL#4594270" }, { "@score":"1", "@id":"4594271", "info":{"authors":{"author":[{"@pid":"66/8853","text":"Ahmad Radaideh"},{"@pid":"98/3754","text":"John N. Daigle"}]},"title":"Analytical modeling of address allocation protocols in wireless ad hoc networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"1","pages":"e3","year":"2011","type":"Journal Articles","access":"open","key":"journals/mca/RadaidehD11","doi":"10.4108/ICST.TRANS.MCA.2011.E3","ee":"https://doi.org/10.4108/icst.trans.mca.2011.e3","url":"https://dblp.org/rec/journals/mca/RadaidehD11"}, "url":"URL#4594271" }, { "@score":"1", "@id":"4594272", "info":{"authors":{"author":[{"@pid":"38/7143","text":"Andrew Tinka"},{"@pid":"44/6300","text":"Thomas Watteyne"},{"@pid":"50/6450","text":"Kristofer S. J. Pister"},{"@pid":"48/2199","text":"Alexandre M. Bayen"}]},"title":"A decentralized scheduling algorithm for time synchronized channel hopping.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"1","pages":"e5","year":"2011","type":"Journal Articles","access":"open","key":"journals/mca/TinkaWPB11","doi":"10.4108/ICST.TRANS.MCA.2011.E5","ee":"https://doi.org/10.4108/icst.trans.mca.2011.e5","url":"https://dblp.org/rec/journals/mca/TinkaWPB11"}, "url":"URL#4594272" }, { "@score":"1", "@id":"4594273", "info":{"authors":{"author":{"@pid":"93/3489","text":"Jun Zheng"}},"title":"Welcome message from the Editor-in-Chief.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"1","pages":"e1","year":"2011","type":"Journal Articles","access":"open","key":"journals/mca/Zheng11","doi":"10.4108/ICST.TRANS.MCA.2011.E1","ee":"https://doi.org/10.4108/icst.trans.mca.2011.e1","url":"https://dblp.org/rec/journals/mca/Zheng11"}, "url":"URL#4594273" }, { "@score":"1", "@id":"4594274", "info":{"authors":{"author":[{"@pid":"65/8854","text":"Yibo Zhu"},{"@pid":"42/8854","text":"Robert Zhong Zhou"},{"@pid":"17/9389","text":"Zheng Peng 0001"},{"@pid":"79/7166","text":"Michael Zuba"},{"@pid":"28/1330","text":"Jun-Hong Cui"}]},"title":"An efficient geo-routing aware MAC protocol for underwater acoustic networks.","venue":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1","number":"1","pages":"e6","year":"2011","type":"Journal Articles","access":"open","key":"journals/mca/ZhuZPZC11","doi":"10.4108/ICST.TRANS.MCA.2011.E6","ee":"https://doi.org/10.4108/icst.trans.mca.2011.e6","url":"https://dblp.org/rec/journals/mca/ZhuZPZC11"}, "url":"URL#4594274" } ] } } } )