Abstract is missing.
- Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering ProblemsFasheng Wang, Xucheng Li, Mingyu Lu. 1-12 [doi]
- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDDYinshan Liu, Xiaofeng Zhong, Jing Wang 0001, Yang Lan, Atsushi Harada. 13-24 [doi]
- Buffer Occupation in Wireless Social NetworksTuo Yu, Xiaohua Tian, Feng Yang, Xinbing Wang. 25-41 [doi]
- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile DevicesYan Zhu, Di Ma, Shan-Biao Wang, Rong-Quan Feng. 42-53 [doi]
- A Network Forensics System for Information Leak EventsTao Zou, Mansoor Alam, Min Song. 54-63 [doi]
- Maximum Independent Set of Links with a Monotone and Sublinear Power AssignmentChao Ma, Fahad Al-dhelaan, Peng-Jun Wan. 64-75 [doi]
- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing SystemsYang Zhang, Dusit Niyato, Ping Wang. 76-87 [doi]
- A Novel Delay-Resilient Remote Memory Attestation for Smart GridXiaofei He, Xinyu Yang, Rui Li, Qingyu Yang. 88-99 [doi]
- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground MinesSong Li, Yanjing Sun, Rufei Ma. 100-109 [doi]
- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh NetworksMin Song, XiaoHua Xu. 110-120 [doi]
- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum AllocationRuihao Zhu, Fan Wu, Guihai Chen. 121-134 [doi]
- A Context-Aware MAC Protocol for VANETsQiu Xu, Haikuan Fan, Shuangfei Guo, Xiaoqiang Xiao. 135-150 [doi]
- A Balance Storage Nodes Assignment for Wireless Sensor NetworksZhigang Li, GeMing Xia, Weiwei Chen, Qing Li. 151-162 [doi]
- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence TheoryChenglin Miao, Liusheng Huang, Weijie Guo, Hongli Xu. 163-174 [doi]
- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNsZiwei Liu, Chuanbo Wei, Yang Ma, Hui Li, Xiaoguang Niu, Lina Wang. 175-185 [doi]
- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic NetworksYun Liu, Bocheng Zhu. 186-195 [doi]
- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor NetworksTao Xiang, Chenyun Yu, Fei Chen. 196-205 [doi]
- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater NetworksHaining Mo, Lina Pu, Yibo Zhu, Zheng Peng, Zaihan Jiang, Jun-Hong Cui. 206-220 [doi]
- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio SignalsShuyu Shi, Stephan Sigg, Yusheng Ji. 221-232 [doi]
- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical ViewChuan Huang, Xu Chen, Junshan Zhang. 233-243 [doi]
- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped ChannelsWei Zhao, Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato. 244-254 [doi]
- Patient's Motion Recognition Based on SOM-Decision TreeWei Yu, Hongli Yan, Junqi Guo, Rongfang Bie. 255-268 [doi]
- Range-Free Mobile Node Localization Using Static AnchorKaushik Mondal, Partha Sarathi Mandal. 269-284 [doi]
- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor NetworkJinbao Li, Jian Yang, Yanqing Zhang, Longjiang Guo, Yingshu Li. 285-299 [doi]
- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App RecommendationXiao Xia, Xiaodong Wang, Xingming Zhou. 300-312 [doi]
- An Urban Area-Oriented Traffic Information Query Strategy in VANETsXinjing Wang, Longjiang Guo, Chunyu Ai, Jinbao Li, Zhipeng Cai. 313-324 [doi]
- Navigation for Indoor Mobile Robot Based on Wireless Sensor NetworkYunzhou Zhang, Shuo Wang, Guanting Fan, Jixian Zhou. 325-336 [doi]
- iMac: Strategy-Proof Incentive Mechanism for Mobile CrowdsourcingZhenni Feng, Yanmin Zhu, Lionel M. Ni. 337-350 [doi]
- Social Welfare Maximization in Participatory Smartphone SensingTong Liu, Yanmin Zhu. 351-365 [doi]
- An Optimal Solution for Round Rotation Time Setting in LEACHHongyan Zhang, Xin Li, Xiumei Fan. 366-376 [doi]
- UPC-MAC: A Power Control MAC Protocol for Underwater Sensor NetworksYishan Su, Yibo Zhu, Haining Mo, Jun-Hong Cui, Zhigang Jin. 377-390 [doi]
- FMAC for Coexisting Ad Hoc Cognitive Radio NetworksYanxiao Zhao, Min Song, Chunsheng Xin. 391-401 [doi]
- Effective RSS Sampling for Forensic Wireless LocalizationYinjie Chen, Zhongli Liu, Xinwen Fu, Wei Zhao. 402-413 [doi]
- An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor NetworksXin Tan, Zhi Sun. 414-425 [doi]
- Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor NetworksRuobing Jiang, Yanmin Zhu, Hongjian Wang, Min Gao, Lionel M. Ni. 426-439 [doi]
- Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative JammingYantian Hou, Ming Li. 440-453 [doi]
- Photo Forensics on Shanzhai Mobile PhoneGang Zhou, Yanbin Tang, Jun-bin Fang, Zoe L. Jiang, K. P. Chow, S. M. Yiu, Lucas Chi Kwong Hui, RongSheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu. 454-464 [doi]
- Local Information Storage Protocol for Urban Vehicular NetworksBo Xie, Yingwen Chen, Ming Xu, Yuangang Wang. 465-473 [doi]
- Maximum Independent Set of Links with Power ControlChao Ma, Fahad Al-dhelaan, Peng-Jun Wan. 474-485 [doi]
- Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor NodesMeng Yang, Donghyun Kim, Deying Li, Wenping Chen, Hongwei Du, Alade O. Tokuta. 486-497 [doi]
- The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell NetworkFan Yang, Bo Yang 0006, Xinping Guan. 498-511 [doi]
- Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell NetworksTao Jing, Fan Zhang, Liran Ma, Wei Li, Xuhao Chen, Yan Huo. 512-523 [doi]
- Social Communications Assisted Epidemic Disease Influence MinimizationBowu Zhang, Pei Li, Xiuzhen Cheng, Rongfang Bie, Dechang Chen. 524-534 [doi]