Abstract is missing.
- Enhanced algebraic error control for random linear network codingZhiyuan Yan, Hongmei Xie. 1-6 [doi]
- Scalable spectrum situational awareness using devices of opportunityJeffrey Connor, Thomas Green, Aleksandar Jovancevic, John Koss, Rajesh Krishnan, Marissa C. Norko, William Ogle, John Weinfield. 1-5 [doi]
- Practical assessment of RSS-based localization in indoor environmentsDaniel Denkovski, Marko Angjelicinoski, Vladimir Atanasovski, Liljana Gavrilovska. 1-6 [doi]
- Implementation of distributed time exchange based cooperative forwardingMuhammad Nazmul Islam, Shantharam Balasubramanian, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella. 1-6 [doi]
- A new DFT-based frequency estimator for single-tone complex sinusoidal signalsLuoyang Fang, Dongliang Duan, Liuqing Yang. 1-6 [doi]
- An agile enabler framework: Architecting services in the cloudsDeborah Farroha, Bassam Farroha. 1-6 [doi]
- Network performance impact of access control policies in Tactical Wireless NetworksWilliam M. S. Stout, Rusty O. Baldwin. 1-6 [doi]
- Resource allocation for OFDM underwater acoustic cooperative transmission with limited feedbackXiaopeng Huang, Victor B. Lawrence. 1-6 [doi]
- Transformational Satellite Communications System (TSAT) lessons learned: Perspectives from TSAT program leadersJoe Vanderpoorten, Julie Cohen, Jay Moody, Charles Cornell, Arnold Streland, Steve Breese. 1-6 [doi]
- CubeSat Torrent: Torrent like distributed communications for CubeSat satellite clustersObulapathi N. Challa, Janise McNair. 1-6 [doi]
- Hamming Masks: Toward defending constrained networked systemsAndrew D. Jurik, Shaun T. Hutton, Julie A. Tarr. 1-6 [doi]
- Satcom-on-the-move why one size doesn't fit allTimothy Shroyer. 1-6 [doi]
- Design of a multitone firefly time synchronization scheme for responsive vehicle-protection jammersPatrick Loos, Jan Mietzner, Patrick Nickel, Gerhard Bauch, Askold Meusling. 1-6 [doi]
- Information-guided randomization for wireless physical layer secure transmissionQiao-long Li. 1-6 [doi]
- Design and simulation of a high frequency exact solvable chaotic oscillatorAubrey N. Beal, J. Phillip Bailey, S. A. Hale, Robert Neal Dean, Michael C. Hamilton, Jitendra K. Tugnait, Daniel W. Hahs, Ned J. Corron. 1-6 [doi]
- Stability of reservation-contention resolution diversity slotted ALOHA for satellite networksMinwoo Lee, Jong Kwan Lee, Hongjun Noh, Jaesung Lim 0001. 1-6 [doi]
- Operationally realistic testing of network centric tactical applications in a lab environmentSheetal Doshi, Unghee Lee, Bradley Bressler, Rajive L. Bagrodia, Michael DiGennaro, Joseph Oleksa, Yong Chen. 1-6 [doi]
- Cramér-Rao bound for channel estimation in amplify-and-forward relaying networksYupeng Jia, Azadeh Vosoughi. 1-6 [doi]
- Blind frequency offset estimation and intercarrier interference cancelation for FD-MC-CDMA systems in aerial vehicle communicationJohn Ellinger, Randy Depoy, Josh Sanderson, Kaiyu Huang, Zhiqiang Wu 0001. 1-6 [doi]
- Network management for multi-network terminalsStephen M. Dudley, Michael Klingler. 1-6 [doi]
- Performance analysis of wireless intruder geolocation in campus wireless networksShanzeng Guo. 1-6 [doi]
- Channel characterization and throughput tradeoff for wireless sensor networksLeonard E. Lightfoot, Ellen Laubie. 1-5 [doi]
- Integrating radio-to-router protocols into EMANELeonid Veytser, Bow-Nan Cheng, Randy Charland. 1-6 [doi]
- Mining diverse opinionsMudhakar Srivatsa, Sihyung Lee, Tarek F. Abdelzaher. 1-7 [doi]
- Naval Task Force interface for Coalition Networks for Secure Information Sharing (CoNSIS)Tuan Nguyen, Steven Lam, Ceasar Castro, Roger Ogden, Cam Tran, Albert Legaspi. 1-6 [doi]
- Multi-group multiuser two-way relay with superposition codingRenju Wu, Ruohan Cao, Tiejun Lv. 1-5 [doi]
- High throughput Farrow re-samplers utilizing reduced complexity FIR filtersJeffrey P. Long, Jose A. Torres. 1-6 [doi]
- Link state distribution rate scaling for maintaining topology in mobile wireless networksShane A. Fink, Vincent W. S. Chan, Christopher C. Yu. 1-6 [doi]
- A cyber-physical approach to a wide-area actionable system for the power gridJosef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan. 1-6 [doi]
- Relay feedback-based power control in multihop wireless networksSyed Amaar Ahmad, Claudio R. C. M. da Silva, Luiz A. DaSilva. 1-6 [doi]
- Energy minimization of wireless sensor networks based on modulation and coding optimization under finite frame length constraintKei Kinoshita, Hideki Ochiai. 1-5 [doi]
- Enhanced monopulse MIMO radar using reliable αβ filteringChan-ho An, Janghoon Yang, Rong Ran, Ui-Young Pak, Young-Jae Ryu, Dong Ku Kim. 1-6 [doi]
- An architecture to support information availability in the tactical domainJames M. Metzler, Brian R. Holmes, Matthew P. Renodin. 1-6 [doi]
- Wireless multicast with cooperative relayingClement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. 1-6 [doi]
- Non-satellite based field communications system for battlefield deploymentsJohn Cartmell, John Tomici. 1-6 [doi]
- Bandwidth optimizations for standards-based publish/subscribe in disadvantaged gridsEspen Skjervold, Ketil Lund, Trude Hafsøe Bloebaum, Frank T. Johnsen. 1-8 [doi]
- An efficient spectral bound for link vulnerability assessment in large-scale networksThang N. Dinh, Yilin Shen, My T. Thai. 1-6 [doi]
- Temporal stability for dynamic network relay setsJoseph P. Macker, Brian Adamson, David J. Claypool. 1-6 [doi]
- High definition video transcoding for transport over satellite (April 2012)Bruce Bennett, Gloria Witherspoon, Troy Barker. 1-5 [doi]
- A GNU-based packet radio for network management field testingConstantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Yitzchak M. Gottlieb, Angelo Sapello, Kaustubh Sinkar, Kimberly Moeltner. 1-6 [doi]
