


Остановите войну!
for scientists:


default search action
ICC 2014: Sydney, Australia
- IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014. IEEE 2014
- Piyush Agrawal, Anders Ahlén, Tomas Olofsson, Mikael Gidlund
:
Characterization of long term channel variations in industrial wireless sensor networks. 1-6 - Yujae Song, Youngnam Han, Yonghoon Choi:
A QoE-aware joint resource allocation algorithm for uplink carrier aggregation in LTE-Advanced systems. 1-5 - Dusit Niyato
, Ping Wang:
Competitive wireless energy transfer bidding: A game theoretic approach. 1-6 - Cédric Ramassamy, Hacène Fouchal
:
A decision-support tool for Wireless Sensor Networks. 7-11 - Rouhollah Rahmatizadeh, Saad Ahmad Khan, Anura P. Jayasumana, Damla Turgut, Ladislau Bölöni:
Routing towards a mobile sink using virtual coordinates in a wireless sensor network. 12-17 - Cheng Zhao, Wuxiong Zhang, Xiumen Yang, Yang Yang, Ye-Qiong Song
:
A novel compressive sensing based Data Aggregation Scheme for Wireless Sensor Networks. 18-23 - Yun Wang, William Chu, Zhifeng Xiao, Yanping Zhang:
Partial sensing coverage in 3D wireless lattice sensor networks. 24-29 - Victor Sucasas
, Ayman Radwan
, Hugo Marques
, Jonathan Rodriguez
, Seiamak Vahid, Rahim Tafazolli:
On the efficiency of merging procedures in hierarchical mobile cooperative networks. 30-35 - Gang Xu, Edith C. H. Ngai, Jiangchuan Liu:
Information-centric collaborative data collection for mobile devices in wireless sensor networks. 36-41 - Takamasa Higuchi, Hirozumi Yamaguchi
, Teruo Higashino, Mineo Takai:
A neighbor collaboration mechanism for mobile crowd sensing in opportunistic networks. 42-47 - Qihang Shu, Qiang Hu, Jun Zheng:
CLARET: A Cooperative cLuster-heAd failuRE deTection mechanism for wireless sensor networks. 48-52 - Yu Wang, Mehul Motani
, Hari Krishna Garg, Qian Chen, Tie Luo
:
Multi-channel Directional Medium Access Control for ad hoc networks: A cooperative approach. 53-58 - Xin Ao, F. Richard Yu
, Shengming Jiang
, Huaqiang Yuan:
On throughput gain of interference alignment in multi-hop MIMO networks. 59-64 - Xi Xu, Rashid Ansari, Ashfaq A. Khokhar:
Adaptive Hierarchical Data Aggregation using Compressive Sensing (A-HDACS) for Non-Smooth Data Field. 65-70 - Steven Kisseleff, Ian F. Akyildiz, Wolfgang H. Gerstacker:
On modulation for magnetic induction based transmission in wireless underground sensor networks. 71-76 - Orestis Georgiou, Carl P. Dettmann, Justin P. Coon
:
Network connectivity: Stochastic vs. deterministic wireless channels. 77-82 - Kaoru Ota
, Mianxiong Dong
, Shan Chang, Hongzi Zhu:
MMCD: Max-throughput and min-delay cooperative downloading for Drive-thru Internet systems. 83-87 - Qingyu Li, Panlong Yang, Yubo Yan, Yue Tao:
Your friends are more powerful than you: Efficient task offloading through social contacts. 88-93 - Imane Rahmouni, Mohamed El-Kamili
, Mohammed Raiss El-Fenni, Lahcen Omari, Abdellatif Kobbane
:
Optimal buffer management policies in DTNs: A POMDP approach. 94-99 - Yaniv George, Itsik Bergel, Ephraim Zehavi
:
The effect of imperfect CSI on the performance of random ad-hoc networks. 100-105 - Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman:
Energy-balancing method to detect denial of service attacks in wireless sensor networks. 106-111 - Farahnaz Naeimipoor, Azzedine Boukerche:
A Hybrid Video Dissemination Protocol for VANETs. 112-117 - Qingwen Zhao, Yanmin Zhu:
An efficient data aggregation algorithm in delay tolerant vehicular networks. 118-123 - Jun Zhang, Vincent Gauthier
