Abstract is missing.
- OFDM signal classification in frequency selective rayleigh channelsEmmanuel Kanterakis, Wei Su. 1-6 [doi]
- A learning based cognitive radio receiverFangming He, Xingzhong Xu, Lei Zhou, Hong Man. 7-12 [doi]
- Co-channel and adjacent channel interference mitigation in cognitive radio networksDonglin Hu, Shiwen Mao. 13-18 [doi]
- Cooperative parallel spectrum sensing in cognitive radio networks using bipartite matchingBehzad Shahrasbi, Nazanin Rahnavard. 19-24 [doi]
- Spectrum behavior learning in Cognitive Radio based on artificial neural networkLiang Yin, Sixing Yin, Weijun Hong, Shufang Li. 25-30 [doi]
- Wideband compressed sensing for cognitive radiosF. Ayhan Sakarya, George S. Nagel, Lan H. Tran, Joseph A. Molnar. 31-36 [doi]
- Weak signal sensing using empirical mode decomposition and stochastic data reorderingArnab Roy 0002, John F. Doherty. 37-41 [doi]
- Phase noise suppression in MIMO OFDM systems with incoherent phase noiseBabak Daneshrad, Weijun Zhu. 42-44 [doi]
- Precision polarized bandwidth expansionRick Dunnegan, Deborah Van Vechten, Deepnarayan Gupta. 45-50 [doi]
- Photonic-based low phase noise frequency synthesis for RF-to-millimeter wave carriers and wideband RF-to-IF down-conversionCharles Middleton, Scott Meredith, Robert Peach, Richard DeSalvo. 51-54 [doi]
- On the design of Frequency-Domain Receivers for SFN where the transmitters have different CFOFábio Silva, Rui Dinis, Paulo Montezuma. 55-60 [doi]
- Achieving DoD IP Modem interoperability utilizing the Joint IP Modem (JIPM)Christopher Catlin, Dana DeFrancesco, Bharat Parikh, Andrew Lincoln, Ben Davis, Andrew Melchior, Ling-Bing Kung. 61-66 [doi]
- Joint-design of adaptive modulation and coding with adaptive ARQ for cooperative relay networksAnnamalai Annamalai, Bhuvan Modi, Oluwatobi Olabiyi. 67-72 [doi]
- Energy efficiency of distributed cooperative relayingYao Xiao, Leonard J. Cimini Jr.. 73-78 [doi]
- Robust node selection for cooperative spectrum sensing with malicious usersKun Zeng, Jun Wang, Shaoqian Li, Danijela Cabric. 79-84 [doi]
- Reliable cooperative communications: A signal processing approachSintayehu Dehnie. 85-90 [doi]
- Physical layer security for cooperative relaying in broadcast networksLiang Chen. 91-96 [doi]
- Spatial cooperative diversity and asynchronous spectrum sensing for cognitive radio networksTae-Eung Sung, Ki-Il Kim. 97-101 [doi]
- Optimal signaling in second-order cyclostationary Gaussian jamming environmentByung Wook Han, Joon Ho Cho. 102-107 [doi]
- Resource allocation for networked electronic warfareSintayehu Dehnie, Reza Ghanadan, Kyle Guan. 108-112 [doi]
- Protocol coding for reliable wireless bits under jamming: Concept and experimental validationPetar Popovski, Germán Corrales Madueño, Lucas Chavarria Gimenez, Laura Luque Sanchez, Niels-Christian Gjerrild. 113-118 [doi]
- Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approachQuanyan Zhu, Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar. 119-124 [doi]
- Optimal cooperative jamming for securityHan-Ting Chiang, James S. Lehnert. 125-130 [doi]
- Computation of the normalized detection threshold for the FFT summation detector through eigenvalue sequence truncationSichun Wang, Robert J. Inkol, François Patenaude, Sreeraman Rajan. 131-136 [doi]
- A mixed signal spectrum clearing system for radio co-existence with high power jammingM. Omer, J. S. Kenney. 137-141 [doi]
- Collaborative compressive spectrum sensing in a UAV environmentHsieh-Chung Chen, H. T. Kung, Dario Vlah, Daniel Hague, Michael Muccio, Brendon Poland. 142-148 [doi]
- Partitioned compressive sensing with neighbor-weighted decodingH. T. Kung, Stephen J. Tarsa. 149-156 [doi]
- GBCS: A two-step compressive sensing reconstruction based on group testing and basis pursuitAli Talari, Nazanin Rahnavard. 157-162 [doi]
- Measurement combining and progressive reconstruction in compressive sensingHsieh-Chung Chen, H. T. Kung, Dario Vlah, Bruce W. Suter. 163-168 [doi]
- A sequential sampling algorithm that adapts to the uncertain sparsity in signal environmentKaren M. Guan, Jonathan P. Krauss, Emilio A. Sovero, Gilbert Tseng, May Tan. 169-173 [doi]
- Unequal compressive imagingBetelhem Mekisso, Ali Talari, Nazanin Rahnavard. 174-179 [doi]
- Geolocation of LTE subscriber stations based on the timing advance ranging parameterLeslie Jarvis, John McEachen, Herschel Loomis. 180-187 [doi]
- Detector design and intercept metrics for intra-pulse radar-embedded communicationsJustin G. Metcalf, Shannon D. Blunt, Erik Perrins. 188-192 [doi]
- Doppler geolocation with drifting carrierHanna E. Witzgall, Brad Pinney, Michael Tinston. 193-198 [doi]
- A blind iterative calibration method for high resolution DOA estimationAhmed Khallaayoun, Raymond J. Weber, Yikun Huang. 199-204 [doi]
- Mobility support in TVWS with multiple geo-location capabilityJihaeng Heo, Gosan Noh, Sungmook Lim, Daesik Hong. 205-210 [doi]
- Reduced redundancy arrays for detection and direction finding over a wide frequency rangeBruce F. McGuffin. 211-216 [doi]
- On the achievable rates for the return-link of multi-beam satellite systems using successive interference cancellationVincent Boussemart, Matteo Berioli, Francesco Rossetto, Michael Joham. 217-223 [doi]
- Adaptive incremental-redundancy transmission for tactical packet radio systemsJason D. Ellis, Michael B. Pursley. 224-229 [doi]
- Quality-of-information aware transmission policies with time-varying linksErtugrul Necdet Ciftcioglu, Aylin Yener. 230-235 [doi]
- Improving multicast throughput in mobile ad-hoc networks using cross-layer signaling mechanismWilliam Su, Reza Ghanadan. 236-241 [doi]
- Optimal resource allocation in a bandwidth exchange enabled relay networkMuhammad Nazmul Islam, Narayan B. Mandayam, Sastry Kompella. 242-247 [doi]
- Net-eigen MAC: A new MIMO MAC solution for interference-oriented concurrent link communicationsPengkai Zhao, Babak Daneshrad. 248-253 [doi]
- Eliminating co-location radio interference with photonic-enhanced spectrum management in cognitive radio networksJerome Sonnenberg, Richard DeSalvo, Charles Middleton. 254-259 [doi]
- Throughput maximization in cognitive radio based wireless mesh networksYanchao Zhao, Jie Wu 0001, Sanglu Lu. 260-265 [doi]
- New results on a two-stage novel modulation classification technique for cognitive radio applicationsOkhtay Azarmanesh, Sven G. Bilen. 266-271 [doi]
- Secure cooperative multi-channel spectrum sensing in cognitive radio networksBehzad Kasiri, Jun Cai, Attahiru Sule Alfa. 272-276 [doi]
- Blind modulation classification based on spectral correlation and its robustness to timing mismatchEric Rebeiz, Danijela Cabric. 277-282 [doi]
- On the design of a modern broadband physical layer for teleoperations linksSungill Kim, Mark Johnson, On Wa Yeung, David Yin. 283-286 [doi]
- Symbol-based physical-layer network coding for two-way relay channelRuohan Cao, Tiejun Lv, Hui Gao. 287-292 [doi]
- Traffic shaping impact of network coding on spectrum predictability and jamming attacksShanshan Wang, Yalin E. Sagduyu, Junshan Zhang, Jason Hongjun Li. 293-298 [doi]
