


default search action
Mobile Computing and Communications Review, Volume 13
Volume 13, Number 1, January 2009
- Sharanya Eswaran, Matthew P. Johnson, Archan Misra

, Thomas La Porta:
Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows. 2-13 - David Slater, Radha Poovendran, Patrick Tague, Brian J. Matt:

Tradeoffs between jamming resilience and communication efficiency in key establishment. 14-25
- Barry E. Mullins, Jason R. Seyba, Richard A. Raines, Benjamin W. P. Ramsey, Paul D. Williams:

Voice and video capacity of a secure IEEE 802.11g wireless network. 26-34
- Chuan Han, Siyu Zhan, Yaling Yang:

Proactive attacker localization in WLAN. 36-39 - Shaoliang Peng, Guoliang Xing, Shanshan Li, Weijia Jia, Yuxing Peng:

Fast summation via sampling in large-scale sensor networks. 40-43 - Stratis Ioannidis, Augustin Chaintreau, Laurent Massoulié:

Distributing content updates over a mobile social network. 44-47 - Zhongyi Liu, Tong Zhao, Yan Wei, Xiaoming Li:

GOSR: geographical opportunistic source routing for VANETs. 48-51 - Ji Luo, Dan Wang, Qian Zhang

:
Double mobility: coverage of the sea surface with mobile sensor networks. 52-55 - Samuel C. Nelson, Mehedi Bakht, Robin Kravets, Albert F. Harris III:

Encounter: based routing in DTNs. 56-59 - Tal Rusak, Philip Alexander Levis:

Burstiness and scaling in the structure of low-power wireless links. 60-64 - S. Bromage, C. Engstrom, James Koshimoto, Matt Bromage, Stephen Dabideen, M. Hu, Rolando Menchaca-Méndez, Duy Nguyen, Bruno Astuto A. Nunes

, Vladislav Petkov, Dhananjay Sampath, H. Taylor, Marzieh Veyseh, Jose Joaquin Garcia-Luna-Aceves, Katia Obraczka, Hamid R. Sadjadpour, Bradley R. Smith:
SCORPION: a heterogeneous wireless networking testbed. 65-68 - Martin Azizyan, Romit Roy Choudhury:

SurroundSense: mobile phone localization using ambient sound and light. 69-72 - Mohammad Hossein Falaki, Srinivasan Keshav:

Trace-based analysis of Wi-Fi scanning strategies. 73-76
Volume 13, Number 2, April 2009
- Chittabrata Ghosh, Dharma P. Agrawal, Marepalli B. Rao:

Channel capacity maximization in cooperative cognitive radio networks using game theory. 2-13 - Chengqi Song, Qian Zhang

:
Achieving cooperative spectrum sensing in wireless cognitive radio networks. 14-25 - Dong Huang, Zhiqi Shen, Chunyan Miao, Cyril Leung:

Fitness landscape analysis for resource allocation in multiuser OFDM based cognitive radio systems. 26-36 - An He, Joseph D. Gaeddert, Kyung Kyoon Bae, Timothy R. Newman, Jeffrey H. Reed, Lizdabel Morales-Tirado, Chang-Hyun Park:

Development of a case-based reasoning cognitive engine for IEEE 802.22 WRAN applications. 37-48 - Stefan Geirhofer, John Z. Sun, Lang Tong, Brian M. Sadler:

Cognitive frequency hopping based on interference prediction: theory and experimental results. 49-61 - Jens P. Elsner, Christian Körner, Friedrich K. Jondral:

Centralized modeling of the communication space for spectral awareness in cognitive radio networks. 62-73 - Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:

Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. 74-85 - Tao Qin, Han Yu, Cyril Leung, Zhiqi Shen, Chunyan Miao:

Towards a trust aware cognitive radio architecture. 86-95 - Shamik Sengupta, Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli:

On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels? 96-107
Volume 13, Number 3, July 2009
- Periklis Liaskovitis, Curt Schurgers:

Energy consumption of multi-hop wireless networks under throughput constraints and range scaling. 1-13 - Shoubhik Mukhopadhyay, Curt Schurgers, Sujit Dey:

Enabling rich mobile applications: joint computation and communication scheduling. 14-25
- Joakim Koskela, Juho Heikkilä, Andrei V. Gurtov:

Poster abstract: a secure P2P SIP system with SPAM prevention. 26-29 - Farhana Ashraf, Robin Kravets:

Poster abstract: neighborhood-based power management. 30-33 - Souvik Sen, Rahul Ghosh, Jie Xiong, Romit Roy Choudhury:

Poster abstract: BeamCast: harnessing beamforming capabilities for link layer multicast. 34-37 - Joseph T. Meyerowitz, Romit Roy Choudhury:

Poster Abstract: CacheCloak: enabling realtime location privacy for mobile users. 38-41 - Nathanael Thompson, Robin Kravets:

Poster abstract: understanding and controlling congestion in delay tolerant networks. 42-45 - Shao-Cheng Wang, Ahmed Helmy:

Poster Abstract: background traffic-aware rate adaptation for IEEE 802.11: implementation and test-bed experimental results. 46-49 - Jung Woo Lee, Branislav Kusy, Philip Alexander Levis:

Poster abstract: whirlpool ad-hoc routing protocol. 50-53 - Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, Konstantina Papagiannaki:

Poster abstract: measuring multi-parameter conflict graphs for 802.11 networks. 54-57 - Jeeyoung Kim, Ahmed Helmy:

Poster abstract: the challenges of accurate mobility prediction for ultra mobile users. 58-61
Volume 13, Number 4, October 2009
- Yang Zhang, Jing Zhao, Guohong Cao:

Roadcast: a popularity aware content sharing scheme in VANETs. 1-14 - Arun Vishwanath, Partha Dutta, Malolan Chetlur, Parul Gupta, Shivkumar Kalyanaraman, Amitabha Ghosh:

Perspectives on quality of experience for video streaming over WiMAX. 15-25
- Christophe J. Merlin, Chen-Hsiang Feng, Wendi B. Heinzelman:

Information-sharing protocol architectures for sensor networks: the state of the art and a new solution. 26-38 - Thomas Claveirole, Marcelo Dias de Amorim:

WiPal: efficient offline merging of IEEE 802.11 traces. 39-46 - Mo Li, Kumbesan Sandrasegaran:

A proxy based authentication localisation scheme for handover between non trust-associated domains. 47-58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














