Abstract is missing.
- Contention-Aware Data Caching in Wireless Multi-hop Ad Hoc NetworksXiaopeng Fan, Jiannong Cao, Weigang Wu. 1-9 [doi]
- Hierarchical Distributed Data Classification in Wireless Sensor NetworksXu Cheng, Ji Xu, Jian Pei, Jiangchuan Liu. 10-19 [doi]
- Cooperative download in urban vehicular networksMarco Fiore, José M. Barceló-Ordinas. 20-29 [doi]
- On Accuracy of Region-based Localization Algorithms for Wireless Sensor NetworksShi-Geng Zhang, Jiannong Cao, Lijun Chen 0006, Daoxu Chen. 30-39 [doi]
- Ratio-based Zero-profiling Indoor LocalizationXiaoyan Li. 40-49 [doi]
- Surviving Holes and Barriers in Geographic Data Reporting for Wireless Sensor NetworksYangfan Zhou, Michael R. Lyu, Jiangchuan Liu. 50-59 [doi]
- A Mobility and Congestion Resilient Data Management System for Mobile Distributed NetworksZe Li, Haiying Shen. 60-69 [doi]
- Throughput Capacity of Mobility-assisted Data Collection in Wireless Sensor NetworksWang Liu, Jianping Wang, Guoliang Xing, Liusheng Huang. 70-79 [doi]
- Mobile Relay Configuration in Data-intensive Wireless Sensor NetworksFatmé El-Moukaddem, Eric Torng, Guoliang Xing, Sandeep Kulkarni. 80-89 [doi]
- Who, When, Where: Timeslot Assignment to Mobile ClientsFangfei Chen, Matthew P. Johnson, Yosef Alayev, Amotz Bar-Noy, Tom La Porta. 90-99 [doi]
- A Multi-Rate Based Router Placement Scheme for Wireless Mesh NetworksJunfang Wang, Kan Cai, Dharma P. Agrawal. 100-109 [doi]
- Molecular MAC for Multichannel Wireless Mesh NetworksMohammad Nassiri, Fabrice Theoleyre, Martin Heusse, Andrzej Duda. 110-119 [doi]
- Almost Optimal Distributed M2M Multicasting in Wireless Mesh NetworksQin Xin, Fredrik Manne, Yan Zhang, Jianping Wang, Zeyu Zheng. 120-129 [doi]
- A Generalized Markov Chain Model For Effective Analysis of Slotted IEEE 802.15.4Pan Gun Park, Piergiuseppe Di Marco, Pablo Soldati, Carlo Fischione, Karl Henrik Johansson. 130-139 [doi]
- Scalable Emulation of TinyOS Applications in Heterogeneous Network ScenariosYi-Tao Wang, Rajive Bagrodia. 140-149 [doi]
- A MAC Protocol For Real-Time Sensing Applications Using Asymmetric TranceiversRaghuram S. Sudhaakar, Chunming Qiao, Seokhoon Yoon, Jia Zhao. 150-159 [doi]
- Reprogramming with Minimal Transferred Data on Wireless Sensor NetworkJingtong Hu, Chun Xue, Yi He, Edwin Hsing-Mean Sha. 160-167 [doi]
- Erasure-Coding Based Utility Routing in Multi-hop Wireless NetworksMingming Lu, Jie Wu. 168-177 [doi]
- On Interest Locality in Content-Based Routing for Large-scale MANETsYang Zhang, Jing Zhao, Guohong Cao, Chita R. Das. 178-187 [doi]
- Scalable Integrated Routing Using Prefix Labels and Distributed Hash Tables for MANETsDhananjay Sampath, J. J. Garcia-Luna-Aceves. 188-198 [doi]
- PaMeLA: A Joint Channel Assignment and Routing Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks with Grid TopologyClaudio Cicconetti, Vanessa Gardellin, Luciano Lenzini, Enzo Mingozzi. 199-207 [doi]
- Level the Buffer Wall: Fair Channel Assignment in Wireless Sensor NetworksYanyan Yang, Yunhuai Liu, Lionel M. Ni. 208-216 [doi]
- Adaptive and Distributed Scheduling in Heterogeneous MIMO-based Ad hoc NetworksShan Chu, Xin Wang. 217-226 [doi]