- Noncoherent digital network coding using multi-tone CPFSK modulationTerry Ferrett, Matthew C. Valenti, Don J. Torrieri. 299-304 [doi]
- Burst error correction using binary multiplication without carryNikolaos G. Bardis, Nikolaos Doukas, Oleksandr P. Markovskyi. 305-309 [doi]
- Beam forming using an iterative bootstrapping techniqueYash Vasavada, X. Huang, Channasandra Ravishankar, J. Corrigan. 310-315 [doi]
- Systematic design of network coding-aware buffering strategiesFrancesco Rossetto, Daniel E. Lucani. 316-322 [doi]
- Iterative channel estimation and partially coherent demodulation of CPFSK in time-selective fading channelsOluwatosin A. Adeladan, John M. Shea. 323-328 [doi]
- Frequency domain processing for cyclic prefix-assisted multi-h CPM block transmissionCheolhee Park, Baxter F. Womack. 329-333 [doi]
- Channel estimation and equalisation for single carrier continuous phase modulationColin Brown, Philip J. Vigneron. 334-340 [doi]
- An improved link-16/JTIDS receiver in pulsed-noise interferenceChi-Han Kao, Clark Robertson. 341-346 [doi]
- An LDPC-based key-agreement scheme over the fast-fading wiretap channelChan Wong Wong, Tan F. Wong, John M. Shea. 347-352 [doi]
- Adaptive algorithms with inertiaByung-Jae Kwak, Nah-Oak Song, Young Hoon Kim. 353-357 [doi]
- Turbo Volterra equalization of intermodulation distortion in multicarrier satellite systemsBassel F. Beidas. 358-363 [doi]
- Multiuser detection in large-dimension multicode MIMO-CDMA systems with higher-order modulationPritam Som, A. Chockalingam. 364-370 [doi]
- Concurrent communications with adaptive interference cancellation in MIMO networksEren Eraslan, Babak Daneshrad. 371-377 [doi]
- Multiple access interference mitigation through multi-level locally orthogonal FH-CDMAJens P. Elsner, Ralph Tanbourgi, Friedrich K. Jondral. 378-383 [doi]
- Interference statistics of a poisson field of interferers with random puncturingAlireza Babaei, Martin Haenggi, Prathima Agrawal, Bijan Jabbari. 384-388 [doi]
- Penetration-free system for transmission of data and power through solid metal barriersTristan J. Lawry, Gary J. Saulnier, Jonathan D. Ashdown, Kyle R. Wilt, Henry A. Scarton, Sam Pascarelle, John D. Pinezich. 389-395 [doi]
- A robust interference mitigation technique for BFSK Fast Frequency Hopped signalsRiccardo Baroni, Francesco Lombardo, Enzo Alberto Candreva, Raffaella Pedone, Alessandro Vanelli-Coralli, Giovanni Emanuele Corazza. 396-400 [doi]
- Spatially focusing a radio signal and simultaneously nulling it at another location using time-reversal signal processingRatish J. Punnoose, Neil Jacklin, David Counsil. 401-405 [doi]
- Robust initialization with reduced pilot overhead for progressive underwater acoustic OFDM receiversJianzhong Huang, Shengli Zhou, Zhaohui Wang. 406-411 [doi]
- Reliable relay-aided underwater acoustic communications with hybrid DLT codesRui Cao, Liuqing Yang. 412-417 [doi]
- OFDM-IDMA communications over underwater acoustic channelsJian Dang, Fengzhong Qu, Zaichen Zhang, Liuqing Yang. 418-423 [doi]
- Impact of relay placement on energy efficiency in Underwater Acoustic NetworksClement Kam, Sastry Kompella, Gam D. Nguyen, Anthony Ephremides, Zaihan Jiang. 424-429 [doi]
- Impact of spatial correlation of fading channels on the performance of MIMO underwater communication systemsJesse Cross, Jian Zhang, Yahong Rosa Zheng. 430-434 [doi]
- Simulations on the statistical properties for cascaded Rayleigh fading channelYazan Ibdah, Yanwu Ding, Hyuck M. Kwon, Kanghee Lee. 435-440 [doi]
- Dependence of radio channel characteristics on terrain variability in hilly/mountainous regionsJonathan S. Lu, Henry L. Bertoni, Alexander X. Han, Chrysanthos Chrysanthou, Jeffrey Boksiner. 441-446 [doi]
- Multipath propagation for helicopter-to-ground MIMO linksMichael Rice, Michael Jensen. 447-452 [doi]
- New results on finite-state Markov models for Nakagami fading channelsMichael A. Juang, Michael B. Pursley. 453-458 [doi]
- Textile antennas: Shotgun proven performanceTero Kaija, Juha Lilja, Pekka Salonen. 459-464 [doi]
- Wideband semielliptical monopole antennaRajesh C. Paryani, Rod B. Waterhouse. 465-470 [doi]
- FPGA implementation of a coherent SOQPSK-TG demodulatorEhsan Hosseini, Erik Perrins. 471-476 [doi]
- Method of estimating the link quality of a UHF SATCOM channelRichard Booton. 477-482 [doi]
- Transmission strategies for single-destination wireless networksGam D. Nguyen, Jeffrey E. Wieselthier, Sastry Kompella, Anthony Ephremides. 483-488 [doi]
- Turbo equalization in an LTE uplink MIMO receiverAleksandar Purkovic, Mingjian Yan. 489-494 [doi]
- Downlink energy-efficient multiuser beamforming with individual SINR constraintsChenzi Jiang, Leonard J. Cimini Jr.. 495-500 [doi]
- MIMO equalization for helicopter-to-ground communicationsMichael Rice, Mohammad Saquib. 501-506 [doi]
- Power efficient uplink LTE with CPM-SC-IFDMARaina Rahman, Erik Perrins, Marilynn Green. 507-512 [doi]
- Pre-distortion schemes for MISO single-user ultra-wideband systemsBruno A. Angelico, Paul Jean E. Jeszensky, Taufik Abrão. 513-518 [doi]
- A GNU radio testbed for distributed polling service-based medium access controlYingsong Huang, Phillip A. Walsh, Yihan Li, Shiwen Mao. 519-524 [doi]
- A retransmission strategy for real-time streaming over satellite in blockage with long memoryHuan Yao, Yuval Kochman, Gregory W. Wornell. 525-531 [doi]
- Frequency-selective I/Q imbalance compensation for OFDM transmitters using online frequency-domain adaptive predistortionR. Keith McPherson. 532-537 [doi]
- Robust physical layer authentication using inherent properties of channel impulse responseFiona Jiazi Liu, Xianbin Wang, Helen Tang. 538-542 [doi]
- Current designs for fast frequency hopping with MFSKThomas C. Royster IV. 543-548 [doi]
- Improving DVB-S2 performance through constellation shaping and iterative demappingXingyu Xiang, Matthew C. Valenti. 549-554 [doi]
- The capacity of SOQPSK-TGCenk Sahin, Erik Perrins. 555-560 [doi]
- Adaptive modulation approach for robust MPEG-4 AAC encoded audio transmissionDeepak Rawat, Sunil Kumar, Santosh Nagaraj, John D. Matyjas. 561-565 [doi]
- EXIT chart analysis and design of non-binary protograph-based LDPC codesBen-Yue Chang, Lara Dolecek, Dariush Divsalar. 566-571 [doi]
- Power loading for OFDM in tactical packet radio systemsMichael A. Juang, Michael B. Pursley. 572-577 [doi]
- 40-Gbps modem architecture for free-space optical communicationsJuan C. Juarez, Joseph E. Sluz, Rachel L. Oberc, David W. Young. 578-582 [doi]
- An experimental evaluation of a novel sequential beamspace smart antenna systemWilliam Tidd, Yikun Huang. 583-588 [doi]
- Asynchronous and high-accuracy digital modulated signal detection by sensor networksJefferson L. Xu, Wei Su, MengChu Zhou. 589-594 [doi]
- Approaching the Matched Filter Bound with coded OFDM and SC-FDE schemesFábio Silva, Rui Dinis, Paulo Montezuma. 595-599 [doi]
- Transmitting with fewer constellation pointsPeng Sun, Daoben Li. 600-604 [doi]
- Superposition coding to support multiple streams, priorities, and channel capacities in the context of GMSKThomas A. Courtade, Jiadong Wang, Richard D. Wesel. 605-609 [doi]
