


default search action
International Journal of Communication Systems, Volume 29
Volume 29, Number 1, January 2016
- Pavel Lafata

:
Investigation of phantom circuit benefits for next generation xDSL systems. 5-15 - Xidong Wang, Wei Zheng, Zhaoming Lu, Xiangming Wen, Wei Li:

Dense femtocell networks power self-optimization: an exact potential game approach. 16-32 - Yiming Jiang, Julong Lan, Zhiming Wang, Yuanyuan Deng:

Embedding and reconfiguration algorithms for service aggregation in network virtualization. 33-46 - Vinícius Duarte Lima, Aldebaro Klautau, João Costa, Klas Ericson, Antoni Fertner, Claudomiro Sales:

A wavelet-based expert system for digital subscriber line topology identification. 47-63 - Ronghua Shang, Kun Zhang, Licheng Jiao

, Jianshe Wu:
Discrete polynary coding immune clonal selection-based joint subcarrier and power allocation in uplink cognitive OFDM network. 64-83 - Shiyong Li, Wei Sun, Changchun Hua

:
Optimal resource allocation for heterogeneous traffic in multipath networks. 84-98 - Parul Puri

, Parul Garg, Mona Aggarwal:
Analysis of spectrally efficient two-way relay assisted free space optical systems in atmospheric turbulence with path loss. 99-112 - Hua Li, Cunqing Hua, Cailian Chen, Xinping Guan:

ADS-B aided robust relay selection for cooperative communications in aircraft approach. 113-129 - Zhijun Wu, Ran Hu, Meng Yue:

Flow-oriented detection of low-rate denial of service attacks. 130-141 - Tadesse Ghirmai:

Design of reduced complexity feedback precoding for MIMO-OFDM. 142-154 - Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang, Cai Fu:

A multi-objective optimization model based on immune algorithm in wireless mesh networks. 155-169 - Geetha Dundesh Devanagavi

, N. Nalini
, Rajashekhar C. Biradar
:
Secured routing in wireless sensor networks using fault-free and trusted nodes. 170-193 - Ana Gomes, Marcio Monteiro, Boris Dortschy, Aldebaro Klautau:

An hybrid evolutionary multiobjective algorithm for multiuser margin maximization in DSL. 194-209 - Yanjing Sun, Jianguang Sun, Fangfang Zhao, Zhuoxian Hu:

Delay constraint multipath routing for wireless multimedia ad hoc networks. 210-225
Volume 29, Number 2, January 2016
- Izzet F. Senturk

, Kemal Akkaya, Shadi Janansefat:
Towards realistic connectivity restoration in partitioned mobile sensor networks. 230-250 - Abdulsalam A. Yayah, Yahaya Coulibaly

, Abdul Samad Ismail, George N. Rouskas
:
Hybrid offset-time and burst assembly algorithm (H-OTBA) for delay sensitive applications over optical burst switching networks. 251-261 - Garima Mishra, Selvamuthu Dharmaraja

, Subrat Kar:
Reducing session establishment delay using timed out packets in SIP signaling network. 262-276 - Yi-Ning Liu

, Chi Cheng, Tao Jiang, Chin-Chen Chang:
A practical lottery using oblivious transfer. 277-282 - Wun-She Yap

, Bok-Min Goi
:
Forgery attacks of an identity-based multi-proxy signature scheme. 283-289 - Chin-Chen Chang, Ting-Fang Cheng, Wei-Yuan Hsueh:

A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. 290-306 - Emmanouil Skondras, Aggeliki Sgora, Angelos Michalas, Dimitrios D. Vergados

:
An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method. 307-329 - M. Abbasi-Jannatabad, H. Khoshbin:

Cooperative beamforming and relay selection in cognitive radio systems. 330-340 - Jian Chen, Xiaokang Zhou, Qun Jin:

Gradually adaptive recommendation based on semantic mapping of users′ interest correlations. 341-361 - Yongbin Wang, Hong Ji, Heli Zhang:

Spectrum-efficiency enhancement in small cell networks with biasing cell association and eICIC: An analytical framework. 362-377 - Subhas Chandra Misra, Virender Singh, Naveen Kumar Jha, Sandip Bisui:

Modeling privacy issues in distributed enterprise resource planning systems. 378-401 - Stevan M. Berber

:
Noise-based spreading in code division multiple access systems for secure communications. 402-416 - Sándor Imre

:
Modified quantum superdense coding for distributed communications. 417-423
Volume 29, Number 3, February 2016
- Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Jui-Tsun Hung, Chun-Pin Shao:

Traffic diversity and code coverage: a preliminary analysis. 428-440 - Saru Kumari

, Muhammad Khurram Khan
, Xiong Li
, Fan Wu
:
Design of a user anonymous password authentication scheme without smart card. 441-458 - Jie Zhou, Hao Jiang, Hisakazu Kikuchi:

Geometry-based statistical channel model and performance for MIMO antennas. 459-477 - Qi Xie, Na Dong, Duncan S. Wong, Bin Hu:

Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. 478-487 - Yawgeng A. Chau, Mostafa Al-Harbawi:

General switch-and-examine relaying for demodulate-and-forward cooperative diversity. 488-506 - Xu Li, Huarui Yin, Ying Xu, Guo Wei:

Inter-cell interference mitigation based on joint beamforming. 507-521 - Nedo Celandroni, Franco Davoli

, Erina Ferro, Alberto Gotta
:
On elastic traffic via contention resolution diversity slotted aloha satellite access. 522-534 - Xiang Feng, Xiaoting Liu, Huiqun Yu:

A new internet of things group search optimizer. 535-552 - Xiaoping Jin, Xinqiang Han, Ning Jin, Youming Li, Zhengquan Li, Xiuming Wang:

Differential space-time network coding in MIMO two-way relay channel network. 553-566 - Siqi Lu

, Jinhua Zhao, Qingfeng Cheng:
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction. 567-578 - Xiangdong Jia, Pengfei Deng, Longxiang Yang, Hongbo Zhu:

Study on cognitive DF relaying cooperation with the mutual interference between primary and secondary users over Nakagami-m fading channels. 579-601 - Alireza Naghizadeh, Samaneh Berenjian, Ehsan Meamari, Reza Ebrahimi Atani

:
Structural-based tunneling: preserving mutual anonymity for circular P2P networks. 602-619 - Sungmook Lim, Kyunbyoung Ko:

Performance evaluation of HDAF relaying systems for pilot and data symbol burst transmission over quasi-static Rayleigh fading channels. 620-637 - Yi-Wei Ma, Jiann-Liang Chen, Fan-Sheng Chang, Chia-Lun Tang:

Novel fingerprinting mechanisms for indoor positioning. 638-656
Volume 29, Number 4, March 2016
- Biao Zhou, Changqiang Jing, Youngok Kim:

Power boosting factor determination in impulse postfix-OFDM-based positioning system. 660-670 - Silvio Sampaio

, Pedro F. Souto
, Francisco Vasques
:
A review of scalability and topological stability issues in IEEE 802.11s wireless mesh networks deployments. 671-693 - Zhikui Chen, Ruochuan Ling, Chung-Ming Huang, Xu Zhu:

A scheme of access service recommendation for the Social Internet of Things. 694-706 - Chenkai Yang, Liusheng Huang, Hongli Xu, Bing Leng:

A scale-independent way for differential estimation in dynamic radio frequency identification systems. 707-721 - Aditi Chatterjee, Palaniandavar Venkateswaran:

An efficient statistical approach for time synchronization in wireless sensor networks. 722-733 - Khaled M. Gharaibeh, Ayman S. Al-Zayed:

Performance of feed-forward linearizers of power amplifiers in OFDM systems under complex gain errors. 734-747 - Hsin-Ying Liang

, Hung-Chi Chu, Chuan-Bi Lin:
Peak-to-average power ratio reduction of orthogonal frequency division multiplexing systems using modified tone reservation techniques. 748-759 - Jun Liu, Lianglun Cheng, Tao Wang, Jianhua Wang:

Sparse deployment scheme in mobile sensor networks with prioritized event area. 760-771 - Min-Xiou Chen, Fu-Hsing Sung:

Integrated service discovery architecture for heterogeneous networks. 772-786 - Jerzy Domzal

