callback( { "result":{ "query":":facetid:toc:\"db/conf/wimob/wimob2008.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"201.70" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"129", "@dc":"129", "@oc":"129", "@id":"43418992", "text":":facetid:toc:db/conf/wimob/wimob2008.bht" } }, "hits":{ "@total":"129", "@computed":"129", "@sent":"129", "@first":"0", "hit":[{ "@score":"1", "@id":"5421659", "info":{"authors":{"author":[{"@pid":"80/6526","text":"Athanassios V. Adamis"},{"@pid":"60/4430","text":"Konstantinos N. Maliatsos"},{"@pid":"12/1224","text":"Philip Constantinou"}]},"title":"Throughput Analysis of Overlay CSMA/CA for Secondary Networks.","venue":"WiMob","pages":"75-81","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/AdamisMC08","doi":"10.1109/WIMOB.2008.31","ee":"https://doi.org/10.1109/WiMob.2008.31","url":"https://dblp.org/rec/conf/wimob/AdamisMC08"}, "url":"URL#5421659" }, { "@score":"1", "@id":"5421660", "info":{"authors":{"author":{"@pid":"a/IAAkyildiz","text":"Ian F. Akyildiz"}},"title":"Spectrum Management in Cognitive Radio Networks.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Akyildiz08","doi":"10.1109/WIMOB.2008.131","ee":"https://doi.org/10.1109/WiMob.2008.131","url":"https://dblp.org/rec/conf/wimob/Akyildiz08"}, "url":"URL#5421660" }, { "@score":"1", "@id":"5421661", "info":{"authors":{"author":[{"@pid":"76/4405","text":"Afef Ben Hadj Alaya-Feki"},{"@pid":"122/8238","text":"Berna Sayraç"},{"@pid":"58/6693","text":"Paul Houzé"},{"@pid":"54/2358","text":"Eric Moulines"}]},"title":"Opportunistic Spectrum Access with IEEE 802.11 in IEEE P1900.4 Framework.","venue":"WiMob","pages":"82-83","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Alaya-FekiSHM08","doi":"10.1109/WIMOB.2008.119","ee":"https://doi.org/10.1109/WiMob.2008.119","url":"https://dblp.org/rec/conf/wimob/Alaya-FekiSHM08"}, "url":"URL#5421661" }, { "@score":"1", "@id":"5421662", "info":{"authors":{"author":[{"@pid":"57/210","text":"Faisal Alazem"},{"@pid":"80/1206","text":"Jean-François Frigon"},{"@pid":"81/2486","text":"David Haccoun"}]},"title":"Throughput and Performance Optimization Using an Adaptive Coded Cooperation Protocol.","venue":"WiMob","pages":"126-132","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/AlazemFH08","doi":"10.1109/WIMOB.2008.24","ee":"https://doi.org/10.1109/WiMob.2008.24","url":"https://dblp.org/rec/conf/wimob/AlazemFH08"}, "url":"URL#5421662" }, { "@score":"1", "@id":"5421663", "info":{"authors":{"author":[{"@pid":"43/1601","text":"Ali Ramadan Ali"},{"@pid":"84/514","text":"Tariq Jamil Saifullah Khanzada"},{"@pid":"90/337","text":"Abbas S. Omar"}]},"title":"Channel Estimation for OFDM Systems in Rapidly Time-Variant Channels Using High Degree Channel Approximation.","venue":"WiMob","pages":"346-348","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/AliKO08","doi":"10.1109/WIMOB.2008.136","ee":"https://doi.org/10.1109/WiMob.2008.136","url":"https://dblp.org/rec/conf/wimob/AliKO08"}, "url":"URL#5421663" }, { "@score":"1", "@id":"5421664", "info":{"authors":{"author":{"@pid":"91/1800","text":"Christos D. Antonopoulos"}},"title":"On SDMA Transmission Considering an Efficient IP Based IEEE 802.16 Relay Station.","venue":"WiMob","pages":"310-315","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Antonopoulos08","doi":"10.1109/WIMOB.2008.93","ee":"https://doi.org/10.1109/WiMob.2008.93","url":"https://dblp.org/rec/conf/wimob/Antonopoulos08"}, "url":"URL#5421664" }, { "@score":"1", "@id":"5421665", "info":{"authors":{"author":[{"@pid":"55/4464","text":"Marco von Arb"},{"@pid":"32/6070","text":"Matthias Bader"},{"@pid":"k/MichaelKuhn2","text":"Michael Kuhn 0002"},{"@pid":"w/RogerWattenhofer","text":"Roger Wattenhofer"}]},"title":"VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking.","venue":"WiMob","pages":"184-189","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ArbBKW08","doi":"10.1109/WIMOB.2008.52","ee":"https://doi.org/10.1109/WiMob.2008.52","url":"https://dblp.org/rec/conf/wimob/ArbBKW08"}, "url":"URL#5421665" }, { "@score":"1", "@id":"5421666", "info":{"authors":{"author":[{"@pid":"a/ChadiAssi","text":"Chadi Assi"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"}]},"title":"Message from the Technical Program Committee Co-chairs.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/AssiC08","doi":"10.1109/WIMOB.2008.5","ee":"https://doi.org/10.1109/WiMob.2008.5","url":"https://dblp.org/rec/conf/wimob/AssiC08"}, "url":"URL#5421666" }, { "@score":"1", "@id":"5421667", "info":{"authors":{"author":[{"@pid":"61/1693","text":"Yacob Astatke"},{"@pid":"42/2973","text":"Richard Dean"},{"@pid":"49/4899","text":"L. S. Ange"}]},"title":"Power Performance Measure for QOS Service Management in Mixed Networks.","venue":"WiMob","pages":"454-459","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/AstatkeDA08","doi":"10.1109/WIMOB.2008.27","ee":"https://doi.org/10.1109/WiMob.2008.27","url":"https://dblp.org/rec/conf/wimob/AstatkeDA08"}, "url":"URL#5421667" }, { "@score":"1", "@id":"5421668", "info":{"authors":{"author":[{"@pid":"61/6362","text":"Ertugrul Basar"},{"@pid":"86/3765","text":"Ümit Aygölü"}]},"title":"A New 2×2 Coordinate Interleaved STBC for High-Rate Wireless Systems.","venue":"WiMob","pages":"151-152","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BasarA08","doi":"10.1109/WIMOB.2008.15","ee":"https://doi.org/10.1109/WiMob.2008.15","url":"https://dblp.org/rec/conf/wimob/BasarA08"}, "url":"URL#5421668" }, { "@score":"1", "@id":"5421669", "info":{"authors":{"author":[{"@pid":"59/2380-2","text":"Christian Bauer 0002"},{"@pid":"40/6465","text":"Max Ehammer"}]},"title":"Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures.","venue":"WiMob","pages":"555-560","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BauerE08","doi":"10.1109/WIMOB.2008.81","ee":"https://doi.org/10.1109/WiMob.2008.81","url":"https://dblp.org/rec/conf/wimob/BauerE08"}, "url":"URL#5421669" }, { "@score":"1", "@id":"5421670", "info":{"authors":{"author":{"@pid":"85/964","text":"Abderrahim Benslimane"}},"title":"Message from the General Chair.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Benslimane08","doi":"10.1109/WIMOB.2008.4","ee":"https://doi.org/10.1109/WiMob.2008.4","url":"https://dblp.org/rec/conf/wimob/Benslimane08"}, "url":"URL#5421670" }, { "@score":"1", "@id":"5421671", "info":{"authors":{"author":[{"@pid":"72/1568","text":"Diana Berbecaru"},{"@pid":"41/3229","text":"Luca Albertalli"}]},"title":"On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks.","venue":"WiMob","pages":"234-240","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BerbecaruA08","doi":"10.1109/WIMOB.2008.14","ee":"https://doi.org/10.1109/WiMob.2008.14","url":"https://dblp.org/rec/conf/wimob/BerbecaruA08"}, "url":"URL#5421671" }, { "@score":"1", "@id":"5421672", "info":{"authors":{"author":{"@pid":"52/6906","text":"Leo Bhebhe"}},"title":"Multi-access Mobility in Heterogeneous Wireless Networks: Today and Tomorrow.","venue":"WiMob","pages":"165-171","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Bhebhe08","doi":"10.1109/WIMOB.2008.133","ee":"https://doi.org/10.1109/WiMob.2008.133","url":"https://dblp.org/rec/conf/wimob/Bhebhe08"}, "url":"URL#5421672" }, { "@score":"1", "@id":"5421673", "info":{"authors":{"author":[{"@pid":"87/1930","text":"Greg Bigwood"},{"@pid":"34/2735","text":"Devan Rehunathan"},{"@pid":"95/3775","text":"Martin Bateman"},{"@pid":"44/6415","text":"Tristan Henderson"},{"@pid":"70/4252","text":"Saleem N. Bhatti"}]},"title":"Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments.","venue":"WiMob","pages":"484-489","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BigwoodRBHB08","doi":"10.1109/WIMOB.2008.86","ee":"https://doi.org/10.1109/WiMob.2008.86","url":"https://dblp.org/rec/conf/wimob/BigwoodRBHB08"}, "url":"URL#5421673" }, { "@score":"1", "@id":"5421674", "info":{"authors":{"author":[{"@pid":"79/5442","text":"Flaminio Borgonovo"},{"@pid":"31/4899","text":"Matteo Cesana"}]},"title":"ARPA: An Arbitration Protocol Based on Advanced Channel Feedback for Radio Frequency Identification.","venue":"WiMob","pages":"178-183","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BorgonovoC08","doi":"10.1109/WIMOB.2008.40","ee":"https://doi.org/10.1109/WiMob.2008.40","url":"https://dblp.org/rec/conf/wimob/BorgonovoC08"}, "url":"URL#5421674" }, { "@score":"1", "@id":"5421675", "info":{"authors":{"author":[{"@pid":"06/5229","text":"Ghalem Boudour"},{"@pid":"94/6633","text":"Cédric Teyssié"},{"@pid":"43/5940","text":"Zoubir Mammeri"}]},"title":"Scheduling-Based Reservation MAC Protocol