Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICNC
ICNC 2016
Generate Citations
2016 International Conference on Computing, Networking and Communications (ICNC)
Feb. 15 2016 to Feb. 18 2016
Kauai, HI, USA
Table of Contents
Index
Freely available from IEEE.
pp. 1-1
Program
Freely available from IEEE.
pp. 1-21
Organizing committee
Freely available from IEEE.
pp. 1-6
Table of contents
Freely available from IEEE.
pp. 1-33
Walking with Geo-Zombie: A pervasive game to engage people in urban crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Catia Prandi
,
Paola Salomoni
,
Marco Roccetti
,
Valentina Nisi
,
Nuno Jardim Nunes
On the design of a word game to enhance Italian language learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Marco Roccetti
,
Paola Salomoni
,
Mathieu Loiseau
,
Monica Masperi
,
Virginie Zampa
,
Andrea Ceccherelli
,
Cristiana Cervini
,
Antonella Valva
"di Piazza in Piazza": Reimagining cultural specific interactions for people-centered exhibitions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Silvia Mirri
,
Paola Salomoni
,
Alberto Pizzinelli
,
Marco Roccetti
,
Claudio E. Palazzi
Reducing queuing delays through VoAP
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Claudio E. Palazzi
,
Armir Bujari
,
Silvia Mirri
Optimizing the Lagrange multiplier in perceptually-friendly high efficiency video coding for mobile applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sima Valizadeh
,
Panos Nasiopoulos
,
Rabab Ward
Effect on vehicle safety of nonexistent or silenced basic safety messages
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
George P. Corser
,
Alejandro Arenas
,
Huirong Fu
The expected impact of smart devices visualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Raffaele Bolla
,
Franco Davoli
,
Chiara Lombardo
,
Laura Masullo
,
Roberto Bruschi
Robust software-defined optical networking for the power grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Houman Rastegarfar
,
Daniel C. Kilper
A traffic and resource-aware energy-saving mechanism in software defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mahshid Rahnamay-Naeini
,
Sonali Sen Baidya
,
Ehsan Siavashi
,
Nasir Ghani
Optimal energy harvest-based weighed cooperative spectrum sensing in cognitive radio
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xin Liu
,
Junhua Yan
,
Kunqi Chen
ZigBee network system for observing operating activities of work vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tatsuya Kobayashi
,
Hiroshi Yamamoto
,
Katsuyuki Yamazaki
Sensor system to advice health-aware information for elderly people on daily living activities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tomoya Ohiwa
,
Hiroshi Yamamoto
,
Katsuyuki Yamazaki
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Lei Chen
,
Narasimha Shashidhar
,
Danda Rawat
,
Ming Yang
,
Christopher Kadlec
Adaptive threshold-based RF spectrum scanning through joint energy and bandwidth detection with USRPs in cognitive sensor networks for ROAR architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Isaac Cushman
,
Ashraf Younis
,
Danda B. Rawat
,
Lei Chen
Optimal energy-efficient multichannel cognitive radio with primary energy harvesting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xin Liu
,
Junhua Yan
Developing a user-friendly sensor network simulator to imitate wireless charging vehicle behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shuo-Han Chen
,
Tseng-Yi Chen
,
Yu-Chun Cheng
,
Hsin-Wen Wei
,
Tsan-sheng Hsu
,
Wei-Kuan Shih
ReSNE: Reconfigurable sensor network emulator virtualizing integrated large-scale sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Daisuke Baba
,
Naoki Suematsu
,
Shun Nabeshima
,
Toshiaki Miyazaki
On mobile sensor data collection using data mules
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Arun Das
,
Anisha Mazumder
,
Arunabha Sen
,
Nathalie Mitton
UAV-assisted disaster management: Applications and open issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Milan Erdelj
,
Enrico Natalizio
Multi-UAVs network communication study for distributed visual simultaneous localization and mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Nesrine Mahdoui
,
Enrico Natalizio
,
Vincent Fremont
ADP: An adaptive feedback approach for energy-efficient wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Afraa Attiah
,
Muhammad Faisal Amjad
,
Omar Nakhila
,
Cliff Zou
Energy efficient movement of wireless sensors with adjustable sensing ranges for mending barrier gaps
