


default search action
15th WiMob 2019: Barcelona, Spain
- 2019 International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2019, Barcelona, Spain, October 21-23, 2019. IEEE 2019, ISBN 978-1-7281-3316-4

- Fernando Darío Almeida García, Henry Ramiro Carvajal Mora, Nathaly Verónica Orozco Garzón

:
GLRT Detection of Nonfluctuating Targets in Background Noise Using Phased Arrays. 1-8 - Sawsan Selmi

, Ridha Bouallègue
:
Interference and power management algorithm for D2D communications underlay 5G cellular network. 1-8 - Mehmet Özgün Demir, Ozan Alp Topal, Guido Dartmann

, Anke Schmeink, Gerd Ascheid, Günes Kurt
, Ali Emre Pusane:
Using Perfect Codes in Relay Aided Networks: A Security Analysis. 1-6 - Hassan Noura

, Raphaël Couturier, Congduc Pham, Ali Chehab
:
Lightweight Stream Cipher Scheme for Resource-Constrained IoT Devices. 1-8 - Mohammad Razzaghpour, Ramoni Adeogun

, Ignacio Rodriguez
, Gilberto Berardinelli
, Rasmus S. Mogensen, Troels Pedersen
, Preben E. Mogensen, Troels B. Sørensen
:
Short-Range UWB Wireless Channel Measurement in Industrial Environments. 1-6 - Rafael Dantas Lero, Chris Exton, Andrew Le Gear:

Communications using a speech-to-text-to-speech pipeline. 1-6 - Paul Stärke, Luca Steinweg

, Corrado Carta
, Frank Ellinger:
Common Emitter Low Noise Amplifier with 19 dB Gain for 140 GHz to 220 GHz in 130 nm SiGe. 1-4 - Mennatallah A. Rostom, Ahmed H. Abd El-Malek

, Maha Elsabrouty, Mohammed Abo-Zahhad
:
Cognitive Radio Users Admission and Channels Allocation in 5G HetNets: A College-based Matching and Auction Game Approach. 1-6 - Ching Hong Lam, James She:

Distance Estimation on Moving Object using BLE Beacon. 1-6 - Minghui Zhang, Ming Chen:

Power Allocation in Multi-cell System Using Distributed Deep Neural Network Algorithm. 1-4 - Hala Alsalloum, Rana Rahim, Leïla Merghem-Boulahia:

Prioritizing Prosumers in the energy trading mechanism: A Game Theoretic approach. 1-5 - Md. Ashraf Uddin

, Andrew Stranieri
, Iqbal Gondal
, Venki Balasubramanian
:
A Decentralized Patient Agent Controlled Blockchain for Remote Patient Monitoring. 1-8 - Phoebe Edward

, Sondos Elzeiny, Mohamed Ashour, Tallal Elshabrawy
:
On the Coexistence of LoRa- and Interleaved Chirp Spreading LoRa-Based Modulations. 1-6 - Mihail Zverev

, Pablo Garrido
, Ramón Agüero
, Josu Bilbao
:
Systematic Network Coding with Overlap for IoT Scenarios. 1-6 - Nadia Mouawad, Rola Naja, Samir Tohmé:

SDN-based Network Selection Platform for V2X Use Cases. 1-6 - Eduardo Nuno Almeida

, Kelwin Fernandes, Francisco Andrade, Pedro Moreira da Silva, Rui Campos
, Manuel Ricardo
:
A Machine Learning Based Quality of Service Estimator for Aerial Wireless Networks. 1-6 - Subho Shankar Basu, Ashish Kumar Sultania, Jeroen Famaey

, Jeroen Hoebeke:
Experimental Performance Evaluation of NB-IoT. 1-6 - Hope Mauwa, Antoine B. Bagula, Emmanuel Tuyishimire

, Tembisa Ngqondi:
An Optimal Spectrum Allocation Strategy for Dynamic Spectrum Markets. 1-8 - Hongzhi Guo, Jianfeng Lv, Jiajia Liu

:
Smart Resource Configuration and Task Offloading with Ultra-Dense Edge Computing. 1-6 - Peng Wang, Yanlin Yue, Wen Sun, Jiajia Liu

