Abstract is missing.
- Shared Information SpaceFabian Angelstorf, Stefan Apelt, Nico Bau, Norman Jansen, Sylvia Kathner. 1-7 [doi]
- Future military mobile radio communication systems from electronic warfare perspectiveHarri Saarnisaari, Timo Bräysy. 1-8 [doi]
- Sensing policy assessment for distributed Channel selection for Cognitive MANET in presence of Intentional JammingGrzegorz Szmit, Jerzy Lopatka, Jerzy Dolowski. 1-8 [doi]
- A VHF waveform for the CORASMA simulatorStefan Couturier, Olaf Bettinger, Cedric Keip. 1-7 [doi]
- On the robustness of OLSR in a mobile tactical scenario in rural terrainUlf Sterner, Ulrika Uppman. 1-8 [doi]
- Interface conformance testing for future military land platformsDaniel Ota, Ditmir Hazizi. 1-7 [doi]
- Network management issues in military Cognitive Radio NetworksTimo Bräysy, Topi Tuukkanen, Stefan Couturier, Erik Verheul, Niels Smit, Boyd Buchin, Vincent Le Nir, Jaroslaw Krygier. 1-6 [doi]
- Spectrum sensing of OFDM signals in frequency domain using histogram based ratio testKrzysztof Kosmowski, Józef Pawelec, Marek Suchanski, Mateusz Kustra. 1-4 [doi]
- Low complexity generic receiver for the NATO Narrow Band WaveformVincent Le Nir, Bart Scheers. 1-7 [doi]
- SDN testbed for validation of cross-layer data-centric security policiesKonrad S. Wrona, Marek Amanowicz, Sebastian Szwaczyk, Krzysztof Gierlowski. 1-6 [doi]
- Dynamic Spectrum Management: A perspective for Polish Armed ForcesPiotr Gajewski, Jerzy Lopatka, Marek Suchanski, Jan Jach. 1-6 [doi]
- TSVCIS performance analysis over bent-pipe relays with automatic gain controlAaron E. Cohen, Michael A. Rupar. 1-5 [doi]
- Evaluation of software-defined networking control plane performance in deployed military communications systemsJon Spencer, Russell Taylor, Robert Hancock. 1-7 [doi]
- Information management in a civilian mission EUCAP Somalia case studyHans-Christian Schmitz, Reinout Pieneman, Matthias Deneckere. 1-7 [doi]
- On the prospects of full-duplex military radiosTaneli Riihonen, Dani Korpi, Olli Rantula, Mikko Valkama. 1-6 [doi]
- Analysis and test framework for the integration of ICT systems in the tactical domainFabian Angelstorf, Andreas Becker, Norman Jansen, Fabian Noth. 1-6 [doi]
- Reactive/proactive connectivity management in a tactical service-oriented infrastructureRoberto Rigolin F. Lopes, Mikko Nieminen, Antti Viidanoja, Stephen D. Wolthusen. 1-8 [doi]
- Approach towards achieving interoperability between military land vehicle and robotic systemsManas Pradhan, Alexander Tiderko, Daniel Ota. 1-7 [doi]
- Heterogeneous tactical radio networks with flexible IP-waveformsChristoph Barz, Christoph Fuchs 0003, Jonathan Kirchhoff, Julia Niewiejska, Henning Rogge. 1-7 [doi]
- Multiuser power and bandwidth allocation in ad hoc networks with Type-I HARQ under Rician channel with statistical CSIXavier Leturc, Christophe J. Le Martret, Philippe Ciblat. 1-7 [doi]
- Evaluation of the scalability of OLSRv2 in an emulated realistic military scenarioKelvin Marcus, Christoph Barz, Jonathan Kirchhoff, Henning Rogge, Jan Nilsson, Ronald in 't Velt, Niranjan Suri, Anders Hansson, Ulf Sterner, Mariann Hauge, King Lee, Arjen Holtzer, Boyd Buchin, Markus Peuhkuri, Levent Misirlioglu. 1-8 [doi]
- National mobility in coalition tactical networksSam McLaughlin, Roland Schutz, Robert Hancock, Konrad S. Wrona, Jon Spencer, Marko Luoma, Nuutti Varis, Vinod K. Mishra, Per Carlén, A. Metin Belci. 1-7 [doi]
- Armed forces' views on Shared Spectrum AccessTopi Tuukkanen, Seppo Yrjölä, Marja Matinmikko, Petri Ahokangas, Miia Mustonen. 1-8 [doi]
- Kings Eye: Platform independent situational awarenessMarianne R. Brannsten, Trude Hafsøe Bloebaum, Frank T. Johnsen, Bård K. Reitan. 1-5 [doi]
- Requirements view for enterprise architecturesStefan Apelt, Iulia Buga, Hanna Geppert, Hussein Hasso, Thomas Kudla. 1-6 [doi]
- 'RuNet 2020' - deploying traditional elements of combat power in cyberspace?Juha-Pekka Nikkarila, Mari Ristolainen. 1-8 [doi]
- Comparing Software Defined architectures for coalition operationsVinod Mishra, Dinesh Verma, Chris Williams, Kelvin Marcus. 1-7 [doi]
- On the fog of RSA key lengths: Verifying public key cryptography strength recommendationsMikko Kiviharju. 1-8 [doi]
- An experimental study of quasi-synchronous multiuser communications in cluttered scenarios at low VHFFikadu T. Dagefu, Gunjan Verma, Predrag Spasojevic, Brian M. Sadler. 1-7 [doi]
- WS-Notification case study and experimentFrank T. Johnsen, Trude Hafsøe Bloebaum, Jose Maria Alcaraz Calero, Qi Wang 0001, James Nightingale, Marco Manso, Norman Jansen. 1-8 [doi]
- On the use of electromagnetic simulation in front door radiofrequency interferenceRonciere Olivier, Pascal Marchand, Sylvain Chenu. 1-5 [doi]