


default search action
Mobile Computing and Communications Review, Volume 13
Volume 13, Number 1, January 2009
- Sharanya Eswaran, Matthew P. Johnson, Archan Misra
, Thomas La Porta:
Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows. 2-13 - David Slater, Radha Poovendran, Patrick Tague, Brian J. Matt:
Tradeoffs between jamming resilience and communication efficiency in key establishment. 14-25
- Barry E. Mullins, Jason R. Seyba, Richard A. Raines, Benjamin W. P. Ramsey, Paul D. Williams:
Voice and video capacity of a secure IEEE 802.11g wireless network. 26-34
- Chuan Han, Siyu Zhan, Yaling Yang:
Proactive attacker localization in WLAN. 36-39 - Shaoliang Peng, Guoliang Xing, Shanshan Li, Weijia Jia, Yuxing Peng:
Fast summation via sampling in large-scale sensor networks. 40-43 - Stratis Ioannidis, Augustin Chaintreau, Laurent Massoulié:
Distributing content updates over a mobile social network. 44-47 - Zhongyi Liu, Tong Zhao, Yan Wei, Xiaoming Li:
GOSR: geographical opportunistic source routing for VANETs. 48-51 - Ji Luo, Dan Wang, Qian Zhang
:
Double mobility: coverage of the sea surface with mobile sensor networks. 52-55 - Samuel C. Nelson, Mehedi Bakht, Robin Kravets, Albert F. Harris III:
Encounter: based routing in DTNs. 56-59 - Tal Rusak, Philip Alexander Levis:
Burstiness and scaling in the structure of low-power wireless links. 60-64 - S. Bromage, C. Engstrom, James Koshimoto, Matt Bromage, Stephen Dabideen, M. Hu, Rolando Menchaca-Méndez, Duy Nguyen, Bruno Astuto A. Nunes
, Vladislav Petkov, Dhananjay Sampath, H. Taylor, Marzieh Veyseh, Jose Joaquin Garcia-Luna-Aceves, Katia Obraczka, Hamid R. Sadjadpour, Bradley R. Smith:
SCORPION: a heterogeneous wireless networking testbed. 65-68 - Martin Azizyan, Romit Roy Choudhury:
SurroundSense: mobile phone localization using ambient sound and light. 69-72 - Mohammad Hossein Falaki, Srinivasan Keshav:
Trace-based analysis of Wi-Fi scanning strategies. 73-76
Volume 13, Number 2, April 2009
- Chittabrata Ghosh, Dharma P. Agrawal, Marepalli B. Rao:
Channel capacity maximization in cooperative cognitive radio networks using game theory. 2-13 - Chengqi Song, Qian Zhang
:
Achieving cooperative spectrum sensing in wireless cognitive radio networks. 14-25 - Dong Huang, Zhiqi Shen, Chunyan Miao, Cyril Leung:
Fitness landscape analysis for resource allocation in multiuser OFDM based cognitive radio systems. 26-36 - An He, Joseph D. Gaeddert, Kyung Kyoon Bae, Timothy R. Newman, Jeffrey H. Reed, Lizdabel Morales-Tirado, Chang-Hyun Park:
Development of a case-based reasoning cognitive engine for IEEE 802.22 WRAN applications. 37-48 - Stefan Geirhofer, John Z. Sun, Lang Tong, Brian M. Sadler:
Cognitive frequency hopping based on interference prediction: theory and experimental results. 49-61 - Jens P. Elsner, Christian Körner, Friedrich K. Jondral:
Centralized modeling of the communication space for spectral awareness in cognitive radio networks. 62-73 - Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. 74-85 - Tao Qin, Han Yu, Cyril Leung, Zhiqi Shen, Chunyan Miao:
Towards a trust aware cognitive radio architecture. 86-95 - Shamik Sengupta, Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli:
On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels? 96-107
Volume 13, Number 3, July 2009
- Periklis Liaskovitis, Curt Schurgers:
Energy consumption of multi-hop wireless networks under throughput constraints and range scaling. 1-13 - Shoubhik Mukhopadhyay, Curt Schurgers, Sujit Dey:
Enabling rich mobile applications: joint computation and communication scheduling. 14-25
- Joakim Koskela, Juho Heikkilä, Andrei V. Gurtov:
Poster abstract: a secure P2P SIP system with SPAM prevention. 26-29 - Farhana Ashraf, Robin Kravets:
Poster abstract: neighborhood-based power management. 30-33 - Souvik Sen, Rahul Ghosh, Jie Xiong, Romit Roy Choudhury:
Poster abstract: BeamCast: harnessing beamforming capabilities for link layer multicast. 34-37 - Joseph T. Meyerowitz, Romit Roy Choudhury:
Poster Abstract: CacheCloak: enabling realtime location privacy for mobile users. 38-41 - Nathanael Thompson, Robin Kravets:
Poster abstract: understanding and controlling congestion in delay tolerant networks. 42-45 - Shao-Cheng Wang, Ahmed Helmy:
Poster Abstract: background traffic-aware rate adaptation for IEEE 802.11: implementation and test-bed experimental results. 46-49 - Jung Woo Lee, Branislav Kusy, Philip Alexander Levis:
Poster abstract: whirlpool ad-hoc routing protocol. 50-53 - Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, Konstantina Papagiannaki:
Poster abstract: measuring multi-parameter conflict graphs for 802.11 networks. 54-57 - Jeeyoung Kim, Ahmed Helmy:
Poster abstract: the challenges of accurate mobility prediction for ultra mobile users. 58-61
Volume 13, Number 4, October 2009
- Yang Zhang, Jing Zhao, Guohong Cao:
Roadcast: a popularity aware content sharing scheme in VANETs. 1-14 - Arun Vishwanath, Partha Dutta, Malolan Chetlur, Parul Gupta, Shivkumar Kalyanaraman, Amitabha Ghosh:
Perspectives on quality of experience for video streaming over WiMAX. 15-25
- Christophe J. Merlin, Chen-Hsiang Feng, Wendi B. Heinzelman:
Information-sharing protocol architectures for sensor networks: the state of the art and a new solution. 26-38 - Thomas Claveirole, Marcelo Dias de Amorim:
WiPal: efficient offline merging of IEEE 802.11 traces. 39-46 - Mo Li, Kumbesan Sandrasegaran:
A proxy based authentication localisation scheme for handover between non trust-associated domains. 47-58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.