- Performance of Combatant Command satellite (COCOMSat) communications in contested environmentsKenneth Y. Jo, David M. Cascio. 1-6 [doi]
- Non-linear programming approach to simulation of the general adversarial agents problemJeremy Mange, Dionysios Kountanis. 1-5 [doi]
- Increasing Network Area Spectral Efficiency by combining multiple PHY techniquesGaelen Pereira, Babak Daneshrad, Bruce Fette. 1-6 [doi]
- A quick pull-in timing recovery technique for frequency hopped systemsLan K. Nguyen, Richard B. Wells. 1-6 [doi]
- Distributed estimation of a parametric field using sparse noisy dataNatalia A. Schmid, Marwan Alkhweldi, Matthew C. Valenti. 1-6 [doi]
- Time reversal multicarrier communications over long multipath fading channelsZhiqiang Liu, T. C. Yang. 1-6 [doi]
- A qualitative and quantitative method for predicting sentiment toward deployed U.S. forcesMark Rahmes, Kathy Wilder, J. Harlan Yates, Kevin L. Fox, Margaret M. Knepper, Jay Hackett. 1-6 [doi]
- Beyond line-of-sight information dissemination for Force ProtectionMatthew Gillen, Joseph P. Loyall, Kyle Usbeck, Kelly Hanlon, Andrew Scally, Joshua Sterling, Richard Newkirk, Ralph Kohler. 1-6 [doi]
- Securing wireless network coding against pollution attack at the physical layerSang Wu Kim. 1-6 [doi]
- An enterprise-wide approach to GIG internet protocol multicastBruce Bennett, Chris Peterson, Dan Gilbert, Emre Ertekin, John Herbert, John Kim. 1-6 [doi]
- Energy-efficient spectram access for ultra low power sensor networksSeokwon Lee, Sungsoo Park, Gosan Noh, Yosub Park, Daesik Hong. 1-6 [doi]
- Cooperative spectrum sensing based on generalized likelihood ratio test under impulsive noise circumstancesTaehun An, Dongjin Kim, Iickho Song, Moo Song Yeu, Hwang-Ki Min, SeungWon Lee, Wonju Lee. 1-6 [doi]
- Time-domain preamble-based SNR estimation for OFDM systems in doubly selective channelsFan Yang, Xi Zhang, Zhong-pei Zhang. 1-5 [doi]
- Next generation NATO satcom management and control servicesRamon Segura, Olivier Gauvry, Andre Terrasse, Alain Delay, Philippe Loussouarn, Arnaud Duvivier. 1-6 [doi]
- Analysis of Slotted Aloha with multipacket messages in clustered surveillance networksSoumya Sen, David J. Dorsey, Roch Guérin, Mung Chiang. 1-6 [doi]
- Spatial reuse in multi-hop linear wireless cooperative networksYao Xiao, Hao Feng, Leonard J. Cimini Jr.. 1-5 [doi]
- A low-complexity multicarrier scheme with LDPC coding for mobile-to-mobile environmentDamien Roque, Cyrille Siclet, Jean-Marc Brossier. 1-6 [doi]
- ML-based receivers for underwater networks using OFDM signals with strong nonlinear distortion effectsJoão Guerreiro, Rui Dinis, Paulo Montezuma. 1-7 [doi]
- Secure & agile wide-area virtual machine mobilitySaleem N. Bhatti, Randall J. Atkinson. 1-8 [doi]
- Identity-Based Internet Protocol NetworkingG. Nakamoto, Robert C. Durst, C. Growney, J. Andresen, J. Ma, Nirav Trivedi, R. Quang, David Pisano. 1-6 [doi]
- Novel energy efficient relaying schemes for wireless sensor networksChitradeep Majumdar, S. N. Merchant, Uday B. Desai. 1-6 [doi]
- Relay selection for AF SISO wireless relay networks under jamming environment with relay power constraintKanghee Lee, Hyuck M. Kwon, Wenhao Xiong, Hyunggi Kim, Sangku Lee. 1-5 [doi]
- On effective sampling techniques for host-based intrusion detection in MANETLinqiang Ge, Hui Liu, Difan Zhang, Wei Yu 0002, Rommie L. Hardy, Robert J. Reschly. 1-6 [doi]
- Fault tolerance requirements of tactical Information Management systemsJeffrey Cleveland, Joseph P. Loyall, James Hanna. 1-8 [doi]
- Ka and Ku operational considerations for military SATCOM applicationsDavid Brunnenmeyer, Scott Mills, Samir Patel, Cesar Suarez, Ling-Bing Kung. 1-7 [doi]
- Enhancing the classification accuracy of IP geolocationHellen Maziku, Sachin Shetty, Keesook Han, Tamara Rogers. 1-6 [doi]
- Lightweight One-Time Signature for multicast authenticationPan Deng, Liuqing Yang. 1-6 [doi]
- Low cost MEMS based INS for land-based military SATCOM OTMSaul Foresta, Rich Hoffmann, Louis Coryell, Robert Pinto. 1-6 [doi]
- MUSHI: Toward Multiple Level Security cloud with strong Hardware level IsolationNing Zhang, Ming Li 0003, Wenjing Lou, Y. Thomas Hou. 1-6 [doi]
- A forensic hypervisor for process tracking and exploit discoveryStephen Kuhn, Stephen Taylor. 1-5 [doi]
- A NNEC-compliant approach for a Future Mission NetworkAlberto Domingo, Hermann Wietgrefe. 1-8 [doi]
- Frequency-domain receiver design for fast varying channelsFábio Silva, Rui Dinis, Paulo Montezuma. 1-7 [doi]
- Distributed energy-based spectrum sensing with opportunistic cooperative diversity for Cognitive Radio Networks over non-identical fading channelsChihkai Chen, Kung Yao. 1-6 [doi]
- Modeling handheld usability for military-based devicesChristian Sonnenberg. 1-6 [doi]
- Supporting military communications with Named Data Networking: An emulation analysisBasil Etefia, Mario Gerla, Lixia Zhang 0001. 1-6 [doi]
- Throughput maximization in CSMA networks with collisionsSankrith Subramanian, Eduardo L. Pasiliao, John M. Shea, Marco M. Carvalho, Warren E. Dixon. 1-6 [doi]
- Development of an open-source GSM femtocell and integrated core infrastructureThomas Tsou, Thomas Cooper, Robert W. McGwier, T. Charles Clancy, Jeffrey H. Reed. 1-6 [doi]
- Direction finding of a compromised node in a spread-spectrum networkDon J. Torrieri. 1-6 [doi]
- An OFDM-based distributed transmission scheme for uncoordinated transmitters without carrier frequency and timing synchronizationXiaohua Li, Jared Feldman, Wednel Cadeau. 1-6 [doi]
- Iterative decoding in SFH communications with Reed-Solomon codes and channel estimationMadhabi Manandhar, Daniel L. Noneaker. 1-6 [doi]
- Openness in military systems part 2: Case studiesOlwen Worthington, Jessica Connah, Dale Chambers, Abigail Solomon, John McInnes. 1-6 [doi]