, Houda Labiod, Abhik Banerjee, Hossam Afifi:
Information dissemination in vehicular networks via evolutionary game theory. 124-129 - Huang Cheng, Xin Fei, Mohammed Almulla, Azzedine Boukerche:
A Knapsack Constrained Steiner Tree model for continuous coverage over urban VANETs. 130-135 - Zhenqiang Mi, Yang Yang, Huan Ma, Dandan Wang:
Connectivity preserving task allocation in mobile robotic sensor network. 136-141 - Xiang Lu, Lei Xie, Yafeng Yin, Wei Wang, Baoliu Ye, Sanglu Lu:
Efficient localization based on imprecise anchors in RFID system. 142-147 - Wenzhe Zhang, Lei Wang, Zhenquan Qin, Xueshu Zheng, Liang Sun, Naigao Jin, Lei Shu
:
INBS: An Improved Naive Bayes Simple learning approach for accurate indoor localization. 148-153 - Sangwoo Lee
, Jaehoon Choi, Sunwoo Kim:
Multihop range-free localization with approximate shortest path in anisotropic networks. 154-159 - Xiufang Shi, Yong Huat Chew, Chau Yuen, Zaiyue Yang:
A RSS-EKF localization method using HMM-based LOS/NLOS channel identification. 160-165 - Xiaopei Lu, Dezun Dong, Xiangke Liao:
FLYER: Fine-grained landmark based greedy geographic routing under uncertain locations. 166-171 - Jonathan DeWitt, Suzanne Patt, Hongchi Shi:
Maximizing continuous barrier coverage in energy harvesting sensor networks. 172-177 - Chenfei Gao, Xiang Sheng, Jian Tang, Weiyi Zhang, Shihong Zou, Mohsen Guizani:
Joint mode selection, channel allocation and power assignment for green device-to-device communications. 178-183 - Wafic Alameddine, Walaa Hamouda, Javad Haghighat:
Energy efficient relay selection scheme for cooperative uniformly distributed wireless sensor networks. 184-189 - Michael Frey, Friedrich Große, Mesut Günes
:
Energy-aware ant routing in wireless multi-hop networks. 190-196 - Bingyi Guo, Quansheng Guan, F. Richard Yu
, Shengming Jiang
, Victor C. M. Leung
:
Energy-efficient topology control with selective diversity in cooperative wireless ad hoc networks. 197-202 - Feilong Lin
, Cailian Chen, Liran Li, Honghua Xu, Xinping Guan:
A novel spectrum sharing scheme for industrial cognitive radio networks: From collective motion perspective. 203-208 - Amiotosh Ghosh, Walaa Hamouda:
Throughput performance of MIMO cognitive networks. 209-214 - Huimin Wu, Rong Yu, Yan Zhang:
Exploiting primary user social features for reliability-driven routing in multi-hop cognitive radio networks. 215-220 - Chen Dong, Lie-Liang Yang, Jing Zuo, Soon Xin Ng, Lajos Hanzo
:
Maximum Throughput Adaptive Rate Transmission scheme for multihop diversity aided multihop links. 221-226 - Jiajun Sun, Huadong Ma:
Collection-behavior based multi-parameter posted pricing mechanism for crowd sensing. 227-232 - Ferdews Tlili, Abderrezak Rachedi
, Abderrahim Benslimane
:
Time-bounded localization algorithm based on distributed Multidimensional Scaling for Wireless Sensor Networks. 233-238 - Jagruti Sahoo, Soumaya Cherkaoui, Abdelhakim Hafid:
Optimal selection of aggregation locations for urban sensing. 239-244 - Guanhua Guo, Zhenzhen Jiao, Zheng Yao, Baoxian Zhang, Cheng Li
:
A location-based friend-assisted coding-aware routing protocol for wireless multihop networks. 245-250 - Rodolfo W. L. Coutinho
, Azzedine Boukerche, Luiz Filipe M. Vieira, Antonio A. F. Loureiro:
GEDAR: Geographic and opportunistic routing protocol with Depth Adjustment for mobile underwater sensor networks. 251-256 - Jihed Eddine Said, Lutful Karim, Jalal Almhana, Alagan Anpalagan
:
Heterogeneous mobility and connectivity-based clustering protocol for wireless sensor networks. 257-262 - Nadeem Javaid
