default search action
International Journal of Communication Systems, Volume 29
Volume 29, Number 1, January 2016
- Pavel Lafata:
Investigation of phantom circuit benefits for next generation xDSL systems. 5-15 - Xidong Wang, Wei Zheng, Zhaoming Lu, Xiangming Wen, Wei Li:
Dense femtocell networks power self-optimization: an exact potential game approach. 16-32 - Yiming Jiang, Julong Lan, Zhiming Wang, Yuanyuan Deng:
Embedding and reconfiguration algorithms for service aggregation in network virtualization. 33-46 - Vinícius Duarte Lima, Aldebaro Klautau, João Costa, Klas Ericson, Antoni Fertner, Claudomiro Sales:
A wavelet-based expert system for digital subscriber line topology identification. 47-63 - Ronghua Shang, Kun Zhang, Licheng Jiao, Jianshe Wu:
Discrete polynary coding immune clonal selection-based joint subcarrier and power allocation in uplink cognitive OFDM network. 64-83 - Shiyong Li, Wei Sun, Changchun Hua:
Optimal resource allocation for heterogeneous traffic in multipath networks. 84-98 - Parul Puri, Parul Garg, Mona Aggarwal:
Analysis of spectrally efficient two-way relay assisted free space optical systems in atmospheric turbulence with path loss. 99-112 - Hua Li, Cunqing Hua, Cailian Chen, Xinping Guan:
ADS-B aided robust relay selection for cooperative communications in aircraft approach. 113-129 - Zhijun Wu, Ran Hu, Meng Yue:
Flow-oriented detection of low-rate denial of service attacks. 130-141 - Tadesse Ghirmai:
Design of reduced complexity feedback precoding for MIMO-OFDM. 142-154 - Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang, Cai Fu:
A multi-objective optimization model based on immune algorithm in wireless mesh networks. 155-169 - Geetha Dundesh Devanagavi, N. Nalini, Rajashekhar C. Biradar:
Secured routing in wireless sensor networks using fault-free and trusted nodes. 170-193 - Ana Gomes, Marcio Monteiro, Boris Dortschy, Aldebaro Klautau:
An hybrid evolutionary multiobjective algorithm for multiuser margin maximization in DSL. 194-209 - Yanjing Sun, Jianguang Sun, Fangfang Zhao, Zhuoxian Hu:
Delay constraint multipath routing for wireless multimedia ad hoc networks. 210-225
Volume 29, Number 2, January 2016
- Izzet F. Senturk, Kemal Akkaya, Shadi Janansefat:
Towards realistic connectivity restoration in partitioned mobile sensor networks. 230-250 - Abdulsalam A. Yayah, Yahaya Coulibaly, Abdul Samad Ismail, George N. Rouskas:
Hybrid offset-time and burst assembly algorithm (H-OTBA) for delay sensitive applications over optical burst switching networks. 251-261 - Garima Mishra, Selvamuthu Dharmaraja, Subrat Kar:
Reducing session establishment delay using timed out packets in SIP signaling network. 262-276 - Yi-Ning Liu, Chi Cheng, Tao Jiang, Chin-Chen Chang:
A practical lottery using oblivious transfer. 277-282 - Wun-She Yap, Bok-Min Goi:
Forgery attacks of an identity-based multi-proxy signature scheme. 283-289 - Chin-Chen Chang, Ting-Fang Cheng, Wei-Yuan Hsueh:
A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. 290-306 - Emmanouil Skondras, Aggeliki Sgora, Angelos Michalas, Dimitrios D. Vergados:
An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method. 307-329 - M. Abbasi-Jannatabad, H. Khoshbin:
Cooperative beamforming and relay selection in cognitive radio systems. 330-340 - Jian Chen, Xiaokang Zhou, Qun Jin:
Gradually adaptive recommendation based on semantic mapping of users′ interest correlations. 341-361 - Yongbin Wang, Hong Ji, Heli Zhang:
Spectrum-efficiency enhancement in small cell networks with biasing cell association and eICIC: An analytical framework. 362-377 - Subhas Chandra Misra, Virender Singh, Naveen Kumar Jha, Sandip Bisui:
Modeling privacy issues in distributed enterprise resource planning systems. 378-401 - Stevan M. Berber:
Noise-based spreading in code division multiple access systems for secure communications. 402-416 - Sándor Imre:
Modified quantum superdense coding for distributed communications. 417-423
Volume 29, Number 3, February 2016
- Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Jui-Tsun Hung, Chun-Pin Shao:
Traffic diversity and code coverage: a preliminary analysis. 428-440 - Saru Kumari, Muhammad Khurram Khan, Xiong Li, Fan Wu:
Design of a user anonymous password authentication scheme without smart card. 441-458 - Jie Zhou, Hao Jiang, Hisakazu Kikuchi:
Geometry-based statistical channel model and performance for MIMO antennas. 459-477 - Qi Xie, Na Dong, Duncan S. Wong, Bin Hu:
Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. 478-487 - Yawgeng A. Chau, Mostafa Al-Harbawi:
General switch-and-examine relaying for demodulate-and-forward cooperative diversity. 488-506 - Xu Li, Huarui Yin, Ying Xu, Guo Wei:
Inter-cell interference mitigation based on joint beamforming. 507-521 - Nedo Celandroni, Franco Davoli, Erina Ferro, Alberto Gotta:
On elastic traffic via contention resolution diversity slotted aloha satellite access. 522-534 - Xiang Feng, Xiaoting Liu, Huiqun Yu:
A new internet of things group search optimizer. 535-552 - Xiaoping Jin, Xinqiang Han, Ning Jin, Youming Li, Zhengquan Li, Xiuming Wang:
Differential space-time network coding in MIMO two-way relay channel network. 553-566 - Siqi Lu, Jinhua Zhao, Qingfeng Cheng:
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction. 567-578 - Xiangdong Jia, Pengfei Deng, Longxiang Yang, Hongbo Zhu:
Study on cognitive DF relaying cooperation with the mutual interference between primary and secondary users over Nakagami-m fading channels. 579-601 - Alireza Naghizadeh, Samaneh Berenjian, Ehsan Meamari, Reza Ebrahimi Atani:
Structural-based tunneling: preserving mutual anonymity for circular P2P networks. 602-619 - Sungmook Lim, Kyunbyoung Ko:
Performance evaluation of HDAF relaying systems for pilot and data symbol burst transmission over quasi-static Rayleigh fading channels. 620-637 - Yi-Wei Ma, Jiann-Liang Chen, Fan-Sheng Chang, Chia-Lun Tang:
Novel fingerprinting mechanisms for indoor positioning. 638-656
Volume 29, Number 4, March 2016
- Biao Zhou, Changqiang Jing, Youngok Kim:
Power boosting factor determination in impulse postfix-OFDM-based positioning system. 660-670 - Silvio Sampaio, Pedro F. Souto, Francisco Vasques:
A review of scalability and topological stability issues in IEEE 802.11s wireless mesh networks deployments. 671-693 - Zhikui Chen, Ruochuan Ling, Chung-Ming Huang, Xu Zhu:
A scheme of access service recommendation for the Social Internet of Things. 694-706 - Chenkai Yang, Liusheng Huang, Hongli Xu, Bing Leng:
A scale-independent way for differential estimation in dynamic radio frequency identification systems. 707-721 - Aditi Chatterjee, Palaniandavar Venkateswaran:
An efficient statistical approach for time synchronization in wireless sensor networks. 722-733 - Khaled M. Gharaibeh, Ayman S. Al-Zayed:
Performance of feed-forward linearizers of power amplifiers in OFDM systems under complex gain errors. 734-747 - Hsin-Ying Liang, Hung-Chi Chu, Chuan-Bi Lin:
Peak-to-average power ratio reduction of orthogonal frequency division multiplexing systems using modified tone reservation techniques. 748-759 - Jun Liu, Lianglun Cheng, Tao Wang, Jianhua Wang:
Sparse deployment scheme in mobile sensor networks with prioritized event area. 760-771 - Min-Xiou Chen, Fu-Hsing Sung:
Integrated service discovery architecture for heterogeneous networks. 772-786 - Jerzy Domzal, Robert Wójcik, Piotr Cholda, Rafal Stankiewicz, Andrzej Jajszczyk:
Efficient congestion control mechanism for flow-aware networks. 787-800 - Jagadeesh Kakarla, Banshidhar Majhi, Ramesh Babu Battula:
IAMMAC: an interference-aware multichannel MAC protocol for wireless sensor-actor networks. 801-822 - Deepak P. M., C. K. Ali:
Low-complexity inter-carrier interference cancelation scheme for SC-IFDMA system. 823-835
Volume 29, Number 5, March 2016
- Niranjan Kumar Ray, Ashok Kumar Turuk:
A technique to improve network lifetime in mobile ad hoc networks. 840-858 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
A short ID-based proxy signature scheme. 859-873 - Ta-Te Lu, Sheng-Cheng Yeh, Shang-Hung Wu:
Actualizing real-time indoor positioning systems using plane models. 874-892 - Uche A. K. Chude-Okonkwo, Chollette C. Chude-Olisah, Solomon Nunoo, Razal Nga:
Characterization and parameterization of dynamic wireless channels over long duration using evolutionary channel parameters. 893-915 - Deepak Kumar Rout, Kiran Kumar Gurrala, Susmita Das:
Performance of amplify forward and decode forward cooperative strategies for body surface communications in UWB Body Area Networks. 916-928 - M. Pounambal, P. Venkata Krishna:
Efficient channel assignment method for multimedia traffic in wireless mesh networks. 929-941 - Jiajun Sun:
Marginal quality-based long-term incentive mechanisms for crowd sensing. 942-958 - Mohammad Reza Majma, Sanaz Almassi, Hamid Shokrzadeh:
SGDD: self-managed grid-based data dissemination protocol for mobile sink in wireless sensor network. 959-976 - Haiquan Wang, Baofeng Zhao, Lei Hong:
Criterions of designing codebooks and a relay selection scheme for a relay network. 977-991 - Zhiqiang Ruan, Haibo Luo, Zhide Chen:
Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks. 992-1011 - JinWoo Yoo, Insun Song, JaeWook Shin, PooGyeon Park:
A variable step-size diffusion affine projection algorithm. 1012-1025 - Mustapha Réda Senouci, Daoud Bouguettouche, Farouk Souilah, Abdelhamid Mellouk:
Static wireless sensor networks deployment using an improved binary PSO. 1026-1041
Volume 29, Number 6, April 2016
- Suhail Al Madani, Balqies Sadoun, Omar Al-Bayari:
Continuously operating reference station and surveying applications in KSA. 1046-1056 - Seyed Akbar Mostafavi, Mehdi Dehghan:
Game-theoretic auction design for bandwidth sharing in helper-assisted P2P streaming. 1057-1072 - Shixun Wu, Dengyuan Xu, Jin Tan, Kai Xu, Honggang Wang:
Two base station location techniques with adjusted measurements in circular scattering environments. 1073-1083 - Richa Bhatia, Ajay Kumar Sharma, Jyoti Saxena:
Comparative investigations of DWDM transmission system with PMD for different orthogonally modulated signals at 80 Gb/s. 1084-1090 - Mohamed Manoufali, Peng-Yong Kong, Shihab Jimaa:
Effect of realistic sea surface movements in achieving full-view coverage camera sensor network. 1091-1115 - Jorge Torres, Fidel Hernández, Youssef El Hajj Shehadeh:
Timing synchronization method for pilot-based coherent detection. 1116-1127 - Gosan Noh, Seungjae Bahng, Youn-Ok Park:
BER minimization for dual-polarized wireless systems with polarization-domain rotation. 1128-1137 - Long Chen, Liusheng Huang, Hongli Xu, Yang Du:
Queueing analysis for preemptive transmission in underlay CRNs. 1138-1155 - Ginu Thomas, Boon-Chong Seet:
Multi-interface cognitive radio for enhanced routing in multi-hop cellular networks. 1156-1186 - Hamidreza Mahini, Mehdi Dehghan, Hamidreza Navidi, Amir Masoud Rahmani:
GaMe-PLive: a new game theoretic mechanism for P2P live video streaming. 1187-1203
Volume 29, Number 7, May 2016
- Abhijit Bhowmick, Sanjay Dhar Roy, Sumit Kundu:
Sensing throughput trade-off for an energy efficient cognitive radio network under faded sensing and reporting channel. 1208-1218 - Saurabh Aggarwal, Joy Kuri, Rahul Vaze:
Social optimum in social groups with give-and-take criterion. 1219-1234 - Mehrdad Agha Mohammad Ali Kermani, Alireza Aliahmadi, Robert A. Hanneman:
Optimizing the choice of influential nodes for diffusion on a social network. 1235-1250 - Chi Lin, Guowei Wu, Tie Qiu, Jing Deng:
A low-cost node capture attack algorithm for wireless sensor networks. 1251-1268 - Amirhosein Moravejosharieh, Jaime Lloret:
A survey of IEEE 802.15.4 effective system parameters for wireless body sensor networks. 1269-1292 - Minghe Mao, Ning Cao, Yunfei Chen, Hao-Hua Chu:
Novel noncoherent detection for multi-hop amplify-and-forward relaying systems. 1293-1304 - Özgür Ergül, Fatih Alagöz, Özgür B. Akan:
Throughput maximization in electromagnetic energy harvesting cognitive radio sensor networks. 1305-1322 - K. Selvaraj, P. Ganeshkumar, M. Anandaraj:
Iterative MMSE equalization and CFO compensation for the uplink SC-FDMA transmission. 1323-1337
Volume 29, Number 8, May 2016
- Chun-Chuan Yang, Jeng-Yueng Chen, Yi-Ting Mai, Hsieh-Hua Liu:
Integrated power saving for relay node and user equipment in LTE-A. 1342-1364 - Konstantinos Deltouzos, Ilias Gkortsilas, Nikolaos Efthymiopoulos, Maria Efthymiopoulou, Spyros G. Denazis:
SeekStream: adapting to dynamic user behavior in P2P video-on-demand. 1365-1394 - Shivam Gupta, Subhas C. Misra:
Compliance, network, security and the people related factors in cloud ERP implementation. 1395-1419 - S. Senthilkumar, C. Geetha Priya:
Beamforming-based feature extraction and RVM-based method for attacker node classification in CRN. 1420-1438 - Pramod Kumar, Ashvini Chaturvedi:
Probabilistic query generation and fuzzy c-means clustering for energy-efficient operation in wireless sensor networks. 1439-1450 - Mohammed W. Baidas, Masoud M. Afghah:
Energy-efficient partner selection in cooperative wireless networks: a matching-theoretic approach. 1451-1470
Volume 29, Number 9, June 2016
- T. H. Kim, J. W. Kim:
Partitioned scheduling for sphere decoding with runtime constraints for practical MIMO communication systems. 1474-1481 - Guozhen Cheng, Hongchang Chen, Hongchao Hu, Julong Lan:
Dynamic switch migration towards a scalable SDN control plane. 1482-1499 - Laurent Yamen Njilla, Niki Pissinou, Kia Makki:
Game theoretic modeling of security and trust relationship in cyberspace. 1500-1512 - Zhiqun Hu, Zhaoming Lu, Xiangming Wen, Wenpeng Jing:
QoE-based pseudo heartbeat message compression mechanism for future wireless network. 1513-1528 - SK Hafizul Islam, Mohammad S. Obaidat, Ruhul Amin:
An anonymous and provably secure authentication scheme for mobile user. 1529-1544 - Leonardo Daniel Sánchez Martínez, Víctor Manuel Ramos Ramos, Oscar Ledesma:
Efficient detection of missing tags for passive RFID systems. 1545-1567 - P. Ganeshkumar, K. Selvaraj, M. Anandaraj, K. P. Vijayakumar:
Iterative nonlinear detection for SFBC SC-FDMA uplink MIMO transmission systems. 1568-1581
Volume 29, Number 10, July 2016
- Mehdi Ghamari Adian, Hassan Aghaeinia:
Resource allocation in MIMO-OFDM-based cooperative cognitive radio networks: optimal and suboptimal low complexity approaches. 1586-1604 - Soumaya Hamouda, Sourour El-Bessi, Sami Tabbane:
New coalition formation game for spectrum sharing in cognitive radio networks. 1605-1619 - Niels Sluijs, Tim Wauters, Chris Develder, Filip De Turck, Piet Demeester, Bart Dhoedt:
Using topology information for quality-aware Peer-to-Peer multilayer video streaming. 1620-1644 - Mao Yang, Yong Li, Bo Li, Depeng Jin, Sheng Chen:
Service-oriented 5G network architecture: an end-to-end software defining approach. 1645-1657 - Antonios Sarigiannidis, Petros Nicopolitidis:
Addressing the interdependence in providing fair and efficient bandwidth distribution in hybrid optical-wireless networks. 1658-1682 - Tarek Bouali, Sidi-Mohammed Senouci, Hichem Sedjelmaci:
A distributed detection and prevention scheme from malicious nodes in vehicular networks. 1683-1704
Volume 29, Number 11, July 2016
- SK Hafizul Islam:
Design and analysis of an improved smartcard-based remote user password authentication scheme. 1708-1719 - Mohsen Maadani, Seyed Ahmad Motamedi:
A comprehensive DCF performance analysis in noisy industrial wireless networks. 1720-1739 - Chuan-Ching Sue, Kai-Chun Chuang, Chi-Yu Hsu:
Access control mechanism using flexible multi-layer structure for mesh-based P2P live streaming systems. 1740-1760 - Binod Prasad, Abhijit Bhowmick, Sanjay Dhar Roy, Sumit Kundu:
Performance of cognitive relay network with novel hybrid spectrum access schemes with imperfect CSI. 1761-1776 - Chia-Chang Hu, Bo-Hung Chen, Yi-Chi Kao:
Achievable sum-rate maximization using relay/antenna selection for MIMO two-way AF relaying with channel uncertainties. 1777-1789 - Francesco Chiti, Romano Fantacci, Laura Pierucci:
Dynamic multicast link selections for buffer-aided relaying networks. 1790-1804 - Yifei Wei, Chenying Ren, Mei Song, F. Richard Yu:
The offloading model for green base stations in hybrid energy networks with multiple objectives. 1805-1816
Volume 29, Number 12, August 2016
- Sweta Jain, Meenu Chawla, Vasco N. G. J. Soares, Joel J. P. C. Rodrigues:
Enhanced fuzzy logic-based spray and wait routing protocol for delay tolerant networks. 1820-1843 - Haijian Zhang, Didier Le Ruyet, Daniel Roviras, Hong Sun:
Polyphase filter bank based multi-band spectrum sensing in cognitive radio systems. 1844-1862 - Mingwu Zhang, Yong Xia, Ou Yuan, Kirill Morozov:
Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services. 1863-1872 - Tung-Chou Chen, Tsui-Tsai Lin:
Blind carrier frequency offset mitigation in space-time block-coded multicarrier code division multiple access uplink transmission. 1873-1888 - Sung-Man Kim, Hyun-Jun Lee:
Half-duplex visible light communication using an LED as both a transmitter and a receiver. 1889-1895 - Yantao Li, Gang Zhou, Daniel Leong:
An energy-efficient framework for ubiquitous phone access. 1896-1906 - Abolfazl Falahati, Nader Sanandaji:
Nested and interleaved direct sequence spread spectrum to enhance CDMA security and bit error rate performance. 1907-1915 - Manjith Ramasamy:
A new feature extraction and attacking node classification framework using PDCFE-HPSMM model in cognitive radio networks. 1916-1935
Volume 29, Number 13, September 2016
- Amit Kumar Mandal, Sudip Misra, Mihir Kumar Dash, Tamoghna Ojha:
Performance analysis of distributed underwater wireless acoustic sensor networks systems in the presence of internal solitons. 1940-1955 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:
An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. 1956-1967 - Kun Ding, Yun Liu, Hsin-Hung Cho, Han-Chieh Chao, Timothy K. Shih:
Cooperative detection and protection for Interest flooding attacks in named data networking. 1968-1980 - Xia Heng, Zhongmin Wang, Jiacun Wang:
Human activity recognition based on transformed accelerometer data from a mobile phone. 1981-1991 - Sudip Misra, Sumit Goswami, Chaynika Taneja, Anandarup Mukherjee:
Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks. 1992-2014 - Sourabh Bharti, Kiran Kumar Pattanaik:
Gravitational outlier detection for wireless sensor networks. 2015-2027 - Rafael Freitas Reale, Romildo Martins da Silva Bezerra, Joberto S. B. Martins:
Applying autonomy with bandwidth allocation models. 2028-2040 - Mohammed W. Baidas, Emad Alsusa, Khairi A. Hamdi:
Power allocation over time-varying multiple-access interference channels. 2041-2058
Volume 29, Number 14, September 2016
Editorial
- Jun Guo, Sung Ho Cho, Xiaoming Fu, Nirwan Ansari, Hong Ji:
Mobile internet: content, security and terminal. 2062-2064
- Georgios Aristomenopoulos, Vassilios Kaldanis, Giannis Katsaros, Symeon Papavassiliou:
Experimentally driven quality of experience-aware multimedia content delivery in modern wireless networks. 2065-2083 - Yumei Wang, Mengyao Sun, Kaiyu Wang, Lin Zhang:
Quality of experience estimation with layered mapping for hypertext transfer protocol video streaming over wireless networks. 2084-2099 - Yoonsuk Kang, Yong-Yeon Jo, Jaehyuk Cha, Sang-Wook Kim, Youngkyun Shin:
The uFLIP benchmark revisited for evaluating SSDs. 2100-2111 - Xi Li, Heli Zhang, Ke Wang:
Toward mobile Internet-based layered vehicular networks with efficient access management. 2112-2133 - Weiran Xu, Chunyun Zhang:
Trigger word mining for relation extraction based on activation force. 2134-2146 - Lei Li, Xin Lin, Yue Zhai, Caixia Yuan, Yanquan Zhou, Jiayin Qi:
User communities and contents co-ranking for user-generated content quality evaluation in social networks. 2147-2168 - Yuanyuan Qiao, Jie Yang, Haiyang He, Yihang Cheng, Zhanyu Ma:
User location prediction with energy efficiency model in the Long Term-Evolution network. 2169-2187
Volume 29, Number 15, October 2016
- Haobo Qing, Yuanan Liu, Gang Xie:
Smart antenna-assisted spectrum sensing for robust detection in cognitive radio networks. 2192-2204 - Qimei Cui, Yulong Shi, Xuefei Zhang, Xiaofeng Tao:
Cooperative wireless localization based on weighting for vector-addition error. 2205-2226 - Nguyen Huu Thanh, Doan Van Tung, Thu Ngo Quynh, Nguyen Canh Nam, Kumbesan Sandrasegaran:
Joint scheduling and mapping in support of downlink fairness and spectral efficiency in ieee 802.16e OFDMA system. 2227-2248 - Junyong Chen, Zhiping Shen, Jun Zhong:
Asymptotic design of quantization and bit allocation for distributed estimation in wireless sensor networks. 2249-2261 - Abhijit Bhowmick, Sanjay Dhar Roy, Sumit Kundu:
Joint impact of sensing time and IED parameter on the performance of an energy efficient cognitive radio system. 2262-2278 - Abderrahim Chariete, Mohamed Bakhouya, Ahmed Nait-Sidi-Moh, Wafaa Ait-Cheik-Bihi, Jaafar Gaber, Raed Kouta, Maxime Wack, Pascal Lorenz:
A study of users' acceptance and satisfaction of emergency call service. 2279-2291 - Wen-Lin Yang, Chun-Tao Yang, Yu-Chung Huang:
Optimal and heuristic algorithms for all-optical group multicast in resource-constrained WDM networks. 2292-2312 - Taha Landolsi, Aly F. Elrefaie:
Effects of pointing errors and channel fading on the performance of free-space optically-preamplified PPM systems. 2313-2324
Volume 29, Number 16, November 2016
Editorial
- Zheng Yan, Valtteri Niemi, Laurence T. Yang:
Key technologies for 5G, the next generation of mobile networks and services. 2328-2329
