callback( { "result":{ "query":":facetid:toc:\"db/conf/mass/mass2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"69.24" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"101", "@dc":"101", "@oc":"101", "@id":"43400487", "text":":facetid:toc:db/conf/mass/mass2015.bht" } }, "hits":{ "@total":"101", "@computed":"101", "@sent":"101", "@first":"0", "hit":[{ "@score":"1", "@id":"3619586", "info":{"authors":{"author":[{"@pid":"174/2162","text":"Rojina Adhikary"},{"@pid":"98/3754","text":"John N. Daigle"}]},"title":"Localization in a Rayleigh Fading Environment Using RSS Based Methodologies.","venue":"MASS","pages":"458-459","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/AdhikaryD15","doi":"10.1109/MASS.2015.54","ee":"https://doi.org/10.1109/MASS.2015.54","url":"https://dblp.org/rec/conf/mass/AdhikaryD15"}, "url":"URL#3619586" }, { "@score":"1", "@id":"3619587", "info":{"authors":{"author":[{"@pid":"34/10609","text":"Alexander Afanasyev"},{"@pid":"02/10813","text":"Zhenkai Zhu"},{"@pid":"58/11268","text":"Yingdi Yu"},{"@pid":"48/6248-4","text":"Lijing Wang 0004"},{"@pid":"z/LixiaZhang1","text":"Lixia Zhang 0001"}]},"title":"The Story of ChronoShare, or How NDN Brought Distributed Secure File Sharing Back.","venue":"MASS","pages":"525-530","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/AfanasyevZYW015","doi":"10.1109/MASS.2015.59","ee":"https://doi.org/10.1109/MASS.2015.59","url":"https://dblp.org/rec/conf/mass/AfanasyevZYW015"}, "url":"URL#3619587" }, { "@score":"1", "@id":"3619588", "info":{"authors":{"author":[{"@pid":"82/2928","text":"Keyvan Amiri"},{"@pid":"r/DBJohnson","text":"David B. Johnson 0001"}]},"title":"Protocol Evaluation in Multihop Wireless Networks with Controllable Node Sparsity or Density (Extended Abstract).","venue":"MASS","pages":"447-448","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/AmiriJ15","doi":"10.1109/MASS.2015.85","ee":"https://doi.org/10.1109/MASS.2015.85","url":"https://dblp.org/rec/conf/mass/AmiriJ15"}, "url":"URL#3619588" }, { "@score":"1", "@id":"3619589", "info":{"authors":{"author":[{"@pid":"174/2178","text":"Patrick Armengol"},{"@pid":"174/2265","text":"Rachelle Tobkes"},{"@pid":"88/755","text":"Kemal Akkaya"},{"@pid":"163/8748","text":"Bekir Sait Ciftler"},{"@pid":"80/6756","text":"Ismail Güvenç"}]},"title":"Efficient Privacy-Preserving Fingerprint-Based Indoor Localization Using Crowdsourcing.","venue":"MASS","pages":"549-554","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ArmengolTACG15","doi":"10.1109/MASS.2015.76","ee":"https://doi.org/10.1109/MASS.2015.76","url":"https://dblp.org/rec/conf/mass/ArmengolTACG15"}, "url":"URL#3619589" }, { "@score":"1", "@id":"3619590", "info":{"authors":{"author":[{"@pid":"174/2229","text":"Satyajit Bhowmick"},{"@pid":"132/1089","text":"Suryadip Chakraborty"},{"@pid":"a/DharmaPAgrawal","text":"Dharma P. Agrawal"}]},"title":"Study of Hadoop-MapReduce on Google N-Gram Datasets.","venue":"MASS","pages":"488-490","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/BhowmickCA15","doi":"10.1109/MASS.2015.105","ee":"https://doi.org/10.1109/MASS.2015.105","url":"https://dblp.org/rec/conf/mass/BhowmickCA15"}, "url":"URL#3619590" }, { "@score":"1", "@id":"3619591", "info":{"authors":{"author":[{"@pid":"174/2168","text":"Shaibal Chakrabarty"},{"@pid":"66/6339","text":"Daniel W. Engels"},{"@pid":"174/2220","text":"Selina Thathapudi"}]},"title":"Black SDN for the Internet of Things.","venue":"MASS","pages":"190-198","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ChakrabartyET15","doi":"10.1109/MASS.2015.100","ee":"https://doi.org/10.1109/MASS.2015.100","url":"https://dblp.org/rec/conf/mass/ChakrabartyET15"}, "url":"URL#3619591" }, { "@score":"1", "@id":"3619592", "info":{"authors":{"author":[{"@pid":"79/3609","text":"Lien-Wu Chen"},{"@pid":"174/2198","text":"Jhen-Jhou Chung"},{"@pid":"174/2235","text":"Jun-Xian Liu"}]},"title":"GoFAST: A Group-Based Emergency Guiding System with Dedicated Path Planning for Mobile Users Using Smartphones.","venue":"MASS","pages":"467-468","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ChenCL15","doi":"10.1109/MASS.2015.35","ee":"https://doi.org/10.1109/MASS.2015.35","url":"https://dblp.org/rec/conf/mass/ChenCL15"}, "url":"URL#3619592" }, { "@score":"1", "@id":"3619593", "info":{"authors":{"author":[{"@pid":"91/6670","text":"Kang Chen"},{"@pid":"15/5579","text":"Haiying Shen"}]},"title":"GreedyFlow: Distributed Greedy Packet Routing between Landmarks in DTNs.","venue":"MASS","pages":"199-207","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ChenS15","doi":"10.1109/MASS.2015.67","ee":"https://doi.org/10.1109/MASS.2015.67","url":"https://dblp.org/rec/conf/mass/ChenS15"}, "url":"URL#3619593" }, { "@score":"1", "@id":"3619594", "info":{"authors":{"author":[{"@pid":"50/6996-3","text":"Min Chen 0003"},{"@pid":"87/6482-1","text":"Xianbin Wang 0001"},{"@pid":"15/885","text":"Junfeng Wang"},{"@pid":"52/328-1","text":"Di Wu 0001"},{"@pid":"93/2334-8","text":"Yong Li 0008"}]},"title":"KCN: Guaranteed Delivery via K-Cooperative-Nodes in Duty-Cycled Sensor Networks.","venue":"MASS","pages":"449-451","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ChenWWWL15","doi":"10.1109/MASS.2015.29","ee":"https://doi.org/10.1109/MASS.2015.29","url":"https://dblp.org/rec/conf/mass/ChenWWWL15"}, "url":"URL#3619594" }, { "@score":"1", "@id":"3619595", "info":{"authors":{"author":[{"@pid":"46/8334","text":"Ningning Cheng"},{"@pid":"50/5206","text":"Shaxun Chen"},{"@pid":"62/8333","text":"Parth H. Pathak"},{"@pid":"m/PrasantMohapatra","text":"Prasant Mohapatra"}]},"title":"Long-Term Privacy Profiling through Smartphone Sensors.","venue":"MASS","pages":"639-644","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ChengCPM15","doi":"10.1109/MASS.2015.36","ee":"https://doi.org/10.1109/MASS.2015.36","url":"https://dblp.org/rec/conf/mass/ChengCPM15"}, "url":"URL#3619595" }, { "@score":"1", "@id":"3619596", "info":{"authors":{"author":[{"@pid":"23/7643","text":"Gianpiero Costantino"},{"@pid":"72/10957","text":"Rajib Ranjan Maiti"},{"@pid":"m/FMartinelli","text":"Fabio Martinelli"},{"@pid":"43/1361","text":"Paolo Santi"}]},"title":"Location-Based Routing for Opportunistic Networks.","venue":"MASS","pages":"452-453","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/CostantinoMMS15","doi":"10.1109/MASS.2015.37","ee":"https://doi.org/10.1109/MASS.2015.37","url":"https://dblp.org/rec/conf/mass/CostantinoMMS15"}, "url":"URL#3619596" }, { "@score":"1", "@id":"3619597", "info":{"authors":{"author":[{"@pid":"146/8146","text":"Boutheina Dab"},{"@pid":"71/7860","text":"Ilhem Fajjari"},{"@pid":"01/3015","text":"Nadjib Aitsaadi"},{"@pid":"03/6403","text":"Abdelhamid Mellouk"}]},"title":"A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks.","venue":"MASS","pages":"109-117","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/DabFAM15","doi":"10.1109/MASS.2015.19","ee":"https://doi.org/10.1109/MASS.2015.19","url":"https://dblp.org/rec/conf/mass/DabFAM15"}, "url":"URL#3619597" }, { "@score":"1", "@id":"3619598", "info":{"authors":{"author":[{"@pid":"52/5861","text":"Ying