Abstract is missing.
- Gradual adaptation of security for sensor networksAntonio Vincenzo Taddeo, Laura Micconi, Alberto Ferrante. 1-9 [doi]
- Fountain codes for exploiting diversity in wireless sensor networksAnya Apavatjrut. 1-2 [doi]
- Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recordingYanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Chen. 1-6 [doi]
- An estimator model for distributed estimation in heterogenous wireless sensor networksShanying Zhu, Cailian Chen, Xinping Guan, Chengnian Long. 1-6 [doi]
- General lower and best case upper bounds on energy optimal multicasting in wireless ad hoc and sensor networksHannes Frey. 1-9 [doi]
- The XO-Mesh path discovery mechanism sanityRicardo Campanha Carrano, Luiz Claudio Schara Magalhaes. 1-6 [doi]
- Design and implementation of a behavioral migraine management iPhone app for adolescents with migraineChang Liu, Kenneth A. Holroyd, Qing Zhu, Kaiyu Shen, Wenqi Zhou. 1-6 [doi]
- Optimal joint routing and scheduling in wireless mesh networks with smart antennasMina Yazdanpanah, Chadi Assi, Yousef R. Shayan. 1-7 [doi]
- Routing for minimum length schedule in multi-channel TDMA based wireless mesh networksBo Wang 0001, Guo-Kai Zeng, Matt W. Mutka, Li Xiao. 1-6 [doi]
- A context-aware framework for health care governance decision-making systems: A model based on the Brazilian Digital TVMauro Oliveira, Carlos Hairon R. Gonçalves, Odorico Andrade, Regis Moura, Claude Sicotte, J.-L. Denis, Stenio Fernandes, Jérôme Gensel, José Bringel Filho, Hervé Martin. 1-6 [doi]
- Experiments on autonomous mobile sensor control for target trackingHongbin Li, Fan Zhang, Jiming Chen, Youxian Sun. 1-5 [doi]
- Proximity marketing solution tailored to user needsMichela Papandrea, Silvia Giordano, Salvatore Vanini, Piergiorgio Cremonese. 1-3 [doi]
- Design and evaluation of a fast authentication scheme for WiFi-based wireless networksZhenxia Zhang, Richard W. Pazzi, Azzedine Boukerche. 1-6 [doi]
- Conditional shortest path routing in delay tolerant networksEyuphan Bulut, Sahin Cem Geyik, Boleslaw K. Szymanski. 1-6 [doi]
- Crowd-sourced sensing and collaboration using twitterMurat Demirbas, Murat Ali Bayir, Cuneyt Gurcan Akcora, Yavuz Selim Yilmaz, Hakan Ferhatosmanoglu. 1-9 [doi]
- A feedback-based adaptive online algorithm for Multi-Gateway load-balancing in wireless mesh networksJuan Jose Galvez, Pedro M. Ruiz, Antonio F. Gómez-Skarmeta. 1-9 [doi]
- Analyzing the effective throughput in multi-hop IEEE 802.1 in networksSimon Frohn, Sascha Gübner, Christoph Lindemann. 1-6 [doi]
- Path diversity gain with network coding and multipath transmission in wireless mesh networksNikolaos Pappas, Vasilios A. Siris, Apostolos Traganitis. 1-6 [doi]
- A multiaccess network of informationKostas Pentikousis, Teemu Rautio. 1-9 [doi]
- Neighbor discovery in 60 GHz wireless personal area networksXueli An, R. Venkatesha Prasad, Ignas G. Niemegeers. 1-8 [doi]
- Algorithm for data similarity measurements to reduce data redundancy in wireless sensor networksAlia Ghaddar, Tahiry Razafindralambo, Isabelle Simplot-Ryl, Samar Tawbi, Abbas Hijazi. 1-6 [doi]
- A robust flooding algorithm in multi-radio multi-channel wireless mesh networksYoundo Lee, Kideok Cho, Ted Taekyoung Kwon, Yanghee Choi. 1-6 [doi]
- Generic network forensic data acquisition from household and small business wireless routersZhongli Liu, Yinjie Chen, Wei Yu, Xinwen Fu. 1-6 [doi]
- Autonomic diagnosis of anomalous network trafficAngelos K. Marnerides, David Hutchison, Dimitrios P. Pezaros. 1-6 [doi]
- Fair scheduling for real-time multimedia support in IEEE 802.16 wireless access networksYaser P. Fallah, Panos Nasiopoulos, Raja Sengupta. 1-9 [doi]
- Attribute-aware data aggregation using dynamic routing in wireless sensor networksJiao Zhang, Fengyuan Ren, Tao He, Chuang Lin. 1-9 [doi]
