Abstract is missing.
- Two-Way Full-Duplex Amplify-and-Forward RelayingXilin Cheng, Bo Yu, Xiang Cheng, Liuqing Yang. 1-6 [doi]
- Spectral Efficiency of Centralized and Decentralized Cooperative Networks with Relay SelectionHao Feng, Yao Xiao, Leonard J. Cimini Jr.. 7-12 [doi]
- Relay Location Optimization for Full-Duplex Decode-and-Forward RelayingBo Yu, Liuqing Yang, Xiang Cheng, Rui Cao. 13-18 [doi]
- On Sequence Design for Full Connectivity Relay NetworkJie Yang 0021, Youvaraj T. Sagar, Kanghee Lee, Hyuck M. Kwon. 19-23 [doi]
- Soft-Output Detection Based on Multi-hop-return Sphere Searching for Distributed Space-Frequency Coded Cooperative Communication SystemXiaofan Yu, Anbing Hu, Jinzhang Ji, Lulu Yang, Bo Xin, Ying Dong. 24-28 [doi]
- Hierarchical Blind Modulation Classification for Underwater Acoustic Communication Signal via Cyclostationary and Maximal Likelihood AnalysisJoshua Sanderson, Xue Li, Zhiqiang Liu, Zhiqiang Wu 0001. 29-34 [doi]
- Modulation Classification in MIMO SystemsEmmanuel Kanterakis, Wei Su. 35-39 [doi]
- Distributed Automatic Modulation Classification Based on Cyclic Feature via Compressive SensingLei Zhou, Hong Man. 40-45 [doi]
- Approximate Centroid Estimation with Constellation Grid Segmentation for Blind M-QAM ClassificationZhechen Zhu, Asoke Kumar Nandi, Muhammad Waqar Aslam. 46-51 [doi]
- Classification of M-ary QAM Based on Instantaneous Power Moment with Adjustable MedianRyosuke Miyauchi, Hideki Ochiai. 52-57 [doi]
- A Map-Based Method for Geolocation in Multipath EnvironmentsJared Baker, Thomas G. Pratt. 58-63 [doi]
- Localization ROC Analysis for Multiband Spectrum Sensing in Cognitive RadiosSteven D. Collins, Birsen Sirkeci Mergen. 64-67 [doi]
- Received Signal Strength-Based Emitter Geolocation Using an Iterative Maximum Likelihood ApproachSichun Wang, Brad R. Jackson, Sreeraman Rajan, François Patenaude. 68-72 [doi]
- Non-data-aided Joint Estimation of Time and Frequency Offset in OFDM Systems Using Channel Order Based RegressionRohan Ramlall. 73-77 [doi]
- Joint Channel and Symbol Timing Estimation and Data DetectionErfan Soltanmohammadi, Mort Naraghi-Pour. 78-83 [doi]
- Anti-jam Communications Using Frequency-Hopped OFDM and LDPC with Erasure Decoding ("Minotaur")Laurence Mailaender. 84-88 [doi]
- Efficient OFDM Denial in the Absence of Channel InformationChristopher Mueller-Smith, Wade Trappe. 89-94 [doi]
- Joint Sidelobe Suppression and PAPR Reduction in OFDM Using Partial Transmit SequencesErtugrul Güvenkaya, Anas Tom, Hüseyin Arslan. 95-100 [doi]
- Improved Doppler Mitigation Techniques for LTE Uplink TransmissionLiang Zhang, Zhihong Hong, Richard Boudreau, Susan Watson, Brad Jackson. 101-106 [doi]
- Improved Out-of-Band Emissions Reduction for OFDM SystemsAhmed Selim, Linda Doyle. 107-111 [doi]
- Routing Loops in Mobile Heterogeneous Ad Hoc NetworksLars Landmark, Mariann Hauge, Øivind Kure. 112-118 [doi]
- An Overview of Opportunistic Routing in Mobile Ad Hoc NetworksZhensheng Zhang, Rajesh Krishnan. 119-124 [doi]
- Modeling Anonymous MANET Communications Using Super-NodesBing Li, Dijiang Huang. 125-130 [doi]
- Automatic Selection of Number of Clusters in Networks Using Relative Eigenvalue QualityJohn M. Shea, Joseph P. Macker. 131-136 [doi]
- Mobile Ad Hoc Networking (MANET) Formulation Considered HarmfulRajesh Krishnan, Zhensheng Zhang. 137-142 [doi]
- Scaling Up a Geographic Addressing SystemRobert J. Hall, Josh Auzins, John Chapin, Barry Fell. 143-149 [doi]
- A Geocast Based File Transfer ProtocolRobert J. Hall. 150-156 [doi]
- Directional TDMA Networking without External Time and Position ReferencesKeith Olds. 157-162 [doi]
- Spatial Sharing Algorithm in mmWave WPANs with Interference Sense Beamforming MechanismRan Cai, Qian Chen, Xiaoming Peng, Danpu Liu. 163-168 [doi]
- Target Tracking in NLOS Environments Using Semidefinite ProgrammingReza Monir Vaghefi, R. Michael Buehrer. 169-174 [doi]
- Simple Relay Enabled MAC (SRMAC) Protocol for Cooperative CommunicationSanghoon Kim, Wayne E. Stark. 175-180 [doi]
- Progressive Decentralized TDMA Based MAC: Joint Optimization of Slot Allocation and Frame LengthsMuhammad Hafeez Chaudhary, Bart Scheers. 181-187 [doi]
- Investigation of MAC for a Hierarchical and Heterogeneous Multichannel Ad Hoc NetworkCrystal A. Jackson, Harlan B. Russell, Brian J. Wolf, Jim Martin. 188-193 [doi]
- An Empty-Queue Aware Cooperative Relay MAC Protocol with Vacation Queue AnalysisYulei Zhao, Bing Du, Ning Ge. 194-199 [doi]
- Cooperative Multi-tree Sleep Scheduling for Surveillance in Wireless Sensor NetworksMarc Barceló Lladó, Alejandro Correa Vila, José López Vicario, Antoni Morell Perez. 200-205 [doi]
- Content-Based Protection and Release Architecture for Future NATO NetworksKonrad S. Wrona, Sander Oudkerk. 206-213 [doi]
- Lightweight Reconfigurable Encryption Architecture for Moving Target DefenseMohammad Iftekhar Husain, Kerry Courtright, Ramalingam Sridhar. 214-219 [doi]
- Cross-Layer Security Management Framework for Mobile Tactical NetworksRonggong Song, Helen Tang, Peter C. Mason, Zhexiong Wei. 220-225 [doi]
- Secure Network Attribution and Prioritization: A Coordinated Architecture for Critical InfrastructureGregory D. Troxel, Laura Poplawski Ma. 226-230 [doi]
- Aligning the Tactical GIG Server Hierarchy with HAIPE Dynamic Discovery ProtocolGeorge F. Elmasry, Jason Fournier, Gus Amouris, Matthew Weltman. 231-236 [doi]
- How to Prove Yourself to Multiple Parties: Energy-Efficient Multi-group AuthenticationThomas R. Halford. 237-242 [doi]
- Secure Many-to-Some CommunicationsThomas R. Halford. 243-247 [doi]
- Trusted Group Key Management for Real-Time Critical Infrastructure ProtectionJonathan Jenkins, Sean Easton, David Guidry, Mike Burmester, Xiuwen Liu, Xin Yuan, Joshua Lawrence, Sereyvathana Ty. 248-253 [doi]