- Wred performance analysis and design for tactical satellite communicationJunghoon Lee, George F. Elmasry, Keith Whittaker, Steve Lescrinier. 1-6 [doi]
- Distributed dynamic slot assignment scheme for fast broadcast transmission in tactical ad hoc networksJong Kwan Lee, Kyu-Man Lee, Jaesung Lim 0001. 1-6 [doi]
- Signal processing advances for the MUTE sEMG-based silent speech recognition systemYunbin Deng, Glen Colby, James T. Heaton, Geoffrey S. Meltzner. 1-6 [doi]
- Anti-jamming defense mechanism in cognitive radios networksMarcelo Camilo, David Fernandes Cruz Moura, Juraci Ferreira Galdino, Ronaldo M. Salles. 1-6 [doi]
- An open source situational awareness display for administering heterogeneous networks on the tactical edgeIgor Pedan, Bow-Nan Cheng. 1-6 [doi]
- An efficient FSN assignment scheme for mitigating multi-hop delay in MIL-STD-188-220D networksHyunkeun Shin, Sangjae Park, Eun-kyung Kim, JaeSung Lim. 1-6 [doi]
- On the value of collaboration in anchorless robot self-localizationJavier Schloemann, R. Michael Buehrer. 1-6 [doi]
- Efficiency of dynamic content adaptation based on semantic description of web service call contextJoanna Sliwa, Bartosz Jasiul. 1-6 [doi]
- Limitations of Quorum-based Rendezvous and key establishment schemes against sophisticated jamming attacksYoung-Hyun Oh, David J. Thuente. 1-6 [doi]
- Optimal resource allocation in HARQ-based OFDMA wireless networksSebastien Marcille, Philippe Ciblat, Christophe J. Le Martret. 1-6 [doi]
- Evaluation of the expansion of Joint IP Modem to support DVB-RCS2 (April 2012)Bruce Bennett, Kensing Quock, Christopher Catlin, Wayne Adams, Sean E. A. Daisley, Joshua Friedman, Andrew Melchior. 1-6 [doi]
- Roadmap to wide band optical GEO relay networksR. Lange, Frank Heine, Matthias Motzigemba, Michael Lutzer, Rolf Meyer. 1-5 [doi]
- Effects of energy harvesting on quality-of-service in transient wireless sensor networksWilliam S. Hortos. 1-9 [doi]
- Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and SimulationSuzanne Hassell, Paul Beraud, Alen Cruz, Gangadhar Ganga, Steve Martin, Justin Toennies, Pablo Vazquez, Gary Wright, Daniel Gomez, Frank Pietryka, Niraj Srivastava, Travis Hester, David Hyde, Brian Mastropietro. 1-6 [doi]
- Iterative FDE receivers for UWB systems with strong interference levelsMário Marques da Silva, Rui Dinis, Paulo Montezuma. 1-6 [doi]
- Guard zones and the near-far problem in DS-CDMA ad hoc networksDon J. Torrieri, Matthew C. Valenti. 1-6 [doi]
- An overview of channel coding for underwater acoustic communicationsJoël Trubuil, André Goalic, Nicolas Beuzelin. 1-7 [doi]
- LAA: Link-layer anonymous access for tactical MANETsRonggong Song, Helen Tang. 1-7 [doi]
- Spectral efficiency of signal processing radios in interference limited environments: Array processing, MIMO, and MUDBruce F. McGuffin. 1-7 [doi]
- Web services: Design choices for space ground system integrationSomdatta Nath. 1-6 [doi]
- Design and implementation of a multicarrier spread spectrum communication systemDaryl Leon Wasden, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny. 1-7 [doi]
- Analysis and design of QAPM modulation using compressive sensing for low power communicationSo-Ra Kim, Heung-Gyoon Ryu. 1-5 [doi]
- Optimal jamming with codewordsHan-Ting Chiang, James S. Lehnert. 1-6 [doi]
- Measuring bias in the mixing time of social graphs due to graph samplingAbedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang. 1-6 [doi]
- Finding overlapped communities in online social networks with Nonnegative Matrix FactorizationNam P. Nguyen, My T. Thai. 1-6 [doi]
- A low complexity algorithm for linear precoder design with finite alphabet inputsMingxi Wang, Yahong Rosa Zheng, Chengshan Xiao, Weiliang Zeng. 1-5 [doi]
- Multi-cycle cyclostationary based spectrum sensing algorithm for OFDM signals with noise uncertainty in cognitive radio networksTadilo Endeshaw Bogale, Luc Vandendorpe. 1-6 [doi]
- The Xenon separation VMM: Secure virtualization infrastructure for military cloudsJohn P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang. 1-6 [doi]
- Cumulant-based channel estimation algorithm for modulation classification in frequency-selective fading channelsSaiDhiraj Amuru, Claudio R. C. M. da Silva. 1-6 [doi]
- Cyber Analysis System Toolkit: A high-fidelity, virtual cyber test-bed for network modeling and experimentationBala Chidambaram, Yueli Yang. 1-5 [doi]
- Performance analysis of message prioritization in delay tolerant networksFlorence McAtee, Sathya Narayanan, Geoffrey G. Xie. 1-6 [doi]
- Dynamic communication resource negotiationsEdward Chow, Farrokh Vatan, George Paloulian, Steve Frisbie, Zuzana Srostlik, Vasilios Kalomiris, Daniel Apgar. 1-6 [doi]
- A comparison of group-based data persistence techniques in MANETsAaron M. Rosenfeld, Robert N. Lass, Dustin S. Ingram, William C. Regli, Joseph P. Macker. 1-6 [doi]
- GPU accelerated Differential Power AnalysisHiren Patel, Rusty Baldwin. 1-5 [doi]
- Scheduling vs. random access in frequency hopped airborne networksDavid Ripplinger, Aradhana Narula-Tam, Katherine Szeto. 1-6 [doi]
- Pulse rotation modulations for spread spectrum communication systemsAlan J. Michaels. 1-6 [doi]
- ARQ-based key scheduling algorithm over correlated erasure channelsYahya S. Khiabani, Shuangqing Wei. 1-6 [doi]
- High-capacity Ka commercial communications satellite architectures for defense applicationsRajeev Gopal, Russell J. F. Fang. 1-6 [doi]
- PER prediction for convolutionally coded MIMO OFDM systems - An analytical approachChung-Yu Lou, Babak Daneshrad. 1-6 [doi]
- Comparison of TSVCIS voice at 8000 and 12000 bps VERSUS CVSD at 16000 bpsPatrick Shahan, David A. Heide, Aaron E. Cohen. 1-4 [doi]