for Bandwidth and Delay Optimization in Wireless Mesh Networks.","venue":"WiMob","pages":"272-277","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BoudourTM08","doi":"10.1109/WIMOB.2008.10","ee":"https://doi.org/10.1109/WiMob.2008.10","url":"https://dblp.org/rec/conf/wimob/BoudourTM08"}, "url":"URL#5421675" }, { "@score":"1", "@id":"5421676", "info":{"authors":{"author":[{"@pid":"80/4023","text":"Manel Boujelben"},{"@pid":"32/6182","text":"Habib Youssef"},{"@pid":"71/1639","text":"Mohamed Abid"}]},"title":"An Efficient Scheme for Key Pre-distribution in Wireless Sensor Networks.","venue":"WiMob","pages":"532-537","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BoujelbenYA08","doi":"10.1109/WIMOB.2008.41","ee":"https://doi.org/10.1109/WiMob.2008.41","url":"https://dblp.org/rec/conf/wimob/BoujelbenYA08"}, "url":"URL#5421676" }, { "@score":"1", "@id":"5421677", "info":{"authors":{"author":[{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"},{"@pid":"51/855","text":"Xin Fei"}]},"title":"Adaptive Data-Gathering Protocols with Mobile Collectors for Vehicular Ad Hoc and Sensor Networks.","venue":"WiMob","pages":"7-12","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BoukercheF08","doi":"10.1109/WIMOB.2008.124","ee":"https://doi.org/10.1109/WiMob.2008.124","url":"https://dblp.org/rec/conf/wimob/BoukercheF08"}, "url":"URL#5421677" }, { "@score":"1", "@id":"5421678", "info":{"authors":{"author":[{"@pid":"09/6138","text":"Mike Burmester"},{"@pid":"79/5444","text":"Emmanouil Magkos"},{"@pid":"87/2923","text":"Vassilios Chrissikopoulos"}]},"title":"Strengthening Privacy Protection in VANETs.","venue":"WiMob","pages":"508-513","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BurmesterMC08","doi":"10.1109/WIMOB.2008.32","ee":"https://doi.org/10.1109/WiMob.2008.32","url":"https://dblp.org/rec/conf/wimob/BurmesterMC08"}, "url":"URL#5421678" }, { "@score":"1", "@id":"5421679", "info":{"authors":{"author":[{"@pid":"10/6388","text":"Sara Bury"},{"@pid":"15/3285","text":"Johnathan Ishmael"},{"@pid":"r/NicholasJPRace","text":"Nicholas J. P. Race"},{"@pid":"86/5797-1","text":"Paul Smith 0001"},{"@pid":"66/4061","text":"Mark Rouncefield"}]},"title":"Towards an Understanding of Security Concerns within Communities.","venue":"WiMob","pages":"478-483","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BuryIRSR08","doi":"10.1109/WIMOB.2008.90","ee":"https://doi.org/10.1109/WiMob.2008.90","url":"https://dblp.org/rec/conf/wimob/BuryIRSR08"}, "url":"URL#5421679" }, { "@score":"1", "@id":"5421680", "info":{"authors":{"author":[{"@pid":"10/1213","text":"Yann Busnel"},{"@pid":"97/4050","text":"Marin Bertier"},{"@pid":"86/676","text":"Anne-Marie Kermarrec"}]},"title":"SOLIST or How to Look for a Needle in a Haystack? A Lightweight Multi-overlay Structure for Wireless Sensor Networks.","venue":"WiMob","pages":"25-31","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/BusnelBK08","doi":"10.1109/WIMOB.2008.56","ee":"https://doi.org/10.1109/WiMob.2008.56","url":"https://dblp.org/rec/conf/wimob/BusnelBK08"}, "url":"URL#5421680" }, { "@score":"1", "@id":"5421681", "info":{"authors":{"author":[{"@pid":"c/ClaudiaCanali","text":"Claudia Canali"},{"@pid":"c/MicheleColajanni","text":"Michele Colajanni"},{"@pid":"l/RiccardoLancellotti","text":"Riccardo Lancellotti"}]},"title":"Resource Management Strategies for Mobile Web-Based Services.","venue":"WiMob","pages":"172-177","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/CanaliCL08","doi":"10.1109/WIMOB.2008.94","ee":"https://doi.org/10.1109/WiMob.2008.94","url":"https://dblp.org/rec/conf/wimob/CanaliCL08"}, "url":"URL#5421681" }, { "@score":"1", "@id":"5421682", "info":{"authors":{"author":[{"@pid":"40/6150","text":"Ali Chamam"},{"@pid":"50/1610","text":"Samuel Pierre"}]},"title":"Power-Efficient Clustering in Wireless Sensor Networks under Coverage Constraint.","venue":"WiMob","pages":"460-465","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ChamamP08","doi":"10.1109/WIMOB.2008.78","ee":"https://doi.org/10.1109/WiMob.2008.78","url":"https://dblp.org/rec/conf/wimob/ChamamP08"}, "url":"URL#5421682" }, { "@score":"1", "@id":"5421683", "info":{"authors":{"author":[{"@pid":"53/5651","text":"Eddie C. L. Chan"},{"@pid":"69/1655","text":"George Baciu"},{"@pid":"39/4284","text":"S. C. Mak"}]},"title":"Wireless Tracking Analysis in Location Fingerprinting.","venue":"WiMob","pages":"214-220","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ChanBM08","doi":"10.1109/WIMOB.2008.30","ee":"https://doi.org/10.1109/WiMob.2008.30","url":"https://dblp.org/rec/conf/wimob/ChanBM08"}, "url":"URL#5421683" }, { "@score":"1", "@id":"5421684", "info":{"authors":{"author":[{"@pid":"91/560","text":"Guillaume Chelius"},{"@pid":"67/176","text":"Isaac Woungang"},{"@pid":"181/2306-1","text":"Stuart Cunningham 0001"}]},"title":"Message from the STWiMob Workshop Organizing Technical Co-chairs.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/CheliusWC08","doi":"10.1109/WIMOB.2008.130","ee":"https://doi.org/10.1109/WiMob.2008.130","url":"https://dblp.org/rec/conf/wimob/CheliusWC08"}, "url":"URL#5421684" }, { "@score":"1", "@id":"5421685", "info":{"authors":{"author":[{"@pid":"47/2309","text":"Bayrem Chelly"},{"@pid":"61/2796","text":"Naceur Malouch"}]},"title":"Movement and Connectivity Algorithms for Location-Based Mobile Social Networks.","venue":"WiMob","pages":"190-195","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ChellyM08","doi":"10.1109/WIMOB.2008.48","ee":"https://doi.org/10.1109/WiMob.2008.48","url":"https://dblp.org/rec/conf/wimob/ChellyM08"}, "url":"URL#5421685" }, { "@score":"1", "@id":"5421686", "info":{"authors":{"author":[{"@pid":"15/5642","text":"Myeon-Gyun Cho"},{"@pid":"45/6025","text":"Shik Kim"}]},"title":"An Efficient CQI Feedback Scheme for Multi-user and Single-User MIMO/OFDMA Systems.","venue":"WiMob","pages":"104-105","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ChoK08","doi":"10.1109/WIMOB.2008.108","ee":"https://doi.org/10.1109/WiMob.2008.108","url":"https://dblp.org/rec/conf/wimob/ChoK08"}, "url":"URL#5421686" }, { "@score":"1", "@id":"5421687", "info":{"authors":{"author":[{"@pid":"45/3787","text":"Myung Sil Choi"},{"@pid":"02/8768","text":"Hyun Woo Kim"},{"@pid":"02/112","text":"Yong Hwan Kim"},{"@pid":"74/1790","text":"Kyung Ho Chung"},{"@pid":"66/6316","text":"Kwang Seon Ahn"}]},"title":"Private Information Protection System with Web-Crawler.","venue":"WiMob","pages":"672-677","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ChoiKKCA08","doi":"10.1109/WIMOB.2008.63","ee":"https://doi.org/10.1109/WiMob.2008.63","url":"https://dblp.org/rec/conf/wimob/ChoiKKCA08"}, "url":"URL#5421687" }, { "@score":"1", "@id":"5421688", "info":{"authors":{"author":[{"@pid":"66/5198","text":"Supasate Choochaisri"},{"@pid":"25/6097","text":"Chalermek Intanagonwiwat"}]},"title":"A System for Using Wireless Sensor Networks as Globally Deductive Databases.","venue":"WiMob","pages":"649-654","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ChoochaisriI08","doi":"10.1109/WIMOB.2008.22","ee":"https://doi.org/10.1109/WiMob.2008.22","url":"https://dblp.org/rec/conf/wimob/ChoochaisriI08"}, "url":"URL#5421688" }, { "@score":"1", "@id":"5421689", "info":{"authors":{"author":[{"@pid":"68/1770","text":"Robin D'Haenens"},{"@pid":"42/6456","text":"Jeroen Doggen"},{"@pid":"79/1562","text":"Dirk Bakker"},{"@pid":"22/1573","text":"Tim Dams"}]},"title":"Transmitting Scalable Video with Unequal Error Protection over 802.11b/g.","venue":"WiMob","pages":"638-643","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DHaenensDBD08","doi":"10.1109/WIMOB.2008.66","ee":"https://doi.org/10.1109/WiMob.2008.66","url":"https://dblp.org/rec/conf/wimob/DHaenensDBD08"}, "url":"URL#5421689" }, { "@score":"1", "@id":"5421690", "info":{"authors":{"author":[{"@pid":"55/5614","text":"Hisham Dahshan"},{"@pid":"27/1377-1","text":"James Irvine 0001"}]},"title":"Analysis of Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying.","venue":"WiMob","pages":"538-542","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DahshanI08","doi":"10.1109/WIMOB.2008.68","ee":"https://doi.org/10.1109/WiMob.2008.68","url":"https://dblp.org/rec/conf/wimob/DahshanI08"}, "url":"URL#5421690" }, { "@score":"1", "@id":"5421691", "info":{"authors":{"author":[{"@pid":"57/576","text":"Laila Daniel"},{"@pid":"03/197","text":"Ilpo Järvinen"},{"@pid":"01/4536","text":"Markku Kojo"}]},"title":"Combating Packet Reordering in Vertical Handoff Using Cross-Layer Notifications to