Dai"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"Integration of Spectrum Database and Sensing Results for Hybrid Spectrum Access Systems.","venue":"MASS","pages":"28-36","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/Dai015","doi":"10.1109/MASS.2015.114","ee":"https://doi.org/10.1109/MASS.2015.114","url":"https://dblp.org/rec/conf/mass/Dai015"}, "url":"URL#3619598" }, { "@score":"1", "@id":"3619599", "info":{"authors":{"author":[{"@pid":"96/755-1","text":"Lei Deng 0001"},{"@pid":"13/6769-9","text":"Ying Zhang 0009"},{"@pid":"12/4395-1","text":"Minghua Chen 0001"},{"@pid":"24/1320","text":"Zongpeng Li"},{"@pid":"l/JackYiuBunLee","text":"Jack Y. B. Lee"},{"@pid":"80/3143","text":"Ying Jun Zhang"},{"@pid":"02/2683","text":"Lingyang Song"}]},"title":"Device-to-Device Load Balancing for Cellular Networks.","venue":"MASS","pages":"19-27","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/DengZCLLZS15","doi":"10.1109/MASS.2015.25","ee":"https://doi.org/10.1109/MASS.2015.25","url":"https://dblp.org/rec/conf/mass/DengZCLLZS15"}, "url":"URL#3619599" }, { "@score":"1", "@id":"3619600", "info":{"authors":{"author":[{"@pid":"145/3026","text":"Christoph Dibak"},{"@pid":"20/6521","text":"Frank Dürr"},{"@pid":"r/KurtRothermel","text":"Kurt Rothermel"}]},"title":"Numerical Analysis of Complex Physical Systems on Networked Mobile Devices.","venue":"MASS","pages":"280-288","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/DibakDR15","doi":"10.1109/MASS.2015.12","ee":"https://doi.org/10.1109/MASS.2015.12","url":"https://dblp.org/rec/conf/mass/DibakDR15"}, "url":"URL#3619600" }, { "@score":"1", "@id":"3619601", "info":{"authors":{"author":[{"@pid":"51/2259","text":"Yuanyuan Fan"},{"@pid":"70/1741-4","text":"Lei Xie 0004"},{"@pid":"04/934","text":"Yafeng Yin"},{"@pid":"24/3318","text":"Sanglu Lu"}]},"title":"A Context Aware Energy-Saving Scheme for Smart Camera Phones Based on Activity Sensing.","venue":"MASS","pages":"64-72","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/FanXYL15","doi":"10.1109/MASS.2015.17","ee":"https://doi.org/10.1109/MASS.2015.17","url":"https://dblp.org/rec/conf/mass/FanXYL15"}, "url":"URL#3619601" }, { "@score":"1", "@id":"3619602", "info":{"authors":{"author":[{"@pid":"88/3790","text":"Yu Fang"},{"@pid":"174/2200","text":"Zijiao Zhang"},{"@pid":"54/2062-1","text":"Cheng Wang 0001"},{"@pid":"70/3488","text":"Zhong Li"},{"@pid":"11/8049","text":"Huiya Yan"},{"@pid":"31/5933","text":"Changjun Jiang"}]},"title":"Scaling Laws of Social-Broadcast Capacity for Mobile Ad Hoc Social Networks.","venue":"MASS","pages":"262-270","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/FangZWLYJ15","doi":"10.1109/MASS.2015.44","ee":"https://doi.org/10.1109/MASS.2015.44","url":"https://dblp.org/rec/conf/mass/FangZWLYJ15"}, "url":"URL#3619602" }, { "@score":"1", "@id":"3619603", "info":{"authors":{"author":[{"@pid":"150/3382","text":"Puchun Feng"},{"@pid":"54/2752-2","text":"Lan Zhang 0002"},{"@pid":"62/5693","text":"Kebin Liu"},{"@pid":"27/2403","text":"Yunhao Liu 0001"}]},"title":"PerLoc: Enabling Infrastructure-Free Indoor Localization with Perspective Projection.","venue":"MASS","pages":"425-433","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/FengZLL15","doi":"10.1109/MASS.2015.47","ee":"https://doi.org/10.1109/MASS.2015.47","url":"https://dblp.org/rec/conf/mass/FengZLL15"}, "url":"URL#3619603" }, { "@score":"1", "@id":"3619604", "info":{"authors":{"author":{"@pid":"g/JJGarciaLunaAceves","text":"J. J. Garcia-Luna-Aceves"}},"title":"New Directions in Content Centric Networking.","venue":"MASS","pages":"494-499","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/Garcia-Luna-Aceves15","doi":"10.1109/MASS.2015.86","ee":"https://doi.org/10.1109/MASS.2015.86","url":"https://dblp.org/rec/conf/mass/Garcia-Luna-Aceves15"}, "url":"URL#3619604" }, { "@score":"1", "@id":"3619605", "info":{"authors":{"author":[{"@pid":"174/2125","text":"Mehdi Golestanian"},{"@pid":"48/2399","text":"Christian Poellabauer"}]},"title":"Joint Route Discovery and Localization in Heterogeneous Wireless Sensor Networks.","venue":"MASS","pages":"598-603","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/GolestanianP15","doi":"10.1109/MASS.2015.102","ee":"https://doi.org/10.1109/MASS.2015.102","url":"https://dblp.org/rec/conf/mass/GolestanianP15"}, "url":"URL#3619605" }, { "@score":"1", "@id":"3619606", "info":{"authors":{"author":[{"@pid":"28/8783","text":"Karim Habak"},{"@pid":"63/4747","text":"Khaled A. Harras"},{"@pid":"52/727","text":"Moustafa Youssef 0001"}]},"title":"What Goes Around Comes Around: Mobile Bandwidth Sharing and Aggregation.","venue":"MASS","pages":"37-45","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HabakHY15","doi":"10.1109/MASS.2015.42","ee":"https://doi.org/10.1109/MASS.2015.42","url":"https://dblp.org/rec/conf/mass/HabakHY15"}, "url":"URL#3619606" }, { "@score":"1", "@id":"3619607", "info":{"authors":{"author":[{"@pid":"36/9769","text":"Abolfazl Hajisami"},{"@pid":"47/3212","text":"Dario Pompili"}]},"title":"Cloud-CFFR: Coordinated Fractional Frequency Reuse in Cloud Radio Access Network (C-RAN).","venue":"MASS","pages":"46-54","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HajisamiP15","doi":"10.1109/MASS.2015.70","ee":"https://doi.org/10.1109/MASS.2015.70","url":"https://dblp.org/rec/conf/mass/HajisamiP15"}, "url":"URL#3619607" }, { "@score":"1", "@id":"3619608", "info":{"authors":{"author":[{"@pid":"36/9769","text":"Abolfazl Hajisami"},{"@pid":"133/4851","text":"Tuyen X. Tran"},{"@pid":"47/3212","text":"Dario Pompili"}]},"title":"Dynamic Provisioning for High Energy Efficiency and Resource Utilization in Cloud RANs.","venue":"MASS","pages":"471-472","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HajisamiTP15","doi":"10.1109/MASS.2015.71","ee":"https://doi.org/10.1109/MASS.2015.71","url":"https://dblp.org/rec/conf/mass/HajisamiTP15"}, "url":"URL#3619608" }, { "@score":"1", "@id":"3619609", "info":{"authors":{"author":[{"@pid":"03/278","text":"Dong Han"},{"@pid":"85/6777","text":"Ye Yan"},{"@pid":"56/2124","text":"Tao Shu"}]},"title":"Context-Aware Distributed Storage in Mobile Cloud Computing.","venue":"MASS","pages":"460-461","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HanYS15","doi":"10.1109/MASS.2015.57","ee":"https://doi.org/10.1109/MASS.2015.57","url":"https://dblp.org/rec/conf/mass/HanYS15"}, "url":"URL#3619609" }, { "@score":"1", "@id":"3619610", "info":{"authors":{"author":[{"@pid":"117/4425","text":"Ehsan Hemmati"},{"@pid":"g/JJGarciaLunaAceves","text":"J. J. Garcia-Luna-Aceves"}]},"title":"A Comparison of Name-Based Content Routing