- Packet Scheduling with Joint Design of MIMO and Network CodingMiao Zhao, Yuanyuan Yang. 227-236 [doi]
- How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor NetworksBo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen. 237-245 [doi]
- Enlighten Me! Secure Key Assignment in Wireless Sensor NetworksMatthias Gauger, Olga Saukh, Pedro José Marrón. 246-255 [doi]
- Secure Autoconfiguration and Public-key Distribution for Mobile Ad-hoc NetworksHongbo Zhou, Matt W. Mutka, Lionel M. Ni. 256-263 [doi]
- ChainFarm: A Novel Authentication Protocol for High-rate Any Source Probabilistic BroadcastYing Huang, Wenbo He, Klara Nahrstedt. 264-273 [doi]
- Multicast Capacity of Multihop Cognitive NetworksCheng Wang, ShaoJie Tang, Xiang-Yang Li, Changjun Jiang. 274-283 [doi]
- Minimum Maintenance Cost Routing in Cognitive Radio NetworksIlario Filippini, Eylem Ekici, Matteo Cesana. 284-293 [doi]
- Joint QoS-aware Admission Control, Channel Assignment, and Power Allocation for Cognitive Radio Cellular NetworksQin Xin, Jie Xiang. 294-303 [doi]
- Cog Gap: A Cognitive and Opportunistic Gateway Access Algorithm in Wireless Mesh NetworksPanlong Yang. 304-312
- Intrusion Detection in Gaussian Distributed Wireless Sensor NetworksYun Wang, Weihuang Fu, Dharma P. Agrawal. 313-321 [doi]
- Measuring location privacy in V2X communication systems with accumulated informationZhendong Ma, Frank Kargl, Michael Weber. 322-331 [doi]
- Providing Source Privacy in Mobile Ad Hoc NetworksJian Ren, Yun Li, Tongtong Li. 332-341 [doi]
- Multigrade Security Monitoring for Ad-Hoc Wireless NetworksMatthew Tan Creti, Matthew Beaman, Saurabh Bagchi, Zhiyuan Li, Yung-Hsiang Lu. 342-352 [doi]
- Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference ModelXiang-Yang Li, XiaoHua Xu, ShiGuang Wang, ShaoJie Tang, Guojun Dai, Jizhong Zhao, Yong Qi. 353-362 [doi]
- Multi-Channel Scheduling Algorithms for Fast Aggregated Convergecast in Sensor NetworksAmitabha Ghosh, Özlem Durmaz Incel, Bhaskar Krishnamachari, Anil Vullikanti. 363-372 [doi]
- Bounded Relay Hop Mobile Data Gathering in Wireless Sensor NetworksMiao Zhao, Yuanyuan Yang. 373-382 [doi]
- Energy-efficient On-demand Active Contour Service for Sensor NetworksYangfan Zhou, Junjie Xiong, Michael R. Lyu, Jiangchuan Liu, Kam-Wing Ng. 383-392 [doi]
- Cross-layer Approach for Energy Efficient Routing in WANETsKhoriba Ghada, Jie Li, Yusheng Ji, Guojun Wang. 393-402 [doi]
- An Analytical Study of Subdividing Hexagon-Clustered WSN for Power SavingDajin Wang. 403-412 [doi]
- Message Forwarding in Cyclic MobiSpace: the Multi-copy CaseCong Liu, Jie Wu, Ionut Cardei. 413-422 [doi]
- Probabilistic Estimation of End-to-End Path Latency in Wireless Sensor NetworksRamon Serna Oliver, Gerhard Fohler. 423-431 [doi]
- Probabilistic-based Message Dissemination in Ad-Hoc and Sensor Networks using Directional AntennasXueli An, Ramin Hekmat. 432-438 [doi]
- Cooperation Helps Power SavingGuanfeng Liang, Nitin H. Vaidya. 439-447 [doi]
- An Improved Lightweight Synchronisation Primitive For SensornetsJonathan Tate, Iain Bate. 448-457 [doi]
