Abstract is missing.
- Towards distributed ensemble clustering for networked sensing systems: a novel geometric approachHu Ding, Lu Su, Jinhui Xu. 1-10 [doi]
- Joint sensor duty cycle scheduling with coverage guaranteeKin Sum Liu, Jie Gao, Shan Lin, Hua Huang, Brent Schiller. 11-20 [doi]
- Throughput-optimal broadcast in wireless networks with dynamic topologyAbhishek Sinha, Leandros Tassiulas, Eytan Modiano. 21-30 [doi]
- A node-based CSMA algorithm for improved delay performance in wireless networksSherif ElAzzouni, Eylem Ekici. 31-40 [doi]
- Throughput characterization of node-based scheduling in multihop wireless networks: a novel application of the Gallai-Edmonds structure theoremBo Ji, Yu Sang. 41-50 [doi]
- Throughput-optimal multi-hop broadcast algorithmsAbhishek Sinha, Georgios S. Paschos, Eytan Modiano. 51-60 [doi]
- Mobility resilience and overhead constrained adaptation in directional 60 GHz WLANs: protocol design and system implementationMuhammad Kumail Haider, Edward W. Knightly. 61-70 [doi]
- Hybrid routing in wireless networks with diverse connectivityChen Yang, Radu Stoleru. 71-80 [doi]
- IQ-Hopping: distributed oblivious channel selection for wireless networksApurv Bhartia, Deeparnab Chakrabarty, Krishna Chintalapudi, Lili Qiu, Bozidar Radunovic, Ramachandran Ramjee. 81-90 [doi]
- How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signalsLinsong Cheng, Jiliang Wang. 91-100 [doi]
- Charge me if you can: charging path optimization and scheduling in mobile networksLin Chen 0002, Shan Lin, Hua Huang. 101-110 [doi]
- On LTE-WiFi coexistence and inter-operator spectrum sharing in unlicensed bands: altruism, cooperation and fairnessCengis Hasan, Mahesh K. Marina, Ursula Challita. 111-120 [doi]
- GAVEL: strategy-proof ascending bid auction for dynamic licensed shared accessSaravana Rathinakumar, Mahesh K. Marina. 121-130 [doi]
- Deploying carrier-grade WiFi: offload traffic, not moneyKonstantinos Poularakis, George Iosifidis, Leandros Tassiulas. 131-140 [doi]
- Fast and reliable unknown tag detection in large-scale RFID systemsWei Gong, Jiangchuan Liu, Zhe Yang. 141-150 [doi]
- Joint property estimation for multiple RFID tag sets using snapshots of variable lengthsQingjun Xiao, Shigang Chen, Min Chen. 151-160 [doi]
- Efficient online coflow routing and schedulingYupeng Li, Shaofeng H.-C. Jiang, Haisheng Tan, Chenzi Zhang, Guihai Chen, Jipeng Zhou, Francis C. M. Lau. 161-170 [doi]
- System intelligence: model, bounds and algorithmsLongbo Huang. 171-180 [doi]
- Distributed coordination maximization over networks: a stochastic approximation approachHyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi. 181-190 [doi]
- Anonymous-query based rate control for wireless multicast: approaching optimality with constant feedbackFei Wu, Yang Yang, Ouyang Zhang, Kannan Srinivasan, Ness B. Shroff. 191-200 [doi]
- WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognitionSheng Tan, Jie Yang 0003. 201-210 [doi]
- Monitoring vital signs using millimeter waveZhicheng Yang, Parth H. Pathak, Yunze Zeng, Xixi Liran, Prasant Mohapatra. 211-220 [doi]
- Full-duplex delay-and-forward relayingKai-Cheng Hsu, Kate Ching-Ju Lin, Hung-Yu Wei. 221-230 [doi]
- Joint selection and transmission scheduling of point-to-point communication requests in multi-channel wireless networksPeng-Jun Wan. 231-240 [doi]
- On the capacity regions of single-channel and multi-channel full-duplex linksJelena Marasevic, Gil Zussman. 241-250 [doi]
- Understanding the impact of limited channel state information on massive MIMO network performancesJia Liu, Atilla Eryilmaz, Ness B. Shroff, Elizabeth S. Bentley. 251-260 [doi]
- Posted pricing for robust crowdsensingKai Han, He Huang, Jun Luo. 261-270 [doi]
- First learn then earn: optimizing mobile crowdsensing campaigns through data-driven user profilingMerkourios Karaliopoulos, Iordanis Koutsopoulos, Michalis Titsias. 271-280 [doi]
- An efficient approximation algorithm for online multi-tier multi-cell user associationWeng-Chon Ao, Konstantinos Psounis. 281-290 [doi]
- Asymptotically optimal algorithm for online reconfiguration of edge-cloudsI.-Hong Hou, Tao Zhao, Shiqiang Wang, Kevin Chan. 291-300 [doi]