- A policy-based approach to automated data reduction for intelligence, surveillance, and reconnaissance systemsPaul C. Hershey, Mu-Cheng Wang, Chris Graham, Steven A. Davidson, Michael Sica, Jason Dudash. 1-6 [doi]
- An efficient common substrings algorithm for on-the-fly behavior-based malware detection and analysisJaime C. Acosta, Humberto Mendoza, Brenda G. Medina. 1-6 [doi]
- Leveraging mobile grid computing for Interference Alignment and CancelationParul Pandey, Hariharasudhan Viswanathan, Dario Pompili. 1-6 [doi]
- Cross-layer design to maintain earthquake sensor network connectivity after loss of infrastructureGregory R. Steinbrecher. 1-6 [doi]
- A testbed for collaborative development of underwater communications and networkingJoão Alves, John R. Potter, Giovanni Zappa, Piero Guerrini, Robert Been. 1-8 [doi]
- Analysis of M-ary UWB FSK detected using two passband filters considering antenna and multipath effectsFernando RamÃrez-Mireles. 1-6 [doi]
- Use of dynamic flight paths to enhance support to priority subscribers on a communications UAVPhilip B. Charlesworth, Stuart M. Allen. 1-6 [doi]
- Online learning in decentralized multi-user spectrum access with synchronized explorationsCem Tekin, Mingyan Liu. 1-6 [doi]
- Lightweight key management in distributed multi-channel cognitive radio networksBehzad Kasiri, Jun Cai, Attahiru Sule Alfa. 1-6 [doi]
- One Force Tactical Communications System: Connecting the Tactical Edge at AEWE Spiral GLawrence Young, Mark Ishii. 1-4 [doi]
- Simulation of moderate time-scale Dynamic Spectrum Access with wide-area spectrum sensorsMatthew Rebholz, Bruce F. McGuffin. 1-6 [doi]
- Using covert timing channels for attack detection in MANETsJonathan J. Edwards, J. David Brown, Peter C. Mason. 1-7 [doi]
- Understanding the delay and loss tradeoffs in large wireless military networks using queuing analysis and MAC modelsAnthony J. McAuley, Latha A. Kant, Kaustubh Sinkar, Charles Graff, M. Patel. 1-6 [doi]
- System capacity and coverage of a cellular network with D2D mobile relaysKiran Vanganuru, Steven Ferrante, Gregory Sternberg. 1-6 [doi]
- Survivability prediction of ad hoc networks under attackJaime C. Acosta, Brenda G. Medina. 1-6 [doi]
- BRAVO: Potential field-based routing and network coding for efficient wireless MANETsVictor Firoiu, Haiyang Liu. 1-6 [doi]
- An experimental study on jamming tolerance of 3G/WCDMAJarno Pinola, Jarmo Prokkola, Esa Piri. 1-7 [doi]
- Criteria for multi-carrier X-band intermodulation products in the receive bandJames Offner, Thomas Saam. 1-6 [doi]
- Low complexity multi-layer optimization for multi-hop wireless networksYi Shi, Yalin E. Sagduyu, Jason H. Li. 1-6 [doi]
- NextVC2 - A next generation virtual world command and controlMarco M. Carvalho, Richard Ford. 1-6 [doi]
- Using hybrid simulation/emulation for experimental assessment of routing policy on mission outcomesGlenn Carl, Joshua Van Hook. 1-7 [doi]
- Supporting information management and information superiority via federation servicesRita Lenzi, Niranjan Suri, Andrzej Uszok, James Hanna, James Milligan. 1-6 [doi]
- On optimum relay deployment in a multi-hop linear network with cooperationHao Feng, Leonard J. Cimini Jr.. 1-6 [doi]
- Openness in military systems part 1: Analysis & applicationsJessica Connah, Abigail Solomon, John McInnes, Olwen Worthington, Dale Chambers. 1-6 [doi]
- Robust wireless channel based secret key extractionMichael Clark. 1-6 [doi]
- Capacity estimation and waveform assignment in military networksMiriam Tauil, Latha A. Kant, Anthony J. McAuley, Charles Graff, M. Patel. 1-6 [doi]
- C2 information quality: An enterprise systems perspectiveDavid S. Alberts, Marius S. Vassiliou, Jonathan R. Agre. 1-7 [doi]
- Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency OffsetBilal A. Ranjha, M. I. Sakib Chowdhury, Mohsen Kavehrad. 1-6 [doi]
- Iterative channel estimation for time-varying relay networks with optimal energy allocationYavuz Yapici. 1-6 [doi]
- High-efficiency ferrite meander antenna (HEMA) for LTE applicationsChandana K. K. Jayasooriya, Hyuck M. Kwon, Ryan Syslo, Yang-Ki Hong, Jaejin Lee, Gavin Abo. 1-6 [doi]
- Modulation detection of underwater acoustic communication signals through cyclostationary analysisZhiqiang Wu 0001, T. C. Yang, Zhiqiang Liu, Vasu Chakarvarthy. 1-6 [doi]
- Spectrum and energy efficiency in two-way multi-relay networks with selective relayingQing Chen, Mustafa Cenk Gursoy. 1-6 [doi]
- Evaluating communications system performance effects at a system of systems levelNadine E. Miner, Brian P. Van Leeuwen, Kimberly M. Welch, M. Donan Estill, Mark A. Smith, Hai D. Le, Craig R. Lawton. 1-6 [doi]
- Opportunistic dual timer relay selection in MIMO relay networksSungjoon Park, Wayne E. Stark. 1-6 [doi]
- Performance criteria affecting pointing error and the impact on total cost of ownershipRohit Murthy. 1-6 [doi]
- Inferring user relationship from hidden information in WLANsNingning Cheng, Prasant Mohapatra, Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli, Srikanth V. Krishnamurthy. 1-6 [doi]
- The trust engineering framework: Architecting native security to defend against the next generation threatsBassam S. Farroha, Deborah L. Farroha. 1-6 [doi]
- Properization of second-order cyclostationary random processes and its application to signal presence detectionJeong Ho Yeo, Joon Ho Cho. 1-6 [doi]
- Cooperative red teaming of a prototype surivable service-oriented systemPartha P. Pal, Michael Atighetchi, Andrew Gronosky, Joseph P. Loyall, Charles Payne, Asher Sinclair, Brandon Froberg, Robert Grant. 1-6 [doi]
- Mobile MIMO capacity in network interference: Informed and Uninformed TransmittersBruce F. McGuffin, Daniel W. Bliss. 1-6 [doi]
- Scrambled Code Multiple Access waveform for micro satellite terminalsLin-Nan Lee, Mustafa Eroz, Liping Chen, Rajeev Gopal. 1-6 [doi]