- Secret Key Generation Exploiting Ultra-wideband Indoor Wireless Channel CharacteristicsJingjing Huang, Ting Jiang, Shijun Zhai. 254-259 [doi]
- CEALICIAN: Compact Encryption and Line-Integrated Circuitry for Information Assurance in NetworkingJose Romero-Mariona, Mihail Schoolov, Tom Nguyen, Tu-Anh Ton. 260-265 [doi]
- Advantages of Mobile Broadband Communications Services for Military ApplicationsDon Wilcoxson. 266-272 [doi]
- Medium Earth Orbit Ka Band Satellite Communications SystemSteven H. Blumenthal. 273-277 [doi]
- Adaptive Cross Polarization Interference Cancellation for Satellite Downlinks: Architecture Trades and Performance AnalysisBrian P. Kearney, David K. Lee. 278-283 [doi]
- Secure MIMO SATCOM TransmissionAndreas Knopp, Robert T. Schwarz, Berthold Lankl. 284-288 [doi]
- Performance of Satellite Gateway over Geostationary Satellite LinksJouko Vankka. 289-292 [doi]
- Mobility Helps Energy Balancing in Wireless NetworksZeydin Pala, Kemal Bicakci, Bülent Tavli. 293-298 [doi]
- Low Energy Socially Cognizant Routing for Delay Tolerant Mobile NetworksCorey Baker, Jose M. Almodovar-Faria, Pierre St. Juste, Janise McNair. 299-304 [doi]
- Latency Analysis in GNU Radio/USRP-Based Software Radio PlatformsNguyen B. Truong, Young-Joo Suh, Chansu Yu. 305-310 [doi]
- Energy Efficiency of Co-polarized and Space-Polarization MIMO Architectures in Packet-Based Communication SystemsJun Chen, Farzad Talebi, Thomas G. Pratt. 311-316 [doi]
- Using Site-Specific, Ray-Tracing Channel Models to Control Wireless TestbedsKeith Taylor, Brenton D. Walker, Richard Graham, Jason Matusiak. 317-322 [doi]
- Analysis of Operational Airborne ISR Full Motion Video MetadataBruce Bennett, Dillon Bussert, Daniel Goldstein. 323-327 [doi]
- Autonomous Construction of a Mountain Terrain Map Using Low-Cost Sensors and Group InformationSungnam Lee, Sanjar Mengliev, Yohan Chon, Rhan Ha, Hojung Cha. 328-333 [doi]
- Context Aware Data Acquisition Framework for Dynamic Data Driven Applications Systems (DDDAS)Nhan Nguyen, Mohammad Maifi Hasan Khan. 334-341 [doi]
- Crucial Differences between Commercial and Military Communications Technology Needs: Why the Military Still Needs Its Own ResearchMarius S. Vassiliou, Jonathan R. Agre, Syed Shah, Thomas Macdonald. 342-347 [doi]
- The Revolution in Military Affairs 2.0: Information Dominance and the Democratization of Information TechnologyAdam C. Firestone. 348-353 [doi]
- Coalition Networks for Secure Information Sharing (CoNSIS) (Invited Paper)Anders Eggen, Mariann Hauge, Ole-Erik Hedenstad, Ketil Lund, Albert Legaspi, Hartmut Seifert, Peter Sevenich, Pierre Simon. 354-359 [doi]
- CORASMA Program on Cognitive Radio for Tactical Networks: High Fidelity Simulator and First Results on Dynamic Frequency AllocationLuca Rose, Raphaël Massin, Luxmiram Vijayandran, Mérouane Debbah, Christophe J. Le Martret. 360-368 [doi]
- Co-site Interference Analysis and Antenna System Integration on a Swedish Combat Vehicle PlatformStefan Karlsson 0001, Magnus Grenvall, Ake Kvick, Lars Eugensson, Fredrik Grahn, Lars Pettersson. 369-374 [doi]
- Security Challenges with LTE-Advanced Systems and Military SpectrumT. Charles Clancy, Mark Norton, Marc Lichtman. 375-381 [doi]
- Spectrum Database Poisoning for Operational Security in Policy-Based Spectrum OperationsAndrew Robertson, Joseph Molnar, Jeffrey Boksiner. 382-387 [doi]
- Co-array Processing Assisted Bayesian Beamforming (CABB): A Nonlinear Beamforming Technique for Joint Aerial Layer Network (JALN) BackboneAbhishek Tiwari, Jingyi Hu, Babak Daneshrad. 388-395 [doi]
- Improving the SRW Waveform via a Physical Layer RetrofitAlex Blyskun, Mark Johnson, Sungill Kim, James Speros, Gautam Thatte, David R. Williamson. 396-399 [doi]
- Partitioned-Stream Communications for Increased Spectral Efficiency in CDMA SystemsChristian Schlegel, Marcel Jar. 400-405 [doi]
- On Optimal Wireless Scheduling with Propagation DelaysClement Kam, Sastry Kompella, Anthony Ephremides, Zaihan Jiang. 406-411 [doi]
- Utility Proportional Fairness Resource Allocation with Carrier Aggregation in 4G-LTEHaya Shajaiah, Ahmed Abdel-Hadi, Charles Clancy. 412-417 [doi]
- Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSIMohammad Fanaei, Matthew C. Valenti, Natalia A. Schmid. 418-423 [doi]
- Energy-Efficient Resource Allocation in Uplink OFDMA Systems under QoS ConstraintsHaina Ye, Gubong Lim, Leonard J. Cimini Jr., Zhenhui Tan. 424-428 [doi]
- On Burst-Mode Synchronization of SOQPSKEhsan Hosseini, Erik Perrins. 429-435 [doi]
- Robust Time-Domain Fine Symbol Synchronization for OFDM-Based Packet Transmission Using CAZAC PreambleFan Yang, Xi Zhang. 436-440 [doi]
- Software-Defined Radio Based Automatic Blind Hierarchical Modulation Detector via Second-Order Cyclostationary Analysis and Fourth-Order CumulantYang Qu, Xue Li, Ruolin Zhou, Vasu Chakravarthy, Zhiqiang Wu 0001. 441-446 [doi]
- Radiometric Identification of Emitters in the Automatic Identification SystemTakashi Iwamoto. 447-452 [doi]
- A Distribution Fitting Approach for Localization of Multiple Scattered Sources with Very Large ArraysAnzhong Hu, Tiejun Lv. 453-457 [doi]
- Melting Pad: An Efficiently Decodable Coding Scheme for Information Theoretic ConfidentialityIvan Sergeev, Muriel Médard, João Barros. 458-463 [doi]
- JIM-Beam: Jamming-Resilient Wireless Flooding Based on Spatial RandomnessJerry T. Chiang, Yih-Chun Hu. 464-469 [doi]
- Diffie's Wireless Phone: Heterodyning-Based Physical-Layer EncryptionJerry T. Chiang, Yih-Chun Hu. 470-475 [doi]
- Physical Layer Watermarking of Direct Sequence Spread Spectrum SignalsXiang Li, Chansu Yu, Murad Hizlan, Won-Tae Kim, Seungmin Park 0001. 476-481 [doi]
- Near-Optimal Precoding Design for MIMO Gaussian Wiretap Channel under Power ConstraintLingxiang Li, Zhi Chen, Jun Fang. 482-486 [doi]
