callback( { "result":{ "query":":facetid:toc:\"db/conf/globecom/globecom2018.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"81.57" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"989", "@dc":"989", "@oc":"989", "@id":"43396674", "text":":facetid:toc:db/conf/globecom/globecom2018.bht" } }, "hits":{ "@total":"989", "@computed":"989", "@sent":"989", "@first":"0", "hit":[{ "@score":"1", "@id":"2566709", "info":{"authors":{"author":[{"@pid":"161/4643","text":"Rana Abbas"},{"@pid":"119/3915","text":"Mahyar Shirvanimoghaddam"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"A Multi-Layer Grant-Free NOMA Scheme for Short Packet Transmissions.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AbbasSLV18","doi":"10.1109/GLOCOM.2018.8647968","ee":"https://doi.org/10.1109/GLOCOM.2018.8647968","url":"https://dblp.org/rec/conf/globecom/AbbasSLV18"}, "url":"URL#2566709" }, { "@score":"1", "@id":"2566710", "info":{"authors":{"author":[{"@pid":"161/2203","text":"Iman Abdalla"},{"@pid":"67/11050","text":"Michael B. Rahaim"},{"@pid":"l/TDCLittle","text":"Thomas D. C. Little"}]},"title":"Impact of Receiver FOV and Orientation on Dense Optical Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AbdallaRL18","doi":"10.1109/GLOCOM.2018.8647842","ee":"https://doi.org/10.1109/GLOCOM.2018.8647842","url":"https://dblp.org/rec/conf/globecom/AbdallaRL18"}, "url":"URL#2566710" }, { "@score":"1", "@id":"2566711", "info":{"authors":{"author":[{"@pid":"181/1440","text":"Mohamed K. Abdel-Aziz"},{"@pid":"146/8064","text":"Chen-Feng Liu"},{"@pid":"117/5426","text":"Sumudu Samarakoon"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Ultra-Reliable Low-Latency Vehicular Networks: Taming the Age of Information Tail.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Abdel-AzizLSBS18","doi":"10.1109/GLOCOM.2018.8647466","ee":"https://doi.org/10.1109/GLOCOM.2018.8647466","url":"https://dblp.org/rec/conf/globecom/Abdel-AzizLSBS18"}, "url":"URL#2566711" }, { "@score":"1", "@id":"2566712", "info":{"authors":{"author":[{"@pid":"183/1743","text":"Amr M. Abdelhady"},{"@pid":"24/7964","text":"Osama Amin"},{"@pid":"62/5430","text":"Basem Shihada"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"On the Optimization of Multi-Cell SLIPT Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AbdelhadyASA18","doi":"10.1109/GLOCOM.2018.8647447","ee":"https://doi.org/10.1109/GLOCOM.2018.8647447","url":"https://dblp.org/rec/conf/globecom/AbdelhadyASA18"}, "url":"URL#2566712" }, { "@score":"1", "@id":"2566713", "info":{"authors":{"author":[{"@pid":"207/3449","text":"Ahmed Mohamed Abdelmoniem"},{"@pid":"b/BrahimBensaou","text":"Brahim Bensaou"},{"@pid":"236/3181","text":"Victor Barsoum"}]},"title":"IncastGuard: An Efficient TCP-Incast Mitigation Mechanism for Cloud Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AbdelmoniemBB18","doi":"10.1109/GLOCOM.2018.8647878","ee":"https://doi.org/10.1109/GLOCOM.2018.8647878","url":"https://dblp.org/rec/conf/globecom/AbdelmoniemBB18"}, "url":"URL#2566713" }, { "@score":"1", "@id":"2566714", "info":{"authors":{"author":[{"@pid":"176/1505","text":"Abdalla E. Abdelrahman"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"137/6691","text":"Najah AbuAli"}]},"title":"Data-driven Robust Scoring Approach for Driver Profiling Applications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AbdelrahmanHA18","doi":"10.1109/GLOCOM.2018.8647971","ee":"https://doi.org/10.1109/GLOCOM.2018.8647971","url":"https://dblp.org/rec/conf/globecom/AbdelrahmanHA18"}, "url":"URL#2566714" }, { "@score":"1", "@id":"2566719", "info":{"authors":{"author":[{"@pid":"236/3262","text":"Sylvester B. Aboagye"},{"@pid":"36/10674-5","text":"Ahmed Ibrahim 0005"},{"@pid":"49/1419","text":"Telex Magloire Nkouatchah Ngatched"}]},"title":"Energy Efficient Power and Flow Control in Millimeter Wave Backhaul Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AboagyeIN18","doi":"10.1109/GLOCOM.2018.8647825","ee":"https://doi.org/10.1109/GLOCOM.2018.8647825","url":"https://dblp.org/rec/conf/globecom/AboagyeIN18"}, "url":"URL#2566719" }, { "@score":"1", "@id":"2566720", "info":{"authors":{"author":[{"@pid":"211/9150","text":"Amine Abouaomar"},{"@pid":"81/8817","text":"Abdellatif Kobbane"},{"@pid":"57/689","text":"Soumaya Cherkaoui"}]},"title":"Matching-Game for User-Fog Assignment.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AbouaomarKC18","doi":"10.1109/GLOCOM.2018.8647545","ee":"https://doi.org/10.1109/GLOCOM.2018.8647545","url":"https://dblp.org/rec/conf/globecom/AbouaomarKC18"}, "url":"URL#2566720" }, { "@score":"1", "@id":"2566722", "info":{"authors":{"author":[{"@pid":"115/8725","text":"Nof Abuzainab"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Misinformation Control in the Internet of Battlefield Things: A Multiclass Mean-Field Game.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AbuzainabS18","doi":"10.1109/GLOCOM.2018.8647236","ee":"https://doi.org/10.1109/GLOCOM.2018.8647236","url":"https://dblp.org/rec/conf/globecom/AbuzainabS18"}, "url":"URL#2566722" }, { "@score":"1", "@id":"2566723", "info":{"authors":{"author":[{"@pid":"236/2837","text":"M'hammed Achour"},{"@pid":"49/9115","text":"Mohammed Mana"},{"@pid":"r/AbderrezakRachedi","text":"Abderrezak Rachedi"}]},"title":"New Slot-Head Jamming Attack and Mitigation Mechanism for Wireless Body Area Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AchourMR18","doi":"10.1109/GLOCOM.2018.8647717","ee":"https://doi.org/10.1109/GLOCOM.2018.8647717","url":"https://dblp.org/rec/conf/globecom/AchourMR18"}, "url":"URL#2566723" }, { "@score":"1", "@id":"2566725", "info":{"authors":{"author":[{"@pid":"207/0145","text":"Luca Acquaviva"},{"@pid":"b/PaoloBellavista","text":"Paolo Bellavista"},{"@pid":"90/2390","text":"Antonio Corradi"},{"@pid":"11/2127","text":"Luca Foschini 0001"},{"@pid":"194/7048","text":"Leo Gioia"},{"@pid":"236/3175","text":"Pasquale Carlo Maiorano Picone"}]},"title":"Cloud Distributed File Systems: A Benchmark of HDFS, Ceph, GlusterFS, and XtremeFS.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AcquavivaBCFGP18","doi":"10.1109/GLOCOM.2018.8647218","ee":"https://doi.org/10.1109/GLOCOM.2018.8647218","url":"https://dblp.org/rec/conf/globecom/AcquavivaBCFGP18"}, "url":"URL#2566725" }, { "@score":"1", "@id":"2566726", "info":{"authors":{"author":[{"@pid":"214/6863","text":"Vipindev Adat"},{"@pid":"63/400","text":"Ilias Politis"},{"@pid":"97/11345","text":"Christos Tselios"},{"@pid":"57/4660","text":"Panagiotis Galiotos"},{"@pid":"09/733","text":"Stavros Kotsopoulos"}]},"title":"On Blockchain Enhanced Secure Network Coding for 5G Deployments.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AdatPTGK18","doi":"10.1109/GLOCOM.2018.8647581","ee":"https://doi.org/10.1109/GLOCOM.2018.8647581","url":"https://dblp.org/rec/conf/globecom/AdatPTGK18"}, "url":"URL#2566726" }, { "@score":"1", "@id":"2566727", "info":{"authors":{"author":[{"@pid":"236/3285","text":"Rami Akrem Addad"},{"@pid":"140/0864","text":"Diego Leonel Cadette Dutra"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"24/6842","text":"Hannu Flinck"},{"@pid":"236/2804","text":"Mehdi Namane"}]},"title":"Benchmarking the ONOS Intent Interfaces to Ease 5G Service Management.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AddadDBTFN18","doi":"10.1109/GLOCOM.2018.8648078","ee":"https://doi.org/10.1109/GLOCOM.2018.8648078","url":"https://dblp.org/rec/conf/globecom/AddadDBTFN18"}, "url":"URL#2566727" }, { "@score":"1", "@id":"2566728", "info":{"authors":{"author":[{"@pid":"236/3285","text":"Rami Akrem Addad"},{"@pid":"140/0864","text":"Diego Leonel Cadette Dutra"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"24/6842","text":"Hannu Flinck"}]},"title":"MIRA!: An SDN-Based Framework for Cross-Domain Fast Migration of Ultra-Low Latency 5G Services.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AddadDTBF18","doi":"10.1109/GLOCOM.2018.8648002","ee":"https://doi.org/10.1109/GLOCOM.2018.8648002","url":"https://dblp.org/rec/conf/globecom/AddadDTBF18"}, "url":"URL#2566728" }, { "@score":"1", "@id":"2566729", "info":{"authors":{"author":[{"@pid":"236/3285","text":"Rami Akrem Addad"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"140/0864","text":"Diego Leonel Cadette Dutra"},{"@pid":"24/6842","text":"Hannu Flinck"}]},"title":"Towards Modeling Cross-Domain Network Slices for 5G.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AddadTBDF18","doi":"10.1109/GLOCOM.2018.8647504","ee":"https://doi.org/10.1109/GLOCOM.2018.8647504","url":"https://dblp.org/rec/conf/globecom/AddadTBDF18"}, "url":"URL#2566729" }, { "@score":"1", "@id":"2566730", "info":{"authors":{"author":[{"@pid":"19/8010","text":"Ansuman Adhikary"},{"@pid":"62/7867","text":"Alexei Ashikhmin"}]},"title":"Uplink Massive MIMO for Channels with Spatial Correlation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AdhikaryA18","doi":"10.1109/GLOCOM.2018.8648130","ee":"https://doi.org/10.1109/GLOCOM.2018.8648130","url":"https://dblp.org/rec/conf/globecom/AdhikaryA18"}, "url":"URL#2566730" }, { "@score":"1", "@id":"2566731", "info":{"authors":{"author":[{"@pid":"176/5311","text":"M. H. Afifi"},{"@pid":"213/7533","text":"Ehab Zaghloul"},{"@pid":"32/4638","text":"Tongtong Li"},{"@pid":"59/2180-1","text":"Jian Ren 0001"}]},"title":"UBNB-PPDP: Utility-Boosting Negotiation-Based Privacy Preserving Data Publishing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AfifiZLR18","doi":"10.1109/GLOCOM.2018.8647518","ee":"https://doi.org/10.1109/GLOCOM.2018.8647518","url":"https://dblp.org/rec/conf/globecom/AfifiZLR18"}, "url":"URL#2566731" }, { "@score":"1", "@id":"2566732", "info":{"authors":{"author":[{"@pid":"147/6054","text":"Samira Afzal"},{"@pid":"41/3606","text":"Vanessa Testoni"},{"@pid":"236/3185","text":"Jean Felipe F. de Oliveira"},{"@pid":"70/2654","text":"Christian Esteve Rothenberg"},{"@pid":"03/2141","text":"Prakash Kolan"},{"@pid":"24/1191","text":"Imed Bouazizi"}]},"title":"A Novel Scheduling Strategy for MMT-Based Multipath Video Streaming.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AfzalTORKB18","doi":"10.1109/GLOCOM.2018.8648134","ee":"https://doi.org/10.1109/GLOCOM.2018.8648134","url":"https://dblp.org/rec/conf/globecom/AfzalTORKB18"}, "url":"URL#2566732" }, { "@score":"1", "@id":"2566734", "info":{"authors":{"author":[{"@pid":"158/2853","text":"Arman Ahmadian"},{"@pid":"99/5171","text":"Hyuncheol Park"}]},"title":"Maximizing Ergodic Throughput in Wireless Powered Communication Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AhmadianP18","doi":"10.1109/GLOCOM.2018.8647192","ee":"https://doi.org/10.1109/GLOCOM.2018.8647192","url":"https://dblp.org/rec/conf/globecom/AhmadianP18"}, "url":"URL#2566734" }, { "@score":"1", "@id":"2566737", "info":{"authors":{"author":[{"@pid":"236/3264","text":"A. S. M. Ahsan-Ul-Haque"},{"@pid":"51/2132","text":"Md. Shohrab Hossain"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"Sequencing System Calls for Effective Malware Detection in Android.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Ahsan-Ul-HaqueH18","doi":"10.1109/GLOCOM.2018.8647967","ee":"https://doi.org/10.1109/GLOCOM.2018.8647967","url":"https://dblp.org/rec/conf/globecom/Ahsan-Ul-HaqueH18"}, "url":"URL#2566737" }, { "@score":"1", "@id":"2566738", "info":{"authors":{"author":[{"@pid":"236/3164","text":"Xiaoyu Ai"},{"@pid":"51/3128","text":"Robert A. Malaney"},{"@pid":"25/6170","text":"Soon Xin Ng"}]},"title":"Quantum Key Reconciliation for Satellite-Based Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AiMN18","doi":"10.1109/GLOCOM.2018.8647658","ee":"https://doi.org/10.1109/GLOCOM.2018.8647658","url":"https://dblp.org/rec/conf/globecom/AiMN18"}, "url":"URL#2566738" }, { "@score":"1", "@id":"2566740", "info":{"authors":{"author":[{"@pid":"163/8814","text":"Abdel-karim Ajami"},{"@pid":"09/3843","text":"Hassan Artail"},{"@pid":"s/KangGShin","text":"Kang G. Shin"}]},"title":"An Optimization Method for Multi-Operator and Mixed-Traffic LTE Deployments in the Unlicensed Bands.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AjamiAS18","doi":"10.1109/GLOCOM.2018.8647948","ee":"https://doi.org/10.1109/GLOCOM.2018.8647948","url":"https://dblp.org/rec/conf/globecom/AjamiAS18"}, "url":"URL#2566740" }, { "@score":"1", "@id":"2566744", "info":{"authors":{"author":[{"@pid":"213/7967","text":"Mohammed S. Al-Abiad"},{"@pid":"98/1677","text":"Sameh Sorour"},{"@pid":"90/5456-2","text":"Md. Jahangir Hossain 0002"}]},"title":"Cloud Offloading with QoS Provisioning Using Cross-Layer Network Coding.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Al-AbiadSH18","doi":"10.1109/GLOCOM.2018.8647299","ee":"https://doi.org/10.1109/GLOCOM.2018.8647299","url":"https://dblp.org/rec/conf/globecom/Al-AbiadSH18"}, "url":"URL#2566744" }, { "@score":"1", "@id":"2566745", "info":{"authors":{"author":[{"@pid":"231/4001","text":"Ahmed Al-Baidhani"},{"@pid":"98/4523","text":"Mohammed Benaissa"},{"@pid":"83/6821","text":"Mikko Vehkaperä"}]},"title":"Wireless Information and Power Transfer Based on Generalized Triangular Decomposition.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Al-BaidhaniBV18","doi":"10.1109/GLOCOM.2018.8647431","ee":"https://doi.org/10.1109/GLOCOM.2018.8647431","url":"https://dblp.org/rec/conf/globecom/Al-BaidhaniBV18"}, "url":"URL#2566745" }, { "@score":"1", "@id":"2566747", "info":{"authors":{"author":[{"@pid":"191/1868","text":"Osama Al-Saadeh"},{"@pid":"172/4539","text":"Gustav Wikström"},{"@pid":"21/93","text":"Joachim Sachs"},{"@pid":"72/10125","text":"Ilaria Thibault"},{"@pid":"13/10039","text":"David Lister"}]},"title":"End-to-End Latency and Reliability Performance of 5G in London.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Al-SaadehWSTL18","doi":"10.1109/GLOCOM.2018.8647379","ee":"https://doi.org/10.1109/GLOCOM.2018.8647379","url":"https://dblp.org/rec/conf/globecom/Al-SaadehWSTL18"}, "url":"URL#2566747" }, { "@score":"1", "@id":"2566748", "info":{"authors":{"author":[{"@pid":"150/3592","text":"Amer AlGhadhban"},{"@pid":"158/4618","text":"Abdulkadir Celik"},{"@pid":"62/5430","text":"Basem Shihada"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"LightFD: A Lightweight Flow Detection Mechanism for Traffic Grooming in Optical Wireless DCNs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlGhadhbanCSA18","doi":"10.1109/GLOCOM.2018.8648021","ee":"https://doi.org/10.1109/GLOCOM.2018.8648021","url":"https://dblp.org/rec/conf/globecom/AlGhadhbanCSA18"}, "url":"URL#2566748" }, { "@score":"1", "@id":"2566749", "info":{"authors":{"author":[{"@pid":"236/3234","text":"Mahmud A. AlaaEldin"},{"@pid":"65/3089","text":"Karim G. Seddik"},{"@pid":"87/620","text":"Wessam Mesbah"}]},"title":"AoD-Adaptive Channel Feedback in FDD Massive MIMO Systems with Multiple-Antenna Users.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AlaaEldinSM18","doi":"10.1109/GLOCOM.2018.8647727","ee":"https://doi.org/10.1109/GLOCOM.2018.8647727","url":"https://dblp.org/rec/conf/globecom/AlaaEldinSM18"}, "url":"URL#2566749" }, { "@score":"1", "@id":"2566751", "info":{"authors":{"author":[{"@pid":"217/9108","text":"A. B. M. Bodrul Alam"},{"@pid":"93/5670","text":"Anwar Haque"},{"@pid":"45/1198","text":"Mohammad Zulkernine"}]},"title":"CREM: A Cloud Reliability Evaluation Model.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlamHZ18","doi":"10.1109/GLOCOM.2018.8647486","ee":"https://doi.org/10.1109/GLOCOM.2018.8647486","url":"https://dblp.org/rec/conf/globecom/AlamHZ18"}, "url":"URL#2566751" }, { "@score":"1", "@id":"2566752", "info":{"authors":{"author":[{"@pid":"199/8187","text":"Mehmood Alam"},{"@pid":"52/323-13","text":"Qi Zhang 0013"}]},"title":"Sequence Block Based Compressed Sensing Multiuser Detection for 5G.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlamZ18","doi":"10.1109/GLOCOM.2018.8647750","ee":"https://doi.org/10.1109/GLOCOM.2018.8647750","url":"https://dblp.org/rec/conf/globecom/AlamZ18"}, "url":"URL#2566752" }, { "@score":"1", "@id":"2566754", "info":{"authors":{"author":[{"@pid":"07/7508","text":"Sultan Alanazi"},{"@pid":"89/4899","text":"Bechir Hamdaoui"}]},"title":"Energy-Aware Resource Management Framework for Overbooked Cloud Data Centers with SLA Assurance.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlanaziH18","doi":"10.1109/GLOCOM.2018.8647884","ee":"https://doi.org/10.1109/GLOCOM.2018.8647884","url":"https://dblp.org/rec/conf/globecom/AlanaziH18"}, "url":"URL#2566754" }, { "@score":"1", "@id":"2566755", "info":{"authors":{"author":[{"@pid":"183/8605","text":"Imad Alawe"},{"@pid":"63/2677","text":"Yassine Hadjadj Aoul"},{"@pid":"37/6589","text":"Adlen Ksentini"},{"@pid":"67/5111","text":"Philippe Bertin"},{"@pid":"19/980","text":"César Viho"},{"@pid":"70/6164","text":"Davy Darche"}]},"title":"Smart Scaling of the 5G Core Network: An RNN-Based Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlaweAKBVD18","doi":"10.1109/GLOCOM.2018.8647590","ee":"https://doi.org/10.1109/GLOCOM.2018.8647590","url":"https://dblp.org/rec/conf/globecom/AlaweAKBVD18"}, "url":"URL#2566755" }, { "@score":"1", "@id":"2566756", "info":{"authors":{"author":[{"@pid":"203/8521","text":"Alberto Martínez Alba"},{"@pid":"137/0059","text":"Arsany Basta"},{"@pid":"236/3208","text":"Jorge Humberto Gómez Velásquez"},{"@pid":"32/3203","text":"Wolfgang Kellerer"}]},"title":"A Realistic Coordinated Scheduling Scheme for the Next-Generation RAN.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlbaBVK18","doi":"10.1109/GLOCOM.2018.8647252","ee":"https://doi.org/10.1109/GLOCOM.2018.8647252","url":"https://dblp.org/rec/conf/globecom/AlbaBVK18"}, "url":"URL#2566756" }, { "@score":"1", "@id":"2566757", "info":{"authors":{"author":[{"@pid":"236/2817","text":"Nasser Aldaghri"},{"@pid":"05/6945","text":"Hessam Mahdavifar"}]},"title":"Fast Secret Key Generation in Static Environments Using Induced Randomness.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AldaghriM18","doi":"10.1109/GLOCOM.2018.8647945","ee":"https://doi.org/10.1109/GLOCOM.2018.8647945","url":"https://dblp.org/rec/conf/globecom/AldaghriM18"}, "url":"URL#2566757" }, { "@score":"1", "@id":"2566759", "info":{"authors":{"author":[{"@pid":"182/9319","text":"Ahmed Alghamdi"},{"@pid":"66/4168","text":"Tamer Nadeem"},{"@pid":"57/5551","text":"Mecit Cetin"}]},"title":"BlueMap: A Pervasive Bluetooth-Based Vehicle Trajectory Reconstruction System.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlghamdiNC18","doi":"10.1109/GLOCOM.2018.8647191","ee":"https://doi.org/10.1109/GLOCOM.2018.8647191","url":"https://dblp.org/rec/conf/globecom/AlghamdiNC18"}, "url":"URL#2566759" }, { "@score":"1", "@id":"2566760", "info":{"authors":{"author":[{"@pid":"236/3291","text":"Hisham Alhulayyil"},{"@pid":"08/4035","text":"Karim Khalil"},{"@pid":"k/SrikanthVKrishnamurthy","text":"Srikanth V. Krishnamurthy"},{"@pid":"06/7392","text":"Derya Cansever"},{"@pid":"l/TomLaPorta","text":"Thomas La Porta"},{"@pid":"89/5072","text":"Ananthram Swami"}]},"title":"On the Detection of Adaptive Side-Channel Attackers in Cloud Environments.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlhulayyilKKCPS18","doi":"10.1109/GLOCOM.2018.8647868","ee":"https://doi.org/10.1109/GLOCOM.2018.8647868","url":"https://dblp.org/rec/conf/globecom/AlhulayyilKKCPS18"}, "url":"URL#2566760" }, { "@score":"1", "@id":"2566761", "info":{"authors":{"author":[{"@pid":"160/4889","text":"Omar Alhussein"},{"@pid":"236/3115","text":"Phu Thinh Do"},{"@pid":"78/10520","text":"Junling Li"},{"@pid":"31/334-2","text":"Qiang Ye 0002"},{"@pid":"159/5790","text":"Weisen Shi"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"},{"@pid":"s/XueminShen","text":"Xuemin Shen"},{"@pid":"25/3528-1","text":"Xu Li 0001"},{"@pid":"40/11298","text":"Jaya Rao"}]},"title":"Joint VNF Placement and Multicast Traffic Routing in 5G Core Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlhusseinDLYSZS18","doi":"10.1109/GLOCOM.2018.8648029","ee":"https://doi.org/10.1109/GLOCOM.2018.8648029","url":"https://dblp.org/rec/conf/globecom/AlhusseinDLYSZS18"}, "url":"URL#2566761" }, { "@score":"1", "@id":"2566762", "info":{"authors":{"author":[{"@pid":"137/6691","text":"Najah Abu Ali"},{"@pid":"170/4241","text":"Sam Aleyadeh"},{"@pid":"96/10135","text":"Fatiha Djebbar"},{"@pid":"75/10077","text":"Akram Alomainy"}]},"title":"Evaluation of Data Dissemination Schemes in Electromagnetic Nanosensor Networks.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AliADA18","doi":"10.1109/GLOCOM.2018.8647626","ee":"https://doi.org/10.1109/GLOCOM.2018.8647626","url":"https://dblp.org/rec/conf/globecom/AliADA18"}, "url":"URL#2566762" }, { "@score":"1", "@id":"2566763", "info":{"authors":{"author":[{"@pid":"185/7230","text":"Mudassar Ali"},{"@pid":"53/7473","text":"Mushtaq Ahmad"},{"@pid":"52/1095-1","text":"Muhammad Naeem 0001"},{"@pid":"26/7757","text":"Ashfaq Ahmed"},{"@pid":"148/2398-3","text":"Muhammad Iqbal 0003"},{"@pid":"10/7465","text":"Waleed Ejaz"},{"@pid":"97/4028","text":"Alagan Anpalagan"}]},"title":"Devices to Devices (Ds2Ds) Communication: Towards Energy Efficient IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AliANAIEA18","doi":"10.1109/GLOCOM.2018.8647943","ee":"https://doi.org/10.1109/GLOCOM.2018.8647943","url":"https://dblp.org/rec/conf/globecom/AliANAIEA18"}, "url":"URL#2566763" }, { "@score":"1", "@id":"2566765", "info":{"authors":{"author":[{"@pid":"132/2212","text":"M. Zulfiker Ali"},{"@pid":"m/JVMisic","text":"Jelena V. Misic"},{"@pid":"62/76","text":"Vojislav B. Misic"}]},"title":"Differentiated QoS to Heterogeneous IoT Nodes in IEEE 802.11ah RAW Mechanism.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AliMM18","doi":"10.1109/GLOCOM.2018.8647598","ee":"https://doi.org/10.1109/GLOCOM.2018.8647598","url":"https://dblp.org/rec/conf/globecom/AliMM18"}, "url":"URL#2566765" }, { "@score":"1", "@id":"2566766", "info":{"authors":{"author":[{"@pid":"194/6893","text":"Osama Alluhaibi"},{"@pid":"45/1115","text":"Qasim Zeeshan Ahmed"}]},"title":"Energy-Efficient Hybrid D-A Precoders Design for mm-Wave Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlluhaibiA18","doi":"10.1109/GLOCOM.2018.8647487","ee":"https://doi.org/10.1109/GLOCOM.2018.8647487","url":"https://dblp.org/rec/conf/globecom/AlluhaibiA18"}, "url":"URL#2566766" }, { "@score":"1", "@id":"2566767", "info":{"authors":{"author":[{"@pid":"154/3856","text":"Abdullah M. Almasoud"},{"@pid":"94/5698","text":"Ahmed E. Kamal 0001"}]},"title":"Energy Harvesting-Based Multicast Communication in Cellular IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlmasoudK18","doi":"10.1109/GLOCOM.2018.8647919","ee":"https://doi.org/10.1109/GLOCOM.2018.8647919","url":"https://dblp.org/rec/conf/globecom/AlmasoudK18"}, "url":"URL#2566767" }, { "@score":"1", "@id":"2566768", "info":{"authors":{"author":[{"@pid":"154/3856","text":"Abdullah M. Almasoud"},{"@pid":"199/9885","text":"Mohamed Y. Selim"},{"@pid":"273/2925","text":"Abdullah M. Alqasir"},{"@pid":"236/3355","text":"Tanzilah Shabnam"},{"@pid":"214/2150","text":"Ala'eddin Masadeh"},{"@pid":"94/5698","text":"Ahmed E. Kamal 0001"}]},"title":"Energy Efficient Data Forwarding in Disconnected Networks Using Cooperative UAVs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AlmasoudSASMK18","doi":"10.1109/GLOCOM.2018.8647594","ee":"https://doi.org/10.1109/GLOCOM.2018.8647594","url":"https://dblp.org/rec/conf/globecom/AlmasoudSASMK18"}, "url":"URL#2566768" }, { "@score":"1", "@id":"2566769", "info":{"authors":{"author":[{"@pid":"236/2986","text":"Jarallah Alqahtani"},{"@pid":"89/4899","text":"Bechir Hamdaoui"}]},"title":"Rethinking Fat-Tree Topology Design for Cloud Data Centers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlqahtaniH18","doi":"10.1109/GLOCOM.2018.8647774","ee":"https://doi.org/10.1109/GLOCOM.2018.8647774","url":"https://dblp.org/rec/conf/globecom/AlqahtaniH18"}, "url":"URL#2566769" }, { "@score":"1", "@id":"2566770", "info":{"authors":{"author":[{"@pid":"151/4609","text":"Reem Alshahrani"},{"@pid":"33/228","text":"Hassan Peyravi"}]},"title":"Adaptive Probe Size Estimation for Cluster Management in Datacenters.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlshahraniP18","doi":"10.1109/GLOCOM.2018.8647665","ee":"https://doi.org/10.1109/GLOCOM.2018.8647665","url":"https://dblp.org/rec/conf/globecom/AlshahraniP18"}, "url":"URL#2566770" }, { "@score":"1", "@id":"2566771", "info":{"authors":{"author":[{"@pid":"198/8725","text":"Adel Alshamrani"},{"@pid":"192/7563","text":"Ankur Chowdhary"},{"@pid":"181/7157","text":"Oussama Mjihil"},{"@pid":"50/8970","text":"Sowmya Myneni"},{"@pid":"36/4573","text":"Dijiang Huang"}]},"title":"Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlshamraniCMMH18","doi":"10.1109/GLOCOM.2018.8647326","ee":"https://doi.org/10.1109/GLOCOM.2018.8647326","url":"https://dblp.org/rec/conf/globecom/AlshamraniCMMH18"}, "url":"URL#2566771" }, { "@score":"1", "@id":"2566772", "info":{"authors":{"author":[{"@pid":"221/0383","text":"Malek M. Alsmadi"},{"@pid":"202/7607","text":"Ayse Elif Canbilen"},{"@pid":"32/3695","text":"Salama S. Ikki"},{"@pid":"61/6362","text":"Ertugrul Basar"},{"@pid":"297/6595","text":"Seyfettin Sinan Gültekin"},{"@pid":"55/6298","text":"Ibrahim Develi"}]},"title":"Imperfect CSI and Improper Gaussian Noise Effects on SSK: Optimal Detection and Error Analysis.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AlsmadiCIBGD18","doi":"10.1109/GLOCOM.2018.8647577","ee":"https://doi.org/10.1109/GLOCOM.2018.8647577","url":"https://dblp.org/rec/conf/globecom/AlsmadiCIBGD18"}, "url":"URL#2566772" }, { "@score":"1", "@id":"2566773", "info":{"authors":{"author":[{"@pid":"152/9444","text":"Mohannad A. Alswailim"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"45/1198","text":"Mohammad Zulkernine"}]},"title":"A Context-Aware Privacy Scheme for Crisis Situations.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlswailimHZ18","doi":"10.1109/GLOCOM.2018.8647222","ee":"https://doi.org/10.1109/GLOCOM.2018.8647222","url":"https://dblp.org/rec/conf/globecom/AlswailimHZ18"}, "url":"URL#2566773" }, { "@score":"1", "@id":"2566774", "info":{"authors":{"author":[{"@pid":"213/8860","text":"Mhd Tahssin Altabbaa"},{"@pid":"22/2103","text":"Arif Selçuk Ögrenci"},{"@pid":"17/664","text":"Erdal Panayirci"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Sparse Channel Estimation for Space-Time Block Coded OFDM-Based Underwater Acoustic Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AltabbaaOPP18","doi":"10.1109/GLOCOM.2018.8647219","ee":"https://doi.org/10.1109/GLOCOM.2018.8647219","url":"https://dblp.org/rec/conf/globecom/AltabbaaOPP18"}, "url":"URL#2566774" }, { "@score":"1", "@id":"2566775", "info":{"authors":{"author":[{"@pid":"123/3369","text":"Sheeraz A. Alvi"},{"@pid":"36/2064","text":"Xiangyun Zhou 0001"},{"@pid":"77/6860","text":"Salman Durrani"}]},"title":"A Lifetime Maximization Scheme for a Sensor Based MTC Device.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AlviZD18","doi":"10.1109/GLOCOM.2018.8647869","ee":"https://doi.org/10.1109/GLOCOM.2018.8647869","url":"https://dblp.org/rec/conf/globecom/AlviZD18"}, "url":"URL#2566775" }, { "@score":"1", "@id":"2566778", "info":{"authors":{"author":[{"@pid":"225/8780","text":"Mohamed Akram Ameddah"},{"@pid":"67/4163","text":"Bhaskar Das"},{"@pid":"66/1381","text":"Jalal Almhana"}]},"title":"Cloud-Assisted Real-Time Road Condition Monitoring System for Vehicles.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AmeddahDA18","doi":"10.1109/GLOCOM.2018.8647334","ee":"https://doi.org/10.1109/GLOCOM.2018.8647334","url":"https://dblp.org/rec/conf/globecom/AmeddahDA18"}, "url":"URL#2566778" }, { "@score":"1", "@id":"2566779", "info":{"authors":{"author":[{"@pid":"168/8487","text":"Ramy Amer"},{"@pid":"92/7804","text":"M. Majid Butt"},{"@pid":"18/10799","text":"Hesham ElSawy"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"12/10098","text":"Jacek Kibilda"},{"@pid":"20/4118","text":"Nicola Marchetti"}]},"title":"On Minimizing Energy Consumption for D2D Clustered Caching Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AmerBEBKM18","doi":"10.1109/GLOCOM.2018.8647532","ee":"https://doi.org/10.1109/GLOCOM.2018.8647532","url":"https://dblp.org/rec/conf/globecom/AmerBEBKM18"}, "url":"URL#2566779" }, { "@score":"1", "@id":"2566780", "info":{"authors":{"author":[{"@pid":"236/2845","text":"Shahira H. Amin"},{"@pid":"24/9223","text":"Ahmed Hesham Mehana"},{"@pid":"16/11052","text":"Samy S. Soliman"},{"@pid":"221/5353","text":"Yasmine A. Fahmy"}]},"title":"User Capacity in Downlink MISO-NOMA Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AminMSF18","doi":"10.1109/GLOCOM.2018.8647291","ee":"https://doi.org/10.1109/GLOCOM.2018.8647291","url":"https://dblp.org/rec/conf/globecom/AminMSF18"}, "url":"URL#2566780" }, { "@score":"1", "@id":"2566782", "info":{"authors":{"author":[{"@pid":"145/2400","text":"Delaram Amiri"},{"@pid":"190/0007","text":"Arman Anzanpour"},{"@pid":"166/4888","text":"Iman Azimi"},{"@pid":"47/2386","text":"Marco Levorato"},{"@pid":"41/923","text":"Amir M. Rahmani"},{"@pid":"22/660","text":"Pasi Liljeberg"},{"@pid":"d/NikilDDutt","text":"Nikil D. Dutt"}]},"title":"Edge-Assisted Sensor Control in Healthcare IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AmiriAALRLD18","doi":"10.1109/GLOCOM.2018.8647457","ee":"https://doi.org/10.1109/GLOCOM.2018.8647457","url":"https://dblp.org/rec/conf/globecom/AmiriAALRLD18"}, "url":"URL#2566782" }, { "@score":"1", "@id":"2566785", "info":{"authors":{"author":[{"@pid":"193/4959","text":"Hamza Ben Ammar"},{"@pid":"63/2677","text":"Yassine Hadjadj Aoul"},{"@pid":"90/5723","text":"Gerardo Rubino"},{"@pid":"60/10808","text":"Soraya Ait Chellouche"}]},"title":"A Versatile Markov Chain Model for the Performance Analysis of CCN Caching Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AmmarARC18","doi":"10.1109/GLOCOM.2018.8648055","ee":"https://doi.org/10.1109/GLOCOM.2018.8648055","url":"https://dblp.org/rec/conf/globecom/AmmarARC18"}, "url":"URL#2566785" }, { "@score":"1", "@id":"2566786", "info":{"authors":{"author":[{"@pid":"236/3294","text":"Mohamed Ammar"},{"@pid":"28/8817","text":"Khalil Ibrahimi"},{"@pid":"184/6690","text":"Mohammed Jouhari"},{"@pid":"75/178","text":"Jalel Ben-Othman"}]},"title":"MAC Protocol-Based Depth Adjustment and Splitting Mechanism for UnderWater Sensor Network (UWSN).","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AmmarIJB18","doi":"10.1109/GLOCOM.2018.8647644","ee":"https://doi.org/10.1109/GLOCOM.2018.8647644","url":"https://dblp.org/rec/conf/globecom/AmmarIJB18"}, "url":"URL#2566786" }, { "@score":"1", "@id":"2566787", "info":{"authors":{"author":[{"@pid":"148/9756","text":"Souheib Ben Amor"},{"@pid":"85/3663","text":"Sofiène Affes"},{"@pid":"75/7911","text":"Faouzi Bellili"},{"@pid":"31/3333","text":"Usa Vilaipornsawai"},{"@pid":"20/4627-3","text":"Liqing Zhang 0003"},{"@pid":"123/9358","text":"Peiying Zhu"}]},"title":"ML Time-Delay and CFO Synchronization for MIMO-Relay Beamforming over Time-Varying Channels.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AmorABVZZ18","doi":"10.1109/GLOCOM.2018.8647960","ee":"https://doi.org/10.1109/GLOCOM.2018.8647960","url":"https://dblp.org/rec/conf/globecom/AmorABVZZ18"}, "url":"URL#2566787" }, { "@score":"1", "@id":"2566789", "info":{"authors":{"author":[{"@pid":"191/1000","text":"Davide Andreoletti"},{"@pid":"13/972","text":"Silvia Giordano"},{"@pid":"34/1346","text":"Giacomo Verticale"},{"@pid":"11/6844","text":"Massimo Tornatore"}]},"title":"Discovering the Geographic Distribution of Live Videos' Users: A Privacy-Preserving Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AndreolettiGVT18","doi":"10.1109/GLOCOM.2018.8647639","ee":"https://doi.org/10.1109/GLOCOM.2018.8647639","url":"https://dblp.org/rec/conf/globecom/AndreolettiGVT18"}, "url":"URL#2566789" }, { "@score":"1", "@id":"2566790", "info":{"authors":{"author":[{"@pid":"63/5370","text":"Marco Anisetti"},{"@pid":"62/575","text":"Claudio A. Ardagna"},{"@pid":"167/2181","text":"Filippo Gaudenzi"},{"@pid":"d/EDamiani","text":"Ernesto Damiani"},{"@pid":"236/3209","text":"Nicla Diomede"},{"@pid":"236/3056","text":"Patrizio Tufarolo"}]},"title":"Moon Cloud: A Cloud Platform for ICT Security Governance.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AnisettiAGDDT18","doi":"10.1109/GLOCOM.2018.8647247","ee":"https://doi.org/10.1109/GLOCOM.2018.8647247","url":"https://dblp.org/rec/conf/globecom/AnisettiAGDDT18"}, "url":"URL#2566790" }, { "@score":"1", "@id":"2566791", "info":{"authors":{"author":[{"@pid":"185/6986","text":"Noha Anous"},{"@pid":"64/3421-1","text":"Mohamed M. Abdallah 0001"},{"@pid":"11/6615","text":"Khalid A. Qaraqe"},{"@pid":"152/8493","text":"Diaa A. Khalil"}]},"title":"Enhancement of Modulation Bandwidth in Wide-Angle VLC Systems via Response-Flattening Filters.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AnousAQK18","doi":"10.1109/GLOCOM.2018.8647359","ee":"https://doi.org/10.1109/GLOCOM.2018.8647359","url":"https://dblp.org/rec/conf/globecom/AnousAQK18"}, "url":"URL#2566791" }, { "@score":"1", "@id":"2566793", "info":{"authors":{"author":[{"@pid":"61/8603","text":"Ahmed Arafa 0001"},{"@pid":"77/5412","text":"Wonjae Shin"},{"@pid":"16/1764","text":"Mojtaba Vaezi"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ArafaSVP18","doi":"10.1109/GLOCOM.2018.8648037","ee":"https://doi.org/10.1109/GLOCOM.2018.8648037","url":"https://dblp.org/rec/conf/globecom/ArafaSVP18"}, "url":"URL#2566793" }, { "@score":"1", "@id":"2566794", "info":{"authors":{"author":[{"@pid":"203/9444","text":"Soroor Aram"},{"@pid":"52/4297","text":"Bijan Jabbari"}]},"title":"A Base Station Association Scheme to Improve Wireless Network QoS and Reliability.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AramJ18","doi":"10.1109/GLOCOM.2018.8647226","ee":"https://doi.org/10.1109/GLOCOM.2018.8647226","url":"https://dblp.org/rec/conf/globecom/AramJ18"}, "url":"URL#2566794" }, { "@score":"1", "@id":"2566795", "info":{"authors":{"author":[{"@pid":"176/5884","text":"Atefeh Hajijamali Arani"},{"@pid":"45/3942","text":"Abolfazl Mehbodniya"},{"@pid":"01/10837","text":"Mohammad Javad Omidi"},{"@pid":"65/1432","text":"Mark F. Flanagan"}]},"title":"Satisfaction Based Channel Allocation Scheme for Self-Organization in Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AraniMOF18","doi":"10.1109/GLOCOM.2018.8647834","ee":"https://doi.org/10.1109/GLOCOM.2018.8647834","url":"https://dblp.org/rec/conf/globecom/AraniMOF18"}, "url":"URL#2566795" }, { "@score":"1", "@id":"2566796", "info":{"authors":{"author":[{"@pid":"76/490","text":"Giuseppe Araniti"},{"@pid":"86/4818","text":"Antonio Iera"},{"@pid":"11/4677","text":"Antonella Molinaro"},{"@pid":"213/4238","text":"Federica Rinaldi"},{"@pid":"157/9900","text":"Pasquale Scopelliti"}]},"title":"Exploiting Multicast Subgrouping for Multi-Layer Video Services in 5G Satellite Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AranitiIMRS18","doi":"10.1109/GLOCOM.2018.8647430","ee":"https://doi.org/10.1109/GLOCOM.2018.8647430","url":"https://dblp.org/rec/conf/globecom/AranitiIMRS18"}, "url":"URL#2566796" }, { "@score":"1", "@id":"2566797", "info":{"authors":{"author":[{"@pid":"195/8057","text":"Mohamed A. Aref"},{"@pid":"68/719","text":"Sudharman K. Jayaweera"}]},"title":"Classification of Radar and Communications Signals Using Wideband Autonomous Cognitive Radios.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ArefJ18","doi":"10.1109/GLOCOM.2018.8647305","ee":"https://doi.org/10.1109/GLOCOM.2018.8647305","url":"https://dblp.org/rec/conf/globecom/ArefJ18"}, "url":"URL#2566797" }, { "@score":"1", "@id":"2566798", "info":{"authors":{"author":[{"@pid":"203/3315","text":"Amel Arfaoui"},{"@pid":"193/4307","text":"Ali Kribeche"},{"@pid":"75/1717","text":"Sidi Mohammed Senouci"},{"@pid":"91/2937","text":"Mohamed Hamdi"}]},"title":"Game-Based Adaptive Remote Access VPN for IoT: Application to e-Health.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ArfaouiKSH18","doi":"10.1109/GLOCOM.2018.8648064","ee":"https://doi.org/10.1109/GLOCOM.2018.8648064","url":"https://dblp.org/rec/conf/globecom/ArfaouiKSH18"}, "url":"URL#2566798" }, { "@score":"1", "@id":"2566799", "info":{"authors":{"author":[{"@pid":"196/3962","text":"Ricardo Arjona"},{"@pid":"83/4567","text":"Andrea Fumagalli"},{"@pid":"74/5521","text":"Craig Lee"},{"@pid":"56/8385","text":"Kumaran Vijayasankar"}]},"title":"An Experimental End-to-End Delay Study of a Sub-1GHz Wireless Sensor Network with LTE Backhaul.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ArjonaFLV18","doi":"10.1109/GLOCOM.2018.8647618","ee":"https://doi.org/10.1109/GLOCOM.2018.8647618","url":"https://dblp.org/rec/conf/globecom/ArjonaFLV18"}, "url":"URL#2566799" }, { "@score":"1", "@id":"2566803", "info":{"authors":{"author":[{"@pid":"236/3152","text":"Marius Arvinte"},{"@pid":"41/312","text":"Ahmed H. Tewfik"}]},"title":"A Relax-and-Round Approach to Complex Lattice Basis Reduction.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ArvinteT18","doi":"10.1109/GLOCOM.2018.8647847","ee":"https://doi.org/10.1109/GLOCOM.2018.8647847","url":"https://dblp.org/rec/conf/globecom/ArvinteT18"}, "url":"URL#2566803" }, { "@score":"1", "@id":"2566804", "info":{"authors":{"author":[{"@pid":"194/7162","text":"Sultangali Arzykulov"},{"@pid":"45/2826","text":"Theodoros A. Tsiftsis"},{"@pid":"164/9004","text":"Galymzhan Nauryzbayev"},{"@pid":"64/3421-1","text":"Mohamed M. Abdallah 0001"},{"@pid":"29/2214","text":"Guanghua Yang"}]},"title":"Outage Performance of Underlay CR-NOMA Networks with Detect-and-Forward Relaying.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ArzykulovTNAY18","doi":"10.1109/GLOCOM.2018.8647964","ee":"https://doi.org/10.1109/GLOCOM.2018.8647964","url":"https://dblp.org/rec/conf/globecom/ArzykulovTNAY18"}, "url":"URL#2566804" }, { "@score":"1", "@id":"2566805", "info":{"authors":{"author":[{"@pid":"236/2840","text":"Behnam Ashrafzadeh"},{"@pid":"35/6157","text":"Amir Zaimbashi"},{"@pid":"236/3233","text":"Ehsan Soleirnani-Nasab"},{"@pid":"52/6842","text":"Murat Uysal"}]},"title":"On the Performance of Multi-Hop Free Space Optical Cooperative Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AshrafzadehZSU18","doi":"10.1109/GLOCOM.2018.8647949","ee":"https://doi.org/10.1109/GLOCOM.2018.8647949","url":"https://dblp.org/rec/conf/globecom/AshrafzadehZSU18"}, "url":"URL#2566805" }, { "@score":"1", "@id":"2566808", "info":{"authors":{"author":[{"@pid":"211/9001","text":"Bouchaib Assila"},{"@pid":"81/8817","text":"Abdellatif Kobbane"},{"@pid":"06/1734","text":"Mohammed El Koutbi"},{"@pid":"75/178","text":"Jalel Ben-Othman"},{"@pid":"22/5508","text":"Lynda Mokdad"}]},"title":"Caching as a Service in 5G Networks: Intelligent Transport and Video on Demand Scenarios.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AssilaKKBM18","doi":"10.1109/GLOCOM.2018.8648110","ee":"https://doi.org/10.1109/GLOCOM.2018.8648110","url":"https://dblp.org/rec/conf/globecom/AssilaKKBM18"}, "url":"URL#2566808" }, { "@score":"1", "@id":"2566809", "info":{"authors":{"author":[{"@pid":"307/5896","text":"Fauzun Abdullah Asuhaimi"},{"@pid":"11/7563","text":"Shengrong Bu"},{"@pid":"25/1002","text":"Muhammad Ali Imran 0001"}]},"title":"Joint Resource Allocation and Power Control in Heterogeneous Cellular Networks for Smart Grids.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AsuhaimiBI18","doi":"10.1109/GLOCOM.2018.8647668","ee":"https://doi.org/10.1109/GLOCOM.2018.8647668","url":"https://dblp.org/rec/conf/globecom/AsuhaimiBI18"}, "url":"URL#2566809" }, { "@score":"1", "@id":"2566810", "info":{"authors":{"author":[{"@pid":"227/7297","text":"Mahdi Attaran"},{"@pid":"46/4642","text":"Jacek Ilow"}]},"title":"Spatial Multiplexing and Antenna Selection in Relay-Assisted Transmissions with Heterogeneous Nodes.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AttaranI18","doi":"10.1109/GLOCOM.2018.8647448","ee":"https://doi.org/10.1109/GLOCOM.2018.8647448","url":"https://dblp.org/rec/conf/globecom/AttaranI18"}, "url":"URL#2566810" }, { "@score":"1", "@id":"2566811", "info":{"authors":{"author":[{"@pid":"176/5265","text":"Apostolos Avranas"},{"@pid":"90/3967","text":"Marios Kountouris"},{"@pid":"54/5257","text":"Philippe Ciblat"}]},"title":"Energy-Latency Tradeoff in Ultra-Reliable Low-Latency Communication with Short Packets.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AvranasKC18","doi":"10.1109/GLOCOM.2018.8648091","ee":"https://doi.org/10.1109/GLOCOM.2018.8648091","url":"https://dblp.org/rec/conf/globecom/AvranasKC18"}, "url":"URL#2566811" }, { "@score":"1", "@id":"2566812", "info":{"authors":{"author":[{"@pid":"175/0543","text":"Hamdan Awan"},{"@pid":"22/3660","text":"Raviraj S. Adve"},{"@pid":"10/7815","text":"Nigel Wallbridge"},{"@pid":"220/5535","text":"Carrol Plummer"},{"@pid":"71/6889","text":"Andrew W. Eckford"}]},"title":"Characterizing Information Propagation in Plants.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AwanAWPE18","doi":"10.1109/GLOCOM.2018.8647210","ee":"https://doi.org/10.1109/GLOCOM.2018.8647210","url":"https://dblp.org/rec/conf/globecom/AwanAWPE18"}, "url":"URL#2566812" }, { "@score":"1", "@id":"2566813", "info":{"authors":{"author":[{"@pid":"174/9648","text":"Omran Ayoub"},{"@pid":"78/10585","text":"Francesco Musumeci 0001"},{"@pid":"191/1000","text":"Davide Andreoletti"},{"@pid":"236/3315","text":"Marco Mussini"},{"@pid":"11/6844","text":"Massimo Tornatore"},{"@pid":"36/6659","text":"Achille Pattavina"}]},"title":"Optimal Cache Deployment for Video-an-Demand Delivery in Optical Metro-Area Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AyoubMAMTP18","doi":"10.1109/GLOCOM.2018.8647763","ee":"https://doi.org/10.1109/GLOCOM.2018.8647763","url":"https://dblp.org/rec/conf/globecom/AyoubMAMTP18"}, "url":"URL#2566813" }, { "@score":"1", "@id":"2566814", "info":{"authors":{"author":[{"@pid":"72/8511","text":"Amin Azari"},{"@pid":"80/67","text":"Cicek Cavdar"}]},"title":"Performance Evaluation and Optimization of LPWA IoT Networks: A Stochastic Geometry Approach.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AzariC18","doi":"10.1109/GLOCOM.2018.8647881","ee":"https://doi.org/10.1109/GLOCOM.2018.8647881","url":"https://dblp.org/rec/conf/globecom/AzariC18"}, "url":"URL#2566814" }, { "@score":"1", "@id":"2566815", "info":{"authors":{"author":[{"@pid":"72/8511","text":"Amin Azari"},{"@pid":"80/67","text":"Cicek Cavdar"}]},"title":"Self-Organized Low-Power IoT Networks: A Distributed Learning Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/AzariC18a","doi":"10.1109/GLOCOM.2018.8647894","ee":"https://doi.org/10.1109/GLOCOM.2018.8647894","url":"https://dblp.org/rec/conf/globecom/AzariC18a"}, "url":"URL#2566815" }, { "@score":"1", "@id":"2566816", "info":{"authors":{"author":[{"@pid":"72/8511","text":"Amin Azari"},{"@pid":"87/5132","text":"Guowang Miao"},{"@pid":"84/6001","text":"Cedomir Stefanovic"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Latency-Energy Tradeoff Based on Channel Scheduling and Repetitions in NB-IoT Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AzariMSP18","doi":"10.1109/GLOCOM.2018.8648024","ee":"https://doi.org/10.1109/GLOCOM.2018.8648024","url":"https://dblp.org/rec/conf/globecom/AzariMSP18"}, "url":"URL#2566816" }, { "@score":"1", "@id":"2566817", "info":{"authors":{"author":[{"@pid":"222/5571","text":"Sherif B. Azmy"},{"@pid":"01/5283","text":"Nizar Zorba"},{"@pid":"07/3173","text":"Hossam S. Hassanein"}]},"title":"Bootstrap-Based Quality Metric for Scarce Sensing Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/AzmyZH18","doi":"10.1109/GLOCOM.2018.8647536","ee":"https://doi.org/10.1109/GLOCOM.2018.8647536","url":"https://dblp.org/rec/conf/globecom/AzmyZH18"}, "url":"URL#2566817" }, { "@score":"1", "@id":"2566818", "info":{"authors":{"author":[{"@pid":"41/9975","text":"Manlio Bacco"},{"@pid":"143/3629","text":"Matteo Catena"},{"@pid":"73/1122","text":"Tomaso de Cola"},{"@pid":"65/4788","text":"Alberto Gotta"},{"@pid":"44/5123","text":"Nicola Tonellotto"}]},"title":"Performance Analysis of WebRTC-Based Video Streaming Over Power Constrained Platforms.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BaccoCCGT18","doi":"10.1109/GLOCOM.2018.8647375","ee":"https://doi.org/10.1109/GLOCOM.2018.8647375","url":"https://dblp.org/rec/conf/globecom/BaccoCCGT18"}, "url":"URL#2566818" }, { "@score":"1", "@id":"2566820", "info":{"authors":{"author":[{"@pid":"154/3936","text":"Mohammed S. Bahbahani"},{"@pid":"34/1858","text":"Emad Alsusa"}]},"title":"CrowdConnect: A Quality of Experience Enhancement Solution for Dense Stadium Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BahbahaniA18","doi":"10.1109/GLOCOM.2018.8648122","ee":"https://doi.org/10.1109/GLOCOM.2018.8648122","url":"https://dblp.org/rec/conf/globecom/BahbahaniA18"}, "url":"URL#2566820" }, { "@score":"1", "@id":"2566822", "info":{"authors":{"author":[{"@pid":"01/6200","text":"Mohammed W. Baidas"},{"@pid":"34/1858","text":"Emad Alsusa"},{"@pid":"236/3273","text":"Motassim Al-Farra"},{"@pid":"236/2954","text":"Mubarak Al-Mubarak"}]},"title":"Game- Theoretic Modeling and Analysis of Multi-Relay Selection in Energy-Harvesting Wireless Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BaidasAAA18","doi":"10.1109/GLOCOM.2018.8648128","ee":"https://doi.org/10.1109/GLOCOM.2018.8648128","url":"https://dblp.org/rec/conf/globecom/BaidasAAA18"}, "url":"URL#2566822" }, { "@score":"1", "@id":"2566824", "info":{"authors":{"author":[{"@pid":"02/10799","text":"Naveen Mysore Balasubramanya"},{"@pid":"65/2886-8","text":"Ankit Gupta 0008"},{"@pid":"17/1153","text":"Mathini Sellathurai"}]},"title":"Combining Code-Domain and Power-Domain NOMA for Supporting Higher Number of Users.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BalasubramanyaG18","doi":"10.1109/GLOCOM.2018.8647770","ee":"https://doi.org/10.1109/GLOCOM.2018.8647770","url":"https://dblp.org/rec/conf/globecom/BalasubramanyaG18"}, "url":"URL#2566824" }, { "@score":"1", "@id":"2566826", "info":{"authors":{"author":[{"@pid":"213/3490","text":"Fetia Bannour"},{"@pid":"92/10614","text":"Sami Souihi"},{"@pid":"03/6403","text":"Abdelhamid Mellouk"}]},"title":"Adaptive State Consistency for Distributed ONOS Controllers.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BannourSM18","doi":"10.1109/GLOCOM.2018.8647168","ee":"https://doi.org/10.1109/GLOCOM.2018.8647168","url":"https://dblp.org/rec/conf/globecom/BannourSM18"}, "url":"URL#2566826" }, { "@score":"1", "@id":"2566827", "info":{"authors":{"author":[{"@pid":"236/3249","text":"Behzad Barabadi"},{"@pid":"23/2837","text":"Farzad Tashtarian"},{"@pid":"y/MHYaghmaee","text":"Mohammad Hossein Yaghmaee Moghaddam"}]},"title":"An Optimal Spatial and Temporal Charging Schedule for Electric Vehicles in Smart Grid.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BarabadiTM18","doi":"10.1109/GLOCOM.2018.8647463","ee":"https://doi.org/10.1109/GLOCOM.2018.8647463","url":"https://dblp.org/rec/conf/globecom/BarabadiTM18"}, "url":"URL#2566827" }, { "@score":"1", "@id":"2566829", "info":{"authors":{"author":[{"@pid":"34/10618","text":"Giulio Bartoli"},{"@pid":"51/3942","text":"Romano Fantacci"},{"@pid":"10/2191","text":"Dania Marabissi"}]},"title":"An Efficient Two-tier MAC Scheme for Satellite Machine-to-Machine Communications.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BartoliFM18","doi":"10.1109/GLOCOM.2018.8647738","ee":"https://doi.org/10.1109/GLOCOM.2018.8647738","url":"https://dblp.org/rec/conf/globecom/BartoliFM18"}, "url":"URL#2566829" }, { "@score":"1", "@id":"2566831", "info":{"authors":{"author":[{"@pid":"115/6399","text":"Celalettin Umit Bas"},{"@pid":"06/2293-26","text":"Rui Wang 0026"},{"@pid":"119/0360","text":"Seun Sangodoyin"},{"@pid":"56/1645","text":"Sooyoung Hur"},{"@pid":"183/6528","text":"Kuyeon Whang"},{"@pid":"87/4354","text":"Jeongho Park"},{"@pid":"78/6091-2","text":"Jianzhong Zhang 0002"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"28 GHz Foliage Propagation Channel Measurements.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BasWSHWPZM18","doi":"10.1109/GLOCOM.2018.8647674","ee":"https://doi.org/10.1109/GLOCOM.2018.8647674","url":"https://dblp.org/rec/conf/globecom/BasWSHWPZM18"}, "url":"URL#2566831" }, { "@score":"1", "@id":"2566833", "info":{"authors":{"author":[{"@pid":"117/3684","text":"Dushyantha A. Basnayaka"},{"@pid":"12/2168","text":"Harald Haas"},{"@pid":"69/6831","text":"Tharmalingam Ratnarajah"}]},"title":"Doppler Effect Assisted Interference Mitigation for Wireless Communication.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BasnayakaHR18","doi":"10.1109/GLOCOM.2018.8647239","ee":"https://doi.org/10.1109/GLOCOM.2018.8647239","url":"https://dblp.org/rec/conf/globecom/BasnayakaHR18"}, "url":"URL#2566833" }, { "@score":"1", "@id":"2566834", "info":{"authors":{"author":[{"@pid":"199/8234","text":"Narangerelt Batsoyol"},{"@pid":"97/3365","text":"HyungJune Lee"}]},"title":"Towards Self-Organizing UAV Ad-Hoc Networks Through Collaborative Sensing and Deployment.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BatsoyolL18","doi":"10.1109/GLOCOM.2018.8647985","ee":"https://doi.org/10.1109/GLOCOM.2018.8647985","url":"https://dblp.org/rec/conf/globecom/BatsoyolL18"}, "url":"URL#2566834" }, { "@score":"1", "@id":"2566835", "info":{"authors":{"author":[{"@pid":"10/10891","text":"Luca Bedogni"},{"@pid":"47/2386","text":"Marco Levorato"}]},"title":"Rising User Privacy Against Predictive Context Awareness Through Adversarial Information Injection.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BedogniL18","doi":"10.1109/GLOCOM.2018.8648104","ee":"https://doi.org/10.1109/GLOCOM.2018.8648104","url":"https://dblp.org/rec/conf/globecom/BedogniL18"}, "url":"URL#2566835" }, { "@score":"1", "@id":"2566837", "info":{"authors":{"author":[{"@pid":"228/2655","text":"Oussama Bekkouche"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"00/2807","text":"Miloud Bagaa"}]},"title":"UAVs Traffic Control Based on Multi-Access Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BekkoucheTB18","doi":"10.1109/GLOCOM.2018.8647421","ee":"https://doi.org/10.1109/GLOCOM.2018.8647421","url":"https://dblp.org/rec/conf/globecom/BekkoucheTB18"}, "url":"URL#2566837" }, { "@score":"1", "@id":"2566839", "info":{"authors":{"author":[{"@pid":"211/8999","text":"Taha Belkhouja"},{"@pid":"34/9386","text":"Amr Mohamed 0001"},{"@pid":"130/9027","text":"Abdulla K. Al-Ali"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BelkhoujaMADG18","doi":"10.1109/GLOCOM.2018.8647207","ee":"https://doi.org/10.1109/GLOCOM.2018.8647207","url":"https://dblp.org/rec/conf/globecom/BelkhoujaMADG18"}, "url":"URL#2566839" }, { "@score":"1", "@id":"2566840", "info":{"authors":{"author":[{"@pid":"220/3012","text":"Ilias Benkacem"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"210/5149","text":"Quang Ngoc Nguyen"},{"@pid":"123/5557","text":"Toshitaka Tsuda"},{"@pid":"34/2036","text":"Takuro Sato"}]},"title":"Integrated ICN and CDN Slice as a Service.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BenkacemBTNTS18","doi":"10.1109/GLOCOM.2018.8648051","ee":"https://doi.org/10.1109/GLOCOM.2018.8648051","url":"https://dblp.org/rec/conf/globecom/BenkacemBTNTS18"}, "url":"URL#2566840" }, { "@score":"1", "@id":"2566841", "info":{"authors":{"author":[{"@pid":"125/1955","text":"Fatma Benkhelifa"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Practical Nonlinear Energy Harvesting Model in MIMO DF Relay System with Channel Uncertainty.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BenkhelifaA18","doi":"10.1109/GLOCOM.2018.8647241","ee":"https://doi.org/10.1109/GLOCOM.2018.8647241","url":"https://dblp.org/rec/conf/globecom/BenkhelifaA18"}, "url":"URL#2566841" }, { "@score":"1", "@id":"2566842", "info":{"authors":{"author":[{"@pid":"125/1955","text":"Fatma Benkhelifa"},{"@pid":"18/10799","text":"Hesham ElSawy"},{"@pid":"m/JulieAMcCann","text":"Julie A. McCann"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Recycling Cellular Downlink Energy for Overlay Self-Sustainable IoT Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BenkhelifaEMA18","doi":"10.1109/GLOCOM.2018.8647615","ee":"https://doi.org/10.1109/GLOCOM.2018.8647615","url":"https://dblp.org/rec/conf/globecom/BenkhelifaEMA18"}, "url":"URL#2566842" }, { "@score":"1", "@id":"2566843", "info":{"authors":{"author":[{"@pid":"46/6276","text":"Debajyoti Bera"},{"@pid":"78/1529","text":"Flavio Esposito"},{"@pid":"236/2873","text":"Meghan Pendyala"}]},"title":"Maximal Labelled-Clique and Click-Biclique Problems for Networked Community Detection.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BeraEP18","doi":"10.1109/GLOCOM.2018.8647563","ee":"https://doi.org/10.1109/GLOCOM.2018.8647563","url":"https://dblp.org/rec/conf/globecom/BeraEP18"}, "url":"URL#2566843" }, { "@score":"1", "@id":"2566844", "info":{"authors":{"author":[{"@pid":"28/3991","text":"Roberto Beraldi"},{"@pid":"01/3034","text":"Abderrahmen Mtibaa"},{"@pid":"41/74","text":"Adnan Noor Mian"}]},"title":"CICO: A Credit-Based Incentive Mechanism for COoperative Fog Computing Paradigms.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BeraldiMM18","doi":"10.1109/GLOCOM.2018.8647959","ee":"https://doi.org/10.1109/GLOCOM.2018.8647959","url":"https://dblp.org/rec/conf/globecom/BeraldiMM18"}, "url":"URL#2566844" }, { "@score":"1", "@id":"2566846", "info":{"authors":{"author":[{"@pid":"125/2057","text":"Ali Bereyhi"},{"@pid":"199/1898","text":"Saba Asaad"},{"@pid":"29/103","text":"Ralf R. Müller"},{"@pid":"90/5247","text":"Rafael F. Schaefer"},{"@pid":"77/6417","text":"Amir Masoud Rabiei"}]},"title":"On Robustness of Massive MIMO Systems against Passive Eavesdropping under Antenna Selection.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BereyhiAMSR18","doi":"10.1109/GLOCOM.2018.8647880","ee":"https://doi.org/10.1109/GLOCOM.2018.8647880","url":"https://dblp.org/rec/conf/globecom/BereyhiAMSR18"}, "url":"URL#2566846" }, { "@score":"1", "@id":"2566847", "info":{"authors":{"author":[{"@pid":"215/3542","text":"K. Vikas Bharadwaj"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"}]},"title":"Construction of Index Codes for Interlinked Cycle Structures with Outer Cycles.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BharadwajR18","doi":"10.1109/GLOCOM.2018.8647456","ee":"https://doi.org/10.1109/GLOCOM.2018.8647456","url":"https://dblp.org/rec/conf/globecom/BharadwajR18"}, "url":"URL#2566847" }, { "@score":"1", "@id":"2566849", "info":{"authors":{"author":[{"@pid":"226/6035","text":"Sumitro Bhaumik"},{"@pid":"236/3032","text":"Rohit Dhangar"},{"@pid":"236/3160","text":"Gouranga Murari"},{"@pid":"236/2952","text":"Swapnil Kumar Bishnu"},{"@pid":"28/9571","text":"Sandip Chakraborty"}]},"title":"Shared Storage Software Defined Data Centers: Analyzing VM Migration Based on Application Workloads.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BhaumikDMBC18","doi":"10.1109/GLOCOM.2018.8647761","ee":"https://doi.org/10.1109/GLOCOM.2018.8647761","url":"https://dblp.org/rec/conf/globecom/BhaumikDMBC18"}, "url":"URL#2566849" }, { "@score":"1", "@id":"2566850", "info":{"authors":{"author":[{"@pid":"69/10261","text":"Sourav Kumar Bhoi"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"154/0895","text":"Deepak Puthal"},{"@pid":"187/9904","text":"Munesh Singh"},{"@pid":"35/10056","text":"Kuei-Fang Hsiao"}]},"title":"Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BhoiOPSH18","doi":"10.1109/GLOCOM.2018.8647321","ee":"https://doi.org/10.1109/GLOCOM.2018.8647321","url":"https://dblp.org/rec/conf/globecom/BhoiOPSH18"}, "url":"URL#2566850" }, { "@score":"1", "@id":"2566851", "info":{"authors":{"author":[{"@pid":"236/2944","text":"Habtamu Mohammed Birhanie"},{"@pid":"133/5477","text":"Mohamed Ayoub Messous"},{"@pid":"75/1717","text":"Sidi-Mohammed Senouci"},{"@pid":"158/4652","text":"El-Hassane Aglzim"},{"@pid":"139/0914","text":"Ahmedin Mohammed Ahmed"}]},"title":"MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BirhanieMSAA18","doi":"10.1109/GLOCOM.2018.8648081","ee":"https://doi.org/10.1109/GLOCOM.2018.8648081","url":"https://dblp.org/rec/conf/globecom/BirhanieMSAA18"}, "url":"URL#2566851" }, { "@score":"1", "@id":"2566853", "info":{"authors":{"author":[{"@pid":"11/4640","text":"Igor Bisio"},{"@pid":"176/0696","text":"Chiara Garibotto"},{"@pid":"42/263","text":"Fabio Lavagetto"},{"@pid":"33/11298","text":"Andrea Sciarrone"},{"@pid":"40/122","text":"Sandro Zappatore"}]},"title":"Improving WiFi Statistical Fingerprint-Based Detection Techniques Against UAV Stealth Attacks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BisioGLSZ18","doi":"10.1109/GLOCOM.2018.8647288","ee":"https://doi.org/10.1109/GLOCOM.2018.8647288","url":"https://dblp.org/rec/conf/globecom/BisioGLSZ18"}, "url":"URL#2566853" }, { "@score":"1", "@id":"2566854", "info":{"authors":{"author":[{"@pid":"143/0984","text":"Sinchan Biswas"},{"@pid":"125/5375","text":"Steffi Knorn"},{"@pid":"24/4143","text":"Subhrakanti Dey"},{"@pid":"23/2677","text":"Anders Ahlén"}]},"title":"Quantized Non-Bayesian Quickest Change Detection with Energy Harvesting.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BiswasKDA18","doi":"10.1109/GLOCOM.2018.8647715","ee":"https://doi.org/10.1109/GLOCOM.2018.8647715","url":"https://dblp.org/rec/conf/globecom/BiswasKDA18"}, "url":"URL#2566854" }, { "@score":"1", "@id":"2566855", "info":{"authors":{"author":[{"@pid":"87/8236","text":"Sudip Biswas"},{"@pid":"132/7939","text":"Keshav Singh"},{"@pid":"143/5148","text":"Omid Taghizadeh"},{"@pid":"69/6831","text":"Tharmalingam Ratnarajah"}]},"title":"QoS-Based Robust Transceiver Design for Coexistence of MIMO Radar and FD MU-MIMO Cellular System.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BiswasSTR18","doi":"10.1109/GLOCOM.2018.8647630","ee":"https://doi.org/10.1109/GLOCOM.2018.8647630","url":"https://dblp.org/rec/conf/globecom/BiswasSTR18"}, "url":"URL#2566855" }, { "@score":"1", "@id":"2566856", "info":{"authors":{"author":[{"@pid":"192/1357","text":"Andrea Bonfante"},{"@pid":"77/6988","text":"Lorenzo Galati Giordano"},{"@pid":"38/7211","text":"David López-Pérez"},{"@pid":"147/1274","text":"Adrian García-Rodríguez"},{"@pid":"28/10806","text":"Giovanni Geraci"},{"@pid":"30/8283","text":"Paolo Baracca"},{"@pid":"92/7804","text":"M. Majid Butt"},{"@pid":"130/3509","text":"Merim Dzaferagic"},{"@pid":"20/4118","text":"Nicola Marchetti"}]},"title":"Performance of Massive MIMO Self-Backhauling for Ultra-Dense Small Cell Deployments.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BonfanteGLGGBBD18","doi":"10.1109/GLOCOM.2018.8647638","ee":"https://doi.org/10.1109/GLOCOM.2018.8647638","url":"https://dblp.org/rec/conf/globecom/BonfanteGLGGBBD18"}, "url":"URL#2566856" }, { "@score":"1", "@id":"2566858", "info":{"authors":{"author":[{"@pid":"184/3910","text":"Ikram Boukhedimi"},{"@pid":"52/6564","text":"Abla Kammoun"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Line-of-Sight and Pilot Contamination Effects on Correlated Multi-Cell Massive MIMO Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BoukhedimiKA18","doi":"10.1109/GLOCOM.2018.8647420","ee":"https://doi.org/10.1109/GLOCOM.2018.8647420","url":"https://dblp.org/rec/conf/globecom/BoukhedimiKA18"}, "url":"URL#2566858" }, { "@score":"1", "@id":"2566859", "info":{"authors":{"author":[{"@pid":"184/5907","text":"Emilien Bourdy"},{"@pid":"86/2285","text":"Kandaraj Piamrat"},{"@pid":"h/MichelHerbin","text":"Michel Herbin"},{"@pid":"47/3278","text":"Hacène Fouchal"}]},"title":"New Method for Exemplar Selection and Application to VANET Experimentation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BourdyPHF18","doi":"10.1109/GLOCOM.2018.8647908","ee":"https://doi.org/10.1109/GLOCOM.2018.8647908","url":"https://dblp.org/rec/conf/globecom/BourdyPHF18"}, "url":"URL#2566859" }, { "@score":"1", "@id":"2566860", "info":{"authors":{"author":[{"@pid":"236/2975","text":"EL Hocine Bouzidi"},{"@pid":"191/2299","text":"Duc-Hung Luong"},{"@pid":"14/7662","text":"Abdelkader Outtagarts"},{"@pid":"178/3149","text":"Abdelkrim Hebbar"},{"@pid":"82/2229","text":"Rami Langar"}]},"title":"Online-Based Learning for Predictive Network Latency in Software-Defined Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BouzidiLOHL18","doi":"10.1109/GLOCOM.2018.8648063","ee":"https://doi.org/10.1109/GLOCOM.2018.8648063","url":"https://dblp.org/rec/conf/globecom/BouzidiLOHL18"}, "url":"URL#2566860" }, { "@score":"1", "@id":"2566862", "info":{"authors":{"author":[{"@pid":"206/3710","text":"Arash Bozorgchenani"},{"@pid":"23/3388","text":"Daniele Tarchi"},{"@pid":"62/2194","text":"Giovanni Emanuele Corazza"}]},"title":"Mobile Edge Computing Partial Offloading Techniques for Mobile Urban Scenarios.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BozorgchenaniTC18","doi":"10.1109/GLOCOM.2018.8647240","ee":"https://doi.org/10.1109/GLOCOM.2018.8647240","url":"https://dblp.org/rec/conf/globecom/BozorgchenaniTC18"}, "url":"URL#2566862" }, { "@score":"1", "@id":"2566864", "info":{"authors":{"author":[{"@pid":"236/3168","text":"Salma Brihi"},{"@pid":"154/3511","text":"Abdellaziz Walid"},{"@pid":"75/178","text":"Jalel Ben-Othman"},{"@pid":"06/1734","text":"Mohammed El Koutbi"}]},"title":"A New Profile-QoS Aware User Association Scheme for 5G Ultra-Dense mmW-µW HetNets.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BrihiWBK18","doi":"10.1109/GLOCOM.2018.8647695","ee":"https://doi.org/10.1109/GLOCOM.2018.8647695","url":"https://dblp.org/rec/conf/globecom/BrihiWBK18"}, "url":"URL#2566864" }, { "@score":"1", "@id":"2566865", "info":{"authors":{"author":[{"@pid":"236/3127","text":"Ishan Budhiraja"},{"@pid":"128/3320","text":"Sudhanshu Tyagi"},{"@pid":"138/1054","text":"Sudeep Tanwar"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"CR-NOMA Based Interference Mitigation Scheme for 5G Femtocells Users.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/BudhirajaTTKG18","doi":"10.1109/GLOCOM.2018.8647354","ee":"https://doi.org/10.1109/GLOCOM.2018.8647354","url":"https://dblp.org/rec/conf/globecom/BudhirajaTTKG18"}, "url":"URL#2566865" }, { "@score":"1", "@id":"2566866", "info":{"authors":{"author":[{"@pid":"202/5458","text":"Thai-Chien Bui"},{"@pid":"60/4488","text":"Mauro Biagi"},{"@pid":"236/3016","text":"Suwit Kiravittaya"}]},"title":"Theoretical Analysis of Optical Spatial Multiple Pulse Position Modulation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BuiBK18","doi":"10.1109/GLOCOM.2018.8647138","ee":"https://doi.org/10.1109/GLOCOM.2018.8647138","url":"https://dblp.org/rec/conf/globecom/BuiBK18"}, "url":"URL#2566866" }, { "@score":"1", "@id":"2566869", "info":{"authors":{"author":[{"@pid":"213/0913","text":"Sherif Adeshina Busari"},{"@pid":"54/7413","text":"Kazi Mohammed Saidul Huq"},{"@pid":"236/2836","text":"Ghassen Felfel"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"}]},"title":"Adaptive Resource Allocation for Energy-Efficient Millimeter-Wave Massive MIMO Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BusariHFR18","doi":"10.1109/GLOCOM.2018.8647877","ee":"https://doi.org/10.1109/GLOCOM.2018.8647877","url":"https://dblp.org/rec/conf/globecom/BusariHFR18"}, "url":"URL#2566869" }, { "@score":"1", "@id":"2566872", "info":{"authors":{"author":[{"@pid":"207/9719","text":"Osama M. Bushnaq"},{"@pid":"158/4618","text":"Abdulkadir Celik"},{"@pid":"18/10799","text":"Hesham ElSawy"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"},{"@pid":"00/384","text":"Tareq Y. Al-Naffouri"}]},"title":"Aerial Data Aggregation in IoT Networks: Hovering & Traveling Time Dilemma.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/BushnaqCEAA18","doi":"10.1109/GLOCOM.2018.8647311","ee":"https://doi.org/10.1109/GLOCOM.2018.8647311","url":"https://dblp.org/rec/conf/globecom/BushnaqCEAA18"}, "url":"URL#2566872" }, { "@score":"1", "@id":"2566873", "info":{"authors":{"author":[{"@pid":"236/3251","text":"Xiuzhang Cai"},{"@pid":"65/8230","text":"Chong Han"},{"@pid":"61/7824","text":"Kamal Sarabandi"}]},"title":"Phenomenology of Foliage Effect on 5G Millimeter-Wave V2V Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CaiHS18","doi":"10.1109/GLOCOM.2018.8647937","ee":"https://doi.org/10.1109/GLOCOM.2018.8647937","url":"https://dblp.org/rec/conf/globecom/CaiHS18"}, "url":"URL#2566873" }, { "@score":"1", "@id":"2566875", "info":{"authors":{"author":[{"@pid":"207/7579","text":"Ersoy Caliskan"},{"@pid":"207/7643","text":"Ali Maatouk"},{"@pid":"24/482","text":"Mutlu Koca"},{"@pid":"18/338","text":"Mohamad Assaad"},{"@pid":"16/8146","text":"Guan Gui 0001"},{"@pid":"24/1478","text":"Hikmet Sari"}]},"title":"A Simple NOMA Scheme with Optimum Detection.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CaliskanMKAGS18","doi":"10.1109/GLOCOM.2018.8647597","ee":"https://doi.org/10.1109/GLOCOM.2018.8647597","url":"https://dblp.org/rec/conf/globecom/CaliskanMKAGS18"}, "url":"URL#2566875" }, { "@score":"1", "@id":"2566876", "info":{"authors":{"author":[{"@pid":"217/8257","text":"Davide Callegaro"},{"@pid":"47/2386","text":"Marco Levorato"}]},"title":"Optimal Computation Offloading in Edge-Assisted UAV Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CallegaroL18","doi":"10.1109/GLOCOM.2018.8648099","ee":"https://doi.org/10.1109/GLOCOM.2018.8648099","url":"https://dblp.org/rec/conf/globecom/CallegaroL18"}, "url":"URL#2566876" }, { "@score":"1", "@id":"2566878", "info":{"authors":{"author":[{"@pid":"54/6265-3","text":"Wei Cao 0003"},{"@pid":"122/5016","text":"Alex Dytso"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"05/1539-2","text":"Zhi Chen 0002"}]},"title":"Group Paging for Massive Machine-Type Communications with Diverse Access Requirements.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CaoDFPC18","doi":"10.1109/GLOCOM.2018.8647767","ee":"https://doi.org/10.1109/GLOCOM.2018.8647767","url":"https://dblp.org/rec/conf/globecom/CaoDFPC18"}, "url":"URL#2566878" }, { "@score":"1", "@id":"2566883", "info":{"authors":{"author":[{"@pid":"224/0942","text":"Miaomiao Cao"},{"@pid":"172/2801","text":"Qiqi Shuai"},{"@pid":"74/571","text":"Victor O. K. Li"}]},"title":"Navigation-Based Traffic Signal Control in Intelligent Transportation Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CaoSL18","doi":"10.1109/GLOCOM.2018.8647310","ee":"https://doi.org/10.1109/GLOCOM.2018.8647310","url":"https://dblp.org/rec/conf/globecom/CaoSL18"}, "url":"URL#2566883" }, { "@score":"1", "@id":"2566885", "info":{"authors":{"author":[{"@pid":"36/5024","text":"Yongsheng Cao"},{"@pid":"04/8707","text":"Guanglin Zhang"},{"@pid":"93/803","text":"Demin Li"},{"@pid":"17/6729-22","text":"Lin Wang 0022"}]},"title":"Online Energy Management for Smart Communities with Heterogeneous Demands.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CaoZLW18","doi":"10.1109/GLOCOM.2018.8647752","ee":"https://doi.org/10.1109/GLOCOM.2018.8647752","url":"https://dblp.org/rec/conf/globecom/CaoZLW18"}, "url":"URL#2566885" }, { "@score":"1", "@id":"2566886", "info":{"authors":{"author":[{"@pid":"222/8364","text":"Martina Capuzzo"},{"@pid":"203/9625","text":"Davide Magrin"},{"@pid":"40/5059","text":"Andrea Zanella"}]},"title":"Mathematical Modeling of LoRa WAN Performance with Bi-directional Traffic.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CapuzzoMZ18","doi":"10.1109/GLOCOM.2018.8647351","ee":"https://doi.org/10.1109/GLOCOM.2018.8647351","url":"https://dblp.org/rec/conf/globecom/CapuzzoMZ18"}, "url":"URL#2566886" }, { "@score":"1", "@id":"2566887", "info":{"authors":{"author":[{"@pid":"28/386","text":"Renato L. G. Cavalcante"},{"@pid":"218/6689","text":"Lorenzo Miretti"},{"@pid":"s/SlawomirStanczak","text":"Slawomir Stanczak"}]},"title":"Error Bounds for FDD Massive MIMO Channel Covariance Conversion with Set-Theoretic Methods.