Protocols.","venue":"MASS","pages":"537-542","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HemmatiG15","doi":"10.1109/MASS.2015.52","ee":"https://doi.org/10.1109/MASS.2015.52","url":"https://dblp.org/rec/conf/mass/HemmatiG15"}, "url":"URL#3619610" }, { "@score":"1", "@id":"3619611", "info":{"authors":{"author":[{"@pid":"00/8850","text":"Kasun Hewage"},{"@pid":"55/1897","text":"Simon Duquennoy"},{"@pid":"147/7723","text":"Venkatraman Iyer"},{"@pid":"46/5016","text":"Thiemo Voigt"}]},"title":"Enabling TCP in Mobile Cyber-Physical Systems.","venue":"MASS","pages":"289-297","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HewageDIV15","doi":"10.1109/MASS.2015.38","ee":"https://doi.org/10.1109/MASS.2015.38","url":"https://dblp.org/rec/conf/mass/HewageDIV15"}, "url":"URL#3619611" }, { "@score":"1", "@id":"3619612", "info":{"authors":{"author":[{"@pid":"65/44","text":"Reginald L. Hobbs"},{"@pid":"143/4679","text":"Will Dron"}]},"title":"Using Intelligent Agents for Social Sensing across Disadvantaged Networks.","venue":"MASS","pages":"633-638","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HobbsD15","doi":"10.1109/MASS.2015.96","ee":"https://doi.org/10.1109/MASS.2015.96","url":"https://dblp.org/rec/conf/mass/HobbsD15"}, "url":"URL#3619612" }, { "@score":"1", "@id":"3619613", "info":{"authors":{"author":[{"@pid":"25/3444","text":"Nan Hu"},{"@pid":"l/TomLaPorta","text":"Thomas La Porta"},{"@pid":"98/418","text":"Novella Bartolini"}]},"title":"Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks.","venue":"MASS","pages":"370-378","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HuPB15","doi":"10.1109/MASS.2015.72","ee":"https://doi.org/10.1109/MASS.2015.72","url":"https://dblp.org/rec/conf/mass/HuPB15"}, "url":"URL#3619613" }, { "@score":"1", "@id":"3619614", "info":{"authors":{"author":[{"@pid":"70/5618-3","text":"Hua Huang 0003"},{"@pid":"12/3912-1","text":"Shan Lin 0001"},{"@pid":"13/3479-2","text":"Lin Chen 0002"},{"@pid":"g/JieGao","text":"Jie Gao 0001"},{"@pid":"17/6735","text":"Anwar Mamat"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"Dynamic Mobile Charger Scheduling in Heterogeneous Wireless Sensor Networks.","venue":"MASS","pages":"379-387","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HuangLCGMW15","doi":"10.1109/MASS.2015.26","ee":"https://doi.org/10.1109/MASS.2015.26","url":"https://dblp.org/rec/conf/mass/HuangLCGMW15"}, "url":"URL#3619614" }, { "@score":"1", "@id":"3619615", "info":{"authors":{"author":[{"@pid":"70/5618-3","text":"Hua Huang 0003"},{"@pid":"12/3912-1","text":"Shan Lin 0001"},{"@pid":"13/3479-2","text":"Lin Chen 0002"},{"@pid":"g/JieGao","text":"Jie Gao 0001"},{"@pid":"17/6735","text":"Anwar Mamat"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"Dynamic Mobile Charger Scheduling in Heterogeneous Wireless Sensor Networks.","venue":"MASS","pages":"465-466","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HuangLCGMW15a","doi":"10.1109/MASS.2015.99","ee":"https://doi.org/10.1109/MASS.2015.99","url":"https://dblp.org/rec/conf/mass/HuangLCGMW15a"}, "url":"URL#3619615" }, { "@score":"1", "@id":"3619616", "info":{"authors":{"author":[{"@pid":"18/4087-1","text":"Chao Huang 0001"},{"@pid":"40/3934-2","text":"Dong Wang 0002"}]},"title":"Time-Aware Truth Discovery in Social Sensing.","venue":"MASS","pages":"479-480","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HuangW15","doi":"10.1109/MASS.2015.50","ee":"https://doi.org/10.1109/MASS.2015.50","url":"https://dblp.org/rec/conf/mass/HuangW15"}, "url":"URL#3619616" }, { "@score":"1", "@id":"3619617", "info":{"authors":{"author":[{"@pid":"18/4087-1","text":"Chao Huang 0001"},{"@pid":"40/3934-2","text":"Dong Wang 0002"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"}]},"title":"Towards Time-Sensitive Truth Discovery in Social Sensing Applications.","venue":"MASS","pages":"154-162","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/HuangWC15","doi":"10.1109/MASS.2015.39","ee":"https://doi.org/10.1109/MASS.2015.39","url":"https://dblp.org/rec/conf/mass/HuangWC15"}, "url":"URL#3619617" }, { "@score":"1", "@id":"3619618", "info":{"authors":{"author":[{"@pid":"152/5378","text":"Brian Jalaeian"},{"@pid":"00/3680-1","text":"Yi Shi 0001"},{"@pid":"24/6114-1","text":"Xu Yuan 0001"},{"@pid":"h/YTHou","text":"Yiwei Thomas Hou"},{"@pid":"73/3673","text":"Wenjing Lou"},{"@pid":"75/451","text":"Scott F. Midkiff"}]},"title":"Harmonizing SIC and MIMO DoF Interference Cancellation for Efficient Network-Wide Resource Allocation.","venue":"MASS","pages":"316-323","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/JalaeianSYHLM15","doi":"10.1109/MASS.2015.95","ee":"https://doi.org/10.1109/MASS.2015.95","url":"https://dblp.org/rec/conf/mass/JalaeianSYHLM15"}, "url":"URL#3619618" }, { "@score":"1", "@id":"3619619", "info":{"authors":{"author":[{"@pid":"81/4995","text":"Imad Jawhar"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"04/2984","text":"Nader Mohamed"},{"@pid":"69/6137-1","text":"Sheng Zhang 0001"}]},"title":"An Efficient Graph Search Algorithm for Backbone Discovery in Wireless Linear Sensor Networks.","venue":"MASS","pages":"604-609","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/JawharWMZ15","doi":"10.1109/MASS.2015.104","ee":"https://doi.org/10.1109/MASS.2015.104","url":"https://dblp.org/rec/conf/mass/JawharWMZ15"}, "url":"URL#3619619" }, { "@score":"1", "@id":"3619620", "info":{"authors":{"author":[{"@pid":"131/5953","text":"Kasthuri Jayarajah"},{"@pid":"148/1920","text":"Shuochao Yao"},{"@pid":"63/7446","text":"Raghava Mutharaju"},{"@pid":"24/4570","text":"Archan Misra"},{"@pid":"06/2115","text":"Geeth de Mel"},{"@pid":"174/2147","text":"Julie Skipper"},{"@pid":"a/TarekFAbdelzaher","text":"Tarek F. Abdelzaher"},{"@pid":"174/2250","text":"Michael Kolodny"}]},"title":"Social Signal Processing for Real-Time Situational Understanding: A Vision and Approach.","venue":"MASS","pages":"627-632","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/JayarajahYMMMSA15","doi":"10.1109/MASS.2015.89","ee":"https://doi.org/10.1109/MASS.2015.89","url":"https://dblp.org/rec/conf/mass/JayarajahYMMMSA15"}, "url":"URL#3619620" }, { "@score":"1", "@id":"3619621", "info":{"authors":{"author":[{"@pid":"127/2907","text":"Jingjie Jiang"},{"@pid":"174/2169","text":"Yifei Zhu"},{"@pid":"50/3402-1","text":"Bo Li 0001"},{"@pid":"l/BaochunLi","text":"Baochun Li"}]},"title":"Rally: Device-to-Device Content Sharing in LTE Networks as a Game.","venue":"MASS","pages":"10-18","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/JiangZ0L15","doi":"10.1109/MASS.2015.77","ee":"https://doi.org/10.1109/MASS.2015.77","url":"https://dblp.org/rec/conf/mass/JiangZ0L15"}, "url":"URL#3619621" }, { "@score":"1", "@id":"3619622", "info":{"authors":{"author":[{"@pid":"174/2185","text":"Shuaizhao Jin"},{"@pid":"141/1943","text":"Zixiao Wang"},{"@pid":"38/7655","text":"Wai Kay Leong"},{"@pid":"02/2726","text":"Ben Leong"},{"@pid":"43/502","text":"Yabo Dong"},{"@pid":"80/3109","text":"Dongming Lu"}]},"title":"Improving Neighbor Discovery with Slot Index