- A Survey of Tactically Suitable Exterior Gateway ProtocolsTerrence Gibbons, Joshua Van Hook, Joy Na Wang, Thomas H. Shake, Dow Street, Vijay Ramachandran. 487-493 [doi]
- MANET IP Header CompressionBow-Nan Cheng, John Zuena, Jim Wheeler, Scott Moore, Brian Hung. 494-503 [doi]
- Multihop Routing in Ad Hoc NetworksDon J. Torrieri, Salvatore Talarico, Matthew C. Valenti. 504-509 [doi]
- Scaling MANETs Using Long-Range Radios and Protocol AdaptationVictor Firoiu, Brian DeCleene, May Leung, Soumendra Nanda, Charles Tao. 510-515 [doi]
- Forwarding Protocol for Multi-channel Narrowband Ad Hoc NetworksDenis Fakhriev, Pavel Nekrasov. 516-520 [doi]
- Doppler Compensation Based Optimal Resource Allocation for QoS Guarantees in Underwater MIMO-OFDM Acoustic Wireless Relay NetworksPing Wang, Xi Zhang, Mei Song. 521-526 [doi]
- A Cooperative Relay Scheme for Tactical Multi-hop Wireless NetworksJong Kwan Lee, Kyu-Man Lee, Hong-Jun Noh, JaeSung Lim. 527-532 [doi]
- Two-Way AF MIMO Beamforming Relay Strategies under Transmit Power ConstraintKanghee Lee, Hyuck M. Kwon, Jie Yang 0021, Edwin M. Sawan, Hyuncheol Park. 533-537 [doi]
- Measurement-Based Analysis of Two-Hop Cooperative RelayingGunnar Eriksson, Sara Linder, Jimmi Grönkvist. 538-543 [doi]
- Progressive Bitstream Optimization in MIMO Channels Based on a Comparison between OSTBC and SMSeok Ho Chang, Pamela C. Cosman, Laurence B. Milstein. 544-549 [doi]
- Scalable Registration and Discovery of Devices in Low-Bandwidth Tactical NetworksStephanie Demers, Mariusz A. Fecko, Yow-Jian Lin, David Shur, Sunil Samtani, Kaustubh Sinkar, John Chapin. 550-555 [doi]
- Estimation and Validation of the 3D Smooth-Turn Mobility Model for Airborne NetworksJunfei Xie, Yan Wan, Kamesh Namuduri, Shengli Fu, Gilbert L. Peterson, John F. Raquet. 556-561 [doi]
- UAV-Based Localization Scheme for Battlefield EnvironmentsDu-Hwan Kim, Kyu-Man Lee, Munyoung Park, JaeSung Lim. 562-567 [doi]
- Neighbor Discovery Using Galois Fields and Its Hardware ImplementationTurhan Karadeniz, Ashok N. Masilamani, J. J. Garcia-Luna-Aceves. 568-573 [doi]
- A Distributed Dynamic Address Assignment Scheme for Tactical Mobile Ad Hoc NetworksMunyoung Park, Jong Kwan Lee, Duhwan Kim, Hoki Baek, JaeSung Lim, Hyungsuk Choi. 574-579 [doi]
- Ergodic Secrecy of Cooperative Secure Wireless CommunicationsAbiodun Olaluwe, Oluwatobi Olabiyi, Annamalai Annamalai. 580-585 [doi]
- A High Throughput Covert Overlay Network within a MANETMazda Salmanian, Ming Li. 586-592 [doi]
- On Combinatoric Approach to Circumvent Internet Censorship Using Decoy RoutersDonghyun Kim 0001, Glenn R. Frye, Sung-Sik Kwon, Hyung Jae Chang, Alade O. Tokuta. 593-598 [doi]
- Disrupting and Preventing Late-Packet Covert Communication Using Sequence Number TrackingFahimeh Rezaei, Michael Hempel, Dongming Peng, Hamid Sharif. 599-604 [doi]
- On the Effect of Imperfect Range Estimates on Base Station Anonymity in Wireless Sensor NetworksJon R. Ward, Mohamed F. Younis. 605-610 [doi]
- Coding Strategies for Robust Link Blockage Mitigation in SATCOMMario A. Blanco, Nicholas V. Burkhardt, C. Chen. 611-616 [doi]
- Estimation of NCW Path Loss Error: With Gaussian Distributed RF Parameter InaccuraciesChris Deng, Lino Gonzalez, Wendy Lui, Rohit Gupta, William Harbison 0001. 617-621 [doi]
- Adaptive Coding and Modulation for Satellite Communication Links in the Presence of Channel Estimation ErrorsVijitha Weerackody. 622-627 [doi]
- Method of Estimating Satellite Link Quality in a Time Slotted Tactical UHF SATCOM SystemRichard Booton, Christopher Dickens. 628-633 [doi]
- On-Earth Performance Evaluation of SatCom On-the-Move (SOTM) TerminalsMostafa Alazab, Marie Rieche, Giovanni Del Galdo, Wolfgang Felber, Florian Raschke, Gregor Siegert, Markus H. Landmann. 634-640 [doi]
- Centrally Controlled Dynamic Spectrum Access for MANETsJeffrey Boksiner, Yuriy Posherstnik, Bryan May, Mark Saltzman, Sherin Kamal. 641-646 [doi]
- Architectural Consequences of Domain Formation in Tactical Edge NetworksThomas H. Shake, Terrence Gibbons. 647-654 [doi]
- Coherent Distributed Techniques for Tactical Radio Networks: Enabling Long Range Communications with Reduced Size, Weight, Power and CostDzulkifli S. Scherber, Patrick Bidigare, Richard O'Donnell, Matthew Rebholz, Miguel Oyarzun, Charles Obranovich, William Kulp, Daniel Chang, D. Richard Brown III. 655-660 [doi]
- A Geographical Analysis of Highly Deployable Troposcatter Systems PerformanceLuis Bastos, Hermann Wietgrefe. 661-667 [doi]
- A Non-cooperative Game to Coordinate the Coverage of Two Communications UAVsPhilip B. Charlesworth. 668-673 [doi]
- Realizing Secure Cellular and Mobile Hot-Spot Extension to Tactical NetworksSubir Das, Vikram Kaul, JaeWon Kang, Kaustubh Sinkar, Dana Chee, Sunil Samtani, Benjamin D. Foresta, Norbert W. Reis, Philip B. Wiener, Thomas G. Sepka. 674-679 [doi]
- Architecture Patterns for Mobile Systems in Resource-Constrained EnvironmentsGrace A. Lewis, Soumya Simanta, Marc Novakouski, Gene M. Cahill, Jeff Boleng, Edwin J. Morris, James Root. 680-685 [doi]
- End-to-End Applications and Algorithm Integration (E2A2I) Method and ArchitecturePaul Hershey, Michael Hirsch, Kate Maxwell. 686-691 [doi]
- Interconnecting Tactical Service-Oriented Infrastructures with Federation ServicesRita Lenzi, Giacomo Benincasa, Enrico Casini, Niranjan Suri, Alessandro Morelli, Scott Watson, Justin Nevitt. 692-697 [doi]
- Towards True Semantic NetworksRoberto Saracco. 698-701 [doi]
- Variable Data Rate Vocoder Improvements for Secure Interoperable DoD Voice CommunicationDavid A. Heide, Aaron E. Cohen, Yvette T. Lee, Thomas M. Moran. 702-707 [doi]
- The Diversity Gain of Retransmissions in Poisson NetworksMartin Haenggi. 708-712 [doi]