- High-rate WiFi broadcasting in crowded scenarios via lightweight coordination of multiple access pointsHang Qiu, Konstantinos Psounis, Giuseppe Caire, Keith M. Chugg, Kaidong Wang. 301-310 [doi]
- Supporting real-time wireless traffic through a high-throughput side channelHaoyang Lu, Wei Gao. 311-320 [doi]
- 2-SAS: preserving users' privacy in centralized dynamic spectrum access systemsYanzhi Dou, Kexiong Curtis Zeng, He Li, Yaling Yang, Bo Gao, Chaowen Guan, Kui Ren, Shaoqian Li. 321-330 [doi]
- Analog man-in-the-middle attack against link-based packet source identificationYu-Chih Tung, Kang G. Shin, Kyu-Han Kim. 331-340 [doi]
- INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systemsHaiming Jin, Lu Su, Houping Xiao, Klara Nahrstedt. 341-350 [doi]
- Coexistence features of LTE-U for spectrum sharing with collocated Wi-Fi: demoJunaid Ansari. 351-352 [doi]
- Multi-channel access and rendezvous in CRNs: demoJiaxun Li, Haitao Zhao, Haijun Wang, Li Zhou, Jibo Wei. 353-354 [doi]
- Self-adaptive network architecture reconfiguration in CRNs: demoHaijun Wang, Haitao Zhao, Jiaxun Li, Jibo Wei. 355-356 [doi]
- Full-duplex wireless based on a small-form-factor analog self-interference canceller: demoTingjun Chen, Jin Zhou, Nicole Grimwood, Rel Fogel, Jelena Marasevic, Harish Krishnaswamy, Gil Zussman. 357-358 [doi]
- 4G LTE-assisted distributed Device-to-Device communication using android smartphones: demoYan-Zhao Hou, Yibing Duan, Junchen Han, Yu Chen, Xiaofeng Tao. 359-360 [doi]
- Towards secure spectrum auction: both bids and bidder locations matter: posterZhili Chen, Lin Chen 0002, Liusheng Huang, Hong Zhong. 361-362 [doi]
- Anonymous category-level joint tag estimation: posterMin Chen, Jia Liu, Shigang Chen, Qingjun Xiao. 363-364 [doi]
- LocalCoin: An ad-hoc payment scheme for areas with high connectivity: posterDimitris Chatzopoulos, Sujit Gujar, Boi Faltings, Pan Hui. 365-366 [doi]
- Rate maximization under reactive jamming attacks: posterSalvatore D'Oro, Eylem Ekici, Sergio Palazzo. 367-368 [doi]
- Reducing computational complexity of coded caching by partitioning users into groups: posterWenxin Li, Shangjie Chen, Guanchen He, Xiaohua Tian, Xinbing Wang. 369-370 [doi]
- Combinatorics, algorithms and systems for sensor deployment with line-of-sight constraints: posterKin Sum Liu, Brent Schiller, Jie Gao, Shan Lin, Joseph S. B. Mitchell. 371-372 [doi]
- Solving the crowdsourcing dilemma using the zero-determinant strategy: posterQin Hu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie. 373-374 [doi]
- A novel anti-jamming routing strategy for tactical MANETs: posterLi Lou, Jian-Hua Fan. 375-376 [doi]
- 2hub private personal data hub for mobile devices: posterMichael Haus, Vittorio Cozzolino, Aaron Yi Ding, Jörg Ott. 377-378 [doi]
- Integration of different cryptographic techniques for real-time V2V communication: posterNagarjuna Chidara, Chinmayi Nibhanupudi, Hrishikesh Venkataraman. 379-380 [doi]
- Context aware dynamic log chunking for mobile healthcare applications: posterRahul Krishnan, Bithin Alangot, Venkat Rangan. 381-382 [doi]
- Analysis of region of interest (RoI) of multimedia content using eye-tracker: posterB. Vinodh, A. Sai Charan, Rolf Assfalg, Hrishikesh Venkataraman. 383-384 [doi]
- Towards in-situ sensor network assisted remote sensing of crop parameters: posterJan Bauer, Bastian Siegmann, Thomas Jarmer, Nils Aschenbruck. 385-386 [doi]
- Adaptive non-binary classification for network centric handover in heterogeneous networks: posterM. N. V. Sneha, K. Vamsi Krishna, Hrishikesh Venkataraman. 387-388 [doi]
- Real time capable UWB wireless network sniffer: posterGeorg von Zengen, Colin Wulf, Yannic Schröder, Lars C. Wolf. 389-390 [doi]
- PotatoMesh: a solar powered WSN testbed: posterBjörn Gernert, Stephan Rottmann, Lars C. Wolf. 391-392 [doi]
- The accuracy of Android energy measurements for offloading computational expensive tasks: posterQuang Huy Nguyen, Falko Dressler. 393-394 [doi]
- The privacy leaky bucket: your mobile devices: posterJie Chu, Ping Ji. 395-396 [doi]
- Indoor localization using multi-range beaconing: posterMehdi Golestanian, Christian Poellabauer. 397-398 [doi]
- Geo-spatial resource allocation for heterogeneous vehicular communications: posterMatthias Wilhelm, Takamasa Higuchi, Onur Altintas. 399-400 [doi]