- Extending Service-Oriented Architectures to the tactical edgeGiacomo Benincasa, Enrico Casini, Rita Lenzi, Alessandro Morelli, Erika Benvegnu, Niranjan Suri, K. Boner, Scott Watson. 1-7 [doi]
- NMT X/Ka tri-band antennasYueh-Chi Chang, Brandon Mui, John Hanlin, Aravind Movva. 1-4 [doi]
- Laboratory evaluation of military radios and network architecturesScott Newman, Jeffrey Schindler, Jiral Shah, Sandra Tinta. 1-8 [doi]
- SISTO: A proposal for serverless information services for tactical operationsDavid Shur, Sunil Samtani, Mariusz A. Fecko, Kyriakos Manousakis, Vikram Kaul, William C. Regli, Joseph B. Kopena. 1-6 [doi]
- Addressing IQ mismatch in Spatial Interference Suppression systemsGaelen Pereira, Babak Daneshrad. 1-7 [doi]
- Sources of misinformation in Online Social Networks: Who to suspect?Dung T. Nguyen, Nam P. Nguyen, My T. Thai. 1-6 [doi]
- On accurately predicting mote deathsSankarkumar Thandapani, Aravind Kailas. 1-6 [doi]
- Guest-transparent instruction authentication for self-patching kernelsDannie M. Stanley, Zhui Deng, Dongyan Xu, Rick Porter, Shane Snyder. 1-6 [doi]
- Supervised learning in the wild: Text classification for critical technologiesArun S. Maiya, Francisco Loaiza-Lemos, Robert M. Rolfe. 1-6 [doi]
- Cross-layer throughput optimization for delay and QoS constrained applicationsEyidayo Adebola, Oluwatobi Olabiyi, Annamalai Annamalai. 1-6 [doi]
- Identification of OFDM signals under multipath fading channelsAli Gorcin, Hüseyin Arslan. 1-7 [doi]
- Opportunistic transport for disrupted airborne networksJustin P. Rohrer, Kamakshi Sirisha Pathapati, Truc Anh N. Nguyen, James P. G. Sterbenz. 1-9 [doi]
- Determining RF angle of arrival using COTS antenna arrays: A field evaluationHsieh-Chung Chen, Tsung-Han Lin, H. T. Kung, Chit-Kwan Lin, Youngjune Gwon. 1-6 [doi]
- Comparing radio-to-router interface implementations on experimental CoTs and open source routersBow-Nan Cheng, Randy Charland, Paul Christensen, Andrea Coyle, Igor Pedan, Leonid Veytser, James Wheeler. 1-6 [doi]
- Minimum Connected Dominating Set in realistic tactical radio network conditionsLi Li 0009, Humphrey Rutagemwa, Thomas Kunz. 1-6 [doi]
- Detection of a non-cooperative transmitter in Rayleigh fading with binary observationsArian Shoari, Alireza Seyedi. 1-5 [doi]
- Admission control and flow termination in mobile ad-hoc networks with Pre-congestion NotificationBjørnar Libæk, Mariann Hauge, Lars Landmark, Øivind Kure. 1-8 [doi]
- Adaptive-rate channel coding for packet radio systems with higher layer fountain codingJason D. Ellis, Michael B. Pursley. 1-6 [doi]
- Cooperative robust localization against malicious anchors based on semi-definite programmingDexin Wang, Liuqing Yang. 1-6 [doi]
- High throughput Ku-band satellites for aeronautical applicationsChris McLain, Sunil Panthi, Mark Sturza, James Hetrick. 1-6 [doi]
- Clustering of Snort alerts to identify patterns and reduce analyst workloadRichard E. Harang, Peter Guarino. 1-6 [doi]
- Performance evaluation of wireless network coding in TDMA networksAik-Tuan Lee, Mario Gerla. 1-6 [doi]
- SCA4 - An evolved frameworkChalena M. Jimenez, Kevin W. Richardson, Donald R. Stephens. 1-6 [doi]
- Congestion control using RED and TCP window adjustmentRob Torres, John Border, George Choquette, Jun Xu, Je-Hong Jong. 1-6 [doi]
- Detection of global, metamorphic malware variants using control and data flow analysisHira Agrawal, Lisa Bahler, Josephine Micallef, Shane Snyder, Alexandr Virodov. 1-6 [doi]
- Determining system parameters for optimal performance of hybrid DS/FFH spread-spectrumXiao Ma, Mohammed M. Olama, P. Teja Kuruganti, Stephen F. Smith, Seddik M. Djouadi. 1-6 [doi]
- Loss-Tolerant TCP (LT-TCP): Implementation and experimental evaluationBishwaroop Ganguly, Buster O. Holzbauer, Koushik Kar, Kevin Battle. 1-6 [doi]
- Output compression for IC fault detection using compressive sensingStephen J. Tarsa, H. T. Kung. 1-6 [doi]
- TITAN: Integrated network management in tactical mobile ad hoc networksConstantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Abhrajit Ghosh, Yitzchak M. Gottlieb, Michael Kaplan, K. Kurachik, Gary Levin, Y. Lin, Alexander Poylisher, Angelo Sapello, Florin Sultan, Akshay Vashist, Michelle Wolberg, Kimberly Moeltner. 1-6 [doi]
- BCS: Compressive sensing for binary sparse signalsUkash Nakarmi, Nazanin Rahnavard. 1-5 [doi]
- Performance analysis of a 2D double hard-limited OCDMA system over FSO link under strong turbulence for defense applicationsVitor G. Andrezo Carneiro, Gilberto Kirk Rodrigues, Maria Thereza M. R. Giraldi. 1-6 [doi]
- Cross-layer modeling and analysis of multihop tactical networking in convoy topologyHumphrey Rutagemwa, Li Li 0009, Philip J. Vigneron. 1-6 [doi]
- Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbedVincent Urias, Brian P. Van Leeuwen, Bryan Richardson. 1-8 [doi]
- Optimal data scheduling of mobile clients serviced using beamforming antennasDaniel T. Bennett, Timothy X. Brown. 1-10 [doi]
- JamDetect: A system to detect RAA aware jamming attacks in IEEE802.11 networksDefeng Xu, Rajive L. Bagrodia. 1-6 [doi]
- Distributed aerial Reconnaissance Ad-hoc networking protocolAshwin J. Pereira, Paul A. Pharris, Justin N. Oursler, Adrian P. Lauf. 1-6 [doi]
- Adaptive virtual slot for enhancing QoS of voice communication in MIL-STD-188-220Jae Joon Lee, Dongwook Kim, JaeSung Lim. 1-6 [doi]
- Subcarrier based threshold performance enhancement in Constant Envelope OFDMAhsen U. Ahmed, Steve C. Thompson, David W. Chi, James R. Zeidler. 1-6 [doi]
- A solution for Co-Service of real-time and non-realtime traffic in cellular cognitive radio networksXiang Mao, Yonggang Liu, Janise McNair. 1-6 [doi]
- Detecting communication anomalies in tactical networks via graph learningAkshay Vashist, Ritu Chadha, Michael Kaplan, Kimberly Moeltner. 1-6 [doi]