- Performance simulation and analysis of M-ary frequency-shift keying with Reed Solomon encoding, noncoherent demodulation, and hybrid soft decision-hard decision decodingKonstantinos Spyridis, Clark Robertson. 610-615 [doi]
- The effect of automatic gain control on the performance of matched-filter packet acquisition using dual antenna diversityShivram Ramanathan, Daniel L. Noneaker. 616-621 [doi]
- Performance of delay and add direct sequence spread spectrum modulation scheme with fast frequency hopping in frequency selective Rayleigh channelsVincent Le Nir, Bart Scheers. 622-627 [doi]
- Analysis of body communication parameters using Software Radio platformSeokseong Jeon, Chansu Yu, Young-Joo Suh, Jin-Hee Moon, Sang-Hoon Lee. 628-633 [doi]
- Performance considerations of MIMO-based ad-hoc networksGeorgios I. Papadakis, Nikos B. Pronios. 634-642 [doi]
- TITLE: Development and test of a Satcom IP modem for the EHF bandGaston Levannier, Patrick Bruas, Marc Touret. 643-648 [doi]
- A technique to improve the performance of fixed-point TDMP decoding of QC-LDPC codes in the presence of SNR estimation errorJaWone A. Kennedy, Daniel L. Noneaker. 649-654 [doi]
- Temporally robust relay sets for mobile wireless networksJustin Dean, David J. Claypool, Joseph P. Macker. 655-660 [doi]
- Opportunistic relaying in multipath and slow fading channel: Relay selection and optimal relay selection periodSungjoon Park, Wayne E. Stark. 661-666 [doi]
- Genetic-algorithm-based construction of Load-Balanced CDSs in Wireless Sensor NetworksJing He, Shouling Ji, Mingyuan Yan, Yi Pan, Yingshu Li. 667-672 [doi]
- MPR-aware performance improvement for inter-domain routing in MANETsYou Lu, Yenan Lin, Biao Zhou, Mario Gerla. 673-678 [doi]
- Performance of BGP among mobile military networksGlenn Carl, Scott Arbiv, David Ward. 679-686 [doi]
- BGP-MX: Border Gateway Protocol with Mobility ExtensionsMaher Kaddoura, Barry Trent, Ranga S. Ramanujan, Gregory Hadynski. 687-692 [doi]
- Distributed backpressure protocols with limited state feedbackScott T. Rager, Ertugrul N. Ciftcioglu, Aylin Yener, Thomas F. La Porta, Michael J. Neely. 693-698 [doi]
- A cross-layer parallel handover optimization scheme for WiMAX networksTing Zhou, Hamid Sharif, Michael Hempel, Puttipong Mahasukhon, Tao Ma, Pradhumna Lal Shrestha. 699-704 [doi]
- Utilizing the broadcast medium while maintaining per-link information: A practical approachBow-Nan Cheng, Andrea Coyle. 705-709 [doi]
- An implementation of a Common Virtual Multipoint Interface in LinuxLeonid Veytser, Bow-Nan Cheng. 710-715 [doi]
- Design consideration of router-to-radio interface in mobile networksMu-Cheng Wang, Steven A. Davidson, Sam Mohan. 716-721 [doi]
- Optimal grouping and matching for network-coded cooperative communicationsSushant Sharma, Yi Shi, Y. Thomas Hou, Sastry Kompella, Scott F. Midkiff. 722-728 [doi]
- Analyzing effect of generation size in intra-session network coding for multiple flows of TCP trafficGokul Bhat, Janise McNair. 729-734 [doi]
- Routing and rate control for coded cooperation in a satellite-terrestrial networkBrooke Shrader, Thomas H. Shake, Joshua Funk, Armen Babikyan, Andrew P. Worthen. 735-740 [doi]
- Coalition formation games for energy-efficient wireless network cocastHung-Quoc Lai, Yan Chen, K. J. Ray Liu. 741-746 [doi]
- Effects of MAC approaches on non-monotonic saturation with COPE - a simple case studyJason Cloud, Linda M. Zeger, Muriel Médard. 747-753 [doi]
- Multiple network coded TCP sessions in disruptive wireless scenariosChien-Chia Chen, Clifford Chen, Joon-Sang Park, Soon-Young Oh, Mario Gerla, M. Y. Sanadidi. 754-759 [doi]
- Improved localization in GPS-denied environments using an autoregressive model and a generalized linear modelXiao Ma, Seddik M. Djouadi, Paul Benjamin Crilly, Samir Sahyoun, Stephen F. Smith. 760-765 [doi]
- A novel ℓ1-regularized LS formulation for target localization and malicious anchor identificationWenshu Zhang, Huilin Xu, Liuqing Yang. 766-771 [doi]
- More (messages) is less (accuracy) in localizationSmruti Parichha, Mart Molle. 772-779 [doi]
- Efficient node self-localization in large ad-hoc wireless networks using interlaced particle filtersBenjamin R. Hamilton, Xiaoli Ma, Robert J. Baxley. 780-785 [doi]
- A location service for VHF tactical networksDavid Kidston, Humphrey Rutagemwa. 786-791 [doi]
- Algorithm and analysis of using GPS for a hybrid mobile satellite terminalJun Erik Xu, Je-Hong Jong, Channasandra Ravishankar, Anthony Noerpel, Yash Vasavada. 792-796 [doi]
- Data replication in mobile tactical networksYang Zhang, Sucharita Ray, Guohong Cao, Tom La Porta, Prithwish Basu. 797-803 [doi]
- ConSens: Consistency-sensitive opportunistic data access in wireless networksSunho Lim, Yumin Lee, Manki Min. 804-809 [doi]
- Reliable data fusion in wireless sensor networks under Byzantine attacksMai Abdelhakim, Leonard E. Lightfoot, Tongtong Li. 810-815 [doi]
- An active buffer management based on the virtual transmission delay for video streaming serviceKyu-Hwan Lee, Hyun-Jin Lee, Jae-Hyun Kim. 816-821 [doi]
- Energy and distortion analysis of video compression schemes for Wireless Video Sensor NetworksSaeed Ullah, Junaid Jameel Ahmad, Junaid Khalid, Syed Ali Khayam. 822-827 [doi]
- Integrating Wireless Sensor Networks in the NATO Network Enabled Capability using Web servicesJoakim Flathagen, Frank T. Johnsen. 828-833 [doi]
- AeroRP performance in highly-dynamic airborne networks using 3D Gauss-Markov mobility modelJustin P. Rohrer, Egemen K. Çetinkaya, Hemanth Narra, Dan Broyles, Kevin Peters, James P. G. Sterbenz. 834-841 [doi]
- Routing fountains: Leveraging wide-area broadcast to improve mobile inter-domain routingJoshua Train, Joseph Bannister, C. S. Raghavendra. 842-848 [doi]
- Reliable geocasting solution for underwater acoustic sensor networksBaozhi Chen, Dario Pompili. 849-854 [doi]
- Interference-aware multipath routing in a Cognitive Radio Ad Hoc NetworkBakul Khanna, Ram Ramanathan. 855-860 [doi]
- Scalability features of the WNaN routing protocolDavid P. Wiggins. 861-865 [doi]
- On local approximation of minimum-latency broadcast scheduling in 3D MANETsYilin Shen, Ying Xuan, My T. Thai. 866-871 [doi]
- Distributed data scheduling for OFDMA-based wireless mesh networksDong Chan Park, Sangseok Yun, Suk Chan Kim, Wooram Shin, Hyunjae Kim, Kwang Jae Lim. 872-877 [doi]
- Lifetime optimization of multi-hop wireless sensor networks by regulating the frequency of use of cooperative transmissionJin-Woo Jung, Mary Ann Ingram. 878-883 [doi]
- Topology-aware Optimal Task Allocation for Mission Critical Environment - A decentralized approachShameem Ahmed, Klara Nahrstedt, Guijun Wang. 884-889 [doi]
- Multiple access in mesh and relay networks: Continuous single-carrier waveforms are superior to bursted multi-carrier waveformsQian Zhang, David W. Matolak. 890-895 [doi]
- A cooperative lifetime extension MAC protocol in duty cycle enabled wireless sensor networksHongzhi Jiao, Mary Ann Ingram, Frank Y. Li. 896-901 [doi]