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CavalcanteMS18","doi":"10.1109/GLOCOM.2018.8647609","ee":"https://doi.org/10.1109/GLOCOM.2018.8647609","url":"https://dblp.org/rec/conf/globecom/CavalcanteMS18"}, "url":"URL#2566887" }, { "@score":"1", "@id":"2566889", "info":{"authors":{"author":[{"@pid":"97/7478","text":"Sung Ho Chae"},{"@pid":"22/1509","text":"Sang-Woon Jeon"},{"@pid":"93/376","text":"Cheol Jeong"}]},"title":"Sub-Band and Power Allocation for IoT Cellular Networks in the Presence of Inter-Band Interference.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChaeJJ18","doi":"10.1109/GLOCOM.2018.8647829","ee":"https://doi.org/10.1109/GLOCOM.2018.8647829","url":"https://dblp.org/rec/conf/globecom/ChaeJJ18"}, "url":"URL#2566889" }, { "@score":"1", "@id":"2566890", "info":{"authors":{"author":[{"@pid":"210/3492","text":"Yuna Chai"},{"@pid":"d/HongWeiDu","text":"Hongwei Du 0001"},{"@pid":"31/334-1","text":"Qiang Ye 0001"},{"@pid":"52/1800-7","text":"Chuang Liu 0007"},{"@pid":"42/1870","text":"Wen Xu"},{"@pid":"94/4084","text":"Chen Zhang"}]},"title":"An Energy-Efficient Multicasting Algorithm for Duty-Cycled WSNs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChaiDYLXZ18","doi":"10.1109/GLOCOM.2018.8647642","ee":"https://doi.org/10.1109/GLOCOM.2018.8647642","url":"https://dblp.org/rec/conf/globecom/ChaiDYLXZ18"}, "url":"URL#2566890" }, { "@score":"1", "@id":"2566891", "info":{"authors":{"author":[{"@pid":"236/2897","text":"Jinlong Chai"},{"@pid":"76/847-1","text":"Lei Feng 0001"},{"@pid":"137/4178","text":"Fanqin Zhou"},{"@pid":"61/3903-2","text":"Pan Zhao 0002"},{"@pid":"50/2599-1","text":"Peng Yu 0001"},{"@pid":"08/6548-1","text":"Wenjing Li 0001"}]},"title":"Energy-Efficient Resource Allocation Based on Hypergraph 3D Matching for D2D-Assisted mMTC Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChaiFZZYL18","doi":"10.1109/GLOCOM.2018.8647400","ee":"https://doi.org/10.1109/GLOCOM.2018.8647400","url":"https://dblp.org/rec/conf/globecom/ChaiFZZYL18"}, "url":"URL#2566891" }, { "@score":"1", "@id":"2566892", "info":{"authors":{"author":[{"@pid":"236/3085","text":"Ravishankar Chamarajnagar"},{"@pid":"48/1535","text":"Ashwin Ashok"}]},"title":"Opportunistic Mobile IoT with Blockchain Based Collaboration.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChamarajnagarA18","doi":"10.1109/GLOCOM.2018.8647756","ee":"https://doi.org/10.1109/GLOCOM.2018.8647756","url":"https://dblp.org/rec/conf/globecom/ChamarajnagarA18"}, "url":"URL#2566892" }, { "@score":"1", "@id":"2566893", "info":{"authors":{"author":[{"@pid":"186/9648","text":"Hengtai Chang"},{"@pid":"137/3358","text":"Ji Bian"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"36/3908","text":"Zhiquan Bai"},{"@pid":"68/4942-13","text":"Jian Sun 0013"},{"@pid":"315/0856","text":"Xiqi Gao"}]},"title":"A 3D Wideband Geometry-Based Stochastic Model for UAV Air-to-Ground Channels.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChangBWBSG18","doi":"10.1109/GLOCOM.2018.8647214","ee":"https://doi.org/10.1109/GLOCOM.2018.8647214","url":"https://dblp.org/rec/conf/globecom/ChangBWBSG18"}, "url":"URL#2566893" }, { "@score":"1", "@id":"2566894", "info":{"authors":{"author":[{"@pid":"70/9166","text":"Chia-Yu Chang"},{"@pid":"203/4079","text":"Lukasz Kulacz"},{"@pid":"03/2422-1","text":"Robert Schmidt 0001"},{"@pid":"82/8335","text":"Adrian Kliks"},{"@pid":"79/8","text":"Navid Nikaein"}]},"title":"Spectrum Management Application - A Tool for Flexible and Efficient Resource Utilization.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChangKSKN18","doi":"10.1109/GLOCOM.2018.8647184","ee":"https://doi.org/10.1109/GLOCOM.2018.8647184","url":"https://dblp.org/rec/conf/globecom/ChangKSKN18"}, "url":"URL#2566894" }, { "@score":"1", "@id":"2566895", "info":{"authors":{"author":[{"@pid":"43/7884","text":"Ronald Y. Chang"},{"@pid":"236/3342","text":"Shing-Jiuan Liu"},{"@pid":"182/7318","text":"Yen-Kai Cheng"}]},"title":"Device-Free Indoor Localization Using Wi-Fi Channel State Information for Internet of Things.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChangLC18","doi":"10.1109/GLOCOM.2018.8647261","ee":"https://doi.org/10.1109/GLOCOM.2018.8647261","url":"https://dblp.org/rec/conf/globecom/ChangLC18"}, "url":"URL#2566895" }, { "@score":"1", "@id":"2566896", "info":{"authors":{"author":[{"@pid":"176/3845","text":"Peiliang Chang"},{"@pid":"87/5132","text":"Guowang Miao"}]},"title":"Resource Provision for Energy-Efficient Mobile Edge Computing Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChangM18","doi":"10.1109/GLOCOM.2018.8648008","ee":"https://doi.org/10.1109/GLOCOM.2018.8648008","url":"https://dblp.org/rec/conf/globecom/ChangM18"}, "url":"URL#2566896" }, { "@score":"1", "@id":"2566897", "info":{"authors":{"author":[{"@pid":"85/624","text":"Wei-Ting Chang"},{"@pid":"19/543","text":"Ravi Tandon"}]},"title":"On the Capacity of Secure Distributed Matrix Multiplication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChangT18","doi":"10.1109/GLOCOM.2018.8647313","ee":"https://doi.org/10.1109/GLOCOM.2018.8647313","url":"https://dblp.org/rec/conf/globecom/ChangT18"}, "url":"URL#2566897" }, { "@score":"1", "@id":"2566898", "info":{"authors":{"author":[{"@pid":"123/3178","text":"Tzu-Wen Chang"},{"@pid":"127/0996","text":"Yao-Jen Tang"},{"@pid":"38/915","text":"Yu-Shu Chen"},{"@pid":"236/3346","text":"Wei-Han Hsu"},{"@pid":"01/6021","text":"Ming-Jer Tsai"}]},"title":"Maximum Concurrent Flow Problem in MPLS-Based Software Defined Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChangTCHT18","doi":"10.1109/GLOCOM.2018.8648112","ee":"https://doi.org/10.1109/GLOCOM.2018.8648112","url":"https://dblp.org/rec/conf/globecom/ChangTCHT18"}, "url":"URL#2566898" }, { "@score":"1", "@id":"2566900", "info":{"authors":{"author":[{"@pid":"120/7763","text":"Shubhajeet Chatterjee"},{"@pid":"63/8805","text":"Mohammad J. Abdel-Rahman"},{"@pid":"87/2959","text":"Allen B. MacKenzie"}]},"title":"Virtualization Framework for Cellular Networks with Downlink Rate Coverage Probability Constraints.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChatterjeeAM18","doi":"10.1109/GLOCOM.2018.8647821","ee":"https://doi.org/10.1109/GLOCOM.2018.8647821","url":"https://dblp.org/rec/conf/globecom/ChatterjeeAM18"}, "url":"URL#2566900" }, { "@score":"1", "@id":"2566903", "info":{"authors":{"author":[{"@pid":"203/2906","text":"Djabir Abdeldjalil Chekired"},{"@pid":"152/9528","text":"Mohammed Amine Togou"},{"@pid":"74/90","text":"Lyes Khoukhi"}]},"title":"A Hybrid SDN Path Computation for Scaling Data Centers Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChekiredTK18","doi":"10.1109/GLOCOM.2018.8647481","ee":"https://doi.org/10.1109/GLOCOM.2018.8647481","url":"https://dblp.org/rec/conf/globecom/ChekiredTK18"}, "url":"URL#2566903" }, { "@score":"1", "@id":"2566905", "info":{"authors":{"author":[{"@pid":"01/448","text":"Wei-Yu Chen"},{"@pid":"06/4397","text":"Bor-Sen Chen"},{"@pid":"21/7029","text":"Wen-Tsuen Chen"}]},"title":"Robust Minimax MSE Transceiver and Power Splitting Design for Multiuser MIMO SWIPT: An LMI Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenCC18","doi":"10.1109/GLOCOM.2018.8647888","ee":"https://doi.org/10.1109/GLOCOM.2018.8647888","url":"https://dblp.org/rec/conf/globecom/ChenCC18"}, "url":"URL#2566905" }, { "@score":"1", "@id":"2566906", "info":{"authors":{"author":[{"@pid":"38/915","text":"Yu-Shu Chen"},{"@pid":"01/7486","text":"Shih-Ying Chang"},{"@pid":"123/3178","text":"Tzu-Wen Chang"},{"@pid":"01/6021","text":"Ming-Jer Tsai"}]},"title":"Multiple Sink Placement with Latency and Reliability Guarantee in Lossy Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenCCT18","doi":"10.1109/GLOCOM.2018.8647965","ee":"https://doi.org/10.1109/GLOCOM.2018.8647965","url":"https://dblp.org/rec/conf/globecom/ChenCCT18"}, "url":"URL#2566906" }, { "@score":"1", "@id":"2566907", "info":{"authors":{"author":[{"@pid":"84/7543-4","text":"Xiangyu Chen 0004"},{"@pid":"61/2422","text":"Ka-Cheong Leung"}]},"title":"A Game Theoretic Approach to Vehicle-to-Grid Scheduling.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenL18","doi":"10.1109/GLOCOM.2018.8647357","ee":"https://doi.org/10.1109/GLOCOM.2018.8647357","url":"https://dblp.org/rec/conf/globecom/ChenL18"}, "url":"URL#2566907" }, { "@score":"1", "@id":"2566909", "info":{"authors":{"author":[{"@pid":"07/6433","text":"Shuang Chen"},{"@pid":"99/76-1","text":"Min Liu 0001"},{"@pid":"99/4923","text":"Sheng Sun"},{"@pid":"137/0200","text":"Zhenzhen Jiao"},{"@pid":"04/6901","text":"Meng Zhang"},{"@pid":"47/4826","text":"Dong Li"}]},"title":"Socially Aware Task Selection Game for Users in Mobile Crowdsensing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenLSJZL18","doi":"10.1109/GLOCOM.2018.8647304","ee":"https://doi.org/10.1109/GLOCOM.2018.8647304","url":"https://dblp.org/rec/conf/globecom/ChenLSJZL18"}, "url":"URL#2566909" }, { "@score":"1", "@id":"2566910", "info":{"authors":{"author":[{"@pid":"16/9901","text":"Jieqiong Chen"},{"@pid":"48/314","text":"Guoqiang Mao"}]},"title":"Secure Message Dissemination in Vehicular Networks: A Topological Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChenM18","doi":"10.1109/GLOCOM.2018.8647910","ee":"https://doi.org/10.1109/GLOCOM.2018.8647910","url":"https://dblp.org/rec/conf/globecom/ChenM18"}, "url":"URL#2566910" }, { "@score":"1", "@id":"2566912", "info":{"authors":{"author":[{"@pid":"210/6130","text":"Kangjian Chen"},{"@pid":"40/8785","text":"Chenhao Qi 0001"}]},"title":"Beam Design with Quantized Phase Shifters for Millimeter Wave Massive MIMO.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenQ18","doi":"10.1109/GLOCOM.2018.8647641","ee":"https://doi.org/10.1109/GLOCOM.2018.8647641","url":"https://dblp.org/rec/conf/globecom/ChenQ18"}, "url":"URL#2566912" }, { "@score":"1", "@id":"2566913", "info":{"authors":{"author":[{"@pid":"92/6289-76","text":"Jie Chen 0076"},{"@pid":"s/BiplabSikdar","text":"Biplab Sikdar 0001"},{"@pid":"38/6823","text":"Mounir Hamdi"}]},"title":"An Adaptive N-Policy Queueing System Design for Energy Efficient and Delay Sensitive Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChenSH18","doi":"10.1109/GLOCOM.2018.8647601","ee":"https://doi.org/10.1109/GLOCOM.2018.8647601","url":"https://dblp.org/rec/conf/globecom/ChenSH18"}, "url":"URL#2566913" }, { "@score":"1", "@id":"2566914", "info":{"authors":{"author":[{"@pid":"57/1772","text":"Xiaomin Chen"},{"@pid":"48/944","text":"Zhan Shu"},{"@pid":"125/8938","text":"Kezhi Wang"},{"@pid":"05/3630","text":"Fangmin Xu"},{"@pid":"74/5570-2","text":"Yue Cao 0002"}]},"title":"Proportional Fairness in Wireless Powered CSMA/CA Based IoT Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenSWXC18","doi":"10.1109/GLOCOM.2018.8648072","ee":"https://doi.org/10.1109/GLOCOM.2018.8648072","url":"https://dblp.org/rec/conf/globecom/ChenSWXC18"}, "url":"URL#2566914" }, { "@score":"1", "@id":"2566916", "info":{"authors":{"author":[{"@pid":"93/3669-2","text":"Zhao Chen 0002"},{"@pid":"16/1093","text":"Xiaoming Tao"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"59/3894","text":"Jianhua Lu"}]},"title":"Joint Wired and Wireless Traffic Minimization for Energy-Efficient Content Delivery Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChenTJL18","doi":"10.1109/GLOCOM.2018.8647497","ee":"https://doi.org/10.1109/GLOCOM.2018.8647497","url":"https://dblp.org/rec/conf/globecom/ChenTJL18"}, "url":"URL#2566916" }, { "@score":"1", "@id":"2566917", "info":{"authors":{"author":[{"@pid":"162/0107","text":"Erkai Chen"},{"@pid":"85/4712","text":"Meixia Tao"},{"@pid":"28/6297","text":"Nan Zhang"}]},"title":"User-Centric Joint Access-Backhaul Design for Full-Duplex Self-Backhauled Cooperative Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenTZ18","doi":"10.1109/GLOCOM.2018.8647386","ee":"https://doi.org/10.1109/GLOCOM.2018.8647386","url":"https://dblp.org/rec/conf/globecom/ChenTZ18"}, "url":"URL#2566917" }, { "@score":"1", "@id":"2566919", "info":{"authors":{"author":[{"@pid":"65/4423-48","text":"Chen Chen 0048"},{"@pid":"37/7910","text":"Gongpu Wang"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"e/YoninaCEldar","text":"Yonina C. Eldar"},{"@pid":"39/9508","text":"Hao Guan"}]},"title":"Blind Detection for Ambient Backscatter Communication System with Multiple-Antenna tags.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChenWGEG18","doi":"10.1109/GLOCOM.2018.8647920","ee":"https://doi.org/10.1109/GLOCOM.2018.8647920","url":"https://dblp.org/rec/conf/globecom/ChenWGEG18"}, "url":"URL#2566919" }, { "@score":"1", "@id":"2566920", "info":{"authors":{"author":[{"@pid":"93/3669-2","text":"Zhao Chen 0002"},{"@pid":"154/7983","text":"Haisheng Xu"},{"@pid":"c/LinXCai","text":"Lin X. Cai"},{"@pid":"96/3060-3","text":"Yu Cheng 0003"}]},"title":"Beamforming Design for Max-Min Fair SWIPT in Green Cloud-RAN with Wireless Fronthaul.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenXCC18","doi":"10.1109/GLOCOM.2018.8647474","ee":"https://doi.org/10.1109/GLOCOM.2018.8647474","url":"https://dblp.org/rec/conf/globecom/ChenXCC18"}, "url":"URL#2566920" }, { "@score":"1", "@id":"2566921", "info":{"authors":{"author":[{"@pid":"220/4030","text":"Jiayin Chen"},{"@pid":"96/8862-1","text":"Wenchao Xu 0001"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"31/8675","text":"Huaqing Wu"},{"@pid":"14/6026-1","text":"Shan Zhang 0001"},{"@pid":"s/XueminShen","text":"Xuemin Sherman Shen"}]},"title":"Reinforcement Learning Policy for Adaptive Edge Caching in Heterogeneous Vehicular Network.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChenXCWZS18","doi":"10.1109/GLOCOM.2018.8647483","ee":"https://doi.org/10.1109/GLOCOM.2018.8647483","url":"https://dblp.org/rec/conf/globecom/ChenXCWZS18"}, "url":"URL#2566921" }, { "@score":"1", "@id":"2566922", "info":{"authors":{"author":[{"@pid":"211/5842","text":"Xingyan Chen"},{"@pid":"51/4906","text":"Changqiao Xu"},{"@pid":"94/4375","text":"Mu Wang"},{"@pid":"224/0908","text":"Tengfei Cao"},{"@pid":"124/8701","text":"Lujie Zhong"},{"@pid":"81/2584","text":"Gabriel-Miro Muntean"}]},"title":"Optimal Coded Caching in 5G Information-Centric Device-to-Device Communications.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenXWCZM18","doi":"10.1109/GLOCOM.2018.8647705","ee":"https://doi.org/10.1109/GLOCOM.2018.8647705","url":"https://dblp.org/rec/conf/globecom/ChenXWCZM18"}, "url":"URL#2566922" }, { "@score":"1", "@id":"2566923", "info":{"authors":{"author":[{"@pid":"202/8474","text":"Huangxun Chen"},{"@pid":"162/5529","text":"Zhice Yang"},{"@pid":"08/359","text":"Chenyu Huang"},{"@pid":"04/2024-1","text":"Qian Zhang 0001"}]},"title":"Drive Safe Inspector: A Wearable-Based Fine-Grained Technique for Driver Hand Position Detection.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChenYHZ18","doi":"10.1109/GLOCOM.2018.8647653","ee":"https://doi.org/10.1109/GLOCOM.2018.8647653","url":"https://dblp.org/rec/conf/globecom/ChenYHZ18"}, "url":"URL#2566923" }, { "@score":"1", "@id":"2566924", "info":{"authors":{"author":[{"@pid":"11/1394-5","text":"Qian Chen 0005"},{"@pid":"41/10628","text":"Xiaojuan Zhang"},{"@pid":"236/3307","text":"Wei Lih Lim"},{"@pid":"16/6038","text":"Yuen Sam Kwok"},{"@pid":"46/3348","text":"Sumei Sun"}]},"title":"Automated Network Planning for Industrial Wireless Mesh Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenZLKS18","doi":"10.1109/GLOCOM.2018.8647561","ee":"https://doi.org/10.1109/GLOCOM.2018.8647561","url":"https://dblp.org/rec/conf/globecom/ChenZLKS18"}, "url":"URL#2566924" }, { "@score":"1", "@id":"2566925", "info":{"authors":{"author":[{"@pid":"63/3159","text":"Dawei Chen"},{"@pid":"284/0094","text":"Xiaoqin Zhang"},{"@pid":"58/6810-39","text":"Li Wang 0039"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Prediction of Cloud Resources Demand Based on Fuzzy Deep Neural Network.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenZWH18","doi":"10.1109/GLOCOM.2018.8647765","ee":"https://doi.org/10.1109/GLOCOM.2018.8647765","url":"https://dblp.org/rec/conf/globecom/ChenZWH18"}, "url":"URL#2566925" }, { "@score":"1", "@id":"2566926", "info":{"authors":{"author":[{"@pid":"144/1592","text":"Zhiqi Chen"},{"@pid":"69/6137-1","text":"Sheng Zhang 0001"},{"@pid":"71/4716","text":"Can Wang"},{"@pid":"96/2572","text":"Zhuzhong Qian"},{"@pid":"94/3601","text":"Mingjun Xiao"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"81/4995","text":"Imad Jawhar"}]},"title":"A Novel Algorithm for NFV Chain Placement in Edge Computing Environments.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenZWQXWJ18","doi":"10.1109/GLOCOM.2018.8647371","ee":"https://doi.org/10.1109/GLOCOM.2018.8647371","url":"https://dblp.org/rec/conf/globecom/ChenZWQXWJ18"}, "url":"URL#2566926" }, { "@score":"1", "@id":"2566928", "info":{"authors":{"author":[{"@pid":"64/3062","text":"Xiang Chen"},{"@pid":"68/3245","text":"Dong Zhang"},{"@pid":"81/6572","text":"Haifeng Zhou"}]},"title":"MATReduce: Towards High-Performance P4 Pipeline by Reducing Duplicate Match Operations.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenZZ18","doi":"10.1109/GLOCOM.2018.8647320","ee":"https://doi.org/10.1109/GLOCOM.2018.8647320","url":"https://dblp.org/rec/conf/globecom/ChenZZ18"}, "url":"URL#2566928" }, { "@score":"1", "@id":"2566930", "info":{"authors":{"author":[{"@pid":"231/5336","text":"Jianqiao Chen"},{"@pid":"77/2428-3","text":"Ping Zhang 0003"},{"@pid":"87/1222","text":"Xi Zhang"},{"@pid":"52/1489","text":"Xiaoli Yang"},{"@pid":"65/5367","text":"Nan Ma"}]},"title":"A Novel 3D Multi-Confocal Ellipsoid Simulation Model for 5G Massive MIMO Mobile Wireless Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenZZYM18","doi":"10.1109/GLOCOM.2018.8648010","ee":"https://doi.org/10.1109/GLOCOM.2018.8648010","url":"https://dblp.org/rec/conf/globecom/ChenZZYM18"}, "url":"URL#2566930" }, { "@score":"1", "@id":"2566931", "info":{"authors":{"author":[{"@pid":"52/7560","text":"Siguang Chen"},{"@pid":"15/6877","text":"Xi Zhu"},{"@pid":"189/2233","text":"Xuejian Zhao"},{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"05/1958-5","text":"Kun Wang 0005"},{"@pid":"97/3523","text":"Geng Yang"}]},"title":"Fog Computing Assisted Efficient Privacy Preserving Data Collection for Big Sensory Data.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChenZZZWY18","doi":"10.1109/GLOCOM.2018.8647372","ee":"https://doi.org/10.1109/GLOCOM.2018.8647372","url":"https://dblp.org/rec/conf/globecom/ChenZZZWY18"}, "url":"URL#2566931" }, { "@score":"1", "@id":"2566932", "info":{"authors":{"author":[{"@pid":"226/9432","text":"Yanyu Cheng"},{"@pid":"99/2339","text":"Kwok Hung Li"},{"@pid":"94/2651","text":"Kah Chan Teh"},{"@pid":"72/11506-1","text":"Sheng Luo 0001"},{"@pid":"35/7092-100","text":"Wei Wang 0100"}]},"title":"Joint User Clustering and Subcarrier Allocation for Downlink Non-Orthogonal Multiple Access Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChengLTLW18","doi":"10.1109/GLOCOM.2018.8647628","ee":"https://doi.org/10.1109/GLOCOM.2018.8647628","url":"https://dblp.org/rec/conf/globecom/ChengLTLW18"}, "url":"URL#2566932" }, { "@score":"1", "@id":"2566933", "info":{"authors":{"author":[{"@pid":"199/8100","text":"Deven Chheda"},{"@pid":"236/3177","text":"Abhijeet Prasad"},{"@pid":"236/3084","text":"Mohamed Abd. El-Samiea"},{"@pid":"99/1427","text":"Long Duan"},{"@pid":"236/2980","text":"Mubanga Nsofu"},{"@pid":"236/3334","text":"Arun Handoo"},{"@pid":"06/2386","text":"Mukesh Mittal"}]},"title":"End-to-End Wireless Network Performance Evaluation Based on Application Quality Indicators.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChhedaPEDNHM18","doi":"10.1109/GLOCOM.2018.8648108","ee":"https://doi.org/10.1109/GLOCOM.2018.8648108","url":"https://dblp.org/rec/conf/globecom/ChhedaPEDNHM18"}, "url":"URL#2566933" }, { "@score":"1", "@id":"2566934", "info":{"authors":{"author":[{"@pid":"236/2812","text":"Ting-Hui Chi"},{"@pid":"06/10335","text":"Chi-Han Lin"},{"@pid":"76/8355","text":"Jian-Jhih Kuo"},{"@pid":"21/7029","text":"Wen-Tsuen Chen"}]},"title":"Live Video Multicast for Dynamic Users via Segment Routing in 5G Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChiLKC18","doi":"10.1109/GLOCOM.2018.8647865","ee":"https://doi.org/10.1109/GLOCOM.2018.8647865","url":"https://dblp.org/rec/conf/globecom/ChiLKC18"}, "url":"URL#2566934" }, { "@score":"1", "@id":"2566935", "info":{"authors":{"author":[{"@pid":"36/10829","text":"Yi-Han Chiang"},{"@pid":"10/3222","text":"Wanjiun Liao"},{"@pid":"53/4376","text":"Yusheng Ji"}]},"title":"RELISH: Green Multicell Clustering in Heterogeneous Networks with Shareable Caching.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChiangLJ18","doi":"10.1109/GLOCOM.2018.8647258","ee":"https://doi.org/10.1109/GLOCOM.2018.8647258","url":"https://dblp.org/rec/conf/globecom/ChiangLJ18"}, "url":"URL#2566935" }, { "@score":"1", "@id":"2566938", "info":{"authors":{"author":[{"@pid":"51/5607","text":"Thomas Choi"},{"@pid":"115/6399","text":"Celalettin Umit Bas"},{"@pid":"06/2293-26","text":"Rui Wang 0026"},{"@pid":"56/1645","text":"Sooyoung Hur"},{"@pid":"87/4354","text":"Jeongho Park"},{"@pid":"78/6091-2","text":"Jianzhong Zhang 0002"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"Measurement Based Directional Modeling of Dynamic Human Body Shadowing at 28 GHz.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChoiBWHPZM18","doi":"10.1109/GLOCOM.2018.8647873","ee":"https://doi.org/10.1109/GLOCOM.2018.8647873","url":"https://dblp.org/rec/conf/globecom/ChoiBWHPZM18"}, "url":"URL#2566938" }, { "@score":"1", "@id":"2566939", "info":{"authors":{"author":[{"@pid":"175/5899","text":"Nikumani Choudhury"},{"@pid":"66/9552","text":"Rakesh Matam"},{"@pid":"39/8298-1","text":"Mithun Mukherjee 0001"},{"@pid":"l/JaimeLloret","text":"Jaime Lloret 0001"}]},"title":"A Non-Threshold-Based Cluster-Head Rotation Scheme for IEEE 802.15.4 Cluster-Tree Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChoudhuryMML18","doi":"10.1109/GLOCOM.2018.8647640","ee":"https://doi.org/10.1109/GLOCOM.2018.8647640","url":"https://dblp.org/rec/conf/globecom/ChoudhuryMML18"}, "url":"URL#2566939" }, { "@score":"1", "@id":"2566940", "info":{"authors":{"author":[{"@pid":"154/3561","text":"Samira Chouikhi"},{"@pid":"m/LeilaMerghem","text":"Leïla Merghem-Boulahia"},{"@pid":"29/2071","text":"Moez Esseghir"}]},"title":"Multi-Level Energy Consumption Optimization for Smart Buildings.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChouikhiME18","doi":"10.1109/GLOCOM.2018.8648092","ee":"https://doi.org/10.1109/GLOCOM.2018.8648092","url":"https://dblp.org/rec/conf/globecom/ChouikhiME18"}, "url":"URL#2566940" }, { "@score":"1", "@id":"2566941", "info":{"authors":{"author":[{"@pid":"138/3008","text":"Sakil Ahmed Chowdhury"},{"@pid":"85/964","text":"Abderrahim Benslimane"}]},"title":"Relocating Redundant Sensors in Randomly Deployed Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChowdhuryB18","doi":"10.1109/GLOCOM.2018.8647974","ee":"https://doi.org/10.1109/GLOCOM.2018.8647974","url":"https://dblp.org/rec/conf/globecom/ChowdhuryB18"}, "url":"URL#2566941" }, { "@score":"1", "@id":"2566942", "info":{"authors":{"author":[{"@pid":"138/3008","text":"Sakil Ahmed Chowdhury"},{"@pid":"95/5200","text":"Jeff Frolik"},{"@pid":"85/964","text":"Abderrahim Benslimane"}]},"title":"Polarization Matching for Networks Utilizing Tripolar Antenna Systems.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ChowdhuryFB18","doi":"10.1109/GLOCOM.2018.8647735","ee":"https://doi.org/10.1109/GLOCOM.2018.8647735","url":"https://dblp.org/rec/conf/globecom/ChowdhuryFB18"}, "url":"URL#2566942" }, { "@score":"1", "@id":"2566943", "info":{"authors":{"author":[{"@pid":"138/1441","text":"Srijit Chowdhury"},{"@pid":"96/3731","text":"Chandan Giri"}]},"title":"Non-Cooperative Game Theory Based Congestion Control in Lossy WSN.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChowdhuryG18","doi":"10.1109/GLOCOM.2018.8647723","ee":"https://doi.org/10.1109/GLOCOM.2018.8647723","url":"https://dblp.org/rec/conf/globecom/ChowdhuryG18"}, "url":"URL#2566943" }, { "@score":"1", "@id":"2566944", "info":{"authors":{"author":[{"@pid":"84/10816-1","text":"Zheng Chu 0001"},{"@pid":"161/6541","text":"Wanming Hao"},{"@pid":"83/3968","text":"Pei Xiao"},{"@pid":"155/5190","text":"Fuhui Zhou"},{"@pid":"143/7377","text":"De Mi"},{"@pid":"50/963","text":"Zhengyu Zhu"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Energy Efficient Hybrid Precoding in Heterogeneous Networks with Limited Wireless Backhaul Capacity.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChuHXZMZL18","doi":"10.1109/GLOCOM.2018.8647807","ee":"https://doi.org/10.1109/GLOCOM.2018.8647807","url":"https://dblp.org/rec/conf/globecom/ChuHXZMZL18"}, "url":"URL#2566944" }, { "@score":"1", "@id":"2566945", "info":{"authors":{"author":[{"@pid":"178/6466","text":"Man Chu"},{"@pid":"83/5560-3","text":"Hang Li 0003"},{"@pid":"68/4580","text":"Xuewen Liao"},{"@pid":"48/4914","text":"Shuguang Cui"}]},"title":"Reinforcement Learning Based Multi-Access Control with Energy Harvesting.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChuLLC18","doi":"10.1109/GLOCOM.2018.8647438","ee":"https://doi.org/10.1109/GLOCOM.2018.8647438","url":"https://dblp.org/rec/conf/globecom/ChuLLC18"}, "url":"URL#2566945" }, { "@score":"1", "@id":"2566947", "info":{"authors":{"author":[{"@pid":"210/4145","text":"Uma Chunduri"},{"@pid":"97/3215","text":"Alexander Clemm"},{"@pid":"62/5158","text":"Richard Li"}]},"title":"Preferred Path Routing - A Next-Generation Routing Framework beyond Segment Routing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ChunduriCL18","doi":"10.1109/GLOCOM.2018.8647410","ee":"https://doi.org/10.1109/GLOCOM.2018.8647410","url":"https://dblp.org/rec/conf/globecom/ChunduriCL18"}, "url":"URL#2566947" }, { "@score":"1", "@id":"2566948", "info":{"authors":{"author":[{"@pid":"66/4102","text":"Ernestina Cianca"},{"@pid":"16/6867","text":"Tommaso Rossi"},{"@pid":"38/2406","text":"Marina Ruggieri"},{"@pid":"11/1857","text":"Marco Presi"},{"@pid":"12/5468","text":"Ernesto Ciaramella"},{"@pid":"93/8963","text":"Lorenzo Luini"},{"@pid":"57/2254","text":"Claudio Sacchi"},{"@pid":"189/3331","text":"Giorgia Parca"},{"@pid":"87/4963","text":"Giuseppe Codispoti"}]},"title":"Softwarization and Virtualization as Enablers for Future EHF/FSO High Throughput Satellites.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CiancaRRPCLSPC18","doi":"10.1109/GLOCOM.2018.8647698","ee":"https://doi.org/10.1109/GLOCOM.2018.8647698","url":"https://dblp.org/rec/conf/globecom/CiancaRRPCLSPC18"}, "url":"URL#2566948" }, { "@score":"1", "@id":"2566949", "info":{"authors":{"author":[{"@pid":"202/4921","text":"Arta Cika"},{"@pid":"27/10962","text":"Mihai-Alin Badiu"},{"@pid":"78/2259","text":"Justin P. Coon"},{"@pid":"90/8335","text":"Shahriar Etemadi Tajbakhsh"}]},"title":"Entropy Rate of Time-Varying Wireless Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CikaBCT18","doi":"10.1109/GLOCOM.2018.8647817","ee":"https://doi.org/10.1109/GLOCOM.2018.8647817","url":"https://dblp.org/rec/conf/globecom/CikaBCT18"}, "url":"URL#2566949" }, { "@score":"1", "@id":"2566950", "info":{"authors":{"author":[{"@pid":"86/11103","text":"Radu-Ioan Ciobanu"},{"@pid":"39/3222","text":"Ciprian Dobre"}]},"title":"On Opportunities for Mobile Offloading.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CiobanuD18","doi":"10.1109/GLOCOM.2018.8647587","ee":"https://doi.org/10.1109/GLOCOM.2018.8647587","url":"https://dblp.org/rec/conf/globecom/CiobanuD18"}, "url":"URL#2566950" }, { "@score":"1", "@id":"2566951", "info":{"authors":{"author":[{"@pid":"137/0222","text":"Giulia Cisotto"},{"@pid":"157/7926","text":"Anna V. Guglielmi"},{"@pid":"75/3888","text":"Leonardo Badia"},{"@pid":"40/5059","text":"Andrea Zanella"}]},"title":"Joint Compression of EEG and EMG Signals for Wireless Biometrics.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CisottoGBZ18","doi":"10.1109/GLOCOM.2018.8647543","ee":"https://doi.org/10.1109/GLOCOM.2018.8647543","url":"https://dblp.org/rec/conf/globecom/CisottoGBZ18"}, "url":"URL#2566951" }, { "@score":"1", "@id":"2566952", "info":{"authors":{"author":[{"@pid":"163/7385","text":"Marcus Z. Comiter"},{"@pid":"k/HTKung","text":"H. T. Kung 0001"}]},"title":"Localization Convolutional Neural Networks Using Angle of Arrival Images.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ComiterK18","doi":"10.1109/GLOCOM.2018.8647687","ee":"https://doi.org/10.1109/GLOCOM.2018.8647687","url":"https://dblp.org/rec/conf/globecom/ComiterK18"}, "url":"URL#2566952" }, { "@score":"1", "@id":"2566953", "info":{"authors":{"author":[{"@pid":"44/7249","text":"Laura Conde-Canencia"},{"@pid":"88/2774","text":"Tyson Condie"},{"@pid":"35/3690","text":"Lara Dolecek"}]},"title":"Data Deduplication with Edit Errors.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Conde-CanenciaC18","doi":"10.1109/GLOCOM.2018.8647415","ee":"https://doi.org/10.1109/GLOCOM.2018.8647415","url":"https://dblp.org/rec/conf/globecom/Conde-CanenciaC18"}, "url":"URL#2566953" }, { "@score":"1", "@id":"2566954", "info":{"authors":{"author":[{"@pid":"97/9672","text":"Carlo Condo"},{"@pid":"04/10102","text":"Valerio Bioglio"},{"@pid":"26/1130","text":"Ingmar Land"}]},"title":"Generalized Fast Decoding of Polar Codes.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CondoBL18","doi":"10.1109/GLOCOM.2018.8648105","ee":"https://doi.org/10.1109/GLOCOM.2018.8648105","url":"https://dblp.org/rec/conf/globecom/CondoBL18"}, "url":"URL#2566954" }, { "@score":"1", "@id":"2566955", "info":{"authors":{"author":[{"@pid":"194/1526","text":"Bastien Confais"},{"@pid":"84/3076","text":"Benoît Parrein"},{"@pid":"25/6482","text":"Adrien Lebre"}]},"title":"A Tree-Based Approach to Locate Object Replicas in a Fog Storage Infrastructure.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ConfaisPL18","doi":"10.1109/GLOCOM.2018.8647470","ee":"https://doi.org/10.1109/GLOCOM.2018.8647470","url":"https://dblp.org/rec/conf/globecom/ConfaisPL18"}, "url":"URL#2566955" }, { "@score":"1", "@id":"2566956", "info":{"authors":{"author":[{"@pid":"186/9421","text":"Laszlon R. Costa"},{"@pid":"137/6312","text":"Darlan C. Moreira"},{"@pid":"58/2191","text":"Yuri C. B. Silva"},{"@pid":"00/3585","text":"Walter C. Freitas Jr."},{"@pid":"27/10413","text":"Francisco Rafael Marques Lima"}]},"title":"User Grouping Based on Spatial Compatibility for Dynamic-TDD Cooperative Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CostaMSFL18","doi":"10.1109/GLOCOM.2018.8647677","ee":"https://doi.org/10.1109/GLOCOM.2018.8647677","url":"https://dblp.org/rec/conf/globecom/CostaMSFL18"}, "url":"URL#2566956" }, { "@score":"1", "@id":"2566957", "info":{"authors":{"author":[{"@pid":"216/9668","text":"Mauro A. A. da Cruz"},{"@pid":"222/5557","text":"Guilherme A. B. Marcondes"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"},{"@pid":"l/PascalLorenz","text":"Pascal Lorenz"},{"@pid":"83/5213","text":"Plácido Rogério Pinheiro"}]},"title":"Performance Evaluation of IoT Middleware through Multicriteria Decision-Making.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CruzMRLP18","doi":"10.1109/GLOCOM.2018.8647381","ee":"https://doi.org/10.1109/GLOCOM.2018.8647381","url":"https://dblp.org/rec/conf/globecom/CruzMRLP18"}, "url":"URL#2566957" }, { "@score":"1", "@id":"2566958", "info":{"authors":{"author":[{"@pid":"192/5922-1","text":"Roberto Maldonado Cuevas 0001"},{"@pid":"94/6047","text":"Claudio Rosa"},{"@pid":"21/3009","text":"Frank Frederiksen"},{"@pid":"96/5723","text":"Klaus I. Pedersen"}]},"title":"On the Impact of Listen-Before-Talk on Ultra-Reliable Low-Latency Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CuevasRFP18","doi":"10.1109/GLOCOM.2018.8648144","ee":"https://doi.org/10.1109/GLOCOM.2018.8648144","url":"https://dblp.org/rec/conf/globecom/CuevasRFP18"}, "url":"URL#2566958" }, { "@score":"1", "@id":"2566960", "info":{"authors":{"author":[{"@pid":"192/3564","text":"Fangyu Cui"},{"@pid":"03/7051","text":"Yunlong Cai"},{"@pid":"157/9149","text":"Zhijin Qin"},{"@pid":"213/8217","text":"Minjian Zhao 0001"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Joint Trajectory Design and Power Allocation for UAV-Enabled Non-Orthogonal Multiple Access Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CuiCQZL18","doi":"10.1109/GLOCOM.2018.8647352","ee":"https://doi.org/10.1109/GLOCOM.2018.8647352","url":"https://dblp.org/rec/conf/globecom/CuiCQZL18"}, "url":"URL#2566960" }, { "@score":"1", "@id":"2566961", "info":{"authors":{"author":[{"@pid":"79/940","text":"Qimei Cui"},{"@pid":"235/1505","text":"Xueying Jiang"},{"@pid":"202/7128","text":"Xinlei Yu"},{"@pid":"118/3675","text":"Yuanjie Wang"},{"@pid":"49/3683","text":"Martin Haenggi"}]},"title":"SIR Meta Distribution in Physical Layer Security with Interference Correlation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CuiJYWH18","doi":"10.1109/GLOCOM.2018.8648100","ee":"https://doi.org/10.1109/GLOCOM.2018.8648100","url":"https://dblp.org/rec/conf/globecom/CuiJYWH18"}, "url":"URL#2566961" }, { "@score":"1", "@id":"2566962", "info":{"authors":{"author":[{"@pid":"42/3805","text":"Wei Cui"},{"@pid":"136/5156","text":"Kaiming Shen"},{"@pid":"82/2790-1","text":"Wei Yu 0001"}]},"title":"Spatial Deep Learning for Wireless Scheduling.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/CuiSY18","doi":"10.1109/GLOCOM.2018.8647453","ee":"https://doi.org/10.1109/GLOCOM.2018.8647453","url":"https://dblp.org/rec/conf/globecom/CuiSY18"}, "url":"URL#2566962" }, { "@score":"1", "@id":"2566963", "info":{"authors":{"author":[{"@pid":"174/9746","text":"Peng-Fei Cui"},{"@pid":"07/314-a","text":"J. Andrew Zhang"},{"@pid":"40/7398","text":"Wen-Jun Lu"},{"@pid":"25/5560","text":"Y. Jay Guo"},{"@pid":"70/2173-2","text":"Hongbo Zhu 0002"}]},"title":"Sparse Channel Modelling Using Multi-Measurement Vector Compressive Sensing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/CuiZLGZ18","doi":"10.1109/GLOCOM.2018.8648115","ee":"https://doi.org/10.1109/GLOCOM.2018.8648115","url":"https://dblp.org/rec/conf/globecom/CuiZLGZ18"}, "url":"URL#2566963" }, { "@score":"1", "@id":"2566964", "info":{"authors":{"author":[{"@pid":"228/3499","text":"Wenkuan Dai"},{"@pid":"73/3521","text":"Yuqing Li"},{"@pid":"13/29","text":"Xiaoying Gan"},{"@pid":"236/2866","text":"Gongquan Xie"}]},"title":"Fast Charging Station Placement with Elastic Demand.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DaiLGX18","doi":"10.1109/GLOCOM.2018.8647556","ee":"https://doi.org/10.1109/GLOCOM.2018.8647556","url":"https://dblp.org/rec/conf/globecom/DaiLGX18"}, "url":"URL#2566964" }, { "@score":"1", "@id":"2566966", "info":{"authors":{"author":[{"@pid":"178/7245","text":"Yanpeng Dai"},{"@pid":"39/4119","text":"Min Sheng"},{"@pid":"96/7401","text":"Junyu Liu"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Resource Allocation for Low-Latency Mobile Edge Computation Offloading in NOMA Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DaiSLCS18","doi":"10.1109/GLOCOM.2018.8647693","ee":"https://doi.org/10.1109/GLOCOM.2018.8647693","url":"https://dblp.org/rec/conf/globecom/DaiSLCS18"}, "url":"URL#2566966" }, { "@score":"1", "@id":"2566967", "info":{"authors":{"author":[{"@pid":"213/9055","text":"Yueyue Dai"},{"@pid":"65/95","text":"Du Xu"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Joint Offloading and Resource Allocation in Vehicular Edge Computing and Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DaiXMZ18","doi":"10.1109/GLOCOM.2018.8648004","ee":"https://doi.org/10.1109/GLOCOM.2018.8648004","url":"https://dblp.org/rec/conf/globecom/DaiXMZ18"}, "url":"URL#2566967" }, { "@score":"1", "@id":"2566968", "info":{"authors":{"author":[{"@pid":"205/9451","text":"Canhuang Dai"},{"@pid":"205/9465","text":"Xingyu Xiao"},{"@pid":"x/LiangXiao3","text":"Liang Xiao 0003"},{"@pid":"76/185-1","text":"Peng Cheng 0001"}]},"title":"Reinforcement Learning Based Power Control for VANET Broadcast against Jamming.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DaiXXC18","doi":"10.1109/GLOCOM.2018.8647273","ee":"https://doi.org/10.1109/GLOCOM.2018.8647273","url":"https://dblp.org/rec/conf/globecom/DaiXXC18"}, "url":"URL#2566968" }, { "@score":"1", "@id":"2566970", "info":{"authors":{"author":[{"@pid":"202/2527","text":"Nader Daneshfar"},{"@pid":"36/8968","text":"Nikolaos Pappas 0001"},{"@pid":"52/2297","text":"Valentin Polishchuk"},{"@pid":"83/2014","text":"Vangelis Angelakis"}]},"title":"Service Allocation in a Mobile Fog Infrastructure under Availability and QoS Constraints.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DaneshfarPPA18","doi":"10.1109/GLOCOM.2018.8647488","ee":"https://doi.org/10.1109/GLOCOM.2018.8647488","url":"https://dblp.org/rec/conf/globecom/DaneshfarPPA18"}, "url":"URL#2566970" }, { "@score":"1", "@id":"2566972", "info":{"authors":{"author":[{"@pid":"149/1467","text":"Snigdha Das"},{"@pid":"125/1601","text":"Soumyajit Chatterjee"},{"@pid":"28/9571","text":"Sandip Chakraborty"},{"@pid":"49/4803","text":"Bivas Mitra"}]},"title":"An Unsupervised Model for Detecting Passively Encountering Groups from WiFi Signals.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DasCCM18","doi":"10.1109/GLOCOM.2018.8647751","ee":"https://doi.org/10.1109/GLOCOM.2018.8647751","url":"https://dblp.org/rec/conf/globecom/DasCCM18"}, "url":"URL#2566972" }, { "@score":"1", "@id":"2566973", "info":{"authors":{"author":[{"@pid":"68/6940","text":"Tamal Das"},{"@pid":"m/GMohan","text":"Mohan Gurusamy"}]},"title":"Resilient Controller Placement in Hybrid SDN/Legacy Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DasG18","doi":"10.1109/GLOCOM.2018.8647566","ee":"https://doi.org/10.1109/GLOCOM.2018.8647566","url":"https://dblp.org/rec/conf/globecom/DasG18"}, "url":"URL#2566973" }, { "@score":"1", "@id":"2566974", "info":{"authors":{"author":[{"@pid":"126/4505","text":"Eftychia G. Datsika"},{"@pid":"14/4817","text":"Elli Kartsakli"},{"@pid":"87/5367","text":"John S. Vardakas"},{"@pid":"60/8280-1","text":"Angelos Antonopoulos 0001"},{"@pid":"159/1684","text":"George Kalfas"},{"@pid":"206/0396","text":"Pavlos Maniotis"},{"@pid":"214/3239","text":"Christos Vagionas"},{"@pid":"26/7881","text":"Nikos Pleros"},{"@pid":"18/466","text":"Christos V. Verikoukis"}]},"title":"QoS-Aware Resource Management for Converged Fiber Wireless 5G Fronthaul Networks.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DatsikaKVAKMVPV18","doi":"10.1109/GLOCOM.2018.8647231","ee":"https://doi.org/10.1109/GLOCOM.2018.8647231","url":"https://dblp.org/rec/conf/globecom/DatsikaKVAKMVPV18"}, "url":"URL#2566974" }, { "@score":"1", "@id":"2566975", "info":{"authors":{"author":[{"@pid":"70/10462","text":"Utku Demir"},{"@pid":"236/2994","text":"Aaron Faulkenberry"},{"@pid":"79/9370","text":"Cristiano Tapparello"},{"@pid":"h/WendiRabinerHeinzelman","text":"Wendi B. Heinzelman"}]},"title":"Reducing Delay in Group Reformation in WiFi Direct Networks Through Redundancy.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DemirFTH18","doi":"10.1109/GLOCOM.2018.8647233","ee":"https://doi.org/10.1109/GLOCOM.2018.8647233","url":"https://dblp.org/rec/conf/globecom/DemirFTH18"}, "url":"URL#2566975" }, { "@score":"1", "@id":"2566976", "info":{"authors":{"author":[{"@pid":"236/3109","text":"Ruoqi Deng"},{"@pid":"146/8046","text":"Boya Di"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Cooperative Collision Avoidance Scheme Design and Analysis in V2X-Based Driving Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DengDS18","doi":"10.1109/GLOCOM.2018.8647721","ee":"https://doi.org/10.1109/GLOCOM.2018.8647721","url":"https://dblp.org/rec/conf/globecom/DengDS18"}, "url":"URL#2566976" }, { "@score":"1", "@id":"2566977", "info":{"authors":{"author":[{"@pid":"139/0806","text":"Ruichen Deng"},{"@pid":"129/1178","text":"Zhiyuan Jiang"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"48/4914","text":"Shuguang Cui"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"A Two-Step Learning and Interpolation Method for Location-Based Channel Database Construction.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DengJZCN18","doi":"10.1109/GLOCOM.2018.8647393","ee":"https://doi.org/10.1109/GLOCOM.2018.8647393","url":"https://dblp.org/rec/conf/globecom/DengJZCN18"}, "url":"URL#2566977" }, { "@score":"1", "@id":"2566979", "info":{"authors":{"author":[{"@pid":"129/1032","text":"Juwendo Denis"},{"@pid":"207/7643","text":"Ali Maatouk"},{"@pid":"164/5904","text":"Salah Eddine Hajri"},{"@pid":"18/338","text":"Mohamad Assaad"}]},"title":"Stay Longer at the Network's Edge: A Novel Proactive Caching Policy through Sojourn Time.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DenisMHA18","doi":"10.1109/GLOCOM.2018.8647314","ee":"https://doi.org/10.1109/GLOCOM.2018.8647314","url":"https://dblp.org/rec/conf/globecom/DenisMHA18"}, "url":"URL#2566979" }, { "@score":"1", "@id":"2566980", "info":{"authors":{"author":[{"@pid":"236/3139","text":"Santosh Kumar Desai"},{"@pid":"139/4375","text":"Amit Dua"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"39/871","text":"Ashok Kumar Das"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"Demand Response Management Using Lattice-Based Cryptography in Smart Grids.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DesaiDKDR18","doi":"10.1109/GLOCOM.2018.8647560","ee":"https://doi.org/10.1109/GLOCOM.2018.8647560","url":"https://dblp.org/rec/conf/globecom/DesaiDKDR18"}, "url":"URL#2566980" }, { "@score":"1", "@id":"2566981", "info":{"authors":{"author":{"@pid":"00/10825","text":"Swapnil Dhamal"}},"title":"Effectiveness of Diffusing Information through a Social Network in Multiple Phases.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Dhamal18","doi":"10.1109/GLOCOM.2018.8647467","ee":"https://doi.org/10.1109/GLOCOM.2018.8647467","url":"https://dblp.org/rec/conf/globecom/Dhamal18"}, "url":"URL#2566981" }, { "@score":"1", "@id":"2566983", "info":{"authors":{"author":[{"@pid":"203/9606","text":"Khaoula Dhifallah"},{"@pid":"42/2567","text":"Yvon Gourhant"},{"@pid":"75/1717","text":"Sidi-Mohammed Senouci"}]},"title":"Combinatorial Double Auction Radio Resource Allocation Model in Crowd Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DhifallahGS18","doi":"10.1109/GLOCOM.2018.8647243","ee":"https://doi.org/10.1109/GLOCOM.2018.8647243","url":"https://dblp.org/rec/conf/globecom/DhifallahGS18"}, "url":"URL#2566983" }, { "@score":"1", "@id":"2566985", "info":{"authors":{"author":[{"@pid":"146/8046","text":"Boya Di"},{"@pid":"77/10205-1","text":"Hongliang Zhang 0001"},{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Data Offloading in Ultra-Dense LEO-Based Integrated Terrestrial-Satellite Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DiZSLL18","doi":"10.1109/GLOCOM.2018.8647954","ee":"https://doi.org/10.1109/GLOCOM.2018.8647954","url":"https://dblp.org/rec/conf/globecom/DiZSLL18"}, "url":"URL#2566985" }, { "@score":"1", "@id":"2566986", "info":{"authors":{"author":[{"@pid":"137/8215","text":"Panagiotis D. Diamantoulakis"},{"@pid":"48/7641","text":"Koralia N. Pappi"},{"@pid":"17/2672-1","text":"Zheng Ma 0001"},{"@pid":"49/7964","text":"Xianfu Lei"},{"@pid":"17/9507","text":"Paschalis C. Sofotasios"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"Airborne Radio Access Networks with Simultaneous Lightwave Information and Power Transfer (SLIPT).","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DiamantoulakisP18","doi":"10.1109/GLOCOM.2018.8648007","ee":"https://doi.org/10.1109/GLOCOM.2018.8648007","url":"https://dblp.org/rec/conf/globecom/DiamantoulakisP18"}, "url":"URL#2566986" }, { "@score":"1", "@id":"2566987", "info":{"authors":{"author":[{"@pid":"146/9704","text":"Tian Ding"},{"@pid":"70/4725-2","text":"Xiaojun Yuan 0002"},{"@pid":"l/SoungChangLiew","text":"Soung Chang Liew"}]},"title":"Structured Sparsity Learning Based Multiuser Detection in Massive-Device Multiple Access.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DingYL18","doi":"10.1109/GLOCOM.2018.8648017","ee":"https://doi.org/10.1109/GLOCOM.2018.8648017","url":"https://dblp.org/rec/conf/globecom/DingYL18"}, "url":"URL#2566987" }, { "@score":"1", "@id":"2566988", "info":{"authors":{"author":[{"@pid":"236/2888","text":"Thuy N. Dinh"},{"@pid":"89/6201","text":"Phuong Hoai Ha"}]},"title":"Resource Management for Improving Performance of IEEE 802.15.4-Based Home Automated Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DinhH18","doi":"10.1109/GLOCOM.2018.8647804","ee":"https://doi.org/10.1109/GLOCOM.2018.8647804","url":"https://dblp.org/rec/conf/globecom/DinhH18"}, "url":"URL#2566988" }, { "@score":"1", "@id":"2566990", "info":{"authors":{"author":[{"@pid":"213/2239","text":"Nghia Doan"},{"@pid":"59/9432","text":"Seyyed Ali Hashemi"},{"@pid":"120/7089","text":"Marco Mondelli"},{"@pid":"15/860","text":"Warren J. Gross"}]},"title":"On the Decoding of Polar Codes on Permuted Factor Graphs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DoanHMG18","doi":"10.1109/GLOCOM.2018.8647308","ee":"https://doi.org/10.1109/GLOCOM.2018.8647308","url":"https://dblp.org/rec/conf/globecom/DoanHMG18"}, "url":"URL#2566990" }, { "@score":"1", "@id":"2566991", "info":{"authors":{"author":[{"@pid":"153/0338","text":"Koustabh Dolui"},{"@pid":"68/5843-2","text":"Csaba Király 0002"}]},"title":"Towards Multi-Container Deployment on IoT Gateways.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DoluiK18","doi":"10.1109/GLOCOM.2018.8647688","ee":"https://doi.org/10.1109/GLOCOM.2018.8647688","url":"https://dblp.org/rec/conf/globecom/DoluiK18"}, "url":"URL#2566991" }, { "@score":"1", "@id":"2566992", "info":{"authors":{"author":[{"@pid":"187/2816","text":"Maria de Fátima Domingues"},{"@pid":"236/3057","text":"Ana Catarina Nepomuceno"},{"@pid":"213/0963","text":"Cátia Tavares"},{"@pid":"50/5718","text":"Ayman Radwan"},{"@pid":"79/2580","text":"Nélia Alberto"},{"@pid":"36/3415-1","text":"Carlos A. F. Marques 0001"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"18/4894","text":"Paulo S. André"},{"@pid":"189/2541","text":"Paulo Fernando da Costa Antunes"}]},"title":"Energy-Aware Wearable E-Health Architecture Using Optical FBG Sensors for Knee Kinematic Monitoring.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DominguesNTRAMR18","doi":"10.1109/GLOCOM.2018.8647425","ee":"https://doi.org/10.1109/GLOCOM.2018.8647425","url":"https://dblp.org/rec/conf/globecom/DominguesNTRAMR18"}, "url":"URL#2566992" }, { "@score":"1", "@id":"2566994", "info":{"authors":{"author":[{"@pid":"14/10940","text":"Yanjie Dong"},{"@pid":"90/5456-2","text":"Md. Jahangir Hossain 0002"},{"@pid":"11/1709","text":"Julian Cheng"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Robust Secrecy Energy Efficient Beamforming in MISOME-SWIPT Systems with Proportional Fairness.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DongHCL18","doi":"10.1109/GLOCOM.2018.8647782","ee":"https://doi.org/10.1109/GLOCOM.2018.8647782","url":"https://dblp.org/rec/conf/globecom/DongHCL18"}, "url":"URL#2566994" }, { "@score":"1", "@id":"2566995", "info":{"authors":{"author":[{"@pid":"175/2338","text":"Peihao Dong"},{"@pid":"69/2745-2","text":"Hua Zhang 0002"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Machine Learning Prediction Based CSI Acquisition for FDD Massive MIMO Downlink.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DongZL18","doi":"10.1109/GLOCOM.2018.8647328","ee":"https://doi.org/10.1109/GLOCOM.2018.8647328","url":"https://dblp.org/rec/conf/globecom/DongZL18"}, "url":"URL#2566995" }, { "@score":"1", "@id":"2566996", "info":{"authors":{"author":[{"@pid":"182/7334","text":"Guannan Dong"},{"@pid":"48/2947-1","text":"Haixia Zhang 0001"},{"@pid":"75/4570","text":"Dongfeng Yuan"}]},"title":"Optimal Downlink Transmission in Massive MIMO Enabled SWIPT Systems with Zero-Forcing Precoding.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DongZY18","doi":"10.1109/GLOCOM.2018.8647551","ee":"https://doi.org/10.1109/GLOCOM.2018.8647551","url":"https://dblp.org/rec/conf/globecom/DongZY18"}, "url":"URL#2566996" }, { "@score":"1", "@id":"2566997", "info":{"authors":{"author":[{"@pid":"234/2156","text":"Dirk Van Dooren"},{"@pid":"14/5281","text":"Gábor Fodor 0001"},{"@pid":"g/JamesGross","text":"James Gross"},{"@pid":"81/3323","text":"Karl Henrik Johansson"}]},"title":"Delay Analysis of Group Handover for Real-Time Control over Mobile Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DoorenFGJ18","doi":"10.1109/GLOCOM.2018.8647501","ee":"https://doi.org/10.1109/GLOCOM.2018.8647501","url":"https://dblp.org/rec/conf/globecom/DoorenFGJ18"}, "url":"URL#2566997" }, { "@score":"1", "@id":"2566998", "info":{"authors":{"author":[{"@pid":"126/6721","text":"Hossein Doroud"},{"@pid":"64/9720","text":"Giuseppe Aceto"},{"@pid":"39/781","text":"Walter de Donato"},{"@pid":"145/2693","text":"Elnaz Alizadeh Jarchlo"},{"@pid":"00/535","text":"Andrés Marín López"},{"@pid":"43/498","text":"César D. Guerrero"},{"@pid":"58/1789","text":"Antonio Pescapè"}]},"title":"Speeding-Up DPI Traffic Classification with Chaining.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DoroudADJLGP18","doi":"10.1109/GLOCOM.2018.8648137","ee":"https://doi.org/10.1109/GLOCOM.2018.8648137","url":"https://dblp.org/rec/conf/globecom/DoroudADJLGP18"}, "url":"URL#2566998" }, { "@score":"1", "@id":"2566999", "info":{"authors":{"author":[{"@pid":"44/6552","text":"Alexis Alfredo Dowhuszko"},{"@pid":"90/1472","text":"Ana I. Pérez-Neira"}]},"title":"Modeling the Effect of Non-Linear Distortion in a Centralized RAN with Analog Optical Fronthaul.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DowhuszkoP18","doi":"10.1109/GLOCOM.2018.8647144","ee":"https://doi.org/10.1109/GLOCOM.2018.8647144","url":"https://dblp.org/rec/conf/globecom/DowhuszkoP18"}, "url":"URL#2566999" }, { "@score":"1", "@id":"2567000", "info":{"authors":{"author":[{"@pid":"211/9137","text":"Safaa Driouech"},{"@pid":"62/2911","text":"Essaid Sabir"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"53/815","text":"Halima Elbiaze"}]},"title":"A Quitting Game Framework for Self-Organized D2D Mobile Relaying in 5G.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DriouechSBE18","doi":"10.1109/GLOCOM.2018.8647479","ee":"https://doi.org/10.1109/GLOCOM.2018.8647479","url":"https://dblp.org/rec/conf/globecom/DriouechSBE18"}, "url":"URL#2567000" }, { "@score":"1", "@id":"2567002", "info":{"authors":{"author":[{"@pid":"166/4113-1","text":"Yao Du 0001"},{"@pid":"125/8938","text":"Kezhi Wang"},{"@pid":"63/1587-1","text":"Kun Yang 0001"},{"@pid":"76/8350","text":"Guopeng Zhang"}]},"title":"Energy-Efficient Resource Allocation in UAV Based MEC System for IoT Devices.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DuWYZ18","doi":"10.1109/GLOCOM.2018.8647789","ee":"https://doi.org/10.1109/GLOCOM.2018.8647789","url":"https://dblp.org/rec/conf/globecom/DuWYZ18"}, "url":"URL#2567002" }, { "@score":"1", "@id":"2567003", "info":{"authors":{"author":[{"@pid":"218/5572","text":"Yuqing Du"},{"@pid":"140/7624","text":"Guangxu Zhu"},{"@pid":"214/4437-1","text":"Jiayao Zhang 0001"},{"@pid":"21/506","text":"Kaibin Huang"}]},"title":"Automatic Recognition of Space-Time Constellations by Learning on the Grassmann Manifold.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DuZZH18","doi":"10.1109/GLOCOM.2018.8647678","ee":"https://doi.org/10.1109/GLOCOM.2018.8647678","url":"https://dblp.org/rec/conf/globecom/DuZZH18"}, "url":"URL#2567003" }, { "@score":"1", "@id":"2567004", "info":{"authors":{"author":[{"@pid":"139/4375","text":"Amit Dua"},{"@pid":"204/4950","text":"Rajat Chaudhary"},{"@pid":"194/6963","text":"Gagangeet Singh Aujla"},{"@pid":"173/6851","text":"Anish Jindal"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"LEASE: Lattice and ECC-Based Authentication and Integrity Verification Scheme in E-Healthcare.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DuaCAJKR18","doi":"10.1109/GLOCOM.2018.8648089","ee":"https://doi.org/10.1109/GLOCOM.2018.8648089","url":"https://dblp.org/rec/conf/globecom/DuaCAJKR18"}, "url":"URL#2567004" }, { "@score":"1", "@id":"2567005", "info":{"authors":{"author":[{"@pid":"139/4375","text":"Amit Dua"},{"@pid":"88/8903","text":"Prateek Sharma"},{"@pid":"236/3214","text":"Shivesh Ganju"},{"@pid":"173/6851","text":"Anish Jindal"},{"@pid":"194/6963","text":"Gagangeet Singh Aujla"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"RoVAN: A Rough Set-based Scheme for Cluster Head Selection in Vehicular Ad-hoc Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DuaSGJAKR18","doi":"10.1109/GLOCOM.2018.8647576","ee":"https://doi.org/10.1109/GLOCOM.2018.8647576","url":"https://dblp.org/rec/conf/globecom/DuaSGJAKR18"}, "url":"URL#2567005" }, { "@score":"1", "@id":"2567006", "info":{"authors":{"author":[{"@pid":"158/8256","text":"Yiping Duan"},{"@pid":"16/1093","text":"Xiaoming Tao"},{"@pid":"216/2736","text":"Chaoyi Han"},{"@pid":"236/3063","text":"Xiaowci Qin"},{"@pid":"59/3894","text":"Jianhua Lu"}]},"title":"Multi-Scale Convolutional Neural Network for SAR Image Semantic Segmentation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DuanTHQL18","doi":"10.1109/GLOCOM.2018.8647657","ee":"https://doi.org/10.1109/GLOCOM.2018.8647657","url":"https://dblp.org/rec/conf/globecom/DuanTHQL18"}, "url":"URL#2567006" }, { "@score":"1", "@id":"2567007", "info":{"authors":{"author":[{"@pid":"224/0786","text":"Yubin Duan"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"134/9388","text":"Huanyang Zheng"}]},"title":"A Greedy Approach for Vehicle Routing When Rebalancing Bike Sharing Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/DuanWZ18","doi":"10.1109/GLOCOM.2018.8647755","ee":"https://doi.org/10.1109/GLOCOM.2018.8647755","url":"https://dblp.org/rec/conf/globecom/DuanWZ18"}, "url":"URL#2567007" }, { "@score":"1", "@id":"2567008", "info":{"authors":{"author":[{"@pid":"236/2889","text":"Ruiyang Duan"},{"@pid":"62/2631-1","text":"Jingjing Wang 0001"},{"@pid":"48/859-1","text":"Hongming Zhang 0001"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"00/440-1","text":"Yong Ren 0001"},{"@pid":"65/1128","text":"Tony Q. S. Quek"}]},"title":"Touch the Sea: Energy Efficient Relay Design for Maritime Multi-Hop Multicast Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DuanWZJRQ18","doi":"10.1109/GLOCOM.2018.8647440","ee":"https://doi.org/10.1109/GLOCOM.2018.8647440","url":"https://dblp.org/rec/conf/globecom/DuanWZJRQ18"}, "url":"URL#2567008" }, { "@score":"1", "@id":"2567009", "info":{"authors":{"author":[{"@pid":"31/8335","text":"Jun Duan"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"}]},"title":"Adaptively Fitting Network Topologies to Traffic Locality in Clos-Type Data Center Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DuanY18","doi":"10.1109/GLOCOM.2018.8647836","ee":"https://doi.org/10.1109/GLOCOM.2018.8647836","url":"https://dblp.org/rec/conf/globecom/DuanY18"}, "url":"URL#2567009" }, { "@score":"1", "@id":"2567010", "info":{"authors":{"author":[{"@pid":"214/2144","text":"Gleb Dubosarskii"},{"@pid":"82/2711","text":"Serguei Primak"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"}]},"title":"Multichannel Power Allocation Game against Jammer with Changing Strategy.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/DubosarskiiPW18","doi":"10.1109/GLOCOM.2018.8647365","ee":"https://doi.org/10.1109/GLOCOM.2018.8647365","url":"https://dblp.org/rec/conf/globecom/DubosarskiiPW18"}, "url":"URL#2567010" }, { "@score":"1", "@id":"2567011", "info":{"authors":{"author":[{"@pid":"223/7720","text":"Najme Ebrahimi"},{"@pid":"05/6945","text":"Hessam Mahdavifar"},{"@pid":"08/9430","text":"Ehsan Afshari"}]},"title":"A Novel Approach to Secure Communication in Physical Layer via Coupled Dynamical Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/EbrahimiMA18","doi":"10.1109/GLOCOM.2018.8647557","ee":"https://doi.org/10.1109/GLOCOM.2018.8647557","url":"https://dblp.org/rec/conf/globecom/EbrahimiMA18"}, "url":"URL#2567011" }, { "@score":"1", "@id":"2567012", "info":{"authors":{"author":[{"@pid":"95/7023","text":"Dariush Ebrahimi"},{"@pid":"54/906","text":"Sanaa Sharafeddine"},{"@pid":"53/4284","text":"Pin-Han Ho"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"}]},"title":"Data Collection in Wireless Sensor Networks Using UAV and Compressive Data Gathering.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/EbrahimiSHA18","doi":"10.1109/GLOCOM.2018.8647924","ee":"https://doi.org/10.1109/GLOCOM.2018.8647924","url":"https://dblp.org/rec/conf/globecom/EbrahimiSHA18"}, "url":"URL#2567012" }, { "@score":"1", "@id":"2567013", "info":{"authors":{"author":[{"@pid":"158/3467","text":"Basem M. ElHalawany"},{"@pid":"34/4445","text":"Kaishun Wu"}]},"title":"Physical-Layer Security of NOMA Systems Under Untrusted Users.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/EihalawanyW18","doi":"10.1109/GLOCOM.2018.8647889","ee":"https://doi.org/10.1109/GLOCOM.2018.8647889","url":"https://dblp.org/rec/conf/globecom/EihalawanyW18"}, "url":"URL#2567013" }, { "@score":"1", "@id":"2567014", "info":{"authors":{"author":[{"@pid":"223/8235","text":"Ali El-Amine"},{"@pid":"137/6266","text":"Hussein Al Haj Hassan"},{"@pid":"74/2921","text":"Loutfi Nuaymi"}]},"title":"Energy and Resource Allocations for Battery Aging-Aware Green Cellular Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/El-AmineHN18","doi":"10.1109/GLOCOM.2018.8647197","ee":"https://doi.org/10.1109/GLOCOM.2018.8647197","url":"https://dblp.org/rec/conf/globecom/El-AmineHN18"}, "url":"URL#2567014" }, { "@score":"1", "@id":"2567015", "info":{"authors":{"author":[{"@pid":"213/0921","text":"Amr S. El-Wakeel"},{"@pid":"47/4003","text":"Aboelmagd Noureldin"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"01/5283","text":"Nizar Zorba"}]},"title":"iDriveSense: Dynamic Route Planning Involving Roads Quality Information.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/El-WakeelNHZ18","doi":"10.1109/GLOCOM.2018.8648009","ee":"https://doi.org/10.1109/GLOCOM.2018.8648009","url":"https://dblp.org/rec/conf/globecom/El-WakeelNHZ18"}, "url":"URL#2567015" }, { "@score":"1", "@id":"2567016", "info":{"authors":{"author":[{"@pid":"158/3467","text":"Basem M. ElHalawany"},{"@pid":"33/1726","text":"Rukhsana Ruby"},{"@pid":"67/7532","text":"Taneli Riihonen"},{"@pid":"34/4445","text":"Kaishun Wu"}]},"title":"Performance of Cooperative NOMA Systems under Passive Eavesdropping.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ElHalawanyRRW18","doi":"10.1109/GLOCOM.2018.8647883","ee":"https://doi.org/10.1109/GLOCOM.2018.8647883","url":"https://dblp.org/rec/conf/globecom/ElHalawanyRRW18"}, "url":"URL#2567016" }, { "@score":"1", "@id":"2567017", "info":{"authors":{"author":[{"@pid":"234/0857","text":"Mohamed A. ElMossallamy"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"16/1033","text":"Miao Pan"},{"@pid":"j/RikuJantti","text":"Riku Jäntti"},{"@pid":"65/3089","text":"Karim G. Seddik"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Backscatter Communications Over Ambient OFDM Signals Using Null Subcarriers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ElMossallamyHPJ18","doi":"10.1109/GLOCOM.2018.8647245","ee":"https://doi.org/10.1109/GLOCOM.2018.8647245","url":"https://dblp.org/rec/conf/globecom/ElMossallamyHPJ18"}, "url":"URL#2567017" }, { "@score":"1", "@id":"2567019", "info":{"authors":{"author":[{"@pid":"236/2819","text":"Abdulaziz E. Elfiqi"},{"@pid":"210/0027","text":"Ahmed E. Morra"},{"@pid":"236/2988","text":"Haitham S. Khallaf"},{"@pid":"04/5063","text":"Hossam M. H. Shalaby"},{"@pid":"17/1351","text":"Steve Hranilovic"}]},"title":"Two-Level MPPM-MDPSK Modulation for Free-Space Optical Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ElfiqiMKSH18","doi":"10.1109/GLOCOM.2018.8647624","ee":"https://doi.org/10.1109/GLOCOM.2018.8647624","url":"https://dblp.org/rec/conf/globecom/ElfiqiMKSH18"}, "url":"URL#2567019" }, { "@score":"1", "@id":"2567020", "info":{"authors":{"author":[{"@pid":"190/7278","text":"Anis Elgabli"},{"@pid":"224/0272","text":"Ali A. Elghariani"},{"@pid":"91/6560","text":"Vaneet Aggarwal"},{"@pid":"56/2643","text":"Mark R. Bell"}]},"title":"QoE-Aware Resource Allocation for Small Cells.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ElgabliEAB18","doi":"10.1109/GLOCOM.2018.8647828","ee":"https://doi.org/10.1109/GLOCOM.2018.8647828","url":"https://dblp.org/rec/conf/globecom/ElgabliEAB18"}, "url":"URL#2567020" }, { "@score":"1", "@id":"2567021", "info":{"authors":{"author":[{"@pid":"156/0070","text":"Medhat H. M. Elsayed"},{"@pid":"97/1972","text":"Melike Erol-Kantarci"}]},"title":"Deep Reinforcement Learning for Reducing Latency in Mission Critical Services.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ElsayedE18","doi":"10.1109/GLOCOM.2018.8647289","ee":"https://doi.org/10.1109/GLOCOM.2018.8647289","url":"https://dblp.org/rec/conf/globecom/ElsayedE18"}, "url":"URL#2567021" }, { "@score":"1", "@id":"2567022", "info":{"authors":{"author":[{"@pid":"174/1129","text":"Sara A. Elsayed"},{"@pid":"16/10701","text":"Sherin Abdel Hamid"},{"@pid":"07/3173","text":"Hossam S. Hassanein"}]},"title":"Probabilistic Cooperative Caching in VANETs for Social Networking.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ElsayedHH18","doi":"10.1109/GLOCOM.2018.8647302","ee":"https://doi.org/10.1109/GLOCOM.2018.8647302","url":"https://dblp.org/rec/conf/globecom/ElsayedHH18"}, "url":"URL#2567022" }, { "@score":"1", "@id":"2567029", "info":{"authors":{"author":[{"@pid":"236/2951","text":"Philippe Fabian"},{"@pid":"r/AbderrezakRachedi","text":"Abderrezak Rachedi"},{"@pid":"04/1783","text":"Cédric Gueguen"},{"@pid":"27/4473","text":"Stéphane Lohier"}]},"title":"Fuzzy-Based Objective Function for Routing Protocol in the Internet of Things.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FabianRGL18","doi":"10.1109/GLOCOM.2018.8647969","ee":"https://doi.org/10.1109/GLOCOM.2018.8647969","url":"https://dblp.org/rec/conf/globecom/FabianRGL18"}, "url":"URL#2567029" }, { "@score":"1", "@id":"2567030", "info":{"authors":{"author":[{"@pid":"97/5103-1","text":"Dian Fan 0001"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"85/6463-1","text":"Bo Ai 0001"},{"@pid":"37/7910","text":"Gongpu Wang"},{"@pid":"23/2071","text":"Zhangdui Zhong"},{"@pid":"33/2397","text":"Arumugam Nallanathan"}]},"title":"Self-Positioning for UAV Swarm via RARE Direction-of-Arrival Estimator.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FanGAWZN18","doi":"10.1109/GLOCOM.2018.8647569","ee":"https://doi.org/10.1109/GLOCOM.2018.8647569","url":"https://dblp.org/rec/conf/globecom/FanGAWZN18"}, "url":"URL#2567030" }, { "@score":"1", "@id":"2567031", "info":{"authors":{"author":[{"@pid":"211/2727","text":"Yajun Fan"},{"@pid":"236/3316","text":"Yuanqi Jia"},{"@pid":"212/1435","text":"Weilin Qu"},{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"63/6561","text":"Xiaomin Mu"},{"@pid":"52/6918-1","text":"Liuqing Yang 0001"}]},"title":"Differential Spatial Frequency Modulation with Orthogonal Frequency Division Multiplexing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FanJQCMY18","doi":"10.1109/GLOCOM.2018.8647570","ee":"https://doi.org/10.1109/GLOCOM.2018.8647570","url":"https://dblp.org/rec/conf/globecom/FanJQCMY18"}, "url":"URL#2567031" }, { "@score":"1", "@id":"2567032", "info":{"authors":{"author":[{"@pid":"231/8607","text":"Boyu Fan"},{"@pid":"156/2442","text":"Zhenchao Ouyang"},{"@pid":"25/4653-2","text":"Jianwei Niu 0002"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"Smart Water Flosser: A Novel Smart Oral Cleaner with IMU Sensor.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/FanONYR18","doi":"10.1109/GLOCOM.2018.8647697","ee":"https://doi.org/10.1109/GLOCOM.2018.8647697","url":"https://dblp.org/rec/conf/globecom/FanONYR18"}, "url":"URL#2567032" }, { "@score":"1", "@id":"2567033", "info":{"authors":{"author":[{"@pid":"150/6245","text":"Congmin Fan"},{"@pid":"70/4725-2","text":"Xiaojun Yuan 0002"},{"@pid":"80/3143","text":"Ying-Jun Angela Zhang"}]},"title":"Deep-Learning-Based Signal Detection for Banded Linear Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FanYZ18","doi":"10.1109/GLOCOM.2018.8648123","ee":"https://doi.org/10.1109/GLOCOM.2018.8648123","url":"https://dblp.org/rec/conf/globecom/FanYZ18"}, "url":"URL#2567033" }, { "@score":"1", "@id":"2567036", "info":{"authors":{"author":[{"@pid":"60/11266","text":"Hasan Farooq"},{"@pid":"214/6621","text":"Ahmad Asghar"},{"@pid":"167/1888","text":"Ali Imran 0001"}]},"title":"Mobility Prediction Empowered Proactive Energy Saving Framework for 5G Ultra-Dense HetNets.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FarooqAI18","doi":"10.1109/GLOCOM.2018.8647256","ee":"https://doi.org/10.1109/GLOCOM.2018.8647256","url":"https://dblp.org/rec/conf/globecom/FarooqAI18"}, "url":"URL#2567036" }, { "@score":"1", "@id":"2567037", "info":{"authors":{"author":[{"@pid":"176/5841","text":"Umar Bin Farooq"},{"@pid":"130/8651","text":"Umair Sajid Hashmi"},{"@pid":"74/2204","text":"Junaid Qadir 0001"},{"@pid":"167/1888","text":"Ali Imran 0001"},{"@pid":"41/74","text":"Adnan Noor Mian"}]},"title":"User Transmit Power Minimization through Uplink Resource Allocation and User Association in HetNets.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FarooqHQIM18","doi":"10.1109/GLOCOM.2018.8647409","ee":"https://doi.org/10.1109/GLOCOM.2018.8647409","url":"https://dblp.org/rec/conf/globecom/FarooqHQIM18"}, "url":"URL#2567037" }, { "@score":"1", "@id":"2567039", "info":{"authors":{"author":[{"@pid":"152/6426","text":"Bohao Feng"},{"@pid":"26/7938","text":"Guanglei Li"},{"@pid":"183/1902","text":"Guanwen Li"},{"@pid":"95/796","text":"Huachun Zhou"},{"@pid":"09/5441","text":"Hongke Zhang"},{"@pid":"90/3575-1","text":"Shui Yu 0001"}]},"title":"Efficient Mappings of Service Function Chains at Terrestrial-Satellite Hybrid Cloud Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FengLLZZY18","doi":"10.1109/GLOCOM.2018.8647330","ee":"https://doi.org/10.1109/GLOCOM.2018.8647330","url":"https://dblp.org/rec/conf/globecom/FengLLZZY18"}, "url":"URL#2567039" }, { "@score":"1", "@id":"2567040", "info":{"authors":{"author":[{"@pid":"43/8404","text":"Guangsheng Feng"},{"@pid":"19/8990","text":"Haibin Lv"},{"@pid":"86/3845","text":"Chengbo Wang"},{"@pid":"217/4781","text":"Fumin Xia"},{"@pid":"87/8407","text":"Hongwu Lv"},{"@pid":"19/3380","text":"Huiqiang Wang"},{"@pid":"82/4299","text":"Qian Zhao"}]},"title":"A Non-Cooperative Game-Theoretical Approach to Mobile Data Offloading.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/FengLWXLWZ18","doi":"10.1109/GLOCOM.2018.8647246","ee":"https://doi.org/10.1109/GLOCOM.2018.8647246","url":"https://dblp.org/rec/conf/globecom/FengLWXLWZ18"}, "url":"URL#2567040" }, { "@score":"1", "@id":"2567042", "info":{"authors":{"author":[{"@pid":"119/0564","text":"Dezhi Feng"},{"@pid":"67/2601-6","text":"Yan Shi 0006"},{"@pid":"29/8859","text":"Saptarshi Das"},{"@pid":"13/7447","text":"Subir Biswas"}]},"title":"Chaotic Pulse Position Coded PDUs for Secure and Energy-Efficient Data Networking.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FengSDB18","doi":"10.1109/GLOCOM.2018.8647407","ee":"https://doi.org/10.1109/GLOCOM.2018.8647407","url":"https://dblp.org/rec/conf/globecom/FengSDB18"}, "url":"URL#2567042" }, { "@score":"1", "@id":"2567043", "info":{"authors":{"author":[{"@pid":"199/1893","text":"Shaohan Feng"},{"@pid":"174/9863","text":"Zehui Xiong"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"37/1304-1","text":"Ping Wang 0001"},{"@pid":"211/7565","text":"Shaun Shuxun Wang"},{"@pid":"06/6785-25","text":"Yang Zhang 0025"}]},"title":"Cyber Risk Management with Risk Aware Cyber-Insurance in Blockchain Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FengXNWWZ18","doi":"10.1109/GLOCOM.2018.8648141","ee":"https://doi.org/10.1109/GLOCOM.2018.8648141","url":"https://dblp.org/rec/conf/globecom/FengXNWWZ18"}, "url":"URL#2567043" }, { "@score":"1", "@id":"2567045", "info":{"authors":{"author":[{"@pid":"195/6063","text":"Emmanouil Fountoulakis"},{"@pid":"36/8968","text":"Nikolaos Pappas 0001"},{"@pid":"98/2372-3","text":"Qi Liao 0003"},{"@pid":"70/6453","text":"Anthony Ephremides"},{"@pid":"83/2014","text":"Vangelis Angelakis"}]},"title":"Dynamic Power Control for Packets with Deadlines.