Synchronization.","venue":"MASS","pages":"253-261","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/JinWLLDL15","doi":"10.1109/MASS.2015.14","ee":"https://doi.org/10.1109/MASS.2015.14","url":"https://dblp.org/rec/conf/mass/JinWLLDL15"}, "url":"URL#3619622" }, { "@score":"1", "@id":"3619623", "info":{"authors":{"author":[{"@pid":"150/5735","text":"Billy Kihei"},{"@pid":"07/1962","text":"John A. Copeland"},{"@pid":"96/3389","text":"Yusun Chang"}]},"title":"Improved 5.9GHz V2V Short Range Path Loss Model.","venue":"MASS","pages":"244-252","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/KiheiCC15","doi":"10.1109/MASS.2015.84","ee":"https://doi.org/10.1109/MASS.2015.84","url":"https://dblp.org/rec/conf/mass/KiheiCC15"}, "url":"URL#3619623" }, { "@score":"1", "@id":"3619624", "info":{"authors":{"author":[{"@pid":"174/2189","text":"Lennart Klaver"},{"@pid":"z/MarcoZuniga","text":"Marco Zuniga"}]},"title":"Shine: A Step Towards Distributed Multi-Hop Visible Light Communication.","venue":"MASS","pages":"235-243","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/KlaverZ15","doi":"10.1109/MASS.2015.78","ee":"https://doi.org/10.1109/MASS.2015.78","url":"https://dblp.org/rec/conf/mass/KlaverZ15"}, "url":"URL#3619624" }, { "@score":"1", "@id":"3619625", "info":{"authors":{"author":[{"@pid":"43/4272","text":"Jun Kurihara"},{"@pid":"96/8504","text":"Kenji Yokota"},{"@pid":"00/9","text":"Kazuaki Ueda"},{"@pid":"36/6615","text":"Atsushi Tagami"}]},"title":"List Interest: Packing Interests for Reduction of Router Workload in CCN 1.0.","venue":"MASS","pages":"500-505","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/KuriharaYUT15","doi":"10.1109/MASS.2015.20","ee":"https://doi.org/10.1109/MASS.2015.20","url":"https://dblp.org/rec/conf/mass/KuriharaYUT15"}, "url":"URL#3619625" }, { "@score":"1", "@id":"3619626", "info":{"authors":{"author":[{"@pid":"02/3672","text":"Heng Li"},{"@pid":"43/5082","text":"Yonghe Liu"},{"@pid":"65/2709","text":"Yi Sun"},{"@pid":"06/3061","text":"Ruiyun Yu"}]},"title":"Place Identification in Location Based Urban VANETs.","venue":"MASS","pages":"621-626","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LiLSY15","doi":"10.1109/MASS.2015.106","ee":"https://doi.org/10.1109/MASS.2015.106","url":"https://dblp.org/rec/conf/mass/LiLSY15"}, "url":"URL#3619626" }, { "@score":"1", "@id":"3619627", "info":{"authors":{"author":[{"@pid":"143/6329","text":"Hanshang Li"},{"@pid":"63/1303-10","text":"Ting Li 0010"},{"@pid":"w/YuWang3","text":"Yu Wang 0003"}]},"title":"Dynamic Participant Recruitment of Mobile Crowd Sensing for Heterogeneous Sensing Tasks.","venue":"MASS","pages":"136-144","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LiLW15","doi":"10.1109/MASS.2015.46","ee":"https://doi.org/10.1109/MASS.2015.46","url":"https://dblp.org/rec/conf/mass/LiLW15"}, "url":"URL#3619627" }, { "@score":"1", "@id":"3619628", "info":{"authors":{"author":[{"@pid":"22/1805","text":"Ying Li"},{"@pid":"98/476-1","text":"Kun Xie 0001"},{"@pid":"10/5630-1","text":"Xin Wang 0001"}]},"title":"Pushing Towards the Limit of Sampling Rate: Adaptive Chasing Sampling.","venue":"MASS","pages":"398-406","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LiXW15","doi":"10.1109/MASS.2015.30","ee":"https://doi.org/10.1109/MASS.2015.30","url":"https://dblp.org/rec/conf/mass/LiXW15"}, "url":"URL#3619628" }, { "@score":"1", "@id":"3619629", "info":{"authors":{"author":[{"@pid":"62/5181","text":"Hao Liang"},{"@pid":"52/5208","text":"Qilian Liang"}]},"title":"Target Detection Using 3-D Sparse Underwater Senor Array Network.","venue":"MASS","pages":"616-620","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LiangL15","doi":"10.1109/MASS.2015.113","ee":"https://doi.org/10.1109/MASS.2015.113","url":"https://dblp.org/rec/conf/mass/LiangL15"}, "url":"URL#3619629" }, { "@score":"1", "@id":"3619630", "info":{"authors":{"author":[{"@pid":"38/1685","text":"Michael Lin"},{"@pid":"02/6688","text":"Simone Silvestri"},{"@pid":"98/418","text":"Novella Bartolini"},{"@pid":"l/TomLaPorta","text":"Thomas La Porta"}]},"title":"Energy-Efficient Selective Activation in Femtocell Networks.","venue":"MASS","pages":"361-369","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LinSBP15","doi":"10.1109/MASS.2015.16","ee":"https://doi.org/10.1109/MASS.2015.16","url":"https://dblp.org/rec/conf/mass/LinSBP15"}, "url":"URL#3619630" }, { "@score":"1", "@id":"3619631", "info":{"authors":{"author":[{"@pid":"43/6690","text":"Hang Liu"},{"@pid":"174/2167","text":"Kristofer Smith"}]},"title":"Improving the Expected Quality of Experience in Cloud-Enabled Wireless Access Networks.","venue":"MASS","pages":"519-524","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LiuS15","doi":"10.1109/MASS.2015.53","ee":"https://doi.org/10.1109/MASS.2015.53","url":"https://dblp.org/rec/conf/mass/LiuS15"}, "url":"URL#3619631" }, { "@score":"1", "@id":"3619632", "info":{"authors":{"author":[{"@pid":"174/2236","text":"Joshua Lloret"},{"@pid":"174/2226","text":"Robyn McCue"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"WeSeeYou: Adapting Video Streaming for Surveillance Applications.","venue":"MASS","pages":"589-592","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LloretMW15","doi":"10.1109/MASS.2015.65","ee":"https://doi.org/10.1109/MASS.2015.65","url":"https://dblp.org/rec/conf/mass/LloretMW15"}, "url":"URL#3619632" }, { "@score":"1", "@id":"3619633", "info":{"authors":{"author":[{"@pid":"174/2271","text":"Anthony Lowhur"},{"@pid":"23/5033","text":"Mooi Choo Chuah"}]},"title":"Dense Optical Flow Based Emotion Recognition Classifier.","venue":"MASS","pages":"573-578","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LowhurC15","doi":"10.1109/MASS.2015.28","ee":"https://doi.org/10.1109/MASS.2015.28","url":"https://dblp.org/rec/conf/mass/LowhurC15"}, "url":"URL#3619633" }, { "@score":"1", "@id":"3619634", "info":{"authors":{"author":[{"@pid":"31/2905","text":"Jun Luan"},{"@pid":"02/2475-1","text":"Seung Jae Lee 0001"},{"@pid":"17/1272","text":"Pai H. Chou"}]},"title":"Fast Compressive Sensing Based on Dominant Frequency Estimation.","venue":"MASS","pages":"454-455","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LuanLC15","doi":"10.1109/MASS.2015.45","ee":"https://doi.org/10.1109/MASS.2015.45","url":"https://dblp.org/rec/conf/mass/LuanLC15"}, "url":"URL#3619634" }, { "@score":"1", "@id":"3619635", "info":{"authors":{"author":[{"@pid":"64/3983","text":"Jiaqing Luo"},{"@pid":"06/3625","text":"Shijie Zhou"},{"@pid":"84/8126","text":"Hongrong Cheng"},{"@pid":"12/7834","text":"Yongjian Liao"},{"@pid":"14/3799","text":"Kai Bu"}]},"title":"A Range-Free Localization of Passive RFID Tags Using Mobile Readers.","venue":"MASS","pages":"445-446","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LuoZCLB15","doi":"10.1109/MASS.2015.34","ee":"https://doi.org/10.1109/MASS.2015.34","url":"https://dblp.org/rec/conf/mass/LuoZCLB15"}, "url":"URL#3619635" }, { "@score":"1", "@id":"3619636", "info":{"authors":{"author":[{"@pid":"132/7875","text":"Chen