TCP.","venue":"WiMob","pages":"297-303","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DanielJK08","doi":"10.1109/WIMOB.2008.117","ee":"https://doi.org/10.1109/WiMob.2008.117","url":"https://dblp.org/rec/conf/wimob/DanielJK08"}, "url":"URL#5421691" }, { "@score":"1", "@id":"5421692", "info":{"authors":{"author":[{"@pid":"04/1010","text":"Lara B. Deek"},{"@pid":"64/3049","text":"Sarah Thoubian"},{"@pid":"59/853","text":"Serouj Jamijian"},{"@pid":"63/4747","text":"Khaled A. Harras"},{"@pid":"09/3843","text":"Hassan Artail"}]},"title":"Exploiting Parallel Networks in Intermittently-Connected Mobile Environments.","venue":"WiMob","pages":"57-62","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DeekTJHA08","doi":"10.1109/WIMOB.2008.96","ee":"https://doi.org/10.1109/WiMob.2008.96","url":"https://dblp.org/rec/conf/wimob/DeekTJHA08"}, "url":"URL#5421692" }, { "@score":"1", "@id":"5421693", "info":{"authors":{"author":[{"@pid":"30/6888","text":"Anand Dersingh"},{"@pid":"19/6373","text":"Ramiro Liscano"},{"@pid":"06/3746","text":"Allan G. Jost"}]},"title":"Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems.","venue":"WiMob","pages":"435-441","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DersinghLJ08","doi":"10.1109/WIMOB.2008.116","ee":"https://doi.org/10.1109/WiMob.2008.116","url":"https://dblp.org/rec/conf/wimob/DersinghLJ08"}, "url":"URL#5421693" }, { "@score":"1", "@id":"5421694", "info":{"authors":{"author":[{"@pid":"52/6933","text":"Sanjay Kumar Dhurandher"},{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"87/635","text":"Nidhi Gupta"}]},"title":"QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization.","venue":"WiMob","pages":"598-602","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DhurandherMOG08","doi":"10.1109/WIMOB.2008.61","ee":"https://doi.org/10.1109/WiMob.2008.61","url":"https://dblp.org/rec/conf/wimob/DhurandherMOG08"}, "url":"URL#5421694" }, { "@score":"1", "@id":"5421695", "info":{"authors":{"author":[{"@pid":"75/1461","text":"Ada Diaconescu"},{"@pid":"96/7032","text":"Johann Bourcier"},{"@pid":"13/2652","text":"Clément Escoffier"}]},"title":"Autonomic iPOJO: Towards Self-Managing Middleware for Ubiquitous Systems.","venue":"WiMob","pages":"472-477","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DiaconescuBE08","doi":"10.1109/WIMOB.2008.89","ee":"https://doi.org/10.1109/WiMob.2008.89","url":"https://dblp.org/rec/conf/wimob/DiaconescuBE08"}, "url":"URL#5421695" }, { "@score":"1", "@id":"5421696", "info":{"authors":{"author":[{"@pid":"79/6718","text":"Raheleh B. Dilmaghani"},{"@pid":"r/RameshRRao","text":"Ramesh R. Rao"}]},"title":"An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response.","venue":"WiMob","pages":"442-447","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DilmaghaniR08","doi":"10.1109/WIMOB.2008.103","ee":"https://doi.org/10.1109/WiMob.2008.103","url":"https://dblp.org/rec/conf/wimob/DilmaghaniR08"}, "url":"URL#5421696" }, { "@score":"1", "@id":"5421697", "info":{"authors":{"author":[{"@pid":"66/4739","text":"Desislava C. Dimitrova"},{"@pid":"h/GeertJHeijenk","text":"Geert J. Heijenk"},{"@pid":"v/HansvandenBerg","text":"Hans van den Berg"},{"@pid":"40/2635","text":"Remco Litjens"}]},"title":"Impact of Inter-cell Interference on Flow Level Performance of Scheduling Schemes for the UMTS EUL.","venue":"WiMob","pages":"106-112","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DimitrovaHBL08","doi":"10.1109/WIMOB.2008.107","ee":"https://doi.org/10.1109/WiMob.2008.107","url":"https://dblp.org/rec/conf/wimob/DimitrovaHBL08"}, "url":"URL#5421697" }, { "@score":"1", "@id":"5421698", "info":{"authors":{"author":[{"@pid":"89/426","text":"Athanasios Doukas"},{"@pid":"27/378","text":"Grigorios Kalivas"}]},"title":"A Novel SNR per Subcarrier Estimation Scheme for OFDM Systems in Frequency Selective Channels.","venue":"WiMob","pages":"340-345","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/DoukasK08","doi":"10.1109/WIMOB.2008.59","ee":"https://doi.org/10.1109/WiMob.2008.59","url":"https://dblp.org/rec/conf/wimob/DoukasK08"}, "url":"URL#5421698" }, { "@score":"1", "@id":"5421699", "info":{"authors":{"author":[{"@pid":"80/6415","text":"Jad El-Najjar"},{"@pid":"58/5281","text":"Brigitte Jaumard"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"}]},"title":"Maximizing Network Stability in a Mobile WiMax/802.16 Mesh Centralized Scheduling.","venue":"WiMob","pages":"259-265","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/El-NajjarJA08","doi":"10.1109/WIMOB.2008.47","ee":"https://doi.org/10.1109/WiMob.2008.47","url":"https://dblp.org/rec/conf/wimob/El-NajjarJA08"}, "url":"URL#5421699" }, { "@score":"1", "@id":"5421700", "info":{"authors":{"author":[{"@pid":"89/2756","text":"Wajdi Elleuch"},{"@pid":"04/4867","text":"Alain C. Houle"}]},"title":"Multiparty Voice over IP (MVoIP) Peer-Based System for Large-Scale Conference Support.","venue":"WiMob","pages":"415-416","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ElleuchH08","doi":"10.1109/WIMOB.2008.122","ee":"https://doi.org/10.1109/WiMob.2008.122","url":"https://dblp.org/rec/conf/wimob/ElleuchH08"}, "url":"URL#5421700" }, { "@score":"1", "@id":"5421701", "info":{"authors":{"author":[{"@pid":"82/6127","text":"Jonathan Engelsma"},{"@pid":"75/3630","text":"James C. Ferrans"},{"@pid":"49/316","text":"Mat C. Hans"}]},"title":"EncounterEngine: Integrating Bluetooth User Proximity Data into Social Applications.","venue":"WiMob","pages":"502-507","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/EngelsmaFH08","doi":"10.1109/WIMOB.2008.74","ee":"https://doi.org/10.1109/WiMob.2008.74","url":"https://dblp.org/rec/conf/wimob/EngelsmaFH08"}, "url":"URL#5421701" }, { "@score":"1", "@id":"5421702", "info":{"authors":{"author":[{"@pid":"23/718","text":"Imran Erguler"},{"@pid":"80/3118","text":"Emin Anarim"}]},"title":"A Password-Based Key Establishment Protocol with Symmetric Key Cryptography.","venue":"WiMob","pages":"543-548","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ErgulerA08","doi":"10.1109/WIMOB.2008.112","ee":"https://doi.org/10.1109/WiMob.2008.112","url":"https://dblp.org/rec/conf/wimob/ErgulerA08"}, "url":"URL#5421702" }, { "@score":"1", "@id":"5421703", "info":{"authors":{"author":[{"@pid":"41/6612","text":"Kevin Eustice"},{"@pid":"47/6759","text":"A. M. Jourabchi"},{"@pid":"15/810","text":"J. Stoops"},{"@pid":"r/PLReiher","text":"Peter L. Reiher"}]},"title":"Improving User Satisfaction in a Ubiquitous Computing Application.","venue":"WiMob","pages":"496-501","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/EusticeJSR08","doi":"10.1109/WIMOB.2008.106","ee":"https://doi.org/10.1109/WiMob.2008.106","url":"https://dblp.org/rec/conf/wimob/EusticeJSR08"}, "url":"URL#5421703" }, { "@score":"1", "@id":"5421704", "info":{"authors":{"author":[{"@pid":"96/4997","text":"Lorenzo Favalli"},{"@pid":"36/86","text":"Pietro Savazzi"},{"@pid":"07/111","text":"Anna Vizziello"}]},"title":"Estimation and Mitigation of Intercarrier Interference for OFDM Systems in Multipath Fading Channels.","venue":"WiMob","pages":"349-354","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/FavalliSV08","doi":"10.1109/WIMOB.2008.58","ee":"https://doi.org/10.1109/WiMob.2008.58","url":"https://dblp.org/rec/conf/wimob/FavalliSV08"}, "url":"URL#5421704" }, { "@score":"1", "@id":"5421705", "info":{"authors":{"author":[{"@pid":"25/4649","text":"Alberto Ferrante"},{"@pid":"78/3581","text":"Roberto Pompei"},{"@pid":"12/4059","text":"Anastasia Stulova"},{"@pid":"70/3421","text":"Antonio Vincenzo Taddeo"}]},"title":"A Protocol for Pervasive Distributed Computing Reliability.","venue":"WiMob","pages":"574-579","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/FerrantePST08","doi":"10.1109/WIMOB.2008.23","ee":"https://doi.org/10.1109/WiMob.2008.23","url":"https://dblp.org/rec/conf/wimob/FerrantePST08"}, "url":"URL#5421705" }, { "@score":"1", "@id":"5421706", "info":{"authors":{"author":[{"@pid":"84/1516","text":"Anna Förster"},{"@pid":"m/AmyLMurphy","text":"Amy L. Murphy"},{"@pid":"s/JochenHSchiller","text":"Jochen H. Schiller"},{"@pid":"t/KirstenTerfloth","text":"Kirsten Terfloth"}]},"title":"An Efficient Implementation of Reinforcement Learning Based Routing on Real WSN Hardware.","venue":"WiMob","pages":"247-252","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ForsterMST08","doi":"10.1109/WIMOB.2008.99","ee":"https://doi.org/10.1109/WiMob.2008.99","url":"https://dblp.org/rec/conf/wimob/ForsterMST08"}, "url":"URL#5421706" }, { "@score":"1", "@id":"5421707", "info":{"authors":{"author":{"@pid":"18/1973","text":"Luigi Fratta"}},"title":"Inter-vehicles Communication: A New Frontier of Ad Hoc Networking.