- Multiple layered method of terminal slot contention resolution for the Integrated Waveform (DAMA UHF SATCOM)Richard Booton. 1-6 [doi]
- A bipartite matching based user grouping method for grouped OFDM-IDMA systemsXiaotian Zhou, Liuqing Yang, Dongfeng Yuan. 1-6 [doi]
- The sub-channel allocation algorithm in femtocell networks based on Ant Colony OptimizationDeli Liu, Haijun Zhang, Wei Zheng, Xiangming Wen. 1-6 [doi]
- Enabling secure and reliable policy-based routing in MANETsMazda Salmanian, Ming Li 0003. 1-7 [doi]
- Cooperative communication with joint optimization of cluster size and resource allocation in wireless sensor networksKyung-Seop Shin, Woo-Chan Kim, Sung-Jin Park 0001, Dong-Ho Cho. 1-5 [doi]
- An RF-DNA verification process for ZigBee networksClay K. Dubendorfer, Benjamin W. P. Ramsey, Michael A. Temple. 1-6 [doi]
- On the use of distributed relays to increase base station anonymity in Wireless Sensor NetworksJon R. Ward, Mohamed F. Younis. 1-6 [doi]
- A combination of quickest detection with oracle approximating shrinkage estimation and its application to spectrum sensing in cognitive radioFeng Lin, Zhen Hu, Robert C. Qiu, Michael C. Wicks. 1-6 [doi]
- Branch and Bound with M algorithm for near optimal MIMO detection with higher order QAM constellationAli Elghariani, Michael D. Zoltowski. 1-5 [doi]
- Partitioned cyclic code shift keying for JTIDSHong-Jun Noh, Jae-Sung Lim 0001. 1-6 [doi]
- Resource allocation for cooperative relay-assisted OFDMA networks with imperfect CSIZheng Chang, Tapani Ristaniemi. 1-6 [doi]
- Bounding the ergodic capacity of asymmetric 2×2 dual-polarized channelsFarzad Talebi, Thomas G. Pratt. 1-6 [doi]
- Cooperative jammer design in cellular network with internal eavesdroppersSeongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, Bontae Koo. 1-5 [doi]
- Quickest change point identification across a sensor arrayLifeng Lai. 1-5 [doi]
- Robust receiver algorithms to mitigate partial-band and partial-time interference in ldpc-coded OFDM systemsLiangbin Li, Ramesh Annavajjala, Toshiaki Koike-Akino, Philip V. Orlik. 1-6 [doi]
- The normalized Bushmitch-Fikus-Hamrick (NBFH) metricDennis Bushmitch, John Fikus, Michael Hamrick, Anthony Khouzam, David Morris. 1-6 [doi]
- Novel Quadrifilar Helix Antenna combining GNSS, Iridium, and a UHF communications monopoleP. G. Elliot, E. N. Rosario, R. J. Davis. 1-6 [doi]
- Location Aware Optimized Link State Routing protocolFabio Pozzo, Lucio Marcenaro, Carlo S. Regazzoni, Vincenzo Gesmundo. 1-6 [doi]
- Active buffer management algorithm for silence suppressed voice applicationsSung-Hyung Lee, Hyun-Jin Lee, Jae-Hyun Kim, Mijeong Hoh, Sang-Heon Shin, Taewan Kim, Byeong-hee Roh. 1-4 [doi]
- Quasi-cyclic low-density parity-check stabilizer codesFeng Shi, Zhiyuan Yan. 1-6 [doi]
- Government Reference Architecture dataplane gatewayEric Redding, Tom Rittenbach, Hiroshi Satake, John Kisor, Dhaval Shah. 1-6 [doi]
- A multicast routing technique for tactical networksDavid Kidston, Minghui Shi. 1-6 [doi]
- IP networking over the AEHF MILSATCOM systemKatie Schroth, Nicholas V. Burkhardt, Ting-Shuo Che, David Pisano. 1-6 [doi]
- CD-PHY: Physical layer security in wireless networks through constellation diversityMohammad Iftekhar Husain, Suyash Mahant, Ramalingam Sridhar. 1-9 [doi]
- A high-assurance, virtual guard architectureMark R. Heckman, Roger R. Schell, Edwards E. Reed. 1-9 [doi]
- Template matching for signal identification in cognitive radio systemsAli Gorcin, Hüseyin Arslan. 1-6 [doi]
- The effect of zealotry in the naming game model of opinion dynamicsGunjan Verma, Ananthram Swami, Kevin S. Chan. 1-6 [doi]
- Optimization of a finite frequency-hopping ad hoc network in Nakagami fadingMatthew C. Valenti, Don J. Torrieri, Salvatore Talarico. 1-6 [doi]
- Region-of-interest video coding for enabling surgical telementoring in low-bandwidth scenariosSourabh Khire, Scott Robertson, Nikil Jayant, Elena A. Wood, Max E. Stachura, Tamer Goksel. 1-6 [doi]
- Performance management in cognitive radio ad hoc networks using congestion based metricPaul Potier, Lijun Qian, Harold Zheng, Sherry Wang. 1-6 [doi]
- On the effects of transmit power control on the performance of wireless networksSanghoon Kim, Wayne E. Stark. 1-6 [doi]
- TimeSync: Virtual time for scalable, high-fidelity hybrid network emulationFlorin Sultan, Alexander Poylisher, Constantin Serban, John Lee, Ritu Chadha, C. Jason Chiang. 1-6 [doi]
- Enabling fractionated spacecraft communications using F6WICSMichael A. Koets, Mark Tapley, Buddy Walls, Jennifer L. Alvarez, Wojciech Toczynski, B. David Moore, Jeremy Pruitt. 1-5 [doi]
- Policy-based spectrum management architectureJeffrey Boksiner, Yuriy Posherstnik, Howard McDonald, Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang, Apurva N. Mody, Matthew Sherman. 1-6 [doi]
- Tactical troposcatter applications in challenging climate zonesLuis Bastos, Hermann Wietgrefe. 1-6 [doi]
- The Cramér-Rao bound for data-aided synchronization of SOQPSKEhsan Hosseini, Erik Perrins. 1-6 [doi]
- Performance analysis of spectrum monitoring for cognitive radiosMahdi Orooji, Erfan Soltanmohammadi, Mort Naraghi-Pour. 1-6 [doi]
- A pedestrian tracking system using group mobility informationSungnam Lee, Hyojeong Shin, Hojung Cha. 1-6 [doi]
- VCMA: Efficient channel access in wireless mesh networks using virtual coordinatesAshok N. Masilamani, J. J. Garcia-Luna-Aceves. 1-6 [doi]
- Elastic multicast for tactical communicationsClaudiu Danilov, Thomas R. Henderson, Orlie Brewer, Jae H. Kim, Joseph P. Macker, Brian Adamson. 1-6 [doi]
- The false positive congestion problem and probabilistic spectrum sensingAndrew Robertson, Joseph Molnar. 1-6 [doi]