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Han Xu
,
Zhongyuan Lai
,
Chang Liu
An energy balance mechanism for monitoring in partial rechargeable WMSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Li-Ling Hung
An energy flowing mechanism for prolonging monitoring lifetime in partial rechargeable WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Li-Ling Hung
Enhanced DRX-aware scheduling for mobile users in LTE networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yu Liu
,
Minh Huynh
,
Dipak Ghosal
Performance evaluation for coexistence of LTE and WiFi
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhiyi Zhou
,
Fei Teng
,
Jialing Liu
,
Weimin Xiao
Mobility assisted device-to-device communications underlaying cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chuhan Gao
,
Yong Li
,
Depeng Jin
Resource allocation using graph coloring for dense cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Suzan Basloom
,
Amani Nazar
,
Ghadah Aldabbagh
,
Manal Abdullah
,
Nikos Dimitriou
A full duplex MAC protocol for efficient asymmetric transmission in WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chulmin Kim
,
Cheeha Kim
Characteristic time based routing in information centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Bitan Bandyopadhyay
,
Anand Seetharam
,
Amitava Mukherjee
,
Mrinal Kanti Naskar
State transition factor of three-state Markov channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Liang Huang
,
Jiefan Qiu
,
Li Ping Qian
Network MIMO with partial cooperation between radar and cellular systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ahmed Abdelhadi
,
T. Charles Clancy
BP-based detection of spatially multiplexed 16-QAM signals in a fully massive MIMO system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tomoya Usami
,
Toshihiko Nishimura
,
Takeo Ohgane
,
Yasutaka Ogawa
Chaotic circle map interleaver for OFDM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Anish Nair
,
Kamran Kiasaleh
Quadrature index modulated OFDM with interleaved grouping for V2X communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Meng Zhang
,
Haowen Wang
,
Xiang Cheng
,
Liu-Qing Yang
,
Xiaotian Zhou
A unified approach to analyze the average bit error probability in generalized fading channels with additive generalized Gaussian noise
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Osamah S. Badarneh
,
Michel Kadoch
,
Ibrahem E. Atawi
Impact of fading severity and receive antenna correlation on TAS/MRC under Nakagami fading
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Juan P. Peña-Martin
,
Concepcion Tellez-Labao
,
Juan M. Romero-Jerez
Development of accurate expressions for the estimation of delay spread in simulcast networks under Weibull fading
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mohammed S. Aloqlah
,
Ahmad Alshamali
,
Tamara Bani Salman
Non-cooperative and cooperative PUEA detection using physical layer in mobile OFDM-based cognitive radio networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Trong Nghia Le
,
Wen-Long Chin
,
Ya-Hsuan Lin
Location-enhanced authenticated key exchange
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Marcos Portnoi
,
Chien-Chung Shen
Robust scheme to protect authentication code of message/image documents in cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Zaid Ameen Abduljabbar
,
Hai Jin
,
Ali A. Yassin
,
Zaid Alaa Hussien
,
Mohammed Abdulridha Hussain
,
Salah H. Abbdal
,
Deqing Zou
Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
David J. Zage
,
Helen Xu
,
Thomas M. Kroeger
,
Bridger Hahn
,
Nolan P. Donoghue
,
Thomas R. Benson
An approach for detection and family classification of malware based on behavioral analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Steven Strandlund Hansen
,
Thor Mark Tampus Larsen
,
Matija Stevanovic
,
Jens Myrup Pedersen
On the feasibility of machine learning as a tool for automatic security classification: A position paper
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Anis Yazidi
,
Hugo Hammer
,
Aleksander Bai
,
Paal E. Engelstad
Touchless interaction for future mobile applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Thomas Kopinski
,
Uwe Handmann
Cost effective mobile and static road side unit deployment for vehicular adhoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Donghyun Kim
,
Yesenia Velasco
,
Zishen Yang
,
Wei Wang
,
Rasheed Hussain