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Fratta08","doi":"10.1109/WIMOB.2008.132","ee":"https://doi.org/10.1109/WiMob.2008.132","url":"https://dblp.org/rec/conf/wimob/Fratta08"}, "url":"URL#5421707" }, { "@score":"1", "@id":"5421708", "info":{"authors":{"author":[{"@pid":"78/6429","text":"Abdulbaset Gaddah"},{"@pid":"k/ThomasKunz","text":"Thomas Kunz"}]},"title":"Subscriber Mobility in Pub/Sub Systems: Pro-active vs. Reactive Handoffs.","venue":"WiMob","pages":"379-384","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/GaddahK08","doi":"10.1109/WIMOB.2008.19","ee":"https://doi.org/10.1109/WiMob.2008.19","url":"https://dblp.org/rec/conf/wimob/GaddahK08"}, "url":"URL#5421708" }, { "@score":"1", "@id":"5421709", "info":{"authors":{"author":[{"@pid":"16/1372","text":"Antonio-Javier García-Sánchez"},{"@pid":"57/2731","text":"Felipe García-Sánchez"},{"@pid":"19/1519","text":"Joan García-Haro"}]},"title":"Feasibility Study of MPEG-4 Transmission on IEEE 802.15.4 Networks.","venue":"WiMob","pages":"397-403","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Garcia-SanchezGG08","doi":"10.1109/WIMOB.2008.12","ee":"https://doi.org/10.1109/WiMob.2008.12","url":"https://dblp.org/rec/conf/wimob/Garcia-SanchezGG08"}, "url":"URL#5421709" }, { "@score":"1", "@id":"5421710", "info":{"authors":{"author":[{"@pid":"85/1666","text":"Driss El Ghanami"},{"@pid":"46/3008","text":"Taek Jin Kwon"},{"@pid":"96/3754","text":"Abdel Hafid"}]},"title":"GRIDS: Geographically Repulsive Insomnious Distributed Sensors - An Efficient Node Selection Mechanism Using Passive Clustering.","venue":"WiMob","pages":"241-246","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/GhanamiKH08","doi":"10.1109/WIMOB.2008.85","ee":"https://doi.org/10.1109/WiMob.2008.85","url":"https://dblp.org/rec/conf/wimob/GhanamiKH08"}, "url":"URL#5421710" }, { "@score":"1", "@id":"5421711", "info":{"authors":{"author":[{"@pid":"83/1098","text":"Armelle Gnassou"},{"@pid":"80/1206","text":"Jean-François Frigon"},{"@pid":"88/1777","text":"Brunilde Sansò"}]},"title":"Impact of Wireless Channel on VoIP QoS and Admission Regions in IEEE 802.11g WLANs.","venue":"WiMob","pages":"63-68","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/GnassouFS08","doi":"10.1109/WIMOB.2008.72","ee":"https://doi.org/10.1109/WiMob.2008.72","url":"https://dblp.org/rec/conf/wimob/GnassouFS08"}, "url":"URL#5421711" }, { "@score":"1", "@id":"5421712", "info":{"authors":{"author":[{"@pid":"56/6296","text":"Antonis G. Gotsis"},{"@pid":"12/1224","text":"Philip Constantinou"}]},"title":"Adaptive Single-Cell OFDMA Resource Allocation for Heterogeneous Data Traffic.","venue":"WiMob","pages":"96-103","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/GotsisC08","doi":"10.1109/WIMOB.2008.25","ee":"https://doi.org/10.1109/WiMob.2008.25","url":"https://dblp.org/rec/conf/wimob/GotsisC08"}, "url":"URL#5421712" }, { "@score":"1", "@id":"5421713", "info":{"authors":{"author":[{"@pid":"99/3882","text":"Ana Elisa P. Goulart"},{"@pid":"80/6624","text":"Wei Zhan"}]},"title":"A Design of Experiment (DOE) Analysis of the Performance of Uplink Real-Time Traffic over a 3G Network.","venue":"WiMob","pages":"466-471","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/GoulartZ08","doi":"10.1109/WIMOB.2008.110","ee":"https://doi.org/10.1109/WiMob.2008.110","url":"https://dblp.org/rec/conf/wimob/GoulartZ08"}, "url":"URL#5421713" }, { "@score":"1", "@id":"5421714", "info":{"authors":{"author":[{"@pid":"04/1783","text":"Cédric Gueguen"},{"@pid":"46/5757","text":"Sébastien Baey"}]},"title":"Compensated Proportional Fair Scheduling in Multiuser OFDM Wireless Networks.","venue":"WiMob","pages":"119-125","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/GueguenB08","doi":"10.1109/WIMOB.2008.26","ee":"https://doi.org/10.1109/WiMob.2008.26","url":"https://dblp.org/rec/conf/wimob/GueguenB08"}, "url":"URL#5421714" }, { "@score":"1", "@id":"5421715", "info":{"authors":{"author":[{"@pid":"14/43","text":"Toshihiro Hori"},{"@pid":"43/2397","text":"Tomotaka Wada"},{"@pid":"62/6809","text":"Yuuki Ota"},{"@pid":"91/4073","text":"Norie Uchitomi"},{"@pid":"95/589","text":"Kouichi Mutsuura"},{"@pid":"21/4867","text":"Hiromi Okada"}]},"title":"A Multi-Sensing-Range Method for Position Estimation of Passive RFID Tags.","venue":"WiMob","pages":"208-213","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/HoriWOUMO08","doi":"10.1109/WIMOB.2008.39","ee":"https://doi.org/10.1109/WiMob.2008.39","url":"https://dblp.org/rec/conf/wimob/HoriWOUMO08"}, "url":"URL#5421715" }, { "@score":"1", "@id":"5421716", "info":{"authors":{"author":[{"@pid":"81/5161","text":"Philipp Hurni"},{"@pid":"b/TorstenBraun","text":"Torsten Braun"},{"@pid":"b/BKBhargava","text":"Bharat K. Bhargava"},{"@pid":"50/671","text":"Yu Zhang"}]},"title":"Multi-hop Cross-Layer Design in Wireless Sensor Networks: A Case Study.","venue":"WiMob","pages":"291-296","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/HurniBBZ08","doi":"10.1109/WIMOB.2008.28","ee":"https://doi.org/10.1109/WiMob.2008.28","url":"https://dblp.org/rec/conf/wimob/HurniBBZ08"}, "url":"URL#5421716" }, { "@score":"1", "@id":"5421717", "info":{"authors":{"author":[{"@pid":"65/4014","text":"Maja Ilic"},{"@pid":"47/2411","text":"Milica Pejanovic-Djurisic"}]},"title":"SER Performance of OFDM Polarization Diversity System with EGC.","venue":"WiMob","pages":"661-665","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/IlicP08","doi":"10.1109/WIMOB.2008.87","ee":"https://doi.org/10.1109/WiMob.2008.87","url":"https://dblp.org/rec/conf/wimob/IlicP08"}, "url":"URL#5421717" }, { "@score":"1", "@id":"5421718", "info":{"authors":{"author":[{"@pid":"61/4913","text":"Tiziano Inzerilli"},{"@pid":"22/4664","text":"Anna Maria Vegni"},{"@pid":"84/4064-1","text":"Alessandro Neri 0001"},{"@pid":"90/2147","text":"Roberto Cusani"}]},"title":"A Location-Based Vertical Handover Algorithm for Limitation of the Ping-Pong Effect.","venue":"WiMob","pages":"385-389","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/InzerilliVNC08","doi":"10.1109/WIMOB.2008.64","ee":"https://doi.org/10.1109/WiMob.2008.64","url":"https://dblp.org/rec/conf/wimob/InzerilliVNC08"}, "url":"URL#5421718" }, { "@score":"1", "@id":"5421719", "info":{"authors":{"author":[{"@pid":"79/6661","text":"Rong-Terng Juang"},{"@pid":"48/6016","text":"Kun-Yi Lin"},{"@pid":"52/2949","text":"Pangan Ting"},{"@pid":"70/5250","text":"Hsin-Piao Lin"},{"@pid":"01/4490","text":"Ding-Bing Lin"}]},"title":"Hybrid ARQ Scheme with Intercarrier Interference Mitigation for OFDM Systems.","venue":"WiMob","pages":"365-366","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/JuangLTLL08","doi":"10.1109/WIMOB.2008.44","ee":"https://doi.org/10.1109/WiMob.2008.44","url":"https://dblp.org/rec/conf/wimob/JuangLTLL08"}, "url":"URL#5421719" }, { "@score":"1", "@id":"5421720", "info":{"authors":{"author":[{"@pid":"45/6789","text":"Ju-Eun Kang"},{"@pid":"37/5988","text":"Dong-Won Kum"},{"@pid":"37/4190","text":"Yang Li"},{"@pid":"10/108","text":"You Ze Cho"}]},"title":"Seamless Handover Scheme for Proxy Mobile IPv6.","venue":"WiMob","pages":"410-414","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/KangKLC08","doi":"10.1109/WIMOB.2008.105","ee":"https://doi.org/10.1109/WiMob.2008.105","url":"https://dblp.org/rec/conf/wimob/KangKLC08"}, "url":"URL#5421720" }, { "@score":"1", "@id":"5421721", "info":{"authors":{"author":[{"@pid":"81/2229","text":"Firdous Kausar"},{"@pid":"88/3982","text":"M. Q. Saeed"},{"@pid":"61/1421","text":"Ashraf Masood"}]},"title":"Key Management and Secure Routing in Heterogeneous Sensor Networks.","venue":"WiMob","pages":"549-554","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/KausarSM08","doi":"10.1109/WIMOB.2008.120","ee":"https://doi.org/10.1109/WiMob.2008.120","url":"https://dblp.org/rec/conf/wimob/KausarSM08"}, "url":"URL#5421721" }, { "@score":"1", "@id":"5421722", "info":{"authors":{"author":[{"@pid":"32/4566","text":"Assadarat Khurat"},{"@pid":"97/4112","text":"Joerg Abendroth"}]},"title":"A Mechanism for Requesting Hierarchical documetns in XACML.","venue":"WiMob","pages":"202-207","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/KhuratA08","doi":"10.1109/WIMOB.2008.118","ee":"https://doi.org/10.1109/WiMob.2008.118","url":"https://dblp.org/rec/conf/wimob/KhuratA08"}, "url":"URL#5421722" }, { "@score":"1", "@id":"5421723", "info":{"authors":{"author":[{"@pid":"00/3984","text":"David A. Knox"},{"@pid":"k/ThomasKunz","text":"Thomas Kunz"}]},"title":"RF Fingerprints for Secure Authentication in Single-Hop