callback( { "result":{ "query":":facetid:toc:\"db/journals/comsur/comsur16.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"188.80" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"111", "@dc":"111", "@oc":"111", "@id":"43443637", "text":":facetid:toc:db/journals/comsur/comsur16.bht" } }, "hits":{ "@total":"111", "@computed":"111", "@sent":"111", "@first":"0", "hit":[{ "@score":"1", "@id":"3717525", "info":{"authors":{"author":[{"@pid":"98/11471","text":"Saeid Abolfazli"},{"@pid":"33/11470","text":"Zohreh Sanaei"},{"@pid":"72/3375-3","text":"Ejaz Ahmed 0003"},{"@pid":"12/989","text":"Abdullah Gani"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"337-368","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/AbolfazliSAGB14","doi":"10.1109/SURV.2013.070813.00285","ee":"https://doi.org/10.1109/SURV.2013.070813.00285","url":"https://dblp.org/rec/journals/comsur/AbolfazliSAGB14"}, "url":"URL#3717525" }, { "@score":"1", "@id":"3717526", "info":{"authors":{"author":[{"@pid":"72/9386","text":"Atiq Ahmed"},{"@pid":"m/LeilaMerghem","text":"Leïla Merghem-Boulahia"},{"@pid":"38/3936","text":"Dominique Gaïti"}]},"title":"Enabling Vertical Handover Decisions in Heterogeneous Wireless Networks: A State-of-the-Art and A Classification.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"776-811","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/AhmedMG14","doi":"10.1109/SURV.2013.082713.00141","ee":"https://doi.org/10.1109/SURV.2013.082713.00141","url":"https://dblp.org/rec/journals/comsur/AhmedMG14"}, "url":"URL#3717526" }, { "@score":"1", "@id":"3717527", "info":{"authors":{"author":[{"@pid":"137/6691","text":"Najah A. Abu Ali"},{"@pid":"05/3877","text":"Abd-Elhamid M. Taha"},{"@pid":"05/8277","text":"Mohamed Salah"},{"@pid":"07/3173","text":"Hossam S. Hassanein"}]},"title":"Uplink Scheduling in LTE and LTE-Advanced: Tutorial, Survey and Evaluation Framework.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1239-1265","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/AliTSH14","doi":"10.1109/SURV.2013.1127.00161","ee":"https://doi.org/10.1109/SURV.2013.1127.00161","url":"https://dblp.org/rec/journals/comsur/AliTSH14"}, "url":"URL#3717527" }, { "@score":"1", "@id":"3717528", "info":{"authors":{"author":[{"@pid":"146/0878","text":"Mohammad Abu Alsheikh"},{"@pid":"00/1006","text":"Shaowei Lin"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"43/4600","text":"Hwee Pink Tan"}]},"title":"Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1996-2018","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/AlsheikhLNT14","doi":"10.1109/COMST.2014.2320099","ee":"https://doi.org/10.1109/COMST.2014.2320099","url":"https://dblp.org/rec/journals/comsur/AlsheikhLNT14"}, "url":"URL#3717528" }, { "@score":"1", "@id":"3717529", "info":{"authors":{"author":[{"@pid":"57/8044","text":"Arash Asadi"},{"@pid":"97/6505-7","text":"Qing Wang 0007"},{"@pid":"46/1660","text":"Vincenzo Mancuso"}]},"title":"A Survey on Device-to-Device Communication in Cellular Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1801-1819","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/AsadiWM14","doi":"10.1109/COMST.2014.2319555","ee":"https://doi.org/10.1109/COMST.2014.2319555","url":"https://dblp.org/rec/journals/comsur/AsadiWM14"}, "url":"URL#3717529" }, { "@score":"1", "@id":"3717530", "info":{"authors":{"author":{"@pid":"14/3759","text":"James Aweya"}},"title":"Implementing Synchronous Ethernet in Telecommunication Systems.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"1080-1113","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Aweya14","doi":"10.1109/SURV.2013.103113.00260","ee":"https://doi.org/10.1109/SURV.2013.103113.00260","url":"https://dblp.org/rec/journals/comsur/Aweya14"}, "url":"URL#3717530" }, { "@score":"1", "@id":"3717531", "info":{"authors":{"author":[{"@pid":"00/2807","text":"Miloud Bagaa"},{"@pid":"88/2323","text":"Yacine Challal"},{"@pid":"37/6589","text":"Adlen Ksentini"},{"@pid":"08/6647","text":"Abdelouahid Derhab"},{"@pid":"60/842","text":"Nadjib Badache"}]},"title":"Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1339-1368","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BagaaCKDB14","doi":"10.1109/SURV.2014.031914.00029","ee":"https://doi.org/10.1109/SURV.2014.031914.00029","url":"https://dblp.org/rec/journals/comsur/BagaaCKDB14"}, "url":"URL#3717531" }, { "@score":"1", "@id":"3717532", "info":{"authors":{"author":[{"@pid":"35/791","text":"Gianmarco Baldini"},{"@pid":"78/6557","text":"Stan Karanasios"},{"@pid":"08/7031","text":"David K. Allen"},{"@pid":"05/10889","text":"Fabrizio Vergari"}]},"title":"Survey of Wireless Communication Technologies for Public Safety.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"619-641","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BaldiniKAV14","doi":"10.1109/SURV.2013.082713.00034","ee":"https://doi.org/10.1109/SURV.2013.082713.00034","url":"https://dblp.org/rec/journals/comsur/BaldiniKAV14"}, "url":"URL#3717532" }, { "@score":"1", "@id":"3717533", "info":{"authors":{"author":[{"@pid":"51/9795","text":"Martín Barrère"},{"@pid":"04/5407","text":"Remi Badonnel"},{"@pid":"f/OlivierFestor","text":"Olivier Festor"}]},"title":"Vulnerability Assessment in Autonomic Networks and Services: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"988-1004","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BarrereBF14","doi":"10.1109/SURV.2013.082713.00154","ee":"https://doi.org/10.1109/SURV.2013.082713.00154","url":"https://dblp.org/rec/journals/comsur/BarrereBF14"}, "url":"URL#3717533" }, { "@score":"1", "@id":"3717534", "info":{"authors":{"author":[{"@pid":"b/PaoloBellavista","text":"Paolo Bellavista"},{"@pid":"90/2390","text":"Antonio Corradi"},{"@pid":"50/1994","text":"Andrea Reale"}]},"title":"Quality of Service in Wide Scale Publish - Subscribe Systems.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1591-1616","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BellavistaCR14","doi":"10.1109/SURV.2014.031914.00192","ee":"https://doi.org/10.1109/SURV.2014.031914.00192","url":"https://dblp.org/rec/journals/comsur/BellavistaCR14"}, "url":"URL#3717534" }, { "@score":"1", "@id":"3717535", "info":{"authors":{"author":[{"@pid":"06/9555","text":"Monowar H. Bhuyan"},{"@pid":"34/4138","text":"D. K. Bhattacharyya"},{"@pid":"78/5662","text":"Jugal K. Kalita"}]},"title":"Network Anomaly Detection: Methods, Systems and Tools.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"303-336","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BhuyanBK14","doi":"10.1109/SURV.2013.052213.00046","ee":"https://doi.org/10.1109/SURV.2013.052213.00046","url":"https://dblp.org/rec/journals/comsur/BhuyanBK14"}, "url":"URL#3717535" }, { "@score":"1", "@id":"3717536", "info":{"authors":{"author":[{"@pid":"47/1541","text":"Raffaele Bolla"},{"@pid":"48/6909","text":"Matteo Repetto"}]},"title":"A Comprehensive Tutorial for Mobility Management in Data Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"812-833","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BollaR14","doi":"10.1109/SURV.2013.071913.00140","ee":"https://doi.org/10.1109/SURV.2013.071913.00140","url":"https://dblp.org/rec/journals/comsur/BollaR14"}, "url":"URL#3717536" }, { "@score":"1", "@id":"3717537", "info":{"authors":{"author":[{"@pid":"96/2278","text":"Luís M. Borges"},{"@pid":"19/1122","text":"Fernando J. Velez"},{"@pid":"97/6644","text":"António S. Lebres"}]},"title":"Survey on the Characterization and Classification of Wireless Sensor Network Applications.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1860-1890","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BorgesVL14","doi":"10.1109/COMST.2014.2320073","ee":"https://doi.org/10.1109/COMST.2014.2320073","url":"https://dblp.org/rec/journals/comsur/BorgesVL14"}, "url":"URL#3717537" }, { "@score":"1", "@id":"3717538", "info":{"authors":{"author":[{"@pid":"122/5447","text":"Elias Bou-Harb"},{"@pid":"d/MDebbabi","text":"Mourad Debbabi"},{"@pid":"a/ChadiAssi","text":"Chadi Assi"}]},"title":"Cyber Scanning: A Comprehensive Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1496-1519","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Bou-HarbDA14","doi":"10.1109/SURV.2013.102913.00020","ee":"https://doi.org/10.1109/SURV.2013.102913.00020","url":"https://dblp.org/rec/journals/comsur/Bou-HarbDA14"}, "url":"URL#3717538" }, { "@score":"1", "@id":"3717539", "info":{"authors":{"author":[{"@pid":"66/310","text":"Lukasz Budzisz"},{"@pid":"137/6331","text":"Fatemeh Ganji"},{"@pid":"71/3141","text":"Gianluca Rizzo"},{"@pid":"m/MarcoAjmoneMarsan","text":"Marco Ajmone Marsan"},{"@pid":"98/5305","text":"Michela Meo"},{"@pid":"64/6544","text":"Yi Zhang"},{"@pid":"34/4058","text":"George Koutitas"},{"@pid":"03/3843","text":"Leandros Tassiulas"},{"@pid":"148/2350","text":"Sofie Lambert"},{"@pid":"32/1098","text":"Bart Lannoo"},{"@pid":"47/6293","text":"Mario Pickavet"},{"@pid":"50/2999","text":"Alberto Conte"},{"@pid":"48/616","text":"Ivaylo Haratcherev"},{"@pid":"w/AdamWolisz","text":"Adam Wolisz"}]},"title":"Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks: A Survey and an Outlook.