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FountoulakisPLE18","doi":"10.1109/GLOCOM.2018.8648124","ee":"https://doi.org/10.1109/GLOCOM.2018.8648124","url":"https://dblp.org/rec/conf/globecom/FountoulakisPLE18"}, "url":"URL#2567045" }, { "@score":"1", "@id":"2567046", "info":{"authors":{"author":[{"@pid":"162/7860","text":"Juan A. Fraire"},{"@pid":"159/1890","text":"Gilles Nies"},{"@pid":"h/HolgerHermanns","text":"Holger Hermanns"},{"@pid":"236/3059","text":"Kristian Bay"},{"@pid":"49/9185","text":"Morten Bisgaard"}]},"title":"Battery-Aware Contact Plan Design for LEO Satellite Constellations: The Ulloriaq Case Study.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/FraireNHBB18","doi":"10.1109/GLOCOM.2018.8647822","ee":"https://doi.org/10.1109/GLOCOM.2018.8647822","url":"https://dblp.org/rec/conf/globecom/FraireNHBB18"}, "url":"URL#2567046" }, { "@score":"1", "@id":"2567047", "info":{"authors":{"author":[{"@pid":"119/0353","text":"Takuya Fujihashi"},{"@pid":"09/5364","text":"Makoto Kobayashi"},{"@pid":"97/5292","text":"Keiichi Endo"},{"@pid":"95/654","text":"Shunsuke Saruwatari"},{"@pid":"43/679","text":"Shinya Kobayashi"},{"@pid":"64/6874","text":"Takashi Watanabe 0001"}]},"title":"Graceful Quality Improvement in Wireless 360-Degree Video Delivery.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/FuiihashiKESKW18","doi":"10.1109/GLOCOM.2018.8647848","ee":"https://doi.org/10.1109/GLOCOM.2018.8647848","url":"https://dblp.org/rec/conf/globecom/FuiihashiKESKW18"}, "url":"URL#2567047" }, { "@score":"1", "@id":"2567049", "info":{"authors":{"author":[{"@pid":"09/10513","text":"Frank Gabriel"},{"@pid":"73/535","text":"Javier Acevedo"},{"@pid":"f/FHPFitzek","text":"Frank H. P. Fitzek"}]},"title":"Network Coding on Wireless Multipath for Tactile Internet with Latency and Resilience Requirements.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GabrielAF18","doi":"10.1109/GLOCOM.2018.8647368","ee":"https://doi.org/10.1109/GLOCOM.2018.8647368","url":"https://dblp.org/rec/conf/globecom/GabrielAF18"}, "url":"URL#2567049" }, { "@score":"1", "@id":"2567051", "info":{"authors":{"author":[{"@pid":"191/6503","text":"Shijian Gao"},{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"52/6918-1","text":"Liuqing Yang 0001"}]},"title":"Generalized Beamspace Modulation for mmWave MIMO.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GaoCY18","doi":"10.1109/GLOCOM.2018.8647976","ee":"https://doi.org/10.1109/GLOCOM.2018.8647976","url":"https://dblp.org/rec/conf/globecom/GaoCY18"}, "url":"URL#2567051" }, { "@score":"1", "@id":"2567052", "info":{"authors":{"author":[{"@pid":"236/2976","text":"Dong Gao"},{"@pid":"236/3191","text":"Zilin Liang"},{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"32/6803","text":"Octavia A. Dobre"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"Stackelberg Game-Based Energy Efficient Power Allocation for Heterogeneous NOMA Networks.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GaoLZDK18","doi":"10.1109/GLOCOM.2018.8647786","ee":"https://doi.org/10.1109/GLOCOM.2018.8647786","url":"https://dblp.org/rec/conf/globecom/GaoLZDK18"}, "url":"URL#2567052" }, { "@score":"1", "@id":"2567054", "info":{"authors":{"author":[{"@pid":"90/2817","text":"Yun Gao"},{"@pid":"90/2018-1","text":"Xin Wei 0001"},{"@pid":"04/10675","text":"Gengxin Zhang"},{"@pid":"81/4761-2","text":"Liang Zhou 0002"},{"@pid":"140/9501","text":"Zhenjiang Dong"}]},"title":"Mining IPTV User Behaviors with an Enhanced LDA Model.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GaoWZZD18","doi":"10.1109/GLOCOM.2018.8647754","ee":"https://doi.org/10.1109/GLOCOM.2018.8647754","url":"https://dblp.org/rec/conf/globecom/GaoWZZD18"}, "url":"URL#2567054" }, { "@score":"1", "@id":"2567055", "info":{"authors":{"author":[{"@pid":"182/6937","text":"Sumit Gautam"},{"@pid":"31/8853","text":"Eva Lagunas"},{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Sequential Resource Distribution Technique for Multi-User OFDM-SWIPT Based Cooperative Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GautamLCO18","doi":"10.1109/GLOCOM.2018.8647813","ee":"https://doi.org/10.1109/GLOCOM.2018.8647813","url":"https://dblp.org/rec/conf/globecom/GautamLCO18"}, "url":"URL#2567055" }, { "@score":"1", "@id":"2567057", "info":{"authors":{"author":[{"@pid":"25/2031","text":"Feng Ge"},{"@pid":"92/3660-1","text":"Yuan Shen 0001"}]},"title":"Realtime Indoor Localization on Smartphones by Multi-Grained Grid-Based Filters.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GeS18","doi":"10.1109/GLOCOM.2018.8647773","ee":"https://doi.org/10.1109/GLOCOM.2018.8647773","url":"https://dblp.org/rec/conf/globecom/GeS18"}, "url":"URL#2567057" }, { "@score":"1", "@id":"2567058", "info":{"authors":{"author":[{"@pid":"177/4804","text":"Yinghao Ge"},{"@pid":"18/7902","text":"Weile Zhang"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"07/9706","text":"Pengcheng Mu"},{"@pid":"223/9562","text":"Guangzhe Zhao"}]},"title":"Angle-Domain Frequency Synchronization for Massive MIMO Uplink with Adaptive MUI Suppression.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GeZGMZ18","doi":"10.1109/GLOCOM.2018.8647596","ee":"https://doi.org/10.1109/GLOCOM.2018.8647596","url":"https://dblp.org/rec/conf/globecom/GeZGMZ18"}, "url":"URL#2567058" }, { "@score":"1", "@id":"2567059", "info":{"authors":{"author":[{"@pid":"213/3583","text":"Nadim Ghaddar"},{"@pid":"93/524-1","text":"Young-Han Kim 0001"},{"@pid":"m/LaurenceBMilstein","text":"Laurence B. Milstein"},{"@pid":"36/2375","text":"Liangping Ma"},{"@pid":"81/1917","text":"Byung K. Yi"}]},"title":"Joint Channel Estimation and Error Correction for Finite-State Markov Channels Using Polar Codes.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GhaddarKMMY18","doi":"10.1109/GLOCOM.2018.8647296","ee":"https://doi.org/10.1109/GLOCOM.2018.8647296","url":"https://dblp.org/rec/conf/globecom/GhaddarKMMY18"}, "url":"URL#2567059" }, { "@score":"1", "@id":"2567060", "info":{"authors":{"author":[{"@pid":"221/0411","text":"Anastassia Gharib"},{"@pid":"10/7465","text":"Waleed Ejaz"},{"@pid":"45/2301","text":"Mohamed Ibnkahla"}]},"title":"Distributed Learning-Based Multi-Band Multi-User Cooperative Sensing in Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GharibEI18","doi":"10.1109/GLOCOM.2018.8648118","ee":"https://doi.org/10.1109/GLOCOM.2018.8648118","url":"https://dblp.org/rec/conf/globecom/GharibEI18"}, "url":"URL#2567060" }, { "@score":"1", "@id":"2567061", "info":{"authors":{"author":[{"@pid":"120/8873","text":"Hakim Ghazzai"},{"@pid":"04/8235","text":"Mahdi Ben Ghorbel"},{"@pid":"k/AndreasKassler","text":"Andreas Kassler"},{"@pid":"90/5456-2","text":"Md. Jahangir Hossain 0002"}]},"title":"Trajectory Optimization for Cooperative Dual-Band UAV Swarms.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GhazzaiGKH18","doi":"10.1109/GLOCOM.2018.8648087","ee":"https://doi.org/10.1109/GLOCOM.2018.8648087","url":"https://dblp.org/rec/conf/globecom/GhazzaiGKH18"}, "url":"URL#2567061" }, { "@score":"1", "@id":"2567062", "info":{"authors":{"author":[{"@pid":"227/7585","text":"Waled Gheth"},{"@pid":"137/6304","text":"Khaled M. Rabie"},{"@pid":"39/8080","text":"Bamidele Adebisi"},{"@pid":"158/4603","text":"Muhammad Ijaz"},{"@pid":"227/7445","text":"Georgina Harris"}]},"title":"Performance Analysis of Integrated Power-Line/Visible-Light Communication Systems with AF Relaying.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GhethRAIH18","doi":"10.1109/GLOCOM.2018.8647270","ee":"https://doi.org/10.1109/GLOCOM.2018.8647270","url":"https://dblp.org/rec/conf/globecom/GhethRAIH18"}, "url":"URL#2567062" }, { "@score":"1", "@id":"2567063", "info":{"authors":{"author":[{"@pid":"04/8235","text":"Mahdi Ben Ghorbel"},{"@pid":"120/8873","text":"Hakim Ghazzai"},{"@pid":"25/10126","text":"Abdullah Kadri"},{"@pid":"90/5456-2","text":"Md. Jahangir Hossain 0002"},{"@pid":"99/69","text":"Hamid Menouar"}]},"title":"An Energy Efficient Overlay Cognitive Radio Approach in UAV-Based Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GhorbelGKHM18","doi":"10.1109/GLOCOM.2018.8647591","ee":"https://doi.org/10.1109/GLOCOM.2018.8647591","url":"https://dblp.org/rec/conf/globecom/GhorbelGKHM18"}, "url":"URL#2567063" }, { "@score":"1", "@id":"2567064", "info":{"authors":{"author":[{"@pid":"19/6568","text":"Debasish Ghose"},{"@pid":"139/7420","text":"Luis Tello-Oquendo"},{"@pid":"64/5183","text":"Frank Y. Li"},{"@pid":"74/6242","text":"Vicent Pla"}]},"title":"Lightweight Relay Selection in Multi-Hop Wake-Up Radio Enabled IoT Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GhoseTLP18","doi":"10.1109/GLOCOM.2018.8647449","ee":"https://doi.org/10.1109/GLOCOM.2018.8647449","url":"https://dblp.org/rec/conf/globecom/GhoseTLP18"}, "url":"URL#2567064" }, { "@score":"1", "@id":"2567065", "info":{"authors":{"author":[{"@pid":"06/900-5","text":"Saptarshi Ghosh 0005"},{"@pid":"59/5712","text":"Tasos Dagiuklas"},{"@pid":"19/8080","text":"Muddesar Iqbal"}]},"title":"Energy-Aware IP Routing Over SDN.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GhoshDI18","doi":"10.1109/GLOCOM.2018.8647764","ee":"https://doi.org/10.1109/GLOCOM.2018.8647764","url":"https://dblp.org/rec/conf/globecom/GhoshDI18"}, "url":"URL#2567065" }, { "@score":"1", "@id":"2567066", "info":{"authors":{"author":[{"@pid":"18/5103","text":"Jie Gong"},{"@pid":"64/3062-7","text":"Xiang Chen 0007"},{"@pid":"35/573-1","text":"Xiao Ma 0001"}]},"title":"Energy-Age Tradeoff in Status Update Communication Systems with Retransmission.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GongCM18","doi":"10.1109/GLOCOM.2018.8647730","ee":"https://doi.org/10.1109/GLOCOM.2018.8647730","url":"https://dblp.org/rec/conf/globecom/GongCM18"}, "url":"URL#2567066" }, { "@score":"1", "@id":"2567067", "info":{"authors":{"author":[{"@pid":"211/4540","text":"Nehuen Gonzalez-Montoro"},{"@pid":"03/3228","text":"Jorge M. Finochietto"},{"@pid":"81/5311","text":"Andrea Bianco"}]},"title":"Optimal Provisioning Strategies for Translucent Elastic Optical Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Gonzalez-Montoro18","doi":"10.1109/GLOCOM.2018.8647424","ee":"https://doi.org/10.1109/GLOCOM.2018.8647424","url":"https://dblp.org/rec/conf/globecom/Gonzalez-Montoro18"}, "url":"URL#2567067" }, { "@score":"1", "@id":"2567068", "info":{"authors":{"author":[{"@pid":"211/4540","text":"Nehuen Gonzalez-Montoro"},{"@pid":"03/3228","text":"Jorge M. Finochietto"},{"@pid":"81/5311","text":"Andrea Bianco"}]},"title":"Translucent Provisioning in Elastic Optical Networks with Sliceable Bandwidth Variable Transponders.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Gonzalez-Montoro18a","doi":"10.1109/GLOCOM.2018.8647712","ee":"https://doi.org/10.1109/GLOCOM.2018.8647712","url":"https://dblp.org/rec/conf/globecom/Gonzalez-Montoro18a"}, "url":"URL#2567068" }, { "@score":"1", "@id":"2567069", "info":{"authors":{"author":[{"@pid":"18/9192","text":"Daisuke Goto"},{"@pid":"129/4010","text":"Hiroki Shibayama"},{"@pid":"68/4491","text":"Fumihiro Yamashita"},{"@pid":"29/3432","text":"Takaya Yamazato"}]},"title":"LEO-MIMO Satellite Systems for High Capacity Transmission.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GotoSYY18","doi":"10.1109/GLOCOM.2018.8647694","ee":"https://doi.org/10.1109/GLOCOM.2018.8647694","url":"https://dblp.org/rec/conf/globecom/GotoSYY18"}, "url":"URL#2567069" }, { "@score":"1", "@id":"2567070", "info":{"authors":{"author":[{"@pid":"204/6381","text":"Eleni Goudeli"},{"@pid":"85/11470","text":"Constantinos Psomas"},{"@pid":"79/5692","text":"Ioannis Krikidis"}]},"title":"An Integrated SWIPT Receiver Using Non-Coherent Detection Schemes.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GoudeliPK18","doi":"10.1109/GLOCOM.2018.8647432","ee":"https://doi.org/10.1109/GLOCOM.2018.8647432","url":"https://dblp.org/rec/conf/globecom/GoudeliPK18"}, "url":"URL#2567070" }, { "@score":"1", "@id":"2567071", "info":{"authors":{"author":[{"@pid":"03/3019","text":"Amit Goyal"},{"@pid":"24/6409","text":"Shalini Batra"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"194/6963","text":"Gagangeet Singh Aujla"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"Adaptive Skip Graph Framework for Peer-to-Peer Networks: Search Time Complexity Analysis.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GoyalBKAO18","doi":"10.1109/GLOCOM.2018.8648018","ee":"https://doi.org/10.1109/GLOCOM.2018.8648018","url":"https://dblp.org/rec/conf/globecom/GoyalBKAO18"}, "url":"URL#2567071" }, { "@score":"1", "@id":"2567072", "info":{"authors":{"author":[{"@pid":"150/8806","text":"Tim Grube"},{"@pid":"86/10013","text":"Jörg Daubert"},{"@pid":"m/MaxMuhlhauser","text":"Max Mühlhäuser"}]},"title":"Asymmetric DCnets for Effective and Efficient Sender Anonymity.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GrubeDM18","doi":"10.1109/GLOCOM.2018.8647607","ee":"https://doi.org/10.1109/GLOCOM.2018.8647607","url":"https://dblp.org/rec/conf/globecom/GrubeDM18"}, "url":"URL#2567072" }, { "@score":"1", "@id":"2567073", "info":{"authors":{"author":[{"@pid":"232/3296","text":"Zhuojia Gu"},{"@pid":"16/6714","text":"Hancheng Lu"},{"@pid":"232/3381","text":"Daren Zhu"},{"@pid":"210/6307","text":"Yujiao Lu"}]},"title":"Joint Power Allocation and Caching Optimization in Fiber-Wireless Access Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GuLZL18","doi":"10.1109/GLOCOM.2018.8647800","ee":"https://doi.org/10.1109/GLOCOM.2018.8647800","url":"https://dblp.org/rec/conf/globecom/GuLZL18"}, "url":"URL#2567073" }, { "@score":"1", "@id":"2567074", "info":{"authors":{"author":[{"@pid":"18/4144","text":"Qi Gu"},{"@pid":"37/7910","text":"Gongpu Wang"},{"@pid":"77/7811","text":"Jingxian Liu"},{"@pid":"86/4912","text":"Rongfei Fan"},{"@pid":"97/5103-1","text":"Dian Fan 0001"},{"@pid":"23/2071","text":"Zhangdui Zhong"}]},"title":"Optimal Offloading with Non-Orthogonal Multiple Access in Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GuWLFFZ18","doi":"10.1109/GLOCOM.2018.8647179","ee":"https://doi.org/10.1109/GLOCOM.2018.8647179","url":"https://dblp.org/rec/conf/globecom/GuWLFFZ18"}, "url":"URL#2567074" }, { "@score":"1", "@id":"2567075", "info":{"authors":{"author":[{"@pid":"15/4208-3","text":"Yu Gu 0003"},{"@pid":"91/4353-11","text":"Xiang Zhang 0011"},{"@pid":"66/190-9","text":"Chao Li 0009"},{"@pid":"17/4005","text":"Fuji Ren"},{"@pid":"17/2703-2","text":"Jie Li 0002"},{"@pid":"40/6686-2","text":"Zhi Liu 0002"}]},"title":"Your WiFi Knows How You Behave: Leveraging WiFi Channel Data for Behavior Analysis.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuZLRLL18","doi":"10.1109/GLOCOM.2018.8647547","ee":"https://doi.org/10.1109/GLOCOM.2018.8647547","url":"https://dblp.org/rec/conf/globecom/GuZLRLL18"}, "url":"URL#2567075" }, { "@score":"1", "@id":"2567076", "info":{"authors":{"author":[{"@pid":"02/213","text":"Bo Gu"},{"@pid":"65/3277","text":"Zhenyu Zhou"},{"@pid":"33/6012","text":"Shahid Mumtaz"},{"@pid":"33/4569","text":"Valerio Frascolla"},{"@pid":"55/3719","text":"Ali Kashif Bashir"}]},"title":"Context-Aware Task Offloading for Multi-Access Edge Computing: Matching with Externalities.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GuZMFB18","doi":"10.1109/GLOCOM.2018.8647845","ee":"https://doi.org/10.1109/GLOCOM.2018.8647845","url":"https://dblp.org/rec/conf/globecom/GuZMFB18"}, "url":"URL#2567076" }, { "@score":"1", "@id":"2567078", "info":{"authors":{"author":[{"@pid":"213/0917","text":"Sanghai Guan"},{"@pid":"62/2631-1","text":"Jingjing Wang 0001"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"00/440-1","text":"Yong Ren 0001"},{"@pid":"85/964","text":"Abderrahim Benslimane"}]},"title":"Colonel Blotto Game Aided Attack-Defense Analysis in Real-World Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuanWJHRB18","doi":"10.1109/GLOCOM.2018.8647886","ee":"https://doi.org/10.1109/GLOCOM.2018.8647886","url":"https://dblp.org/rec/conf/globecom/GuanWJHRB18"}, "url":"URL#2567078" }, { "@score":"1", "@id":"2567080", "info":{"authors":{"author":[{"@pid":"159/4171","text":"Arturo Guizar"},{"@pid":"57/5956","text":"Mickael Maman"},{"@pid":"73/9314","text":"Valérian Mannoni"},{"@pid":"59/9197","text":"Francois Dehmas"},{"@pid":"81/2241","text":"Vincent Berg"}]},"title":"Adaptive LPWA Networks Based on Turbo-FSK: from PHY to MAC Layer Performance Evaluation.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GuizarMMDB18","doi":"10.1109/GLOCOM.2018.8647475","ee":"https://doi.org/10.1109/GLOCOM.2018.8647475","url":"https://dblp.org/rec/conf/globecom/GuizarMMDB18"}, "url":"URL#2567080" }, { "@score":"1", "@id":"2567082", "info":{"authors":{"author":[{"@pid":"140/1393","text":"San Gultekin"},{"@pid":"86/40","text":"Aonan Zhang"},{"@pid":"97/7035","text":"John W. Paisley"}]},"title":"Asymptotic Simulated Annealing for Variational Inference.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GultekinZP18","doi":"10.1109/GLOCOM.2018.8647376","ee":"https://doi.org/10.1109/GLOCOM.2018.8647376","url":"https://dblp.org/rec/conf/globecom/GultekinZP18"}, "url":"URL#2567082" }, { "@score":"1", "@id":"2567083", "info":{"authors":{"author":[{"@pid":"174/6724","text":"Kemal Guner"},{"@pid":"29/3036","text":"Tevfik Kosar"}]},"title":"Energy-Efficient Mobile Network I/O.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GunerK18","doi":"10.1109/GLOCOM.2018.8647651","ee":"https://doi.org/10.1109/GLOCOM.2018.8647651","url":"https://dblp.org/rec/conf/globecom/GunerK18"}, "url":"URL#2567083" }, { "@score":"1", "@id":"2567084", "info":{"authors":{"author":[{"@pid":"129/4918","text":"Chongtao Guo"},{"@pid":"122/5651","text":"Le Liang"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Resource Allocation for Low-Latency Vehicular Communications with Packet Retransmission.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuoLL18","doi":"10.1109/GLOCOM.2018.8647866","ee":"https://doi.org/10.1109/GLOCOM.2018.8647866","url":"https://dblp.org/rec/conf/globecom/GuoLL18"}, "url":"URL#2567084" }, { "@score":"1", "@id":"2567085", "info":{"authors":{"author":[{"@pid":"236/3321","text":"Weiran Guo"},{"@pid":"126/5767","text":"An-An Lu"},{"@pid":"79/1472","text":"Xin Meng"},{"@pid":"05/5369","text":"Xiqi Gao 0001"},{"@pid":"90/4825","text":"Ni Ma"}]},"title":"Broad Coverage Precoding for Massive MIMO with Alternating Projections.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuoLMGM18","doi":"10.1109/GLOCOM.2018.8647391","ee":"https://doi.org/10.1109/GLOCOM.2018.8647391","url":"https://dblp.org/rec/conf/globecom/GuoLMGM18"}, "url":"URL#2567085" }, { "@score":"1", "@id":"2567087", "info":{"authors":{"author":[{"@pid":"42/8204","text":"Hongzhi Guo"},{"@pid":"84/6889-52","text":"Jie Zhang 0052"},{"@pid":"40/6246-1","text":"Jiajia Liu 0001"},{"@pid":"22/1887","text":"Haibin Zhang"},{"@pid":"69/1010-4","text":"Wen Sun 0004"}]},"title":"Energy-Efficient Task Offloading and Transmit Power Allocation for Ultra-Dense Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuoZLZS18","doi":"10.1109/GLOCOM.2018.8647895","ee":"https://doi.org/10.1109/GLOCOM.2018.8647895","url":"https://dblp.org/rec/conf/globecom/GuoZLZS18"}, "url":"URL#2567087" }, { "@score":"1", "@id":"2567089", "info":{"authors":{"author":[{"@pid":"167/0667","text":"Huayan Guo"},{"@pid":"19/771-1","text":"Qianqian Zhang 0001"},{"@pid":"175/2475","text":"Sa Xiao"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"Multi-Antenna Beamforming Receiver for Cognitive Ambient Backscatter Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuoZXL18","doi":"10.1109/GLOCOM.2018.8647741","ee":"https://doi.org/10.1109/GLOCOM.2018.8647741","url":"https://dblp.org/rec/conf/globecom/GuoZXL18"}, "url":"URL#2567089" }, { "@score":"1", "@id":"2567090", "info":{"authors":{"author":[{"@pid":"91/7449","text":"Naveen Gupta"},{"@pid":"179/8168","text":"Durgesh Kumar"},{"@pid":"89/3598","text":"Vivek Ashok Bohara"}]},"title":"A Novel User Selection and Resource Allocation Framework for Cooperative D2D Communication.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuptaKB18","doi":"10.1109/GLOCOM.2018.8647818","ee":"https://doi.org/10.1109/GLOCOM.2018.8647818","url":"https://dblp.org/rec/conf/globecom/GuptaKB18"}, "url":"URL#2567090" }, { "@score":"1", "@id":"2567091", "info":{"authors":{"author":[{"@pid":"236/2914","text":"Sayan Sen Gupta"},{"@pid":"59/3422","text":"Neelesh B. Mehta"}]},"title":"Revisiting Censoring in Energy Harvesting Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/GuptaM18","doi":"10.1109/GLOCOM.2018.8647464","ee":"https://doi.org/10.1109/GLOCOM.2018.8647464","url":"https://dblp.org/rec/conf/globecom/GuptaM18"}, "url":"URL#2567091" }, { "@score":"1", "@id":"2567092", "info":{"authors":{"author":[{"@pid":"188/6357","text":"Saurav Gupta"},{"@pid":"51/7-1","text":"Ajit Kumar Sahoo 0001"},{"@pid":"116/0906","text":"Upendra Kumar Sahoo"}]},"title":"In-Network Distributed Identification of Wiener and Volterra-Laguerre Models for Nonlinear Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/GuptaSS18","doi":"10.1109/GLOCOM.2018.8648133","ee":"https://doi.org/10.1109/GLOCOM.2018.8648133","url":"https://dblp.org/rec/conf/globecom/GuptaSS18"}, "url":"URL#2567092" }, { "@score":"1", "@id":"2567093", "info":{"authors":{"author":[{"@pid":"194/7014","text":"Mohammad Hadian"},{"@pid":"194/6940","text":"Thamer Altuwaiyan"},{"@pid":"50/8499","text":"Haoyu Wang"},{"@pid":"92/3528","text":"Xiaohui Liang"}]},"title":"WiLock: Exploiting Wireless Signals for Device-Free Continuous Authentication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HadianAWL18","doi":"10.1109/GLOCOM.2018.8647248","ee":"https://doi.org/10.1109/GLOCOM.2018.8647248","url":"https://dblp.org/rec/conf/globecom/HadianAWL18"}, "url":"URL#2567093" }, { "@score":"1", "@id":"2567095", "info":{"authors":{"author":[{"@pid":"85/8603","text":"Ahmad Abu Al Haija"},{"@pid":"86/2829","text":"Ben Liang 0001"},{"@pid":"61/1489-1","text":"Min Dong 0001"},{"@pid":"02/10100","text":"Gary Boudreau"}]},"title":"Efficient Multi-User Quantize-Forward Relaying in Massive MIMO HetNets.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HaijaLDB18","doi":"10.1109/GLOCOM.2018.8647994","ee":"https://doi.org/10.1109/GLOCOM.2018.8647994","url":"https://dblp.org/rec/conf/globecom/HaijaLDB18"}, "url":"URL#2567095" }, { "@score":"1", "@id":"2567098", "info":{"authors":{"author":[{"@pid":"21/7707","text":"Sofiane Hamrioui"},{"@pid":"212/9933","text":"Camil Adam Mohamed Hamrioui"},{"@pid":"85/9019","text":"Isabel de la Torre Díez"},{"@pid":"l/PascalLorenz","text":"Pascal Lorenz"},{"@pid":"l/JaimeLloret","text":"Jaime Lloret Mauri"}]},"title":"Improving IoT Communications Based on Smart Routing Algorithms.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HamriouiHDLM18","doi":"10.1109/GLOCOM.2018.8647183","ee":"https://doi.org/10.1109/GLOCOM.2018.8647183","url":"https://dblp.org/rec/conf/globecom/HamriouiHDLM18"}, "url":"URL#2567098" }, { "@score":"1", "@id":"2567099", "info":{"authors":{"author":[{"@pid":"94/9625-1","text":"Di Han 0001"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"},{"@pid":"59/3415","text":"Jianqing Liu"},{"@pid":"f/YuguangFang","text":"Yuguang Fang"}]},"title":"A Probabilistic Scheduling Policy for Energy Efficient UAV Communications with Delay Constraints.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HanCLF18","doi":"10.1109/GLOCOM.2018.8647383","ee":"https://doi.org/10.1109/GLOCOM.2018.8647383","url":"https://dblp.org/rec/conf/globecom/HanCLF18"}, "url":"URL#2567099" }, { "@score":"1", "@id":"2567101", "info":{"authors":{"author":[{"@pid":"157/9688","text":"Qiyi Han"},{"@pid":"43/2613-4","text":"Lei You 0004"},{"@pid":"91/2752","text":"Fang Miao"},{"@pid":"33/8953","text":"Wenjie Fan"}]},"title":"Modeling Rumor Spreading with Repeated Propagations in Multilayer Online Social Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HanYMF18","doi":"10.1109/GLOCOM.2018.8647992","ee":"https://doi.org/10.1109/GLOCOM.2018.8647992","url":"https://dblp.org/rec/conf/globecom/HanYMF18"}, "url":"URL#2567101" }, { "@score":"1", "@id":"2567102", "info":{"authors":{"author":[{"@pid":"176/6590","text":"Sara Handouf"},{"@pid":"62/2911","text":"Essaid Sabir"},{"@pid":"176/1214","text":"Hajar El Hammouti"},{"@pid":"89/7602","text":"Mohammed Sadik"}]},"title":"Availability and Pricing Combined Framework for Rivalry Flying Access Network Providers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HandoufSHS18","doi":"10.1109/GLOCOM.2018.8647951","ee":"https://doi.org/10.1109/GLOCOM.2018.8647951","url":"https://dblp.org/rec/conf/globecom/HandoufSHS18"}, "url":"URL#2567102" }, { "@score":"1", "@id":"2567103", "info":{"authors":{"author":[{"@pid":"236/3320","text":"Asif Hanif"},{"@pid":"235/2256","text":"Muhammad Saad Chughtai"},{"@pid":"236/3106","text":"Abuzar Ahmad Qureshi"},{"@pid":"236/3309","text":"Abdullah Aleem"},{"@pid":"163/1309","text":"Farasat Munir"},{"@pid":"49/1440-3","text":"Muhammad Tahir 0003"},{"@pid":"62/5444","text":"Momin Uppal"}]},"title":"Non-Obtrusive Detection of Concealed Metallic Objects Using Commodity WiFi Radios.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HanifCQAMTU18","doi":"10.1109/GLOCOM.2018.8647871","ee":"https://doi.org/10.1109/GLOCOM.2018.8647871","url":"https://dblp.org/rec/conf/globecom/HanifCQAMTU18"}, "url":"URL#2567103" }, { "@score":"1", "@id":"2567104", "info":{"authors":{"author":[{"@pid":"195/7233","text":"Jialu Hao"},{"@pid":"83/5898-1","text":"Cheng Huang 0001"},{"@pid":"35/295-24","text":"Jian Liu 0024"},{"@pid":"55/10764","text":"Ming Xian"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HaoHLXS18","doi":"10.1109/GLOCOM.2018.8647659","ee":"https://doi.org/10.1109/GLOCOM.2018.8647659","url":"https://dblp.org/rec/conf/globecom/HaoHLXS18"}, "url":"URL#2567104" }, { "@score":"1", "@id":"2567105", "info":{"authors":{"author":[{"@pid":"80/4735","text":"Jie Hao"},{"@pid":"12/6277-2","text":"Ran Wang 0002"},{"@pid":"181/2745-2","text":"Yi Zhuang 0002"},{"@pid":"01/986","text":"Baoxian Zhang"}]},"title":"A Flexible Network Utility Optimization Approach for Energy Harvesting Sensor Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HaoWZZ18","doi":"10.1109/GLOCOM.2018.8648082","ee":"https://doi.org/10.1109/GLOCOM.2018.8648082","url":"https://dblp.org/rec/conf/globecom/HaoWZZ18"}, "url":"URL#2567105" }, { "@score":"1", "@id":"2567106", "info":{"authors":{"author":[{"@pid":"187/6908","text":"Alireza Haqiqatnejad"},{"@pid":"16/2007","text":"Farbod Kayhan"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Robust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HaqiqatnejadKO18","doi":"10.1109/GLOCOM.2018.8647896","ee":"https://doi.org/10.1109/GLOCOM.2018.8647896","url":"https://dblp.org/rec/conf/globecom/HaqiqatnejadKO18"}, "url":"URL#2567106" }, { "@score":"1", "@id":"2567107", "info":{"authors":{"author":[{"@pid":"176/5836","text":"Ahmed H. Hareedy"},{"@pid":"150/6263","text":"Homa Esfahanizadeh"},{"@pid":"91/2333","text":"Andrew Tan"},{"@pid":"35/3690","text":"Lara Dolecek"}]},"title":"Spatially-Coupled Code Design for Partial-Response Channels: Optimal Object-Minimization Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HareedyETD18","doi":"10.1109/GLOCOM.2018.8647335","ee":"https://doi.org/10.1109/GLOCOM.2018.8647335","url":"https://dblp.org/rec/conf/globecom/HareedyETD18"}, "url":"URL#2567107" }, { "@score":"1", "@id":"2567108", "info":{"authors":{"author":[{"@pid":"142/1614","text":"Muhammad Haris"},{"@pid":"00/10615","text":"Sobia Jangsher"},{"@pid":"44/9529","text":"Hassaan Khaliq Qureshi"},{"@pid":"33/6012","text":"Shahid Mumtaz"},{"@pid":"92/7742","text":"Anwer Al-Dulaimi"}]},"title":"Power Allocation for Reliable Smart Grid Communication Employing Neighborhood Area Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HarisJQMA18","doi":"10.1109/GLOCOM.2018.8647298","ee":"https://doi.org/10.1109/GLOCOM.2018.8647298","url":"https://dblp.org/rec/conf/globecom/HarisJQMA18"}, "url":"URL#2567108" }, { "@score":"1", "@id":"2567109", "info":{"authors":{"author":[{"@pid":"132/6648","text":"Mohammed Zaki Hasan"},{"@pid":"45/1477","text":"Hussain M. Al-Rizzo"},{"@pid":"18/3784","text":"Fadi Al-Turjman 0001"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"50/5718","text":"Ayman Radwan"}]},"title":"Internet of Things Task Scheduling in Cloud Environment Using Particle Swarm Optimization.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HasanAARR18","doi":"10.1109/GLOCOM.2018.8647917","ee":"https://doi.org/10.1109/GLOCOM.2018.8647917","url":"https://dblp.org/rec/conf/globecom/HasanAARR18"}, "url":"URL#2567109" }, { "@score":"1", "@id":"2567111", "info":{"authors":{"author":[{"@pid":"236/2875","text":"Osama Hassan"},{"@pid":"17/664","text":"Erdal Panayirci"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"Physical-Layer Security for Indoor Visible Light Communications with Space Shift Keying Modulation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HassanPPH18","doi":"10.1109/GLOCOM.2018.8648035","ee":"https://doi.org/10.1109/GLOCOM.2018.8648035","url":"https://dblp.org/rec/conf/globecom/HassanPPH18"}, "url":"URL#2567111" }, { "@score":"1", "@id":"2567112", "info":{"authors":{"author":[{"@pid":"203/9375","text":"Shayan Hassanpour"},{"@pid":"45/3551","text":"Dirk Wübben"},{"@pid":"38/836","text":"Armin Dekorsy"}]},"title":"A Graph-Based Message Passing Approach for Noisy Source Coding via Information Bottleneck Principle.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HassanpourWD18","doi":"10.1109/GLOCOM.2018.8647224","ee":"https://doi.org/10.1109/GLOCOM.2018.8647224","url":"https://dblp.org/rec/conf/globecom/HassanpourWD18"}, "url":"URL#2567112" }, { "@score":"1", "@id":"2567113", "info":{"authors":{"author":[{"@pid":"161/9963","text":"Fadoua Hassen"},{"@pid":"89/5339","text":"Lotfi Mhamdi"}]},"title":"A New Paradigm to Build Scalable Packet-Switches for Data Center Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HassenM18","doi":"10.1109/GLOCOM.2018.8647295","ee":"https://doi.org/10.1109/GLOCOM.2018.8647295","url":"https://dblp.org/rec/conf/globecom/HassenM18"}, "url":"URL#2567113" }, { "@score":"1", "@id":"2567114", "info":{"authors":{"author":[{"@pid":"145/1304","text":"Ghaith Hattab"},{"@pid":"22/3082","text":"Danijela Cabric"}]},"title":"Distributed Wideband Spatio-Spectral Sensing for Unlicensed Massive IoT Communications.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HattabC18","doi":"10.1109/GLOCOM.2018.8647200","ee":"https://doi.org/10.1109/GLOCOM.2018.8647200","url":"https://dblp.org/rec/conf/globecom/HattabC18"}, "url":"URL#2567114" }, { "@score":"1", "@id":"2567115", "info":{"authors":{"author":[{"@pid":"145/1304","text":"Ghaith Hattab"},{"@pid":"22/3082","text":"Danijela Cabric"}]},"title":"Performance Analysis of Uplink Cellular IoT Using Different Deployments of Data Aggregators.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HattabC18a","doi":"10.1109/GLOCOM.2018.8647923","ee":"https://doi.org/10.1109/GLOCOM.2018.8647923","url":"https://dblp.org/rec/conf/globecom/HattabC18a"}, "url":"URL#2567115" }, { "@score":"1", "@id":"2567116", "info":{"authors":{"author":[{"@pid":"190/3541","text":"Ali Mohammad Hayajneh"},{"@pid":"26/9611","text":"Syed Ali Raza Zaidi"},{"@pid":"80/5555","text":"Desmond C. McLernon"},{"@pid":"21/4583","text":"Moe Z. Win"},{"@pid":"167/1888","text":"Ali Imran 0001"},{"@pid":"51/2718","text":"Mounir Ghogho"}]},"title":"Optimal Coverage and Rate in Downlink Cellular Networks: A SIR Meta-Distribution Based Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HayajnehZMWIG18","doi":"10.1109/GLOCOM.2018.8648045","ee":"https://doi.org/10.1109/GLOCOM.2018.8648045","url":"https://dblp.org/rec/conf/globecom/HayajnehZMWIG18"}, "url":"URL#2567116" }, { "@score":"1", "@id":"2567117", "info":{"authors":{"author":[{"@pid":"176/3890","text":"Yusaku Hayamizu"},{"@pid":"236/3151","text":"Kazuki Otsuka"},{"@pid":"10/5292","text":"Masaki Bandai"},{"@pid":"15/2634","text":"Miki Yamamoto"}]},"title":"Resource Pooling in Multipath Congestion Control for Content Centric Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HayamizuOBY18","doi":"10.1109/GLOCOM.2018.8647130","ee":"https://doi.org/10.1109/GLOCOM.2018.8647130","url":"https://dblp.org/rec/conf/globecom/HayamizuOBY18"}, "url":"URL#2567117" }, { "@score":"1", "@id":"2567118", "info":{"authors":{"author":[{"@pid":"65/9245","text":"Shiwen He"},{"@pid":"62/1302","text":"Yongming Huang"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"},{"@pid":"54/8052-1","text":"Jiaheng Wang 0001"}]},"title":"Energy Efficient Hybrid Precoding for Millimeter Wave F-RAN with Wireless Fronthaul.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HeHXW18","doi":"10.1109/GLOCOM.2018.8647930","ee":"https://doi.org/10.1109/GLOCOM.2018.8647930","url":"https://dblp.org/rec/conf/globecom/HeHXW18"}, "url":"URL#2567118" }, { "@score":"1", "@id":"2567119", "info":{"authors":{"author":[{"@pid":"39/2405-6","text":"Ying He 0006"},{"@pid":"158/4827","text":"Chengchao Liang"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Integrated Computing, Caching, and Communication for Trust-Based Social Networks: A Big Data DRL Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HeLYL18","doi":"10.1109/GLOCOM.2018.8647548","ee":"https://doi.org/10.1109/GLOCOM.2018.8647548","url":"https://dblp.org/rec/conf/globecom/HeLYL18"}, "url":"URL#2567119" }, { "@score":"1", "@id":"2567121", "info":{"authors":{"author":[{"@pid":"206/8570","text":"Bingtao He"},{"@pid":"87/3074","text":"Qiang Ni"},{"@pid":"49/6002-2","text":"Jian Chen 0002"},{"@pid":"37/6260-2","text":"Long Yang 0002"},{"@pid":"42/8073","text":"Lu Lv"}]},"title":"Joint Antenna and User Selection for Untrusted Relay Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HeNCYL18","doi":"10.1109/GLOCOM.2018.8647350","ee":"https://doi.org/10.1109/GLOCOM.2018.8647350","url":"https://dblp.org/rec/conf/globecom/HeNCYL18"}, "url":"URL#2567121" }, { "@score":"1", "@id":"2567122", "info":{"authors":{"author":[{"@pid":"178/7298","text":"Hongli He"},{"@pid":"96/3813","text":"Hangguan Shan"},{"@pid":"90/1379","text":"Aiping Huang"},{"@pid":"31/334-2","text":"Qiang Ye 0002"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"}]},"title":"Reinforcement Learning-Based Computing and Transmission Scheduling for LTE-U-Enabled IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HeSHYZ18","doi":"10.1109/GLOCOM.2018.8647178","ee":"https://doi.org/10.1109/GLOCOM.2018.8647178","url":"https://dblp.org/rec/conf/globecom/HeSHYZ18"}, "url":"URL#2567122" }, { "@score":"1", "@id":"2567123", "info":{"authors":{"author":[{"@pid":"182/7495","text":"Shuan He"},{"@pid":"w/WeiWang15","text":"Wei Wang 0015"}]},"title":"A QoE-Optimized Power Allocation Scheme for Non-Orthogonal Multiple Access Wireless Video Services.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HeW18","doi":"10.1109/GLOCOM.2018.8647404","ee":"https://doi.org/10.1109/GLOCOM.2018.8647404","url":"https://dblp.org/rec/conf/globecom/HeW18"}, "url":"URL#2567123" }, { "@score":"1", "@id":"2567124", "info":{"authors":{"author":[{"@pid":"173/4661","text":"Xiangyu He"},{"@pid":"129/1065","text":"Hong Xing"},{"@pid":"79/5815","text":"Yue Chen"},{"@pid":"33/2397","text":"Arumugam Nallanathan"}]},"title":"Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HeXCN18","doi":"10.1109/GLOCOM.2018.8647282","ee":"https://doi.org/10.1109/GLOCOM.2018.8647282","url":"https://dblp.org/rec/conf/globecom/HeXCN18"}, "url":"URL#2567124" }, { "@score":"1", "@id":"2567125", "info":{"authors":{"author":[{"@pid":"06/868","text":"Yejun He"},{"@pid":"187/3182","text":"Jiajia Yin"},{"@pid":"81/10607","text":"Chunlong He"},{"@pid":"49/5928","text":"Jian Qiao"}]},"title":"A Resource Allocation Scheme for Distributed Antenna System with Device-to-Device Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HeYHQ18","doi":"10.1109/GLOCOM.2018.8647541","ee":"https://doi.org/10.1109/GLOCOM.2018.8647541","url":"https://dblp.org/rec/conf/globecom/HeYHQ18"}, "url":"URL#2567125" }, { "@score":"1", "@id":"2567126", "info":{"authors":{"author":[{"@pid":"57/10097","text":"Cornelius T. Healy"},{"@pid":"32/7381","text":"Anas F. Alrawi"},{"@pid":"01/4379","text":"Charalampos C. Tsimenidis"}]},"title":"Joint Interleaver and LDPC Code Parameter Design for Beyond G.Fast Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HealyAT18","doi":"10.1109/GLOCOM.2018.8647753","ee":"https://doi.org/10.1109/GLOCOM.2018.8647753","url":"https://dblp.org/rec/conf/globecom/HealyAT18"}, "url":"URL#2567126" }, { "@score":"1", "@id":"2567127", "info":{"authors":{"author":[{"@pid":"163/4938","text":"Hamed Hellaoui"},{"@pid":"98/2570","text":"Ali Chelli"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"09/3053","text":"Tarik Taleb"}]},"title":"Towards Mitigating the Impact of UAVs on Cellular Communications.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HellaouiCBT18","doi":"10.1109/GLOCOM.2018.8648083","ee":"https://doi.org/10.1109/GLOCOM.2018.8648083","url":"https://dblp.org/rec/conf/globecom/HellaouiCBT18"}, "url":"URL#2567127" }, { "@score":"1", "@id":"2567128", "info":{"authors":{"author":[{"@pid":"268/7567","text":"Ahmed H. Helmy"},{"@pid":"00/6922","text":"Amiya Nayak"}]},"title":"Towards More Dynamic Energy-Efficient Bandwidth Allocation in EPONs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HelmyN18","doi":"10.1109/GLOCOM.2018.8647809","ee":"https://doi.org/10.1109/GLOCOM.2018.8647809","url":"https://dblp.org/rec/conf/globecom/HelmyN18"}, "url":"URL#2567128" }, { "@score":"1", "@id":"2567129", "info":{"authors":{"author":[{"@pid":"268/7567","text":"Ahmed H. Helmy"},{"@pid":"00/6922","text":"Amiya Nayak"}]},"title":"Towards Green Fog-LR-PON Integration for Wireless Backhauls.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HelmyN18a","doi":"10.1109/GLOCOM.2018.8647885","ee":"https://doi.org/10.1109/GLOCOM.2018.8647885","url":"https://dblp.org/rec/conf/globecom/HelmyN18a"}, "url":"URL#2567129" }, { "@score":"1", "@id":"2567132", "info":{"authors":{"author":[{"@pid":"119/0040","text":"Takahiro Hirayama"},{"@pid":"96/6814","text":"Takaya Miyazawa"},{"@pid":"24/10646","text":"Abu Hena Al Muktadir"},{"@pid":"68/570","text":"Hiroaki Harai"},{"@pid":"k/VedKafle","text":"Ved P. Kafle"}]},"title":"Salience-Based Distributed Controllers Placement in Software Defined Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HirayamaMMHK18","doi":"10.1109/GLOCOM.2018.8647498","ee":"https://doi.org/10.1109/GLOCOM.2018.8647498","url":"https://dblp.org/rec/conf/globecom/HirayamaMMHK18"}, "url":"URL#2567132" }, { "@score":"1", "@id":"2567133", "info":{"authors":{"author":[{"@pid":"25/799","text":"Yusuke Hirota"},{"@pid":"15/5232","text":"Hideaki Furukawa"},{"@pid":"68/570","text":"Hiroaki Harai"},{"@pid":"45/3002","text":"Naoya Wada"}]},"title":"A Fractionally Spatial Super-Channel Switching System Design with Spatial Channel Slicing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HirotaFHW18","doi":"10.1109/GLOCOM.2018.8647603","ee":"https://doi.org/10.1109/GLOCOM.2018.8647603","url":"https://dblp.org/rec/conf/globecom/HirotaFHW18"}, "url":"URL#2567133" }, { "@score":"1", "@id":"2567134", "info":{"authors":{"author":[{"@pid":"183/1733","text":"Daisuke Hisano"},{"@pid":"26/10801","text":"Yu Nakayama"},{"@pid":"15/8209","text":"Kazuki Maruta"},{"@pid":"83/5736","text":"Akihiro Maruta"}]},"title":"Deployment Design of Functional Split Base Station in Fixed and Wireless Multihop Fronthaul.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HisanoNMM18","doi":"10.1109/GLOCOM.2018.8647413","ee":"https://doi.org/10.1109/GLOCOM.2018.8647413","url":"https://dblp.org/rec/conf/globecom/HisanoNMM18"}, "url":"URL#2567134" }, { "@score":"1", "@id":"2567135", "info":{"authors":{"author":[{"@pid":"150/3702","text":"Tom Hößler"},{"@pid":"14/10126","text":"Meryem Simsek"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"Joint Analysis of Channel Availability and Time-Based Reliability Metrics for Wireless URLLC.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HoblerSF18","doi":"10.1109/GLOCOM.2018.8647801","ee":"https://doi.org/10.1109/GLOCOM.2018.8647801","url":"https://dblp.org/rec/conf/globecom/HoblerSF18"}, "url":"URL#2567135" }, { "@score":"1", "@id":"2567137", "info":{"authors":{"author":[{"@pid":"169/0903","text":"Moinul Hossain"},{"@pid":"x/JXie-1","text":"Jiang Xie 0001"}]},"title":"Covert Spectrum Handoff: An Attack in Spectrum Handoff Processes in Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HossainX18","doi":"10.1109/GLOCOM.2018.8647586","ee":"https://doi.org/10.1109/GLOCOM.2018.8647586","url":"https://dblp.org/rec/conf/globecom/HossainX18"}, "url":"URL#2567137" }, { "@score":"1", "@id":"2567138", "info":{"authors":{"author":[{"@pid":"93/5300","text":"Weigang Hou"},{"@pid":"64/1967-5","text":"Lei Guo 0005"},{"@pid":"09/8234","text":"Zhaolong Ning"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"Appropriate Service Degradability for Virtualized Inter-Data-Center Optical Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HouGNO18","doi":"10.1109/GLOCOM.2018.8647198","ee":"https://doi.org/10.1109/GLOCOM.2018.8647198","url":"https://dblp.org/rec/conf/globecom/HouGNO18"}, "url":"URL#2567138" }, { "@score":"1", "@id":"2567139", "info":{"authors":{"author":[{"@pid":"129/7801","text":"Jiancao Hou"},{"@pid":"25/3612","text":"Mohammad Shikh-Bahaei"}]},"title":"Transmission Capacity of Full-Duplex MIMO Ad-Hoc Network with Limited Self-Interference Cancellation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HouS18","doi":"10.1109/GLOCOM.2018.8647531","ee":"https://doi.org/10.1109/GLOCOM.2018.8647531","url":"https://dblp.org/rec/conf/globecom/HouS18"}, "url":"URL#2567139" }, { "@score":"1", "@id":"2567140", "info":{"authors":{"author":[{"@pid":"236/2959","text":"Zakaria Abou El Houda"},{"@pid":"74/90","text":"Lyes Khoukhi"},{"@pid":"73/2285","text":"Abdelhakim Hafid"}]},"title":"ChainSecure - A Scalable and Proactive Solution for Protecting Blockchain Applications Using SDN.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HoudaKH18","doi":"10.1109/GLOCOM.2018.8647279","ee":"https://doi.org/10.1109/GLOCOM.2018.8647279","url":"https://dblp.org/rec/conf/globecom/HoudaKH18"}, "url":"URL#2567140" }, { "@score":"1", "@id":"2567141", "info":{"authors":{"author":[{"@pid":"70/9915","text":"Bay-Yuan Hsu"},{"@pid":"38/8845","text":"Chih-Ya Shen"}]},"title":"On Extracting Social-Aware Diversity-Optimized Groups in Social Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HsuS18","doi":"10.1109/GLOCOM.2018.8648030","ee":"https://doi.org/10.1109/GLOCOM.2018.8648030","url":"https://dblp.org/rec/conf/globecom/HsuS18"}, "url":"URL#2567141" }, { "@score":"1", "@id":"2567143", "info":{"authors":{"author":[{"@pid":"150/1977","text":"Binbin Hu"},{"@pid":"145/4503","text":"Luoyang Fang"},{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"52/6918-1","text":"Liuqing Yang 0001"}]},"title":"Relay-and-Repair Based in-Vehicle Storage (R2IVS) System in Vehicular Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HuFCY18","doi":"10.1109/GLOCOM.2018.8647280","ee":"https://doi.org/10.1109/GLOCOM.2018.8647280","url":"https://dblp.org/rec/conf/globecom/HuFCY18"}, "url":"URL#2567143" }, { "@score":"1", "@id":"2567145", "info":{"authors":{"author":[{"@pid":"236/3093","text":"Binxuan Hu"},{"@pid":"236/3081","text":"Yujia Gao"},{"@pid":"10/6178-1","text":"Liang Liu 0001"},{"@pid":"04/6217","text":"Huadong Ma"}]},"title":"Federated Region-Learning: An Edge Computing Based Framework for Urban Environment Sensing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuGLM18","doi":"10.1109/GLOCOM.2018.8647649","ee":"https://doi.org/10.1109/GLOCOM.2018.8647649","url":"https://dblp.org/rec/conf/globecom/HuGLM18"}, "url":"URL#2567145" }, { "@score":"1", "@id":"2567146", "info":{"authors":{"author":[{"@pid":"236/3001","text":"Guisheng Hu"},{"@pid":"42/6727","text":"Yunjian Jia"},{"@pid":"119/7813","text":"Zhengchuan Chen"}]},"title":"Multi-User Computation Offloading with D2D for Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuJC18","doi":"10.1109/GLOCOM.2018.8647906","ee":"https://doi.org/10.1109/GLOCOM.2018.8647906","url":"https://dblp.org/rec/conf/globecom/HuJC18"}, "url":"URL#2567146" }, { "@score":"1", "@id":"2567147", "info":{"authors":{"author":[{"@pid":"236/2979","text":"Shisheng Hu"},{"@pid":"21/1581","text":"Yiyang Pei"},{"@pid":"207/9749","text":"Paul Pu Liang"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"Robust Modulation Classification under Uncertain Noise Condition Using Recurrent Neural Network.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuPLL18","doi":"10.1109/GLOCOM.2018.8647582","ee":"https://doi.org/10.1109/GLOCOM.2018.8647582","url":"https://dblp.org/rec/conf/globecom/HuPLL18"}, "url":"URL#2567147" }, { "@score":"1", "@id":"2567148", "info":{"authors":{"author":[{"@pid":"41/9056","text":"Sha Hu"},{"@pid":"14/875","text":"Fredrik Rusek"}]},"title":"Modulus Zero-Forcing Detection for MIMO Channels.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuR18","doi":"10.1109/GLOCOM.2018.8648126","ee":"https://doi.org/10.1109/GLOCOM.2018.8648126","url":"https://dblp.org/rec/conf/globecom/HuR18"}, "url":"URL#2567148" }, { "@score":"1", "@id":"2567149", "info":{"authors":{"author":[{"@pid":"41/9056","text":"Sha Hu"},{"@pid":"14/875","text":"Fredrik Rusek"},{"@pid":"54/2477","text":"Ove Edfors"}]},"title":"Capacity Degradation with Modeling Hardware Impairment in Large Intelligent Surface.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HuRE18","doi":"10.1109/GLOCOM.2018.8647606","ee":"https://doi.org/10.1109/GLOCOM.2018.8647606","url":"https://dblp.org/rec/conf/globecom/HuRE18"}, "url":"URL#2567149" }, { "@score":"1", "@id":"2567150", "info":{"authors":{"author":[{"@pid":"59/11113-1","text":"Xiaoling Hu 0001"},{"@pid":"14/139","text":"Caijun Zhong"},{"@pid":"72/2676-1","text":"Xiaoming Chen 0001"},{"@pid":"236/3060","text":"Weiqiang Xu"},{"@pid":"81/6236-1","text":"Zhaoyang Zhang 0001"}]},"title":"Rate Analysis and ADC Bits Allocation for Cell-Free Massive MIMO Systems with Low Resolution ADCs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HuZCXZ18","doi":"10.1109/GLOCOM.2018.8647412","ee":"https://doi.org/10.1109/GLOCOM.2018.8647412","url":"https://dblp.org/rec/conf/globecom/HuZCXZ18"}, "url":"URL#2567150" }, { "@score":"1", "@id":"2567151", "info":{"authors":{"author":[{"@pid":"174/3780","text":"Jingzhi Hu"},{"@pid":"148/4458","text":"Zijie Zheng"},{"@pid":"146/8046","text":"Boya Di"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Tri-Level Stackelberg Game for Resource Allocation in Radio Access Network Slicing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuZDS18","doi":"10.1109/GLOCOM.2018.8648014","ee":"https://doi.org/10.1109/GLOCOM.2018.8648014","url":"https://dblp.org/rec/conf/globecom/HuZDS18"}, "url":"URL#2567151" }, { "@score":"1", "@id":"2567154", "info":{"authors":{"author":[{"@pid":"81/6685-9","text":"Wei Huang 0009"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Pricing for Content Pushing with Request Delay Information: A Stackelberg Game Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HuangCP18","doi":"10.1109/GLOCOM.2018.8647181","ee":"https://doi.org/10.1109/GLOCOM.2018.8647181","url":"https://dblp.org/rec/conf/globecom/HuangCP18"}, "url":"URL#2567154" }, { "@score":"1", "@id":"2567155", "info":{"authors":{"author":[{"@pid":"190/5294","text":"Chieh-Yang Huang"},{"@pid":"82/2054","text":"Lun-Wei Ku"}]},"title":"EmotionPush: Emotion and Response Time Prediction Towards Human-Like Chatbots.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HuangK18","doi":"10.1109/GLOCOM.2018.8647331","ee":"https://doi.org/10.1109/GLOCOM.2018.8647331","url":"https://dblp.org/rec/conf/globecom/HuangK18"}, "url":"URL#2567155" }, { "@score":"1", "@id":"2567157", "info":{"authors":{"author":[{"@pid":"159/9726","text":"Zhiqing Huang"},{"@pid":"234/5278","text":"Mengjia Li"},{"@pid":"15/9722","text":"Rui Tian"},{"@pid":"33/6794","text":"Yanxin Zhang"},{"@pid":"57/4280","text":"Weidong Wang"}]},"title":"Dynamic Compressive Data Acquisition in Vehicular Sensor Network.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuangLTZW18","doi":"10.1109/GLOCOM.2018.8648074","ee":"https://doi.org/10.1109/GLOCOM.2018.8648074","url":"https://dblp.org/rec/conf/globecom/HuangLTZW18"}, "url":"URL#2567157" }, { "@score":"1", "@id":"2567158", "info":{"authors":{"author":[{"@pid":"22/8338","text":"Qinlong Huang"},{"@pid":"84/3795","text":"Nan Li"},{"@pid":"33/5774","text":"Yixian Yang"}]},"title":"DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuangLY18","doi":"10.1109/GLOCOM.2018.8648113","ee":"https://doi.org/10.1109/GLOCOM.2018.8648113","url":"https://dblp.org/rec/conf/globecom/HuangLY18"}, "url":"URL#2567158" }, { "@score":"1", "@id":"2567159", "info":{"authors":{"author":[{"@pid":"97/9989","text":"Shuai Huang"},{"@pid":"00/3361-2","text":"Lin Lin 0002"},{"@pid":"77/6310-1","text":"Hao Yan 0001"},{"@pid":"42/5953-3","text":"Juan Xu 0003"},{"@pid":"15/6010-1","text":"Fuqiang Liu 0001"}]},"title":"Mean and Variance of Received Signal in Diffusion-Based Mobile Molecular Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuangLYXL18","doi":"10.1109/GLOCOM.2018.8647683","ee":"https://doi.org/10.1109/GLOCOM.2018.8647683","url":"https://dblp.org/rec/conf/globecom/HuangLYXL18"}, "url":"URL#2567159" }, { "@score":"1", "@id":"2567160", "info":{"authors":{"author":[{"@pid":"46/4826","text":"Qin Huang"},{"@pid":"191/6557","text":"Jiayi Rui"},{"@pid":"158/3339","text":"Liyuan Song"},{"@pid":"37/10829","text":"Zulin Wang"}]},"title":"Graftage Coding for Distributed Storage Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuangRSW18","doi":"10.1109/GLOCOM.2018.8647333","ee":"https://doi.org/10.1109/GLOCOM.2018.8647333","url":"https://dblp.org/rec/conf/globecom/HuangRSW18"}, "url":"URL#2567160" }, { "@score":"1", "@id":"2567161", "info":{"authors":{"author":[{"@pid":"35/198-5","text":"Yong Huang 0005"},{"@pid":"35/7092-50","text":"Wei Wang 0050"},{"@pid":"65/8601","text":"Biao He"},{"@pid":"18/5837-7","text":"Liang Sun 0007"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"}]},"title":"On Secure Transmission Design: An Information Leakage Perspective.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuangWHSJ18","doi":"10.1109/GLOCOM.2018.8648032","ee":"https://doi.org/10.1109/GLOCOM.2018.8648032","url":"https://dblp.org/rec/conf/globecom/HuangWHSJ18"}, "url":"URL#2567161" }, { "@score":"1", "@id":"2567162", "info":{"authors":{"author":[{"@pid":"47/1295","text":"Scott C.-H. Huang"},{"@pid":"36/6772","text":"Hsiao-Chun Wu"},{"@pid":"236/2958","text":"Elaine Y.-N. Sun"}]},"title":"Novel Evolutional Coding Technique Using Edge-Updated Graphs.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuangWS18","doi":"10.1109/GLOCOM.2018.8647655","ee":"https://doi.org/10.1109/GLOCOM.2018.8647655","url":"https://dblp.org/rec/conf/globecom/HuangWS18"}, "url":"URL#2567162" }, { "@score":"1", "@id":"2567163", "info":{"authors":{"author":[{"@pid":"153/6482","text":"Longxia Huang"},{"@pid":"80/1012","text":"Gongxuan Zhang"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"88/9558","text":"Anmin Fu"},{"@pid":"62/4606","text":"John Yearwood"}]},"title":"Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HuangZYFY18","doi":"10.1109/GLOCOM.2018.8647309","ee":"https://doi.org/10.1109/GLOCOM.2018.8647309","url":"https://dblp.org/rec/conf/globecom/HuangZYFY18"}, "url":"URL#2567163" }, { "@score":"1", "@id":"2567164", "info":{"authors":{"author":[{"@pid":"236/3020","text":"Alexandre Huff"},{"@pid":"224/2102","text":"Giovanni Venâncio de Souza"},{"@pid":"203/6442","text":"Leonardo da Cruz Marcuzzo"},{"@pid":"224/6851","text":"Vinicius Fulber Garcia"},{"@pid":"64/6563","text":"Carlos Raniery Paula dos Santos"},{"@pid":"02/3940","text":"Elias P. Duarte Jr."}]},"title":"A Holistic Approach to Define Service Chains Using Click-on-OSv on Different NFV Platforms.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HuffSMGSD18","doi":"10.1109/GLOCOM.2018.8647418","ee":"https://doi.org/10.1109/GLOCOM.2018.8647418","url":"https://dblp.org/rec/conf/globecom/HuffSMGSD18"}, "url":"URL#2567164" }, { "@score":"1", "@id":"2567165", "info":{"authors":{"author":[{"@pid":"164/6487","text":"Christopher Husmann"},{"@pid":"53/2758","text":"Konstantinos Nikitopoulos"}]},"title":"ViPer MIMO: Increasing Large MIMO Efficiency via Practical Vector-Perturbation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HusmannN18","doi":"10.1109/GLOCOM.2018.8647879","ee":"https://doi.org/10.1109/GLOCOM.2018.8647879","url":"https://dblp.org/rec/conf/globecom/HusmannN18"}, "url":"URL#2567165" }, { "@score":"1", "@id":"2567167", "info":{"authors":{"author":[{"@pid":"166/3258","text":"Bilal Hussain"},{"@pid":"05/1627","text":"Qinghe Du"},{"@pid":"28/2359","text":"Pinyi Ren"}]},"title":"Deep Learning-Based Big Data-Assisted Anomaly Detection in Cellular Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/HussainDR18","doi":"10.1109/GLOCOM.2018.8647366","ee":"https://doi.org/10.1109/GLOCOM.2018.8647366","url":"https://dblp.org/rec/conf/globecom/HussainDR18"}, "url":"URL#2567167" }, { "@score":"1", "@id":"2567168", "info":{"authors":{"author":[{"@pid":"200/2244","text":"Ahmed F. Hussein"},{"@pid":"67/2133","text":"Hany Elgala"},{"@pid":"l/TDCLittle","text":"Thomas D. C. Little"}]},"title":"Evolution of Multi-Tier Transmission Towards 5G Li-Fi Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HusseinEL18","doi":"10.1109/GLOCOM.2018.8647846","ee":"https://doi.org/10.1109/GLOCOM.2018.8647846","url":"https://dblp.org/rec/conf/globecom/HusseinEL18"}, "url":"URL#2567168" }, { "@score":"1", "@id":"2567169", "info":{"authors":{"author":[{"@pid":"193/2322","text":"Nguyen Van Huynh"},{"@pid":"37/8852","text":"Dinh Thai Hoang"},{"@pid":"95/10112","text":"Diep N. Nguyen"},{"@pid":"71/2764","text":"Eryk Dutkiewicz"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"37/1304-1","text":"Ping Wang 0001"}]},"title":"Reinforcement Learning Approach for RF-Powered Cognitive Radio Network with Ambient Backscatter.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/HuynhHNDNW18","doi":"10.1109/GLOCOM.2018.8647862","ee":"https://doi.org/10.1109/GLOCOM.2018.8647862","url":"https://dblp.org/rec/conf/globecom/HuynhHNDNW18"}, "url":"URL#2567169" }, { "@score":"1", "@id":"2567170", "info":{"authors":{"author":[{"@pid":"236/3212","text":"Osama T. Ibrahim"},{"@pid":"37/7589","text":"Walid Gomaa 0001"},{"@pid":"52/727","text":"Moustafa Youssef 0001"}]},"title":"Zero-Calibration Device-Free Localization for the IoT Based on Participatory Sensing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/IbrahimGY18","doi":"10.1109/GLOCOM.2018.8648111","ee":"https://doi.org/10.1109/GLOCOM.2018.8648111","url":"https://dblp.org/rec/conf/globecom/IbrahimGY18"}, "url":"URL#2567170" }, { "@score":"1", "@id":"2567171", "info":{"authors":{"author":[{"@pid":"36/10674-5","text":"Ahmed Ibrahim 0005"},{"@pid":"49/1419","text":"Telex Magloire Nkouatchah Ngatched"},{"@pid":"32/6803","text":"Octavia A. Dobre"}]},"title":"Joint Power Control and Routing in Multihop D2D Assisted Cellular Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/IbrahimND18","doi":"10.1109/GLOCOM.2018.8647540","ee":"https://doi.org/10.1109/GLOCOM.2018.8647540","url":"https://dblp.org/rec/conf/globecom/IbrahimND18"}, "url":"URL#2567171" }, { "@score":"1", "@id":"2567172", "info":{"authors":{"author":[{"@pid":"234/0709","text":"Hiroki Ikeuchi"},{"@pid":"91/3130","text":"Akio Watanabe"},{"@pid":"93/2793","text":"Takehiro Kawata"},{"@pid":"13/6662","text":"Ryoichi Kawahara"}]},"title":"Root-Cause Diagnosis Using Logs Generated by User Actions.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/IkeuchiWKK18","doi":"10.1109/GLOCOM.2018.8647957","ee":"https://doi.org/10.1109/GLOCOM.2018.8647957","url":"https://dblp.org/rec/conf/globecom/IkeuchiWKK18"}, "url":"URL#2567172" }, { "@score":"1", "@id":"2567174", "info":{"authors":{"author":[{"@pid":"190/4709","text":"MohammadNoor Injadat"},{"@pid":"190/4710","text":"Fadi Salo"},{"@pid":"07/8331","text":"Ali Bou Nassif"},{"@pid":"98/2985","text":"Aleksander Essex"},{"@pid":"26/704","text":"Abdallah Shami"}]},"title":"Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/InjadatSNES18","doi":"10.1109/GLOCOM.2018.8647714","ee":"https://doi.org/10.1109/GLOCOM.2018.8647714","url":"https://dblp.org/rec/conf/globecom/InjadatSNES18"}, "url":"URL#2567174" }, { "@score":"1", "@id":"2567175", "info":{"authors":{"author":[{"@pid":"236/3017","text":"Mohammad Irfan"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"On the Spectral Efficiency of Orthogonal Frequency-Division Multiplexing with Index Modulation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/IrfanA18","doi":"10.1109/GLOCOM.2018.8647972","ee":"https://doi.org/10.1109/GLOCOM.2018.8647972","url":"https://dblp.org/rec/conf/globecom/IrfanA18"}, "url":"URL#2567175" }, { "@score":"1", "@id":"2567178", "info":{"authors":{"author":[{"@pid":"213/4705","text":"Shinya Ishiyama"},{"@pid":"15/4179","text":"Tadashi Nakano"},{"@pid":"02/4576","text":"Yutaka Okaie"},{"@pid":"40/2808","text":"Takahiro Hara"}]},"title":"Epidemic Information Dissemination in Mobile Molecular Communication Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/IshiyamaNOH18","doi":"10.1109/GLOCOM.2018.8648028","ee":"https://doi.org/10.1109/GLOCOM.2018.8648028","url":"https://dblp.org/rec/conf/globecom/IshiyamaNOH18"}, "url":"URL#2567178" }, { "@score":"1", "@id":"2567179", "info":{"authors":{"author":[{"@pid":"184/5424","text":"Fumito Ito"},{"@pid":"59/6522","text":"Fumiki Uzawa"},{"@pid":"36/8974","text":"Kazuhiko Mitsuyama"},{"@pid":"134/7310","text":"Naohiko Iai"}]},"title":"Field Trial of 4×4 TDD-SVD-MIMO System with Rank Adaptation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ItoUMI18","doi":"10.1109/GLOCOM.2018.8647496","ee":"https://doi.org/10.1109/GLOCOM.2018.8647496","url":"https://dblp.org/rec/conf/globecom/ItoUMI18"}, "url":"URL#2567179" }, { "@score":"1", "@id":"2567183", "info":{"authors":{"author":[{"@pid":"213/9864","text":"Shan Jaffry"},{"@pid":"71/9608","text":"Syed Faraz Hasan"},{"@pid":"78/10516","text":"Xiang Gui"}]},"title":"Shared Spectrum for Mobile-Cell's Backhaul and Access Link.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JaffryHG18","doi":"10.1109/GLOCOM.2018.8647131","ee":"https://doi.org/10.1109/GLOCOM.2018.8647131","url":"https://dblp.org/rec/conf/globecom/JaffryHG18"}, "url":"URL#2567183" }, { "@score":"1", "@id":"2567186", "info":{"authors":{"author":[{"@pid":"167/3863","text":"Mohammad Vahid Jamali"},{"@pid":"05/6945","text":"Hessam Mahdavifar"}]},"title":"A Low-Complexity Recursive Approach Toward Code-Domain NOMA for Massive Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JamaliM18","doi":"10.1109/GLOCOM.2018.8647982","ee":"https://doi.org/10.1109/GLOCOM.2018.8647982","url":"https://dblp.org/rec/conf/globecom/JamaliM18"}, "url":"URL#2567186" }, { "@score":"1", "@id":"2567190", "info":{"authors":{"author":[{"@pid":"03/197","text":"Ilpo Järvinen"},{"@pid":"224/2353","text":"Iivo Raitahila"},{"@pid":"98/6208","text":"Zhen Cao"},{"@pid":"01/4536","text":"Markku Kojo"}]},"title":"FASOR Retransmission Timeout and Congestion Control Mechanism for CoAP.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JarvinenRCK18","doi":"10.1109/GLOCOM.2018.8647909","ee":"https://doi.org/10.1109/GLOCOM.2018.8647909","url":"https://dblp.org/rec/conf/globecom/JarvinenRCK18"}, "url":"URL#2567190" }, { "@score":"1", "@id":"2567192", "info":{"authors":{"author":[{"@pid":"168/0570","text":"Bilal A. Jebur"},{"@pid":"01/4379","text":"Charalampos C. Tsimenidis"}]},"title":"Impact of Self and Co-Channel Interference on An DNF Full-Duplex One-Way Relay System.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JeburT18","doi":"10.1109/GLOCOM.2018.8647605","ee":"https://doi.org/10.1109/GLOCOM.2018.8647605","url":"https://dblp.org/rec/conf/globecom/JeburT18"}, "url":"URL#2567192" }, { "@score":"1", "@id":"2567193", "info":{"authors":{"author":[{"@pid":"05/7993","text":"Behrouz Jedari"},{"@pid":"48/1923","text":"Mario Di Francesco"}]},"title":"Delay Analysis of Layered Video Caching in Crowdsourced Heterogeneous Wireless Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JedariF18","doi":"10.1109/GLOCOM.2018.8647205","ee":"https://doi.org/10.1109/GLOCOM.2018.8647205","url":"https://dblp.org/rec/conf/globecom/JedariF18"}, "url":"URL#2567193" }, { "@score":"1", "@id":"2567197", "info":{"authors":{"author":[{"@pid":"236/3046","text":"Mengnan Jian"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"49/5340-2","text":"Shi Jin 0002"},{"@pid":"60/9196","text":"Hai Lin 0001"},{"@pid":"12/2499","text":"Ling Xing"}]},"title":"Wideband Channel Estimation for mmWave Massive MIMO System with Off-Grid Sparse Bayesian Learning.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JianGJLX18","doi":"10.1109/GLOCOM.2018.8648143","ee":"https://doi.org/10.1109/GLOCOM.2018.8648143","url":"https://dblp.org/rec/conf/globecom/JianGJLX18"}, "url":"URL#2567197" }, { "@score":"1", "@id":"2567198", "info":{"authors":{"author":{"@pid":"52/146","text":"Yuming Jiang 0001"}},"title":"A Basic Result on the Superposition of Arrival Processes in Deterministic Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Jiang18","doi":"10.1109/GLOCOM.2018.8647202","ee":"https://doi.org/10.1109/GLOCOM.2018.8647202","url":"https://dblp.org/rec/conf/globecom/Jiang18"}, "url":"URL#2567198" }, { "@score":"1", "@id":"2567199", "info":{"authors":{"author":[{"@pid":"221/5543","text":"Rongkun Jiang"},{"@pid":"70/4512","text":"Shan Cao"},{"@pid":"28/2073","text":"Wei Gao"},{"@pid":"58/4775","text":"Xiaoyu Wang"}]},"title":"Grey Correlation Degree Analysis on Pilot Pattern Optimization for OFDM Channel Estimation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JiangCGW18","doi":"10.1109/GLOCOM.2018.8647550","ee":"https://doi.org/10.1109/GLOCOM.2018.8647550","url":"https://dblp.org/rec/conf/globecom/JiangCGW18"}, "url":"URL#2567199" }, { "@score":"1", "@id":"2567200", "info":{"authors":{"author":[{"@pid":"129/1178","text":"Zhiyuan Jiang"},{"@pid":"198/0919","text":"Ziyan He"},{"@pid":"97/10424-13","text":"Sheng Chen 0013"},{"@pid":"54/2683","text":"Andreas F. Molisch"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Inferring Remote Channel State Information: Cramér-Rae Lower Bound and Deep Learning Implementation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JiangHCMZN18","doi":"10.1109/GLOCOM.2018.8648140","ee":"https://doi.org/10.1109/GLOCOM.2018.8648140","url":"https://dblp.org/rec/conf/globecom/JiangHCMZN18"}, "url":"URL#2567200" }, { "@score":"1", "@id":"2567201", "info":{"authors":{"author":[{"@pid":"59/4773","text":"Dingde Jiang"},{"@pid":"205/5570","text":"Liuwei Huo"},{"@pid":"49/594","text":"Houbing Song"}]},"title":"Understanding Base Stations' Behaviors and Activities with Big Data Analysis.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JiangHS18","doi":"10.1109/GLOCOM.2018.8647613","ee":"https://doi.org/10.1109/GLOCOM.2018.8647613","url":"https://dblp.org/rec/conf/globecom/JiangHS18"}, "url":"URL#2567201" }, { "@score":"1", "@id":"2567202", "info":{"authors":{"author":[{"@pid":"208/0703","text":"Chuan'ao Jiang"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"17/218","text":"Liuguo Yin"},{"@pid":"84/4625-1","text":"Yi Qian 0001"}]},"title":"Joint Backhaul and Access Link Resource Management in Maritime Communication Network.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JiangJYQ18","doi":"10.1109/GLOCOM.2018.8647749","ee":"https://doi.org/10.1109/GLOCOM.2018.8647749","url":"https://dblp.org/rec/conf/globecom/JiangJYQ18"}, "url":"URL#2567202" }, { "@score":"1", "@id":"2567203", "info":{"authors":{"author":[{"@pid":"132/7878","text":"Shunrong Jiang"},{"@pid":"59/3415","text":"Jianqing Liu"},{"@pid":"221/1215","text":"Mengjie Duan"},{"@pid":"53/10765-1","text":"Liangmin Wang 0001"},{"@pid":"f/YuguangFang","text":"Yuguang Fang"}]},"title":"Secure and Privacy-Preserving Report De-duplication in the Fog-Based Vehicular Crowdsensing System.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JiangLDWF18","doi":"10.1109/GLOCOM.2018.8647901","ee":"https://doi.org/10.1109/GLOCOM.2018.8647901","url":"https://dblp.org/rec/conf/globecom/JiangLDWF18"}, "url":"URL#2567203" }, { "@score":"1", "@id":"2567204", "info":{"authors":{"author":[{"@pid":"132/7878","text":"Shunrong Jiang"},{"@pid":"59/3415","text":"Jianqing Liu"},{"@pid":"53/10765-1","text":"Liangmin Wang 0001"},{"@pid":"f/YuguangFang","text":"Yuguang Fang"}]},"title":"A Secure Data Forwarding Scheme in Vehicular Named Data Networking.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JiangLWF18","doi":"10.1109/GLOCOM.2018.8647216","ee":"https://doi.org/10.1109/GLOCOM.2018.8647216","url":"https://dblp.org/rec/conf/globecom/JiangLWF18"}, "url":"URL#2567204" }, { "@score":"1", "@id":"2567205", "info":{"authors":{"author":[{"@pid":"34/10703","text":"Wenbo Jiang"},{"@pid":"39/5544-1","text":"Hongwei Li 0001"},{"@pid":"87/10142","text":"Guowen Xu"},{"@pid":"93/6953","text":"Mi Wen"},{"@pid":"216/6985","text":"Guishan Dong"},{"@pid":"59/554","text":"Xiaodong Lin 0001"}]},"title":"A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JiangLXWDL18","doi":"10.1109/GLOCOM.2018.8647852","ee":"https://doi.org/10.1109/GLOCOM.2018.8647852","url":"https://dblp.org/rec/conf/globecom/JiangLXWDL18"}, "url":"URL#2567205" }, { "@score":"1", "@id":"2567206", "info":{"authors":{"author":[{"@pid":"16/4520-5","text":"Chen Jiang 0005"},{"@pid":"149/0005","text":"Wenhao Wu"},{"@pid":"46/2384","text":"Zhi Ding 0001"}]},"title":"The Design of Transport Block-Based ROHC U-Mode for LTE Multicast.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JiangWD18","doi":"10.1109/GLOCOM.2018.8648067","ee":"https://doi.org/10.1109/GLOCOM.2018.8648067","url":"https://dblp.org/rec/conf/globecom/JiangWD18"}, "url":"URL#2567206" }, { "@score":"1", "@id":"2567207", "info":{"authors":{"author":[{"@pid":"129/1178","text":"Zhiyuan Jiang"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Improved Scaling Law for Status Update Timeliness in Massive IoT by Elastic Spatial Multiplexing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JiangZN18","doi":"10.1109/GLOCOM.2018.8647132","ee":"https://doi.org/10.1109/GLOCOM.2018.8647132","url":"https://dblp.org/rec/conf/globecom/JiangZN18"}, "url":"URL#2567207" }, { "@score":"1", "@id":"2567208", "info":{"authors":{"author":[{"@pid":"67/1608","text":"Long Jiao"},{"@pid":"46/2005-3","text":"Ning Wang 0003"},{"@pid":"80/1651-1","text":"Kai Zeng 0001"}]},"title":"Secret Beam: Robust Secret Key Agreement for mmWave Massive MIMO 5G Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JiaoWZ18","doi":"10.1109/GLOCOM.2018.8647588","ee":"https://doi.org/10.1109/GLOCOM.2018.8647588","url":"https://dblp.org/rec/conf/globecom/JiaoWZ18"}, "url":"URL#2567208" }, { "@score":"1", "@id":"2567209", "info":{"authors":{"author":[{"@pid":"42/8333","text":"Yichao Jin"},{"@pid":"40/11345","text":"Usman Raza"},{"@pid":"15/5883","text":"Mahesh Sooriyabandara"}]},"title":"BOOST: Bringing Opportunistic ROuting and Effortless-Scheduling to TSCH MAC.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JinRS18","doi":"10.1109/GLOCOM.2018.8647851","ee":"https://doi.org/10.1109/GLOCOM.2018.8647851","url":"https://dblp.org/rec/conf/globecom/JinRS18"}, "url":"URL#2567209" }, { "@score":"1", "@id":"2567210", "info":{"authors":{"author":[{"@pid":"202/2294","text":"Shengda Jin"},{"@pid":"202/1712","text":"Zhaowei Zhu"},{"@pid":"79/6027-1","text":"Cong Shen 0001"},{"@pid":"27/8763","text":"Sadiq Ali"},{"@pid":"99/3567","text":"Hua Qian"},{"@pid":"98/3680","text":"Xiliang Luo"}]},"title":"Sparse Spectrum Reuse in HetNets with Relays.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JinZSAQL18","doi":"10.1109/GLOCOM.2018.8647408","ee":"https://doi.org/10.1109/GLOCOM.2018.8647408","url":"https://dblp.org/rec/conf/globecom/JinZSAQL18"}, "url":"URL#2567210" }, { "@score":"1", "@id":"2567211", "info":{"authors":{"author":[{"@pid":"173/6851","text":"Anish Jindal"},{"@pid":"194/6963","text":"Gagangeet Singh Aujla"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"43/1754","text":"Radu Prodan"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"DRUMS: Demand Response Management in a Smart City Using Deep Learning and SVR.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JindalAKPO18","doi":"10.1109/GLOCOM.2018.8647926","ee":"https://doi.org/10.1109/GLOCOM.2018.8647926","url":"https://dblp.org/rec/conf/globecom/JindalAKPO18"}, "url":"URL#2567211" }, { "@score":"1", "@id":"2567213", "info":{"authors":{"author":[{"@pid":"146/8138","text":"Vahid Joroughi"},{"@pid":"99/9174","text":"Bhavani Shankar Mysore Rama Rao"},{"@pid":"57/8757","text":"Sina Maleki"},{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"26/2221","text":"Joel Grotz"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Robust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JoroughiRMCGO18","doi":"10.1109/GLOCOM.2018.8647819","ee":"https://doi.org/10.1109/GLOCOM.2018.8647819","url":"https://dblp.org/rec/conf/globecom/JoroughiRMCGO18"}, "url":"URL#2567213" }, { "@score":"1", "@id":"2567214", "info":{"authors":{"author":[{"@pid":"181/6379","text":"Harshvardhan P. Joshi"},{"@pid":"47/955","text":"Rudra Dutta"}]},"title":"GADFly: A Fast and Robust Algorithm to Detect P2P Botnets in Communication Graphs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/JoshiD18","doi":"10.1109/GLOCOM.2018.8647234","ee":"https://doi.org/10.1109/GLOCOM.2018.8647234","url":"https://dblp.org/rec/conf/globecom/JoshiD18"}, "url":"URL#2567214" }, { "@score":"1", "@id":"2567215", "info":{"authors":{"author":[{"@pid":"191/7182","text":"Shihao Ju"},{"@pid":"07/2123","text":"Theodore S. Rappaport"}]},"title":"Millimeter-Wave Extended NYUSIM Channel Model for Spatial Consistency.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/JuR18","doi":"10.1109/GLOCOM.2018.8647188","ee":"https://doi.org/10.1109/GLOCOM.2018.8647188","url":"https://dblp.org/rec/conf/globecom/JuR18"}, "url":"URL#2567215" }, { "@score":"1", "@id":"2567217", "info":{"authors":{"author":[{"@pid":"194/8581","text":"Anastasios Kakkavas"},{"@pid":"70/6600","text":"Mario Hernán Castañeda García"},{"@pid":"128/4402","text":"Richard A. Stirling-Gallacher"},{"@pid":"50/2506","text":"Josef A. Nossek"}]},"title":"Multi-Array 5G V2V Relative Positioning: Performance Bounds.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KakkavasGSN18","doi":"10.1109/GLOCOM.2018.8647812","ee":"https://doi.org/10.1109/GLOCOM.2018.8647812","url":"https://dblp.org/rec/conf/globecom/KakkavasGSN18"}, "url":"URL#2567217" }, { "@score":"1", "@id":"2567219", "info":{"authors":{"author":[{"@pid":"129/1099","text":"Mahmoud I. Kamel"},{"@pid":"43/4366","text":"Walaa Hamouda"},{"@pid":"05/4817","text":"Amr M. Youssef"}]},"title":"Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KamelHY18","doi":"10.1109/GLOCOM.2018.8648146","ee":"https://doi.org/10.1109/GLOCOM.2018.8648146","url":"https://dblp.org/rec/conf/globecom/KamelHY18"}, "url":"URL#2567219" }, { "@score":"1", "@id":"2567220", "info":{"authors":{"author":[{"@pid":"199/0010","text":"Sarah Kamel"},{"@pid":"78/1851","text":"Michèle A. Wigger"},{"@pid":"29/1132","text":"Mireille Sarkiss"}]},"title":"Decentralized Coded Caching for Wiretap Broadcast Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KamelWS18","doi":"10.1109/GLOCOM.2018.8647549","ee":"https://doi.org/10.1109/GLOCOM.2018.8647549","url":"https://dblp.org/rec/conf/globecom/KamelWS18"}, "url":"URL#2567220" }, { "@score":"1", "@id":"2567221", "info":{"authors":{"author":[{"@pid":"192/3599","text":"Hiroto Kamoi"},{"@pid":"45/10835","text":"Kentaroh Toyoda"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"}]},"title":"Fall Detection Using UHF Passive RFID Based on the Neighborhood Preservation Principle.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KamoiTO18","doi":"10.1109/GLOCOM.2018.8648040","ee":"https://doi.org/10.1109/GLOCOM.2018.8648040","url":"https://dblp.org/rec/conf/globecom/KamoiTO18"}, "url":"URL#2567221" }, { "@score":"1", "@id":"2567225", "info":{"authors":{"author":[{"@pid":"223/4722","text":"Ojas Kanhere"},{"@pid":"07/2123","text":"Theodore S. Rappaport"}]},"title":"Position Locationing for Millimeter Wave Systems.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KanhereR18","doi":"10.1109/GLOCOM.2018.8647983","ee":"https://doi.org/10.1109/GLOCOM.2018.8647983","url":"https://dblp.org/rec/conf/globecom/KanhereR18"}, "url":"URL#2567225" }, { "@score":"1", "@id":"2567226", "info":{"authors":{"author":[{"@pid":"224/0867","text":"Cem Kaptan"},{"@pid":"33/3823","text":"Burak Kantarci"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"}]},"title":"Reliability-Driven Vehicular Crowd-Sensing: A Case Study for Localization in Public Transportation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KaptanKB18","doi":"10.1109/GLOCOM.2018.8647989","ee":"https://doi.org/10.1109/GLOCOM.2018.8647989","url":"https://dblp.org/rec/conf/globecom/KaptanKB18"}, "url":"URL#2567226" }, { "@score":"1", "@id":"2567228", "info":{"authors":{"author":[{"@pid":"218/6844","text":"Rahif Kassab"},{"@pid":"12/3337","text":"Osvaldo Simeone"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Coexistence of URLLC and eMBB Services in the C-RAN Uplink: An Information-Theoretic Study.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KassabSP18","doi":"10.1109/GLOCOM.2018.8647460","ee":"https://doi.org/10.1109/GLOCOM.2018.8647460","url":"https://dblp.org/rec/conf/globecom/KassabSP18"}, "url":"URL#2567228" }, { "@score":"1", "@id":"2567229", "info":{"authors":{"author":[{"@pid":"158/1134","text":"Hossein Kazemi"},{"@pid":"52/4739","text":"Majid Safari"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"Bandwidth Scheduling and Power Control for Wireless Backhauling in Optical Attocell Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KazemiSH18","doi":"10.1109/GLOCOM.2018.8647686","ee":"https://doi.org/10.1109/GLOCOM.2018.8647686","url":"https://dblp.org/rec/conf/globecom/KazemiSH18"}, "url":"URL#2567229" }, { "@score":"1", "@id":"2567230", "info":{"authors":{"author":[{"@pid":"32/7635","text":"Haifeng Ke"},{"@pid":"88/9558","text":"Anmin Fu"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"93/5439","text":"Si Chen"}]},"title":"AQ-DP: A New Differential Privacy Scheme Based on Quasi-Identifier Classifying in Big Data.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KeFYC18","doi":"10.1109/GLOCOM.2018.8647941","ee":"https://doi.org/10.1109/GLOCOM.2018.8647941","url":"https://dblp.org/rec/conf/globecom/KeFYC18"}, "url":"URL#2567230" }, { "@score":"1", "@id":"2567231", "info":{"authors":{"author":[{"@pid":"36/9808","text":"Maurice Khabbaz"},{"@pid":"69/7882","text":"Elie Saad"},{"@pid":"236/3232","text":"Joe Kodsi"}]},"title":"A Novel Vehicular Traffic Control Scheme for Connectivity Improvement in VANETs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KhabbazSK18","doi":"10.1109/GLOCOM.2018.8647645","ee":"https://doi.org/10.1109/GLOCOM.2018.8647645","url":"https://dblp.org/rec/conf/globecom/KhabbazSK18"}, "url":"URL#2567231" }, { "@score":"1", "@id":"2567232", "info":{"authors":{"author":[{"@pid":"160/4970","text":"Bassem Khalfi"},{"@pid":"236/2810","text":"Abdurrahman Elmaghbub"},{"@pid":"89/4899","text":"Bechir Hamdaoui"}]},"title":"Distributed Wideband Sensing for Faded Dynamic Spectrum Access with Changing Occupancy.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KhalfiEH18","doi":"10.1109/GLOCOM.2018.8647931","ee":"https://doi.org/10.1109/GLOCOM.2018.8647931","url":"https://dblp.org/rec/conf/globecom/KhalfiEH18"}, "url":"URL#2567232" }, { "@score":"1", "@id":"2567233", "info":{"authors":{"author":[{"@pid":"160/4970","text":"Bassem Khalfi"},{"@pid":"89/4899","text":"Bechir Hamdaoui"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"AirMAP: Scalable Spectrum Occupancy Recovery Using Local Low-Rank Matrixapproximation.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KhalfiHG18","doi":"10.1109/GLOCOM.2018.8647667","ee":"https://doi.org/10.1109/GLOCOM.2018.8647667","url":"https://dblp.org/rec/conf/globecom/KhalfiHG18"}, "url":"URL#2567233" }, { "@score":"1", "@id":"2567234", "info":{"authors":{"author":[{"@pid":"236/3231","text":"Muhammad N. Khalid"},{"@pid":"151/6521","text":"Muneer Usman"},{"@pid":"51/4942","text":"Hong-Chuan Yang"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Extended Delivery Time Analysis of Cognitive Data Transmission Over Multiple Primary Channels.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KhalidUYA18","doi":"10.1109/GLOCOM.2018.8647979","ee":"https://doi.org/10.1109/GLOCOM.2018.8647979","url":"https://dblp.org/rec/conf/globecom/KhalidUYA18"}, "url":"URL#2567234" }, { "@score":"1", "@id":"2567236", "info":{"authors":{"author":[{"@pid":"141/4989","text":"Kasem Khalil"},{"@pid":"92/7480","text":"Khalid Elgazzar"},{"@pid":"b/MagdyABayoumi","text":"Magdy A. Bayoumi"}]},"title":"A Comparative Analysis on Resource Discovery Protocols for The Internet of Things.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KhalilEB18","doi":"10.1109/GLOCOM.2018.8647553","ee":"https://doi.org/10.1109/GLOCOM.2018.8647553","url":"https://dblp.org/rec/conf/globecom/KhalilEB18"}, "url":"URL#2567236" }, { "@score":"1", "@id":"2567237", "info":{"authors":{"author":[{"@pid":"175/1715","text":"Jalal Khamse-Ashari"},{"@pid":"63/6343","text":"Ioannis Lambadaris"},{"@pid":"79/5571","text":"George Kesidis"},{"@pid":"61/6430","text":"Bhuvan Urgaonkar"},{"@pid":"14/5856","text":"Yiqiang Q. Zhao"}]},"title":"A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for Self-Organizing Servers.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Khamse-AshariLK18","doi":"10.1109/GLOCOM.2018.8647675","ee":"https://doi.org/10.1109/GLOCOM.2018.8647675","url":"https://dblp.org/rec/conf/globecom/Khamse-AshariLK18"}, "url":"URL#2567237" }, { "@score":"1", "@id":"2567238", "info":{"authors":{"author":[{"@pid":"197/9926","text":"Mohammad Toaha Raza Khan"},{"@pid":"78/10960","text":"Syed Hassan Ahmed"},{"@pid":"66/2701","text":"Dongkyun Kim"}]},"title":"AUV-Assisted Energy-Efficient Clustering in Underwater Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KhanAK18","doi":"10.1109/GLOCOM.2018.8647278","ee":"https://doi.org/10.1109/GLOCOM.2018.8647278","url":"https://dblp.org/rec/conf/globecom/KhanAK18"}, "url":"URL#2567238" }, { "@score":"1", "@id":"2567242", "info":{"authors":{"author":[{"@pid":"201/2536","text":"Rawan F. El Khatib"},{"@pid":"01/5283","text":"Nizar Zorba"},{"@pid":"07/3173","text":"Hossam S. Hassanein"}]},"title":"A Fair Reputation-Based Incentive Mechanism for Cooperative Crowd Sensing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KhatibZH18","doi":"10.1109/GLOCOM.2018.8647555","ee":"https://doi.org/10.1109/GLOCOM.2018.8647555","url":"https://dblp.org/rec/conf/globecom/KhatibZH18"}, "url":"URL#2567242" }, { "@score":"1", "@id":"2567243", "info":{"authors":{"author":[{"@pid":"169/2579","text":"Hakima Khelifi"},{"@pid":"97/6043","text":"Senlin Luo"},{"@pid":"201/1271","text":"Boubakr Nour"},{"@pid":"221/4153","text":"Akrem Sellami"},{"@pid":"43/5060","text":"Hassine Moungla"},{"@pid":"05/720","text":"Farid Naït-Abdesselam"}]},"title":"An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KhelifiLNSMN18","doi":"10.1109/GLOCOM.2018.8647898","ee":"https://doi.org/10.1109/GLOCOM.2018.8647898","url":"https://dblp.org/rec/conf/globecom/KhelifiLNSMN18"}, "url":"URL#2567243" }, { "@score":"1", "@id":"2567244", "info":{"authors":{"author":[{"@pid":"48/10104","text":"Mahmoud Khonji"},{"@pid":"07/5150","text":"Youssef Iraqi"}]},"title":"Attributing Authors of Emirati Tweets.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KhonjiI18","doi":"10.1109/GLOCOM.2018.8647952","ee":"https://doi.org/10.1109/GLOCOM.2018.8647952","url":"https://dblp.org/rec/conf/globecom/KhonjiI18"}, "url":"URL#2567244" }, { "@score":"1", "@id":"2567248", "info":{"authors":{"author":[{"@pid":"12/10098","text":"Jacek Kibilda"},{"@pid":"v/GustavodeVeciana","text":"Gustavo de Veciana"}]},"title":"Dynamic Network Densification: Overcoming Spatio-Temporal Variability in Wireless Traffic.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KibildaV18","doi":"10.1109/GLOCOM.2018.8647997","ee":"https://doi.org/10.1109/GLOCOM.2018.8647997","url":"https://dblp.org/rec/conf/globecom/KibildaV18"}, "url":"URL#2567248" }, { "@score":"1", "@id":"2567250", "info":{"authors":{"author":[{"@pid":"225/5312","text":"Hwanjin Kim"},{"@pid":"37/8968","text":"Junil Choi"}]},"title":"Channel Estimation for One-Bit Massive MIMO Systems Exploiting Spatio-Temporal Correlations.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KimC18","doi":"10.1109/GLOCOM.2018.8647574","ee":"https://doi.org/10.1109/GLOCOM.2018.8647574","url":"https://dblp.org/rec/conf/globecom/KimC18"}, "url":"URL#2567250" }, { "@score":"1", "@id":"2567251", "info":{"authors":{"author":[{"@pid":"51/850","text":"Seungmo Kim"},{"@pid":"28/10727","text":"Carl B. Dietrich"}]},"title":"A Novel Method for Evaluation of Coexistence between DSRC and Wi-Fi at 5.9 GHz.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KimD18","doi":"10.1109/GLOCOM.2018.8647709","ee":"https://doi.org/10.1109/GLOCOM.2018.8647709","url":"https://dblp.org/rec/conf/globecom/KimD18"}, "url":"URL#2567251" }, { "@score":"1", "@id":"2567253", "info":{"authors":{"author":[{"@pid":"25/6052","text":"Minsu Kim"},{"@pid":"37/1760","text":"Jemin Lee"}]},"title":"Outage Probability of UAV Communications in the Presence of Interference.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KimL18","doi":"10.1109/GLOCOM.2018.8647521","ee":"https://doi.org/10.1109/GLOCOM.2018.8647521","url":"https://dblp.org/rec/conf/globecom/KimL18"}, "url":"URL#2567253" }, { "@score":"1", "@id":"2567254", "info":{"authors":{"author":[{"@pid":"53/3148","text":"In-Soo Kim"},{"@pid":"89/3451","text":"Namyoon Lee"},{"@pid":"37/8968","text":"Junil Choi"}]},"title":"Dominant Channel Estimation via MIPS for Large-Scale Antenna Systems with One-Bit ADCs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KimLC18","doi":"10.1109/GLOCOM.2018.8648125","ee":"https://doi.org/10.1109/GLOCOM.2018.8648125","url":"https://dblp.org/rec/conf/globecom/KimLC18"}, "url":"URL#2567254" }, { "@score":"1", "@id":"2567257", "info":{"authors":{"author":[{"@pid":"48/1338","text":"Kyeong Jin Kim"},{"@pid":"75/1219","text":"Hongwu Liu"},{"@pid":"88/609","text":"Marco Di Renzo"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Performance Analysis of Spectrum Sharing Systems with Distributed CDD.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KimLRP18","doi":"10.1109/GLOCOM.2018.8647728","ee":"https://doi.org/10.1109/GLOCOM.2018.8647728","url":"https://dblp.org/rec/conf/globecom/KimLRP18"}, "url":"URL#2567257" }, { "@score":"1", "@id":"2567258", "info":{"authors":{"author":[{"@pid":"236/2891","text":"Heasung Kim"},{"@pid":"161/9785","text":"Heecheol Yang"},{"@pid":"236/3293","text":"Yeongmo Kim"},{"@pid":"34/516-1","text":"Jungwoo Lee 0001"}]},"title":"Action-Bounding for Reinforcement Learning in Energy Harvesting Communication Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KimYKL18","doi":"10.1109/GLOCOM.2018.8647681","ee":"https://doi.org/10.1109/GLOCOM.2018.8647681","url":"https://dblp.org/rec/conf/globecom/KimYKL18"}, "url":"URL#2567258" }, { "@score":"1", "@id":"2567259", "info":{"authors":{"author":[{"@pid":"05/11221","text":"Masayuki Kinoshita"},{"@pid":"29/3432","text":"Takaya Yamazato"},{"@pid":"87/1362","text":"Hiraku Okada"},{"@pid":"18/5373","text":"Toshiaki Fujii"},{"@pid":"11/6674","text":"Shintaro Arai"},{"@pid":"90/3222","text":"Tomohiro Yendo"},{"@pid":"73/3040","text":"Koji Kamakura"}]},"title":"A Comparison of Reception Methods for Visible Light Communication Using High-Speed Stereo Cameras.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KinoshitaYOFAYK18","doi":"10.1109/GLOCOM.2018.8647953","ee":"https://doi.org/10.1109/GLOCOM.2018.8647953","url":"https://dblp.org/rec/conf/globecom/KinoshitaYOFAYK18"}, "url":"URL#2567259" }, { "@score":"1", "@id":"2567260", "info":{"authors":{"author":[{"@pid":"205/3479","text":"Rajalekshmi Kishore"},{"@pid":"45/10799","text":"Sanjeev Gurugopinath"},{"@pid":"14/7881","text":"Sami Muhaidat"},{"@pid":"17/9507","text":"Paschalis C. Sofotasios"},{"@pid":"51/3596","text":"Mehrdad Dianati"},{"@pid":"a/NaofalAlDhahir","text":"Naofal Al-Dhahir"}]},"title":"Energy Efficiency Analysis of Collaborative Compressive Sensing for Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KishoreGMSDA18","doi":"10.1109/GLOCOM.2018.8647779","ee":"https://doi.org/10.1109/GLOCOM.2018.8647779","url":"https://dblp.org/rec/conf/globecom/KishoreGMSDA18"}, "url":"URL#2567260" }, { "@score":"1", "@id":"2567261", "info":{"authors":{"author":[{"@pid":"132/7927","text":"Steven Kisseleff"},{"@pid":"203/8419","text":"Jakob Kneißl"},{"@pid":"145/5067","text":"Gerd Kilian"},{"@pid":"57/5273","text":"Wolfgang H. Gerstacker"}]},"title":"Optimal MAP Detection in Presence of Burst Interference for Low Power Wide Area Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KisseleffKKG18","doi":"10.1109/GLOCOM.2018.8647991","ee":"https://doi.org/10.1109/GLOCOM.2018.8647991","url":"https://dblp.org/rec/conf/globecom/KisseleffKKG18"}, "url":"URL#2567261" }, { "@score":"1", "@id":"2567262", "info":{"authors":{"author":[{"@pid":"194/6895","text":"Takahito Kito"},{"@pid":"119/0353","text":"Takuya Fujihashi"},{"@pid":"25/799","text":"Yusuke Hirota"},{"@pid":"64/6874","text":"Takashi Watanabe 0001"}]},"title":"Users' Demand-Based Segment Scheduling for Progressive Multi-View Video Transmission.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KitoFHW18","doi":"10.1109/GLOCOM.2018.8648068","ee":"https://doi.org/10.1109/GLOCOM.2018.8648068","url":"https://dblp.org/rec/conf/globecom/KitoFHW18"}, "url":"URL#2567262" }, { "@score":"1", "@id":"2567263", "info":{"authors":{"author":[{"@pid":"223/4755","text":"Rami Klaimi"},{"@pid":"72/1588","text":"Charbel Abdel Nour"},{"@pid":"70/3031","text":"Catherine Douillard"},{"@pid":"57/3779","text":"Joumana Farah"}]},"title":"Design of Low-Complexity Convolutional Codes over GF(q).","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KlaimiNDF18","doi":"10.1109/GLOCOM.2018.8647824","ee":"https://doi.org/10.1109/GLOCOM.2018.8647824","url":"https://dblp.org/rec/conf/globecom/KlaimiNDF18"}, "url":"URL#2567263" }, { "@score":"1", "@id":"2567264", "info":{"authors":{"author":[{"@pid":"154/3643","text":"Markus Klugel"},{"@pid":"32/3203","text":"Wolfgang Kellerer"}]},"title":"Wireless Technologies with Standard Interference Properties.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KlugelK18","doi":"10.1109/GLOCOM.2018.8647422","ee":"https://doi.org/10.1109/GLOCOM.2018.8647422","url":"https://dblp.org/rec/conf/globecom/KlugelK18"}, "url":"URL#2567264" }, { "@score":"1", "@id":"2567265", "info":{"authors":{"author":[{"@pid":"236/3045","text":"Eisaku Ko"},{"@pid":"96/2402","text":"Kwang-Cheng Chen"}]},"title":"Wireless Communications Meets Artificial Intelligence: An Illustration by Autonomous Vehicles on Manhattan Streets.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KoC18","doi":"10.1109/GLOCOM.2018.8647380","ee":"https://doi.org/10.1109/GLOCOM.2018.8647380","url":"https://dblp.org/rec/conf/globecom/KoC18"}, "url":"URL#2567265" }, { "@score":"1", "@id":"2567266", "info":{"authors":{"author":[{"@pid":"98/3964","text":"Toshiaki Koike-Akino"},{"@pid":"15/4476-4","text":"Pu Wang 0004"},{"@pid":"10/3164","text":"Philip V. Orlik"}]},"title":"Joint Lattice and Subspace Vector Perturbation with PAPR Reduction for Massive MU-MIMO Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Koike-AkinoWO18","doi":"10.1109/GLOCOM.2018.8647187","ee":"https://doi.org/10.1109/GLOCOM.2018.8647187","url":"https://dblp.org/rec/conf/globecom/Koike-AkinoWO18"}, "url":"URL#2567266" }, { "@score":"1", "@id":"2567267", "info":{"authors":{"author":[{"@pid":"158/1994-1","text":"Lingjing Kong 0001"},{"@pid":"10/217-21","text":"Cheng Chen 0021"},{"@pid":"137/6308","text":"Yunlu Wang"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"Power Consumption Evaluation in High Speed Visible Light Communication Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KongCWH18","doi":"10.1109/GLOCOM.2018.8647711","ee":"https://doi.org/10.1109/GLOCOM.2018.8647711","url":"https://dblp.org/rec/conf/globecom/KongCWH18"}, "url":"URL#2567267" }, { "@score":"1", "@id":"2567268", "info":{"authors":{"author":[{"@pid":"44/3953","text":"Jerzy Konorski"},{"@pid":"19/4117","text":"Szymon Szott"}]},"title":"A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KonorskiS18","doi":"10.1109/GLOCOM.2018.8647988","ee":"https://doi.org/10.1109/GLOCOM.2018.8647988","url":"https://dblp.org/rec/conf/globecom/KonorskiS18"}, "url":"URL#2567268" }, { "@score":"1", "@id":"2567269", "info":{"authors":{"author":[{"@pid":"47/2258","text":"Konstantinos Konstantinidis"},{"@pid":"08/6089","text":"Aditya Ramamoorthy"}]},"title":"Leveraging Coding Techniques for Speeding up Distributed Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KonstantinidisR18","doi":"10.1109/GLOCOM.2018.8647133","ee":"https://doi.org/10.1109/GLOCOM.2018.8647133","url":"https://dblp.org/rec/conf/globecom/KonstantinidisR18"}, "url":"URL#2567269" }, { "@score":"1", "@id":"2567270", "info":{"authors":{"author":[{"@pid":"194/2813","text":"Antzela Kosta"},{"@pid":"36/8968","text":"Nikolaos Pappas 0001"},{"@pid":"70/6453","text":"Anthony Ephremides"},{"@pid":"83/2014","text":"Vangelis Angelakis"}]},"title":"Age of Information and Throughput in a Shared Access Network with Heterogeneous Traffic.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KostaPEA18","doi":"10.1109/GLOCOM.2018.8647212","ee":"https://doi.org/10.1109/GLOCOM.2018.8647212","url":"https://dblp.org/rec/conf/globecom/KostaPEA18"}, "url":"URL#2567270" }, { "@score":"1", "@id":"2567271", "info":{"authors":{"author":[{"@pid":"166/7673","text":"Roman Kovalchukov"},{"@pid":"50/5725","text":"Dmitri Moltchanov"},{"@pid":"160/1621","text":"Vyacheslav Begishev"},{"@pid":"27/9954","text":"Andrey K. Samuylov"},{"@pid":"66/6334","text":"Sergey Andreev 0001"},{"@pid":"10/5061","text":"Yevgeni Koucheryavy"},{"@pid":"59/564","text":"Konstantin E. Samouylov"}]},"title":"Improved Session Continuity in 5G NR with Joint Use of Multi-Connectivity and Guard Bandwidth.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KovalchukovMBSA18","doi":"10.1109/GLOCOM.2018.8647608","ee":"https://doi.org/10.1109/GLOCOM.2018.8647608","url":"https://dblp.org/rec/conf/globecom/KovalchukovMBSA18"}, "url":"URL#2567271" }, { "@score":"1", "@id":"2567272", "info":{"authors":{"author":[{"@pid":"162/6620","text":"Jevgenij Krivochiza"},{"@pid":"175/2761","text":"Juan Carlos Merlano Duncan"},{"@pid":"49/8436","text":"Stefano Andrenacci"},{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Closed-Form Solution for Computationally Efficient Symbol-Level Precoding.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KrivochizaMACO18","doi":"10.1109/GLOCOM.2018.8647428","ee":"https://doi.org/10.1109/GLOCOM.2018.8647428","url":"https://dblp.org/rec/conf/globecom/KrivochizaMACO18"}, "url":"URL#2567272" }, { "@score":"1", "@id":"2567273", "info":{"authors":{"author":[{"@pid":"203/9650","text":"Dhanushka Kudathanthirige"},{"@pid":"209/0032","text":"Gayan Amarasuriya"}]},"title":"Massive MIMO NOMA Downlink.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Kudathanthirige18","doi":"10.1109/GLOCOM.2018.8647417","ee":"https://doi.org/10.1109/GLOCOM.2018.8647417","url":"https://dblp.org/rec/conf/globecom/Kudathanthirige18"}, "url":"URL#2567273" }, { "@score":"1", "@id":"2567274", "info":{"authors":{"author":[{"@pid":"232/1891","text":"Christiane Kuhn"},{"@pid":"236/3350","text":"Friederike Kitzing"},{"@pid":"69/2809","text":"Thorsten Strufe"}]},"title":"An Attack on Untraceable Linear Network Coding.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KuhnKS18","doi":"10.1109/GLOCOM.2018.8647458","ee":"https://doi.org/10.1109/GLOCOM.2018.8647458","url":"https://dblp.org/rec/conf/globecom/KuhnKS18"}, "url":"URL#2567274" }, { "@score":"1", "@id":"2567277", "info":{"authors":{"author":[{"@pid":"76/8355","text":"Jian-Jhih Kuo"},{"@pid":"85/318","text":"De-Nian Yang"},{"@pid":"123/0499","text":"Wei-Cheng Li"},{"@pid":"21/7029","text":"Wen-Tsuen Chen"}]},"title":"Efficient Multi-View 3D Video Multicast with Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KuoYLC18","doi":"10.1109/GLOCOM.2018.8647277","ee":"https://doi.org/10.1109/GLOCOM.2018.8647277","url":"https://dblp.org/rec/conf/globecom/KuoYLC18"}, "url":"URL#2567277" }, { "@score":"1", "@id":"2567279", "info":{"authors":{"author":[{"@pid":"218/1302","text":"Endre Hegland Hjort Kure"},{"@pid":"92/8861","text":"Sabita Maharjan"},{"@pid":"97/4581","text":"Stein Gjessing"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"A Distributed Offloading Market for 5G Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/KureMGZ18","doi":"10.1109/GLOCOM.2018.8647676","ee":"https://doi.org/10.1109/GLOCOM.2018.8647676","url":"https://dblp.org/rec/conf/globecom/KureMGZ18"}, "url":"URL#2567279" }, { "@score":"1", "@id":"2567280", "info":{"authors":{"author":[{"@pid":"139/9858","text":"Sachitha Kusaladharma"},{"@pid":"209/0032","text":"Gayan Amarasuriya"},{"@pid":"62/1102","text":"Wei-Ping Zhu 0001"},{"@pid":"56/4552","text":"Wessam Ajib"}]},"title":"Rate Analysis for NOMA in Massive MIMO Based Stochastic Cellular Networks with Pilot Contamination.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KusaladharmaAZA18","doi":"10.1109/GLOCOM.2018.8647575","ee":"https://doi.org/10.1109/GLOCOM.2018.8647575","url":"https://dblp.org/rec/conf/globecom/KusaladharmaAZA18"}, "url":"URL#2567280" }, { "@score":"1", "@id":"2567281", "info":{"authors":{"author":[{"@pid":"139/9858","text":"Sachitha Kusaladharma"},{"@pid":"62/1102","text":"Wei-Ping Zhu 0001"},{"@pid":"56/4552","text":"Wessam Ajib"}]},"title":"Downlink NOMA for Stochastic Cellular Networks under Millimeter Wave Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KusaladharmaZA18","doi":"10.1109/GLOCOM.2018.8647454","ee":"https://doi.org/10.1109/GLOCOM.2018.8647454","url":"https://dblp.org/rec/conf/globecom/KusaladharmaZA18"}, "url":"URL#2567281" }, { "@score":"1", "@id":"2567282", "info":{"authors":{"author":[{"@pid":"122/1160","text":"Naomi Kuze"},{"@pid":"97/8298","text":"Daichi Kominami"},{"@pid":"40/3753","text":"Kenji Kashima"},{"@pid":"06/8133","text":"Tomoaki Hashimoto"},{"@pid":"99/4092-1","text":"Masayuki Murata 0001"}]},"title":"Self-Organizing Control Mechanisms According to Information Confidence for Improving Performance.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/KuzeKKHM18","doi":"10.1109/GLOCOM.2018.8647892","ee":"https://doi.org/10.1109/GLOCOM.2018.8647892","url":"https://dblp.org/rec/conf/globecom/KuzeKKHM18"}, "url":"URL#2567282" }, { "@score":"1", "@id":"2567285", "info":{"authors":{"author":[{"@pid":"236/2967","text":"Mohammed Laroui"},{"@pid":"221/4153","text":"Akrem Sellami"},{"@pid":"201/1271","text":"Boubakr Nour"},{"@pid":"43/5060","text":"Hassine Moungla"},{"@pid":"93/6277","text":"Hossam Afifi"},{"@pid":"84/10933","text":"Sofiane Boukli Hacene"}]},"title":"Driving Path Stability in VANETs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LarouiSNMAH18","doi":"10.1109/GLOCOM.2018.8647450","ee":"https://doi.org/10.1109/GLOCOM.2018.8647450","url":"https://dblp.org/rec/conf/globecom/LarouiSNMAH18"}, "url":"URL#2567285" }, { "@score":"1", "@id":"2567286", "info":{"authors":{"author":[{"@pid":"194/7092","text":"Chi-Han Lee"},{"@pid":"43/7884","text":"Ronald Y. Chang"},{"@pid":"16/8862","text":"Chun-Tao Lin"},{"@pid":"44/4288","text":"Shin-Ming Cheng"}]},"title":"Energy-Efficient D2D Underlaid MIMO Cellular Networks with Energy Harvesting.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LeeCLC18","doi":"10.1109/GLOCOM.2018.8647272","ee":"https://doi.org/10.1109/GLOCOM.2018.8647272","url":"https://dblp.org/rec/conf/globecom/LeeCLC18"}, "url":"URL#2567286" }, { "@score":"1", "@id":"2567287", "info":{"authors":{"author":[{"@pid":"03/3185","text":"Lin-Nan Lee"},{"@pid":"19/3436","text":"Mustafa Eroz"},{"@pid":"155/5176","text":"Neal Becker"},{"@pid":"93/5265","text":"Stan Kay"},{"@pid":"236/3276","text":"Victor Liau"},{"@pid":"88/1450","text":"Liping Chen"},{"@pid":"87/5782","text":"Rohit Iyer Seshadri"}]},"title":"Scrambled Coded Multiple Access, Variations and Improvements.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LeeEBKLCS18","doi":"10.1109/GLOCOM.2018.8647757","ee":"https://doi.org/10.1109/GLOCOM.2018.8647757","url":"https://dblp.org/rec/conf/globecom/LeeEBKLCS18"}, "url":"URL#2567287" }, { "@score":"1", "@id":"2567288", "info":{"authors":{"author":[{"@pid":"80/2550","text":"Chung-Wei Lee"},{"@pid":"236/3308","text":"Shih-Hsuan Huang"},{"@pid":"01/6021","text":"Ming-Jer Tsai"}]},"title":"Behavioral Intentions Maximization for Multiple Products and Rumors in Online Social Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LeeHT18","doi":"10.1109/GLOCOM.2018.8648061","ee":"https://doi.org/10.1109/GLOCOM.2018.8648061","url":"https://dblp.org/rec/conf/globecom/LeeHT18"}, "url":"URL#2567288" }, { "@score":"1", "@id":"2567289", "info":{"authors":{"author":[{"@pid":"204/6348","text":"Tim van der Lee"},{"@pid":"141/3228","text":"Saleem Raza"},{"@pid":"95/1530","text":"George Exarchakos"},{"@pid":"12/2800","text":"Mesut Günes"}]},"title":"Towards Co-Located TSCH Networks: An Inter-Network Interference Perspective.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LeeREG18","doi":"10.1109/GLOCOM.2018.8647867","ee":"https://doi.org/10.1109/GLOCOM.2018.8647867","url":"https://dblp.org/rec/conf/globecom/LeeREG18"}, "url":"URL#2567289" }, { "@score":"1", "@id":"2567290", "info":{"authors":{"author":[{"@pid":"153/9978","text":"Gilsoo Lee"},{"@pid":"41/6237","text":"Walid Saad"},{"@pid":"09/3625","text":"Mehdi Bennis"}]},"title":"Online Optimization for UAV-Assisted Distributed Fog Computing in Smart Factories of Industry 4.0.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LeeSB18","doi":"10.1109/GLOCOM.2018.8647441","ee":"https://doi.org/10.1109/GLOCOM.2018.8647441","url":"https://dblp.org/rec/conf/globecom/LeeSB18"}, "url":"URL#2567290" }, { "@score":"1", "@id":"2567291", "info":{"authors":{"author":[{"@pid":"64/9060","text":"Kai Lei"},{"@pid":"266/4046","text":"Keke Li"},{"@pid":"53/6000","text":"Jie Xing"},{"@pid":"74/3468-2","text":"Bo Jin 0002"},{"@pid":"67/6649-4","text":"Yi Wang 0004"}]},"title":"Distributed Information-Agnostic Flow Scheduling in Data Centers Based on Wait-Time.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LeiLXJW18","doi":"10.1109/GLOCOM.2018.8647622","ee":"https://doi.org/10.1109/GLOCOM.2018.8647622","url":"https://dblp.org/rec/conf/globecom/LeiLXJW18"}, "url":"URL#2567291" }, { "@score":"1", "@id":"2567292", "info":{"authors":{"author":[{"@pid":"09/471-1","text":"Lei Lei 0001"},{"@pid":"43/2613-2","text":"Lei You 0002"},{"@pid":"48/450-33","text":"Yang Yang 0033"},{"@pid":"09/5856-1","text":"Di Yuan 0001"},{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Power and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LeiYYYCO18","doi":"10.1109/GLOCOM.2018.8647669","ee":"https://doi.org/10.1109/GLOCOM.2018.8647669","url":"https://dblp.org/rec/conf/globecom/LeiYYYCO18"}, "url":"URL#2567292" }, { "@score":"1", "@id":"2567293", "info":{"authors":{"author":[{"@pid":"118/9640","text":"Johann Leithon"},{"@pid":"116/7840","text":"Luis A. Suárez"},{"@pid":"132/7952","text":"Dushantha Nalin K. Jayakody"},{"@pid":"123/9284","text":"Muhammad Moiz Anis"}]},"title":"A Task Scheduling Strategy for Utility Maximization in a Renewable-Powered IoT Node.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LeithonSJA18","doi":"10.1109/GLOCOM.2018.8647691","ee":"https://doi.org/10.1109/GLOCOM.2018.8647691","url":"https://dblp.org/rec/conf/globecom/LeithonSJA18"}, "url":"URL#2567293" }, { "@score":"1", "@id":"2567294", "info":{"authors":{"author":[{"@pid":"172/4452","text":"Yikai Li"},{"@pid":"209/0032","text":"Gayan Amarasuriya"}]},"title":"Relay-Aided Massive MIMO NOMA Downlink.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiA18","doi":"10.1109/GLOCOM.2018.8647572","ee":"https://doi.org/10.1109/GLOCOM.2018.8647572","url":"https://dblp.org/rec/conf/globecom/LiA18"}, "url":"URL#2567294" }, { "@score":"1", "@id":"2567295", "info":{"authors":{"author":[{"@pid":"20/8277","text":"Fenghua Li"},{"@pid":"187/7783","text":"Yahong Chen"},{"@pid":"90/4149-1","text":"Ben Niu 0001"},{"@pid":"01/4775-2","text":"Yuanyuan He 0002"},{"@pid":"158/8135","text":"Kui Geng"},{"@pid":"40/429","text":"Jin Cao"}]},"title":"Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiCNHGC18","doi":"10.1109/GLOCOM.2018.8647719","ee":"https://doi.org/10.1109/GLOCOM.2018.8647719","url":"https://dblp.org/rec/conf/globecom/LiCNHGC18"}, "url":"URL#2567295" }, { "@score":"1", "@id":"2567297", "info":{"authors":{"author":[{"@pid":"89/6764-10","text":"Bin Li 0010"},{"@pid":"27/6389","text":"Zesong Fei"},{"@pid":"213/9055","text":"Yueyue Dai"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Secrecy-Optimized Resource Allocation for UAV-Assisted Relaying Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiFDZ18","doi":"10.1109/GLOCOM.2018.8647437","ee":"https://doi.org/10.1109/GLOCOM.2018.8647437","url":"https://dblp.org/rec/conf/globecom/LiFDZ18"}, "url":"URL#2567297" }, { "@score":"1", "@id":"2567298", "info":{"authors":{"author":[{"@pid":"17/2703-15","text":"Jie Li 0015"},{"@pid":"231/0778","text":"Ransheng Feng"},{"@pid":"40/6686-2","text":"Zhi Liu 0002"},{"@pid":"09/5042-11","text":"Wei Sun 0011"},{"@pid":"118/0486","text":"Qiyue Li"}]},"title":"Modeling QoE of Virtual Reality Video Transmission over Wireless Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiFLSL18","doi":"10.1109/GLOCOM.2018.8647729","ee":"https://doi.org/10.1109/GLOCOM.2018.8647729","url":"https://dblp.org/rec/conf/globecom/LiFLSL18"}, "url":"URL#2567298" }, { "@score":"1", "@id":"2567300", "info":{"authors":{"author":[{"@pid":"47/4826-8","text":"Dong Li 0008"},{"@pid":"39/5270","text":"Bin Huang"},{"@pid":"51/5556","text":"Li Cui"},{"@pid":"262/0620-2","text":"Zhiwei Xu 0002"}]},"title":"WebletScript: A Lightweight Distributed JavaScript Engine for Internet of Things.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiHCX18","doi":"10.1109/GLOCOM.2018.8647204","ee":"https://doi.org/10.1109/GLOCOM.2018.8647204","url":"https://dblp.org/rec/conf/globecom/LiHCX18"}, "url":"URL#2567300" }, { "@score":"1", "@id":"2567301", "info":{"authors":{"author":[{"@pid":"37/4190","text":"Yang Li"},{"@pid":"63/7178","text":"Ronghui Hou"},{"@pid":"81/5546","text":"King-Shan Lui"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"}]},"title":"An MEC-Based DoS Attack Detection Mechanism for C-V2X Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiHLL18","doi":"10.1109/GLOCOM.2018.8647323","ee":"https://doi.org/10.1109/GLOCOM.2018.8647323","url":"https://dblp.org/rec/conf/globecom/LiHLL18"}, "url":"URL#2567301" }, { "@score":"1", "@id":"2567302", "info":{"authors":{"author":[{"@pid":"160/9829","text":"Aohan Li"},{"@pid":"32/4821","text":"Guangjie Han"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"}]},"title":"Enhanced Channel Hopping Algorithm for Heterogeneous Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiHO18","doi":"10.1109/GLOCOM.2018.8647527","ee":"https://doi.org/10.1109/GLOCOM.2018.8647527","url":"https://dblp.org/rec/conf/globecom/LiHO18"}, "url":"URL#2567302" }, { "@score":"1", "@id":"2567303", "info":{"authors":{"author":[{"@pid":"65/2605","text":"Yongbo Li"},{"@pid":"31/83","text":"Tian Lan"}]},"title":"Multichoice Games for Optimizing Task Assignment in Edge Computing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiL18","doi":"10.1109/GLOCOM.2018.8648006","ee":"https://doi.org/10.1109/GLOCOM.2018.8648006","url":"https://dblp.org/rec/conf/globecom/LiL18"}, "url":"URL#2567303" }, { "@score":"1", "@id":"2567305", "info":{"authors":{"author":[{"@pid":"12/3242-2","text":"Jiawei Li 0002"},{"@pid":"98/3129","text":"Hongbin Luo"},{"@pid":"141/1964","text":"Mingshuang Jin"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"146/7830","text":"Zhaoxu Wang"}]},"title":"Solving Selfish Routing in Route-by-Name Information-Centric Network Architectures.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiLJYW18","doi":"10.1109/GLOCOM.2018.8647863","ee":"https://doi.org/10.1109/GLOCOM.2018.8647863","url":"https://dblp.org/rec/conf/globecom/LiLJYW18"}, "url":"URL#2567305" }, { "@score":"1", "@id":"2567306", "info":{"authors":{"author":[{"@pid":"144/7219","text":"Xingwang Li 0001"},{"@pid":"65/4699-6","text":"Jingjing Li 0006"},{"@pid":"93/8541","text":"Yuanwei Liu"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"33/2397","text":"Arumugam Nallanathan"}]},"title":"Outage Performance of Cooperative NOMA Networks with Hardware Impairments.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiLLDN18","doi":"10.1109/GLOCOM.2018.8647427","ee":"https://doi.org/10.1109/GLOCOM.2018.8647427","url":"https://dblp.org/rec/conf/globecom/LiLLDN18"}, "url":"URL#2567306" }, { "@score":"1", "@id":"2567307", "info":{"authors":{"author":[{"@pid":"215/9414","text":"Chuanyin Li"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"},{"@pid":"139/9804-1","text":"Yuzhou Li 0001"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Price and Spectrum Inventory Game for MVNOs in Wireless Virtualization Communication Markets.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiLLH18","doi":"10.1109/GLOCOM.2018.8647942","ee":"https://doi.org/10.1109/GLOCOM.2018.8647942","url":"https://dblp.org/rec/conf/globecom/LiLLH18"}, "url":"URL#2567307" }, { "@score":"1", "@id":"2567309", "info":{"authors":{"author":[{"@pid":"176/6865","text":"Pengyun Li"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"},{"@pid":"62/5909-1","text":"Hongyan Li 0001"},{"@pid":"69/3330-3","text":"Shun Zhang 0003"},{"@pid":"158/6993","text":"Guangxiang Yang"}]},"title":"Graph Based Task Scheduling Algorithm for Earth Observation Satellites.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiLLZY18","doi":"10.1109/GLOCOM.2018.8647444","ee":"https://doi.org/10.1109/GLOCOM.2018.8647444","url":"https://dblp.org/rec/conf/globecom/LiLLZY18"}, "url":"URL#2567309" }, { "@score":"1", "@id":"2567310", "info":{"authors":{"author":[{"@pid":"140/7353","text":"Tongxin Li"},{"@pid":"96/7401","text":"Junyu Liu"},{"@pid":"39/4119","text":"Min Sheng"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"}]},"title":"Caching in Ultra-Dense Small Cell Networks with Limited Backhaul.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiLSL18","doi":"10.1109/GLOCOM.2018.8647387","ee":"https://doi.org/10.1109/GLOCOM.2018.8647387","url":"https://dblp.org/rec/conf/globecom/LiLSL18"}, "url":"URL#2567310" }, { "@score":"1", "@id":"2567311", "info":{"authors":{"author":[{"@pid":"27/973","text":"Jianan Li"},{"@pid":"93/3389-1","text":"Jianhua Li 0001"},{"@pid":"20/3894-1","text":"Jun Wu 0001"},{"@pid":"236/3341","text":"Gengshen Lin"}]},"title":"On-Demand Fog Caching Service for ICN Using Synthetical Popularity, Cost, and Importance Status.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiLWL18","doi":"10.1109/GLOCOM.2018.8648044","ee":"https://doi.org/10.1109/GLOCOM.2018.8648044","url":"https://dblp.org/rec/conf/globecom/LiLWL18"}, "url":"URL#2567311" }, { "@score":"1", "@id":"2567312", "info":{"authors":{"author":[{"@pid":"00/1996","text":"Peifeng Li"},{"@pid":"50/11068","text":"Yuansheng Luo"},{"@pid":"125/8938","text":"Kezhi Wang"},{"@pid":"63/1587-1","text":"Kun Yang 0001"}]},"title":"Energy Minimization and Offloading Number Maximization in Wireless Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiLWY18","doi":"10.1109/GLOCOM.2018.8647904","ee":"https://doi.org/10.1109/GLOCOM.2018.8647904","url":"https://dblp.org/rec/conf/globecom/LiLWY18"}, "url":"URL#2567312" }, { "@score":"1", "@id":"2567313", "info":{"authors":{"author":[{"@pid":"45/2422-2","text":"Beibei Li 0002"},{"@pid":"88/3562","text":"Rongxing Lu"},{"@pid":"78/3245","text":"Gaoxi Xiao"},{"@pid":"67/4307","text":"Zhou Su"},{"@pid":"g/AliAGhorbani","text":"Ali A. Ghorbani 0001"}]},"title":"PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiLXSG18","doi":"10.1109/GLOCOM.2018.8647324","ee":"https://doi.org/10.1109/GLOCOM.2018.8647324","url":"https://dblp.org/rec/conf/globecom/LiLXSG18"}, "url":"URL#2567313" }, { "@score":"1", "@id":"2567317", "info":{"authors":{"author":[{"@pid":"144/7219","text":"Xingwang Li 0001"},{"@pid":"74/4742","text":"Michail Matthaiou"},{"@pid":"93/8541","text":"Yuanwei Liu"},{"@pid":"60/4037","text":"Hien Quoc Ngo"},{"@pid":"82/4243-1","text":"Lihua Li 0001"}]},"title":"Multi-Pair Two-Way Massive MIMO Relaying with Hardware Impairments over Rician Fading Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiMLNL18","doi":"10.1109/GLOCOM.2018.8647480","ee":"https://doi.org/10.1109/GLOCOM.2018.8647480","url":"https://dblp.org/rec/conf/globecom/LiMLNL18"}, "url":"URL#2567317" }, { "@score":"1", "@id":"2567318", "info":{"authors":{"author":[{"@pid":"214/6707","text":"Xiaoshuai Li"},{"@pid":"74/3608-1","text":"Lin Ma 0001"},{"@pid":"75/4675","text":"Yubin Xu"},{"@pid":"17/4979","text":"Rajan Shankaran"},{"@pid":"o/MehmetAOrgun","text":"Mehmet A. Orgun"}]},"title":"Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiMXSO18","doi":"10.1109/GLOCOM.2018.8647182","ee":"https://doi.org/10.1109/GLOCOM.2018.8647182","url":"https://dblp.org/rec/conf/globecom/LiMXSO18"}, "url":"URL#2567318" }, { "@score":"1", "@id":"2567319", "info":{"authors":{"author":[{"@pid":"212/1537","text":"Jionghui Li"},{"@pid":"42/10187","text":"Shuai Nie"},{"@pid":"65/8230-1","text":"Chong Han 0001"}]},"title":"ASMC-NOMA: Downlink Adaptive Subcarrier Spacing Multi-Carrier NOMA for 5G Time-Varying Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiNH18","doi":"10.1109/GLOCOM.2018.8647783","ee":"https://doi.org/10.1109/GLOCOM.2018.8647783","url":"https://dblp.org/rec/conf/globecom/LiNH18"}, "url":"URL#2567319" }, { "@score":"1", "@id":"2567320", "info":{"authors":{"author":[{"@pid":"169/4123","text":"Liangzhi Li 0001"},{"@pid":"18/4822","text":"Kaoru Ota"},{"@pid":"62/6234","text":"Mianxiong Dong"},{"@pid":"18/466","text":"Christos V. Verikoukis"}]},"title":"Enabling 60 GHz Seamless Coverage for Mobile Devices: A Motion Learning Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiODV18","doi":"10.1109/GLOCOM.2018.8647317","ee":"https://doi.org/10.1109/GLOCOM.2018.8647317","url":"https://dblp.org/rec/conf/globecom/LiODV18"}, "url":"URL#2567320" }, { "@score":"1", "@id":"2567321", "info":{"authors":{"author":[{"@pid":"185/5782","text":"Bohua Li"},{"@pid":"39/8794","text":"Yukui Pei"}]},"title":"A Novel Hierarchical Architecture Design for Secure Wireless Fieldbus Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiP18","doi":"10.1109/GLOCOM.2018.8647349","ee":"https://doi.org/10.1109/GLOCOM.2018.8647349","url":"https://dblp.org/rec/conf/globecom/LiP18"}, "url":"URL#2567321" }, { "@score":"1", "@id":"2567322", "info":{"authors":{"author":[{"@pid":"160/9829","text":"Aohan Li"},{"@pid":"137/0265","text":"Fereidoun H. Panahi"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"},{"@pid":"32/4821","text":"Guangjie Han"}]},"title":"Learning-Based Optimal Channel Selection in the Presence of Jammer for Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiPOH18","doi":"10.1109/GLOCOM.2018.8647307","ee":"https://doi.org/10.1109/GLOCOM.2018.8647307","url":"https://dblp.org/rec/conf/globecom/LiPOH18"}, "url":"URL#2567322" }, { "@score":"1", "@id":"2567324", "info":{"authors":{"author":[{"@pid":"48/4185","text":"Dan Li"},{"@pid":"50/1689","text":"Deli Qiao"},{"@pid":"64/5666-35","text":"Lei Zhang 0035"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Performance Analysis of Indoor THz Communications with One-Bit Precoding.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiQZL18","doi":"10.1109/GLOCOM.2018.8648135","ee":"https://doi.org/10.1109/GLOCOM.2018.8648135","url":"https://dblp.org/rec/conf/globecom/LiQZL18"}, "url":"URL#2567324" }, { "@score":"1", "@id":"2567325", "info":{"authors":{"author":[{"@pid":"125/9522","text":"Shengyang Li"},{"@pid":"40/11345","text":"Usman Raza"},{"@pid":"23/8192-1","text":"Aftab Khan 0001"}]},"title":"How Agile is the Adaptive Data Rate Mechanism of LoRaWAN?","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiRK18","doi":"10.1109/GLOCOM.2018.8647469","ee":"https://doi.org/10.1109/GLOCOM.2018.8647469","url":"https://dblp.org/rec/conf/globecom/LiRK18"}, "url":"URL#2567325" }, { "@score":"1", "@id":"2567326", "info":{"authors":{"author":[{"@pid":"72/872-9","text":"Qiang Li 0009"},{"@pid":"211/0657","text":"Wennian Shi"},{"@pid":"28/6937","text":"Yong Xiao"},{"@pid":"76/3232","text":"Xiaohu Ge"},{"@pid":"94/4377","text":"Ashish Pandharipande"}]},"title":"Content Size-Aware Edge Caching: A Size-Weighted Popularity-Based Approach.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiSXGP18","doi":"10.1109/GLOCOM.2018.8647794","ee":"https://doi.org/10.1109/GLOCOM.2018.8647794","url":"https://dblp.org/rec/conf/globecom/LiSXGP18"}, "url":"URL#2567326" }, { "@score":"1", "@id":"2567327", "info":{"authors":{"author":[{"@pid":"78/10520","text":"Junling Li"},{"@pid":"159/5790","text":"Weisen Shi"},{"@pid":"31/334-2","text":"Qiang Ye 0002"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"},{"@pid":"s/XueminShen","text":"Xuemin Shen"},{"@pid":"25/3528-1","text":"Xu Li 0001"}]},"title":"Online Joint VNF Chain Composition and Embedding for 5G Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiSYZSL18","doi":"10.1109/GLOCOM.2018.8647700","ee":"https://doi.org/10.1109/GLOCOM.2018.8647700","url":"https://dblp.org/rec/conf/globecom/LiSYZSL18"}, "url":"URL#2567327" }, { "@score":"1", "@id":"2567328", "info":{"authors":{"author":[{"@pid":"192/1598","text":"Kuikui Li"},{"@pid":"85/4712","text":"Meixia Tao"},{"@pid":"56/2971-2","text":"Zhiyong Chen 0002"}]},"title":"Exploiting Computation Replication in Multi-User Multi-Server Mobile Edge Computing Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiTC18","doi":"10.1109/GLOCOM.2018.8648075","ee":"https://doi.org/10.1109/GLOCOM.2018.8648075","url":"https://dblp.org/rec/conf/globecom/LiTC18"}, "url":"URL#2567328" }, { "@score":"1", "@id":"2567330", "info":{"authors":{"author":[{"@pid":"137/8316","text":"Jiachen Li"},{"@pid":"07/1951-5","text":"Jing Xu 0005"},{"@pid":"92/3836","text":"Shimin Gong"},{"@pid":"27/4942","text":"Chengming Li"},{"@pid":"76/440","text":"Dusit Niyato"}]},"title":"A Game Theoretic Approach for Backscatter-Aided Relay Communications in Hybrid Radio Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiXGLN18","doi":"10.1109/GLOCOM.2018.8647737","ee":"https://doi.org/10.1109/GLOCOM.2018.8647737","url":"https://dblp.org/rec/conf/globecom/LiXGLN18"}, "url":"URL#2567330" }, { "@score":"1", "@id":"2567331", "info":{"authors":{"author":[{"@pid":"10/1143","text":"Zheng Li"},{"@pid":"69/4104","text":"Sheng Yang"},{"@pid":"89/3520","text":"Thierry Clessienne"}]},"title":"Exploiting Location Information to Enhance Throughput in Downlink V2I Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiYC18","doi":"10.1109/GLOCOM.2018.8647423","ee":"https://doi.org/10.1109/GLOCOM.2018.8647423","url":"https://dblp.org/rec/conf/globecom/LiYC18"}, "url":"URL#2567331" }, { "@score":"1", "@id":"2567335", "info":{"authors":{"author":[{"@pid":"47/5642","text":"Liying Li"},{"@pid":"25/5898-1","text":"Guodong Zhao 0001"},{"@pid":"209/1746","text":"Sihua Lin"},{"@pid":"05/1539-2","text":"Zhi Chen 0002"}]},"title":"Max-SIR Scheduling Algorithm: An Interference Management Algorithm in Cache-Enabled D2D Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZLC18","doi":"10.1109/GLOCOM.2018.8647806","ee":"https://doi.org/10.1109/GLOCOM.2018.8647806","url":"https://dblp.org/rec/conf/globecom/LiZLC18"}, "url":"URL#2567335" }, { "@score":"1", "@id":"2567336", "info":{"authors":{"author":[{"@pid":"181/2688","text":"Qi Li"},{"@pid":"48/2947-1","text":"Haixia Zhang 0001"},{"@pid":"166/6694","text":"Jingping Qiao"},{"@pid":"75/4570","text":"Dongfeng Yuan"}]},"title":"Cooperative Relay-Assisted Proactive Eavesdropping for Wireless Information Surveillance Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZQY18","doi":"10.1109/GLOCOM.2018.8647654","ee":"https://doi.org/10.1109/GLOCOM.2018.8647654","url":"https://dblp.org/rec/conf/globecom/LiZQY18"}, "url":"URL#2567336" }, { "@score":"1", "@id":"2567337", "info":{"authors":{"author":[{"@pid":"45/3709","text":"Weiwei Li"},{"@pid":"50/7188-1","text":"Kuan Zhang 0001"},{"@pid":"67/4307","text":"Zhou Su"},{"@pid":"88/3562","text":"Rongxing Lu"},{"@pid":"94/3104-2","text":"Ying Wang 0002"}]},"title":"Anomalous Path Detection for Spatial Crowdsourcing-Based Indoor Navigation System.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiZSLW18","doi":"10.1109/GLOCOM.2018.8647174","ee":"https://doi.org/10.1109/GLOCOM.2018.8647174","url":"https://dblp.org/rec/conf/globecom/LiZSLW18"}, "url":"URL#2567337" }, { "@score":"1", "@id":"2567338", "info":{"authors":{"author":[{"@pid":"71/4662","text":"Mingzhe Li"},{"@pid":"43/6657","text":"Jin Zhang"},{"@pid":"35/7092-50","text":"Wei Wang 0050"}]},"title":"Task Selection and Scheduling for Food Delivery: A Game-Theoretic Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZW18","doi":"10.1109/GLOCOM.2018.8647947","ee":"https://doi.org/10.1109/GLOCOM.2018.8647947","url":"https://dblp.org/rec/conf/globecom/LiZW18"}, "url":"URL#2567338" }, { "@score":"1", "@id":"2567339", "info":{"authors":{"author":[{"@pid":"87/3555","text":"Pei Li"},{"@pid":"51/222","text":"Haiyang Zhang"},{"@pid":"95/6985-5","text":"Wei Wu 0005"},{"@pid":"152/1612","text":"Haibo Dai"},{"@pid":"36/7022","text":"Baoyun Wang"}]},"title":"Proactive Eavesdropping via Jamming in Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZWDW18","doi":"10.1109/GLOCOM.2018.8647517","ee":"https://doi.org/10.1109/GLOCOM.2018.8647517","url":"https://dblp.org/rec/conf/globecom/LiZWDW18"}, "url":"URL#2567339" }, { "@score":"1", "@id":"2567340", "info":{"authors":{"author":[{"@pid":"27/7250","text":"Zhihe Li"},{"@pid":"18/6335","text":"Xiaofeng Zhong"},{"@pid":"35/3800","text":"Jie Wei"},{"@pid":"221/3914","text":"Han Shi"}]},"title":"The Application of Manhattan Tangent Distance in Outdoor Fingerprint Localization.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZWS18","doi":"10.1109/GLOCOM.2018.8647175","ee":"https://doi.org/10.1109/GLOCOM.2018.8647175","url":"https://dblp.org/rec/conf/globecom/LiZWS18"}, "url":"URL#2567340" }, { "@score":"1", "@id":"2567341", "info":{"authors":{"author":[{"@pid":"117/3061","text":"Zhenzhen Li"},{"@pid":"95/1161-1","text":"Kun Zhu 0001"},{"@pid":"12/6277-4","text":"Ran Wang 0004"},{"@pid":"87/6559-1","text":"Yuanyuan Xu 0001"}]},"title":"Context-Aware Decoupled Multiple Association in Ultra-Dense Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiZWX18","doi":"10.1109/GLOCOM.2018.8647512","ee":"https://doi.org/10.1109/GLOCOM.2018.8647512","url":"https://dblp.org/rec/conf/globecom/LiZWX18"}, "url":"URL#2567341" }, { "@score":"1", "@id":"2567342", "info":{"authors":{"author":[{"@pid":"66/6852","text":"Shu Li"},{"@pid":"84/6889-53","text":"Jie Zhang 0053"},{"@pid":"36/878","text":"Dongqing Xie"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"57/5595","text":"Wanchun Dou"}]},"title":"High Quality Participant Recruitment of Mobile Crowdsourcing over Big Data.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZXYD18","doi":"10.1109/GLOCOM.2018.8647720","ee":"https://doi.org/10.1109/GLOCOM.2018.8647720","url":"https://dblp.org/rec/conf/globecom/LiZXYD18"}, "url":"URL#2567342" }, { "@score":"1", "@id":"2567343", "info":{"authors":{"author":[{"@pid":"133/7864","text":"Jiaxun Li"},{"@pid":"00/3855-1","text":"Haitao Zhao 0001"},{"@pid":"42/3657","text":"Shaojie Zhang"},{"@pid":"73/2285","text":"Abdelhakim Hafid"}]},"title":"Cross-Layer Optimization on Access Delay in Channel-Hopping Based Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZZH18","doi":"10.1109/GLOCOM.2018.8647706","ee":"https://doi.org/10.1109/GLOCOM.2018.8647706","url":"https://dblp.org/rec/conf/globecom/LiZZH18"}, "url":"URL#2567343" }, { "@score":"1", "@id":"2567344", "info":{"authors":{"author":[{"@pid":"11/3140-2","text":"Zan Li 0002"},{"@pid":"67/2674-4","text":"Xiaohui Zhao 0004"},{"@pid":"123/3334","text":"Zhongliang Zhao"},{"@pid":"128/2481","text":"Fengye Hu"},{"@pid":"16/6501-2","text":"Hui Liang 0002"},{"@pid":"b/TorstenBraun","text":"Torsten Braun"}]},"title":"Crowdsensing Indoor Walking Paths with Massive Noisy Crowdsourcing User Traces.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiZZHLB18","doi":"10.1109/GLOCOM.2018.8647916","ee":"https://doi.org/10.1109/GLOCOM.2018.8647916","url":"https://dblp.org/rec/conf/globecom/LiZZHLB18"}, "url":"URL#2567344" }, { "@score":"1", "@id":"2567345", "info":{"authors":{"author":[{"@pid":"177/7802","text":"Nikolaos Liakopoulos"},{"@pid":"17/3456","text":"Georgios S. Paschos"},{"@pid":"95/6795","text":"Thrasyvoulos Spyropoulos"}]},"title":"User Association for Ultra Dense Networks with QoS Guarantees.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiakopoulosPS18","doi":"10.1109/GLOCOM.2018.8648145","ee":"https://doi.org/10.1109/GLOCOM.2018.8648145","url":"https://dblp.org/rec/conf/globecom/LiakopoulosPS18"}, "url":"URL#2567345" }, { "@score":"1", "@id":"2567346", "info":{"authors":{"author":[{"@pid":"47/5734","text":"Liping Liang"},{"@pid":"34/8968","text":"Wenchi Cheng"},{"@pid":"10/4661-1","text":"Wei Zhang 0001"},{"@pid":"04/1131-1","text":"Hailin Zhang 0001"}]},"title":"Orthogonal Frequency and Mode Division Multiplexing for Wireless Communications.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiangCZZ18","doi":"10.1109/GLOCOM.2018.8647860","ee":"https://doi.org/10.1109/GLOCOM.2018.8647860","url":"https://dblp.org/rec/conf/globecom/LiangCZZ18"}, "url":"URL#2567346" }, { "@score":"1", "@id":"2567348", "info":{"authors":{"author":[{"@pid":"18/835","text":"Yuan Liang"},{"@pid":"59/2180-1","text":"Jian Ren 0001"},{"@pid":"32/4638","text":"Tongtong Li"}]},"title":"The Worst Jamming Distribution for Securely Precoded OFDM.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiangRL18","doi":"10.1109/GLOCOM.2018.8648038","ee":"https://doi.org/10.1109/GLOCOM.2018.8648038","url":"https://dblp.org/rec/conf/globecom/LiangRL18"}, "url":"URL#2567348" }, { "@score":"1", "@id":"2567349", "info":{"authors":{"author":[{"@pid":"158/4827","text":"Chengchao Liang"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"06/8276","text":"Ngoc-Dung Dào"},{"@pid":"82/7","text":"Gamini Senarath"},{"@pid":"123/9305","text":"Hamid Farmanbar"}]},"title":"Enabling Adaptive Data Prefetching in 5G Mobile Networks with Edge Caching.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiangYDSF18","doi":"10.1109/GLOCOM.2018.8647443","ee":"https://doi.org/10.1109/GLOCOM.2018.8647443","url":"https://dblp.org/rec/conf/globecom/LiangYDSF18"}, "url":"URL#2567349" }, { "@score":"1", "@id":"2567350", "info":{"authors":{"author":[{"@pid":"229/2403","text":"Siyi Liao"},{"@pid":"62/6234","text":"Mianxiong Dong"},{"@pid":"18/4822","text":"Kaoru Ota"},{"@pid":"20/3894-1","text":"Jun Wu 0001"},{"@pid":"93/3389-1","text":"Jianhua Li 0001"},{"@pid":"194/7030","text":"Tianpeng Ye"}]},"title":"Vehicle Mobility-Based Geographical Migration of Fog Resource for Satellite-Enabled Smart Cities.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiaoDOWLY18","doi":"10.1109/GLOCOM.2018.8647525","ee":"https://doi.org/10.1109/GLOCOM.2018.8647525","url":"https://dblp.org/rec/conf/globecom/LiaoDOWLY18"}, "url":"URL#2567350" }, { "@score":"1", "@id":"2567351", "info":{"authors":{"author":[{"@pid":"98/2372","text":"Qi Liao"},{"@pid":"39/3861","text":"Thomas Fischer"},{"@pid":"236/3286","text":"Jack Gao"},{"@pid":"232/1239","text":"Faisal Hafeez"},{"@pid":"170/1141","text":"Carl Oechsner"},{"@pid":"236/3007","text":"Jana Knode"}]},"title":"A Secure End-to-End Cloud Computing Solution for Emergency Management with UAVs.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiaoFGHOK18","doi":"10.1109/GLOCOM.2018.8648094","ee":"https://doi.org/10.1109/GLOCOM.2018.8648094","url":"https://dblp.org/rec/conf/globecom/LiaoFGHOK18"}, "url":"URL#2567351" }, { "@score":"1", "@id":"2567352", "info":{"authors":{"author":[{"@pid":"236/3162","text":"Young-Zhe Liao"},{"@pid":"29/847","text":"Shi-Chun Tsai"}]},"title":"Fast Failover with Hierarchical Disjoint Paths in SDN.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiaoT18","doi":"10.1109/GLOCOM.2018.8647950","ee":"https://doi.org/10.1109/GLOCOM.2018.8647950","url":"https://dblp.org/rec/conf/globecom/LiaoT18"}, "url":"URL#2567352" }, { "@score":"1", "@id":"2567353", "info":{"authors":{"author":[{"@pid":"202/4797","text":"Alessandro Lieto"},{"@pid":"39/7911","text":"Ilaria Malanchini"},{"@pid":"47/3507","text":"Antonio Capone"}]},"title":"Enabling Dynamic Resource Sharing for Slice Customization in 5G Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LietoMC18","doi":"10.1109/GLOCOM.2018.8647249","ee":"https://doi.org/10.1109/GLOCOM.2018.8647249","url":"https://dblp.org/rec/conf/globecom/LietoMC18"}, "url":"URL#2567353" }, { "@score":"1", "@id":"2567354", "info":{"authors":{"author":[{"@pid":"236/2928","text":"Caroline Maul de A. Lima"},{"@pid":"236/2930","text":"Eduardo A. da Silva"},{"@pid":"03/2074","text":"Pedro B. Velloso"}]},"title":"Performance Evaluation of 802.11 IoT Devices for Data Collection in the Forest with Drones.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LimaSV18","doi":"10.1109/GLOCOM.2018.8647220","ee":"https://doi.org/10.1109/GLOCOM.2018.8647220","url":"https://dblp.org/rec/conf/globecom/LimaSV18"}, "url":"URL#2567354" }, { "@score":"1", "@id":"2567355", "info":{"authors":{"author":{"@pid":"31/1246","text":"Shih-Chun Lin"}},"title":"End-to-End Network Slicing for 5G&B Wireless Software-Defined Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Lin18","doi":"10.1109/GLOCOM.2018.8647514","ee":"https://doi.org/10.1109/GLOCOM.2018.8647514","url":"https://dblp.org/rec/conf/globecom/Lin18"}, "url":"URL#2567355" }, { "@score":"1", "@id":"2567356", "info":{"authors":{"author":[{"@pid":"132/1565","text":"Zhiyuan Lin"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"}]},"title":"Optimal Scheduling of Caching in Gaussian Broadcast Channel with Common Information.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LinC18","doi":"10.1109/GLOCOM.2018.8647505","ee":"https://doi.org/10.1109/GLOCOM.2018.8647505","url":"https://dblp.org/rec/conf/globecom/LinC18"}, "url":"URL#2567356" }, { "@score":"1", "@id":"2567357", "info":{"authors":{"author":[{"@pid":"132/1565","text":"Zhiyuan Lin"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"}]},"title":"Joint Pushing and Recommendation for Susceptible Users with Time-Varying Connectivity.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LinC18a","doi":"10.1109/GLOCOM.2018.8647838","ee":"https://doi.org/10.1109/GLOCOM.2018.8647838","url":"https://dblp.org/rec/conf/globecom/LinC18a"}, "url":"URL#2567357" }, { "@score":"1", "@id":"2567358", "info":{"authors":{"author":[{"@pid":"06/6217","text":"Zhi Lin"},{"@pid":"73/1685-1","text":"Min Lin 0001"},{"@pid":"94/7080","text":"Jun-Bo Wang"},{"@pid":"168/2850","text":"Xiaohuan Wu"},{"@pid":"62/1102","text":"Wei-Ping Zhu 0001"}]},"title":"Joint Optimization for Secure WIPT in Satellite-Terrestrial Integrated Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LinLWWZ18","doi":"10.1109/GLOCOM.2018.8648041","ee":"https://doi.org/10.1109/GLOCOM.2018.8648041","url":"https://dblp.org/rec/conf/globecom/LinLWWZ18"}, "url":"URL#2567358" }, { "@score":"1", "@id":"2567360", "info":{"authors":{"author":[{"@pid":"236/3193","text":"Enlu Liu"},{"@pid":"22/2465","text":"Xiaoheng Deng"},{"@pid":"25/9812","text":"Zhi Cao"},{"@pid":"82/1228-3","text":"Honggang Zhang 0003"}]},"title":"Design and Evaluation of a Prediction-Based Dynamic Edge Computing System.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuDCZ18","doi":"10.1109/GLOCOM.2018.8647199","ee":"https://doi.org/10.1109/GLOCOM.2018.8647199","url":"https://dblp.org/rec/conf/globecom/LiuDCZ18"}, "url":"URL#2567360" }, { "@score":"1", "@id":"2567361", "info":{"authors":{"author":[{"@pid":"58/2670-1","text":"Bo Liu 0001"},{"@pid":"48/3462-1","text":"Ming Ding 0001"},{"@pid":"19/8310","text":"Tianqing Zhu"},{"@pid":"98/2912-1","text":"Yong Xiang 0001"},{"@pid":"92/2939","text":"Wanlei Zhou 0001"}]},"title":"Using Adversarial Noises to Protect Privacy in Deep Learning Era.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuDZXZ18","doi":"10.1109/GLOCOM.2018.8647189","ee":"https://doi.org/10.1109/GLOCOM.2018.8647189","url":"https://dblp.org/rec/conf/globecom/LiuDZXZ18"}, "url":"URL#2567361" }, { "@score":"1", "@id":"2567362", "info":{"authors":{"author":[{"@pid":"206/1818","text":"Xuanyu Liu"},{"@pid":"60/4601-5","text":"Xiao Fu 0005"},{"@pid":"36/4256-3","text":"Bin Luo 0003"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuFLDG18","doi":"10.1109/GLOCOM.2018.8647499","ee":"https://doi.org/10.1109/GLOCOM.2018.8647499","url":"https://dblp.org/rec/conf/globecom/LiuFLDG18"}, "url":"URL#2567362" }, { "@score":"1", "@id":"2567363", "info":{"authors":{"author":[{"@pid":"178/7314","text":"Ruosi Liu"},{"@pid":"176/5938","text":"Amir H. Fazlollahi"},{"@pid":"83/4665","text":"Yan Zeng"},{"@pid":"00/5899","text":"Jianhua Liu"}]},"title":"SNR Equalization of Multicarrier Frequency-Selective Channels Using GMD.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuFZL18","doi":"10.1109/GLOCOM.2018.8647739","ee":"https://doi.org/10.1109/GLOCOM.2018.8647739","url":"https://dblp.org/rec/conf/globecom/LiuFZL18"}, "url":"URL#2567363" }, { "@score":"1", "@id":"2567364", "info":{"authors":{"author":[{"@pid":"221/1610","text":"Mengjie Liu"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"70/2180","text":"Jianhong Zhou"},{"@pid":"28/8080","text":"Shuang Qin"}]},"title":"Joint Two-Tier Network Function Parallelization on Multicore Platform.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuFZQ18","doi":"10.1109/GLOCOM.2018.8647513","ee":"https://doi.org/10.1109/GLOCOM.2018.8647513","url":"https://dblp.org/rec/conf/globecom/LiuFZQ18"}, "url":"URL#2567364" }, { "@score":"1", "@id":"2567365", "info":{"authors":{"author":[{"@pid":"31/5736","text":"Xiang Liu"},{"@pid":"50/806","text":"Yuchun Guo"},{"@pid":"90/965","text":"Yishuai Chen"},{"@pid":"121/0858","text":"Xiaoying Tan"}]},"title":"Trajectory Privacy Protection on Spatial Streaming Data with Differential Privacy.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuGCT18","doi":"10.1109/GLOCOM.2018.8647918","ee":"https://doi.org/10.1109/GLOCOM.2018.8647918","url":"https://dblp.org/rec/conf/globecom/LiuGCT18"}, "url":"URL#2567365" }, { "@score":"1", "@id":"2567366", "info":{"authors":{"author":[{"@pid":"51/2773","text":"Jiaqi Liu"},{"@pid":"157/9360","text":"Shengjie Guo"},{"@pid":"175/2475","text":"Sa Xiao"},{"@pid":"16/1033","text":"Miao Pan"},{"@pid":"20/4512","text":"Xiangwei Zhou"},{"@pid":"89/5914","text":"Geoffrey Ye Li"},{"@pid":"99/6515-1","text":"Gang Wu 0001"},{"@pid":"46/1212","text":"Shaoqian Li"}]},"title":"Resource Allocation for Cooperative D2D-Enabled Wireless Caching Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuGXPZLWL18","doi":"10.1109/GLOCOM.2018.8647286","ee":"https://doi.org/10.1109/GLOCOM.2018.8647286","url":"https://dblp.org/rec/conf/globecom/LiuGXPZLWL18"}, "url":"URL#2567366" }, { "@score":"1", "@id":"2567367", "info":{"authors":{"author":[{"@pid":"81/4578","text":"Qiwei Liu"},{"@pid":"206/6471","text":"Hanqing Guo"},{"@pid":"202/0637","text":"Junhong Xu"},{"@pid":"70/5417-1","text":"Honggang Wang 0001"},{"@pid":"225/5252","text":"Aaron Kageza"},{"@pid":"225/5201","text":"Saeed AlQarni"},{"@pid":"05/3879","text":"Shaoen Wu"}]},"title":"Non-Contact Non-Invasive Heart and Respiration Rates Monitoring with MIMO Radar Sensing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuGXWKAW18","doi":"10.1109/GLOCOM.2018.8648106","ee":"https://doi.org/10.1109/GLOCOM.2018.8648106","url":"https://dblp.org/rec/conf/globecom/LiuGXWKAW18"}, "url":"URL#2567367" }, { "@score":"1", "@id":"2567368", "info":{"authors":{"author":[{"@pid":"61/3234-13","text":"Qiang Liu 0013"},{"@pid":"78/744-2","text":"Tao Han 0002"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Joint Radio and Computation Resource Management for Low Latency Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuHA18","doi":"10.1109/GLOCOM.2018.8647792","ee":"https://doi.org/10.1109/GLOCOM.2018.8647792","url":"https://dblp.org/rec/conf/globecom/LiuHA18"}, "url":"URL#2567368" }, { "@score":"1", "@id":"2567369", "info":{"authors":{"author":[{"@pid":"61/3234-13","text":"Qiang Liu 0013"},{"@pid":"78/744-2","text":"Tao Han 0002"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Energy-Efficient On-Demand Cloud Radio Access Networks Virtualization.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuHA18a","doi":"10.1109/GLOCOM.2018.8647929","ee":"https://doi.org/10.1109/GLOCOM.2018.8647929","url":"https://dblp.org/rec/conf/globecom/LiuHA18a"}, "url":"URL#2567369" }, { "@score":"1", "@id":"2567370", "info":{"authors":{"author":[{"@pid":"97/5495","text":"Dongqing Liu"},{"@pid":"73/2285","text":"Abdelhakim Hafid"},{"@pid":"74/90","text":"Lyes Khoukhi"}]},"title":"Population Game Based Energy and Time Aware Task Offloading for Large Amounts of Competing Users.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuHK18","doi":"10.1109/GLOCOM.2018.8647522","ee":"https://doi.org/10.1109/GLOCOM.2018.8647522","url":"https://dblp.org/rec/conf/globecom/LiuHK18"}, "url":"URL#2567370" }, { "@score":"1", "@id":"2567371", "info":{"authors":{"author":[{"@pid":"29/4366","text":"Jingwei Liu"},{"@pid":"53/9131-7","text":"Qin Hu 0007"},{"@pid":"207/5904","text":"Chaoya Li"},{"@pid":"91/3456","text":"Rong Sun"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuHLSDG18","doi":"10.1109/GLOCOM.2018.8647327","ee":"https://doi.org/10.1109/GLOCOM.2018.8647327","url":"https://dblp.org/rec/conf/globecom/LiuHLSDG18"}, "url":"URL#2567371" }, { "@score":"1", "@id":"2567372", "info":{"authors":{"author":[{"@pid":"90/4497","text":"Keke Liu"},{"@pid":"78/4081","text":"Yang Han"},{"@pid":"23/4564","text":"Shaohua Yang"},{"@pid":"57/3963","text":"Bruce Wilson"},{"@pid":"46/6982","text":"Xuebin Wu"},{"@pid":"61/7032","text":"Wu Chang"}]},"title":"A Modified Two-Bit Finite-Alphabet Iterative Decoder for LDPC Codes.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuHYWWC18","doi":"10.1109/GLOCOM.2018.8647129","ee":"https://doi.org/10.1109/GLOCOM.2018.8647129","url":"https://dblp.org/rec/conf/globecom/LiuHYWWC18"}, "url":"URL#2567372" }, { "@score":"1", "@id":"2567375", "info":{"authors":{"author":[{"@pid":"25/3327-5","text":"Tingting Liu 0005"},{"@pid":"l/JunLi4","text":"Jun Li 0004"},{"@pid":"29/1639-2","text":"Feng Shu 0002"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Quality-of-Service Driven Resource Allocation Based on Martingale Theory.