WSN.","venue":"WiMob","pages":"567-573","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/KnoxK08","doi":"10.1109/WIMOB.2008.18","ee":"https://doi.org/10.1109/WiMob.2008.18","url":"https://dblp.org/rec/conf/wimob/KnoxK08"}, "url":"URL#5421723" }, { "@score":"1", "@id":"5421724", "info":{"authors":{"author":[{"@pid":"49/3416","text":"Laszlo Korossy"},{"@pid":"06/3257","text":"Csaba Vulkán"}]},"title":"QoS Aware HSDPA Congestion Control Algorithm.","venue":"WiMob","pages":"404-409","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/KorossyV08","doi":"10.1109/WIMOB.2008.37","ee":"https://doi.org/10.1109/WiMob.2008.37","url":"https://dblp.org/rec/conf/wimob/KorossyV08"}, "url":"URL#5421724" }, { "@score":"1", "@id":"5421725", "info":{"authors":{"author":[{"@pid":"34/4605","text":"Christoph Krauß"},{"@pid":"s/MarkusSchneider2","text":"Markus Schneider 0002"},{"@pid":"e/ClaudiaEckert","text":"Claudia Eckert 0001"}]},"title":"An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs.","venue":"WiMob","pages":"586-591","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/KraussSE08","doi":"10.1109/WIMOB.2008.13","ee":"https://doi.org/10.1109/WiMob.2008.13","url":"https://dblp.org/rec/conf/wimob/KraussSE08"}, "url":"URL#5421725" }, { "@score":"1", "@id":"5421726", "info":{"authors":{"author":[{"@pid":"32/1264","text":"Ioannis Krontiris"},{"@pid":"96/1667","text":"Thanassis Giannetsos"},{"@pid":"18/4520","text":"Tassos Dimitriou"}]},"title":"Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side.","venue":"WiMob","pages":"526-531","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/KrontirisGD08","doi":"10.1109/WIMOB.2008.83","ee":"https://doi.org/10.1109/WiMob.2008.83","url":"https://dblp.org/rec/conf/wimob/KrontirisGD08"}, "url":"URL#5421726" }, { "@score":"1", "@id":"5421727", "info":{"authors":{"author":{"@pid":"k/ThomasKunz","text":"Thomas Kunz"}},"title":"Accurately Predicting Residual Energy Levels in MANETs.","venue":"WiMob","pages":"44-50","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Kunz08","doi":"10.1109/WIMOB.2008.17","ee":"https://doi.org/10.1109/WiMob.2008.17","url":"https://dblp.org/rec/conf/wimob/Kunz08"}, "url":"URL#5421727" }, { "@score":"1", "@id":"5421728", "info":{"authors":{"author":[{"@pid":"65/1873","text":"Shouwen Lai"},{"@pid":"61/2985","text":"Binoy Ravindran"},{"@pid":"13/5651","text":"Hyeonjoong Cho"}]},"title":"Rate Allocation with Lifetime Maximization and Fairness for Data Aggregation in Sensor Networks.","venue":"WiMob","pages":"1-6","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LaiRC08","doi":"10.1109/WIMOB.2008.33","ee":"https://doi.org/10.1109/WiMob.2008.33","url":"https://dblp.org/rec/conf/wimob/LaiRC08"}, "url":"URL#5421728" }, { "@score":"1", "@id":"5421729", "info":{"authors":{"author":[{"@pid":"06/6914","text":"Wei Kuang Lai"},{"@pid":"11/5196","text":"Kai-Ting Yang"}]},"title":"Frame Size Adaptation in Mobile Wireless Networks with Cross-Layer Cooperative Model.","venue":"WiMob","pages":"278-283","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LaiY08","doi":"10.1109/WIMOB.2008.82","ee":"https://doi.org/10.1109/WiMob.2008.82","url":"https://dblp.org/rec/conf/wimob/LaiY08"}, "url":"URL#5421729" }, { "@score":"1", "@id":"5421730", "info":{"authors":{"author":[{"@pid":"22/2462","text":"Randall Landry"},{"@pid":"94/1379","text":"Jared Burdin"}]},"title":"An Evolutionary Model for the Study of Wireless Networks.","venue":"WiMob","pages":"367-372","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LandryB08","doi":"10.1109/WIMOB.2008.104","ee":"https://doi.org/10.1109/WiMob.2008.104","url":"https://dblp.org/rec/conf/wimob/LandryB08"}, "url":"URL#5421730" }, { "@score":"1", "@id":"5421731", "info":{"authors":{"author":[{"@pid":"12/5538","text":"Philippe Le-Huy"},{"@pid":"43/1661-2","text":"Sébastien Roy 0002"}]},"title":"Low-Power 2.4 GHz Wake-Up Radio for Wireless Sensor Networks.","venue":"WiMob","pages":"13-18","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Le-HuyR08","doi":"10.1109/WIMOB.2008.54","ee":"https://doi.org/10.1109/WiMob.2008.54","url":"https://dblp.org/rec/conf/wimob/Le-HuyR08"}, "url":"URL#5421731" }, { "@score":"1", "@id":"5421732", "info":{"authors":{"author":[{"@pid":"32/1842","text":"Yuro Lee"},{"@pid":"55/4739-1","text":"Jaemin Ahn 0001"},{"@pid":"93/2285","text":"Sok-Kyu Lee"}]},"title":"Multi-rate QR-MDD for High Data Rate Transmission in Nomadic Local Wireless Access.","venue":"WiMob","pages":"644-648","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LeeAL08","doi":"10.1109/WIMOB.2008.95","ee":"https://doi.org/10.1109/WiMob.2008.95","url":"https://dblp.org/rec/conf/wimob/LeeAL08"}, "url":"URL#5421732" }, { "@score":"1", "@id":"5421733", "info":{"authors":{"author":[{"@pid":"41/5156","text":"Keunhyung Lee"},{"@pid":"10/6792","text":"Huisoo Lee"},{"@pid":"84/4161","text":"Yongwook Lee"},{"@pid":"97/112","text":"Jihyun Lee"},{"@pid":"64/6519","text":"Wangrok Oh"}]},"title":"A New Channel Reliability Value for Iterative MAP Turbo Decoder.","venue":"WiMob","pages":"333-334","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LeeLLLO08","doi":"10.1109/WIMOB.2008.97","ee":"https://doi.org/10.1109/WiMob.2008.97","url":"https://dblp.org/rec/conf/wimob/LeeLLLO08"}, "url":"URL#5421733" }, { "@score":"1", "@id":"5421734", "info":{"authors":{"author":[{"@pid":"36/2220","text":"Kang-Won Lee"},{"@pid":"22/2330","text":"Won-Kyeong Seo"},{"@pid":"37/5988","text":"Dong-Won Kum"},{"@pid":"10/108","text":"You Ze Cho"}]},"title":"Global Mobility Management Scheme with Interworking between PMIPv6 and MIPv6.","venue":"WiMob","pages":"153-158","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LeeSKC08","doi":"10.1109/WIMOB.2008.98","ee":"https://doi.org/10.1109/WiMob.2008.98","url":"https://dblp.org/rec/conf/wimob/LeeSKC08"}, "url":"URL#5421734" }, { "@score":"1", "@id":"5421735", "info":{"authors":{"author":[{"@pid":"53/1886","text":"Jenq-Shiou Leu"},{"@pid":"70/1798","text":"Hui-Ching Hsieh"}]},"title":"An Autonomous Wireless Sensor Network with Fault Resilience.","venue":"WiMob","pages":"223-227","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LeuH08","doi":"10.1109/WIMOB.2008.42","ee":"https://doi.org/10.1109/WiMob.2008.42","url":"https://dblp.org/rec/conf/wimob/LeuH08"}, "url":"URL#5421735" }, { "@score":"1", "@id":"5421736", "info":{"authors":{"author":[{"@pid":"l/TDCLittle","text":"Thomas D. C. Little"},{"@pid":"23/5013","text":"Peter Dib"},{"@pid":"64/4381","text":"Kandarp Shah"},{"@pid":"62/1132","text":"Nick Barraford"},{"@pid":"72/5831","text":"Beth Gallagher"}]},"title":"Using LED Lighting for Ubiquitous Indoor Wireless Networking.","venue":"WiMob","pages":"373-378","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LittleDSBG08","doi":"10.1109/WIMOB.2008.57","ee":"https://doi.org/10.1109/WiMob.2008.57","url":"https://dblp.org/rec/conf/wimob/LittleDSBG08"}, "url":"URL#5421736" }, { "@score":"1", "@id":"5421737", "info":{"authors":{"author":[{"@pid":"45/4723","text":"Chi Harold Liu"},{"@pid":"74/6617","text":"Athanasios Gkelias"},{"@pid":"02/853","text":"Yun Hou"},{"@pid":"04/2707","text":"Kin K. Leung"}]},"title":"A Distributed Scheduling Algorithm with QoS Provisions in Multi-hop Wireless Mesh Networks.","venue":"WiMob","pages":"253-258","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LiuGHL08","doi":"10.1109/WIMOB.2008.113","ee":"https://doi.org/10.1109/WiMob.2008.113","url":"https://dblp.org/rec/conf/wimob/LiuGHL08"}, "url":"URL#5421737" }, { "@score":"1", "@id":"5421738", "info":{"authors":{"author":[{"@pid":"76/5789","text":"Shuai Liu"},{"@pid":"19/1215","text":"D. Y. Zhang"},{"@pid":"30/1988","text":"Xiao Chu"},{"@pid":"59/4066","text":"Hadi Otrok"},{"@pid":"b/PrBhattacharya","text":"Prabir Bhattacharya"}]},"title":"A Game Theoretic Approach to Optimize the Performance of Host-Based IDS.","venue":"WiMob","pages":"448-453","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/LiuZCOB08","doi":"10.1109/WIMOB.2008.20","ee":"https://doi.org/10.1109/WiMob.2008.20","url":"https://dblp.org/rec/conf/wimob/LiuZCOB08"}, "url":"URL#5421738" }, { "@score":"1", "@id":"5421739", "info":{"authors":{"author":[{"@pid":"36/3535","text":"Linoh A. Magagula"},{"@pid":"33/3977","text":"H. Anthony Chan"}]},"title":"IEEE 802.21-Assisted Cross-Layer Design and PMIPv6 Mobility Management Framework for Next Generation Wireless Networks.","venue":"WiMob","pages":"159-164","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MagagulaC08","doi":"10.1109/WIMOB.2008.46","ee":"https://doi.org/10.1109/WiMob.2008.46","url":"https://dblp.org/rec/conf/wimob/MagagulaC08"}, "url":"URL#5421739" }, { "@score":"1", "@id":"5421740", "info":{"authors":{"author":[{"@pid":"46/3165","text":"Bodhaswar