Lyu"},{"@pid":"62/7000","text":"Amit Pande"},{"@pid":"133/3861","text":"Xinlei Wang 0002"},{"@pid":"119/3904","text":"Jindan Zhu"},{"@pid":"72/1963","text":"Dawu Gu"},{"@pid":"m/PrasantMohapatra","text":"Prasant Mohapatra"}]},"title":"CLIP: Continuous Location Integrity and Provenance for Mobile Phones.","venue":"MASS","pages":"172-180","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/LyuPWZGM15","doi":"10.1109/MASS.2015.33","ee":"https://doi.org/10.1109/MASS.2015.33","url":"https://dblp.org/rec/conf/mass/LyuPWZGM15"}, "url":"URL#3619636" }, { "@score":"1", "@id":"3619637", "info":{"authors":{"author":[{"@pid":"164/7902","text":"Baban A. Mahmood"},{"@pid":"33/9971","text":"D. Manivannan 0001"}]},"title":"GRB: Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc Networks.","venue":"MASS","pages":"473-474","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/MahmoodM15","doi":"10.1109/MASS.2015.49","ee":"https://doi.org/10.1109/MASS.2015.49","url":"https://dblp.org/rec/conf/mass/MahmoodM15"}, "url":"URL#3619637" }, { "@score":"1", "@id":"3619638", "info":{"authors":{"author":[{"@pid":"62/4917","text":"Xin Miao"},{"@pid":"62/5693","text":"Kebin Liu"},{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"},{"@pid":"27/2403","text":"Yunhao Liu 0001"}]},"title":"Quality-Aware Online Task Assignment in Mobile Crowdsourcing.","venue":"MASS","pages":"127-135","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/MiaoLCL15","doi":"10.1109/MASS.2015.40","ee":"https://doi.org/10.1109/MASS.2015.40","url":"https://dblp.org/rec/conf/mass/MiaoLCL15"}, "url":"URL#3619638" }, { "@score":"1", "@id":"3619639", "info":{"authors":{"author":[{"@pid":"174/2227","text":"Samiuddin Mohammed"},{"@pid":"51/4251","text":"Mengjun Xie"}]},"title":"A Measurement Study on Media Streaming over Wi-Fi in Named Data Networking.","venue":"MASS","pages":"543-548","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/MohammedX15","doi":"10.1109/MASS.2015.56","ee":"https://doi.org/10.1109/MASS.2015.56","url":"https://dblp.org/rec/conf/mass/MohammedX15"}, "url":"URL#3619639" }, { "@score":"1", "@id":"3619640", "info":{"authors":{"author":[{"@pid":"36/1625","text":"Marc Mosko"},{"@pid":"163/1886","text":"Christopher A. Wood"}]},"title":"Secure Fragmentation for Content Centric Networking.","venue":"MASS","pages":"506-512","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/MoskoW15","doi":"10.1109/MASS.2015.51","ee":"https://doi.org/10.1109/MASS.2015.51","url":"https://dblp.org/rec/conf/mass/MoskoW15"}, "url":"URL#3619640" }, { "@score":"1", "@id":"3619641", "info":{"authors":{"author":[{"@pid":"141/5931","text":"Mustafa Mousa"},{"@pid":"141/5994","text":"Enas Oudat"},{"@pid":"96/6965","text":"Christian G. Claudel"}]},"title":"A Novel Dual Traffic/Flash Flood Monitoring System Using Passive Infrared/Ultrasonic Sensors.","venue":"MASS","pages":"388-397","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/MousaOC15","doi":"10.1109/MASS.2015.61","ee":"https://doi.org/10.1109/MASS.2015.61","url":"https://dblp.org/rec/conf/mass/MousaOC15"}, "url":"URL#3619641" }, { "@score":"1", "@id":"3619642", "info":{"authors":{"author":[{"@pid":"99/7868","text":"Azade Nazi"},{"@pid":"57/10514","text":"Saravanan Thirumuruganathan"},{"@pid":"42/5855","text":"Vagelis Hristidis"},{"@pid":"z/NanZhang4","text":"Nan Zhang 0004"},{"@pid":"07/1181","text":"Gautam Das 0001"}]},"title":"Querying Hidden Attributes in an Online Community Network.","venue":"MASS","pages":"657-662","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/NaziTH0D15","doi":"10.1109/MASS.2015.74","ee":"https://doi.org/10.1109/MASS.2015.74","url":"https://dblp.org/rec/conf/mass/NaziTH0D15"}, "url":"URL#3619642" }, { "@score":"1", "@id":"3619643", "info":{"authors":{"author":[{"@pid":"18/5102","text":"Florentin Neumann"},{"@pid":"f/HannesFrey","text":"Hannes Frey"}]},"title":"On Demand Beaconless Planar Backbone Construction for Quasi Unit Disk Graphs.","venue":"MASS","pages":"342-351","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/NeumannF15","doi":"10.1109/MASS.2015.63","ee":"https://doi.org/10.1109/MASS.2015.63","url":"https://dblp.org/rec/conf/mass/NeumannF15"}, "url":"URL#3619643" }, { "@score":"1", "@id":"3619644", "info":{"authors":{"author":[{"@pid":"79/986","text":"Phuong Nguyen"},{"@pid":"45/3224","text":"Klara Nahrstedt"}]},"title":"Context-Aware Crowd-Sensing in Opportunistic Mobile Social Networks.","venue":"MASS","pages":"477-478","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/NguyenN15","doi":"10.1109/MASS.2015.80","ee":"https://doi.org/10.1109/MASS.2015.80","url":"https://dblp.org/rec/conf/mass/NguyenN15"}, "url":"URL#3619644" }, { "@score":"1", "@id":"3619645", "info":{"authors":{"author":[{"@pid":"174/2636","text":"Shayne T. O'Brien"},{"@pid":"70/5472","text":"Bo Song"},{"@pid":"86/7817","text":"Brian J. Williams"},{"@pid":"174/2175","text":"Shaowu Bao"}]},"title":"Colorful Math: Developing Algorithmic Methodology to Visualize and Analyze the Dynamics of a Deciduous Tree.","venue":"MASS","pages":"555-560","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/OBrienSWB15","doi":"10.1109/MASS.2015.64","ee":"https://doi.org/10.1109/MASS.2015.64","url":"https://dblp.org/rec/conf/mass/OBrienSWB15"}, "url":"URL#3619645" }, { "@score":"1", "@id":"3619646", "info":{"authors":{"author":[{"@pid":"65/9942","text":"Pouya Ostovari"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"}]},"title":"Reliable Broadcast with Joint Forward Error Correction and Erasure Codes in Wireless Communication Networks.","venue":"MASS","pages":"324-332","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/Ostovari015","doi":"10.1109/MASS.2015.68","ee":"https://doi.org/10.1109/MASS.2015.68","url":"https://dblp.org/rec/conf/mass/Ostovari015"}, "url":"URL#3619646" }, { "@score":"1", "@id":"3619647", "info":{"authors":{"author":[{"@pid":"141/5994","text":"Enas Oudat"},{"@pid":"141/5931","text":"Mustafa Mousa"},{"@pid":"96/6965","text":"Christian G. Claudel"}]},"title":"Vehicle Detection and Classification Using Passive Infrared Sensing.","venue":"MASS","pages":"443-444","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/OudatMC15","doi":"10.1109/MASS.2015.62","ee":"https://doi.org/10.1109/MASS.2015.62","url":"https://dblp.org/rec/conf/mass/OudatMC15"}, "url":"URL#3619647" }, { "@score":"1", "@id":"3619648", "info":{"authors":{"author":[{"@pid":"76/8033","text":"Scott Pudlewski"},{"@pid":"42/4566","text":"Brooke Shrader"},{"@pid":"149/3837","text":"Laura Herrera"},{"@pid":"59/9551","text":"Nathaniel M. Jones"},{"@pid":"66/6205","text":"Andrew P. Worthen"}]},"title":"MQCC: Maximum Queue Congestion Control for Multipath Networks with Blockage.","venue":"MASS","pages":"91-99","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/PudlewskiSHJW15","doi":"10.1109/MASS.2015.13","ee":"https://doi.org/10.1109/MASS.2015.13","url":"https://dblp.org/rec/conf/mass/PudlewskiSHJW15"}, "url":"URL#3619648" }, { "@score":"1", "@id":"3619649", "info":{"authors":{"author":[{"@pid":"174/2207","text":"Amy