Abstract is missing.
- On tracking multiple indistinguishable targetsYe Zhu, Anil Vikram, Huirong Fu. 1-9 [doi]
- Correlating mobility with social encounters: Distributed localization in sparse mobile networksJunbo Zhao, Yanmin Zhu, Lionel M. Ni. 10-18 [doi]
- DHT-based localized service discovery in wireless mesh networksHanno Wirtz, Tobias Heer, Martin Serror, Klaus Wehrle. 19-28 [doi]
- Mobile barrier coverage for dynamic objects in wireless sensor networksLinghe Kong, Yanmin Zhu, Min-You Wu, Wei Shu. 29-37 [doi]
- RSAA: Reliable Splitting Aware ALOHA to capture passing tagsLei Kang, Chen Qian, Lionel M. Ni. 38-46 [doi]
- Complete and fast unknown tag identification in large RFID systemsXuan Liu, Shigeng Zhang, Kai Bu, Bin Xiao. 47-55 [doi]
- A framework for frameless TDMA using slot chainsGentian Jakllari, Mike Neufeld, Ram Ramanathan. 56-64 [doi]
- Fast identification of mobile RFID tagsDavid Benedetti, Gaia Maselli, Chiara Petrioli. 65-74 [doi]
- Pro-Energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networksAlessandro Cammarano, Chiara Petrioli, Dora Spenza. 75-83 [doi]
- Collaborative mobile charging for sensor networksSheng Zhang, Jie Wu 0001, Sanglu Lu. 84-92 [doi]
- ZigBee-assisted Power Saving Management for mobile devicesHua Qin, Wensheng Zhang 0001. 93-101 [doi]
- SmartMote: Energy and VoI aware solar-powered sensor network design for environment monitoringShaoJie Tang, Cheng Bo, Xiang-Yang Li, Yunhao Li, XiaoHua Xu, Jing Yuan. 102-110 [doi]
- Netbrick: A high-performance, low-power hardware platform for wireless and hybrid sensor networksCesare Alippi, Romolo Camplani, Manuel Roveri, Gabriele Viscardi. 111-117 [doi]
- LOOP: A location based routing scheme for opportunistic networksShanshan Lu, Yanliang Liu, Yonghe Liu, Mohan Kumar. 118-126 [doi]
- A scalable analytical framework for deriving optimum scheduling and routing in underwater sensor networksFrancesco Lo Presti, Chiara Petrioli, Roberto Petroccia, Ariona Shashaj. 127-135 [doi]
- VICO: A framework for configuring indoor visible light communication networksYiyang Li, Leijie Wang, Jianxia Ning, Konstantinos Pelechrinis, Srikanth V. Krishnamurthy, Zhengyuan Xu. 136-144 [doi]
- End-to-end fairness over non-convex capacity region in IEEE 802.11-based wireless networksJia Bai, Fan Qiu, Yuan Xue. 145-154 [doi]
- Optimizations for route discovery in asynchronous duty-cycling wireless networksLei Tang, Yanjun Sun, Omer Gurewitz, David B. Johnson. 155-163 [doi]
- Credit routing for source-location privacy protection in wireless sensor networksZongqing Lu, Yonggang Wen. 164-172 [doi]
- Enhancing wireless communication privacy with artificial fadingTing Wang, Yaling Yang. 173-181 [doi]
- You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial NetworksBogdan Carbunar, Rahul Potharaju. 182-190 [doi]
- Social closeness based clone attack detection for mobile healthcare systemYanzhi Ren, Yingying Chen, Mooi Choo Chuah. 191-199 [doi]
- Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networksRahul Potharaju, Md. Endadul Hoque, Cristina Nita-Rotaru, Saswati Sarkar, Santosh S. Venkatesh. 200-208 [doi]
- CodeMP: Network coded multipath to support TCP in disruptive MANETsChien-Chia Chen, Guruprasad Tahasildar, Yu-Ting Yu, Joon-Sang Park, Mario Gerla, M. Y. Sanadidi. 209-217 [doi]
- Data elevators: Applying the bundle protocol in Delay Tolerant Wireless Sensor NetworksWolf-Bastian Pöttner, Felix Büsching, Georg von Zengen, Lars C. Wolf. 218-226 [doi]
- Eagle eye: A dual-radio architecture in delay tolerant networksLinghe Kong, Tianji Li, Min-You Wu, Wei Shu. 227-235 [doi]
- Sensory-data-enhanced authentication for RFID-based access control systemsYuanchao Shu, Yu Gu 0001, Jiming Chen. 236-244 [doi]
- Detecting spectrum misuse in wireless networksKefeng Tan, Kai Zeng, Daniel Wu, Prasant Mohapatra. 245-253 [doi]
- Enhancing the accuracy of radio tomographic imaging using channel diversityOssi Kaltiokallio, Maurizio Bocca, Neal Patwari. 254-262 [doi]
- The Monitoring Core: A framework for sensor security application developmentMarco Valero, A. Selcuk Uluagac, S. Venkatachalam, K. C. Ramalingam, Raheem A. Beyah. 263-271 [doi]
- Capacity and delay tradeoffs in mobile networks under Gaussian channel modelCheng Wang, Xiang-Yang Li, ShaoJie Tang, Changjun Jiang. 272-280 [doi]
- A hybrid fault detection approach for context-aware wireless sensor networksEhsan Ullah Warriach, Tuan-Anh Nguyen, Marco Aiello, Kenji Tei. 281-289 [doi]
- Achievable throughput in duty-cycled wireless networksJing Li, Wenjie Zeng, Anish Arora. 290-298 [doi]
- WiFu: A composable toolkit for experimental wireless transport protocolsRandy Buck, Rich Lee, Philip Lundrigan, Daniel Zappala. 299-307 [doi]
- Error minimizing jammer localization through smart estimation of ambient noiseZhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen. 308-316 [doi]
- Bankrupting the jammer in WSNFarhana Ashraf, Yih-Chun Hu, Robin Hillary Kravets. 317-325 [doi]
- STIR-ing the wireless medium with self-tuned, inference-based, real-time jammingBruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague. 326-334 [doi]
- Efficient and timely jamming detection in wireless sensor networksDonggang Liu, Joshua Raymer, Andy Fox. 335-343 [doi]
- Goodput maximization in opportunistic spectrum access radio links with imperfect spectrum sensing and fec-based packet protectionMaurizio A. Bonuccelli, Donatella Ermini, Loreto Pescosolido, Chiara Petrioli. 344-352 [doi]
- Content dissemination by pushing and sharing in mobile cellular networks: An analytical studyXiaofei Wang, Min Chen, Zhu Han, Ted Taekyoung Kwon, Yanghee Choi. 353-361 [doi]
- Exploiting cooperation for delay optimization in cognitive networksChowdhury Sayeed Hyder, Li Xiao, Max Ellison. 362-370 [doi]
- Spectrum decision for efficient routing in cognitive radio networkRamzi Saifan, Ahmed E. Kamal, Yong Guan. 371-379 [doi]
- PathZip: Packet path tracing in wireless sensor networksXiaopei Lu, Dezun Dong, Xiangke Liao, Shanshan Li. 380-388 [doi]
- Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networksMohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri. 389-397 [doi]
- Cross-layer coordination for efficient contents delivery in LTE eMBMS trafficEilwoo Baik, Amit Pande, Prasant Mohapatra. 398-406 [doi]
- Fusion performance in long-haul sensor networks with message retransmission and retrodictionQiang Liu, Xin Wang, Nageswara S. V. Rao, Katharine Brigham, B. V. K. Vijaya Kumar. 407-415 [doi]
- Path-loss fluctuations towards robust scheduling algorithms in the SINR modelZhaoquan Gu, Guanyu Wang, Yuexuan Wang. 416-424 [doi]
- Collaborative assessment of functional reliability in wireless networksZi Feng, Konstantinos Pelechrinis, Srikanth V. Krishnamurthy, Ananthram Swami, Felix Wu, Munindar P. Singh. 425-433 [doi]
- On the spanning ratio of partial Delaunay triangulationFlorentin Neumann, Hannes Frey. 434-442 [doi]
- Collusion-resistant repeated double auctions for cooperative communicationsZichuan Xu, Weifa Liang. 443-447 [doi]
- Maximizing data preservation in intermittently connected sensor networksXiang Hou, Zane Sumpter, Lucas Burson, Xinyu Xue, Bin Tang. 448-452 [doi]
- Modeling spatial node density in waypoint mobilityBruno Astuto A. Nunes, Katia Obraczka. 453-457 [doi]
- Observation vs statistics: Near optimal online channel access in cognitive radio networksBowen Li, Panlong Yang, JinLong Wang, QiHui Wu, Xiang-Yang Li, Yunhao Liu. 458-462 [doi]
- Bugs or anomalies? Sequence mining based debugging in wireless sensor networksKefa Lu, Qing Cao, Michael Thomason. 463-467 [doi]
- Fuseviz: A framework for web-based data fusion and visualization in smart environmentsGiacomo Ghidini, Sajal K. Das, Vipul Gupta. 468-472 [doi]
- Performance improvement by collision avoidance of control packets in receiver-driven multihop wireless mesh networksTadashi Hayamizu, Daichi Kominami, Masashi Sugano, Masayuki Murata, Takaaki Hatauchi. 473-474 [doi]
- Dynamic configuration of mobile cloud middleware based on traffic loadHuber Flores, Satish Narayana Srirama. 475-476 [doi]
- Immediate acknowledgement for single-channel full-duplex wireless networksWooyeol Choi, Hyuk Lim. 477-478 [doi]
- A novel distributed scheme for building spontaneous social communities over manetsZhao Tian, Nancy Samaan. 479-480 [doi]
- Efficient mobile content dissemination through broadcast and opportunistic networksFang Wang, Yong Li 0008, Zhaocheng Wang, Depeng Jin, Zhixing Yang. 481-482 [doi]
- Exploiting long-range opportunistic links to improve delivery, delay and energy consumption in wireless sensor networksQuentin Lampin, Dominique Barthel, Isabelle Augé-Blum, Fabrice Valois. 483-484 [doi]
- Using network virtualization and openflow to build large scale DTN evaluation testbedYong Li 0008, Depeng Jin, Pan Hui, Lieguang Zeng. 485-486 [doi]
- Demo of sensor deployment in detecting event's boundaryAparna Venkataraman, Jung-Hyun Jun, Dharma P. Agrawal. 487-488 [doi]
- Creating secured electronic medical record framework for mobile devicesMuneer Malik, Dharma P. Agrawal. 489-490 [doi]