1 | -- | 3 | Eun-Kyu Lee, Soon-Young Oh, Mario Gerla. Frequency quorum rendezvous for fast and resilient key establishment under jamming attack |
4 | -- | 6 | Tingting Sun, Wade Trappe, Yanyong Zhang. Improved AP association management using machine learning |
7 | -- | 9 | Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi. Listen before you talk, but on the frequency domain |
10 | -- | 12 | Ahmad Rahmati, Clayton Shepard, Angela Nicoara, Lin Zhong, Jatinder Pal Singh. Mobile TCP usage characteristics and the feasibility of network migration without infrastructure support |
13 | -- | 15 | Saeed Moghaddam, Ahmed Helmy. Modeling of internet usage in large mobile societies using self-organizing maps |
16 | -- | 18 | Rahul Potharaju, Cristina Nita-Rotaru. Pandora: a platform for worm simulations in mobile ad-hoc networks |
19 | -- | 21 | Xian Chen, Bing Wang, Kyoungwon Suh, Wei Wei. Passive online wireless LAN health monitoring from a single measurement point |
22 | -- | 24 | Udayan Kumar, Ahmed Helmy. Proximity-based trust-advisor using encounters |
25 | -- | 27 | Hongsheng Lu, Christian Poellabauer. Balancing broadcast reliability and transmission range in VANETs |
28 | -- | 30 | Bo Han, Pan Hui, Aravind Srinivasan. Mobile data offloading in metropolitan area networks |
31 | -- | 33 | Mehedi Bakht, Robin Kravets. SearchLight: asynchronous neighbor discovery using systematic probing |
34 | -- | 36 | Aarti Munjal, Tracy Camp, William Navidi. SMOOTH: a simple way to model human walks |
37 | -- | 39 | Sungwook Moon, Ahmed Helmy. Spectral analysis of periodicity and regularity for mobile encounters in delay tolerant networks |
40 | -- | 42 | Jingyao Zhang, Yi Tang, Sachin Hirve, Srikrishna Iyer, Patrick Schaumont, Yaling Yang. SUNSHINE: a multi-domain sensor network simulator |
43 | -- | 45 | Dan Levin, Harald Schiƶberg, Ruben Merz, Cigdem Sengul. TCPSpeaker: clean and dirty sides of the same slate |
46 | -- | 48 | Jonathan Wellons, Yuan Xue. The impact of topology in robust routing on wireless mesh networks |
49 | -- | 51 | Yong Li, Yu Gong, Depeng Jin, Li Su, Lieguang Zeng, Pan Hui. Towards an optimal malware defense system for DTN with heterogeneous devices |
52 | -- | 54 | Pirathayini Srikantha, Marianna Carrera, Martin May. Traffic shaping in wireless home networks |