- Ricardo Tadashi Kobayashi, Taufik Abrão:
Cooperative multi-cellular large MIMO over asynchronous channel training. 2330-2348 - Xin Huang, Xiong Gao, Zheng Yan:
Security protocols in body sensor networks using visible light communications. 2349-2363 - Meikang Qiu, Diqiu Cao, Hai Su, Keke Gai:
Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G. 2364-2374 - Xi Yin, Binxing Fang, Shuyuan Jin, Meikang Qiu, Athanasios V. Vasilakos, Yongjun Xu:
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G. 2375-2387 - Christos Bouras, Georgios Diles, Vasileios Kokkinos, Andreas Papazois:
Transmission optimizing on dense femtocell deployments in 5G. 2388-2402 - Haodong Guo, Ling Chen, Gencai Chen, Mingqi Lv:
Smartphone-based activity recognition independent of device orientation and placement. 2403-2415 - Chen Yu, Zhongqiu Tu, Dezhong Yao, Feng Lu, Hai Jin:
Probabilistic routing algorithm based on contact duration and message redundancy in delay tolerant network. 2416-2426 - Fang Tian, Haixiao Liu, Bin Song, Hao Qin, Guangliang Ren:
Belief propagation-based compressed video sensing for mobile Internet. 2427-2438
Volume 29, Number 17, November 2016
- SK Hafizul Islam, Muhammad Khurram Khan:
Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. 2442-2456 - Rong Geng, Zhaolong Ning, Ning Ye:
A load-balancing and coding-aware multicast protocol for mobile ad hoc networks. 2457-2470 - Mohsen Toorani:
Security analysis of the IEEE 802.15.6 standard. 2471-2489 - Bharathi Retnaswamy, Krishna Kumar Ponniah:
A new ontology-based multi agent framework for intrusion detection. 2490-2502 - Ramesh Babu Battula, Manoj Singh Gaur, Dinesh Gopalani:
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network. 2503-2516 - Chih-Chiang Wang, Ying-Dar Lin:
CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems. 2517-2533 - Hwang-Cheng Wang, Isaac Woungang, Kuo-Chang Ting, Chih-Cheng Tseng, Fang-Chang Kuo, Hung Te Huang:
Co-tier downlink interference management in dense femtocell networks. 2534-2541 - Juncheng Jia, Dajin Wang, Zhengqiu He, Jianxi Fan, Shukui Zhang, Jin Wang, Jianfeng Yan:
In-band bootstrapping in database-driven multi-hop cognitive radio networks. 2542-2554 - Esraa Abd El-Khaleq, Yasmine El-Sayed, Tawfik Ismail, Hassan Mostafa:
Electrical and optical clock and data recovery in optical access networks: a comparative study. 2555-2564
Volume 29, Number 18, December 2016
- Wen-Tzu Chen:
An efficient RFID anticollision algorithm using early adjustment of frame length. 2568-2579 - Hamid Reza Ghaeini, Behzad Akbari, Behrang Barekatain, Alicia Triviño-Cabrera:
Adaptive video protection in large scale peer-to-peer video streaming over mobile wireless mesh networks. 2580-2603 - Jagadeesh Kakarla, Banshidhar Majhi, Ramesh Babu Battula:
A delay and energy aware coordination mechanism for WSAN. 2604-2621 - Sakshi Aneja, Sanjay Sharma:
Multilevel space-time trellis coded cooperation with channel state information at transmitter. 2622-2631 - Mohammad Kazemi, Hassan Aghaeinia:
A lower bound on achievable rate of MRT precoding in multicell multiuser massive MIMO networks with Rician flat fading. 2632-2649 - Mohammed Aliyu Gadam, Chee Kyun Ng, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim:
Hybrid channel gain prioritized access-aware cell association with interference mitigation in LTE-Advanced HetNets. 2650-2668 - Peng He, Yuming Mao, Qiang Liu, Kun Yang:
Improving reliability performance of diffusion-based molecular communication with adaptive threshold variation algorithm. 2669-2680
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.