, Robert Wójcik, Piotr Cholda
, Rafal Stankiewicz
, Andrzej Jajszczyk
:
Efficient congestion control mechanism for flow-aware networks. 787-800 - Jagadeesh Kakarla, Banshidhar Majhi, Ramesh Babu Battula

:
IAMMAC: an interference-aware multichannel MAC protocol for wireless sensor-actor networks. 801-822 - Deepak P. M., C. K. Ali:

Low-complexity inter-carrier interference cancelation scheme for SC-IFDMA system. 823-835
Volume 29, Number 5, March 2016
- Niranjan Kumar Ray

, Ashok Kumar Turuk
:
A technique to improve network lifetime in mobile ad hoc networks. 840-858 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

:
A short ID-based proxy signature scheme. 859-873 - Ta-Te Lu

, Sheng-Cheng Yeh, Shang-Hung Wu:
Actualizing real-time indoor positioning systems using plane models. 874-892 - Uche A. K. Chude-Okonkwo, Chollette C. Chude-Olisah, Solomon Nunoo

, Razal Nga:
Characterization and parameterization of dynamic wireless channels over long duration using evolutionary channel parameters. 893-915 - Deepak Kumar Rout

, Kiran Kumar Gurrala, Susmita Das
:
Performance of amplify forward and decode forward cooperative strategies for body surface communications in UWB Body Area Networks. 916-928 - M. Pounambal, P. Venkata Krishna

:
Efficient channel assignment method for multimedia traffic in wireless mesh networks. 929-941 - Jiajun Sun:

Marginal quality-based long-term incentive mechanisms for crowd sensing. 942-958 - Mohammad Reza Majma

, Sanaz Almassi
, Hamid Shokrzadeh
:
SGDD: self-managed grid-based data dissemination protocol for mobile sink in wireless sensor network. 959-976 - Haiquan Wang, Baofeng Zhao, Lei Hong:

Criterions of designing codebooks and a relay selection scheme for a relay network. 977-991 - Zhiqiang Ruan, Haibo Luo, Zhide Chen:

Improving reliability of erasure codes-based storage paradigm under correlated failures for wireless sensor networks. 992-1011 - JinWoo Yoo

, Insun Song, JaeWook Shin, PooGyeon Park
:
A variable step-size diffusion affine projection algorithm. 1012-1025 - Mustapha Réda Senouci

, Daoud Bouguettouche, Farouk Souilah, Abdelhamid Mellouk:
Static wireless sensor networks deployment using an improved binary PSO. 1026-1041
Volume 29, Number 6, April 2016
- Suhail Al Madani, Balqies Sadoun, Omar Al-Bayari:

Continuously operating reference station and surveying applications in KSA. 1046-1056 - Seyed Akbar Mostafavi

, Mehdi Dehghan
:
Game-theoretic auction design for bandwidth sharing in helper-assisted P2P streaming. 1057-1072 - Shixun Wu, Dengyuan Xu, Jin Tan, Kai Xu, Honggang Wang:

Two base station location techniques with adjusted measurements in circular scattering environments. 1073-1083 - Richa Bhatia, Ajay Kumar Sharma, Jyoti Saxena:

Comparative investigations of DWDM transmission system with PMD for different orthogonally modulated signals at 80 Gb/s. 1084-1090 - Mohamed Manoufali

, Peng-Yong Kong
, Shihab Jimaa
:
Effect of realistic sea surface movements in achieving full-view coverage camera sensor network. 1091-1115 - Jorge Torres

, Fidel Hernández
, Youssef El Hajj Shehadeh:
Timing synchronization method for pilot-based coherent detection. 1116-1127 - Gosan Noh, Seungjae Bahng, Youn-Ok Park:

BER minimization for dual-polarized wireless systems with polarization-domain rotation. 1128-1137 - Long Chen, Liusheng Huang, Hongli Xu, Yang Du:

Queueing analysis for preemptive transmission in underlay CRNs. 1138-1155 - Ginu Thomas, Boon-Chong Seet:

Multi-interface cognitive radio for enhanced routing in multi-hop cellular networks. 1156-1186 - Hamidreza Mahini, Mehdi Dehghan, Hamidreza Navidi, Amir Masoud Rahmani:

GaMe-PLive: a new game theoretic mechanism for P2P live video streaming. 1187-1203
Volume 29, Number 7, May 2016
- Abhijit Bhowmick, Sanjay Dhar Roy

, Sumit Kundu:
Sensing throughput trade-off for an energy efficient cognitive radio network under faded sensing and reporting channel. 1208-1218 - Saurabh Aggarwal

, Joy Kuri, Rahul Vaze:
Social optimum in social groups with give-and-take criterion. 1219-1234 - Mehrdad Agha Mohammad Ali Kermani

, Alireza Aliahmadi, Robert A. Hanneman:
Optimizing the choice of influential nodes for diffusion on a social network. 1235-1250 - Chi Lin, Guowei Wu, Tie Qiu, Jing Deng:

A low-cost node capture attack algorithm for wireless sensor networks. 1251-1268 - Amirhosein Moravejosharieh, Jaime Lloret:

A survey of IEEE 802.15.4 effective system parameters for wireless body sensor networks. 1269-1292 - Minghe Mao

, Ning Cao, Yunfei Chen
, Hao-Hua Chu:
Novel noncoherent detection for multi-hop amplify-and-forward relaying systems. 1293-1304 - Özgür Ergül, Fatih Alagöz, Özgür B. Akan:

Throughput maximization in electromagnetic energy harvesting cognitive radio sensor networks. 1305-1322 - K. Selvaraj, P. Ganeshkumar, M. Anandaraj

:
Iterative MMSE equalization and CFO compensation for the uplink SC-FDMA transmission. 1323-1337
Volume 29, Number 8, May 2016
- Chun-Chuan Yang, Jeng-Yueng Chen, Yi-Ting Mai, Hsieh-Hua Liu:

Integrated power saving for relay node and user equipment in LTE-A. 1342-1364 - Konstantinos Deltouzos

, Ilias Gkortsilas, Nikolaos Efthymiopoulos, Maria Efthymiopoulou, Spyros G. Denazis:
SeekStream: adapting to dynamic user behavior in P2P video-on-demand. 1365-1394 - Shivam Gupta

, Subhas C. Misra:
Compliance, network, security and the people related factors in cloud ERP implementation. 1395-1419 - S. Senthilkumar, C. Geetha Priya:

Beamforming-based feature extraction and RVM-based method for attacker node classification in CRN. 1420-1438 - Pramod Kumar

, Ashvini Chaturvedi:
Probabilistic query generation and fuzzy c-means clustering for energy-efficient operation in wireless sensor networks. 1439-1450 - Mohammed W. Baidas

, Masoud M. Afghah:
Energy-efficient partner selection in cooperative wireless networks: a matching-theoretic approach. 1451-1470
Volume 29, Number 9, June 2016
- T. H. Kim, J. W. Kim:

Partitioned scheduling for sphere decoding with runtime constraints for practical MIMO communication systems. 1474-1481 - Guozhen Cheng, Hongchang Chen, Hongchao Hu, Julong Lan:

Dynamic switch migration towards a scalable SDN control plane. 1482-1499 - Laurent Yamen Njilla, Niki Pissinou, Kia Makki:

Game theoretic modeling of security and trust relationship in cyberspace. 1500-1512 - Zhiqun Hu, Zhaoming Lu, Xiangming Wen, Wenpeng Jing:

QoE-based pseudo heartbeat message compression mechanism for future wireless network. 1513-1528 - SK Hafizul Islam

, Mohammad S. Obaidat
, Ruhul Amin
:
An anonymous and provably secure authentication scheme for mobile user. 1529-1544 - Leonardo Daniel Sánchez Martínez, Víctor Manuel Ramos Ramos

, Oscar Ledesma:
Efficient detection of missing tags for passive RFID systems. 1545-1567 - P. Ganeshkumar, K. Selvaraj, M. Anandaraj

, K. P. Vijayakumar:
Iterative nonlinear detection for SFBC SC-FDMA uplink MIMO transmission systems. 1568-1581
Volume 29, Number 10, July 2016
- Mehdi Ghamari Adian, Hassan Aghaeinia

:
Resource allocation in MIMO-OFDM-based cooperative cognitive radio networks: optimal and suboptimal low complexity approaches. 1586-1604 - Soumaya Hamouda, Sourour El-Bessi, Sami Tabbane:

New coalition formation game for spectrum sharing in cognitive radio networks. 1605-1619 - Niels Sluijs, Tim Wauters, Chris Develder

, Filip De Turck
, Piet Demeester, Bart Dhoedt:
Using topology information for quality-aware Peer-to-Peer multilayer video streaming. 1620-1644 - Mao Yang, Yong Li, Bo Li, Depeng Jin, Sheng Chen

:
Service-oriented 5G network architecture: an end-to-end software defining approach. 1645-1657 - Antonios Sarigiannidis, Petros Nicopolitidis:

Addressing the interdependence in providing fair and efficient bandwidth distribution in hybrid optical-wireless networks. 1658-1682 - Tarek Bouali, Sidi-Mohammed Senouci

, Hichem Sedjelmaci:
A distributed detection and prevention scheme from malicious nodes in vehicular networks. 1683-1704
Volume 29, Number 11, July 2016
- SK Hafizul Islam

:
Design and analysis of an improved smartcard-based remote user password authentication scheme. 1708-1719 - Mohsen Maadani

, Seyed Ahmad Motamedi
:
A comprehensive DCF performance analysis in noisy industrial wireless networks. 1720-1739 - Chuan-Ching Sue, Kai-Chun Chuang, Chi-Yu Hsu:

Access control mechanism using flexible multi-layer structure for mesh-based P2P live streaming systems. 1740-1760 - Binod Prasad, Abhijit Bhowmick, Sanjay Dhar Roy

, Sumit Kundu:
Performance of cognitive relay network with novel hybrid spectrum access schemes with imperfect CSI. 1761-1776 - Chia-Chang Hu, Bo-Hung Chen, Yi-Chi Kao:

Achievable sum-rate maximization using relay/antenna selection for MIMO two-way AF relaying with channel uncertainties. 1777-1789 - Francesco Chiti, Romano Fantacci, Laura Pierucci:

Dynamic multicast link selections for buffer-aided relaying networks. 1790-1804 - Yifei Wei, Chenying Ren, Mei Song, F. Richard Yu

:
The offloading model for green base stations in hybrid energy networks with multiple objectives. 1805-1816
Volume 29, Number 12, August 2016
- Sweta Jain

, Meenu Chawla
, Vasco N. G. J. Soares
, Joel J. P. C. Rodrigues:
Enhanced fuzzy logic-based spray and wait routing protocol for delay tolerant networks. 1820-1843 - Haijian Zhang, Didier Le Ruyet, Daniel Roviras, Hong Sun:

Polyphase filter bank based multi-band spectrum sensing in cognitive radio systems. 1844-1862 - Mingwu Zhang, Yong Xia, Ou Yuan, Kirill Morozov:

Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services. 1863-1872 - Tung-Chou Chen, Tsui-Tsai Lin:

Blind carrier frequency offset mitigation in space-time block-coded multicarrier code division multiple access uplink transmission. 1873-1888 - Sung-Man Kim, Hyun-Jun Lee:

Half-duplex visible light communication using an LED as both a transmitter and a receiver. 1889-1895 - Yantao Li, Gang Zhou, Daniel Leong:

An energy-efficient framework for ubiquitous phone access. 1896-1906 - Abolfazl Falahati

, Nader Sanandaji:
Nested and interleaved direct sequence spread spectrum to enhance CDMA security and bit error rate performance. 1907-1915 - Manjith Ramasamy:

A new feature extraction and attacking node classification framework using PDCFE-HPSMM model in cognitive radio networks. 1916-1935
Volume 29, Number 13, September 2016
- Amit Kumar Mandal, Sudip Misra

, Mihir Kumar Dash, Tamoghna Ojha
:
Performance analysis of distributed underwater wireless acoustic sensor networks systems in the presence of internal solitons. 1940-1955 - Mohammad Sabzinejad Farash

, Mahmoud Ahmadian-Attari:
An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. 1956-1967 - Kun Ding, Yun Liu, Hsin-Hung Cho, Han-Chieh Chao

, Timothy K. Shih:
Cooperative detection and protection for Interest flooding attacks in named data networking. 1968-1980 - Xia Heng