- WTE-MAC: Wakeup time estimation MAC For improving end-to-end delay performance In WSNJae-Ho Lee, Kyeong Hur, Doo Seop Eom. 902-907 [doi]
- CLA-MAC: A cooperative extension of load adaptive MAC protocolHoward Huang, Homayoun Yousefi'zadeh, Hamid Jafarkhani. 908-913 [doi]
- An optimal single/concurrent link MAC scheme for a single-hop MIMO networkPengkai Zhao, Babak Daneshrad. 914-919 [doi]
- Fully distributed clock synchronization in wide-range TDMA Ad-Hoc networksGeraud Allard, Vasken Genc, Jacques Yelloz. 920-925 [doi]
- Performance evaluation of single channel virtual-circuit MAC protocols for MANETsSenni Perumal, John S. Baras. 926-931 [doi]
- IP QoS with military precedence level for the NATO information infrastructureEnrico Casini, Aad van der Zanden, Rob Goode, Ricardo Berto-Monleon. 932-937 [doi]
- Voice-radio interconnectivity in air defense networksRichard Birckbichler, Dieter Eier, Vince Campanella. 938-943 [doi]
- Evolving DISA networks using pseudo wireJoseph Merritt. 944-949 [doi]
- Directional ad hoc networking technology (DANTE) performance at seaChristopher Meagher, Randall Olsen, Christopher Cirullo, Robert C. Ferro, Nathaniel Stevens, Joonyoung Yu. 950-955 [doi]
- Effective packet transmission scheme for real-time situational awareness based on MIL-STD-188-220 tactical ad-hoc networksJeonghun Kim, Dongwook Kim, JaeSung Lim, Jeongin Choi, Ho Kim. 956-960 [doi]
- Using UHF connectivity to off-load VHF messaging in tactical MANETsJohn Whitbeck, Yoann Lopez, Jeremie Leguay, Vania Conan, Olivier Rosenberg, Olivier Tessier. 961-966 [doi]
- TraJECT-3D: Generating realistic mobility traces for tactical network simulationRyan Pakbaz, Amir Aminzadeh-Gohari, Volkan Rodoplu. 967-972 [doi]
- Performance evaluation of cooperative cognitive radio networks with data/decision fusionO. Olabiyi, A. Annamalai. 973-978 [doi]
- Further results on throughput optimization using adaptive PHY/MAC/APP layer techniquesA. Annamalai, O. Odejide. 979-984 [doi]
- Connectivity and Scaling behavior of power-limited directional infrastructureless wireless networksMatthew F. Carey, John M. Chapin, Vincent W. S. Chan. 985-990 [doi]
- Analysis of spatial pipelining in Opportunistic Large Array broadcastsHaejoon Jung, Mary Ann Ingram. 991-996 [doi]
- A content freshness enhancement with infrastructures in mobile opportunistic networksDaehyun Ban, Michael Devetsikiotis. 997-1002 [doi]
- Predicting the performance of geographic delay-tolerant routingErik Kuiper, Simin Nadjm-Tehrani. 1003-1008 [doi]
- Robust communications for disconnected, intermittent, low-bandwidth (DIL) environmentsKeith Scott, Tamer Refaei, Nirav Trivedi, Jenny Trinh, Joseph P. Macker. 1009-1014 [doi]
- An experimental evaluation of peer-to-peer reliable multicast protocolsGiacomo Benincasa, Andrea Rossi, Niranjan Suri, Mauro Tortonesi, Cesare Stefanelli. 1015-1022 [doi]
- The stability of multihop transport with autonomous cooperationThomas R. Halford, Keith M. Chugg. 1023-1028 [doi]
- Full duplex spectrum sensing in non-time-slotted cognitive radio networksWenchi Cheng, Xi Zhang, Hailin Zhang. 1029-1034 [doi]
- Joint wideband spectrum sensing in frequency overlapping cognitive radio networks using distributed compressive sensingUkash Nakarmi, Nazanin Rahnavard. 1035-1040 [doi]
- Cross-network spectrum sensing for mission-critical cognitive radio networks: Collaboration through gatewaysHusheng Li, Lijun Qian. 1041-1046 [doi]
- A practical approach for channel problem detection and adaptation in tactical radio systemsWoo-Sung Jung, Keun Woo Lim, Young-Bae Ko, Yooseung Song, Sangjoon Park. 1047-1052 [doi]
- Exploring opportunistic access techniques using stochastic models: Dynamic spectrum access without sensingJad Nasreddine, Janne Riihijärvi, Xia Li, Petri Mähönen. 1053-1060 [doi]
- State based multiple channel selection in multi-channel wireless networksBrian Phillips, Murali Tummala, John C. McEachen. 1061-1066 [doi]
- A bio-inspired approach combining genetic algorithms and game theory for dispersal of autonomous manet nodesJanusz Kusyk, Jianmin Zou, Cem Safak Sahin, M. Ümit Uyar, Stephen Gundry, Elkin B. Urrea. 1067-1072 [doi]
- Genetic algorithms for self-spreading autonomous and holonomic unmanned vehicles in a three-dimensional spaceStephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin, Elkin Urrea. 1073-1078 [doi]
- Physical- and network-topology control for systems of mobile robotsLeenhapat Navaravong, John M. Shea, Warren E. Dixon. 1079-1084 [doi]
- A solution to network protocol issues for directional ad-hoc networks through topology control and a multiple-radio-per-node architectureChristopher Cirullo, Randall Olsen, Christopher Meagher, Robert Ferro, Joonyoung Yu, Nathaniel Stevens. 1085-1089 [doi]
- Wireless testbed implementation of cognitive topology control for power efficient connected networksKyriakos Manousakis, Latha A. Kant, Kenneth Young, Charles Graff, Mitesh P. Patel, David Yee. 1090-1095 [doi]
- Efficient group handoff decision algorithm for wireless networks with mobile access pointsJung-Min Moon, Dong-Ho Cho. 1096-1101 [doi]
- SAT: an SVM-based automated trust management system for Mobile Ad-hoc NetworksWenjia Li, Anupam Joshi, Tim Finin. 1102-1107 [doi]
- Toward a flexible ontology-based policy approach for network operations using the KAoS frameworkAndrzej Uszok, Jeffrey M. Bradshaw, James Lott, Matthew Johnson, Maggie R. Breedy, Michael Vignati, Keith Whittaker, Kimberly Jakubowski, Jeffrey Bowcock, Daniel Apgar. 1108-1114 [doi]
- Fuzzing test data generation based on message matrix perturbation with keyword referenceShijia Gu, Yueyang Song, Xin Zhao, Weihai Li. 1115-1120 [doi]
- Using cyber maneuver to improve network resiliencyPaul Beraud, Alen Cruz, Suzanne Hassell, Sonny Meadows. 1121-1126 [doi]
- OPAL - A survivability-oriented approach to management of tactical military networksKin-Ping Hui, Peyam Pourbeik, Peter George, Damien Phillips, Shane Magrath, Marek Kwiatkowski. 1127-1132 [doi]
- Using an adaptive management plane for policy-based network management traffic in MANETsMichelle Wolberg, Ritu Chadha, C. Jason Chiang, Kathleen Kurachik, Marcus Pang, Gregory Hadynski. 1133-1138 [doi]
- Enhancement of frequency-based wormhole attack detectionRonggong Song, Peter C. Mason, Ming Li. 1139-1145 [doi]
- Computer Network Testbed at Binghamton UniversityAndrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, James Antonakos. 1146-1151 [doi]
- Cyber situational awareness through operational streaming analysisWilliam W. Streilein, John Truelove, Chad R. Meiners, Gregory Eakman. 1152-1157 [doi]
- Enhancing application performance with network awareness in Tactical NetworksTa Chen, Sharanya Eswaran, Michael A. Kaplan, Sunil Samtani, David Shur, John Sucec, Larry Wong. 1158-1163 [doi]
- A multi-perspective approach to insider threat detectionMajid Raissi-Dehkordi, David Carr. 1164-1169 [doi]
- Detecting and localizing large-scale router failures using active probesQiang Zheng, Guohong Cao, Tom La Porta, Ananthram Swami. 1170-1175 [doi]
- On the efficiency of establishing and maintaining security associations in tactical MANETs in group formationMazda Salmanian, Li Pan, Jiangxin Hu, Ming Li. 1176-1182 [doi]