,
R.N. Uma
A graph coloring resource sharing scheme for full-duplex cellular-VANET heterogeneous networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tinghan Yang
,
Rongqing Zhang
,
Xiang Cheng
,
Liuqing Yang
Performance evaluation for multi-antenna vehicular communication based on IEEE 802.11p standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shuangshuang Han
,
Kai Zhao
,
Liu-Qing Yang
,
Xiang Cheng
Developing modulator and demodulator for the EU eCall in-vehicle system in FPGAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Majeed Nader
,
John Liu
Performance analysis of android-based real-time message dissemination in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Wantanee Viriyasitavat
,
Soranut Midtrapanon
,
Takkachai Rittirat
,
Sornrakitch Thanumaiweerakun
A QoS-based power allocation for cellular users with different modulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ying Wang
,
Ahmed Abdelhadi
Resource allocation in cellular systems for applications with random parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Zaid Kbah
,
Ahmed Abdelhadi
Integrated QoS provisioning for unified LTE-WiMAX networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Joswill Victor Pajaro Rodriguez
,
Amir Esmailpour
Window based fair aggregator for the scalable support of QoS guarantees in the backbone: An experimental performance study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mustafa Sanli
,
Aydin Pehlivanli
,
Ece Güran Schmidt
Internet video traffic classification using QoS features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Wang Zai-jian
,
Yu-ning Dong
,
Hai-xian Shi
,
Yang Lingyun
,
Tang Pingping
Network-assisted multipath DASH using the distributed decision engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Tiia Ojanperä
,
Janne Vehkaperä
Performance evaluation of alternative routing in a wireless mesh network with an adaptive array
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kosuke Suzuki
,
Toshihiko Nishimura
,
Takeo Ohgane
,
Yasutaka Ogawa
High performance phase rotated spreading codes for MC-CDMA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Zhiping Zhang
,
Yang Qu
,
Lin Zhang
,
John Ellinger
,
Zhiqiang Wu
Performance analysis of diversity combining techniques in double-Rayleigh channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohamed Lassaad Ammari
,
Sebastien Roy
On the performance of amplifier-aware dense networks: Finite block-length analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Behrooz Makki
,
Chao Fang
,
Tommy Svensson
,
Masoumeh Nasiri-Kenari
A dynamic forward error control scheme for video streaming over wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
E. N. Weyulu
,
Guy-Alain Lusilao-Zodi
Energy-efficient full diversity unitary space-time block code designs using QR decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Eleanor Leung
,
Jian-Kang Zhang
Optimization of codes for the joint Viterbi detector decoder (JVDD)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Sari Shafidah Bte Shafiee
,
Chan Kheong Sann
,
Goh Wang Ling
Echo decomposition based time delay sensor with sub-sample resolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Bettadapura
,
A. A. Louis Beex
Migration-aware protection scheme for optical networks evolving from fixed grid to flexible grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Xiaosong Yu
,
Yongli Zhao
,
Yuanlong Tan
,
Guoying Zhang
,
Jie Zhang
Software defined clustered-optical access networking for ubiquitous data center optical interconnection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hui Yang
,
Jie Zhang
,
Yongli Zhao
,
Yuefeng Ji
,
Young Lee
CAPEX optimization in multi-chassis multi-rate IP/optical networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohammad Sheikh Zefreh
,
Ali Tizghadam
,
Alberto Leon-Garcia
,
Halima Elbiaze
,
Walter Miron
Defragmentation algorithm for joint dynamic and static routing problems in elastic optical networks with unicast and anycast traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Michal Aibin
,
Krzysztof Walkowiak
Integrating ‘State of the Network’ information into impairment model using binary logic operators
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Maninder Singh
,
Maninder Lal Singh
Sigma-delta PWM waveforms for optical front-hauling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
L. Combi
,
U. Spagnolini