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2259-2285","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/BudziszGRMMZKTLLPCHW14","doi":"10.1109/COMST.2014.2329505","ee":"https://doi.org/10.1109/COMST.2014.2329505","url":"https://dblp.org/rec/journals/comsur/BudziszGRMMZKTLLPCHW14"}, "url":"URL#3717539" }, { "@score":"1", "@id":"3717540", "info":{"authors":{"author":[{"@pid":"07/11069","text":"Ismail Butun"},{"@pid":"06/6443","text":"Salvatore D. Morgera"},{"@pid":"96/785","text":"Ravi Sankar"}]},"title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"266-282","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ButunMS14","doi":"10.1109/SURV.2013.050113.00191","ee":"https://doi.org/10.1109/SURV.2013.050113.00191","url":"https://dblp.org/rec/journals/comsur/ButunMS14"}, "url":"URL#3717540" }, { "@score":"1", "@id":"3717541", "info":{"authors":{"author":[{"@pid":"02/4935","text":"Miguel Elias M. Campista"},{"@pid":"00/4946","text":"Marcelo G. Rubinstein"},{"@pid":"32/6032","text":"Igor M. Moraes"},{"@pid":"51/7019","text":"Luís Henrique Maciel Kosmalski Costa"},{"@pid":"18/2077","text":"Otto Carlos M. B. Duarte"}]},"title":"Challenges and Research Directions for the Future Internetworking.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"1050-1079","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/CampistaRMCD14","doi":"10.1109/SURV.2013.100213.00143","ee":"https://doi.org/10.1109/SURV.2013.100213.00143","url":"https://dblp.org/rec/journals/comsur/CampistaRMCD14"}, "url":"URL#3717541" }, { "@score":"1", "@id":"3717542", "info":{"authors":{"author":[{"@pid":"40/429","text":"Jin Cao"},{"@pid":"74/1079","text":"Maode Ma"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"52/7485","text":"Yueyu Zhang"},{"@pid":"92/689","text":"Zhenxing Luo"}]},"title":"A Survey on Security Aspects for LTE and LTE-A Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"283-302","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/CaoMLZL14","doi":"10.1109/SURV.2013.041513.00174","ee":"https://doi.org/10.1109/SURV.2013.041513.00174","url":"https://dblp.org/rec/journals/comsur/CaoMLZL14"}, "url":"URL#3717542" }, { "@score":"1", "@id":"3717543", "info":{"authors":{"author":[{"@pid":"75/10038","text":"Ricardo Campanha Carrano"},{"@pid":"47/4581","text":"Diego G. Passos 0001"},{"@pid":"13/6767","text":"Luiz Claudio Schara Magalhães"},{"@pid":"40/809","text":"Célio Vinicius N. de Albuquerque"}]},"title":"Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"181-194","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/CarranoPMA14","doi":"10.1109/SURV.2013.052213.00116","ee":"https://doi.org/10.1109/SURV.2013.052213.00116","url":"https://dblp.org/rec/journals/comsur/CarranoPMA14"}, "url":"URL#3717543" }, { "@score":"1", "@id":"3717544", "info":{"authors":{"author":[{"@pid":"150/1337","text":"Riccardo Cavallari"},{"@pid":"03/7268","text":"Flavia Martelli"},{"@pid":"56/10646","text":"Ramona Rosini"},{"@pid":"82/4870","text":"Chiara Buratti"},{"@pid":"51/5708","text":"Roberto Verdone"}]},"title":"A Survey on Wireless Body Area Networks: Technologies and Design Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1635-1657","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/CavallariMRBV14","doi":"10.1109/SURV.2014.012214.00007","ee":"https://doi.org/10.1109/SURV.2014.012214.00007","url":"https://dblp.org/rec/journals/comsur/CavallariMRBV14"}, "url":"URL#3717544" }, { "@score":"1", "@id":"3717545", "info":{"authors":{"author":[{"@pid":"72/2676-1","text":"Xiaoming Chen 0001"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"},{"@pid":"11/7195-1","text":"Weixiao Meng 0001"}]},"title":"Cooperative Communications for Cognitive Radio Networks - From Theory to Applications.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1180-1192","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ChenCM14","doi":"10.1109/SURV.2014.021414.00066","ee":"https://doi.org/10.1109/SURV.2014.021414.00066","url":"https://dblp.org/rec/journals/comsur/ChenCM14"}, "url":"URL#3717545" }, { "@score":"1", "@id":"3717546", "info":{"authors":{"author":[{"@pid":"129/4009","text":"Keyu Chen"},{"@pid":"74/1079","text":"Maode Ma"},{"@pid":"24/1332","text":"En Cheng"},{"@pid":"75/222-1","text":"Fei Yuan 0001"},{"@pid":"50/4091-2","text":"Wei Su 0002"}]},"title":"A Survey on MAC Protocols for Underwater Wireless Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1433-1447","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ChenMCYS14","doi":"10.1109/SURV.2014.013014.00032","ee":"https://doi.org/10.1109/SURV.2014.013014.00032","url":"https://dblp.org/rec/journals/comsur/ChenMCYS14"}, "url":"URL#3717546" }, { "@score":"1", "@id":"3717547", "info":{"authors":{"author":[{"@pid":"50/6996-3","text":"Min Chen 0003"},{"@pid":"61/6196","text":"Jiafu Wan"},{"@pid":"37/3650","text":"Sergio González-Valenzuela"},{"@pid":"56/4402","text":"Xiaofei Liao"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"A Survey of Recent Developments in Home M2M Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"98-114","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ChenWGLL14","doi":"10.1109/SURV.2013.110113.00249","ee":"https://doi.org/10.1109/SURV.2013.110113.00249","url":"https://dblp.org/rec/journals/comsur/ChenWGLL14"}, "url":"URL#3717547" }, { "@score":"1", "@id":"3717548", "info":{"authors":{"author":[{"@pid":"92/11141","text":"Kemal Davaslioglu"},{"@pid":"06/5722","text":"Ender Ayanoglu"}]},"title":"Quantifying Potential Energy Efficiency Gain in Green Cellular Wireless Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2065-2091","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/DavasliogluA14","doi":"10.1109/COMST.2014.2322951","ee":"https://doi.org/10.1109/COMST.2014.2322951","url":"https://dblp.org/rec/journals/comsur/DavasliogluA14"}, "url":"URL#3717548" }, { "@score":"1", "@id":"3717549", "info":{"authors":{"author":[{"@pid":"24/10016","text":"Dina S. Deif"},{"@pid":"88/2797","text":"Yasser Gadallah"}]},"title":"Classification of Wireless Sensor Networks Deployment Techniques.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"834-855","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/DeifG14","doi":"10.1109/SURV.2013.091213.00018","ee":"https://doi.org/10.1109/SURV.2013.091213.00018","url":"https://dblp.org/rec/journals/comsur/DeifG14"}, "url":"URL#3717549" }, { "@score":"1", "@id":"3717550", "info":{"authors":{"author":[{"@pid":"26/8089","text":"Stefan Dietzel"},{"@pid":"33/7861","text":"Jonathan Petit"},{"@pid":"46/306","text":"Frank Kargl"},{"@pid":"15/503-1","text":"Björn Scheuermann 0001"}]},"title":"In-Network Aggregation for Vehicular Ad Hoc Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1909-1932","year":"2014","type":"Journal Articles","access":"open","key":"journals/comsur/DietzelPKS14","doi":"10.1109/COMST.2014.2320091","ee":"https://doi.org/10.1109/COMST.2014.2320091","url":"https://dblp.org/rec/journals/comsur/DietzelPKS14"}, "url":"URL#3717550" }, { "@score":"1", "@id":"3717551", "info":{"authors":{"author":[{"@pid":"31/2788","text":"Mischa Dohler"},{"@pid":"132/2577","text":"Joerg Swetina"},{"@pid":"59/1890","text":"Angeliki Alexiou"},{"@pid":"84/2428","text":"Chonggang Wang"},{"@pid":"98/620","text":"Patricia Martigne"},{"@pid":"77/6893","text":"Kan Zheng"}]},"title":"Editorial: IEEE Communications Surveys & Tutorials - Machine-to-Machine Technologies & Architectures.