- Spatio-temporal Spread of Events in Social Networks: A Gas Shortage Case StudyRaghu K. Ganti, Mudhakar Srivatsa, Hengchang Liu, Tarek F. Abdelzaher. 713-718 [doi]
- Red Black Network: Temporal and Topological Analysis of Two Intertwined Social NetworksSaurav Pandit, Jonathan Koch, Yang Yang 0008, Brian Uzzi, Nitesh V. Chawla. 719-724 [doi]
- Effects of Partial Topology on Fault DiagnosisBrett Holbert, Srikar Tati, Simone Silvestri, Thomas F. La Porta, Ananthram Swami. 725-730 [doi]
- REM-Enabled Transmitter Localization for Ad Hoc ScenariosLiljana Gavrilovska, Vladimir Atanasovski, Valentin Rakovic, Daniel Denkovski, Marko Angjelicinoski. 731-736 [doi]
- Introduction of Dynamic Spectrum Access Technology in NATO Europe Tactical CommunicationsBart Scheers. 737-742 [doi]
- ESSOR HDRWF - Capabilities and Perspectives of an Innovative Coalition WaveformChristian Serra, Philippe Margot, Pekka Heikkinen, Alberto Quintana, Marcin Lewandowski, Bo Granbom, Claudio Armani, Yannick Thomas. 743-751 [doi]
- Networking the Global Maritime PartnershipGeorge Galdorisi, Stephanie Hszieh, Stephan K. Lapic. 752-757 [doi]
- Communications Performance Improvements of Mobile Networked MIMO in Army Operational EnvironmentsNancy V. Saldanha, Hung-Quoc Lai, Phillip Q. Nguyen, Mary R. Labib, Brian Brown, Shannon Baduini, Leslie Clarkson, Jeff Ernst, Mike Hilley, Brian Height, Steve Iezzi, Dan Yelverton. 758-763 [doi]
- A Site-Specific MIMO Channel Simulator for Hilly and Mountainous EnvironmentsJonathan S. Lu, Henry L. Bertoni. 764-769 [doi]
- Finding Optimal Model Parameters from Measurements with Severe MultipathScot A. Hawkins, Nixon A. Pendergrass. 770-774 [doi]
- SNR Increase Per-Bit-Increase for MPSK and MQAM Signals and SNR Penalty of Using MPSK over MQAM for a Rayleigh Fading ChannelNing Kong, Larry B. Milstein. 775-780 [doi]
- Performance of a Compressed Spectrum Differential Frequency Hopping System over Rayleigh Fading ChannelsZhi Chen, Yanguang Song, Binhong Dong. 781-785 [doi]
- High Security Wireless CDSK-Based Chaos Communication with New Chaos MapHeung-Gyoon Ryu, Jun-Hyun Lee. 786-790 [doi]
- Efficient Amplification and Detection of Multilevel SC-FDE Signals Based on BPSK ComponentsVitor Astucia, Rui Dinis, Paulo Montezuma, Marko Beko. 791-796 [doi]
- Cost Function Analysis for FD-MC-CDMA Blind Frequency Offset Estimation in High Speed Aerial CommunicationJohn Ellinger, Zhiqiang Wu 0001. 797-802 [doi]
- Implementing the NASA Deep Space LDPC Codes for Defense ApplicationsWiley H. Zhao, Jeffrey P. Long. 803-808 [doi]
- Modulation Adaptation for OFDM Packet Radio TransmissionsMichael A. Juang, Michael B. Pursley. 809-810 [doi]
- Tunnelized Cyclostationary Signal Processing: A Novel Approach to Low-Energy Spectrum SensingChad M. Spooner, Apurva N. Mody, Jack Chuang, Michael P. Anthony. 811-816 [doi]
- On the Sensitivity of Wideband Radiometric Detection for Low Probability of Intercept and Probability of Detection (LPI/LPD) in Frequency Hopped SystemsLan K. Nguyen, Mario A. Blanco, Louis J. Sparace. 817-822 [doi]
- Levy Flight Based Cuckoo Search Algorithm for Synthesizing Cross-Ambiguity FunctionsMomin Jamil, Hans-Jürgen Zepernick, Xin-She Yang. 823-828 [doi]
- Zero Sidelobe Aperiodic Codes via Additive-Multiplicative Mismatched FilteringAdly T. Fam, Farhan A. Qazi, Ravi Kadlimatti. 829-836 [doi]
- Target Detection and Classification by UWB Communication Signal Based on Fourth-Order CumulantsYi Zhong, Zheng Zhou, Ting Jiang. 837-841 [doi]
- Transparent IP Proxy for Tactical Ad Hoc NetworksHelder Marques, Jeremie Leguay, Hicham Khalife, Vania Conan, Damien Lavaux. 842-847 [doi]
- Mobile Ad Hoc Computational Grid: Opportunities and ChallengesSayed Chhattan Shah. 848-857 [doi]
- Analysis of Mobility Models for Airborne NetworksJunfei Xie, Yan Wan, Jae H. Kim, Shengli Fu, Kamesh Namuduri. 858-863 [doi]
- Differential Evolution Based Fault Tolerant Topology Control in MANETsStephen Gundry, Jianmin Zou, Janusz Kusyk, Cem Safak Sahin, M. Ümit Uyar. 864-869 [doi]
- Optimizing Control Overhead for Power-Aware Routing in Wireless NetworksAnand Seetharam, Bo Jiang, Dennis Goeckel, Jim Kurose, Robert E. Hancock. 870-875 [doi]
- Design of Mesh Enhancements to Airborne LinksNikhil Bhagwat, Justin Yackoski, Jason H. Li, Kurt Turck. 876-881 [doi]
- PMTR: Privacy-Enhancing Multilayer Trajectory-Based Routing Protocol for Vehicular Ad Hoc NetworksBaber Aslam, M. Faisal Amjad, Cliff C. Zou. 882-887 [doi]
- Graph Matching-Based Topology Reconfiguration Algorithm for Systems of Networked Autonomous VehiclesLeenhapat Navaravong, John M. Shea, Eduardo L. Pasiliao, Warren E. Dixon. 888-893 [doi]
- Hierarchical Sparse Coding for Wireless Link Prediction in an Airborne ScenarioStephen J. Tarsa, H. T. Kung. 894-900 [doi]
- Vehicular Backbone Network Approach to Vehicular Military Ad Hoc NetworksIzhak Rubin, Andrea Baiocchi, Francesca Cuomo, Pierpaolo Salvo. 901-909 [doi]
- Performance Analysis of Jammed Single-Hop Wireless NetworksPeng Wang, Brian Henz. 910-915 [doi]
- A Design Method to Select Optimal Routes and Balance Load in Wireless Communication NetworksMu-Cheng Wang, Steven A. Davidson, Y. Simon Chuang. 916-921 [doi]
- Minimum Error Transmissions with Imperfect Channel Information in High Mobility SystemsNing Sun, Jingxian Wu. 922-927 [doi]
- Performance of Multipath in Fiber-Wireless (FiWi) Access Network with Network VirtualizationShan He, Guochu Shou, Yihong Hu, Zhigang Guo. 928-932 [doi]
- Modeling Three Dimensional Channel Characteristics in Outdoor-to-Indoor LTE Small Cell EnvironmentsAliye Özge Kaya, Doru Calin. 933-938 [doi]
- Detection of Misbehavior in Cooperative Spectrum SensingErfan Soltanmohammadi, Mort Naraghi-Pour. 939-944 [doi]
- Detection of Cognitive Interference in Wireless Environments: An IQ Test in the AirHusheng Li, Sintayehu Dehnie, Vasu Chakravarthy, Zhiqiang Wu 0001. 945-950 [doi]
- Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio NetworksMuhammad Faisal Amjad, Baber Aslam, Cliff C. Zou. 951-956 [doi]
- Security of Classic PN-Spreading Codes for Hybrid DS/FH Spread-Spectrum SystemsXiao Ma, Mohammed M. Olama, P. Teja Kuruganti, Stephen F. Smith, Seddik M. Djouadi. 957-962 [doi]
- Confidential Spatial Multiplexing in the Presence of EavesdropperTaha A. Khalaf, Sang Wu Kim. 963-967 [doi]
- Automated Execution Control and Dynamic Behavior Monitoring for Android (TM) ApplicationsMike Ter Louw, Marc Krull, Tavaris Thomas, Rebecca Cathey, Gregory Frazier, Mike Weber. 968-973 [doi]
- Behavior Analysis via Execution Path ClustersRebecca Cathey, Gregory Frazier, Michael Weber. 974-979 [doi]
- Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision ForestsWilliam J. Glodek, Richard E. Harang. 980-985 [doi]
- Migrating an OS Scheduler into Tightly Coupled FPGA Logic to Increase Attacker WorkloadJason Dahlstrom, Stephen Taylor. 986-991 [doi]
- Cost-Based Placement of Virtualized Deep Packet Inspection Functions in SDNMathieu Bouet, Jeremie Leguay, Vania Conan. 992-997 [doi]
- Protected MILSATCOM Design for Affordability Risk Reduction (DFARR)Matthew Glaser, Kelly Greiner, Bryan Hilburn, Jacob Justus, Christopher Walsh, William Dallas, Joseph Vanderpoorten, Jo-Chieh Chuang, Carl A. Sunshine. 998-1001 [doi]
- A Method for Calculation of the Resilience of a Space SystemRon Burch. 1002-1007 [doi]
- Protection Evaluation Framework for Tactical SATCOM ArchitecturesGary M. Lehto, Gregory Edlund, Terrence Smigla, Francis Afinidad. 1008-1013 [doi]
- Alternatives for Supporting Multiple Cryptographically-Isolated User Groups in Frequency-Hopping SystemsFrederick J. Block, David Qiu, Thomas C. Royster IV. 1014-1019 [doi]
- Transponded Architecture Considerations in Protected MILSATCOMMark Lyubarev, Brian Kominiarek, Michael Calabro, Yen Hoang. 1020-1025 [doi]
- A Thinner Thinnest Path Using Directional Transmissions in a NetworkRaymond Moberly. 1026-1031 [doi]
- On the Exploitation of the Android OS for the Design of a Wireless Mesh Network TestbedMatteo Danieletto, Giorgio Quer, Ramesh R. Rao, Michele Zorzi. 1032-1038 [doi]
- The MITRE Tactical Channel Emulation SystemCollin Hockey, Patrick M. Howard, Ryan T. Moniz, Christopher Niessen, Billy Zhong. 1039-1044 [doi]
- A Spatial Interpolation Method for Radio Frequency Maps Based on the Discrete Cosine TransformGarrett M. Vanhoy, Haris Volos, Carlos E. Caicedo Bastidas, Tamal Bose. 1045-1050 [doi]
- EBEM's Enhanced Capabilities Facilitate the Navy's Emerging Operational Requirements and Enable Bandwidth Efficient Communications over IPBrian Zaharris, Ben Davis, Kurt Fiscko, Eric Otte, Britney Chan. 1051-1056 [doi]
- Enhanced Message Concatenation (EMC) Scheme for QoS Provision in Multi-hop Combat Net RadioEunho Kim, Bosung Kim, Byeong-hee Roh. 1057-1062 [doi]
- Improving H.264 Scalable Video Delivery for Multi-homed Terminals Using Multiple Links in Heterogeneous Wireless NetworksAllen L. Ramaboli, Olabisi E. Falowo, H. Anthony Chan. 1063-1068 [doi]
- Load Balancing for Return Satellite Channels with Multiple Traffic ClassesJun Erik Xu, Rob Torres, John Border, Yangang Li. 1069-1074 [doi]
- Satellite Broadband Enters the Mass Market: Now Everything is DifferentSteve Gardner. 1075-1080 [doi]
- Mobile Network Emulation - Experiences and ChallengesBrian Adamson, David Claypool. 1081-1086 [doi]
- Reliable Multicast CloudsRyan E. Irwin, Prithwish Basu. 1087-1092 [doi]
- Self-Optimization in Future Hybrid NetworksRahul Urgaonkar, Saikat Guha, Prithwish Basu, Howard Tripp, Timothy Freeman 0002, Robert E. Hancock, James F. Kurose, Wei Wei 0001, Anand Seetharam, J. Lowe. 1093-1098 [doi]
- Disrupted Adaptive Routing: Gossip-Based Routing in Delay-Tolerant NetworksBakul Khanna, Jason Redi, Prithwish Basu, Ram Ramanathan. 1099-1104 [doi]
- Value of InformationDerya Cansever. 1105-1108 [doi]
- QoS-Enabled Spectrum-Aware Routing for Disaster Relief and Tactical Operations over Cognitive Radio Ad Hoc NetworksEvren Onem, Salim Eryigit, Tuna Tugcu, Ali Akurgal. 1109-1115 [doi]
- Rapidly Deployable Network for Tactical Applications: Aerial Base Station with Opportunistic Links for Unattended and Temporary Events ABSOLUTE ExampleIsabelle Bucaille, Serge Hethuin, Andrea Munari, Romain Hermenier, Tinku Rasheed, Sandy Allsopp. 1116-1120 [doi]
- Ideas for Future Mission Networks (Invited Paper)Torleiv Maseng. 1121-1124 [doi]
- Combining Technology Acceptance and Culture in One Tool: Implications for Information Sharing within CoalitionsHarry D. Tunnell IV. 1125-1132 [doi]
- Achieving High Bandwidth Efficiency under Partial-Band Noise JammingHuan Yao, Jacob C. Huang, Gregory W. Wornell. 1133-1138 [doi]
- Sparsity-Cognizant Source Location Mapping for Underwater AcousticsPedro A. Forero, Paul A. Baxley. 1139-1144 [doi]
- Adaptive Analog Nonlinear Algorithms and Circuits for Improving Signal Quality in the Presence of Technogenic InterferenceAlexei V. Nikitin, Ruslan L. Davidchack, Tim J. Sobering. 1145-1154 [doi]
- A Novel Receiver Based Technique for Monitoring Spectral Re-growth and Mitigating Adjacent-Channel InterferenceRohit Iyer Seshadri, Bassel F. Beidas, Lin-Nan Lee. 1155-1160 [doi]
- Adaptive Beamforming for Tele-operated Unmanned Ground VehiclesChris Meagher, David Hooper, Chris Cirullo, Joe Neff, Jia-Chi Samuel Chieh. 1161-1165 [doi]
- Fourteen Years of Cognitive Radio DevelopmentBruce Fette. 1166-1175 [doi]
- Cognitive Jamming Game for Dynamically Countering Ad Hoc Cognitive Radio NetworksWilliam G. Conley, Adam J. Miller. 1176-1182 [doi]
- High-Fidelity Adaptive Compression for Cognitive Spectral MonitoringJohn Matthews, Leonid Bukshpun, Ranjit D. Pradhan. 1183-1186 [doi]