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuLSH18","doi":"10.1109/GLOCOM.2018.8647578","ee":"https://doi.org/10.1109/GLOCOM.2018.8647578","url":"https://dblp.org/rec/conf/globecom/LiuLSH18"}, "url":"URL#2567375" }, { "@score":"1", "@id":"2567376", "info":{"authors":{"author":[{"@pid":"153/5169","text":"Anqi Liu"},{"@pid":"83/2914","text":"Changle Li"},{"@pid":"180/7303","text":"Wenwei Yue"},{"@pid":"16/1951","text":"Xun Zhou"}]},"title":"Real-Time Traffic Prediction: A Novel Imputation Optimization Algorithm with Missing Data.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuLYZ18","doi":"10.1109/GLOCOM.2018.8647193","ee":"https://doi.org/10.1109/GLOCOM.2018.8647193","url":"https://dblp.org/rec/conf/globecom/LiuLYZ18"}, "url":"URL#2567376" }, { "@score":"1", "@id":"2567377", "info":{"authors":{"author":[{"@pid":"29/4366","text":"Jingwei Liu"},{"@pid":"30/2914","text":"Xiaolu Li"},{"@pid":"67/804","text":"Lin Ye"},{"@pid":"z/HongliZhang","text":"Hongli Zhang 0001"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuLYZDG18","doi":"10.1109/GLOCOM.2018.8647713","ee":"https://doi.org/10.1109/GLOCOM.2018.8647713","url":"https://dblp.org/rec/conf/globecom/LiuLYZDG18"}, "url":"URL#2567377" }, { "@score":"1", "@id":"2567378", "info":{"authors":{"author":[{"@pid":"20/2039-17","text":"Ming Liu 0017"},{"@pid":"02/463","text":"Yuming Mao"},{"@pid":"98/4623","text":"Supeng Leng"},{"@pid":"222/8120","text":"Xiaosha Chen"}]},"title":"Security Performance of the Distributed Antenna IoT Network with Full-Duplex Wireless Power Transfer.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuMLC18","doi":"10.1109/GLOCOM.2018.8647276","ee":"https://doi.org/10.1109/GLOCOM.2018.8647276","url":"https://dblp.org/rec/conf/globecom/LiuMLC18"}, "url":"URL#2567378" }, { "@score":"1", "@id":"2567379", "info":{"authors":{"author":[{"@pid":"75/1219","text":"Hongwu Liu"},{"@pid":"51/4005","text":"Nikolaos I. Miridakis"},{"@pid":"45/2826","text":"Theodoros A. Tsiftsis"},{"@pid":"48/1338","text":"Kyeong Jin Kim"},{"@pid":"61/4074","text":"Kyung Sup Kwak"}]},"title":"Coordinated Uplink Transmission for Cooperative NOMA Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuMTKK18","doi":"10.1109/GLOCOM.2018.8647831","ee":"https://doi.org/10.1109/GLOCOM.2018.8647831","url":"https://dblp.org/rec/conf/globecom/LiuMTKK18"}, "url":"URL#2567379" }, { "@score":"1", "@id":"2567380", "info":{"authors":{"author":[{"@pid":"147/8841","text":"Dongxiao Liu"},{"@pid":"121/2421","text":"Jianbing Ni"},{"@pid":"39/5544-1","text":"Hongwei Li 0001"},{"@pid":"s/XueminShen","text":"Xuemin Sherman Shen"}]},"title":"Achieving Adaptive Linkability for Cellular V2X Group Communications in 5G.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuNLS18","doi":"10.1109/GLOCOM.2018.8647610","ee":"https://doi.org/10.1109/GLOCOM.2018.8647610","url":"https://dblp.org/rec/conf/globecom/LiuNLS18"}, "url":"URL#2567380" }, { "@score":"1", "@id":"2567382", "info":{"authors":{"author":[{"@pid":"37/2109-20","text":"Gang Liu 0020"},{"@pid":"67/5376-1","text":"Wei Quan 0001"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"152/6426","text":"Bohao Feng"},{"@pid":"09/5441","text":"Hongke Zhang"},{"@pid":"s/XueminShen","text":"Xuemin Sherman Shen"}]},"title":"BLAM: Lightweight Bloom-Filter Based DDoS Mitigation for Information-Centric IoT.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuQCFZS18","doi":"10.1109/GLOCOM.2018.8647872","ee":"https://doi.org/10.1109/GLOCOM.2018.8647872","url":"https://dblp.org/rec/conf/globecom/LiuQCFZS18"}, "url":"URL#2567382" }, { "@score":"1", "@id":"2567383", "info":{"authors":{"author":[{"@pid":"29/4366","text":"Jingwei Liu"},{"@pid":"230/3500","text":"Huifang Tang"},{"@pid":"207/5904","text":"Chaoya Li"},{"@pid":"91/3456","text":"Rong Sun"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"vFAC: Fine-Grained Access Control with Versatility for Cloud Storage.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuTLSDG18","doi":"10.1109/GLOCOM.2018.8647169","ee":"https://doi.org/10.1109/GLOCOM.2018.8647169","url":"https://dblp.org/rec/conf/globecom/LiuTLSDG18"}, "url":"URL#2567383" }, { "@score":"1", "@id":"2567384", "info":{"authors":{"author":[{"@pid":"76/1820","text":"Xin Liu"},{"@pid":"44/3928","text":"Dapeng Wu 0002"},{"@pid":"236/2886","text":"Haiying Peng"},{"@pid":"92/1227","text":"Ruyan Wang"}]},"title":"Health Topics Mining in Online Medical Community.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuWPW18","doi":"10.1109/GLOCOM.2018.8647970","ee":"https://doi.org/10.1109/GLOCOM.2018.8647970","url":"https://dblp.org/rec/conf/globecom/LiuWPW18"}, "url":"URL#2567384" }, { "@score":"1", "@id":"2567385", "info":{"authors":{"author":[{"@pid":"97/2274-51","text":"Yu Liu 0051"},{"@pid":"84/2752","text":"Fanggang Wang"},{"@pid":"11/2983","text":"Jingwen Zhang"},{"@pid":"85/6463-1","text":"Bo Ai 0001"},{"@pid":"23/2071","text":"Zhangdui Zhong"}]},"title":"Blind Identification of LDPC Codes in Multipath Fading Channel via Expectation Maximization.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuWZAZ18","doi":"10.1109/GLOCOM.2018.8647781","ee":"https://doi.org/10.1109/GLOCOM.2018.8647781","url":"https://dblp.org/rec/conf/globecom/LiuWZAZ18"}, "url":"URL#2567385" }, { "@score":"1", "@id":"2567386", "info":{"authors":{"author":[{"@pid":"77/7811","text":"Jingxian Liu"},{"@pid":"32/3424","text":"Ke Xiong 0001"},{"@pid":"16/6317-8","text":"Yang Lu 0008"},{"@pid":"44/2936","text":"Pingyi Fan"},{"@pid":"225/0004","text":"Duohua Wang"},{"@pid":"23/2071","text":"Zhangdui Zhong"}]},"title":"SWIPT-Enabled NOMA Networks with Full-Duplex Relaying.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuXLFWZ18","doi":"10.1109/GLOCOM.2018.8647987","ee":"https://doi.org/10.1109/GLOCOM.2018.8647987","url":"https://dblp.org/rec/conf/globecom/LiuXLFWZ18"}, "url":"URL#2567386" }, { "@score":"1", "@id":"2567387", "info":{"authors":{"author":[{"@pid":"98/1737-3","text":"Dong Liu 0003"},{"@pid":"32/2760","text":"Chenyang Yang 0001"}]},"title":"A Learning-Based Approach to Joint Content Caching and Recommendation at Base Stations.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuY18","doi":"10.1109/GLOCOM.2018.8647827","ee":"https://doi.org/10.1109/GLOCOM.2018.8647827","url":"https://dblp.org/rec/conf/globecom/LiuY18"}, "url":"URL#2567387" }, { "@score":"1", "@id":"2567388", "info":{"authors":{"author":[{"@pid":"13/5407-6","text":"Xuan Liu 0006"},{"@pid":"57/5443","text":"Peng Yang"},{"@pid":"62/887","text":"Yongqiang Dong"},{"@pid":"78/10960","text":"Syed Hassan Ahmed"}]},"title":"An Analysis of Content Sharing Hops for Dual-Structural Network Based on General Random Graph.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuYDA18","doi":"10.1109/GLOCOM.2018.8647228","ee":"https://doi.org/10.1109/GLOCOM.2018.8647228","url":"https://dblp.org/rec/conf/globecom/LiuYDA18"}, "url":"URL#2567388" }, { "@score":"1", "@id":"2567389", "info":{"authors":{"author":[{"@pid":"66/2967-2","text":"Yiming Liu 0002"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"46/2311-4","text":"Xi Li 0004"},{"@pid":"83/2179-1","text":"Hong Ji 0001"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Resource Allocation for Video Transcoding and Delivery Based on Mobile Edge Computing and Blockchain.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuYLJL18","doi":"10.1109/GLOCOM.2018.8648088","ee":"https://doi.org/10.1109/GLOCOM.2018.8648088","url":"https://dblp.org/rec/conf/globecom/LiuYLJL18"}, "url":"URL#2567389" }, { "@score":"1", "@id":"2567391", "info":{"authors":{"author":[{"@pid":"60/7006","text":"Yujie Liu"},{"@pid":"65/2899-1","text":"Xu Zhu 0001"},{"@pid":"130/1634","text":"Eng Gee Lim"},{"@pid":"88/9308","text":"Yufei Jiang"},{"@pid":"15/6040-1","text":"Yi Huang 0001"}]},"title":"Iterative Semi-Blind CFO Estimation, SI Cancelation and Signal Detection for Full-Duplex Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuZLJH18","doi":"10.1109/GLOCOM.2018.8647485","ee":"https://doi.org/10.1109/GLOCOM.2018.8647485","url":"https://dblp.org/rec/conf/globecom/LiuZLJH18"}, "url":"URL#2567391" }, { "@score":"1", "@id":"2567392", "info":{"authors":{"author":[{"@pid":"93/127","text":"Tuo Liu"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Joint Optimization of Cache Allocation and Content Placement in Urban Vehicular Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LiuZN18","doi":"10.1109/GLOCOM.2018.8647913","ee":"https://doi.org/10.1109/GLOCOM.2018.8647913","url":"https://dblp.org/rec/conf/globecom/LiuZN18"}, "url":"URL#2567392" }, { "@score":"1", "@id":"2567393", "info":{"authors":{"author":[{"@pid":"140/7769","text":"Zishan Liu"},{"@pid":"37/1629-13","text":"Lin Zhang 0013"},{"@pid":"31/2597-1","text":"Wei Ni 0001"},{"@pid":"07/3441","text":"Iain B. Collings"}]},"title":"A Cross-Layer MAC Aware Pseudonym (MAP) Scheme for the VANET.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuZNC18","doi":"10.1109/GLOCOM.2018.8647808","ee":"https://doi.org/10.1109/GLOCOM.2018.8647808","url":"https://dblp.org/rec/conf/globecom/LiuZNC18"}, "url":"URL#2567393" }, { "@score":"1", "@id":"2567394", "info":{"authors":{"author":[{"@pid":"181/2612-6","text":"Ling Liu 0006"},{"@pid":"75/1805-1","text":"Yiqing Zhou 0001"},{"@pid":"50/567","text":"Jinhong Yuan"},{"@pid":"90/2236","text":"Lin Tian"},{"@pid":"84/1530","text":"Jinglin Shi"}]},"title":"Fronthaul Capacity Requirement Minimization via Physical Layer Caching in Cloud-RAN.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LiuZYTS18","doi":"10.1109/GLOCOM.2018.8648107","ee":"https://doi.org/10.1109/GLOCOM.2018.8648107","url":"https://dblp.org/rec/conf/globecom/LiuZYTS18"}, "url":"URL#2567394" }, { "@score":"1", "@id":"2567397", "info":{"authors":{"author":[{"@pid":"198/5325","text":"Gobinath Loganathan"},{"@pid":"75/4355","text":"Jagath Samarabandu"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"}]},"title":"Real-Time Intrusion Detection in Network Traffic Using Adaptive and Auto-Scaling Stream Processor.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LoganathanSW18","doi":"10.1109/GLOCOM.2018.8647489","ee":"https://doi.org/10.1109/GLOCOM.2018.8647489","url":"https://dblp.org/rec/conf/globecom/LoganathanSW18"}, "url":"URL#2567397" }, { "@score":"1", "@id":"2567398", "info":{"authors":{"author":[{"@pid":"234/6187","text":"Kaixuan Long"},{"@pid":"89/10957","text":"Chencheng Ye"},{"@pid":"67/5781-1","text":"Ying Cui 0001"},{"@pid":"40/6686-2","text":"Zhi Liu 0002"}]},"title":"Optimal Multi-Quality Multicast for 360 Virtual Reality Video.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LongYCL18","doi":"10.1109/GLOCOM.2018.8647429","ee":"https://doi.org/10.1109/GLOCOM.2018.8647429","url":"https://dblp.org/rec/conf/globecom/LongYCL18"}, "url":"URL#2567398" }, { "@score":"1", "@id":"2567399", "info":{"authors":{"author":[{"@pid":"158/4841","text":"Radhika Loomba"},{"@pid":"96/1047","text":"Thijs Metsch"},{"@pid":"210/3346","text":"Leonard Feehan"},{"@pid":"34/5501","text":"Joe Butler"}]},"title":"A Hybrid Fitness-Utility Algorithm for Improved Service Chain Placement.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LoombaMFB18","doi":"10.1109/GLOCOM.2018.8648033","ee":"https://doi.org/10.1109/GLOCOM.2018.8648033","url":"https://dblp.org/rec/conf/globecom/LoombaMFB18"}, "url":"URL#2567399" }, { "@score":"1", "@id":"2567400", "info":{"authors":{"author":[{"@pid":"38/7211","text":"David López-Pérez"},{"@pid":"48/3462-1","text":"Ming Ding 0001"},{"@pid":"46/8453","text":"Huazhou Li"},{"@pid":"77/6988","text":"Lorenzo Galati Giordano"},{"@pid":"28/10806","text":"Giovanni Geraci"},{"@pid":"147/1274","text":"Adrian García-Rodríguez"},{"@pid":"36/4948","text":"Zihuai Lin"},{"@pid":"10/2899","text":"Mahbub Hassan"}]},"title":"On the Downlink Performance of UAV Communications in Dense Cellular Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Lopez-PerezDLGG18","doi":"10.1109/GLOCOM.2018.8647634","ee":"https://doi.org/10.1109/GLOCOM.2018.8647634","url":"https://dblp.org/rec/conf/globecom/Lopez-PerezDLGG18"}, "url":"URL#2567400" }, { "@score":"1", "@id":"2567402", "info":{"authors":{"author":[{"@pid":"122/5113","text":"Yunlong Lu"},{"@pid":"67/4573","text":"Xiaohong Huang"},{"@pid":"16/3614","text":"Dandan Li"},{"@pid":"04/3348-2","text":"Yan Zhang 0002"}]},"title":"Collaborative Graph-Based Mechanism for Distributed Big Data Leakage Prevention.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LuHLZ18","doi":"10.1109/GLOCOM.2018.8647746","ee":"https://doi.org/10.1109/GLOCOM.2018.8647746","url":"https://dblp.org/rec/conf/globecom/LuHLZ18"}, "url":"URL#2567402" }, { "@score":"1", "@id":"2567403", "info":{"authors":{"author":[{"@pid":"210/6307","text":"Yujiao Lu"},{"@pid":"16/6714","text":"Hancheng Lu"},{"@pid":"95/6915","text":"Liangliang Cao"},{"@pid":"25/3972-1","text":"Feng Wu 0001"},{"@pid":"232/3381","text":"Daren Zhu"}]},"title":"Learning Deterministic Policy with Target for Power Control in Wireless Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LuLCWZ18","doi":"10.1109/GLOCOM.2018.8648056","ee":"https://doi.org/10.1109/GLOCOM.2018.8648056","url":"https://dblp.org/rec/conf/globecom/LuLCWZ18"}, "url":"URL#2567403" }, { "@score":"1", "@id":"2567405", "info":{"authors":{"author":[{"@pid":"183/1745","text":"Jean-Alain Lucciardi"},{"@pid":"91/436","text":"Gilles Mesnager"},{"@pid":"20/7819","text":"Nathalie Thomas"},{"@pid":"43/3999","text":"Charly Poulliat"},{"@pid":"61/7026","text":"Marie-Laure Boucheret"},{"@pid":"213/0923","text":"Guillaume Buscarlet"}]},"title":"Piecewise Volterra Series Approximation for Improved Non-Linear Channel Modelization and Detection.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LucciardiMTPBB18","doi":"10.1109/GLOCOM.2018.8647907","ee":"https://doi.org/10.1109/GLOCOM.2018.8647907","url":"https://dblp.org/rec/conf/globecom/LucciardiMTPBB18"}, "url":"URL#2567405" }, { "@score":"1", "@id":"2567406", "info":{"authors":{"author":[{"@pid":"18/7911","text":"Changqing Luo"},{"@pid":"119/3867","text":"Sergio Salinas 0001"},{"@pid":"72/2643-1","text":"Pan Li 0001"}]},"title":"Efficient Privacy-Preserving Large-Scale CP Tensor Decompositions.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LuoSL18","doi":"10.1109/GLOCOM.2018.8647978","ee":"https://doi.org/10.1109/GLOCOM.2018.8647978","url":"https://dblp.org/rec/conf/globecom/LuoSL18"}, "url":"URL#2567406" }, { "@score":"1", "@id":"2567407", "info":{"authors":{"author":[{"@pid":"143/9632","text":"Hejia Luo"},{"@pid":"143/0921","text":"Gongzheng Zhang"},{"@pid":"192/8140","text":"Alexey Maevskiy"},{"@pid":"08/63","text":"Vladimir Gritsenko"},{"@pid":"78/6191","text":"Yue Zhou"},{"@pid":"21/5521-22","text":"Ying Chen 0022"},{"@pid":"00/3887-1","text":"Rong Li 0001"},{"@pid":"56/1577","text":"Yiqun Ge"},{"@pid":"39/449-1","text":"Jian Wang 0001"},{"@pid":"125/8189-62","text":"Jun Wang 0062"}]},"title":"Analysis and Application of Permuted Polar Codes.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/LuoZMGZCLGWW18","doi":"10.1109/GLOCOM.2018.8647725","ee":"https://doi.org/10.1109/GLOCOM.2018.8647725","url":"https://dblp.org/rec/conf/globecom/LuoZMGZCLGWW18"}, "url":"URL#2567407" }, { "@score":"1", "@id":"2567408", "info":{"authors":{"author":[{"@pid":"236/2996","text":"Quang-Trung Luu"},{"@pid":"41/1521","text":"Michel Kieffer"},{"@pid":"13/10671","text":"Alexandre Mouradian"},{"@pid":"62/2830","text":"Sylvaine Kerboeuf"}]},"title":"Aggregated Resource Provisioning for Network Slices.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LuuKMK18","doi":"10.1109/GLOCOM.2018.8648039","ee":"https://doi.org/10.1109/GLOCOM.2018.8648039","url":"https://dblp.org/rec/conf/globecom/LuuKMK18"}, "url":"URL#2567408" }, { "@score":"1", "@id":"2567409", "info":{"authors":{"author":[{"@pid":"122/5219","text":"Bojie Lv"},{"@pid":"w/RuiWang7","text":"Rui Wang 0007"},{"@pid":"67/5781-1","text":"Ying Cui 0001"},{"@pid":"02/3687","text":"Haisheng Tan"}]},"title":"Joint Optimization of File Placement and Delivery in Cache-Assisted Wireless Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LvWCT18","doi":"10.1109/GLOCOM.2018.8647797","ee":"https://doi.org/10.1109/GLOCOM.2018.8647797","url":"https://dblp.org/rec/conf/globecom/LvWCT18"}, "url":"URL#2567409" }, { "@score":"1", "@id":"2567410", "info":{"authors":{"author":[{"@pid":"227/4787","text":"Wenyi Lv"},{"@pid":"81/9593-3","text":"Yu Zeng 0003"},{"@pid":"28/8968","text":"Tiecheng Song"},{"@pid":"144/6588","text":"Tianheng Xu"},{"@pid":"96/5737","text":"Honglin Hu"}]},"title":"Stable and Proportional Fair User Pairing Algorithm for D2D-Relay Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LvZSXH18","doi":"10.1109/GLOCOM.2018.8647902","ee":"https://doi.org/10.1109/GLOCOM.2018.8647902","url":"https://dblp.org/rec/conf/globecom/LvZSXH18"}, "url":"URL#2567410" }, { "@score":"1", "@id":"2567411", "info":{"authors":{"author":[{"@pid":"176/5905","text":"Ling Lyu"},{"@pid":"35/6761","text":"Cailian Chen"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"25/3029","text":"Xinping Guan"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"NOMA-Assisted Small-Packet Transmissions in Mission-Critical MTCs for Industrial Automation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LyuCCGS18","doi":"10.1109/GLOCOM.2018.8647316","ee":"https://doi.org/10.1109/GLOCOM.2018.8647316","url":"https://dblp.org/rec/conf/globecom/LyuCCGS18"}, "url":"URL#2567411" }, { "@score":"1", "@id":"2567412", "info":{"authors":{"author":[{"@pid":"236/2795","text":"Ruiling Lyu"},{"@pid":"96/7401","text":"Junyu Liu"},{"@pid":"39/4119","text":"Min Sheng"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"}]},"title":"Modeling and Analysis of UAV Assisted Cellular Network.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/LyuLSL18","doi":"10.1109/GLOCOM.2018.8647516","ee":"https://doi.org/10.1109/GLOCOM.2018.8647516","url":"https://dblp.org/rec/conf/globecom/LyuLSL18"}, "url":"URL#2567412" }, { "@score":"1", "@id":"2567413", "info":{"authors":{"author":[{"@pid":"198/4028","text":"Zixiang Ma"},{"@pid":"24/1209","text":"John Bigham"},{"@pid":"99/3504","text":"Stefan Poslad"},{"@pid":"220/9034","text":"Bang Wu"},{"@pid":"175/5693","text":"Xiaoshuai Zhang"},{"@pid":"70/2129","text":"Eliane L. Bodanese"}]},"title":"Device-Free, Activity During Daily Life, Recognition Using a Low-Cost Lidar.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MaBPWZB18","doi":"10.1109/GLOCOM.2018.8647251","ee":"https://doi.org/10.1109/GLOCOM.2018.8647251","url":"https://dblp.org/rec/conf/globecom/MaBPWZB18"}, "url":"URL#2567413" }, { "@score":"1", "@id":"2567414", "info":{"authors":{"author":[{"@pid":"85/5058","text":"Rui Ma"},{"@pid":"28/531","text":"Xianghui Cao"},{"@pid":"71/208-13","text":"Shuai Zhang 0013"},{"@pid":"31/2088-4","text":"Lu Liu 0004"},{"@pid":"96/3060-3","text":"Yu Cheng 0003"},{"@pid":"64/221","text":"Changyin Sun"}]},"title":"A DBN-Based Independent Set Learning Algorithm for Capacity Optimization in Wireless Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MaCZLCS18","doi":"10.1109/GLOCOM.2018.8647940","ee":"https://doi.org/10.1109/GLOCOM.2018.8647940","url":"https://dblp.org/rec/conf/globecom/MaCZLCS18"}, "url":"URL#2567414" }, { "@score":"1", "@id":"2567415", "info":{"authors":{"author":[{"@pid":"230/3906","text":"Jianhui Ma"},{"@pid":"80/7804","text":"Chuan Huang"}]},"title":"Energy Efficiency of Decode-and-Forward Full- Duplex Relay Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MaH18","doi":"10.1109/GLOCOM.2018.8647353","ee":"https://doi.org/10.1109/GLOCOM.2018.8647353","url":"https://dblp.org/rec/conf/globecom/MaH18"}, "url":"URL#2567415" }, { "@score":"1", "@id":"2567416", "info":{"authors":{"author":[{"@pid":"83/4950-1","text":"Yu Ma 0001"},{"@pid":"31/1277","text":"Weifa Liang"},{"@pid":"183/6818","text":"Meitian Huang"},{"@pid":"01/267-1","text":"Song Guo 0001"}]},"title":"Profit Maximization of NFV-Enabled Request Admissions in SDNs.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MaLHG18","doi":"10.1109/GLOCOM.2018.8647455","ee":"https://doi.org/10.1109/GLOCOM.2018.8647455","url":"https://dblp.org/rec/conf/globecom/MaLHG18"}, "url":"URL#2567416" }, { "@score":"1", "@id":"2567417", "info":{"authors":{"author":[{"@pid":"210/6229","text":"Ruqiu Ma"},{"@pid":"58/6810-39","text":"Li Wang 0039"},{"@pid":"45/5796","text":"Gordon L. Stüber"}]},"title":"Adverse Selection and Moral Hazard Based Incentive Mechanism for Full-Duplex Relay Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MaWS18","doi":"10.1109/GLOCOM.2018.8648005","ee":"https://doi.org/10.1109/GLOCOM.2018.8648005","url":"https://dblp.org/rec/conf/globecom/MaWS18"}, "url":"URL#2567417" }, { "@score":"1", "@id":"2567419", "info":{"authors":{"author":[{"@pid":"194/6965","text":"Yassine Maalej"},{"@pid":"98/1677","text":"Sameh Sorour"},{"@pid":"21/2416","text":"Ahmed Abdel-Rahim"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Tracking 3D LIDAR Point Clouds Using Extended Kalman Filters in KITTI Driving Sequences.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MaalejSAG18","doi":"10.1109/GLOCOM.2018.8647803","ee":"https://doi.org/10.1109/GLOCOM.2018.8647803","url":"https://dblp.org/rec/conf/globecom/MaalejSAG18"}, "url":"URL#2567419" }, { "@score":"1", "@id":"2567420", "info":{"authors":{"author":[{"@pid":"215/9222","text":"Narendar Madhavan"},{"@pid":"14/1930","text":"Masahiro Sekiya"},{"@pid":"71/3912","text":"Toshihisa Nabetani"}]},"title":"Development of 802.11ax-compatible LSI and Performance Evaluation of Uplink OFDMA.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MadhavanSN18","doi":"10.1109/GLOCOM.2018.8647617","ee":"https://doi.org/10.1109/GLOCOM.2018.8647617","url":"https://dblp.org/rec/conf/globecom/MadhavanSN18"}, "url":"URL#2567420" }, { "@score":"1", "@id":"2567421", "info":{"authors":{"author":[{"@pid":"30/10806","text":"Setareh Maghsudi"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"}]},"title":"Distributed Task Management in Cyber-Physical Systems: How to Cooperate Under Uncertainty?","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MaghsudiS18","doi":"10.1109/GLOCOM.2018.8647643","ee":"https://doi.org/10.1109/GLOCOM.2018.8647643","url":"https://dblp.org/rec/conf/globecom/MaghsudiS18"}, "url":"URL#2567421" }, { "@score":"1", "@id":"2567423", "info":{"authors":{"author":[{"@pid":"150/5594","text":"Jasmin A. Mahal"},{"@pid":"73/1462","text":"T. Charles Clancy"}]},"title":"Jammer Blind Estimation of a Third-Party OFDM Channel.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MahalC18","doi":"10.1109/GLOCOM.2018.8647805","ee":"https://doi.org/10.1109/GLOCOM.2018.8647805","url":"https://dblp.org/rec/conf/globecom/MahalC18"}, "url":"URL#2567423" }, { "@score":"1", "@id":"2567425", "info":{"authors":{"author":[{"@pid":"154/3559","text":"Khaqan Majeed"},{"@pid":"17/1351","text":"Steve Hranilovic"}]},"title":"Passive Indoor Localization for Visible Light Communication Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MajeedH18","doi":"10.1109/GLOCOM.2018.8647875","ee":"https://doi.org/10.1109/GLOCOM.2018.8647875","url":"https://dblp.org/rec/conf/globecom/MajeedH18"}, "url":"URL#2567425" }, { "@score":"1", "@id":"2567426", "info":{"authors":{"author":[{"@pid":"227/1288","text":"Aaisha Makkar"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"35/10056","text":"Kuei-Fang Hsiao"}]},"title":"QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MakkarKOH18","doi":"10.1109/GLOCOM.2018.8647180","ee":"https://doi.org/10.1109/GLOCOM.2018.8647180","url":"https://dblp.org/rec/conf/globecom/MakkarKOH18"}, "url":"URL#2567426" }, { "@score":"1", "@id":"2567427", "info":{"authors":{"author":[{"@pid":"227/1288","text":"Aaisha Makkar"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"}]},"title":"FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MakkarOK18","doi":"10.1109/GLOCOM.2018.8647294","ee":"https://doi.org/10.1109/GLOCOM.2018.8647294","url":"https://dblp.org/rec/conf/globecom/MakkarOK18"}, "url":"URL#2567427" }, { "@score":"1", "@id":"2567428", "info":{"authors":{"author":[{"@pid":"119/1434","text":"Derya Malak"},{"@pid":"m/MurielMedard","text":"Muriel Médard"},{"@pid":"72/5346","text":"Edmund M. Yeh"}]},"title":"ARQ with Cumulative Feedback to Compensate for Burst Errors.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MalakMY18","doi":"10.1109/GLOCOM.2018.8648058","ee":"https://doi.org/10.1109/GLOCOM.2018.8648058","url":"https://dblp.org/rec/conf/globecom/MalakMY18"}, "url":"URL#2567428" }, { "@score":"1", "@id":"2567429", "info":{"authors":{"author":{"@pid":"51/3128","text":"Robert A. Malaney"}},"title":"A Note on the Information-Theoretic-(in)Security of Fading Generated Secret Keys.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Malaney18","doi":"10.1109/GLOCOM.2018.8647137","ee":"https://doi.org/10.1109/GLOCOM.2018.8647137","url":"https://dblp.org/rec/conf/globecom/Malaney18"}, "url":"URL#2567429" }, { "@score":"1", "@id":"2567432", "info":{"authors":{"author":[{"@pid":"189/4529","text":"Chengzhi Mao"},{"@pid":"236/3333","text":"Kangbo Lin"},{"@pid":"215/4910","text":"Tiancheng Yu"},{"@pid":"92/3660","text":"Yuan Shen"}]},"title":"A Probabilistic Learning Approach to UWB Ranging Error Mitigation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MaoLYS18","doi":"10.1109/GLOCOM.2018.8647602","ee":"https://doi.org/10.1109/GLOCOM.2018.8647602","url":"https://dblp.org/rec/conf/globecom/MaoLYS18"}, "url":"URL#2567432" }, { "@score":"1", "@id":"2567433", "info":{"authors":{"author":[{"@pid":"195/5435","text":"Tianqi Mao"},{"@pid":"78/8276-1","text":"Zhaocheng Wang 0001"}]},"title":"Physical-Layer Security Enhancement for SIMO-MBM Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MaoW18","doi":"10.1109/GLOCOM.2018.8647748","ee":"https://doi.org/10.1109/GLOCOM.2018.8647748","url":"https://dblp.org/rec/conf/globecom/MaoW18"}, "url":"URL#2567433" }, { "@score":"1", "@id":"2567434", "info":{"authors":{"author":[{"@pid":"13/4788","text":"Mario Marchese"},{"@pid":"161/5386","text":"Fabio Patrone"}]},"title":"Energy-aware Routing Algorithm for DTN-Nanosatellite Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MarcheseP18","doi":"10.1109/GLOCOM.2018.8647491","ee":"https://doi.org/10.1109/GLOCOM.2018.8647491","url":"https://dblp.org/rec/conf/globecom/MarcheseP18"}, "url":"URL#2567434" }, { "@score":"1", "@id":"2567436", "info":{"authors":{"author":[{"@pid":"169/9903","text":"Fatma Marzouk"},{"@pid":"187/7009","text":"Rui Alheiro"},{"@pid":"04/1616","text":"Jonathan Rodriguez 0001"},{"@pid":"50/5718","text":"Ayman Radwan"}]},"title":"Enhanced Reachability and Low Latency DENM Dissemination Protocol for Platoon Based VANETs.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MarzoukARR18","doi":"10.1109/GLOCOM.2018.8647647","ee":"https://doi.org/10.1109/GLOCOM.2018.8647647","url":"https://dblp.org/rec/conf/globecom/MarzoukARR18"}, "url":"URL#2567436" }, { "@score":"1", "@id":"2567438", "info":{"authors":{"author":[{"@pid":"233/5254","text":"Usama Masood"},{"@pid":"214/6621","text":"Ahmad Asghar"},{"@pid":"167/1888","text":"Ali Imran 0001"},{"@pid":"41/74","text":"Adnan Noor Mian"}]},"title":"Deep Learning Based Detection of Sleeping Cells in Next Generation Cellular Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MasoodAIM18","doi":"10.1109/GLOCOM.2018.8647689","ee":"https://doi.org/10.1109/GLOCOM.2018.8647689","url":"https://dblp.org/rec/conf/globecom/MasoodAIM18"}, "url":"URL#2567438" }, { "@score":"1", "@id":"2567439", "info":{"authors":{"author":[{"@pid":"191/6882","text":"Toshiki Matsumine"},{"@pid":"96/4253","text":"Brian M. Kurkoski"},{"@pid":"02/1176","text":"Hideki Ochiai"}]},"title":"Construction D Lattice Decoding and Its Application to BCH Code Lattices.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MatsumineKO18","doi":"10.1109/GLOCOM.2018.8647232","ee":"https://doi.org/10.1109/GLOCOM.2018.8647232","url":"https://dblp.org/rec/conf/globecom/MatsumineKO18"}, "url":"URL#2567439" }, { "@score":"1", "@id":"2567440", "info":{"authors":{"author":[{"@pid":"124/8414","text":"Israel Leyva Mayorga"},{"@pid":"216/6622","text":"Roberto Torre Arranz"},{"@pid":"194/8617","text":"Sreekrishna Pandi"},{"@pid":"10/1557-2","text":"Giang T. Nguyen 0002"},{"@pid":"74/6242","text":"Vicent Pla"},{"@pid":"22/482","text":"Jorge Martínez-Bauset"},{"@pid":"f/FHPFitzek","text":"Frank H. P. Fitzek"}]},"title":"A Network-Coded Cooperation Protocol for Efficient Massive Content Distribution.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MayorgaAPNPMF18","doi":"10.1109/GLOCOM.2018.8647661","ee":"https://doi.org/10.1109/GLOCOM.2018.8647661","url":"https://dblp.org/rec/conf/globecom/MayorgaAPNPMF18"}, "url":"URL#2567440" }, { "@score":"1", "@id":"2567441", "info":{"authors":{"author":[{"@pid":"209/6932","text":"Said Medjkouh"},{"@pid":"223/4164","text":"Emre Gönültas"},{"@pid":"25/8184","text":"Tom Goldstein"},{"@pid":"54/306","text":"Olav Tirkkonen"},{"@pid":"51/3407","text":"Christoph Studer"}]},"title":"Unsupervised Charting of Wireless Channels.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MedjkouhGGTS18","doi":"10.1109/GLOCOM.2018.8647535","ee":"https://doi.org/10.1109/GLOCOM.2018.8647535","url":"https://dblp.org/rec/conf/globecom/MedjkouhGGTS18"}, "url":"URL#2567441" }, { "@score":"1", "@id":"2567443", "info":{"authors":{"author":[{"@pid":"160/4053","text":"Farhad Mehran"},{"@pid":"53/2758","text":"Konstantinos Nikitopoulos"}]},"title":"Generalized Space-Time Super-Modulation for Headerless Grant-Free Rateless Multiple Access.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MehranN18","doi":"10.1109/GLOCOM.2018.8648102","ee":"https://doi.org/10.1109/GLOCOM.2018.8648102","url":"https://dblp.org/rec/conf/globecom/MehranN18"}, "url":"URL#2567443" }, { "@score":"1", "@id":"2567444", "info":{"authors":{"author":[{"@pid":"164/9012","text":"Weidong Mei"},{"@pid":"150/9712","text":"Qingqing Wu"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"}]},"title":"Cellular-Connected UAV: Uplink Association, Power Control and Interference Coordination.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MeiWZ18","doi":"10.1109/GLOCOM.2018.8647820","ee":"https://doi.org/10.1109/GLOCOM.2018.8647820","url":"https://dblp.org/rec/conf/globecom/MeiWZ18"}, "url":"URL#2567444" }, { "@score":"1", "@id":"2567445", "info":{"authors":{"author":[{"@pid":"203/3360","text":"Tesnim Mekki"},{"@pid":"23/4103","text":"Issam Jabri"},{"@pid":"r/AbderrezakRachedi","text":"Abderrezak Rachedi"},{"@pid":"21/2944","text":"Maher Ben Jemaa"}]},"title":"Towards Multi-Access Edge Based Vehicular Fog Computing Architecture.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MekkiJRJ18","doi":"10.1109/GLOCOM.2018.8647850","ee":"https://doi.org/10.1109/GLOCOM.2018.8647850","url":"https://dblp.org/rec/conf/globecom/MekkiJRJ18"}, "url":"URL#2567445" }, { "@score":"1", "@id":"2567446", "info":{"authors":{"author":[{"@pid":"185/6995","text":"Rico Mendrzik"},{"@pid":"42/1188","text":"Henk Wymeersch"},{"@pid":"19/2794","text":"Gerhard Bauch 0001"}]},"title":"Joint Localization and Mapping Through Millimeter Wave MIMO in 5G Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MendrzikWB18","doi":"10.1109/GLOCOM.2018.8647451","ee":"https://doi.org/10.1109/GLOCOM.2018.8647451","url":"https://dblp.org/rec/conf/globecom/MendrzikWB18"}, "url":"URL#2567446" }, { "@score":"1", "@id":"2567447", "info":{"authors":{"author":[{"@pid":"236/2933","text":"Xiangyue Meng"},{"@pid":"99/5935","text":"Hazer Inaltekin"},{"@pid":"54/2451","text":"Brian S. Krongold"}]},"title":"Deep Reinforcement Learning-Based Power Control in Full-Duplex Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MengIK18","doi":"10.1109/GLOCOM.2018.8647699","ee":"https://doi.org/10.1109/GLOCOM.2018.8647699","url":"https://dblp.org/rec/conf/globecom/MengIK18"}, "url":"URL#2567447" }, { "@score":"1", "@id":"2567448", "info":{"authors":{"author":[{"@pid":"210/0500","text":"Xianling Meng"},{"@pid":"35/7092-21","text":"Wei Wang 0021"},{"@pid":"194/6915","text":"Yitu Wang"},{"@pid":"68/4401","text":"Vincent K. N. Lau"},{"@pid":"81/6236-1","text":"Zhaoyang Zhang 0001"}]},"title":"Delay-Optimal Computation Offloading for Computation-Constrained Mobile Edge Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MengWWLZ18","doi":"10.1109/GLOCOM.2018.8647703","ee":"https://doi.org/10.1109/GLOCOM.2018.8647703","url":"https://dblp.org/rec/conf/globecom/MengWWLZ18"}, "url":"URL#2567448" }, { "@score":"1", "@id":"2567450", "info":{"authors":{"author":[{"@pid":"236/3237","text":"Russell Meredith"},{"@pid":"236/2791","text":"Natalie Landsberg"},{"@pid":"236/2917","text":"Agueo Lopez"},{"@pid":"47/955","text":"Rudra Dutta"}]},"title":"Recovering an OSPF Network from Malicious Attacks: An Experimental Evaluation of Recovery Techniques.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MeredithLLD18","doi":"10.1109/GLOCOM.2018.8648093","ee":"https://doi.org/10.1109/GLOCOM.2018.8648093","url":"https://dblp.org/rec/conf/globecom/MeredithLLD18"}, "url":"URL#2567450" }, { "@score":"1", "@id":"2567451", "info":{"authors":{"author":[{"@pid":"221/0400","text":"Niezi Mharsi"},{"@pid":"36/8725","text":"Makhlouf Hadji"},{"@pid":"49/1099","text":"Philippe Martins"}]},"title":"Full Coverage Hole Optimization in Cloud Radio Access Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MharsiHM18","doi":"10.1109/GLOCOM.2018.8647648","ee":"https://doi.org/10.1109/GLOCOM.2018.8647648","url":"https://dblp.org/rec/conf/globecom/MharsiHM18"}, "url":"URL#2567451" }, { "@score":"1", "@id":"2567452", "info":{"authors":{"author":[{"@pid":"133/3341","text":"Yang Mi"},{"@pid":"80/8335","text":"Chunbo Luo"},{"@pid":"96/3727","text":"Geyong Min"},{"@pid":"70/1958","text":"Pablo Casaseca-de-la-Higuera"},{"@pid":"95/6543","text":"Zhi Wang"}]},"title":"Towards Optimal Power Splitting in Simultaneous Power and Information Transmission.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MiLMCW18","doi":"10.1109/GLOCOM.2018.8647526","ee":"https://doi.org/10.1109/GLOCOM.2018.8647526","url":"https://dblp.org/rec/conf/globecom/MiLMCW18"}, "url":"URL#2567452" }, { "@score":"1", "@id":"2567453", "info":{"authors":{"author":[{"@pid":"143/7377","text":"De Mi"},{"@pid":"64/5666-35","text":"Lei Zhang 0035"},{"@pid":"51/3596","text":"Mehrdad Dianati"},{"@pid":"14/7881","text":"Sami Muhaidat"},{"@pid":"83/3968","text":"Pei Xiao"},{"@pid":"18/380","text":"Rahim Tafazolli"}]},"title":"Self-Calibration for Massive MIMO with Channel Reciprocity and Channel Estimation Errors.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MiZDMXT18","doi":"10.1109/GLOCOM.2018.8647759","ee":"https://doi.org/10.1109/GLOCOM.2018.8647759","url":"https://dblp.org/rec/conf/globecom/MiZDMXT18"}, "url":"URL#2567453" }, { "@score":"1", "@id":"2567456", "info":{"authors":{"author":[{"@pid":"188/6033","text":"Victor Millnert"},{"@pid":"58/2502","text":"Johan Eker"},{"@pid":"84/2278","text":"Enrico Bini"}]},"title":"Achieving Predictable and Low End-to-End Latency for a Network of Smart Services.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MillnertEB18","doi":"10.1109/GLOCOM.2018.8647332","ee":"https://doi.org/10.1109/GLOCOM.2018.8647332","url":"https://dblp.org/rec/conf/globecom/MillnertEB18"}, "url":"URL#2567456" }, { "@score":"1", "@id":"2567457", "info":{"authors":{"author":[{"@pid":"180/2966","text":"Qublai Khan Ali Mirza"},{"@pid":"a/IrfanUllahAwan","text":"Irfan Awan"},{"@pid":"26/4300","text":"Muhammad Younas 0001"}]},"title":"A Cloud-Based Energy Efficient Hosting Model for Malware Detection Framework.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MirzaAY18","doi":"10.1109/GLOCOM.2018.8648119","ee":"https://doi.org/10.1109/GLOCOM.2018.8648119","url":"https://dblp.org/rec/conf/globecom/MirzaAY18"}, "url":"URL#2567457" }, { "@score":"1", "@id":"2567458", "info":{"authors":{"author":[{"@pid":"131/9750","text":"Javad Mirzaei"},{"@pid":"22/3660","text":"Raviraj Adve"},{"@pid":"91/6648","text":"Shahram ShahbazPanahi"}]},"title":"Semi-Blind Channel Estimation for Frequency-Selective Massive MIMO Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MirzaeiAS18","doi":"10.1109/GLOCOM.2018.8647635","ee":"https://doi.org/10.1109/GLOCOM.2018.8647635","url":"https://dblp.org/rec/conf/globecom/MirzaeiAS18"}, "url":"URL#2567458" }, { "@score":"1", "@id":"2567459", "info":{"authors":{"author":[{"@pid":"127/4952","text":"Alekha Kumar Mishra"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"154/0895","text":"Deepak Puthal"},{"@pid":"161/6873","text":"Asis Kumar Tripathy"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"Graph-Based Symmetric Crypto-System for Data Confidentiality.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MishraOPTC18","doi":"10.1109/GLOCOM.2018.8647844","ee":"https://doi.org/10.1109/GLOCOM.2018.8647844","url":"https://dblp.org/rec/conf/globecom/MishraOPTC18"}, "url":"URL#2567459" }, { "@score":"1", "@id":"2567460", "info":{"authors":{"author":[{"@pid":"62/76","text":"Vojislav B. Misic"},{"@pid":"m/JVMisic","text":"Jelena V. Misic"},{"@pid":"22/6882","text":"Xiaolin Chang"}]},"title":"Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MisicMC18","doi":"10.1109/GLOCOM.2018.8647670","ee":"https://doi.org/10.1109/GLOCOM.2018.8647670","url":"https://dblp.org/rec/conf/globecom/MisicMC18"}, "url":"URL#2567460" }, { "@score":"1", "@id":"2567461", "info":{"authors":{"author":[{"@pid":"m/JVMisic","text":"Jelena V. Misic"},{"@pid":"62/76","text":"Vojislav B. Misic"},{"@pid":"22/6882","text":"Xiaolin Chang"}]},"title":"Kernel Based Estimation of Domain Parameters at IoT Proxy.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MisicMC18a","doi":"10.1109/GLOCOM.2018.8648071","ee":"https://doi.org/10.1109/GLOCOM.2018.8648071","url":"https://dblp.org/rec/conf/globecom/MisicMC18a"}, "url":"URL#2567461" }, { "@score":"1", "@id":"2567462", "info":{"authors":{"author":[{"@pid":"123/9268","text":"Zoubeir Mlika"},{"@pid":"97/5325","text":"Elmahdi Driouch"},{"@pid":"56/4552","text":"Wessam Ajib"}]},"title":"User Scheduling with Deadlines and Energy Harvesting Base Station.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MlikaDA18","doi":"10.1109/GLOCOM.2018.8648142","ee":"https://doi.org/10.1109/GLOCOM.2018.8648142","url":"https://dblp.org/rec/conf/globecom/MlikaDA18"}, "url":"URL#2567462" }, { "@score":"1", "@id":"2567463", "info":{"authors":{"author":[{"@pid":"88/2279","text":"Ahmed M. Mohamed"},{"@pid":"202/4917","text":"Rana A. Hassan"},{"@pid":"71/7867","text":"John Tadrous"},{"@pid":"71/2433","text":"Mohammed Nafie"},{"@pid":"23/553","text":"Tamer A. ElBatt"},{"@pid":"39/93","text":"Fadel F. Digham"}]},"title":"On Optimal Dynamic Caching in Relay Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MohamedHTNED18","doi":"10.1109/GLOCOM.2018.8647936","ee":"https://doi.org/10.1109/GLOCOM.2018.8647936","url":"https://dblp.org/rec/conf/globecom/MohamedHTNED18"}, "url":"URL#2567463" }, { "@score":"1", "@id":"2567464", "info":{"authors":{"author":[{"@pid":"194/8619","text":"Samin Mohammadi"},{"@pid":"117/9325","text":"Reza Farahbakhsh"},{"@pid":"84/4327","text":"Noël Crespi"}]},"title":"User Reactions Prediction Using Embedding Features.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MohammadiFC18","doi":"10.1109/GLOCOM.2018.8647625","ee":"https://doi.org/10.1109/GLOCOM.2018.8647625","url":"https://dblp.org/rec/conf/globecom/MohammadiFC18"}, "url":"URL#2567464" }, { "@score":"1", "@id":"2567465", "info":{"authors":{"author":[{"@pid":"236/3322","text":"Jayendhar Gautham Mohanasundaram"},{"@pid":"34/7684","text":"Tram Truong Huu"},{"@pid":"m/GMohan","text":"Mohan Gurusamy"}]},"title":"Game Theoretic Switch-Controller Mapping with Traffic Variations in Software Defined Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MohanasundaramH18","doi":"10.1109/GLOCOM.2018.8647406","ee":"https://doi.org/10.1109/GLOCOM.2018.8647406","url":"https://dblp.org/rec/conf/globecom/MohanasundaramH18"}, "url":"URL#2567465" }, { "@score":"1", "@id":"2567467", "info":{"authors":{"author":[{"@pid":"119/3867","text":"Sergio A. Salinas Monroy"},{"@pid":"l/MingLi6","text":"Ming Li 0006"},{"@pid":"72/2643-1","text":"Pan Li 0001"}]},"title":"Energy-Based Detection of Defect Injection Attacks in IoT-Enabled Manufacturing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MonroyLL18","doi":"10.1109/GLOCOM.2018.8647631","ee":"https://doi.org/10.1109/GLOCOM.2018.8647631","url":"https://dblp.org/rec/conf/globecom/MonroyLL18"}, "url":"URL#2567467" }, { "@score":"1", "@id":"2567468", "info":{"authors":{"author":[{"@pid":"225/5575","text":"Momena Monwar"},{"@pid":"143/7309","text":"Omid Semiari"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Optimized Path Planning for Inspection by Unmanned Aerial Vehicles Swarm with Energy Constraints.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MonwarSS18","doi":"10.1109/GLOCOM.2018.8647342","ee":"https://doi.org/10.1109/GLOCOM.2018.8647342","url":"https://dblp.org/rec/conf/globecom/MonwarSS18"}, "url":"URL#2567468" }, { "@score":"1", "@id":"2567470", "info":{"authors":{"author":[{"@pid":"146/0545","text":"Reza Mosayebi"},{"@pid":"168/0825","text":"Wayan Wicke"},{"@pid":"39/10518","text":"Vahid Jamali"},{"@pid":"144/7684","text":"Arman Ahmadzadeh"},{"@pid":"95/2265","text":"Robert Schober"},{"@pid":"25/311","text":"Masoumeh Nasiri-Kenari"}]},"title":"Advanced Target Detection via Molecular Communication.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MosayebiWJASN18","doi":"10.1109/GLOCOM.2018.8647734","ee":"https://doi.org/10.1109/GLOCOM.2018.8647734","url":"https://dblp.org/rec/conf/globecom/MosayebiWJASN18"}, "url":"URL#2567470" }, { "@score":"1", "@id":"2567472", "info":{"authors":{"author":[{"@pid":"203/9675","text":"Ahmed Elhamy Mostafa"},{"@pid":"54/3080","text":"Vincent W. S. Wong 0001"},{"@pid":"236/3119","text":"Shuri Liao"},{"@pid":"95/2265","text":"Robert Schober"},{"@pid":"168/0850","text":"Mengying Ding"},{"@pid":"88/898-15","text":"Fan Wang 0015"}]},"title":"Aggregate Preamble Sequence Design for Massive Machine-Type Communications in 5G Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MostafaWLSDW18","doi":"10.1109/GLOCOM.2018.8647963","ee":"https://doi.org/10.1109/GLOCOM.2018.8647963","url":"https://dblp.org/rec/conf/globecom/MostafaWLSDW18"}, "url":"URL#2567472" }, { "@score":"1", "@id":"2567473", "info":{"authors":{"author":[{"@pid":"92/8328","text":"Habib Mostafaei"},{"@pid":"80/2984","text":"Michael Menth"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"A Learning Automaton-Based Controller Placement Algorithm for Software-Defined Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MostafaeiMO18","doi":"10.1109/GLOCOM.2018.8647363","ee":"https://doi.org/10.1109/GLOCOM.2018.8647363","url":"https://dblp.org/rec/conf/globecom/MostafaeiMO18"}, "url":"URL#2567473" }, { "@score":"1", "@id":"2567474", "info":{"authors":{"author":[{"@pid":"164/8730","text":"Abdallah Moubayed"},{"@pid":"190/4709","text":"MohammadNoor Injadat"},{"@pid":"26/704","text":"Abdallah Shami"},{"@pid":"l/HananLutfiyya","text":"Hanan Lutfiyya"}]},"title":"DNS Typo-Squatting Domain Detection: A Data Analytics & Machine Learning Based Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MoubayedISL18","doi":"10.1109/GLOCOM.2018.8647679","ee":"https://doi.org/10.1109/GLOCOM.2018.8647679","url":"https://dblp.org/rec/conf/globecom/MoubayedISL18"}, "url":"URL#2567474" }, { "@score":"1", "@id":"2567475", "info":{"authors":{"author":[{"@pid":"10/9829","text":"Mohammad Mozaffari"},{"@pid":"213/8226","text":"Ali Taleb Zadeh Kasgari"},{"@pid":"41/6237","text":"Walid Saad"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"3D Cellular Network Architecture with Drones for beyond 5G.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MozaffariKSBD18","doi":"10.1109/GLOCOM.2018.8647225","ee":"https://doi.org/10.1109/GLOCOM.2018.8647225","url":"https://dblp.org/rec/conf/globecom/MozaffariKSBD18"}, "url":"URL#2567475" }, { "@score":"1", "@id":"2567478", "info":{"authors":{"author":[{"@pid":"39/8298-1","text":"Mithun Mukherjee 0001"},{"@pid":"23/10014","text":"Yejun Liu"},{"@pid":"l/JaimeLloret","text":"Jaime Lloret 0001"},{"@pid":"64/1967-5","text":"Lei Guo 0005"},{"@pid":"66/9552","text":"Rakesh Matam"},{"@pid":"93/9156","text":"Mohammad Aazam"}]},"title":"Transmission and Latency-Aware Load Balancing for Fog Radio Access Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MukherjeeLLGMA18","doi":"10.1109/GLOCOM.2018.8647580","ee":"https://doi.org/10.1109/GLOCOM.2018.8647580","url":"https://dblp.org/rec/conf/globecom/MukherjeeLLGMA18"}, "url":"URL#2567478" }, { "@score":"1", "@id":"2567480", "info":{"authors":{"author":[{"@pid":"201/8302","text":"Bodhibrata Mukhopadhyay"},{"@pid":"04/7529","text":"Seshan Srirangarajan"},{"@pid":"69/3743","text":"Subrat Kar"}]},"title":"Robust Range-Based Secure Localization in Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/MukhopadhyaySK18","doi":"10.1109/GLOCOM.2018.8647742","ee":"https://doi.org/10.1109/GLOCOM.2018.8647742","url":"https://dblp.org/rec/conf/globecom/MukhopadhyaySK18"}, "url":"URL#2567480" }, { "@score":"1", "@id":"2567481", "info":{"authors":{"author":[{"@pid":"236/3150","text":"Nithin Murali"},{"@pid":"71/10062","text":"Kumar Appaiah"}]},"title":"Keyboard Side Channel Attacks on Smartphones Using Sensor Fusion.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MuraliA18","doi":"10.1109/GLOCOM.2018.8647336","ee":"https://doi.org/10.1109/GLOCOM.2018.8647336","url":"https://dblp.org/rec/conf/globecom/MuraliA18"}, "url":"URL#2567481" }, { "@score":"1", "@id":"2567482", "info":{"authors":{"author":[{"@pid":"229/2377","text":"Placido Mursia"},{"@pid":"130/0864","text":"Italo Atzeni"},{"@pid":"44/3570","text":"David Gesbert"},{"@pid":"39/5796","text":"Laura Cottatellucci"}]},"title":"Covariance Shaping for Massive MIMO Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/MursiaAGC18","doi":"10.1109/GLOCOM.2018.8647861","ee":"https://doi.org/10.1109/GLOCOM.2018.8647861","url":"https://dblp.org/rec/conf/globecom/MursiaAGC18"}, "url":"URL#2567482" }, { "@score":"1", "@id":"2567484", "info":{"authors":{"author":[{"@pid":"146/5492","text":"Muhammad Nabeel"},{"@pid":"199/8268","text":"Muhammad Sohaib Amjad"},{"@pid":"d/FalkoDressler","text":"Falko Dressler"}]},"title":"Preamble-Less Diversity Combining: Improved Energy-Efficiency in Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NabeelAD18","doi":"10.1109/GLOCOM.2018.8647312","ee":"https://doi.org/10.1109/GLOCOM.2018.8647312","url":"https://dblp.org/rec/conf/globecom/NabeelAD18"}, "url":"URL#2567484" }, { "@score":"1", "@id":"2567485", "info":{"authors":{"author":[{"@pid":"162/0017","text":"Qurrat-Ul-Ain Nadeem"},{"@pid":"52/6564","text":"Abla Kammoun"},{"@pid":"75/4085","text":"Mérouane Debbah"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Asymptotic Analysis of Regularized Zero-Forcing in Double Scattering Channels.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/NadeemKDA18","doi":"10.1109/GLOCOM.2018.8647297","ee":"https://doi.org/10.1109/GLOCOM.2018.8647297","url":"https://dblp.org/rec/conf/globecom/NadeemKDA18"}, "url":"URL#2567485" }, { "@score":"1", "@id":"2567489", "info":{"authors":{"author":[{"@pid":"42/705","text":"Yasuo Nakashima"},{"@pid":"29/3432","text":"Takaya Yamazato"},{"@pid":"11/6674","text":"Shintaro Arai"},{"@pid":"28/6571","text":"Hiroya Tanaka"},{"@pid":"80/6616","text":"Yukihiro Tadokoro"}]},"title":"Noise-Aided Demodulation with One-Bit ADC for Quadrature Amplitude Modulated Signals.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NakashimaYATT18","doi":"10.1109/GLOCOM.2018.8648114","ee":"https://doi.org/10.1109/GLOCOM.2018.8648114","url":"https://dblp.org/rec/conf/globecom/NakashimaYATT18"}, "url":"URL#2567489" }, { "@score":"1", "@id":"2567490", "info":{"authors":{"author":[{"@pid":"65/1092","text":"Mort Naraghi-Pour"},{"@pid":"46/6524","text":"Takeshi Ikuma"}]},"title":"Joint Spatial and Spectral Localization of OFDM Sources with Noncoherent Arrays.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Naraghi-PourI18","doi":"10.1109/GLOCOM.2018.8647995","ee":"https://doi.org/10.1109/GLOCOM.2018.8647995","url":"https://dblp.org/rec/conf/globecom/Naraghi-PourI18"}, "url":"URL#2567490" }, { "@score":"1", "@id":"2567491", "info":{"authors":{"author":[{"@pid":"236/3153","text":"Elahe Naserianhanzaei"},{"@pid":"80/1854-1","text":"Xinheng Wang 0001"},{"@pid":"48/3935","text":"Keshav P. Dahal"}]},"title":"APPR: Additive Personalized Point-of-Interest Recommendation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Naserianhanzaei18","doi":"10.1109/GLOCOM.2018.8647203","ee":"https://doi.org/10.1109/GLOCOM.2018.8647203","url":"https://dblp.org/rec/conf/globecom/Naserianhanzaei18"}, "url":"URL#2567491" }, { "@score":"1", "@id":"2567492", "info":{"authors":{"author":[{"@pid":"236/3025","text":"Nourhan Hesham Nasr"},{"@pid":"236/3354","text":"Mohamed-Darwish A. Mohamed"},{"@pid":"69/10085","text":"Mohamed Khairy"}]},"title":"Dartboard Scheme for Rate Enhancement of Mobile Free-Space Optical Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NasrMK18","doi":"10.1109/GLOCOM.2018.8647897","ee":"https://doi.org/10.1109/GLOCOM.2018.8647897","url":"https://dblp.org/rec/conf/globecom/NasrMK18"}, "url":"URL#2567492" }, { "@score":"1", "@id":"2567493", "info":{"authors":{"author":[{"@pid":"172/0886","text":"Mohammad H. Nassralla"},{"@pid":"190/3487","text":"Mortada Haidar"},{"@pid":"190/3563","text":"Hussein Alawieh"},{"@pid":"28/9198","text":"Ahmad M. El-Hajj"},{"@pid":"47/1876","text":"Zaher Dawy"}]},"title":"Patient-Aware EEG-Based Feature and Classifier Selection for e-Health Epileptic Seizure Prediction.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NassrallaHAED18","doi":"10.1109/GLOCOM.2018.8647660","ee":"https://doi.org/10.1109/GLOCOM.2018.8647660","url":"https://dblp.org/rec/conf/globecom/NassrallaHAED18"}, "url":"URL#2567493" }, { "@score":"1", "@id":"2567494", "info":{"authors":{"author":[{"@pid":"150/6120","text":"Alain Richard Ndjiongue"},{"@pid":"49/1419","text":"Telex Magloire Nkouatchah Ngatched"},{"@pid":"56/1712","text":"Hendrik C. Ferreira"}]},"title":"Access Telecommunication Systems Using VLC Technology: Cascaded LD-LED Channel Analysis.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NdjiongueNF18","doi":"10.1109/GLOCOM.2018.8647946","ee":"https://doi.org/10.1109/GLOCOM.2018.8647946","url":"https://dblp.org/rec/conf/globecom/NdjiongueNF18"}, "url":"URL#2567494" }, { "@score":"1", "@id":"2567496", "info":{"authors":{"author":[{"@pid":"180/3009","text":"Rithea Ngeth"},{"@pid":"169/1637","text":"Yuto Lim"},{"@pid":"96/4253","text":"Brian M. Kurkoski"},{"@pid":"17/5184","text":"Yasuo Tan"}]},"title":"A Design of Overlapped Chunked Code over Compute-and-Forward in Multi-Source Multi-Relay Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NgethLKT18","doi":"10.1109/GLOCOM.2018.8647922","ee":"https://doi.org/10.1109/GLOCOM.2018.8647922","url":"https://dblp.org/rec/conf/globecom/NgethLKT18"}, "url":"URL#2567496" }, { "@score":"1", "@id":"2567497", "info":{"authors":{"author":[{"@pid":"124/5499","text":"Nhan Nguyen-Thanh"},{"@pid":"16/1122","text":"Dana Marinca"},{"@pid":"02/3994","text":"Kinda Khawam"},{"@pid":"05/3990-1","text":"Steven Martin 0001"},{"@pid":"52/7210","text":"Lila Boukhatem"}]},"title":"Multimedia Content Popularity: Learning and Recommending a Prediction Method.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Nguyen-ThanhMKM18","doi":"10.1109/GLOCOM.2018.8647370","ee":"https://doi.org/10.1109/GLOCOM.2018.8647370","url":"https://dblp.org/rec/conf/globecom/Nguyen-ThanhMKM18"}, "url":"URL#2567497" }, { "@score":"1", "@id":"2567498", "info":{"authors":{"author":[{"@pid":"154/3537-1","text":"Tri Minh Nguyen 0001"},{"@pid":"56/4552","text":"Wessam Ajib"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"}]},"title":"A Novel Cooperative NOMA in Wireless Backhaul Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NguyenAA18","doi":"10.1109/GLOCOM.2018.8647442","ee":"https://doi.org/10.1109/GLOCOM.2018.8647442","url":"https://dblp.org/rec/conf/globecom/NguyenAA18"}, "url":"URL#2567498" }, { "@score":"1", "@id":"2567502", "info":{"authors":{"author":[{"@pid":"182/7485","text":"Shanjin Ni"},{"@pid":"96/5668-1","text":"Junhui Zhao 0001"},{"@pid":"87/763","text":"Howard H. Yang"},{"@pid":"65/1128","text":"Tony Q. S. Quek"},{"@pid":"22/231-1","text":"Yi Gong 0001"}]},"title":"Small Cell Range Expansion with Interference Mitigation for Downlink Massive MIMO HetNets.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/NiZYQG18","doi":"10.1109/GLOCOM.2018.8647788","ee":"https://doi.org/10.1109/GLOCOM.2018.8647788","url":"https://dblp.org/rec/conf/globecom/NiZYQG18"}, "url":"URL#2567502" }, { "@score":"1", "@id":"2567503", "info":{"authors":{"author":[{"@pid":"207/1743","text":"Jiangtian Nie"},{"@pid":"174/9863","text":"Zehui Xiong"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"37/1304-1","text":"Ping Wang 0001"},{"@pid":"42/2501-1","text":"Jun Luo 0001"}]},"title":"A Socially-Aware Incentive Mechanism for Mobile Crowdsensing Service Market.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/NieXNWL18","doi":"10.1109/GLOCOM.2018.8647726","ee":"https://doi.org/10.1109/GLOCOM.2018.8647726","url":"https://dblp.org/rec/conf/globecom/NieXNWL18"}, "url":"URL#2567503" }, { "@score":"1", "@id":"2567504", "info":{"authors":{"author":[{"@pid":"161/2005","text":"Koichi Nihei"},{"@pid":"87/3631","text":"Hiroshi Yoshida"},{"@pid":"121/1953","text":"Natsuki Kai"},{"@pid":"02/5339","text":"Kozo Satoda"},{"@pid":"12/6669","text":"Keiichi Chono"}]},"title":"Adaptive Bitrate Control of Scalable Video for Live Video Streaming on Best-Effort Network.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/NiheiYKSC18","doi":"10.1109/GLOCOM.2018.8648000","ee":"https://doi.org/10.1109/GLOCOM.2018.8648000","url":"https://dblp.org/rec/conf/globecom/NiheiYKSC18"}, "url":"URL#2567504" }, { "@score":"1", "@id":"2567505", "info":{"authors":{"author":[{"@pid":"236/3280","text":"Rasoul Nikbakht"},{"@pid":"05/3488","text":"Anders Jonsson 0001"},{"@pid":"84/1348","text":"Angel Lozano"}]},"title":"Dual-Kernel Online Reconstruction of Power Maps.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NikbakhtJL18","doi":"10.1109/GLOCOM.2018.8647510","ee":"https://doi.org/10.1109/GLOCOM.2018.8647510","url":"https://dblp.org/rec/conf/globecom/NikbakhtJL18"}, "url":"URL#2567505" }, { "@score":"1", "@id":"2567506", "info":{"authors":{"author":[{"@pid":"166/6562","text":"Ahmad Nimr"},{"@pid":"152/4925","text":"Marwa Chafii"},{"@pid":"150/6367","text":"Maximilian Matthé"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"Extended GFDM Framework: OTFS and GFDM Comparison.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NimrCMF18","doi":"10.1109/GLOCOM.2018.8647704","ee":"https://doi.org/10.1109/GLOCOM.2018.8647704","url":"https://dblp.org/rec/conf/globecom/NimrCMF18"}, "url":"URL#2567506" }, { "@score":"1", "@id":"2567507", "info":{"authors":{"author":[{"@pid":"211/3618","text":"Boyu Ning"},{"@pid":"05/1539-2","text":"Zhi Chen 0002"},{"@pid":"120/7361","text":"Lingxiang Li"},{"@pid":"236/3014","text":"Wenrong Chen"}]},"title":"Optimal Beam Steering Design for Large-Scale mmWave MIMO Wiretap Channel.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NingCLC18","doi":"10.1109/GLOCOM.2018.8647769","ee":"https://doi.org/10.1109/GLOCOM.2018.8647769","url":"https://dblp.org/rec/conf/globecom/NingCLC18"}, "url":"URL#2567507" }, { "@score":"1", "@id":"2567508", "info":{"authors":{"author":[{"@pid":"159/1239","text":"Kyoomars Alizadeh Noghani"},{"@pid":"120/8873","text":"Hakim Ghazzai"},{"@pid":"k/AndreasKassler","text":"Andreas Kassler"}]},"title":"A Generic Framework for Task Offloading in mmWave MEC Backhaul Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NoghaniGK18","doi":"10.1109/GLOCOM.2018.8647559","ee":"https://doi.org/10.1109/GLOCOM.2018.8647559","url":"https://dblp.org/rec/conf/globecom/NoghaniGK18"}, "url":"URL#2567508" }, { "@score":"1", "@id":"2567509", "info":{"authors":{"author":[{"@pid":"205/9448","text":"Jannatun Noor"},{"@pid":"236/3137","text":"Md. Golam Hossain"},{"@pid":"236/2969","text":"Muhammad Ahad Alam"},{"@pid":"97/907-3","text":"Ashraf Uddin 0003"},{"@pid":"76/6786","text":"Sriram Chellappan"},{"@pid":"20/9660","text":"A. B. M. Alim Al Islam"}]},"title":"svLoad: An Automated Test-Driven Architecture for Load Testing in Cloud Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NoorHAUCI18","doi":"10.1109/GLOCOM.2018.8647493","ee":"https://doi.org/10.1109/GLOCOM.2018.8647493","url":"https://dblp.org/rec/conf/globecom/NoorHAUCI18"}, "url":"URL#2567509" }, { "@score":"1", "@id":"2567510", "info":{"authors":{"author":[{"@pid":"213/0864","text":"Mohammad Reza Nosouhi"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"00/10437","text":"Marthie Grobler"},{"@pid":"98/2912-1","text":"Yong Xiang 0001"},{"@pid":"62/9980","text":"Zuqing Zhu"}]},"title":"SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/NosouhiYGXZ18","doi":"10.1109/GLOCOM.2018.8647933","ee":"https://doi.org/10.1109/GLOCOM.2018.8647933","url":"https://dblp.org/rec/conf/globecom/NosouhiYGXZ18"}, "url":"URL#2567510" }, { "@score":"1", "@id":"2567511", "info":{"authors":{"author":[{"@pid":"201/1271","text":"Boubakr Nour"},{"@pid":"54/7398","text":"Kashif Sharif"},{"@pid":"73/237-1","text":"Fan Li 0001"},{"@pid":"43/5060","text":"Hassine Moungla"},{"@pid":"94/5698","text":"Ahmed E. Kamal 0001"},{"@pid":"93/6277","text":"Hossam Afifi"}]},"title":"NCP: A near ICN Cache Placement Scheme for IoT-Based Traffic Class.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NourSLMKA18","doi":"10.1109/GLOCOM.2018.8647629","ee":"https://doi.org/10.1109/GLOCOM.2018.8647629","url":"https://dblp.org/rec/conf/globecom/NourSLMKA18"}, "url":"URL#2567511" }, { "@score":"1", "@id":"2567513", "info":{"authors":{"author":[{"@pid":"221/4938","text":"Than Than Nu"},{"@pid":"119/0353","text":"Takuya Fujihashi"},{"@pid":"64/6874","text":"Takashi Watanabe 0001"}]},"title":"Power-Efficient Video Uploading for Crowdsourced Multi-View Video Streaming.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/NuFW18","doi":"10.1109/GLOCOM.2018.8647244","ee":"https://doi.org/10.1109/GLOCOM.2018.8647244","url":"https://dblp.org/rec/conf/globecom/NuFW18"}, "url":"URL#2567513" }, { "@score":"1", "@id":"2567514", "info":{"authors":{"author":[{"@pid":"185/7020","text":"Mohanad Obeed"},{"@pid":"19/4604","text":"Hayssam Dahrouj"},{"@pid":"119/2416","text":"Anas M. Salhab"},{"@pid":"87/3320","text":"Salam A. Zummo"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"DC-Bias Allocation in Cooperative VLC Networks via Joint Information and Energy Transfer.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ObeedDSZA18","doi":"10.1109/GLOCOM.2018.8647944","ee":"https://doi.org/10.1109/GLOCOM.2018.8647944","url":"https://dblp.org/rec/conf/globecom/ObeedDSZA18"}, "url":"URL#2567514" }, { "@score":"1", "@id":"2567515", "info":{"authors":{"author":[{"@pid":"132/0039","text":"Tamoghna Ojha"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"158/5242","text":"Narendra Singh Raghuwanshi"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"iDVSP: Intelligent Dynamic Virtual Sensor Provisioning in Sensor-Cloud Infrastructure.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/OjhaMRO18","doi":"10.1109/GLOCOM.2018.8647815","ee":"https://doi.org/10.1109/GLOCOM.2018.8647815","url":"https://dblp.org/rec/conf/globecom/OjhaMRO18"}, "url":"URL#2567515" }, { "@score":"1", "@id":"2567516", "info":{"authors":{"author":[{"@pid":"02/4576","text":"Yutaka Okaie"},{"@pid":"213/4705","text":"Shinya Ishiyama"},{"@pid":"40/2808","text":"Takahiro Hara"}]},"title":"Leader-Follower-Amplifier Based Mobile Molecular Communication Systems for Cooperative Drug Delivery.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/OkaieIH18","doi":"10.1109/GLOCOM.2018.8647185","ee":"https://doi.org/10.1109/GLOCOM.2018.8647185","url":"https://dblp.org/rec/conf/globecom/OkaieIH18"}, "url":"URL#2567516" }, { "@score":"1", "@id":"2567518", "info":{"authors":{"author":[{"@pid":"203/9316","text":"Sihem Ouahouah"},{"@pid":"133/4986","text":"Jonathan Prados-Garzon"},{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"62/2209","text":"Chafika Benzaid"}]},"title":"Energy and Delay Aware Physical Collision Avoidance in Unmanned Aerial Vehicles.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/OuahouahPTB18","doi":"10.1109/GLOCOM.2018.8647223","ee":"https://doi.org/10.1109/GLOCOM.2018.8647223","url":"https://dblp.org/rec/conf/globecom/OuahouahPTB18"}, "url":"URL#2567518" }, { "@score":"1", "@id":"2567519", "info":{"authors":{"author":[{"@pid":"236/2790","text":"Mert Ozates"},{"@pid":"d/TolgaMDuman","text":"Tolga M. Duman"}]},"title":"Channel Coding for Energy Harvesting Communications Using Run Length Limited Codes.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/OzatesD18","doi":"10.1109/GLOCOM.2018.8647264","ee":"https://doi.org/10.1109/GLOCOM.2018.8647264","url":"https://dblp.org/rec/conf/globecom/OzatesD18"}, "url":"URL#2567519" }, { "@score":"1", "@id":"2567520", "info":{"authors":{"author":[{"@pid":"155/4833","text":"Masayoshi Ozawa"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"},{"@pid":"137/0265","text":"Fereidoun H. Panahi"},{"@pid":"315/0813-2","text":"Wenjie Jiang 0002"},{"@pid":"79/3499","text":"Yasushi Takatori"},{"@pid":"83/1008","text":"Tadao Nakagawa"}]},"title":"A Low-Complexity High-Accuracy AR Based Channel Prediction Method for Interference Alignment.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/OzawaOPJTN18","doi":"10.1109/GLOCOM.2018.8647292","ee":"https://doi.org/10.1109/GLOCOM.2018.8647292","url":"https://dblp.org/rec/conf/globecom/OzawaOPJTN18"}, "url":"URL#2567520" }, { "@score":"1", "@id":"2567522", "info":{"authors":{"author":[{"@pid":"133/3838","text":"Mustafa Özger"},{"@pid":"86/11365","text":"Michal Vondra"},{"@pid":"80/67","text":"Cicek Cavdar"}]},"title":"Towards beyond Visual Line of Sight Piloting of UAVs with Ultra Reliable Low Latency Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/OzgerVC18","doi":"10.1109/GLOCOM.2018.8647652","ee":"https://doi.org/10.1109/GLOCOM.2018.8647652","url":"https://dblp.org/rec/conf/globecom/OzgerVC18"}, "url":"URL#2567522" }, { "@score":"1", "@id":"2567523", "info":{"authors":{"author":[{"@pid":"119/3833","text":"Mustafa Ozmen"},{"@pid":"179/2463","text":"Eamonn Kennedy"},{"@pid":"236/3270","text":"Jacob Rose"},{"@pid":"232/8152","text":"Pratistha Shakya"},{"@pid":"172/1773","text":"Jacob K. Rosenstein"},{"@pid":"18/4387","text":"Christopher Rose"}]},"title":"High Speed Chemical Vapor Communication Using Photoionization Detectors.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/OzmenKRSRR18","doi":"10.1109/GLOCOM.2018.8647736","ee":"https://doi.org/10.1109/GLOCOM.2018.8647736","url":"https://dblp.org/rec/conf/globecom/OzmenKRSRR18"}, "url":"URL#2567523" }, { "@score":"1", "@id":"2567524", "info":{"authors":{"author":[{"@pid":"203/1251","text":"Ayswarya Padmanabhan"},{"@pid":"23/6359","text":"Antti Tölli"}]},"title":"An Iterative Approach for Inter-Group Interference Management in Two-Stage Precoder Design.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/PadmanabhanT18","doi":"10.1109/GLOCOM.2018.8647663","ee":"https://doi.org/10.1109/GLOCOM.2018.8647663","url":"https://dblp.org/rec/conf/globecom/PadmanabhanT18"}, "url":"URL#2567524" }, { "@score":"1", "@id":"2567525", "info":{"authors":{"author":[{"@pid":"143/3913","text":"Milutin Pajovic"},{"@pid":"119/2621","text":"Gozde Ozcan"},{"@pid":"98/3964","text":"Toshiaki Koike-Akino"},{"@pid":"15/4476-4","text":"Pu Wang 0004"},{"@pid":"10/3164","text":"Philip V. Orlik"}]},"title":"Packet Separation in Phase Noise Impaired Random Access Channel.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PajovicOKWO18","doi":"10.1109/GLOCOM.2018.8647403","ee":"https://doi.org/10.1109/GLOCOM.2018.8647403","url":"https://dblp.org/rec/conf/globecom/PajovicOKWO18"}, "url":"URL#2567525" }, { "@score":"1", "@id":"2567526", "info":{"authors":{"author":[{"@pid":"88/7127","text":"Xiao Pang"},{"@pid":"99/76-1","text":"Min Liu 0001"},{"@pid":"20/6301","text":"Zhongcheng Li"},{"@pid":"137/0200","text":"Zhenzhen Jiao"},{"@pid":"99/4923","text":"Sheng Sun"}]},"title":"Trust Function Based Spinal Codes over the Mobile Fading Channel between UAVs.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PangLLJS18","doi":"10.1109/GLOCOM.2018.8647141","ee":"https://doi.org/10.1109/GLOCOM.2018.8647141","url":"https://dblp.org/rec/conf/globecom/PangLLJS18"}, "url":"URL#2567526" }, { "@score":"1", "@id":"2567527", "info":{"authors":{"author":[{"@pid":"236/2798","text":"Arled Papa"},{"@pid":"73/1122","text":"Tomaso de Cola"},{"@pid":"191/2277","text":"Petra Vizarreta"},{"@pid":"192/3618","text":"Mu He"},{"@pid":"m/CarmenMasMachuca","text":"Carmen Mas Machuca"},{"@pid":"32/3203","text":"Wolfgang Kellerer"}]},"title":"Dynamic SDN Controller Placement in a LEO Constellation Satellite Network.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/PapaCVHMK18","doi":"10.1109/GLOCOM.2018.8647843","ee":"https://doi.org/10.1109/GLOCOM.2018.8647843","url":"https://dblp.org/rec/conf/globecom/PapaCVHMK18"}, "url":"URL#2567527" }, { "@score":"1", "@id":"2567528", "info":{"authors":{"author":[{"@pid":"221/0300","text":"Vasilis K. Papanikolaou"},{"@pid":"137/8215","text":"Panagiotis D. Diamantoulakis"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"14/7881","text":"Sami Muhaidat"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"Hybrid VLC/RF Networks with Non-Orthogonal Multiple Access.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PapanikolaouDDM18","doi":"10.1109/GLOCOM.2018.8647397","ee":"https://doi.org/10.1109/GLOCOM.2018.8647397","url":"https://dblp.org/rec/conf/globecom/PapanikolaouDDM18"}, "url":"URL#2567528" }, { "@score":"1", "@id":"2567529", "info":{"authors":{"author":[{"@pid":"136/5609","text":"Jihong Park"},{"@pid":"09/3625","text":"Mehdi Bennis"}]},"title":"URLLC-eMBB Slicing to Support VR Multimodal Perceptions over Wireless Cellular Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ParkB18","doi":"10.1109/GLOCOM.2018.8647208","ee":"https://doi.org/10.1109/GLOCOM.2018.8647208","url":"https://dblp.org/rec/conf/globecom/ParkB18"}, "url":"URL#2567529" }, { "@score":"1", "@id":"2567530", "info":{"authors":{"author":[{"@pid":"72/9851","text":"Jounsup Park"},{"@pid":"c/PhilipAChou","text":"Philip A. Chou"},{"@pid":"78/4381","text":"Jenq-Neng Hwang"}]},"title":"Volumetric Media Streaming for Augmented Reality.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ParkCH18","doi":"10.1109/GLOCOM.2018.8647537","ee":"https://doi.org/10.1109/GLOCOM.2018.8647537","url":"https://dblp.org/rec/conf/globecom/ParkCH18"}, "url":"URL#2567530" }, { "@score":"1", "@id":"2567531", "info":{"authors":{"author":[{"@pid":"72/9851","text":"Jounsup Park"},{"@pid":"78/4381","text":"Jenq-Neng Hwang"},{"@pid":"09/6598","text":"Hung-Yu Wei"}]},"title":"Cross-Layer Optimization for VR Video Multicast Systems.