T. Maharaj"},{"@pid":"69/2788","text":"Francois P. S. Luus"}]},"title":"Decremental Redundancy Compression with Fountain Codes.","venue":"WiMob","pages":"328-332","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MaharajL08","doi":"10.1109/WIMOB.2008.65","ee":"https://doi.org/10.1109/WiMob.2008.65","url":"https://dblp.org/rec/conf/wimob/MaharajL08"}, "url":"URL#5421740" }, { "@score":"1", "@id":"5421741", "info":{"authors":{"author":[{"@pid":"22/4667","text":"Puttipong Mahasukhon"},{"@pid":"12/854","text":"Hamid Sharif"},{"@pid":"27/4898","text":"Michael Hempel"},{"@pid":"64/3395","text":"Ting Zhou"},{"@pid":"w/WeiWang15","text":"Wei Wang 0015"},{"@pid":"82/343","text":"Tadeusz A. Wysocki"}]},"title":"Performance Analysis of Multi-hop IEEE 802.11 DCF Backhaul Networks.","venue":"WiMob","pages":"69-74","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MahasukhonSHZWW08","doi":"10.1109/WIMOB.2008.123","ee":"https://doi.org/10.1109/WiMob.2008.123","url":"https://dblp.org/rec/conf/wimob/MahasukhonSHZWW08"}, "url":"URL#5421741" }, { "@score":"1", "@id":"5421742", "info":{"authors":{"author":[{"@pid":"43/3665","text":"Daniele Manzaroli"},{"@pid":"35/917","text":"P. Lacche"},{"@pid":"05/116","text":"Marina Pettinari"},{"@pid":"56/5371","text":"Luca Roffia"},{"@pid":"26/7641","text":"Alfredo D'Elia"},{"@pid":"49/5776","text":"Tullio Salmon Cinotti"}]},"title":"Enhancing Social Life with Path Solvers: Rendezvous without Constraints on Meeting Place and Time.","venue":"WiMob","pages":"490-495","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ManzaroliLPRDC08","doi":"10.1109/WIMOB.2008.92","ee":"https://doi.org/10.1109/WiMob.2008.92","url":"https://dblp.org/rec/conf/wimob/ManzaroliLPRDC08"}, "url":"URL#5421742" }, { "@score":"1", "@id":"5421743", "info":{"authors":{"author":[{"@pid":"34/3073","text":"Karel-Peet Mare"},{"@pid":"46/3165","text":"Bodhaswar T. Maharaj"}]},"title":"Performance Analysis of Modern Space-Time Codes on a MIMO-WiMAX Platform.","venue":"WiMob","pages":"139-144","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MareM08","doi":"10.1109/WIMOB.2008.84","ee":"https://doi.org/10.1109/WiMob.2008.84","url":"https://dblp.org/rec/conf/wimob/MareM08"}, "url":"URL#5421743" }, { "@score":"1", "@id":"5421744", "info":{"authors":{"author":[{"@pid":"83/5477","text":"Takeshi Matsuda"},{"@pid":"08/6444","text":"Hidehisa Nakayama"},{"@pid":"s/XueminShen","text":"Sherman X. Shen"},{"@pid":"78/1116","text":"Yoshiaki Nemoto"},{"@pid":"19/3059","text":"Nei Kato"}]},"title":"On Gateway Selection Protocol for DYMO-Based MANET.","venue":"WiMob","pages":"32-37","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MatsudaNSNK08","doi":"10.1109/WIMOB.2008.51","ee":"https://doi.org/10.1109/WiMob.2008.51","url":"https://dblp.org/rec/conf/wimob/MatsudaNSNK08"}, "url":"URL#5421744" }, { "@score":"1", "@id":"5421745", "info":{"authors":{"author":[{"@pid":"85/545","text":"Davide Mattera"},{"@pid":"44/6777","text":"Luigi Paura"},{"@pid":"55/6250","text":"Fabio Sterle"}]},"title":"MultistageWidely-Linear DF Equalizers for MIMO Channels.","venue":"WiMob","pages":"133-138","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MatteraPS08","doi":"10.1109/WIMOB.2008.55","ee":"https://doi.org/10.1109/WiMob.2008.55","url":"https://dblp.org/rec/conf/wimob/MatteraPS08"}, "url":"URL#5421745" }, { "@score":"1", "@id":"5421746", "info":{"authors":{"author":[{"@pid":"20/5510","text":"Giacomo de Meulenaer"},{"@pid":"37/1688","text":"François Gosset"},{"@pid":"38/2138","text":"François-Xavier Standaert"},{"@pid":"78/1061","text":"Olivier Pereira"}]},"title":"On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks.","venue":"WiMob","pages":"580-585","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MeulenaerGSP08","doi":"10.1109/WIMOB.2008.16","ee":"https://doi.org/10.1109/WiMob.2008.16","url":"https://dblp.org/rec/conf/wimob/MeulenaerGSP08"}, "url":"URL#5421746" }, { "@score":"1", "@id":"5421747", "info":{"authors":{"author":[{"@pid":"89/6100","text":"Jelena Mirkovic"},{"@pid":"w/BernhardWalke","text":"Bernhard Walke"}]},"title":"On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty.","venue":"WiMob","pages":"84-89","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MirkovicW08","doi":"10.1109/WIMOB.2008.38","ee":"https://doi.org/10.1109/WiMob.2008.38","url":"https://dblp.org/rec/conf/wimob/MirkovicW08"}, "url":"URL#5421747" }, { "@score":"1", "@id":"5421748", "info":{"authors":{"author":[{"@pid":"36/1023","text":"Sudip Misra"},{"@pid":"65/1953","text":"Kiran Isaac Abraham"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"212/4770","text":"P. Venkata Krishna 0001"}]},"title":"Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach.","venue":"WiMob","pages":"603-607","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MisraAOK08","doi":"10.1109/WIMOB.2008.62","ee":"https://doi.org/10.1109/WiMob.2008.62","url":"https://dblp.org/rec/conf/wimob/MisraAOK08"}, "url":"URL#5421748" }, { "@score":"1", "@id":"5421749", "info":{"authors":{"author":[{"@pid":"20/4094","text":"Peter Mueller"},{"@pid":"58/5813","text":"Mieso K. Denko"}]},"title":"Message from the Workshops Co-chairs.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MuellerD08","doi":"10.1109/WIMOB.2008.126","ee":"https://doi.org/10.1109/WiMob.2008.126","url":"https://dblp.org/rec/conf/wimob/MuellerD08"}, "url":"URL#5421749" }, { "@score":"1", "@id":"5421750", "info":{"authors":{"author":[{"@pid":"20/4094","text":"Peter Mueller"},{"@pid":"46/2601","text":"Kaisa Nyberg"},{"@pid":"83/4094","text":"Stefanos Gritzalis"},{"@pid":"16/6779","text":"Costas Lambrinoudakis"}]},"title":"Message from the SecPri Workshop Organizing Technical Co-chairs.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/MuellerNGL08","doi":"10.1109/WIMOB.2008.129","ee":"https://doi.org/10.1109/WiMob.2008.129","url":"https://dblp.org/rec/conf/wimob/MuellerNGL08"}, "url":"URL#5421750" }, { "@score":"1", "@id":"5421751", "info":{"authors":{"author":[{"@pid":"40/5798","text":"Hamed Nasrabadi"},{"@pid":"05/3014","text":"Farid Ashtiani"}]},"title":"Improving Coverage-Capacity Tradeoff and Power Consumption of TDMA-CDMA by Coverage-Dependent Timeslot Allocation.","venue":"WiMob","pages":"266-271","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/NasrabadiA08","doi":"10.1109/WIMOB.2008.69","ee":"https://doi.org/10.1109/WiMob.2008.69","url":"https://dblp.org/rec/conf/wimob/NasrabadiA08"}, "url":"URL#5421751" }, { "@score":"1", "@id":"5421752", "info":{"authors":{"author":[{"@pid":"56/3197","text":"Nidal Nasser"},{"@pid":"79/3363","text":"Waltenegus Dargie"},{"@pid":"58/5813","text":"Mieso K. Denko"},{"@pid":"75/1656","text":"Ahmed H. Zahran"}]},"title":"Message from the HWN-RMQ Workshop Organizing Technical Co-chairs.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/NasserDDZ08","doi":"10.1109/WIMOB.2008.127","ee":"https://doi.org/10.1109/WiMob.2008.127","url":"https://dblp.org/rec/conf/wimob/NasserDDZ08"}, "url":"URL#5421752" }, { "@score":"1", "@id":"5421753", "info":{"authors":{"author":[{"@pid":"98/5914","text":"Chung Tien Nguyen"},{"@pid":"70/4201","text":"Olivier Camp"}]},"title":"Using Context Information to Improve Computation of Trust in Ad Hoc Networks.","venue":"WiMob","pages":"619-624","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/NguyenC08","doi":"10.1109/WIMOB.2008.43","ee":"https://doi.org/10.1109/WiMob.2008.43","url":"https://dblp.org/rec/conf/wimob/NguyenC08"}, "url":"URL#5421753" }, { "@score":"1", "@id":"5421754", "info":{"authors":{"author":[{"@pid":"73/1386","text":"Yahya E. Osais"},{"@pid":"57/4385","text":"Marc St-Hilaire"},{"@pid":"16/6654","text":"Fei Richard Yu"}]},"title":"Directional Sensor Placement with Optimal Sensing Range, Field of View and Orientation.","venue":"WiMob","pages":"19-24","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/OsaisSY08","doi":"10.1109/WIMOB.2008.88","ee":"https://doi.org/10.1109/WiMob.2008.88","url":"https://dblp.org/rec/conf/wimob/OsaisSY08"}, "url":"URL#5421754" }, { "@score":"1", "@id":"5421755", "info":{"authors":{"author":[{"@pid":"18/4910","text":"Ghaya Rekaya-Ben Othman"},{"@pid":"84/5037","text":"Rym Ouertani"},{"@pid":"45/195","text":"Abdellatif Salah"}]},"title":"The Spherical Bound Stack Decoder.","venue":"WiMob","pages":"322-327","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/OthmanOS08","doi":"10.1109/WIMOB.2008.115","ee":"https://doi.org/10.1109/WiMob.2008.115","url":"https://dblp.org/rec/conf/wimob/OthmanOS08"}, "url":"URL#5421755" }, { "@score":"1", "@id":"5421756", "info":{"authors":{"author":[{"@pid":"59/4066","text":"Hadi