Puente"},{"@pid":"71/3836","text":"Chiu C. Tan 0001"}]},"title":"Survey of Smartphone-Based Police Monitoring Apps.","venue":"MASS","pages":"579-584","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/PuenteT15","doi":"10.1109/MASS.2015.27","ee":"https://doi.org/10.1109/MASS.2015.27","url":"https://dblp.org/rec/conf/mass/PuenteT15"}, "url":"URL#3619649" }, { "@score":"1", "@id":"3619650", "info":{"authors":{"author":[{"@pid":"130/5866","text":"Rachael Purta"},{"@pid":"229/8924","text":"David Hachen"},{"@pid":"149/6752","text":"Jeffrey Liew"},{"@pid":"42/6870","text":"Aaron Striegel"}]},"title":"Toward a System for Longitudinal Emotion Sensing.","venue":"MASS","pages":"651-656","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/PurtaHLS15","doi":"10.1109/MASS.2015.81","ee":"https://doi.org/10.1109/MASS.2015.81","url":"https://dblp.org/rec/conf/mass/PurtaHLS15"}, "url":"URL#3619650" }, { "@score":"1", "@id":"3619651", "info":{"authors":{"author":[{"@pid":"93/10695","text":"Chen Qiu"},{"@pid":"m/MattWMutka","text":"Matt W. Mutka"}]},"title":"AirLoc: Mobile Robots Assisted Indoor Localization.","venue":"MASS","pages":"407-415","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/QiuM15","doi":"10.1109/MASS.2015.10","ee":"https://doi.org/10.1109/MASS.2015.10","url":"https://dblp.org/rec/conf/mass/QiuM15"}, "url":"URL#3619651" }, { "@score":"1", "@id":"3619652", "info":{"authors":{"author":[{"@pid":"121/1878","text":"Chenxi Qiu"},{"@pid":"15/5579","text":"Haiying Shen"}]},"title":"Link Scheduling in Wireless Cooperative Communication Networks.","venue":"MASS","pages":"462-464","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/QiuS15","doi":"10.1109/MASS.2015.75","ee":"https://doi.org/10.1109/MASS.2015.75","url":"https://dblp.org/rec/conf/mass/QiuS15"}, "url":"URL#3619652" }, { "@score":"1", "@id":"3619653", "info":{"authors":{"author":[{"@pid":"121/1878","text":"Chenxi Qiu"},{"@pid":"15/5579","text":"Haiying Shen"},{"@pid":"91/6670","text":"Kang Chen"}]},"title":"An Energy-Efficient and Distributed Cooperation Mechanism for k-Coverage Hole Detection and Healing in WSNs.","venue":"MASS","pages":"73-81","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/QiuSC15","doi":"10.1109/MASS.2015.115","ee":"https://doi.org/10.1109/MASS.2015.115","url":"https://dblp.org/rec/conf/mass/QiuSC15"}, "url":"URL#3619653" }, { "@score":"1", "@id":"3619654", "info":{"authors":{"author":[{"@pid":"162/5552","text":"Meera Radhakrishnan"},{"@pid":"24/4570","text":"Archan Misra"},{"@pid":"51/6146","text":"Rajesh Krishna Balan"},{"@pid":"51/343","text":"Youngki Lee"}]},"title":"Smartphones and BLE Services: Empirical Insights.","venue":"MASS","pages":"226-234","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/RadhakrishnanMB15","doi":"10.1109/MASS.2015.92","ee":"https://doi.org/10.1109/MASS.2015.92","url":"https://dblp.org/rec/conf/mass/RadhakrishnanMB15"}, "url":"URL#3619654" }, { "@score":"1", "@id":"3619655", "info":{"authors":{"author":[{"@pid":"156/6819","text":"Sohail Rafiqi"},{"@pid":"169/3192","text":"Chatchai Wangwiwattana"},{"@pid":"156/6808","text":"Ephrem Fernandez"},{"@pid":"n/VSSNair","text":"Suku Nair"},{"@pid":"22/4287","text":"Eric C. Larson"}]},"title":"Work-in-Progress, PupilWare-M: Cognitive Load Estimation Using Unmodified Smartphone Cameras.","venue":"MASS","pages":"645-650","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/RafiqiWFNL15","doi":"10.1109/MASS.2015.31","ee":"https://doi.org/10.1109/MASS.2015.31","url":"https://dblp.org/rec/conf/mass/RafiqiWFNL15"}, "url":"URL#3619655" }, { "@score":"1", "@id":"3619656", "info":{"authors":{"author":[{"@pid":"49/7729","text":"Mehdi Rahmati"},{"@pid":"47/3212","text":"Dario Pompili"}]},"title":"Interference Cancellation in Multiuser Acoustic Underwater Networks Using Probabilistic SDMA.","venue":"MASS","pages":"307-315","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/RahmatiP15","doi":"10.1109/MASS.2015.101","ee":"https://doi.org/10.1109/MASS.2015.101","url":"https://dblp.org/rec/conf/mass/RahmatiP15"}, "url":"URL#3619656" }, { "@score":"1", "@id":"3619657", "info":{"authors":{"author":[{"@pid":"159/4579","text":"Aram Rasul"},{"@pid":"e/ThomasErlebach","text":"Thomas Erlebach"}]},"title":"An Energy Efficient and Restricted Tour Construction for Mobile Sink in Wireless Sensor Networks.","venue":"MASS","pages":"55-63","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/RasulE15","doi":"10.1109/MASS.2015.41","ee":"https://doi.org/10.1109/MASS.2015.41","url":"https://dblp.org/rec/conf/mass/RasulE15"}, "url":"URL#3619657" }, { "@score":"1", "@id":"3619658", "info":{"authors":{"author":[{"@pid":"174/2217","text":"Claudia Salazar"},{"@pid":"174/2121","text":"Katie Buckley"},{"@pid":"173/1274","text":"Catherine Mobley"}]},"title":"What's on Tap? Transforming Stormwater Survey Data into Visually Appealing Educational Tools.","venue":"MASS","pages":"593-597","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/SalazarBM15","doi":"10.1109/MASS.2015.66","ee":"https://doi.org/10.1109/MASS.2015.66","url":"https://dblp.org/rec/conf/mass/SalazarBM15"}, "url":"URL#3619658" }, { "@score":"1", "@id":"3619659", "info":{"authors":{"author":[{"@pid":"39/7827","text":"Fatemeh Saremi"},{"@pid":"a/TarekFAbdelzaher","text":"Tarek F. Abdelzaher"}]},"title":"Combining Map-Based Inference and Crowd-Sensing for Detecting Traffic Regulators.","venue":"MASS","pages":"145-153","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/SaremiA15","doi":"10.1109/MASS.2015.18","ee":"https://doi.org/10.1109/MASS.2015.18","url":"https://dblp.org/rec/conf/mass/SaremiA15"}, "url":"URL#3619659" }, { "@score":"1", "@id":"3619660", "info":{"authors":{"author":[{"@pid":"85/8849","text":"Asanka P. Sayakkara"},{"@pid":"170/5539","text":"Chathura Suduwella"},{"@pid":"174/2146","text":"Charith Shalitha"},{"@pid":"174/2245","text":"Rumesh Hapuarachchi"},{"@pid":"01/3590","text":"Chamath Keppitiyagama"},{"@pid":"22/2540","text":"Kasun De Zoysa"}]},"title":"Wireless Sensing: What Simplicity Has to Offer?","venue":"MASS","pages":"475-476","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/SayakkaraSSHKZ15","doi":"10.1109/MASS.2015.79","ee":"https://doi.org/10.1109/MASS.2015.79","url":"https://dblp.org/rec/conf/mass/SayakkaraSSHKZ15"}, "url":"URL#3619660" }, { "@score":"1", "@id":"3619661", "info":{"authors":{"author":[{"@pid":"116/2851","text":"Ahmed El Shafie 0001"},{"@pid":"a/NaofalAlDhahir","text":"Naofal Al-Dhahir"},{"@pid":"83/6194","text":"Ridha Hamila"}]},"title":"Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks with Node Buffers.","venue":"MASS","pages":"271-279","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ShafieAH15","doi":"10.1109/MASS.2015.23","ee":"https://doi.org/10.1109/MASS.2015.23","url":"https://dblp.org/rec/conf/mass/ShafieAH15"}, "url":"URL#3619661" }, { "@score":"1", "@id":"3619662", "info":{"authors":{"author":[{"@pid":"07/4044","text":"Xingfa