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ParkHW18","doi":"10.1109/GLOCOM.2018.8647389","ee":"https://doi.org/10.1109/GLOCOM.2018.8647389","url":"https://dblp.org/rec/conf/globecom/ParkHW18"}, "url":"URL#2567531" }, { "@score":"1", "@id":"2567532", "info":{"authors":{"author":[{"@pid":"165/5483","text":"Taehyeun Park"},{"@pid":"153/9978","text":"Gilsoo Lee"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Message-Aware Uplink Transmit Power Level Partitioning for Non-Orthogonal Multiple Access (NOMA).","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ParkLS18","doi":"10.1109/GLOCOM.2018.8647935","ee":"https://doi.org/10.1109/GLOCOM.2018.8647935","url":"https://dblp.org/rec/conf/globecom/ParkLS18"}, "url":"URL#2567532" }, { "@score":"1", "@id":"2567533", "info":{"authors":{"author":[{"@pid":"17/3456","text":"Georgios S. Paschos"},{"@pid":"177/7802","text":"Nikolaos Liakopoulos"},{"@pid":"75/4085","text":"Mérouane Debbah"},{"@pid":"89/1218","text":"Tong Wen"}]},"title":"Computational Optimal Transport for 5G Massive C-RAN Device Association.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PaschosLDW18","doi":"10.1109/GLOCOM.2018.8647414","ee":"https://doi.org/10.1109/GLOCOM.2018.8647414","url":"https://dblp.org/rec/conf/globecom/PaschosLDW18"}, "url":"URL#2567533" }, { "@score":"1", "@id":"2567534", "info":{"authors":{"author":[{"@pid":"83/10835","text":"Emmanouil Pateromichelakis"},{"@pid":"46/5685","text":"Konstantinos Samdanis"}]},"title":"Context-Aware Joint Routing & Scheduling for mm-Wave Backhaul / Access Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Pateromichelakis18","doi":"10.1109/GLOCOM.2018.8648046","ee":"https://doi.org/10.1109/GLOCOM.2018.8648046","url":"https://dblp.org/rec/conf/globecom/Pateromichelakis18"}, "url":"URL#2567534" }, { "@score":"1", "@id":"2567536", "info":{"authors":{"author":[{"@pid":"137/6296","text":"Sohail Payami"},{"@pid":"82/5581","text":"Christos Masouros"},{"@pid":"17/1153","text":"Mathini Sellathurai"}]},"title":"Low-Complexity and Robust Quantized Hybrid Beamforming and Channel Estimation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PayamiMS18","doi":"10.1109/GLOCOM.2018.8647690","ee":"https://doi.org/10.1109/GLOCOM.2018.8647690","url":"https://dblp.org/rec/conf/globecom/PayamiMS18"}, "url":"URL#2567536" }, { "@score":"1", "@id":"2567537", "info":{"authors":{"author":[{"@pid":"41/8036","text":"Vincenzo Pellegrini"},{"@pid":"39/7820","text":"Fabio Principe"},{"@pid":"236/2962","text":"Rodolfo Guidi"},{"@pid":"236/3277","text":"Gabriele Scozza"},{"@pid":"236/2847","text":"Giacomo de Mauro"},{"@pid":"236/3361","text":"Riccardo Cioni"}]},"title":"Adding PHY-Layer Crypto to COFDM Radios through a Large Array with Directional Modulation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PellegriniPGSMC18","doi":"10.1109/GLOCOM.2018.8647271","ee":"https://doi.org/10.1109/GLOCOM.2018.8647271","url":"https://dblp.org/rec/conf/globecom/PellegriniPGSMC18"}, "url":"URL#2567537" }, { "@score":"1", "@id":"2567538", "info":{"authors":{"author":[{"@pid":"236/3312","text":"Mateus Pelloso"},{"@pid":"211/9211","text":"Andressa Vergutz"},{"@pid":"85/7266","text":"Aldri Santos"},{"@pid":"22/4022","text":"Michele Nogueira"}]},"title":"A Self-Adaptable System for DDoS Attack Prediction Based on the Metastability Theory.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PellosoVSN18","doi":"10.1109/GLOCOM.2018.8647934","ee":"https://doi.org/10.1109/GLOCOM.2018.8647934","url":"https://dblp.org/rec/conf/globecom/PellosoVSN18"}, "url":"URL#2567538" }, { "@score":"1", "@id":"2567539", "info":{"authors":{"author":[{"@pid":"149/7762-6","text":"Xi Peng 0006"},{"@pid":"10/4008-1","text":"Bo Bai 0001"},{"@pid":"77/6324-1","text":"Gong Zhang 0001"},{"@pid":"80/2095","text":"Yu Lan"},{"@pid":"236/2890","text":"Haofeng Qi"},{"@pid":"t/DonaldFTowsley","text":"Don Towsley"}]},"title":"Bit-Level Power-Law Queueing Theory with Applications in LTE Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PengBZLQT18","doi":"10.1109/GLOCOM.2018.8647562","ee":"https://doi.org/10.1109/GLOCOM.2018.8647562","url":"https://dblp.org/rec/conf/globecom/PengBZLQT18"}, "url":"URL#2567539" }, { "@score":"1", "@id":"2567542", "info":{"authors":{"author":[{"@pid":"35/10806","text":"Tong Peng"},{"@pid":"17/221-50","text":"Yi Wang 0050"},{"@pid":"98/285","text":"Alister G. Burr"},{"@pid":"25/3612","text":"Mohammad Shikh-Bahaei"}]},"title":"A Physical Layer Network Coding Design for 5G Network MIMO.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/PengWBS18","doi":"10.1109/GLOCOM.2018.8647306","ee":"https://doi.org/10.1109/GLOCOM.2018.8647306","url":"https://dblp.org/rec/conf/globecom/PengWBS18"}, "url":"URL#2567542" }, { "@score":"1", "@id":"2567543", "info":{"authors":{"author":[{"@pid":"226/9349","text":"Mingyao Peng"},{"@pid":"00/2446-1","text":"Jie Zeng 0001"},{"@pid":"54/3643-1","text":"Xin Su 0001"},{"@pid":"39/3711-2","text":"Bei Liu 0002"},{"@pid":"31/5990","text":"Limin Xiao"}]},"title":"Power Allocation in Downlink PDMA Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PengZSLX18","doi":"10.1109/GLOCOM.2018.8647283","ee":"https://doi.org/10.1109/GLOCOM.2018.8647283","url":"https://dblp.org/rec/conf/globecom/PengZSLX18"}, "url":"URL#2567543" }, { "@score":"1", "@id":"2567545", "info":{"authors":{"author":[{"@pid":"144/8284","text":"Chuan Pham"},{"@pid":"214/6671","text":"Duong Tuan Nguyen"},{"@pid":"03/1312","text":"Nguyen Hoang Tran"},{"@pid":"70/3231","text":"Kim Khoa Nguyen"},{"@pid":"69/4317","text":"Mohamed Cheriet"}]},"title":"Dynamic Controller/Switch Mapping in Virtual Networks Service Chains.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PhamNTNC18","doi":"10.1109/GLOCOM.2018.8647798","ee":"https://doi.org/10.1109/GLOCOM.2018.8647798","url":"https://dblp.org/rec/conf/globecom/PhamNTNC18"}, "url":"URL#2567545" }, { "@score":"1", "@id":"2567548", "info":{"authors":{"author":{"@pid":"82/8332","text":"Renaud-Alexandre Pitaval"}},"title":"Time-Frequency Selective MIMO Precoding for OFDM with Insufficient CP.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Pitaval18","doi":"10.1109/GLOCOM.2018.8647533","ee":"https://doi.org/10.1109/GLOCOM.2018.8647533","url":"https://dblp.org/rec/conf/globecom/Pitaval18"}, "url":"URL#2567548" }, { "@score":"1", "@id":"2567549", "info":{"authors":{"author":[{"@pid":"236/2978","text":"Marcelo Pizzutti"},{"@pid":"89/1649","text":"Alberto Egon Schaeffer Filho"}]},"title":"An Efficient Multipath Mechanism Based on the Flowlet Abstraction and P4.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PizzuttiF18","doi":"10.1109/GLOCOM.2018.8647887","ee":"https://doi.org/10.1109/GLOCOM.2018.8647887","url":"https://dblp.org/rec/conf/globecom/PizzuttiF18"}, "url":"URL#2567549" }, { "@score":"1", "@id":"2567550", "info":{"authors":{"author":[{"@pid":"175/1389","text":"Michele Polese"},{"@pid":"176/5178","text":"Marco Giordani"},{"@pid":"88/4138-2","text":"Arnab Roy 0002"},{"@pid":"302/0892","text":"Douglas R. Castor"},{"@pid":"14/2991","text":"Michele Zorzi"}]},"title":"Distributed Path Selection Strategies for Integrated Access and Backhaul at mmWaves.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PoleseGRCZ18","doi":"10.1109/GLOCOM.2018.8647977","ee":"https://doi.org/10.1109/GLOCOM.2018.8647977","url":"https://dblp.org/rec/conf/globecom/PoleseGRCZ18"}, "url":"URL#2567550" }, { "@score":"1", "@id":"2567551", "info":{"authors":{"author":[{"@pid":"215/5103","text":"Nicolas Pontois"},{"@pid":"79/195","text":"Megumi Kaneko"},{"@pid":"215/5276","text":"Thi Ha Ly Dinh"},{"@pid":"52/7210","text":"Lila Boukhatem"}]},"title":"User Pre-Scheduling and Beamforming with Outdated CSI in 5G Fog Radio Access Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PontoisKDB18","doi":"10.1109/GLOCOM.2018.8647539","ee":"https://doi.org/10.1109/GLOCOM.2018.8647539","url":"https://dblp.org/rec/conf/globecom/PontoisKDB18"}, "url":"URL#2567551" }, { "@score":"1", "@id":"2567552", "info":{"authors":{"author":[{"@pid":"154/8270","text":"Giuseppe Portaluri"},{"@pid":"236/3006","text":"Marialaura Tamburello"},{"@pid":"80/6788","text":"Stefano Giordano"}]},"title":"A Novel IoT-Based Architecture for Self-Adaptive Aerodynamic Flow Control System for Motorcycle.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PortaluriTG18","doi":"10.1109/GLOCOM.2018.8648012","ee":"https://doi.org/10.1109/GLOCOM.2018.8648012","url":"https://dblp.org/rec/conf/globecom/PortaluriTG18"}, "url":"URL#2567552" }, { "@score":"1", "@id":"2567553", "info":{"authors":{"author":[{"@pid":"177/2565","text":"Maryam Pouryazdan"},{"@pid":"33/3823","text":"Burak Kantarci"}]},"title":"TA-CROCS: Trustworthiness-Aware Coalitional Recruitment of Crowd-Sensors.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PouryazdanK18","doi":"10.1109/GLOCOM.2018.8648026","ee":"https://doi.org/10.1109/GLOCOM.2018.8648026","url":"https://dblp.org/rec/conf/globecom/PouryazdanK18"}, "url":"URL#2567553" }, { "@score":"1", "@id":"2567554", "info":{"authors":{"author":[{"@pid":"133/4986","text":"Jonathan Prados-Garzon"},{"@pid":"177/5450","text":"Abdelquoddouss Laghrissi"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"09/3053","text":"Tarik Taleb"}]},"title":"A Queuing Based Dynamic Auto Scaling Algorithm for the LTE EPC Control Plane.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Prados-GarzonLB18","doi":"10.1109/GLOCOM.2018.8648023","ee":"https://doi.org/10.1109/GLOCOM.2018.8648023","url":"https://dblp.org/rec/conf/globecom/Prados-GarzonLB18"}, "url":"URL#2567554" }, { "@score":"1", "@id":"2567555", "info":{"authors":{"author":[{"@pid":"223/4445","text":"Shree M. Prasad"},{"@pid":"14/7689","text":"Trilochan Panigrahi"},{"@pid":"10/2899","text":"Mahbub Hassan"}]},"title":"Energy Efficient Event Localization and Classification for Nano IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/PrasadPH18","doi":"10.1109/GLOCOM.2018.8647374","ee":"https://doi.org/10.1109/GLOCOM.2018.8647374","url":"https://dblp.org/rec/conf/globecom/PrasadPH18"}, "url":"URL#2567555" }, { "@score":"1", "@id":"2567557", "info":{"authors":{"author":[{"@pid":"165/3396","text":"Henning Puttnies"},{"@pid":"69/2386","text":"Peter Danielis"},{"@pid":"31/178","text":"Dirk Timmermann"}]},"title":"PTP-LP: Using Linear Programming to Increase the Delay Robustness of IEEE 1588 PTP.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/PuttniesDT18","doi":"10.1109/GLOCOM.2018.8647777","ee":"https://doi.org/10.1109/GLOCOM.2018.8647777","url":"https://dblp.org/rec/conf/globecom/PuttniesDT18"}, "url":"URL#2567557" }, { "@score":"1", "@id":"2567559", "info":{"authors":{"author":[{"@pid":"187/9742","text":"Haoran Qi"},{"@pid":"36/5276-1","text":"Xingjian Zhang 0001"},{"@pid":"33/3099-1","text":"Yue Gao 0001"}]},"title":"Subspace-Aided Low-Complexity Blind Compressive Spectrum Sensing over TV Whitespace.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QiZG18","doi":"10.1109/GLOCOM.2018.8647956","ee":"https://doi.org/10.1109/GLOCOM.2018.8647956","url":"https://dblp.org/rec/conf/globecom/QiZG18"}, "url":"URL#2567559" }, { "@score":"1", "@id":"2567560", "info":{"authors":{"author":[{"@pid":"15/3610","text":"Lei Qian"},{"@pid":"41/2668","text":"Xuefen Chi"},{"@pid":"03/8499","text":"Linlin Zhao"}]},"title":"Hybrid Access Algorithm for eMBB Terminals with Heterogeneous QoS in MPR Aided VLC System.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QianCZ18","doi":"10.1109/GLOCOM.2018.8647841","ee":"https://doi.org/10.1109/GLOCOM.2018.8647841","url":"https://dblp.org/rec/conf/globecom/QianCZ18"}, "url":"URL#2567560" }, { "@score":"1", "@id":"2567561", "info":{"authors":{"author":[{"@pid":"71/944","text":"Jing Qian"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"49/5340-2","text":"Shi Jin 0002"},{"@pid":"12/2499","text":"Ling Xing"},{"@pid":"96/5668-1","text":"Junhui Zhao 0001"}]},"title":"Capacity of Ambient Backscatter Communications with Binary Input and Binary Output Channel.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QianGJXZ18","doi":"10.1109/GLOCOM.2018.8647136","ee":"https://doi.org/10.1109/GLOCOM.2018.8647136","url":"https://dblp.org/rec/conf/globecom/QianGJXZ18"}, "url":"URL#2567561" }, { "@score":"1", "@id":"2567562", "info":{"authors":{"author":[{"@pid":"236/3143","text":"Yihui Qian"},{"@pid":"65/10314","text":"Yutong Liu"},{"@pid":"23/7909","text":"Linghe Kong"},{"@pid":"63/1722","text":"Min-You Wu"},{"@pid":"33/6012","text":"Shahid Mumtaz"}]},"title":"ReFeR: Resource Critical Flow Monitoring in Software-Defined Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QianLKWM18","doi":"10.1109/GLOCOM.2018.8647445","ee":"https://doi.org/10.1109/GLOCOM.2018.8647445","url":"https://dblp.org/rec/conf/globecom/QianLKWM18"}, "url":"URL#2567562" }, { "@score":"1", "@id":"2567563", "info":{"authors":{"author":[{"@pid":"90/11201","text":"Meng Qin"},{"@pid":"78/9558","text":"Jinglei Li"},{"@pid":"23/43","text":"Qinghai Yang"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"61/4074","text":"Kyung Sup Kwak"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Multiple Time-Scale SON Function Coordination in Ultra-Dense Small Cell Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QinLYCKS18","doi":"10.1109/GLOCOM.2018.8647554","ee":"https://doi.org/10.1109/GLOCOM.2018.8647554","url":"https://dblp.org/rec/conf/globecom/QinLYCKS18"}, "url":"URL#2567563" }, { "@score":"1", "@id":"2567564", "info":{"authors":{"author":[{"@pid":"90/11201","text":"Meng Qin"},{"@pid":"78/9558","text":"Jinglei Li"},{"@pid":"23/43","text":"Qinghai Yang"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"61/4074","text":"Kyung Sup Kwak"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Self-Organized Energy Management in Energy Harvesting Small Cell Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QinLYCKS18a","doi":"10.1109/GLOCOM.2018.8647780","ee":"https://doi.org/10.1109/GLOCOM.2018.8647780","url":"https://dblp.org/rec/conf/globecom/QinLYCKS18a"}, "url":"URL#2567564" }, { "@score":"1", "@id":"2567566", "info":{"authors":{"author":[{"@pid":"13/4737-1","text":"Min Qiu 0001"},{"@pid":"77/68","text":"Yu-Chih Huang"},{"@pid":"50/567","text":"Jinhong Yuan"},{"@pid":"13/1187","text":"Chin-Liang Wang"}]},"title":"Downlink Lattice-Partition-Based Non-Orthogonal Multiple Access without SIC for Slow Fading Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QiuHYW18","doi":"10.1109/GLOCOM.2018.8647840","ee":"https://doi.org/10.1109/GLOCOM.2018.8647840","url":"https://dblp.org/rec/conf/globecom/QiuHYW18"}, "url":"URL#2567566" }, { "@score":"1", "@id":"2567567", "info":{"authors":{"author":[{"@pid":"16/1041-4","text":"Yue Qiu 0004"},{"@pid":"74/1079","text":"Maode Ma"}]},"title":"A Privacy-Preserving Proximity Testing for Location-Based Services.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QiuM18","doi":"10.1109/GLOCOM.2018.8647604","ee":"https://doi.org/10.1109/GLOCOM.2018.8647604","url":"https://dblp.org/rec/conf/globecom/QiuM18"}, "url":"URL#2567567" }, { "@score":"1", "@id":"2567569", "info":{"authors":{"author":[{"@pid":"192/6131","text":"Youyang Qu"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"92/2939","text":"Wanlei Zhou 0001"},{"@pid":"25/4653-2","text":"Jianwei Niu 0002"}]},"title":"FBI: Friendship Learning-Based User Identification in Multiple Social Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/QuYZN18","doi":"10.1109/GLOCOM.2018.8647771","ee":"https://doi.org/10.1109/GLOCOM.2018.8647771","url":"https://dblp.org/rec/conf/globecom/QuYZN18"}, "url":"URL#2567569" }, { "@score":"1", "@id":"2567570", "info":{"authors":{"author":[{"@pid":"204/1614","text":"Nawab Muhammad Faseeh Qureshi"},{"@pid":"55/3719","text":"Ali Kashif Bashir"},{"@pid":"199/0193","text":"Isma Farah Siddiqui"},{"@pid":"131/2566","text":"Asad Abbas"},{"@pid":"37/5748","text":"Kee-Hyun Choi"},{"@pid":"27/2707","text":"Dong Ryeol Shin"}]},"title":"A Knowledge-Based Path Optimization Technique for Cognitive Nodes in Smart Grid.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/QureshiBSACS18","doi":"10.1109/GLOCOM.2018.8648016","ee":"https://doi.org/10.1109/GLOCOM.2018.8648016","url":"https://dblp.org/rec/conf/globecom/QureshiBSACS18"}, "url":"URL#2567570" }, { "@score":"1", "@id":"2567574", "info":{"authors":{"author":[{"@pid":"147/5144","text":"Nadhir Ben Rached"},{"@pid":"52/6564","text":"Abla Kammoun"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"},{"@pid":"46/9298","text":"Raúl Tempone"}]},"title":"Accurate Outage Probability Evaluation of Equal Gain Combining Receivers.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/RachedKAT18","doi":"10.1109/GLOCOM.2018.8647776","ee":"https://doi.org/10.1109/GLOCOM.2018.8647776","url":"https://dblp.org/rec/conf/globecom/RachedKAT18"}, "url":"URL#2567574" }, { "@score":"1", "@id":"2567576", "info":{"authors":{"author":[{"@pid":"216/2668","text":"Muhammed T. Rahman"},{"@pid":"74/9205","text":"Navid Tadayon"},{"@pid":"20/7794-6","text":"Shuo Han 0006"},{"@pid":"82/3084","text":"Shahrokh Valaee"}]},"title":"LocHunt: Angle of Arrival Based Location Estimation in Harsh Multipath Environments.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RahmanTHV18","doi":"10.1109/GLOCOM.2018.8647870","ee":"https://doi.org/10.1109/GLOCOM.2018.8647870","url":"https://dblp.org/rec/conf/globecom/RahmanTHV18"}, "url":"URL#2567576" }, { "@score":"1", "@id":"2567577", "info":{"authors":{"author":[{"@pid":"220/3073","text":"M. Kollengode Ramachandran"},{"@pid":"65/6366","text":"A. Chockalingam"}]},"title":"MIMO-OTFS in High-Doppler Fading Channels: Signal Detection and Channel Estimation.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/RamachandranC18","doi":"10.1109/GLOCOM.2018.8647394","ee":"https://doi.org/10.1109/GLOCOM.2018.8647394","url":"https://dblp.org/rec/conf/globecom/RamachandranC18"}, "url":"URL#2567577" }, { "@score":"1", "@id":"2567578", "info":{"authors":{"author":[{"@pid":"229/9011","text":"Vidhya Ramani"},{"@pid":"144/7177","text":"Tanesh Kumar"},{"@pid":"10/3184","text":"An Braeken"},{"@pid":"123/9171","text":"Madhusanka Liyanage"},{"@pid":"34/76","text":"Mika Ylianttila"}]},"title":"Secure and Efficient Data Accessibility in Blockchain Based Healthcare Systems.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/RamaniKBLY18","doi":"10.1109/GLOCOM.2018.8647221","ee":"https://doi.org/10.1109/GLOCOM.2018.8647221","url":"https://dblp.org/rec/conf/globecom/RamaniKBLY18"}, "url":"URL#2567578" }, { "@score":"1", "@id":"2567579", "info":{"authors":{"author":[{"@pid":"154/6782","text":"Itsikiantsoa Randrianantenaina"},{"@pid":"79/195","text":"Megumi Kaneko"},{"@pid":"19/4604","text":"Hayssam Dahrouj"},{"@pid":"18/10799","text":"Hesham ElSawy"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Joint Scheduling and Power Adaptation in NOMA-Based Fog-Radio Access Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Randrianantenaina18","doi":"10.1109/GLOCOM.2018.8647893","ee":"https://doi.org/10.1109/GLOCOM.2018.8647893","url":"https://dblp.org/rec/conf/globecom/Randrianantenaina18"}, "url":"URL#2567579" }, { "@score":"1", "@id":"2567581", "info":{"authors":{"author":[{"@pid":"165/2103","text":"Nihesh Rathod"},{"@pid":"76/10719","text":"Renu Subramanian"},{"@pid":"82/2194","text":"Rajesh Sundaresan"}]},"title":"Data-Driven and GIS-Based Coverage Estimation in a Heterogeneous Propagation Environment.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RathodSS18","doi":"10.1109/GLOCOM.2018.8647473","ee":"https://doi.org/10.1109/GLOCOM.2018.8647473","url":"https://dblp.org/rec/conf/globecom/RathodSS18"}, "url":"URL#2567581" }, { "@score":"1", "@id":"2567582", "info":{"authors":{"author":[{"@pid":"167/9202","text":"Vishnu V. Ratnam"},{"@pid":"54/2683","text":"Andreas F. Molisch"}]},"title":"Multi-Antenna FSR Receivers: Low Complexity, Non-Coherent, Massive Antenna Receivers.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RatnamM18","doi":"10.1109/GLOCOM.2018.8647339","ee":"https://doi.org/10.1109/GLOCOM.2018.8647339","url":"https://dblp.org/rec/conf/globecom/RatnamM18"}, "url":"URL#2567582" }, { "@score":"1", "@id":"2567584", "info":{"authors":{"author":[{"@pid":"176/5566","text":"Mattia Rebato"},{"@pid":"175/1389","text":"Michele Polese"},{"@pid":"14/2991","text":"Michele Zorzi"}]},"title":"Multi-Sector and Multi-Panel Performance in 5G mmWave Cellular Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RebatoPZ18","doi":"10.1109/GLOCOM.2018.8647528","ee":"https://doi.org/10.1109/GLOCOM.2018.8647528","url":"https://dblp.org/rec/conf/globecom/RebatoPZ18"}, "url":"URL#2567584" }, { "@score":"1", "@id":"2567586", "info":{"authors":{"author":[{"@pid":"236/2841","text":"Rene Hernandez Remedios"},{"@pid":"00/6922","text":"Amiya Nayak"}]},"title":"On Improving Measurement Accuracy of DREAM Framework with Estimation Filters.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/RemediosN18","doi":"10.1109/GLOCOM.2018.8648080","ee":"https://doi.org/10.1109/GLOCOM.2018.8648080","url":"https://dblp.org/rec/conf/globecom/RemediosN18"}, "url":"URL#2567586" }, { "@score":"1", "@id":"2567587", "info":{"authors":{"author":[{"@pid":"02/5283","text":"Hao Ren"},{"@pid":"150/5699","text":"Zixiong Wang"},{"@pid":"122/5557","text":"Shiying Han"},{"@pid":"49/6002-26","text":"Jian Chen 0026"},{"@pid":"00/2225","text":"Changyuan Yu"},{"@pid":"79/1442","text":"Chao Xu"},{"@pid":"181/8418","text":"Jinlong Yu"}]},"title":"Performance Improvement of M-QAM OFDM-NOMA Visible Light Communication Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RenWHCYXY18","doi":"10.1109/GLOCOM.2018.8648084","ee":"https://doi.org/10.1109/GLOCOM.2018.8648084","url":"https://dblp.org/rec/conf/globecom/RenWHCYXY18"}, "url":"URL#2567587" }, { "@score":"1", "@id":"2567589", "info":{"authors":{"author":[{"@pid":"28/8328","text":"Arman Rezaee"},{"@pid":"84/510","text":"Vincent W. S. Chan"}]},"title":"Cognitive Network Management and Control with Significantly Reduced State Sensing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RezaeeC18","doi":"10.1109/GLOCOM.2018.8648066","ee":"https://doi.org/10.1109/GLOCOM.2018.8648066","url":"https://dblp.org/rec/conf/globecom/RezaeeC18"}, "url":"URL#2567589" }, { "@score":"1", "@id":"2567590", "info":{"authors":{"author":[{"@pid":"178/7893","text":"Roohollah Rezaei"},{"@pid":"153/1967","text":"Mohammad Movahednasab"},{"@pid":"122/5759","text":"Naeimeh Omidvar"},{"@pid":"59/1337","text":"Mohammad Reza Pakravan"}]},"title":"Optimal and Near-Optimal Policies for Wireless Power Transfer Considering Fairness.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RezaeiMOP18","doi":"10.1109/GLOCOM.2018.8648052","ee":"https://doi.org/10.1109/GLOCOM.2018.8648052","url":"https://dblp.org/rec/conf/globecom/RezaeiMOP18"}, "url":"URL#2567590" }, { "@score":"1", "@id":"2567591", "info":{"authors":{"author":[{"@pid":"236/2953","text":"Amjad Riaz"},{"@pid":"17/1156","text":"Sajid Saleem"},{"@pid":"29/7910","text":"Syed Ali Hassan 0001"}]},"title":"Energy Efficient Neighbor Discovery for mmWave D2D Networks Using Polya's Necklaces.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RiazSH18","doi":"10.1109/GLOCOM.2018.8647419","ee":"https://doi.org/10.1109/GLOCOM.2018.8647419","url":"https://dblp.org/rec/conf/globecom/RiazSH18"}, "url":"URL#2567591" }, { "@score":"1", "@id":"2567594", "info":{"authors":{"author":[{"@pid":"196/2929","text":"Javier Rodríguez-Fernández"},{"@pid":"76/6287","text":"Nuria González Prelcic"}]},"title":"Channel Estimation for Frequency-Selective mmWave MIMO Systems with Beam-Squint.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Rodriguez-Fernandez18","doi":"10.1109/GLOCOM.2018.8647269","ee":"https://doi.org/10.1109/GLOCOM.2018.8647269","url":"https://dblp.org/rec/conf/globecom/Rodriguez-Fernandez18"}, "url":"URL#2567594" }, { "@score":"1", "@id":"2567595", "info":{"authors":{"author":[{"@pid":"175/6234","text":"Rakibul Islam Rony"},{"@pid":"66/5997","text":"Elena López-Aguilera"},{"@pid":"65/1234","text":"Eduard Garcia Villegas"}]},"title":"Optimization of 5G Fronthaul Based on Functional Splitting at PHY Layer.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RonyLV18","doi":"10.1109/GLOCOM.2018.8647928","ee":"https://doi.org/10.1109/GLOCOM.2018.8647928","url":"https://dblp.org/rec/conf/globecom/RonyLV18"}, "url":"URL#2567595" }, { "@score":"1", "@id":"2567597", "info":{"authors":{"author":[{"@pid":"67/11359","text":"Soheil Rostami"},{"@pid":"128/2448","text":"Kari Heiska"},{"@pid":"155/5326","text":"Oleksandr Puchko"},{"@pid":"66/11067","text":"Jukka Talvitie"},{"@pid":"50/6391","text":"Kari Leppänen"},{"@pid":"89/6586","text":"Mikko Valkama"}]},"title":"Novel Wake-Up Signaling for Enhanced Energy-Efficiency of 5G and beyond Mobile Devices.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RostamiHPTLV18","doi":"10.1109/GLOCOM.2018.8648062","ee":"https://doi.org/10.1109/GLOCOM.2018.8648062","url":"https://dblp.org/rec/conf/globecom/RostamiHPTLV18"}, "url":"URL#2567597" }, { "@score":"1", "@id":"2567598", "info":{"authors":{"author":[{"@pid":"211/9025","text":"Imane Rouam"},{"@pid":"28/8817","text":"Khalil Ibrahimi"},{"@pid":"75/178","text":"Jalel Ben-Othman"}]},"title":"Game Model for Dynamic Cell Association of Macro-User in Two-Tier Cellular Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/RouamIB18","doi":"10.1109/GLOCOM.2018.8647362","ee":"https://doi.org/10.1109/GLOCOM.2018.8647362","url":"https://dblp.org/rec/conf/globecom/RouamIB18"}, "url":"URL#2567598" }, { "@score":"1", "@id":"2567600", "info":{"authors":{"author":[{"@pid":"222/5598","text":"Niloy Saha"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"71/8917","text":"Samaresh Bera"}]},"title":"QoS-Aware Adaptive Flow-Rule Aggregation in Software-Defined IoT.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SahaMB18","doi":"10.1109/GLOCOM.2018.8647471","ee":"https://doi.org/10.1109/GLOCOM.2018.8647471","url":"https://dblp.org/rec/conf/globecom/SahaMB18"}, "url":"URL#2567600" }, { "@score":"1", "@id":"2567602", "info":{"authors":{"author":[{"@pid":"31/10585","text":"Alphan Sahin"},{"@pid":"92/1942-1","text":"Rui Yang 0001"}]},"title":"Sequence-Based OOK for Orthogonal Multiplexing of Wake-Up Radio Signals and OFDM Waveforms.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SahinY18","doi":"10.1109/GLOCOM.2018.8647401","ee":"https://doi.org/10.1109/GLOCOM.2018.8647401","url":"https://dblp.org/rec/conf/globecom/SahinY18"}, "url":"URL#2567602" }, { "@score":"1", "@id":"2567605", "info":{"authors":{"author":[{"@pid":"166/9491","text":"Hadi Saki"},{"@pid":"35/10806","text":"Tong Peng"},{"@pid":"25/3612","text":"Mohammad Shikh-Bahaei"}]},"title":"Energy Efficient Delay Sensitive Optimization in SWIPT-MIMO.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SakiPS18","doi":"10.1109/GLOCOM.2018.8647672","ee":"https://doi.org/10.1109/GLOCOM.2018.8647672","url":"https://dblp.org/rec/conf/globecom/SakiPS18"}, "url":"URL#2567605" }, { "@score":"1", "@id":"2567606", "info":{"authors":{"author":[{"@pid":"195/3074","text":"Tasneem Salah"},{"@pid":"209/9054","text":"Haya Hasan"},{"@pid":"84/6806","text":"M. Jamal Zemerly"},{"@pid":"21/6026","text":"Chan Yeob Yeun"},{"@pid":"83/2935","text":"Mahmoud Al-Qutayri"},{"@pid":"49/1994","text":"Yousof Al-Hammadi"},{"@pid":"99/5144","text":"Jiankun Hu"}]},"title":"Secure Autonomous Mobile Agents for Web Services.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SalahHZYAAH18","doi":"10.1109/GLOCOM.2018.8647435","ee":"https://doi.org/10.1109/GLOCOM.2018.8647435","url":"https://dblp.org/rec/conf/globecom/SalahHZYAAH18"}, "url":"URL#2567606" }, { "@score":"1", "@id":"2567607", "info":{"authors":{"author":[{"@pid":"236/2896","text":"Farah Salah"},{"@pid":"77/971","text":"Mika Rinne"}]},"title":"Performance Analysis of User Plane Connectivity in the 5G Non-Standalone Deployment.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SalahR18","doi":"10.1109/GLOCOM.2018.8647939","ee":"https://doi.org/10.1109/GLOCOM.2018.8647939","url":"https://dblp.org/rec/conf/globecom/SalahR18"}, "url":"URL#2567607" }, { "@score":"1", "@id":"2567608", "info":{"authors":{"author":[{"@pid":"184/6118","text":"Umber Saleem"},{"@pid":"97/2274-16","text":"Yu Liu 0016"},{"@pid":"00/10615","text":"Sobia Jangsher"},{"@pid":"93/2334-8","text":"Yong Li 0008"}]},"title":"Performance Guaranteed Partial Offloading for Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SaleemLJL18","doi":"10.1109/GLOCOM.2018.8647301","ee":"https://doi.org/10.1109/GLOCOM.2018.8647301","url":"https://dblp.org/rec/conf/globecom/SaleemLJL18"}, "url":"URL#2567608" }, { "@score":"1", "@id":"2567609", "info":{"authors":{"author":[{"@pid":"13/8823","text":"Sadaf Salehkalaibar"},{"@pid":"78/1851","text":"Michèle A. Wigger"}]},"title":"Distributed Hypothesis Testing Over Multi-Access Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SalehkalaibarW18","doi":"10.1109/GLOCOM.2018.8647744","ee":"https://doi.org/10.1109/GLOCOM.2018.8647744","url":"https://dblp.org/rec/conf/globecom/SalehkalaibarW18"}, "url":"URL#2567609" }, { "@score":"1", "@id":"2567610", "info":{"authors":{"author":[{"@pid":"198/1186","text":"Hazem Sallouha"},{"@pid":"176/8071","text":"Mohammad Mahdi Azari 0001"},{"@pid":"72/4438","text":"Sofie Pollin"}]},"title":"Energy-Constrained UAV Trajectory Design for Ground Node Localization.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SallouhaAP18","doi":"10.1109/GLOCOM.2018.8647530","ee":"https://doi.org/10.1109/GLOCOM.2018.8647530","url":"https://dblp.org/rec/conf/globecom/SallouhaAP18"}, "url":"URL#2567610" }, { "@score":"1", "@id":"2567611", "info":{"authors":{"author":[{"@pid":"167/9231","text":"Amit Samanta 0001"},{"@pid":"54/2780-1","text":"Zheng Chang 0001"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Latency-Oblivious Distributed Task Scheduling for Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SamantaCH18","doi":"10.1109/GLOCOM.2018.8647673","ee":"https://doi.org/10.1109/GLOCOM.2018.8647673","url":"https://dblp.org/rec/conf/globecom/SamantaCH18"}, "url":"URL#2567611" }, { "@score":"1", "@id":"2567612", "info":{"authors":{"author":[{"@pid":"117/5426","text":"Sumudu Samarakoon"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"41/6237","text":"Walid Saad"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Federated Learning for Ultra-Reliable Low-Latency V2V Communications.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SamarakoonBSD18","doi":"10.1109/GLOCOM.2018.8647927","ee":"https://doi.org/10.1109/GLOCOM.2018.8647927","url":"https://dblp.org/rec/conf/globecom/SamarakoonBSD18"}, "url":"URL#2567612" }, { "@score":"1", "@id":"2567613", "info":{"authors":{"author":[{"@pid":"117/3472","text":"Luis Sanabria-Russo"},{"@pid":"12/395","text":"Jesus Alonso-Zarate"},{"@pid":"18/466","text":"Christos V. Verikoukis"}]},"title":"SDN-Based Pro-Active Flow Installation Mechanism for Delay Reduction in IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Sanabria-RussoA18","doi":"10.1109/GLOCOM.2018.8647382","ee":"https://doi.org/10.1109/GLOCOM.2018.8647382","url":"https://dblp.org/rec/conf/globecom/Sanabria-RussoA18"}, "url":"URL#2567613" }, { "@score":"1", "@id":"2567614", "info":{"authors":{"author":[{"@pid":"43/10100","text":"Tachporn Sanguanpuak"},{"@pid":"05/8967","text":"Sudarshan Guruacharya"},{"@pid":"r/RMAPRajatheva","text":"Nandana Rajatheva"},{"@pid":"18/6638","text":"Matti Latva-aho"}]},"title":"Edge Caching for Cache Intensity under Probabilistic Delay Constraint.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SanguanpuakGRL18","doi":"10.1109/GLOCOM.2018.8647612","ee":"https://doi.org/10.1109/GLOCOM.2018.8647612","url":"https://dblp.org/rec/conf/globecom/SanguanpuakGRL18"}, "url":"URL#2567614" }, { "@score":"1", "@id":"2567615", "info":{"authors":{"author":[{"@pid":"48/1437","text":"Luca Sanguinetti"},{"@pid":"67/1658","text":"Emil Björnson"},{"@pid":"19/4592","text":"Jakob Hoydis"}]},"title":"Fundamental Asymptotic Behavior of (Two-User) Distributed Massive MIMO.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SanguinettiBH18","doi":"10.1109/GLOCOM.2018.8647938","ee":"https://doi.org/10.1109/GLOCOM.2018.8647938","url":"https://dblp.org/rec/conf/globecom/SanguinettiBH18"}, "url":"URL#2567615" }, { "@score":"1", "@id":"2567616", "info":{"authors":{"author":[{"@pid":"85/2621-4","text":"Ricardo Santos 0004"},{"@pid":"120/8873","text":"Hakim Ghazzai"},{"@pid":"k/AndreasKassler","text":"Andreas Kassler"}]},"title":"Optimal Steerable mmWave Mesh Backhaul Reconfiguration.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SantosGK18","doi":"10.1109/GLOCOM.2018.8647747","ee":"https://doi.org/10.1109/GLOCOM.2018.8647747","url":"https://dblp.org/rec/conf/globecom/SantosGK18"}, "url":"URL#2567616" }, { "@score":"1", "@id":"2567617", "info":{"authors":{"author":[{"@pid":"236/2827","text":"Gabriel B. Dos Santos"},{"@pid":"126/6814","text":"Fernando Antonio Mota Trinta"},{"@pid":"67/10788","text":"Paulo A. L. Rego"},{"@pid":"165/3596","text":"Francisco Airton Silva"},{"@pid":"02/4334","text":"José Neuman de Souza"}]},"title":"Performance and Energy Consumption Evaluation of Computation Offloading Using CAOS D2D.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SantosTRSS18","doi":"10.1109/GLOCOM.2018.8647732","ee":"https://doi.org/10.1109/GLOCOM.2018.8647732","url":"https://dblp.org/rec/conf/globecom/SantosTRSS18"}, "url":"URL#2567617" }, { "@score":"1", "@id":"2567618", "info":{"authors":{"author":[{"@pid":"164/6484","text":"Muris Sarajlic"},{"@pid":"10/6178-2","text":"Liang Liu 0002"},{"@pid":"14/875","text":"Fredrik Rusek"},{"@pid":"28/6610","text":"Farhana Sheikh"},{"@pid":"54/2477","text":"Ove Edfors"}]},"title":"Impact of Relay Cooperation on the Performance of Large-Scale Multipair Two-Way Relay Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SarajlicLRSE18","doi":"10.1109/GLOCOM.2018.8647760","ee":"https://doi.org/10.1109/GLOCOM.2018.8647760","url":"https://dblp.org/rec/conf/globecom/SarajlicLRSE18"}, "url":"URL#2567618" }, { "@score":"1", "@id":"2567619", "info":{"authors":{"author":[{"@pid":"158/1553","text":"Elham Sarbazi"},{"@pid":"52/4739","text":"Majid Safari"},{"@pid":"12/2168","text":"Harald Haas"}]},"title":"The Impact of Long Dead Time on the Photocount Distribution of SPAD Receivers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SarbaziSH18","doi":"10.1109/GLOCOM.2018.8647814","ee":"https://doi.org/10.1109/GLOCOM.2018.8647814","url":"https://dblp.org/rec/conf/globecom/SarbaziSH18"}, "url":"URL#2567619" }, { "@score":"1", "@id":"2567620", "info":{"authors":{"author":[{"@pid":"38/4941","text":"Hirofumi Sasaki"},{"@pid":"52/8975","text":"Doohwan Lee"},{"@pid":"168/8495","text":"Hiroyuki Fukumoto"},{"@pid":"223/8074","text":"Yasunori Yagi"},{"@pid":"45/225","text":"Takana Kaho"},{"@pid":"92/5139","text":"Hiroyuki Shiba"},{"@pid":"45/513","text":"Takashi Shimizu"}]},"title":"Experiment on Over-100-Gbps Wireless Transmission with OAM-MIMO Multiplexing System in 28-GHz Band.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SasakiLFYKSS18","doi":"10.1109/GLOCOM.2018.8647361","ee":"https://doi.org/10.1109/GLOCOM.2018.8647361","url":"https://dblp.org/rec/conf/globecom/SasakiLFYKSS18"}, "url":"URL#2567620" }, { "@score":"1", "@id":"2567621", "info":{"authors":{"author":[{"@pid":"214/4867","text":"Ryota Sasazawa"},{"@pid":"115/6386","text":"Yuichi Kawamoto"},{"@pid":"04/5689","text":"Hiroki Nishiyama 0001"},{"@pid":"19/3059","text":"Nei Kato"},{"@pid":"24/1090","text":"Fumie Ono"},{"@pid":"48/3054","text":"Ryu Miura"}]},"title":"Multilayer Virtual-Cell-Based Resource Allocation in Unmanned Aircraft Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SasazawaKNKOM18","doi":"10.1109/GLOCOM.2018.8648085","ee":"https://doi.org/10.1109/GLOCOM.2018.8648085","url":"https://dblp.org/rec/conf/globecom/SasazawaKNKOM18"}, "url":"URL#2567621" }, { "@score":"1", "@id":"2567622", "info":{"authors":{"author":[{"@pid":"126/2518","text":"Vanlin Sathya"},{"@pid":"236/3184","text":"Morteza Merhnoush"},{"@pid":"86/4074","text":"Monisha Ghosh"},{"@pid":"57/3191-1","text":"Sumit Roy 0001"}]},"title":"Energy Detection Based Sensing of Multiple Wi-Fi BSSs for LTE-U CSAT.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SathyaMGR18","doi":"10.1109/GLOCOM.2018.8647217","ee":"https://doi.org/10.1109/GLOCOM.2018.8647217","url":"https://dblp.org/rec/conf/globecom/SathyaMGR18"}, "url":"URL#2567622" }, { "@score":"1", "@id":"2567623", "info":{"authors":{"author":[{"@pid":"224/0915","text":"Giannis Savva"},{"@pid":"17/4482","text":"Konstantinos Manousakis"},{"@pid":"36/4013","text":"Georgios Ellinas"}]},"title":"Eavesdropping-Aware Routing and Spectrum Allocation in EONs Using Spread Spectrum Techniques.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SavvaME18","doi":"10.1109/GLOCOM.2018.8647253","ee":"https://doi.org/10.1109/GLOCOM.2018.8647253","url":"https://dblp.org/rec/conf/globecom/SavvaME18"}, "url":"URL#2567623" }, { "@score":"1", "@id":"2567624", "info":{"authors":{"author":[{"@pid":"176/5827","text":"Maria Scalabrin"},{"@pid":"45/11437","text":"Nicolò Michelusi"},{"@pid":"19/3912","text":"Michele Rossi"}]},"title":"Beam Training and Data Transmission Optimization in Millimeter-Wave Vehicular Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ScalabrinMR18","doi":"10.1109/GLOCOM.2018.8647890","ee":"https://doi.org/10.1109/GLOCOM.2018.8647890","url":"https://dblp.org/rec/conf/globecom/ScalabrinMR18"}, "url":"URL#2567624" }, { "@score":"1", "@id":"2567625", "info":{"authors":{"author":[{"@pid":"170/2641","text":"Sebastian Schiessl"},{"@pid":"g/JamesGross","text":"James Gross"},{"@pid":"19/2492","text":"Giuseppe Caire"}]},"title":"Delay Performance of the Multiuser MISO Downlink.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SchiesslGC18","doi":"10.1109/GLOCOM.2018.8647680","ee":"https://doi.org/10.1109/GLOCOM.2018.8647680","url":"https://dblp.org/rec/conf/globecom/SchiesslGC18"}, "url":"URL#2567625" }, { "@score":"1", "@id":"2567630", "info":{"authors":{"author":[{"@pid":"232/4513","text":"Luca Sciullo"},{"@pid":"236/2957","text":"Federico Fossemo"},{"@pid":"133/4880","text":"Angelo Trotta"},{"@pid":"63/442","text":"Marco Di Felice"}]},"title":"LOCATE: A LoRa-based mObile emergenCy mAnagement sysTEm.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SciulloFTF18","doi":"10.1109/GLOCOM.2018.8647177","ee":"https://doi.org/10.1109/GLOCOM.2018.8647177","url":"https://dblp.org/rec/conf/globecom/SciulloFTF18"}, "url":"URL#2567630" }, { "@score":"1", "@id":"2567631", "info":{"authors":{"author":[{"@pid":"98/9336","text":"Hichem Sedjelmaci"},{"@pid":"61/8276","text":"Inès Ben Jemaa"},{"@pid":"36/8725","text":"Makhlouf Hadji"},{"@pid":"98/7910","text":"Arnaud Kaiser"}]},"title":"Security Framework for Vehicular Edge Computing Network Based on Behavioral Game.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SedjelmaciJHK18","doi":"10.1109/GLOCOM.2018.8647348","ee":"https://doi.org/10.1109/GLOCOM.2018.8647348","url":"https://dblp.org/rec/conf/globecom/SedjelmaciJHK18"}, "url":"URL#2567631" }, { "@score":"1", "@id":"2567633", "info":{"authors":{"author":[{"@pid":"199/9885","text":"Mohamed Y. Selim"},{"@pid":"127/6738","text":"Ahmad Alsharoa"},{"@pid":"94/5698","text":"Ahmed E. Kamal 0001"}]},"title":"Short-Term and Long-Term Cell Outage Compensation Using UAVs in 5G Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SelimAK18","doi":"10.1109/GLOCOM.2018.8648054","ee":"https://doi.org/10.1109/GLOCOM.2018.8648054","url":"https://dblp.org/rec/conf/globecom/SelimAK18"}, "url":"URL#2567633" }, { "@score":"1", "@id":"2567635", "info":{"authors":{"author":[{"@pid":"236/3067","text":"Nour El Houda Senoussi"},{"@pid":"01/8385","text":"Mohamed Lamine Kerdoudi"},{"@pid":"44/1298","text":"Abdelmalik Bachir"},{"@pid":"13/125","text":"Abdelmadjid Bouabdallah"}]},"title":"On Enhancing Location Privacy and QoS for Video Streaming Over Wireless Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SenoussiKBB18","doi":"10.1109/GLOCOM.2018.8647355","ee":"https://doi.org/10.1109/GLOCOM.2018.8647355","url":"https://dblp.org/rec/conf/globecom/SenoussiKBB18"}, "url":"URL#2567635" }, { "@score":"1", "@id":"2567637", "info":{"authors":{"author":[{"@pid":"231/6072","text":"Xiaojun Shang"},{"@pid":"61/1951-2","text":"Zhenhua Li 0002"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"}]},"title":"Partial Rerouting for High-Availability and Low-Cost Service Function Chain.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShangLY18","doi":"10.1109/GLOCOM.2018.8647552","ee":"https://doi.org/10.1109/GLOCOM.2018.8647552","url":"https://dblp.org/rec/conf/globecom/ShangLY18"}, "url":"URL#2567637" }, { "@score":"1", "@id":"2567638", "info":{"authors":{"author":[{"@pid":"194/8573","text":"Luyao Shang"},{"@pid":"37/3474","text":"Erik S. Perrins"}]},"title":"Memory Based LT Encoders over BIAWGN Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShangP18","doi":"10.1109/GLOCOM.2018.8647558","ee":"https://doi.org/10.1109/GLOCOM.2018.8647558","url":"https://dblp.org/rec/conf/globecom/ShangP18"}, "url":"URL#2567638" }, { "@score":"1", "@id":"2567639", "info":{"authors":{"author":[{"@pid":"30/8347","text":"Qi Shao"},{"@pid":"41/7881","text":"Man Hon Cheung"},{"@pid":"77/623-1","text":"Jianwei Huang 0001"}]},"title":"Crowdsourcing with Bounded Rationality: A Cognitive Hierarchy Perspective.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ShaoCH18","doi":"10.1109/GLOCOM.2018.8647377","ee":"https://doi.org/10.1109/GLOCOM.2018.8647377","url":"https://dblp.org/rec/conf/globecom/ShaoCH18"}, "url":"URL#2567639" }, { "@score":"1", "@id":"2567640", "info":{"authors":{"author":[{"@pid":"75/6784","text":"Weidong Shao"},{"@pid":"69/3330-3","text":"Shun Zhang 0003"},{"@pid":"62/5909-1","text":"Hongyan Li 0001"},{"@pid":"21/11018","text":"Jianpeng Ma"},{"@pid":"223/9562","text":"Guangzhe Zhao"},{"@pid":"231/4024","text":"Xiushe Zhang"}]},"title":"Spatially Sparse Code Multiplexing for the Massive MIMO Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShaoZLMZZ18","doi":"10.1109/GLOCOM.2018.8647465","ee":"https://doi.org/10.1109/GLOCOM.2018.8647465","url":"https://dblp.org/rec/conf/globecom/ShaoZLMZZ18"}, "url":"URL#2567640" }, { "@score":"1", "@id":"2567641", "info":{"authors":{"author":{"@pid":"154/7105","text":"Filipo Sharevski"}},"title":"Leveraging Cellular Intemet-of-Things for Resilient and Robust Disaster Management.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/Sharevski18","doi":"10.1109/GLOCOM.2018.8647495","ee":"https://doi.org/10.1109/GLOCOM.2018.8647495","url":"https://dblp.org/rec/conf/globecom/Sharevski18"}, "url":"URL#2567641" }, { "@score":"1", "@id":"2567644", "info":{"authors":{"author":[{"@pid":"159/1529","text":"Mohit K. Sharma"},{"@pid":"96/4430","text":"Chandra R. Murthy"},{"@pid":"80/5048","text":"Rahul Vaze"}]},"title":"On Optimal Scheduling and Power Control for Uncoordinated Multiple Access by Energy Harvesting Nodes.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SharmaMV18","doi":"10.1109/GLOCOM.2018.8647194","ee":"https://doi.org/10.1109/GLOCOM.2018.8647194","url":"https://dblp.org/rec/conf/globecom/SharmaMV18"}, "url":"URL#2567644" }, { "@score":"1", "@id":"2567645", "info":{"authors":{"author":[{"@pid":"160/3438","text":"Shubha Sharma"},{"@pid":"236/3259","text":"Jerome Tan"},{"@pid":"66/549","text":"A. S. Madhukumar"},{"@pid":"199/9811","text":"Swaminathan Ramabadran"}]},"title":"Switching-Based Transmit Antenna/Aperture Selection in a MISO Hybrid FSO/RF System.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SharmaTMR18","doi":"10.1109/GLOCOM.2018.8647284","ee":"https://doi.org/10.1109/GLOCOM.2018.8647284","url":"https://dblp.org/rec/conf/globecom/SharmaTMR18"}, "url":"URL#2567645" }, { "@score":"1", "@id":"2567646", "info":{"authors":{"author":[{"@pid":"59/8405","text":"Rui She"},{"@pid":"169/1580","text":"Shanyun Liu"},{"@pid":"44/2936","text":"Pingyi Fan"}]},"title":"State Variation Mining: On Information Divergence with Message Importance in Big Data.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SheLF18","doi":"10.1109/GLOCOM.2018.8647882","ee":"https://doi.org/10.1109/GLOCOM.2018.8647882","url":"https://dblp.org/rec/conf/globecom/SheLF18"}, "url":"URL#2567646" }, { "@score":"1", "@id":"2567647", "info":{"authors":{"author":[{"@pid":"31/8950","text":"Qian Shen"},{"@pid":"47/3877","text":"Jianping He 0001"},{"@pid":"214/2052","text":"Silan Zheng"},{"@pid":"35/6761","text":"Cailian Chen"},{"@pid":"46/999-6","text":"Bo Yang 0006"}]},"title":"Traffic-Related Mission-Critical Transmission for Vehicular Ad-Hoc Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShenHZCY18","doi":"10.1109/GLOCOM.2018.8647519","ee":"https://doi.org/10.1109/GLOCOM.2018.8647519","url":"https://dblp.org/rec/conf/globecom/ShenHZCY18"}, "url":"URL#2567647" }, { "@score":"1", "@id":"2567648", "info":{"authors":{"author":[{"@pid":"236/2909","text":"Dailing Shen"},{"@pid":"214/2005","text":"Chenjia Wei"},{"@pid":"41/1088","text":"Xiaolin Zhou"},{"@pid":"214/2067","text":"Lingda Wang"},{"@pid":"71/9729","text":"Chongbin Xu"}]},"title":"Photon Counting Based Iterative Quantum Non-Orthogonal Multiple Access with Spatial Coupling.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ShenWZWX18","doi":"10.1109/GLOCOM.2018.8648086","ee":"https://doi.org/10.1109/GLOCOM.2018.8648086","url":"https://dblp.org/rec/conf/globecom/ShenWZWX18"}, "url":"URL#2567648" }, { "@score":"1", "@id":"2567649", "info":{"authors":{"author":[{"@pid":"131/4331","text":"Tong Shen"},{"@pid":"83/10201","text":"Xian Yu"},{"@pid":"01/2888","text":"Gaogang Xie"},{"@pid":"16/2420","text":"Dafang Zhang"}]},"title":"High-Performance IPv6 Lookup with Real-Time Updates Using Hierarchical-Balanced Search Tree.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShenYXZ18","doi":"10.1109/GLOCOM.2018.8647190","ee":"https://doi.org/10.1109/GLOCOM.2018.8647190","url":"https://dblp.org/rec/conf/globecom/ShenYXZ18"}, "url":"URL#2567649" }, { "@score":"1", "@id":"2567650", "info":{"authors":{"author":[{"@pid":"99/6100-1","text":"Fei Shen 0001"},{"@pid":"70/6271-3","text":"Guowei Zhang 0003"},{"@pid":"231/3952","text":"Chongchong Zhang"},{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"53/4040","text":"Rong Yang"}]},"title":"An Incentive Framework for Resource Sensing in Fog Computing Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ShenZZYY18","doi":"10.1109/GLOCOM.2018.8647135","ee":"https://doi.org/10.1109/GLOCOM.2018.8647135","url":"https://dblp.org/rec/conf/globecom/ShenZZYY18"}, "url":"URL#2567650" }, { "@score":"1", "@id":"2567651", "info":{"authors":{"author":[{"@pid":"24/1131-2","text":"Yao Shi 0002"},{"@pid":"34/1858","text":"Emad Alsusa"},{"@pid":"164/8873","text":"Aysha Ebrahim"}]},"title":"Single and Dual Connectivity for Decoupled Uplink and Downlink Access in UHF-mmWave Hybrid Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShiAE18","doi":"10.1109/GLOCOM.2018.8647411","ee":"https://doi.org/10.1109/GLOCOM.2018.8647411","url":"https://dblp.org/rec/conf/globecom/ShiAE18"}, "url":"URL#2567651" }, { "@score":"1", "@id":"2567652", "info":{"authors":{"author":[{"@pid":"170/1762","text":"Liqin Shi"},{"@pid":"34/8968","text":"Wenchi Cheng"},{"@pid":"203/9417","text":"Yinghui Ye"},{"@pid":"04/1131-1","text":"Hailin Zhang 0001"},{"@pid":"43/3601","text":"Rose Qingyang Hu"}]},"title":"Heterogeneous Power-Splitting Based Two-Way DF Relaying with Non-Linear Energy Harvesting.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShiCYZH18","doi":"10.1109/GLOCOM.2018.8647768","ee":"https://doi.org/10.1109/GLOCOM.2018.8647768","url":"https://dblp.org/rec/conf/globecom/ShiCYZH18"}, "url":"URL#2567652" }, { "@score":"1", "@id":"2567653", "info":{"authors":{"author":[{"@pid":"236/3133","text":"Dian Shi"},{"@pid":"234/6210","text":"Jiahao Ding"},{"@pid":"194/7011","text":"Sai Mounika Errapotu"},{"@pid":"37/7488","text":"Hao Yue"},{"@pid":"14/2062-1","text":"Wenjun Xu 0001"},{"@pid":"20/4512","text":"Xiangwei Zhou"},{"@pid":"16/1033","text":"Miao Pan"}]},"title":"Deep Q-Network Based Route Scheduling for Transportation Network Company Vehicles.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShiDEYXZP18","doi":"10.1109/GLOCOM.2018.8647546","ee":"https://doi.org/10.1109/GLOCOM.2018.8647546","url":"https://dblp.org/rec/conf/globecom/ShiDEYXZP18"}, "url":"URL#2567653" }, { "@score":"1", "@id":"2567654", "info":{"authors":{"author":[{"@pid":"198/7100-1","text":"Jianfeng Shi 0001"},{"@pid":"209/8713","text":"Yinlu Wang"},{"@pid":"43/6008-3","text":"Hao Xu 0003"},{"@pid":"99/311-1","text":"Ming Chen 0001"},{"@pid":"25/492","text":"Benoît Champagne"}]},"title":"Performance Analysis of User-Centric Virtual Cell Dense Networks over mmWave Channels.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShiWXCC18","doi":"10.1109/GLOCOM.2018.8647592","ee":"https://doi.org/10.1109/GLOCOM.2018.8647592","url":"https://dblp.org/rec/conf/globecom/ShiWXCC18"}, "url":"URL#2567654" }, { "@score":"1", "@id":"2567655", "info":{"authors":{"author":[{"@pid":"50/3642-1","text":"Zheng Shi 0001"},{"@pid":"29/2214","text":"Guanghua Yang"},{"@pid":"126/5272","text":"Yaru Fu"},{"@pid":"83/5522-11","text":"Hong Wang 0011"},{"@pid":"59/518","text":"Shaodan Ma"}]},"title":"Performance Analysis of MIMO-NOMA Systems with Randomly Deployed Users.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShiYFWM18","doi":"10.1109/GLOCOM.2018.8647702","ee":"https://doi.org/10.1109/GLOCOM.2018.8647702","url":"https://dblp.org/rec/conf/globecom/ShiYFWM18"}, "url":"URL#2567655" }, { "@score":"1", "@id":"2567657", "info":{"authors":{"author":[{"@pid":"236/3065","text":"Rajan Shrestha"},{"@pid":"209/0032","text":"Gayan Amarasuriya"}]},"title":"Wireless Energy Harvesting in Massive MIMO with Low-Dimensional Digital Precoding.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShresthaA18","doi":"10.1109/GLOCOM.2018.8647793","ee":"https://doi.org/10.1109/GLOCOM.2018.8647793","url":"https://dblp.org/rec/conf/globecom/ShresthaA18"}, "url":"URL#2567657" }, { "@score":"1", "@id":"2567658", "info":{"authors":{"author":[{"@pid":"236/3065","text":"Rajan Shrestha"},{"@pid":"209/0032","text":"Gayan Amarasuriya"}]},"title":"SWIPT in Cell-Free Massive MIMO.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShresthaA18a","doi":"10.1109/GLOCOM.2018.8648129","ee":"https://doi.org/10.1109/GLOCOM.2018.8648129","url":"https://dblp.org/rec/conf/globecom/ShresthaA18a"}, "url":"URL#2567658" }, { "@score":"1", "@id":"2567659", "info":{"authors":{"author":[{"@pid":"220/3420","text":"Aawesh Shrestha"},{"@pid":"17/7223","text":"Myounggyu Won"}]},"title":"DeepWalking: Enabling Smartphone-Based Walking Speed Estimation Using Deep Learning.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShresthaW18","doi":"10.1109/GLOCOM.2018.8647857","ee":"https://doi.org/10.1109/GLOCOM.2018.8647857","url":"https://dblp.org/rec/conf/globecom/ShresthaW18"}, "url":"URL#2567659" }, { "@score":"1", "@id":"2567660", "info":{"authors":{"author":[{"@pid":"155/5056","text":"Rudraksh Shrivastava"},{"@pid":"46/5685","text":"Konstantinos Samdanis"},{"@pid":"236/3324","text":"Ahmed Bakry"}]},"title":"On Policy Based RAN Slicing for Emerging 5G TDD Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShrivastavaSB18","doi":"10.1109/GLOCOM.2018.8647358","ee":"https://doi.org/10.1109/GLOCOM.2018.8647358","url":"https://dblp.org/rec/conf/globecom/ShrivastavaSB18"}, "url":"URL#2567660" }, { "@score":"1", "@id":"2567661", "info":{"authors":{"author":[{"@pid":"143/0117","text":"Jiangang Shu"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"26/6407","text":"Kan Yang 0001"},{"@pid":"31/3845-2","text":"Yinghui Zhang 0002"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"},{"@pid":"d/RobertHDeng","text":"Robert H. Deng"}]},"title":"SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShuLYZJD18","doi":"10.1109/GLOCOM.2018.8647346","ee":"https://doi.org/10.1109/GLOCOM.2018.8647346","url":"https://dblp.org/rec/conf/globecom/ShuLYZJD18"}, "url":"URL#2567661" }, { "@score":"1", "@id":"2567662", "info":{"authors":{"author":[{"@pid":"86/10294","text":"Hong-Han Shuai"},{"@pid":"236/2852","text":"Cheng-Ming Tsai"},{"@pid":"236/3061","text":"Yun-Jui Hsu"},{"@pid":"236/3073","text":"Ta-Che Hsiao"}]},"title":"On Accelerating Multi-Layered Heterogeneous Network Embedding Learning.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ShuaiTHH18","doi":"10.1109/GLOCOM.2018.8647392","ee":"https://doi.org/10.1109/GLOCOM.2018.8647392","url":"https://dblp.org/rec/conf/globecom/ShuaiTHH18"}, "url":"URL#2567662" }, { "@score":"1", "@id":"2567663", "info":{"authors":{"author":[{"@pid":"156/2545","text":"Tshiamo Sigwele"},{"@pid":"92/3019","text":"Yim-Fun Hu"},{"@pid":"64/5995-1","text":"Muhammad Ali 0001"},{"@pid":"226/4634","text":"Jiacheng Hou"},{"@pid":"131/8146","text":"Misfa Susanto"},{"@pid":"13/596","text":"Helmy Fitriawan"}]},"title":"Intelligent and Energy Efficient Mobile Smartphone Gateway for Healthcare Smart Devices Based on 5G.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SigweleHAHSF18","doi":"10.1109/GLOCOM.2018.8648031","ee":"https://doi.org/10.1109/GLOCOM.2018.8648031","url":"https://dblp.org/rec/conf/globecom/SigweleHAHSF18"}, "url":"URL#2567663" }, { "@score":"1", "@id":"2567664", "info":{"authors":{"author":[{"@pid":"236/2816","text":"Marcus Vinicius Brito da Silva"},{"@pid":"144/9529","text":"Arthur Selle Jacobs"},{"@pid":"146/3489","text":"Ricardo José Pfitscher"},{"@pid":"52/4475","text":"Lisandro Zambenedetti Granville"}]},"title":"IDEAFIX: Identifying Elephant Flows in P4-Based IXP Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SilvaJPG18","doi":"10.1109/GLOCOM.2018.8647685","ee":"https://doi.org/10.1109/GLOCOM.2018.8647685","url":"https://dblp.org/rec/conf/globecom/SilvaJPG18"}, "url":"URL#2567664" }, { "@score":"1", "@id":"2567665", "info":{"authors":{"author":[{"@pid":"236/3363","text":"Wesley R. Da Silva"},{"@pid":"207/1344-2","text":"Luiz Oliveira 0002"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"117/4596","text":"Ricardo de Andrade Lira Rabelo"},{"@pid":"222/5581","text":"Carlos N. M. Marins"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"}]},"title":"An Internet of Things Tracking System Approach Based on LoRa Protocol.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SilvaOKRMR18","doi":"10.1109/GLOCOM.2018.8647984","ee":"https://doi.org/10.1109/GLOCOM.2018.8647984","url":"https://dblp.org/rec/conf/globecom/SilvaOKRMR18"}, "url":"URL#2567665" }, { "@score":"1", "@id":"2567667", "info":{"authors":{"author":[{"@pid":"08/1370","text":"Neelima Singh"},{"@pid":"47/4820","text":"Brejesh Lall"}]},"title":"Spectral Entropy Features Based Analysis of Impulse Noise Sources for PLC Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SinghL18","doi":"10.1109/GLOCOM.2018.8647262","ee":"https://doi.org/10.1109/GLOCOM.2018.8647262","url":"https://dblp.org/rec/conf/globecom/SinghL18"}, "url":"URL#2567667" }, { "@score":"1", "@id":"2567668", "info":{"authors":{"author":[{"@pid":"213/9443","text":"Prem Singh"},{"@pid":"236/3024","text":"Bagadi Usha Rani"},{"@pid":"165/8434","text":"Himanshu B. Mishra"},{"@pid":"155/7339","text":"Kasturi Vasudevan"}]},"title":"Neighbourhood Detection-based ZF-V-BLAST Architecture for MIMO-FBMC-OQAM Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SinghRMV18","doi":"10.1109/GLOCOM.2018.8647242","ee":"https://doi.org/10.1109/GLOCOM.2018.8647242","url":"https://dblp.org/rec/conf/globecom/SinghRMV18"}, "url":"URL#2567668" }, { "@score":"1", "@id":"2567669", "info":{"authors":{"author":[{"@pid":"200/7335","text":"Praveen Kumar Singya"},{"@pid":"03/593-2","text":"Nagendra Kumar 0002"},{"@pid":"98/6271","text":"Vimal Bhatia"}]},"title":"Performance Analysis of Opportunistic Two-Way 3P-ANC Multi-Relay System with Imperfect CSI and NLPA.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SingyaKB18","doi":"10.1109/GLOCOM.2018.8647874","ee":"https://doi.org/10.1109/GLOCOM.2018.8647874","url":"https://dblp.org/rec/conf/globecom/SingyaKB18"}, "url":"URL#2567669" }, { "@score":"1", "@id":"2567670", "info":{"authors":{"author":[{"@pid":"236/3325","text":"Sotiris Skaperas"},{"@pid":"57/176","text":"Lefteris Mamatas"},{"@pid":"08/6235","text":"Arsenia Chorti"}]},"title":"Early Video Content Popularity Detection with Change Point Analysis.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SkaperasMC18","doi":"10.1109/GLOCOM.2018.8648121","ee":"https://doi.org/10.1109/GLOCOM.2018.8648121","url":"https://dblp.org/rec/conf/globecom/SkaperasMC18"}, "url":"URL#2567670" }, { "@score":"1", "@id":"2567671", "info":{"authors":{"author":[{"@pid":"236/3092","text":"Konstantinos Skiadopoulos"},{"@pid":"70/5565","text":"Konstantinos Giannakis"},{"@pid":"80/1907","text":"Konstantinos Oikonomou"},{"@pid":"s/IoannisStavrakakis","text":"Ioannis Stavrakakis"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"Distributed Construction of D-Hop Connected Dominating Sets for Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SkiadopoulosGOS18","doi":"10.1109/GLOCOM.2018.8647369","ee":"https://doi.org/10.1109/GLOCOM.2018.8647369","url":"https://dblp.org/rec/conf/globecom/SkiadopoulosGOS18"}, "url":"URL#2567671" }, { "@score":"1", "@id":"2567672", "info":{"authors":{"author":[{"@pid":"185/7006","text":"Christodoulos Skouroumounis"},{"@pid":"85/11470","text":"Constantinos Psomas"},{"@pid":"79/5692","text":"Ioannis Krikidis"}]},"title":"Full-Duplex Radio in mmWave Cellular Networks with Cell Center/Edge Users.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SkouroumounisPK18","doi":"10.1109/GLOCOM.2018.8647461","ee":"https://doi.org/10.1109/GLOCOM.2018.8647461","url":"https://dblp.org/rec/conf/globecom/SkouroumounisPK18"}, "url":"URL#2567672" }, { "@score":"1", "@id":"2567673", "info":{"authors":{"author":[{"@pid":"214/6659","text":"Oussama Ben Smida"},{"@pid":"98/8513","text":"Slim Zaidi"},{"@pid":"85/3663","text":"Sofiène Affes"},{"@pid":"82/3084","text":"Shahrokh Valaee"}]},"title":"Low-Cost Robust Distributed Collaborative Beamforming against Implementation Impairments.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SmidaZAV18","doi":"10.1109/GLOCOM.2018.8648059","ee":"https://doi.org/10.1109/GLOCOM.2018.8648059","url":"https://dblp.org/rec/conf/globecom/SmidaZAV18"}, "url":"URL#2567673" }, { "@score":"1", "@id":"2567674", "info":{"authors":{"author":[{"@pid":"168/3127","text":"Sima Sobhiyeh"},{"@pid":"65/1092","text":"Mort Naraghi-Pour"}]},"title":"Online Hypothesis Testing and Non-Parametric Model Estimation Based on Correlated Observations.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SobhiyehN18","doi":"10.1109/GLOCOM.2018.8647853","ee":"https://doi.org/10.1109/GLOCOM.2018.8647853","url":"https://dblp.org/rec/conf/globecom/SobhiyehN18"}, "url":"URL#2567674" }, { "@score":"1", "@id":"2567676", "info":{"authors":{"author":[{"@pid":"01/2743","text":"Rui Song"},{"@pid":"45/10757","text":"Yubo Song"},{"@pid":"28/435-6","text":"Shang Gao 0006"},{"@pid":"43/5134-1","text":"Bin Xiao 0001"},{"@pid":"55/4757","text":"Aiqun Hu"}]},"title":"I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SongSGXH18","doi":"10.1109/GLOCOM.2018.8647385","ee":"https://doi.org/10.1109/GLOCOM.2018.8647385","url":"https://dblp.org/rec/conf/globecom/SongSGXH18"}, "url":"URL#2567676" }, { "@score":"1", "@id":"2567679", "info":{"authors":{"author":[{"@pid":"153/9985","text":"Keshav Sood"},{"@pid":"180/8361","text":"Kallol Krishna Karmakar"},{"@pid":"v/VijayVaradharajan","text":"Vijay Varadharajan"},{"@pid":"76/2607","text":"Udaya Kiran Tupakula"},{"@pid":"90/3575-1","text":"Shui Yu 0001"}]},"title":"Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SoodKVTY18","doi":"10.1109/GLOCOM.2018.8647833","ee":"https://doi.org/10.1109/GLOCOM.2018.8647833","url":"https://dblp.org/rec/conf/globecom/SoodKVTY18"}, "url":"URL#2567679" }, { "@score":"1", "@id":"2567681", "info":{"authors":{"author":[{"@pid":"47/3886","text":"Ulrich Speidel"},{"@pid":"15/3610","text":"Lei Qian"}]},"title":"Striking a Balance between Bufferbloat and TCP Queue Oscillation in Satellite Input Buffers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SpeidelQ18","doi":"10.1109/GLOCOM.2018.8647662","ee":"https://doi.org/10.1109/GLOCOM.2018.8647662","url":"https://dblp.org/rec/conf/globecom/SpeidelQ18"}, "url":"URL#2567681" }, { "@score":"1", "@id":"2567682", "info":{"authors":{"author":[{"@pid":"183/1792","text":"Maximilian Stark"},{"@pid":"179/9257","text":"Jan Lewandowsky"},{"@pid":"19/2794","text":"Gerhard Bauch 0001"}]},"title":"Information-Optimum LDPC Decoders with Message Alignment for Irregular Codes.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/StarkLB18","doi":"10.1109/GLOCOM.2018.8648053","ee":"https://doi.org/10.1109/GLOCOM.2018.8648053","url":"https://dblp.org/rec/conf/globecom/StarkLB18"}, "url":"URL#2567682" }, { "@score":"1", "@id":"2567683", "info":{"authors":{"author":[{"@pid":"236/3289","text":"Liam Stigant"},{"@pid":"13/5366-1","text":"Rong Zhang 0001"},{"@pid":"193/1600","text":"Leslie Derek Humphrey"},{"@pid":"236/2942","text":"Trevor P. Linney"},{"@pid":"236/3332","text":"Trevor Morsman"},{"@pid":"32/7381","text":"Anas F. Al Rawi"}]},"title":"Spatially Adaptive Linear Precoding for Systems Beyond G.Fast.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/StigantZHLMR18","doi":"10.1109/GLOCOM.2018.8648147","ee":"https://doi.org/10.1109/GLOCOM.2018.8648147","url":"https://dblp.org/rec/conf/globecom/StigantZHLMR18"}, "url":"URL#2567683" }, { "@score":"1", "@id":"2567685", "info":{"authors":{"author":[{"@pid":"232/4195","text":"Binbin Su"},{"@pid":"157/9149","text":"Zhijin Qin"},{"@pid":"87/3074","text":"Qiang Ni"}]},"title":"Energy Efficient Resource Allocation for Uplink LoRa Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SuQN18","doi":"10.1109/GLOCOM.2018.8647416","ee":"https://doi.org/10.1109/GLOCOM.2018.8647416","url":"https://dblp.org/rec/conf/globecom/SuQN18"}, "url":"URL#2567685" }, { "@score":"1", "@id":"2567686", "info":{"authors":{"author":[{"@pid":"116/7840","text":"Luis A. Suarez"},{"@pid":"224/8904","text":"Vladimir Lyashev 0001"},{"@pid":"224/8808","text":"Alexander Sherstobitov"}]},"title":"Reduced Space and Time-Delay Channel State Representation for 5G FDD Massive MIMO Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SuarezLS18","doi":"10.1109/GLOCOM.2018.8648022","ee":"https://doi.org/10.1109/GLOCOM.2018.8648022","url":"https://dblp.org/rec/conf/globecom/SuarezLS18"}, "url":"URL#2567686" }, { "@score":"1", "@id":"2567688", "info":{"authors":{"author":[{"@pid":"88/619-7","text":"Peng Sun 0007"},{"@pid":"120/4036","text":"Noura AlJeri"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"}]},"title":"A Fast Vehicular Traffic Flow Prediction Scheme Based on Fourier and Wavelet Analysis.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SunAB18","doi":"10.1109/GLOCOM.2018.8647731","ee":"https://doi.org/10.1109/GLOCOM.2018.8647731","url":"https://dblp.org/rec/conf/globecom/SunAB18"}, "url":"URL#2567688" }, { "@score":"1", "@id":"2567689", "info":{"authors":{"author":[{"@pid":"153/8254","text":"Yaping Sun"},{"@pid":"56/2971-2","text":"Zhiyong Chen 0002"},{"@pid":"85/4712","text":"Meixia Tao"},{"@pid":"93/4010-11","text":"Hui Liu 0011"}]},"title":"Modeling and Trade-Off for Mobile Communication, Computing and Caching Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SunCTL18","doi":"10.1109/GLOCOM.2018.8647791","ee":"https://doi.org/10.1109/GLOCOM.2018.8647791","url":"https://dblp.org/rec/conf/globecom/SunCTL18"}, "url":"URL#2567689" }, { "@score":"1", "@id":"2567690", "info":{"authors":{"author":[{"@pid":"51/394","text":"Fei Sun"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"14/6026-1","text":"Shan Zhang 0001"},{"@pid":"14/8431","text":"Haibo Zhou"},{"@pid":"34/8605-1","text":"Lin Gui 0001"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Reinforcement Learning Based Computation Migration for Vehicular Cloud Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SunCZZGS18","doi":"10.1109/GLOCOM.2018.8647996","ee":"https://doi.org/10.1109/GLOCOM.2018.8647996","url":"https://dblp.org/rec/conf/globecom/SunCZZGS18"}, "url":"URL#2567690" }, { "@score":"1", "@id":"2567696", "info":{"authors":{"author":[{"@pid":"194/3079","text":"Yuxuan Sun"},{"@pid":"40/52","text":"Jinhui Song"},{"@pid":"34/4858-1","text":"Sheng Zhou 0001"},{"@pid":"65/7485","text":"Xueying Guo"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"Task Replication for Vehicular Edge Computing: A Combinatorial Multi-Armed Bandit Based Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SunSZGN18","doi":"10.1109/GLOCOM.2018.8647564","ee":"https://doi.org/10.1109/GLOCOM.2018.8647564","url":"https://dblp.org/rec/conf/globecom/SunSZGN18"}, "url":"URL#2567696" }, { "@score":"1", "@id":"2567697", "info":{"authors":{"author":[{"@pid":"72/5840","text":"Hongguang Sun"},{"@pid":"92/1942","text":"Rui Yang"},{"@pid":"39/4119","text":"Min Sheng"},{"@pid":"04/3348-6","text":"Yan Zhang 0006"},{"@pid":"49/1245-9","text":"Jia Liu 0009"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"}]},"title":"Coverage Analysis for Ultra-Dense Networks with Dynamic TDD.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/SunYSZLL18","doi":"10.1109/GLOCOM.2018.8647395","ee":"https://doi.org/10.1109/GLOCOM.2018.8647395","url":"https://dblp.org/rec/conf/globecom/SunYSZLL18"}, "url":"URL#2567697" }, { "@score":"1", "@id":"2567698", "info":{"authors":{"author":[{"@pid":"226/6025","text":"German Sviridov"},{"@pid":"81/5311","text":"Andrea Bianco"},{"@pid":"67/4811","text":"Paolo Giaccone"}]},"title":"To Sync or Not to Sync: Why Asynchronous Traffic Control Is Good Enough for Your Data Center.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/SviridovBG18","doi":"10.1109/GLOCOM.2018.8647692","ee":"https://doi.org/10.1109/GLOCOM.2018.8647692","url":"https://dblp.org/rec/conf/globecom/SviridovBG18"}, "url":"URL#2567698" }, { "@score":"1", "@id":"2567701", "info":{"authors":{"author":{"@pid":"05/3877","text":"Abd-Elhamid M. Taha"}},"title":"A Framework for Dynamic Assessment of Road Safety in Smart Cities.","venue":"GLOBECOM","pages":"1-4","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Taha18","doi":"10.1109/GLOCOM.2018.8647170","ee":"https://doi.org/10.1109/GLOCOM.2018.8647170","url":"https://dblp.org/rec/conf/globecom/Taha18"}, "url":"URL#2567701" }, { "@score":"1", "@id":"2567702", "info":{"authors":{"author":[{"@pid":"08/10801","text":"Sanaa Taha"},{"@pid":"133/4861","text":"Mohammed Alhassany"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Lightweight Handover Authentication Scheme for 5G-Based V2X Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TahaAS18","doi":"10.1109/GLOCOM.2018.8648020","ee":"https://doi.org/10.1109/GLOCOM.2018.8648020","url":"https://dblp.org/rec/conf/globecom/TahaAS18"}, "url":"URL#2567702" }, { "@score":"1", "@id":"2567703", "info":{"authors":{"author":[{"@pid":"08/10801","text":"Sanaa Taha"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Lightweight Group Authentication with Dynamic Vehicle-Clustering for 5G-Based V2X Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TahaS18","doi":"10.1109/GLOCOM.2018.8647864","ee":"https://doi.org/10.1109/GLOCOM.2018.8647864","url":"https://dblp.org/rec/conf/globecom/TahaS18"}, "url":"URL#2567703" }, { "@score":"1", "@id":"2567704", "info":{"authors":{"author":[{"@pid":"135/6316","text":"Satoshi Takabe"},{"@pid":"92/806","text":"Tadashi Wadayama"}]},"title":"Connectivity of Ad Hoc Wireless Networks with Node Faults.