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"1-3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/DohlerSAWMZ14","doi":"10.1109/SURV.2014.012114.00000","ee":"https://doi.org/10.1109/SURV.2014.012114.00000","url":"https://dblp.org/rec/journals/comsur/DohlerSAWMZ14"}, "url":"URL#3717551" }, { "@score":"1", "@id":"3717552", "info":{"authors":{"author":[{"@pid":"145/2043","text":"Ruwini Edirisinghe"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"}]},"title":"Cross-Layer Contextual Interactions in Wireless Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"1114-1134","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/EdirisingheZ14","doi":"10.1109/SURV.2013.101813.00023","ee":"https://doi.org/10.1109/SURV.2013.101813.00023","url":"https://dblp.org/rec/journals/comsur/EdirisingheZ14"}, "url":"URL#3717552" }, { "@score":"1", "@id":"3717553", "info":{"authors":{"author":[{"@pid":"74/2700","text":"Mohammed El-Hajjar"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"EXIT Charts for System Design and Analysis.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"127-153","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/El-HajjarH14","doi":"10.1109/SURV.2013.050813.00137","ee":"https://doi.org/10.1109/SURV.2013.050813.00137","url":"https://dblp.org/rec/journals/comsur/El-HajjarH14"}, "url":"URL#3717553" }, { "@score":"1", "@id":"3717554", "info":{"authors":{"author":[{"@pid":"f/PascalFelber","text":"Pascal Felber"},{"@pid":"k/PGKropf","text":"Peter G. Kropf"},{"@pid":"51/2227","text":"Eryk Schiller"},{"@pid":"67/5838","text":"Sabina Serbu"}]},"title":"Survey on Load Balancing in Peer-to-Peer Distributed Hash Tables.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"473-492","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/FelberKSS14","doi":"10.1109/SURV.2013.060313.00157","ee":"https://doi.org/10.1109/SURV.2013.060313.00157","url":"https://dblp.org/rec/journals/comsur/FelberKSS14"}, "url":"URL#3717554" }, { "@score":"1", "@id":"3717555", "info":{"authors":{"author":[{"@pid":"130/5023","text":"Sören Finster"},{"@pid":"87/6890","text":"Ingmar Baumgart"}]},"title":"Privacy-Aware Smart Metering: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1732-1745","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/FinsterB14","doi":"10.1109/SURV.2014.052914.00090","ee":"https://doi.org/10.1109/SURV.2014.052914.00090","url":"https://dblp.org/rec/journals/comsur/FinsterB14"}, "url":"URL#3717555" }, { "@score":"1", "@id":"3717556", "info":{"authors":{"author":[{"@pid":"141/1991","text":"Michael Finsterbusch"},{"@pid":"72/10025","text":"Chris Richter"},{"@pid":"76/10021","text":"Eduardo Rocha"},{"@pid":"65/6969","text":"Jean-Alexander Müller"},{"@pid":"145/2049","text":"Klaus Hanssgen"}]},"title":"A Survey of Payload-Based Traffic Classification Approaches.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"1135-1156","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/FinsterbuschRRMH14","doi":"10.1109/SURV.2013.100613.00161","ee":"https://doi.org/10.1109/SURV.2013.100613.00161","url":"https://dblp.org/rec/journals/comsur/FinsterbuschRRMH14"}, "url":"URL#3717556" }, { "@score":"1", "@id":"3717557", "info":{"authors":{"author":[{"@pid":"55/10544","text":"Michael Fire"},{"@pid":"127/6539","text":"Roy Goldschmidt"},{"@pid":"38/4086","text":"Yuval Elovici"}]},"title":"Online Social Networks: Threats and Solutions.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2019-2036","year":"2014","type":"Journal Articles","access":"open","key":"journals/comsur/FireGE14","doi":"10.1109/COMST.2014.2321628","ee":"https://doi.org/10.1109/COMST.2014.2321628","url":"https://dblp.org/rec/journals/comsur/FireGE14"}, "url":"URL#3717557" }, { "@score":"1", "@id":"3717558", "info":{"authors":{"author":[{"@pid":"89/1563","text":"Bo Fu"},{"@pid":"181/1848-1","text":"Yang Xiao 0001"},{"@pid":"70/5799-1","text":"Hongmei Julia Deng"},{"@pid":"32/5332","text":"Hui Zeng"}]},"title":"A Survey of Cross-Layer Designs in Wireless Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"110-126","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/FuXDZ14","doi":"10.1109/SURV.2013.081313.00231","ee":"https://doi.org/10.1109/SURV.2013.081313.00231","url":"https://dblp.org/rec/journals/comsur/FuXDZ14"}, "url":"URL#3717558" }, { "@score":"1", "@id":"3717559", "info":{"authors":{"author":[{"@pid":"28/5282","text":"Liljana Gavrilovska"},{"@pid":"05/8863","text":"Daniel Denkovski"},{"@pid":"66/9953","text":"Valentin Rakovic"},{"@pid":"162/0090","text":"Marko Angjelicinoski"}]},"title":"Medium Access Control Protocols in Cognitive Radio Networks: Overview and General Classification.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2092-2124","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/GavrilovskaDRA14","doi":"10.1109/COMST.2014.2322971","ee":"https://doi.org/10.1109/COMST.2014.2322971","url":"https://dblp.org/rec/journals/comsur/GavrilovskaDRA14"}, "url":"URL#3717559" }, { "@score":"1", "@id":"3717560", "info":{"authors":{"author":[{"@pid":"95/6725-2","text":"Luis Hernández 0002"},{"@pid":"72/3407","text":"Carlos Baladrón Zorita"},{"@pid":"30/1756","text":"Javier M. Aguiar"},{"@pid":"39/3280","text":"Belén Carro"},{"@pid":"97/4333","text":"Antonio Sánchez-Esguevillas"},{"@pid":"l/JaimeLloret","text":"Jaime Lloret 0001"},{"@pid":"150/1521","text":"Joaquim Massana"}]},"title":"A Survey on Electric Power Demand Forecasting: Future Trends in Smart Grids, Microgrids and Smart Buildings.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1460-1495","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/HernandezZACSLM14","doi":"10.1109/SURV.2014.032014.00094","ee":"https://doi.org/10.1109/SURV.2014.032014.00094","url":"https://dblp.org/rec/journals/comsur/HernandezZACSLM14"}, "url":"URL#3717560" }, { "@score":"1", "@id":"3717561", "info":{"authors":{"author":[{"@pid":"16/8214","text":"Rick Hofstede"},{"@pid":"58/3770","text":"Pavel Celeda"},{"@pid":"56/5974","text":"Brian Trammell"},{"@pid":"08/4676","text":"Idilio Drago"},{"@pid":"90/2103","text":"Ramin Sadre"},{"@pid":"59/2521","text":"Anna Sperotto"},{"@pid":"p/AikoPras","text":"Aiko Pras"}]},"title":"Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2037-2064","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/HofstedeCTDSSP14","doi":"10.1109/COMST.2014.2321898","ee":"https://doi.org/10.1109/COMST.2014.2321898","url":"https://dblp.org/rec/journals/comsur/HofstedeCTDSSP14"}, "url":"URL#3717561" }, { "@score":"1", "@id":"3717562", "info":{"authors":{"author":[{"@pid":"119/5055","text":"Mohammad Ashraful Hoque"},{"@pid":"78/3796","text":"Matti Siekkinen"},{"@pid":"38/1107","text":"Jukka K. Nurminen"}]},"title":"Energy Efficient Multimedia Streaming to Mobile Devices - A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"579-597","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/HoqueSN14","doi":"10.1109/SURV.2012.111412.00051","ee":"https://doi.org/10.1109/SURV.2012.111412.00051","url":"https://dblp.org/rec/journals/comsur/HoqueSN14"}, "url":"URL#3717562" }, { "@score":"1", "@id":"3717563", "info":{"authors":{"author":[{"@pid":"38/2894","text":"Jens Horneber"},{"@pid":"78/7545","text":"Anton Hergenröder"}]},"title":"A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1820-1838","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/HorneberH14","doi":"10.1109/COMST.2014.2320051","ee":"https://doi.org/10.1109/COMST.2014.2320051","url":"https://dblp.org/rec/journals/comsur/HorneberH14"}, "url":"URL#3717563" }, { "@score":"1", "@id":"3717564", "info":{"authors":{"author":{"@pid":"45/1224","text":"Ekram Hossain 0001"}},"title":"Editorial: First Quarter 2014, IEEE Communications Surveys & Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"1-4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Hossain14","doi":"10.1109/SURV.2014.013114.00000","ee":"https://doi.org/10.1109/SURV.2014.013114.00000","url":"https://dblp.org/rec/journals/comsur/Hossain14"}, "url":"URL#3717564" }, { "@score":"1", "@id":"3717565", "info":{"authors":{"author":{"@pid":"45/1224","text":"Ekram Hossain 0001"}},"title":"Editorial: Second Quarter 2014, IEEE Communications Surveys & Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"613-618","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Hossain14a","doi":"10.1109/SURV.2014.042914.00000","ee":"https://doi.org/10.1109/SURV.2014.042914.00000","url":"https://dblp.org/rec/journals/comsur/Hossain14a"}, "url":"URL#3717565" }, { "@score":"1", "@id":"3717566", "info":{"authors":{"author":{"@pid":"45/1224","text":"Ekram Hossain 0001"}},"title":"Editorial: Third Quarter 2014 IEEE Communications Surveys & Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1174-1179","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Hossain14b","doi":"10.1109/SURV.2014.072114.00000","ee":"https://doi.org/10.1109/SURV.2014.072114.00000","url":"https://dblp.org/rec/journals/comsur/Hossain14b"}, "url":"URL#3717566" }, { "@score":"1", "@id":"3717567", "info":{"authors":{"author":{"@pid":"45/1224","text":"Ekram Hossain 0001"}},"title":"Editorial: Fourth Quarter 2014 IEEE Communications Surveys and Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1797-1800","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Hossain14c","doi":"10.1109/COMST.2014.2369651","ee":"https://doi.org/10.1109/COMST.2014.2369651","url":"https://dblp.org/rec/journals/comsur/Hossain14c"}, "url":"URL#3717567" }, { "@score":"1", "@id":"3717568", "info":{"authors":{"author":[{"@pid":"139/8901","text":"Andrej Hrovat"},{"@pid":"62/4806","text":"Gorazd Kandus"},{"@pid":"05/1636","text":"Tomaz Javornik"}]},"title":"A Survey of Radio Propagation Modeling for Tunnels.