


default search action
31st MILCOM 2012: Tampa, FL, USA
- 31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, October 29 - November 1, 2012. IEEE 2012, ISBN 978-1-4673-1729-0

- Zhiqiang Liu, T. C. Yang:

Time reversal multicarrier communications over long multipath fading channels. 1-6 - Andreas Ramstad Urke

, Lars Erling Bråten, Knut Øvsthus:
TCP challenges in hybrid military satellite networks; measurements and comparison. 1-6 - Du Zheng, Helen Tang, F. Richard Yu

:
A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications. 1-6 - David Brunnenmeyer, Scott Mills, Samir Patel, Cesar Suarez, Ling-Bing Kung:

Ka and Ku operational considerations for military SATCOM applications. 1-7 - Patrick Shahan, David A. Heide, Aaron E. Cohen

:
Comparison of TSVCIS voice at 8000 and 12000 bps VERSUS CVSD at 16000 bps. 1-4 - Suzanne Hassell, Paul Beraud, Alen Cruz, Gangadhar Ganga, Steve Martin, Justin Toennies, Pablo Vazquez, Gary Wright, Daniel Gomez, Frank Pietryka, Niraj Srivastava, Travis Hester, David Hyde, Brian Mastropietro:

Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation. 1-6 - Glen Nakamoto, Robert C. Durst, Chris Growney, Jason Andresen, Jamie Ma, Nirav Trivedi, Randy Quang, David Pisano:

Identity-Based Internet Protocol Networking. 1-6 - Joël Trubuil, André Goalic, Nicolas Beuzelin:

An overview of channel coding for underwater acoustic communications. 1-7 - Eric Redding, Tom Rittenbach, Hiroshi Satake, John Kisor, Dhaval Shah:

Government Reference Architecture dataplane gateway. 1-6 - Bjørnar Libæk, Mariann Hauge, Lars Landmark, Øivind Kure:

Admission control and flow termination in mobile ad-hoc networks with Pre-congestion Notification. 1-8 - Igor Pedan, Bow-Nan Cheng:

An open source situational awareness display for administering heterogeneous networks on the tactical edge. 1-6 - Leonid Veytser, Bow-Nan Cheng, Randy Charland:

Integrating radio-to-router protocols into EMANE. 1-6 - Randy Charland, Leonid Veytser, Bow-Nan Cheng:

Integrating multiple radio-to-router interfaces to open source dynamic routers. 1-6 - Michael Vitt, George F. Elmasry, Manoj Jain:

Adaptation of RSVP-AGG protocol to tactical networks - A tactical edge open architecture concept. 1-5 - Paul C. Hershey, Mu-Cheng Wang

, Chris Graham, Steven A. Davidson, Michael Sica, Jason Dudash:
A policy-based approach to automated data reduction for intelligence, surveillance, and reconnaissance systems. 1-6 - Jon R. Ward, Mohamed F. Younis:

On the use of distributed relays to increase base station anonymity in Wireless Sensor Networks. 1-6 - Glenn Carl, Joshua Van Hook:

Using hybrid simulation/emulation for experimental assessment of routing policy on mission outcomes. 1-7 - Junghoon Lee, George F. Elmasry, Keith Whittaker, Steve Lescrinier:

Wred performance analysis and design for tactical satellite communication. 1-6 - Lan K. Nguyen, Richard B. Wells:

A quick pull-in timing recovery technique for frequency hopped systems. 1-6 - Justin P. Rohrer, Kamakshi Sirisha Pathapati, Truc Anh N. Nguyen, James P. G. Sterbenz

:
Opportunistic transport for disrupted airborne networks. 1-9 - Timothy Shroyer:

Satcom-on-the-move why one size doesn't fit all. 1-6 - Hira Agrawal, Lisa Bahler, Josephine Micallef, Shane Snyder, Alexandr Virodov:

Detection of global, metamorphic malware variants using control and data flow analysis. 1-6 - Dannie M. Stanley, Zhui Deng, Dongyan Xu, Rick Porter, Shane Snyder:

Guest-transparent instruction authentication for self-patching kernels. 1-6 - Mark Henry, George Vachula, Gregary B. Prince, John Pehowich:

A comparison of open architecture standards for the development of complex military systems: GRA, FACE, SCA NeXT (4.0). 1-9 - Chandana K. K. Jayasooriya, Hyuck M. Kwon, Ryan Syslo, Yang-Ki Hong, Jaejin Lee, Gavin Abo:

High-efficiency ferrite meander antenna (HEMA) for LTE applications. 1-6 - James Offner, Thomas Saam:

Criteria for multi-carrier X-band intermodulation products in the receive band. 1-6 - Vijitha Weerackody, Enrique Cuevas:

Adjacent satellite interference from a network Of MF-TDMA satellite communications on-the-move terminals. 1-6 - Rohit Murthy:

Performance criteria affecting pointing error and the impact on total cost of ownership. 1-6 - Michael Clark:

Robust wireless channel based secret key extraction. 1-6 - Lino Gonzalez, Mike Tracey, Wendy Lui, Richard E. Greel, Vasile Aghinii:

How to evaluate SOTM antennas, modems, and architectures. 1-6 - Jerome Sonnenberg, David B. Chester, James E. Schroeder, Keith Olds:

Quantifying the relative merits of genetic and swarm algorithms for network optimization in cognitive radio networks. 1-8 - Ramon Segura, Olivier Gauvry, Andre Terrasse, Alain Delay, Philippe Loussouarn, Arnaud Duvivier:

Next generation NATO satcom management and control services. 1-6 - Jessica Connah, Abigail Solomon, John McInnes, Olwen Worthington, Dale Chambers:

Openness in military systems part 1: Analysis & applications. 1-6 - Ehsan Hosseini, Erik Perrins:

The Cramér-Rao bound for data-aided synchronization of SOQPSK. 1-6 - Michael A. Koets

, Mark Tapley, Buddy Walls, Jennifer L. Alvarez, Wojciech Toczynski, B. David Moore, Jeremy Pruitt:
Enabling fractionated spacecraft communications using F6WICS. 1-5 - Hong-Jun Noh, Jaesung Lim:

Partitioned cyclic code shift keying for JTIDS. 1-6 - Aaron M. Rosenfeld, Robert N. Lass, Dustin S. Ingram, William C. Regli, Joseph P. Macker:

A comparison of group-based data persistence techniques in MANETs. 1-6 - Bow-Nan Cheng, Randy Charland, Paul Christensen, Andrea Coyle, Igor Pedan, Leonid Veytser, James Wheeler:

Comparing radio-to-router interface implementations on experimental CoTs and open source routers. 1-6 - Don J. Torrieri, Matthew C. Valenti

:
Guard zones and the near-far problem in DS-CDMA ad hoc networks. 1-6 - Don J. Torrieri:

Direction finding of a compromised node in a spread-spectrum network. 1-6 - Michael Lundberg, Xinyu Wang, Emre Ertekin, Darnell Rhodes:

The impact of enclave network devices to the tactical inter-service architecture. 1-6 - Luis Bastos, Hermann Wietgrefe:

Tactical troposcatter applications in challenging climate zones. 1-6 - Mudhakar Srivatsa, Sihyung Lee

, Tarek F. Abdelzaher:
Mining diverse opinions. 1-7 - Saul Foresta, Rich Hoffmann, Louis Coryell, Robert Pinto:

Low cost MEMS based INS for land-based military SATCOM OTM. 1-6 - Mário Marques da Silva

, Rui Dinis
, Paulo Montezuma
:
Iterative FDE receivers for UWB systems with strong interference levels. 1-6 - Linqiang Ge, Hui Liu, Difan Zhang, Wei Yu

, Rommie L. Hardy, Robert J. Reschly:
On effective sampling techniques for host-based intrusion detection in MANET. 1-6 - Philip B. Charlesworth, Stuart M. Allen

:
Use of dynamic flight paths to enhance support to priority subscribers on a communications UAV. 1-6 - Jong-Kwan Lee, Kyu-Man Lee, Jaesung Lim:

Distributed dynamic slot assignment scheme for fast broadcast transmission in tactical ad hoc networks. 1-6 - Sébastien Marcille, Philippe Ciblat, Christophe J. Le Martret:

Optimal resource allocation in HARQ-based OFDMA wireless networks. 1-6 - Xinlei (Oscar) Wang, Kai Zeng, Kannan Govindan

, Prasant Mohapatra:
Chaining for securing data provenance in distributed information networks. 1-6 - Alexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James H. Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang:

Building an operation support system for a fast reconfigurable network experimentation testbed. 1-6 - Hiren J. Patel, Rusty Baldwin:

GPU accelerated Differential Power Analysis. 1-5 - Hiren J. Patel, Rusty Baldwin:

Differential Power Analysis using wavelet decomposition. 1-5 - John J. Windish:

Synchronization performance using Scale Time Offset Robust Modulation. 1-6 - Joseph P. Macker, David J. Claypool:

Dynamic communities in evolving network graphs. 1-6 - Joseph P. Macker, Brian Adamson, David J. Claypool:

Temporal stability for dynamic network relay sets. 1-6 - Jeffrey P. Long, Jose A. Torres:

High throughput Farrow re-samplers utilizing reduced complexity FIR filters. 1-6 - Chihkai Chen, Kung Yao:

Distributed energy-based spectrum sensing with opportunistic cooperative diversity for Cognitive Radio Networks over non-identical fading channels. 1-6 - Ashok N. Masilamani, J. J. Garcia-Luna-Aceves:

VCMA: Efficient channel access in wireless mesh networks using virtual coordinates. 1-6 - Qi Zeng, Husheng Li, Lijun Qian:

GPS spoofing attack on time synchronization in wireless networks and detection scheme design. 1-5 - B. Q. Kan:

Towards minimizing delay in MHWN based on activity estimation. 1-6 - Taehun An, Dongjin Kim, Iickho Song

, Moo Song Yeu, Hwang-Ki Min, Seungwon Lee, Wonju Lee:
Cooperative spectrum sensing based on generalized likelihood ratio test under impulsive noise circumstances. 1-6 - Patrick Loos, Jan Mietzner, Patrick Nickel, Gerhard Bauch, Askold Meusling:

Design of a multitone firefly time synchronization scheme for responsive vehicle-protection jammers. 1-6 - John Cartmell, John Tomici:

Non-satellite based field communications system for battlefield deployments. 1-6 - William Harbison, Rohit Gupta:

Optimal PSD limit accommodation in heterogeneous SHF SATCOM networks. 1-6 - David S. Alberts, Marius S. Vassiliou, Jonathan R. Agre:

C2 information quality: An enterprise systems perspective. 1-7 - Alberto Domingo, Hermann Wietgrefe:

A NNEC-compliant approach for a Future Mission Network. 1-8 - Mohammad Iftekhar Husain, Suyash Mahant, Ramalingam Sridhar:

CD-PHY: Physical layer security in wireless networks through constellation diversity. 1-9 - Ratish J. Punnoose, David Counsil, Derek Young:

Focusing a radio signal and simultaneously nulling it at another location using time-reversal: Experimental results. 1-6 - Yilin Shen, Thang N. Dinh

, My T. Thai:
Adaptive algorithms for detecting critical links and nodes in dynamic networks. 1-6 - Yupeng Jia, Azadeh Vosoughi:

Cramér-Rao bound for channel estimation in amplify-and-forward relaying networks. 1-6 - Jan Nilsson, Ulf Sterner:

Robust MPR-based flooding in mobile ad-hoc networks. 1-6 - Alan J. Michaels:

Pulse rotation modulations for spread spectrum communication systems. 1-6 - Gregory Rucker, Robert G. Cole, Derya Cansever, Amitabh Mishra:

Games applied to jam resistant DSA radios. 1-6 - Somdatta Nath:

Web services: Design choices for space ground system integration. 1-6 - Espen Skjervold, Ketil Lund, Trude Hafsøe Bloebaum, Frank T. Johnsen:

Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids. 1-8 - Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, Bontae Koo:

Cooperative jammer design in cellular network with internal eavesdroppers. 1-5 - Sanghoon Kim, Wayne E. Stark:

On the effects of transmit power control on the performance of wireless networks. 1-6 - James M. Metzler, Brian R. Holmes, Matthew P. Renodin:

An architecture to support information availability in the tactical domain. 1-6 - Fabio Pozzo, Lucio Marcenaro

, Carlo S. Regazzoni
, Vincenzo Gesmundo:
Location Aware Optimized Link State Routing protocol. 1-6 - Xiaohua Li, Jared Feldman, Wednel Cadeau:

An OFDM-based distributed transmission scheme for uncoordinated transmitters without carrier frequency and timing synchronization. 1-6 - Jason D. Ellis, Michael B. Pursley:

Adaptive-rate channel coding for packet radio systems with higher layer fountain coding. 1-6 - Robert Lange, Frank Heine, Matthias Motzigemba, Michael Lutzer, Rolf Meyer:

Roadmap to wide band optical GEO relay networks. 1-5 - Xiao Ma, Mohammed M. Olama, P. Teja Kuruganti, Stephen F. Smith, Seddik M. Djouadi:

Determining system parameters for optimal performance of hybrid DS/FFH spread-spectrum. 1-6 - Vítor G. Andrezo Carneiro, Gilberto Kirk Rodrigues, Maria Thereza M. Rocco Giraldi

:
Performance analysis of a 2D double hard-limited OCDMA system over FSO link under strong turbulence for defense applications. 1-6 - Jeremy Mange, Dionysios Kountanis:

Non-linear programming approach to simulation of the general adversarial agents problem. 1-5 - Chalena M. Jimenez, Kevin W. Richardson, Donald R. Stephens:

SCA4 - An evolved framework. 1-6 - Chung-Yu Lou, Babak Daneshrad:

PER prediction for convolutionally coded MIMO OFDM systems - An analytical approach. 1-6 - Sungjoon Park, Wayne E. Stark:

Opportunistic dual timer relay selection in MIMO relay networks. 1-6 - Gaelen Pereira, Babak Daneshrad, Bruce Fette:

Increasing Network Area Spectral Efficiency by combining multiple PHY techniques. 1-6 - Mark Rahmes, Kathy Wilder, J. Harlan Yates, Kevin L. Fox, Margaret M. Knepper, Jay Hackett:

A qualitative and quantitative method for predicting sentiment toward deployed U.S. forces. 1-6 - Jarno Pinola

, Jarmo Prokkola, Esa Piri:
An experimental study on jamming tolerance of 3G/WCDMA. 1-7 - Olwen Worthington, Jessica Connah, Dale Chambers, Abigail Solomon, John McInnes:

Openness in military systems part 2: Case studies. 1-6 - Marcelo Camilo, David F. C. Moura, Juraci Ferreira Galdino, Ronaldo M. Salles

:
Anti-jamming defense mechanism in cognitive radios networks. 1-6 - Damien Roque, Cyrille Siclet, Jean-Marc Brossier:

A low-complexity multicarrier scheme with LDPC coding for mobile-to-mobile environment. 1-6 - Xilin Cheng, Rui Cao, Liuqing Yang:

Practical implementation of hybrid DLT codes for cooperative relay communications. 1-6 - Dexin Wang, Liuqing Yang:

Cooperative robust localization against malicious anchors based on semi-definite programming. 1-6 - Mazda Salmanian, Ming Li:

Enabling secure and reliable policy-based routing in MANETs. 1-7 - David Dubois, Howard Gans, Terence Lei, Rolando Ventura:

Front End Mission Modeling. 1-6 - Kiran Vanganuru, Steven Ferrante, Gregory Sternberg:

System capacity and coverage of a cellular network with D2D mobile relays. 1-6 - Arun S. Maiya, Francisco Loaiza-Lemos, Robert M. Rolfe:

Supervised learning in the wild: Text classification for critical technologies. 1-6 - Colin Brown, Philip J. Vigneron:

Signal recovery for CPM in frequency flat fast fading channels. 1-6 - Scott Newman, Jeffrey Schindler, Jiral Shah, Sandra Tinta:

Laboratory evaluation of military radios and network architectures. 1-8 - Liangbin Li, Ramesh Annavajjala, Toshiaki Koike-Akino

, Philip V. Orlik:
Robust receiver algorithms to mitigate partial-band and partial-time interference in ldpc-coded OFDM systems. 1-6 - Fernando Ramírez-Mireles:

Analysis of M-ary UWB FSK detected using two passband filters considering antenna and multipath effects. 1-6 - Ossama Younis, David Shallcross, Latha A. Kant, Kenneth Young, Charles Graff, Mitesh P. Patel:

TDMA scheduling and channel assignment for cognitive tactical networks. 1-6 - Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan:

A cyber-physical approach to a wide-area actionable system for the power grid. 1-6 - Yahya S. Khiabani, Shuangqing Wei:

ARQ-based key scheduling algorithm over correlated erasure channels. 1-6 - Bassam S. Farroha, Deborah L. Farroha:

Architecting dynamic cyber defense for a secure multi-tenant cloud services environment. 1-6 - Bassam S. Farroha, Deborah L. Farroha:

The trust engineering framework: Architecting native security to defend against the next generation threats. 1-6 - Bassam S. Farroha, Deborah L. Farroha:

An adaptive SoS framework for integrating dynamic cyber defense. 1-6 - Deborah L. Farroha, Bassam S. Farroha:

An agile enabler framework: Architecting services in the clouds. 1-6 - John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang:

The Xenon separation VMM: Secure virtualization infrastructure for military clouds. 1-6 - Tolga Numanoglu, Baris Karadeniz, Furuzan Atay Onat, Ahmet Ertugrul Kolagasioglu:

An embedded radio software emulation platform using OPNET and VxWorks to develop distributed algorithms for military ad-hoc networks. 1-6 - Clement Kam, Sastry Kompella

, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Wireless multicast with cooperative relaying. 1-6 - Arian Shoari, Alireza Seyedi:

Detection of a non-cooperative transmitter in Rayleigh fading with binary observations. 1-5 - Mark R. Heckman, Roger R. Schell

, Edwards E. Reed:
A high-assurance, virtual guard architecture. 1-9 - Jiaxi Jin, Wei Si, David Starobinski, Ari Trachtenberg:

Prioritized data synchronization for disruption tolerant networks. 1-8 - Soumya Sen, David J. Dorsey, Roch Guérin, Mung Chiang:

Analysis of Slotted Aloha with multipacket messages in clustered surveillance networks. 1-6 - Mingxi Wang, Yahong Rosa Zheng

, Chengshan Xiao, Weiliang Zeng:
A low complexity algorithm for linear precoder design with finite alphabet inputs. 1-5 - Leonard E. Lightfoot, Ellen Laubie:

Channel characterization and throughput tradeoff for wireless sensor networks. 1-5 - Feng Lin, Zhen Hu, Robert C. Qiu, Michael C. Wicks:

A combination of quickest detection with oracle approximating shrinkage estimation and its application to spectrum sensing in cognitive radio. 1-6 - Lin-Nan Lee, Mustafa Eroz, Liping Chen, Rajeev Gopal:

Scrambled Code Multiple Access waveform for micro satellite terminals. 1-6 - Thomas R. Mason, Carlyn H. Weaver, Marc A. Camacho:

Position, navigation, and timing in the Common Operating Environment: Prototyping the PNT User equipment Modernization Architecture. 1-6 - Basil Etefia, Mario Gerla, Lixia Zhang:

Supporting military communications with Named Data Networking: An emulation analysis. 1-6 - Nadine E. Miner, Brian P. Van Leeuwen, Kimberly M. Welch, M. Donan Estill, Mark A. Smith, Hai D. Le, Craig R. Lawton:

Evaluating communications system performance effects at a system of systems level. 1-6 - Mahdi Orooji

, Erfan Soltanmohammadi, Mort Naraghi-Pour:
Performance analysis of spectrum monitoring for cognitive radios. 1-6 - Erfan Soltanmohammadi, Mahdi Orooji

, Mort Naraghi-Pour:
Distributed detection in wireless sensor networks in the presence of misbehaving nodes. 1-6 - Paul G. Elliot, E. N. Rosario, R. J. Davis:

Novel Quadrifilar Helix Antenna combining GNSS, Iridium, and a UHF communications monopole. 1-6 - Fan Yang, Xi Zhang, Zhong-Pei Zhang:

Time-domain preamble-based SNR estimation for OFDM systems in doubly selective channels. 1-5 - João Alves

, John R. Potter
, Giovanni Zappa, Piero Guerrini, Robert Been:
A testbed for collaborative development of underwater communications and networking. 1-8 - P. Teja Kuruganti, Xiao Ma, Seddik M. Djouadi:

Experimental validation of stochastic wireless Urban channel model: Estimation and prediction. 1-5 - Cem Tekin, Mingyan Liu:

Online learning in decentralized multi-user spectrum access with synchronized explorations. 1-6 - Bishwaroop Ganguly, Buster O. Holzbauer, Koushik Kar

, Kevin Battle:
Loss-Tolerant TCP (LT-TCP): Implementation and experimental evaluation. 1-6 - Xia Li, Zhen Hu, Robert C. Qiu, Michael C. Wicks:

Experimental demonstration of cognitive radar for target localization under strong interference. 1-6 - Kyung-Seop Shin, Woo-Chan Kim, Sungjin Park, Dong-Ho Cho:

Cooperative communication with joint optimization of cluster size and resource allocation in wireless sensor networks. 1-5 - Daryl Leon Wasden, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny

:
Design and implementation of a multicarrier spread spectrum communication system. 1-7 - Ning Zhang, Ming Li, Wenjing Lou, Y. Thomas Hou

:
MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation. 1-6 - Lifeng Lai:

Quickest change point identification across a sensor array. 1-5 - Matthew Gillen, Joseph P. Loyall, Kyle Usbeck, Kelly Hanlon, Andrew Scally, Joshua Sterling, Richard Newkirk, Ralph Kohler:

Beyond line-of-sight information dissemination for Force Protection. 1-6 - Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Abhrajit Ghosh, Yitzchak M. Gottlieb, Michael Kaplan, Kathleen Kurachik, Gary Levin, Yow-Jia Lin, Alexander Poylisher, Angelo Sapello, Florin Sultan, Akshay Vashist, Michelle Wolberg, Kimberly Moeltner:

TITAN: Integrated network management in tactical mobile ad hoc networks. 1-6 - Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Yitzchak M. Gottlieb, Angelo Sapello, Kaustubh Sinkar, Kimberly Moeltner:

A GNU-based packet radio for network management field testing. 1-6 - David King, Gerardo Orlando, James Kohler:

A case for trusted sensors: Encryptors with Deep Packet Inspection capabilities. 1-6 - Tadilo Endeshaw Bogale, Luc Vandendorpe:

Multi-cycle cyclostationary based spectrum sensing algorithm for OFDM signals with noise uncertainty in cognitive radio networks. 1-6 - David Kidston, Minghui Shi:

A multicast routing technique for tactical networks. 1-6 - Michael Badger, Dennis Bushmitch, Richard S. Cozby, Jon Ellis, John H. Fikus, Rachel Marrotta, Christopher Morey, Kurt Rausch, Bill Roberts, Edward Slatt:

Automated Performance Assessment Framework innovation (APAFI) project. 1-6 - Dennis Bushmitch, John Fikus, Michael Hamrick, Anthony Khouzam, David Morris:

The normalized Bushmitch-Fikus-Hamrick (NBFH) metric. 1-6 - So-Ra Kim, Heung-Gyoon Ryu:

Analysis and design of QAPM modulation using compressive sensing for low power communication. 1-5 - MinWoo Lee, Jong-Kwan Lee, Hongjun Noh, Jaesung Lim:

Stability of reservation-contention resolution diversity slotted ALOHA for satellite networks. 1-6 - Sungnam Lee, Hyojeong Shin, Hojung Cha:

A pedestrian tracking system using group mobility information. 1-6 - Miguel Luzio, Rui Dinis

, Paulo Montezuma
, Vitor Astucia, Marko Beko:
Efficient receivers for SC-FDE with offset modulations. 1-6 - Michael Badger, Dennis Bushmitch, Vivek Agnish, Richard S. Cozby, John Fikus, Frank Halloran, Kirk Chang, Paul McCabe, Shobha Erramilli:

Laboratory-based end-to-end network System of Systems Integration, design and risk reduction: Critical activity for System of Systems Integration Directorate and the Army. 1-6 - Ningning Cheng, Prasant Mohapatra, Mathieu Cunche, Mohamed Ali Kâafar

, Roksana Boreli, Srikanth V. Krishnamurthy
:
Inferring user relationship from hidden information in WLANs. 1-6 - Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim

, Zhi-Li Zhang:
Measuring bias in the mixing time of social graphs due to graph sampling. 1-6 - Yavuz Yapici:

Iterative channel estimation for time-varying relay networks with optimal energy allocation. 1-6 - Saleem N. Bhatti

, Randall J. Atkinson:
Secure & agile wide-area virtual machine mobility. 1-8 - Sankrith Subramanian, Eduardo L. Pasiliao, John M. Shea

, Marco M. Carvalho
, Warren E. Dixon
:
Throughput maximization in CSMA networks with collisions. 1-6 - Zhen Kan, Eduardo L. Pasiliao, J. Willard Curtis, Warren E. Dixon

:
Particle filter based average consensus target tracking with preservation of network connectivity. 1-6 - Bruce F. McGuffin, Daniel W. Bliss:

Mobile MIMO capacity in network interference: Informed and Uninformed Transmitters. 1-6 - Jeffrey Boksiner, Yuriy Posherstnik, Howard McDonald, Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang, Apurva N. Mody

, Matthew Sherman:
Policy-based spectrum management architecture. 1-6 - Jeffrey Cleveland, Joseph P. Loyall, James Hanna:

Fault tolerance requirements of tactical Information Management systems. 1-8 - Zhenghao Zhang, Matthew Trinkle, Lijun Qian, Husheng Li:

Quickest detection of GPS spoofing attack. 1-6 - Bruce F. McGuffin:

Spectral efficiency of signal processing radios in interference limited environments: Array processing, MIMO, and MUD. 1-7 - Ronggong Song, Helen Tang:

LAA: Link-layer anonymous access for tactical MANETs. 1-7 - Erfan Soltanmohammadi, Mahdi Orooji

, Mort Naraghi-Pour:
Spectrum monitoring for cognitive radios in Rayleigh fading channel. 1-6 - Jonathan J. Edwards, J. David Brown, Peter C. Mason:

Using covert timing channels for attack detection in MANETs. 1-7 - Chan-ho An, Janghoon Yang, Rong Ran, Ui-Young Pak, Young-Jae Ryu, Dong Ku Kim:

Enhanced monopulse MIMO radar using reliable αβ filtering. 1-6 - Pengkai Zhao, You Lu, Babak Daneshrad, Mario Gerla:

Cooperative spatial scheduling in distributed MIMO MAC with interference/concurrency awareness. 1-6 - Daniel J. Jakubisin, R. Michael Buehrer:

Improved modulation classification using a factor-graph-based iterative receiver. 1-6 - Ahsen U. Ahmed, Steve C. Thompson, David W. Chi, James R. Zeidler:

Subcarrier based threshold performance enhancement in Constant Envelope OFDM. 1-6 - Udayan Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor:

Polite: A policy framework for building managed mobile apps. 1-6 - Di Fang, Sixi Su, Tiejun Lv, Hui Gao, Wei Long:

Joint quantization strategy for uplink cooperative cellular interference alignment with limited feedback. 1-5 - Syed Amaar Ahmad, Claudio R. C. M. da Silva, Luiz A. DaSilva:

Relay feedback-based power control in multihop wireless networks. 1-6 - Gaelen Pereira, Babak Daneshrad:

Addressing IQ mismatch in Spatial Interference Suppression systems. 1-7 - Richard Booton:

Multiple layered method of terminal slot contention resolution for the Integrated Waveform (DAMA UHF SATCOM). 1-6 - Thomas R. Halford, Thomas A. Courtade, Kurt A. Turck:

The user capacity of barrage relay networks. 1-6 - Christian Sonnenberg:

Modeling handheld usability for military-based devices. 1-6 - Leemon C. Baird III, Martin C. Carlisle

, William L. Bahn, Eric Smith:
The Glowworm hash: Increased speed and security for BBC unkeyed jam resistance. 1-6 - Madhabi Manandhar, Daniel L. Noneaker:

Iterative decoding in SFH communications with Reed-Solomon codes and channel estimation. 1-6 - Russell A. Fink, Emre Gunduzhan, Bruce P. Benjamin, Derya Cansever, Mars Gralia, Peter Dinsmore:

IPsec tunnels vs. identity-only obfuscation techniques for moving target networks. 1-6 - Giacomo Benincasa

, Enrico Casini, Rita Lenzi, Alessandro Morelli
, Erika Benvegnu, Niranjan Suri, Kevin Boner, Scott Watson:
Extending Service-Oriented Architectures to the tactical edge. 1-7 - Muhammad Nazmul Islam, Shantharam Balasubramanian, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella

:
Implementation of distributed time exchange based cooperative forwarding. 1-6 - Stephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:

Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs. 1-6 - Nam P. Nguyen, My T. Thai:

Finding overlapped communities in online social networks with Nonnegative Matrix Factorization. 1-6 - Kanghee Lee, Hyuck M. Kwon, Wenhao Xiong, Hyunggi Kim, Sangku Lee:

Relay selection for AF SISO wireless relay networks under jamming environment with relay power constraint. 1-5 - Jaime C. Acosta, Brenda G. Medina:

Survivability prediction of ad hoc networks under attack. 1-6 - Jae-Joon Lee, Dongwook Kim, Jaesung Lim:

Adaptive virtual slot for enhancing QoS of voice communication in MIL-STD-188-220. 1-6 - Jeong Ho Yeo, Joon Ho Cho:

Properization of second-order cyclostationary random processes and its application to signal presence detection. 1-6 - Matthew J. La Pan, T. Charles Clancy, Robert W. McGwier:

Jamming attacks against OFDM timing synchronization and signal acquisition. 1-7 - Seokwon Lee, Sungsoo Park, Gosan Noh, Yosub Park, Daesik Hong:

Energy-efficient spectram access for ultra low power sensor networks. 1-6 - Renju Wu, Ruohan Cao, Tiejun Lv:

Multi-group multiuser two-way relay with superposition coding. 1-5 - Hyunkeun Shin, Sangjae Park, Eun Kyung Kim, Jaesung Lim:

An efficient FSN assignment scheme for mitigating multi-hop delay in MIL-STD-188-220D networks. 1-6 - Fábio Silva, Rui Dinis

, Paulo Montezuma
:
Frequency-domain receiver design for fast varying channels. 1-7 - Darcy Swain, David Fritz, Howard McDonald:

A phased approach to policy-based Spectrum operations. 1-6 - Johan Sigholm, Massimiliano Raciti:

Best-effort Data Leakage Prevention in inter-organizational tactical MANETs. 1-7 - Yi Shi

, Yalin E. Sagduyu, Jason H. Li:
Low complexity multi-layer optimization for multi-hop wireless networks. 1-6 - Rajeev Gopal, Russell J. F. Fang:

High-capacity Ka commercial communications satellite architectures for defense applications. 1-6 - Shanzeng Guo:

Performance analysis of wireless intruder geolocation in campus wireless networks. 1-6 - Yueh-Chi Chang, Brandon Mui, John Hanlin, Aravind Movva:

NMT X/Ka tri-band antennas. 1-4 - H. D. Mustafa, Sunil H. Karamchandani

, Shukla Shubham, S. N. Merchant, Uday B. Desai:
MPTA: Modified polymer textile antennas for green symbiotic cloud communications. 1-6 - João Guerreiro

, Rui Dinis
, Paulo Montezuma
:
ML-based receivers for underwater networks using OFDM signals with strong nonlinear distortion effects. 1-7 - Alessandro Morelli

, Ralph Kohler, Cesare Stefanelli, Niranjan Suri, Mauro Tortonesi
:
Supporting COTS applications in Tactical Edge Networks. 1-7 - Akshay Vashist, Ritu Chadha, Michael Kaplan, Kimberly Moeltner:

Detecting communication anomalies in tactical networks via graph learning. 1-6 - Bruce Bennett, Chris Peterson, Dan Gilbert, Emre Ertekin, John Herbert, John Kim:

An enterprise-wide approach to GIG internet protocol multicast. 1-6 - Florence McAtee, Sathya Narayanan, Geoffrey G. Xie:

Performance analysis of message prioritization in delay tolerant networks. 1-6 - Xiaopeng Huang, Victor B. Lawrence:

Resource allocation for OFDM underwater acoustic cooperative transmission with limited feedback. 1-6 - Bruce Bennett, Kensing Quock, Christopher Catlin, Wayne Adams, Sean E. A. Daisley, Joshua Friedman, Andrew Melchior:

Evaluation of the expansion of Joint IP Modem to support DVB-RCS2 (April 2012). 1-6 - Kenneth Y. Jo, David M. Cascio:

Performance of Combatant Command satellite (COCOMSat) communications in contested environments. 1-6 - Bruce Bennett, Gloria Witherspoon, Troy Barker:

High definition video transcoding for transport over satellite (April 2012). 1-5 - Ali Gorcin

, Hüseyin Arslan
:
Template matching for signal identification in cognitive radio systems. 1-6 - Partha P. Pal

, Michael Atighetchi, Andrew Gronosky, Joseph P. Loyall, Charles Payne, Asher Sinclair, Brandon Froberg, Robert Grant:
Cooperative red teaming of a prototype surivable service-oriented system. 1-6 - Edward Chow, Farrokh Vatan, George Paloulian, Steve Frisbie, Zuzana Srostlik, Vasilios Kalomiris, Daniel Apgar:

Dynamic communication resource negotiations. 1-6 - Lawrence Young, Mark Ishii:

One Force Tactical Communications System: Connecting the Tactical Edge at AEWE Spiral G. 1-4 - Matthew C. Valenti

, Don J. Torrieri, Salvatore Talarico:
Optimization of a finite frequency-hopping ad hoc network in Nakagami fading. 1-6 - Xiang Mao, Yonggang Liu, Janise McNair:

A solution for Co-Service of real-time and non-realtime traffic in cellular cognitive radio networks. 1-6 - SaiDhiraj Amuru, Claudio R. C. M. da Silva:

Cumulant-based channel estimation algorithm for modulation classification in frequency-selective fading channels. 1-6 - Richard E. Harang, Peter Guarino:

Clustering of Snort alerts to identify patterns and reduce analyst workload. 1-6 - Bilal A. Ranjha, M. I. Sakib Chowdhury

, Mohsen Kavehrad:
Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency Offset. 1-6 - Eric Graves, Ben Landers, David Greene, Tan F. Wong:

Certification codes for maliciousness detection in Physical-layer Network Coding. 1-6 - Dung T. Nguyen, Nam P. Nguyen, My T. Thai:

Sources of misinformation in Online Social Networks: Who to suspect? 1-6 - Yunbin Deng, Glen Colby, James T. Heaton, Geoffrey S. Meltzner:

Signal processing advances for the MUTE sEMG-based silent speech recognition system. 1-6 - Li Li, Humphrey Rutagemwa

, Thomas Kunz:
Minimum Connected Dominating Set in realistic tactical radio network conditions. 1-6 - Jingwei Huang

, David M. Nicol:
Security and provenance in M3GS for cross-domain information sharing. 1-6 - Matthew Rebholz, Bruce F. McGuffin:

Simulation of moderate time-scale Dynamic Spectrum Access with wide-area spectrum sensors. 1-6 - Stephen M. Dudley, Michael Klingler:

Network management for multi-network terminals. 1-6 - Jacob Green, John Schultz:

Collaborative applications at the Tactical Edge through resilient group dissemination in DTN. 1-6 - Yao Xiao, Hao Feng, Leonard J. Cimini Jr.:

Spatial reuse in multi-hop linear wireless cooperative networks. 1-5 - Humphrey Rutagemwa

, Li Li, Philip J. Vigneron:
Cross-layer modeling and analysis of multihop tactical networking in convoy topology. 1-6 - Andrew Robertson, Joseph Molnar:

The false positive congestion problem and probabilistic spectrum sensing. 1-6 - Jeffrey Connor, Thomas Green, Aleksandar Jovancevic, John Koss, Rajesh Krishnan, Marissa C. Norko, William Ogle, John Weinfield:

Scalable spectrum situational awareness using devices of opportunity. 1-5 - Sankarkumar Thandapani, Aravind Kailas:

On accurately predicting mote deaths. 1-6 - Sourabh Khire, Scott Robertson, Nikil Jayant, Elena A. Wood, Max E. Stachura, Tamer Goksel:

Region-of-interest video coding for enabling surgical telementoring in low-bandwidth scenarios. 1-6 - Hao Feng, Leonard J. Cimini Jr.:

On optimum relay deployment in a multi-hop linear network with cooperation. 1-6 - Qiao-long Li:

Information-guided randomization for wireless physical layer secure transmission. 1-6 - Shane A. Fink, Vincent W. S. Chan, Christopher C. Yu:

Link state distribution rate scaling for maintaining topology in mobile wireless networks. 1-6 - Andrew D. Jurik, Shaun T. Hutton, Julie A. Tarr:

Hamming Masks: Toward defending constrained networked systems. 1-6 - Gunjan Verma, Ananthram Swami, Kevin S. Chan:

The effect of zealotry in the naming game model of opinion dynamics. 1-6 - Bow-Nan Cheng, Scott Moore:

A comparison of MANET routing protocols on airborne tactical networks. 1-6 - Rob Torres, John Border, George Choquette, Jun Xu, Je-Hong Jong:

Congestion control using RED and TCP window adjustment. 1-6 - Katie Schroth, Nicholas V. Burkhardt, Ting-Shuo Che, David Pisano:

IP networking over the AEHF MILSATCOM system. 1-6 - Farzad Talebi, Thomas G. Pratt:

Bounding the ergodic capacity of asymmetric 2×2 dual-polarized channels. 1-6 - Anjali Sridhar, Klara Nahrstedt, Long H. Vu:

Sangam - efficient cellular-WiFi group framework for file sharing service. 1-6 - Aubrey N. Beal

, J. Phillip Bailey
, Sidni A. Hale, Robert Neal Dean, Michael C. Hamilton
, Jitendra K. Tugnait
, Daniel W. Hahs, Ned J. Corron
:
Design and simulation of a high frequency exact solvable chaotic oscillator. 1-6 - Clay K. Dubendorfer, Benjamin W. P. Ramsey, Michael A. Temple:

An RF-DNA verification process for ZigBee networks. 1-6 - Stephen J. Tarsa, H. T. Kung:

Output compression for IC fault detection using compressive sensing. 1-6 - Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Stephen Gundry, Ceni Safak Sahin:

Bio-inspired and Voronoi-based algorithms for self-positioning autonomous mobile nodes. 1-6 - Daniel Denkovski

, Marko Angjelicinoski, Vladimir Atanasovski
, Liljana Gavrilovska:
Practical assessment of RSS-based localization in indoor environments. 1-6 - Young-Hyun Oh, David J. Thuente:

Limitations of Quorum-based Rendezvous and key establishment schemes against sophisticated jamming attacks. 1-6 - Brittany Clore, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:

Validating a custom IPv6 security application using OPNET modeler. 1-6 - Joanna Sliwa, Bartosz Jasiul:

Efficiency of dynamic content adaptation based on semantic description of web service call context. 1-6 - Anthony J. McAuley, Latha A. Kant, Kaustubh Sinkar, Charles Graff, Mitesh P. Patel:

Understanding the delay and loss tradeoffs in large wireless military networks using queuing analysis and MAC models. 1-6 - Luoyang Fang, Dongliang Duan, Liuqing Yang:

A new DFT-based frequency estimator for single-tone complex sinusoidal signals. 1-6 - Natalia A. Schmid, Marwan Alkhweldi, Matthew C. Valenti

:
Distributed estimation of a parametric field using sparse noisy data. 1-6 - Xiaotian Zhou, Liuqing Yang, Dongfeng Yuan:

A bipartite matching based user grouping method for grouped OFDM-IDMA systems. 1-6 - Pan Deng, Liuqing Yang:

Lightweight One-Time Signature for multicast authentication. 1-6 - Nizar Tayem:

Estimation 2D DOA of coherent signals using a new antenna array configuration. 1-5 - Stephen Kuhn, Stephen Taylor:

A forensic hypervisor for process tracking and exploit discovery. 1-5 - Vincent Urias, Brian P. Van Leeuwen, Bryan Richardson:

Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed. 1-8 - Jaime C. Acosta, Humberto Mendoza, Brenda G. Medina:

An efficient common substrings algorithm for on-the-fly behavior-based malware detection and analysis. 1-6 - François Lucas, Christophe Guettier:

Hybrid solving technique for vehicle planning with communication constraints. 1-6 - P. Teja Kuruganti, James J. Nutaro

, Seddik M. Djouadi:
Event-based transmission line matrix method for simulating site-specific multipath propagation characteristics. 1-6 - Javier Schloemann, R. Michael Buehrer:

On the value of collaboration in anchorless robot self-localization. 1-6 - Soon-Young Oh, Bao-Hong Shen, Mario Gerla:

Network coding over a MANET proactive link state routing protocol and TDMA scheduling. 1-6 - Claudiu Danilov, Thomas R. Henderson, Orlie Brewer, Jae H. Kim, Joseph P. Macker, Brian Adamson:

Elastic multicast for tactical communications. 1-6 - Claudiu Danilov, Thomas R. Henderson, Thomas Goff, Orlie Brewer, Jae H. Kim, Joseph P. Macker, Brian Adamson:

Adaptive routing for tactical communications. 1-7 - William M. S. Stout, Rusty O. Baldwin:

Network performance impact of access control policies in Tactical Wireless Networks. 1-6 - Emeka E. Egbogah, Abraham O. Fapojuwo, Liqi Shi:

An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks. 1-7 - Obulapathi N. Challa, Janise McNair:

CubeSat Torrent: Torrent like distributed communications for CubeSat satellite clusters. 1-6 - David Ripplinger, Aradhana Narula-Tam, Katherine Szeto:

Scheduling vs. random access in frequency hopped airborne networks. 1-6 - Defeng Xu, Rajive L. Bagrodia:

JamDetect: A system to detect RAA aware jamming attacks in IEEE802.11 networks. 1-6 - Bala Chidambaram, Yueli Yang:

Cyber Analysis System Toolkit: A high-fidelity, virtual cyber test-bed for network modeling and experimentation. 1-5 - Zhiqiang Wu, T. C. Yang, Zhiqiang Liu, Vasu Chakarvarthy:

Modulation detection of underwater acoustic communication signals through cyclostationary analysis. 1-6 - Marwen Bouanen, François Gagnon

, Georges Kaddoum
, Denis Couillard, Claude Thibeault:
An LPI design for secure OFDM systems. 1-6 - Marco M. Carvalho

, Richard Ford:
NextVC2 - A next generation virtual world command and control. 1-6 - Jasen Kintner, Zach Mildon, Sun-il Kim:

Tiny Bubbles: A fault-tolerant distributed overlay for networks with block-churn. 1-6 - John Lee, Latha A. Kant, Anthony J. McAuley, Kaustubh Sinkar, Charles Graff, Mitesh P. Patel:

Planning & design of routing architectures for multi-tier military networks. 1-7 - Jonathan D. Ashdown, Gary J. Saulnier, Tristan J. Lawry, Kyle R. Wilt

, Henry A. Scarton:
High-rate ultrasonic communication through metallic barriers using MIMO-OFDM techniques. 1-6 - Rita Lenzi, Niranjan Suri, Andrzej Uszok

, James Hanna, James R. Milligan:
Supporting information management and information superiority via federation services. 1-6 - Rumi Ghosh, J. J. Garcia-Luna-Aceves:

Link state routing in regions of interest. 1-6 - John Ellinger, Randy Depoy, Josh Sanderson, Kaiyu Huang, Zhiqiang Wu

:
Blind frequency offset estimation and intercarrier interference cancelation for FD-MC-CDMA systems in aerial vehicle communication. 1-6 - Florin Sultan, Alexander Poylisher, Constantin Serban, John Lee, Ritu Chadha, C. Jason Chiang:

TimeSync: Virtual time for scalable, high-fidelity hybrid network emulation. 1-6 - Hellen Maziku

, Sachin Shetty
, Keesook Han, Tamara Rogers:
Enhancing the classification accuracy of IP geolocation. 1-6 - Trevor Cook, Lisa Scott:

Type based abstraction for QoI aware applications. 1-6 - Ali Gorcin

, Hüseyin Arslan
:
Identification of OFDM signals under multipath fading channels. 1-7 - Zhiyuan Yan, Hongmei Xie:

Enhanced algebraic error control for random linear network coding. 1-6 - Victor Firoiu, Haiyang Liu:

BRAVO: Potential field-based routing and network coding for efficient wireless MANETs. 1-6 - Paul Potier, Lijun Qian, Harold Zheng, Sherry Wang:

Performance management in cognitive radio ad hoc networks using congestion based metric. 1-6 - Robert J. Hall:

A geocast-based algorithm for a field common operating picture. 1-6 - Thomas Tsou, Thomas Cooper, Robert W. McGwier, T. Charles Clancy, Jeffrey H. Reed:

Development of an open-source GSM femtocell and integrated core infrastructure. 1-6 - Parul Pandey, Hariharasudhan Viswanathan, Dario Pompili:

Leveraging mobile grid computing for Interference Alignment and Cancelation. 1-6 - Hsieh-Chung Chen, Tsung-Han Lin, H. T. Kung, Chit-Kwan Lin, Youngjune Gwon:

Determining RF angle of arrival using COTS antenna arrays: A field evaluation. 1-6 - Feng Shi, Zhiyuan Yan:

Quasi-cyclic low-density parity-check stabilizer codes. 1-6 - William S. Hortos:

Effects of energy harvesting on quality-of-service in transient wireless sensor networks. 1-9 - Ashwin J. Pereira, Paul A. Pharris, Justin N. Oursler, Adrian P. Lauf

:
Distributed aerial Reconnaissance Ad-hoc networking protocol. 1-6 - Daniel T. Bennett, Timothy X. Brown:

Optimal data scheduling of mobile clients serviced using beamforming antennas. 1-10 - Ali A. Elghariani, Michael D. Zoltowski:

Branch and Bound with M algorithm for near optimal MIMO detection with higher order QAM constellation. 1-5 - Sang Wu Kim:

Securing wireless network coding against pollution attack at the physical layer. 1-6 - Gregory R. Steinbrecher:

Cross-layer design to maintain earthquake sensor network connectivity after loss of infrastructure. 1-6 - Qing Chen, Mustafa Cenk Gursoy:

Spectrum and energy efficiency in two-way multi-relay networks with selective relaying. 1-6 - Thang N. Dinh

, Yilin Shen, My T. Thai:
An efficient spectral bound for link vulnerability assessment in large-scale networks. 1-6 - Sung-Hyung Lee, Hyun-Jin Lee, Jae-Hyun Kim, Mijeong Hoh, Sang-heon Shin, Taewan Kim, Byeong-Hee Roh

:
Active buffer management algorithm for silence suppressed voice applications. 1-4 - Ali A. Elghariani, Michael D. Zoltowski:

Detection of Code Spread OFDM based on 0-1 Integer Quadratic Programming. 1-6 - Chris McLain, Sunil Panthi, Mark Sturza

, James Hetrick:
High throughput Ku-band satellites for aeronautical applications. 1-6 - Jeffrey Boksiner, Chrysanthos Chrysanthou, Jonathan Lee, Mashuk Billah, Timothy Bocskor, David Barton, James Breakall:

Modeling of radiowave propagation in tunnels. 1-6 - Joe Vanderpoorten, Julie Cohen, Jay Moody, Charles Cornell, Arnold Streland, Steve Breese:

Transformational Satellite Communications System (TSAT) lessons learned: Perspectives from TSAT program leaders. 1-6 - Miriam Tauil, Latha A. Kant, Anthony J. McAuley, Charles Graff, Mitesh P. Patel:

Capacity estimation and waveform assignment in military networks. 1-6 - Minh Dao, Dzung T. Nguyen, Trac D. Tran, Sang Chin:

Chemical plume detection in hyperspectral imagery via joint sparse representation. 1-5 - Ping Wang, Xi Zhang, Mei Song, Xue Chen:

Energy efficient stochastic power scheduling scheme for wireless cellular networks. 1-6 - Moazzam Khan, Zehui Bi, John A. Copeland:

Software updates as a security metric: Passive identification of update trends and effect on machine infection. 1-6 - Chitradeep Majumdar, S. N. Merchant, Uday B. Desai:

Novel energy efficient relaying schemes for wireless sensor networks. 1-6 - Deli Liu, Haijun Zhang, Wei Zheng, Xiangming Wen:

The sub-channel allocation algorithm in femtocell networks based on Ant Colony Optimization. 1-6 - Ukash Nakarmi, Nazanin Rahnavard:

BCS: Compressive sensing for binary sparse signals. 1-5 - Han-Ting Chiang, James S. Lehnert:

Optimal jamming with codewords. 1-6 - Eyidayo Adebola, Oluwatobi Olabiyi, Annamalai Annamalai:

Some remarks on the Dirac delta function approximation for ASER analysis of digital modulations over fading channels. 1-6 - Eyidayo Adebola, Oluwatobi Olabiyi, Annamalai Annamalai:

Cross-layer throughput optimization for delay and QoS constrained applications. 1-6 - Behzad Kasiri, Jun Cai, Attahiru Sule Alfa:

Lightweight key management in distributed multi-channel cognitive radio networks. 1-6 - Andrej Bevec, Peter Bothner, Philip Chan, Ikechi Nigel Chike, Michael Masciulli, Michael Markowski, G. Welles Still:

Modeling mobile network connectivity in the presence of jamming. 1-4 - Yu-Ting Yu, Thomas Punihaole, Mario Gerla, M. Y. Sanadidi:

Content routing in the Vehicle Cloud. 1-6 - David Shur, Sunil Samtani, Mariusz A. Fecko, Kyriakos Manousakis, Vikram Kaul, William C. Regli, Joseph B. Kopena:

SISTO: A proposal for serverless information services for tactical operations. 1-6 - Aik-Tuan Lee, Mario Gerla:

Performance evaluation of wireless network coding in TDMA networks. 1-6 - Kei Kinoshita, Hideki Ochiai

:
Energy minimization of wireless sensor networks based on modulation and coding optimization under finite frame length constraint. 1-5 - Zheng Chang

, Tapani Ristaniemi:
Resource allocation for cooperative relay-assisted OFDMA networks with imperfect CSI. 1-6 - Sheetal Doshi, Unghee Lee, Bradley Bressler, Rajive L. Bagrodia, Michael DiGennaro, Joseph Oleksa, Yong Chen:

Operationally realistic testing of network centric tactical applications in a lab environment. 1-6 - Tuan Nguyen, Steven Lam, Ceasar Castro, Roger Ogden, Cam Tran, Albert Legaspi:

Naval Task Force interface for Coalition Networks for Secure Information Sharing (CoNSIS). 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