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TakabeW18","doi":"10.1109/GLOCOM.2018.8647315","ee":"https://doi.org/10.1109/GLOCOM.2018.8647315","url":"https://dblp.org/rec/conf/globecom/TakabeW18"}, "url":"URL#2567704" }, { "@score":"1", "@id":"2567705", "info":{"authors":{"author":[{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"236/2796","text":"Si-Ahmed Naas"}]},"title":"Scheduled Communications in Next Generationmobile Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TalebBN18","doi":"10.1109/GLOCOM.2018.8647344","ee":"https://doi.org/10.1109/GLOCOM.2018.8647344","url":"https://dblp.org/rec/conf/globecom/TalebBN18"}, "url":"URL#2567705" }, { "@score":"1", "@id":"2567707", "info":{"authors":{"author":[{"@pid":"176/5788","text":"Manal El Tanab"},{"@pid":"43/4366","text":"Walaa Hamouda"}]},"title":"Performance of Overload Control in Machine- to-Machine Wireless Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TanabH18","doi":"10.1109/GLOCOM.2018.8648076","ee":"https://doi.org/10.1109/GLOCOM.2018.8648076","url":"https://dblp.org/rec/conf/globecom/TanabH18"}, "url":"URL#2567707" }, { "@score":"1", "@id":"2567709", "info":{"authors":{"author":[{"@pid":"181/2702-5","text":"Jie Tang 0005"},{"@pid":"67/1608","text":"Long Jiao"},{"@pid":"46/2005-3","text":"Ning Wang 0003"},{"@pid":"15/4476-3","text":"Pu Wang 0003"},{"@pid":"80/1651-1","text":"Kai Zeng 0001"},{"@pid":"94/5572-1","text":"Hong Wen 0001"}]},"title":"Mobility Improves NOMA Physical Layer Security.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TangJWWZW18","doi":"10.1109/GLOCOM.2018.8648079","ee":"https://doi.org/10.1109/GLOCOM.2018.8648079","url":"https://dblp.org/rec/conf/globecom/TangJWWZW18"}, "url":"URL#2567709" }, { "@score":"1", "@id":"2567711", "info":{"authors":{"author":[{"@pid":"181/2702-2","text":"Jie Tang 0002"},{"@pid":"235/8500","text":"Jingci Luo"},{"@pid":"49/8","text":"Daniel K. C. So"},{"@pid":"34/1858","text":"Emad Alsusa"},{"@pid":"35/5506","text":"Kai-Kit Wong"},{"@pid":"84/4581-1","text":"Nan Zhao 0001"}]},"title":"Energy-Efficient Resource Allocation in SWIPT Enabled NOMA Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TangLSAWZ18","doi":"10.1109/GLOCOM.2018.8647573","ee":"https://doi.org/10.1109/GLOCOM.2018.8647573","url":"https://dblp.org/rec/conf/globecom/TangLSAWZ18"}, "url":"URL#2567711" }, { "@score":"1", "@id":"2567712", "info":{"authors":{"author":[{"@pid":"202/3033","text":"Fengxiao Tang"},{"@pid":"202/2936","text":"Bomin Mao"},{"@pid":"64/3988","text":"Zubair Md. Fadlullah"},{"@pid":"19/3059","text":"Nei Kato"}]},"title":"Deep Spatiotemporal Partially Overlapping Channel Allocation: Joint CNN and Activity Vector Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TangMFK18","doi":"10.1109/GLOCOM.2018.8647254","ee":"https://doi.org/10.1109/GLOCOM.2018.8647254","url":"https://dblp.org/rec/conf/globecom/TangMFK18"}, "url":"URL#2567712" }, { "@score":"1", "@id":"2567713", "info":{"authors":{"author":[{"@pid":"84/3594-1","text":"Xiao Tang 0001"},{"@pid":"28/2359","text":"Pinyi Ren"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Securing Small Cell Networks Under Interference Constraint: A Quasi-Variational Inequality Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TangRH18","doi":"10.1109/GLOCOM.2018.8647227","ee":"https://doi.org/10.1109/GLOCOM.2018.8647227","url":"https://dblp.org/rec/conf/globecom/TangRH18"}, "url":"URL#2567713" }, { "@score":"1", "@id":"2567715", "info":{"authors":{"author":[{"@pid":"98/8856","text":"Voravit Tanyingyong"},{"@pid":"70/9976","text":"Robert Olsson"},{"@pid":"01/6677","text":"Markus Hidell"},{"@pid":"14/2531","text":"Peter Sjödin"},{"@pid":"93/3625","text":"Bengt Ahlgren"}]},"title":"Implementation and Deployment of an Outdoor IoT-Based Air Quality Monitoring Testbed.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TanyingyongOHSA18","doi":"10.1109/GLOCOM.2018.8647287","ee":"https://doi.org/10.1109/GLOCOM.2018.8647287","url":"https://dblp.org/rec/conf/globecom/TanyingyongOHSA18"}, "url":"URL#2567715" }, { "@score":"1", "@id":"2567716", "info":{"authors":{"author":[{"@pid":"172/2738","text":"Yuechen Tao"},{"@pid":"127/2907","text":"Jingjie Jiang"},{"@pid":"183/1810","text":"Shiyao Ma"},{"@pid":"137/9646","text":"Luping Wang"},{"@pid":"35/7092-30","text":"Wei Wang 0030"},{"@pid":"50/3402-1","text":"Bo Li 0001"}]},"title":"Unraveling the RTT-fairness Problem for BBR: A Queueing Model.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TaoJMWWL18","doi":"10.1109/GLOCOM.2018.8647260","ee":"https://doi.org/10.1109/GLOCOM.2018.8647260","url":"https://dblp.org/rec/conf/globecom/TaoJMWWL18"}, "url":"URL#2567716" }, { "@score":"1", "@id":"2567717", "info":{"authors":{"author":[{"@pid":"225/5333","text":"Md Mostofa Kamal Tareq"},{"@pid":"143/7309","text":"Omid Semiari"},{"@pid":"53/2578","text":"Mohsen Amini Salehi"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Ultra Reliable, Low Latency Vehicle-to-Infrastructure Wireless Communications with Edge Computing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TareqSSS18","doi":"10.1109/GLOCOM.2018.8647367","ee":"https://doi.org/10.1109/GLOCOM.2018.8647367","url":"https://dblp.org/rec/conf/globecom/TareqSSS18"}, "url":"URL#2567717" }, { "@score":"1", "@id":"2567721", "info":{"authors":{"author":[{"@pid":"54/6279","text":"Yuuichi Teranishi"},{"@pid":"151/8766","text":"Takashi Kimata"},{"@pid":"76/10038","text":"Hiroaki Yamanaka"},{"@pid":"70/5846","text":"Eiji Kawai"},{"@pid":"68/570","text":"Hiroaki Harai"}]},"title":"Supporting k-Nearest Service Discoveries for Large-Scale Edge Computing Environments.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TeranishiKYKH18","doi":"10.1109/GLOCOM.2018.8647195","ee":"https://doi.org/10.1109/GLOCOM.2018.8647195","url":"https://dblp.org/rec/conf/globecom/TeranishiKYKH18"}, "url":"URL#2567721" }, { "@score":"1", "@id":"2567725", "info":{"authors":{"author":[{"@pid":"210/6136","text":"Xuanxuan Tian"},{"@pid":"82/5445","text":"Tingting Zhang"},{"@pid":"10/2002","text":"Qinyu Zhang 0001"},{"@pid":"15/8552","text":"Zhaohui Song"}]},"title":"HRRP-Based Extended Target Recognition in OFDM-Based RadCom Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TianZZS18","doi":"10.1109/GLOCOM.2018.8647263","ee":"https://doi.org/10.1109/GLOCOM.2018.8647263","url":"https://dblp.org/rec/conf/globecom/TianZZS18"}, "url":"URL#2567725" }, { "@score":"1", "@id":"2567727", "info":{"authors":{"author":[{"@pid":"213/1006","text":"Santosh Timilsina"},{"@pid":"203/9650","text":"Dhanushka Kudathanthirige"},{"@pid":"209/0032","text":"Gayan Amarasuriya"}]},"title":"Physical Layer Security in Cell- Free Massive MIMO.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TimilsinaKA18","doi":"10.1109/GLOCOM.2018.8647876","ee":"https://doi.org/10.1109/GLOCOM.2018.8647876","url":"https://dblp.org/rec/conf/globecom/TimilsinaKA18"}, "url":"URL#2567727" }, { "@score":"1", "@id":"2567728", "info":{"authors":{"author":[{"@pid":"236/3039","text":"Ayush Tiwari"},{"@pid":"70/4107","text":"Harsha Chenji"},{"@pid":"169/2718","text":"Vijay Kumar Devabhaktuni"}]},"title":"Comparison of Statistical Signal Processing and Machine Learning Algorithms for Spectrum Sensing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TiwariCD18","doi":"10.1109/GLOCOM.2018.8647811","ee":"https://doi.org/10.1109/GLOCOM.2018.8647811","url":"https://dblp.org/rec/conf/globecom/TiwariCD18"}, "url":"URL#2567728" }, { "@score":"1", "@id":"2567729", "info":{"authors":{"author":[{"@pid":"152/9528","text":"Mohammed Amine Togou"},{"@pid":"203/2906","text":"Djabir Abdeldjalil Chekired"},{"@pid":"74/90","text":"Lyes Khoukhi"},{"@pid":"81/2584","text":"Gabriel-Miro Muntean"}]},"title":"A Distributed Control Plane for Path Computation Scalability in Software-Defined Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TogouCKM18","doi":"10.1109/GLOCOM.2018.8647468","ee":"https://doi.org/10.1109/GLOCOM.2018.8647468","url":"https://dblp.org/rec/conf/globecom/TogouCKM18"}, "url":"URL#2567729" }, { "@score":"1", "@id":"2567730", "info":{"authors":{"author":[{"@pid":"192/3657","text":"Van Tong"},{"@pid":"52/8082","text":"Hai Anh Tran"},{"@pid":"92/10614","text":"Sami Souihi"},{"@pid":"03/6403","text":"Abdelhamid Mellouk"}]},"title":"A Novel QUIC Traffic Classifier Based on Convolutional Neural Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TongTSM18","doi":"10.1109/GLOCOM.2018.8647128","ee":"https://doi.org/10.1109/GLOCOM.2018.8647128","url":"https://dblp.org/rec/conf/globecom/TongTSM18"}, "url":"URL#2567730" }, { "@score":"1", "@id":"2567731", "info":{"authors":{"author":[{"@pid":"171/6451","text":"Konstantinos Tountas"},{"@pid":"125/0427","text":"George Sklivanitis"},{"@pid":"p/DimitriosAPados","text":"Dimitris A. Pados"},{"@pid":"73/1900","text":"Stella N. Batalama"}]},"title":"All-spectrum Digital Waveform Design via Bit Flipping.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TountasSPB18","doi":"10.1109/GLOCOM.2018.8647511","ee":"https://doi.org/10.1109/GLOCOM.2018.8647511","url":"https://dblp.org/rec/conf/globecom/TountasSPB18"}, "url":"URL#2567731" }, { "@score":"1", "@id":"2567732", "info":{"authors":{"author":[{"@pid":"219/3619","text":"Quang Nhat Tran"},{"@pid":"99/5144","text":"Jiankun Hu"},{"@pid":"62/3151-3","text":"Song Wang 0003"}]},"title":"Alignment-Free Cancellable Template with Clustered-Minutiae Local Structure.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TranHW18","doi":"10.1109/GLOCOM.2018.8647290","ee":"https://doi.org/10.1109/GLOCOM.2018.8647290","url":"https://dblp.org/rec/conf/globecom/TranHW18"}, "url":"URL#2567732" }, { "@score":"1", "@id":"2567733", "info":{"authors":{"author":[{"@pid":"154/1033","text":"Dung Phuong Trinh"},{"@pid":"09/8823","text":"Youngmin Jeong"},{"@pid":"14/1458","text":"Hyundong Shin"},{"@pid":"21/4583","text":"Moe Z. Win"}]},"title":"Molecular Communication in a Cox Field of Interfering Molecules.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/TrinhJSW18","doi":"10.1109/GLOCOM.2018.8647990","ee":"https://doi.org/10.1109/GLOCOM.2018.8647990","url":"https://dblp.org/rec/conf/globecom/TrinhJSW18"}, "url":"URL#2567733" }, { "@score":"1", "@id":"2567734", "info":{"authors":{"author":[{"@pid":"71/2561","text":"Paschalis Tsiaflakis"},{"@pid":"192/0755","text":"Yannick Lefevre"},{"@pid":"160/4966","text":"Werner Coomans"},{"@pid":"49/6382","text":"Jochen Maes"}]},"title":"Friendly Full Duplex: A Multi-User Full Duplex Method for MGfast in Coexistence with G.fast.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/TsiaflakisLCM18","doi":"10.1109/GLOCOM.2018.8647579","ee":"https://doi.org/10.1109/GLOCOM.2018.8647579","url":"https://dblp.org/rec/conf/globecom/TsiaflakisLCM18"}, "url":"URL#2567734" }, { "@score":"1", "@id":"2567738", "info":{"authors":{"author":[{"@pid":"20/241-3","text":"Muhammad Usman 0003"},{"@pid":"82/10434","text":"Muhammad Rizwan Asghar"},{"@pid":"42/7740","text":"Imran Shafique Ansari"},{"@pid":"129/0976","text":"Marwa K. Qaraqe"},{"@pid":"39/4893","text":"Fabrizio Granelli"}]},"title":"An Energy Consumption Model for WiFi Direct Based D2D Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/UsmanAAQG18","doi":"10.1109/GLOCOM.2018.8647905","ee":"https://doi.org/10.1109/GLOCOM.2018.8647905","url":"https://dblp.org/rec/conf/globecom/UsmanAAQG18"}, "url":"URL#2567738" }, { "@score":"1", "@id":"2567739", "info":{"authors":{"author":[{"@pid":"20/241-3","text":"Muhammad Usman 0003"},{"@pid":"236/3218","text":"Ameera Akhtar"},{"@pid":"129/0976","text":"Marwa K. Qaraqe"},{"@pid":"39/4893","text":"Fabrizio Granelli"}]},"title":"Remote Cloud vs Local Mobile Cloud: A Quantitative Analysis.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/UsmanAQG18","doi":"10.1109/GLOCOM.2018.8648069","ee":"https://doi.org/10.1109/GLOCOM.2018.8648069","url":"https://dblp.org/rec/conf/globecom/UsmanAQG18"}, "url":"URL#2567739" }, { "@score":"1", "@id":"2567740", "info":{"authors":{"author":[{"@pid":"180/2617","text":"Ovais Bin Usman"},{"@pid":"46/3148","text":"Gerhard H. Staude"},{"@pid":"79/3050","text":"Andreas Knopp"}]},"title":"Onboard Compensation of Linear and Non-Linear Hardware Imperfections in Multiport Amplifiers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/UsmanSK18","doi":"10.1109/GLOCOM.2018.8647682","ee":"https://doi.org/10.1109/GLOCOM.2018.8647682","url":"https://dblp.org/rec/conf/globecom/UsmanSK18"}, "url":"URL#2567740" }, { "@score":"1", "@id":"2567742", "info":{"authors":{"author":[{"@pid":"202/8642","text":"Amir Varasteh"},{"@pid":"54/6573","text":"Marilet De Andrade"},{"@pid":"m/CarmenMasMachuca","text":"Carmen Mas Machuca"},{"@pid":"43/6153","text":"Lena Wosinska"},{"@pid":"32/3203","text":"Wolfgang Kellerer"}]},"title":"Power-Aware Virtual Network Function Placement and Routing Using an Abstraction Technique.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/VarastehAMWK18","doi":"10.1109/GLOCOM.2018.8647538","ee":"https://doi.org/10.1109/GLOCOM.2018.8647538","url":"https://dblp.org/rec/conf/globecom/VarastehAMWK18"}, "url":"URL#2567742" }, { "@score":"1", "@id":"2567743", "info":{"authors":{"author":[{"@pid":"230/2898","text":"Artur Felipe da Silva Veloso"},{"@pid":"215/6817","text":"Andrey Antonio Rodrigues"},{"@pid":"134/0799","text":"José V. V. Sobral"},{"@pid":"25/3419","text":"Joel J. P. C. Rodrigues"},{"@pid":"236/3058","text":"Mateus S. S. Feitosa"},{"@pid":"117/4596","text":"Ricardo de Andrade Lira Rabelo"}]},"title":"An IoT Smart Metering Solution Based on IEEE 802.15.4.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/VelosoRSRFR18","doi":"10.1109/GLOCOM.2018.8647795","ee":"https://doi.org/10.1109/GLOCOM.2018.8647795","url":"https://dblp.org/rec/conf/globecom/VelosoRSRFR18"}, "url":"URL#2567743" }, { "@score":"1", "@id":"2567745", "info":{"authors":{"author":[{"@pid":"85/7288","text":"George E. Violettas"},{"@pid":"18/6473","text":"Sophia G. Petridou"},{"@pid":"57/176","text":"Lefteris Mamatas"}]},"title":"Routing under Heterogeneity and Mobility for the Internet of Things: A Centralized Control Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ViolettasPM18","doi":"10.1109/GLOCOM.2018.8647237","ee":"https://doi.org/10.1109/GLOCOM.2018.8647237","url":"https://dblp.org/rec/conf/globecom/ViolettasPM18"}, "url":"URL#2567745" }, { "@score":"1", "@id":"2567746", "info":{"authors":{"author":[{"@pid":"122/4950","text":"Christian Vitale"},{"@pid":"c/CFChiasserini","text":"Carla-Fabiana Chiasserini"},{"@pid":"67/7179","text":"Francesco Malandrino"}]},"title":"On the Impact of IoT Traffic on the Cellular EPC.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/VitaleCM18","doi":"10.1109/GLOCOM.2018.8647966","ee":"https://doi.org/10.1109/GLOCOM.2018.8647966","url":"https://dblp.org/rec/conf/globecom/VitaleCM18"}, "url":"URL#2567746" }, { "@score":"1", "@id":"2567747", "info":{"authors":{"author":[{"@pid":"224/0765","text":"Piergiorgio Vitello"},{"@pid":"194/1500","text":"Andrea Capponi"},{"@pid":"158/4744","text":"Claudio Fiandrino"},{"@pid":"67/4811","text":"Paolo Giaccone"},{"@pid":"54/5802","text":"Dzmitry Kliazovich"},{"@pid":"35/1417","text":"Ulrich Sorger"},{"@pid":"b/PascalBouvry","text":"Pascal Bouvry"}]},"title":"Collaborative Data Delivery for Smart City-Oriented Mobile Crowdsensing Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/VitelloCFGKSB18","doi":"10.1109/GLOCOM.2018.8648047","ee":"https://doi.org/10.1109/GLOCOM.2018.8648047","url":"https://dblp.org/rec/conf/globecom/VitelloCFGKSB18"}, "url":"URL#2567747" }, { "@score":"1", "@id":"2567749", "info":{"authors":{"author":[{"@pid":"221/0409","text":"Thai T. Vu"},{"@pid":"193/2322","text":"Nguyen Van Huynh"},{"@pid":"37/8852","text":"Dinh Thai Hoang"},{"@pid":"95/10112","text":"Diep N. Nguyen"},{"@pid":"71/2764","text":"Eryk Dutkiewicz"}]},"title":"Offloading Energy Efficiency with Delay Constraint for Cooperative Mobile Edge Computing Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/VuHHND18","doi":"10.1109/GLOCOM.2018.8647856","ee":"https://doi.org/10.1109/GLOCOM.2018.8647856","url":"https://dblp.org/rec/conf/globecom/VuHHND18"}, "url":"URL#2567749" }, { "@score":"1", "@id":"2567750", "info":{"authors":{"author":[{"@pid":"92/806","text":"Tadashi Wadayama"},{"@pid":"135/6316","text":"Satoshi Takabe"}]},"title":"Quantizer Optimization Based on Neural Quantizerfor Sum-Product Decoder.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WadayamaT18","doi":"10.1109/GLOCOM.2018.8647503","ee":"https://doi.org/10.1109/GLOCOM.2018.8647503","url":"https://dblp.org/rec/conf/globecom/WadayamaT18"}, "url":"URL#2567750" }, { "@score":"1", "@id":"2567751", "info":{"authors":{"author":[{"@pid":"28/4489","text":"Krzysztof Walkowiak"},{"@pid":"194/2236","text":"Piotr Lechowicz"},{"@pid":"00/6854","text":"Miroslaw Klinkowski"}]},"title":"Transceiver Sharing in Survivable Spectrally-Spatially Flexible Optical Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WalkowiakLK18","doi":"10.1109/GLOCOM.2018.8648095","ee":"https://doi.org/10.1109/GLOCOM.2018.8648095","url":"https://dblp.org/rec/conf/globecom/WalkowiakLK18"}, "url":"URL#2567751" }, { "@score":"1", "@id":"2567752", "info":{"authors":{"author":[{"@pid":"187/9952","text":"Kaidi Wang"},{"@pid":"94/5160","text":"Jingjing Cui"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"f/PingzhiFan","text":"Pingzhi Fan"}]},"title":"A Stackelberg Game Approach for NOMA in mmWave Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangCDF18","doi":"10.1109/GLOCOM.2018.8647544","ee":"https://doi.org/10.1109/GLOCOM.2018.8647544","url":"https://dblp.org/rec/conf/globecom/WangCDF18"}, "url":"URL#2567752" }, { "@score":"1", "@id":"2567753", "info":{"authors":{"author":[{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"229/7440","text":"Zihao Chu"},{"@pid":"79/3289","text":"Yanhong Zhou"},{"@pid":"30/6102","text":"Kang Wang"},{"@pid":"24/8037-1","text":"Chi Lin 0001"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"Partial Charging Scheduling in Wireless Rechargeable Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangCZWLO18","doi":"10.1109/GLOCOM.2018.8648027","ee":"https://doi.org/10.1109/GLOCOM.2018.8648027","url":"https://dblp.org/rec/conf/globecom/WangCZWLO18"}, "url":"URL#2567753" }, { "@score":"1", "@id":"2567754", "info":{"authors":{"author":[{"@pid":"75/3158-5","text":"Zhe Wang 0005"},{"@pid":"65/7661","text":"Lingjie Duan"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"}]},"title":"Traffic-Aware Adaptive Deployment for UAV-Aided Communication Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangDZ18","doi":"10.1109/GLOCOM.2018.8647708","ee":"https://doi.org/10.1109/GLOCOM.2018.8647708","url":"https://dblp.org/rec/conf/globecom/WangDZ18"}, "url":"URL#2567754" }, { "@score":"1", "@id":"2567755", "info":{"authors":{"author":[{"@pid":"71/4292-27","text":"Gang Wang 0027"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"65/1128","text":"Tony Q. S. Quek"},{"@pid":"28/8080","text":"Shuang Qin"}]},"title":"On Fast Slice Reconfiguration.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangFQQ18","doi":"10.1109/GLOCOM.2018.8648117","ee":"https://doi.org/10.1109/GLOCOM.2018.8648117","url":"https://dblp.org/rec/conf/globecom/WangFQQ18"}, "url":"URL#2567755" }, { "@score":"1", "@id":"2567756", "info":{"authors":{"author":[{"@pid":"97/6505-22","text":"Qing Wang 0022"},{"@pid":"64/1049-1","text":"Jing Fu 0001"},{"@pid":"67/10367","text":"Jingjin Wu"},{"@pid":"73/1162-1","text":"Bill Moran 0001"},{"@pid":"01/4750","text":"Moshe Zukerman"}]},"title":"Energy-Efficient Priority-Based Scheduling for Wireless Network Slicing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangFWMZ18","doi":"10.1109/GLOCOM.2018.8647696","ee":"https://doi.org/10.1109/GLOCOM.2018.8647696","url":"https://dblp.org/rec/conf/globecom/WangFWMZ18"}, "url":"URL#2567756" }, { "@score":"1", "@id":"2567757", "info":{"authors":{"author":[{"@pid":"187/5833","text":"Bolei Wang"},{"@pid":"20/6898","text":"Feifei Gao"},{"@pid":"89/5914","text":"Geoffrey Ye Li"},{"@pid":"49/5340-2","text":"Shi Jin 0002"},{"@pid":"60/9196","text":"Hai Lin 0001"}]},"title":"Wideband Channel Estimation for mmWave Massive MIMO Systems with Beam Squint Effect.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangGLJL18","doi":"10.1109/GLOCOM.2018.8647494","ee":"https://doi.org/10.1109/GLOCOM.2018.8647494","url":"https://dblp.org/rec/conf/globecom/WangGLJL18"}, "url":"URL#2567757" }, { "@score":"1", "@id":"2567758", "info":{"authors":{"author":[{"@pid":"217/2229","text":"Zichang Wang"},{"@pid":"85/3639-3","text":"Fei Guo 0003"},{"@pid":"43/1032-1","text":"Yan Meng 0001"},{"@pid":"153/5725","text":"Huaxin Li"},{"@pid":"22/5702","text":"Haojin Zhu"},{"@pid":"49/1185","text":"Zhenfu Cao"}]},"title":"Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangGMLZC18","doi":"10.1109/GLOCOM.2018.8647567","ee":"https://doi.org/10.1109/GLOCOM.2018.8647567","url":"https://dblp.org/rec/conf/globecom/WangGMLZC18"}, "url":"URL#2567758" }, { "@score":"1", "@id":"2567759", "info":{"authors":{"author":[{"@pid":"12/2633-1","text":"Ting Wang 0001"},{"@pid":"38/6823","text":"Mounir Hamdi"}]},"title":"eMPTCP: Towards High Performance Multipath Data Transmission by Leveraging SDN.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangH18","doi":"10.1109/GLOCOM.2018.8647477","ee":"https://doi.org/10.1109/GLOCOM.2018.8647477","url":"https://dblp.org/rec/conf/globecom/WangH18"}, "url":"URL#2567759" }, { "@score":"1", "@id":"2567760", "info":{"authors":{"author":[{"@pid":"14/8056","text":"Yung-Shun Wang"},{"@pid":"03/3341","text":"Y.-W. Peter Hong"},{"@pid":"21/7029","text":"Wen-Tsuen Chen"}]},"title":"Dynamically Connectable UAV Base Stations with Cooperative Energy Sharing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangHC18","doi":"10.1109/GLOCOM.2018.8647398","ee":"https://doi.org/10.1109/GLOCOM.2018.8647398","url":"https://dblp.org/rec/conf/globecom/WangHC18"}, "url":"URL#2567760" }, { "@score":"1", "@id":"2567761", "info":{"authors":{"author":[{"@pid":"136/5328","text":"Shengchu Wang"},{"@pid":"236/3256","text":"Mengxia He"},{"@pid":"67/398","text":"Qi Guo"},{"@pid":"37/1629-32","text":"Lin Zhang 0032"}]},"title":"Nonlinear MIMO Communications under pi-Periodic Phase Measurements.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangHGZ18","doi":"10.1109/GLOCOM.2018.8647142","ee":"https://doi.org/10.1109/GLOCOM.2018.8647142","url":"https://dblp.org/rec/conf/globecom/WangHGZ18"}, "url":"URL#2567761" }, { "@score":"1", "@id":"2567762", "info":{"authors":{"author":[{"@pid":"23/2060-9","text":"Dan Wang 0009"},{"@pid":"225/7238","text":"Jianhao Huang"},{"@pid":"80/7804-1","text":"Chuan Huang 0001"}]},"title":"Full-Duplex Amplify-and-Forward Receiver Cooperations for Interference Channels.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangHH18","doi":"10.1109/GLOCOM.2018.8647900","ee":"https://doi.org/10.1109/GLOCOM.2018.8647900","url":"https://dblp.org/rec/conf/globecom/WangHH18"}, "url":"URL#2567762" }, { "@score":"1", "@id":"2567763", "info":{"authors":{"author":[{"@pid":"50/8499","text":"Haoyu Wang"},{"@pid":"194/7014","text":"Mohammad Hadian"},{"@pid":"92/3528","text":"Xiaohui Liang"}]},"title":"Efficient and Privacy-Preserving Roadmap Data Update for Autonomous Vehicles.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangHL18","doi":"10.1109/GLOCOM.2018.8648036","ee":"https://doi.org/10.1109/GLOCOM.2018.8648036","url":"https://dblp.org/rec/conf/globecom/WangHL18"}, "url":"URL#2567763" }, { "@score":"1", "@id":"2567764", "info":{"authors":{"author":[{"@pid":"62/2631-1","text":"Jingjing Wang 0001"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"137/9869","text":"Zhongxiang Wei"},{"@pid":"198/9834","text":"Tong Bai"},{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"00/440-1","text":"Yong Ren 0001"}]},"title":"UAV Aided Network Association in Space-Air-Ground Communication Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangJWBZR18","doi":"10.1109/GLOCOM.2018.8647724","ee":"https://doi.org/10.1109/GLOCOM.2018.8647724","url":"https://dblp.org/rec/conf/globecom/WangJWBZR18"}, "url":"URL#2567764" }, { "@score":"1", "@id":"2567765", "info":{"authors":{"author":[{"@pid":"46/2005-3","text":"Ning Wang 0003"},{"@pid":"67/1608","text":"Long Jiao"},{"@pid":"15/4476-3","text":"Pu Wang 0003"},{"@pid":"194/6922","text":"Monireh Dabaghchian"},{"@pid":"80/1651-1","text":"Kai Zeng 0001"}]},"title":"Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangJWDZ18","doi":"10.1109/GLOCOM.2018.8647707","ee":"https://doi.org/10.1109/GLOCOM.2018.8647707","url":"https://dblp.org/rec/conf/globecom/WangJWDZ18"}, "url":"URL#2567765" }, { "@score":"1", "@id":"2567766", "info":{"authors":{"author":[{"@pid":"75/3158-15","text":"Zhe Wang 0015"},{"@pid":"23/7909","text":"Linghe Kong"},{"@pid":"51/1742","text":"Guihai Chen"},{"@pid":"42/963-2","text":"Liang He 0002"}]},"title":"PPM: Preamble and Postamble Based Multi-Packet Reception for Green ZigBee Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangKCH18","doi":"10.1109/GLOCOM.2018.8647405","ee":"https://doi.org/10.1109/GLOCOM.2018.8647405","url":"https://dblp.org/rec/conf/globecom/WangKCH18"}, "url":"URL#2567766" }, { "@score":"1", "@id":"2567768", "info":{"authors":{"author":[{"@pid":"160/6074","text":"Yunmin Wang"},{"@pid":"66/3387-22","text":"Hui Li 0022"}]},"title":"Popularity Prediction Oriented Provider Mobility Support in Content-Centric Networking.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangL18","doi":"10.1109/GLOCOM.2018.8648034","ee":"https://doi.org/10.1109/GLOCOM.2018.8648034","url":"https://dblp.org/rec/conf/globecom/WangL18"}, "url":"URL#2567768" }, { "@score":"1", "@id":"2567770", "info":{"authors":{"author":[{"@pid":"214/2132","text":"Zhaorui Wang 0001"},{"@pid":"l/SoungChangLiew","text":"Soung Chang Liew"},{"@pid":"01/2086-1","text":"Lu Lu 0001"}]},"title":"Optimal Noncoherent Detection for Physical-Layer Network Coding.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangLL18","doi":"10.1109/GLOCOM.2018.8647500","ee":"https://doi.org/10.1109/GLOCOM.2018.8647500","url":"https://dblp.org/rec/conf/globecom/WangLL18"}, "url":"URL#2567770" }, { "@score":"1", "@id":"2567771", "info":{"authors":{"author":[{"@pid":"88/3634","text":"Junhua Wang"},{"@pid":"25/3327-5","text":"Tingting Liu 0005"},{"@pid":"73/4566-1","text":"Kai Liu 0001"},{"@pid":"55/10300","text":"BaekGyu Kim"},{"@pid":"x/JXie-1","text":"Jiang Xie 0001"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Computation Offloading Over Fog and Cloud Using Multi-Dimensional Multiple Knapsack Problem.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangLLKXH18","doi":"10.1109/GLOCOM.2018.8647854","ee":"https://doi.org/10.1109/GLOCOM.2018.8647854","url":"https://dblp.org/rec/conf/globecom/WangLLKXH18"}, "url":"URL#2567771" }, { "@score":"1", "@id":"2567772", "info":{"authors":{"author":[{"@pid":"97/6505","text":"Qing Wang"},{"@pid":"20/2039","text":"Ming Liu"},{"@pid":"30/2704","text":"Nian Liu"},{"@pid":"23/2071","text":"Zhangdui Zhong"}]},"title":"On Augmenting UL Connections in Massive MIMO System Using Composite Channel Estimation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangLLZ18","doi":"10.1109/GLOCOM.2018.8648132","ee":"https://doi.org/10.1109/GLOCOM.2018.8648132","url":"https://dblp.org/rec/conf/globecom/WangLLZ18"}, "url":"URL#2567772" }, { "@score":"1", "@id":"2567773", "info":{"authors":{"author":[{"@pid":"209/1568","text":"Jingrong Wang"},{"@pid":"83/4877","text":"Kaiyang Liu"},{"@pid":"90/8333","text":"Minming Ni"},{"@pid":"p/JianpingPan","text":"Jianping Pan 0001"}]},"title":"Learning Based Mobility Management Under Uncertainties for Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangLNP18","doi":"10.1109/GLOCOM.2018.8647718","ee":"https://doi.org/10.1109/GLOCOM.2018.8647718","url":"https://dblp.org/rec/conf/globecom/WangLNP18"}, "url":"URL#2567773" }, { "@score":"1", "@id":"2567774", "info":{"authors":{"author":[{"@pid":"175/2561","text":"Huiyang Wang"},{"@pid":"95/10112","text":"Diep N. Nguyen"},{"@pid":"37/8852","text":"Dinh Thai Hoang"},{"@pid":"71/2764","text":"Eryk Dutkiewicz"},{"@pid":"58/7703","text":"Qingqing Cheng"}]},"title":"Real-Time Crowdsourcing Incentive for Radio Environment Maps: A Dynamic Pricing Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangNHDC18","doi":"10.1109/GLOCOM.2018.8647268","ee":"https://doi.org/10.1109/GLOCOM.2018.8647268","url":"https://dblp.org/rec/conf/globecom/WangNHDC18"}, "url":"URL#2567774" }, { "@score":"1", "@id":"2567775", "info":{"authors":{"author":[{"@pid":"49/3800-10","text":"Lu Wang 0010"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"}]},"title":"Signal Restoration Based on Temporal Structure and Multi-Layer Architecture.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangO18","doi":"10.1109/GLOCOM.2018.8647206","ee":"https://doi.org/10.1109/GLOCOM.2018.8647206","url":"https://dblp.org/rec/conf/globecom/WangO18"}, "url":"URL#2567775" }, { "@score":"1", "@id":"2567776", "info":{"authors":{"author":[{"@pid":"81/2392","text":"Ruhai Wang"},{"@pid":"59/7702","text":"Siwei Peng"},{"@pid":"174/3128","text":"Alaa Sabbagh"},{"@pid":"17/1169","text":"Bin Cao"},{"@pid":"08/8790","text":"Kanglian Zhao"},{"@pid":"85/10799","text":"Guannan Yang"}]},"title":"Bundle Protocol for Space Communication Networks in Presence of Intermittent Link Connectivity.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangPSCZY18","doi":"10.1109/GLOCOM.2018.8647274","ee":"https://doi.org/10.1109/GLOCOM.2018.8647274","url":"https://dblp.org/rec/conf/globecom/WangPSCZY18"}, "url":"URL#2567776" }, { "@score":"1", "@id":"2567777", "info":{"authors":{"author":[{"@pid":"39/2537-1","text":"Dawei Wang 0001"},{"@pid":"28/2359","text":"Pinyi Ren"}]},"title":"Energy-Efficient Primary Security Provisioning for the Full-Duplex Cognitive Radio Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangR18","doi":"10.1109/GLOCOM.2018.8647265","ee":"https://doi.org/10.1109/GLOCOM.2018.8647265","url":"https://dblp.org/rec/conf/globecom/WangR18"}, "url":"URL#2567777" }, { "@score":"1", "@id":"2567778", "info":{"authors":{"author":[{"@pid":"13/1187","text":"Chin-Liang Wang"},{"@pid":"06/2352","text":"Shao-Cheng Wang"}]},"title":"A New Preamble Design for Channel Estimation in Offset QAM Filter Bank Multicarrier Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangW18","doi":"10.1109/GLOCOM.2018.8647171","ee":"https://doi.org/10.1109/GLOCOM.2018.8647171","url":"https://dblp.org/rec/conf/globecom/WangW18"}, "url":"URL#2567778" }, { "@score":"1", "@id":"2567779", "info":{"authors":{"author":[{"@pid":"159/1506","text":"Zuoen Wang"},{"@pid":"19/6608","text":"Jingxian Wu 0001"}]},"title":"Distributed Data Diffusion in Finite Time in Decentralized Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangW18a","doi":"10.1109/GLOCOM.2018.8647229","ee":"https://doi.org/10.1109/GLOCOM.2018.8647229","url":"https://dblp.org/rec/conf/globecom/WangW18a"}, "url":"URL#2567779" }, { "@score":"1", "@id":"2567780", "info":{"authors":{"author":[{"@pid":"126/8982","text":"Haobo Wang"},{"@pid":"51/5171","text":"Richard D. Wesel"}]},"title":"Channel Code Analysis and Design Using Multiple Variable-Length Codes in Parallel without Feedback.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangW18b","doi":"10.1109/GLOCOM.2018.8647962","ee":"https://doi.org/10.1109/GLOCOM.2018.8647962","url":"https://dblp.org/rec/conf/globecom/WangW18b"}, "url":"URL#2567780" }, { "@score":"1", "@id":"2567781", "info":{"authors":{"author":[{"@pid":"40/3934-32","text":"Dong Wang 0032"},{"@pid":"84/2752","text":"Fanggang Wang"},{"@pid":"85/6463-1","text":"Bo Ai 0001"},{"@pid":"23/2071","text":"Zhangdui Zhong"}]},"title":"Wireless MIMO Switching with Imperfect Channel State Information.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangWAZ18","doi":"10.1109/GLOCOM.2018.8647666","ee":"https://doi.org/10.1109/GLOCOM.2018.8647666","url":"https://dblp.org/rec/conf/globecom/WangWAZ18"}, "url":"URL#2567781" }, { "@score":"1", "@id":"2567782", "info":{"authors":{"author":[{"@pid":"30/6437-2","text":"Weijia Wang 0002"},{"@pid":"87/10698","text":"Chang-Heng Wang"},{"@pid":"74/2569","text":"Tara Javidi"}]},"title":"Reliable Shortest Path Routing with Applications to Wireless Software-Defined Networking.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangWJ18","doi":"10.1109/GLOCOM.2018.8647684","ee":"https://doi.org/10.1109/GLOCOM.2018.8647684","url":"https://dblp.org/rec/conf/globecom/WangWJ18"}, "url":"URL#2567782" }, { "@score":"1", "@id":"2567783", "info":{"authors":{"author":[{"@pid":"02/6128-11","text":"Xiangyu Wang 0011"},{"@pid":"27/10801","text":"Xuyu Wang"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"07/314-28","text":"Jian Zhang 0028"},{"@pid":"53/2227","text":"Senthilkumar Chinnappa Gounder Periaswamy"},{"@pid":"220/6662","text":"Justin Patton"}]},"title":"DeepMap: Deep Gaussian Process for Indoor Radio Map Construction and Location Estimation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangWMZPP18","doi":"10.1109/GLOCOM.2018.8647266","ee":"https://doi.org/10.1109/GLOCOM.2018.8647266","url":"https://dblp.org/rec/conf/globecom/WangWMZPP18"}, "url":"URL#2567783" }, { "@score":"1", "@id":"2567785", "info":{"authors":{"author":[{"@pid":"80/7163","text":"Donglin Wang"},{"@pid":"12/2633","text":"Ting Wang"},{"@pid":"181/2734","text":"Feng Zhao"},{"@pid":"03/5992","text":"Xuetao Zhang"}]},"title":"Improved Graph-Based Semi-Supervised Learning for Fingerprint-Based Indoor Localization.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangWZZ18","doi":"10.1109/GLOCOM.2018.8647621","ee":"https://doi.org/10.1109/GLOCOM.2018.8647621","url":"https://dblp.org/rec/conf/globecom/WangWZZ18"}, "url":"URL#2567785" }, { "@score":"1", "@id":"2567786", "info":{"authors":{"author":[{"@pid":"46/2005","text":"Ning Wang"},{"@pid":"94/5218","text":"Shaoyi Xu"}]},"title":"Resource Allocation for LTE-Based Heterogeneous Vehicular Network in Unlicensed Bands.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangX18","doi":"10.1109/GLOCOM.2018.8647600","ee":"https://doi.org/10.1109/GLOCOM.2018.8647600","url":"https://dblp.org/rec/conf/globecom/WangX18"}, "url":"URL#2567786" }, { "@score":"1", "@id":"2567787", "info":{"authors":{"author":[{"@pid":"39/1084-1","text":"Tengjiao Wang 0001"},{"@pid":"90/1155-1","text":"Fang Yang 0001"},{"@pid":"69/764-1","text":"Ling Cheng 0001"},{"@pid":"00/6342-4","text":"Jian Song 0004"}]},"title":"Generalized Spatial Modulation Based Hybrid Dimming Scheme for Visible Light Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangYCS18","doi":"10.1109/GLOCOM.2018.8647623","ee":"https://doi.org/10.1109/GLOCOM.2018.8647623","url":"https://dblp.org/rec/conf/globecom/WangYCS18"}, "url":"URL#2567787" }, { "@score":"1", "@id":"2567788", "info":{"authors":{"author":[{"@pid":"12/5838","text":"Tao Wang"},{"@pid":"91/352","text":"Pingpeng Yuan"},{"@pid":"56/4402","text":"Xiaofei Liao"},{"@pid":"98/4156","text":"Hai Jin 0001"}]},"title":"Parallel Processing SPARQL Theta Join on Large Scale RDF Graphs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WangYLJ18","doi":"10.1109/GLOCOM.2018.8647646","ee":"https://doi.org/10.1109/GLOCOM.2018.8647646","url":"https://dblp.org/rec/conf/globecom/WangYLJ18"}, "url":"URL#2567788" }, { "@score":"1", "@id":"2567789", "info":{"authors":{"author":[{"@pid":"w/RuiWang1","text":"Rui Wang 0001"},{"@pid":"70/4725-2","text":"Xiaojun Yuan 0002"},{"@pid":"20/3894-6","text":"Jun Wu 0006"},{"@pid":"10/4661-1","text":"Wei Zhang 0001"}]},"title":"Optimal DoF Region of MIMO Y Channel with Hybrid Data Exchanges.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangYWZ18","doi":"10.1109/GLOCOM.2018.8647399","ee":"https://doi.org/10.1109/GLOCOM.2018.8647399","url":"https://dblp.org/rec/conf/globecom/WangYWZ18"}, "url":"URL#2567789" }, { "@score":"1", "@id":"2567790", "info":{"authors":{"author":[{"@pid":"52/3194-24","text":"Fei Wang 0024"},{"@pid":"87/1222-5","text":"Xi Zhang 0005"}]},"title":"Resource Allocation for Wireless Power Transmission Enabled Full-Duplex OFDMA Mobile Wireless Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZ18","doi":"10.1109/GLOCOM.2018.8647388","ee":"https://doi.org/10.1109/GLOCOM.2018.8647388","url":"https://dblp.org/rec/conf/globecom/WangZ18"}, "url":"URL#2567790" }, { "@score":"1", "@id":"2567791", "info":{"authors":{"author":[{"@pid":"52/3194-24","text":"Fei Wang 0024"},{"@pid":"87/1222-5","text":"Xi Zhang 0005"}]},"title":"Resource Allocation for Wireless Power Transmission over Full-Duplex NOMA Mobile Wireless Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZ18a","doi":"10.1109/GLOCOM.2018.8647740","ee":"https://doi.org/10.1109/GLOCOM.2018.8647740","url":"https://dblp.org/rec/conf/globecom/WangZ18a"}, "url":"URL#2567791" }, { "@score":"1", "@id":"2567792", "info":{"authors":{"author":[{"@pid":"148/1448","text":"Baoji Wang"},{"@pid":"56/8969","text":"Rongqing Zhang 0001"},{"@pid":"65/4423-2","text":"Chen Chen 0002"},{"@pid":"29/1059-1","text":"Xiang Cheng 0001"},{"@pid":"52/6918-1","text":"Liuqing Yang 0001"}]},"title":"Interference Hypergraph-Based Resource Allocation (IHG-RA) for NOMA-Integrated V2X Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZCCY18","doi":"10.1109/GLOCOM.2018.8648050","ee":"https://doi.org/10.1109/GLOCOM.2018.8648050","url":"https://dblp.org/rec/conf/globecom/WangZCCY18"}, "url":"URL#2567792" }, { "@score":"1", "@id":"2567794", "info":{"authors":{"author":[{"@pid":"71/4292-41","text":"Gang Wang 0041"},{"@pid":"60/2931-1","text":"Yi Zhong 0001"},{"@pid":"78/744-1","text":"Tao Han 0001"},{"@pid":"76/3232","text":"Xiaohu Ge"},{"@pid":"65/1128","text":"Tony Q. S. Quek"}]},"title":"On the Effect of Spatio-Temporal Fluctuation of Traffic in Wireless Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZHGQ18","doi":"10.1109/GLOCOM.2018.8647775","ee":"https://doi.org/10.1109/GLOCOM.2018.8647775","url":"https://dblp.org/rec/conf/globecom/WangZHGQ18"}, "url":"URL#2567794" }, { "@score":"1", "@id":"2567795", "info":{"authors":{"author":[{"@pid":"75/3158-16","text":"Zhe Wang 0016"},{"@pid":"87/1585","text":"Yu Zheng"},{"@pid":"236/2876","text":"Michael Jigo"},{"@pid":"180/9286","text":"Taosheng Liu"},{"@pid":"59/2180-1","text":"Jian Ren 0001"},{"@pid":"09/864","text":"Zhi Tian"},{"@pid":"32/4638","text":"Tongtong Li"}]},"title":"Decoding Behavioral Accuracy in an Attention Task Using Brain fMRI Data.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZJLRTL18","doi":"10.1109/GLOCOM.2018.8647356","ee":"https://doi.org/10.1109/GLOCOM.2018.8647356","url":"https://dblp.org/rec/conf/globecom/WangZJLRTL18"}, "url":"URL#2567795" }, { "@score":"1", "@id":"2567796", "info":{"authors":{"author":[{"@pid":"181/2812-70","text":"Hao Wang 0070"},{"@pid":"63/550-1","text":"Dong Zhao 0001"},{"@pid":"04/6217","text":"Huadong Ma"},{"@pid":"236/2906","text":"Lige Ding"}]},"title":"Min-Max Planning of Time-Sensitive and Heterogeneous Tasks in Mobile Crowd Sensing.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZMD18","doi":"10.1109/GLOCOM.2018.8647534","ee":"https://doi.org/10.1109/GLOCOM.2018.8647534","url":"https://dblp.org/rec/conf/globecom/WangZMD18"}, "url":"URL#2567796" }, { "@score":"1", "@id":"2567797", "info":{"authors":{"author":[{"@pid":"84/2694-4","text":"Yong Wang 0004"},{"@pid":"62/8453","text":"Mu Zhou"},{"@pid":"03/1375","text":"Zengshan Tian"},{"@pid":"157/9175","text":"Weiqiang Tan"}]},"title":"Beamforming and Artificial Noise Design for Energy Efficient Cloud RAN with CSI Uncertainty.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZTT18","doi":"10.1109/GLOCOM.2018.8647434","ee":"https://doi.org/10.1109/GLOCOM.2018.8647434","url":"https://dblp.org/rec/conf/globecom/WangZTT18"}, "url":"URL#2567797" }, { "@score":"1", "@id":"2567799", "info":{"authors":{"author":[{"@pid":"67/187","text":"Zhiqiang Wang"},{"@pid":"218/2704","text":"Jinle Zhu"},{"@pid":"w/JunWang5","text":"Jun Wang 0005"},{"@pid":"87/5293","text":"Guangrong Yue"}]},"title":"An Overlapped Subarray Structure in Hybrid Millimeter-Wave Multi-User MIMO System.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZWY18","doi":"10.1109/GLOCOM.2018.8647446","ee":"https://doi.org/10.1109/GLOCOM.2018.8647446","url":"https://dblp.org/rec/conf/globecom/WangZWY18"}, "url":"URL#2567799" }, { "@score":"1", "@id":"2567800", "info":{"authors":{"author":[{"@pid":"18/3178-2","text":"Jingyi Wang 0002"},{"@pid":"142/3651-1","text":"Xinyue Zhang 0001"},{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"84/1781","text":"Hai Lin"},{"@pid":"30/3255","text":"Hideki Tode"},{"@pid":"16/1033","text":"Miao Pan"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Data-Driven Optimization for Utility Providers with Differential Privacy of Users' Energy Profile.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WangZZLTPH18","doi":"10.1109/GLOCOM.2018.8647839","ee":"https://doi.org/10.1109/GLOCOM.2018.8647839","url":"https://dblp.org/rec/conf/globecom/WangZZLTPH18"}, "url":"URL#2567800" }, { "@score":"1", "@id":"2567801", "info":{"authors":{"author":[{"@pid":"82/10375-1","text":"Muhammad Waqas 0001"},{"@pid":"146/9028","text":"Manzoor Ahmed"},{"@pid":"23/8208-1","text":"Jiayi Zhang 0001"},{"@pid":"93/2334-8","text":"Yong Li 0008"}]},"title":"Confidential Information Ensurance through Physical Layer Security in Device-to-Device Communication.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WaqasAZL18","doi":"10.1109/GLOCOM.2018.8647343","ee":"https://doi.org/10.1109/GLOCOM.2018.8647343","url":"https://dblp.org/rec/conf/globecom/WaqasAZL18"}, "url":"URL#2567801" }, { "@score":"1", "@id":"2567802", "info":{"authors":{"author":[{"@pid":"15/3756","text":"Bo Wei"},{"@pid":"46/1391","text":"Wataru Kawakami"},{"@pid":"33/11345","text":"Kenji Kanai"},{"@pid":"55/3226","text":"Jiro Katto"},{"@pid":"73/8637","text":"Shangguang Wang"}]},"title":"TRUST: A TCP Throughput Prediction Method in Mobile Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WeiKKKW18","doi":"10.1109/GLOCOM.2018.8647390","ee":"https://doi.org/10.1109/GLOCOM.2018.8647390","url":"https://dblp.org/rec/conf/globecom/WeiKKKW18"}, "url":"URL#2567802" }, { "@score":"1", "@id":"2567803", "info":{"authors":{"author":[{"@pid":"133/3239","text":"Debing Wei"},{"@pid":"71/7028","text":"Li Yan"},{"@pid":"146/8113","text":"Xuanheng Li"},{"@pid":"29/5259-3","text":"Jie Wang 0003"},{"@pid":"54/10022","text":"Jiefu Chen"},{"@pid":"16/1033","text":"Miao Pan"},{"@pid":"90/6246","text":"Yahong Rosa Zheng"}]},"title":"Ferrite Assisted Geometry-Conformal Magnetic Induction Antenna and Subsea Communications for AUVs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WeiYLWCPZ18","doi":"10.1109/GLOCOM.2018.8647396","ee":"https://doi.org/10.1109/GLOCOM.2018.8647396","url":"https://dblp.org/rec/conf/globecom/WeiYLWCPZ18"}, "url":"URL#2567803" }, { "@score":"1", "@id":"2567804", "info":{"authors":{"author":[{"@pid":"83/784-1","text":"Zhiqiang Wei 0001"},{"@pid":"50/2484-27","text":"Lei Yang 0027"},{"@pid":"42/8146","text":"Derrick Wing Kwan Ng"},{"@pid":"50/567","text":"Jinhong Yuan"}]},"title":"On the Performance Gain of NOMA over OMA in Uplink Single-Cell Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WeiYNY18","doi":"10.1109/GLOCOM.2018.8647743","ee":"https://doi.org/10.1109/GLOCOM.2018.8647743","url":"https://dblp.org/rec/conf/globecom/WeiYNY18"}, "url":"URL#2567804" }, { "@score":"1", "@id":"2567805", "info":{"authors":{"author":[{"@pid":"12/2554-1","text":"Lu Wei 0001"},{"@pid":"95/7469-1","text":"Zhong Zheng 0001"},{"@pid":"86/5178","text":"Hamid Gharavi"}]},"title":"Exact Moments of Mutual Information of Jacobi MIMO Channels in High-SNR Regime.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WeiZG18","doi":"10.1109/GLOCOM.2018.8647267","ee":"https://doi.org/10.1109/GLOCOM.2018.8647267","url":"https://dblp.org/rec/conf/globecom/WeiZG18"}, "url":"URL#2567805" }, { "@score":"1", "@id":"2567806", "info":{"authors":{"author":[{"@pid":"138/5950","text":"Shengjun Wei"},{"@pid":"06/5514","text":"Hao Zhong"},{"@pid":"177/0901","text":"Chun Shan"},{"@pid":"67/804","text":"Lin Ye"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Vulnerability Prediction Based on Weighted Software Network for Secure Software Building.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WeiZSYDG18","doi":"10.1109/GLOCOM.2018.8647583","ee":"https://doi.org/10.1109/GLOCOM.2018.8647583","url":"https://dblp.org/rec/conf/globecom/WeiZSYDG18"}, "url":"URL#2567806" }, { "@score":"1", "@id":"2567807", "info":{"authors":{"author":[{"@pid":"88/10359","text":"Fuxi Wen"},{"@pid":"133/8555","text":"Nil Garcia"},{"@pid":"154/4388","text":"Josef Kulmer"},{"@pid":"55/3603","text":"Klaus Witrisal"},{"@pid":"42/1188","text":"Henk Wymeersch"}]},"title":"Tensor Decomposition Based Beamspace ESPRIT for Millimeter Wave MIMO Channel Estimation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WenGKWW18","doi":"10.1109/GLOCOM.2018.8647176","ee":"https://doi.org/10.1109/GLOCOM.2018.8647176","url":"https://dblp.org/rec/conf/globecom/WenGKWW18"}, "url":"URL#2567807" }, { "@score":"1", "@id":"2567808", "info":{"authors":{"author":[{"@pid":"51/5171","text":"Richard D. Wesel"},{"@pid":"157/3922","text":"Nathan Wong"},{"@pid":"204/4270","text":"Alexander M. Baldauf"},{"@pid":"236/2850","text":"Adam Belhouchat"},{"@pid":"83/7255","text":"Anoosheh Heidarzadeh"},{"@pid":"00/3050","text":"Jean-François Chamberland"}]},"title":"Transmission Lengths That Maximize Throughput of Variable-Length Coding & ACK/NACK Feedback.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WeselWBBHC18","doi":"10.1109/GLOCOM.2018.8647619","ee":"https://doi.org/10.1109/GLOCOM.2018.8647619","url":"https://dblp.org/rec/conf/globecom/WeselWBBHC18"}, "url":"URL#2567808" }, { "@score":"1", "@id":"2567809", "info":{"authors":{"author":[{"@pid":"168/0825","text":"Wayan Wicke"},{"@pid":"209/9536","text":"Tobias Schwering"},{"@pid":"144/7684","text":"Arman Ahmadzadeh"},{"@pid":"39/10518","text":"Vahid Jamali"},{"@pid":"92/10836","text":"Adam Noel"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Modeling Duct Flow for Molecular Communication.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WickeSAJNS18","doi":"10.1109/GLOCOM.2018.8647632","ee":"https://doi.org/10.1109/GLOCOM.2018.8647632","url":"https://dblp.org/rec/conf/globecom/WickeSAJNS18"}, "url":"URL#2567809" }, { "@score":"1", "@id":"2567810", "info":{"authors":{"author":[{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"48/4792-23","text":"Yang Chen 0023"},{"@pid":"134/9388","text":"Huanyang Zheng"}]},"title":"Approximation Algorithms for Dependency-Aware Rule-Caching in Software-Defined Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuCZ18","doi":"10.1109/GLOCOM.2018.8647259","ee":"https://doi.org/10.1109/GLOCOM.2018.8647259","url":"https://dblp.org/rec/conf/globecom/WuCZ18"}, "url":"URL#2567810" }, { "@score":"1", "@id":"2567811", "info":{"authors":{"author":[{"@pid":"54/4158-9","text":"Qiong Wu 0009"},{"@pid":"83/6331-4","text":"Xu Chen 0004"},{"@pid":"04/2090-6","text":"Zhi Zhou 0006"},{"@pid":"01/5394-9","text":"Liang Chen 0009"}]},"title":"User-Centric Location Prediction in Mobile Social Networks: A Factor Graph Learning Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuCZC18","doi":"10.1109/GLOCOM.2018.8648043","ee":"https://doi.org/10.1109/GLOCOM.2018.8648043","url":"https://dblp.org/rec/conf/globecom/WuCZC18"}, "url":"URL#2567811" }, { "@score":"1", "@id":"2567812", "info":{"authors":{"author":[{"@pid":"73/9469","text":"Guodong Wu"},{"@pid":"16/1278-1","text":"Chao Dong 0001"},{"@pid":"115/6316","text":"Aijing Li"},{"@pid":"64/5666-38","text":"Lei Zhang 0038"},{"@pid":"00/638","text":"Qihui Wu"}]},"title":"FM-MAC: A Multi-Channel MAC Protocol for FANETs with Directional Antenna.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuDLZW18","doi":"10.1109/GLOCOM.2018.8648025","ee":"https://doi.org/10.1109/GLOCOM.2018.8648025","url":"https://dblp.org/rec/conf/globecom/WuDLZW18"}, "url":"URL#2567812" }, { "@score":"1", "@id":"2567813", "info":{"authors":{"author":[{"@pid":"66/3531","text":"Hongying Wu"},{"@pid":"63/7178","text":"Ronghui Hou"},{"@pid":"35/892","text":"Bo Sun"}]},"title":"A Cross-Layer OBSS Interference Management Scheme for High Efficiency WLAN.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WuHS18","doi":"10.1109/GLOCOM.2018.8647384","ee":"https://doi.org/10.1109/GLOCOM.2018.8647384","url":"https://dblp.org/rec/conf/globecom/WuHS18"}, "url":"URL#2567813" }, { "@score":"1", "@id":"2567818", "info":{"authors":{"author":[{"@pid":"51/1027","text":"Guowei Wu"},{"@pid":"63/4989-4","text":"Likun Wang 0004"},{"@pid":"05/8410","text":"Zichuan Xu"},{"@pid":"37/752-1","text":"Lin Yao 0001"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuWXYO18","doi":"10.1109/GLOCOM.2018.8648015","ee":"https://doi.org/10.1109/GLOCOM.2018.8648015","url":"https://dblp.org/rec/conf/globecom/WuWXYO18"}, "url":"URL#2567818" }, { "@score":"1", "@id":"2567819", "info":{"authors":{"author":[{"@pid":"31/8675","text":"Huaqing Wu"},{"@pid":"96/8862-1","text":"Wenchao Xu 0001"},{"@pid":"220/4030","text":"Jiayin Chen"},{"@pid":"58/6810-39","text":"Li Wang 0039"},{"@pid":"s/XueminShen","text":"Xuemin Shen"}]},"title":"Matching-Based Content Caching in Heterogeneous Vehicular Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuXCWS18","doi":"10.1109/GLOCOM.2018.8647134","ee":"https://doi.org/10.1109/GLOCOM.2018.8647134","url":"https://dblp.org/rec/conf/globecom/WuXCWS18"}, "url":"URL#2567819" }, { "@score":"1", "@id":"2567820", "info":{"authors":{"author":[{"@pid":"150/9712","text":"Qingqing Wu"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"}]},"title":"Intelligent Reflecting Surface Enhanced Wireless Network: Joint Active and Passive Beamforming Design.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuZ18","doi":"10.1109/GLOCOM.2018.8647620","ee":"https://doi.org/10.1109/GLOCOM.2018.8647620","url":"https://dblp.org/rec/conf/globecom/WuZ18"}, "url":"URL#2567820" }, { "@score":"1", "@id":"2567822", "info":{"authors":{"author":[{"@pid":"168/2850","text":"Xiaohuan Wu"},{"@pid":"62/1102","text":"Wei-Ping Zhu 0001"},{"@pid":"73/1685-1","text":"Min Lin 0001"},{"@pid":"89/5901-6","text":"Jun Yan 0006"}]},"title":"Joint Doppler and Channel Estimation with Nested Arrays for Millimeter Wave Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuZLY18","doi":"10.1109/GLOCOM.2018.8647701","ee":"https://doi.org/10.1109/GLOCOM.2018.8647701","url":"https://dblp.org/rec/conf/globecom/WuZLY18"}, "url":"URL#2567822" }, { "@score":"1", "@id":"2567823", "info":{"authors":{"author":[{"@pid":"195/8067","text":"Nanmiao Wu"},{"@pid":"20/4512","text":"Xiangwei Zhou"},{"@pid":"57/988","text":"Mingxuan Sun"}]},"title":"Incentive Mechanisms and Influence of Negotiation Power in Multi-Relay Cooperative Wireless Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/WuZS18","doi":"10.1109/GLOCOM.2018.8648048","ee":"https://doi.org/10.1109/GLOCOM.2018.8648048","url":"https://dblp.org/rec/conf/globecom/WuZS18"}, "url":"URL#2567823" }, { "@score":"1", "@id":"2567824", "info":{"authors":{"author":[{"@pid":"42/1188","text":"Henk Wymeersch"},{"@pid":"133/8555","text":"Nil Garcia"},{"@pid":"118/2462","text":"Hyowon Kim"},{"@pid":"88/6407","text":"Gonzalo Seco-Granados"},{"@pid":"16/5689-1","text":"Sunwoo Kim 0001"},{"@pid":"88/10359","text":"Fuxi Wen"},{"@pid":"129/1476","text":"Markus Fröhle"}]},"title":"5G mm Wave Downlink Vehicular Positioning.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/WymeerschGKSKWF18","doi":"10.1109/GLOCOM.2018.8647275","ee":"https://doi.org/10.1109/GLOCOM.2018.8647275","url":"https://dblp.org/rec/conf/globecom/WymeerschGKSKWF18"}, "url":"URL#2567824" }, { "@score":"1", "@id":"2567825", "info":{"authors":{"author":[{"@pid":"191/2538","text":"Meng Xi"},{"@pid":"20/3894-1","text":"Jun Wu 0001"},{"@pid":"93/3389-1","text":"Jianhua Li 0001"},{"@pid":"176/5848","text":"Gaolei Li"}]},"title":"Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XiWLL18","doi":"10.1109/GLOCOM.2018.8647325","ee":"https://doi.org/10.1109/GLOCOM.2018.8647325","url":"https://dblp.org/rec/conf/globecom/XiWLL18"}, "url":"URL#2567825" }, { "@score":"1", "@id":"2567826", "info":{"authors":{"author":[{"@pid":"176/0053","text":"Teng Xi"},{"@pid":"80/4406","text":"Wendong Wang"},{"@pid":"32/5495-8","text":"Ye Tian 0008"},{"@pid":"46/5223-2","text":"Hui Gao 0002"}]},"title":"Mutual Information Maximization for Collaborative Mobile Sensing with Calibration Constraint.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XiWTG18","doi":"10.1109/GLOCOM.2018.8647285","ee":"https://doi.org/10.1109/GLOCOM.2018.8647285","url":"https://dblp.org/rec/conf/globecom/XiWTG18"}, "url":"URL#2567826" }, { "@score":"1", "@id":"2567827", "info":{"authors":{"author":[{"@pid":"133/5336-1","text":"Chong Xiang 0001"},{"@pid":"199/3661","text":"Qingrong Chen"},{"@pid":"166/1912","text":"Minhui Xue"},{"@pid":"22/5702","text":"Haojin Zhu"}]},"title":"APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XiangCXZ18","doi":"10.1109/GLOCOM.2018.8647508","ee":"https://doi.org/10.1109/GLOCOM.2018.8647508","url":"https://dblp.org/rec/conf/globecom/XiangCXZ18"}, "url":"URL#2567827" }, { "@score":"1", "@id":"2567828", "info":{"authors":{"author":[{"@pid":"236/2927","text":"Zhongcheng Xiao"},{"@pid":"181/2330","text":"Bin Gao"},{"@pid":"44/9804-2","text":"Sicong Liu 0002"},{"@pid":"x/LiangXiao3","text":"Liang Xiao 0003"}]},"title":"Learning Based Power Control for mmWave Massive MIMO against Jamming.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XiaoGLX18","doi":"10.1109/GLOCOM.2018.8647173","ee":"https://doi.org/10.1109/GLOCOM.2018.8647173","url":"https://dblp.org/rec/conf/globecom/XiaoGLX18"}, "url":"URL#2567828" }, { "@score":"1", "@id":"2567829", "info":{"authors":{"author":[{"@pid":"151/6226","text":"Chiyang Xiao"},{"@pid":"00/2446-1","text":"Jie Zeng 0001"},{"@pid":"39/3711-2","text":"Bei Liu 0002"},{"@pid":"54/3643-1","text":"Xin Su 0001"},{"@pid":"02/736-1","text":"Jing Wang 0001"}]},"title":"Cross-Layer Power Control for Uplink NOMA in IoT Applications with Statistical Delay Constraints.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XiaoZLSW18","doi":"10.1109/GLOCOM.2018.8647452","ee":"https://doi.org/10.1109/GLOCOM.2018.8647452","url":"https://dblp.org/rec/conf/globecom/XiaoZLSW18"}, "url":"URL#2567829" }, { "@score":"1", "@id":"2567830", "info":{"authors":{"author":[{"@pid":"203/9483","text":"Jiandong Xie"},{"@pid":"175/2475","text":"Sa Xiao"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"58/6810-24","text":"Li Wang 0024"}]},"title":"Throughput-Aware Joint Route-Access Network Selection in Vehicular Communications.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XieXLW18","doi":"10.1109/GLOCOM.2018.8647319","ee":"https://doi.org/10.1109/GLOCOM.2018.8647319","url":"https://dblp.org/rec/conf/globecom/XieXLW18"}, "url":"URL#2567830" }, { "@score":"1", "@id":"2567832", "info":{"authors":{"author":[{"@pid":"185/0983","text":"Yunchou Xing"},{"@pid":"07/2123","text":"Theodore S. Rappaport"}]},"title":"Propagation Measurement System and Approach at 140 GHz-Moving to 6G and Above 100 GHz.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XingR18","doi":"10.1109/GLOCOM.2018.8647921","ee":"https://doi.org/10.1109/GLOCOM.2018.8647921","url":"https://dblp.org/rec/conf/globecom/XingR18"}, "url":"URL#2567832" }, { "@score":"1", "@id":"2567833", "info":{"authors":{"author":[{"@pid":"174/9863","text":"Zehui Xiong"},{"@pid":"199/1893","text":"Shaohan Feng"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"37/1304-1","text":"Ping Wang 0001"},{"@pid":"84/3398","text":"Amir Leshem"},{"@pid":"06/6785-25","text":"Yang Zhang 0025"}]},"title":"Game Theoretic Analysis for Joint Sponsored and Edge Caching Content Service Market.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XiongFNWLZ18","doi":"10.1109/GLOCOM.2018.8647436","ee":"https://doi.org/10.1109/GLOCOM.2018.8647436","url":"https://dblp.org/rec/conf/globecom/XiongFNWLZ18"}, "url":"URL#2567833" }, { "@score":"1", "@id":"2567836", "info":{"authors":{"author":[{"@pid":"62/8593","text":"Yanqing Xu"},{"@pid":"182/7428","text":"Donghong Cai"},{"@pid":"74/3719-5","text":"Fang Fang 0005"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"},{"@pid":"48/4825-4","text":"Chao Shen 0004"},{"@pid":"35/3474","text":"Gang Zhu"}]},"title":"Outage Analysis and Power Allocation for HARQ-CC Enabled NOMA Downlink Transmission.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XuCFDSZ18","doi":"10.1109/GLOCOM.2018.8647914","ee":"https://doi.org/10.1109/GLOCOM.2018.8647914","url":"https://dblp.org/rec/conf/globecom/XuCFDSZ18"}, "url":"URL#2567836" }, { "@score":"1", "@id":"2567839", "info":{"authors":{"author":[{"@pid":"202/0637","text":"Junhong Xu"},{"@pid":"81/4578","text":"Qiwei Liu"},{"@pid":"206/6471","text":"Hanqing Guo"},{"@pid":"225/5252","text":"Aaron Kageza"},{"@pid":"225/5201","text":"Saeed AlQarni"},{"@pid":"05/3879","text":"Shaoen Wu"}]},"title":"Shared Multi-Task Imitation Learning for Indoor Self-Navigation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XuLGKAW18","doi":"10.1109/GLOCOM.2018.8647614","ee":"https://doi.org/10.1109/GLOCOM.2018.8647614","url":"https://dblp.org/rec/conf/globecom/XuLGKAW18"}, "url":"URL#2567839" }, { "@score":"1", "@id":"2567841", "info":{"authors":{"author":[{"@pid":"43/6008-3","text":"Hao Xu 0003"},{"@pid":"132/8058","text":"Cunhua Pan"},{"@pid":"32/1213-1","text":"Wei Xu 0001"},{"@pid":"198/7100-1","text":"Jianfeng Shi 0001"},{"@pid":"99/311-1","text":"Ming Chen 0001"},{"@pid":"61/3443","text":"Wei Heng"}]},"title":"Improving Wireless Physical Layer Security via D2D Communication.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XuPXSCH18","doi":"10.1109/GLOCOM.2018.8647915","ee":"https://doi.org/10.1109/GLOCOM.2018.8647915","url":"https://dblp.org/rec/conf/globecom/XuPXSCH18"}, "url":"URL#2567841" }, { "@score":"1", "@id":"2567842", "info":{"authors":{"author":[{"@pid":"69/9079","text":"Shengjie Xu"},{"@pid":"84/4625-1","text":"Yi Qian 0001"},{"@pid":"43/3601","text":"Rose Qingyang Hu"}]},"title":"Privacy-Preserving Data Preprocessing for Fog Computing in 5G Network Security.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XuQH18","doi":"10.1109/GLOCOM.2018.8647912","ee":"https://doi.org/10.1109/GLOCOM.2018.8647912","url":"https://dblp.org/rec/conf/globecom/XuQH18"}, "url":"URL#2567842" }, { "@score":"1", "@id":"2567843", "info":{"authors":{"author":[{"@pid":"81/5941-7","text":"Qian Xu 0007"},{"@pid":"28/2359","text":"Pinyi Ren"}]},"title":"Secrecy Energy Efficiency of Massive MIMO AF Relaying System with Low-Resolution ADCs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XuR18","doi":"10.1109/GLOCOM.2018.8647772","ee":"https://doi.org/10.1109/GLOCOM.2018.8647772","url":"https://dblp.org/rec/conf/globecom/XuR18"}, "url":"URL#2567843" }, { "@score":"1", "@id":"2567845", "info":{"authors":{"author":[{"@pid":"90/514-25","text":"Jun Xu 0025"},{"@pid":"122/5231","text":"Gürkan Solmaz"},{"@pid":"150/5734","text":"Rouhollah Rahmatizadeh"},{"@pid":"b/LadislauBoloni","text":"Ladislau Bölöni"},{"@pid":"15/5766","text":"Damla Turgut"}]},"title":"Providing Distribution Estimation for Animal Tracking with Unmanned Aerial Vehicles.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XuSRBT18","doi":"10.1109/GLOCOM.2018.8647784","ee":"https://doi.org/10.1109/GLOCOM.2018.8647784","url":"https://dblp.org/rec/conf/globecom/XuSRBT18"}, "url":"URL#2567845" }, { "@score":"1", "@id":"2567846", "info":{"authors":{"author":[{"@pid":"206/6956","text":"Xianzhe Xu"},{"@pid":"85/4712","text":"Meixia Tao"}]},"title":"Collaborative Multi-Agent Reinforcement Learning of Caching Optimization in Small-Cell Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XuT18","doi":"10.1109/GLOCOM.2018.8647341","ee":"https://doi.org/10.1109/GLOCOM.2018.8647341","url":"https://dblp.org/rec/conf/globecom/XuT18"}, "url":"URL#2567846" }, { "@score":"1", "@id":"2567847", "info":{"authors":{"author":[{"@pid":"32/1213","text":"Wei Xu"},{"@pid":"225/5272","text":"Yuzhuo Wei"},{"@pid":"67/5781-1","text":"Ying Cui 0001"},{"@pid":"40/6686-2","text":"Zhi Liu 0002"}]},"title":"Energy-Efficient Multi-View Video Transmission with View Synthesis-Enabled Multicast.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XuWCL18","doi":"10.1109/GLOCOM.2018.8648001","ee":"https://doi.org/10.1109/GLOCOM.2018.8648001","url":"https://dblp.org/rec/conf/globecom/XuWCL18"}, "url":"URL#2567847" }, { "@score":"1", "@id":"2567848", "info":{"authors":{"author":[{"@pid":"96/8862-1","text":"Wenchao Xu 0001"},{"@pid":"31/8675","text":"Huaqing Wu"},{"@pid":"220/4030","text":"Jiayin Chen"},{"@pid":"159/5790","text":"Weisen Shi"},{"@pid":"14/8431","text":"Haibo Zhou"},{"@pid":"73/8540","text":"Nan Cheng"},{"@pid":"s/XueminShen","text":"Xuemin Sherman Shen"}]},"title":"ViFi: Vehicle-to-Vehicle Assisted Traffic Offloading via Roadside WiFi Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/XuWCSZCS18","doi":"10.1109/GLOCOM.2018.8647650","ee":"https://doi.org/10.1109/GLOCOM.2018.8647650","url":"https://dblp.org/rec/conf/globecom/XuWCSZCS18"}, "url":"URL#2567848" }, { "@score":"1", "@id":"2567849", "info":{"authors":{"author":[{"@pid":"33/8397","text":"Wenwen Xu"},{"@pid":"74/8792-2","text":"Yichen Wang 0002"},{"@pid":"12/5838-55","text":"Tao Wang 0055"}]},"title":"QoS-Driven Subchannel and Power Allocation for Security-Aware D2D Underlaying Cellular Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XuWW18","doi":"10.1109/GLOCOM.2018.8647958","ee":"https://doi.org/10.1109/GLOCOM.2018.8647958","url":"https://dblp.org/rec/conf/globecom/XuWW18"}, "url":"URL#2567849" }, { "@score":"1", "@id":"2567851", "info":{"authors":{"author":[{"@pid":"14/5580","text":"Yi Xu"},{"@pid":"65/95","text":"Du Xu"}]},"title":"Maximizing Profit of Network InP by Cross-Priority Traffic Engineering.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XuX18","doi":"10.1109/GLOCOM.2018.8647722","ee":"https://doi.org/10.1109/GLOCOM.2018.8647722","url":"https://dblp.org/rec/conf/globecom/XuX18"}, "url":"URL#2567851" }, { "@score":"1", "@id":"2567852", "info":{"authors":{"author":[{"@pid":"210/0339","text":"Yuhan Xue"},{"@pid":"152/6266","text":"Shengru Li"},{"@pid":"51/4757-3","text":"Kai Han 0003"},{"@pid":"65/10574","text":"Sicheng Zhao"},{"@pid":"185/7317","text":"Huibai Huang"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"62/9980","text":"Zuqing Zhu"}]},"title":"Virtualization of Table Resources in Programmable Data Plane with Global Consideration.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XueLHZHYZ18","doi":"10.1109/GLOCOM.2018.8647300","ee":"https://doi.org/10.1109/GLOCOM.2018.8647300","url":"https://dblp.org/rec/conf/globecom/XueLHZHYZ18"}, "url":"URL#2567852" }, { "@score":"1", "@id":"2567853", "info":{"authors":{"author":[{"@pid":"221/1078","text":"Yijie Xun"},{"@pid":"40/6246-1","text":"Jiajia Liu 0001"},{"@pid":"38/3012","text":"Jing Ning"},{"@pid":"22/1887","text":"Haibin Zhang"}]},"title":"An Experimental Study Towards the In-Vehicle Network of Intelligent and Connected Vehicles.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/XunLNZ18","doi":"10.1109/GLOCOM.2018.8647571","ee":"https://doi.org/10.1109/GLOCOM.2018.8647571","url":"https://dblp.org/rec/conf/globecom/XunLNZ18"}, "url":"URL#2567853" }, { "@score":"1", "@id":"2567854", "info":{"authors":{"author":[{"@pid":"183/1727","text":"Louiza Yala"},{"@pid":"24/4899","text":"Pantelis A. Frangoudis"},{"@pid":"37/6589","text":"Adlen Ksentini"}]},"title":"Latency and Availability Driven VNF Placement in a MEC-NFV Environment.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YalaFK18","doi":"10.1109/GLOCOM.2018.8647858","ee":"https://doi.org/10.1109/GLOCOM.2018.8647858","url":"https://dblp.org/rec/conf/globecom/YalaFK18"}, "url":"URL#2567854" }, { "@score":"1", "@id":"2567855", "info":{"authors":{"author":[{"@pid":"84/1962","text":"Yoshinobu Yamada"},{"@pid":"56/6932","text":"Ryoichi Shinkuma"},{"@pid":"35/3895","text":"Takehiro Sato"},{"@pid":"72/1700","text":"Eiji Oki"}]},"title":"Feature-Selection Based Data Prioritization in Mobile Traffic Prediction Using Machine Learning.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YamadaSSO18","doi":"10.1109/GLOCOM.2018.8647627","ee":"https://doi.org/10.1109/GLOCOM.2018.8647627","url":"https://dblp.org/rec/conf/globecom/YamadaSSO18"}, "url":"URL#2567855" }, { "@score":"1", "@id":"2567856", "info":{"authors":{"author":[{"@pid":"03/954","text":"Kohei Yamamoto"},{"@pid":"45/10835","text":"Kentaroh Toyoda"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"}]},"title":"Non-Contact Heartbeat Detection by MUSIC with Discrete Cosine Transform-Based Parameter Adjustment.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YamamotoTO18","doi":"10.1109/GLOCOM.2018.8647250","ee":"https://doi.org/10.1109/GLOCOM.2018.8647250","url":"https://dblp.org/rec/conf/globecom/YamamotoTO18"}, "url":"URL#2567856" }, { "@score":"1", "@id":"2567857", "info":{"authors":{"author":[{"@pid":"13/3953","text":"Yan Yan"},{"@pid":"235/6419","text":"Pratheep Bondalapati"},{"@pid":"91/1861","text":"Abhishek Tiwari"},{"@pid":"236/3303","text":"Chiyun Xia"},{"@pid":"236/3074","text":"Andy Cashion"},{"@pid":"76/5684","text":"Dawei Zhang"},{"@pid":"40/4498","text":"Qi Tang"},{"@pid":"53/6703","text":"Michael Reed"}]},"title":"11-Gbps Broadband Modem-Agnostic Line-of-Sight MIMO Over the Range of 13 km.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YanBTXCZTR18","doi":"10.1109/GLOCOM.2018.8647462","ee":"https://doi.org/10.1109/GLOCOM.2018.8647462","url":"https://dblp.org/rec/conf/globecom/YanBTXCZTR18"}, "url":"URL#2567857" }, { "@score":"1", "@id":"2567858", "info":{"authors":{"author":[{"@pid":"18/3055","text":"Jia Yan"},{"@pid":"79/8966","text":"Suzhi Bi"},{"@pid":"80/3143","text":"Ying-Jun Angela Zhang"}]},"title":"Optimal Offloading and Resource Allocation in Mobile-Edge Computing with Inter-User Task Dependency.","venue":"GLOBECOM","pages":"1-8","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YanBZ18","doi":"10.1109/GLOCOM.2018.8647523","ee":"https://doi.org/10.1109/GLOCOM.2018.8647523","url":"https://dblp.org/rec/conf/globecom/YanBZ18"}, "url":"URL#2567858" }, { "@score":"1", "@id":"2567859", "info":{"authors":{"author":[{"@pid":"69/452-5","text":"Qi Yan 0005"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"},{"@pid":"46/2005-4","text":"Ning Wang 0004"},{"@pid":"01/4301","text":"Lixin Li"}]},"title":"An Efficient Two-User Multicast Pushing Policy for Cache Hit Ratio Maximization.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YanCWL18","doi":"10.1109/GLOCOM.2018.8647238","ee":"https://doi.org/10.1109/GLOCOM.2018.8647238","url":"https://dblp.org/rec/conf/globecom/YanCWL18"}, "url":"URL#2567859" }, { "@score":"1", "@id":"2567861", "info":{"authors":{"author":[{"@pid":"210/6145","text":"Dongliang Yan"},{"@pid":"w/RuiWang1","text":"Rui Wang 0001"},{"@pid":"15/2420","text":"Erwu Liu"},{"@pid":"221/2376","text":"Qitong Hou"}]},"title":"Robust Beamforming Optimization for Downlink Cloud Radio Access Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YanWLH18","doi":"10.1109/GLOCOM.2018.8647981","ee":"https://doi.org/10.1109/GLOCOM.2018.8647981","url":"https://dblp.org/rec/conf/globecom/YanWLH18"}, "url":"URL#2567861" }, { "@score":"1", "@id":"2567862", "info":{"authors":{"author":[{"@pid":"194/6753","text":"Ruidong Yan"},{"@pid":"90/8098-2","text":"Yuqing Zhu 0002"},{"@pid":"63/1296-1","text":"Deying Li 0001"},{"@pid":"04/2124","text":"Yongcai Wang"},{"@pid":"04/1620","text":"Wenping Chen"}]},"title":"Minimum Cost Stable Outcome in Exchange Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YanZLWC18","doi":"10.1109/GLOCOM.2018.8648060","ee":"https://doi.org/10.1109/GLOCOM.2018.8648060","url":"https://dblp.org/rec/conf/globecom/YanZLWC18"}, "url":"URL#2567862" }, { "@score":"1", "@id":"2567864", "info":{"authors":{"author":[{"@pid":"37/1091-5","text":"Yan Yang 0005"},{"@pid":"128/3965","text":"Shuping Dang"},{"@pid":"06/868","text":"Yejun He"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Markov Decision Process Based Pilot Pattern Optimization for 5G V2X Communications.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YangDHG18","doi":"10.1109/GLOCOM.2018.8647515","ee":"https://doi.org/10.1109/GLOCOM.2018.8647515","url":"https://dblp.org/rec/conf/globecom/YangDHG18"}, "url":"URL#2567864" }, { "@score":"1", "@id":"2567866", "info":{"authors":{"author":[{"@pid":"46/2248-1","text":"Zhong Yang 0001"},{"@pid":"93/8541","text":"Yuanwei Liu"},{"@pid":"79/5815-2","text":"Yue Chen 0002"}]},"title":"Q-Learning for Content Placement in Wireless Cooperative Caching.