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"658-669","year":"2014","type":"Journal Articles","access":"open","key":"journals/comsur/HrovatKJ14","doi":"10.1109/SURV.2013.091213.00175","ee":"https://doi.org/10.1109/SURV.2013.091213.00175","url":"https://dblp.org/rec/journals/comsur/HrovatKJ14"}, "url":"URL#3717568" }, { "@score":"1", "@id":"3717569", "info":{"authors":{"author":[{"@pid":"92/1299-1","text":"Fei Hu 0001"},{"@pid":"56/5838","text":"Qi Hao"},{"@pid":"139/2607","text":"Ke Bao"}]},"title":"A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2181-2206","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/HuHB14","doi":"10.1109/COMST.2014.2326417","ee":"https://doi.org/10.1109/COMST.2014.2326417","url":"https://dblp.org/rec/journals/comsur/HuHB14"}, "url":"URL#3717569" }, { "@score":"1", "@id":"3717570", "info":{"authors":{"author":[{"@pid":"94/3756","text":"Dong Huang"},{"@pid":"h/BingshengHe","text":"Bingsheng He"},{"@pid":"m/ChunyanMiao","text":"Chunyan Miao"}]},"title":"A Survey of Resource Management in Multi-Tier Web Applications.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1574-1590","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/HuangHM14","doi":"10.1109/SURV.2014.010814.00060","ee":"https://doi.org/10.1109/SURV.2014.010814.00060","url":"https://dblp.org/rec/journals/comsur/HuangHM14"}, "url":"URL#3717570" }, { "@score":"1", "@id":"3717571", "info":{"authors":{"author":[{"@pid":"24/5158","text":"Yosr Jarraya"},{"@pid":"154/6471","text":"Taous Madi"},{"@pid":"d/MDebbabi","text":"Mourad Debbabi"}]},"title":"A Survey and a Layered Taxonomy of Software-Defined Networking.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1955-1980","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/JarrayaMD14","doi":"10.1109/COMST.2014.2320094","ee":"https://doi.org/10.1109/COMST.2014.2320094","url":"https://dblp.org/rec/journals/comsur/JarrayaMD14"}, "url":"URL#3717571" }, { "@score":"1", "@id":"3717572", "info":{"authors":{"author":[{"@pid":"117/5035","text":"Mohamed Amine Kafi"},{"@pid":"92/4240","text":"Djamel Djenouri"},{"@pid":"75/178","text":"Jalel Ben-Othman"},{"@pid":"60/842","text":"Nadjib Badache"}]},"title":"Congestion Control Protocols in Wireless Sensor Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1369-1390","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KafiDBB14","doi":"10.1109/SURV.2014.021714.00123","ee":"https://doi.org/10.1109/SURV.2014.021714.00123","url":"https://dblp.org/rec/journals/comsur/KafiDBB14"}, "url":"URL#3717572" }, { "@score":"1", "@id":"3717573", "info":{"authors":{"author":[{"@pid":"13/11293","text":"Ratinder Kaur"},{"@pid":"05/7685","text":"Maninder Singh"}]},"title":"A Survey on Zero-Day Polymorphic Worm Detection Techniques.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1520-1549","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KaurS14","doi":"10.1109/SURV.2014.022714.00160","ee":"https://doi.org/10.1109/SURV.2014.022714.00160","url":"https://dblp.org/rec/journals/comsur/KaurS14"}, "url":"URL#3717573" }, { "@score":"1", "@id":"3717574", "info":{"authors":{"author":[{"@pid":"38/6357","text":"Mohammad Ali Khalighi"},{"@pid":"52/6842","text":"Murat Uysal"}]},"title":"Survey on Free Space Optical Communication: A Communication Theory Perspective.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2231-2258","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KhalighiU14","doi":"10.1109/COMST.2014.2329501","ee":"https://doi.org/10.1109/COMST.2014.2329501","url":"https://dblp.org/rec/journals/comsur/KhalighiU14"}, "url":"URL#3717574" }, { "@score":"1", "@id":"3717575", "info":{"authors":{"author":[{"@pid":"51/9862","text":"Rana Azeem M. Khan"},{"@pid":"k/HolgerKarl","text":"Holger Karl"}]},"title":"MAC Protocols for Cooperative Diversity in Wireless LANs and Wireless Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"46-63","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KhanK14","doi":"10.1109/SURV.2013.042313.00067","ee":"https://doi.org/10.1109/SURV.2013.042313.00067","url":"https://dblp.org/rec/journals/comsur/KhanK14"}, "url":"URL#3717575" }, { "@score":"1", "@id":"3717576", "info":{"authors":{"author":[{"@pid":"39/11134","text":"Atta ur Rehman Khan"},{"@pid":"85/2694","text":"Mazliza Othman"},{"@pid":"73/5667","text":"Sajjad Ahmad Madani"},{"@pid":"k/SameeUllahKhan","text":"Samee Ullah Khan"}]},"title":"A Survey of Mobile Cloud Computing Application Models.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"393-413","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KhanOMK14","doi":"10.1109/SURV.2013.062613.00160","ee":"https://doi.org/10.1109/SURV.2013.062613.00160","url":"https://dblp.org/rec/journals/comsur/KhanOMK14"}, "url":"URL#3717576" }, { "@score":"1", "@id":"3717577", "info":{"authors":{"author":[{"@pid":"52/7861","text":"Mounib Khanafer"},{"@pid":"23/7861","text":"Mouhcine Guennoun"},{"@pid":"217/2530","text":"Hussein T. Mouftah"}]},"title":"A Survey of Beacon-Enabled IEEE 802.15.4 MAC Protocols in Wireless Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"856-876","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KhanaferGM14","doi":"10.1109/SURV.2013.112613.00094","ee":"https://doi.org/10.1109/SURV.2013.112613.00094","url":"https://dblp.org/rec/journals/comsur/KhanaferGM14"}, "url":"URL#3717577" }, { "@score":"1", "@id":"3717578", "info":{"authors":{"author":[{"@pid":"136/8342","text":"Sheharbano Khattak"},{"@pid":"31/8636","text":"Naurin Rasheed Ramay"},{"@pid":"145/2080","text":"Kamran Riaz Khan"},{"@pid":"80/3447","text":"Affan A. Syed"},{"@pid":"68/6021","text":"Syed Ali Khayam"}]},"title":"A Taxonomy of Botnet Behavior, Detection, and Defense.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"898-924","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KhattakRKSK14","doi":"10.1109/SURV.2013.091213.00134","ee":"https://doi.org/10.1109/SURV.2013.091213.00134","url":"https://dblp.org/rec/journals/comsur/KhattakRKSK14"}, "url":"URL#3717578" }, { "@score":"1", "@id":"3717579", "info":{"authors":{"author":[{"@pid":"52/10127","text":"H. Hakan Kilinc"},{"@pid":"57/363","text":"Tugrul Yanik"}]},"title":"A Survey of SIP Authentication and Key Agreement Schemes.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"1005-1023","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KilincY14","doi":"10.1109/SURV.2013.091513.00050","ee":"https://doi.org/10.1109/SURV.2013.091513.00050","url":"https://dblp.org/rec/journals/comsur/KilincY14"}, "url":"URL#3717579" }, { "@score":"1", "@id":"3717580", "info":{"authors":{"author":[{"@pid":"96/6657","text":"Jaewoo Kim"},{"@pid":"27/6188","text":"Jaiyong Lee"},{"@pid":"14/5753","text":"Jaeho Kim"},{"@pid":"17/319","text":"Jaeseok Yun"}]},"title":"M2M Service Platforms: Survey, Issues, and Enabling Technologies.