Default Cover Image

2016 International Conference on Computing, Networking and Communications (ICNC)

Feb. 15 2016 to Feb. 18 2016

Kauai, HI, USA

Table of Contents

IndexFreely available from IEEE.pp. 1-1
ProgramFreely available from IEEE.pp. 1-21
Organizing committeeFreely available from IEEE.pp. 1-6
Table of contentsFreely available from IEEE.pp. 1-33
Reducing queuing delays through VoAPFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Effect on vehicle safety of nonexistent or silenced basic safety messagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
The expected impact of smart devices visualizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Robust software-defined optical networking for the power gridFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Optimal energy harvest-based weighed cooperative spectrum sensing in cognitive radioFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
ZigBee network system for observing operating activities of work vehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Optimal energy-efficient multichannel cognitive radio with primary energy harvestingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
On mobile sensor data collection using data mulesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
UAV-assisted disaster management: Applications and open issuesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
ADP: An adaptive feedback approach for energy-efficient wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Energy efficient movement of wireless sensors with adjustable sensing ranges for mending barrier gapsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An energy balance mechanism for monitoring in partial rechargeable WMSNsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An energy flowing mechanism for prolonging monitoring lifetime in partial rechargeable WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Enhanced DRX-aware scheduling for mobile users in LTE networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance evaluation for coexistence of LTE and WiFiFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Mobility assisted device-to-device communications underlaying cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Resource allocation using graph coloring for dense cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A full duplex MAC protocol for efficient asymmetric transmission in WLANFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Characteristic time based routing in information centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
State transition factor of three-state Markov channelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Network MIMO with partial cooperation between radar and cellular systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Chaotic circle map interleaver for OFDMFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Quadrature index modulated OFDM with interleaved grouping for V2X communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Location-enhanced authenticated key exchangeFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Touchless interaction for future mobile applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Developing modulator and demodulator for the EU eCall in-vehicle system in FPGAsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A QoS-based power allocation for cellular users with different modulationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Resource allocation in cellular systems for applications with random parametersFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Integrated QoS provisioning for unified LTE-WiMAX networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Internet video traffic classification using QoS featuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Network-assisted multipath DASH using the distributed decision engineFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
High performance phase rotated spreading codes for MC-CDMAFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance analysis of diversity combining techniques in double-Rayleigh channelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
On the performance of amplifier-aware dense networks: Finite block-length analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A dynamic forward error control scheme for video streaming over wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Energy-efficient full diversity unitary space-time block code designs using QR decompositionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Optimization of codes for the joint Viterbi detector decoder (JVDD)Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Echo decomposition based time delay sensor with sub-sample resolutionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Integrating ‘State of the Network’ information into impairment model using binary logic operatorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Sigma-delta PWM waveforms for optical front-haulingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Ethernet signal transmission via VLC lighting LED link in a real networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Ergodic capacity-based energy optimization algorithm in massive MIMO systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Tree search based configurable joint detection and decoding algorithms for MIMO systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Controller placement algorithm to alleviate burdens on communication nodesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A queue-length based distributed scheduling for CSMA-driven Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Cloud-based community services in community networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Twitter structure as a composition of two distinct networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Smart and connected e-Health lab for standards validation and conformanceFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
5G today: Modulation technique alternativesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
COBANETS: A new paradigm for cognitive communications systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Randomized positioning DSSS for anti-jamming wireless communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Analysis and characterisation of botnet scan trafficFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Watermarking for detecting freeloader misbehavior in software-defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Achieving lightweight, time-specific and secure access control in cloud storageFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Latent fingerprint matching in large databases using high performance computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
CloudPDB: A light-weight data privacy schema for cloud-based databasesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Frequency-minimal moving target defense using software-defined networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Selective encryption and component-oriented deduplication for mobile cloud data computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A light-weight forwarding plane for content-centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Modeling 3D video traffic using a Markov modulated gamma processFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A new highly accurate workload model for campus email trafficFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Optimal context-aware resource allocation in cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Showing 100 out of 189