- Fast computation of schedules for dynamic traffic in wireless mesh networksPeng Wang, Stephan Bohacek. 1-7 [doi]
- Performance analysis of the IEEE 802.11 MAC protocol for DSRC with and without RetransmissionsMd. Imrul Hassan, Hai Le Vu, Taka Sakurai. 1-8 [doi]
- Channel pool management for video streaming in WLANXin Liu, George Calcev. 1-6 [doi]
- Connectivity guarantee during wireless sensor networks deploymentTahiry Razafindralambo, David Simplot-Ryl. 1-6 [doi]
- Automatic planning of UMTS release 4.0 networks using realistic trafficMohammad Reza Pasandideh, Marc St-Hilaire. 1-9 [doi]
- Information utility in mission-oriented networksSharanya Eswaran, David Shur, Sunil Samtani, Aristides Staikos. 1-9 [doi]
- A distributed privacy-preserving scheme for location-based queriesEmmanouil Magkos, Panayiotis Kotzanikolaou, Spyros Sioutas, Konstantinos Oikonomou. 1-6 [doi]
- On the impact of uplink power control in network MIMO systems with MMSE and SIC receiversGábor Fodor, Stefano Sorrentino, Mikael Johansson, Pablo Soldati. 1-9 [doi]
- WANDA B.: Weight and activity with blood pressure monitoring system for heart failure patientsMyung-kyung Suh, Lorraine S. Evangelista, Victor Chen, Wen-Sao Hong, Jamie Macbeth, Ani Nahapetian, Florence-Joy Figueras, Majid Sarrafzadeh. 1-6 [doi]
- Evaluation of quality of experience for video streaming over dynamic spectrum access systemsChristopher N. Ververidis, Janne Riihijärvi, Petri Mähönen. 1-8 [doi]
- Towards securing mintroute in wireless sensor networksIslam Hegazy, Reihaneh Safavi-Naini, Carey Williamson. 1-6 [doi]
- Cross-layer H.264 scalable video downstream delivery over WLANsGiuseppe Bianchi, Andrea Detti, Pierpaolo Loreti, Claudio Pisa, Srisakul Thakolsri, Wolfgang Kellerer, Jörg Widmer. 1-9 [doi]
- A RTLS/DR based localization system architecture for indoor mobile robotsBingbing Liu, Xiaojun Wu, Vikas Reddy Enti, Dee Meng Kang, Wei Liu. 1-6 [doi]
- Opportunistically supported ubiquitous localization: Machine learning enhancementsMichela Papandrea. 1-2 [doi]
- Trade-off between exploration and reporting victim locations in USARSion Scone, Iain Phillips. 1-6 [doi]
- Efficient network selection in heterogeneous communication scenarios using arbitrationSven Lahde, Martin Wegner, Lars C. Wolf. 1-6 [doi]
- On access point association in wireless mesh networksA. Argento, Matteo Cesana, Ilaria Malanchini. 1-6 [doi]
- A method to compare new and traditional accelerometry data in physical activity monitoringVincent T. van Hees, Marcelo Pias, Salman Taherian, Ulf Ekelund, Soren Brage. 1-6 [doi]
- On the maximum performance in opportunistic routingLlorenç Cerdà-Alabern, Amir Darehshoorzadeh, Vicent Pla. 1-8 [doi]
- PCAR: A power controlled routing protocol for wireless ad hoc networksXue Zhang, Ming Liu, Haigang Gong, Sanglu Lu, Jie Wu. 1-6 [doi]
- SHARC: Community-based partitioning for mobile ad hoc networks using neighborhood similarityGuillaume-Jean Herbiet, Pascal Bouvry. 1-9 [doi]
- Synchronization impact on the performance of Data-Timed Sending (DTS) based wireless sensor networksKonstantin Chomu, Liljana Gavrilovska. 1-6 [doi]
- Video quality prediction in the presence of MAC contention and wireless channel errorWerayut Saesue, Chun Tung Chou, Jian Zhang. 1-10 [doi]
- Enable multimedia mobility with IEEE 802.21Guang Lu. 1-6 [doi]
- SAMSON: Secure access for medical smart cards over networksGuy C. Hembroff, Sead Muftic. 1-6 [doi]
- DEHAR: A distributed energy harvesting aware routing algorithm for ad-hoc multi-hop wireless sensor networksMikkel Koefoed Jakobsen, Jan Madsen, Michael R. Hansen. 1-9 [doi]
- MAC layer design in cognitive radio networksSuzan Bayhan. 1-2 [doi]
- Misbehaving router detection in link-state routing for wireless mesh networksGergely Ács, Levente Buttyán, László Dóra. 1-6 [doi]
- Achievement notification in a real-world achievement systemTonio Triebel, Sascha Schnaufer, Wolfgang Effelsberg. 1-2 [doi]
- Implementation of the OBAMP overlay protocol for multicast delivery in OLSR wireless community networksFrancesco Saverio Proto, Claudio Pisa. 1-3 [doi]
- Streaming H.264 scalable video over data distribution service in a wireless environmentAndrea Detti, Pierpaolo Loreti, Nicola Blefari-Melazzi, Francesco Fedi. 1-3 [doi]
- Reservation-based distributed scheduling in wireless networksGustavo Vejarano, Janise McNair. 1-9 [doi]
- Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANsChibiao Liu, James T. Yu, Gregory B. Brewster. 1-9 [doi]
- XS-WSNet: Extreme scale wireless sensor network simulationAli Asim, Sébastien Tixeuil. 1-9 [doi]
- TTN: A time-to-network approach to data reporting in mobile ad hoc networksPhillip Sitbon, Wu-chi Feng, Nirupama Bulusu. 1-9 [doi]
- A social transitivity-based data dissemination scheme for opportunistic networksJaesung Ku, Yangwoo Ko, Jisun An, Dongman Lee. 1-9 [doi]
- A signal combining technique based on channel shortening for cooperative sensor networksSyed Imtiaz Hussain, Mohamed-Slim Alouini, Mazen O. Hasna. 1-6 [doi]
- Rope ladder routing: Position-based multipath routing for wireless mesh networksJohannes Lessmann, Marcus Schoeller, Frank A. Zdarsky. 1-6 [doi]
- Wyner-Ziv video coding with error-prone wireless fading channelsKuganeswaran Thambu. 1-2 [doi]
- Reactive on-board regulation of cognitive radiosYu Zhang, Arati Baliga, Wade Trappe. 1-6 [doi]
- Tradeoffs between security and communication performance in wireless mesh networksReza Curtmola, Jing Dong, Cristina Nita-Rotaru. 1-6 [doi]
- Estimation and prediction for tracking trajectories in cellular networks using the recursive prediction error methodRuben H. Milocco, Selma Boumerdassi. 1-7 [doi]
- Polar coordinate routing for multiple paths in wireless networksMaulik Desai, Nicholas F. Maxemchuk. 1-9 [doi]
- Pervasive speech API demoStefan Radomski, Dirk Schnelle-Walka. 1-2 [doi]
- P2P overlay topology control in MANETsAfzal Mawji, Hossam S. Hassanein. 1-9 [doi]
- Load-balanced routing and gateway selection in wireless mesh networks: Design, implementation and experimentationEmilio Ancillotti, Raffaele Bruno, Marco Conti. 1-7 [doi]
- Security and privacy for mobile electronic health monitoring and recording systemsJohannes Barnickel, Hakan Karahan, Ulrike Meyer. 1-6 [doi]
- LER-MAC: A Load-independent Energy-efficient and Rate-control Integrated Asynchronous Duty Cycle MAC for Wireless Sensor NetworksMuhammad Mostafa Monowar, Muhammad Mahbub Alam, Md. Obaidur Rahman, Choong Seon Hong. 1-9 [doi]
- Comparing simulation tools and experimental testbeds for wireless mesh networksKefeng Tan, Daniel Wu, An Chan, Prasant Mohapatra. 1-9 [doi]
- Using time-of-day and location-based mobility profiles to improve scanning during handoversPaul Boone, Michel Barbeau, Evangelos Kranakis. 1-6 [doi]
- POSTECH s U-Health Smart Home for elderly monitoring and supportJin Kim, Hyeok-soo Choi, Hui Wang 0006, Nazim Agoulmine, M. Jamal Deerv, James Won-Ki Hong. 1-6 [doi]
- Statistical modeling of harvestable kinetic energy for wearable medical sensorsNathalie Yarkony, Kamran Sayrafian-Pour, Antonio Possolo. 1-5 [doi]
- Comparing network protocols via elimination of MAC/PHY effectsDevan Rehunathan. 1-2 [doi]
- The CareNet residential gateway: A conceptual overviewBruce Zamaere, Peter Sjödin, Björn Pehrson. 1-6 [doi]
- Detection of the Evil ring attack in wireless sensor networks using cross verificationWei Shi, Michel Barbeau, Jean-Pierre Corriveau. 1-6 [doi]
- Demonstration of seamless multimedia session transfer to support pervasive mobile computingRobert G. Gazda, Debashish Purkayastha, Xin Feng, Farshad A. Samimi. 1 [doi]
- StreamSocial: A P2P streaming system with social incentivesOsama Abboud, Thomas Zinner, Eduardo Lidanski, Konstantin Pussep, Ralf Steinmetz. 1-2 [doi]
- Investigating the impact of human activity on the performance of wireless networks - An experimental approachElyes Ben Hamida, Guillaume Chelius. 1-8 [doi]
- A vision of cooperation tools for VANETsJezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil. 1-4 [doi]
- An analysis of distributed and asynchronous wireless group communication mechanismsSurendar Chandra, Xuwen Yu. 1-6 [doi]
- A secure peer-to-peer web frameworkJoakim Koskela, Andrei Gurtov. 1-6 [doi]
- On the side effects of packet detection sensitivity in IEEE 802.11 interference managementLuca Scalia, Joerg Widmer, Imad Aad. 1-7 [doi]
- Channel assortment strategy for reliable communication in multi-hop cognitive radio networksMubashir Husain Rehmani. 1-2 [doi]
- Wireless sensor networks based localization for audio-source: A GCC-GA methodBo Cheng, Cailian Chen, Zhezhuang Xu, Haoran Li, Xinping Guan. 1-6 [doi]
- Using a backlogged queue approach for adaptive MAC frame aggregationGautam D. Bhanage, Dipankar Raychaudhuri, Ivan Seskar. 1-9 [doi]
- Artificial ants for efficient data forwarding in wireless mesh networksFawaz S. Bokhari. 1-2 [doi]
- Achieving per-station fairness in IEEE 802.11 wireless LANsWan-Seon Lim, Young-Joo Suh. 1-9 [doi]
- Virtual smartphone over IPEric Y. Chen, Mitsutaka Itoh. 1-6 [doi]
- Least attained recent service for packet scheduling over wireless LANsMartin Heusse, Guillaume Urvoy-Keller, Andrzej Duda, Timothy X. Brown. 1-9 [doi]
- OptiMOS: Optimal MOS-based scheduling of downlink voice flows in point-to-multipoint access networksMatteo Maria Andreozzi, Giovanni Stea, Dario Sabella. 1-6 [doi]
- An application layer non-repudiation wireless system: A cross-layer approachSasan Adibi. 1-2 [doi]
- Game theory for channel assignment of cognitive radiosAmiotosh Ghosh, Walaa Hamouda. 1-2 [doi]
- Optimal link scheduling for real-time traffic in wireless mesh networks in both per-flow and per-path frameworksPaola Cappanera, Luciano Lenzini, Alessandro Lori, Giovanni Stea, Gigliola Vaglini. 1-9 [doi]
- Utility-based channel assignment and topology control in wireless mesh networksTheodoros Dionysiou, Vasilios A. Siris, George Stamatakis. 1-9 [doi]
- Next-generation E-health communication infrastructure using converged super-broadband optical and wireless access systemArshad Chowdhury, Hung-Chang Chien, Sourabh Khire, Shu-Hao Fan, Xianfeng Tang, Nikil Jayant, Gee-Kung Chang. 1-5 [doi]
- Social similarity as a driver for selfish, cooperative and altruistic behaviorEva Jaho, Merkourios Karaliopoulos, Ioannis Stavrakakis. 1-6 [doi]
- Distributed storage in Disruption Tolerant NetworkJingzhe Du, Evangelos Kranakis, Amiya Nayak. 1-6 [doi]
- Channel tracking algorithms for highly efficient wireless broadband communications in rural areasLakmali Atapattu. 1-2 [doi]
- Spectrum sharing between IEEE 802.16 and IEEE 802.11 based wireless networksMohammad Muttakin Siddique, Bernd-Ludwig Wenning, Carmelita Görg, Maciej Mühleisen. 1-6 [doi]
- AGC-based RF Fingerprints in Wireless Sensor Networks for authenticationDavid A. Knox, Thomas Kunz. 1-6 [doi]
- Resilient Peer-to-Peer live-streaming using motifsLachezar Krumov, Adriana Andreeva, Thorsten Strufe. 1-8 [doi]
- Router selfishness in community wireless mesh networks: Cross-layer benefits and harmsKrzysztof Gierlowski, Jerzy Konorski. 1-6 [doi]
- Assessment of the true risks to the protection of confidential information in the wireless home and office environmentMichel Barbeau. 1-6 [doi]