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"61-76","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KimLKY14","doi":"10.1109/SURV.2013.100713.00203","ee":"https://doi.org/10.1109/SURV.2013.100713.00203","url":"https://dblp.org/rec/journals/comsur/KimLKY14"}, "url":"URL#3717580" }, { "@score":"1", "@id":"3717581", "info":{"authors":{"author":[{"@pid":"66/6736","text":"Nikos Komninos"},{"@pid":"154/6668","text":"Eleni Philippou"},{"@pid":"37/2147","text":"Andreas Pitsillides"}]},"title":"Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1933-1954","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/KomninosPP14","doi":"10.1109/COMST.2014.2320093","ee":"https://doi.org/10.1109/COMST.2014.2320093","url":"https://dblp.org/rec/journals/comsur/KomninosPP14"}, "url":"URL#3717581" }, { "@score":"1", "@id":"3717582", "info":{"authors":{"author":[{"@pid":"334/3048","text":"Adrián Lara"},{"@pid":"142/0436","text":"Anisha Kolasani"},{"@pid":"65/5635","text":"Byrav Ramamurthy"}]},"title":"Network Innovation using OpenFlow: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"493-512","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/LaraKR14","doi":"10.1109/SURV.2013.081313.00105","ee":"https://doi.org/10.1109/SURV.2013.081313.00105","url":"https://dblp.org/rec/journals/comsur/LaraKR14"}, "url":"URL#3717582" }, { "@score":"1", "@id":"3717583", "info":{"authors":{"author":[{"@pid":"27/9556","text":"Andres Laya"},{"@pid":"24/1961-1","text":"Luis Alonso 0001"},{"@pid":"12/395","text":"Jesus Alonso-Zarate"}]},"title":"Is the Random Access Channel of LTE and LTE-A Suitable for M2M Communications? A Survey of Alternatives.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"4-16","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Laya0A14","doi":"10.1109/SURV.2013.111313.00244","ee":"https://doi.org/10.1109/SURV.2013.111313.00244","url":"https://dblp.org/rec/journals/comsur/Laya0A14"}, "url":"URL#3717583" }, { "@score":"1", "@id":"3717584", "info":{"authors":{"author":[{"@pid":"138/5527","text":"Ying Loong Lee"},{"@pid":"85/1835","text":"Teong Chee Chuah"},{"@pid":"11/9116","text":"Jonathan Loo"},{"@pid":"87/1880","text":"Alexey V. Vinel"}]},"title":"Recent Advances in Radio Resource Management for Heterogeneous LTE/LTE-A Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2142-2180","year":"2014","type":"Journal Articles","access":"open","key":"journals/comsur/LeeCLV14","doi":"10.1109/COMST.2014.2326303","ee":"https://doi.org/10.1109/COMST.2014.2326303","url":"https://dblp.org/rec/journals/comsur/LeeCLV14"}, "url":"URL#3717584" }, { "@score":"1", "@id":"3717585", "info":{"authors":{"author":[{"@pid":"13/5732","text":"Haeyoung Lee"},{"@pid":"43/9708","text":"Seiamak Vahid"},{"@pid":"59/3145","text":"Klaus Moessner"}]},"title":"A Survey of Radio Resource Management for Spectrum Aggregation in LTE-Advanced.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"745-760","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/LeeVM14","doi":"10.1109/SURV.2013.101813.00275","ee":"https://doi.org/10.1109/SURV.2013.101813.00275","url":"https://dblp.org/rec/journals/comsur/LeeVM14"}, "url":"URL#3717585" }, { "@score":"1", "@id":"3717586", "info":{"authors":{"author":[{"@pid":"48/128","text":"Husheng Li"},{"@pid":"93/10825","text":"Aleksandar D. Dimitrovski"},{"@pid":"54/1028","text":"Ju Bin Song"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"48/536","text":"Lijun Qian"}]},"title":"Communication Infrastructure Design in Cyber Physical Systems with Applications in Smart Grids: A Hybrid System Framework.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1689-1708","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/LiDSHQ14","doi":"10.1109/SURV.2014.052914.00130","ee":"https://doi.org/10.1109/SURV.2014.052914.00130","url":"https://dblp.org/rec/journals/comsur/LiDSHQ14"}, "url":"URL#3717586" }, { "@score":"1", "@id":"3717587", "info":{"authors":{"author":[{"@pid":"89/5914","text":"Geoffrey Ye Li"},{"@pid":"122/5743","text":"Jinping Niu"},{"@pid":"43/5538","text":"Daewon Lee"},{"@pid":"30/7197","text":"Jiancun Fan"},{"@pid":"19/2823","text":"Yusun Fu"}]},"title":"Multi-Cell Coordinated Scheduling and MIMO in LTE.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"761-775","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/LiNLFF14","doi":"10.1109/SURV.2014.022614.00186","ee":"https://doi.org/10.1109/SURV.2014.022614.00186","url":"https://dblp.org/rec/journals/comsur/LiNLFF14"}, "url":"URL#3717587" }, { "@score":"1", "@id":"3717588", "info":{"authors":{"author":[{"@pid":"62/5181-2","text":"Hao Liang 0002"},{"@pid":"150/1505","text":"Amit Kumar Tamang"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Stochastic Information Management in Smart Grid.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1746-1770","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/LiangTZS14","doi":"10.1109/SURV.2014.020614.00115","ee":"https://doi.org/10.1109/SURV.2014.020614.00115","url":"https://dblp.org/rec/journals/comsur/LiangTZS14"}, "url":"URL#3717588" }, { "@score":"1", "@id":"3717589", "info":{"authors":{"author":[{"@pid":"77/9561","text":"Yinsheng Liu"},{"@pid":"81/3319","text":"Zhenhui Tan"},{"@pid":"89/7908","text":"Hongjie Hu"},{"@pid":"19/1152","text":"Leonard J. Cimini Jr."},{"@pid":"89/5914","text":"Geoffrey Ye Li"}]},"title":"Channel Estimation for OFDM.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1891-1908","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/LiuTHCL14","doi":"10.1109/COMST.2014.2320074","ee":"https://doi.org/10.1109/COMST.2014.2320074","url":"https://dblp.org/rec/journals/comsur/LiuTHCL14"}, "url":"URL#3717589" }, { "@score":"1", "@id":"3717590", "info":{"authors":{"author":[{"@pid":"87/4775","text":"José A. Lopez-Salcedo"},{"@pid":"144/8631","text":"José A. del Peral-Rosado"},{"@pid":"88/6407","text":"Gonzalo Seco-Granados"}]},"title":"Survey on Robust Carrier Tracking Techniques.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"670-688","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Lopez-SalcedoPS14","doi":"10.1109/SURV.2013.082713.00228","ee":"https://doi.org/10.1109/SURV.2013.082713.00228","url":"https://dblp.org/rec/journals/comsur/Lopez-SalcedoPS14"}, "url":"URL#3717590" }, { "@score":"1", "@id":"3717591", "info":{"authors":{"author":[{"@pid":"29/2864-1","text":"Ning Lu 0001"},{"@pid":"s/XueminShen","text":"Xuemin (Sherman) Shen"}]},"title":"Scaling Laws for Throughput Capacity and Delay in Wireless Networks - A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"642-657","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/LuS14","doi":"10.1109/SURV.2013.081313.00039","ee":"https://doi.org/10.1109/SURV.2013.081313.00039","url":"https://dblp.org/rec/journals/comsur/LuS14"}, "url":"URL#3717591" }, { "@score":"1", "@id":"3717592", "info":{"authors":{"author":[{"@pid":"122/5199","text":"Anny Martínez"},{"@pid":"46/1785","text":"Marcelo Yannuzzi"},{"@pid":"93/6627","text":"Víctor López 0001"},{"@pid":"78/1845","text":"Diego R. López"},{"@pid":"63/9839","text":"Wilson Ramírez"},{"@pid":"30/4324","text":"René Serral-Gracià"},{"@pid":"04/4820","text":"Xavier Masip-Bruin"},{"@pid":"89/11509","text":"Maciej Maciejewski"},{"@pid":"18/6846","text":"Jörn Altmann"}]},"title":"Network Management Challenges and Trends in Multi-Layer and Multi-Vendor Settings for Carrier-Grade Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2207-2230","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/MartinezYLLRSMMA14","doi":"10.1109/COMST.2014.2327754","ee":"https://doi.org/10.1109/COMST.2014.2327754","url":"https://dblp.org/rec/journals/comsur/MartinezYLLRSMMA14"}, "url":"URL#3717592" }, { "@score":"1", "@id":"3717593", "info":{"authors":{"author":[{"@pid":"23/11531","text":"Kevin Mets"},{"@pid":"38/6069","text":"Juan Aparicio"},{"@pid":"74/1846","text":"Chris Develder"}]},"title":"Combining Power and Communication Network Simulation for Cost-Effective Smart Grid Analysis.