Ethernet signal transmission via VLC lighting LED link in a real network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Piotr Zwierko
,
Lukasz Maksymiuk
,
Jerzy Siuzdak
Ergodic capacity-based energy optimization algorithm in massive MIMO systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Peng Kou
,
Xiaohui Li
,
Ruohan Guo
,
Yongqiang Hei
Tree search based configurable joint detection and decoding algorithms for MIMO systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chien-Hao Huang
,
Chia-Po Yu
,
Chung-An Shen
Controller placement algorithm to alleviate burdens on communication nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Genya Ishigaki
,
Norihiko Shinomiya
A queue-length based distributed scheduling for CSMA-driven Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Toshiki Takeda
,
Takuya Yoshihiro
Proactive Ethernet Congestion Control based on link utilization estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mahmoud Bahnasy
,
Bochra Boughzala
,
Halima Elbiaze
,
Brian Alleyne
,
Andre Beliveau
,
Chakri Padala
Cloud-based community services in community networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Roger Baig
,
Felix Freitag
,
Agusti Moll
,
Leandro Navarro
,
Roger Pueyo
,
Vladimir Vlassov
Twitter structure as a composition of two distinct networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Meng Tong
,
Ameya Sanzgiri
,
Dimitrios Koutsonikolas
,
Shambhu Upadhyaya
Smart and connected e-Health lab for standards validation and conformance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
W. Liu
,
U. Krieger
,
E. K. Park
,
S. S. Zhu
5G today: Modulation technique alternatives
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ender Ayanoglu
COBANETS: A new paradigm for cognitive communications systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Michele Zorzi
,
Andrea Zanella
,
Alberto Testolin
,
Michele De Filippo De Grazia
,
Marco Zorzi
Randomized positioning DSSS for anti-jamming wireless communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ahmad Alagil
,
Meshari Alotaibi
,
Yao Liu
Analysis and characterisation of botnet scan traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Angelos K. Marnerides
,
Andreas U. Mauthe
Watermarking for detecting freeloader misbehavior in software-defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Younghee Park
,
Sang-Yoon Chang
,
Lavanya M. Krishnamurthy
Two for the price of one: A combined browser defense against XSS and clickjacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kanpata Sudhakara Rao
,
Naman Jain
,
Nikhil Limaje
,
Abhilash Gupta
,
Mridul Jain
,
Bernard Menezes
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Fenghua Li
,
Yuanyuan He
,
Ben Niu
,
Hui Li
,
Hanyi Wang
Network security analyzing and modeling based on Petri net and Attack tree for SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Linyuan Yao
,
Ping Dong
,
Tao Zheng
,
Hongke Zhang
,
Xiaojiang Du
,
Mohsen Guizani
Achieving lightweight, time-specific and secure access control in cloud storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yanchao Wang
,
Fenghua Li
,
Ben Niu
,
Rongna Xie
Latent fingerprint matching in large databases using high performance computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yenumula B Reddy
CloudPDB: A light-weight data privacy schema for cloud-based databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mehdi Bahrami
,
Mukesh Singhal
Frequency-minimal moving target defense using software-defined networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Saptarshi Debroy
,
Prasad Calyam
,
Minh Nguyen
,
Allen Stage
,
Vladimir Georgiev
Selective encryption and component-oriented deduplication for mobile cloud data computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Sejun Song
,
Baek-Young Choi
,
Daehee Kim
A light-weight forwarding plane for content-centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
J.J. Garcia-Luna-Aceves
,
Maziar Mirzazad-Barijough
Modeling 3D video traffic using a Markov modulated gamma process
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Savera Tanwir
,
Debanjana Nayak
,
Harry Perros
A new highly accurate workload model for campus email traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Spyros Boukoros
,
Athina Kalampogia
,
Polychronis Koutsakis
Optimal context-aware resource allocation in cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ahmed Abdelhadi
,
T. Charles Clancy
Showing 100 out of 189
Load More
Load All