- Cooperative Compressive Spectrum Sensing in Cognitive Radio Based on W-OMPLei Zhou, Hong Man. 1187-1192 [doi]
- Belief Propagation Based Spectrum Sensing Subject to Dynamic Primary User Activities: Phantom of Quickest DetectionYifan Wang, Husheng Li, Lijun Qian. 1193-1200 [doi]
- An Extension of Wideband HF CapabilitiesMark B. Jorgenson, Robert W. Johnson, Randy W. Nelson. 1201-1206 [doi]
- Predictive ACM Margin for DVB-S2 Modems and EPM IP Modem 21e for the Ka and EHF BandsGaston Levannier, Marc Touret, Jullien Pailler, Pierre Bacquet. 1207-1212 [doi]
- Information Theoretic Capacity Bounds for Protected SATCOMBalasubramanian Ramakrishnan. 1213-1219 [doi]
- Advanced Coding Schemes against Jamming in Telecommand LinksMarco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Roberto Garello, Nicola Maturo, Ignacio Aguilar Sanchez, Stefano Cioni. 1220-1226 [doi]
- Time-Domain Correlation-Based Multipath Modeling of Wideband Space-Polarization MIMO ChannelsFarzad Talebi, Thomas G. Pratt. 1227-1232 [doi]
- Indoor Multi-wall Path Loss Model at 1.93 GHzLun Li, Yazan Ibdah, Yanwu Ding, Homa Eghbali, Sami Hakam Muhaidat, Xiurong Ma. 1233-1237 [doi]
- Measurement and Characterization of Various Outdoor 60 GHz Diffracted and Scattered PathsJonathan S. Lu, Patrick Cabrol, Daniel Steinbach, Ravikumar V. Pragada. 1238-1243 [doi]
- Feasibility Study of Outdoor Wireless Communication in the 60 GHz BandDaniel J. Jakubisin, Claudio R. C. M. da Silva. 1244-1249 [doi]
- HF MIMO NVIS Measurements with Co-located Dipoles for Future Tactical CommunicationsRobert C. Daniels, Steven W. Peters, Robert W. Heath Jr.. 1250-1255 [doi]
- A New MIMO HF Data Link: Designing for High Data Rates and Backwards CompatibilityRobert C. Daniels, Steven W. Peters. 1256-1261 [doi]
- Diversity Measure of Co-polarized and Polarized MIMO Architectures over Wideband Mobile-to-Mobile ChannelsJun Chen, Thomas G. Pratt. 1262-1267 [doi]
- Sparse Coding Quantization for Downlink MU-MIMO with Limited CSI FeedbackQi Wang, Hao Feng, Leonard J. Cimini Jr., Larry J. Greenstein, Douglas S. Chan, Ahmadreza Hedayat. 1268-1272 [doi]
- AF MIMO Beamforming Relay Networks under Various Power ConstraintsSangku Lee, Hyuck M. Kwon, Kanghee Lee, Hyuncheol Park. 1273-1277 [doi]
- Non-orthogonal Multiple Access in a Downlink Multiuser Beamforming SystemBeomju Kim, Sungmook Lim, Hyungjong Kim, Sangwook Suh, Jonghyung Kwun, Sooyong Choi, Chungyong Lee, Sanghoon Lee 0001, Daesik Hong. 1278-1283 [doi]
- Inferring Wireless Communications Links and Network Topology from Externals Using Granger CausalityPaul Tilghman, David Rosenbluth. 1284-1289 [doi]
- Cooperative RS Selection Schemes for IEEE 802.16j NetworksHyukjoon Lee, Ho Young Hwang 0001, Suyong Kim, Bongsoo Roh, Guisoon Park. 1290-1295 [doi]
- A Load Prediction Based Virtual Cell Breathing Scheme for LTE-A SystemXinsheng Zhao, Wei Zhang, Chao Wang. 1296-1301 [doi]
- Improving Scalability in Tactical Ground Radio Networks by Using Relay NodesZachary Bunting, Aradhana Narula-Tam, Eytan Modiano. 1302-1307 [doi]
- SON for Government Spectrum ApplicationsR. Menon, J. Yun, E. Gormley, C. Immendorf. 1308-1315 [doi]
- Using Fisher Information Matrix Summary Statistics to Assess the Value of Collaborative Positioning OpportunitiesJavier Schloemann, R. Michael Buehrer. 1316-1321 [doi]
- Link Asymmetry in Virtual MISO-based NetworksHaejoon Jung, Mary Ann Weitnauer. 1322-1327 [doi]
- Protecting QoS in the Ciphertext DomainJoanna N. Ptasinski, David R. Wasserman, Roger Casey. 1328-1333 [doi]
- Worth a Thousand Bits: Visual Encoding of Tactical Communication Network DataAndrea L. Brennen, Carl E. Fossa Jr., Thomas G. Macdonald, S. W. Arbiv, William C. Barto. 1334-1340 [doi]
- Performance of Loss-Tolerant TCP (LT-TCP) in the Presence of Correlated LossesNathan Hourt, Koushik Kar, Bishwaroop Ganguly. 1341-1346 [doi]
- Efficient Broadcasting in Tactical Networks: The Impact of Local Topology Information AccuracyThomas Kunz, Li Li 0009. 1347-1352 [doi]
- Power Efficient User Pairing for Multicasting in Heterogeneous Wireless NetworksYao Xiao, Yang Guan, Leonard Cimini, Chien-Chung Shen. 1353-1358 [doi]
- Using the IntelRate Controller to Improve Throughput and Queue Size of High-Speed WLANsJungang Liu, Oliver W. W. Yang. 1359-1364 [doi]
- Performance Evaluation of Access Control for CRDSA and R-CRDSA under High Traffic LoadHong-Jun Noh, Jong Kwan Lee, Jae-Sung Lim. 1365-1370 [doi]
- Achieving Energy Efficient Transmission in Wireless Body Area Networks for the Physiological Monitoring of Military SoldiersEmeka E. Egbogah, Abraham O. Fapojuwo. 1371-1376 [doi]
- Sharktank: The SeCAN Lab "Tip of the Spear" for Commercial Solutions for Classified Mobility SystemsBobby Murphy, Akinwale Akinpelu, Antonio DeSimone, John Forte. 1377-1382 [doi]
- Securing Robust Header Compression (ROHC)Bow-Nan Cheng, Scott Moore. 1383-1390 [doi]
- Testbed for Cellular Telecommunications Cyber Vulnerability AnalysisBrian Van Leeuwen, Vincent Urias, Casey Glatter, Alex Interrante-Grant. 1391-1397 [doi]
- Correlating GSM and 802.11 Hardware IdentifiersJeremy Martin, Danny Rhame, Robert Beverly, John McEachen. 1398-1403 [doi]
- Watching for Weakness in Wild WPANsBenjamin W. P. Ramsey, Barry E. Mullins, Ryan Speers, Katherine A. Batterton. 1404-1409 [doi]
- Attack Mitigation through DiversityMorgon Kanter, Stephen Taylor. 1410-1415 [doi]
- Bear - A Resilient Kernel for Tactical MissionsColin Nichols, Morgon Kanter, Stephen Taylor. 1416-1421 [doi]
- The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM SelectionJungmin Lim, Seokjoo Doo, Hyunsoo Yoon. 1422-1428 [doi]
- Reducing Attack Surface with VM-Based Phantom ServerLi Wang, Zhan Wang, Kun Sun, Sushil Jajodia. 1429-1435 [doi]
- Towards a Cross-Domain MapReduce FrameworkThuy D. Nguyen, Mark A. Gondree, Jean Khosalim, Cynthia E. Irvine. 1436-1441 [doi]