, Zhongmin Wang, Jiacun Wang:
Human activity recognition based on transformed accelerometer data from a mobile phone. 1981-1991 - Sudip Misra

, Sumit Goswami, Chaynika Taneja, Anandarup Mukherjee
:
Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks. 1992-2014 - Sourabh Bharti

, Kiran Kumar Pattanaik
:
Gravitational outlier detection for wireless sensor networks. 2015-2027 - Rafael Freitas Reale

, Romildo Martins da Silva Bezerra, Joberto S. B. Martins
:
Applying autonomy with bandwidth allocation models. 2028-2040 - Mohammed W. Baidas

, Emad Alsusa
, Khairi A. Hamdi
:
Power allocation over time-varying multiple-access interference channels. 2041-2058
Volume 29, Number 14, September 2016
Editorial
- Jun Guo, Sung Ho Cho

, Xiaoming Fu
, Nirwan Ansari
, Hong Ji:
Mobile internet: content, security and terminal. 2062-2064
- Georgios Aristomenopoulos, Vassilios Kaldanis, Giannis Katsaros, Symeon Papavassiliou:

Experimentally driven quality of experience-aware multimedia content delivery in modern wireless networks. 2065-2083 - Yumei Wang, Mengyao Sun, Kaiyu Wang, Lin Zhang:

Quality of experience estimation with layered mapping for hypertext transfer protocol video streaming over wireless networks. 2084-2099 - Yoonsuk Kang, Yong-Yeon Jo, Jaehyuk Cha

, Sang-Wook Kim, Youngkyun Shin:
The uFLIP benchmark revisited for evaluating SSDs. 2100-2111 - Xi Li, Heli Zhang, Ke Wang:

Toward mobile Internet-based layered vehicular networks with efficient access management. 2112-2133 - Weiran Xu, Chunyun Zhang:

Trigger word mining for relation extraction based on activation force. 2134-2146 - Lei Li, Xin Lin, Yue Zhai, Caixia Yuan, Yanquan Zhou, Jiayin Qi:

User communities and contents co-ranking for user-generated content quality evaluation in social networks. 2147-2168 - Yuanyuan Qiao, Jie Yang, Haiyang He, Yihang Cheng, Zhanyu Ma:

User location prediction with energy efficiency model in the Long Term-Evolution network. 2169-2187
Volume 29, Number 15, October 2016
- Haobo Qing, Yuanan Liu, Gang Xie:

Smart antenna-assisted spectrum sensing for robust detection in cognitive radio networks. 2192-2204 - Qimei Cui, Yulong Shi, Xuefei Zhang, Xiaofeng Tao:

Cooperative wireless localization based on weighting for vector-addition error. 2205-2226 - Nguyen Huu Thanh

, Doan Van Tung, Thu Ngo Quynh, Nguyen Canh Nam, Kumbesan Sandrasegaran:
Joint scheduling and mapping in support of downlink fairness and spectral efficiency in ieee 802.16e OFDMA system. 2227-2248 - Junyong Chen, Zhiping Shen, Jun Zhong:

Asymptotic design of quantization and bit allocation for distributed estimation in wireless sensor networks. 2249-2261 - Abhijit Bhowmick, Sanjay Dhar Roy

, Sumit Kundu:
Joint impact of sensing time and IED parameter on the performance of an energy efficient cognitive radio system. 2262-2278 - Abderrahim Chariete, Mohamed Bakhouya

, Ahmed Nait-Sidi-Moh
, Wafaa Ait-Cheik-Bihi, Jaafar Gaber
, Raed Kouta
, Maxime Wack, Pascal Lorenz
:
A study of users' acceptance and satisfaction of emergency call service. 2279-2291 - Wen-Lin Yang, Chun-Tao Yang, Yu-Chung Huang:

Optimal and heuristic algorithms for all-optical group multicast in resource-constrained WDM networks. 2292-2312 - Taha Landolsi, Aly F. Elrefaie:

Effects of pointing errors and channel fading on the performance of free-space optically-preamplified PPM systems. 2313-2324
Volume 29, Number 16, November 2016
Editorial
- Zheng Yan

, Valtteri Niemi, Laurence T. Yang:
Key technologies for 5G, the next generation of mobile networks and services. 2328-2329
- Ricardo Tadashi Kobayashi