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1771-1796","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/MetsAD14","doi":"10.1109/SURV.2014.021414.00116","ee":"https://doi.org/10.1109/SURV.2014.021414.00116","url":"https://dblp.org/rec/journals/comsur/MetsAD14"}, "url":"URL#3717593" }, { "@score":"1", "@id":"3717594", "info":{"authors":{"author":[{"@pid":"142/0438","text":"Shahab Mirzadeh"},{"@pid":"42/2102","text":"Haitham S. Cruickshank"},{"@pid":"18/380","text":"Rahim Tafazolli"}]},"title":"Secure Device Pairing: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"17-40","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/MirzadehCT14","doi":"10.1109/SURV.2013.111413.00196","ee":"https://doi.org/10.1109/SURV.2013.111413.00196","url":"https://dblp.org/rec/journals/comsur/MirzadehCT14"}, "url":"URL#3717594" }, { "@score":"1", "@id":"3717595", "info":{"authors":{"author":[{"@pid":"79/11528","text":"Arghir-Nicolae Moldovan"},{"@pid":"57/1420","text":"Stephan Weibelzahl"},{"@pid":"95/266","text":"Cristina Hava Muntean"}]},"title":"Energy-Aware Mobile Learning: Opportunities and Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"234-265","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/MoldovanWM14","doi":"10.1109/SURV.2013.071913.00194","ee":"https://doi.org/10.1109/SURV.2013.071913.00194","url":"https://dblp.org/rec/journals/comsur/MoldovanWM14"}, "url":"URL#3717595" }, { "@score":"1", "@id":"3717596", "info":{"authors":{"author":[{"@pid":"23/10127","text":"Samaneh Movassaghi"},{"@pid":"26/1047","text":"Mehran Abolhasan"},{"@pid":"52/5828","text":"Justin Lipman"},{"@pid":"47/3219","text":"David B. Smith 0001"},{"@pid":"76/4975","text":"Abbas Jamalipour"}]},"title":"Wireless Body Area Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1658-1686","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/MovassaghiALSJ14","doi":"10.1109/SURV.2013.121313.00064","ee":"https://doi.org/10.1109/SURV.2013.121313.00064","url":"https://dblp.org/rec/journals/comsur/MovassaghiALSJ14"}, "url":"URL#3717596" }, { "@score":"1", "@id":"3717597", "info":{"authors":{"author":[{"@pid":"48/1273","text":"Amitav Mukherjee"},{"@pid":"77/7892","text":"S. Ali A. Fakoorian"},{"@pid":"14/4834-8","text":"Jing Huang 0008"},{"@pid":"13/166","text":"A. Lee Swindlehurst"}]},"title":"Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1550-1573","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/MukherjeeFHS14","doi":"10.1109/SURV.2014.012314.00178","ee":"https://doi.org/10.1109/SURV.2014.012314.00178","url":"https://dblp.org/rec/journals/comsur/MukherjeeFHS14"}, "url":"URL#3717597" }, { "@score":"1", "@id":"3717598", "info":{"authors":{"author":[{"@pid":"52/1095-1","text":"Muhammad Naeem 0001"},{"@pid":"97/4028","text":"Alagan Anpalagan"},{"@pid":"37/6792","text":"Muhammad Jaseemuddin"},{"@pid":"01/4296-1","text":"Daniel Chonghwan Lee"}]},"title":"Resource Allocation Techniques in Cooperative Cognitive Radio Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"729-744","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/NaeemAJL14","doi":"10.1109/SURV.2013.102313.00272","ee":"https://doi.org/10.1109/SURV.2013.102313.00272","url":"https://dblp.org/rec/journals/comsur/NaeemAJL14"}, "url":"URL#3717598" }, { "@score":"1", "@id":"3717599", "info":{"authors":{"author":[{"@pid":"87/8512","text":"Hoang Anh Ngo"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Hybrid Automatic-Repeat-reQuest Systems for Cooperative Wireless Communications.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"25-45","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/NgoH14","doi":"10.1109/SURV.2013.071913.00073","ee":"https://doi.org/10.1109/SURV.2013.071913.00073","url":"https://dblp.org/rec/journals/comsur/NgoH14"}, "url":"URL#3717599" }, { "@score":"1", "@id":"3717600", "info":{"authors":{"author":[{"@pid":"27/3084","text":"Bruno Astuto A. Nunes"},{"@pid":"95/9976","text":"Marc Mendonca"},{"@pid":"133/3858","text":"Xuan Nam Nguyen"},{"@pid":"o/KatiaObraczka","text":"Katia Obraczka"},{"@pid":"71/5329","text":"Thierry Turletti"}]},"title":"A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1617-1634","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/NunesMNOT14","doi":"10.1109/SURV.2014.012214.00180","ee":"https://doi.org/10.1109/SURV.2014.012214.00180","url":"https://dblp.org/rec/journals/comsur/NunesMNOT14"}, "url":"URL#3717600" }, { "@score":"1", "@id":"3717601", "info":{"authors":{"author":[{"@pid":"119/3827","text":"Colin O'Reilly"},{"@pid":"31/5291","text":"Alexander Gluhak"},{"@pid":"25/1002","text":"Muhammad Ali Imran 0001"},{"@pid":"86/3207","text":"Sutharshan Rajasegarar"}]},"title":"Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1413-1432","year":"2014","type":"Journal Articles","access":"open","key":"journals/comsur/OReillyGIR14","doi":"10.1109/SURV.2013.112813.00168","ee":"https://doi.org/10.1109/SURV.2013.112813.00168","url":"https://dblp.org/rec/journals/comsur/OReillyGIR14"}, "url":"URL#3717601" }, { "@score":"1", "@id":"3717602", "info":{"authors":{"author":[{"@pid":"123/9806","text":"Francisco Paisana"},{"@pid":"20/4118","text":"Nicola Marchetti"},{"@pid":"87/1848","text":"Luiz A. DaSilva"}]},"title":"Radar, TV and Cellular Bands: Which Spectrum Access Techniques for Which Bands?","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1193-1220","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/PaisanaMD14","doi":"10.1109/SURV.2014.031914.00078","ee":"https://doi.org/10.1109/SURV.2014.031914.00078","url":"https://dblp.org/rec/journals/comsur/PaisanaMD14"}, "url":"URL#3717602" }, { "@score":"1", "@id":"3717603", "info":{"authors":{"author":[{"@pid":"15/6904","text":"Jianli Pan"},{"@pid":"j/RajJain","text":"Raj Jain"},{"@pid":"38/1846","text":"Subharthi Paul"}]},"title":"A Survey of Energy Efficiency in Buildings and Microgrids using Networking Technologies.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1709-1731","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/PanJP14","doi":"10.1109/SURV.2014.060914.00089","ee":"https://doi.org/10.1109/SURV.2014.060914.00089","url":"https://dblp.org/rec/journals/comsur/PanJP14"}, "url":"URL#3717603" }, { "@score":"1", "@id":"3717604", "info":{"authors":{"author":[{"@pid":"97/1246","text":"Sancheng Peng"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"48/3424","text":"Aimin Yang"}]},"title":"Smartphone Malware and Its Propagation Modeling: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"925-941","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/PengYY14","doi":"10.1109/SURV.2013.070813.00214","ee":"https://doi.org/10.1109/SURV.2013.070813.00214","url":"https://dblp.org/rec/journals/comsur/PengYY14"}, "url":"URL#3717604" }, { "@score":"1", "@id":"3717605", "info":{"authors":{"author":[{"@pid":"115/6940","text":"Charith Perera"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"},{"@pid":"c/PeterChristen","text":"Peter Christen"},{"@pid":"82/2760","text":"Dimitrios Georgakopoulos 0001"}]},"title":"Context Aware Computing for The Internet of Things: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"414-454","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/PereraZCG14","doi":"10.1109/SURV.2013.042313.00197","ee":"https://doi.org/10.1109/SURV.2013.042313.00197","url":"https://dblp.org/rec/journals/comsur/PereraZCG14"}, "url":"URL#3717605" }, { "@score":"1", "@id":"3717606", "info":{"authors":{"author":[{"@pid":"10/5855","text":"Alejandro Pérez-Méndez"},{"@pid":"40/8072","text":"Fernando Pereñíguez-Garcia"},{"@pid":"05/381","text":"Rafael Marín López"},{"@pid":"m/GabrielLopezMillan","text":"Gabriel López Millán"},{"@pid":"154/6734","text":"Josh Howlett"}]},"title":"Identity Federations Beyond the Web: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"2125-2141","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Perez-MendezPLMH14","doi":"10.1109/COMST.2014.2323430","ee":"https://doi.org/10.1109/COMST.2014.2323430","url":"https://dblp.org/rec/journals/comsur/Perez-MendezPLMH14"}, "url":"URL#3717606" }, { "@score":"1", "@id":"3717607", "info":{"authors":{"author":[{"@pid":"01/6745","text":"R. Venkatesha Prasad"},{"@pid":"68/10719","text":"Shruti Devasenapathy"},{"@pid":"66/7413","text":"Vijay S. Rao"},{"@pid":"04/3595","text":"Javad Vazifehdan"}]},"title":"Reincarnation in the Ambiance: Devices and Networks with Energy Harvesting.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"195-213","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/PrasadDRV14","doi":"10.1109/SURV.2013.062613.00235","ee":"https://doi.org/10.1109/SURV.2013.062613.00235","url":"https://dblp.org/rec/journals/comsur/PrasadDRV14"}, "url":"URL#3717607" }, { "@score":"1", "@id":"3717608", "info":{"authors":{"author":[{"@pid":"119/4016-3","text":"Peng Qin 0003"},{"@pid":"79/292-2","text":"Bin Dai 0002"},{"@pid":"81/2320","text":"Benxiong Huang"},{"@pid":"22/4479","text":"Guan Xu"},{"@pid":"w/KuiWu","text":"Kui Wu 0001"}]},"title":"A Survey on Network Tomography With Network Coding.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1981-1995","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/QinDHXW14","doi":"10.1109/COMST.2014.2320096","ee":"https://doi.org/10.1109/COMST.2014.2320096","url":"https://dblp.org/rec/journals/comsur/QinDHXW14"}, "url":"URL#3717608" }, { "@score":"1", "@id":"3717609", "info":{"authors":{"author":[{"@pid":"68/2208","text":"Hamed Mohsenian Rad"},{"@pid":"39/4893","text":"Fabrizio Granelli"},{"@pid":"20/6179-1","text":"Kui Ren 0001"},{"@pid":"74/1846","text":"Chris Develder"},{"@pid":"98/5441-1","text":"Lijun Chen 0001"},{"@pid":"j/TaoJiang-2","text":"Tao Jiang 0002"},{"@pid":"l/XueLiu","text":"Xue Liu 0001"}]},"title":"Editorial: IEEE Communications Surveys & TutorialsSpecial Section on Energy and Smart Grid.