- TPSS: A Two-phase Sleep Scheduling Protocol for Object Tracking in Wireless Sensor NetworksQianqian Ren, Jianzhong Li, Hong Gao. 458-465 [doi]
- Focused-Coverage by Mobile Sensor NetworksXu Li, Hannes Frey, Nicola Santoro, Ivan Stojmenovic. 466-475 [doi]
- Directed Coverage in Wireless Sensor Networks: Concept and QualityXiaole Bai, Lei Ding, Jin Teng, Changqing Xu, Dong Xuan. 476-485 [doi]
- Target Coverage Problem in Wireless Sensor Networks: A Column Generation Based ApproachYu Gu, Jie Li, Baohua Zhao, Yusheng Ji. 486-495 [doi]
- Performance Analysis of Stochastic Network Coverage with Limited MobilityChris Yu-Tak Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao, Jiming Chen. 496-505 [doi]
- Reliable Multicast in Wireless Networks Using Network CodingCheng Zhan, Yinlong Xu, Jianping Wang, Victor C. S. Lee. 506-515 [doi]
- Interference and Power Constrained Broadcasting and Multicasting in Wireless Ad Hoc Networks with Directional AntennasZheng Li, Deying Li. 516-525 [doi]
- Fast Group Communications in Multihop Wireless Networks Subject to Physical InterferencePeng-Jun Wan, Lixin Wang, Ophir Frieder. 526-533 [doi]
- OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable LinksMing Li, Wenjing Lou, Kai Zeng. 534-543 [doi]
- FOCUS: A Cost-Effective Approach for Large-Scale Crop Monitoring with Sensor NetworksYuan Yuan, Shanshan Li, Kui Wu, Weijia Jia, Yuxing Peng. 544-553 [doi]
- Dynamic Linking and Loading in Networked Embedded SystemsWei Dong, Chun Chen, Xue Liu, Jiajun Bu, Yunhao Liu. 554-562 [doi]
- DMRC: Distortion-Minimizing Rate Control for Wireless Multimedia Sensor NetworksScott Pudlewski, Tommaso Melodia. 563-572 [doi]
- On the Minimum Number of Neighbours for Good Routing Performance in MANETsOday Jerew, Haley M. Jones, Kim L. Blackmore. 573-582 [doi]
- OWL: Towards Scalable Routing in MANETs Using Depth-First Search On DemandStephen Dabideen, J. J. Garcia-Luna-Aceves. 583-592 [doi]
- BDP: A Bloom Filters Based Dissemination Protocol in Wireless Sensor NetworksTao Chen, Deke Guo, Xue Liu, Honghui Chen, Xueshan Luo, Junxian Liu. 593-602 [doi]
- Two Ray or not Two Ray this is the price to payEugenio Giordano, Raphael Frank, Abhishek Ghosh, Giovanni Pau, Mario Gerla. 603-608 [doi]
- Ticket-based Reliable Routing in VANETGongjun Yan, Danda B. Rawat, Samy El-Tawab. 609-614 [doi]
- Analysis of Aggregated Power Level and Rate-Power Control Designs for Status Update Messages in VANETsChing-Ling Huang, Yaser Pourmohammadi Fallah, Raja Sengupta. 615-620 [doi]
- RF-GPS: RFID Assisted Localization in VANETsEun-Kyu Lee, Sungwon Yang, Soon-Young Oh, Mario Gerla. 621-626 [doi]
- Real-Time Weather Notification System using Intelligent Vehicles and Smart SensorsSamy El-Tawab, Mahmoud Abuelela, Gongjun Yan. 627-632 [doi]
- LICP: A Look-ahead Intersection Control Policy with Intelligent VehiclesHongyu Huang, Minjie Zhu, Minglu Li, Xu Li, Min-You Wu, Linghe Kong. 633-638 [doi]
- Design & Implementation of IEEE 802.11s Mesh Nodes with Enhanced FeaturesPranjal Pandey, Sethuraman Satish, Joy Kuri, Haresh Dagale. 639-644 [doi]
- Achieving Fairness in Lossy 802.11e Wireless Multi-Hop Mesh NetworksQizhi Cao, Tianji Li, Douglas J. Leith. 645-650 [doi]