- From security to vulnerability: Data authentication undermines message delivery in smart gridXiang Lu, Wenye Wang, Zhuo Lu, Jianfeng Ma. 1183-1188 [doi]
- Provisioning Substation-level authentication in the smart grid networksBinod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah. 1189-1194 [doi]
- A distributed network-sensor based intrusion detection framework in enterprise networksDifan Zhang, Wei Yu 0002, Rommie L. Hardy. 1195-1200 [doi]
- Managing base station location privacyMaria Gorlatova, Roberto Aiello, Stefan Mangold. 1201-1206 [doi]
- Automatic security analysis using security metricsKun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang, Anoop Singhal. 1207-1212 [doi]
- PRONET: Network trust assessment based on incomplete provenanceKannan Govindan, Xinlei Wang 0002, Mohammad Maifi Hasan Khan, Gulustan Dogan, Kai Zeng, Gerald M. Powell, Ted Brown, Tarekh F. Abdelzaher, Prasant Mohapatra. 1213-1218 [doi]
- Jamming attacks in 802.11g - A cognitive radio based approachSudarshan Prasad, David J. Thuente. 1219-1224 [doi]
- Control channel hopping for avoidance of scrambling attacks in IEEE 802.16 systemsJunwoo Jung, Jaemin Jeung, JaeSung Lim. 1225-1230 [doi]
- Adaptive rapid channel-hopping scheme mitigating smart jammer attacks in secure WLANJaemin Jeung, Seungmyeong Jeong, JaeSung Lim. 1231-1236 [doi]
- Timely and robust key establishment under jamming attack in critical wireless networksEun-Kyu Lee, Soon-Young Oh, Mario Gerla. 1237-1242 [doi]
- Multi-node coordinated jamming for location privacy protectionSangho Oh, Marco Gruteser. 1243-1249 [doi]
- Spread-spectrum cognitive networking: Distributed channelization and routingKanke Gao, Lei Ding, Tommaso Melodia, Stella N. Batalama, Dimitris A. Pados, John D. Matyjas. 1250-1255 [doi]
- Minimax games for cooperative spectrum sensing in a centralized cognitive radio network in the presence of interferersV. Sriram Siddhardh Nadendla, Hao Chen 0001, Pramod K. Varshney. 1256-1260 [doi]
- On the (f)utility of untrusted data sanitizationAshish Gehani, David Hanz, John Rushby, Grit Denker, Rance DeLong. 1261-1266 [doi]
- A methodology for the structured security analysis of interconnectionsD. Boonstra, H. A. Schotanus, C. A. A. Verkoelen, A. C. M. Smulders. 1267-1272 [doi]
- Design and analysis of an ARQ based symmetric key generation algorithmYahya S. Khiabani, Shuangqing Wei. 1273-1278 [doi]
- Non-normalizable functions: A new method to generate metamorphic malwareRodney Owens, Weichao Wang. 1279-1284 [doi]
- Controlled information sharing in NATO operationsKonrad S. Wrona, Geir Hallingstad. 1285-1290 [doi]
- Human-Centered Network Visualizer: Visual abstractions of network operations in a tactical environmentChristopher T. Cannon, Donald A. Pellegrino, Thomas T. Hewett, William C. Regli, Giovanni Oddo. 1291-1296 [doi]
- Colored Petri nets as the enabling technology in intrusion detection systemsAndrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, James Antonakos, M. Baimukhamedov. 1297-1301 [doi]
- Automatic functionality detection in behavior-based IDSTomas Nykodym, Victor A. Skormin, Andrey M. Dolgikh, James Antonakos. 1302-1307 [doi]
- Scaling data-plane logging in large scale networksAhsan Arefin, Ahmed Khurshid, Matthew Caesar, Klara Nahrstedt. 1308-1314 [doi]
- Building and evaluating a k-resilient mobile distributed file system resistant to device compromiseScott Huchton, Geoffrey G. Xie, Robert Beverly. 1315-1320 [doi]
- MT6D: A Moving Target IPv6 DefenseMatthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront. 1321-1326 [doi]
- Combinatorial auction-based multiple dynamic mission assignmentJin-Hee Cho, Ananthram Swami, Trevor Cook. 1327-1332 [doi]
- Graph-based analysis in network securityM. Patrick Collins. 1333-1337 [doi]
- Challenges in streaming graph analysisJonathan W. Berry, Matthew Oster, Cynthia A. Phillips, Steven J. Plimpton. 1338 [doi]
- Cauldron mission-centric cyber situational awareness with defense in depthSushil Jajodia, Steven Noel, Pramod Kalapa, Massimiliano Albanese, John Williams. 1339-1344 [doi]
- Dedicated vs. distributed: A study of mission survivability metricsHamed Okhravi, Andrew Johnson, Joshua Haines, Travis Mayberry, Agnes Hui Chan. 1345-1350 [doi]
- Precise structural vulnerability assessment via mathematical programmingThang N. Dinh, My T. Thai. 1351-1356 [doi]
- UCDS: Unifying connected dominating set with low message complexity, fault tolerance, and flexible dominating factorC. David Young, Alan D. Amis. 1357-1362 [doi]
- Fingerprinting large data sets through memory de-duplication technique in virtual machinesRodney Owens, Weichao Wang. 1363-1368 [doi]
- An investigative analysis into security in the clouds and the impact of virtualization on the security architectureBassam S. Farroha, Deborah L. Farroha. 1369-1374 [doi]
- Multi-security domain management integration architecture for end-to-end service management in military networksKlaus-Dieter Tuchs, Tamas Halmai, Marc van Selm. 1375-1380 [doi]
- A Self-shielding Dynamic Network ArchitectureJustin Yackoski, Peng Xie, Harry Bullen, Jason Li, Kun Sun. 1381-1386 [doi]
- A Live-Virtual-Constructive (LVC) framework for cyber operations test, evaluation and trainingManeesh Varshney, Kent Pickett, Rajive L. Bagrodia. 1387-1392 [doi]
- Specification of a Policy Based Network Management architectureRicardo Berto-Monleon, Enrico Casini, Rob van Engelshoven, Rob Goode, Klaus-Dieter Tuchs, Tamas Halmai. 1393-1398 [doi]
- Efficient trust based information sharing schemes over distributed collaborative networksHuang Lin, Xiaoyan Zhu, Y. Fang, Chi Zhang, Zhenfu Cao. 1399-1403 [doi]
- A technical overview of the International Radio Security Service API for tactical radiosAnthony DiBernardo, Scott Leubner, Charles Linn, Leonard Picone, Rafael Aguado Munoz, Javier Fernandez Alonso, Alvaro Mayol Garrido. 1404-1409 [doi]
- Wireless key establishment with asynchronous clocksKaihe Xu, Qian Wang, Kui Ren. 1410-1415 [doi]
- The role of Network Operations in bringing commercial wireless to tactical networksGeorge F. Elmasry, Robert Welsh, Manoj Jain, Ben Hoe, Kimberly Jakubowski, Keith Whittaker, Giovanni Oddo. 1416-1421 [doi]
- Evolution of optimal heterogeneous wireless mesh networksHector M. Lugo-Cordero, Ratan K. Guha. 1422-1427 [doi]
- On the application of cognitive network design to MANET Network ManagementLatha A. Kant, Anthony J. McAuley, Kyriakos Manousakis, Ritu Chadha, C. J. Chiang, Yitzchak M. Gottlieb, Charles Graff, M. Patel, J. Bowcock, Kimberly Moeltner, D. Yee. 1428-1433 [doi]
- Cryptographic solutions for COTS smart phonesAnne-Marie Buibish, Noel E. Johnson, David Emery, Michael Prudlow. 1434-1439 [doi]
- Optimization of a Public Key InfrastructureAnders Fongen. 1440-1447 [doi]
- Risk Based Mobile Access Control (RiBMAC) policy frameworkJim Luo, Myong H. Kang. 1448-1453 [doi]
- Examining the technologies and processes for key management in the enterprise and the way forward into the virtualized environmentBassam Farroha, Deborah Farroha, Andy Cohen. 1454-1459 [doi]