, M. Aslam, Karim Djouani
, Zahoor Ali Khan
, Turki Ali Alghamdi
:
ATCEEC: A new energy efficient routing protocol for Wireless Sensor Networks. 263-268 - Cesar Asensio-Marco
, Baltasar Beferull-Lozano:
Optimal topology design for energy efficient consensus in broadcast wireless sensor networks. 269-275 - Adeel Javed, Haibo Zhang
, Zhiyi Huang, Jeremiah D. Deng:
BWS: Beacon-driven wake-up scheme for train localization using wireless sensor networks. 276-281 - Shahid Mumtaz
, Kazi Mohammed Saidul Huq
, Ayman Radwan
, Jonathan Rodriguez
, Rui L. Aguiar:
Energy efficient interference-aware resource allocation in LTE-D2D communication. 282-287 - Deze Zeng, Peng Li, Song Guo
, Toshiaki Miyazaki:
Minimum-energy reprogramming with guaranteed quality-of-sensing in software-defined sensor networks. 288-293 - Adlen Ksentini, Tarik Taleb, Xiaohu Ge
, Honglin Hu:
Congestion-aware MTC device triggering. 294-298 - Mzoughi Houda, Faouzi Zarai, Mohammad S. Obaidat
, Lotfi Kamoun:
Optimizing handover decision and target selection in LTE-A network-based on MIH protocol. 299-304 - Hyung-Sin Kim
, Young-June Choi, Saewoong Bahk:
Elimination of multi-hop transmission from downlink in low power and lossy networks. 305-310 - Chih-Kuang Lin
, Irwin O. Kennedy:
Combining successive interference cancellation and CSMA/CA in a beam forming IEEE 802.15.4 gateway. 311-317 - Tamara Alshammari, Bechir Hamdaoui, Mohsen Guizani, Ammar Rayes:
Overcoming user selfishness in DSA systems through credit-based resource allocation. 318-323 - Zijie Zhang, Guoqiang Mao
, Tao Han, Brian D. O. Anderson:
Cooperative information forwarding in vehicular networks subject to channel randomness. 324-329 - Huong Nguyen Minh, Abderrahim Benslimane
:
Polling scheme for reliable broadcasting in vehicular networks. 330-335 - Haroun Benkaouha, Lynda Mokdad, Abdelli Abdelkrim:
SAN-based modeling of fault tolerant protocols for MANETs. 336-341 - Igor Bisio
, Carlo Braccini, Stefano Delucchi, Fabio Lavagetto
, Mario Marchese
:
Dynamic multi-attribute Network Selection algorithm for Vertical Handover procedures over mobile ad hoc networks. 342-347 - Francesco Chiti
, Romano Fantacci
, Giovanni Rigazzi:
A mobility driven joint clustering and relay selection for IEEE 802.11p/WAVE vehicular networks. 348-353 - Long Qu, Jiaming He, Chadi Assi:
Understanding the benefits of successive interference cancellation in multi-rate multi-hop wireless networks. 354-360 - Changlin Yang, Kwan-Wu Chin
:
A novel distributed algorithm for complete targets coverage in energy harvesting wireless sensor networks. 361-366 - Mohammadreza Soltani, Michael Hempel, Hamid Sharif:
Data fusion utilization for optimizing large-scale Wireless Sensor Networks. 367-372 - Suleyman Uludag
, Murat Karakus
, Evrim Guler
:
Low-complexity 3D target tracking in Wireless Aerial Sensor Networks. 373-378 - Weixiao Meng, Dekun Zhang, Yao Zhao, Cheng Li
:
Distributed joint iterative localization algorithm for WSN. 379-384 - Yafei Mao, Chao Dong, Haipeng Dai, Xiaojun Zhu
, Guihai Chen
:
Optimal scheduling with pairwise coding under heterogeneous delay constraints. 385-390 - Anagha Jamthe, Amitabh Mishra, Dharma P. Agrawal:
Scheduling schemes for interference suppression in healthcare sensor networks. 391-396 - Maodong Li, Chen-Khong Tham
:
Resource scheduling in SC-FDMA based relay wireless sensor networks. 397-402 - Xin Ao, F. Richard Yu
, Huaqiang Yuan, Shengming Jiang
:
Traffic-aware link scheduling with interference alignment for multi-user MIMO networks. 403-408 - Bentao Zhang, Yong Li, Depeng Jin, Pan Hui:
Adaptive wakeup scheduling based on power-law distributed contacts in delay tolerant networks. 409-414 - Udara Sadathana Wijetunge, Ramanan Subramanian, André Pollok
, Sylvie Perreau:
Maximizing packet delivery ratio in stochastic routing: An analytical perspective. 415-420 - Shahram Mohrehkesh, Tamer Nadeem:
Optimized inquiry mechanisms for Bluetooth devices. 421-427 - Ismail Bennis
, Hacène Fouchal
, Ouadoudi Zytoune
, Driss Aboutajdine:
An evaluation of the TPGF protocol implementation over NS-2. 428-433 - Jun Huang, Donggai Du, Qiang Duan, Yi Sun, Ying Yin, Tiantian Zhou, Yanguang Zhang:
Modeling and analysis on congestion control in the Internet of Things. 434-439 - Minming Ni, Jianping Pan
, Lin Cai
:
Power Emission Density-based interference analysis for random wireless networks. 440-445 - Hongning Dai
, Raymond Chi-Wing Wong
, Qinglin Zhao:
Multi-channel wireless networks with infrastructure support: Capacity and delay. 446-451 - Panayiotis Kolios, Andreas Pitsillides, Osnat Mokryn
, Katerina Papadaki:
Explore and exploit in wireless ad hoc emergency response networks. 452-458 - Mohammed Elmorsy, Ehab S. Elmallah:
On pathsets and cutsets of a Wireless Sensor Network surveillance problem. 459-465 - Norberto Barroca, Luís M. Borges, Fernando J. Velez
, Periklis Chatzimisios
:
IEEE 802.15.4 MAC layer performance enhancement by employing RTS/CTS combined with packet concatenation. 466-471 - Serdar Vural, Pirabakaran Navaratnam, Ning Wang, Rahim Tafazolli:
Asynchronous clustering of multihop Wireless Sensor Networks. 472-477 - Jian Su, Ha H. Nguyen:
Sensor grouping for linear distributed estimation in a wireless sensor network. 478-483 - Osama Arouk, Adlen Ksentini, Yassine Hadjadj Aoul, Tarik Taleb:
On improving the group paging method for machine-type-communications. 484-489 - Zhaolong Ning
, Qingyang Song, Lei Guo
, Koji Okamura:
Social-oriented adaptive transmission in wireless ad hoc networks. 490-495 - Chao Zhang, Yingjian Liu, Zhongwen Guo, Guodong Sun, Yu Wang:
Minimum cost localization problem in three-dimensional ocean sensor networks. 496-501 - Shun Cai, Sanfeng Zhang, Guoxin Wu, Yongqiang Dong, Taieb Znati:
Minimum cost opportunistic routing with intra-session network coding. 502-507 - Firooz B. Saghezchi
, Ayman Radwan
, Jonathan Rodriguez
, Abd-Elhamid M. Taha:
Coalitional relay selection game to extend battery lifetime of multi-standard mobile terminals. 508-513 - De-You Zhang, Qiyue Yu, Weixiao Meng, Cheng Li
:
2FSK modulation for multiuser physical-layer network coding network. 514-519 - Reza Monir Vaghefi, R. Michael Buehrer:
Joint TOA-based sensor synchronization and localization using semidefinite programming. 520-525 - Yue Lu, Wei Wang, Lin Chen, Zhaoyang Zhang, Aiping Huang:
Opportunistic forwarding in energy harvesting mobile delay tolerant networks. 526-531 - Novella Bartolini
, Giancarlo Bongiovanni, Thomas La Porta, Simone Silvestri, F. Vincenti:
Voronoi-based deployment of mobile sensors in the face of adversaries. 532-537 - Hichem Sedjelmaci, Sidi-Mohammed Senouci:
A new Intrusion Detection Framework for Vehicular Networks. 538-543 - Ruki Harwahyu
, Harris Simaremare, Riri Fitri Sari
, Pascal Lorenz
:
Performance estimation of AODV variant with trust mechanism. 544-549 - Panagiotis Karkazis
, Ioannis Papaefstathiou
, Lambros Sarakis, Theodore B. Zahariadis
, Terpsichori-Helen N. Velivasaki
, Dimitrios Bargiotas:
Evaluation of RPL with a transmission count-efficient and trust-aware routing metric. 550-556 - Chunsheng Zhu, Hasen Nicanfar, Victor C. M. Leung
, Wenxiang Li, Laurence T. Yang:
A trust and reputation management system for cloud and sensor networks integration. 557-562 - Xu Wu, Jun Zheng, Hui Tong, Nathalie Mitton:
DAYcast: A dynamic transmission delay based broadcast protocol for vehicular ad hoc networks. 563-567 - Omar Chakroun, Soumaya Cherkaoui:
RMDS: Relevance-based messages dissemination scheme for 802.11p VANETs. 568-573 - Razvan Cristian Voicu, Hamza Ijaz Abbasi, Huangwei Fang, Billy Kihei, John A. Copeland, Yusun Chang:
Fast and reliable broadcasting in VANETs using SNR with ACK decoupling. 574-579 - Renfei Wang, Mohammed Almulla, Cristiano G. Rezende, Azzedine Boukerche:
Video streaming over vehicular networks by a multiple path solution with error correction. 580-585 - Sylvere Kwatirayo, Jalal Almhana, Z. Liu, J. Siblini:
Optimizing road intersection traffic flow using stochastic and heuristic algorithms. 586-591 - Yu Li, Rui Dai, Junjie Zhang:
Morphing communications of Cyber-Physical Systems towards moving-target defense. 592-598 - Liang Xiao
, Yan Chen, K. J. Ray Liu
:
Anti-cheating prosumer energy exchange based on indirect reciprocity. 599-604 - Wenlin Han, Yang Xiao
:
NFD: A practical scheme to detect non-technical loss fraud in smart grid. 605-609 - Alexander Oberle, Pedro Larbig, Nicolai Kuntze, Carsten Rudolph
:
Integrity based relationships and trustworthy communication between network participants. 610-615 - Yihai Zhu, Jun Yan, Yufei Tang, Yan Sun, Haibo He:
The sequential attack against power grid networks. 616-621 - Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
:
Enhancing email classification using data reduction and disagreement-based semi-supervised learning. 622-627 - Yong Wang, Long-Ping He, Jing Peng, Jie Hou, Yun Xia:
A context-dependent privacy preserving framework in road networks. 628-633 - Dongxiao Liu, Hongwei Li, Yi Yang, Haomiao Yang:
Achieving Multi-Authority Access Control with Efficient Attribute Revocation in smart grid. 634-639 - Elias Bou-Harb
, Claude Fachkha
, Mourad Debbabi, Chadi Assi:
Inferring internet-scale infections by correlating malware and probing activities. 640-646 - Guanglou Zheng, Gengfa Fang, Mehmet A. Orgun
, Rajan Shankaran
:
A non-key based security scheme supporting emergency treatment of wireless implants. 647-652 - Yanbing Liu, Qingyun Liu, Ping Liu, Jianlong Tan, Li Guo:
A factor-searching-based multiple string matching algorithm for intrusion detection. 653-658 - Yu Ding, Zhuo Peng, Yuanyuan Zhou, Chao Zhang:
Android low entropy demystified. 659-664 - Kevin C. Lee, Jing Deng, Raghuram S. Sudhaakar:
Fast authentication in multi-hop infrastructure-based mobile communication. 665-670 - Zhexiong Wei, Helen Tang, F. Richard Yu
, Maoyu Wang, Peter C. Mason:
Trust establishment with data fusion for secure routing in MANETs. 671-676 - Carol J. Fung, Barbara Martini, Molka Gharbaoui, Francesco Paolucci, Alessio Giorgetti
, Piero Castoldi:
Quality of interaction among path computation elements for trust-aware inter-provider cooperation. 677-682 - Bo Fu, Yang Xiao
:
A multi-resolution flow-net methodology for accountable logging and its application in TCP/IP networks. 683-687 - Yi-Hui Lin, Chih-Yu Wang, Wen-Tsuen Chen:
A content privacy-preserving protocol for energy-efficient access to commercial online social networks. 688-694 - He Li
, Peng Li, Song Guo
, Shui Yu
:
Byzantine-resilient secure software-defined networks with multiple controllers. 695-700