- Collaborative Ad Hoc Aerial Reconnaissance PlatformChristopher S. Badder, Michael R. Zanchi, Adrian P. Lauf. 1442-1446 [doi]
- Agnostic Protocol Translation for Cross-Domain Information SharingChen Liu, Bao-Hong Shen, Soon-Young Oh, Mario Gerla, Jens Palsberg, Clif Banner, Richard Butler. 1447-1452 [doi]
- Army Warfighter Network-Tactical (WIN-T) Theory of OperationSyed R. Ali, Richard S. Wexler. 1453-1461 [doi]
- On the Federation of Information in Coalition Operations: Building Single Information Domains Out of Multiple Security DomainsAlberto Domingo, Hermann Wietgrefe. 1462-1469 [doi]
- Dynamic Selection of Persistence and Transport Layer Protocols in Challenged NetworksAaron M. Rosenfeld, Robert N. Lass, William C. Regli, Joseph P. Macker. 1470-1475 [doi]
- PeerTalk: A Push-to-Talk and Instant Messaging Service for Tactical NetworksEnrico Casini, Niranjan Suri, Maggie R. Breedy, Peter Budulas, Jesse Kovach, Radhika Roy. 1476-1481 [doi]
- Real-Time Communications Resource Allocation Process, Architecture, and AlgorithmPaul C. Hershey, Steven A. Davidson, Mu-Cheng Wang. 1482-1487 [doi]
- REAP: Delta Compression for Publish/Subscribe Web Services in MANETsEspen Skjervold, Magnus Skjegstad. 1488-1496 [doi]
- ConfigAssure: A Science of ConfigurationSanjai Narain. 1497-1498 [doi]
- Implementing Heterogeneous Military SystemsMark Rich. 1499-1505 [doi]
- Providing Local Content Discovery and Sharing in Mobile Tactical NetworksMary R. Schurgot, Jairo O. Esteban, Lloyd G. Greenwald, Yang Guo, Mark Smith, David Stott, Matteo Varvello, Limin Wang. 1506-1511 [doi]
- ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network EdgeSamuel B. Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves. 1512-1517 [doi]
- CASCADE: Content Access System for the Combat-Agile Distributed EnvironmentTim Strayer, Vikas Kawadia, Armando Caro, Samuel C. Nelson, Dorene Ryder, Carsten Clark, Kolia Sadeghi Bryan Tedesco, Olivia DeRosa. 1518-1523 [doi]
- S-6 Associate: A Unified Approach to Building and Managing Network Operating Environment within the Context of Tactical Missions and Other Warfighting FunctionsMelinda Gresham, Josip Pilipovic, Eric Drucker, Larry Lafferty. 1524-1528 [doi]
- On the Use of Waveform Diversity in the Design of RF Signal SystemsGerard Titi. 1529-1534 [doi]
- MIMO Radar Waveform Design to Support Spectrum SharingSaiDhiraj Amuru, R. Michael Buehrer, Ravi Tandon, Shabnam Sodagari. 1535-1540 [doi]
- A Burst SC-FDE Scheme for High-Speed Communication Based on RadarWu Zhao, Yu Zhang, Hang Zhang. 1541-1546 [doi]
- Outage Performance Study of Cognitive Multi-antenna Relay Network with Physical-Layer Network Coding over Nakagami-m Fading ChannelsYing Zhu, Jia Liu, Xiaoyu Tao, Zhiyong Feng. 1547-1552 [doi]
- Partial Interference Alignment in Heterogeneous NetworksJongpil Seo, Chamsol Yang, GunWoo Park, Jaehak Chung. 1553-1557 [doi]
- Breaking the Barrier of Transmission Noise in Full-Duplex RadioYingbo Hua, Yiming Ma, Ping Liang, Ali Cagatay Cirik. 1558-1563 [doi]
- Quantization Effects in Digital Chaotic Communication SystemsAlan J. Michaels, Chad C. Lau. 1564-1569 [doi]
- Resource Block Based Precoding Schemes for Suppressing Out-of-Band EmissionJuan Fang, Zihao You, I-Tai Lu, Jialing Li, Rui Yang. 1570-1575 [doi]
- Hybrid Combination of N-Continuous and Null-Space Precoding for Out-of-Band Emission SuppressionZihao You, Juan Fang, I-Tai Lu. 1576-1580 [doi]
- Multiple-Access Interference Mitigation and Iterative Demodulation of CPFSK in Asynchronous Slow FHSS SystemsOluwatosin A. Adeladan, John M. Shea. 1581-1586 [doi]
- Physical Layer Adaptation for Packet Radio Systems with Higher Layer Fountain CodingJason D. Ellis, Michael B. Pursley. 1587-1589 [doi]
- New Results on the Performance of a Protocol for Adaptive Modulation and CodingSiddhartha S. Borkotoky, Jason D. Ellis, Michael A. Juang, Sneha L. Kottapalli, Michael B. Pursley. 1590-1591 [doi]
- High-Speed Turbo Equalization for GPP-Based Software Defined RadiosMichael Schwall, Friedrich K. Jondral. 1592-1596 [doi]
- On the Use of Multiple Amplifiers and Antennas for Efficient Directive Transmission with Large ConstellationsPaulo Montezuma, Vitor Astucia, Rui Dinis, Marko Beko. 1597-1603 [doi]
- Simulation of Moderate Time-Scale Dynamic Spectrum Access with Distributed Spectrum SensorsMatthew Rebholz, Bruce F. McGuffin. 1604-1609 [doi]
- Compressive Estimation of a Spatial Gaussian ProcessMehrzad Malmirchegini. 1610-1615 [doi]
- Binary Compressive Sensing via Sum of l1-Norm and l(infinity)-Norm RegularizationSheng Wang, Nazanin Rahnavard. 1616-1621 [doi]
- Automatic Modulation Classification under IQ Imbalance Using Supervised LearningMarc Lichtman, William C. Headley, Jeffrey H. Reed. 1622-1627 [doi]
- A Novel Sense-through-Foliage Target Recognition Method Based on Sparse RepresentationShijun Zhai, Ting Jiang, Jingjing Huang. 1628-1633 [doi]
- Optical PPM Demodulation from Slot-Sampled Photon Counting DetectorsKevin J. Quirk, Meera Srinivasan. 1634-1638 [doi]
- Upper Bounding the Capacity of Binary Chip-Asynchronous Optical CDMASalman A. Khan, Jan Bajcsy. 1639-1644 [doi]
- Power-Efficient Constellation Design for a Multicarrier Optical Wireless SystemQian Gao, Jonathan H. Manton, Gang Chen 0007, Yingbo Hua. 1645-1650 [doi]
- Performance Analysis of Asymmetric RF/FSO Dual-Hop Relaying Systems for UAV ApplicationsJaedon Park, Eunju Lee, Guisoon Park, Bongsoo Roh, Giwan Yoon. 1651-1656 [doi]
- A New Approach for WLAN Channel Selection Based on Outage CapacityBahador Amiri, Hamid R. Sadjadpour. 1657-1662 [doi]
- From Spectrum Agility to Network Agility: Proactive and Adaptive Reconfiguration for Reliable Communication in Tactical NetworksHui Zeng, Hongmei Julia Deng, Ke Meng, Song Luo, Xiang Yu, Apurva N. Mody, Matthew Sherman, Jude Muller, Zhenxing Wang. 1663-1668 [doi]