- Using a novel blending method over multiple network connections for secure communicationJaime C. Acosta, John D. Medrano. 1460-1465 [doi]
- Mission-driven tactical network managementKyriakos Manousakis, Yitzchak M. Gottlieb, Ritu Chadha, C. Jason Chiang, Kimberly Moeltner. 1466-1471 [doi]
- Computational resiliency for distributed applicationsKathleen Mcgill, Stephen Taylor. 1472-1479 [doi]
- A usable interface for location-based access control and Over-The-Air Keying in tactical environmentsAdam Petcher, Roger I. Khazan, Daniil M. Utin. 1480-1486 [doi]
- Desktop Demilitarized ZoneGlen Nakamoto, Jeff Schwefler, Kenneth Palmer. 1487-1492 [doi]
- Evaluation of network trust using provenance based on distributed local intelligenceGulustan Dogan, Theodore Brown, Kannan Govindan, Hasan Khan Mohammad Maifi, Tarek F. Abdelzaher, Prasant Mohapatra, Jin-Hee Cho. 1493-1498 [doi]
- Agent-Based Provenance ArchitectureRobert E. Eek, Dale D. Miller. 1499-1505 [doi]
- Using COTS technologies for battlefield applicationsAnni Woolley, Danielle Duff. 1506-1510 [doi]
- Impact of the Network Environment on a Common Operating EnvironmentRobert E. Donnelly. 1511-1516 [doi]
- Tracking commander's intent in dynamic networksMichael K. Martin, Kathleen M. Carley, Paul Sauk, Patrick Perrin, Daniel O'Neill, Anni Woolley. 1517-1522 [doi]
- Supporting the Commander's information requirements: Automated support for Battle Drill processes using R-CASTJeffrey From, Patrick Perrin, Daniel O'Neill, John Yen. 1523-1528 [doi]
- Development and experimentation of collaborative Red Force Tracking in service oriented architecture for tactical networking systemsGenevieve Sella, Olivier Cherrier, Christophe Guettier, Jacques Yelloz. 1529-1534 [doi]
- Developing corporate services in an agile environmentDeborah Farroha, Bassam Farroha. 1535-1540 [doi]
- Infrastructure, middleware, and applications for portable cellular devices in tactical edge networksNiranjan Suri, Louis Pochet, Joshua Sterling, Ralph Kohler, Enrico Casini, Jesse Kovach, Robert Winkler, Peter Budulas. 1541-1546 [doi]
- Equalization of packet delays in OFDMA scheduling of real-time video callsAlexander X. Han, I.-Tai Lu. 1547-1552 [doi]
- Analysis and implementation of the virtual network systemJuho Määttä, Risto Järvinen, Riku Luostarinen, Lauri Liuhto, Taneli Taira, Jukka Manner. 1553-1558 [doi]
- An ontology for RF and photonic-assisted cognitive radio networksJerome Sonnenberg, Richard DeSalvo, Charles Middleton. 1559-1564 [doi]
- Middleware transports in a real-time embedded environmentRoy M. Bell. 1565-1567 [doi]
- Net-centric information and knowledge management and dissemination for data-to-decision C2 applications using intelligent agents and service-oriented architecturesIsrael Mayk, William C. Regli, D. Nguyen, M. Mai, A. Chan, Todd Urness, B. Goren, S. Kizenko, S. Randles, Z. Jastrebski, J. Ruschmeyer, Lex Lehman, M. McCurdy, D. Millar, I. Simmons, C. Cannon, Joseph B. Kopena, A. Patwardhan, G. Tassone, J. Lindquist, G. Jewell, R. Forkenbrock, M. Nicholson, F. Koss, R. Wray, J. Bradshaw, J. Lott. 1568-1573 [doi]
- Advances in content transformation in heterogeneous tactical wireless networksTa Chen, Andrzej Cichocki, Sharanya Eswaran, Vikram Kaul, Yow-Jian Lin, Sunil Samtani, David Shur, Jeffrey Bowcock. 1574-1579 [doi]
- Improving WSN application QoS and network lifetime management using SOA strategiesCarolyn Ortega, Ted Brown, John Ibbotson, Robert Hancock. 1580-1585 [doi]
- QAM: A comprehensive QoS-aware Middleware suite for tactical communicationsAlexander Poylisher, Florin Sultan, Abhrajit Ghosh, Shiwei Li, C. Jason Chiang, Ritu Chadha, Kimberly Moeltner, Kimberly Jakubowski. 1586-1591 [doi]
- Service Oriented Architecture (SOA) based Enterprise Management for MILSATCOM tactical environmentsMichelle Watton-Harper, Tom Vanek, Daeron Lockett, Jessica Sanford. 1592-1597 [doi]
- Providing interoperable real-time data communication with TENAJ. Russell Noseworthy. 1598-1603 [doi]
- Integrated information and network management for end-to-end Quality of ServiceMarco M. Carvalho, Adrian Granados, Kyle Usbeck, Joseph P. Loyall, Matthew Gillen, Asher Sinclair, James P. Hanna. 1604-1609 [doi]
- Reliable and geo-localized content search in mobile networksClaudio Cicconetti, Flavio Crisciani, Valeria Ginghiali, Raffaella Mambrini. 1610-1615 [doi]
- INDI: Adapting the multicast DNS service discovery infrastructure in mobile wireless networksJoseph P. Macker, Ian Taylor. 1616-1621 [doi]
- Utility adaptive service brokering mechanism for personal cloud serviceHyewon Song, Changseok Bae, Jeun-Woo Lee, Chan-Hyun Youn. 1622-1627 [doi]
- Adaptive data delivery over disadvantaged, dynamic networksBrent Rickenbach, Peter Griffin, Jason Rush, John Flanagan, Brian Adamson, Joseph P. Macker. 1628-1632 [doi]
- Low-complexity video encoding for UAV reconnaissance and surveillanceMalavika Bhaskaranand, Jerry D. Gibson 0001. 1633-1638 [doi]
- An evaluation of serverless group chatRobert N. Lass, Duc N. Nguyen, David W. Millar, William C. Regli, Joseph P. Macker, R. Brian Adamson. 1639-1644 [doi]
- Group formation and communication in mobile wireless environmentsKurchi Subhra Hazra, Klara Nahrstedt. 1645-1650 [doi]
- Distributed chat in dynamic networksMagnus Skjegstad, Ketil Lund, Espen Skjervold, Frank T. Johnsen. 1651-1657 [doi]
- Middleware for supporting content sharing in dynamic networksMohan Kumar, Sharma Chakravarthy, Sanjay Kumar Madria, Mark Linderman, Waseem Naqvi. 1658-1663 [doi]
- PIM: A unique framework for sensor fusion in the tactical environmentErika Benvegnu, Niranjan Suri, Kenneth M. Ford, James F. Allen, Giulio Finestrali. 1664-1669 [doi]
- Autonomic control for wireless sensor network surveillance applicationsDarminder Singh Ghataoura, John E. Mitchell 0002, George Matich. 1670-1675 [doi]
- A plausible CONOPS for frequency reuse at Ka-band on WGS systemLino Gonzalez, Chris McLain, William Hall. 1676-1683 [doi]
- Delay/overhead measurements for circuit-emulation tunnelsBasil Etefia, James Hant. 1684-1689 [doi]
- Network Centric Waveform operation over the WGSRohit Gupta. 1690-1695 [doi]
- Bi-link-failure-free Routing and Wavelength Assignment for torus-based avionic WDM LANsDexiang Wang, Janise McNair. 1696-1701 [doi]
- Spectrum allocation in C-NEDAT: A tool to automate MANET design and opportunistically adapt network spectrum useMiriam Tauil, David Shallcross, Latha A. Kant, Charles Graff, Mitesh P. Patel. 1702-1707 [doi]
- A complexity measure for military communication networksFuli Shi, Chao Li, Dongliang Qin, Yifan Zhu, Feng Yang. 1708-1713 [doi]
- Survivability and recovery of degraded communication networksLinda Zeger, Ira Kohlberg. 1714-1719 [doi]
- Progress towards reliable free-space optical networksLarry B. Stotts, Ned Plasson, Todd W. Martin, David W. Young, Juan Juarez. 1720-1726 [doi]
- Degree-dependent and cascading node failures in random geometric networksZhenning Kong, Edmund M. Yeh. 1727-1732 [doi]
- The use of PKI in next generation UHF SATCOMAatam Godhwani, Matt Murfield, Terry Delaney, Kok-Song Fong, Patrick Browne, Steve Hryckiewicz. 1733-1738 [doi]
