Abstract is missing.
- In Sensors We Trust - A Realistic Possibility?Mani Srivastava. 1 [doi]
- Low-Power Listening Goes Multi-channelBeshr Al Nahas, Simon Duquennoy, Venkatraman Iyer, Thiemo Voigt. 2-9 [doi]
- PhyTraces: Simulating New RF Environments with Physical Layer TracesJiakang Lu, Kamin Whitehouse. 10-17 [doi]
- A Novel Wake-Up Receiver with Addressing Capability for Wireless Sensor NodesChiara Petrioli, Dora Spenza, Pasquale Tommasino, Alessandro Trifiletti. 18-25 [doi]
- Symmetric Coherent Link Degree, Adaptive Throughput-Transmission Power for Wireless Sensor NetworksKonstantinos Chantzis, Dimitrios Amaxilatis, Ioannis Chatzigiannakis, José D. P. Rolim. 26-34 [doi]
- Indoor Occupant Positioning System Using Active RFID Deployment and Particle FiltersKevin Weekly, Han Zou, Lihua Xie, Qing-Shan Jia, Alexandre M. Bayen. 35-42 [doi]
- Harnessing Non-Uniform Transmit Power Levels for Improved Sequence Based LocalizationSuvil Deora, Bhaskar Krishnamachari. 43-50 [doi]
- FlashTrack: A Fast, In-network Tracking System for Sensor NetworksHao Jiang, Jiannan Zhai, Jason O. Hallstrom. 51-58 [doi]
- Trajectory Approximation for Resource Constrained Mobile Sensor NetworksGhulam Murtaza, Salil S. Kanhere, Aleksandar Ignjatovic, Raja Jurdak, Sanjay Jha. 59-66 [doi]
- Crowd-Sensing with Polarized SourcesMd. Tanvir Al Amin, Tarek F. Abdelzaher, Dong Wang, Boleslaw K. Szymanski. 67-74 [doi]
- A Dual-Sensor Enabled Indoor Localization System with Crowdsensing Spot SurveyChi Zhang, Jun Luo, Jianxin Wu. 75-82 [doi]
- On Decentralized In-network Aggregation in Real-World Scenarios with Crowd MobilityMichal Gregorczyk, Tomasz Pazurkiewicz, Konrad Iwanicki. 83-91 [doi]
- The Information Funnel: Exploiting Named Data for Information-Maximizing Data CollectionShiGuang Wang, Tarek F. Abdelzaher, Santhosh Gajendran, Ajith Herga, Sachin Kulkarni, Shen Li, Hengchang Liu, Chethan Suresh, Abhishek Sreenath, Hongwei Wang, William Dron, Alice Leung, Ramesh Govindan, John P. Hancock. 92-100 [doi]
- Aggregation in Smartphone Sensor NetworksNimantha Thushan Baranasuriya, Seth Lewis Gilbert, Calvin C. Newport, Jayanthi Rao. 101-110 [doi]
- A Comparison of On-Mote Lossy Compression Algorithms for Wireless Seismic Data AcquisitionMarc J. Rubin, Michael B. Wakin, Tracy Camp. 111-118 [doi]
- Data Extrapolation in Social Sensing for Disaster ResponseSiyu Gu, Chenji Pan, Hengchang Liu, Shen Li, Shaohan Hu, Lu Su, ShiGuang Wang, Dong Wang, Md. Tanvir Al Amin, Ramesh Govindan, Charu C. Aggarwal, Raghu K. Ganti, Mudhakar Srivatsa, Amotz Barnoy, Peter Terlecky, Tarek F. Abdelzaher. 119-126 [doi]
- Wonder: Efficient Tag Identification for Large-Scale RFID SystemsHaoxiang Liu, Kebin Liu, Wei Gong, Yunhao Liu, Lei Chen 0002. 127-134 [doi]
- Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of ThingsHossein Shafagh, Anwar Hithnawi. 135-136 [doi]
- Poster Abstract: Low-Power Wireless Channel Quality Estimation in the Presence of RF SmogAnwar Hithnawi, Hossein Shafagh, Simon Duquennoy. 137-138 [doi]
- Poster Abstract: Integration of Different Smart Metering Systems Based on Wireless CommunicationMasashi Sugano. 139-140 [doi]
- Poster Abstract: Semantically Enriched Object Identification for Internet of ThingsSejin Chun, Jooik Jung, Xiongnan Jin, Gunhee Cho, Kyong-Ho Lee. 141-142 [doi]
- Feature Extraction in Densely Sensed EnvironmentsMaryam Vahabi, Vikram Gupta, Michele Albano, Eduardo Tovar. 143-151 [doi]
- Real-Time Distributed Visual Feature Extraction from Video in Sensor NetworksEmil Eriksson, György Dán, Viktoria Fodor. 152-161 [doi]
- A Robust Watermarking Technique for Secure Sharing of BASN Generated Medical DataVishwa Goudar, Miodrag Potkonjak. 162-170 [doi]
- Healing Wireless Sensor Networks from Malicious Epidemic DiffusionNicola Roberto Zema, Enrico Natalizio, Michael Poss, Giuseppe Ruggeri, Antonella Molinaro. 171-178 [doi]
- Robust Compressive Data Gathering in Wireless Sensor Networks with Linear TopologyMohammadreza Mahmudimanesh, Neeraj Suri. 179-186 [doi]
- Compressive Sensing Based Data Gathering in Clustered Wireless Sensor NetworksMinh Tuan Nguyen, Keith A. Teague. 187-192 [doi]
- Efficient Agile Sink Selection in Wireless Sensor Networks Based on Compressed SensingMohammadreza Mahmudimanesh, Amir Naseri, Neeraj Suri. 193-200 [doi]
- Near-Optimal Deterministic Steiner Tree Maintenance in Sensor NetworksGokarna Sharma, Costas Busch. 201-208 [doi]
- Data Selection for Maximum Coverage in Sensor Networks with Cost ConstraintsScott T. Rager, Ertugrul Necdet Ciftcioglu, Thomas F. La Porta, Alice Leung, William Dron, Ram Ramanathan, John P. Hancock. 209-216 [doi]
- On Properties of Quantized Consensus in Layered Sensor NetworksVardhman Sheth, Yan Wan, Junfei Xie, Shengli Fu, Zongli Lin, Sajal K. Das. 217-224 [doi]
- Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use CaseFrancois Despaux, Ye-Qiong Song, Abdelkader Lahmadi. 225-232 [doi]
- Context-Oriented Programming for Adaptive Wireless Sensor Network SoftwareMikhail Afanasov, Luca Mottola, Carlo Ghezzi. 233-240 [doi]
- An Emulation-Based Method for Lifetime Estimation of Wireless Sensor NetworksWilfried Dron, Simon Duquennoy, Thiemo Voigt, Khalil Hachicha, Patrick Garda. 241-248 [doi]
- Hole Approximation-Dissemination Scheme for Bounded-Stretch Routing in Sensor NetworksPhi-Le Nguyen, Khanh-Van Nguyen. 249-256 [doi]
- Security Access Protocols in IoT Networks with Heterogenous Non-IP TerminalsRomeo Giuliano, Franco Mazzenga, Alessandro Neri, Anna Maria Vegni. 257-262 [doi]
- A Survey on (mobile) Wireless Sensor Network Experimentation TestbedsAnne-Sophie Tonneau, Nathalie Mitton, Julien Vandaele. 263-268 [doi]
- A Survey of Technologies in Internet of ThingsJasper Tan, Simon G. M. Koo. 269-274 [doi]
- Capturing Semantics of Energy MeterRanjan Dasgupta, Sounak Dey, Anupam Basu. 275-280 [doi]
- Decentralizing and Adding Portability to an IoT Test-Bed through SmartphonesSotiris E. Nikoletseas, Maria Rapti, Theofanis P. Raptis, Konstantinos Veroutis. 281-286 [doi]
- Performance Enhancement and Evaluation of IEEE 802.11ah Multi-Access Point Network Using Restricted Access Window MechanismOrod Raeesi, Juho Pirskanen, Ali Hazmi, Jukka Talvitie, Mikko Valkama. 287-293 [doi]
- A Fast and Fault-Tolerant Distributed Algorithm for Near-Optimal TDMA Scheduling in WSNsAshutosh Bhatia, R. C. Hansdah. 294-301 [doi]
- Adaptive Fuzzy Logic Mobility Management for WSNZinon Zinonos, Vasos Vassiliou, Chrysostomos Chrysostomou. 302-307 [doi]
- A Neighbour Disjoint Multipath Scheme for Fault Tolerant Wireless Sensor NetworksA. K. M. Mahtab Hossain, Cormac J. Sreenan, Szymon Fedor. 308-315 [doi]
- Dimensioning of Wireless Sensor and Actuator Networks for Guaranteed Delivery TimePetcharat Suriyachai. 316-321 [doi]
- Optimal Successive Group Decoding to Mitigate Interference in Wireless SystemsOmar Abu-Ella, Mohammed Elmusrati. 322-326 [doi]
- Performance Evaluation of PIR Sensor Deployment in Critical Area Surveillance NetworksSerkan Akbas, Mehmet Akif Efe, Suat Ozdemir. 327-332 [doi]
- Sensor Localization via Diversely Polarized AntennasMarco Antonio Marques Marinho, Edison Pignaton de Freitas, João Paulo Carvalho Lustosa Da Costa, Rafael Timóteo de Sousa Júnior. 333-337 [doi]
- Cooperative Modulation Diversity Applied to Heterogeneous Wireless Sensor NetworksMarcelo Portela Sousa, Waslon Terllizzie Araujo Lopes, Francisco Madeiro, Marcelo S. Alencar. 338-343 [doi]
- Optimizing Router Nodes Placement for Designing Distributed Sensor NetworksMohammad Mozumdar, Arun Ganesan, Alireza Ameri Daragheh. 344-348 [doi]
- Energy Efficient Handover in HetNets Using IEEE 802.21Gurkan Coskun, Ibrahim Hökelek, Hakan Ali Çirpan. 349-353 [doi]
- Cyber-Physical Systems AttestationJunia Valente, Carlos Barreto, Alvaro A. Cárdenas. 354-357 [doi]
- Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical SystemsAlefiya Hussain, Ted Faber, Robert Braden, Terry V. Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz, Laura Tinnel. 358-360 [doi]
- Towards Secure Demand-Response Systems on the CloudApurva Mohan, Daisuke Mashima. 361-366 [doi]
- Energy Oriented Vulnerability Analysis on Authentication Protocols for CPSPriyanka D. Harish, Swapnoneel Roy. 367-371 [doi]
- Cyber Security for Personal Medical Devices Internet of ThingsApurva Mohan. 372-374 [doi]