:
An Attribute-Based Distributed Access Control for Blockchain-enabled IoT. 1-6 - Alexander Münzberg, Janina Sauer, Andreas Hein, Norbert Rösch:

Checking the Plausibility of Nutrient Data in Food Datasets Using KNIME and Big Data. 1-4 - Milena Radenkovic

, Vu San Ha Huynh, Robert I. John, Pietro Manzoni:
Enabling Real-time Communications and Services in Heterogeneous Networks of Drones and Vehicles. 1-6 - Mohammadsaleh Nikooroo

, Zdenek Becvar:
Joint Positioning of UAV and Power Control for Flying Base Stations in Mobile Networks. 1-6 - Abdelwahab Boualouache

, Ridha Soua, Thomas Engel:
SDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks. 1-6 - Haitham Afifi, Konrad Horbach, Holger Karl:

A Genetic Algorithm Framework for Solving Wireless Virtual Network Embedding. 1-6 - Taehoon Kwon:

Average Data Rate Analysis for Hierachical Cell Structure under Nakagami-m Fading Channel with a Two-layer Feed-Forward Neural Network. 1-4 - Laura Galluccio, Shakthivelu Janardhanan

, Y. Narayan, Prabagarane Nagaradjane:
Design and Deployment of a Wireless BAN at the Edge for Reliable Healthcare Monitoring. 1-4 - Hyunyoung Kim, Beomsoo Shin, Yeseul Lee, Soyoung Hwang:

Design and Implementation of Mobile Indoor Scanning System. 1-5 - Satya Ranjan Das, Goutam K. Audhya, Koushik Sinha:

Channel Assignment in Hexagonal Cellular Networks in Presence of Device-to-Device Communication. 1-6 - Yijing Li, Xuefei Zhang, Huici Wu, Junjie Liu, Dian Tang, Xiaofeng Tao:

DQN for Multi-layer Game Based Mining Competition in VEC Network. 1-6 - Adila Mebrek, Leïla Merghem-Boulahia, Moez Esseghir

:
Energy-efficient solution using stochastic approach for IoT-Fog-Cloud Computing. 1-6 - Wei Liu, Yoshito Watanabe

, Yozo Shoji
:
Mobility and Terrain-aware Data Delivery in Urban Vehicular Networks. 1-6 - Rolando Guerra-Gómez

, Silvia Ruiz-Boqué
, Mario García-Lozano, Juan José Olmos Bonafé:
Dynamic Resource Allocation in C-RAN with Real-Time Traffic and Realistic Scenarios. 1-6 - Ghina Saad, Hassan Harb, Chady Abou Jaoude, Ali Jaber:

A Distributed Round-Based Prediction Model for Hierarchical Large-Scale Sensor Networks. 1-6 - Safa Boumiza, Rafik Braham:

An Anomaly Detector for CAN Bus Networks in Autonomous Cars based on Neural Networks. 1-6 - Ibrahim Amadou, Brandon Foubert, Nathalie Mitton:

LoRa in a haystack: a study of the LORA signal behavior. 1-4 - Ayan Chatterjee, Martin W. Gerdes, Santiago G. Martinez

:
eHealth Initiatives for The Promotion of Healthy Lifestyle and Allied Implementation Difficulties. 1-8 - Jiabao Yu, Aiqun Hu, Fen Zhou, Yuexiu Xing

, Yi Yu, Guyue Li, Linning Peng:
Radio Frequency Fingerprint Identification Based on Denoising Autoencoders. 1-6 - Jean-Claude Charr, Karine Deschinkel, Rania Haj Mansour, Mourad Hakem:

Optimizing the Lifetime of Heterogeneous Sensor Networks Under Coverage Constraint : MILP and Genetic Based Approaches. 1-6 - Nidhi Simmons

, Carlos Rafael Nogueira da Silva, Simon L. Cotton, Paschalis C. Sofotasios
, Seong Ki Yoo
, Michel Daoud Yacoub
:
The Double Shadowed κ-µ Fading Model. 1-6 - Phoebe Edward