- An adaptive SoS framework for integrating dynamic cyber defenseBassam S. Farroha, Deborah L. Farroha. 1-6 [doi]
- Practical implementation of hybrid DLT codes for cooperative relay communicationsXilin Cheng, Rui Cao, Liuqing Yang. 1-6 [doi]
- Best-effort Data Leakage Prevention in inter-organizational tactical MANETsJohan Sigholm, Massimiliano Raciti. 1-7 [doi]
- Network coding over a MANET proactive link state routing protocol and TDMA schedulingSoon-Young Oh, Bao-Hong Shen, Mario Gerla. 1-6 [doi]
- Cooperative spatial scheduling in distributed MIMO MAC with interference/concurrency awarenessPengkai Zhao, You Lu, Babak Daneshrad, Mario Gerla. 1-6 [doi]
- Prioritized data synchronization for disruption tolerant networksJiaxi Jin, Wei Si, David Starobinski, Ari Trachtenberg. 1-8 [doi]
- Synchronization performance using Scale Time Offset Robust ModulationJohn J. Windish. 1-6 [doi]
- Focusing a radio signal and simultaneously nulling it at another location using time-reversal: Experimental resultsRatish J. Punnoose, David Counsil, Derek Young. 1-6 [doi]
- Modeling mobile network connectivity in the presence of jammingAndrej Bevec, Peter Bothner, Philip Chan, Ikechi Nigel Chike, Michael Masciulli, Michael Markowski, G. Welles Still. 1-4 [doi]
- Quickest detection of GPS spoofing attackZhenghao Zhang, Matthew Trinkle, Lijun Qian, Husheng Li. 1-6 [doi]
- Sangam - efficient cellular-WiFi group framework for file sharing serviceAnjali Sridhar, Klara Nahrstedt, Long Vu. 1-6 [doi]
- Planning & design of routing architectures for multi-tier military networksJ. Lee, Latha A. Kant, Anthony J. McAuley, Kaustubh Sinkar, Charles Graff, Mitesh Patel. 1-7 [doi]
- Hybrid solving technique for vehicle planning with communication constraintsFrançois Lucas, Christophe Guettier. 1-6 [doi]
- Adjacent satellite interference from a network Of MF-TDMA satellite communications on-the-move terminalsVijitha Weerackody, Enrique Cuevas. 1-6 [doi]
- A phased approach to policy-based Spectrum operationsDarcy Swain, David Fritz, Howard McDonald. 1-6 [doi]
- Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETsStephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin. 1-6 [doi]
- Jamming attacks against OFDM timing synchronization and signal acquisitionMatthew J. La Pan, T. Charles Clancy, Robert W. McGwier. 1-7 [doi]
- Adaptive routing for tactical communicationsClaudiu Danilov, Thomas R. Henderson, Thomas Goff, Orlie Brewer, Jae H. Kim, Joseph P. Macker, Brian Adamson. 1-7 [doi]
- A case for trusted sensors: Encryptors with Deep Packet Inspection capabilitiesDavid King, Gerardo Orlando, James Kohler. 1-6 [doi]
- Quantifying the relative merits of genetic and swarm algorithms for network optimization in cognitive radio networksJerome Sonnenberg, David B. Chester, James Schroeder, Keith Olds. 1-8 [doi]
- A geocast-based algorithm for a field common operating pictureRobert J. Hall. 1-6 [doi]
- Chemical plume detection in hyperspectral imagery via joint sparse representationMinh Dao, Dzung T. Nguyen, Trac D. Tran, Sang Peter Chin. 1-5 [doi]
- Modeling of radiowave propagation in tunnelsJeffrey Boksiner, Chrysanthou Chrysanthos, Jonathan Lee, Mashuk Billah, Timothy Bocskor, David Barton, James Breakall. 1-6 [doi]
- Laboratory-based end-to-end network System of Systems Integration, design and risk reduction: Critical activity for System of Systems Integration Directorate and the ArmyMichael Badger, Dennis Bushmitch, Vivek Agnish, Richard S. Cozby, John Fikus, Frank Halloran, Kirk Chang, Paul McCabe, Shobha Erramilli. 1-6 [doi]
- Some remarks on the Dirac delta function approximation for ASER analysis of digital modulations over fading channelsEyidayo Adebola, Oluwatobi Olabiyi, Annamalai Annamalai. 1-6 [doi]
- Towards minimizing delay in MHWN based on activity estimationB. Q. Kan. 1-6 [doi]
- Bio-inspired and Voronoi-based algorithms for self-positioning autonomous mobile nodesJianmin Zou, Janusz Kusyk, M. Ümit Uyar, Stephen Gundry, Ceni Safak Sahin. 1-6 [doi]
- Experimental demonstration of cognitive radar for target localization under strong interferenceXia Li, Zhen Hu, Robert C. Qiu, Michael C. Wicks. 1-6 [doi]
- Security and provenance in M3GS for cross-domain information sharingJingwei Huang, David M. Nicol. 1-6 [doi]
- Estimation 2D DOA of coherent signals using a new antenna array configurationNizar Tayem. 1-5 [doi]
- The user capacity of barrage relay networksThomas R. Halford, Thomas A. Courtade, Kurt A. Turck. 1-6 [doi]
- A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communicationsDu Zheng, Helen Tang, F. Richard Yu. 1-6 [doi]
- Type based abstraction for QoI aware applicationsTrevor Cook, Lisa Scott. 1-6 [doi]
- Chaining for securing data provenance in distributed information networksXinlei (Oscar) Wang, Kai Zeng, Kannan Govindan, Prasant Mohapatra. 1-6 [doi]
- IPsec tunnels vs. identity-only obfuscation techniques for moving target networksRussell A. Fink, Emre Gunduzhan, Bruce P. Benjamin, Derya Cansever, Mars Gralia, Peter Dinsmore. 1-6 [doi]
- Particle filter based average consensus target tracking with preservation of network connectivityZhen Kan, Eduardo L. Pasiliao, J. Willard Curtis, Warren E. Dixon. 1-6 [doi]
- Robust MPR-based flooding in mobile ad-hoc networksJan Nilsson, Ulf Sterner. 1-6 [doi]
- Link state routing in regions of interestRumi Ghosh, J. J. Garcia-Luna-Aceves. 1-6 [doi]
- TCP challenges in hybrid military satellite networks; measurements and comparisonAndreas R. Urke, Lars Erling Bråten, Knut Øvsthus. 1-6 [doi]
- Spectrum monitoring for cognitive radios in Rayleigh fading channelErfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour. 1-6 [doi]
- Experimental validation of stochastic wireless Urban channel model: Estimation and predictionP. Teja Kuruganti, Xiao Ma, Seddik M. Djouadi. 1-5 [doi]
- An LPI design for secure OFDM systemsMarwen Bouanen, François Gagnon, Georges Kaddoum, Denis Couillard, Claude Thibeault. 1-6 [doi]
- MPTA: Modified polymer textile antennas for green symbiotic cloud communicationsH. D. Mustafa, S. H. Karamchandani, S. Shubham, S. N. Merchant, Uday B. Desai. 1-6 [doi]
- Dynamic communities in evolving network graphsJoseph P. Macker, David J. Claypool. 1-6 [doi]
- Tiny Bubbles: A fault-tolerant distributed overlay for networks with block-churnJasen Kintner, Zach Mildon, Sunil Kim. 1-6 [doi]
- Optimal PSD limit accommodation in heterogeneous SHF SATCOM networksWilliam Harbison 0001, Rohit Gupta. 1-6 [doi]
- An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networksEmeka E. Egbogah, Abraham O. Fapojuwo, Liqi Shi. 1-7 [doi]
- High-rate ultrasonic communication through metallic barriers using MIMO-OFDM techniquesJonathan D. Ashdown, Gary J. Saulnier, Tristan J. Lawry, Kyle R. Wilt, Henry A. Scarton. 1-6 [doi]
- Differential Power Analysis using wavelet decompositionHiren Patel, Rusty Baldwin. 1-5 [doi]
- Polite: A policy framework for building managed mobile appsUdayan Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor. 1-6 [doi]
- The impact of enclave network devices to the tactical inter-service architectureMichael Lundberg, Xinyu Wang, Emre Ertekin, Darnell Rhodes. 1-6 [doi]
- Automated Performance Assessment Framework innovation (APAFI) projectMichael Badger, Dennis Bushmitch, Richard S. Cozby, Jon Ellis, John H. Fikus, Rachel Marrotta, Christopher Morey, Kurt Rausch, Bill Roberts, Edward Slatt. 1-6 [doi]
- An embedded radio software emulation platform using OPNET and VxWorks to develop distributed algorithms for military ad-hoc networksTolga Numanoglu, Baris Karadeniz, Furuzan Atay Onat, Ahmet Ertugrul Kolagasioglu. 1-6 [doi]
- Event-based transmission line matrix method for simulating site-specific multipath propagation characteristicsP. Teja Kuruganti, James J. Nutaro, Seddik M. Djouadi. 1-6 [doi]
- How to evaluate SOTM antennas, modems, and architecturesLino Gonzalez, Mike Tracey, Wendy Lui, Richard E. Greel, Vasile Aghinii. 1-6 [doi]
- Collaborative applications at the Tactical Edge through resilient group dissemination in DTNJacob Green, John Schultz. 1-6 [doi]
- Adaptation of RSVP-AGG protocol to tactical networks - A tactical edge open architecture conceptMichael Vitt, George F. Elmasry, Manoj Jain. 1-5 [doi]
- Front End Mission ModelingDavid DuBois, Howard Gans, Terence Lei, Rolando Ventura. 1-6 [doi]
- Content routing in the Vehicle CloudYu-Ting Yu, Thomas Punihaole, Mario Gerla, M. Y. Sanadidi. 1-6 [doi]
- Adaptive algorithms for detecting critical links and nodes in dynamic networksYilin Shen, Thang N. Dinh, My T. Thai. 1-6 [doi]
- The Glowworm hash: Increased speed and security for BBC unkeyed jam resistanceLeemon C. Baird III, Martin C. Carlisle, William L. Bahn, Eric Smith. 1-6 [doi]
- Detection of Code Spread OFDM based on 0-1 Integer Quadratic ProgrammingAli Elghariani, Michael D. Zoltowski. 1-6 [doi]
- Improved modulation classification using a factor-graph-based iterative receiverDaniel J. Jakubisin, R. Michael Buehrer. 1-6 [doi]
- Validating a custom IPv6 security application using OPNET modelerBrittany Clore, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront. 1-6 [doi]
- Certification codes for maliciousness detection in Physical-layer Network CodingEric Graves, Ben Landers, David Greene, Tan F. Wong. 1-6 [doi]
- TDMA scheduling and channel assignment for cognitive tactical networksOssama Younis, David Shallcross, Latha A. Kant, Kenneth Young, Charles Graff, Mitesh Patel. 1-6 [doi]
- A comparison of MANET routing protocols on airborne tactical networksBow-Nan Cheng, Scott Moore. 1-6 [doi]
- Games applied to jam resistant DSA radiosG. Rucker, Robert G. Cole, Derya Cansever, A. Mishra. 1-6 [doi]
- Joint quantization strategy for uplink cooperative cellular interference alignment with limited feedbackDi Fang, Sixi Su, Tiejun Lv, Hui Gao, Wei Long. 1-5 [doi]
- Signal recovery for CPM in frequency flat fast fading channelsColin Brown, Philip J. Vigneron. 1-6 [doi]
- Efficient receivers for SC-FDE with offset modulationsMiguel Luzio, Rui Dinis, Paulo Montezuma, Vitor Astucia, Marko Beko. 1-6 [doi]
- Architecting dynamic cyber defense for a secure multi-tenant cloud services environmentBassam S. Farroha, Deborah L. Farroha. 1-6 [doi]
- Supporting COTS applications in Tactical Edge NetworksAlessandro Morelli, Ralph Kohler, Cesare Stefanelli, Niranjan Suri, Mauro Tortonesi. 1-7 [doi]
- Energy efficient stochastic power scheduling scheme for wireless cellular networksPing Wang, Xi Zhang, Mei Song, Xue Chen. 1-6 [doi]
- A comparison of open architecture standards for the development of complex military systems: GRA, FACE, SCA NeXT (4.0)Mark Henry, George Vachula, Gregary B. Prince, John Pehowich. 1-9 [doi]
- Distributed detection in wireless sensor networks in the presence of misbehaving nodesErfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour. 1-6 [doi]
- Position, navigation, and timing in the Common Operating Environment: Prototyping the PNT User equipment Modernization ArchitectureThomas R. Mason, Carlyn H. Weaver, Marc A. Camacho. 1-6 [doi]
- GPS spoofing attack on time synchronization in wireless networks and detection scheme designQi Zeng, Husheng Li, Lijun Qian. 1-5 [doi]
- Integrating multiple radio-to-router interfaces to open source dynamic routersRandy Charland, Leonid Veytser, Bow-Nan Cheng. 1-6 [doi]
- Software updates as a security metric: Passive identification of update trends and effect on machine infectionMoazzam Khan, Zehui Bi, John A. Copeland. 1-6 [doi]
- Building an operation support system for a fast reconfigurable network experimentation testbedAlexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang. 1-6 [doi]