nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A chance constrained approach for LTE cellular network planning under uncertainty
|
Challita, Ursula |
|
2016 |
|
PA |
p. 34-45 12 p. |
artikel |
2 |
A novel cell-selection optimization handover for long-term evolution (LTE) macrocellusing fuzzy TOPSIS
|
Hussein, Yaseein Soubhi |
|
2016 |
|
PA |
p. 22-33 12 p. |
artikel |
3 |
Appendix
|
|
|
2016 |
|
PA |
p. I-II nvt p. |
artikel |
4 |
A real-time lane marking localization, tracking and communication system
|
Mammeri, Abdelhamid |
|
2016 |
|
PA |
p. 132-143 12 p. |
artikel |
5 |
Dynamic framework for building highly-localized mobile web DTN applications
|
Sankaran, Kartik |
|
2016 |
|
PA |
p. 56-65 10 p. |
artikel |
6 |
Editorial 2016
|
Conti, Marco |
|
2016 |
|
PA |
p. 1-2 2 p. |
artikel |
7 |
Editorial Board
|
|
|
2016 |
|
PA |
p. IFC- 1 p. |
artikel |
8 |
Efficient and Transparent Use of personal device storage in opportunistic data forwarding
|
Hoseini, Sayed Amir |
|
2016 |
|
PA |
p. 47-55 9 p. |
artikel |
9 |
Handover-related self-optimization in femtocells: A survey and an interaction study
|
Suleiman, Kais Elmurtadi |
|
2016 |
|
PA |
p. 82-98 17 p. |
artikel |
10 |
On search and content availability in opportunistic networks
|
Hyytiä, Esa |
|
2016 |
|
PA |
p. 118-131 14 p. |
artikel |
11 |
Performance of the MAC protocol in wireless recharging under E-limited scheduling
|
Khan, Mohammad Shahnoor Islam |
|
2016 |
|
PA |
p. 157-164 8 p. |
artikel |
12 |
Phantom cascades: The effect of hidden nodes on information diffusion
|
Belák, Václav |
|
2016 |
|
PA |
p. 12-21 10 p. |
artikel |
13 |
Predicting the attributes of social network users using a graph-based machine learning method
|
Ding, Yuxin |
|
2016 |
|
PA |
p. 3-11 9 p. |
artikel |
14 |
Smartphone positioning in sparse Wi-Fi environments
|
Waqar, Wasiq |
|
2016 |
|
PA |
p. 108-117 10 p. |
artikel |
15 |
Space–time efficient network coding for wireless multi-hop networks
|
Yan, Yan |
|
2016 |
|
PA |
p. 144-156 13 p. |
artikel |
16 |
Special Section on Challenged Networks
|
Gerla, Mario |
|
2016 |
|
PA |
p. 46- 1 p. |
artikel |
17 |
Stalk and lie—The cost of Sybil attacks in opportunistic networks
|
Trifunovic, Sacha |
|
2016 |
|
PA |
p. 66-79 14 p. |
artikel |
18 |
Wireless and Mobile Network Modeling, Analysis, Design, Optimization, and Simulation
|
Li, Cheng |
|
2016 |
|
PA |
p. 80-81 2 p. |
artikel |
19 |
Wireless Networking Testbed and Emulator (WiNeTestEr)
|
Beshay, J.D. |
|
2016 |
|
PA |
p. 99-107 9 p. |
artikel |