, Ezzeldin Tarek, Minar El-Aasser, Mohamed Ashour, Tallal Elshabrawy
:
Further LoRa Capacity Enhancement through Interleaved Chirp Spreading LoRa Expansion. 1-6 - Yuexiu Xing

, Aiqun Hu, Jiabao Yu, Guyue Li, Linning Peng, Fen Zhou:
A Robust Radio Frequency Fingerprint Identification Scheme for LFM Pulse Radars. 1-6 - Nadia Mouawad, Rola Naja, Samir Tohmé:

Inter-Slice Mobility Management Solution In V2X Environment. 1-6 - Mohammed B. Alshawki

, Bruno Crispo
, Péter Ligeti:
A Decentralized and Scalable Model for Resource Discovery in IoT Network. 1-4 - Mozhgan Pourmoradnasseri

, Kaveh Khoshkhah, Artjom Lind
, Amnir Hadachi
:
OD-Matrix Extraction based on Trajectory Reconstruction from Mobile Data. 1-8 - Hasanin Harkous, Hassan Artail:

A Two-Stage Machine Learning Method for Highly-Accurate Drunk Driving Detection. 1-6 - Benoît Fournier, Gilles Guette, Valérie Viet Triem Tong, Jean-Louis Lanet:

SEER4US, Secured Energy Efficient Routing for UAV Swarms. 1-6 - Salam Doumiati, Hassan Artail, Mohamad Assaad:

Application of the Topological Interference Management Method in Practical Scenarios. 1-4 - Laura Galluccio, Giacomo Morabito:

Impact of worm propagation on vehicular sensor networks exploiting V2V communications. 1-6 - Christopher Koellner, Marc Kurz

, Erik Sonnleitner:
What Did You Mean? An Evaluation of Online Character Recognition Approaches. 1-6 - Umar Saeed, Jyri Hämäläinen, Edward Mutafungwa, Risto Wichman

, David González González
, Mario García-Lozano:
Route-based Radio Coverage Analysis of Cellular Network Deployments for V2N Communication. 1-6 - Renato Cruz

, André Coelho
, Rui Campos
, Manuel Ricardo
:
A Theoretical Model for Planning NB-IoT Networks. 1-4 - Abdel-karim Ajami, Hassan Artail:

A Generic Model For Performance Characterization of LTE Operators in LAA Networks. 1-6 - Lijian Chen, Xiannian Zhou, Minhao Wang, Jiefan Qiu, Siyi Liu, Keji Mao:

ARU-Net: Research and Application for Wrist Reference Bone Segmentation. 1-5 - Sunday Oladayo Oladejo

, Olabisi E. Falowo
:
Latency-Aware Dynamic Resource Allocation Scheme for 5G Heterogeneous Network: A Network Slicing-Multitenancy Scenario. 1-7 - Thomas Chatzidimitris, Damianos Gavalas

, Vlasios Kasapakis
, Charalampos Konstantopoulos
, Damianos Kypriadis, Grammati E. Pantziou
, Christos D. Zaroliagis
:
A Location History-Aware Retail Product Recommender System. 1-6 - Kenneth Okello, Ahmed H. Abd El-Malek

, Maha Elsabrouty, Mohammed Abo-Zahhad
:
Multi-Mobile Primary and Secondary Users Spectrum Sensing Effect in Cognitive Radio Networks. 1-6 - Wei Zhao, Wen Qiu, Taoyang Zhou, Xun Shao, Xiujun Wang:

Sarsa-based Trajectory Planning of Multi-UAVs in Dense Mesh Router Networks. 1-5 - Carlo Augusto Grazia

:
IEEE 802.11n/ac Wireless Network Efficiency under different TCP Congestion Controls. 1-6 - Moises Nunez Ochoa, Arturo Guizar, Mickael Maman, Andrzej Duda

:
Toward a Self-Deployment of LoRa Networks: Link and Topology Adaptation. 1-7 - Rym Hicheri, Matthias Pätzold:

A New Iterative Procedure for the Localization of a Moving Object/Person in Indoor Areas from Received RF Signals. 1-6 - Muhammad Usman Sheikh, Jyri Hämäläinen, G. David Gonzalez

, Riku Jäntti
, Osvaldo Gonsa:
Usability Benefits and Challenges in mmWave V2V Communications: A Case Study. 1-5 - Simon Wong

, James She, Kang Eun Jeon:
Efficient Updates of Battery Status for BLE Beacon Network. 1-6 - Baha Eddine Youcef Belmekki

, Abdelkrim Hamza, Benoît Escrig
:
Outage Analysis of Cooperative NOMA Using Maximum Ratio Combining at Intersections. 1-6 - Minsu Kim, Kwangsue Chung:

Highlights-based Bitrate Adaptation Scheme for Mobile Video Streaming Service. 1-4 - Sihem Nita, Salim Bitam

, Abdelhamid Mellouk:
A Body Area Network for Ubiquitous Driver Stress Monitoring based on ECG Signal. 1-6 - Filipe B. Teixeira

, Nuno Moreira, Rui Campos
, Manuel Ricardo
:
Data Muling Approach for Long-Range Broadband Underwater Communications. 1-4 - Helder Aranha

, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto:
Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach. 1-6 - Mohammed Alenezi

, Kok Keong Chai, Shihab Jimaa, Yue Chen:
Use of Unsupervised Learning Clustering Algorithm to Reduce Collisions and Delay within LoRa System for Dense Applications. 1-5 - Martina Umlauft, Wilfried Elmenreich:

Topology Characterization for Position-based Wireless Network Topology Generators. 1-4 - Ioannis Avgouleas

, Nikolaos Pappas, Vangelis Angelakis:
Performance Evaluation of Wireless Caching Helper Systems. 1-6 - Ousmane Dieng

, Congduc Pham, Ousmane Thiare
:
Outdoor Localization and Distance Estimation Based on Dynamic RSSI Measurements in LoRa Networks: Application to Cattle Rustling Prevention. 1-6 - Anne Marie Lunde Husebø, Marianne Storm, Ingvild Margreta Morken, Jens Espeland, Laila Garberg Hagen, Bjørg Karlsen:

Discussing a Nurse Assisted eHealth Service From Hospital to Home. 1-6 - Ngurah Indra Er

, Kamal Deep Singh, Jean-Marie Bonnin:
CityView: A Vehicle Based Image and Data Collection for Smart Cities. 1-7 - Mariem Bouchaala, Cherif Ghazel, Leïla Azouz Saïdane:

Dual Revocation: Attribute and User Revocation Based On CPABE In Cloud Computing. 1-6 - Sam Hylamia, Wenqing Yan, Christian Rohner, Thiemo Voigt:

Tiek: Two-tier Authentication and Key Distribution for Wearable Devices. 1-6 - Juan Pablo García-Martín

, Antonio Torralba:
On the Combination of LR-WPAN and LPWA Technologies to Provide a Collaborative Wireless Solution for Diverse IoT. 1-4 - Álvaro López-Raventós, Francesc Wilhelmi, Sergio Barrachina-Muñoz, Boris Bellalta:

Combining Software Defined Networks and Machine Learning to enable Self Organizing WLANs. 1-8 - Kaïs Bouallegue, Jean-Yves Baudais, Matthieu Crussière:

Unified Sensing Algorithm : a Smart Full Exploitation of Detection Methods. 1-6 - Yekta Turk, Engin Zeydan

, Zeki Bilgin:
A Machine Learning Based Management System for Network Services. 1-8 - Mingyong Yin, Qixu Wang, Mingsheng Cao:

An Attack Vector Evaluation Method for Smart City Security Protection. 1-7 - Ahmad Shokair, Jean-François Hélard, Oussama Bazzi, Matthieu Crussière, Youssef Nasser:

Analysis of the Coverage Probability of Cellular Multicast Single Frequency Networks. 1-6 - Meriem Mhedhbi, Mira Morcos, Ana Galindo-Serrano, Salah-Eddine Elayoubi:

Performance Evaluation of 5G Radio Configurations for Industry 4.0. 1-6 - Charlotte Meixner, Hannes Baumann

, Annika Fenger, Bettina Wollesen
:
Gamification in health apps to increase physical activity within families. 15-20 - Pedro Madureira

