default search action
WASA 2015: Qufu, China
- Kuai Xu, Haojin Zhu:
Wireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings. Lecture Notes in Computer Science 9204, Springer 2015, ISBN 978-3-319-21836-6 - Feng Chen, Hong Zhou, Yuchuan Luo, Yingwen Chen:
Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments. 1-8 - Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou:
Multi-proxy Multi-signature Binding Positioning Protocol. 9-18 - Kwang-Cheng Chen, Whai-En Chen, Wu-Chun Chung, Yeh-Ching Chung, Qimei Cui, Cheng-Hsin Hsu, Shao-Yu Lien, Zhisheng Niu, Zhigang Tian, Jing Wang, Liqiang Zhao:
Efficient Network Structure of 5G Mobile Communications. 19-28 - Long Chen, Liusheng Huang, Hongli Xu, Hou Deng, Zehao Sun:
Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs. 29-39 - Yen-Hung Chen, Ching-Neng Lai, Yuan-Cheng Lai, Yang-Chi Li:
A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks. 40-49 - Ying Chen, Changying Li, Jiguo Yu, Hongsong Zhu, Yuyan Sun:
k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks. 50-59 - Jaime Chon, Ross Raymond, Haiyan Wang, Feng Wang:
Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams. 60-69 - Mingwei Dai, Xiaoxia Huang:
Radio Signal Based Device-Free Velocity Recognition. 70-82 - Dongping Deng, Hongwei Du, Xiaohua Jia, Qiang Ye:
Minimum-Cost Information Dissemination in Social Networks. 83-93 - Xiaoheng Deng, Genghao Li, Mianxiong Dong:
Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity. 94-103 - Chenglin Fan, Qing Yang, Binhai Zhu:
Computing an Optimal Path with the Minimum Number of Distinct Sensors. 104-113 - Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang:
ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device. 114-122 - Bing Feng, Zhen Wang, Chi Zhang, Nenghai Yu, Yuguang Fang:
Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs. 123-133 - Li Feng, Jiguo Yu, Xiuzhen Cheng, Shengling Wang:
Impact of a Deterministic Delay in the DCA Protocol. 134-144 - Xia Feng, Chun-yan Li, De-xin Chen, Jin Tang:
EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET. 145-154 - Kathryn Grebel, Duy Dang, Liran Ma, Donnell Payne, Brent Cooper:
iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired. 155-164 - Hongliang He, Pinyi Ren, Qinghe Du, Li Sun:
Estimation Based Adaptive ACB Scheme for M2M Communications. 165-174 - Yanfei He, Yuan Wu, Jiachao Chen, Qinglin Zhao, Weidang Lu:
Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit. 175-189 - Xintao Hong, Hongbin Liang, Zengan Gao:
Adaptive Resource Allocation for Anti-money Laundering Based on SMDP. 190-200 - Xiang Hou, Bin Lin, Rongxi He, Xudong Wang, Tao Yu:
Infrastructure Deployment and Optimization for Cloud-Radio Access Networks. 201-211 - Huaida Hua, Jian Qiu, Shiwei Song, Xizhe Wang, Guojun Dai:
A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks. 212-221 - Jun Huang, Yi Sun, Cong-Cong Xing, Yanxiao Zhao, Qianbin Chen:
A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network. 222-231 - Yan Huo, Yuejia Liu, Xiaoshuang Xing, Xiuzhen Cheng, Liran Ma, Tao Jing:
A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs. 232-242 - Zhefeng Jiang, Shiwen Mao:
Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-Duplex Wireless LANs. 243-252 - Libin Jiao, Guangzhi Zhang, Shenling Wang, Rashid Mehmood, Rongfang Bie:
Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering. 253-262 - Tao Jing, Yating Zhang, Zhen Li, Qinghe Gao, Yan Huo, Wei Zhou:
DRL: A New Mobility Model in Mobile Social Networks. 263-273 - Chengzhe Lai, Rongxing Lu, Dong Zheng:
SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems. 274-283 - Maya Larson, Ruinian Li, Chunqiang Hu, Wei Li, Xiuzhen Cheng, Rongfang Bie:
A Bidder-Oriented Privacy-Preserving VCG Auction Scheme. 284-294 - Maya Larson, Wei Li, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie:
A Secure Multi-unit Sealed First-Price Auction Mechanism. 295-304 - Lei Lei, Huijian Wang, Xuemin (Sherman) Shen, Zhangdui Zhong, Kan Zheng:
Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks. 305-314 - Ji Li, Siyao Cheng, Zhipeng Cai, Qilong Han, Hong Gao:
Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks. 315-324 - Jinguo Li, Yaping Lin, Mi Wen, Chunhua Gu, Bo Yin:
Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing. 325-334 - Luqun Li:
A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control. 335-344 - Yi Li, Lu Zhou, Haojin Zhu, Limin Sun:
Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks. 345-355 - Feilong Lin, Cailian Chen, Cunqing Hua, Xin-Ping Guan:
SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection. 356-365 - Bo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu:
On Computing Multi-Agent Itinerary Planning in Distributed Wireless Sensor Networks. 366-376 - Chang Liu, Chunqing Wu, Wanrong Yu, Baokang Zhao, Zhenqian Feng:
FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication. 377-385 - Chang Lou, Xiaofeng Gao, Fan Wu, Guihai Chen:
Energy-Aware Clustering and Routing Scheme in Wireless Sensor Network. 386-395 - Rong Ma, Zhenfu Cao:
Serial Number Based Encryption and Its Application for Mobile Networks. 396-406 - Yinbin Miao, Jiajia Liu, Jianfeng Ma:
Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds. 407-416 - Zhonghong Ou, Jun Wu, Antti Ylä-Jääski:
Big-Little-Cell Based "Handprint" Positioning System. 417-426 - Deming Pang, Ming Zhu, Gang Hu, Ming Xu:
Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks. 427-436 - Qifan Qi, Zhou Su, Qichao Xu, Jintian Li, Dongfeng Fang, Bo Han:
Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks. 437-445 - Hao Qu, Longjiang Guo, Weiping Zhang, Jinbao Li, Meirui Ren:
Rogue Access Point Detection in Vehicular Environments. 446-456 - Pengbo Si, Qiuran Li, Yanhua Zhang, Yuguang Fang:
Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture. 457-466 - Yipin Sun, Shuhui Chen, Biao Han, Bofeng Zhang, Jinshu Su:
A Novel Location Privacy Mining Threat in Vehicular Internet Access Service. 467-476 - Zehao Sun, Shaojie Tang, He Huang, Liusheng Huang, Zhenyu Zhu, Hansong Guo, Yu-e Sun:
iProtect: Detecting Physical Assault Using Smartphone. 477-486 - Xiao Tang, Pinyi Ren, Qinghe Du, Li Sun:
Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework. 487-496 - Zhu Tang, Zhenqian Feng, Wanrong Yu, Wei Han, Baokang Zhao, Chunqing Wu, Xilong Mao, Feng Chen:
A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks. 497-507 - Chao Wang, Chuanwen Luo, Lili Jia, Qingbo Zhang, Jiguo Yu:
Domatic Partition in Homogeneous Wireless Sensor Networks. 508-517 - Hai-xu Wang, Shaohua Wu, Jing-ran Yang, Chan-juan Ding:
High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity. 518-527 - Hongtao Wang, Qiang Li, Feng Yi, Qi Han, Limin Sun:
Influential Spatial Facility Prediction over Dynamic Objects. 528-538 - Licheng Wang, Yun Pan, Minzheng Jia, Haseeb Ahmad:
A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs. 539-549 - Lixin Wang, C. P. Abubucker, William Washington, Katrina Gilmore:
Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks. 550-560 - Rongrong Wang, Minhui Xue, Kelvin Liu, Haifeng Qian:
Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks. 561-570 - Xiaoming Wang, Yaguang Lin, Lichen Zhang, Zhipeng Cai:
A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks. 571-580 - Yang Wang, Shuang Wu, Xiaofeng Gao, Fan Wu, Guihai Chen:
Efficient Line K-Coverage Algorithms in Mobile Sensor Network. 581-591 - Yingjie Wang, Yingshu Li, Yang Gao, Xiangrong Tong:
A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher. 592-601 - Wei Li, Kai Xing, Jing Xu:
A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks. 602-611 - Lifei Wei, Lei Zhang, Kai Zhang, Mianxiong Dong:
An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud. 612-622 - Xiaoshuang Xing, Hang Liu, Xiuzhen Cheng, Wei Zhou, Dechang Chen:
Cooperative Spectrum and Infrastructure Leasing on TV Bands. 623-633 - Datong Xu, Pinyi Ren, Qinghe Du, Li Sun:
Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System. 634-643 - Dongyang Xu, Pinyi Ren, Qinghe Du, Li Sun:
Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages. 644-653 - Zhonghu Xu, Kai Xing:
Network Reachability Analysis on Temporally Varying Interaction Networks. 654-663 - Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi:
Performance of Target Tracking in Radar Network System Under Deception Attack. 664-673 - Tingting Yang, Chengming Yang, Zhonghua Sun, Hailong Feng, Jiadong Yang, Fan Sun, Ruilong Deng:
Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View. 674-684 - Shanhe Yi, Zhengrui Qin, Qun Li:
Security and Privacy Issues of Fog Computing: A Survey. 685-695 - Xuming Yin, Jinghua Zhu, Yingshu Li, Zhiqiang Wu:
Mobile Data Gathering with Time-Constraints in Wireless Sensor Networks. 696-705 - Kan Yu, Zhi Li, Qiang Li, Jiguo Yu:
A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model. 706-714 - Wenbin Yu, Cailian Chen, Bo Yang, Xin-Ping Guan:
PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks. 715-724 - Luke Zhang, Li Wang, Xiaojiang Du:
Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications. 725-734 - Yizhen Zhang, Guobing Li, Guomei Zhang, Gangming Lyu:
Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks. 735-744 - Qinglin Zhao, Taka Sakurai, Jiguo Yu, Limin Sun:
On the Stable Throughput in Wireless LANs. 745-755 - Zhongyuan Zhao, Mugen Peng, Li Wang, Wenqi Cai, Yong Li, Hsiao-Hwa Chen:
Antenna Selection in Large-Scale Multiple Antenna Systems. 756-766 - Zheng Liu, Xinyu Yang, Peng Zhao, Wei Yu:
Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs. 767-777 - Xi Zhou, Junqi Guo, Shenling Wang:
Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones. 778-787 - Ming Zhu, Jiannong Cao, Deming Pang, Zongjian He, Ming Xu:
SDN-Based Routing for Efficient Message Propagation in VANET. 788-797 - Tongxin Zhu, Xinrui Wang, Siyao Cheng, Zhipeng Cai, Jianzhong Li:
Critical Point Aware Data Acquisition Algorithm in Sensor Networks. 798-808 - Wenchao Li, Jiguo Yu, Dongxiao Yu, Baogui Huang:
Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks. 809-819 - Xueyan Sun, Xiaowu Liu, Shuwen Zhang:
A Simplified Attack-Defense Game Model for NSSA. 820-828 - Shuqiang Wang, Yanyan Shen, Jinxing Hu, Zhe Xuan, Zhe Lu:
Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network. 829-835 - Tian Wang, Zhen Peng, Junbin Liang, Yiqiao Cai, Yonghong Chen, Hui Tian, Bineng Zhong:
Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks. 836-844 - Jipeng Zhou, Xuefeng Wang, Haisheng Tan, Yuhui Deng:
Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks. 845-853
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.