Default Cover Image

2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT)

April 11 2016 to April 13 2016

Cairo, Egypt

Table of Contents

IndexFreely available from IEEE.pp. 1-2
CommitteesFreely available from IEEE.pp. 1-4
Table of contentsFreely available from IEEE.pp. 1-4
Technical programmeFreely available from IEEE.pp. 1-9
Autonomous localization scheme for mobile sensor networks in fading environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An enhanced TDMA Cluster-based MAC (ETCM) for multichannel vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Distributed time synchronization mechanism for large-scale vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
On the beamforming and blind interference threshold estimation in underlay cognitive systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Generalized implicit cooperation with slotted contention in cognitive radio wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Automation of understanding textual contents in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
VOLTE deployment scenarios: Perspectives and performance assessmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Consensus-based information synchronization for content-centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Smart mobile system for pregnancy care using body sensorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Performance of WiMAX for smart grid applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance of smart grid communication in the presence of impulsive noiseFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Multi-RAT mobile node architecture for efficient handover using software defined networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A dimensioning framework for indoor DAS LTE networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An SDR platform for performance evaluation of OFDM-based indoor DAS solutionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Persistent store-based dual replication system for distributed SDN controllerFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Investigating different factors affecting the infection rate of Internet wormsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Performance evaluation of IoT protocols under a constrained wireless access networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
CBSTM-IoT: Context-based social trust model for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Classification and analysis of IEEE 802.15.4 PHY layer attacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Slinging MUD: Manufacturer usage descriptions: How the network can protect thingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Distributed monitoring in 6LoWPAN based Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An annulus-based access class barring scheme for stationary machine-type communications devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Benefits of the IEEE 802.15.4's MAC layer acknowledgements in Ad-Hoc networks: An experimental analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An identification and prevention of theft-of-service attack on cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Power allocation strategies for Non-Orthogonal Multiple AccessFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Detection techniques for data-level spoofing in GPS-based phasor measurement unitsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Performance evaluation of CoMP methods under RF calibration errorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Showing 45 out of 45