Otrok"},{"@pid":"94/1458","text":"Noman Mohammed"},{"@pid":"w/LingyuWang","text":"Lingyu Wang 0001"},{"@pid":"d/MDebbabi","text":"Mourad Debbabi"},{"@pid":"b/PrBhattacharya","text":"Prabir Bhattacharya"}]},"title":"A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.","venue":"WiMob","pages":"608-612","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/OtrokMWDB08","doi":"10.1109/WIMOB.2008.21","ee":"https://doi.org/10.1109/WiMob.2008.21","url":"https://dblp.org/rec/conf/wimob/OtrokMWDB08"}, "url":"URL#5421756" }, { "@score":"1", "@id":"5421757", "info":{"authors":{"author":[{"@pid":"05/6489","text":"Marc-Olivier Ouellet"},{"@pid":"90/5623","text":"Steven Chamberland"},{"@pid":"22/1674","text":"Philippe Galinier"}]},"title":"On the Planning Problem of Wireless Local Area Networks with Directional Antennas.","venue":"WiMob","pages":"655-660","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/OuelletCG08","doi":"10.1109/WIMOB.2008.101","ee":"https://doi.org/10.1109/WiMob.2008.101","url":"https://dblp.org/rec/conf/wimob/OuelletCG08"}, "url":"URL#5421757" }, { "@score":"1", "@id":"5421758", "info":{"authors":{"author":{"@pid":"70/6467","text":"Suat Özdemir"}},"title":"Functional Reputation Based Data Aggregation for Wireless Sensor Networks.","venue":"WiMob","pages":"592-597","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Ozdemir08","doi":"10.1109/WIMOB.2008.102","ee":"https://doi.org/10.1109/WiMob.2008.102","url":"https://dblp.org/rec/conf/wimob/Ozdemir08"}, "url":"URL#5421758" }, { "@score":"1", "@id":"5421759", "info":{"authors":{"author":[{"@pid":"00/5213","text":"L. Felipe Perrone"},{"@pid":"94/3065","text":"Christopher J. Kenna"},{"@pid":"66/5887","text":"Bryan C. Ward"}]},"title":"Enhancing the Credibility of Wireless Network Simulations with Experiment Automation.","venue":"WiMob","pages":"631-637","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/PerroneKW08","doi":"10.1109/WIMOB.2008.53","ee":"https://doi.org/10.1109/WiMob.2008.53","url":"https://dblp.org/rec/conf/wimob/PerroneKW08"}, "url":"URL#5421759" }, { "@score":"1", "@id":"5421760", "info":{"authors":{"author":[{"@pid":"32/4359","text":"Luci Pirmez"},{"@pid":"44/467","text":"Jaime Cesar de Carvalho Jr."},{"@pid":"88/4289","text":"Flávia Coimbra Delicato"},{"@pid":"50/943","text":"Luiz Fernando Rust C. Carmo"},{"@pid":"88/5568","text":"Marcos Pirmez"},{"@pid":"69/1904","text":"Paulo F. Pires"}]},"title":"User's Profile-Driven Resource Reservation for WiMAX Networks.","venue":"WiMob","pages":"304-309","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/PirmezJDCPP08","doi":"10.1109/WIMOB.2008.109","ee":"https://doi.org/10.1109/WiMob.2008.109","url":"https://dblp.org/rec/conf/wimob/PirmezJDCPP08"}, "url":"URL#5421760" }, { "@score":"1", "@id":"5421761", "info":{"authors":{"author":[{"@pid":"r/AbderrezakRachedi","text":"Abderrezak Rachedi"},{"@pid":"85/964","text":"Abderrahim Benslimane"},{"@pid":"59/4066","text":"Hadi Otrok"},{"@pid":"94/1458","text":"Noman Mohammed"},{"@pid":"d/MDebbabi","text":"Mourad Debbabi"}]},"title":"A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks.","venue":"WiMob","pages":"417-422","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/RachediBOMD08","doi":"10.1109/WIMOB.2008.77","ee":"https://doi.org/10.1109/WiMob.2008.77","url":"https://dblp.org/rec/conf/wimob/RachediBOMD08"}, "url":"URL#5421761" }, { "@score":"1", "@id":"5421762", "info":{"authors":{"author":[{"@pid":"73/1891","text":"Josko Radic"},{"@pid":"41/5566","text":"Nikola Rozic"}]},"title":"Improved Decoding of Clipped OFDM Signals through Iteration.","venue":"WiMob","pages":"355-359","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/RadicR08","doi":"10.1109/WIMOB.2008.76","ee":"https://doi.org/10.1109/WiMob.2008.76","url":"https://dblp.org/rec/conf/wimob/RadicR08"}, "url":"URL#5421762" }, { "@score":"1", "@id":"5421763", "info":{"authors":{"author":[{"@pid":"67/1359","text":"Sk. Md. Mizanur Rahman"},{"@pid":"56/3197","text":"Nidal Nasser"},{"@pid":"01/3142","text":"Kassem Saleh"}]},"title":"Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks.","venue":"WiMob","pages":"423-428","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/RahmanNS08","doi":"10.1109/WIMOB.2008.79","ee":"https://doi.org/10.1109/WiMob.2008.79","url":"https://dblp.org/rec/conf/wimob/RahmanNS08"}, "url":"URL#5421763" }, { "@score":"1", "@id":"5421764", "info":{"authors":{"author":[{"@pid":"306/3595","text":"Víctor Rangel"},{"@pid":"150/4824","text":"Miguel Perez"},{"@pid":"38/3991","text":"Javier Gomez 0001"},{"@pid":"59/6284","text":"Miguel López-Guerrero"},{"@pid":"78/4446","text":"Raúl Aquino"}]},"title":"Performance Evaluation of Five New Adaptive Contention Slot Allocators for IEEE 802.16 Based Systems.","venue":"WiMob","pages":"316-321","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/RangelPGLA08","doi":"10.1109/WIMOB.2008.125","ee":"https://doi.org/10.1109/WiMob.2008.125","url":"https://dblp.org/rec/conf/wimob/RangelPGLA08"}, "url":"URL#5421764" }, { "@score":"1", "@id":"5421765", "info":{"authors":{"author":[{"@pid":"157/8215","text":"Mohammad Abdur Razzaque"},{"@pid":"d/SimonADobson","text":"Simon Dobson"},{"@pid":"n/PaddyNixon","text":"Paddy Nixon"}]},"title":"Cross-Layer Self Routing: A Self-Managed Routing Approach for MANETs.","venue":"WiMob","pages":"284-290","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/RazzaqueDN08","doi":"10.1109/WIMOB.2008.73","ee":"https://doi.org/10.1109/WiMob.2008.73","url":"https://dblp.org/rec/conf/wimob/RazzaqueDN08"}, "url":"URL#5421765" }, { "@score":"1", "@id":"5421766", "info":{"authors":{"author":[{"@pid":"56/2641","text":"Oscar Real"},{"@pid":"07/674","text":"Vicenç Almenar"}]},"title":"OFDM ICI Self-Cancellation Scheme Based on Five Weights.","venue":"WiMob","pages":"360-364","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/RealA08","doi":"10.1109/WIMOB.2008.35","ee":"https://doi.org/10.1109/WiMob.2008.35","url":"https://dblp.org/rec/conf/wimob/RealA08"}, "url":"URL#5421766" }, { "@score":"1", "@id":"5421767", "info":{"authors":{"author":[{"@pid":"r/PLReiher","text":"Peter L. Reiher"},{"@pid":"35/4287","text":"John Zimmerman"},{"@pid":"41/6612","text":"Kevin Eustice"}]},"title":"Message from the SAUCE Workshop Organizing Technical Co-chairs.","venue":"WiMob","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ReiherZE08","doi":"10.1109/WIMOB.2008.128","ee":"https://doi.org/10.1109/WiMob.2008.128","url":"https://dblp.org/rec/conf/wimob/ReiherZE08"}, "url":"URL#5421767" }, { "@score":"1", "@id":"5421768", "info":{"authors":{"author":[{"@pid":"306/3246","text":"L. Puente Rodríguez"},{"@pid":"59/5546","text":"Ángel García-Crespo"},{"@pid":"306/2356","text":"M. J. Poza Lara"},{"@pid":"97/1749","text":"Belén Ruíz-Mezcua"}]},"title":"Study of Different Fusion Techniques for Multimodal Biometric Authentication.","venue":"WiMob","pages":"666-671","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/RodriguezGLR08","doi":"10.1109/WIMOB.2008.29","ee":"https://doi.org/10.1109/WiMob.2008.29","url":"https://dblp.org/rec/conf/wimob/RodriguezGLR08"}, "url":"URL#5421768" }, { "@score":"1", "@id":"5421769", "info":{"authors":{"author":[{"@pid":"76/1604","text":"Aleksi Saarela"},{"@pid":"48/6310","text":"Jan-Erik Ekberg"},{"@pid":"46/2601","text":"Kaisa Nyberg"}]},"title":"Random Beacon for Privacy and Group Security.","venue":"WiMob","pages":"514-519","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/SaarelaEN08","doi":"10.1109/WIMOB.2008.91","ee":"https://doi.org/10.1109/WiMob.2008.91","url":"https://dblp.org/rec/conf/wimob/SaarelaEN08"}, "url":"URL#5421769" }, { "@score":"1", "@id":"5421770", "info":{"authors":{"author":[{"@pid":"13/1954","text":"Haïdar Safa"},{"@pid":"54/2707","text":"Omar Mirza"},{"@pid":"09/3843","text":"Hassan Artail"}]},"title":"A Dynamic Energy Efficient Clustering Algorithm for MANETs.","venue":"WiMob","pages":"51-56","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/SafaMA08","doi":"10.1109/WIMOB.2008.67","ee":"https://doi.org/10.1109/WiMob.2008.67","url":"https://dblp.org/rec/conf/wimob/SafaMA08"}, "url":"URL#5421770" }, { "@score":"1", "@id":"5421771", "info":{"authors":{"author":[{"@pid":"54/2841","text":"Tarek El Salti"},{"@pid":"56/3197","text":"Nidal Nasser"}]},"title":"Generic 3-D Routing Protocols in Sensing-Covering