- Efficient transmission of DoD PKI certificates in tactical networksSean R. O'Melia, Roger I. Khazan, Daniil M. Utin. 1739-1747 [doi]
- Fast acquisition techniques for very long PN codes for On-Board Secure TTC transpondersL. Simone, G. Fittipaldi, Ignacio Aguilar Sanchez. 1748-1753 [doi]
- On-Board TTC Transponder for Secure CommunicationsL. Simone, D. Gelfusa, S. Ciarcia, G. Fittipaldi. 1754-1759 [doi]
- Indoor geolocation by inertial navigationDon J. Torrieri, Michael B. Bendak, Gordon Ritchie. 1760-1765 [doi]
- Compressive Sampling for energy efficient and loss resilient camera sensor networksAshish Wani, Nazanin Rahnavard. 1766-1771 [doi]
- Inexpensive High Dynamic Range Video for large scale security and surveillanceStephen Mangiat, Jerry D. Gibson 0001. 1772-1777 [doi]
- An integrated simulation environment for sensor data fusion applications in wireless mesh networksNils Aschenbruck, Christoph Fuchs. 1778-1783 [doi]
- Performance of wireless sensor networks under random node failuresMilan Bradonjic, Aric A. Hagberg, Feng Pan. 1784-1789 [doi]
- Implementation and emulation of adaptive-array algorithms for direct-sequence systemsThomas J. Calomiris, Don J. Torrieri, Douglas A. Gwyn, Tarin Ziyaee. 1790-1795 [doi]
- Efficient placement of directional antennas in infrastructure-based wireless networksFeng Pan, Shiva Prasad Kasiviswanathan. 1796-1801 [doi]
- Integrated Topside - integration of narrowband and wideband array antennas for shipboard communicationsJoseph A. Molnar, Ivan Corretjer, Gregory Tavik. 1802-1807 [doi]
- A conformal UHF antenna suitable for satellite communications by small air, land & sea sensor platformsD. T. Auckland, Mark Reese. 1808-1811 [doi]
- On-satellite testing of mobile communication antennas for compliance to VMES, ESV, and other pointing accuracy requirementsRohit Murthy. 1812-1817 [doi]
- Verification and validation of the QualNet JTRS WNW and SRW waveform modelsGary Comparetto, Phil Hallenbeck, Mohammad Mirhakkak, Nancy Schult, Robyn Wade, Mike DiGennaro. 1818-1826 [doi]
- MIMO performance evaluation for airborne wireless communication systemsJesse Chen, Babak Daneshrad, Weijun Zhu. 1827-1832 [doi]
- Performance analysis of an integrated wireless network using WiMAX as backhaul support for WiFi trafficShensheng Tang. 1833-1837 [doi]
- Efficient methods for broadcasting multi-slot messages with random access with captureAmanda Peters, Linda Zeger. 1838-1844 [doi]
- Feasibility and performance analyses of adapting Ethernet-based protocols in space-based networksMai T. Lee. 1845-1852 [doi]
- A peak to peak frame synchronization algorithm for data frames transmitted asynchronously over fading channelsRyan Shoup, Nancy List. 1853-1857 [doi]
- Design of a scalable digital Wireless Channel Emulator for networking radiosScott Buscemi, Ron Sass. 1858-1863 [doi]
- A testbed to support Radio-to-Router interface testing and evaluationRandy Charland, Paul Christensen, James Wheeler, Bow-Nan Cheng. 1864-1869 [doi]
- Integration of the CORE and EMANE Network EmulatorsJeff Ahrenholz, Tom Goff, Brian Adamson. 1870-1875 [doi]
- The mLab-PENGWUN hybrid emulation environment for airborne networksMarco M. Carvalho, Adrian Granados, Marco Arguedas, Carlos Perez, Michael Muccio, Joseph Suprenant, Daniel Hague, Brendon Poland. 1876-1881 [doi]
- RFnest™: Radio frequency network emulator simulator toolJustin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Jason H. Li, Yalin E. Sagduyu, Renato Levy. 1882-1887 [doi]
- A case for DoD application of public cloud computing servicesKris E. Barcomb, Jeffrey W. Humphries, Robert F. Mills. 1888-1893 [doi]
- Cloud computing applications for large-scale satellite ground systemsRichard Anthony, John Fritz, Doug Barnhart. 1894-1898 [doi]
- Short Messaging Services using TDRSS with low-power Personal Communication DevicesJerry Brand. 1899-1902 [doi]
- Switch-and-Navigate: Controlling data ferry mobility for delay-bounded messagesLiang Ma, Ting He, Ananthram Swami, Kang-Won Lee, Kin K. Leung. 1903-1908 [doi]
- Multiple-call handover decisions using fuzzy MCGDM in heterogeneous wireless networksOlabisi E. Falowo, H. Anthony Chan. 1909-1914 [doi]
- On heterogeneous mobile network connectivity: Number of gateway nodesJun Sun, Carl Fossa, Thomas Mak. 1915-1920 [doi]
- Optimal number of gateways for mobile ad-hoc networks (MANET) with two subnetsEvan Saltzman, Dan Gonzales. 1921-1925 [doi]
- Integrating challenged networksSaleem N. Bhatti, Randall J. Atkinson, Joakim Klemets. 1926-1933 [doi]
- Gateway-based interdomain routing scheme for intentional named message delivery in Disruption Tolerant NetworksM. Chuah, B. Herbst, D. Li. 1934-1939 [doi]
- Topology design and performance analysis for networked earth observing small satellitesPaul Muri, Janise McNair, Joseph Antoon, Ann Gordon-Ross, Kathryn Cason, Norman G. Fitz-Coy. 1940-1945 [doi]
- Design and performance of a 3G mobile satellite systemChannasandra Ravishankar, Adrian Morris, Charles Barnett, Anthony Noerpel, James J. Jong. 1946-1951 [doi]
- Adaptive Coherent Aperture Combining for small disadvantaged SatCom terminalsRichard Nink, Thomas Oliver, Thomas Saam. 1952-1957 [doi]
- Peak satellite-to-earth data rates derived from measurements of a 20 Gbps bread-board modemD. Landon, R. Simons, E. Wintucky, J. Sun, J. Winn, A. Laraway, W. McIntire, J. Metz, F. Smith. 1958-1963 [doi]
- "Army SATCOM OTM full elevation performance characterization"Herald Beljour, Saul Foresta, Rich Hoffmann, Laurie Shamblin, Joseph Shields, Andrew Stevens, Chip Uhler, Eric Carl, Michael Eriksson. 1964-1967 [doi]
- The Rucksack Portable Receive Suite performance over WGS using the DVB-S2 Mini IRDBruce Bennett, Dick Gedney, Andy Lincoln, Chris Bush, Jim Marshall, Richard Gibbons. 1968-1973 [doi]
- Air Force aerial layer networking transformation initiativesTodd Schug, Christina Dee, Nikki Harshman, Ryan Merrell. 1974-1978 [doi]
- Airborne ISR mesh high-speed communication via satelliteLawrence E. Kingsley, Phil Chacon, Michael Geist, Punit Mukhija, Tom Bernritter. 1979-1984 [doi]
- Characterizing routing with radio-to-router information in an airborne networkBow-Nan Cheng, Randy Charland, Paul Christensen, Andrea Coyle, Edward Kuczynski, Stephen McGarry, Igor Pedan, Leonid Veytser, James Wheeler. 1985-1990 [doi]
- Disconnection-resilient IP link-state routing for airborne networksMichael Perloff, Rajesh Krishnan, Ram Ramanathan, Carlos Gutiérrez, Bruce Metcalf, David Krzysiak, Raman K. Mehra. 1991-1996 [doi]
- On connectivity of Airborne Networks in presence of region-based faultsShahrzad Shirazipourazad, Pavel Ghosh, Arunabha Sen. 1997-2002 [doi]
- CARUS, an operational retasking application for a swarm of autonomous UAVs: First return on experienceSerge Chaumette, Rémi Laplace, Christophe Mazel, Raphaël Mirault, A. Dunand, Y. Lecoutre, J.-N. Perbet. 2003-2010 [doi]
- GIG End-to-End Policy Based Network Management: A new approach to large-scale distributed automationSteven A. Davidson, Mu-Cheng Wang, Sam Mohan, Frank Bronzo, John Zinky, Jerry Burchfiel. 2011-2018 [doi]
