default search action
8th Q2SWinet 2012: Paphos, Cyprus
- Peter Mueller, Jalel Ben-Othman, Raffaele Bruno:
Q2SWinet'12, Proceedings of the Eighth ACM Symposium on QoS and Security for Wireless and Mobile Networks, Paphos, Cyprus, October 24-25, 2012. ACM 2012, ISBN 978-1-4503-1619-4
Optimization issues in wireless networks
- Julien Boite, Vania Conan, Gérard Nguengang, Mathieu Bouet, Alain Ploix, Dominique Gaïti:
Scaling end-to-end measurements in heterogeneous wireless mesh networks. 1-8 - Fabien Esmiol, Stéphane Rousseau, Vania Conan, Christian Bonnet:
Near optimal multicoloring for inter-cluster interference avoidance. 9-16 - James Gross, Marco Weyres, Adam Wolisz:
Effective service capacity analysis of opportunistic multi-carrier OFDMA systems. 17-26
QoS in wireless ad hoc and sensor networks
- Elias Yaacoub, Abdullah Kadri, Adnan A. Abu-Dayya:
An energy-efficient M2M communication method for leakage detection in underground water pipes. 27-32 - Slim Rekhis, Nourhene Ellouze, Noureddine Boudriga:
A wireless sensor network based water monitoring system. 33-40 - Elias Yaacoub, Adnan A. Abu-Dayya:
Enhancing the QoS of real-time video streaming over LTE MBMS using D2D communications. 41-46
Security in wireless networks I
- Rodrigo do Carmo, Marc Werner, Matthias Hollick:
Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks. 47-54 - Ioana Rodhe, Christian Rohner, Edith C. H. Ngai:
On location privacy and quality of information in participatory sensing. 55-62
Security in wireless networks II
- Osama Abumansoor, Azzedine Boukerche:
Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing. 63-70 - Lukas Malina, Jan Hajny, Vaclav Zeman:
Group signatures for secure and privacy preserving vehicular ad hoc networks. 71-74 - Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahmane Lakas:
Unthresholded adaptive revocation technique in mobile ad hoc networks. 75-78
Poster session
- Elias Yaacoub, Abdullah Kadri, Adnan A. Abu-Dayya:
Cooperative wireless sensor networks for green internet of things. 79-80 - Htoo Aung Maw, Hannan Xiao, Bruce Christianson:
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. 81-84 - Garima Gupta, Preeti Nagrath, Sandhya Aneja, Neelima Gupta:
Reference based approach to mitigate blackhole attacks in delay tolerant networks. 85-88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.