Regions.","venue":"WiMob","pages":"228-233","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/SaltiN08","doi":"10.1109/WIMOB.2008.100","ee":"https://doi.org/10.1109/WiMob.2008.100","url":"https://dblp.org/rec/conf/wimob/SaltiN08"}, "url":"URL#5421771" }, { "@score":"1", "@id":"5421772", "info":{"authors":{"author":[{"@pid":"60/6494","text":"Florian Scheuer"},{"@pid":"41/4140","text":"Klaus Poessel"},{"@pid":"f/HannesFederrath","text":"Hannes Federrath"}]},"title":"Preventing Profile Generation in Vehicular Networks.","venue":"WiMob","pages":"520-525","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ScheuerPF08","doi":"10.1109/WIMOB.2008.45","ee":"https://doi.org/10.1109/WiMob.2008.45","url":"https://dblp.org/rec/conf/wimob/ScheuerPF08"}, "url":"URL#5421772" }, { "@score":"1", "@id":"5421773", "info":{"authors":{"author":[{"@pid":"42/1514","text":"Andrzej Sikora"},{"@pid":"37/4232","text":"Ewa Niewiadomska-Szynkiewicz"}]},"title":"MobASim: A Software Platform for Mobile Ad Hoc Networks Modeling and Simulation.","venue":"WiMob","pages":"625-630","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/SikoraN08","doi":"10.1109/WIMOB.2008.34","ee":"https://doi.org/10.1109/WiMob.2008.34","url":"https://dblp.org/rec/conf/wimob/SikoraN08"}, "url":"URL#5421773" }, { "@score":"1", "@id":"5421774", "info":{"authors":{"author":[{"@pid":"10/2737","text":"Ustijana Sikoska"},{"@pid":"62/1538","text":"D. Davcev"},{"@pid":"27/4965","text":"Jordan Sikoski"}]},"title":"Sensitivity Analysis for GPS in Land-Vehicle Navigation.","venue":"WiMob","pages":"221-222","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/SikoskaDS08","doi":"10.1109/WIMOB.2008.111","ee":"https://doi.org/10.1109/WiMob.2008.111","url":"https://dblp.org/rec/conf/wimob/SikoskaDS08"}, "url":"URL#5421774" }, { "@score":"1", "@id":"5421775", "info":{"authors":{"author":[{"@pid":"91/5523","text":"Dare Sokoya"},{"@pid":"46/3165","text":"Bodhaswar T. Maharaj"}]},"title":"Channel Estimation Algorithm for Super-Orthogonal Space Time Trellis Coded-OFDM Systems.","venue":"WiMob","pages":"335-339","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/SokoyaM08","doi":"10.1109/WIMOB.2008.60","ee":"https://doi.org/10.1109/WiMob.2008.60","url":"https://dblp.org/rec/conf/wimob/SokoyaM08"}, "url":"URL#5421775" }, { "@score":"1", "@id":"5421776", "info":{"authors":{"author":[{"@pid":"08/1239","text":"Christian Tchepnda"},{"@pid":"21/7455","text":"Hassnaa Moustafa"},{"@pid":"18/5416","text":"Houda Labiod"},{"@pid":"41/4724","text":"Gilles Bourdon"}]},"title":"Prioritizing and Enhancing Vehicular Networks Authentication Process Using DSRC Channels Diversity.","venue":"WiMob","pages":"429-434","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/TchepndaMLB08","doi":"10.1109/WIMOB.2008.9","ee":"https://doi.org/10.1109/WiMob.2008.9","url":"https://dblp.org/rec/conf/wimob/TchepndaMLB08"}, "url":"URL#5421776" }, { "@score":"1", "@id":"5421777", "info":{"authors":{"author":[{"@pid":"07/6994","text":"Do Van Thanh 0001"},{"@pid":"e/PaalEngelstad","text":"Paal E. Engelstad"},{"@pid":"58/2839","text":"Tore E. Jønvik"},{"@pid":"06/4969-1","text":"Do van Thuan 0001"},{"@pid":"30/3830","text":"Ivar Jørstad"}]},"title":"Towards a Uniform IMS Client on Heterogeneous Devices.","venue":"WiMob","pages":"196-201","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ThanhEJTJ08","doi":"10.1109/WIMOB.2008.71","ee":"https://doi.org/10.1109/WiMob.2008.71","url":"https://dblp.org/rec/conf/wimob/ThanhEJTJ08"}, "url":"URL#5421777" }, { "@score":"1", "@id":"5421778", "info":{"authors":{"author":[{"@pid":"07/6994","text":"Do Van Thanh 0001"},{"@pid":"30/3830","text":"Ivar Jørstad"},{"@pid":"e/PaalEngelstad","text":"Paal E. Engelstad"},{"@pid":"58/2839","text":"Tore E. Jønvik"},{"@pid":"33/5253","text":"Boning Feng"},{"@pid":"06/4969-1","text":"Do van Thuan 0001"}]},"title":"Authentication in a Multi-access IMS Environment.","venue":"WiMob","pages":"613-618","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ThanhJEJFT08","doi":"10.1109/WIMOB.2008.80","ee":"https://doi.org/10.1109/WiMob.2008.80","url":"https://dblp.org/rec/conf/wimob/ThanhJEJFT08"}, "url":"URL#5421778" }, { "@score":"1", "@id":"5421779", "info":{"authors":{"author":[{"@pid":"42/4294","text":"Masoomeh Torabzadeh"},{"@pid":"56/4552","text":"Wessam Ajib"}]},"title":"Proportional Fairness for MIMO Multi-user Schedulers with Traffic Arrival Process.","venue":"WiMob","pages":"90-95","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/TorabzadehA08","doi":"10.1109/WIMOB.2008.70","ee":"https://doi.org/10.1109/WiMob.2008.70","url":"https://dblp.org/rec/conf/wimob/TorabzadehA08"}, "url":"URL#5421779" }, { "@score":"1", "@id":"5421780", "info":{"authors":{"author":[{"@pid":"20/5737","text":"Kazuya Tsukamoto"},{"@pid":"72/3268","text":"Takeshi Yamaguchi"},{"@pid":"75/1036","text":"Shigeru Kashihara"},{"@pid":"12/3808","text":"Yuji Oie"}]},"title":"Implementation Design of Handover Management Scheme for Efficient Multimodal Communication.","venue":"WiMob","pages":"684-689","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/TsukamotoYKO08","doi":"10.1109/WIMOB.2008.36","ee":"https://doi.org/10.1109/WiMob.2008.36","url":"https://dblp.org/rec/conf/wimob/TsukamotoYKO08"}, "url":"URL#5421780" }, { "@score":"1", "@id":"5421781", "info":{"authors":{"author":[{"@pid":"89/5028","text":"P. Ubaidulla"},{"@pid":"65/6366","text":"Ananthanarayanan Chockalingam"}]},"title":"Precoder Designs for MIMO Broadcast Channels with Imperfect CSI.","venue":"WiMob","pages":"145-150","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/UbaidullaC08","doi":"10.1109/WIMOB.2008.121","ee":"https://doi.org/10.1109/WiMob.2008.121","url":"https://dblp.org/rec/conf/wimob/UbaidullaC08"}, "url":"URL#5421781" }, { "@score":"1", "@id":"5421782", "info":{"authors":{"author":[{"@pid":"09/3162","text":"Christopher N. Ververidis"},{"@pid":"p/GCPolyzos","text":"George C. Polyzos"}]},"title":"AVERT: Adaptive SerVicE and Route Discovery ProTocol for MANETs.","venue":"WiMob","pages":"38-43","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/VerveridisP08","doi":"10.1109/WIMOB.2008.49","ee":"https://doi.org/10.1109/WiMob.2008.49","url":"https://dblp.org/rec/conf/wimob/VerveridisP08"}, "url":"URL#5421782" }, { "@score":"1", "@id":"5421783", "info":{"authors":{"author":[{"@pid":"36/1341-3","text":"Liping Wang 0003"},{"@pid":"53/4376","text":"Yusheng Ji"},{"@pid":"15/6010-1","text":"Fuqiang Liu 0001"}]},"title":"A Novel Centralized Resource Scheduling Scheme in OFDMA-Based Two-Hop Relay-Enhanced Cellular Systems.","venue":"WiMob","pages":"113-118","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/WangJL08","doi":"10.1109/WIMOB.2008.50","ee":"https://doi.org/10.1109/WiMob.2008.50","url":"https://dblp.org/rec/conf/wimob/WangJL08"}, "url":"URL#5421783" }, { "@score":"1", "@id":"5421784", "info":{"authors":{"author":[{"@pid":"75/1656","text":"Ahmed H. Zahran"},{"@pid":"s/CJSreenan","text":"Cormac J. Sreenan"}]},"title":"PGMS: Pseudo-optimal Greedy Media Streaming Algorithm for Heterogeneous Wireless Networks.","venue":"WiMob","pages":"390-396","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ZahranS08","doi":"10.1109/WIMOB.2008.75","ee":"https://doi.org/10.1109/WiMob.2008.75","url":"https://dblp.org/rec/conf/wimob/ZahranS08"}, "url":"URL#5421784" }, { "@score":"1", "@id":"5421785", "info":{"authors":{"author":{"@pid":"45/3426","text":"Hong Zhou"}},"title":"Code Combining Diversity Reception and Its Application to Broadband Wireless.","venue":"WiMob","pages":"678-683","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/Zhou08","doi":"10.1109/WIMOB.2008.11","ee":"https://doi.org/10.1109/WiMob.2008.11","url":"https://dblp.org/rec/conf/wimob/Zhou08"}, "url":"URL#5421785" }, { "@score":"1", "@id":"5421786", "info":{"authors":{"author":[{"@pid":"67/5651","text":"Saber Zrelli"},{"@pid":"20/5513","text":"Atsuko Miyaji"},{"@pid":"74/6349","text":"Yoichi Shinoda"},{"@pid":"60/3016","text":"Thierry Ernst"}]},"title":"Security and Access Control for Vehicular Communications.","venue":"WiMob","pages":"561-566","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/wimob/ZrelliMSE08","doi":"10.1109/WIMOB.2008.114","ee":"https://doi.org/10.1109/WiMob.2008.114","url":"https://dblp.org/rec/conf/wimob/ZrelliMSE08"}, "url":"URL#5421786" }, { "@score":"1", "@id":"5429302", "info":{"title":"IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, 12-14 October 2008, Proceedings","venue":"WiMob","publisher":"IEEE Computer Society","year":"2008","type":"Editorship","key":"conf/wimob/2008","ee":"https://ieeexplore.ieee.org/xpl/conhome/4654184/proceeding","url":"https://dblp.org/rec/conf/wimob/2008"}, "url":"URL#5429302" } ] } } } )