nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A conflict avoidance scheme between mobility load balancing and mobility robustness optimization in self-organizing networks
|
Huang, Miaona |
|
2016 |
24 |
1 |
p. 271-281 |
artikel |
2 |
Adaptive A-MPDU retransmission scheme with two-level frame aggregation compensation for IEEE 802.11n/ac/ad WLANs
|
Liu, Jilong |
|
2016 |
24 |
1 |
p. 223-234 |
artikel |
3 |
Adaptive wireless communications under competition and jamming in energy constrained networks
|
Khan, Zaheer |
|
2016 |
24 |
1 |
p. 151-171 |
artikel |
4 |
A novel collaborative approach for location prediction in mobile networks
|
Sepahkar, Mehdi |
|
2016 |
24 |
1 |
p. 283-294 |
artikel |
5 |
A novel method for measurement points selection in access points localization
|
Yang, Xiaoling |
|
2016 |
24 |
1 |
p. 257-270 |
artikel |
6 |
A QoS routing strategy using fuzzy logic for NGEO satellite IP networks
|
Jiang, Zhuqing |
|
2016 |
24 |
1 |
p. 295-307 |
artikel |
7 |
Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach
|
Sharifi, Morteza |
|
2016 |
24 |
1 |
p. 61-68 |
artikel |
8 |
Cross layer scheme for quality of service aware multicast routing in mobile ad hoc networks
|
Shafigh, Alireza Shams |
|
2016 |
24 |
1 |
p. 329-343 |
artikel |
9 |
Data offloading and task allocation for cloudlet-assisted ad hoc mobile clouds
|
Guo, Xijuan |
|
2016 |
24 |
1 |
p. 79-88 |
artikel |
10 |
Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing
|
Saha, Sujoy |
|
2016 |
24 |
1 |
p. 173-194 |
artikel |
11 |
Enhancing QoE for video streaming in MANETs via multi-constraint routing
|
Lal, Chhagan |
|
2016 |
24 |
1 |
p. 235-256 |
artikel |
12 |
Graph cut based clustering for cognitive radio ad hoc networks without common control channels
|
Zhang, Huyin |
|
2016 |
24 |
1 |
p. 209-221 |
artikel |
13 |
$$\hbox {S}^2$$S2DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks
|
Tortelli, Michele |
|
2016 |
24 |
1 |
p. 309-328 |
artikel |
14 |
LiPro: light-based indoor positioning with rotating handheld devices
|
Xie, Bo |
|
2016 |
24 |
1 |
p. 49-59 |
artikel |
15 |
Mining user preferences of new locations on location-based social networks: a multidimensional cloud model approach
|
Wang, Fan |
|
2016 |
24 |
1 |
p. 113-125 |
artikel |
16 |
Multi-pair two-way relaying systems with physical layer network coding
|
Xie, Ning |
|
2016 |
24 |
1 |
p. 195-208 |
artikel |
17 |
Overload control in the network domain of LTE/LTE-A based machine type communications
|
Alavikia, Zahra |
|
2016 |
24 |
1 |
p. 1-16 |
artikel |
18 |
Practical deniable authentication for pervasive computing environments
|
Li, Fagen |
|
2016 |
24 |
1 |
p. 139-149 |
artikel |
19 |
SALA: Smartphone-Assisted Localization Algorithm for Positioning Indoor IoT Devices
|
Jeong, Jaehoon (Paul) |
|
2016 |
24 |
1 |
p. 27-47 |
artikel |
20 |
Scheduled WiFi using distributed contention in WLANs: algorithms, experiments, and case-studies
|
Shih, Chao-Fang |
|
2016 |
24 |
1 |
p. 89-112 |
artikel |
21 |
SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
|
Luo, Hanguang |
|
2016 |
24 |
1 |
p. 69-78 |
artikel |
22 |
SNR based secure communication via untrusted amplify-and-forward relay nodes using artificial noise
|
Sarma, Siddhartha |
|
2016 |
24 |
1 |
p. 127-138 |
artikel |
23 |
Using wireless underground sensor networks for mine and miner safety
|
Akkaş, M. Alper |
|
2016 |
24 |
1 |
p. 17-26 |
artikel |