- Starvation Effect Study in IEEE 802.11 Mesh NetworksAndrey Lyakhov, Ivan Pustogarov, Alexander Safonov, Mikhail Yakimov. 651-656 [doi]
- Evaluation of a Potential Energy Methodology for Joint Routing and Scheduling in Wireless Mesh NetworksLeonardo Badia. 657-662 [doi]
- Route Selection for Capacity Maximization in Multi-Rate TDMA-based Wireless Ad Hoc NetworksRaffaele Bruno, Vania Conan, Stéphane Rousseau. 663-669 [doi]
- Optimal Forwarder List Selection in Opportunistic RoutingYanhua Li, Wei Chen, Zhi-Li Zhang. 670-675 [doi]
- Multicast Routing and Channel Assignment in Wireless Mesh NetworksChia-Sheng Chou, Chien Chen, Ying-Yu Chen, Rong-Hong Jan, Cheng-Chung Hsieh. 676-681 [doi]
- Performance Evaluation of a WiMAX Multi-Hop Relay System to Support Multicast/Broadcast ServiceChengxuan He, Oliver Yang, Guo Qiang Wang. 682-687 [doi]
- Quality-Aware Multiple Backbone Construction on Multi-interface Wireless Mesh Networks for P2P StreamingTzu-Chieh Tsai. 688-693 [doi]
- Detecting Privacy Infractions in Applications: A Framework and MethodologyMichael Smit, Kelly A. Lyons, Michael McAllister, Jacob Slonim. 694-701 [doi]
- Extended Attribute Based Encryption for Private Information RetrievalYinan Shan, Zhenfu Cao. 702-707 [doi]
- A Fuzzy Comprehensive Evaluation Model for Harms of Computer VirusCong Zheng, Lansheng Han, Jihang Ye, Mengsong Zou, Qiwen Liu. 708-713 [doi]
- A Study on Read-Write Protection of a Digital Document by Cryptographic TechniquesYasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko. 714-721 [doi]
- Security Considerations on Pervasive Real-time CollaborationFuwen Liu, Hartmut König. 722-727 [doi]
- A Strategy-proof Trust Mechanism for Pervasive Computing EnvironmentsZhiqiang Wei, Wei Zhou, Mijun Kang, Michael Collins, Paddy Nixon. 728-731 [doi]
- Computational Model for Trust Management in RFID Supply ChainsManmeet Mahinderjit Singh, Xue Li. 734-740 [doi]
- A New High-Performance Approach for Offline Replacement Attack Prevention in Trusted ClientsHossein Rezaei Ghaleh, Siavash Khorsandi. 741-746 [doi]
- A-Kad: an anonymous P2P protocol based on Kad networkYongQing Ni, DaeHun Nyang, Xu Wang. 747-752 [doi]
- Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh NetworksAnoosha Prathapani, Lakshmi Santhanam, Dharma P. Agrawal. 753-758 [doi]
- A Directed Acyclic Graph based Detection for RBAC Based SecureXiyuan Chen, Miaoliang Zhu. 759-764 [doi]
- RPROB - A Family of Binomial-Mix-based Anonymous Communication SystemsMinh-Triet Tran, Anh Duc Duong, Isao Echizen. 765-770 [doi]
- Towards Neutral Trust Management Framework in Unstructured NetworksRuidong Li, Jie Li. 771-776 [doi]
- Strong authentication with mobile phone as security tokenDo Van Thanh, Ivar Jørstad, Tore E. Jønvik, Do van Thuan. 777-782 [doi]
- Operating System Mechanisms for TPM-Based Lifetime Measurement of Process IntegrityXiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan. 783-789 [doi]
- Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo MethodLina Wang, Yuntao Yue, Chi Guo, Xiaoying Zhang. 790-795 [doi]
- Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over TimeJianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård. 796-803 [doi]
- An Efficient Geographic Location-based Security Mechanism for Vehicular Adhoc NetworksGongjun Yan, Stephan Olariu. 804-809 [doi]
- Adaptive Security and Trust Management for Autonomic Message-Oriented MiddlewareHabtamu Abie. 810-817 [doi]
- Strengthening Class1 Gen2 RFID TagsJihoon Cho. 818-824 [doi]
- Improving the Reliability of Embedded Systems with Cache and SPMMeng Wang, Yi Wang, Duo Liu, Zili Shao. 825-830 [doi]
- A Heuristic Policy-based System Call Interposition in Dynamic Binary TranslationDeen Zheng, Zhengwei Qi, Alei Liang, Hongbo Yang, Haibing Guan, Liang Liu. 831-835 [doi]
- Pervasive Service Access with SIM-based VPNDo Van Thanh, Ivar Jørstad, Tor Anders Johansen, Elias Bakken, Do van Thuan. 836-841 [doi]
- QoS-aware Optimization Strategy for Security Ranking in SSL ProtocolFang Qi, Zhe Tang, Guojun Wang, Jie Wu. 842-847 [doi]
- CENDA-Camouflage Event Based Malicious Node Detection ArchitectureKanthakumar Pongaliur, Li Xiao, Alex X. Liu. 848-855 [doi]
- A Low-Frequency RFID to Challenge Security and Privacy ConcernsMohammed Benaissa, Tim Good. 856-863 [doi]
- Secure localization and location verification in wireless sensor networksYingpei Zeng, Jiannong Cao, Jue Hong, Li Xie. 864-869 [doi]
- Distributed Lightweight Target Tracking for Wireless Sensor NetworksSheng Wang, Xue Wang, Yong Wang, Xinyao Sun. 870-875 [doi]
- RRDD: Receiver-oriented Robust Data Delivery in Mobile Sensor NetworksWeiwei Fang, Xin Zhao, Tianshu Chu, Yuan An, Yi Liu, Depei Qian. 876-881 [doi]
- A new broadcast-Key Management Scheme for Distributed Wireless Sensor NetworksYingZhi Zeng, Xia Yan, Jinshu Su. 882-887 [doi]
- A Price-based Adaptive Task Allocation for Wireless Sensor NetworkNeda Edalat, Wendong Xiao, Chen-Khong Tham, Ehsan Keikha, Lee-Ling Ong. 888-893 [doi]
- Anti-Sensornet: Intruders and CountermeasuresMin-You Wu. 894-899 [doi]
- Practical Location-based Routing Protocol in Vehicular Ad Hoc NetworksZhi Li, Yanmin Zhu, Minglu Li. 900-905 [doi]
- EUCOW: Energy-Efficient Boundary Monitoring for Unsmoothed Continuous Objects in Wireless Sensor NetworkJiehui Chen, Mitsuji Matsumoto. 906-911 [doi]
- On Efficient Deployment of High-end Sensors in Large-scale Heterogeneous WSNsYi Gu, Qishi Wu, Xiaoshan Cai, Jeremy Bond. 912-917 [doi]
- UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor NetworkLi Zhengbao, Zhongwen Guo, Haipeng Qu, Feng Hong, Pengpeng Chen, Meng Yang. 918-923 [doi]
- A High-Accuracy Real-Time Localization Algorithm for Wireless Sensor NetworksWen Ouyang, Ying Tsao. 924-928 [doi]
- A Cross-Layer Design for Dynamic Resource Block Allocation in 3G Long Term Evolution SystemHossam Fattah, Hussein M. Alnuweiri. 929-934 [doi]
- An Enhanced Query Tree Protocol for RFID Tag Collision Resolution with Progressive Population EstimationXinqing Yan. 935-940 [doi]
- On Channel Usability of Wireless Mesh Networks -- When Stability Plays With YouPanlong Yang. 941-946 [doi]
- Throughput and Delay Analysis of the IEEE 802.15.3 CSMA/CA MechanismXin Liu, Wenjun Zeng. 947-952 [doi]
