default search action
37th Sarnoff Symposium 2016: Newark, NJ, USA
- 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, September 19-21, 2016. IEEE 2016, ISBN 978-1-5090-1540-5
- Matthew Chan, Hassan Elsherbini, Xiaowen Zhang:
User density and spatial cloaking algorithm selection: Improving privacy protection of mobile users. 1-2 - Mauricio General, Jorge E. Pezoa:
Reliable path provisioning in the presence of multiple correlated failures. 1-2 - Chi-Heng Lee, Tseng-Yi Chen, Shuo-Han Chen, Hsin-Wen Wei, Heng-Yin Chen, Wei-Kuan Shih:
Rescuing moribund NVM-based sensor nodes by an energy-efficient WCV routing algorithm. 1-2 - Parisa Hassanzadeh, Antonia M. Tulino, Jaime Llorca, Elza Erkip:
Memory-rate trade-off for caching and delivery of correlated sources. 1-2 - Padmaja Scindia, Jonathan Voris:
Can mobile device users be identified by how they play a game? 1-2 - Shuo-Han Chen, Tseng-Yi Chen, Chi-Heng Lee, Hsin-Wen Wei, Tsan-sheng Hsu, Wei-Kuan Shih:
Exploiting the locality of virtual-machine images to boost the performance of a cloud platform. 1-2 - Vincent Chiriaco, Aubrey Franzen, Rebecca Thayil, Xiaowen Zhang:
Finding partial hash collisions by brute force parallel programming. 1-2 - Daniel Lartiga, Nicolas Boettcher, Yasmany Prieto, Jorge E. Pezoa:
QoSApp: Dynamic bandwith management for QoS applications using OpenFlow. 1-2 - Akeem A. Adebomehin, Stuart D. Walker:
Ultra-wideband signals for high-resolution cognitive positioning techniques in 5G wireless. 1-2 - Danielle Lopez, Ivan Mazo, Shuqun Zhang:
Digital holographic image reconstruction and GPU acceleration. 1-2 - Caleb Skinner, Yu Sang, Bo Ji:
Improving timeliness of information through replicating requests. 1-2 - Jason Loux, Dawei Li, Jie Wu:
Configuring and controlling a software defined network with a Pica8 switch. 1-2 - Sangwoo Park, Jin-Hyun Ahn, Seungwon Lee, Iickho Song:
Full-duplex communication in cooperative cognitive radio networks: Preliminary results. 1-2 - Shuo-Han Chen, Tseng-Yi Chen, Hsin-Wen Wei, Tsan-sheng Hsu, Chen-Hung Huang, Wei-Kuan Shih:
Improving the 3-star approximation algorithm for relay node placement in wireless sensor network. 1-2 - Peristera A. Baziana:
An asynchronous transmission protocol with propagation delay study for WDM networks. 1-2 - Noemi Glaeser, Anduo Wang:
Access control for a database-defined network. 1-2 - Efe Onaran, Siddharth Garg, Elza Erkip:
Optimal de-anonymization in random graphs with community structure. 1-2 - Vinay Chamola, Pratik Narang, Biplab Sikdar:
Downlink power control for latency aware grid energy savings in green cellular networks. 1-6 - Fraida Fund, Shahram Shahsavari, Shivendra S. Panwar, Elza Erkip, Sundeep Rangan:
Do open resources encourage entry into the millimeter wave cellular service market? 1-2 - Arash Deylamsalehi, Pegah Afsharlar, Vinod M. Vokkarane:
Modeling energy costs and emissions for anycast RWA in optical data center networks. 7-12 - Ali Shahini, Nirwan Ansari:
Sub-channel allocation in green powered heterogeneous cognitive radio networks. 13-18 - Swapnil Mhaske, Hojin Kee, Tai Ly, Predrag Spasojevic:
FPGA-accelerated simulation of a hybrid-ARQ system using high level synthesis. 19-21 - Mehmet Engin Tozal:
Enumerating single destination, policy-preferred paths in AS-level Internet topology maps. 25-30 - Robinson Udechukwu, Shireesh Bhat, Rudra Dutta, George N. Rouskas:
Language of choice: On embedding choice-related semantics in a realizable protocol. 31-36 - Brian Jalaian, Venkat R. Dasari, Y. Thomas Hou:
Modeling and optimization for programmable unified control plane in heterogeneous wireless networks. 37-42 - Sachin Sharma, Seshadri Mohan:
Dynamic spectrum leasing methodology (DSLM): A game theoretic approach. 43-46 - Amit Mukhopadhyay, Harold J. Batteram, Xiaohua Chen, Frank Louwdyk, Ashoke Sharma, Z. John Zhao:
Designing optimal heterogeneous networks. 47-52 - Theodoros Soultanopoulos, Stelios Sotiriadis, Euripides G. M. Petrakis, Cristiana Amza:
Data management of sensor signals for high bandwidth data streaming to the cloud. 53-58 - Fawaz Alassery, Walid K. M. Ahmed:
Smart wireless sensor networks powered by remaining energy cluster head selection protocol. 59-64 - Shuyan Li, Wei Huang, Donglin Wang, Ziqian Dong:
Two-target device-free passive localization by combining anomaly link selection and weighted-link minimum error localization. 65-70 - Sunny Shakya, Xiaojun Cao:
Transparent virtual network embedding in elastic optical networks. 71-76 - Juzi Zhao, Vinod M. Vokkarane:
Dynamic erasure-coded data retrieval in elastic optical data center networks. 77-82 - Muhammad B. Awan, Seshadri Mohan:
Analysis of beam divergence and input bit rate for free space optical communication link. 83-87 - Amit Kachroo, Mehmet Kemal Özdemir, Hatice Tekiner-Mogulkoc:
Optimization of LTE radio resource block allocation for maritime channels. 88-93 - Selahattin Gökceli, Buse Canli, Gunes Karabulut-Kurt:
Universal filtered multicarrier systems: Testbed deployment of a 5G waveform candidate. 94-99 - Oluwaseyi Omotere, Wasiu Opeyemi Oduola, Nan Zou, Xiangfang Li, Lijun Qian, Deepak Kataria:
Distributed spectrum monitoring and surveillance using a cognitive radio based testbed. 100-105 - Shu Huang, Ilya Baldin:
Market-based path service composition for software defined networks. 106-111 - Jingxin Wu, Maotong Xu, Suresh Subramaniam, Hiroshi Hasegawa:
Evaluation and performance modeling of two OXC architectures. 112-117 - John J. Majikes, Sean Mealin, Rita Brugarolas, Katherine Walker, Sherrie Yuschak, Barbara L. Sherman, Alper Bozkurt, David L. Roberts:
Smart connected canines: IoT design considerations for the lab, home, and mission-critical environments. 118-123 - Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using semantic technologies to mine vehicular context for security. 124-129 - Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, Haythem Bany Salameh, Issa M. Khalil:
On the continuous coverage problem for a swarm of UAVs. 130-135 - Chen Xu, Xiaoban Wu, Yan Luo, Brian Tierney, Jeronimo Bezerra:
Pepple: Programmable network measurement for troubleshooting soft failures. 136-141 - Che Zhang, Hong Xu, Libin Liu, Zhixiong Niu, Peng Wang, Yongqiang Tian, Chengchen Hu:
Kuijia: Traffic rescaling in data center WANs. 142-147 - Md. Zakirul Alam Bhuiyan, Jie Wu:
Trustworthy and protected data collection for event detection using networked sensing systems. 148-153 - Zifan Peng, Yuchen Xie, Donglin Wang, Ziqian Dong:
One-to-all regularized logistic regression-based classification for WiFi indoor localization. 154-159 - Zi Wang, Juecong Cai, Sihua Cheng, Wenjia Li:
DroidDeepLearner: Identifying Android malware using deep learning. 160-165 - Sean Rocke, Alexander M. Wyglinski:
Frame-based temporal occupancy characterization for compliance enforcement in opportunistic spectrum access networks. 166-171 - Bhupendra Kumar, Shankar Prakriya:
Rate performance of adaptive link selection in buffer-aided cognitive relay networks. 172-177 - Muthukrishnan Senthil Kumar, Aresh Dadlani, Kiseon Kim, Richard O. Afolabi:
Overlay secondary spectrum sharing with independent re-attempts in cognitive radios. 178-180 - Feixiong Zhang, Yanyong Zhang, Dipankar Raychaudhuri:
Edge caching and nearest replica routing in information-centric networking. 181-186 - Aresh Dadlani, Muthukrishnan Senthil Kumar, Kiseon Kim, Faryad Darabi Sahneh:
Transient analysis of a resource-limited recovery policy for epidemics: A retrial queueing approach. 187-192 - Zhengqi Jiang, Di Wu, Roberto Rojas-Cessa:
Lowest-cost network node identification for data caching for information centric networks. 193-198 - A. M. Leonard, Hang Cai, Krishna K. Venkatasubramanian, M. Ali, Thomas Eisenbarth:
A honeypot system for wearable networks. 199-201 - Weiqiang Dong, Moshe Kam:
A greedy algorithm for decentralized Bayesian detection with feedback. 202-207 - Ramadhan J. Mstafa, Khaled M. Elleithy:
A novel video steganography algorithm in DCT domain based on hamming and BCH codes. 208-213 - Nora Almalki, Reza Curtmola, Xiaoning Ding, Narain H. Gehani, Cristian Borcea:
P2F2: Privacy-preserving face finder. 214-219
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.