Default Cover Image

2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)

Oct. 9 2017 to Oct. 11 2017

Rome, Italy

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 1-1
CommitteesFreely available from IEEE.pp. 1-10
Table of contentsFreely available from IEEE.pp. 1-12
Technical programFreely available from IEEE.pp. 1-14
Optimal aggregated ConvergeCast scheduling with an SINR interference modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On practical multihop wireless communication: Insights, limitations, and solutionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
NxWLAN: Towards transparent and secure usage of neighbors' access points in residential WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Study on the feasibility of LoRaWAN for smart city applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 334-340
DejaVu: A case for assisted email replies on smartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A station regrouping method for contention based IEEE 802.11ah wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Non-intrusive QoE prediction in WLANFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Capacity analysis of two-tier networks with MIMO cognitive small cells in Nagakami-m fadingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Enabling RPL multihop communications based on LoRaFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A new centralized access control for mmWave D2D communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Binary subchannel decomposition of lattice-based multiple access schemesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
DroidPosture: A trusted posture assessment service for mobile devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Self-backhauled autonomous LTE mesh networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Narrowband distance evaluation technique for indoor positioning systems based on Zadoff-Chu sequencesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
DCC-enabled contention based forwarding scheme for VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Cooperation in multi-user wireless powered communication networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
WiMAX network federation using spectrum virtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 378-384
Choreography-based vs orchestration-based service composition in opportunistic networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Investigating interference between LoRa and IEEE 802.15.4g networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Study and analysis of ultra wideband through glass propagation channel characteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
TCP performance over 5G mmWave links — Tradeoff between capacity and latencyFull-text access may be available. Sign in or learn about subscription options.pp. 385-394
Mobility management optimization and conflict avoidance in self-organizing OFDMA networksFull-text access may be available. Sign in or learn about subscription options.pp. 175-182
Super learning for anomaly detection in cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
SNIFFO: Security of networks and intelligence for field operationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Backscatter MAC protocol for future Internet of Things networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Energy-efficient massive cellular IoT shared spectrum access via mobile data aggregatorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Stealthy jammer detection algorithm for wide-band radios: A physical layer approachFull-text access may be available. Sign in or learn about subscription options.pp. 79-83
Evaluating LoRa energy efficiency for adaptive networks: From star to mesh topologiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Securing cyber physical systems from injection attacks by exploiting random sequencesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A comprehensive and effective mechanism for DDoS detection in SDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Singer cyclic difference sets for an energy-efficient joining schemeFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Collision prevention in distributed 6TiSCH networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An energy efficient optimum shared cell scheduling for TSCH networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
LTE signal fingerprinting localization based on CSIFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Improving resource efficiency with partial resource muting for future wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Complete edge function onloading for effective backend-driven cyber foragingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
The secure mobile teen: Looking at the secret world of childrenFull-text access may be available. Sign in or learn about subscription options.pp. 341-348
QoE-driven video enhancements in wireless networks through predictive packet dropsFull-text access may be available. Sign in or learn about subscription options.pp. 355-361
A radio resource management scheme in future ultra-dense phantom networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Multilayered Wyner-Ziv lattice coding for single-cell point-to-multipoint communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance analysis of early packet loss detection in WiFi direct 802.11 networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
FFR-aided OFDMA-based networks under spatially correlated shadowingFull-text access may be available. Sign in or learn about subscription options.pp. 49-54
Comparison of similarity approaches for indoor localizationFull-text access may be available. Sign in or learn about subscription options.pp. 349-354
Energy-efficient cooperative spectrum sensing with a merged clustering measureFull-text access may be available. Sign in or learn about subscription options.pp. 38-43
Cross-layer analysis of optimal relaying strategies for terahertz-band communication networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Smart-phone based monitoring of cancer related fatigueFull-text access may be available. Sign in or learn about subscription options.pp. 249-256
Technology independent scheduling architecture for V2X communications: A flexible approachFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
Strengthening access control in case of compromised accounts in smart homeFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Showing 100 out of 128