Abstract is missing.
- Multi-document abstractive summarization using chunk-graph and recurrent neural networkJianwei Niu 0002, Huan Chen, Qingjuan Zhao, Limin Su, Mohammed Atiquzzaman. 1-6 [doi]
- Rate maximization via PAPR reduction in MIMO-OFDM uplink: A user cooperation approachAntti Arvola, Antti Tölli, David Gesbert. 1-6 [doi]
- Spatial and frequency correlations in two-ray air-ground SIMO channelsDavid W. Matolak, Hosseinali Jamal, Ruoyu Sun. 1-6 [doi]
- Spectral efficiency analysis for spatial modulation in massive MIMO uplink over dispersive channelsYue Sun, Jintao Wang, Longzhuang He, Jian Song. 1-6 [doi]
- Comparison of dynamic biometrie security characteristics against other biometricsBenoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis. 1-7 [doi]
- Interference exploitation for enhanced security in D2D spectrum sharing networksWei Wang, Kah Chan Teh, Kwok Hung Li. 1-6 [doi]
- Hybrid satellite-terrestrial spectrum sharing system with opportunistic secondary network selectionPankaj K. Sharma, Prabhat K. Upadhyay, Daniel Benevides da Costa, Petros S. Bithas, Athanasios G. Kanatas. 1-6 [doi]
- Machine learning inspired energy-efficient hybrid precoding for mmWave massive MIMO systemsXinyu Gao, Linglong Dai, Ying Sun, Shuangfeng Han, I Chih-Lin. 1-6 [doi]
- A multi-domain role activation modelVilmar Abreu, Altair Olivo Santin, Eduardo Viegas, Maicon Stihler. 1-6 [doi]
- A dynamic-trust-based recruitment framework for mobile crowd sensingYali Gao, Xiaoyong Li, Jirui Li, Yunquan Gao. 1-6 [doi]
- Cost-efficient barrier coverage with a hybrid sensor network under practical constraintsXiaoyun Zhang, Mathew L. Wymore, Daji Qiao. 1-7 [doi]
- On low complexity per-tone common mode sensor based alien noise cancellation for downstream VDSLRamanjit Ahuja, Pravesh Biyani, Surendra Prasad. 1-7 [doi]
- On the performance boost for peer to peer WebRTC-based video streaming with network codingPatrik J. Braun, Marton Sipos, Péter Ekler, Frank H. P. Fitzek. 1-6 [doi]
- Stochastic modeling of wireless charged wearables for reliable health monitoring in hospital environmentsProdromos-Vasileios Mekikis, Angelos Antonopoulos, Elli Kartsakli, Nikos I. Passas, Luis Alonso 0001, Christos V. Verikoukis. 1-6 [doi]
- Distance distributions for Matérn cluster processes with application to network performance analysisJinchuan Tang, Gaojie Chen, Justin P. Coon, David E. Simmons. 1-6 [doi]
- Cache-aided data delivery over erasure broadcast channelsMohammad Mohammadi Amiri, Deniz Gündüz. 1-6 [doi]
- Signaling cost analysis for handoff decision algorithms in femtocell networksWahida Nasrin, Jiang Xie. 1-6 [doi]
- A Nash stable cross-layer coalition formation game for device-to-device communicationsNicole Sawyer, David B. Smith. 1-6 [doi]
- Addressing multiple nodes in networked labs-on-chips without payload re-injectionWerner Haselmayr, Andrea Biral, Andreas Grimmer, Andrea Zanella, Andreas Springer, Robert Wille. 1-6 [doi]
- MIMO systems with low-resolution ADCs: Linear coding approachSong-Nam Hong, Yo-Seb Jeon, Namyoon Lee. 1-6 [doi]
- Fair video caching for named data networkingZhao Zhang, Huadong Ma, Yaohong Xue, Liang Liu. 1-6 [doi]
- Federations of connected things for delay-sensitive IoT services in 5G environmentsIvan Farris, Antonino Orsino, Leonardo Militano, Michele Nitti, Giuseppe Araniti, Luigi Atzori, Antonio Iera. 1-6 [doi]
- Performance evaluation of real-time 10GbE data connectivity over a converged IF-over-Fiber links and millimeter-wave wireless bridgeAbdelmoula Bekkali, Takashi Kobayashi, Kosuke Nishimura, Nobuhiko Shibagaki, Kenichi Kashima, Yosuke Sato. 1-6 [doi]
- Two-dimensional distributed spectrum reusing in cognitive radio network: Based on game theoryChaoqiong Fan, Bin Li, Chenglin Zhao, Arumugam Nallanathan. 1-6 [doi]
- Utilizing communication range to shorten the route of sweep coverageChuang Liu, Hongwei Du, Qiang Ye. 1-6 [doi]
- Optimal DASH-multicasting over LTEJounsup Park, Aliasghar Tarkhan, Jenq-Neng Hwang, Qiyue Li, Yiiing Xu, Wei Huang. 1-6 [doi]
- Post-disaster data evacuation from isolated data centers through LEO satellite networksRafael B. R. Lourenco, Gustavo B. Figueiredo, Massimo Tornatore, Biswanath Mukherjee. 1-5 [doi]
- Packet coloring for intelligent traffic management in wireless networksDoru Calin, Bong-Ho Kim, Francis Bourriaud. 1-6 [doi]
- Uniformly oversampled sequence detection in the presence of unknown jitterCinna Soltanpur, J. R. Cruz. 1-6 [doi]
- QUIC: Better for what and for whom?Sarah Cook, Bertrand Mathieu, Patrick Truong, Isabelle Hamchaoui. 1-6 [doi]
- Secret-key capacity of infinite compound sources with communication rate constraintNima Tavangaran, Holger Boche, Rafael F. Schaefer. 1-6 [doi]
- Efficient and privacy-aware authentication scheme for EVs pre-paid wireless charging servicesKhaled Rabieh, Mingkui Wei. 1-6 [doi]
- CelEc framework for reconfigurable small cells as part of 5G ultra-dense networksChristophoros Christophorou, Andreas Pitsillides, Ian F. Akyildiz. 1-7 [doi]
- Assuring virtual network function image integrity and host sealing in Telco cloueShankar Lal, Sowmya Ravidas, Ian Oliver, Tarik Taleb. 1-6 [doi]
- Space-frequency to space-frequency for MIMO radio over copperAndrea Matera, Lorenzo Combi, Syed Hassan Raza Naqvi, Umberto Spagnolini. 1-6 [doi]
- A prescient recovery approach for disjoint MSNsIzzet F. Senturk. 1-6 [doi]
- Out of amplifier band optical broadcast intra-data center network architectureHenna Huang, Vincent W. S. Chan. 1-6 [doi]
- Computational resource constrained multi-cell joint processing in cloud radio access networksChao Han, Wei Wang, Yitu Wang, Zhaoyang Zhang 0001. 1-6 [doi]
- Performance analysis of turbo-coded cooperative relaying in spectrum-sharing systemsJules Merlin Mouatcho Moualeu, Walaa Hamouda, Fambirai Takawira. 1-6 [doi]
- A near optimal interference minimization resource allocation algorithm for D2D communicationMd Yeakub Hassan, Faisal Hussain, Md Sakhawat Hossen, Salimur Choudhury, Muhammad Mahbub Alam. 1-6 [doi]
- ML and MAP phase noise estimators for optical fiber FBMC-OQAM systemsFrançois Rottenberg, Trung Hien Nguyen, Simon-Pierre Gorza, François Horlin, Jérôme Louveaux. 1-6 [doi]
- Versioning-aware and QoE-oriented strategy for adaptative bitrate streamingMaiara de S. Coelho, Cesar A. V. Melo, Nelson L. S. Da Fonseca. 1-6 [doi]
- Better bounds by worse assumptions - Improving network calculus accuracy by adding pessimism to the network modelSteffen Bondorf. 1-7 [doi]
- Average downlink rate in Ultra-Dense NetworksMahmoud I. Kamel, Walaa Hamouda, Amr M. Youssef. 1-6 [doi]
- A theoretical foundation for location secrecyWenhan Dai, Moe Z. Win. 1-6 [doi]
- Leaky bucket-inspired power output smoothing with load-adaptive algorithmXiangyu Chen, Ka-Cheong Leung, Albert Y. S. Lam. 1-6 [doi]
- Arrayed space optical communications: Localization of the ground stationZexi Fang, Athanassios Manikas. 1-6 [doi]
- EnOR: Energy balancing routing protocol for underwater sensor networksRodolfo W. L. Coutinho, Azzedine Boukerche, Luiz Filipe M. Vieira, Antonio A. F. Loureiro. 1-6 [doi]
- On capacity bounds of two-way diffusion channel with molecule harvestingJiun-Ting Huang, Chia-han Lee. 1-6 [doi]
- Routing, fiber, band, and spectrum assignment (RFBSA) for multi-granular elastic optical networksJingxin Wu, Maotong Xu, Suresh Subramaniam, Hiroshi Hasegawa. 1-6 [doi]
- Facilitating safe vehicle routing in smart citiesAbd-Elhamid M. Taha. 1-5 [doi]
- On the benefits of successive interference cancellation for ultra narrow band networks : Theory and application to IoTYuqi Mo, Claire Goursaud, Jean-Marie Gorce. 1-6 [doi]
- DABKS: Dynamic attribute-based keyword search in cloud computingBaishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, Jie Wu. 1-6 [doi]
- A quality of experience-aware association algorithm for 5G heterogeneous networksPanagiotis Trakas, Ferran Adelantado, Nizar Zorba, Christos V. Verikoukis. 1-6 [doi]
- A calculation method for social network user credibilityFang Zhou, Jian-Lin Jin, Xiaojiang Du, Bowen Zhang, Xu-Cheng Yin. 1-6 [doi]
- Trust-based time series data model for mobile crowdsensingXiao Ma, Zhenzhe Zheng, Fan Wu, Guihai Chen. 1-6 [doi]
- Performance of intent-based virtualized network infrastructure managementFranco Callegati, Walter Cerroni, Chiara Contoli, Francesco Foresta. 1-6 [doi]
- Antenna selection for multi-user MIMO at millimeter-wave spectrum with lens antenna arraysRongrong Qian, Mathini Sellathurai, Xu Ming Fang. 1-5 [doi]
- Performance analysis of dense small cell networks with generalized fadingBin Yang 0006, Ming Ding, Guoqiang Mao, Xiaohu Ge. 1-7 [doi]
- Beamformer design for interference alignment in full-duplex cellular networks with imperfect CSIPaula Aquilina, Tharmalingam Ratnarajah. 1-6 [doi]
- Fair beamwidth selection and resource allocation for indoor millimeter-wave networksNima Eshraghi, Vahid Shah-Mansouri, Behrouz Maham. 1-6 [doi]
- Compressed sensing based semidefinite relaxation detection algorithm for overloaded uplink multiuser massive MIMO systemLin Li, Weixiao Meng, Cheng Li. 1-6 [doi]
- On information spreading in multiplex networks with gossip mechanismYufan Huang, Huaiyu Dai. 1-6 [doi]
- Massive machine-type communication (mMTC) access with integrated authenticationNuno K. Pratas, Sarath Pattathil, Cedomir Stefanovic, Petar Popovski. 1-6 [doi]
- An effective energy-harvesting-aware routing algorithm for WSN-based IoT applicationsThien D. Nguyen, Jamil Y. Khan, Duy T. Ngo. 1-6 [doi]
- VDAS: Verifiable data aggregation scheme for Internet of ThingsJingwei Liu, Jinping Han, Longfei Wu, Rong Sun, Xiaojiang Du. 1-6 [doi]
- AHI: Efficient policy space set operationsDanyang Li, Xiaohe Hu, Linli Wan, Zhi Liu, Jun Li. 1-6 [doi]
- Joint user association and base station switching on/off for green heterogeneous cellular networksXiaojian Lin, Shaowei Wang. 1-6 [doi]
- Interference statistics of regular ring-structured networks with 60 GHz directional antennasGuang Yang, Ming Xiao. 1-6 [doi]
- Joint computation offloading, resource allocation and content caching in cellular networks with mobile edge computingChen-meng Wang, Chengchao Liang, Fei Richard Yu, Qianbin Chen, Lun Tang. 1-6 [doi]
- Virtual machine placement for backhaul traffic minimization in fog radio access networksYa-Ju Yu, Te-Chuan Chiu, Ai-Chun Pang, Ming-Fan Chen, Jiajia Liu. 1-7 [doi]
- Performance analysis of IEEE 802.11.ad downlink hybrid beamformingWen Wu, Qinghua Shen, Miao Wang 0003, Xuemin Sherman Shen. 1-6 [doi]
- Coexisting 802.11a/n and 802.11ac clients in WLANs: Optimization and differentiationYayu Gao, Xinghua Sun, Lin Dai. 1-6 [doi]
- Optical Switch in the Middle (OSM) architecture for DCNs with Hadoop adaptationsXiaoyu Wang, Malathi Veeraraghavan, Zongli Lin, Eiji Oki. 1-7 [doi]
- Characterization of link lifetime in the presence of random blocking objectsAshraf Al-Rimawi, Davide Dardari. 1-6 [doi]
- Estimation and detection based on correlated observations from a heterogeneous sensor networkSima Sobhiyeh, Mort Naraghi-Pour. 1-6 [doi]
- Energy-efficient resource allocation strategy in ultra dense small-cell networks: A Stackelberg game approachLiang Xu, Yuming Mao, Supeng Leng, Guanhua Qiao, Quanxin Zhao. 1-6 [doi]
- Pricing-based energy storage sharing and virtual capacity allocationDongwei Zhao, Hao Wang, Jianwei Huang, Xiaojun Lin. 1-6 [doi]
- Directional training and fast sector-based processing schemes for mmWave channelsZheda Li, Nadisanka Rupasinghe, Ozgun Y. Bursalioglu, Chenwei Wang, Haralabos C. Papadopoulos, Giuseppe Caire. 1-7 [doi]
- Efficient channel estimation for massive MIMO systems via truncated two-dimensional atomic norm minimizationYue Wang, Ping Xu, Zhi Tian. 1-6 [doi]
- Novel attacks in OSPF networks to poison routing tableYubo Song, Shang Gao, Aiqun Hu, Bin Xiao 0001. 1-6 [doi]
- Optimal energy planning for wireless self-contained sensor networks in oil reservoirsAbdallah A. Alshehri, Shih-Chun Lin, Ian F. Akyildiz. 1-7 [doi]
- Information centric sensor-cloud integration: An efficient model to improve wireless sensor networks' lifetimeThanh Dinh, Younghan Kim. 1-6 [doi]
- M2M meets D2D: Harnessing D2D interfaces for the aggregation of M2M dataAsma Afzal, Syed Ali Raza Zaidi, Desmond C. McLernon, Mounir Ghogho, Afef Feki. 1-6 [doi]
- Caching for distributed parameter estimation in wireless sensor networksPradeep Chennakesavula, Y.-W. Peter Hong, Anna Scaglione. 1-6 [doi]
- Low-complexity hybrid analog/digital beamforming for multicast transmission in mmwave systemsJingyue Huang, Ziming Cheng, Erkai Chen, Meixia Tao. 1-6 [doi]
- A low complexity soft-output data detection scheme based on Jacobi method for massive MIMO uplink transmissionFan Jiang, Cheng Li, Zijun Gong. 1-5 [doi]
- DFRA: Demodulation-free random access for UAV ad hoc networksWeijun Wang, Chao Dong, Sen Zhu, Hai Wang. 1-6 [doi]
- Energy harvesting in secret key generation systems under jamming attacksElena Veronica Belmega, Arsenia Chorti. 1-6 [doi]
- Energy efficient preceding C-RAN downlink with compression at fronthaulKien-Giang Nguyen, Quang-Doanh Vu, Markku J. Juntti, Le-Nam Tran. 1-6 [doi]
- Fairness in multi-operator energy sharingMaria Oikonomakou, Angelos Antonopoulos, Luis Alonso 0001, Christos V. Verikoukis. 1-6 [doi]
- On the effect of flow table size and controller capacity on SDN network throughputGongming Zhao, Liusheng Huang, Zhuolong Yu, Hongli Xu, Pengzhan Wang. 1-6 [doi]
- Analysis of interference mitigation in mmWave communicationsAmir H. Jafari, JeongHun Park, Robert W. Heath Jr.. 1-6 [doi]
- An iterative incentive mechanism design for crowd sensing using best response dynamicsAlireza Chakeri, Luis G. Jaimes. 1-7 [doi]
- Asynchronous and noncoherent neighbor discovery for the IoT using sparse-graph codesKabir Chandrasekher, Kangwook Lee, Peter Kairouz, Ramtin Pedarsani, Kannan Ramchandran. 1-6 [doi]
- A neural-network-based realization of in-network computation for the Internet of ThingsNichoas Kaminski, Irene Macaluso, Emanuele Di Pascale, Avishek Nag, John Brady, Mark Y. Kelly, Keith E. Nolan, Wael Guibène, Linda Doyle. 1-6 [doi]
- Optimal signalling strategies and power allocation for wireless secret key generation systems in the presence of a jammerArsenia Chorti. 1-6 [doi]
- Towards adaptive state consistency in distributed SDN control planeErmin Sakic, Fragkiskos Sardis, Jochen W. Guck, Wolfgang Kellerer. 1-7 [doi]
- Process state synchronization for mobility support in mobile cloud computingEjaz Ahmed, Anjum Naveed, Abdullah Gani, Siti Hafizah Ab Hamid, Muhammad Imran Razzak, Mohsen Guizani. 1-6 [doi]
- Hash-based load balanced traffic steering on softswitches for chaining virtualized network functionsMinh-Tuan Thai, Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai. 1-6 [doi]
- Exploiting QoS flexibility for smart grid and IoT applications using TV white spacesNaveed Ul Hassan, Chau Yuen, Muhammad Bershgal Atique. 1-6 [doi]
- Theoretical analysis of PF scheduling with bursty traffic model in OFDMA systemsGuowei Zhang, Jing Xu, Ligang Liu, Yang Yang, Qiang Li, Matti Hamalainen. 1-6 [doi]
- Secret-key binding to physical identifiers with reliability guaranteesOnur Günlü, Anes Belkacem, Bernhard C. Geiger. 1-6 [doi]
- A frequency-domain approach to wideband channel estimation in millimeter wave systemsJavier Rodríguez-Fernández, Kiran Venugopal, Nuria González Prelcic, Robert W. Heath Jr.. 1-7 [doi]
- JP-CoMP with antenna selection for multi-carrier C-RAN with finite backhaul capacityGanesh Venkatraman, Antti Tölli, Jarkko Kaleva, Markku J. Juntti. 1-7 [doi]
- Frequency injection interfacing: A novel method for delivering external information to an OFDM receiver physical layerBilly Kihei, John A. Copeland, Yusun Chang. 1-6 [doi]
- SMS and one-time-password interception in LTE networksSilke Holtmanns, Ian Oliver. 1-6 [doi]
- Cooperation incentives for multi-operator C-RAN energy efficient sharingMatteo Vincenzi, Angelos Antonopoulos, Elli Kartsakli, John S. Vardakas, Luis Alonso 0001, Christos V. Verikoukis. 1-6 [doi]
- A new lower bound on the ergodic capacity of optical MIMO channelsRémi Bonnefoi, Amor Nafkha. 1-4 [doi]
- A probabilistic link prediction model in time-varying social networksSima Das, Sajal K. Das. 1-6 [doi]
- D2D relay management in multi-cell networksJunquan Deng, Olav Tirkkonen, Tao Chen. 1-6 [doi]
- Energy management in large-scale MIMO systems with per-antenna energy harvestingRami Hamdi, Elmahdi Driouch, Wessam Ajib. 1-6 [doi]
- Pilot hopping in massive MIMO systems: Spectral efficiency analysis and achievable ratesAhmed S. Alwakeel, Ahmed Hesham Mehana, Atef M. Ghuniem. 1-6 [doi]
- Autonomous relocation strategies for cells on wheels in environments with prohibited areasLadan Rabieekenari, Kamran Sayrafian, John S. Baras. 1-6 [doi]
- Delay-tolerant resource scheduling in large-scale virtualized radio access networksXianfu Chen, Huaqing Zhang, Zhu Han. 1-6 [doi]
- A secure PMIPv6-based group mobility scheme for 6L0WPAN networksYue Qiu, Maode Ma. 1-6 [doi]
- Bitrate adaptation in backward-shifted coding for HTTP adaptive video streamingZakaria Ye, Rachid El Azouzi, Tania Jiménez, Francesco De Pellegrini, Stefan Valentin. 1-6 [doi]
- Efficient wireless mobile networks communications applied to e-healthSofiane Hamrioui, Pascal Lorenz. 1-6 [doi]
- Delay-bounded and minimal energy broadcast in satellite networks with multi-power levelsWenqiang Liu, Zhiyi Wang, Tao Lv, Hejiao Huang, Xiaohua Jia. 1-6 [doi]
- Multiple constrained QoS routing with RPLWalid Khallef, Miklós Molnár, Abderrahim Benslimane, Sylvain Durand. 1-6 [doi]
- A* algorithm based power minimization for discontinuous operations in G.fastAnkita Raj, Pravesh Biyani, Sandip Aine. 1-6 [doi]
- A new framework for peer-to-peer energy sharing and coordination in the energy internetYanglin Zhou, Song Ci, Hongjia Li, Yang Yang. 1-6 [doi]
- On-demand mobility support with anchor chains in information centric networksAytac Azgin, Ravishankar Ravindran, Guoqiang Wang. 1-7 [doi]
- Power minimization strategies in downlink MIMO-NOMA systemsJingjing Cui, Zhiguo Ding, Pingzhi Fan. 1-6 [doi]
- Designing optimum mother constellation and codebooks for SCMAMehmood Alam, Qi Zhang. 1-6 [doi]
- A game theoretical framework for improving the quality of service in cooperative RAN cachingChang Yang, Hongjia Li, Liming Wang, Zhen Xu. 1-7 [doi]
- Leveraging multiple coflow attributes for information-agnostic coflow schedulingShuo Wang, Jiao Zhang, Tao Huang, Tian Pan, Jiang Liu, Yunjie Liu. 1-6 [doi]
- On optimizing scalable video delivery over media aware mobile cloudsIlias Politis, Christos Tselios, Asimakis Lykourgiotis, Stavros Kotsopoulos. 1-6 [doi]
- A trust networks recommender algorithm based on Latent Factor ModelShangru Zhong, WeiYang Zhang, Qiang Zhang, Kai Lei. 1-7 [doi]
- On reducing optical monitoring uncertainties and localizing soft failuresIppokratis Sartzetakis, Konstantinos Christodoulopoulos, Emmanouel Manos Varvarigos. 1-6 [doi]
- Link packing in mmWave networksYasaman Ghasempour, Narayan Prasad, Mohammad Ali Amir Khojastepour, Sampath Rangarajan. 1-7 [doi]
- Multicast channel communication with interactive receiver cooperation over orthogonal linksVictor Exposito, Sheng Yang, Nicolas Gresset. 1-6 [doi]
- Throughput analysis of the two-way relay system with network coding and energy harvestingHaifeng Cao, Liqun Fu, Hongning Dai. 1-6 [doi]
- Millimeter-wave/terahertz massive MIMO BDMA transmission with per-beam synchronizationLi You, Xiqi Gao, Geoffrey Ye Li, Xiang-Gen Xia, Ni Ma. 1-6 [doi]
- Monitoring the status of iBeacons with crowd sensingYingying Guo, Yan Sun, Tin Yu Wu, Mohammad S. Obaidat, Wei-Tsong Lee. 1-7 [doi]
- Enhanced user datagram protocol for video streaming in VANETSofiane Zaidi, Salim Bitam, Abdelhamid Mellouk. 1-6 [doi]
- On-the-fly traffic classification and control with a stateful SDN approachAndrea Bianco, Paolo Giaccone, Seyedaidin Kelki, Nicolas Mejia Campos, Stefano Traverso, Tianzhu Zhang. 1-6 [doi]
- Exploiting LTE white space using dynamic spectrum access algorithms based on survival analysisTimothy A. Hall, Anirudha Sahoo, Charles Hagwood, Sarah Streett. 1-7 [doi]
- Physical layer security: A WFRFT-basec cooperation approachXiaojie Fang, Ning Zhang 0007, Xuejun Sha, Dajiang Chen, Xuanli Wu, Xuemin Sherman Shen. 1-6 [doi]
- QoS-aware data replications and placements for query evaluation of big data analyticsQiufen Xia, Weifa Liang, Zichuan Xu. 1-7 [doi]
- Relay employment problem for unacknowledged transmissions: Myopic policy and structureKesav Kaza, Rahul Meshram, S. N. Merchant. 1-7 [doi]
- Performance evaluation of LoRa networks in a smart city scenarioDavide Magrin, Marco Centenaro, Lorenzo Vangelista. 1-7 [doi]
- Using personal information to aid in guessing passwords of Chinese websChen Su, Yuesheng Zhu. 1-6 [doi]
- Optimal transmission policy in energy harvesting wireless communications: A learning approachKeyu Wu, Chintha Tellambura, Hai Jiang. 1-6 [doi]
- LLE: A timer extension mechanism for alarm-triggered traffic in IEEE 802.11ah WLANsXin Zhang, Kwan L. Yeung. 1-6 [doi]
- A delay-based cross-layer scheduler for adaptive DSLJeremy Van den Eynde, Jeroen Verdyck, Marc Moonen, Chris Blondia. 1-6 [doi]
- Software defined media: Virtualization of audio-visual servicesManabu Tsukada, Keiko Ogawa, Masahiro Ikeda, Takuro Sone, Kenta Niwa, Shoichiro Saito, Takashi Kasuya, Hideki Sunahara, Hiroshi Esaki. 1-7 [doi]
- Learning to survive: Achieving energy neutrality in wireless sensor networks using reinforcement learningFayçal Ait Aoudia, Matthieu Gautier, Olivier Berder. 1-6 [doi]
- Efficient coding based heterogeneous data access in vehicular networksG. G. Md. Nawaz Ali, Md. Ashiqur Rahman, Syeda Khairunnesa Samantha, Yumeng Gao, Peter H. J. Chong, Yong Liang Guan. 1-6 [doi]
- A new RF beam training method for multi-user millimeter wave systemsTaeseok Oh, Chang-Ick Song, Jaehoon Jung, Inkyu Lee. 1-6 [doi]
- Logarithmic gravity centrality for identifying influential spreaders in dynamic large-scale social networksJianwei Niu 0002, Haifeng Yang, Lei Wang. 1-6 [doi]
- Device-to-device communications underlaying cellular networks in unlicensed bandsHongliang Zhang, Yun Liao, Lingyang Song. 1-6 [doi]
- Max progressive network updateYang Chen, Jie Wu. 1-6 [doi]
- Data offloading in mobile cloud computing: A Markov Decision Process approachDongqing Liu, Lyes Khoukhi, Abdelhakim Hafid. 1-6 [doi]
- Cooperative multicast non-orthogonal multiple access in cognitive radioYingyang Chen, Li Wang, Bingli Jiao. 1-6 [doi]
- 3D vision attack against authenticationZupei Li, Qinggang Yue, Chuta Sano, Wei Yu 0002, Xinwen Fu. 1-6 [doi]
- In-switch dynamic flow aggregation in software defined networksTzu-Yu Chao, Kuochen Wang, Lichun Wang, Chain-Wu Lee. 1-6 [doi]
- Hybrid precoding and combining design for millimeter-wave multi-user MIMO based on SVDAng Li, Christos Masouros. 1-6 [doi]
- Energy-spectral efficiency tradeoff for heterogeneous networks with QoS constraintsCemil Can Coskun, Ender Ayanoglu. 1-7 [doi]
- Content offloading via D2D communications based on user interests and sharing willingnessYi-Jin Pan, Cunhua Pan, Huiling Zhu, Qasim Zeeshan Ahmed, Ming Chen, Jiangzhou Wang. 1-6 [doi]
- Cross-object coding and allocation (COCA) for distributed storage systemsLuoyang Fang, Rongqing Zhang 0001, Xiang Cheng 0001, Liuqing Yang 0001. 1-6 [doi]
- Dynamic switch-controller association and control devolution for SDN systemsXi Huang, Simeng Bian, Ziyu Shao, Hong Xu. 1-6 [doi]
- Detecting radio frequency interference for CSI measurements on COTS WiFi devicesYue Zheng, Chenshu Wu, Kun Qian, Zheng Yang, Yunhao Liu. 1-6 [doi]
- A resource allocation scheme based on Semi-Markov Decision Process for dynamic vehicular cloudsRodolfo Ipolito Meneguette, Azzedine Boukerche, Adinovam H. M. Pimenta, Messias Meneguette. 1-6 [doi]
- Feature-level fusion of physiological parameters to be used as cryptographic keysDuygu Karaoglan Altop, Albert Levi, Volkan Tuzcu. 1-6 [doi]
- LoCo - link: A low-complexity link selection algorithm for delay mitigation in asymmetric two-hop networksNikolaos Nomikos, Themistoklis Charalambous, Demosthenes Vouyioukas, George K. Karagiannidis. 1-6 [doi]
- Indoor WLAN localization using high-dimensional manifold alignment with limited calibration loadMu Zhou, Qiao Zhang, Zengshan Tian, Yanmeng Wang. 1-6 [doi]
- Multicast interference alignment in a multi-group multi-way relaying networkDaniel Papsdorf, Yuri C. B. Silva, Anja Klein 0002. 1-6 [doi]
- Collaborative hierarchical caching for traffic offloading in heterogeneous networksXiuhua Li, Xiaofei Wang, Keqiu Li, Victor C. M. Leung. 1-6 [doi]
- Efficient network-coded relaying systems with energy harvesting and transferringNan Qi, Ming Xiao, Theodoros A. Tsiftsis, Lin Zhang, Mikael Skoglund, Huisheng Zhang. 1-6 [doi]
- Traffic-aware task placement with guaranteed job completion time for geo-distributed big dataPeng Li, Toshiaki Miyazaki, Song Guo. 1-6 [doi]
- Process parameter estimation oriented industrial wireless sensor networks: A sequential approachFeilong Lin, Shanying Zhu, Cailian Chen, Xinping Guan. 1-6 [doi]
- OWCell: Optical wireless cellular data center network architectureAbdelbaset S. Hamza, Suraj Yadav, Suraj Ketan, Jitender S. Deogun, Dennis R. Alexander. 1-6 [doi]
- Control of charging of electric vehicles through menu-based pricing under uncertaintyArnob Ghosh, Vaneet Aggarwal. 1-6 [doi]
- On the performance of NCC-OFDMA systems in the presence of carrier frequency offsetAli Reza Heidarpour, Gunes Karabulut Kurt, Murat Uysal. 1-6 [doi]
- An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computingJing Li, Zhitao Guan, Xiaojiang Du, Zijian Zhang, Jun Wu. 1-6 [doi]
- New era in shared C-RAN and core network: A case study for efficient RRH usageOmer Narmanlioglu, Engin Zeydan. 1-7 [doi]
- Multiuser precoding and channel estimation for hybrid millimeter wave MIMO systemsLou Zhao, Derrick Wing Kwan Ng, Jinhong Yuan. 1-7 [doi]
- Analytical estimation schemes for optical unipolar OFDM transmission over AWGNRonald Mulinde, Khoa D. Nguyen, William G. Cowley. 1-6 [doi]
- Full-duplex MIMO relay system design based on SCMAShuai Han, Jiaqi Zhang, Cheng Guo, Ningqing Liu. 1-5 [doi]
- Riding on the primary: A new spectrum sharing paradigm for wireless-powered IoT devicesXin Kang, Ying-Chang Liang, Jing Yang. 1-6 [doi]
- Evaluation of MU-TXOP sharing probabilities in IEEE 802.11acM. Zulfiker Ali, Jelena V. Misic, Vojislav B. Misic. 1-6 [doi]
- Multi-channel broadcast in asymmetric duty cycling wireless body area networksRongrong Zhang, Hassine Moungla, Jihong Yu, Lin Chen 0002, Ahmed Mehaoua. 1-6 [doi]
- Multi-resource allocation in cloud radio access networksNuo Yu, Zhaohui Song, Hongwei Du, Hejiao Huang, Xiaohua Jia. 1-6 [doi]
- Energy harvesting random underlay cognitive networks with power controlSachitha Kusaladharma, Chintha Tellambura. 1-6 [doi]
- PABO: Congestion mitigation via packet bounceXiang Shi, Lin Wang, Fa Zhang, Kai Zheng 0003, Zhiyong Liu. 1-6 [doi]
- Localization of a silent target node in magnetic induction based wireless underground sensor networksSteven Kisseleff, Xi Chen, Ian F. Akyildiz, Wolfgang H. Gerstacker. 1-7 [doi]
- Towards efficient data access in mobile cloud computing using pre-fetching and cachingHou Zhijun, Robson E. De Grande, Azzedine Boukerche. 1-6 [doi]
- Shift and mutually orthogonal, multi-band pilot schemes for large-scale MIMO-OFDM systemsUlas Güntürkün, Christian Schlegel. 1-7 [doi]
- CiFi: Deep convolutional neural networks for indoor localization with 5 GHz Wi-FiXuyu Wang, Xiangyu Wang, Shiwen Mao. 1-6 [doi]
- Optimization of cache-enabled opportunistic interference alignment wireless networks: A big data deep reinforcement learning approachYing He, Chengchao Liang, F. Richard Yu, Nan Zhao, Hongxi Yin. 1-6 [doi]
- Binary index codes using l-th NMDS codesAnoop Thomas, B. Sundar Rajan. 1-6 [doi]
- Providing consistent rates for backhauling of mobile base stations in public urban transportationFidan Mehmeti, Catherine Rosenberg. 1-7 [doi]
- Filter-bank based adaptive transmission for underlay cognitive radioNour Mansour, Dirk Dahlhaus. 1-7 [doi]
- On the relation between the asymptotic performance of different algorithms for information bottleneck frameworkShayan Hassanpour, Dirk Wübben, Armin Dekorsy, Brian M. Kurkoski. 1-6 [doi]
- CovertMIMO: A covert uplink transmission scheme for MIMO systemsXiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun. 1-6 [doi]
- Optimal transmit power and active interference mitigation of underlay MIMO cognitive systemsNikolaos I. Miridakis, Minghua Xia, Theodoros A. Tsiftsis. 1-6 [doi]
- Energy efficient mobile edge computing in dense cellular networksLixing Chen, Sheng Zhou, Jie Xu. 1-6 [doi]
- Optimal time sharing in RF-powered backscatter cognitive radio networksDinh Thai Hoang, Dusit Niyato, Ping Wang, Dong In Kim. 1-6 [doi]
- S-ROGUE: Routing protocol for unmanned systems on the surfaceSébastien Bindel, Serge Chaumette, Benoît Hilt, Pascal Lorenz. 1-7 [doi]
- AutoPatchDroid: A framework for patching inter-app vulnerabilities in android applicationJiayun Xie, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani. 1-6 [doi]
- On network coded filesystem shim: Over-the-top multipath multi-source made easyChres W. Sørensen, Daniel E. Lucani, Muriel Médard. 1-7 [doi]
- Efficient joint subcarrier and power allocation for achieving green multiuser full-duplex decode-and-forward relay networksKeshav Singh, Ankit Gupta, Tharmalingam Ratnarajah. 1-6 [doi]
- Multicast-pushing with human-in-the-loop: Where social networks meet wireless communicationsQi Yan, Wei Chen, Bo Bai 0001, H. Vincent Poor. 1-6 [doi]
- Radio-over-modes for C-RAN architecture with smart optical resources assignmentLorenzo Combi, Andrea Matera, Alberto Gatto, Paola Parolari, Pierpaolo Boffi, Umberto Spagnolini. 1-6 [doi]
- Massive MIMO relaying assisted D2D with opportunistic energy harvestingKaifeng Guo, Sida Dai, Gerd Ascheid. 1-7 [doi]
- On the diversity of partial relaying cooperation with relay selection in finite-SNR regimeThang X. Vu, Symeon Chatzinotas, Björn E. Ottersten. 1-6 [doi]
- Clustering analysis for malicious network trafficJie Wang, Lili Yang, Jie Wu, Jemal H. Abawajy. 1-6 [doi]
- Energy-efficient proactive scheduling in ultra dense networksMatthieu De Mari, Tony Q. S. Quek. 1-6 [doi]
- Profit maximization in wireless powered communications with improved non-linear energy conversion and storage efficienciesLiqin Shi, Liqiang Zhao, Kai Liang, Xiaoli Chu, Gang Wu, Hsiao-Hwa Chen. 1-6 [doi]
- Error rates of a full-duplex system over EGK fading channels subject to laplacian interferenceHamza Soury, Hesham ElSawy, Mohamed-Slim Alouini. 1-7 [doi]
- Generic application layer protocol translation for IPv4/IPv6 transitionCong Liu, Yong Cui, Chaokun Zhang, Jianping Wu. 1-6 [doi]
- SHIPHER: A new family of light-weight block ciphers based on dynamic operatorsXiali Hei, Binheng Song, Caijin Ling. 1-7 [doi]
- Localization in long-range ultra narrow band IoT networks using RSSIHazem Sallouha, Alessandro Chiumento, Sofie Pollin. 1-6 [doi]
- Random caching based cooperative transmission in heterogeneous wireless networksWanli Wen, Ying Cui, Fu-Chun Zheng, Shi Jin. 1-6 [doi]
- Achieving personalized and privacy-preserving range queries over outsourced cloud dataYao Shen, Liusheng Huang, Wei Yang. 1-6 [doi]
- Social stability enhanced mobile D2D relay networks: An optimal stopping approachHe Zhang, Qinghe Du, Pinyi Ren, Zehua Wang. 1-6 [doi]
- Distributed faulty node detection in DTNs in presence of Byzantine attackWenjie Li, Francesca Bassi, Michel Kieffer, Alex Calisti, Gianni Pasolini, Davide Dardari. 1-6 [doi]
- A vehicular network based intelligent lane change assistance protocol for highwaysMaram Bani Younes, Azzedine Boukerche. 1-6 [doi]
- Ping-pong beam training with hybrid digital-analog antenna arraysCarles Navarro i Manchon, Elisabeth de Carvalho, Jørgen Bach Andersen. 1-7 [doi]
- Secure outage probability over κ-μ fading channelsShunya Iwata, Tomoaki Ohtsuki, Pooi Yuen Kam. 1-6 [doi]
- Online learning for interference coordination in heterogeneous networksJose A. Ayala-Romero, Juan J. Alcaraz, Javier Vales-Alonso, Esteban Egea-López. 1-6 [doi]
- Learning automata based optimized multipath routingusing leapfrog algorithm for VANETsVankadara Saritha, P. Venkata Krishna, Sudip Misra, Mohammad S. Obaidat. 1-5 [doi]
- Cloud-based eHealth video encoding system for real time thermographic streaming: Performance evaluationMiguel Garcia-Pineda, Jaume Segura-Garcia, Santiago Felici-Castell, Joel J. P. C. Rodrigues. 1-6 [doi]
- Performance modeling of the middleware overlay infrastructure of mobile thingsGeorgios Bouloukakis, Ioannis D. Moscholios, Nikolaos Georgantas, Valérie Issarny. 1-6 [doi]
- Analytical energy-efficient planning of 5G cloud radio access networkRiccardo Bassoli, Marco Di Renzo, Fabrizio Granelli. 1-4 [doi]
- Focusing on a probability element: Parameter selection of message importance measure in big dataRui She, Shanyun Liu, Yunquan Dong, Pingyi Fan. 1-6 [doi]
- Optimization of primary exclusive region in spatial grid-based spectrum database using stochastic GeometryShota Yamashita, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura. 1-6 [doi]
- Receiver-driven flow scheduling for commodity datacentersAadil Zia Khan, Ihsan Ayyub Qazi. 1-6 [doi]
- Robust resource allocation and clustering formulation for multicast C-RAN with impaired CSIDi Chen, Volker Kühn 0001. 1-6 [doi]
- Privacy preserving clock auction for emergency demand response in colocation data centersSai Mounika Errapotu, Justin Loveless, Rong Yu, Shaolei Ren, Miao Pan, Zhu Han. 1-6 [doi]
- Recommending access points to individual mobile users via automatic group learningBahar Partov, Douglas J. Leith, Alessandro Checco. 1-6 [doi]
- Graph compaction in analyzing large scale online social networksSima Das, Jennifer Leopold, Susmita Ghosh, Sajal K. Das. 1-6 [doi]
- Hybrid Rayleigh and Double-Weibull over impaired RF/FSO system with outdated CSIElyes Balti, Mohsen Guizani, Bechir Hamdaoui. 1-6 [doi]
- RSU authentication by aggregation in VANET using an interaction zoneAmina Bendouma, Boucif Amar Bensaber. 1-6 [doi]
- Wi-fire: Device-free fire detection using WiFi networksShuxin Zhong, Yongzhi Huang, Rukhsana Ruby, Lu Wang, Yu-Xuan Qiu, Kaishun Wu. 1-6 [doi]
- Cooperative receiver for ambient backscatter communications with multiple antennasGang Yang, Ying-Chang Liang, Qianqian Zhang. 1-6 [doi]
- Preference-aware Fast Interest Forwarding for video streaming in information-centric VANETsMu Wang, Changqiao Xu, Shijie Jia, Jianfeng Guan, Luigi Alfredo Grieco. 1-7 [doi]
- Identity management using blockchain for cognitive cellular networksSaravanan Raju, Sai Boddepalli, Suraj Gampa, Qiben Yan, Jitender S. Deogun. 1-6 [doi]
- VXVDEX: Internet of threads and networks of namespacesRenzo Davoli. 1-6 [doi]
- Stochastic/deterministic behavior of cross polarization discrimination in mmWave channelsNaveed Iqbal, Jian Luo, Christian Schneider, Diego A. Dupleich, Robert Müller, Stephan Hafner, Reiner S. Thomä. 1-5 [doi]
- An efficient fuzzy rule-based big data analytics scheme for providing healthcare-as-a-serviceAnish Jindal, Amit Dua, Neeraj Kumar, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues. 1-6 [doi]
- Towards construction of efficient and optimally resilient VPN topologies by exactly calculating Maximum Disjoint PathsMartin Backhaus, Guenter Schaefer. 1-6 [doi]
- Protecting web contents against persistent distributed crawlersShengye Wan, Yue Li, Kun Sun. 1-6 [doi]
- The right content for the right relay in self-organizing delay tolerant networks: A matching game perspectiveSara Arabi, Essaid Sabir, Tarik Taleb, Mohamed Sadik. 1-6 [doi]
- Missing tag identification in open RFID systemsYanyan Wang, Jia Liu, Xia Wang, Feng Zhu, Lijun Chen. 1-6 [doi]
- A color gamut mapping scheme for backward compatible UHD video distributionMaryam Azimi, Timothee-Florian Bronner, Panos Nasiopoulos, Mahsa T. Pourazad. 1-5 [doi]
- Jamming resiliency and mobility management in cognitive communication networksNadia Adem, Bechir Hamdaoui. 1-6 [doi]
- Characterizing the impact of interference through spectral analysis on commercial 802.11 devicesKostas Chounos, Stratos Keranidis, Thanasis Korakis, Leandros Tassiulas. 1-6 [doi]
- Effective capacity analysis for underlay cognitive satellite-terrestrial networksYuhan Ruan, Yongzhao Li, Cheng-Xiang Wang, Rui Zhang, Hailin Zhang. 1-6 [doi]
- Artificial-noise-aided beamforming design against a multi-antenna eavesdropper under secrecy outage constraintBo Wang, Pengcheng Mu, Zongze Li, Weile Zhang, Hui-Ming Wang, Qinye Yin. 1-6 [doi]
- An efficient optimal algorithm for integer-forcing linear MIMO receivers designJinming Wen, Lanping Li, Xiaohu Tang, Wai Ho Mow, Chintha Tellambura. 1-6 [doi]
- Variational inequality approach to spectrum balancing in vectoring xDSL networksMartin Wolkerstorfer, Christoph F. Mecklenbrauker. 1-7 [doi]
- Scheduling and power allocation in self-backhauled full duplex small cellsSanjay Goyal, Pei Liu, Shivendra S. Panwar. 1-7 [doi]
- Bias reduced method for TDOA and AOA localization in the presence of sensor errorsYue Zhao, Zan Li, Benjian Hao, Jiangbo Si, Pengwu Wan. 1-6 [doi]
- Pilot-less high-rate block transmission with two-dimensional basis expansion model for doubly-selective fading MIMO systemsToshiaki Koike-Akino, Philip V. Orlik, Keyong Jin Kim. 1-7 [doi]
- LTE-based passive device-free crowd density estimationSimone Di Domenico, Mauro De Sanctis, Ernestina Cianca, Paolo Colucci, Giuseppe Bianchi. 1-6 [doi]
- Ultra reliable communication via optimum power allocation for type-I ARQ in finite block-lengthEndrit Dosti, Uditha Lakmal Wijewardhana, Hirley Alves, Matti Latva-aho. 1-6 [doi]
- An efficient joint sub-Nyquist spectrum sensing scheme with geolocation database over TV white spaceYuan Ma, Xingjian Zhang, Yue Gao Queen Mary. 1-6 [doi]
- Beamforming design with combined channel estimate and covariance CSIT via random matrix theoryWassim Tabikh, Yi Yuan-Wu, Dirk T. M. Slock. 1-5 [doi]
- Optimal priority-queuing for EV charging-discharging service based on cloud computingChekired Djabir Abd Eldjalil, Lyes Khoukhi. 1-6 [doi]
- Energy efficient 3D positioning of micro unmanned aerial vehicles for underlay cognitive radio systemsHakim Ghazzai, Mahdi Ben Ghorbel, Abdullah Kadri, Md. Jahangir Hossain. 1-6 [doi]
- On the secure degrees-of-freedom of partially connected networks with no CSITMohamed Adel Attia, Ravi Tandon. 1-6 [doi]
- Influence maximization on twitter: A mechanism for effective marketing campaignYan Mei, Weiliang Zhao, Jian Yang 0001. 1-6 [doi]
- A memory-assisted MAC protocol with angular-division-multiplexing in terahertz networksChong Han, Wenqian Tong, Xinyi Wu. 1-6 [doi]
- An IoT service-oriented system for agriculture monitoringCarlos Cambra Baseca, Sandra Sendra, Jaime Lloret, Laura García. 1-6 [doi]
- Channel sparsification beamforming for internet-of-things systemsHyoungju Ji, Byonghyo Shim, Jun Won Choi. 1-5 [doi]
- Unequal error protection for video streaming using delay-aware fountain codesKairan Sun, Dapeng Wu 0001. 1-6 [doi]
- A novel video-based application for road markings detection and recognitionZongzhi Tang, Azzedine Boukerche. 1-6 [doi]
- Qualia: A multilayer solution for QoE passive monitoring at the user terminalArslan Ahmad, Luigi Atzori, Maria G. Martini. 1-6 [doi]
- Fundamental tradeoffs in resource provisioning for IoT services over cellular networksAmin Azari, Guowang Miao. 1-7 [doi]
- Asymptotic analysis of cooperative massive MIMO networks with user centric clusteringSiddhartan Govindasamy, Itsik Bergel. 1-6 [doi]
- Towards bootstrapping trust in D2D using PGP and reputation mechanismMuhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Fabrizio Granelli. 1-6 [doi]
- Gaussian broadcast channels with receiver cache assignmentShirin Saeedi Bidokhti, Michele A. Wigger, Aylin Yener. 1-6 [doi]
- A simplified deterministic channel model for user mobility investigations in 5G networksAhmad Awada 0002, Andreas Lobinger, Anton Enqvist, Anup Talukdar, Ingo Viering. 1-7 [doi]
- Performance of taylor-kuznetsov memories under timing errorsElsa Dupraz, Bane Vasic, David Declercq. 1-5 [doi]
- Single-point model of MIMO-UWB indoor systems using time-reversal transmissionEleni Bogdani, Demosthenes Vouyioukas, Nikolaos Nomikos, Dimitrios N. Skoutas, Charalambos Skianis. 1-6 [doi]
- Secure transmissions in wireless ad hoc networks using hybrid half and full duplex receiversTong-Xing Zheng, Qian Yang, Yi Zhang, Hui-Ming Wang, Pengcheng Mu. 1-6 [doi]
- A failure avoidance oriented approach for virtual network reliability enhancementShuopeng Li, Mohand Yazid Saidi, Ken Chen. 1-6 [doi]
- An effective DDoS defense scheme for SDNXueli Huang, Xiaojiang Du, Bin Song. 1-6 [doi]
- Predicting hypertensive disorders in high-risk pregnancy using the random forest approachMario W. L. Moreira, Joel J. P. C. Rodrigues, Antonio M. B. Oliveira, Kashif Saleem, Augusto José Venâncio Neto. 1-5 [doi]
- SRA: Slot reservation announcement scheme for medium access control of IEEE 802.11 crowded networks in emergency scenariosSina Fathi Kazerooni, Roberto Rojas-Cessa. 1-6 [doi]
- An asynchronous high-throughput random access protocol for low power wide area networksVicente Almonacid, Laurent Franck. 1-6 [doi]
- High-performance multicast services in 5G big data network with massive MIMOKe Xiao, Fenghe Wang, Humphrey Rutagemwa, Michel Kadoch, Bo Rong. 1-6 [doi]
- Connectivity maximization for narrowband IoT systems with NOMAAhmed Elhamy Mostafa, Yong Zhou, Vincent W. S. Wong. 1-6 [doi]
- SICC: SDN-based incast congestion control for data centersAhmed M. Abdelmoniem, Brahim Bensaou, Amuda James Abu. 1-6 [doi]
- A trace-driven evaluation of cloud computing schedulers for IaaSZhihao Yao, Ioannis Papapanagiotou. 1-6 [doi]
- Performance analysis of faster than symbol rate sampling in 1-bit massive MIMO systemsAli Bulut Üçüncü, Ali Özgür Yilmaz. 1-6 [doi]
- A PSO model with VM migration and transmission power control for low Service Delay in the multiple cloudlets ECC scenarioTiago Gama Rodrigues, Katsuya Suto, Hiroki Nishiyama, Nei Kato. 1-6 [doi]
- Capacity limits of LoRaWAN technology for smart metering applicationsNadège Varsier, Jean Schwoerer. 1-6 [doi]
- A joint dedupe-fountain coded archival storageSuayb S. Arslan, Turguy Goker, Rod Wideman. 1-7 [doi]
- Big data aided aggregation coding multiple access for machine type communicationsYanhuan Sun, Sihai Zhang, Jinkang Zhu, Wuyang Zhou, Zhen Wang. 1-6 [doi]
- A centrality-based RSU deployment approach for vehicular ad hoc networksZhenyu Wang, Jun Zheng, Yuying Wu, Nathalie Mitton. 1-5 [doi]
- An altruistic service channel selection scheme for V2V infotainment applicationsMohammed Amine Togou, Lyes Khoukhi, Abdelhakim Hafid. 1-6 [doi]
- Manifold optimization algorithms for SWIPT over MIMO broadcast channels with discrete input signalsAnan Lu, Xiqi Gao, Yahong Rosa Zheng, Chengshan Xiao. 1-6 [doi]
- Robust regression for anomaly detectionZiyu Wang, Jiahai Yang, Shize Zhang, Chenxi Li. 1-6 [doi]
- A new EEG-based causal information measure for identifying brain connectivity in response to perceived audio qualityKetan Mehta, Jörg Kliewer. 1-6 [doi]
- Predictive resource allocation evaluation with real channel measurementsSuhail Ahmad, Rikard Reinhagen, L. Srikar Muppirisetty, Henk Wymeersch. 1-5 [doi]
- Study on 3GPP rural macrocell path loss models for millimeter wave wireless communicationsGeorge R. MacCartney, Theodore S. Rappaport. 1-7 [doi]
- Outage and spectral efficiency study in cooperative wireless heterogeneous networksBei Xie, Zekun Zhang, Rose Qingyang Hu, Yi Qian. 1-6 [doi]
- CryptMDB: A practical encrypted MongoDB over big dataGuowen Xu, Yan Ren, Hongwei Li, Dongxiao Liu, Yuanshun Dai, Kan Yang. 1-6 [doi]
- A deep reinforcement learning based framework for power-efficient resource allocation in cloud RANsZhiyuan Xu, Yanzhi Wang, Jian Tang, Jing Wang, Mustafa Cenk Gursoy. 1-6 [doi]
- Pedestrian dead reckoning trajectory matching method for radio map crowdsourcing building in WiFi indoor positioning systemLin Ma, Yanyun Fan, Yubin Xu, Yang Cui. 1-6 [doi]
- Detection of active eavesdropper using source enumeration method in massive MIMOKunpeng Yuan, Li Guo 0004, Chao Dong, Tianyu Kang. 1-5 [doi]
- Downlink scheduling for heterogeneous traffic with Gaussian weights in LTE-ANasim Ferdosian, Mohamed Othman, Kweh Yeah Lun, Borhanuddin Mohd Ali. 1-6 [doi]
- Enabling device-to-device communications in LTE-unlicensed spectrumBodong Shang, Liqiang Zhao, Kwang-Cheng Chen. 1-6 [doi]
- Fly and recharge: Achieving persistent coverage using Small Unmanned Aerial Vehicles (SUAVs)Angelo Trotta, Marco Di Felice, Kaushik R. Chowdhury, Luciano Bononi. 1-7 [doi]
- Blockage and Coverage Analysis with MmWave Cross Street BSs Near Urban IntersectionsYuyang Wang, Kiran Venugopal, Andreas F. Molisch, Robert W. Heath Jr.. 1-6 [doi]
- Multi-user millimeter wave MIMO with single-sided full-dimensional lens antenna arrayYong Zeng, Lu Yang, Rui Zhang. 1-6 [doi]
- Benefits of joint planning of small cells and fiber backhaul in 5G dense cellular networksFederico Tonini, Matteo Fiorani, Carla Raffaelli, Lena Wosinska, Paolo Monti. 1-6 [doi]
- Worst-case robust sum rate maximization for full-duplex bi-directional MIMO systems under channel knowledge uncertaintyOmid Taghizadeh, Rudolf Mathar. 1-7 [doi]
- A fast algorithm for multi-group multicast beamforming in large-scale wireless systemsErkai Chen, Meixia Tao. 1-6 [doi]
- The effect of buffer management strategies on 6LoWPAN's response to buffer reservation attacksAhmed Raoof, Ashraf Matrawy. 1-7 [doi]
- Optimizing availability in CoMP and CA-enabled HetNetsJie Jia, Yansha Deng, Jian Chen, Hamid Aghvami, Arumugam Nallanathan, Xingwei Wang. 1-6 [doi]
- Bayesian learning based multiuser detection for M2M communications with time-varying user activitiesXiaoxu Zhang, Ying-Chang Liang, Jun Fang. 1-6 [doi]
- Unequal steganography with unequal error protection for wireless physiological signal transmissionNeerja Sahu, Dongming Peng, Hamid Sharif. 1-6 [doi]
- An efficient management of the control channel bandwidth in VANETsNoureddine Haouari, Samira Moussaoui, Sidi-Mohammed Senouci, Abdelwahab Boualouache, Mohamed Ayoub Messous. 1-6 [doi]
- Connectivity and coverage in machine-type communicationsPanagiotis G. Sarigiannidis, Theodoros Zygiridis, Antonios Sarigiannidis, Thomas D. Lagkas, Mohammad S. Obaidat, Nikolaos V. Kantartzis. 1-6 [doi]
- Power line network topology identification using admittance measurements and total least squares estimationFederico Passerini, Andrea M. Tonello. 1-6 [doi]
- Axonal transmission analysis in neuro-spike communicationKeyvan Aghababaiyan, Behrouz Maham. 1-6 [doi]
- 3D vs. 2D channel models: Spatial correlation and channel capacity comparison and analysisYawei Yu, Peter J. Smith, Pawel A. Dmochowski, Jianhua Zhang, Mansoor Shafi. 1-7 [doi]
- Interference networks with caches at both endsJoan S. Pujol Roig, Deniz Gündüz, Filippo Tosato. 1-6 [doi]
- Detecting mobile botnets through machine learning and system calls analysisVictor G. T. da Costa, Sylvio Barbon, Rodrigo Sanches Miani, Joel J. P. C. Rodrigues, Bruno Bogaz Zarpelão. 1-6 [doi]
- Detection and coding schemes for parallel interference in resistive memoriesYuval Ben-Hur, Yuval Cassuto. 1-7 [doi]
- Opportunistic secure transmission for wireless relay networks with modify-and-forward protocolQuoc-Tuan Vien, Tuan Anh Le, Trung Q. Duong. 1-6 [doi]
- Block-filtered OFDM: A novel waveform for future wireless technologiesDavid Demmer, Robin Gerzaguet, Jean-Baptiste Dore, Didier Le Ruyet, Dimitri Ktenas. 1-6 [doi]
- A tractable framework for performance analysis of dense multi-antenna networksXianghao Yu, Chang Li, Jun Zhang, Khaled Ben Letaief. 1-6 [doi]
- Secure D2D-enabled cellular communication against selective eavesdroppingWeidong Mei, Zhi Chen, Jun Fang, Bin Fu. 1-7 [doi]
- Adaptive Monte Carlo algorithm to global radio resources optimization in H-CRANMatias Artur Klafke Schimuneck, Maicon Kist, Juergen Rochol, Ana Carolina Ribeiro-Teixeira, Cristiano Bonato Both. 1-6 [doi]
- Robust and low complexity Bayesian data fusion for hybrid cooperative vehicular localizationGia-Minh Hoang, Benoît Denis, Jérôme Härri, Dirk T. M. Slock. 1-6 [doi]
- Cooperative multiuser modulation classification in multipath channels via expectation-maximizationJingwen Zhang, Fanggang Wang, Zhangdui Zhong, Danijela Cabric. 1-6 [doi]
- Physical Sidelink Control Channel (PSCCH) in Mode 2: Performance analysisDavid W. Griffith, Fernando J. Cintron, Richard Rouil. 1-7 [doi]
- A DNA strand displacement reaction implementation-friendly clock designDonglin Wen, Lulu Ge, Yuxiang Lu, Chuan Zhang, Xiaohu You. 1-6 [doi]
- Cache-aided interference management in wireless cellular networksNavid Naderializadeh, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. 1-7 [doi]
- Wireless noise prevention for mobile agents in smart homePetros Spachos, Liang Song, Konstantinos N. Plataniotis. 1-6 [doi]
- Spectrum and energy efficiency maximization in UAV-enabled mobile relayingJingwei Zhang, Yong Zeng, Rui Zhang. 1-6 [doi]
- Uplink analysis of large MU-MIMO systems with space-constrained arrays in Ricean fadingHarsh Tataria, Peter J. Smith, Michail Matthaiou, Pawel A. Dmochowski. 1-7 [doi]
- A factoring algorithm for probabilistic localization in Underwater Sensor NetworksSalwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah. 1-7 [doi]
- Enhancing RAN throughput by optimizec controller placement in optical metro networksFrancesco Musumeci 0001, Camilla Bellanzon, Massimo Tornatore, Achille Pattavina, Jose Torrijos Gijon. 1-6 [doi]
- Resource allocation for MU-MIMO non-orthogonal multiple access (NOMA) system with interference alignmentZiad Qais Al-Abbasi, Daniel K. C. So, Jie Tang. 1-6 [doi]
- Real-time prediction of length of stay using passive Wi-Fi sensingTruc Viet Le, Baoyang Song, Laura Wynter. 1-6 [doi]
- A practical channel estimation scheme for indoor 60GHz massive MIMO systems via array signal processingDian Fan, Feifei Gao, Gongpu Wang, Zhangdui Zhong, Arumugam Nallanathan. 1-6 [doi]
- Big data challenges and opportunities in the hype of Industry 4.0Maqbool Khan, Xiaotong Wu, Xiaolong Xu, Wanchun Dou. 1-6 [doi]
- Non-binary LDPC coded DPSK modulation for phase noise channelsTudor Ninacs, Balázs Matuz, Gianluigi Liva, Giulio Colavolpe. 1-6 [doi]
- How to optimally allocate resources for coded distributed computing?Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. 1-7 [doi]
- Energy efficiency of two-tier heterogeneous networks with energy harvestingTiejun Lv, Hui Gao, Zai Shi, Xin Su. 1-6 [doi]
- Nanoscale optical communications modulator and acousto-optic transduction with vibrating graphene and resonance energy transferBurhan Gulbahar, Gorkem Memisoglu. 1-7 [doi]
- Impact factor-based group recommendation scheme with privacy preservation in MSNsYuanyuan He, Kuan Zhang, Hanyi Wang, FengHua Li, Ben Niu, Hui Li 0006. 1-6 [doi]
- Asymmetric normalization aided information diffusion for socially-aware mobile networksKai Zhang, Jingjing Wang, Chunxiao Jiang, Kwang-Cheng Chen, Yong Ren. 1-6 [doi]
- A privacy-preserving and truthful tendering framework for vehicle cloud computingAbdulrahman Alamer, Yong Deng, Xiaodong Lin. 1-7 [doi]
- Embedding virtual software-defined networks over distributed hypervisors for vDC formulationHuibai Huang, Shengru Li, Kai Han, Quanying Sun, Daoyun Hu, Zuqing Zhu. 1-6 [doi]
- A queuing method for adaptive censoring in big data processingHongbin Zhu, Xiliang Luo, Fangfei Shen, Hua Qian, Yang Yang. 1-6 [doi]
- Mobility-aware coded-caching scheme for small cell networkTuo Liu, Sheng Zhou, Zhisheng Niu Tsinghua. 1-6 [doi]
- Double iterative waterfilling for sum rate maximization in multicarrier NOMA systemsYaru Fu, Lou Salaun, Chi Wan Sung, Chung Shue Chen, Marceau Coupechoux. 1-6 [doi]
- Supporting multi-bit simultaneous query in wireless networks with coherent analog bloom filterZhenghao Zhang. 1-7 [doi]
- Optimal relay selection and power control for energy-harvesting wireless relay networksYuan Wu, Li Ping Qian, Xuemin Sherman Shen. 1-6 [doi]
- Smart charge scheduling for EVs based on two-way communicationJihene Rezgui, Soumaya Cherkaoui. 1-6 [doi]
- Optimal power splitting for SWIPT-based MIMO DF relay systemsYuan Liu. 1-6 [doi]
- A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systemsYuki Tanigawa, Yu Kozai, Takahiko Saba. 1-6 [doi]
- When brands fight over bands: Sociality in the cognitive radio ecosystemAnna Wisniewska, Bilal Khan, Ala I. Al-Fuqaha, Kirk Dombrowski, Mohammad Abu Shattal. 1-6 [doi]
- Online load balancing for Network Functions VirtualizationTuan-Minh Pham, Thi-Thuy-Lien Nguyen, Serge Fdida, Huynh Thi Thanh Binh. 1-6 [doi]
- Wireless information and power transfer in full-duplex systems with massive antenna arraysMohammadAli Mohammadi, Batu K. Chalise, Himal A. Suraweera, Zhiguo Ding. 1-6 [doi]
- Applying bussgang's theorem to fixed-gain OFDM-based relay networks: A profile decay analysisDavid E. Simmons, Hachem Yassine, Justin P. Coon. 1-6 [doi]
- Performance of differential modulation under rf impairmentsBassant Selim, Paschalis C. Sofotasios, Sami Muhaidat, George K. Karagiannidis, Bayan S. Sharif. 1-6 [doi]
- Discontinuous transmission-enabled licensed-assisted access for energy-efficient hetnetsPei-Rong Li, Kai-Ten Feng. 1-6 [doi]
- Channel training design in full-duplex wiretap channels to enhance physical layer securityShihao Yan, Xiangyun Zhou, Nan (Jonas) Yang, Thushara D. Abhayapala, A. Lee Swindlehurst. 1-6 [doi]
- Seamless handover in IP over ICN networks: A coding approachMohammed Al-Khalidi, Nikolaos Thomos, Martin J. Reed, Mays F. Al-Naday, Dirk Trossen. 1-7 [doi]
- Charge station placement in electric vehicle energy distribution networkJianwen Xu, Ping Yi, Tiantian Xie, Wei Wang, Xin Liu, Ting Zhu. 1-6 [doi]
- Measuring the validity of sensing coverage in the presence of anchor misplacementYaser Al Mtawa, Hossam S. Hassanein, Nidal Nasser. 1-6 [doi]
- Energy-efficient cache resource allocation and QoE optimization for HTTP adaptive bit rate streaming over cellular networksJun-feng Xie, Renchao Xie, Tao Huang, Jiang Liu, Yunjie Liu. 1-6 [doi]
- Quantifying equivocation for finite blocklength wiretap codesJack Pfister, Marco A. C. Gomes, João P. Vilela, Willie K. Harrison. 1-6 [doi]
- Resource assignment in vehicular cloudsMahmudun Nabi, Robert Benkoczi, Sherin Abdel Hamid, Hossam S. Hassanein. 1-6 [doi]
- Multi-frequency millimeter wave massive MIMO channel measurements and analysisJie Huang, Rui Feng, Jian Sun, Cheng-Xiang Wang, Wensheng Zhang, Yang Yang. 1-6 [doi]
- Enforcing timely network policies installation in OpenFlow-based software defined networksTing Wang, Mounir Hamdi, Jie Chen. 1-6 [doi]
- Outage and average error probability for UL-massive MIMO systems: Asymptotic analysisIsmail Hburi, Hamed S. Al-Raweshidy. 1-6 [doi]
- Optimal positioning of flying relays for wireless networks: A LOS map approachJunting Chen, David Gesbert. 1-6 [doi]
- Mitigating congestion and bufferbloat on satellite networks through a rate-based AQMCarlo Augusto Grazia, Natale Patriciello, Martin Klapez, Maurizio Casoni. 1-6 [doi]
- Identity privacy preserving biometric based authentication scheme for Naked healthcare environmentTanesh Kumar, An Braeken, Madhusanka Liyanage, Mika Ylianttila. 1-7 [doi]
- FLoc: Device-free passive indoor localization in complex environmentsWenqiang Chen, Maoning Guan, Lu Wang, Rukhsana Ruby, Kaishun Wu. 1-6 [doi]
- On the delivery of augmented information services over wireless computing networksHao Feng, Jaime Llorca, Antonia Maria Tulino, Andreas F. Molisch. 1-7 [doi]
- Narrow-beam optical communications in underwater wireless network with passive node mobilityRobert Webster, Kumudu S. Munasinghe, Abbas Jamalipour. 1-6 [doi]
- In-network compression for multiterminal cascade MIMO systemsInaki Estella Aguerri, Abdellatif Zaidi. 1-6 [doi]
- eOpenFlow: Software defined sampling via a highly adoptable OpenFlow extensionGuang Cheng, Yongning Tang. 1-6 [doi]
- A feasibility analysis on the use of ultrasonic multihop communications for E-health applicationsLaura Galluccio, Sebastiano Milardo, Elisabetta Sciacca. 1-6 [doi]
- On the energy-efficiency of hybrid analog-digital transceivers for large antenna array systemsChristos G. Tsinos, Sina Maleki, Symeon Chatzinotas, Björn E. Ottersten. 1-7 [doi]
- Content delivery network slicing: QoE and cost awarenessSara Retal, Miloud Bagaa, Tarik Taleb, Hannu Flinck. 1-6 [doi]
- Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approachLakshmikanth Guntupalli, Jorge Martínez-Bauset, Frank Y. Li. 1-6 [doi]
- Cost-effective migration towards C-RAN with optimal fronthaul designShari Sofia Lisi, Abdulrahman Alabbasi, Massimo Tornatore, Cicek Cavdar. 1-7 [doi]
- Designing Green C-RAN with limited fronthaul via mixed-integer second order cone programmingPhuong Luong, Charles L. Despins, François Gagnon, Le-Nam Tran. 1-6 [doi]
- Sequential and parallel scheduling of dynamic bandwidth-intensive scientific workflows in elastic optical networksJuzi Zhao, Anisha Joseph, Vinod M. Vokkarane. 1-7 [doi]
- Explore hidden information for indoor floor plan constructionBing Zhou, Fan Ye. 1-6 [doi]
- Cost analysis of smart lighting solutions for smart citiesGiuseppe Cacciatore, Claudio Fiandrino, Dzmitry Kliazovich, Fabrizio Granelli, Pascal Bouvry. 1-6 [doi]
- Multi-objective scheduling of micro-services for optimal service function chainsDeval Bhamare, Mohammed Samaka, Aiman Erbad, Raj Jain, Lav Gupta, H. Anthony Chan. 1-6 [doi]
- A mobile relay selection strategy in cooperative spectrum sharing frameworkDeng Xiao, Xuanli Wu, Meng Chuiyang, Shuai Han, Xiaojie Fang. 1-6 [doi]
- Distributed SCH selection for concurrent transmissions in IEEE 1609.4 multi-channel VANETsDeuk Lee, Syed Hassan Ahmed, Dongkyun Kim, John A. Copeland, Yusun Chang. 1-6 [doi]
- Optimal power allocation for joint cooperative beamforming and jamming assisted wireless networksHaiyan Guo, Zhen Yang, Linghua Zhang, Jia Zhu, YuLong Zou. 1-6 [doi]
- Iterative ToA-based terminal positioning in emerging cellular systemsFrançois Horlin, Mathieu Van Eeckhaute, Thomas Van der Vorst, André Bourdoux, François Quitin, Philippe De Doncker. 1-5 [doi]
- Cost-effective vehicular network planning with cache-enabled green roadside unitsShan Zhang, Ning Zhang, Xiaojie Fang, Peng Yang, Xuemin Sherman Shen. 1-6 [doi]
- Mobility increases the data offloading ratio in D2D caching networksRui Wang 0007, Jun Zhang, S. H. Song, Khaled Ben Letaief. 1-6 [doi]
- Capacity bounds on energy harvesting binary symmetric channels with finite batteryZhengchuan Chen, Guido Carlo Fen-ante, Howard H. Yang, Tony Q. S. Quek. 1-5 [doi]
- Remote radio head (RRH) deployment in flexible C-RAN under limited fronthaul capacityBo-Syuan Huang, Yi-Han Chiang, Wanjiun Liao. 1-6 [doi]
- An online secretary framework for fog network formation with minimal latencyGilsoo Lee, Walid Saad, Mehdi Bennis. 1-6 [doi]
- Loss-aware adaptive scalable transmission in wireless high-speed railway networksZhongbai Jiang, Changqiao Xu, Jianfeng Guan, Hongke Zhang, Shui Yu. 1-6 [doi]
- Efficient scheme for secure and privacy-preserving electric vehicle dynamic charging systemSurya Gunukula, Ahmed B. T. Sherif, M. Pazos-Revilla, B. Ausby, Mohamed Mahmoud, Xuemin Sherman Shen. 1-6 [doi]
- Interplay of energy and bandwidth consumption in CRAN with optimal function splitXinbo Wang, Abdulrahman Alabbasi, Cicek Cavdar. 1-6 [doi]
- Secret key generation in Rayleigh block fading AWGN channels under jamming attacksArsenia Chorti, Elena Veronica Belmega. 1-6 [doi]
- ReSDN: A lightweight solution for data-plane state recovery in software-defined networksGuan-Rong Chen, Chi-Yu Li, Kuochen Wang. 1-7 [doi]
- Graph based resource allocation for physical layer security in full-duplex cellular networksTinghan Yang, Rongqing Zhang 0001, Xiang Cheng 0001, Liuqing Yang 0001. 1-6 [doi]
- Irregular repetition slotted ALOHA over the Rayleigh block fading channel with captureFederico Clazzer, Enrico Paolini, Iacopo Mambelli, Cedomir Stefanovic. 1-6 [doi]
- Soft video delivery for free viewpoint videoTakuya Fujibashi, Toshiaki Koike-Akino, Takashi Watanabe, Philip V. Orlik. 1-7 [doi]
- Minimum cost based clustering scheme for cooperative wireless caching network with heterogeneous file preferenceYu Ye, Zhengquan Zhang, Guang Yang, Ming Xiao. 1-6 [doi]
- Distributed mininet with symbiosisRong Rong, Jason Liu. 1-6 [doi]
- On Information Bottleneck Graphs to design compress and forward quantizers with side information for multi-carrier transmissionDaniel Kern, Volker Kühn 0001. 1-6 [doi]
- Compressive sensing in wireless multimedia sensor networks based on low-rank approximationYan Zhang, Jichang Guo, Chongyi Li. 1-6 [doi]
- AE-shelter: An novel anti-eavesdropping scheme in wireless networksXuran Li, Hong-Ning Dai, Qiu Wang, Athanasios V. Vasilakos. 1-6 [doi]
- Coexistence of DSRC and Wi-Fi: Impact on the performance of vehicular safety applicationsJinshan Liu, Gaurang Naik, Jung-Min Park 0001. 1-6 [doi]
- Computational offloading with delay and capacity constraints in mobile edgeWenjie Wang, Wei Zhou. 1-6 [doi]
- MAP: Contention-free MAC protocol for VANETs with PLNCEugène David Ngangue Ndih, Soumaya Cherkaoui. 1-7 [doi]
- Full-duplex cooperative cognitive radio networks with wireless energy harvestingRui Zhang, He Chen, Phee Lep Yeoh, Yonghui Li, Branka Vucetic. 1-6 [doi]
- Beamspace aware adaptive channel estimation for single-carrier time-varying massive MIMO channelsGokhan M. Guvensen, Ender Ayanoglu. 1-7 [doi]
- Wearable healthcare systems: A single channel accelerometer based anomaly detector for studies of gait freezing in Parkinson's diseaseThuy T. Pham, Diep N. Nguyen, Eryk Dutkiewicz, Alistair Lee McEwan, Philip Heng Wai Leong. 1-5 [doi]
- On the ergodic capacity of optical space shift keying based FSO-MIMO system under atmospheric turbulenceAnshul Jaiswal, Manav R. Bhatnagar, Virander K. Jain. 1-7 [doi]
- PV cell angle optimisation for energy arrival-consumption matching in a solar energy harvesting cellular networkDoris Benda, Xiaoli Chu, Sumei Sun, Tony Q. S. Quek, Alastair Buckley. 1-6 [doi]
- A 3-D Non-stationary wideband MIMO channel model allowing for velocity variations of the mobile stationJi Bian, Cheng-Xiang Wang, Minggao Zhang, Xiaohu Ge, Xiqi Gao. 1-6 [doi]
- Distributed resource sharing in fog-assisted big data streamingBo Yin, Wenlong Shen, Yu Cheng, Lin X. Cai, Qing Li. 1-6 [doi]
- Renovating location-based routing for integrated communication privacy and efficiency in IoTTao Shu, Shuguang Cui. 1-6 [doi]
- D2D scheme for vehicular safety applications in LTE advanced networkHossein Soleimani, Azzedine Boukerche. 1-6 [doi]
- Non-Bayesian social learning with observation reuse and soft switchingMd. Zulfiquar Ali Bhotto, Wee-Peng Tay. 1-6 [doi]
- At every corner : Determining corner points of two-user Gaussian interference channelsOlivier Rioul. 1-6 [doi]
- Design and analysis of elastic handoff in cognitive cellular networksSaravanan Raju, Sai Boddepalli, Neelabjo Choudhury, Qiben Yan, Jitender S. Deogun. 1-6 [doi]
- Analysis of different user grouping algorithms in a C-RAN downlink systemJialong Duan, Xavier Lagrange, Frédéric Guilloud. 1-6 [doi]
- Human dynamics of mobile crowd sensing experimental datasetsPaolo Bellavista, Antonio Corradi, Luca Foschini, Stefano Chessa, Michele Girolami. 1-6 [doi]
- Overlay RF-powered backscatter cognitive radio networks: A game theoretic approachDinh Thai Hoang, Dusit Niyato, Ping Wang, Dong In Kim, Long Bao Le. 1-6 [doi]
- Low complexity channel estimation based on DFT for short range communicationGaojian Wang, Shaghayegh Aghabozorgi Naeimi, Gerd Ascheid. 1-7 [doi]
- Dot-product based preference preserved hashing for fast collaborative filteringYan Zhang, Guowu Yang, Lin Hu, Hong Wen, Jinsong Wu. 1-6 [doi]
- Joint computation and radio resource management for cellular networks with mobile edge computingChen-meng Wang, F. Richard Yu, Qianbin Chen, Lun Tang. 1-6 [doi]
- Distributed, multi-level network anomaly detection for datacentre networksMircea Iordache, Simon Jouet, Angelos K. Marnerides, Dimitrios P. Pezaros. 1-6 [doi]
- Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmissionDatong Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang. 1-6 [doi]
- Multi-scale spectrum sensing in small-cell mm-wave cognitive wireless networksNicolò Michelusi, Matthew S. Nokleby, Urbashi Mitra, A. Robert Calderbank. 1-6 [doi]
- A contract-based incentive mechanism for energy harvesting-based Internet of ThingsZhanwei Hou, He Chen, Yonghui Li, Zhu Han, Branka Vucetic. 1-6 [doi]
- Routing protocol design for drone-cell communication networksPeng Yang, Xianbin Cao, Chao Yin, Zhenyu Xiao, Xing Xi, Dapeng Oliver Wu. 1-6 [doi]
- Application agnostic QoE triggered multipath switching for Android devicesFerenc Fejes, Sándor Rácz, Geza Szabo. 1-7 [doi]
- Cooperative caching for spectrum access in cognitive radio networksBo Zhou, Sangtian Wang, Erkai Chen, Meixia Tao. 1-6 [doi]
- Multi-index fusion via similarity matrix pooling for image retrievalXin Chen, Jun Wu, Shaoyan Sun, Qi Tian. 1-6 [doi]
- Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacksLi Yuan, Kun Wang, Toshiaki Miyazaki, Song Guo, Meng Wu. 1-6 [doi]
- Role of motifs in topological robustness of gene regulatory networksSatyaki Roy, Mayank Raj, Preetam Ghosh, Sajal K. Das. 1-6 [doi]
- Performance-aware Energy-efficient Virtual Machine Placement in Cloud data centerXiaoning Zhang, Yangming Zhao, Shuai Guo, Yichao Li. 1-7 [doi]
- A resource scheduling scheme based on feed-back for SCMA grant-free uplink transmissionShuai Han, Xiangxue Tai, Weixiao Meng, Cheng Li. 1-6 [doi]
- RF/Analog self-interference canceller for 2×2 MIMO full-duplex transceiverFei Chen, Hak Hyun Lee, Robert Morawski, Tho Le-Ngoc. 1-6 [doi]
- WeiSTARS: A weighted trust-aware relay selection scheme for VANETSofiane Dahmane, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Pascal Lorenz. 1-6 [doi]
- New blind deflation-based deconvolution algorithms using givens and shear rotationsQadri Mayyala, Karim Abed-Meraim, Azzedine Zerguine. 1-6 [doi]
- Proactive wireless sensor network for industrial IoTTim Farnham. 1-6 [doi]
- Constant envelope transmission in MISO system with adaptive online constellationShuowen Zhang, Rui Zhang, Teng Joon Lim. 1-6 [doi]
- Self energy recycling techniques for MIMO wireless communication systemsJuhui Chae, Hoon Lee, Jaein Kim, Inkyu Lee. 1-6 [doi]
- Energy-efficient predictive video streaming under demand uncertaintiesRamy Atawia, Hossam S. Hassanein, Aboelmagd Noureldin. 1-6 [doi]
- Optimal symbol misalignment estimation in asynchronous physical-layer network codingYulin Shao, Soung Chang Liew, Lu Lu. 1-7 [doi]
- IEEE 802.11p EDCA performance analysis for vehicle-to-vehicle infotainment applicationsMohammed Amine Togou, Lyes Khoukhi, Abdelhakim Hafid. 1-6 [doi]
- Energy scheduling for optical channels with energy harvesting devicesZhe Wang, Vaneet Aggarwal, Xiaodong Wang, Muhammad Ismail. 1-6 [doi]
- Stochastic network utility maximization in the presence of heavy-tailsShuang Xia, Pu Wang. 1-7 [doi]
- Improvement of BER performance by tilting receiver plane for indoor visible light communications with input-dependent noiseJin-Yuan Wang, Jun-Bo Wang, Bingcheng Zhu, Min Lin, Yongpeng Wu, Yongjin Wang, Ming Chen. 1-6 [doi]
- Ultra reliable short message relaying with wireless power transferOnel L. Alcaraz López, Richard Demo Souza, Hirley Alves, Evelio Martín García Fernández. 1-6 [doi]
- A revisiting to queueing theory for mobile instant messaging with keep-alive mechanism in cellular networksLu Fan, Zhifeng Zhao, Chen Qi, Rongpeng Li, Honggang Zhang. 1-6 [doi]
- A generalized analytical framework for coverage evaluation in mmWave heterogeneous cellular networks in urban areasChun-Hung Liu, Di-Chun Liang, Jie-Ru Yang, Jie Chen. 1-7 [doi]
- Expectation-propagation based low-complexity channel estimation for massive MIMO systemsChao Wei, Zaichen Zhang, Huaping Liu. 1-5 [doi]
- Throughput maximization of cognitive radio network by conflict-free link allocation using neural networkSakil Ahmed Chowdhury, Abderrahim Benslimane, Farzana Akhter. 1-6 [doi]
- Relay-aided non-orthogonal multiple access with noisy network codingJawwad Nasar Chattha, Momin Uppal. 1-6 [doi]
- Coupled Markovian Arrival Process for Automotive Machine Type Communication traffic modelingElena Grigoreva, Maximilian Laurer, Mikhail Vilgelm, Thomas Gehrsitz, Wolfgang Kellerer. 1-6 [doi]
- Self-organizing wireless network parameter optimization through mixed integer programmingFaris Alfarhan, Ahmed Alsohaily. 1-6 [doi]
- An as-level approach to network traffic analysis and modellingQuentin Grandemange, Yusuf Bhujwalla, Marion Gilson, Olivier Ferveur, Eric Gnaedinger. 1-6 [doi]
- Privacy preservation with channel-based jamming for data aggregation in smart gridsChan Dai Truyen Thai, Jemin Lee, Jong Yeol Ryu, Tony Q. S. Quek. 1-6 [doi]
- Symbol synchronization for diffusive molecular communication systemsVahid Jamali, Arman Ahmadzadeh, Robert Schober. 1-7 [doi]
- Channel tracking for massive MIMO systems with spatial-temporal basis expansion modelJianwei Zhao, Feifei Gao, Weimin Jia, Junhui Zhao, Weile Zhang. 1-5 [doi]
- Multidimensional data learning-based caching strategy in information-centric networksLing Cai, Xingwei Wang, Jinkuan Wang, Min Huang, Tian Yang. 1-6 [doi]
- An enhanced coding strategy for FTN-OFDM/OQAM transceiver designNaila Lahbabi, Hao Lin, Charbel Abdel Nour, Catherine Douillard, Pierre Siohan. 1-6 [doi]
- An analysis of caching in information-centric vehicular networksFelipe M. Modesto, Azzedine Boukerche. 1-6 [doi]
- Energy coverage in wireless powered sub-6 GHz and millimeter wave dense cellular networksLifeng Wang, Kai-Kit Wong. 1-6 [doi]
- V-handoff: A practical energy efficient handoff for 802.11 infrastructure networksHaoxin Wang, Jiang Xie, Tao Han. 1-6 [doi]
- Joint optimal waveform design for multiuser VLC systems over ISI channelJie Lian, Maïté Brandt-Pearce. 1-6 [doi]
- Noncoherent analog network coding using LDPC-coded FSKTerry Ferrett, Matthew C. Valenti. 1-6 [doi]
- Resilient large-scale cognitive radio ad hoc networking using path-time codesYi-Chi Chen, I-Wei Lai, Kwang-Cheng Chen. 1-6 [doi]
- Face-to-machine proximity estimation for mobile industrial human machine interactionTing Liu, Zhezhuang Xu, Rongkai Wang, Hao Jiang, Cailian Chen, Shih-Hau Fang. 1-6 [doi]
- Construction of the RSRP map using sparse MDT measurements by regression clusteringFoad Sohrabi, Edgar Kuehn. 1-6 [doi]
- Experimental evaluation of advanced beam tracking with CSI acquisition for 5G radio accessKiichi Tateishi, Daisuke Kurita, Atsushi Harada, Yoshihisa Kishiyama, Shoji Itoh, Hideshi Murai, Nicolas Schrammar, Arne Simonsson, Peter Ökvist. 1-6 [doi]
- Profit-driven resource provisioning in NFV-based environmentsWalid Racheg, Nadir Ghrada, Mohamed Faten Zhani. 1-7 [doi]
- Indoor localization with asymmetric grid-based filters in large areas utilizing smartphonesTong Guan, Le Fang, Wen Dong 0001, Yunfei Hou, Chunming Qiao. 1-6 [doi]
- EXIT-based optimization of linear precoder for MIMO encoded systems assuming turbo detectionNhat-Quang Nhan, Philippe Rostaing, Karine Amis, Ludovic Collin, Emanuel Radoi. 1-6 [doi]
- A measurement study on Amazon wishlist and its privacy exposureYue Li, Nan Zheng, Haining Wang, Kun Sun, Hui Fang. 1-7 [doi]
- Random fibonacci sequences and capacity/power scaling in cooperative multihop networksDavid E. Simmons, Justin P. Coon. 1-6 [doi]
- Green resource allocation and EE-balancing in multiuser two-way amplify-and-forward relay networksKeshav Singh, Ankit Gupta, Tharmalingam Ratnarajah. 1-6 [doi]
- Large scale analysis of physical layer security in multi-user wireless networksMehdi Sadeghzadeh, Mehdi Maleki, Masoud Salehi, Hamid-Reza Bahrami. 1-6 [doi]
- Markov chain-based performance analysis of MIMO-aware media access control protocolHakim Badis, Abderrezak Rachedi. 1-6 [doi]
- Performance analysis of the 802.11ax UL OFDMA random access protocol in dense networksLeonardo Lanante, Tatsumi Uwai, Yuhei Nagao, Masayuki Kurosaki, Chittabratta Ghosh. 1-6 [doi]
- Performance evaluation of E-MQS scheduler with Mobility in LTE heterogeneous networkDuy-Huy Nguyen, Hang Nguyen, Eric Renault. 1-6 [doi]
- Statistical distribution of position error in weighted centroid localizationKagiso Magowe, Andrea Giorgetti, Kandeepan Sithamparanathan, Xinghuo Yu. 1-5 [doi]
- Geometry-based modeling and simulation of 3D multipath propagation channel with realistic spatial characteristicsAleksei Fedorov, Haibo Zhang 0001, Yawen Chen. 1-6 [doi]
- Optimizing time-variant quota-controlled routing in delay-tolerant networksJiagao Wu, Yue Ma, Linfeng Liu, Jianping Pan. 1-6 [doi]
- Fair and efficient weighted sum rate maximization for multi-rate secondary users in cognitive radio networkSakil Ahmed Chowdhury, Abderrahim Benslimane, Farzana Akhter. 1-6 [doi]
- Optimized beam selection for efficient long range underwater acoustic communicationAkram Ahmed, Mohamed F. Younis. 1-6 [doi]
- Private information retrieval from coded databasesKarim A. Banawan, Sennur Ulukus. 1-6 [doi]
- On the effect of imperfect timing synchronization on pilot contaminationAntonios Pitarokoilis, Emil Bjomson, Erik G. Larsson. 1-6 [doi]
- Performance analysis for ZigBee under WiFi interference in smart homeHaoran Jiang, Bin Liu, Chang Wen Chen. 1-6 [doi]
- Per-Server Dominant-Share Fairness (PS-DSF): A multi-resource fair allocation mechanism for heterogeneous serversJalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao. 1-7 [doi]
- QoS-driven function placement reducing expenditures in NFV deploymentsPetra Vizarreta, Massimo Condoluci, Carmen Mas Machuca, Toktam Mahmoodi, Wolfgang Kellerer. 1-7 [doi]
- Single-user and multi-user MIMO channel estimation for LTE-Advanced uplinkStefan Pratschner, Stefan Schwarz, Markus Rupp. 1-6 [doi]
- Nanoscale optical channel modeling for in vivo wireless nanosensor networks: A geometrical approachPedram Johari, Josep Miquel Jornet. 1-6 [doi]
- Dynamic control of NFV forwarding graphs with end-to-end deadline constraintsVictor Millnert, Johan Eker, Enrico Bini. 1-7 [doi]
- A clinical decision support system for aiding diagnosis of Alzheimer's disease and related disorders in mobile devicesCarolina Medeiros Carvalho, Débora C. Muchaluat-Saade, Aura Conci, Flávio Luiz Seixas, Jerson Laks. 1-6 [doi]
- Fundamental limits on latency in cloud- and cache-aided HetNetsJaber Kakar, Soheil Gherekhloo, Zohaib Hassan Awan, Aydin Sezgin. 1-6 [doi]
- Outage performance for the cognitive broadband satellite system and terrestrial cellular network in millimeter wave scenarioKang An, Min Lin, Jian Guyang, Tao Liang, Jun-Bo Wang, Wei-Ping Zhu. 1-6 [doi]
- Beam learningSaiDhiraj Amuru. 1-6 [doi]
- Energy-aware coflow and antenna scheduling for hybrid server-centric data center networksTao Li, Silvia Santini. 1-7 [doi]
- A scalable overload control algorithm for massive access in machine-to-machine networksManal El Tanab, Walaa Hamouda. 1-6 [doi]
- IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systemsYuhan Li, Anmin Fu, Yan Yu, Gongxuan Zhang. 1-6 [doi]
- An impulsive noise resistant physical layer for smart grid communicationsNdeye Bineta Sarr, Abdul-Karim Yazbek, Herve Boeglen, Jean-Pierre Cances, Rodolphe Vauzelle, François Gagnon. 1-7 [doi]
- Non-Orthogonal Multiple Access schemes in Wireless Powered Communication NetworksMohamed A. Abd-Elmagid, Alessandro Biason, Tamer A. ElBatt, Karim G. Seddik, Michele Zorzi. 1-6 [doi]
- Compressed sensing based network tomography using end-to-end path measurementsWeiwei Wang, Xiaoying Gan, Wenjie Bai, Xinbing Wang, Xiaohua Tian. 1-6 [doi]
- Two-phase incentive-based secure key system for data management in internet of thingsM. Bala Krishna, Joel J. P. C. Rodrigues. 1-6 [doi]
- Cooperative wireless edge caching with relay selectionConstantinos Psomas, Gan Zheng, Ioannis Krikidis. 1-5 [doi]
- Malicious URL sequence detection using event de-noising convolutional neural networkToshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata. 1-7 [doi]
- On optimal training in massive MIMO systems with insufficient pilotsWeizheng Zhang, Wei Zhang. 1-6 [doi]
- Cognitive relay selection with incomplete channel state information of interference linksPriyanka Das, Neelesh B. Mehta, P. N. Arya. 1-6 [doi]
- Symmetric private information retrieval for MDS coded distributed storageQiwen Wang, Mikael Skoglund. 1-6 [doi]
- On the spectral efficiency and relay energy efficiency of full-duplex relay channelZhengchuan Chen, Tony Q. S. Quek, Ying-Chang Liang. 1-6 [doi]
- Profit-based file replication in data intensive cloud data centersMuhannad Alghamdi, Bin Tang, Yutian Chen. 1-7 [doi]
- Throughput aware and green energy aware user association in heterogeneous networksQiang Fan, Nirwan Ansari. 1-6 [doi]
- Dynamic Virtual Measurement Function scheduling in software-oriented measurement environmentYongyi Ran, Xiaoban Wu, Peilong Li, Yan Luo. 1-6 [doi]
- Network coding-based caching in large-scale SIC-enabled wireless networksDongdong Jiang, Ying Cui. 1-7 [doi]
- Cooperative distributed energy scheduling for smart homes applying stochastic model predictive controlMehdi Rahmani-andebili, Haiying Shen. 1-6 [doi]
- On the linear codes with (r, δ)-locality for distributed storageJie Hao, Shu-Tao Xia, Bin Chen. 1-6 [doi]
- Multi-cell coordination via disjoint clustering in dense millimeter wave cellular networksNor Aishah Muhammad, He Chen, Wei Bao, Yonghui Li, Branka Vucetic. 1-6 [doi]
- Supermodular game based energy efficient power allocation in heterogeneous small cell networksHaijun Zhang, Mengying Sun, Keping Long, Min Sheng, Victor C. M. Leung. 1-5 [doi]
- Benefits and challenges of cross-linked ring road satellite networks: A case studyJuan A. Fraire, Marius Feldmann, Scott C. Burleigh. 1-7 [doi]
- Impact of co-channel interference on an underlay cognitive radio network over Nakagami-m fading channelsJamal Hussein, Salama S. Ikki, Said Boussakta, Charalampos Tsimenidis. 1-7 [doi]
- Hybrid POF/VLC link with M-PAM and MLP equaliserIsaac Osahon, Evangelos Pikasis, Sujan Rajbhandari, Wasiu O. Popoola. 1-6 [doi]
- A flexible HW and SW co-operated baseband research platform for massive MIMO systemLei Guan, Lorenzo Galati Giordano, Andrea Bonfante. 1-7 [doi]
- A reinforcement learning approach to power control and rate adaptation in cellular networksEuhanna Ghadimi, Francesco Davide Calabrese, Gunnar Peters, Pablo Soldati. 1-7 [doi]
- ICN-FC: An Information-Centric Networking based framework for efficient functional chainingLei Liu, Yang Peng, Mehdi Bahrami, Liguang (Ted) Xie, Akira Ito, Sevak Mnatsakanyan, Gang Qu, Zilong Ye, Huiping Guo. 1-7 [doi]
- Transmit antenna selection in vehicle-to-vehicle time-varying fading channelsPetros S. Bithas, Athanasios G. Kanatas, Daniel Benevides da Costa, Prabhat Kumar Upadhyay. 1-6 [doi]
- Energy-throughput tradeoff in sustainable Cloud-RAN with energy harvestingZhao Chen, Ziru Chen, Lin X. Cai, Yu Cheng. 1-6 [doi]
- Optimal file storing with cache memory in amorphous femto helper aided networksDongyeon Ko, Bi Hong, Jung Hoon Lee, Wan Choi. 1-6 [doi]
- Delay-optimal probabilistic scheduling in green communications with arbitrary arrival and adaptive transmissionXiang Chen, Wei Chen, Joohyun Lee, Ness B. Shroff. 1-6 [doi]
- Artificial-noise-aided nonlinear secure transmission for MU-MISO wiretap channel with quantized CSITLiang Sun, Rui Wang, Hai Wang, Victor C. M. Leung. 1-7 [doi]
- Performance evaluation of a wireless sensor node with energy harvesting and varying conditions of operationChe Soong Kim, Alexander N. Dudin, Sergey A. Dudin, Olga S. Dudina. 1-6 [doi]
- Low-complexity near-optimal detector for multiple-input multiple-output OFDM with index modulationBeixiong Zheng, Miaowen Wen, Ertugrul Basar, Fangjiong Chen. 1-6 [doi]
- PDGM: Percolation-based directed graph matching in social networksLijing Wang, Jin-Hee Cho, Ing-Ray Chen, Jiangzhuo Chen. 1-7 [doi]
- A novel electric vehicles charging/discharging scheme with load management protocolDhaou Said, Hussein T. Mouftah. 1-6 [doi]
- Practical compute-and-forward approaches for the multiple access relay channelMohammad Nur Hasan, Brian M. Kurkoski. 1-6 [doi]
- A client-based secure deduplication of multimedia dataDanping Li, Chao Yang, Chengzhou Li, Qi Jiang 0001, Xiaofeng Chen, Jianfeng Ma, Jian Ren. 1-6 [doi]
- Efficient sensor placement heuristicsMustapha Réda Senouci, Abdelkarim Abdellaoui. 1-6 [doi]
- On the coexistence of Wi-Fi and LTE-U in unlicensed spectrumXijun Wang, Tony Q. S. Quek, Min Sheng, Jiandong Li. 1-6 [doi]
- Fundamental limits of random access communication with retransmissionsDerya Malak, Howard Huang, Jeffrey G. Andrews. 1-7 [doi]
- Distributed real-time sound speed profiling in underwater environmentsAkram Ahmed, Mohamed F. Younis. 1-7 [doi]
- A novel millimeter-wave channel simulator and applications for 5G wireless communicationsShu Sun, George R. MacCartney, Theodore S. Rappaport. 1-7 [doi]
- FHY-layer authentication with multiple landmarks with reduced communication overheadXiaoyue Wan, Liang Xiao, Qiangda Li, Zhu Han. 1-6 [doi]
- Variational Bayesian inference for nonparametric signal compressive sensing on structured manifoldsShaoyang Li, Xiaoming Tao, Jianhua Lu. 1-6 [doi]
- Hybrid multi-and single-carrier modulation approach for visible light communicationJunnan Gao, Fang Yang, Sicong Liu. 1-6 [doi]
- Optimization of heterogeneous caching systems with rate limited linksAbdelrahman M. Ibrahim, Ahmed A. Zewail, Aylin Yener. 1-6 [doi]
- Secure clustered distributed storage against eavesdroppersBeongjun Choi, Jy-yong Sohn, Sung Whan Yoon, Jaekyun Moon. 1-6 [doi]
- Blind detection of uplink grant-free SCMA with unknown user sparsityJiaqi Liu, Gang Wu, Shaoqian Li, Olav Tirkkonen. 1-6 [doi]
- On the performance of adaptive video caching over information-centric networksWenjie Li, Sharief M. A. Oteafy, Hossam S. Hassanein. 1-6 [doi]
- Energy-efficient resource scheduling for NOMA systems with imperfect channel state informationFang Fang, Haijun Zhang, Julian Cheng, Victor C. M. Leung. 1-5 [doi]
- Hybrid content caching for low end-to-end latency in cloud-based wireless networksJeongho Kwak, Yeongjin Kim, Long Bao Le, Song Chong. 1-6 [doi]
- Spatially coupled code design for three-phase bidirectional relayingMd. Noor-A.-Rahim, Guan Yong Liang. 1-6 [doi]
- Q-learning based superposed band detection in multicarrier transmissionAli Shaikh, Fereidoun H. Panahi, Tomoaki Ohtsuki, Kouhei Suzaki, Hirofumi Sasaki, Hideya So, Tadao Nakagawa. 1-6 [doi]
- Performance evaluation of random access response estimation scheme for IoT communicationsSeung-Su Yoo, Sung-Hyung Lee, So-Yi Jung, Jae-Hyun Kim. 1-6 [doi]
- Joint offloading and computing optimization in wireless powered mobile-edge computing systemsFeng Wang, Jie Xu, Xin Wang, Shuguang Cui. 1-6 [doi]
- On the applicability of SAN in modeling and analyzing a Priority Queue Management based congestion control for WMSNsLynda Mokdad, Nawel Gharbi, Jalel Ben-Othman. 1-6 [doi]
- GreenAir: Harmonic CTI relaxation under massive heterogeneous wireless devicesDaehyun Ban, SangSoon Lim, Seongwon Han, Woojin Park. 1-6 [doi]
- Throughput optimal listen-before-talk for cellular in unlicensed spectrumNing Wei, Xingqin Lin, Wanwan Li, Youzhi Xiong, Zhongpei Zhang. 1-6 [doi]
- On the spectral efficiency and fairness in full-duplex cellular networksJose Mairton B. da Silva Jr., Gábor Fodor, Carlo Fischione. 1-6 [doi]
- Refining the ring road-delays and path lengths in a LEO satellite message-ferry networkMarius Feldmann, Felix Walter. 1-7 [doi]
- Design and secrecy performance of novel two-way free-space QKD protocol using standard FSO systemsPhuc V. Trinh, Anh T. Pham. 1-6 [doi]
- Delay and delay-constrained throughput analysis of a wireless powered communication systemZhidu Li, Yuming Jiang, Yuehong Gao, Lin Sang, Dacheng Yang. 1-6 [doi]
- Virtualized network views for localizing misbehaving sources in SDN data planesMaha Shamseddine, Wassim Itani, Ayman I. Kayssi, Ali Chehab. 1-7 [doi]
- An efficient throughput-aware resource allocation technique for data transmission in unmanned aircraft systemsYuichi Kawamoto, Hiroki Nishiyama, Nei Kato, Fumie Ono, Ryu Miura. 1-6 [doi]
- Optimum designs of wireless ad hoc networks with random multiple accessDali Hu, Jingxian Wu, Pingzhi Fan. 1-6 [doi]
- Load-aware coordinated multipoint joint transmission in dense heterogeneous networks: Downlink coverage and throughput limitsChun-Hung Liu, Po-chia Chen. 1-7 [doi]
- Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoTBaraq Ghaleb, Ahmed Yassin Al-Dubai, Imed Romdhani, Youssef Nasser, Azzedine Boukerche. 1-6 [doi]
- Cooperative load balancing on human moving trajectory diversity in cellular networksKao-Peng Chou, Jia-Chin Lin. 1-5 [doi]
- Stochastic resonance decoding for quantum LDPC codesNithin Raveendran, Priya J. Nadkarni, Shayan Srinivasa Garani, Bane Vasic. 1-6 [doi]
- Stackelberg game approach for wireless virtualization design in wireless networksThinh Duy Tran, Long Bao Le. 1-6 [doi]
- Reduced complexity optimal detection of binary faster-than-Nyquist signalingEbrahim Bedeer, Halim Yanikomeroglu, Mohamed Hossam Ahmed. 1-6 [doi]
- Generalized spatial modulation with transmit antenna grouping for massive MIMOPeizhong Ju, Meng Zhang, Xiang Cheng, Liuqing Yang 0001. 1-6 [doi]
- Power allocation and cooperative diversity in two-way non-regenerative cognitive radio networksSaeed Vahidian, Maryam Najafi, Marzieh Najafi, Fawaz S. Al-Qahtani. 1-7 [doi]
- Scaling laws for wireless energy transmission in mmWave massive MIMO systemsGervais N. Kamga, Sonia Aïssa. 1-6 [doi]
- Towards a sustainable people-centric sensingFrances Albert Santos, Thiago H. Silva, Torsten Braun, Antonio A. F. Loureiro, Leandro A. Villas. 1-6 [doi]
- Non-binary LDPC codes for orthogonal modulations: Analysis and code designGianluigi Liva, Balázs Matuz, Enrico Paolini, Mark F. Flanagan. 1-6 [doi]
- Energy efficient mobile computation offloading via online prefetchingSeung-Woo Ko, Kaibin Huang, Seong-Lyun Kim, Hyukjin Chae. 1-6 [doi]
- On the security of transmissions over fading wiretap channels in realistic conditionsMarco Baldi, Linda Senigagliesi, Franco Chiaraluce. 1-6 [doi]
- Big data driven information diffusion analysis and control in online social networksKai Zhang, Jingjing Wang, Chunxiao Jiang, Zhongxiang Wei, Yong Ren. 1-6 [doi]
- Hierarchical power competition for security enhancement in wireless networksXiao Tang, Pinyi Ren, Zhu Han. 1-6 [doi]
- Sum rate of massive MIMO downlink with simultaneous relayed and direct transmissionsDhanushka Kudathanthirige, Gayan Amarasuriya. 1-7 [doi]
- Privacy-preserving quantization learning with applications to smart metersMaggie Mhanna, Pablo Piantanida, Pierre Duhamel. 1-6 [doi]
- An efficient approach for data transmission in power-constrained wireless sensor networkCatherine Almhana, Vartan Choulakian, Jalal Almhana. 1-6 [doi]
- Investigating the impact of coherent multipath interference on optical QPSK systemsJoão J. O. Pires, Luís G. C. Cancela. 1-6 [doi]
- Learn to adapt: Self-optimizing small cell transmit power with correlated bandit learningZhiyang Wang, Cong Shen, Xiliang Luo, Mihaela van der Schaar. 1-6 [doi]
- Practical privacy in WDM networks with all-optical layered encryptionAnna Engelmann, Admela Jukan. 1-6 [doi]
- See the near future: A short-term predictive methodology to traffic load in ITSXun Zhou, Changle Li, Zhe Liu, Tom H. Luan, Zhifang Miao, Lina Zhu, Lei Xiong. 1-6 [doi]
- VNF placement with replication for Loac balancing in NFV networksFrancisco Carpio, Samia Dhahri, Admela Jukan. 1-6 [doi]
- Outage constrained robust hybrid coordinated beamforming for massive MIMO enabled heterogeneous cellular networksGuixian Xu, Chia-Hsiang Lin, Weiguo Ma, Chong-Yung Chi. 1-7 [doi]
- Analyzing the impact of NFV in large provider networks: A use case perspectiveAshwin Gumaste, Sidharth Sharma, Tamal Das, Aniruddha Kushwaha. 1-7 [doi]
- Efficient fast-convolution based implementation of 5G waveform processing using circular convolution decompositionAlaaEddin Loulou, Juha Yli-Kaakinen, Markku Renfors. 1-7 [doi]
- Distributed estimation of a spatially correlated random field in decentralized sensor networksZuoen Wang, Jingxian Wu, Jing Yang. 1-6 [doi]
- Privacy-preserving mobile crowdsensing for located-based applicationsJianbing Ni, Kuan Zhang, Xiaodong Lin, Qi Xia, Xuemin Sherman Shen. 1-6 [doi]
- Improvement in Kinect based measurements using anthropometric constraints for rehabilitationPratyusha Das, Kingshuk Chakravarty, Debatri Chatterjee, Aniruddha Sinha. 1-6 [doi]
- Optimizing service replication for mobile delay-sensitive applications in 5G edge networkIvan Farris, Tarik Taleb, Miloud Bagaa, Hannu Flick. 1-6 [doi]
- Delay-aware massive random access for machine-type communications via hierarchical stochastic learningYannan Ruan, Wei Wang, Zhaoyang Zhang 0001, Vincent K. N. Lau. 1-6 [doi]
- 2: Energy efficient mobility management in dense small cells with mobile edge computingJie Xu, Yuxuan Sun, Lixing Chen, Sheng Zhou. 1-6 [doi]
- Optimal energy management strategies in mobile networks powered by a smart gridWael Labidi, Tijani Chahed, Salah-Eddine Elayoubi. 1-6 [doi]
- Controller DAC: Securing SDN controller with dynamic access controlYuchia Tseng, Montida Pattaranantakul, Ruan He, Zonghua Zhang, Farid Naït-Abdesselam. 1-6 [doi]
- Popularity evolution of professional users on facebookSamin Mohammadi, Reza Farahbakhsh, Noël Crespi. 1-6 [doi]
- Data correlation aware opportunistic routing protocol for wireless sensor networksGuanglun Huang, Baoxian Zhang, Zheng Yao. 1-6 [doi]
- Interference coordination in full-duplex HetNet with large-scale antenna arraysWei Lv, Zhaoyang Zhang 0001, Chunxu Jiao, Caijun Zhong. 1-6 [doi]
- Energy and spectral efficiency analysis for selective ARQ multi-channel systemsTaniya Shafique, Osama Amin, Mohamed-Slim Alouini. 1-6 [doi]
- Location-based coverage probability for distributed antenna systems in finite-area networksMohammud Z. Bocus, Orestis Georgiou, Justin P. Coon, Dene A. Hedges. 1-6 [doi]
- Secure and efficient key generation and agreement methods for wireless body area networksZhouzhou Li, Honggang Wang, Mahmoud Daneshmand, Hua Fang. 1-6 [doi]
- Localization and synchronization in wireless networks using full-duplex radiosYan Liu, Yuan Shen, Dongning Guo, Moe Z. Win. 1-6 [doi]
- A dual-directional path-loss model in 5G wireless fractal small cell networksJiaqi Chen, Fen Bin, Xiaohu Ge, Qiang Li, Cheng-Xiang Wang. 1-6 [doi]
- Detecting and predicting outages in mobile networks with log dataVijay K. Gurbani, Dan Kushnir, Veena B. Mendiratta, Chitra Phadke, Eric Falk, Radu State. 1-7 [doi]
- Excited Markov Chain Monte Carlo MIMO detector with 8-antenna 802.11ac testbed demonstrationJonathan C. Hedstrom, Chung Him George Yuen, Rong-Rong Chen, Behrouz Farhang-Boroujeny. 1-7 [doi]
- Measuring influence in online social networks: With a focus on Gowalla and BrightkiteAfrand Agah, Prithviraj Kumar Dasari. 1-5 [doi]
- Establishing a session database for SDN using 802.1X and multiple authentication resourcesFrederik Hauser, Mark Schmidt, Michael Menth. 1-7 [doi]
- Network coding-based distributed network formation game for multi-source multicast networksMinhae Kwon, Hyunggon Park. 1-6 [doi]
- A flexible authenticated lightweight cipher using Even-Mansour constructionEduardo Marsola do Nascimento, Jose Antonio Moreira Xexeo. 1-6 [doi]
- Secure multi-party data communications in cloud augmented IoT environmentXueqing Huang, Nirwan Ansari. 1-6 [doi]
- A union bound analysis for codes over binary asymmetric channelsGuanghui Song, Kui Cai, Jun Cheng. 1-5 [doi]
- A cooperative spectrum sensing protocol for IEEE 802.15.4m wide-area WSNsFrancesco Chiti, Romano Fantacci, Francesca Nizzi, Laura Pierucci, Tommaso Pecorella. 1-6 [doi]
- Joint pilot sequence design and power control for Max-Min fairness in uplink massive MIMOTrinh Van Chien, Emil Bjomson, Erik G. Larsson. 1-6 [doi]
- Scalable (n, k, d) exact-repair regenerating codes with small repair bandwidthMehran Elyasi, Soheil Mohajer. 1-7 [doi]
- Downlink transmission capacity analysis for virtual cell based distributed antenna systemsMing Cheng, Jun-Bo Wang. 1-6 [doi]
- An efficient sensor-cloud interactive model for on-demand latency requirement guaranteeThanh Dinh, Younghan Kim. 1-6 [doi]
- Inscribed rectangles algorithm for routing, core and spectrum assignment for SDM optical networksPedro M. Moura, Nelson L. S. Da Fonseca. 1-6 [doi]
- Detection of spoofed identities on smartphones via sociability metricsFazel Anjomshoa, Burak Kantarci, Melike Erol-Kantarci, Stephanie Schuckers. 1-6 [doi]
- A mobility and activeness aware relay selection algorithm for multi-hop D2D communication underlaying cellular networksXianting Lu, Jun Zheng, Chengzheng Liu, Jie Xiao. 1-6 [doi]
- QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networksQichao Xu, Zhou Su, Qiyong Zhao, Jiantao Song, Wenxue Shen, Ying Wang, Kan Yang 0001. 1-6 [doi]
- An evolutionary game theoretic analysis for crowdsourced WiFi networksYu Gao, Xiaoyang Zhang, Xiaoyan Mo, Lin Gao. 1-6 [doi]
- Analysis and optimization of wireless transmissions over fast fading channels with slow time-varying energy arrivalJie Gong, Zhenyu Zhou, Sheng Zhou. 1-6 [doi]
- CORIA - Analyzing internet connectivity risks using network graphsBenjamin Fabian, Annika Baumann, Mathias Ehlert, Vasilis Ververis, Tatiana Ermakova. 1-6 [doi]
- Game theoretic study of protecting MIMO transmissions against smart attacksYanda Li, Liang Xiao 0003, Huaiyu Dai, H. Vincent Poor. 1-6 [doi]
- An optimal resource assignment for C/D-plane virtualized mobile core networksKazuki Tanabe, Hiroki Nakayama, Tsunemasa Hayashi, Katsunori Yamaoka. 1-6 [doi]
- Capacity scaling laws for power constrained amplify-and-forward OFDM-based relay networksDavid E. Simmons, Justin P. Coon. 1-6 [doi]
- Economic incentives in virtualized access networksThiago Teixeira, Andres Marentes, Tilman Wolf. 1-7 [doi]
- Transmit antenna selection for massive MIMO: A knapsack problem formulationRyan Husbands, Qasim Ahmed, Junyuan Wang. 1-6 [doi]
- Downlink performance of multi-tier wireless networks using punctured poisson process modelSoroor Aram, Bijan Jabbari. 1-6 [doi]
- CryptoCache: Network caching with confidentialityJeremie Leguay, Georgios S. Paschos, Elizabeth A. Quaglia, Ben Smyth. 1-6 [doi]
- A relay selection scheme for lifetime extension in amplify-and-forward cooperative networksOuadoudi Zytoune, Hacène Fouchal, Driss Aboutajdine. 1-6 [doi]
- Machine learning for predicting QoE of video streaming in mobile networksYu-Ting Lin, Eduardo Mucelli Rezende Oliveira, Sana Ben Jemaa, Salah-Eddine Elayoubi. 1-6 [doi]
- BladeMAC: Radio duty-cycling in a dynamic, cyclical channelMathew L. Wymore, Daji Qiao. 1-7 [doi]
- A cognitive algorithm for traffic steering in LTE-LSA/Wi-Fi resource sharing scenariosJean Cerrillo Fernandez, Rafael Kunst, Juergen Rochol. 1-6 [doi]
- Deterministic equivalent for max-min SINR over random user locationsHossein A. Moghaddam, Antti Tölli, Luca Sanguinetti, Mérouane Debbah. 1-6 [doi]
- Throughput maximization and resource optimization in NFV-enabled networksZichuan Xu, Weifa Liang, Alex Galis, Yu Ma. 1-7 [doi]
- Holiday syndrome: A measurement study of mobile social network use during holidaysChengliang Gao, Yuanxing Zhang, Kaigui Bian, Zhuojin Li, Yichong Bai, Xuanzhe Liu. 1-6 [doi]
- Secure off-path replication in content-centric networksMarc Mosko, Christopher A. Wood. 1-7 [doi]
- A cross-layer approach for ultra-low-latency machine type communicationOliver Ploder, Nino Palaoro, Bernhard Etzlinger, Andreas Springer. 1-6 [doi]
- Fairness enhancement in dual-hop wireless powered communication networksParisa Ramezani, Abbas Jamalipour. 1-6 [doi]
- Minimizing operational cost for zero information leakageMegumi Ando, Eli Upfal. 1-7 [doi]
- A thresholding-based antenna switching in MIMO cognitive radio networks with SWIPT-enabled secondary receiverFatma Benkhelifa, Mohamed-Slim Alouini. 1-6 [doi]
- Gamma-modulated Wavelet model for Internet of Things trafficYuhong Li, Yuanyuan Huang, Xiang Su, Jukka Riekki, Huber Flores, Chao Sun, Hanyu Wei, Hao Wang, Lei Han. 1-6 [doi]
- Secrecy performance analysis with optimal DF relay selection of underlay CR networks over Nakagami-m fading channelsHuan Zhang, Hongjiang Lei, Imran Shafique Ansari, Gaofeng Pan, Zhi Ren, Khalid A. Qaraqe. 1-6 [doi]
- On the coexistence of non-orthogonal multiple access and millimeter-wave communicationsZhiguo Ding, Pingzhi Fan, H. Vincent Poor. 1-6 [doi]
- Enhancing performance of heterogeneous cloud radio access networks with efficient user associationShaowei Wang, Yang Sun. 1-6 [doi]
- Enhancing mobile edge caching with bandwidth provisioning in software-defined mobile networksChengchao Liang, F. Richard Yu. 1-6 [doi]
- Secure and privacy-preserving concentration of metering data in AMI networksNeetesh Saxena, Bong-Jun Choi, Santiago Grijalva. 1-7 [doi]
- A testbed implementation of hybrid decision model based seamless lightweight vertical handoverTusher Chakraborty, Md. Shohrab Hossain, Mohammed Atiquzzaman. 1-6 [doi]
- Pilot contamination is not a fundamental asymptotic limitation in massive MIMOEmil Björnson, Jakob Hoydis, Luca Sanguinetti. 1-6 [doi]
- Modeling DoS attacks in WSNs with quantitative gamesQuentin Monnet, Mathieu Sassolas, Lynda Mokdad. 1-6 [doi]
- Antenna selection for MIMO-NOMA networksYuehua Yu, He Chen, Yonghui Li, Zhiguo Ding, Branka Vucetic. 1-6 [doi]
- An experimental study on the robustness of integer-forcing linear receiversCorina I. Ionita, Bobak Nazer, Chen Feng, Behnaam Aazhang. 1-7 [doi]
- Modeling and analysis of wireless networks using poisson hard-core processHan-Bae Kong, Ian Flint, Ping Wang, Dusit Niyato, Nicolas Privault. 1-6 [doi]
- App-centric and environment-aware monitoring and diagnosis in the cloudTiago Carvalho, Hyong S. Kim. 1-7 [doi]
- Wireless Internet of Things - Quantifying cost to transmit TCP data in lossy radio link conditionsCraig Lee, Andrea Fumagalli. 1-5 [doi]
- A real-time MIMO channel sounder for vehicle-to-vehicle propagation channel at 5.9 GHzRui Wang, C. Umit Bas, Olivier Renaudin, Seun Sangodoyin, Usman T. Virk, Andreas F. Molisch. 1-6 [doi]
- Dynamic bit selection in mixed-ADC cloud-RAN systemsJeongHun Park, Sungwoo Park, Ali Yazdan, Robert W. Heath Jr.. 1-6 [doi]
- Outage performance of full/half-duplex user relaying in NOMA systemsXinwei Yue, Yuanwei Liu, Shaoli Kang, Arumugam Nallanathan, Zhiguo Ding. 1-6 [doi]
- Asynchronous peak detection for demodulation in molecular communicationAndrew W. Eckford, Adam Noel. 1-6 [doi]
- QoS analysis of cognitive radios employing HARQSami Akin, Marwan Hammouda, Jürgen Peissig. 1-6 [doi]
- Preemptive dynamic scheduling algorithm for data relay satellite systemsBoyu Deng, Chunxiao Jiang, Linling Kuang, Song Guo, Ning Ge, Jianhua Lu. 1-6 [doi]
- DSSR: Balancing semantics and speed requirements in packet trace replayScott Fortner, Geoffrey G. Xie. 1-6 [doi]
- Flocking virtual machines in quest for responsive IoT cloud servicesSherif Abdelwahab, Bechir Hamdaoui. 1-6 [doi]
- Spatial modulation using analog phase shiftersWei Wang, Wei Zhang. 1-6 [doi]
- An approximate search framework for big dataShang Li, Zhigang Zhou, Hongli Zhang, Binxing Fang. 1-6 [doi]
- A context-aware user-driven strategy to exploit Offloading and sharing in ultra-dense deploymentsFaouzi Bouali, Klaus Moessner, Michael Fitch. 1-7 [doi]
- A fast converging algorithm for limited fronthaul C-RANs design: Power and throughput trade-offPhuong Luong, Charles L. Despins, François Gagnon, Le-Nam Tran. 1-6 [doi]
- Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONsSophia G. Petridou, Stylianos Basagiannis, Lefteris Mamatas. 1-6 [doi]
- Fountain code-inspired channel estimation for multi-user millimeter wave MIMO systemsMatthew Kokshoorn, He Chen, Yonghui Li, Branka Vucetic. 1-6 [doi]
- Low latency MEC framework for SDN-based LTE/LTE-A networksAnta Huang, Navid Nikaein, Tore Stenbock, Adlen Ksentini, Christian Bonnet. 1-6 [doi]
- User weighted probability algorithm for heterogeneous C-RAN interference mitigationImad Al-Samman, Reham Almesaeed, Angela Doufexi, Mark A. Beach, Andrew R. Nix. 1-7 [doi]
- Bandit strategies for blindly attacking networksSaiDhiraj Amuru, R. Michael Buehrer, Mihaela van der Schaar. 1-6 [doi]
- Scalable guaranteed-bandwidth multicast service in software defined ISP networksHardik Soni, Walid Dabbous, Thierry Turletti, Hitoshi Asaeda. 1-7 [doi]
- Distributed antenna system based frequency switch scheme evaluation for high-speed railwaysAli Wali, Junyuan Wang, Huiling Zhu, Jiangzhou Wang. 1-6 [doi]
- π/2-shifted phase shift keying on the hypersphere: Transmitter and receiver algorithmsChristoph Rachinger, Mohammad Ali Sedaghat, Ralf R. Müller, Johannes B. Huber. 1-6 [doi]
- Optimal coordinated beamforming with artificial noise for secure transmission in multi-cell multi-user networksYang Lu, Ke Xiong, Pingyi Fan, Zhangdui Zhong. 1-6 [doi]
- An efficient learning automata based task offloading in mobile cloud computing environmentsP. Venkata Krishna, Sudip Misra, Vankadara Saritha, Naga Raju Dasari, Mohammad S. Obaidat. 1-6 [doi]
- Multi-graph Zero-knowledge-based authentication system in Internet of ThingsI-Hsun Chuang, Bing-Jie Guo, Jen-Sheng Tsai, Yau-Hwang Kuo. 1-6 [doi]
- Is local blacklisting relevant in slow channel hopping low-power wireless networks?Vasileios Kotsiou, Georgios Z. Papadopoulos, Periklis Chatzimisios, Fabrice Theoleyre. 1-6 [doi]
- Secure and robust authentication for DC MicroGrids based on power talk communicationMarko Angjelichinoski, Pietro Danzi, Cedomir Stefanovic, Petar Popovski. 1-7 [doi]
- Partial overlapping chunk based dual-path transmission: Scheme and modellingJiahuan Zhang, Chunxi Li, Yongxiang Zhao, Baoxian Zhang. 1-6 [doi]
- Wireless powered communication networks in interference channelHanjin Kim, Hoon Lee, Inkyu Lee. 1-6 [doi]
- Multi-user small-scale spectrum aggregationPawel Kryszkiewicz, Adrian Kliks, Hanna Bogucka. 1-6 [doi]
- SDN based traffic engineering without optimization: A centrality based approachPedro Amaral, Paulo Pinto, Luis Bernardo, Fabio Silva. 1-7 [doi]
- MiniReal: A real SDN network testbed built over an SDN bare metal commodity switchShie-Yuan Wang, I-Yun Lee. 1-6 [doi]
- An analytical model for millimeter wave outdoor directional non-line-of-sight channelsR. T. Rakesh, Goutam Das, Debarati Sen. 1-6 [doi]
- Optimizing VNF live migration via para-virtualization driver and QuickAssist technologyJinshi Zhang, Liang Li, Dong Wang. 1-6 [doi]
- Multi-objective group organization methods in online elderly watching system of local communityShota Tatsukawa, Yosuke Tanigawa, Hideki Tode. 1-7 [doi]
- Finite length performance of random MAC strategiesKonstantinos Dovelos, Laura Toni, Pascal Frossard. 1-5 [doi]
- Structured sparse recovery algorithms for data decoding in media based modulationAshok Bandi, Chandra R. Murthy. 1-6 [doi]
- A cost sharing mechanism for location privacy preservation in big trajectory dataXiaotong Wu, Shu Li, Jun Yang, Wanchun Dou. 1-6 [doi]
- Exploiting network similarity for latency prediction of edge devicesShenghe Xu, Pei Liu, Shivendra S. Panwar. 1-5 [doi]
- A taxonomy-based approach for security in software-defined networkingChristian Banse, Julian Schütte. 1-6 [doi]
- Concurrent transmission based stackelberg game for D2D communications in mmWave networksYu Li, Zufan Zhang, Wei Wang, Honggang Wang. 1-6 [doi]
- Traffic density based adaptive QoS classes mapping for integrated LTE-WiMAX 5G networksMuntadher Alshaikh Ali, Amir Esmailpour, Nidal Nasser. 1-7 [doi]
- On the two time scale characteristics of wireless high speed railway networksChengxiao Yu, Wei Quan, Shui Yu, Hongke Zhang. 1-6 [doi]
- Optimizing mobility and energy charging for mobile cloudletYang Sui, Xiumin Wang, Min Pengt, Ning An. 1-6 [doi]
- SDN-enabled session continuity for wireless networksWei-Wen Chen, Li-Hsing Yen, Chia-Lin Chuo, Ting-Hsuan Heish, Chien-Chao Tseng. 1-6 [doi]
- Random walk based co-occurrence prediction in location-based social networksFatima Mourchid, Abdellatif Kobbane, Jalel Ben-Othman, Mohammed El Koutbi. 1-6 [doi]
- Performance analysis of wireless sensor networks with ginibre point process modelingHan-Bae Kong, Ping Wang, Dusit Niyato. 1-6 [doi]
- Cost Aware cloudlet Placement for big data processing at the edgeQiang Fan, Nirwan Ansari. 1-6 [doi]
- A decision-making model with relaxed dissensus condition toward consensus building via social mediaYusuke Sakumoto, Masaki Aida. 1-6 [doi]
- Optical datacenter networks with elastic optical switchesWojciech Kabacinski, Marek Michalski, Remigiusz Rajewski, Mariusz Zal. 1-6 [doi]
- Exploit concurrent transmissions through discernible interference cancellationJunmei Yao, Wei Lou, Kaishun Wu. 1-6 [doi]
- Energy-efficient M2M communications with mobile edge computing in virtualized cellular networksMeng Li, F. Richard Yu, Pengbo Si, Haipeng Yao, Enchang Sun, Yanhua Zhang. 1-6 [doi]
- Defense against advanced persistent threats: A Colonel Blotto game approachMinghui Min, Liang Xiao 0003, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam. 1-6 [doi]
- 2ER: Integrated information and energy relaying protocol for RF powered communication networkDeepak Mishra, Swades De, Dilip Krishnaswamy. 1-6 [doi]
- Transmit antenna selection schemes for MISO-NOMA cooperative downlink transmissions with hybrid SWIPT protocolNhu Tri Do, Daniel Benevides da Costa, Trung Quang Duong, Beongku An. 1-6 [doi]
- Towards using local energy to enhance smart meters privacyMohamed Attia, Sidi-Mohammed Senouci, El-Hassane Aglzim. 1-6 [doi]
- Compressive channel estimation and multi-user detection in C-RANQi He, Tony Q. S. Quek, Zhi Chen, Shaoqian Li. 1-6 [doi]
- Training-based synchronization for quantity-based modulation in inverse Gaussian channelsBo-Kai Hsu, Po-Chun Chou, Chia-han Lee, Ping-Cheng Yeh. 1-6 [doi]
- Joint access and backhaul resource management for ultra-dense networksHongcheng Zhuang, Jun Chen, Dapeng Oliver Wu. 1-6 [doi]
- Priority-based spectrum access in cognitive D2D networks for IoTXingya Liu, Jiang (Linda) Xie. 1-6 [doi]
- Minimizing upload latency for critical tasks in cellular-based IoT networks using multiple relaysShang-Hong Hsu, Chi-Han Lin, Chih-Yu Wang, Wen-Tsuen Chen. 1-7 [doi]
- Energy efficiency in two-tiered wireless sensor networksJun Guo, Erdem Koyuncu, Hamid Jafarkhani. 1-6 [doi]
- Optimal energy beamforming and data routing for immortal wireless sensor networksRong Du, Ayca Ozcelikkale, Carlo Fischione, Ming Xiao. 1-6 [doi]
- Connectionless access for massive machine type communications in ultra-dense networksPetteri Kela, Henrik Lundqvist, Mário Costa, Kari Leppänen, Riku Jäntti. 1-6 [doi]
- Temporal netgrid model based routing optimization in satellite networksJian Li, Hancheng Lu, Yali Wang. 1-6 [doi]
- SegHyPer: Segmentation- and hypothesis based network performance evaluation for high speed train usersTaulant Berisha, Philipp Svoboda, Stephan Ojak, Christoph F. Mecklenbräuker. 1-6 [doi]
- Efficient offloading mechanism for UAVs-based value added servicesSihem Ouahouah, Tarik Taleb, JaeSeung Song, Chafika Benzaid. 1-6 [doi]
- Robust power optimization for device-to-device communication in a multi-cell network under partial CSIAli Ramezani-Kebrya, Min Dong, Ben Liang, Gary Boudreau, S. Hossein Seyedmehdi. 1-6 [doi]
- A novel anomaly detection system to assist network management in SDN environmentLuiz Fernando Carvalho, Gilberto Fernandes, Joel J. P. C. Rodrigues, Leonardo de Souza Mendes, Mario Lemes Proença Jr.. 1-6 [doi]
- Asymptotic analysis of random lattices in high dimensionsYuan Qi, Rongrong Qian. 1-7 [doi]
- Preprocessor design for hybrid preprocessing with selection in massive MISO systemsVishnu V. Ratnam, Ozgun Y. Bursalioglu, Haralabos C. Papadopoulos, Andreas F. Molisch. 1-7 [doi]
- Sensing, probing, and transmitting strategy for energy harvesting cognitive radioKeyu Wu, Hai Jiang, Chintha Tellambura. 1-6 [doi]
- Power saving model for mobile device and virtual base station in the 5G eraM. Sajid Mushtaq, Scott Fowler, Abdelhamid Mellouk. 1-6 [doi]
- Rate allocation for strategic users in Gaussian multiple access wiretap channelsHao Ge, Randall A. Berry. 1-7 [doi]
- Joint optimization of energy consumption and throughput of directional WMNsIyad Lahsen Cherif, Lynda Zitoune, Véronique Vèque. 1-6 [doi]
- Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systemsFrancisco J. Aparicio-Navarro, Jonathon A. Chambers, Konstantinos Kyriakopoulos, Yu Gong, David J. Parish. 1-7 [doi]
- Joint covariance matrix estimation and pilot allocation in massive MIMO systemsDavid Neumann, Kamel Shibli, Michael Joham, Wolfgang Utschick. 1-6 [doi]
- Wellness assessment through environmental sensors and smartphonesMadison McCarthy, Petros Spachos. 1-6 [doi]
- High order cumulants based spectrum sensing and power recognition in hybrid interweave-underlay spectrum accessDanyang Wang, Zan Li, Ning Zhang 0007, Peihan Qi, Xuemin Sherman Shen. 1-6 [doi]
- The optimum rate of inter-frequency scan in inter-frequency HetNetsAli Mahbas, Huiling Zhu, Jiangzhou Wang. 1-6 [doi]
- Application protocols enabling internet of remote things via random access satellite channelsManlio Bacco, Marco Colucci, Alberto Gotta. 1-6 [doi]
- SDN for MPTCP: An enhanced architecture for large data transfers in datacentersAli Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. 1-7 [doi]
- Stable throughput region of downlink NOMA transmissions with limited CSIYong Zhou, Vincent W. S. Wong. 1-7 [doi]
- QoS-oriented capacity planning for edge computingYu Xiao, Marius Noreikis, Antti Ylä-Jääski. 1-6 [doi]
- Heartbeat detection with Doppler radar based on spectrogramEriko Mogi, Tomoaki Ohtsuki. 1-6 [doi]
- BSM dissemination with network coded relaying in VANETs at NLOS intersectionsYumeng Gao, Peter Han Joo Chong, Yong Liang Guan. 1-6 [doi]
- A six-port modulator based RF transmission system: Application in an OFDM environmentIl-Do Choi, Kyoungtae Lee, Jin-Sup Kim, Se-whan Choi, Uooyeol Yoon, Ju Yong Lee. 1-6 [doi]
- On the use of bio-inspired desynchronization algorithms for beaconing in ITSAlexandre Mouradian, Véronique Vèque. 1-6 [doi]
- A closed-form symbol error rate analysis for successive interference cancellation decodersJinming Wen, Keyu Wu, Chintha Tellambura. 1-6 [doi]
- Computing the hardware complexity of digital transparent satellite processors on the basis of performance requirementsV. Sulli, Domenico Giancristofaro, Fortunato Santucci, Marco Faccio. 1-7 [doi]
- Fast centralized authentication in Wi-Fi HaLow networksDmitry Bankov, Evgeny M. Khorov, Andrey I. Lyakhov, Ekaterina Stepanova. 1-6 [doi]
- Traffic offloading with maximum user capacity in dense D2D cooperative networksNadine Abbas, Zaher Dawy, Hazem M. Hajj, Sanaa Sharafeddine, Fethi Filali. 1-6 [doi]
- Robust beamforming for secrecy rate in cooperative cognitive radio multicast communicationsVan-Dinh Nguyen, Trung Quang Duong, Oh-Soon Shin, Arumugam Nallanathan, George K. Karagiannidis. 1-6 [doi]
- Impact of improper Gaussian signaling on hardware impaired systemsSidrah Javed, Osama Amin, Salama S. Ikki, Mohamed-Slim Alouini. 1-6 [doi]
- Lightweight mutual authentication among sensors in body area networks through Physical Unclonable FunctionsLiping Xie, Weichao Wang, Xinghua Shi, Tuanfa Qin. 1-6 [doi]
- An efficient learning-based approach to multi-objective route planning in a smart cityYuan Yao, Zhe Peng, Bin Xiao 0001, Jichang Guan. 1-6 [doi]
- A Semi-Markov Decision Model-based brokering mechanism for mobile cloud marketGlaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Elena Degtiareva, Joel J. P. C. Rodrigues. 1-6 [doi]
- On the stability and throughput of compressive random access in MTCJinho Choi. 1-6 [doi]
- Efficient interference-aware power control in wireless ad hoc networksJunmei Yao, Wei Lou, Chao Yang, Kaishun Wu. 1-6 [doi]
- Load and resource aware federation of disjoint sensor network segmentsSookyoung Lee, Mohamed F. Younis, Ben Anglin, Meejeong Lee. 1-6 [doi]
- GroupSec: A new security model for the webSpencer Sevilla, J. J. Garcia-Luna-Aceves, Hamid R. Sadjadpour. 1-6 [doi]
- Optimized receiver control in interactive multiview video streaming systemsXue Zhang, Laura Toni, Pascal Frossard, Yao Zhao, Chunyu Lin. 1-6 [doi]
- Privacy-aware incentive mechanism for mobile crowd sensingJing Yang Koh, Gareth W. Peters, Derek Leong, Ido Nevat, Wai-Choong Wong. 1-6 [doi]
- Caching in Gaussian interference channel with QoS constraintsEstefania Recayte, Giuseppe Cocco, Alessandro Vanelli-Coralli. 1-7 [doi]
- A closer look at Eclipse attacks against Tor hidden servicesQingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang. 1-6 [doi]
- Optimizing pilot overhead for ultra-reliable short-packet transmissionMohammadreza Mousaei, Besma Smida. 1-5 [doi]
- Group joining time for Cognitive Personal Area Networks (CPANs) with independent node arrivalsMd. Mizanur Rahman, Jelena V. Misic, Vojislav B. Misic. 1-6 [doi]
- A refactoring approach for optimizing mobile networksMatteo Pozza, Ashwin Rao, Armir Bujari, Hannu Flinck, Claudio E. Palazzi, Sasu Tarkoma. 1-6 [doi]
- Security aspects of confidential network codingStefan Pfennig, Elke Franz. 1-6 [doi]
- Distributed channel prediction for multi-agent systemsVinay-Prasad Chowdappa, Markus Frohole, Henk Wymeersch, Carmen Botella. 1-6 [doi]
- Secure multi-pair massive MIMO two-way amplify-and-forward relay network with power allocation schemeXin Pan, Li Guo 0004, Chao Dong, Tianyu Kang. 1-5 [doi]
- Fundamental limits on communication latency for distributed control via electromechanical wavesEman M. Hammad, Abdallah K. Farraj, Deepa Kundur. 1-6 [doi]
- Self-adaptive beaconing for vehicular ad hoc networksDaxin Tian, Jianshan Zhou, Zhengguo Sheng, Min Chen, Qiang Ni, Victor C. M. Leung. 1-6 [doi]
- Traffic characteristics on 1Gbit/s access aggregation linksHenrik Abrahamsson, Bengt Ahlgren, Patrik Lindvall, Johanna Nieminen, Per Tholin. 1-7 [doi]
- Millimeter wave small-scale spatial statistics in an urban microcell scenarioShu Sun, Hangsong Yan, George R. MacCartney, Theodore S. Rappaport. 1-7 [doi]
- Economics in mobile data offloading with uniform pricingMingmei Li, Tony Q. S. Quek, Costas Courcoubetis. 1-6 [doi]
- Throughput optimization for massive random access of M2M communications in LTE networksWen Zhan, Lin Dai. 1-6 [doi]
- Channel estimation for filter bank multicarrier systems in low SNR environmentsJonathan Driggs, Taylor Sibbett, Hussein Moradi, Behrouz Farhang-Boroujeny. 1-7 [doi]
- On practical network coded ARQ for two-way wireless communicationHongyi Zhu, Xinghao Gu, Besma Smida, David J. Love. 1-6 [doi]
- A flow aggregation method based on end-to-end delay in SDNTakuya Kosugiyama, Kazuki Tanabe, Hiroki Nakayama, Tsunemasa Hayashi, Katsunori Yamaoka. 1-6 [doi]
- Resolution of network topology using fast graph miningShohei Kamamura, Aki Fukuda, Hiroshi Yamamoto, Hiroki Date, Rie Hayashi, Yoshihiko Uematsu. 1-6 [doi]
- Bit-interleaved polar-coded OFDM for low-latency M2M wireless communicationsToshiaki Koike-Akino, Ye Wang, Stark C. Draper, Kenya Sugihara, Wataru Matsumoto. 1-7 [doi]
- Traffic-pattern aware opportunistic wireless energy harvesting in cognitive radio networksM. Ejaz Ahmed, Dong In Kim. 1-6 [doi]
- Flexible precoding for mobile satellite system hot spotsVincenzo Icolari, Stefano Cioni, Pantelis-Daniel M. Arapoglou, Alberto Ginesi, Alessandro Vanelli-Coralli. 1-6 [doi]
- Enhancing the reliability of services in NFV with the cost-efficient redundancy schemeWeiran Ding, Hongfang Yu, Shouxi Luo. 1-6 [doi]
- The dark side of network functions virtualization: A perspective on the technological sustainabilityRaffaele Bolla, Roberto Bruschi, Franco Davoli, Chiara Lombardo, Jane Frances Pajo, Odnan Ref Sanchez. 1-7 [doi]
- Capacity analysis of aerial small cellsAkarsh Pokkunuru, Qin Zhang, Pu Wang. 1-7 [doi]
- Collision vs non-collision distributed time synchronization for dense IoT deploymentsMaria Antonieta Alvarez, Umberto Spagnolini. 1-6 [doi]
- Adaptation of a Conference Key Distribution System for the wireless ad hoc networkChristos Tselikis, Christos Douligeris, Sarandis Mitropoulos, Nikos Komninos, George Tselikis. 1-6 [doi]
- Time-frequency interference rejection based on the S-transform for GNSS applicationsYazan Abdoush, Giacomo Pojani, Marco Bartolucci, Giovanni Emanuele Corazza. 1-6 [doi]
- A security metric for the evaluation of collaborative intrusion detection systems in wireless sensor networksAlex Ramos, Marcella Lazar, Raimir Holanda Filho, Joel J. P. C. Rodrigues. 1-6 [doi]
- Dual-anonymous reward distribution for mobile crowdsensingJianbing Ni, Xiaodong Lin, Qi Xia, Xuemin Sherman Shen. 1-6 [doi]
- Cost efficient network slicing for optical packet switched torus data centersBogdan Uscumlic, Jesse E. Simsarian, Arnaud Dupas, Eric Dutisseuil, Gopalasingham Aravinthan, Thierry Zami, Sébastien Bigo, Yvan Pointurier. 1-7 [doi]
- Algorithm for shared path for protection of space division multiplexing elastic optical networksHelder M. N. S. Oliveira, Nelson L. S. Da Fonseca. 1-6 [doi]
- Network slicing in 5G: An auction-based modelMenglan Jiang, Massimo Condoluci, Toktam Mahmoodi. 1-6 [doi]
- Measurement and analytics on social groups of device-to-device sharing in mobile social networksHui Wang, Shanjia Wang, Yuhua Zhang, Xiaofei Wang, Keqiu Li, Tianpeng Jiang. 1-6 [doi]
- Spatial quadrature modulation for visible light communication in indoor environmentDiana Dawoud, Fabien Heliot, Muhammad Ali Imran, Rahim Tafazolli. 1-6 [doi]
- Modeling software defined satellite networks using queueing theoryTaixin Li, Huachun Zhou, Hongbin Luo, Wei Quan, Shui Yu. 1-6 [doi]
- Theoretical analysis of the target detection rules for the UAV-based wireless sensor networksPeng Sun, Azzedine Boukerche, Qiyue Wu. 1-6 [doi]
- Selective signal sample forwarding for receive diversity in energy-constrained sensor networksMuhammad Nabeel, Bastian Bloessl, Falko Dressler. 1-6 [doi]
- Joint beamforming design and power splitting control in cooperative SWIPT NOMA systemsYanqing Xu, Chao Shen, Zhiguo Ding, Xiaofang Sun, Shihao Yan, Gang Zhu. 1-6 [doi]
- Distance based duplex mode selection in large scale peer-to-peer wireless networksKasun T. Hemachandra, Abraham O. Fapojuwo. 1-6 [doi]
- A dynamic scalable scheme for managing mixed crowdsnajah abuali, Abd-Elhamid M. Taha. 1-5 [doi]
- Wireless underground channel diversity reception with multiple antennas for internet of underground thingsAbdul Salam, Mehmet C. Vuran. 1-7 [doi]
- Together or alone: Detecting group mobility with wireless fingerprintsGürkan Solmaz, Fang-Jing Wu. 1-7 [doi]
- ADMM-based distributed algorithm for emergency backup in time-variant inter-DC networksXiaokang Xie, Qing Ling, Ping Lu, Zuqing Zhu. 1-6 [doi]
- Towards trustworthy and private keyword search in encrypted decentralized storageChengjun Cai, Xingliang Yuan, Cong Wang. 1-7 [doi]
- Application-driven virtual network embedding for industrial wireless sensor networksMingyan Li, Cunqing Hua, Cailian Chen, Xinping Guan. 1-6 [doi]
- Single-carrier index modulation and CS detectionJinho Choi. 1-6 [doi]
- Resource allocation for V2X communications: A local search based 3D matching approachQing Wei, Wanlu Sun, Bo Bai, Li Wang, Erik G. Ström, Mei Song. 1-6 [doi]
- Freely drifting cubesat constellations for improving coverage for Arctic sensor networksRoger Birkeland. 1-6 [doi]
- Queue demotion threshold configuration for minimizing flow completion in information-agnostic datacentersBo Xu, Chao Hu, Bo Liu, Chang-you Xing, Dongyang Li. 1-6 [doi]
- Computation offloading game for an UAV network in mobile edge computingMohamed Ayoub Messous, Hichem Sedjelmaci, Noureddin Houari, Sidi-Mohammed Senouci. 1-6 [doi]
- Cross-layer optimized routing with low duty cycle TDMA across multiple wireless body area networksSamiya M. Shimly, David B. Smith, Samaneh Movassaghi. 1-6 [doi]
- Options-based sequential auctions for dynamic cloud resource allocationSeyyedali Hosseinalipour, Huaiyu Dai. 1-6 [doi]
- A structured irregular repetition slotted ALOHA scheme with low error floorsEnrico Paolini, Gianluigi Liva, Alexandre Graell i Amat. 1-6 [doi]
- On channel equalization for full-duplex relay networksKonstantin Muranov, Besma Smida, Natasha Devroye. 1-6 [doi]
- On-the-fly secure key generation with deterministic modelsRick Fritschek, Gerhard Wunder. 1-6 [doi]
- Geo-Network Coding Function Virtualization for reliable communication over satelliteTan Do-Duy, M. A. Vazquez-Castro. 1-6 [doi]
- Efficient auction mechanisms for two-layer vehicle-to-grid energy trading in smart gridWeifeng Zhong, Kan Xie, Yi Liu, Chao Yang, Shengli Xie. 1-6 [doi]
- Capacity loss and antenna array geometryThibaud Gabillard, Vidhya Sridhar, Athanassios Manikas. 1-7 [doi]
- Fault-tolerant IaaS management for networked cloud infrastructure with SDNHeli Amarasinghe, Abdallah Jarray, Ahmed Karmouch. 1-7 [doi]
- Enhanced automatic neighbor relation function for 5G cellular systems with massive MIMOMin Huang, Xu Zhang. 1-6 [doi]
- A configurable FPGA FEC unit for Tb/s optical communicationJakob Dahl Andersen, Knud J. Larsen, Christian Bering Bogh, Søren Forchhammer, Francesco Da Ros, Kjeld Dalgaard, Shajeel Iqbal. 1-6 [doi]
- Distributed power allocation for D2D communications overlaying OFDMA networksAndrea Abrardo, Marco Moretti. 1-6 [doi]
- Cooperative non-orthogonal relaying for security enhancement in untrusted relay networksLu Lv, Qiang Ni, Zhiguo Ding, Jian Chen. 1-6 [doi]
- Cramer-Rao bound for AOA-based VLP with an aperture-based receiverHeidi Steendam, Thomas Q. Wang, Jean Armstrong. 1-6 [doi]
- Joint antenna selection and transceiver design for MU-MIMO mmWave systemsXiongfei Zhai, Yunlong Cai, Qingjiang Shi, Minjian Zhao, Geoffrey Ye Li, Benoît Champagne. 1-6 [doi]
- Big-data-driven network partitioning for ultra-dense radio access networksSiqi Huang, Tao Han, Nirwan Ansari. 1-6 [doi]
- Uncertainty principle based spatial-temporal resolution tradeoff for cognitive radio networksChang Liu, Husheng Li, Jie Wang, Minglu Jin, Jae-Moung Kim. 1-6 [doi]
- Performance of wiretap Rayleigh fading channels under statistical delay constraintsFarshad Naghibi, Sebastian Schiessl, Hussein Al-Zubaidy, James Gross. 1-7 [doi]
- A truthful content auction scheme for distributee content delivery in ultra-dense networksBowen Liu, Heli Zhang, Hong Ji, Xi Li, Victor C. M. Leung. 1-6 [doi]
- Interference-aware OFDM receiver for channels with sparse common supportsOana-Elena Barbu, Carles Navarro i Manchon, Mihai-Alin Badiu, Christian Rom, Tommaso Balercia, Bernard Henri Fleury. 1-6 [doi]
- Low-latency routing for fronthaul network: A Monte Carlo machine learning approachYu Nakayama, Daisuke Hisano, Takahiro Kubo, Tatsuya Shimizu, Hirotaka Nakamura, Jun Terada, Akihiro Otaka. 1-6 [doi]
- On the ergodic secrecy capacity with full duplex communicationNurul H. Mahmood, Imran Shafique Ansari, Preben E. Mogensen, Khalid A. Qaraqe. 1-6 [doi]
- A novel approach for spectral efficiency analysis in MIMO cellular networksGeordie George, Ratheesh Kumar Mungara, Angel Lozano, Martin Haenggi. 1-6 [doi]
- Big data set privacy preserving through sensitive attribute-based groupingYouyang Qu, Shui Yu, Longxiang Gao, Jianwei Niu 0002. 1-6 [doi]
- Urban context aware human mobility model based on temporal correlationXu Kang, Liang Liu, Huadong Ma, Dong Zhao. 1-6 [doi]
- Sphere decoding for spatial permutation modulation MIMO systemsJung-Chun Chi, Yu-Cheng Yeh, I-Wei Lai, Yuan-Hao Huang. 1-8 [doi]
- Incremental anchor layout for indoor positioningTianzhu Qiao, Huaping Liu. 1-6 [doi]
- Sparse channel estimation in millimeter wave communications: Exploiting joint AoD-AoA angular spreadPu Wang, Milutin Pajovic, Philip V. Orlik, Toshiaki Koike-Akino, Kyeong Jin Kim, Jun Fang. 1-6 [doi]
- Automatic privacy leakage detection for massive android apps via a novel hybrid approachHongyi Chen, Ho-Fung Leung, Biao Han, Jinshu Su. 1-7 [doi]
- Prototype filter design for FBMC in massive MIMO channelsAmir Aminjavaheri, Arman Farhang, Linda E. Doyle, Behrouz Farhang-Boroujeny. 1-6 [doi]
- Enhanced Random Access: Initial access load balance in highly dense LTE-A networks for multiservice (H2H-MTC) trafficMohammad Istiak Hossain, Amin Azari, Jan Markendahl, Jens Zander. 1-7 [doi]
- Energy efficient beamforming design for full-duplex MIMO interference channelsAli Cagatay Cirik, Sudip Biswas, Satyanarayana Vuppala, Tharmalingam Ratnarajah. 1-6 [doi]
- Accessing the hidden available spectrum in cognitive radio networks under GSM-based primary networksAntara Hom Chowdhury, Yi Song, Chengzong Pang. 1-6 [doi]
- Coverage and achievable rate analysis for indoor terahertz wireless networksAnamaria Moldovan, Prasanth Karunakaran, Ian F. Akyildiz, Wolfgang H. Gerstacker. 1-7 [doi]
- FLARP, fast lightweight available rate probing: Benchmarking mobile broadband networksMichael Rindler, Philipp Svoboda, Markus Rupp. 1-7 [doi]
- LTE user equipment RSRP difference elimination method using multidimensional scaling for LTE fingerprint-based positioning systemLin Ma, Ningdi Jin, Yang Cui, Yubin Xu. 1-6 [doi]
- Power and spreading factor control in low power wide area networksBrecht Reynders, Wannes Meert, Sofie Pollin. 1-6 [doi]
- Synchronization of time-of-flight 3D sensors for optical communicationHannes Plank, Armin Schoenlieb, Christoph Ehrenhöfer, Christian Steger, Gerald Holweg, Norbert Druml. 1-6 [doi]
- Non-coherent multi-layer constellations for unequal error protectionKareem M. Attiah, Karim G. Seddik, Ramy H. Gohary, Halim Yanikomeroglu. 1-6 [doi]
- Outage performance of NOMA in downlink SDMA systems with limited feedbackQian Yang, Tong-Xing Zheng, Hui-Ming Wang, Hao Deng, Yi Zhang, Xiayi Qiu, Pengcheng Mu. 1-6 [doi]
- Protecting user privacy based on secret sharing with fault tolerance for big data in smart gridZhitao Guan, Guanlin Si, Xiaojiang Du, Peng Liu, Zijian Zhang, Zhenyu Zhou. 1-6 [doi]
- Agglomerative user clustering and downlink group scheduling for FDD massive MIMO systemsXiaoyu Sun, Xiqi Gao, Geoffrey Ye Li, Wei Han. 1-6 [doi]
- Performance analysis of uplink sparse code multiple access with iterative multiuser receiverJinchen Bao, Zheng Ma, Ming Xiao, Theodoros A. Tsiftsis, Zhongliang Zhu. 1-6 [doi]
- Stochastic modeling, analysis and optimization of coded caching in small-cell networksXuejian Xu, Meixia Tao. 1-6 [doi]
- Making least privilege the low-hanging fruit in cloudsTian Puyang, Qingni Shen, Yang Luo, Wu Luo, Zhonghai Wu. 1-7 [doi]
- Optimal linear precoding for indoor visible light communication systemHoussem Sifaou, Ki-Hong Park, Abla Kammoun, Mohamed-Slim Alouini. 1-5 [doi]
- On the optimal power allocation for two-way full-duplex AF relay networksChe Lin, Jyun-Wei Li. 1-7 [doi]
- Delay optimal scheduling for network coding broadcastEmmanouil Skevakis, Ioannis Lambadaris. 1-6 [doi]
- ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attackDongyang Xu, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun. 1-6 [doi]
- Spatially and spectrally flexible lightpath schedulingJeremy M. Plante, Vinod M. Vokkarane. 1-7 [doi]
- Optimal scalar linear codes for single unicast neighboring interference symmetric index codingNiranjana Ambadi, B. Sundar Rajan. 1-7 [doi]
- Optimization of network service chain provisioningNicolas Huin, Brigitte Jaumard, Frédéric Giroire. 1-7 [doi]
- Optimal resource allocation for multicarrier MISO-NOMA systemsYan Sun, Derrick Wing Kwan Ng, Robert Schober. 1-7 [doi]
- TVM: Tabular VM migration for reducing hop violations of service chains in cloud datacentersYing-Feng Wu, Yu-Lun Su, Charles H.-P. Wen. 1-6 [doi]
- Physical layer security for optical attocell networksZhe Chen, Harald Haas. 1-6 [doi]
- Information diffusion algorithms over WSNs for non-asymptotic confidence region evaluationAlex Calisti, Davide Dardari, Gianni Pasolini, Michel Kieffer, Francesca Bassi. 1-7 [doi]
- Identifying counterfeit smart grid devices: A lightweight system level frameworkLeonardo Babun, Hidayet Aksu, A. Selcuk Uluagac. 1-6 [doi]
- Achieving joint secrecy with cache-channel coding over erasure broadcast channelsSarah Kamel, Mireille Sarkiss, Michele A. Wigger. 1-6 [doi]
- Performance of advanced telecommand frame synchronizer under pulsed jamming conditionsNele Noels, Marc Moeneclaey. 1-6 [doi]
- Noise-suppressing chaos generator to improve BER for DCSK systemsWeiwei Rao, Lin Zhang, Zhiping Zhang, Zhiqiang Wu 0001. 1-6 [doi]
- Asynchronous resource allocation in distributed heterogeneous networksAmrit S. Bedi, Ketan Rajawat. 1-7 [doi]
- Towards QoE named content-centric wireless multimedia sensor networks with mobile sinksGaolei Li, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Tianpeng Ye. 1-6 [doi]
- Two-stage uplink training for pilot spoofing attack detection and secure transmissionJiandong Xie, Ying-Chang Liang, Jun Fang, Xin Kang. 1-6 [doi]
- RF-spectrum opportunities for cognitive radio networks operating over GSM channelsMiguel Luis, Rodolfo Oliveira, Rui Dinis, Luis Bernardo. 1-6 [doi]
- Embedding virtual multicast trees in software-defined networksEvrim Guler, Danyang Zheng, Guangchun Luo, Ling Tian, Xiaojun Cao. 1-6 [doi]
- CTR: Cluster based topological routing for disaster response networksVijay K. Shah, Satyaki Roy, Simone Silvestri, Sajal K. Das. 1-6 [doi]
- QoE estimation-based server benchmarking for virtual video delivery platformLauri Koskimies, Tarik Taleb, Miloud Bagaa. 1-6 [doi]
- On the effective capacities of distributed and co-located large-scale antenna systemsCong Shen, Zehao Yu, Chang Wen Chen, Feng Wu. 1-6 [doi]
- Are you in the line? RSSI-based queue detection in crowdsFang-Jing Wu, Gürkan Solmaz. 1-7 [doi]
- Mutual coupling exploitation for point-to-point MIMO by constructive interferenceAng Li, Christos Masouros. 1-6 [doi]
- Asynchronous pilots scheduling in massive MIMO systemsZhichao Zhou, Dong Wang, Zhenchao Wang. 1-6 [doi]
- A big data based dynamic bandwidth allocation strategy with secrecy constraintsSai Xu, Shuai Han, Wei-Xiao Meng, Cheng Li, Yang Cui. 1-6 [doi]
- Energy-efficient transmission for wireless powerec D2D communication networksYanxia Zhang, Jing Zhang, Yan Sun, Derrick Wing Kwan Ng. 1-7 [doi]
- Outage analysis of spectrum sharing multi-antenna multi-relay networksZhenzhen Hu, Julian Cheng, Zhongpei Zhang. 1-5 [doi]
- Stream reasoning-based control of caching strategies in CCN routersHarald Beck, Bruno Bierbaumer, Minh Dao-Tran, Thomas Eiter, Hermann Hellwagner, Konstantin Schekotihin. 1-6 [doi]
- Path planning for aerial sensor networks with connectivity constraintsXiuming Liu, Teng Xi, Edith C. H. Ngai, Wendong Wang. 1-6 [doi]
- Reinforcement learning in MIMO wireless networks with energy harvestingHoda Ayatollahi, Cristiano Tapparello, Wendi B. Heinzelman. 1-6 [doi]
- Joint backhaul and access optimization for service-segment-based VN admission controlMeisam Mirahsan, Hamid Farmanbar, Halim Yanikomeroglu. 1-6 [doi]
- Residual self-interference cancellation and data detection in full-duplex communication systemsAbbas Koohian, Hani Mehrpouyan, Ali Arshad Nasir, Salman Durrani, Steven D. Blostein. 1-6 [doi]
- Traffic profiling for mobile video streamingDimitrios Tsilimantos, Theodoros Karagkioules, Amaya Nogales-Gómez, Stefan Valentin. 1-7 [doi]
- Redundant placement of virtualized network functions for LTE evolved Multimedia Broadcast Multicast ServicesHernani D. Chantre, Nelson L. S. Da Fonseca. 1-7 [doi]
- Mitigation of phase noise in massive MIMO systems: A rate-splitting approachAnastasios K. Papazafeiropoulos, Bruno Clerckx, Tharmalingam Ratnarajah. 1-7 [doi]
- New dynamic, reliable and energy efficient scheduling for wireless body area networks (WBAN)Marwa Salayma, Ahmed Yassin Al-Dubai, Imed Romdhani, Youssef Nasser. 1-6 [doi]
- Modeling and analysis for admission control of M2M communications using network calculusJun Huang, Mengxi Zeng, Cong-Cong Xing, Jiangtao Luo, Fen Hou. 1-6 [doi]
- Throughput analysis of point-to-multi-point hybric FSO/RF networkTamer Rakia, Fayez Gebali, Hong-Chuan Yang, Mohamed-Slim Alouini. 1-6 [doi]
- Millimeter wave adaptive transmission using spatial scattering modulationYacong Ding, Kyeong Jin Kim, Toshiaki Koike-Akino, Milutin Pajovic, Pu Wang, Philip V. Orlik. 1-6 [doi]
- An artificial neural network approach for loss estimation in bufferless optical packet switched networksSaleh Yousefi, Jamshid Bagherzadeh, Masoud Asghari. 1-6 [doi]
- Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSIXuanxuan Tang, Yueming Cai, Wendong Yang, Yuzhen Huang, Trung Quang Duong, Weiwei Yang. 1-6 [doi]
- QoS prediction method for data supply chain based on contextPeng Li, Hong Luo, Tin Yu Wu, Mohammad S. Obaidat. 1-7 [doi]
- IEEE 802.11ac: Effect of channel bonding on spectrum utilization in dense environmentsYousri Daldoul, Djamal-Eddine Meddour, Adlen Ksentini. 1-6 [doi]
- Coordinated maritime missions of unmanned vehicles - Network architecture and performance analysisArtur Zolich, Atle Sogrov, Erlend Vagsholm, Vegard Hovstein, Tor Arne Johansen. 1-7 [doi]
- Resources optimization and efficient distribution of shared virtual sensors in sensor-cloudElie El Rachkidi, Nazim Agoulmine, Nada Chendeb Taher, Djamel Belaïd. 1-6 [doi]
- Gesture recognition with wearable 9-axis sensorsFang-Ting Liu, Yong-Ting Wang, Hsi-Pin Ma. 1-6 [doi]
- Power efficiency of improper signaling in MIMO full-duplex relaying for K-user interference networksAli Kariminezhad, Aydin Sezgin, Marius Pesavento. 1-6 [doi]
- CFT: A Cluster-based File Transfer Scheme for highway VANETsQuyuan Luo, Changle Li, Qiang Ye, Tom H. Luan, Lina Zhu, Xiaolei Han. 1-6 [doi]
- Compressive RF training and channel estimation in massive MIMO with limited RF chainsAn Liu, Vincent K. N. Lau, Michael L. Honig, Lixiang Lian. 1-6 [doi]
- ICN-based protocol architectures for next-generation backhauling over satelliteTomaso de Cola, Andrea Blanco. 1-6 [doi]
- FlexCRAN: A flexible functional split framework over ethernet fronthaul in Cloud-RANChia-Yu Chang, Navid Nikaein, Raymond Knopp, Thrasyvoulos Spyropoulos, S. Sandeep Kumar. 1-7 [doi]
- Performance evaluation of movement prediction techniques for vehicular networksNoura Aljeri, Azzedine Boukerche. 1-6 [doi]
- Online caching in heterogeneous networksFrederic Gabry, Valerio Bioglio, Ingmar Land. 1-5 [doi]
- U-safety: Urban safety analysis in a smart cityZhe Peng, Bin Xiao 0001, Yuan Yao, Jichang Guan, Fan Yang. 1-6 [doi]
- Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networksJin Cao, Maode Ma, Hui Li 0006, Yulong Fu, Ben Niu, FengHua Li. 1-6 [doi]
- Online Bandwidth Calendaring: On-the-fly admission, scheduling, and path computationMaxime Dufour, Stefano Paris, Jeremie Leguay, Moez Draief. 1-6 [doi]
- A rewarding scheme for collaborative crowdsourcing in cellular NetworksKeita Hasegawa, Kohei Sugiyama, Yuki Koizumi, Atsushi Tagami, Toru Hasegawa. 1-6 [doi]
- A combined optical spectrum scrambling and defragmentation in multi-core fiber networksSandeep Kumar Singh, Wolfgang Bziuk, Admela Jukan. 1-6 [doi]
- Cumulant based operating point estimation for communication satellite transpondersMatthias G. Schraml, Andreas Knopp. 1-7 [doi]
- Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced dataQing Wei, Hui Zhu, Rongxing Lu, Hui Li 0006. 1-6 [doi]
- Energy efficient resource allocation for HARQ with statistical CSI in multiuser ad hoc networksXavier Leturc, Christophe J. Le Martret, Philippe Ciblat. 1-6 [doi]
- Internet censorship in Italy: An analysis of 3G/4G networksGiuseppe Aceto, Antonio Montieri, Antonio Pescapè. 1-6 [doi]
- Experimental evaluation of functional splits for 5G cloud-RANsNikos Makris, Pavlos Basaras, Thanasis Korakis, Navid Nikaein, Leandros Tassiulas. 1-6 [doi]
- Multipair full-duplex massive MIMO relaying with low-resolution ADCs and imperfect CSIChuili Kong, Caijun Zhong, Shi Jin, Sheng Yang, Hai Lin, Zhaoyang Zhang 0001. 1-6 [doi]
- Enhancing the robustness of interdependent cyber-physical systems by designing the interdependency relationshipYangming Zhao, Chunming Qiao. 1-6 [doi]
- Asymptotics of transmit antenna selection: Impact of multiple receive antennasSaba Asaad, Ali Bereyhi, Ralf R. Müller, Amir M. Rabiei. 1-6 [doi]
- Outage probability and fronthaul usage tradeoff caching strategy in cloud-RANZhun Ye, Cunhua Pan, Huiling Zhu, Jiangzhou Wang. 1-6 [doi]
- Block-filtered OFDM: A new promising waveform for multi-service scenariosRobin Gerzaguet, David Demmer, Jean-Baptiste Dore, Dimitri Ktenas. 1-6 [doi]
- Online data deduplication for in-memory big-data analytic systemsYushi Sun, Catherine Y. Zeng, Jaeyoon Chung, Zhe Huang. 1-7 [doi]
- Noncoherent SIMO detection by expectation propagationKamran Ghavami, Mort Naraghi-Pour. 1-6 [doi]
- Social-oriented Mobile Cloud Offload processing with delay constraints for efficient energy conservationConstandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla, Periklis Chatzimisios. 1-7 [doi]
- Matching game approach for charging scheduling in vehicle-to-grid networksGuanhua Qiao, Supeng Leng, Ming Zeng, Yan Zhang. 1-6 [doi]
- A biological circuit design for modulated parity-check encoding in molecular communicationAlessio Marcone, Massimiliano Pierobon, Maurizio Magarini. 1-7 [doi]
- Low-cost wearable bluetooth sensor for epileptic episodes detectionJose Manuel Ramirez-Alaminos, Sandra Sendra, Jaime Lloret, Jorge Navarro-Ortiz. 1-6 [doi]
- On the use of distributed synchronization in 5G device-to-device networksDavid Tetreault-La Roche, Benoît Champagne, Ioannis N. Psaromiligkos, Benoit Pelletier. 1-7 [doi]
- Throughput enhancement of restricted access window for uniform grouping scheme in IEEE 802.11ahN. Nawaz, Maryam Hafeez, Syed Ali Raza Zaidi, Desmond C. McLernon, Mounir Ghogho. 1-7 [doi]
- Joint optimization of QoE and wasted resources due to users abandonment in mobile video streamingMohamed Bouzian, Mustapha Bouhtou, Taoufik En-Najjary, Lucile Sassatelli, Guillaume Urvoy-Keller. 1-7 [doi]
- An efficient chunked network code based transmission scheme in wireless networksCanning Zhang, Bin Tang, Baoliu Ye, Sanglu Lu. 1-6 [doi]
- An anonymous messaging system for Delay Tolerant NetworksSpiridon Bakiras, Erald Troja, XiaoHua Xu. 1-6 [doi]
- Foresighted deception in dynamic security gamesXiaofan He, Mohammad M. Islam, Richeng Jin, Huaiyu Dai. 1-6 [doi]
- Sum secrecy rate optimization for MIMOME wiretap channel with artificial noise and D2D underlay communicationWeidong Mei, Zhi Chen, Jun Fang. 1-7 [doi]
- Leapfrog collaboration: Toward determinism and predictability in industrial-IoT applicationsGeorgios Z. Papadopoulos, Tadanori Matsui, Pascal Thubert, Géraldine Texier, Thomas Watteyne, Nicolas Montavont. 1-6 [doi]
- Enhancing the effectiveness of traffic engineering in hybrid SDNWen Wang, Wenbo He, Jinshu Su. 1-6 [doi]
- 2D time-frequency interference modelling using stochastic geometry for performance evaluation in Low-Power Wide-Area NetworksZhuocheng Li, Steeve Zozor, Jean-Marc Drossier, Nadège Varsier, Quentin Lampin. 1-7 [doi]
- Simultaneous context inference and mapping using mm-Wave for indoor scenariosAli Yassin, Youssef Nasser, Mariette Awad, Ahmed Yassin Al-Dubai. 1-6 [doi]
- Massive CSI acquisition in dense cloud-RAN with spatial and temporal prior informationXuan Liu, Yuanming Shi, Jun Zhang, Khaled Ben Letaief. 1-6 [doi]
- Performance characterization of spatially random energy harvesting underlay D2D networks with primary user power controlSachitha Kusaladharma, Chintha Tellambura. 1-7 [doi]
- A Verifiable and Flexible Data Sharing mechanism for Information-Centric IoTRuidong Li, Hitoshi Asaeda, Jie Li, Xiaoming Fu. 1-7 [doi]
- Error performance of NOMA VLC systemsHanaa Marshoud, Paschalis C. Sofotasios, Sami Muhaidat, George K. Karagiannidis, Bayan S. Sharif. 1-6 [doi]
- A novel FDD massive MIMO system based on downlink spatial channel estimation without CSITAli A. Esswie, Mohammed El-Absi, Octavia A. Dobre, Salama Ikki, Thomas Kaiser. 1-6 [doi]
- Electromagnetic side channel analysis of laser facsimileYanyun Xu, Jianlin Hu, Meng Zhang, Weiqing Huang. 1-6 [doi]
- Spectral-efficient model for multiuser massive MIMO: Exploiting user velocityThang X. Vu, Trinh Anh Vu, Symeon Chatzinotas, Björn E. Ottersten. 1-6 [doi]
- 5G virtualized radio access network approach based on NO Stack frameworkJie Zeng, Xin Su, Jinjin Gong, Liping Rong, Jing Wang. 1-5 [doi]
- Optimal co-phasing power allocation for coordinated OFDM transmissionBing Luo, Phee Lep Yeoh, Brian S. Krongold. 1-6 [doi]
- SAM: Cache space allocation in collaborative edge-caching networkQinghua Ding, Haitian Pang, Lifeng Sun. 1-6 [doi]
- Dynamic resource allocation and pricing for shared radio access infrastructureOzgur Umut Akgul, Ilaria Malanchini, Vinay Suryaprakash, Antonio Capone. 1-7 [doi]
- Resource allocation for non-orthogonal multiple access in heterogeneous networksJingjing Zhao, Yuanwei Liu, Kok Keong Chai, Arumugam Nallanathan, Yue Chen, Zhu Han. 1-6 [doi]
- Improving read access time of high-performance solid-state drives via layered coding schemesHyegyeong Park, Jaekyun Moon. 1-7 [doi]
- Tasks scheduling and resource allocation in heterogeneous cloud for delay-bounded mobile edge computingTianchu Zhao, Sheng Zhou, Xueying Guo, Zhisheng Niu. 1-7 [doi]
- Sigmoid function detector in the Presence of heavy-tailed noise for multiple antenna cognitive radio networksMohammad Yavari Manesh, Ali Olfat. 1-5 [doi]
- Feedback-aided coded caching for the MISO BC with small cachesJingjing Zhang, Petros Elia. 1-6 [doi]
- Inferring social information on foreign people from mobile traffic dataChristian Callegari, Rosario Giuseppe Garroppo, Stefano Giordano. 1-6 [doi]
- SIC vs. JD: Uplink NOMA techniques for M2M random accessYushu Zhang, Kewu Peng, Zhangmei Chen, Jian Song. 1-6 [doi]
- FBMC-based Physical Random Access ChannelNicolas Cassiau, Dimitri Ktenas. 1-5 [doi]
- MIMO intensity-modulation channels: Capacity bounds and high SNR characterizationAnas Chaaban, Zouheir Rezki, Mohamed-Slim Alouini. 1-6 [doi]
- Secrecy performance analysis of hybrid eavesdroppers system using stochastic geometry and random matrix theoryHui Chen, Xiaofeng Tao, Na Li, Zhu Han. 1-6 [doi]
- Throughput maximization using cross-layer design in wireless sensor networksAnahid Attarkashani, Walaa Hamouda. 1-6 [doi]
- A complex orthogonal WCP circular filtered multi-carrier (COW-CFMC) schemeRostom Zakaria, Didier Le Ruyet, Carlos Aurelio Faria da Rocha, Bartolomeu F. Uchôa Filho. 1-6 [doi]
- Towards wireless infrastructure-as-a-service (WlaaS) for 5G software-defined cellular systemsAlbert Gran, Shih-Chun Lin, Ian F. Akyildiz. 1-6 [doi]
- Link scheduling for mmWave WMN backhaulJorma Kilpi, Kari Seppänen, Tapio Suihko, Jori Paananen, David T. Chen, Pekka Wainio. 1-7 [doi]
- Correlation-driven optimized Taylor expansion precoding for massive MIMO systems with correlated channelsWence Zhang, Rodrigo C. de Lamare, Cunhua Pan, Ming Chen, Bingyang Wu, Xu Bao. 1-6 [doi]
- AugAuth: Shoulder-surfing resistant authentication for augmented realityRuide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y. Thomas Hou, Yuichi Kawamoto. 1-6 [doi]
- Improving the interaction of a green mobile network with the smart gridDaniela Renga, Hussein Al Haj Hassan, Michela Meo, Loutfi Nuaymi. 1-7 [doi]
- Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction gameAnibal Sanjab, Walid Saad, Tamer Basar. 1-6 [doi]
- AoD-adaptive subspace codebook for channel feedback in FDD massive MIMO systemsWenqian Shen, Linglong Dai, Guan Gui, Zhaocheng Wang, Robert W. Heath Jr., Fumiyuki Adachi. 1-5 [doi]
- Fundamental framework for describing various node centralities using an oscillation model on social media networksChisa Takano, Masaki Aida. 1-6 [doi]
- Interference and outage in random D2D networks under millimeter wave channelsSachitha Kusaladharma, Chintha Tellambura. 1-7 [doi]
- Service provisioning update scheme for mobile application users in a cloudlet networkHuawei Huang, Song Guo. 1-6 [doi]
- Ensuring reliable logging for data accountability in untrusted cloud storageZhen Yang, Wenyu Wang, Yongfeng Huang. 1-6 [doi]
- A flexible wideband millimeter-wave channel sounder with local area and NLOS to LOS transition measurementsGeorge R. MacCartney, Hangsong Yan, Shu Sun, Theodore S. Rappaport. 1-7 [doi]
- Optimized linear physical-layer network coding of full-rate full-diversity in MIMO two-way relay networksLong Shi, Tao Yang, Xiang-Gen Xia. 1-6 [doi]
- SCMA codebook design based on constellation rotationYongkang Zhou, Qiyue Yu, Weixiao Meng, Cheng Li. 1-6 [doi]
- Connection steering mechanism between mobile networks for reliable UAV's IoT platformNaser Hossein Motlagh, Miloud Bagaa, Tarik Taleb, JaeSeung Song. 1-6 [doi]
- Downlink performance of regularized ZF in massive MIMO systems subject to IQ imbalanceNikolaos Kolomvakis, Mikael Coldrey, Thomas Eriksson, Mats Viberg. 1-7 [doi]
- Consumer oriented web services ranking and classificationTaycir Bouasker, Mahjoub Langar. 1-7 [doi]
- Tweaking cryptographic primitives with moderate state space by direct manipulationJörg Keller 0001, Gabriele Spenger. 1-7 [doi]
- Cloud aided internet mobility for privacy protectionPing Zhang 0017, Arjan Durresi. 1-6 [doi]
- Outage probability and energy efficiency of DF relaying power line communication networks: Cooperative and non-cooperativeKhaled M. Rabie, Bamidele Adebisi, Haris Gacanin. 1-6 [doi]
- Optimal delay constrained offloading for vehicular edge computing networksKe Zhang, Yuming Mao, Supeng Leng, Sabita Maharjan, Yan Zhang. 1-6 [doi]
- Optimization of energy efficiency in the downlink LTE transmissionBartosz Bossy, Pawel Kryszkiewicz, Hanna Bogucka. 1-6 [doi]
- Joint performance optimization of primary networks and cognitive radio networksJingyi Dai, Shaowei Wang. 1-6 [doi]
- When D2D meets cloud: Hybrid mobile task offloadings in fog computingXu Chen, Junshan Zhang. 1-6 [doi]
- An SDN-approach for QoE management of multimedia services using resource allocationElisavet Grigoriou, Alcardo Alex Barakabitze, Luigi Atzori, Lingfen Sun, Virginia Pilloni. 1-7 [doi]
- Comprehensive grant-free random access for massive & low latency communicationAmeha T. Abebe, Chung G. Kang. 1-6 [doi]
- On modeling and understanding vehicle evacuation attacks in VANETsMingkui Wei, Zhuo Lu, Wenye Wang. 1-7 [doi]
- You speak, we detect: Quantitative diagnosis of anomic and Wernicke's aphasia using digital signal processing techniquesMurad Khan, Bhagya Nathali Silva, Syed Hassan Ahmed, Awais Ahmad, Sadia Din, Houbing Song. 1-6 [doi]
- A hierarchical approach for the selection of optical ground stations maximizing the data transfer from low-earth observation satellitesMikael Capelle, Marie-José Huguet, Nicolas Jozefowiez, Xavier Olive. 1-6 [doi]
- Optimal cache allocation for femto helpers with joint transmission capabilitiesAlina Tuholukova, Giovanni Neglia, Thrasyvoulos Spyropoulos. 1-7 [doi]
- A simple approximation algorithm for base station association in HetNetsZoubeir Mlika, Elmahdi Driouch, Wessam Ajib. 1-6 [doi]
- A distributed middleware architecture for attack-resilient communications in smart gridsYifu Wu, Jin Wei, Bri-Mathias Hodge. 1-7 [doi]
- Big data analytics of geosocial media for planning and real-time decisionsM. Mazhar Rathore, Anand Paul, Awais Ahmad, Muhammad Imran Razzak, Mohsen Guizani. 1-6 [doi]
- Centralize or distribute? A techno-economic study to design a low-cost cloud radio access networkXinbo Wang, Lin Wang, Salah-Eddine Elayoubi, Alberto Conte, Biswanath Mukherjee, Cicek Cavdar. 1-7 [doi]
- On decode-and-forward relaying for the diamond relay channel with multicarrier transmissionAntony V. Mampilly, Srikrishna Bhashyam. 1-6 [doi]
- Compressive data gathering in wireless sensor networks via group sparse regularizationShudong Liu, Yi Liu, Yan Zhang, Tan Tan. 1-5 [doi]
- 2 Gaussian process approach for indoor localization with RSSI fingerprintsIgor Bisio, Fabio Lavagetto, Andrea Sciarrone, Simon Yiu. 1-6 [doi]
- SINET5: A low-latency and high-bandwidth backbone network for SDN/NFV EraTakashi Kurimoto, Shigeo Urushidani, Hiroshi Yamada, Kenjiro Yamanaka, Motonori Nakamura, Shunji Abe, Kensuke Fukuda, Michihiro Koibuchi, Hiroki Takakura, Shigeki Yamada, Yusheng Ji. 1-7 [doi]
- Privacy-preserving public auditing for non-manager groupLongxia Huang, Gongxuan Zhang, Anmin Fu. 1-6 [doi]
- Covert communication with finite blocklength in AWGN channelsShihao Yan, Biao He, Yirui Cong, Xiangyun Zhou. 1-6 [doi]
- Interference-Aware Muting for the uplink of heterogeneous cellular networks: A stochastic geometry approachFrancisco Javier Martin-Vega, M. Carmen Aguayo-Torres, Gerardo Gómez, Marco Di Renzo. 1-6 [doi]
- Decentralized relay selection in two-user multihop decode-and-forward relay networksRajitha Senanayake, Saman Atapattu, Phee Lep Yeoh, Jamie Evans. 1-6 [doi]
- HetFlow: A distributed delay-based congestion control for data centers to achieve ultra low queueing delayMahmoud Mohamed Bahnasy, Halima Elbiaze, Bochra Boughzala. 1-7 [doi]
- Sampling-based tracking of time-varying channels for millimeter wave-band communicationsJin Hyeok Yoo, Jisu Bae, Sun Hong Lim, Sunwoo Kim, Jun Won Choi, Byonghyo Shim. 1-6 [doi]
- Flexible HARQ: A high throughput hybrid-ARQ protocolVignesh Sethuraman, Hairuo Zhuang. 1-6 [doi]
- Cost aware caching and streaming scheduling for efficient cloud based TVZinelaabidine Nadir, Miloud Bagaa, Tarik Taleb. 1-6 [doi]