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1687-1688","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/RadGRDCJL14","doi":"10.1109/SURV.2014.042914.00001","ee":"https://doi.org/10.1109/SURV.2014.042914.00001","url":"https://dblp.org/rec/journals/comsur/RadGRDCJL14"}, "url":"URL#3717609" }, { "@score":"1", "@id":"3717610", "info":{"authors":{"author":[{"@pid":"25/6358","text":"Ashikur Rahman"},{"@pid":"l/XueLiu","text":"Xue Liu 0001"},{"@pid":"32/8375","text":"Fanxin Kong"}]},"title":"A Survey on Geographic Load Balancing Based Data Center Power Management in the Smart Grid Environment.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"214-233","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/RahmanLK14","doi":"10.1109/SURV.2013.070813.00183","ee":"https://doi.org/10.1109/SURV.2013.070813.00183","url":"https://dblp.org/rec/journals/comsur/RahmanLK14"}, "url":"URL#3717610" }, { "@score":"1", "@id":"3717611", "info":{"authors":{"author":[{"@pid":"40/11298","text":"Jaya B. Rao"},{"@pid":"f/AOFapojuwo","text":"Abraham O. Fapojuwo"}]},"title":"A Survey of Energy Efficient Resource Management Techniques for Multicell Cellular Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"154-180","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/RaoF14","doi":"10.1109/SURV.2013.042313.00226","ee":"https://doi.org/10.1109/SURV.2013.042313.00226","url":"https://dblp.org/rec/journals/comsur/RaoF14"}, "url":"URL#3717611" }, { "@score":"1", "@id":"3717612", "info":{"authors":{"author":[{"@pid":"167/5151","text":"Admar Ajith Kumar Somappa"},{"@pid":"74/6402","text":"Knut Øvsthus"},{"@pid":"34/5592","text":"Lars Michael Kristensen"}]},"title":"An Industrial Perspective on Wireless Sensor Networks - A Survey of Requirements, Protocols, and Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1391-1412","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/SOK14","doi":"10.1109/SURV.2014.012114.00058","ee":"https://doi.org/10.1109/SURV.2014.012114.00058","url":"https://dblp.org/rec/journals/comsur/SOK14"}, "url":"URL#3717612" }, { "@score":"1", "@id":"3717613", "info":{"authors":{"author":[{"@pid":"31/10585","text":"Alphan Sahin"},{"@pid":"80/6756","text":"Ismail Güvenç"},{"@pid":"67/1416","text":"Hüseyin Arslan"}]},"title":"A Survey on Multicarrier Communications: Prototype Filters, Lattice Structures, and Implementation Aspects.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1312-1338","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/SahinGA14","doi":"10.1109/SURV.2013.121213.00263","ee":"https://doi.org/10.1109/SURV.2013.121213.00263","url":"https://dblp.org/rec/journals/comsur/SahinGA14"}, "url":"URL#3717613" }, { "@score":"1", "@id":"3717614", "info":{"authors":{"author":[{"@pid":"33/11470","text":"Zohreh Sanaei"},{"@pid":"98/11471","text":"Saeid Abolfazli"},{"@pid":"12/989","text":"Abdullah Gani"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"369-392","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/SanaeiAGB14","doi":"10.1109/SURV.2013.050113.00090","ee":"https://doi.org/10.1109/SURV.2013.050113.00090","url":"https://dblp.org/rec/journals/comsur/SanaeiAGB14"}, "url":"URL#3717614" }, { "@score":"1", "@id":"3717615", "info":{"authors":{"author":[{"@pid":"51/7861","text":"Charalambos Sergiou"},{"@pid":"22/6627","text":"Pavlos Antoniou"},{"@pid":"98/5749","text":"Vasos Vassiliou"}]},"title":"A Comprehensive Survey of Congestion Control Protocols in Wireless Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"4","pages":"1839-1859","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/SergiouAV14","doi":"10.1109/COMST.2014.2320071","ee":"https://doi.org/10.1109/COMST.2014.2320071","url":"https://dblp.org/rec/journals/comsur/SergiouAV14"}, "url":"URL#3717615" }, { "@score":"1", "@id":"3717616", "info":{"authors":{"author":[{"@pid":"83/10747","text":"Huaizhou Shi"},{"@pid":"01/6745","text":"R. Venkatesha Prasad"},{"@pid":"95/259","text":"Ertan Onur"},{"@pid":"23/3922","text":"Ignas G. Niemegeers"}]},"title":"Fairness in Wireless Networks: Issues, Measures and Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"5-24","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ShiPON14","doi":"10.1109/SURV.2013.050113.00015","ee":"https://doi.org/10.1109/SURV.2013.050113.00015","url":"https://dblp.org/rec/journals/comsur/ShiPON14"}, "url":"URL#3717616" }, { "@score":"1", "@id":"3717617", "info":{"authors":{"author":[{"@pid":"123/3375","text":"Bambang Soelistijanto"},{"@pid":"86/2404","text":"Michael P. Howarth"}]},"title":"Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"538-555","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/SoelistijantoH14","doi":"10.1109/SURV.2013.052213.00088","ee":"https://doi.org/10.1109/SURV.2013.052213.00088","url":"https://dblp.org/rec/journals/comsur/SoelistijantoH14"}, "url":"URL#3717617" }, { "@score":"1", "@id":"3717618", "info":{"authors":{"author":[{"@pid":"56/9730","text":"Guillermo Suarez-Tangil"},{"@pid":"98/3527","text":"Juan E. Tapiador"},{"@pid":"56/2713","text":"Pedro Peris-Lopez"},{"@pid":"r/ArturoRibagorda","text":"Arturo Ribagorda"}]},"title":"Evolution, Detection and Analysis of Malware for Smart Devices.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"961-987","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/Suarez-TangilTPR14","doi":"10.1109/SURV.2013.101613.00077","ee":"https://doi.org/10.1109/SURV.2013.101613.00077","url":"https://dblp.org/rec/journals/comsur/Suarez-TangilTPR14"}, "url":"URL#3717618" }, { "@score":"1", "@id":"3717619", "info":{"authors":{"author":[{"@pid":"09/5042","text":"Wei Sun"},{"@pid":"59/5806-2","text":"Zheng Yang 0002"},{"@pid":"50/7645","text":"Xinglin Zhang"},{"@pid":"27/2403","text":"Yunhao Liu 0001"}]},"title":"Energy-Efficient Neighbor Discovery in Mobile Ad Hoc and Wireless Sensor Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1448-1459","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/SunYZL14","doi":"10.1109/SURV.2013.012414.00164","ee":"https://doi.org/10.1109/SURV.2013.012414.00164","url":"https://dblp.org/rec/journals/comsur/SunYZL14"}, "url":"URL#3717619" }, { "@score":"1", "@id":"3717620", "info":{"authors":{"author":[{"@pid":"70/8015","text":"Mathieu Tahon"},{"@pid":"88/2292","text":"Sofie Verbrugge"},{"@pid":"143/1815","text":"Peter J. Willis"},{"@pid":"59/144","text":"Paul Botham"},{"@pid":"78/6705","text":"Didier Colle"},{"@pid":"47/6293","text":"Mario Pickavet"},{"@pid":"d/PietDemeester","text":"Piet Demeester"}]},"title":"Real Options in Telecom Infrastructure Projects - A Tutorial.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"1157-1173","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/TahonVWBCPD14","doi":"10.1109/SURV.2013.062613.00126","ee":"https://doi.org/10.1109/SURV.2013.062613.00126","url":"https://dblp.org/rec/journals/comsur/TahonVWBCPD14"}, "url":"URL#3717620" }, { "@score":"1", "@id":"3717621", "info":{"authors":{"author":[{"@pid":"37/9979","text":"Christina Thorpe"},{"@pid":"56/753-1","text":"Liam Murphy 0001"}]},"title":"A Survey of Adaptive Carrier Sensing Mechanisms for IEEE 802.11 Wireless Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1266-1293","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ThorpeM14","doi":"10.1109/SURV.2014.031814.00177","ee":"https://doi.org/10.1109/SURV.2014.031814.00177","url":"https://dblp.org/rec/journals/comsur/ThorpeM14"}, "url":"URL#3717621" }, { "@score":"1", "@id":"3717622", "info":{"authors":{"author":[{"@pid":"19/6769","text":"Chun-Wei Tsai"},{"@pid":"70/2368","text":"Chin-Feng Lai"},{"@pid":"56/3982","text":"Ming-Chao Chiang"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"}]},"title":"Data Mining for Internet of Things: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"77-97","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/TsaiLCY14","doi":"10.1109/SURV.2013.103013.00206","ee":"https://doi.org/10.1109/SURV.2013.103013.00206","url":"https://dblp.org/rec/journals/comsur/TsaiLCY14"}, "url":"URL#3717622" }, { "@score":"1", "@id":"3717623", "info":{"authors":{"author":[{"@pid":"136/7932","text":"Can Tunca"},{"@pid":"69/2933","text":"Sinan Isik"},{"@pid":"06/5341","text":"Mehmet Yunus Donmez"},{"@pid":"99/6193","text":"Cem Ersoy"}]},"title":"Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"877-897","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/TuncaIDE14","doi":"10.1109/SURV.2013.100113.00293","ee":"https://doi.org/10.1109/SURV.2013.100113.00293","url":"https://dblp.org/rec/journals/comsur/TuncaIDE14"}, "url":"URL#3717623" }, { "@score":"1", "@id":"3717624", "info":{"authors":{"author":[{"@pid":"141/1163","text":"Raza Umar"},{"@pid":"92/2711","text":"Asrar U. H. Sheikh"},{"@pid":"d/MohamedDeriche","text":"Mohamed A. Deriche"}]},"title":"Unveiling the Hidden Assumptions of Energy Detector Based Spectrum Sensing for Cognitive Radios.