- A novel cross-layer modeling framework for analyzing SOA-based information servicesRavi Vaidyanathan, Gi Tae Kim, Aleksandar Kolarov, Francesco Caruso, Germaine Forbes. 2019-2024 [doi]
- Interoperable joint planning and execution Web service with TITANChristophe Guettier, Jacques Yelloz, Olivier Cherrier, Israel Mayk, Willy Lamal. 2025-2030 [doi]
- Standardizing Network transit in NATO coalition networksPhil Copeland, Rob Goode, Rob van Engelshoven, Marc van Selm, Michael Winkler. 2031-2035 [doi]
- Enhancing the specification of node mobility in Mobile Ad-Hoc Networks using the Motion Planning FrameworkDavid J. Claypool, Justin Dean. 2036-2041 [doi]
- Highly-deployable troposcatter systems in support of NATO expeditionary operationsLuis Bastos, Hermann Wietgrefe. 2042-2049 [doi]
- Heterogeneous system framework for underwater networkingAlessandro Berni, Diego Merani, John R. Potter, Robert Been. 2050-2056 [doi]
- Underwater optical communication using software defined radio over LED and laser based linksWilliam C. Cox, Jim A. Simpson, John F. Muth. 2057-2062 [doi]
- The maintenance of TDMA network synchronization when Reference Burst is vanished in K-JTDLSJinWoo Han, Jae-Pil Lee, Dhongwoon Jang, Sangkyun Oh, Ilhyuk Oh. 2063-2068 [doi]
- MIMO system implementation with displaced ground antennas for broadband military SATCOMAndreas Knopp, Robert T. Schwarz, Berthold Lankl. 2069-2075 [doi]
- Incorporation of uplink channel state information into an end-to-end coded satellite communication systemNancy List, Ryan Shoup. 2076-2080 [doi]
- Relative performance of mobile networks in the Ku, commercial Ka and government Ka bandsChris McLain, Lino Gonzalez, William Hall. 2081-2086 [doi]
- Network architecture for mission critical communications using LEO satellitesNarayanan Natarajan, Anindo Bagchi, William E. Stephens, Stephen J. Leanheart. 2087-2092 [doi]
- Current standards and Regulations for Vehicle-Mounted Earth Stations and their impact on performanceVijitha Weerackody, Enrique Cuevas. 2093-2098 [doi]
- Airborne protected Military Satellite Communications: Analysis of open-loop pointing and closed-loop tracking with noisy platform attitude informationWilliam D. Deike, Timothy M. Gallagher. 2099-2104 [doi]
- The DirecNet™ standard reference architecture: A roadmap for interoperabilityKeith Olds, Raymond Cole, Bruce Lord, Martin Duke, Mathew Sherman, John Spaulding, John Boyd. 2105-2110 [doi]
- White space backup network architecture for the connection continuity of wired and wireless access networksSeungil Yoon, Jongman Kim. 2111-2116 [doi]
- Tactical Use of WiMAX-based networks for anti-aircraft artillery unitsManuel Esteve, Carlos E. Palau, Israel Pérez-Llopis, Israel Pérez-Llopis, Luis E. Hernández-Blanco. 2117-2122 [doi]
- ViMesh (TM) high-speed V-band Vehicular Ad-hoc NetworkHaobin Yu, Houman Ghajari, Anders Nilsson Plymoth, Per Johansson. 2123-2128 [doi]
- Performance of IEEE 802.11 based WLAN devices under various jamming signalsIlkka Harjula, Jarno Pinola, Jarmo Prokkola. 2129-2135 [doi]
- Hybrid DS/FFH spread-spectrum: A robust, secure transmission technique for communication in harsh environmentsMohammed M. Olama, Xiao Ma, P. Teja Kuruganti, Stephen F. Smith, Seddik M. Djouadi. 2136-2141 [doi]
- Photonic signal cancellation for co-site interference mitigationMilad Alemohammad, Dalma Novak, Rod B. Waterhouse. 2142-2146 [doi]
- Noncooperative AF schemes for wireless mobile networks under jamming environmentYazan Ibdah, Hyuck M. Kwon, Yanwu Ding, Kanghee Lee. 2147-2151 [doi]
- Validation of the triply selective fading channel model through a MIMO test bed and experimental resultsSaurav Subedi, Huang Lou, Fei Ren, Mingxi Wang, Yahong Rosa Zheng. 2152-2157 [doi]
- Tactical Network Integration Test FrameworkLorraine Prior, Carl Fossa, David Ward, Jun Sun, Patrick Boehm, Edward Kuczynski, John Cain, Thomas Mak. 2158-2163 [doi]
- Large scale MANET emulations using U.S. Army waveforms with application: VoIPBrian J. Henz, Travis W. Parker, David A. Richie, Lisa M. Marvel. 2164-2169 [doi]
- Operator-in-the-loop experimentation: Providing combat utility measuresLinda McCabe. 2170-2175 [doi]
- Increasing attacker workload with virtual machinesStephen Kuhn, Stephen Taylor. 2176-2181 [doi]
- TENA and JMETC, enabling integrated testing in distributed LVC environmentsGene Hudgins, Keith Poch, Juana Secondine. 2182-2187 [doi]
- Symbol detection on asynchronous OFDMA mesh networks with timing misalignmentSungeun Lee, Xiaoli Ma. 2188-2193 [doi]
- Which one is more sensitive to carrier frequency offsets - OFDMA or SC-FDMA?Malik Muhammad Usman Gul, Sungeun Lee, Xiaoli Ma. 2194-2199 [doi]
- LDPC coded OFDM system design and performance verification on a realistic underwater acoustic channel modelHyeong-Won Jeon, Su-Je Lee, Heung-No Lee. 2200-2204 [doi]
- On the adaptation of commercial smartphones to tactical environmentsVikram Kaul, Christian Makaya, Subir Das, David Shur, Sunil Samtani. 2205-2210 [doi]
- Blind parameter estimation for OFDM interception receiver with iterative cyclostationary analysisJason Gejie Liu, Xianbin Wang, Jay Nadeau, Paul K. M. Ho. 2211-2215 [doi]
- 4G LTE wireless solutions for DoD systemsA. R. Hartman, M. J. Beacken, D. J. Bishop, K. L. Kelly. 2216-2221 [doi]
- Facilitating the watchstander's voice communications task in future Navy operationsDerek P. Brock, Christina Wasylyshyn, Brian McClimens, Dennis Perzanowski. 2222-2226 [doi]
- Commercially Hosted Resilient CommunicationsDon Brown, Doug Schroeder. 2227-2232 [doi]
- Impact of power spread constraints on a multiuser detection enabled ad hoc networkScott Kuzdeba, Joseph Farkas, Brandon Hombs. 2233-2237 [doi]
- The next 10 years of DOD wireless networking researchJohn M. Chapin, Vincent W. S. Chan. 2238-2245 [doi]
- Polarization-based zero forcing suppression with multiple degrees of freedomThomas G. Pratt, Hrishikesh Tapse, Bruce Fette, Robert J. Baxley, Brett T. Walkenhorst, Guillermo Acosta-Marum. 2246-2251 [doi]
- Polarization-based zero forcing with channel estimationThomas G. Pratt, Hrishikesh Tapse, Robert T. Baxley, Brett T. Walkenhorst, Guillermo Acosta-Marum. 2252-2257 [doi]
- The DARPA WNaN network architectureJason Redi, Ram Ramanathan. 2258-2263 [doi]
- Thoughts on military spectrum relocation strategyJonathon Cheah, Rich North. 2264-2269 [doi]
- A new opportunity for unmanned aerial systems (UAS) via commercial Ka-band satellitesCarolyn Campbell, Peter Farney, James A. Mazzei, Terrance M. Cooney. 2270-2273 [doi]
- The Modernization of Enterprise Terminals (MET)Art Reiff, Steve McClintock, Don Hershberger, Scott Potter. 2274-2279 [doi]
- Advanced commercial satellite systems technology for protected communicationsDon Wilcoxson. 2280-2285 [doi]
- The case for disaggregation of U.S. MILSATCOMRon Burch. 2286-2291 [doi]
- EHF options for contested SATCOMLeonard Schiavone, David Hendry. 2292-2295 [doi]
- Commercial SATCOM in support of protected connectivity for the Warfighter and First ResponderFrank Prautzsch, Steven Graves. 2296-2301 [doi]
- Commercial SATCOM communications protection: Commercial SATCOM resilience to jammingWiliam Hreha, Dave Grybos, Rob Singh. 2302-2306 [doi]