- CREATE-NEST: A Distributed Cognitive Radio Network Platform with Physical Channel AwarenessLei Ding, Yalin E. Sagduyu, Tommaso Melodia, Jason H. Li, Jared Feldman, John D. Matyjas. 1669-1674 [doi]
- Cognitive Networks with Dynamic User Classification for Tactical CommunicationsMarco Levorato, Urbashi Mitra. 1675-1680 [doi]
- Spectrum Coexistence Issues: Challenges and Research DirectionsSintayehu Dehnie, Vasu Chakravarthy, Zhiqiang Wu 0001, Chittabrata Ghosh, Husheng Li. 1681-1689 [doi]
- The Use of Reliability-Based Splitting Algorithms to Improve Distributed Estimation in WSNsSeksan Laitrakun, Edward J. Coyle. 1690-1695 [doi]
- Wireless Sensor Network Energy Use While Tracking Secure Area IntrusionsRobert Hartwell. 1696-1701 [doi]
- A Markovian Approach to Modeling the Optimal Lifetime of Multi-hop Wireless Sensor NetworksJian Lin, Mary Ann Weitnauer. 1702-1707 [doi]
- Cluster-Based Energy-Efficient Data Collection in Wireless Sensor Networks Utilizing Compressive SensingMinh Tuan Nguyen, Nazanin Rahnavard. 1708-1713 [doi]
- Sensor Network Localization via Distributed Randomized Gradient DescentMort Naraghi-Pour, Gustavo Chacon Rojas. 1714-1719 [doi]
- Caching for Non-independent Content: Improving Information Gathering in Constrained NetworksWilliam Dron, Md. Yusuf Sarwar Uddin, ShiGuang Wang, Tarek F. Abdelzaher, Alice Leung, Arun Iyengar, Ramesh Govindan, John P. Hancock. 1720-1725 [doi]
- Inferring Military Activity in Hybrid Networks through Cache BehaviorMostafa Dehghan, Dennis L. Goeckel, Ting He, Don Towsley. 1726-1731 [doi]
- A Linux Kernel Implementation of Broadcast Interflow Network CodingLeonid Veytser, Bow-Nan Cheng. 1732-1738 [doi]
- Novel Joint Network Coding and Scheduling Scheme in Distributed TDMA-Based WMNsJaeryong Cha, Jinki Kim, Jaehyun Kim. 1739-1743 [doi]
- Control Processes and Ultra High Data Rates for Unmanned Autonomous SystemsDavid M. Coleman, William Nelson, Christopher C. Davis, Stuart D. Milner. 1744-1749 [doi]
- IEEE DySPAN 1900.5 Efforts to Support Spectrum Access StandardizationLynn Grande, Matthew Sherman, Hua Zhu, Mieczyslaw M. Kokar, John A. Stine. 1750-1755 [doi]
- The DirecNet Network Management ArchitectureJerome Sonnenberg, Steven A. Davidson, Matthew Sherman. 1756-1761 [doi]
- Government Reference Architecture Extensions for Application to Base StationsHiroshi Satake, Tim Skutt, Mat Sherman, Wayne Eagleson, Tom Rittenbach, Tom Sepka. 1762-1767 [doi]
- A Government Reference Architecture Test Bed Using a Virtual Private NetworkTom Rittenbach, Hiroshi Satake, Derek Schoonmaker, Joshua Cunningham, Thomas Duffe. 1768-1773 [doi]
- Overview of the Joint Open Architecture Spectrum Infrastructure (JOASI) Ontology for Spectrum InteroperabilityRobert B. Normoyle. 1774-1778 [doi]
- Cryptographic Roles in the Age of Wikileaks: Implementation Models for Cryptographically Enforced RBACMikko Kiviharju. 1779-1788 [doi]
- Sustenance against RL-Based Sybil Attacks in Cognitive Radio Networks Using Dynamic Reputation SystemKenneth Ezirim, Erald Troja, Shamik Sengupta. 1789-1794 [doi]
- A Technique for Network Topology DeceptionSamuel T. Trassare, Robert Beverly, David Alderson. 1795-1800 [doi]
- Distributed Trust Based Routing in Mobile Ad-Hoc NetworksShalabh Jain, John S. Baras. 1801-1807 [doi]
- The Integration of Trusted Platform Modules into a Tactical Identity Management SystemAnders Fongen, Federico Mancini. 1808-1813 [doi]
- Flexibility and Extensibilty in the Design of Spacecraft Communications SystemsMichael A. Koets, Jennifer L. Alvarez. 1814-1818 [doi]
- Methods of Detection of Bandlimited Signals on UHF MILSATCOM DownlinksJames Norris, Brian Taylor, William Tyler. 1819-1824 [doi]
- Deadline Based Resource Balancing Task Allocation for Clustered Heterogeneous LEO Small Satellite NetworkJing Qin, Yonggang Liu, Xiang Mao, Janise McNair. 1825-1831 [doi]
- Sensitivity of Interference to Locations of Vehicle-Mounted Earth StationsVijitha Weerackody. 1832-1837 [doi]
- Challenges and Solutions for Routing in Converged Satellite and Terrestrial NetworksKwang-Chun Go, Jae-Hyun Kim, Jae-Ryong Cha, Byong-Gak Jo, Ki-Keun Kim. 1838-1843 [doi]
- A New Light-Weight JPEG2000 Encryption Technique Based on Arithmetic CodingHassan Yakout El-Arsh, Yahya Z. Mohasseb. 1844-1849 [doi]
- Optimal Workload and Energy Storage Management for Cloud Data CentersYuanxiong Guo, Yuguang Fang, Pramod P. Khargonekar. 1850-1855 [doi]
- SCIMITAR: Scalable Stream-Processing for Sensor Information BrokeringKurt Rohloff, Jeffrey Cleveland, Joseph P. Loyall, Timothy Blocher. 1856-1861 [doi]
- Trust-Based Service Composition and Binding for Tactical Networks with Multiple ObjectivesYating Wang, Ing-Ray Chen, Jin-Hee Cho, Kevin S. Chan, Ananthram Swami. 1862-1867 [doi]
- Trusted Service Discovery through Identity ManagementAnders Fongen, Trude Hafsoe Bloebaum. 1868-1873 [doi]
- Architecture Concepts for a Future Heterogeneous, Survivable Tactical InternetJohn M. Chapin, Vincent W. S. Chan. 1874-1879 [doi]
- Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP RequestsAaron Adler, Michael J. Mayhew, Jeffrey Cleveland, Michael Atighetchi, Rachel Greenstadt. 1880-1887 [doi]
- Scalability Analysis of Tactical Mobility PatternsErtugrul Necdet Ciftcioglu, Ram Ramanathan, Thomas F. La Porta. 1888-1893 [doi]
- Minimizing Eccentricity in Composite Networks via Constrained Edge AdditionsSenni Perumal, Prithwish Basu, Ziyu Guan. 1894-1899 [doi]
- Human Factors in Intelligence, Surveillance, and Reconnaissance: Gaps for Soldiers and Technology RecommendationsJonathan Z. Bakdash, Diego Pizzocaro, Alun Precee. 1900-1905 [doi]
- Resilient Leadership Delegation in Tactical SystemsRishabh Dudheria, Wade Trappe, Naftaly H. Minsky. 1906-1912 [doi]