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"713-728","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/UmarSD14","doi":"10.1109/SURV.2013.081313.00054","ee":"https://doi.org/10.1109/SURV.2013.081313.00054","url":"https://dblp.org/rec/journals/comsur/UmarSD14"}, "url":"URL#3717624" }, { "@score":"1", "@id":"3717625", "info":{"authors":{"author":[{"@pid":"52/8144","text":"Berta Carballido Villaverde"},{"@pid":"41/1181","text":"Rodolfo de Paz Alberola"},{"@pid":"78/7047","text":"Antonio J. Jara"},{"@pid":"13/1806","text":"Szymon Fedor"},{"@pid":"d/SajalKDas","text":"Sajal K. Das 0001"},{"@pid":"25/1850","text":"Dirk Pesch"}]},"title":"Service Discovery Protocols for Constrained Machine-to-Machine Communications.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"41-60","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/VillaverdeAJFDP14","doi":"10.1109/SURV.2013.102213.00229","ee":"https://doi.org/10.1109/SURV.2013.102213.00229","url":"https://dblp.org/rec/journals/comsur/VillaverdeAJFDP14"}, "url":"URL#3717625" }, { "@score":"1", "@id":"3717626", "info":{"authors":{"author":[{"@pid":"58/6810-24","text":"Li Wang 0024"},{"@pid":"53/2189-11","text":"Li Li 0011"},{"@pid":"79/1442-5","text":"Chao Xu 0005"},{"@pid":"70/8512","text":"Dandan Liang"},{"@pid":"25/6170","text":"Soon Xin Ng"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Multiple-Symbol Joint Signal Processing for Differentially Encoded Single- and Multi-Carrier Communications: Principles, Designs and Applications.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"689-712","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/WangLXLNH14","doi":"10.1109/SURV.2013.081313.00218","ee":"https://doi.org/10.1109/SURV.2013.081313.00218","url":"https://dblp.org/rec/journals/comsur/WangLXLNH14"}, "url":"URL#3717626" }, { "@score":"1", "@id":"3717627", "info":{"authors":{"author":[{"@pid":"60/8402","text":"Yini Wang"},{"@pid":"41/3095","text":"Sheng Wen"},{"@pid":"50/2192-1","text":"Yang Xiang 0001"},{"@pid":"92/2939","text":"Wanlei Zhou 0001"}]},"title":"Modeling the Propagation of Worms in Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"942-960","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/WangWXZ14","doi":"10.1109/SURV.2013.100913.00195","ee":"https://doi.org/10.1109/SURV.2013.100913.00195","url":"https://dblp.org/rec/journals/comsur/WangWXZ14"}, "url":"URL#3717627" }, { "@score":"1", "@id":"3717628", "info":{"authors":{"author":[{"@pid":"21/10364","text":"Kaimin Wei"},{"@pid":"06/4676-4","text":"Xiao Liang 0004"},{"@pid":"x/KeXu","text":"Ke Xu 0001"}]},"title":"A Survey of Social-Aware Routing Protocols in Delay Tolerant Networks: Applications, Taxonomy and Design-Related Issues.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"556-578","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/WeiLX14","doi":"10.1109/SURV.2013.042313.00103","ee":"https://doi.org/10.1109/SURV.2013.042313.00103","url":"https://dblp.org/rec/journals/comsur/WeiLX14"}, "url":"URL#3717628" }, { "@score":"1", "@id":"3717629", "info":{"authors":{"author":[{"@pid":"36/10100","text":"Dionysis Xenakis"},{"@pid":"21/4930","text":"Nikos I. Passas"},{"@pid":"49/5843","text":"Lazaros F. Merakos"},{"@pid":"18/466","text":"Christos V. Verikoukis"}]},"title":"Mobility Management for Femtocells in LTE-Advanced: Key Aspects and Survey of Handover Decision Algorithms.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"64-91","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/XenakisPMV14","doi":"10.1109/SURV.2013.060313.00152","ee":"https://doi.org/10.1109/SURV.2013.060313.00152","url":"https://dblp.org/rec/journals/comsur/XenakisPMV14"}, "url":"URL#3717629" }, { "@score":"1", "@id":"3717630", "info":{"authors":{"author":[{"@pid":"147/7669","text":"Junfei Xie"},{"@pid":"09/3733-1","text":"Yan Wan 0001"},{"@pid":"07/6647","text":"Jae H. Kim"},{"@pid":"65/3633","text":"Shengli Fu"},{"@pid":"04/5985","text":"Kamesh Namuduri"}]},"title":"A Survey and Analysis of Mobility Models for Airborne Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1221-1238","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/XieWKFN14","doi":"10.1109/SURV.2013.111313.00138","ee":"https://doi.org/10.1109/SURV.2013.111313.00138","url":"https://dblp.org/rec/journals/comsur/XieWKFN14"}, "url":"URL#3717630" }, { "@score":"1", "@id":"3717631", "info":{"authors":{"author":[{"@pid":"70/1741-4","text":"Lei Xie 0004"},{"@pid":"04/934","text":"Yafeng Yin"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"},{"@pid":"24/3318","text":"Sanglu Lu"}]},"title":"Managing RFID Data: Challenges, Opportunities and Solutions.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"3","pages":"1294-1311","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/XieYVL14","doi":"10.1109/SURV.2014.022614.00143","ee":"https://doi.org/10.1109/SURV.2014.022614.00143","url":"https://dblp.org/rec/journals/comsur/XieYVL14"}, "url":"URL#3717631" }, { "@score":"1", "@id":"3717632", "info":{"authors":{"author":[{"@pid":"51/308","text":"George Xylomenos"},{"@pid":"09/3162","text":"Christopher N. Ververidis"},{"@pid":"78/1518","text":"Vasilios A. Siris"},{"@pid":"02/8484","text":"Nikos Fotiou"},{"@pid":"05/6626","text":"Christos Tsilopoulos"},{"@pid":"80/6422","text":"Xenofon Vasilakos"},{"@pid":"89/1954","text":"Konstantinos V. Katsaros"},{"@pid":"p/GCPolyzos","text":"George C. Polyzos"}]},"title":"A Survey of Information-Centric Networking Research.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"2","pages":"1024-1049","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/XylomenosVSFTVKP14","doi":"10.1109/SURV.2013.070813.00063","ee":"https://doi.org/10.1109/SURV.2013.070813.00063","url":"https://dblp.org/rec/journals/comsur/XylomenosVSFTVKP14"}, "url":"URL#3717632" }, { "@score":"1", "@id":"3717633", "info":{"authors":{"author":[{"@pid":"52/727","text":"Moustafa Youssef 0001"},{"@pid":"80/6266","text":"Mohamed Ibrahim"},{"@pid":"10/7255","text":"Mohamed Abdel Latif"},{"@pid":"13/3479-2","text":"Lin Chen 0002"},{"@pid":"40/4747","text":"Athanasios V. Vasilakos"}]},"title":"Routing Metrics of Cognitive Radio Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"92-109","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/YoussefILCV14","doi":"10.1109/SURV.2013.082713.00184","ee":"https://doi.org/10.1109/SURV.2013.082713.00184","url":"https://dblp.org/rec/journals/comsur/YoussefILCV14"}, "url":"URL#3717633" }, { "@score":"1", "@id":"3717634", "info":{"authors":{"author":[{"@pid":"04/3348-8","text":"Yan Zhang 0008"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"On Protocol-Independent Data Redundancy Elimination.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"455-472","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ZhangA14","doi":"10.1109/SURV.2013.052213.00186","ee":"https://doi.org/10.1109/SURV.2013.052213.00186","url":"https://dblp.org/rec/journals/comsur/ZhangA14"}, "url":"URL#3717634" }, { "@score":"1", "@id":"3717635", "info":{"authors":{"author":[{"@pid":"12/4711","text":"Zhongshan Zhang"},{"@pid":"53/6133","text":"Keping Long"},{"@pid":"21/1550-1","text":"Jianping Wang 0001"},{"@pid":"d/FalkoDressler","text":"Falko Dressler"}]},"title":"On Swarm Intelligence Inspired Self-Organized Networking: Its Bionic Mechanisms, Designing Principles and Optimization Approaches.","venue":"IEEE Commun. Surv. Tutorials","volume":"16","number":"1","pages":"513-537","year":"2014","type":"Journal Articles","access":"closed","key":"journals/comsur/ZhangLWD14","doi":"10.1109/SURV.2013.062613.00014","ee":"https://doi.org/10.1109/SURV.2013.062613.00014","url":"https://dblp.org/rec/journals/comsur/ZhangLWD14"}, "url":"URL#3717635" } ] } } } )