, Nuno Cardoso, Filipe Sousa
, Waldir Moreira
:
My-AHA: Middleware Platform to Sustain Active and Healthy Ageing. 21-26 - Hanane Lamaazi, Adnan El Ahmadi

, Nabil Benamar, Antonio J. Jara
:
OF-ECF: A New Optimization of the Objective Function for Parent Selection in RPL. 27-32 - Maghsoud Morshedi, Josef Noll:

Deploying Energy Efficient Wi-Fi Networks. 33-39 - Hadi Sayed, Ali El-Amine, Hussein Al Haj Hassan

, Loutfi Nuaymi, Roger Achkar
:
Reinforcement Learning for Radio Resource Management of Hybrid-Powered Cellular Networks. 40-46 - Chékra El Fehri, Mohamed Kassab, Nouha Baccour

, Slim Abdellatif, Pascal Berthou
, Inès Kammoun
:
An Uplink Synchronization scheme for LoRaWAN Class B. 47-52 - Vitor Lamela, Helder Fontes

, Tiago Oliveira
, José Ruela, Manuel Ricardo
, Rui Campos
:
Repeatable and Reproducible Wireless Networking Experimentation through Trace-based Simulation. 53-58 - Øystein Sigholt, Besmir Tola, Yuming Jiang:

Keeping Connected When the Mobile Social Network Goes Offline. 59-64 - Yoshito Watanabe

, Wei Liu, Yozo Shoji
:
A Demonstrative Study on the Potential of Store-Carry-Forward-Based Contents Delivery by a Beverage Supplier's Logistics Network. 65-70 - Omar Aponte, Rute C. Sofia

:
Mobility Management Optimization via Inference of Roaming Behavior. 71-76 - Manuel González Hidalgo

, Marc Munar
, Pedro Bibiloni, Gabriel Moyà-Alcover, Andrea Craus-Miguel
, Juan José Segura-Sampedro
:
Detection of infected wounds in abdominal surgery images using fuzzy logic and fuzzy sets. 99-106 - Salima Houta

, Tim Ameler, Rainer Surges:
Use of HL7 FHIR to structure data in epilepsy self-management applications. 111-115 - Kenneth Okello, Ahmed H. Abd El-Malek

, Maha Elsabrouty, Mohammed Abo-Zahhad
:
Mobile-based Collaborative Compressive Spectrum Sensing for Cognitive Radio Networks. 116-120 - Marwan El Hajj, Ghaïs El Zein, Gheorghe Zaharia, Hanna Farhat, Sawsan Sadek:

Angular Measurements and Analysis of the Indoor Propagation Channel at 60 GHz. 121-126 - Simon Sundberg

, Johan Garcia:
Localization Performance for eNodeBs using Solitary and Fused RSS-Modeling Approaches. 127-132 - Khaled Q. Abdelfadeel, Yasantha Samarawickrama, Victor Cionca

:
How To Conduct LoRaWAN Site Surveys. 133-138 - Meena Gangula:

An Iterative Algorithm for Wyner's Wire-Tap Equivocation Region. 139-143 - Nazli Siasi, Adrian Jaesim, Adel Aldalbahi

, Nasir Ghani:
Link Failure Recovery in NFV for 5G and Beyond. 144-148 - Sayantan Hazra

:
Burst Error Analysis in Hybrid Satellite-Terrestrial Broadcasting Systems for High Velocity Receivers. 149-154 - Maxim Penner, Martin Fuhrwerk, Jürgen Peissig:

Bit Error Probability for Asynchronous Channel Access in Feedback-Less MFC with Scattered Pilot-Based FBMC-OQAM. 155-160 - Jochen Rust

, Simon Knobbe, Steffen Paul:
On Blockchain-Based Dynamic Resource Allocation for Concurrent Industrial Wireless Premises Networks. 161-166 - Sergio Gramacho, Felipe Gramacho, Avani Wildani:

Autonomic Partitioning for the Smart Control of Wireless Mesh Networks. 175-182 - Alia Ghaddar