- A Note on the Study of Bluetooth Networks Distributed AlgorithmsAhmed Jeddah, Nejib Zaguia, Guy-Vincent Jourdan. 953-958 [doi]
- An Enhanced Synchronization Approach for RFID Private AuthenticationQingsong Yao, Yong Qi, Jizhong Zhao, Jinsong Han. 959-964 [doi]
- A kNN Search Protocol Using a Voronoi Diagram in Wireless Broadcast EnvironmentsChuan-Ming Liu. 965-970 [doi]
- A Proportional Fair Backoff Scheme for Wireless Sensor NetworksYuanfang Chen, MingChu Li, Lei Wang, Lei Shu. 971-976 [doi]
- Delay and Energy Efficiency Tradeoffs for Data Collections in Large Scale Wireless Sensor NetworksChao Ren, Xufei Mao, Li Zhanhuai. 977-982 [doi]
- A Force-Driven Evolutionary Approach for Multi-objective 3D Differentiated Sensor Network DeploymentLiang-Che Wei, Chih-Wei Kang, Jian-Hung Chen. 983-988 [doi]
- A new Group Key Management Scheme based on DMST for Wireless Sensor NetworksYingZhi Zeng, Xia Yan, Jinshu Su. 989-994 [doi]
- Design and Implementation of a Security Manager for WirelessHART NetworksShahid Raza, Thiemo Voigt, Adriaan Slabbert, Krister Landernäs. 995-1004 [doi]
- A Per-Hop Security Scheme for Highly Dynamic Wireless Sensor NetworksSyed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere. 1005-1011 [doi]
- DiffUser: Differentiated User Access Control on SmartphoneXudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, Dong Xuan. 1012-1017 [doi]
- cooperative anonymity authentication in vehicular networksJianmin Chen, Jie Wu. 1018-1023 [doi]
- Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor NetworksZhijun Li, Guang Gong. 1030-1035 [doi]
- Performance Impact of and Protocol Interdependencies of IEEE 802.15.4 Security MechanismsFeng Cheng, Xiaolong Yin, Reinhard German, Falko Dressler. 1036-1041 [doi]
- A Principal-Agent Method to Prevent Selfish MAC Layer Behavior in Wireless NetworksKai Shi, Yantai Shu, Oliver W. W. Yang, Chunfeng Liu. 1042-1047 [doi]
- Private Cluster Head Election in Wireless Sensor NetworksLevente Buttyán, Tamás Holczer. 1048-1053 [doi]
- SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor NetworksYingpei Zeng, Jiannong Cao, Jue Hong, Shigeng Zhang, Li Xie. 1054-1059 [doi]
- Accurate Power Profiling of Sensornets with the COOJA/MSPSim SimulatorJoakim Eriksson, Fredrik Österlind, Thiemo Voigt, Niclas Finne, Shahid Raza, Nicolas Tsiftes, Adam Dunkels. 1060-1061 [doi]
- Design and implementation of non-autonomous mobile wireless sensor for debris flow monitoringHuang-Chen Lee, Chuan-Yu Cho, Chung-Ta King, Yao-Min Fang, Bing-Jean Lee. 1062-1064 [doi]
- iTracking: Accurate Light-based Location-tracking in Wireless Sensor NetworksAndong Zhan, Shen Li, Tao Li, Lubin Guan, Panlong Yang, Xiaobing Wu, Guihai Chen. 1065-1067 [doi]
- Quality Estimation based Data Fusion in Wireless Sensor NetworksFrederik Hermans, Norman Dziengel, Jochen H. Schiller. 1068-1070 [doi]
- VS3: A Vehicular Surveillance and Sensing System for Security ApplicationsLien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng. 1071-1073 [doi]
- Pattern Formation Using Multiple RobotsJun Zeng, Daoyong Liu, Alei Liang, Haibing Guan. 1074-1076 [doi]