Shen"},{"@pid":"159/1158","text":"Yueshen Chen"},{"@pid":"40/4731","text":"Jianhui Zhang"},{"@pid":"174/2136","text":"Landi Wang"},{"@pid":"36/623","text":"Guojun Dai"},{"@pid":"h/TianHe","text":"Tian He 0001"}]},"title":"BarFi: Barometer-Aided Wi-Fi Floor Localization Using Crowdsourcing.","venue":"MASS","pages":"416-424","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ShenCZWDH15","doi":"10.1109/MASS.2015.103","ee":"https://doi.org/10.1109/MASS.2015.103","url":"https://dblp.org/rec/conf/mass/ShenCZWDH15"}, "url":"URL#3619662" }, { "@score":"1", "@id":"3619663", "info":{"authors":{"author":[{"@pid":"189/4028","text":"Aloizio P. Silva"},{"@pid":"174/2249","text":"Marcelo R. Hilario"},{"@pid":"h/CelsoMassakiHirata","text":"Celso M. Hirata"},{"@pid":"o/KatiaObraczka","text":"Katia Obraczka"}]},"title":"A Percolation-Based Approach to Model DTN Congestion Control.","venue":"MASS","pages":"100-108","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/SilvaHHO15","doi":"10.1109/MASS.2015.91","ee":"https://doi.org/10.1109/MASS.2015.91","url":"https://dblp.org/rec/conf/mass/SilvaHHO15"}, "url":"URL#3619663" }, { "@score":"1", "@id":"3619664", "info":{"authors":{"author":[{"@pid":"25/5691","text":"Besma Smida"},{"@pid":"174/2203","text":"Hamed Mojtahed"},{"@pid":"174/2252","text":"Holly Markovich"},{"@pid":"174/2194","text":"Andie Lee"}]},"title":"Backscatter-Modulation Constellation for Full-Duplex Wireless Communication.","venue":"MASS","pages":"561-566","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/SmidaMML15","doi":"10.1109/MASS.2015.88","ee":"https://doi.org/10.1109/MASS.2015.88","url":"https://dblp.org/rec/conf/mass/SmidaMML15"}, "url":"URL#3619664" }, { "@score":"1", "@id":"3619665", "info":{"authors":{"author":[{"@pid":"59/1815","text":"Chao Song"},{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"49/2793-1","text":"Li Lu 0001"},{"@pid":"20/2039-2","text":"Ming Liu 0002"}]},"title":"RTS Assisted Mobile Localization: Mitigating Jigsaw Puzzle Problem of Fingerprint Space with Extra Mile.","venue":"MASS","pages":"434-442","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/SongWLL15","doi":"10.1109/MASS.2015.43","ee":"https://doi.org/10.1109/MASS.2015.43","url":"https://dblp.org/rec/conf/mass/SongWLL15"}, "url":"URL#3619665" }, { "@score":"1", "@id":"3619666", "info":{"authors":{"author":[{"@pid":"151/7481","text":"Junji Takemasa"},{"@pid":"56/3376","text":"Yuki Koizumi"},{"@pid":"38/5203","text":"Toru Hasegawa"},{"@pid":"71/1406","text":"Ioannis Psaras"}]},"title":"On Energy Reduction and Green Networking Enhancement Due to In-Network Caching.","venue":"MASS","pages":"513-518","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/TakemasaKHP15","doi":"10.1109/MASS.2015.55","ee":"https://doi.org/10.1109/MASS.2015.55","url":"https://dblp.org/rec/conf/mass/TakemasaKHP15"}, "url":"URL#3619666" }, { "@score":"1", "@id":"3619667", "info":{"authors":{"author":[{"@pid":"143/0927","text":"Rasool Tavakoli"},{"@pid":"09/3386","text":"Majid Nabi"},{"@pid":"b/TwanBasten","text":"Twan Basten"},{"@pid":"g/KeesGoossens","text":"Kees Goossens"}]},"title":"Enhanced Time-Slotted Channel Hopping in WSNs Using Non-intrusive Channel-Quality Estimation.","venue":"MASS","pages":"217-225","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/TavakoliNBG15","doi":"10.1109/MASS.2015.48","ee":"https://doi.org/10.1109/MASS.2015.48","url":"https://dblp.org/rec/conf/mass/TavakoliNBG15"}, "url":"URL#3619667" }, { "@score":"1", "@id":"3619668", "info":{"authors":{"author":[{"@pid":"133/4851","text":"Tuyen X. Tran"},{"@pid":"47/3212","text":"Dario Pompili"}]},"title":"Dynamic Radio Cooperation for Downlink Cloud-RANs with Computing Resource Sharing.","venue":"MASS","pages":"118-126","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/TranP15","doi":"10.1109/MASS.2015.21","ee":"https://doi.org/10.1109/MASS.2015.21","url":"https://dblp.org/rec/conf/mass/TranP15"}, "url":"URL#3619668" }, { "@score":"1", "@id":"3619669", "info":{"authors":{"author":[{"@pid":"00/9","text":"Kazuaki Ueda"},{"@pid":"96/8504","text":"Kenji Yokota"},{"@pid":"43/4272","text":"Jun Kurihara"},{"@pid":"36/6615","text":"Atsushi Tagami"}]},"title":"A Performance Analysis of End-to-End Fragmentation in Content-Centric Networking.","venue":"MASS","pages":"531-536","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/UedaYKT15","doi":"10.1109/MASS.2015.24","ee":"https://doi.org/10.1109/MASS.2015.24","url":"https://dblp.org/rec/conf/mass/UedaYKT15"}, "url":"URL#3619669" }, { "@score":"1", "@id":"3619670", "info":{"authors":{"author":[{"@pid":"174/2131","text":"Ying Vang"},{"@pid":"174/2259","text":"Arturo Saavedra"},{"@pid":"65/4115","text":"Shuhui Yang"}]},"title":"Ferry Enhanced Improved PRoPHET Routing Protocol.","venue":"MASS","pages":"567-572","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/VangSY15","doi":"10.1109/MASS.2015.60","ee":"https://doi.org/10.1109/MASS.2015.60","url":"https://dblp.org/rec/conf/mass/VangSY15"}, "url":"URL#3619670" }, { "@score":"1", "@id":"3619671", "info":{"authors":{"author":[{"@pid":"71/4292","text":"Gang Wang"},{"@pid":"61/2035","text":"Wenming Li"},{"@pid":"174/2232","text":"Xingyu Cai"}]},"title":"MBDMAC: A MAC Protocol for Multi-beam Directional Antennas in Wireless Networks.","venue":"MASS","pages":"486-487","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/WangLC15","doi":"10.1109/MASS.2015.94","ee":"https://doi.org/10.1109/MASS.2015.94","url":"https://dblp.org/rec/conf/mass/WangLC15"}, "url":"URL#3619671" }, { "@score":"1", "@id":"3619672", "info":{"authors":{"author":[{"@pid":"174/2154","text":"Brandy Warwick"},{"@pid":"174/2219","text":"Nicholas Symons"},{"@pid":"05/3054-1","text":"Xiao Chen 0001"},{"@pid":"27/5547","text":"Kaiqi Xiong"}]},"title":"Detecting Driver Drowsiness Using Wireless Wearables.","venue":"MASS","pages":"585-588","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/WarwickSCX15","doi":"10.1109/MASS.2015.22","ee":"https://doi.org/10.1109/MASS.2015.22","url":"https://dblp.org/rec/conf/mass/WarwickSCX15"}, "url":"URL#3619672" }, { "@score":"1", "@id":"3619673", "info":{"authors":{"author":[{"@pid":"174/2240","text":"Shunyi Xu"},{"@pid":"34/3772-1","text":"Chuan Wu 0001"},{"@pid":"24/1320","text":"Zongpeng Li"}]},"title":"Software Defined Mobile Multicast.","venue":"MASS","pages":"208-216","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/XuWL15","doi":"10.1109/MASS.2015.87","ee":"https://doi.org/10.1109/MASS.2015.87","url":"https://dblp.org/rec/conf/mass/XuWL15"}, "url":"URL#3619673" }, { "@score":"1", "@id":"3619674", "info":{"authors":{"author":[{"@pid":"92/7993","text":"Zhe Yan"},{"@pid":"10/5630-1","text":"Xin Wang 0001"},{"@pid":"174/2155","text":"Daegeun Yoon"},{"@pid":"27/3906","text":"Dongliang Xie"}]},"title":"Connecting Robots with Concurrent Exploration