, Lama Darwish, Fadi Yamout:
Identifying Mass-based local anomalies using Binary Space Partitioning. 183-190 - Eleftheria Polychronidou, Antonios Lalas, Dimitrios Tzovaras

, Konstantinos Votis
:
A systematic distributing sensor system prototype for respiratory diseases. 191-196 - Simon Hayhoe

, Helena Garcia Carrisoza, Jonathan Rix, Kieron Sheehy, Jane Seale:
A survey of networked and Wi-Fi enabled practices to support disabled learners in museums. 197-202 - Janina Sauer, Andreas Hein, Alexander Münzberg, Norbert Rösch:

Simplify Testing of Mobile Medical Applications by Using Timestamps for Remote, Automated Evaluation. 203-206 - Johannes Güldenring, Lucas Koring, Philipp Gorczak, Christian Wietfeld

:
Heterogeneous Multilink Aggregation for Reliable UAV Communication in Maritime Search and Rescue Missions. 215-220 - Germán Castellanos

, Margot Deruyck, Luc Martens, Wout Joseph:
Multi-frequency Backhaul analysis for UABS in disaster situations. 221-225 - Klement Streit, Nils Rodday, Florian Steuber, Corinna Schmitt, Gabi Dreo Rodosek:

Wireless SDN for Highly Utilized MANETs. 226-234 - Martin Klapez

, Carlo Augusto Grazia
, Maurizio Casoni
:
IEEE 802.11p field trials on interference minimization for safety-related V2X applications. 235-240 - Djibrilla Incha Adamou, Alexandre Mouradian, Véronique Vèque:

Towards the Use of Commercial Flights for Data Collection in Wide White Area Networks. 241-248 - Alexandros I. Papadopoulos, Christos P. Antonopoulos, Konstantinos Antonopoulos, Nikolaos S. Voros

, Stavros A. Koubias
:
Development of Highly Accurate IoT-Ready Quaternion-based 3D Gradiometer based on COTS IMUs. 249-254 - George A. Ropokis:

Multi-relay cooperation with self-energy recycling and power consumption considerations. 268-275 - Achal Agrawal, Sivasriprasanna Maddila, Chao Zhang, Bhanukiran Perabathini, Samson Lasaulce:

Cooperative Energy Efficient Resource Allocation in Fast Fading Interference Networks. 276-281 - Natale Patriciello, José Núñez-Martínez, Jorge Baranda, Maurizio Casoni

, Josep Mangues-Bafalluy:
Towards Backpressure Routing in Wireless Mesh Backhauls for Dense LTE Deployments. 282-287 - Eva-Maria Schomakers, Chantal Lidynia, Martina Ziefle:

Listen to My Heart? How Privacy Concerns Shape Users' Acceptance of e-Health Technologies. 306-311 - Armin Gerl

, Bianca Meier:
Privacy in the Future of Integrated Health Care Services - Are Privacy Languages the Key? 312-317 - Francis N. Nwebonyi

, Rolando Martins
, Manuel Eduardo Correia
:
Security and Fairness in IoT Based e-Health System: A Case Study of Mobile Edge-Clouds. 318-323 - Babatunji Omoniwa, Maxime Guériau, Ivana Dusparic:

An RL-based Approach to Improve Communication Performance and Energy Utilization in Fog-based IoT. 324-329 - Xiao Han, Jing Wang, Qinyu Zhang

, Xue Qin, Meng Sun:
Multi-UAV Automatic Dynamic Obstacle Avoidance with Experience-shared A2C. 330-335 - Zhijuan Hu, Danyang Wang, Zan Li, Meng Sun, Weizhi Wang:

Differential Compression for Mobile Edge Computing in Internet of Vehicles. 336-341 - Radwa El-Awadi

, Ana Fernández Vilas
, Rebeca P. Díaz Redondo
:
Fog Computing Solution for Distributed Anomaly Detection in Smart Grids. 348-353 - Karim Zkik

, Anass Sebbar
, Youssef Baddi
, Amine Belhadi
, Mohammed Boulmalf:
An efficient modular security plane AM-SecP for hybrid distributed SDN. 354-359 - Ziming Zhu:

Game theoretic framework for cyber-physical system security incorporating bounded rationality. 360-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