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangLC18","doi":"10.1109/GLOCOM.2018.8647993","ee":"https://doi.org/10.1109/GLOCOM.2018.8647993","url":"https://dblp.org/rec/conf/globecom/YangLC18"}, "url":"URL#2567866" }, { "@score":"1", "@id":"2567867", "info":{"authors":{"author":[{"@pid":"86/8969","text":"Ruizhe Yang"},{"@pid":"97/339","text":"Bo Lin"},{"@pid":"16/6654","text":"Fei Richard Yu"},{"@pid":"11/8605","text":"Yinglei Teng"},{"@pid":"39/731","text":"Yanhua Zhang"}]},"title":"A Dynamic Pilot and Data Power Allocation for TDD Massive MIMO Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangLYTZ18","doi":"10.1109/GLOCOM.2018.8647568","ee":"https://doi.org/10.1109/GLOCOM.2018.8647568","url":"https://dblp.org/rec/conf/globecom/YangLYTZ18"}, "url":"URL#2567867" }, { "@score":"1", "@id":"2567868", "info":{"authors":{"author":[{"@pid":"47/5740","text":"Hong Yang"},{"@pid":"60/4037","text":"Hien Quoc Ngo"},{"@pid":"76/3752","text":"Erik G. Larsson"}]},"title":"Multi-Cell Massive MIMO in LoS.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangNL18","doi":"10.1109/GLOCOM.2018.8647891","ee":"https://doi.org/10.1109/GLOCOM.2018.8647891","url":"https://dblp.org/rec/conf/globecom/YangNL18"}, "url":"URL#2567868" }, { "@score":"1", "@id":"2567869", "info":{"authors":{"author":[{"@pid":"37/6260-2","text":"Long Yang 0002"},{"@pid":"87/3074","text":"Qiang Ni"},{"@pid":"42/8073","text":"Lu Lv"},{"@pid":"49/6002-2","text":"Jian Chen 0002"},{"@pid":"172/0839","text":"Xuan Xue"},{"@pid":"04/1131-1","text":"Hailin Zhang 0001"},{"@pid":"15/5983-1","text":"Hai Jiang 0001"},{"@pid":"43/10099-1","text":"Jia Shi 0001"}]},"title":"Cooperative NOMA for Wireless Layered Multicast.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangNLCXZJS18","doi":"10.1109/GLOCOM.2018.8647790","ee":"https://doi.org/10.1109/GLOCOM.2018.8647790","url":"https://dblp.org/rec/conf/globecom/YangNLCXZJS18"}, "url":"URL#2567869" }, { "@score":"1", "@id":"2567870", "info":{"authors":{"author":[{"@pid":"194/3087","text":"Hengjie Yang"},{"@pid":"155/0677","text":"Sudarsan V. S. Ranganathan"},{"@pid":"51/5171","text":"Richard D. Wesel"}]},"title":"Serial List Viterbi Decoding with CRC: Managing Errors, Erasures, and Complexity.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangRW18","doi":"10.1109/GLOCOM.2018.8647589","ee":"https://doi.org/10.1109/GLOCOM.2018.8647589","url":"https://dblp.org/rec/conf/globecom/YangRW18"}, "url":"URL#2567870" }, { "@score":"1", "@id":"2567871", "info":{"authors":{"author":[{"@pid":"00/5867-25","text":"Chao Yang 0025"},{"@pid":"27/10801","text":"Xuyu Wang"},{"@pid":"52/3003","text":"Shiwen Mao"}]},"title":"AutoTag: Recurrent Variational Autoencoder for Unsupervised Apnea Detection with RFID Tags.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangWM18","doi":"10.1109/GLOCOM.2018.8648073","ee":"https://doi.org/10.1109/GLOCOM.2018.8648073","url":"https://dblp.org/rec/conf/globecom/YangWM18"}, "url":"URL#2567871" }, { "@score":"1", "@id":"2567872", "info":{"authors":{"author":[{"@pid":"63/10551","text":"An Yang"},{"@pid":"144/1669","text":"Xiaoshan Wang"},{"@pid":"16/1656","text":"Yuyan Sun"},{"@pid":"87/3691","text":"Yan Hu"},{"@pid":"19/6306","text":"Zhiqiang Shi"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YangWSHSS18","doi":"10.1109/GLOCOM.2018.8648131","ee":"https://doi.org/10.1109/GLOCOM.2018.8648131","url":"https://dblp.org/rec/conf/globecom/YangWSHSS18"}, "url":"URL#2567872" }, { "@score":"1", "@id":"2567873", "info":{"authors":{"author":[{"@pid":"53/3019","text":"Guosheng Yang"},{"@pid":"w/JunWang5","text":"Jun Wang 0005"},{"@pid":"116/7214","text":"Guoyong Zhang"},{"@pid":"236/3364","text":"Xuanyu Lu"},{"@pid":"46/1212","text":"Shaoqian Li"}]},"title":"Optimal Memoryless Pre-Processing and Signal Detection for Impulsive Noise.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YangWZLL18","doi":"10.1109/GLOCOM.2018.8647903","ee":"https://doi.org/10.1109/GLOCOM.2018.8647903","url":"https://dblp.org/rec/conf/globecom/YangWZLL18"}, "url":"URL#2567873" }, { "@score":"1", "@id":"2567874", "info":{"authors":{"author":[{"@pid":"29/3081-72","text":"Fan Yang 0072"},{"@pid":"14/2062-1","text":"Wenjun Xu 0001"},{"@pid":"53/5898","text":"Chia-Han Lee"},{"@pid":"48/195-1","text":"Zhiyong Feng 0001"},{"@pid":"32/2368","text":"Jiaru Lin"}]},"title":"Joint Beamforming and Time Duration Optimization for Battery-Free-Multi-Antenna-Relay-Assisted WPCN.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangXLFL18","doi":"10.1109/GLOCOM.2018.8647656","ee":"https://doi.org/10.1109/GLOCOM.2018.8647656","url":"https://dblp.org/rec/conf/globecom/YangXLFL18"}, "url":"URL#2567874" }, { "@score":"1", "@id":"2567875", "info":{"authors":{"author":[{"@pid":"36/4658-5","text":"Gang Yang 0005"},{"@pid":"220/3269","text":"Dongdong Yuan"},{"@pid":"98/153","text":"Ying-Chang Liang"}]},"title":"Optimal Resource Allocation in Full-Duplex Ambient Backscatter Communication Networks for Green IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangYL18","doi":"10.1109/GLOCOM.2018.8648019","ee":"https://doi.org/10.1109/GLOCOM.2018.8648019","url":"https://dblp.org/rec/conf/globecom/YangYL18"}, "url":"URL#2567875" }, { "@score":"1", "@id":"2567877", "info":{"authors":{"author":[{"@pid":"48/450","text":"Yang Yang"},{"@pid":"157/9312","text":"Lidong Zhu"},{"@pid":"224/5251","text":"Zongmiao He"}]},"title":"An Interference-Free GFDM Transmission Scheme for Integrated Satellite-Terrestrial Communication.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangZH18","doi":"10.1109/GLOCOM.2018.8647235","ee":"https://doi.org/10.1109/GLOCOM.2018.8647235","url":"https://dblp.org/rec/conf/globecom/YangZH18"}, "url":"URL#2567877" }, { "@score":"1", "@id":"2567878", "info":{"authors":{"author":[{"@pid":"176/3974","text":"Bowen Yang"},{"@pid":"64/5666-35","text":"Lei Zhang 0035"},{"@pid":"50/1689","text":"Deli Qiao"},{"@pid":"25/5898-1","text":"Guodong Zhao 0001"},{"@pid":"25/1002","text":"Muhammad Ali Imran 0001"}]},"title":"Narrowband Internet of Things (NB-IoT) and LTE Systems Co-Existence Analysis.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YangZQZI18","doi":"10.1109/GLOCOM.2018.8647484","ee":"https://doi.org/10.1109/GLOCOM.2018.8647484","url":"https://dblp.org/rec/conf/globecom/YangZQZI18"}, "url":"URL#2567878" }, { "@score":"1", "@id":"2567879", "info":{"authors":{"author":[{"@pid":"150/5542","text":"Jingjing Yao"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Reliability-Aware Fog Resource Provisioning for Deadline-Driven IoT Services.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YaoA18","doi":"10.1109/GLOCOM.2018.8647378","ee":"https://doi.org/10.1109/GLOCOM.2018.8647378","url":"https://dblp.org/rec/conf/globecom/YaoA18"}, "url":"URL#2567879" }, { "@score":"1", "@id":"2567880", "info":{"authors":{"author":[{"@pid":"235/0718","text":"Guoqiang Yao"},{"@pid":"234/2641","text":"Guiwu Yang"},{"@pid":"07/6821","text":"Jianhao Hu"},{"@pid":"118/5221-2","text":"Chao Fei 0002"}]},"title":"A Low Complexity Expectation Propagation Detection for Massive MIMO System.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YaoYHF18","doi":"10.1109/GLOCOM.2018.8647172","ee":"https://doi.org/10.1109/GLOCOM.2018.8647172","url":"https://dblp.org/rec/conf/globecom/YaoYHF18"}, "url":"URL#2567880" }, { "@score":"1", "@id":"2567881", "info":{"authors":{"author":[{"@pid":"37/752-1","text":"Lin Yao 0001"},{"@pid":"68/2766-7","text":"Xin Zhao 0007"},{"@pid":"51/1027","text":"Guowei Wu"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"The Community Characteristic Based Controller Deployment Strategy for SDNs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YaoZWO18","doi":"10.1109/GLOCOM.2018.8647196","ee":"https://doi.org/10.1109/GLOCOM.2018.8647196","url":"https://dblp.org/rec/conf/globecom/YaoZWO18"}, "url":"URL#2567881" }, { "@score":"1", "@id":"2567882", "info":{"authors":{"author":[{"@pid":"236/3258","text":"Umair Yaqub"},{"@pid":"98/1677","text":"Sameh Sorour"}]},"title":"Multi-Objective Resource Optimization for Hierarchical Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YaqubS18","doi":"10.1109/GLOCOM.2018.8648109","ee":"https://doi.org/10.1109/GLOCOM.2018.8648109","url":"https://dblp.org/rec/conf/globecom/YaqubS18"}, "url":"URL#2567882" }, { "@score":"1", "@id":"2567884", "info":{"authors":{"author":[{"@pid":"129/0969-1","text":"Yu Ye 0001"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"},{"@pid":"33/6012","text":"Shahid Mumtaz"},{"@pid":"129/1024","text":"Jing Yue"},{"@pid":"92/7742","text":"Anwer Al-Dulaimi"}]},"title":"Analysis on Consistency of Content Update in Cache-Enabled Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YeXMYA18","doi":"10.1109/GLOCOM.2018.8647565","ee":"https://doi.org/10.1109/GLOCOM.2018.8647565","url":"https://dblp.org/rec/conf/globecom/YeXMYA18"}, "url":"URL#2567884" }, { "@score":"1", "@id":"2567886", "info":{"authors":{"author":[{"@pid":"150/5634","text":"Changyan Yi"},{"@pid":"72/3887-1","text":"Jun Cai 0001"}]},"title":"A Truthful Mechanism for Delay-Dependent Prioritized Medical Packet Transmission Scheduling.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YiC18","doi":"10.1109/GLOCOM.2018.8647507","ee":"https://doi.org/10.1109/GLOCOM.2018.8647507","url":"https://dblp.org/rec/conf/globecom/YiC18"}, "url":"URL#2567886" }, { "@score":"1", "@id":"2567887", "info":{"authors":{"author":[{"@pid":"211/7468","text":"Wenqiang Yi"},{"@pid":"93/8541","text":"Yuanwei Liu"},{"@pid":"33/2397","text":"Arumugam Nallanathan"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"A Unified Spatial Framework for Clustered UAV Networks Based on Stochastic Geometry.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YiLNK18","doi":"10.1109/GLOCOM.2018.8648138","ee":"https://doi.org/10.1109/GLOCOM.2018.8648138","url":"https://dblp.org/rec/conf/globecom/YiLNK18"}, "url":"URL#2567887" }, { "@score":"1", "@id":"2567888", "info":{"authors":{"author":[{"@pid":"60/7912-1","text":"Xiaoyan Yin 0001"},{"@pid":"50/10586","text":"Yanjiao Chen"},{"@pid":"236/3141","text":"Xiaoqian Mi"},{"@pid":"33/3535","text":"Hua Wang"},{"@pid":"236/3195","text":"Zhangyong Tang"},{"@pid":"95/6808","text":"Chen He"},{"@pid":"80/3909","text":"Dingyi Fang"}]},"title":"Time Context-Aware IPTV Program Recommendation Based on Tensor Learning.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YinCMWTHF18","doi":"10.1109/GLOCOM.2018.8647211","ee":"https://doi.org/10.1109/GLOCOM.2018.8647211","url":"https://dblp.org/rec/conf/globecom/YinCMWTHF18"}, "url":"URL#2567888" }, { "@score":"1", "@id":"2567889", "info":{"authors":{"author":[{"@pid":"156/5800","text":"Ziyan Yin"},{"@pid":"l/JunLi4","text":"Jun Li 0004"},{"@pid":"48/3462-1","text":"Ming Ding 0001"},{"@pid":"37/5972","text":"Fei Song"},{"@pid":"38/7211","text":"David López-Pérez"}]},"title":"Uplink Performance Analysis of Base Station Antenna Heights in Dense Cellular Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YinLDSL18","doi":"10.1109/GLOCOM.2018.8647345","ee":"https://doi.org/10.1109/GLOCOM.2018.8647345","url":"https://dblp.org/rec/conf/globecom/YinLDSL18"}, "url":"URL#2567889" }, { "@score":"1", "@id":"2567890", "info":{"authors":{"author":[{"@pid":"07/2864-1","text":"Rui Yin 0001"},{"@pid":"98/3049","text":"Yunfeng Zhang"},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Fundamental EE Tradeoff in LTE-U Based Small Cell Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YinZL18","doi":"10.1109/GLOCOM.2018.8647810","ee":"https://doi.org/10.1109/GLOCOM.2018.8647810","url":"https://dblp.org/rec/conf/globecom/YinZL18"}, "url":"URL#2567890" }, { "@score":"1", "@id":"2567891", "info":{"authors":{"author":[{"@pid":"172/4416","text":"Seong Ki Yoo"},{"@pid":"80/2847","text":"Simon L. Cotton"},{"@pid":"17/9507","text":"Paschalis C. Sofotasios"},{"@pid":"14/7881","text":"Sami Muhaidat"},{"@pid":"35/427","text":"Osamah S. Badarneh"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"Energy Detection-Based Spectrum Sensing over Fisher-Snedecor F Fading Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YooCSMBK18","doi":"10.1109/GLOCOM.2018.8647778","ee":"https://doi.org/10.1109/GLOCOM.2018.8647778","url":"https://dblp.org/rec/conf/globecom/YooCSMBK18"}, "url":"URL#2567891" }, { "@score":"1", "@id":"2567892", "info":{"authors":{"author":{"@pid":"28/1591","text":"Daisaburo Yoshioka"}},"title":"Security of Public-Key Cryptosystems Based on Chebyshev Polynomials over the Residue Ring Z/pkZ.","venue":"GLOBECOM","pages":"1-4","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Yoshioka18","doi":"10.1109/GLOCOM.2018.8647213","ee":"https://doi.org/10.1109/GLOCOM.2018.8647213","url":"https://dblp.org/rec/conf/globecom/Yoshioka18"}, "url":"URL#2567892" }, { "@score":"1", "@id":"2567893", "info":{"authors":{"author":[{"@pid":"129/0985","text":"Maram Bani Younes"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"}]},"title":"Toward a Smooth Vehicular Traffic at Round Road - Intersections§.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/YounesB18","doi":"10.1109/GLOCOM.2018.8647925","ee":"https://doi.org/10.1109/GLOCOM.2018.8647925","url":"https://dblp.org/rec/conf/globecom/YounesB18"}, "url":"URL#2567893" }, { "@score":"1", "@id":"2567894", "info":{"authors":{"author":[{"@pid":"212/1520","text":"Zhengxin Yu"},{"@pid":"88/1307-1","text":"Jia Hu 0001"},{"@pid":"96/3727","text":"Geyong Min"},{"@pid":"122/8079","text":"Haochuan Lu"},{"@pid":"89/887","text":"Zhiwei Zhao"},{"@pid":"59/10825","text":"Haozhe Wang"},{"@pid":"19/320","text":"Nektarios Georgalas"}]},"title":"Federated Learning Based Proactive Content Caching in Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YuHMLZWG18","doi":"10.1109/GLOCOM.2018.8647616","ee":"https://doi.org/10.1109/GLOCOM.2018.8647616","url":"https://dblp.org/rec/conf/globecom/YuHMLZWG18"}, "url":"URL#2567894" }, { "@score":"1", "@id":"2567895", "info":{"authors":{"author":[{"@pid":"67/3150","text":"Yifan Yu"},{"@pid":"223/5316","text":"Huazhang Lv"},{"@pid":"80/1035","text":"Dan Chen"}]},"title":"Towards the Seamless Integration of OTT CDN and Mobile Edge Computing System.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YuLC18","doi":"10.1109/GLOCOM.2018.8647347","ee":"https://doi.org/10.1109/GLOCOM.2018.8647347","url":"https://dblp.org/rec/conf/globecom/YuLC18"}, "url":"URL#2567895" }, { "@score":"1", "@id":"2567899", "info":{"authors":{"author":[{"@pid":"39/934","text":"Nuo Yu"},{"@pid":"231/6040","text":"Qingyuan Xie"},{"@pid":"120/6867","text":"Qiuyun Wang"},{"@pid":"d/HongWeiDu","text":"Hongwei Du 0001"},{"@pid":"65/4745","text":"Hejiao Huang"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"}]},"title":"Collaborative Service Placement for Mobile Edge Computing Applications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YuXWDHJ18","doi":"10.1109/GLOCOM.2018.8647338","ee":"https://doi.org/10.1109/GLOCOM.2018.8647338","url":"https://dblp.org/rec/conf/globecom/YuXWDHJ18"}, "url":"URL#2567899" }, { "@score":"1", "@id":"2567900", "info":{"authors":{"author":[{"@pid":"26/6190-4","text":"Hui Yu 0004"},{"@pid":"62/2814-1","text":"Jiahai Yang 0001"},{"@pid":"43/6355","text":"Carol J. Fung"}]},"title":"Elastic Network Service Chain with Fine-Grained Vertical Scaling.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YuYF18","doi":"10.1109/GLOCOM.2018.8648096","ee":"https://doi.org/10.1109/GLOCOM.2018.8648096","url":"https://dblp.org/rec/conf/globecom/YuYF18"}, "url":"URL#2567900" }, { "@score":"1", "@id":"2567902", "info":{"authors":{"author":[{"@pid":"213/8010","text":"Xuejing Yuan"},{"@pid":"145/7790","text":"Yuxuan Chen"},{"@pid":"184/6025","text":"Aohui Wang"},{"@pid":"c/KaiChen12","text":"Kai Chen 0012"},{"@pid":"65/3618","text":"Shengzhi Zhang"},{"@pid":"78/7690","text":"Heqing Huang"},{"@pid":"17/2811","text":"Ian M. Molloy"}]},"title":"All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YuanCWCZHM18","doi":"10.1109/GLOCOM.2018.8647762","ee":"https://doi.org/10.1109/GLOCOM.2018.8647762","url":"https://dblp.org/rec/conf/globecom/YuanCWCZHM18"}, "url":"URL#2567902" }, { "@score":"1", "@id":"2567903", "info":{"authors":{"author":[{"@pid":"71/9839","text":"Hang Yuan"},{"@pid":"72/10095","text":"Nan Yang 0006"},{"@pid":"17/2247-4","text":"Kai Yang 0004"},{"@pid":"65/8230-1","text":"Chong Han 0001"},{"@pid":"91/2709","text":"Jianping An"}]},"title":"Hybrid Beamforming for MIMO-OFDM Terahertz Wireless Systems over Frequency Selective Channels.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YuanYYHA18","doi":"10.1109/GLOCOM.2018.8647835","ee":"https://doi.org/10.1109/GLOCOM.2018.8647835","url":"https://dblp.org/rec/conf/globecom/YuanYYHA18"}, "url":"URL#2567903" }, { "@score":"1", "@id":"2567905", "info":{"authors":{"author":[{"@pid":"117/1741","text":"Qinggang Yue"},{"@pid":"172/5451","text":"Zupei Li"},{"@pid":"86/5355","text":"Chao Gao"},{"@pid":"82/2790-2","text":"Wei Yu 0002"},{"@pid":"49/2189","text":"Xinwen Fu"},{"@pid":"z/WeiZhao-1","text":"Wei Zhao 0001"}]},"title":"The Peeping Eye in the Sky.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/YueLGYFZ18","doi":"10.1109/GLOCOM.2018.8647787","ee":"https://doi.org/10.1109/GLOCOM.2018.8647787","url":"https://dblp.org/rec/conf/globecom/YueLGYFZ18"}, "url":"URL#2567905" }, { "@score":"1", "@id":"2567906", "info":{"authors":{"author":[{"@pid":"47/6124","text":"Flavio Zabini"},{"@pid":"17/5820","text":"Gianni Pasolini"},{"@pid":"73/2997","text":"Cristina De Castro"},{"@pid":"82/5840","text":"Oreste Andrisano"}]},"title":"On Molecular Communications via Diffusion with Multiple Transmitters and Multiple Receivers.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZabiniPCA18","doi":"10.1109/GLOCOM.2018.8648049","ee":"https://doi.org/10.1109/GLOCOM.2018.8648049","url":"https://dblp.org/rec/conf/globecom/ZabiniPCA18"}, "url":"URL#2567906" }, { "@score":"1", "@id":"2567907", "info":{"authors":{"author":[{"@pid":"139/5971","text":"Faheem Zafari"},{"@pid":"33/5448-8","text":"Jian Li 0008"},{"@pid":"04/2707","text":"Kin K. Leung"},{"@pid":"t/DonaldFTowsley","text":"Don Towsley"},{"@pid":"89/5072","text":"Ananthram Swami"}]},"title":"Optimal Energy Tradeoff Among Communication, Computation and Caching with QoI-Guarantee.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZafariLLTS18","doi":"10.1109/GLOCOM.2018.8647490","ee":"https://doi.org/10.1109/GLOCOM.2018.8647490","url":"https://dblp.org/rec/conf/globecom/ZafariLLTS18"}, "url":"URL#2567907" }, { "@score":"1", "@id":"2567908", "info":{"authors":{"author":[{"@pid":"213/7533","text":"Ehab Zaghloul"},{"@pid":"32/4638","text":"Tongtong Li"},{"@pid":"59/2180-1","text":"Jian Ren 0001"}]},"title":"An Attribute-Based Distributed Data Sharing Scheme.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZaghloulLR18","doi":"10.1109/GLOCOM.2018.8647167","ee":"https://doi.org/10.1109/GLOCOM.2018.8647167","url":"https://dblp.org/rec/conf/globecom/ZaghloulLR18"}, "url":"URL#2567908" }, { "@score":"1", "@id":"2567909", "info":{"authors":{"author":[{"@pid":"228/9059","text":"Selma Zamoum"},{"@pid":"47/2858","text":"Jérôme Lacan"},{"@pid":"61/7026","text":"Marie-Laure Boucheret"},{"@pid":"85/1969","text":"Mathieu Gineste"},{"@pid":"150/5570","text":"Jean-Baptiste Dupe"}]},"title":"Deterministic Distribution of Replicas Positions for Multiuser Random Transmissions in Satcoms.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZamoumLBGD18","doi":"10.1109/GLOCOM.2018.8647911","ee":"https://doi.org/10.1109/GLOCOM.2018.8647911","url":"https://dblp.org/rec/conf/globecom/ZamoumLBGD18"}, "url":"URL#2567909" }, { "@score":"1", "@id":"2567910", "info":{"authors":{"author":[{"@pid":"210/3814","text":"Alexandra Zayets"},{"@pid":"s/EckehardGSteinbach","text":"Eckehard G. Steinbach"}]},"title":"Low-Complexity Fingerprint Matching for Real-Time Indoor Localization Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZayetsS18","doi":"10.1109/GLOCOM.2018.8647529","ee":"https://doi.org/10.1109/GLOCOM.2018.8647529","url":"https://dblp.org/rec/conf/globecom/ZayetsS18"}, "url":"URL#2567910" }, { "@score":"1", "@id":"2567911", "info":{"authors":{"author":[{"@pid":"236/3196","text":"Ye-Yan Zeng"},{"@pid":"16/1480","text":"Bi-Ru Dai"}]},"title":"A Multi-Label Threshold Learning Framework for Propagation Algorithms on a Non-Feature Network.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZengD18","doi":"10.1109/GLOCOM.2018.8647303","ee":"https://doi.org/10.1109/GLOCOM.2018.8647303","url":"https://dblp.org/rec/conf/globecom/ZengD18"}, "url":"URL#2567911" }, { "@score":"1", "@id":"2567912", "info":{"authors":{"author":[{"@pid":"65/4787","text":"Yonghong Zeng"},{"@pid":"131/1871","text":"Yugang Ma"},{"@pid":"46/3348","text":"Sumei Sun"}]},"title":"Joint Radar-Communication: Low Complexity Algorithm and Self-Interference Cancellation.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZengMS18","doi":"10.1109/GLOCOM.2018.8647502","ee":"https://doi.org/10.1109/GLOCOM.2018.8647502","url":"https://dblp.org/rec/conf/globecom/ZengMS18"}, "url":"URL#2567912" }, { "@score":"1", "@id":"2567913", "info":{"authors":{"author":[{"@pid":"01/6205-1","text":"Yong Zeng 0001"},{"@pid":"37/5126-2","text":"Jie Xu 0002"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"}]},"title":"Rotary-Wing UAV Enabled Wireless Network: Trajectory Design and Resource Allocation.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZengXZ18","doi":"10.1109/GLOCOM.2018.8647595","ee":"https://doi.org/10.1109/GLOCOM.2018.8647595","url":"https://dblp.org/rec/conf/globecom/ZengXZ18"}, "url":"URL#2567913" }, { "@score":"1", "@id":"2567914", "info":{"authors":{"author":[{"@pid":"52/2761-2","text":"Ming Zeng 0002"},{"@pid":"98/8335","text":"Animesh Yadav"},{"@pid":"32/6803","text":"Octavia A. Dobre"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Energy-Efficient Power Allocation for Uplink NOMA.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZengYDP18","doi":"10.1109/GLOCOM.2018.8647478","ee":"https://doi.org/10.1109/GLOCOM.2018.8647478","url":"https://dblp.org/rec/conf/globecom/ZengYDP18"}, "url":"URL#2567914" }, { "@score":"1", "@id":"2567915", "info":{"authors":{"author":[{"@pid":"170/4425","text":"Haiyong Zeng"},{"@pid":"65/2899-1","text":"Xu Zhu 0001"},{"@pid":"88/9308","text":"Yufei Jiang"},{"@pid":"17/4972","text":"Yan Zuo"},{"@pid":"137/9869","text":"Zhongxiang Wei"},{"@pid":"51/6856-10","text":"Tong Wang 0010"}]},"title":"Fuzzy Logic Based Multi-Criterion User Selection and Resource Allocation for Green Coordinated NOMA.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZengZJZWW18","doi":"10.1109/GLOCOM.2018.8648101","ee":"https://doi.org/10.1109/GLOCOM.2018.8648101","url":"https://dblp.org/rec/conf/globecom/ZengZJZWW18"}, "url":"URL#2567915" }, { "@score":"1", "@id":"2567916", "info":{"authors":{"author":[{"@pid":"10/1103","text":"Yiming Zeng"},{"@pid":"203/0767","text":"Pengzhan Zhou"},{"@pid":"51/4433-1","text":"Ji Liu 0001"},{"@pid":"10/2031-1","text":"Yuanyuan Yang 0001"}]},"title":"Modeling Dishonest Behavior in Mobile Data Gathering Over Leasing Residential Sensor Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZengZLY18","doi":"10.1109/GLOCOM.2018.8647506","ee":"https://doi.org/10.1109/GLOCOM.2018.8647506","url":"https://dblp.org/rec/conf/globecom/ZengZLY18"}, "url":"URL#2567916" }, { "@score":"1", "@id":"2567917", "info":{"authors":{"author":[{"@pid":"236/2863","text":"Lanting Zha"},{"@pid":"150/5546","text":"Yansha Deng"},{"@pid":"92/10836","text":"Adam Noel"},{"@pid":"98/6377","text":"Maged Elkashlan"},{"@pid":"33/2397","text":"Arumugam Nallanathan"}]},"title":"Transceiver Observations in Asymmetric and Symmetric Diffusive Molecular Communication Systems.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhaDNEN18","doi":"10.1109/GLOCOM.2018.8648127","ee":"https://doi.org/10.1109/GLOCOM.2018.8648127","url":"https://dblp.org/rec/conf/globecom/ZhaDNEN18"}, "url":"URL#2567917" }, { "@score":"1", "@id":"2567918", "info":{"authors":{"author":[{"@pid":"205/6157","text":"Haoyang Zhai"},{"@pid":"222/5539","text":"Liting Yang"},{"@pid":"15/4179","text":"Tadashi Nakano"},{"@pid":"61/3234-16","text":"Qiang Liu 0016"},{"@pid":"63/1587-1","text":"Kun Yang 0001"}]},"title":"Bio-Inspired Design and Implementation of Mobile Molecular Communication Systems at the Macroscale.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhaiYNLY18","doi":"10.1109/GLOCOM.2018.8647802","ee":"https://doi.org/10.1109/GLOCOM.2018.8647802","url":"https://dblp.org/rec/conf/globecom/ZhaiYNLY18"}, "url":"URL#2567918" }, { "@score":"1", "@id":"2567919", "info":{"authors":{"author":{"@pid":"84/3637","text":"Zhenghao Zhang"}},"title":"Novel PRACH Scheme for 5G Networks Based on Analog Bloom Filter.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Zhang18","doi":"10.1109/GLOCOM.2018.8647961","ee":"https://doi.org/10.1109/GLOCOM.2018.8647961","url":"https://dblp.org/rec/conf/globecom/Zhang18"}, "url":"URL#2567919" }, { "@score":"1", "@id":"2567921", "info":{"authors":{"author":[{"@pid":"51/222","text":"Haiyang Zhang"},{"@pid":"65/7661","text":"Lingjie Duan"}]},"title":"Going beyond Secrecy Rate via Information Jamming.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangD18","doi":"10.1109/GLOCOM.2018.8647745","ee":"https://doi.org/10.1109/GLOCOM.2018.8647745","url":"https://dblp.org/rec/conf/globecom/ZhangD18"}, "url":"URL#2567921" }, { "@score":"1", "@id":"2567922", "info":{"authors":{"author":[{"@pid":"25/9133","text":"Yuyang Zhang"},{"@pid":"65/6687","text":"Ping Dong"},{"@pid":"43/5685-2","text":"Yong Yu 0002"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"98/3129","text":"Hongbin Luo"},{"@pid":"76/5177","text":"Tao Zheng"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"A Bignum Network Coding Scheme for Multipath Transmission in Vehicular Networks.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangDYDLZG18","doi":"10.1109/GLOCOM.2018.8647337","ee":"https://doi.org/10.1109/GLOCOM.2018.8647337","url":"https://dblp.org/rec/conf/globecom/ZhangDYDLZG18"}, "url":"URL#2567922" }, { "@score":"1", "@id":"2567923", "info":{"authors":{"author":[{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"236/2822","text":"Mengting Feng"},{"@pid":"53/6133","text":"Keping Long"},{"@pid":"13/5195","text":"George K. Karagiannidis"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks with Energy Harvesting.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangFLKL18","doi":"10.1109/GLOCOM.2018.8647140","ee":"https://doi.org/10.1109/GLOCOM.2018.8647140","url":"https://dblp.org/rec/conf/globecom/ZhangFLKL18"}, "url":"URL#2567923" }, { "@score":"1", "@id":"2567924", "info":{"authors":{"author":[{"@pid":"07/314-68","text":"Jian Zhang 0068"},{"@pid":"92/1327","text":"Cheng Gao"},{"@pid":"151/5896","text":"Liangyi Gong"},{"@pid":"220/1060","text":"Zhaojun Gu"},{"@pid":"46/2089","text":"Dapeng Man"},{"@pid":"56/2037-1","text":"Wu Yang 0001"},{"@pid":"22/5535","text":"Xiaojiang Du"}]},"title":"Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangGGGMYD18","doi":"10.1109/GLOCOM.2018.8648070","ee":"https://doi.org/10.1109/GLOCOM.2018.8648070","url":"https://dblp.org/rec/conf/globecom/ZhangGGGMYD18"}, "url":"URL#2567924" }, { "@score":"1", "@id":"2567925", "info":{"authors":{"author":[{"@pid":"19/771-1","text":"Qianqian Zhang 0001"},{"@pid":"167/0667","text":"Huayan Guo"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"70/4725-2","text":"Xiaojun Yuan 0002"}]},"title":"Clustering-Inspired Signal Detection for Ambient Backscatter Communication Systems.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangGLY18","doi":"10.1109/GLOCOM.2018.8647201","ee":"https://doi.org/10.1109/GLOCOM.2018.8647201","url":"https://dblp.org/rec/conf/globecom/ZhangGLY18"}, "url":"URL#2567925" }, { "@score":"1", "@id":"2567926", "info":{"authors":{"author":[{"@pid":"224/9885","text":"Dongheng Zhang"},{"@pid":"43/4685-6","text":"Yang Hu 0006"},{"@pid":"88/2827-7","text":"Yan Chen 0007"}]},"title":"Breath Status Tracking Using Commodity WiFi.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangHC18","doi":"10.1109/GLOCOM.2018.8647255","ee":"https://doi.org/10.1109/GLOCOM.2018.8647255","url":"https://dblp.org/rec/conf/globecom/ZhangHC18"}, "url":"URL#2567926" }, { "@score":"1", "@id":"2567927", "info":{"authors":{"author":[{"@pid":"120/1104","text":"Yongtao Zhang"},{"@pid":"07/7178","text":"Shibo He"},{"@pid":"160/2310","text":"Songyuan Li"},{"@pid":"55/2484-1","text":"Jiming Chen 0001"}]},"title":"A Novel Framework for Mitigating Intra-Operator Customer Churn in Telecommunications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangHLC18","doi":"10.1109/GLOCOM.2018.8647524","ee":"https://doi.org/10.1109/GLOCOM.2018.8647524","url":"https://dblp.org/rec/conf/globecom/ZhangHLC18"}, "url":"URL#2567927" }, { "@score":"1", "@id":"2567928", "info":{"authors":{"author":[{"@pid":"z/JianjunZhang-8","text":"Jianjun Zhang 0008"},{"@pid":"62/1302","text":"Yongming Huang"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"},{"@pid":"54/8052-1","text":"Jiaheng Wang 0001"},{"@pid":"90/3246","text":"Luxi Yang"}]},"title":"Energy-Efficient Cooperative Hybrid Precoding for Millimeter-Wave Communication Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangHXWY18","doi":"10.1109/GLOCOM.2018.8647975","ee":"https://doi.org/10.1109/GLOCOM.2018.8647975","url":"https://dblp.org/rec/conf/globecom/ZhangHXWY18"}, "url":"URL#2567928" }, { "@score":"1", "@id":"2567929", "info":{"authors":{"author":[{"@pid":"14/5888","text":"Yixin Zhang"},{"@pid":"134/5774","text":"Sai Huang"},{"@pid":"50/963","text":"Zhengyu Zhu"},{"@pid":"80/3482-2","text":"Di Zhang 0002"},{"@pid":"33/3099-1","text":"Yue Gao 0001"},{"@pid":"48/195-1","text":"Zhiyong Feng 0001"}]},"title":"Multi-Power-Level Beam Sensing-Throughput Tradeoff in Millimeter Wave Multi-User Scenario.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangHZZGF18","doi":"10.1109/GLOCOM.2018.8647364","ee":"https://doi.org/10.1109/GLOCOM.2018.8647364","url":"https://dblp.org/rec/conf/globecom/ZhangHZZGF18"}, "url":"URL#2567929" }, { "@score":"1", "@id":"2567930", "info":{"authors":{"author":[{"@pid":"91/195","text":"Chi Zhang"},{"@pid":"00/8334","text":"Chunxiao Jiang"},{"@pid":"74/4483","text":"Jin Jin"},{"@pid":"46/2252-1","text":"Sheng Wu 0001"},{"@pid":"63/4802","text":"Linling Kuang"},{"@pid":"01/267-1","text":"Song Guo 0001"}]},"title":"Spatial Angular Spectrum Sensing for Non-Geostationary Satellite Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangJJWKG18","doi":"10.1109/GLOCOM.2018.8647520","ee":"https://doi.org/10.1109/GLOCOM.2018.8647520","url":"https://dblp.org/rec/conf/globecom/ZhangJJWKG18"}, "url":"URL#2567930" }, { "@score":"1", "@id":"2567931", "info":{"authors":{"author":[{"@pid":"152/6588","text":"Guobin Zhang"},{"@pid":"96/1952","text":"Feng Ke"},{"@pid":"120/8856","text":"Yiming Peng"},{"@pid":"74/3128","text":"Chong Zhang"},{"@pid":"70/2140-1","text":"Haijun Zhang 0001"}]},"title":"User Access and Resource Allocation in Full-Duplex User-Centric Ultra-Dense Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangKPZZ18","doi":"10.1109/GLOCOM.2018.8648065","ee":"https://doi.org/10.1109/GLOCOM.2018.8648065","url":"https://dblp.org/rec/conf/globecom/ZhangKPZZ18"}, "url":"URL#2567931" }, { "@score":"1", "@id":"2567932", "info":{"authors":{"author":[{"@pid":"70/2140-1","text":"Haijun Zhang 0001"},{"@pid":"96/8493","text":"Xiangnan Liu"},{"@pid":"53/6133","text":"Keping Long"},{"@pid":"33/2397","text":"Arumugam Nallanathan"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Energy Efficient Resource Allocation and Caching in Fog Radio Access Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangLLNL18","doi":"10.1109/GLOCOM.2018.8648077","ee":"https://doi.org/10.1109/GLOCOM.2018.8648077","url":"https://dblp.org/rec/conf/globecom/ZhangLLNL18"}, "url":"URL#2567932" }, { "@score":"1", "@id":"2567933", "info":{"authors":{"author":[{"@pid":"194/7059","text":"Yuanxing Zhang"},{"@pid":"203/9716","text":"Zhuojin Li"},{"@pid":"236/3112","text":"Chengxu Yang"},{"@pid":"87/2334","text":"Kaigui Bian"},{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"36/3071-1","text":"Xiaoming Li 0001"}]},"title":"SIGN: War-Driving Free Indoor Navigation Using Coded Visual Tags.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangLYBSL18","doi":"10.1109/GLOCOM.2018.8647186","ee":"https://doi.org/10.1109/GLOCOM.2018.8647186","url":"https://dblp.org/rec/conf/globecom/ZhangLYBSL18"}, "url":"URL#2567933" }, { "@score":"1", "@id":"2567934", "info":{"authors":{"author":[{"@pid":"19/771-2","text":"Qianqian Zhang 0002"},{"@pid":"10/9829","text":"Mohammad Mozaffari"},{"@pid":"41/6237","text":"Walid Saad"},{"@pid":"09/3625","text":"Mehdi Bennis"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Machine Learning for Predictive On-Demand Deployment of Uavs for Wireless Communications.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangMSBD18","doi":"10.1109/GLOCOM.2018.8647209","ee":"https://doi.org/10.1109/GLOCOM.2018.8647209","url":"https://dblp.org/rec/conf/globecom/ZhangMSBD18"}, "url":"URL#2567934" }, { "@score":"1", "@id":"2567935", "info":{"authors":{"author":[{"@pid":"236/3229","text":"Hailu Zhang"},{"@pid":"203/9662","text":"Minghui Min"},{"@pid":"x/LiangXiao3","text":"Liang Xiao 0003"},{"@pid":"44/9804-2","text":"Sicong Liu 0002"},{"@pid":"76/185-1","text":"Peng Cheng 0001"},{"@pid":"75/6927","text":"Mugen Peng"}]},"title":"Reinforcement Learning-Based Interference Control for Ultra-Dense Small Cells.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangMXLCP18","doi":"10.1109/GLOCOM.2018.8648136","ee":"https://doi.org/10.1109/GLOCOM.2018.8648136","url":"https://dblp.org/rec/conf/globecom/ZhangMXLCP18"}, "url":"URL#2567935" }, { "@score":"1", "@id":"2567936", "info":{"authors":{"author":[{"@pid":"34/3535","text":"Shanshan Zhang"},{"@pid":"59/7987","text":"Amitangshu Pal"},{"@pid":"25/2574-1","text":"Krishna Kant 0001"},{"@pid":"13/5776","text":"Slobodan Vucetic"}]},"title":"Enhancing Disaster Situational Awareness via Automated Summary Dissemination of Social Media Content.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangPKV18","doi":"10.1109/GLOCOM.2018.8647340","ee":"https://doi.org/10.1109/GLOCOM.2018.8647340","url":"https://dblp.org/rec/conf/globecom/ZhangPKV18"}, "url":"URL#2567936" }, { "@score":"1", "@id":"2567937", "info":{"authors":{"author":[{"@pid":"175/5693","text":"Xiaoshuai Zhang"},{"@pid":"99/3504","text":"Stefan Poslad"},{"@pid":"198/4028","text":"Zixiang Ma"}]},"title":"Block-Based Access Control for Blockchain-Based Electronic Medical Records (EMRs) Query in eHealth.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangPM18","doi":"10.1109/GLOCOM.2018.8647433","ee":"https://doi.org/10.1109/GLOCOM.2018.8647433","url":"https://dblp.org/rec/conf/globecom/ZhangPM18"}, "url":"URL#2567937" }, { "@score":"1", "@id":"2567938", "info":{"authors":{"author":[{"@pid":"04/8707","text":"Guanglin Zhang"},{"@pid":"199/9860","text":"Mengjiao Qin"},{"@pid":"20/2488","text":"Zhirong Shen"},{"@pid":"17/6729-22","text":"Lin Wang 0022"}]},"title":"Energy Management for Smart Base Stations with Heterogeneous Energy Harvesting Devices.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangQSW18","doi":"10.1109/GLOCOM.2018.8647710","ee":"https://doi.org/10.1109/GLOCOM.2018.8647710","url":"https://dblp.org/rec/conf/globecom/ZhangQSW18"}, "url":"URL#2567938" }, { "@score":"1", "@id":"2567939", "info":{"authors":{"author":[{"@pid":"21/1048-20","text":"Peng Zhang 0020"},{"@pid":"46/3348","text":"Sumei Sun"}]},"title":"One Node to Guard All: Jamming-Resistant and Low-Latency Communication for IoT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangS18","doi":"10.1109/GLOCOM.2018.8647322","ee":"https://doi.org/10.1109/GLOCOM.2018.8647322","url":"https://dblp.org/rec/conf/globecom/ZhangS18"}, "url":"URL#2567939" }, { "@score":"1", "@id":"2567940", "info":{"authors":{"author":[{"@pid":"95/9457","text":"Zhongbao Zhang"},{"@pid":"63/2499","text":"Sen Su"},{"@pid":"93/3167","text":"Xu Liu"},{"@pid":"236/3066","text":"Yutong Guo"},{"@pid":"236/3094","text":"Jiaju Zhang"}]},"title":"Efficient Multi-Pair Active Friending in Online Social Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangSLGZ18","doi":"10.1109/GLOCOM.2018.8647329","ee":"https://doi.org/10.1109/GLOCOM.2018.8647329","url":"https://dblp.org/rec/conf/globecom/ZhangSLGZ18"}, "url":"URL#2567940" }, { "@score":"1", "@id":"2567941", "info":{"authors":{"author":[{"@pid":"77/10205-1","text":"Hongliang Zhang 0001"},{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Peer to Peer Packet Dispatching for Local Area Packetized Power Networks with Multiple Routers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangSLP18","doi":"10.1109/GLOCOM.2018.8647816","ee":"https://doi.org/10.1109/GLOCOM.2018.8647816","url":"https://dblp.org/rec/conf/globecom/ZhangSLP18"}, "url":"URL#2567941" }, { "@score":"1", "@id":"2567942", "info":{"authors":{"author":[{"@pid":"66/6011","text":"Liming Zhang"},{"@pid":"29/5259-3","text":"Jie Wang 0003"},{"@pid":"61/7448","text":"Qinghua Gao"},{"@pid":"146/8113","text":"Xuanheng Li"},{"@pid":"16/1033","text":"Miao Pan"},{"@pid":"f/YuguangFang","text":"Yuguang Fang"}]},"title":"LetFi: Letter Recognition in the Air Using CSI.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangWGLPF18","doi":"10.1109/GLOCOM.2018.8647830","ee":"https://doi.org/10.1109/GLOCOM.2018.8647830","url":"https://dblp.org/rec/conf/globecom/ZhangWGLPF18"}, "url":"URL#2567942" }, { "@score":"1", "@id":"2567943", "info":{"authors":{"author":[{"@pid":"144/6624","text":"Zezhong Zhang"},{"@pid":"w/RuiWang7","text":"Rui Wang 0007"},{"@pid":"37/4190-26","text":"Yang Li 0026"}]},"title":"Rate Adaptation of D2D Underlaying Downlink Massive MIMO Networks with Reinforcement Learning.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangWL18","doi":"10.1109/GLOCOM.2018.8647257","ee":"https://doi.org/10.1109/GLOCOM.2018.8647257","url":"https://dblp.org/rec/conf/globecom/ZhangWL18"}, "url":"URL#2567943" }, { "@score":"1", "@id":"2567944", "info":{"authors":{"author":[{"@pid":"142/3651-1","text":"Xinyue Zhang 0001"},{"@pid":"18/3178-2","text":"Jingyi Wang 0002"},{"@pid":"61/1651","text":"Hongning Li"},{"@pid":"93/10800","text":"Yuanxiong Guo"},{"@pid":"06/4559","text":"Qingqi Pei"},{"@pid":"72/2643-1","text":"Pan Li 0001"},{"@pid":"16/1033","text":"Miao Pan"}]},"title":"Data-Driven Caching with Users' Local Differential Privacy in Information-Centric Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangWLGPLP18","doi":"10.1109/GLOCOM.2018.8647637","ee":"https://doi.org/10.1109/GLOCOM.2018.8647637","url":"https://dblp.org/rec/conf/globecom/ZhangWLGPLP18"}, "url":"URL#2567944" }, { "@score":"1", "@id":"2567945", "info":{"authors":{"author":[{"@pid":"64/6544-35","text":"Yi Zhang 0035"},{"@pid":"28/7604","text":"Chih-Yu Wang 0001"},{"@pid":"09/6598","text":"Hung-Yu Wei"}]},"title":"Parked Vehicle Assisted VFC System with Smart Parking: An Auction Approach.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangWW18","doi":"10.1109/GLOCOM.2018.8648013","ee":"https://doi.org/10.1109/GLOCOM.2018.8648013","url":"https://dblp.org/rec/conf/globecom/ZhangWW18"}, "url":"URL#2567945" }, { "@score":"1", "@id":"2567947", "info":{"authors":{"author":[{"@pid":"19/6669","text":"Haitao Zhang"},{"@pid":"44/3928","text":"Dapeng Wu 0002"},{"@pid":"236/3343","text":"Ruoying Zhang"},{"@pid":"92/1227","text":"Ruyan Wang"}]},"title":"Incremental Learning System for Disease Prediction: Epileptic Seizure Case.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangWZW18","doi":"10.1109/GLOCOM.2018.8647373","ee":"https://doi.org/10.1109/GLOCOM.2018.8647373","url":"https://dblp.org/rec/conf/globecom/ZhangWZW18"}, "url":"URL#2567947" }, { "@score":"1", "@id":"2567948", "info":{"authors":{"author":[{"@pid":"132/8045","text":"Zhicai Zhang"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"60/10645","text":"Fang Fu"},{"@pid":"71/1527","text":"Qiao Yan"},{"@pid":"236/3335","text":"Zhouyang Wang"}]},"title":"Joint Offloading and Resource Allocation in Mobile Edge Computing Systems: An Actor-Critic Approach.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangYFYW18","doi":"10.1109/GLOCOM.2018.8647593","ee":"https://doi.org/10.1109/GLOCOM.2018.8647593","url":"https://dblp.org/rec/conf/globecom/ZhangYFYW18"}, "url":"URL#2567948" }, { "@score":"1", "@id":"2567949", "info":{"authors":{"author":[{"@pid":"190/7015","text":"Dajun Zhang"},{"@pid":"16/6654","text":"F. Richard Yu"},{"@pid":"86/8969","text":"Ruizhe Yang"}]},"title":"A Machine Learning Approach for Software-Defined Vehicular Ad Hoc Networks with Trust Management.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangYY18","doi":"10.1109/GLOCOM.2018.8647426","ee":"https://doi.org/10.1109/GLOCOM.2018.8647426","url":"https://dblp.org/rec/conf/globecom/ZhangYY18"}, "url":"URL#2567949" }, { "@score":"1", "@id":"2567950", "info":{"authors":{"author":[{"@pid":"163/7328","text":"Shuhang Zhang"},{"@pid":"77/10205-1","text":"Hongliang Zhang 0001"},{"@pid":"146/8046","text":"Boya Di"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Resource Allocation and Trajectory Design for Cellular UAV-to-X Communication Networks in 5G.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangZDS18","doi":"10.1109/GLOCOM.2018.8647671","ee":"https://doi.org/10.1109/GLOCOM.2018.8647671","url":"https://dblp.org/rec/conf/globecom/ZhangZDS18"}, "url":"URL#2567950" }, { "@score":"1", "@id":"2567951", "info":{"authors":{"author":[{"@pid":"163/7328","text":"Shuhang Zhang"},{"@pid":"77/10205-1","text":"Hongliang Zhang 0001"},{"@pid":"146/8046","text":"Boya Di"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Cooperative Sensing and Transmission for Cellular Network Controlled Unmanned Aerial Vehicles.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangZDS18a","doi":"10.1109/GLOCOM.2018.8647799","ee":"https://doi.org/10.1109/GLOCOM.2018.8647799","url":"https://dblp.org/rec/conf/globecom/ZhangZDS18a"}, "url":"URL#2567951" }, { "@score":"1", "@id":"2567953", "info":{"authors":{"author":[{"@pid":"12/5927-5","text":"Xiaoyu Zhang 0005"},{"@pid":"203/3476","text":"Hanyu Zhu"},{"@pid":"98/3680","text":"Xiliang Luo"}]},"title":"MIDAR: Massive MIMO Based Detection and Ranging.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangZL18","doi":"10.1109/GLOCOM.2018.8647986","ee":"https://doi.org/10.1109/GLOCOM.2018.8647986","url":"https://dblp.org/rec/conf/globecom/ZhangZL18"}, "url":"URL#2567953" }, { "@score":"1", "@id":"2567954", "info":{"authors":{"author":[{"@pid":"59/1164","text":"Yueyue Zhang"},{"@pid":"76/4923","text":"Yaping Zhu"},{"@pid":"30/1330","text":"Weiwei Xia"},{"@pid":"99/6100-1","text":"Fei Shen 0001"},{"@pid":"207/1588","text":"Xuzhou Zuo"},{"@pid":"62/3960-4","text":"Feng Yan 0004"},{"@pid":"21/4801","text":"Lianfeng Shen"}]},"title":"Game-Based Power Control for Downlink Non-Orthogonal Multiple Access in HetNets.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangZXSZYS18","doi":"10.1109/GLOCOM.2018.8647230","ee":"https://doi.org/10.1109/GLOCOM.2018.8647230","url":"https://dblp.org/rec/conf/globecom/ZhangZXSZYS18"}, "url":"URL#2567954" }, { "@score":"1", "@id":"2567955", "info":{"authors":{"author":[{"@pid":"231/3965","text":"Renmin Zhang"},{"@pid":"69/2745-2","text":"Hua Zhang 0002"},{"@pid":"32/1213-1","text":"Wei Xu 0001"},{"@pid":"49/4098","text":"Chunming Zhao"}]},"title":"A Codebook Based Simultaneous Beam Training for mmWave Multi-User MIMO Systems with Split Structures.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangZXZ18","doi":"10.1109/GLOCOM.2018.8648139","ee":"https://doi.org/10.1109/GLOCOM.2018.8648139","url":"https://dblp.org/rec/conf/globecom/ZhangZXZ18"}, "url":"URL#2567955" }, { "@score":"1", "@id":"2567956", "info":{"authors":{"author":[{"@pid":"71/208","text":"Shuai Zhang"},{"@pid":"69/6137-1","text":"Sheng Zhang 0001"},{"@pid":"177/4376","text":"Xiaoda Zhang"},{"@pid":"96/2572","text":"Zhuzhong Qian"},{"@pid":"94/3601","text":"Mingjun Xiao"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"128/5781","text":"Jidong Ge"},{"@pid":"02/3450-1","text":"Xiaoliang Wang 0001"}]},"title":"Far-Sighted Multi-Stage Awasre Coflow Scheduling.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhangZZQXWGW18","doi":"10.1109/GLOCOM.2018.8647855","ee":"https://doi.org/10.1109/GLOCOM.2018.8647855","url":"https://dblp.org/rec/conf/globecom/ZhangZZQXWGW18"}, "url":"URL#2567956" }, { "@score":"1", "@id":"2567957", "info":{"authors":{"author":[{"@pid":"81/8054","text":"Ruoyu Zhang"},{"@pid":"02/9805","text":"Jiayan Zhang"},{"@pid":"139/3492","text":"Tianyu Zhao"},{"@pid":"122/5641","text":"Honglin Zhao"}]},"title":"Block Sparse Recovery for Wideband Channel Estimation in Hybrid mmWave MIMO Systems.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhangZZZ18","doi":"10.1109/GLOCOM.2018.8647482","ee":"https://doi.org/10.1109/GLOCOM.2018.8647482","url":"https://dblp.org/rec/conf/globecom/ZhangZZZ18"}, "url":"URL#2567957" }, { "@score":"1", "@id":"2567958", "info":{"authors":{"author":[{"@pid":"63/5422","text":"Liang Zhao"},{"@pid":"96/2402","text":"Kwang-Cheng Chen"}]},"title":"The Game Theoretic Consensus in a Networked Multi-Agent System.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhaoC18","doi":"10.1109/GLOCOM.2018.8647439","ee":"https://doi.org/10.1109/GLOCOM.2018.8647439","url":"https://dblp.org/rec/conf/globecom/ZhaoC18"}, "url":"URL#2567958" }, { "@score":"1", "@id":"2567959", "info":{"authors":{"author":[{"@pid":"128/7841","text":"Caidan Zhao"},{"@pid":"19/3667","text":"Caiyun Chen"},{"@pid":"221/4940","text":"Zhibiao Cai"},{"@pid":"221/4953","text":"Mingxian Shi"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Classification of Small UAVs Based on Auxiliary Classifier Wasserstein GANs.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhaoCCSDG18","doi":"10.1109/GLOCOM.2018.8647973","ee":"https://doi.org/10.1109/GLOCOM.2018.8647973","url":"https://dblp.org/rec/conf/globecom/ZhaoCCSDG18"}, "url":"URL#2567959" }, { "@score":"1", "@id":"2567960", "info":{"authors":{"author":[{"@pid":"182/0044","text":"Yizhe Zhao"},{"@pid":"90/5064-1","text":"Jie Hu 0001"},{"@pid":"138/3919","text":"Ran Guo"},{"@pid":"63/1587-1","text":"Kun Yang 0001"},{"@pid":"98/4623","text":"Supeng Leng"}]},"title":"Enhanced CSMA/CA Protocol Design for Integrated Data and Energy Transfer in WLANs.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhaoHGYL18","doi":"10.1109/GLOCOM.2018.8647766","ee":"https://doi.org/10.1109/GLOCOM.2018.8647766","url":"https://dblp.org/rec/conf/globecom/ZhaoHGYL18"}, "url":"URL#2567960" }, { "@score":"1", "@id":"2567961", "info":{"authors":{"author":[{"@pid":"57/836","text":"Yongxiang Zhao"},{"@pid":"52/173","text":"Wei Hu"},{"@pid":"35/6163","text":"Chunxi Li"},{"@pid":"70/1564","text":"Hongyun Zheng"},{"@pid":"01/986","text":"Baoxian Zhang"}]},"title":"Enabling Free-Viewpoint Television with P2P Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhaoHLZZ18","doi":"10.1109/GLOCOM.2018.8647143","ee":"https://doi.org/10.1109/GLOCOM.2018.8647143","url":"https://dblp.org/rec/conf/globecom/ZhaoHLZZ18"}, "url":"URL#2567961" }, { "@score":"1", "@id":"2567962", "info":{"authors":{"author":[{"@pid":"97/4708","text":"Li Zhao"},{"@pid":"06/2123-3","text":"Qin Liu 0003"},{"@pid":"65/4745","text":"Hejiao Huang"},{"@pid":"j/XiaohuaJia","text":"Xiaohua Jia"}]},"title":"Efficient Privacy-Preserving Query Processing on Outsourced Geographic Databases.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhaoLHJ18","doi":"10.1109/GLOCOM.2018.8648116","ee":"https://doi.org/10.1109/GLOCOM.2018.8648116","url":"https://dblp.org/rec/conf/globecom/ZhaoLHJ18"}, "url":"URL#2567962" }, { "@score":"1", "@id":"2567963", "info":{"authors":{"author":[{"@pid":"84/4581-6","text":"Nan Zhao 0006"},{"@pid":"98/153","text":"Ying-Chang Liang"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"21/1581","text":"Yiyang Pei"},{"@pid":"227/4759","text":"Yunhao Jiang"}]},"title":"Deep Reinforcement Learning for User Association and Resource Allocation in Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhaoLNPJ18","doi":"10.1109/GLOCOM.2018.8647611","ee":"https://doi.org/10.1109/GLOCOM.2018.8647611","url":"https://dblp.org/rec/conf/globecom/ZhaoLNPJ18"}, "url":"URL#2567963" }, { "@score":"1", "@id":"2567964", "info":{"authors":{"author":[{"@pid":"210/6242","text":"Tantan Zhao"},{"@pid":"48/7198","text":"Guobing Li"},{"@pid":"62/7197","text":"Guomei Zhang"},{"@pid":"69/5538","text":"Chun-Xia Zhang"}]},"title":"Security-Enhanced User Pairing for MISO-NOMA Downlink Transmission.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhaoLZZ18","doi":"10.1109/GLOCOM.2018.8647585","ee":"https://doi.org/10.1109/GLOCOM.2018.8647585","url":"https://dblp.org/rec/conf/globecom/ZhaoLZZ18"}, "url":"URL#2567964" }, { "@score":"1", "@id":"2567965", "info":{"authors":{"author":[{"@pid":"226/0568","text":"Guanqun Zhao"},{"@pid":"28/8080","text":"Shuang Qin"},{"@pid":"94/3694-4","text":"Gang Feng 0004"}]},"title":"Network Slice Selection in Softwarization Based Mobile Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhaoQF18","doi":"10.1109/GLOCOM.2018.8647166","ee":"https://doi.org/10.1109/GLOCOM.2018.8647166","url":"https://dblp.org/rec/conf/globecom/ZhaoQF18"}, "url":"URL#2567965" }, { "@score":"1", "@id":"2567967", "info":{"authors":{"author":[{"@pid":"157/9996","text":"Peiyao Zhao"},{"@pid":"78/8276-1","text":"Zhaocheng Wang 0001"}]},"title":"Joint User Scheduling and Hybrid Precoding for Multi-User mmWave Systems with Two-Layer PS Network.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhaoW18","doi":"10.1109/GLOCOM.2018.8647826","ee":"https://doi.org/10.1109/GLOCOM.2018.8647826","url":"https://dblp.org/rec/conf/globecom/ZhaoW18"}, "url":"URL#2567967" }, { "@score":"1", "@id":"2567968", "info":{"authors":{"author":[{"@pid":"236/2865","text":"Litong Zhao"},{"@pid":"43/2085-1","text":"Xiaodong Xu 0001"},{"@pid":"118/4659","text":"Kaiyu Zhu"},{"@pid":"186/0747","text":"Shujun Han"},{"@pid":"96/6496","text":"Xiaofeng Tao"}]},"title":"QoS-based Dynamic Allocation and Adaptive ACB Mechanism for RAN Overload Avoidance in MTC.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhaoXZHT18","doi":"10.1109/GLOCOM.2018.8647599","ee":"https://doi.org/10.1109/GLOCOM.2018.8647599","url":"https://dblp.org/rec/conf/globecom/ZhaoXZHT18"}, "url":"URL#2567968" }, { "@score":"1", "@id":"2567969", "info":{"authors":{"author":[{"@pid":"233/3871","text":"Pengyu Zhao"},{"@pid":"213/0962","text":"Yuzhe Yang"},{"@pid":"194/7059","text":"Yuanxing Zhang"},{"@pid":"87/2334","text":"Kaigui Bian"},{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"218/2702","text":"Pengpeng Qiao"},{"@pid":"128/3410","text":"Zhetao Li"}]},"title":"Optimal Trajectory Planning of Drones for 3D Mobile Sensing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhaoYZBSQL18","doi":"10.1109/GLOCOM.2018.8647796","ee":"https://doi.org/10.1109/GLOCOM.2018.8647796","url":"https://dblp.org/rec/conf/globecom/ZhaoYZBSQL18"}, "url":"URL#2567969" }, { "@score":"1", "@id":"2567971", "info":{"authors":{"author":[{"@pid":"214/2146","text":"Xiaojian Zhen"},{"@pid":"96/3813","text":"Hangguan Shan"},{"@pid":"87/763","text":"Howard H. Yang"},{"@pid":"65/1128","text":"Tony Q. S. Quek"},{"@pid":"90/1379","text":"Aiping Huang"}]},"title":"Analysis of Throughput in Heterogeneous Dynamic TDD Networks with Backhaul.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhenSYQH18","doi":"10.1109/GLOCOM.2018.8647955","ee":"https://doi.org/10.1109/GLOCOM.2018.8647955","url":"https://dblp.org/rec/conf/globecom/ZhenSYQH18"}, "url":"URL#2567971" }, { "@score":"1", "@id":"2567972", "info":{"authors":{"author":[{"@pid":"25/1888","text":"Peng Zheng"},{"@pid":"17/5705-11","text":"Hao Li 0011"},{"@pid":"62/921","text":"Chengchen Hu"}]},"title":"DIAL: Distributed Elephant Flow Counting on SDN.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhengLH18","doi":"10.1109/GLOCOM.2018.8647402","ee":"https://doi.org/10.1109/GLOCOM.2018.8647402","url":"https://dblp.org/rec/conf/globecom/ZhengLH18"}, "url":"URL#2567972" }, { "@score":"1", "@id":"2567973", "info":{"authors":{"author":[{"@pid":"148/4458","text":"Zijie Zheng"},{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"89/5914","text":"Geoffrey Ye Li"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"A Stackelberg Game Approach to Large-Scale Edge Caching.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhengSHLP18","doi":"10.1109/GLOCOM.2018.8648011","ee":"https://doi.org/10.1109/GLOCOM.2018.8648011","url":"https://dblp.org/rec/conf/globecom/ZhengSHLP18"}, "url":"URL#2567973" }, { "@score":"1", "@id":"2567974", "info":{"authors":{"author":[{"@pid":"150/5517","text":"Tong-Xing Zheng"},{"@pid":"15/3199","text":"Qian Yang"},{"@pid":"203/1946","text":"Ke-Wen Huang"},{"@pid":"37/2062-1","text":"Hui-Ming Wang 0001"},{"@pid":"83/784-1","text":"Zhiqiang Wei 0001"},{"@pid":"50/567","text":"Jinhong Yuan"}]},"title":"Physical-Layer Secure Transmissions in Cache-Enabled Cooperative Small Cell Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhengYHWWY18","doi":"10.1109/GLOCOM.2018.8647492","ee":"https://doi.org/10.1109/GLOCOM.2018.8647492","url":"https://dblp.org/rec/conf/globecom/ZhengYHWWY18"}, "url":"URL#2567974" }, { "@score":"1", "@id":"2567976", "info":{"authors":{"author":[{"@pid":"36/2728","text":"Yu Zhou"},{"@pid":"52/295","text":"Yifan Chen"},{"@pid":"m/RossDMurch","text":"Ross D. Murch"}]},"title":"Latticed Channel Model of Touchable Communication over Capillary Microcirculation Network.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhouCM18","doi":"10.1109/GLOCOM.2018.8647980","ee":"https://doi.org/10.1109/GLOCOM.2018.8647980","url":"https://dblp.org/rec/conf/globecom/ZhouCM18"}, "url":"URL#2567976" }, { "@score":"1", "@id":"2567977", "info":{"authors":{"author":[{"@pid":"65/3277","text":"Zhenyu Zhou"},{"@pid":"210/3589","text":"Junhao Feng"},{"@pid":"85/6463-1","text":"Bo Ai 0001"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Energy-Efficient Mobile Crowd Sensing Based on Unmanned Aerial Vehicles.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhouFAG18","doi":"10.1109/GLOCOM.2018.8647849","ee":"https://doi.org/10.1109/GLOCOM.2018.8647849","url":"https://dblp.org/rec/conf/globecom/ZhouFAG18"}, "url":"URL#2567977" }, { "@score":"1", "@id":"2567978", "info":{"authors":{"author":[{"@pid":"70/2180","text":"Jianhong Zhou"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"47/6795","text":"Tak-Shing Peter Yum"},{"@pid":"28/8080","text":"Shuang Qin"}]},"title":"Actor-Critic Algorithm Based Discontinuous Reception (DRX) for Machine-Type Communications.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhouFYQ18","doi":"10.1109/GLOCOM.2018.8647785","ee":"https://doi.org/10.1109/GLOCOM.2018.8647785","url":"https://dblp.org/rec/conf/globecom/ZhouFYQ18"}, "url":"URL#2567978" }, { "@score":"1", "@id":"2567979", "info":{"authors":{"author":[{"@pid":"82/1512-1","text":"Kai Zhou 0001"},{"@pid":"59/2180-1","text":"Jian Ren 0001"},{"@pid":"32/4638","text":"Tongtong Li"}]},"title":"Security and Privacy Enhancement for Outsourced Biometric Identification.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhouRL18","doi":"10.1109/GLOCOM.2018.8647899","ee":"https://doi.org/10.1109/GLOCOM.2018.8647899","url":"https://dblp.org/rec/conf/globecom/ZhouRL18"}, "url":"URL#2567979" }, { "@score":"1", "@id":"2567980", "info":{"authors":{"author":[{"@pid":"65/3628-12","text":"Bo Zhou 0012"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Optimal Sampling and Updating for Minimizing Age of Information in the Internet of Things.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhouS18","doi":"10.1109/GLOCOM.2018.8647281","ee":"https://doi.org/10.1109/GLOCOM.2018.8647281","url":"https://dblp.org/rec/conf/globecom/ZhouS18"}, "url":"URL#2567980" }, { "@score":"1", "@id":"2567981", "info":{"authors":{"author":[{"@pid":"155/5190","text":"Fuhui Zhou"},{"@pid":"32/4605","text":"Haijian Sun"},{"@pid":"84/10816-1","text":"Zheng Chu 0001"},{"@pid":"43/3601","text":"Rose Qingyang Hu"}]},"title":"Computation Efficiency Maximization for Wireless-Powered Mobile Edge Computing.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhouSCH18","doi":"10.1109/GLOCOM.2018.8647509","ee":"https://doi.org/10.1109/GLOCOM.2018.8647509","url":"https://dblp.org/rec/conf/globecom/ZhouSCH18"}, "url":"URL#2567981" }, { "@score":"1", "@id":"2567982", "info":{"authors":{"author":[{"@pid":"69/6147-2","text":"Lin Zhou 0002"},{"@pid":"165/1859","text":"Albrecht Wolf"},{"@pid":"83/4035","text":"Mehul Motani"}]},"title":"On the Finite Blocklength Performance of Lossy Multi-Connectivity.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhouWM18","doi":"10.1109/GLOCOM.2018.8647459","ee":"https://doi.org/10.1109/GLOCOM.2018.8647459","url":"https://dblp.org/rec/conf/globecom/ZhouWM18"}, "url":"URL#2567982" }, { "@score":"1", "@id":"2567983", "info":{"authors":{"author":[{"@pid":"201/3530","text":"Xuying Zhou"},{"@pid":"35/7092-21","text":"Wei Wang 0021"},{"@pid":"194/6915","text":"Yitu Wang"},{"@pid":"81/6236-1","text":"Zhaoyang Zhang 0001"}]},"title":"On the Cooperation for Content Caching from a Coalitional Game Perspective.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhouWWZ18","doi":"10.1109/GLOCOM.2018.8647837","ee":"https://doi.org/10.1109/GLOCOM.2018.8647837","url":"https://dblp.org/rec/conf/globecom/ZhouWWZ18"}, "url":"URL#2567983" }, { "@score":"1", "@id":"2567984", "info":{"authors":{"author":[{"@pid":"64/10047","text":"Lai Zhou"},{"@pid":"90/5587-5","text":"Zhi Yang 0005"},{"@pid":"220/3404","text":"Guangyue Zhao"},{"@pid":"76/5271","text":"Shidong Zhou"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"}]},"title":"Propagation Characteristics of Air-to-Air Channels in Urban Environments.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhouYZZW18","doi":"10.1109/GLOCOM.2018.8647360","ee":"https://doi.org/10.1109/GLOCOM.2018.8647360","url":"https://dblp.org/rec/conf/globecom/ZhouYZZW18"}, "url":"URL#2567984" }, { "@score":"1", "@id":"2567985", "info":{"authors":{"author":[{"@pid":"67/2535-7","text":"Zhou Zhou 0007"},{"@pid":"87/1222","text":"Xi Zhang"},{"@pid":"47/9461","text":"Qingyun Liu"},{"@pid":"80/4063","text":"Yujia Zhu"},{"@pid":"43/4804-2","text":"Da Li 0002"},{"@pid":"02/929","text":"Li Guo"}]},"title":"SASD: A Self-Adaptive Stateful Decompression Architecture.","venue":"GLOBECOM","pages":"206-212","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhouZLZLG18","doi":"10.1109/GLOCOM.2018.8647636","ee":"https://doi.org/10.1109/GLOCOM.2018.8647636","url":"https://dblp.org/rec/conf/globecom/ZhouZLZLG18"}, "url":"URL#2567985" }, { "@score":"1", "@id":"2567987", "info":{"authors":{"author":[{"@pid":"146/7208","text":"Guorong Zhou"},{"@pid":"77/4505","text":"Liqiang Zhao"},{"@pid":"08/9611","text":"Qiong Shi"},{"@pid":"74/6653","text":"Gan Zheng"},{"@pid":"96/2402","text":"Kwang-Cheng Chen"}]},"title":"Rate-Delay Analysis of Radio Access Network Slices.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhouZSZC18","doi":"10.1109/GLOCOM.2018.8647758","ee":"https://doi.org/10.1109/GLOCOM.2018.8647758","url":"https://dblp.org/rec/conf/globecom/ZhouZSZC18"}, "url":"URL#2567987" }, { "@score":"1", "@id":"2567988", "info":{"authors":{"author":{"@pid":"62/9980","text":"Zuqing Zhu"}},"title":"Economics of Multi-Domain Software-Defined EONs: Games Among Brokers.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/Zhu18","doi":"10.1109/GLOCOM.2018.8647139","ee":"https://doi.org/10.1109/GLOCOM.2018.8647139","url":"https://dblp.org/rec/conf/globecom/Zhu18"}, "url":"URL#2567988" }, { "@score":"1", "@id":"2567989", "info":{"authors":{"author":[{"@pid":"208/9943","text":"Bingyu Zhu"},{"@pid":"c/WeiChen2","text":"Wei Chen 0002"}]},"title":"Coded Caching with Joint Content Recommendation and User Grouping.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhuC18","doi":"10.1109/GLOCOM.2018.8647664","ee":"https://doi.org/10.1109/GLOCOM.2018.8647664","url":"https://dblp.org/rec/conf/globecom/ZhuC18"}, "url":"URL#2567989" }, { "@score":"1", "@id":"2567990", "info":{"authors":{"author":[{"@pid":"140/7624","text":"Guangxu Zhu"},{"@pid":"181/2847","text":"Li Chen"},{"@pid":"21/506","text":"Kaibin Huang"}]},"title":"MIMO Over-the-Air Computation: Beamforming Optimization on the Grassmann Manifold.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhuCH18","doi":"10.1109/GLOCOM.2018.8648097","ee":"https://doi.org/10.1109/GLOCOM.2018.8648097","url":"https://dblp.org/rec/conf/globecom/ZhuCH18"}, "url":"URL#2567990" }, { "@score":"1", "@id":"2567991", "info":{"authors":{"author":[{"@pid":"232/3381","text":"Daren Zhu"},{"@pid":"16/6714","text":"Hancheng Lu"},{"@pid":"232/3296","text":"Zhuojia Gu"},{"@pid":"210/6307","text":"Yujiao Lu"},{"@pid":"232/3151","text":"Fengqian Guo"}]},"title":"Joint Power Allocation and Caching for SVC Videos in Heterogeneous Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhuLGLG18","doi":"10.1109/GLOCOM.2018.8647476","ee":"https://doi.org/10.1109/GLOCOM.2018.8647476","url":"https://dblp.org/rec/conf/globecom/ZhuLGLG18"}, "url":"URL#2567991" }, { "@score":"1", "@id":"2567992", "info":{"authors":{"author":[{"@pid":"202/1712","text":"Zhaowei Zhu"},{"@pid":"52/5150","text":"Ting Liu"},{"@pid":"202/2294","text":"Shengda Jin"},{"@pid":"98/3680","text":"Xiliang Luo"}]},"title":"Learn and Pick Right Nodes to Offload.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhuLJL18","doi":"10.1109/GLOCOM.2018.8648042","ee":"https://doi.org/10.1109/GLOCOM.2018.8648042","url":"https://dblp.org/rec/conf/globecom/ZhuLJL18"}, "url":"URL#2567992" }, { "@score":"1", "@id":"2567993", "info":{"authors":{"author":[{"@pid":"60/2161-1","text":"Lina Zhu 0001"},{"@pid":"83/2914","text":"Changle Li"},{"@pid":"31/8333","text":"Tom H. Luan"},{"@pid":"217/8928","text":"Jianjia Yi"},{"@pid":"48/314","text":"Guoqiang Mao"}]},"title":"Framework for Cooperative Perception of Intelligent Vehicles: Using Improved Neighbor Discovery.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZhuLLYM18","doi":"10.1109/GLOCOM.2018.8647293","ee":"https://doi.org/10.1109/GLOCOM.2018.8647293","url":"https://dblp.org/rec/conf/globecom/ZhuLLYM18"}, "url":"URL#2567993" }, { "@score":"1", "@id":"2567994", "info":{"authors":{"author":[{"@pid":"82/3167","text":"Yan Zhu"},{"@pid":"39/4119","text":"Min Sheng"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"},{"@pid":"137/6323","text":"Runzi Liu"},{"@pid":"02/5889-59","text":"Yu Wang 0059"},{"@pid":"236/2950","text":"Kai Chi"}]},"title":"Traffic Modeling and Performance Analysis for Remote Sensing Satellite Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhuSLLWC18","doi":"10.1109/GLOCOM.2018.8648003","ee":"https://doi.org/10.1109/GLOCOM.2018.8648003","url":"https://dblp.org/rec/conf/globecom/ZhuSLLWC18"}, "url":"URL#2567994" }, { "@score":"1", "@id":"2567997", "info":{"authors":{"author":[{"@pid":"236/3003","text":"Wenzhan Zhu"},{"@pid":"167/9224","text":"Weiling Zheng"},{"@pid":"49/3884","text":"Dian Zhang"}]},"title":"Beyond RSS: A PRR Aided RSS System to Localize Transceiver-Free Target in Sparse Wireless Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZhuZZ18","doi":"10.1109/GLOCOM.2018.8647832","ee":"https://doi.org/10.1109/GLOCOM.2018.8647832","url":"https://dblp.org/rec/conf/globecom/ZhuZZ18"}, "url":"URL#2567997" }, { "@score":"1", "@id":"2567998", "info":{"authors":{"author":[{"@pid":"236/3216","text":"Abdelhak Zier"},{"@pid":"84/5490","text":"Abdelhafid Abouaissa"},{"@pid":"l/PascalLorenz","text":"Pascal Lorenz"}]},"title":"E-RPL: A Routing Protocol for IoT Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZierAL18","doi":"10.1109/GLOCOM.2018.8647318","ee":"https://doi.org/10.1109/GLOCOM.2018.8647318","url":"https://dblp.org/rec/conf/globecom/ZierAL18"}, "url":"URL#2567998" }, { "@score":"1", "@id":"2567999", "info":{"authors":{"author":[{"@pid":"236/2789","text":"Sara Zimmo"},{"@pid":"164/8730","text":"Abdallah Moubayed"},{"@pid":"137/0114","text":"Ahmed Refaey"},{"@pid":"26/704","text":"Abdallah Shami"}]},"title":"Coexistence of WiFi and LTE in the Unlicensed Band Using Time-Domain Virtualization.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZimmoMRS18","doi":"10.1109/GLOCOM.2018.8648057","ee":"https://doi.org/10.1109/GLOCOM.2018.8648057","url":"https://dblp.org/rec/conf/globecom/ZimmoMRS18"}, "url":"URL#2567999" }, { "@score":"1", "@id":"2568001", "info":{"authors":{"author":[{"@pid":"159/2164","text":"Maha Zohdy"},{"@pid":"204/4457","text":"Samia Kazemi"},{"@pid":"65/2830","text":"Ali Tajer"}]},"title":"A Broadcast Approach to Multiple Access with Partial CSIT.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZohdyKT18","doi":"10.1109/GLOCOM.2018.8647542","ee":"https://doi.org/10.1109/GLOCOM.2018.8647542","url":"https://dblp.org/rec/conf/globecom/ZohdyKT18"}, "url":"URL#2568001" }, { "@score":"1", "@id":"2568003", "info":{"authors":{"author":[{"@pid":"210/5728","text":"Yan Zong"},{"@pid":"77/3562","text":"Xuewu Dai"},{"@pid":"122/7149","text":"Zhiwei Gao 0001"},{"@pid":"84/6419","text":"Krishna Busawon"},{"@pid":"66/9566","text":"Richard Binns"},{"@pid":"236/2992","text":"Ian Elliott"}]},"title":"Synchronization of Pulse-Coupled Oscillators for IEEE 802.15.4 Multi-Hop Wireless Sensor Networks.","venue":"GLOBECOM","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"open","key":"conf/globecom/ZongDGBBE18","doi":"10.1109/GLOCOM.2018.8647633","ee":"https://doi.org/10.1109/GLOCOM.2018.8647633","url":"https://dblp.org/rec/conf/globecom/ZongDGBBE18"}, "url":"URL#2568003" }, { "@score":"1", "@id":"2568004", "info":{"authors":{"author":[{"@pid":"43/7418","text":"Yulong Zou"},{"@pid":"236/3035","text":"Lidong Cai"},{"@pid":"49/5304","text":"Haiyan Guo"},{"@pid":"22/2544-1","text":"Jia Zhu 0001"}]},"title":"Secrecy Outage Probability of Cooperative Relay Networks with Channel Estimation Error.","venue":"GLOBECOM","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZouCGZ18","doi":"10.1109/GLOCOM.2018.8647165","ee":"https://doi.org/10.1109/GLOCOM.2018.8647165","url":"https://dblp.org/rec/conf/globecom/ZouCGZ18"}, "url":"URL#2568004" }, { "@score":"1", "@id":"2568005", "info":{"authors":{"author":[{"@pid":"43/7418","text":"Yulong Zou"},{"@pid":"62/7967","text":"Xiao Jiang"},{"@pid":"22/2544-1","text":"Jia Zhu 0001"},{"@pid":"49/5304","text":"Haiyan Guo"}]},"title":"Outage Minimization for Energy-Harvesting Multi-Antenna Multi-Relay Networks.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZouJZG18","doi":"10.1109/GLOCOM.2018.8647472","ee":"https://doi.org/10.1109/GLOCOM.2018.8647472","url":"https://dblp.org/rec/conf/globecom/ZouJZG18"}, "url":"URL#2568005" }, { "@score":"1", "@id":"2568007", "info":{"authors":{"author":[{"@pid":"207/3362","text":"Hang Zou"},{"@pid":"236/2913","text":"Youba Nait-Belaid"},{"@pid":"41/1521","text":"Michel Kieffer"}]},"title":"Optimal Opponent Selection for Distributed Multi-Agent Self-Classification.","venue":"GLOBECOM","pages":"1-6","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/globecom/ZouNK18","doi":"10.1109/GLOCOM.2018.8648103","ee":"https://doi.org/10.1109/GLOCOM.2018.8648103","url":"https://dblp.org/rec/conf/globecom/ZouNK18"}, "url":"URL#2568007" }, { "@score":"1", "@id":"2684935", "info":{"title":"IEEE Global Communications Conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018","venue":"GLOBECOM","publisher":"IEEE","year":"2018","type":"Editorship","key":"conf/globecom/2018","ee":"https://ieeexplore.ieee.org/xpl/conhome/8634808/proceeding","url":"https://dblp.org/rec/conf/globecom/2018"}, "url":"URL#2684935" } ] } } } )