of Control and Communications.","venue":"MASS","pages":"352-360","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/YanWYX15","doi":"10.1109/MASS.2015.32","ee":"https://doi.org/10.1109/MASS.2015.32","url":"https://dblp.org/rec/conf/mass/YanWYX15"}, "url":"URL#3619674" }, { "@score":"1", "@id":"3619675", "info":{"authors":{"author":[{"@pid":"21/10358","text":"Zhicheng Yang"},{"@pid":"62/8333","text":"Parth H. Pathak"},{"@pid":"141/9566","text":"Yunze Zeng"},{"@pid":"m/PrasantMohapatra","text":"Prasant Mohapatra"}]},"title":"Sensor-Assisted Codebook-Based Beamforming for Mobility Management in 60 GHz WLANs.","venue":"MASS","pages":"333-341","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/YangPZM15","doi":"10.1109/MASS.2015.58","ee":"https://doi.org/10.1109/MASS.2015.58","url":"https://dblp.org/rec/conf/mass/YangPZM15"}, "url":"URL#3619675" }, { "@score":"1", "@id":"3619676", "info":{"authors":{"author":[{"@pid":"86/11141","text":"Yingyuan Yang"},{"@pid":"22/1105","text":"Jinyuan Stella Sun"},{"@pid":"91/195-1","text":"Chi Zhang 0001"},{"@pid":"72/2643-1","text":"Pan Li 0001"}]},"title":"Retraining and Dynamic Privilege for Implicit Authentication Systems.","venue":"MASS","pages":"163-171","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/YangSZ015","doi":"10.1109/MASS.2015.69","ee":"https://doi.org/10.1109/MASS.2015.69","url":"https://dblp.org/rec/conf/mass/YangSZ015"}, "url":"URL#3619676" }, { "@score":"1", "@id":"3619677", "info":{"authors":{"author":[{"@pid":"115/6376","text":"Yanhong Yang"},{"@pid":"86/4843","text":"Huan Yang"},{"@pid":"72/5666","text":"Liang Cheng"},{"@pid":"31/2303","text":"Xiaotong Zhang"}]},"title":"Optimal Time and Channel Assignment for Data Collection in Wireless Sensor Networks.","venue":"MASS","pages":"456-457","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/YangYCZ15","doi":"10.1109/MASS.2015.90","ee":"https://doi.org/10.1109/MASS.2015.90","url":"https://dblp.org/rec/conf/mass/YangYCZ15"}, "url":"URL#3619677" }, { "@score":"1", "@id":"3619678", "info":{"authors":{"author":[{"@pid":"161/6978","text":"Shitong Yuan"},{"@pid":"52/5208","text":"Qilian Liang"}]},"title":"Game Theoretical Method for Sum-Rate Maximization in Full-Duplex Massive MIMO Heterogeneous Networks.","venue":"MASS","pages":"610-615","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/YuanL15","doi":"10.1109/MASS.2015.109","ee":"https://doi.org/10.1109/MASS.2015.109","url":"https://dblp.org/rec/conf/mass/YuanL15"}, "url":"URL#3619678" }, { "@score":"1", "@id":"3619679", "info":{"authors":{"author":[{"@pid":"42/2112-1","text":"De-gan Zhang 0001"},{"@pid":"27/1736","text":"Wen-bin Li"},{"@pid":"37/1873","text":"Zhen Ma"},{"@pid":"147/8363-4","text":"Si Liu 0004"},{"@pid":"174/2144","text":"Jin-Jie Song"}]},"title":"New Dv-Distance Algorithm Based on Path for Wireless Sensor Network.","venue":"MASS","pages":"491-493","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ZhangLMLS15","doi":"10.1109/MASS.2015.97","ee":"https://doi.org/10.1109/MASS.2015.97","url":"https://dblp.org/rec/conf/mass/ZhangLMLS15"}, "url":"URL#3619679" }, { "@score":"1", "@id":"3619680", "info":{"authors":{"author":[{"@pid":"42/2112-1","text":"De-gan Zhang 0001"},{"@pid":"37/1873","text":"Zhen Ma"},{"@pid":"75/6090","text":"Dexin Zhao"},{"@pid":"174/2144","text":"Jin-Jie Song"},{"@pid":"147/8363-4","text":"Si Liu 0004"}]},"title":"Novel Adaptive Queue Intelligent Management Algorithm.","venue":"MASS","pages":"483-485","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ZhangMZSL15","doi":"10.1109/MASS.2015.98","ee":"https://doi.org/10.1109/MASS.2015.98","url":"https://dblp.org/rec/conf/mass/ZhangMZSL15"}, "url":"URL#3619680" }, { "@score":"1", "@id":"3619681", "info":{"authors":{"author":[{"@pid":"90/545-1","text":"Zhikun Zhang 0001"},{"@pid":"55/826-1","text":"Heng Zhang 0001"},{"@pid":"07/7178","text":"Shibo He"},{"@pid":"76/185-1","text":"Peng Cheng 0001"}]},"title":"Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks.","venue":"MASS","pages":"181-189","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ZhangZHC15","doi":"10.1109/MASS.2015.93","ee":"https://doi.org/10.1109/MASS.2015.93","url":"https://dblp.org/rec/conf/mass/ZhangZHC15"}, "url":"URL#3619681" }, { "@score":"1", "@id":"3619682", "info":{"authors":{"author":[{"@pid":"224/0761","text":"Xi Zheng 0001"},{"@pid":"j/ChristineJulien","text":"Christine Julien 0001"},{"@pid":"37/2953","text":"Rodion M. Podorozhny"},{"@pid":"99/622","text":"Franck Cassez"}]},"title":"BraceAssertion: Runtime Verification of Cyber-Physical Systems.","venue":"MASS","pages":"298-306","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ZhengJPC15","doi":"10.1109/MASS.2015.15","ee":"https://doi.org/10.1109/MASS.2015.15","url":"https://dblp.org/rec/conf/mass/ZhengJPC15"}, "url":"URL#3619682" }, { "@score":"1", "@id":"3619683", "info":{"authors":{"author":[{"@pid":"07/4580","text":"Yang Zhou"},{"@pid":"64/10521","text":"Yuanchao Shu"},{"@pid":"76/185-1","text":"Peng Cheng 0001"},{"@pid":"34/520-1","text":"Zhiguo Shi 0001"},{"@pid":"55/2484-1","text":"Jiming Chen 0001"}]},"title":"Phonemeter: Bringing EMF Detection to Smartphones.","venue":"MASS","pages":"469-470","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ZhouSCSC15","doi":"10.1109/MASS.2015.82","ee":"https://doi.org/10.1109/MASS.2015.82","url":"https://dblp.org/rec/conf/mass/ZhouSCSC15"}, "url":"URL#3619683" }, { "@score":"1", "@id":"3619684", "info":{"authors":{"author":[{"@pid":"07/4691-4","text":"Weiping Zhu 0004"},{"@pid":"65/5746-9","text":"Yi Hong 0009"},{"@pid":"97/4817","text":"Vaskar Raychoudhury"},{"@pid":"124/6274","text":"Run Zhao"},{"@pid":"40/3934-24","text":"Dong Wang 0024"}]},"title":"Adaptive Distributed Reader Activation Approach for Large-Scale RFID Systems.","venue":"MASS","pages":"82-90","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ZhuHRZW15","doi":"10.1109/MASS.2015.11","ee":"https://doi.org/10.1109/MASS.2015.11","url":"https://dblp.org/rec/conf/mass/ZhuHRZW15"}, "url":"URL#3619684" }, { "@score":"1", "@id":"3619685", "info":{"authors":{"author":[{"@pid":"174/2169","text":"Yifei Zhu"},{"@pid":"127/2907","text":"Jingjie Jiang"},{"@pid":"50/3402-1","text":"Bo Li 0001"},{"@pid":"l/BaochunLi","text":"Baochun Li"}]},"title":"Rado: A Randomized Auction Approach for Data Offloading via D2D Communication.","venue":"MASS","pages":"1-9","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/mass/ZhuJ0L15","doi":"10.1109/MASS.2015.83","ee":"https://doi.org/10.1109/MASS.2015.83","url":"https://dblp.org/rec/conf/mass/ZhuJ0L15"}, "url":"URL#3619685" }, { "@score":"1", "@id":"3668570", "info":{"title":"12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015","venue":"MASS","publisher":"IEEE Computer Society","year":"2015","type":"Editorship","key":"conf/mass/2015","ee":"https://ieeexplore.ieee.org/xpl/conhome/7366896/proceeding","url":"https://dblp.org/rec/conf/mass/2015"}, "url":"URL#3668570" } ] } } } )