, Taufik Abrão
:
Cooperative multi-cellular large MIMO over asynchronous channel training. 2330-2348 - Xin Huang, Xiong Gao, Zheng Yan

:
Security protocols in body sensor networks using visible light communications. 2349-2363 - Meikang Qiu, Diqiu Cao, Hai Su, Keke Gai

:
Data transfer minimization for financial derivative pricing using Monte Carlo simulation with GPU in 5G. 2364-2374 - Xi Yin, Binxing Fang, Shuyuan Jin, Meikang Qiu, Athanasios V. Vasilakos

, Yongjun Xu:
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G. 2375-2387 - Christos Bouras, Georgios Diles, Vasileios Kokkinos

, Andreas Papazois:
Transmission optimizing on dense femtocell deployments in 5G. 2388-2402 - Haodong Guo, Ling Chen, Gencai Chen, Mingqi Lv:

Smartphone-based activity recognition independent of device orientation and placement. 2403-2415 - Chen Yu, Zhongqiu Tu, Dezhong Yao

, Feng Lu, Hai Jin:
Probabilistic routing algorithm based on contact duration and message redundancy in delay tolerant network. 2416-2426 - Fang Tian, Haixiao Liu, Bin Song, Hao Qin, Guangliang Ren:

Belief propagation-based compressed video sensing for mobile Internet. 2427-2438
Volume 29, Number 17, November 2016
- SK Hafizul Islam

, Muhammad Khurram Khan
:
Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks. 2442-2456 - Rong Geng, Zhaolong Ning

, Ning Ye:
A load-balancing and coding-aware multicast protocol for mobile ad hoc networks. 2457-2470 - Mohsen Toorani

:
Security analysis of the IEEE 802.15.6 standard. 2471-2489 - Bharathi Retnaswamy, Krishna Kumar Ponniah

:
A new ontology-based multi agent framework for intrusion detection. 2490-2502 - Ramesh Babu Battula

, Manoj Singh Gaur, Dinesh Gopalani
:
ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network. 2503-2516 - Chih-Chiang Wang, Ying-Dar Lin:

CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems. 2517-2533 - Hwang-Cheng Wang, Isaac Woungang, Kuo-Chang Ting, Chih-Cheng Tseng, Fang-Chang Kuo, Hung Te Huang:

Co-tier downlink interference management in dense femtocell networks. 2534-2541 - Juncheng Jia, Dajin Wang, Zhengqiu He, Jianxi Fan, Shukui Zhang, Jin Wang, Jianfeng Yan:

In-band bootstrapping in database-driven multi-hop cognitive radio networks. 2542-2554 - Esraa Abd El-Khaleq, Yasmine El-Sayed

, Tawfik Ismail
, Hassan Mostafa
:
Electrical and optical clock and data recovery in optical access networks: a comparative study. 2555-2564
Volume 29, Number 18, December 2016
- Wen-Tzu Chen:

An efficient RFID anticollision algorithm using early adjustment of frame length. 2568-2579 - Hamid Reza Ghaeini

, Behzad Akbari, Behrang Barekatain
, Alicia Triviño-Cabrera
:
Adaptive video protection in large scale peer-to-peer video streaming over mobile wireless mesh networks. 2580-2603 - Jagadeesh Kakarla, Banshidhar Majhi, Ramesh Babu Battula

:
A delay and energy aware coordination mechanism for WSAN. 2604-2621 - Sakshi Aneja

, Sanjay Sharma
:
Multilevel space-time trellis coded cooperation with channel state information at transmitter. 2622-2631 - Mohammad Kazemi

, Hassan Aghaeinia
:
A lower bound on achievable rate of MRT precoding in multicell multiuser massive MIMO networks with Rician flat fading. 2632-2649 - Mohammed Aliyu Gadam

, Chee Kyun Ng, Nor Kamariah Noordin, Aduwati Sali
, Fazirulhisyam Hashim:
Hybrid channel gain prioritized access-aware cell association with interference mitigation in LTE-Advanced HetNets. 2650-2668 - Peng He, Yuming Mao, Qiang Liu, Kun Yang:

Improving reliability performance of diffusion-based molecular communication with adaptive threshold variation algorithm. 2669-2680

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