- Robust resource allocation for multi-tier cognitive heterogeneous networksYongjun Xu, Yuan Hu, Qianbin Chen, Tiecheng Song, Rong Lai. 1-6 [doi]
- LTE proximity discovery for supporting participatory mobile health communitiesPaolo Bellavista, Jacopo De Benedetto, Carlos Roberto De Rolt, Luca Foschini, Rebecca Montanari. 1-6 [doi]
- Modeling flow setup time for controller placement in SDN: Evaluation for dynamic flowsMu He, Arsany Basta, Andreas Blenk, Wolfgang Kellerer. 1-7 [doi]
- Positioning for visible light communication system exploiting multipath reflectionsHamid Hosseinianfar, Mohammad Noshad, Maïté Brandt-Pearce. 1-6 [doi]
- On managing interference in a one-dimensional space over time-invariant channelsMohaned Chraiti, Ali Ghrayeb, Chadi Assi. 1-7 [doi]
- Computation offloading leveraging computing resources from edge cloud and mobile peersNguyen Ti Ti, Long Bao Le. 1-6 [doi]
- A blind interference management technique for the K-user interference channel with ISI: Interference-free OFDMNamyoon Lee. 1-6 [doi]
- A scalable and bandwidth-efficient multicast algorithm based on segment routing in software-defined networkingJang-Ping Sheu, Yin-Chen Chen. 1-6 [doi]
- Performance analysis of topology-oriented solutions on energy efficient networksJuvencio Arnaldo Manjate, Markus Hidell, Peter Sjödin. 1-6 [doi]
- An adaptive distributed power scheduling algorithm for renewable Microgrid cooperationXingzheng Zhu, Ka-Cheong Leung. 1-6 [doi]
- Receiving-Capacity-Constrained Rapid and Fair Disaster Backup for multiple datacenters in SDNXiaole Li, Hua Wang, Shanwen Yi, Xibo Yao. 1-6 [doi]
- Cell selection game in heterogeneous macro-small cell networksKhaoula Dhifallah, Yvon Gourhant, Sidi-Mohammed Senouci. 1-6 [doi]
- Hybrid digital-to-analog precoding design for mm-wave systemsOsama Alluhaibi, Qasim Zeeshan Ahmed, Junyuan Wang, Huiling Zhu. 1-6 [doi]
- Wireless body area networks: Energy-efficient, provably socially-efficient, transmit power controlYizhou Yang, David B. Smith. 1-6 [doi]
- Magneto-inductive passive relaying in arbitrarily arranged networksGregor Dumphart, Eric Slottke, Armin Wittneben. 1-6 [doi]
- New sensing technique for detecting application layer DDoS attacks targeting back-end database resourcesDavid Beckett, Sakir Sezer, John V. McCanny. 1-7 [doi]
- Resource allocation between service computing and communication computing for mobile operatorKezhi Wang, Kun Yang. 1-6 [doi]
- A building block to model an SDN/NFV networkGiuseppe Faraci, Alfio Lombardo, Giovanni Schembra. 1-7 [doi]
- A new class of nonlinear precoders for hardware efficient massive MIMO systemsMohammad Ali Sedaghat, Ali Bereyhi, Ralf R. Müller. 1-7 [doi]
- Fast algorithms for jammer placement to partition a wireless networkJixin Feng, Warren E. Dixon, John M. Shea. 1-6 [doi]
- A privacy-preserving and real-time traceable power request scheme for smart gridQingyou Yang, Jianan Hong, Kaiping Xue, Weikeng Chen, Xiang Zhang, Hao Yue. 1-6 [doi]
- A cost-effective shuffling-based defense against HTTP DDoS attacks with SDN/NFVYi-Hui Lin, Jian-Jhih Kuo, De-Nian Yang, Wen-Tsuen Chen. 1-7 [doi]
- Cost-efficient VM configuration algorithm in the cloud using mix scaling strategyLi Lu, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Shiyou Qian, Minglu Li. 1-6 [doi]
- Joint interference management and resource allocation for device-to-device (D2D) communications underlying downlink/uplink decoupled (DUDe) heterogeneous networksAbdulkadir Celik, Redha M. Radaydeh, Fawaz S. Al-Qahtani, Mohamed-Slim Alouini. 1-6 [doi]
- Near-optimal distributed power control for ARQ based multihop links with decoding costsMohit K. Sharma, Chandra R. Murthy. 1-6 [doi]
- A logo based approach for visual quality evaluation in telemedicine applicationsKarim M. Nasr, Maria G. Martini. 1-6 [doi]
- A transient stability control adaptive to measurements uncertaintiesAbdallah K. Farraj, Eman M. Hammad, Deepa Kundur. 1-6 [doi]
- Nonlinear compressive sensing for distorted measurements and application to improving efficiency of power amplifiersHsieh-Chung Chen, H. T. Kung, Marcus Z. Comiter. 1-7 [doi]
- Learning radio maps for UAV-aided wireless networks: A segmented regression approachJunting Chen, Uday Yatnalli, David Gesbert. 1-6 [doi]
- Deep learning based optimization in wireless networkLu Liu, Yu Cheng, Lin X. Cai, Sheng Zhou, Zhisheng Niu. 1-6 [doi]
- Evaluate clustering performance and computational efficiency for PSO based fuzzy clustering methods in processing big imbalanced dataJin Wang, Hua Fang, Bo Li, Honggang Wang. 1-6 [doi]
- A wireless backhaul solution using visible light communication for indoor Li-Fi attocell networksHossein Kazemi, Majid Safari, Harald Haas. 1-7 [doi]
- A hybrid SDN/NFV architecture for future LTE networksAli Tawbeh, Haïdar Safa, Ahmad R. Dhaini. 1-6 [doi]
- Joint MMSE precoder and equalizer for massive MIMO using 1-bit quantizationOvais Bin Usman, Josef A. Nossek, Christian A. Hofmann, Andreas Knopp. 1-6 [doi]
- Modelling and analysis of low-power wide-area networksZhijin Qin, Yuanwei Liu, Geoffrey Ye Li, Julie A. McCann. 1-7 [doi]
- On scalability and interference avoidance in nonlinear adjacent channel interference networksAditya V. Padaki, Ravi Tandon, Jeffrey H. Reed. 1-6 [doi]
- Blind detection for MIMO systems with low-resolution ADCs using supervised learningYo-Seb Jeon, Song-Nam Hong, Namyoon Lee. 1-6 [doi]
- Bridging the gap between big data and game theory: A general hierarchical pricing frameworkZijie Zheng, Lingyang Song, Zhu Han. 1-6 [doi]
- Optimal status updating to minimize age of information with an energy harvesting sourceXianwen Wu, Jing Yang, Jingxian Wu. 1-6 [doi]
- Effective information rates of single-carrier and multi-carrier modulation schemes for bandwidth constrained IM/DD systemsSana Mazahir, Anas Chaaban, Hany Elgala, Mohamed-Slim Alouini. 1-6 [doi]
- Maximizing link utilization with coflow-aware scheduling in datacenter networksJingjie Jiang, Shiyao Ma, Bo Li 0001, Baochun Li, Jiangchuan Liu. 1-6 [doi]
- Energy consumption reduction methods of geographic routing protocols with out-of-date location information in mobile ad hoc networksYao-Jen Tang, Chung-wei Lee, Meng-Han Lin, Bing-Hong Liu, Ming-Jer Tsai. 1-6 [doi]
- Energy-efficient relay placement and power allocation for two-hop D2D relay networksSa Xiao, Xiangwei Zhou, Yi Yuan-Wu, Geoffrey Ye Li, Wei Guo. 1-6 [doi]
- A measurement-based boundary estimation approach for localization in industrial WSNsQihao Li, Kuan Zhang, Michael Cheffena, Xuemin Sherman Shen. 1-6 [doi]
- A spatiotemporal model for the LTE uplink: Spatially interacting tandem queues approachMohammad Gharbieh, Hesham ElSawy, Ahmed Bader, Mohamed-Slim Alouini. 1-7 [doi]
- An incentive-based workload assignment with power allocation in ad hoc cloudBin Cao, Shichao Xia, Yun Li, Bo Li. 1-6 [doi]
- Providing wireless coverage to high-rise buildings using UAVsHazim Shakhatreh, Abdallah Khreishah, Bo Ji. 1-6 [doi]
- Throughput vs. latency: QoS-centric resource allocation for multi-user millimeter wave systemsMiltiades C. Filippou, Danilo De Donno, Camila Priale, Joan Palacios, Domenico Giustiniano, Joerg Widmer. 1-6 [doi]
- A payment scheme in crowdsourcingXiao Chen, Kaiqi Xiong. 1-6 [doi]
- Node placement for localization networksZhenyu Liu, Wenhan Dai, Moe Z. Win. 1-6 [doi]
- Dynamic workload migration over optical backbone network to minimize data center electricity costSabidur Rahman, Abhishek Gupta, Massimo Tomatore, Biswanath Mukherjee. 1-5 [doi]
- Allocation of control resources with preamble priority awareness for human and machine type communications in LTE-Advanced networksCarlos A. Astudillo, Tiago P. C. de Andrade, Nelson L. S. Da Fonseca. 1-6 [doi]
- Multi-antenna based one-bit spatio-temporal wideband sensing for cognitive radio networksJ. C. Merlano-Duncan, Shree Krishna Sharma, Symeon Chatzinotas, Björn E. Ottersten, Xianbin Wang. 1-7 [doi]
- Energy efficient multicasting in cognitive radio networksAbdullah M. Almasoud, Ahmed E. Kamal. 1-6 [doi]
- An indirect reciprocity based incentive framework for cooperative spectrum sensingBin Chen, Biling Zhang, Jung-Lang Yu, Yan Chen, Zhu Han. 1-6 [doi]
- An analytical model for S-ALOHA performance evaluation in M2M networksQipeng Song, Xavier Lagrange, Loutfi Nuaymi. 1-7 [doi]
- Modulation concepts for high-rate display-camera data transmissionRuediger Kays, Christian Brauers, Johannes Klein. 1-6 [doi]
- Power control in full duplex networks: Area spectrum efficiency and energy efficencyChenyuan Feng, Yi Zhong, Tony Q. S. Quek, Gang Wu. 1-6 [doi]
- A-VeMAC: An adaptive vehicular MAC protocol for vehicular ad hoc networksPing Chen, Jun Zheng, Yuying Wu. 1-6 [doi]
- Hybrid MMSE-VP precoding for multi-user massive MIMO systemsRuikai Mai, Tho Le-Ngoc, Duy H. N. Nguyen. 1-6 [doi]
- Enhancing the accuracy of iBeacons for indoor proximity-based servicesFaheem Zafari, Ioannis Papapanagiotou, Michael Devetsikiotis, Thomas J. Hacker. 1-7 [doi]
- Designing optimal interlink structures for interdependent networks under budget constraintsSrinjoy Chattopadhyay, Huaiyu Dai. 1-6 [doi]
- Gene functional annotation via matrix completionBin Liu, Dan Ma, Chunmei Ma, Shuang Wu. 1-6 [doi]
- Covert-channel-resistant congestion control for traffic normalization in uncontrolled networksMartin Byrenheid, Michael Rossberg, Guenter Schaefer, Robert Dorn. 1-7 [doi]
- Power splitting protocol design for the cooperative NOMA with SWIPTYinghui Ye, Yongzhao Li, Dan Wang, Guangyue Lu. 1-5 [doi]
- Spectrum sensing for wireless communications using energy ratio and beamformingKais Bouallegue, Iyad Dayoub, Mohamed Gharbi. 1-6 [doi]
- AmpN: Real-time LOS/NLOS identification with WiFiFu Xiao, Zhengxin Guo, Hai Zhu, Xiaohui Xie, Ruchuan Wang. 1-7 [doi]
- Angular domain pilot design and channel estimation for FDD massive MIMO networksPeiyao Zhao, Zhaocheng Wang, Chen Sun. 1-6 [doi]
- The hidden mailman and his mailbag: Routing path analysis from a European perspectiveJosef Gustafsson, Rahul Hiran, Vengatanathan Krishnamoorthi, Niklas Carlsson. 1-7 [doi]
- Adaptive and safe presentation strategy of image information on social platformHuaibo Sun, Hong Luo, Tin Yu Wu, Mohammad S. Obaidat. 1-7 [doi]
- Successive interference cancellation in full duplex cellular networksMing Liu, Yuming Mao, Supeng Leng, Kun Yang. 1-6 [doi]
- Privacy-preserving mobile crowd sensing for big data applicationsWenlong Shen, Bo Yin, Yu Cheng, Xianghui Cao, Qing Li. 1-6 [doi]
- Asymptotically tight performance bounds for selection diversity over Beaulieu-Xie fading channels with arbitrary correlationAdebola Olutayo, Julian Cheng, Jonathan F. Holzman. 1-6 [doi]
- Autoconfiguration of L3 network for large-scale IoT emulation testbedKenji Fujikawa, Hiroaki Harai. 1-6 [doi]
- Doubly selective underwater acoustic channel estimation with basis expansion modelXuesi Wang, Jintao Wang, Longzhuang He, Jian Song. 1-6 [doi]
- Capacity of clustered distributed storageJy-yong Sohn, Beongjun Choi, Sung Whan Yoon, Jaekyun Moon. 1-7 [doi]
- Service chain modeling and embedding for NFV-based content deliveryNicolas Herbaut, Daniel Négru, David Dietrich, Panagiotis Papadimitriou 0001. 1-7 [doi]
- Joint delay and energy minimization for instantly decodable network codingMariem Zayene, Oussama Habachi, Vahid Meghdadi, Tahar Ezzeddine, Jean-Pierre Cances. 1-6 [doi]
- Mobile energy harvesting nodesAhmed Arafa, Sennur Ulukus. 1-6 [doi]
- Communication-efficient decentralized hypothesis testing for sensor networks with minimum fusion center feedbackHongfei Wang, Steven D. Blostein. 1-6 [doi]
- Detection of LSSUAV using hash fingerprint based SVDDZhiyuan Shi, Minmin Huang, Caidan Zhao, Lianfen Huang, Xiaojiang Du, Yifeng Zhao. 1-5 [doi]
- Channel division multiple access for MTC under frequency-selective fadingJinho Choi, Nam Yul Yu. 1-6 [doi]
- Leakage of signal function with reused keys in RLWE key exchangeJintai Ding, Saed Alsayigh, R. V. Saraswathy, Scott R. Fluhrer, Xiaodong Lin. 1-6 [doi]
- Spatial outage capacity of poisson bipolar networksSanket S. Kalamkar, Martin Haenggi. 1-6 [doi]
- CUDA-accelerated task scheduling in vehicular clouds with opportunistically available V2IYassine Maalej, Ahmed Abderrahim, Mohsen Guizani, Bechir Hamdaoui. 1-6 [doi]
- High-capacity clos-network switch for data center networksFadoua Hassen, Lotfi Mhamdi. 1-7 [doi]
- Characterization of aggregate received power from power beacons in millimeter wave ad hoc networksXiaohui Zhou, Salman Durrani, Jing Guo. 1-7 [doi]
- TcpHas: TCP for HTTP adaptive streamingChiheb Ben Ameur, Emmanuel Mory, Bernard Cousin, Eugen Dedu. 1-7 [doi]
- Low-complexity massive MIMO subspace tracking from low-dimensional projectionsSaeid Haghighatshoar, Giuseppe Caire. 1-7 [doi]
- A reliable task assignment strategy for spatial crowdsourcing in big data environmentLiqiu Gu, Kun Wang, Xiulong Liu, Song Guo, Bo Liu. 1-6 [doi]
- CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoTVanesa Daza, Roberto Di Pietro, Ivan Klimek, Matteo Signorini. 1-6 [doi]
- Viewport-adaptive navigable 360-degree video deliveryXavier Corbillon, Gwendal Simon, Alisa Devlic, Jacob Chakareski. 1-7 [doi]
- Resource allocation for energy harvesting-powered D2D communications underlaying cellular networksHaichao Wang, Guoru Ding, JinLong Wang, Le Wang, Theodoros A. Tsiftsis, Prabhat Kumar Sharma. 1-6 [doi]
- Interference-free LED allocation for the fisheye lens based visible light communicationsRui Jang, Zhaocheng Wang, Xudong Zhu, Qi Wang. 1-6 [doi]
- Physical layer security enhancement in multi-user multi-full-duplex-relay networksYouhong Feng, Zhen Yang, Shihao Yan, Nan (Jonas) Yang, Bin Lv. 1-7 [doi]
- Joint optimization of transmit beamforming and processor sleeping for green C-RANKun Guo, Min Sheng, Jianhua Tang, Tony Q. S. Quek, Zhiliang Qiu. 1-6 [doi]
- Interference-aware frame optimization for the return link of a multi-beam satelliteYoann Couble, Emmanuel Chaput, Thibault Deleu, Cédric Baudoin, Jean-Baptiste Dupe, Caroline Bes, André-Luc Beylot. 1-6 [doi]
- Observation driven sensor schedulingMarcos M. Vasconcelos, Urbashi Mitra. 1-6 [doi]
- An evaluation of flexible frequency utilization in high throughput satellite communication systems with digital channelizerKazuma Kaneko, Hiroki Nishiyama, Nei Kato, Amane Miura, Morio Toyoshima. 1-6 [doi]
- Edge-aware inter-domain routing for realizing next-generation mobility servicesShreyasee Mukherjee, Shravan Sriram, Dipankar Raychaudhuri. 1-6 [doi]
- Enhancing coexistence in the unlicensed band with massive MIMOGiovanni Geraci, Adrian García-Rodríguez, David López-Pérez, Andrea Bonfante, Lorenzo Galati Giordano, Holger Claussen. 1-6 [doi]
- A novel fairness-driven approach for heterogeneous gateways' link scheduling in IoT networksRevathy Narayanan, Manikantan Srinivasan, Surabhi Abhimithra Karthikeya, C. Siva Ram Murthy. 1-7 [doi]
- Enabling efficient multi-channel bonding for IEEE 802.11ac WLANsSami Khairy, Mengqi Han, Lin X. Cai, Yu Cheng, Zhu Han. 1-6 [doi]
- Online-relaying-based image communication in unmanned aerial vehicle networksKevon Scott, Rui Dai, Junjie Zhang. 1-6 [doi]
- The wireless localisation matching problem and a maximum likelihood based solutionCamly Nguyen, Orestis Georgiou, Yuki Yonezawa, Yusuke Doi. 1-7 [doi]
- STOIC: Streaming operating systems in the cloudRiley Collins, Teo Gelles, Benjamin Marks, Alex Simms, Kevin C. Webb. 1-6 [doi]
- Hierarchical trust-based black-hole detection in WSN-based smart grid monitoringSafa Otoum, Burak Kantarci, Hussein T. Mouftah. 1-6 [doi]
- Robust satellite image transmission over bandwidth-constrained wireless channelsYali Wang, Hancheng Lu, Zexue Li, Jian Li. 1-6 [doi]
- Wireless SDN mobile ad hoc network: From theory to practiceHans C. Yu, Giorgio Quer, Ramesh R. Rao. 1-7 [doi]
- New macrocell downlink energy consumption minimization with cell DTx and power controlRémi Bonnefoi, Christophe Moy, Jacques Palicot. 1-7 [doi]
- Multi-quality of service routing and spectrum assignment in elastic optical networksShadi Shahsavari, Hamzeh Beyranvand, Jawad A. Salehi. 1-6 [doi]
- Joint design of multi-tap analog cancellation and digital beamforming for reduced complexity full duplex MIMO systemsGeorge C. Alexandropoulos, Melissa Duarte. 1-7 [doi]
- Cooperative forwarding in multi-radio multi-channel multi-flow wireless networksCherry Ye Aung, Peter Han Joo Chong. 1-7 [doi]
- Channel-statistics-based analog downlink beamforming for millimeter-wave multi-user massive MIMOZheda Li, Shengqian Han, Andreas F. Molisch. 1-6 [doi]
- Antenna subsystem far-field characterization of the spin-stabilized satellite Eu: CROPISMartin Drobczyk, Jan Budroweit. 1-6 [doi]
- Resource allocation for D2D-enabled inter-vehicle communications in multiplatoonsHai-xia Peng, Dazhou Li, Qiang Ye, Khadige Abboud, Hai Zhao, Weihua Zhuang, Xuemin Sherman Shen. 1-6 [doi]
- Joint energy-bandwidth allocation for multi-user channels with cooperating hybrid energy nodesVaneet Aggarwal, Mark R. Bell, Anis Elgabli, Xiaodong Wang, Shan Zhong. 1-6 [doi]
- Hyper-linked communications: WebRTC enabled asynchronous collaborationHenrique Rocha, Ricardo Lopes Pereira. 1-7 [doi]
- Physical layer secret-key generation with discreet cosine transform for the Internet of ThingsGeorge Margelis, Xenofon Fafoutis, George C. Oikonomou, Robert J. Piechocki, Theo Tryfonas, Paul Thomas. 1-6 [doi]
- Distortion limited amplify-and-forward relay networks and the ε-critical phase transitionDavid E. Simmons, Justin P. Coon. 1-6 [doi]
- Cooperative beamforming techniques for energy efficient IoT wireless communicationSpyridon Vassilaras, George C. Alexandropoulos. 1-6 [doi]
- MAGNET: A middleware for the proximal interaction of devices based on Wi-Fi directLuciano Baresi, Naser Derakhshan, Sam Guinea, Francesco Arenella. 1-7 [doi]
- A comparison of OFDM, QAM-FBMC, and OQAM-FBMC waveforms subject to phase noiseVicent Moles-Cases, Ali A. Zaidi, Xiaoming Chen, Tobias J. Oechtering, Robert Baldemair. 1-6 [doi]
- Data aided channel estimation for massive MIMO with pilot contaminationMeiyan Ju, Lu Xu, Lu Jin, Defeng David Huang. 1-6 [doi]
- BotDetector: A robust and scalable approach toward detecting malware-infected devicesSho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto. 1-7 [doi]
- Lightweight service replication for ultra-short latency applications in mobile edge networksIvan Farris, Tarik Taleb, Antonio Iera, Hannu Flinck. 1-6 [doi]
- A game theoretic approach for inspecting web-based malvertisingChin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. 1-6 [doi]
- Ultra-dense edge caching under spatio-temporal demand and network dynamicsHyesung Kim, Jihong Park, Mehdi Bennis, Seong-Lyun Kim, Mérouane Debbah. 1-7 [doi]
- Performance analysis of Alamouti-coded OFDM systems over spatio-temporally correlated underwater acoustic channelsMeisam Naderi, Gulzaib Rafiq, Matthias Pätzold. 1-6 [doi]
- Topological entropy in wireless networks subject to composite fadingJustin P. Coon, Peter J. Smith. 1-7 [doi]
- Resource sharing among mmWave cellular service providers in a vertically differentiated duopolyFraida Fund, Shahram Shahsavari, Shivendra S. Panwar, Elza Erkip, Sundeep Rangan. 1-7 [doi]
- UniFlex: A framework for simplifying wireless network controlPiotr Gawlowicz, Anatolij Zubow, Mikolaj Chwalisz, Adam Wolisz. 1-7 [doi]
- On differential privacy-preserving movements of unmanned aerial vehiclesHyunbum Kim, Jalel Ben-Othman, Lynda Mokdad. 1-6 [doi]
- Coexistence analysis of LTE and WLAN systems with heterogenous backoff slot durationsYao Ma, Daniel G. Kuester, Jason Coder, William Young. 1-7 [doi]
- AC-QoS-FS: Ant colony based QoS-aware forwarding strategy for routing in Named Data NetworkingAbdelali Kerrouche, Mustapha Réda Senouci, Abdelhamid Mellouk, Thiago Abreu. 1-6 [doi]
- A robust precoding for RF mismatched massive MIMO transmissionYan Chen, Xiqi Gao, Xiang-Gen Xia, Li You. 1-6 [doi]
- Iterative uniform-cost search of active antenna group selection for generalised spatial modulationYue Sun, Jintao Wang, Longzhuang He, Jian Song. 1-6 [doi]
- A fully-distributed advanced traffic management system based on opportunistic content sharingAllan Mariano de Souza, Nelson L. S. Da Fonseca, Leandro Villas. 1-6 [doi]
- A cross-layer scheme for multimedia transfer over AdHoc networksIsmail Bennis, Kandaraj Piamrat, Hacène Fouchal, Marwane Ayaida. 1-6 [doi]
- Synchronized power saving mechanism for WiMAX networksAymen Belghith, Amal Walha, Bernard Cousin, Mohammad S. Obaidat. 1-6 [doi]
- Construction of an indoor positioning system for home IoT applicationsSangjae Lee, Namkyoung Lee, Jeonghee Ahn, Jaewon Kim, Byoungchul Moon, Suk Hoon Jung, Dongsoo Han. 1-7 [doi]
- Achieving the optimal throughput scaling in multi-cell random access networksHuifa Lin, Won-Yong Shin. 1-6 [doi]
- Exploiting the stable fixture matching game for mobile crowd sensing: A local event sharing frameworkYunan Gu, Li Wang, Miao Pan, Zhu Han. 1-6 [doi]
- Fast and smooth data delivery using MPTCP by avoiding redundant retransmissionsYigit Ozcan, Fabrice Guillemin, Patrice Houze, Catherine Rosenberg. 1-7 [doi]
- Failure mitigation in software defined networking employing load type predictionNader Bouacida, Amer AlGhadhban, Shiyam Alalmaei, Haneen Mohammed, Basem Shihada. 1-7 [doi]
- Difference Bloom Filter: A probabilistic structure for multi-set membership queryDongsheng Yang, Deyu Tian, Junzhi Gong, Siang Gao, Tong Yang, Xiaoming Li. 1-6 [doi]