1 Multi-Node Wireless Energy Charging in Sensor Networks
2 Mobile application security: malware threats and defenses
3 VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks
4 Wireless communications for vehicular safety
5 Opportunistic communications in interference alignment networks with wireless power transfer
6 Backpressure Delay Enhancement for Encounter-Based Mobile Networks While Sustaining Throughput Optimality
7 A Topology Potential-Based Method for Identifying Essential Proteins from PPI Networks
8 Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks
9 Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
10 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
11 Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
12 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
13 Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter
14 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
15 Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
16 Game-Theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks
17 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
18 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
19 On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
20 A Hierarchical Account-Aided Reputation Management System for MANETs
21 Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach
22 On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications
23 Multipath TCP: Analysis, Design, and Implementation
24 On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
25 Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications
26 Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
27 Authenticated Key Exchange Protocols for Parallel Network File Systems
28 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks
29 Decentralized Computation Offloading Game for Mobile Cloud Computing
30 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
31 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
32 Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm
33 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
34 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
35 Breaking the vehicular wireless communications barriers: Vertical handover techniques for heterogeneous networks
36 Increasing User Perceived Quality by Selective Load Balancing of Video Traffic in Wireless Networks
37 Adaptive Intelligent Middleware Architecture for Mobile Real-time Communications
38 Dynamic Routing for Flying Ad Hoc Networks
39 Effect of Mobility on the Outage and BER Performances of
40 Digital Transmissions over Nakagami-m Fading Channels
41 Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
42 MERVS: A Novel Multi-channel Error Recovery Video Streaming Protocol for Vehicle Ad-hoc Network
43 Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
44 On the Throughput and Delay in Ad Hoc Networks With Human Mobility
45 On-Demand Discovery of Software Service Dependencies in MANETs
46 Probabilistic Key Pre-distribution for Heterogeneous Mobile Ad hoc Networks Using Subjective Logic
47 Restoring Connectivity of Mobile Robotic Sensor Networks While Avoiding Obstacles
48 The FINS Framework: Design and Implementation of the Flexible Internetwork Stack (FINS) Framework
49 2FLIP: A Two-Factor Lightweight Privacy Preserving Authentication Scheme for VANET
50 A New Decentralized Bayesian Approach for Cooperative Vehicle Localization Based on Fusion of GPS and VANET Based Inter-Vehicle Distance Measurement
51 A Threshold Anonymous Authentication Protocol for VANETs
52 Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET
53 Gateway Placement and Packet Routing For Multihop In-Vehicle Internet Access
54 Multi-Hop Cluster based IEEE 802.11p and LTE Hybrid Architecture for VANET Safety Message Dissemination
55 Optimizing the Control Channel Interval of the DSRC for Vehicular Safety Applications
56 Understanding spurious message forwarding in VANET beacon-less dissemination protocols: an analytical approach
57 V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs
58 VANET-Cloud: A Generic Cloud Computing Model For Vehicular Ad Hoc Networks
59 A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs
60 A Novel Wireless Mobile Platform to Locate and Gather Data From Optical Fiber Sensors Integrated Into a WSN
61 A Survey on Radio Resource Allocation in Cognitive Radio Sensor Networks
62 Application-Specific Customization of Dynamic Profiling Mechanisms for Sensor Networks
63 Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks
64 Energy Efficient COGnitive MAC for Sensor Networks under WLAN Co-existence
65 HMM-Based Decision Fusion in Wireless Sensor Networks With Noncoherent Multiple Access
66 HYRMA: A Hybrid Routing Protocol for Marine Environments Monitoring
67 Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack
68 Optimal Resource Allocation for Detection of a Gaussian Process Using a MAC in WSNs
69 Scalable Data-Coupled Clustering for Large Scale WSN
70 Sensors Augmentation Influence over Trust and Reputation Models Realization for Dense Wireless Sensor Networks
71 User Privacy And Data Trustworthiness In Mobile Crowd Sensing
72 Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With Network Coding and Successive Interference Cancelation
73 Power Control and Soft Topology Adaptations in Multihop Cellular Networks With Multi-Point Connectivity
74 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks
75 Dynamic Openflow-Controlled Optical Packet Switching Network
76 Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
77 Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing
78 Privacy-Preserving Detection of Sensitive Data Exposure
79 Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking
80 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
81 Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
82 Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques
83 Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks
84 Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks
85 Self-Organizing Resource Management Framework in OFDMA Femtocells
86 Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
87 Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks
88 A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks
89 Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
90 Authenticated Key Exchange Protocols for Parallel Network File Systems
91 Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs
92 Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks
93 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
94 Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks
95 Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs
96 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
97 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
98 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks
99 Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm