Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
WIMOB
WIMOB 2017
Generate Citations
2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
Oct. 9 2017 to Oct. 11 2017
Rome, Italy
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Committees
Freely available from IEEE.
pp. 1-10
Table of contents
Freely available from IEEE.
pp. 1-12
Technical program
Freely available from IEEE.
pp. 1-14
CWN'17: The fourth international workshop on cooperative wireless networks — 2017 — Program
Freely available from IEEE.
pp. 1-2
CWN'17: The fourth international workshop on cooperative wireless networks — 2017 — Committees and welcome
Freely available from IEEE.
pp. 1-1
EN4PPDR'17: Fourth international workshop on emergency networks for public protection and disaster relief — 2017 — Program
Freely available from IEEE.
pp. 1-1
EN4PPDR'17: Fourth international workshop on emergency networks for public protection and disaster relief — 2017 — Committees and welcome
Freely available from IEEE.
pp. 1-1
IEEE eHPWAS'17: Fifth international IEEE workshop on e-health pervasive wireless applications and services 2017 — Program
Freely available from IEEE.
pp. 1-1
IEEE eHPWAS'17: Fifth international IEEE workshop on e-health pervasive wireless applications and services 2017 — Committees and welcome
Freely available from IEEE.
pp. 1-2
SEUNet'17: Second international workshop on smart environments and urban networking — 2017 — Program
Freely available from IEEE.
pp. 1-1
SEUNet'17: Second international workshop on smart environments and urban networking — 2017 — Committees and welcome
Freely available from IEEE.
pp. 1-1
STWiMob'2017: 2017 Tenth IEEE international workshop on selected topics in mobile and wireless computing — Program
Freely available from IEEE.
pp. 1-2
STWiMob'2017: 2017 Tenth IEEE international workshop on selected topics in mobile and wireless computing — Committees and welcome
Freely available from IEEE.
pp. 1-1
PerCAM'17: Fifth international workshop on pervasive and context-aware middleware 2017 — Program
Freely available from IEEE.
pp. 1-1
PerCAM'17: Fifth international workshop on pervasive and context-aware middleware 2017 — Committees and welcome
Freely available from IEEE.
pp. 1-1
Optimal aggregated ConvergeCast scheduling with an SINR interference model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mahesh Bakshi
,
Brigitte Jaumard
,
Lata Narayanan
On practical multihop wireless communication: Insights, limitations, and solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abderrahmen Mtibaa
,
Ahmed Emam
,
Khaled A. Harras
NxWLAN: Towards transparent and secure usage of neighbors' access points in residential WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Piotr Gawłowicz
,
Sven Zehl
,
Anatolij Zubow
,
Adam Wolisz
Fine-grained access provisioning via joint gateway selection and flow routing on SDN-aware Wi-Fi mesh networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Dawood Sajjadi
,
Rukhsana Ruby
,
Maryam Tanha
,
Jianping Pan
Study on the feasibility of LoRaWAN for smart city applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-340
by
Fanghao Yu
,
Ziming Zhu
,
Zhong Fan
Outage probability of MIMO cognitive cooperative radio networks with multiple AF relays using orthogonal space-time block codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-89
by
Advaita Advaita
,
Mani Meghala Gali
,
Thi My Chinh Chu
,
Hans-Jürgen Zepernick
DejaVu: A case for assisted email replies on smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Uma Parthavi Moravapalle
,
Raghupathy Sivakumar
Time diversity in multipath channels for cellular IoT: Theoretical and simulation analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-97
by
Louis-Adrien Dufrene
,
Matthieu Crussiere
,
Jean-François Helard
,
Jean Schwoerer
A station regrouping method for contention based IEEE 802.11ah wireless LAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ziming Zhu
,
Zhenzhe Zhong
,
Zhong Fan
Non-intrusive QoE prediction in WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M. L. Jiménez-Padilla
,
P. Romero-Hierro
,
M. C. Aguayo-Torres
,
C. Cardenas
,
J. Baños-Polglase
Less latency and better protection with AL-FEC sliding window codes: A robust multimedia CBR broadcast case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Vincent Roca
,
Belkacem Teibi
,
Christophe Burdinat
,
Tuan Tran
,
Cédric Thienot
Capacity analysis of two-tier networks with MIMO cognitive small cells in Nagakami-m fading
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Thi My Chinh Chu
,
Hans-Jürgen Zepernick
Enabling RPL multihop communications based on LoRa
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Benjamin Sartori
,
Steffen Thielemans
,
Maite Bezunartea
,
An Braeken
,
Kris Steenhaut
A new centralized access control for mmWave D2D communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Salvatore Riolo
,
Daniela Panno
,
Antonio Di Maria
SEBRA: SAND-enabled bitrate and resource allocation algorithm for network-assisted video streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Evgeny Khorov
,
Artem Krasilov
,
Mikhail Liubogoshchev
,
Suwen Tang
Autonomous and dynamic inter-cell interference coordination techniques for future wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mahdi Ezzaouia
,
Cédric Gueguen
,
Mohamad Yassin
,
Mahmoud Ammar
,
Xavier Lagrange
,
Ammar Bouallegue
Optimize wireless networks for energy saving by distributed computation of Čech complex
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ngoc-Khuyen Le
,
Anaïs Vergne
,
Philippe Martins
,
Laurent Decreusefond
Binary subchannel decomposition of lattice-based multiple access schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abir Ben Hadj Fredj
,
Jean-Claude Belfiore
DroidPosture: A trusted posture assessment service for mobile devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sileshi Demesie Yalew
,
Gerald Q. Maguire
,
Seif Haridi
,
Miguel Correia
Self-backhauled autonomous LTE mesh networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Romain Favraud
,
Chia-Yu Chang
,
Navid Nikaein
Measurements for the development of an enhanced model for wireless channels in industrial environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ramona Croonenbroeck
,
Lisa Underberg
,
Armin Wulf
,
Rüdiger Kays
BER analysis of overloaded MC-CDMA cellular system employing sphere decoder in non-ideal sectorization scenario
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Henry Ramiro Carvajal Mora
,
Nathaly Verónica Orozco Garzón
,
Celso de Almeida
Narrowband distance evaluation technique for indoor positioning systems based on Zadoff-Chu sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
G. Piccinni
,
G. Avitabile
,
G. Coviello
DCC-enabled contention based forwarding scheme for VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Thiwiza Bellache
,
Oyunchimeg Shagdar
,
Samir Tohme
Cooperation in multi-user wireless powered communication networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mariam M.N. Aboelwafa
,
Karim G. Seddik
,
Mustafa ElNainay
Optimizing D2D transmission for secure and reliable smart grid communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Muhammad Waqas
,
Zain Ali
,
Haji Muhammad Furqan
,
Guftaar Ahmad Sardar Sidhu
WiMAX network federation using spectrum virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-384
by
Babatunde Samuel Ogunleye
,
Alexandru Murgu
Choreography-based vs orchestration-based service composition in opportunistic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fadhlallah Baklouti
,
Nicolas Le Sommer
,
Yves Mahéo
Investigating interference between LoRa and IEEE 802.15.4g networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Charalampos Orfanidis
,
Laura Marie Feeney
,
Martin Jacobsson
,
Per Gunningberg
Study and analysis of ultra wideband through glass propagation channel characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Richa Bharadwaj
,
Shiban K. Koul
Improving reliable data transport in wireless sensor networks through dynamic cache-aware rate control mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Melchizedek I. Alipio
,
Nestor Michael C. Tiglao
A scalable IoT framework to design logical data flow using virtual sensor
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Le Kim-Hung
,
Soumya Kanti Datta
,
Christian Bonnet
,
François Hamon
,
Alexandre Boudonne
TCP performance over 5G mmWave links — Tradeoff between capacity and latency
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-394
by
Marcus Pieska
,
Andreas Kassler
Real-time sampling rate adaptation based on continuous risk level evaluation in wireless body sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Carol Habib
,
Abdallah Makhoul
,
Rony Darazi
,
Raphael Couturier
Joint optimization of QoE and fairness through network assisted adaptive mobile video streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abbas Mehrabi
,
Matti Siekkinen
,
Antti Ylä-Jääski
EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Francesca Cuomo
,
Manuel Campo
,
Alberto Caponi
,
Giuseppe Bianchi
,
Giampaolo Rossini
,
Patrizio Pisani
Reducing the data transmission in sensor networks through Kruskal-Wallis model
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-78
by
Ali Jaber
,
Mohamad Abou Taam
,
Abdallah Makhoul
,
Chady Abou Jaoude
,
Oussama Zahwe
,
Hassan Harb
Cooperative anti-jamming for secondary opportunistic networks: A Colonel Blotto game model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mohamed Abdel Raheem
,
Mohammad Mahmoud Abdellatif
UPWARC: User plane wireless adaptable reliable communication, a new architecture for high speed train passenger internet services
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-189
by
Subharthi Banerjee
,
Michael Hempel
,
Hamid Sharif
Mobility management optimization and conflict avoidance in self-organizing OFDMA networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-182
by
Nur Öykü Tuncel
,
Mutlu Koca
Super learning for anomaly detection in cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Pedro Casas
,
Juan Vanerio
SNIFFO: Security of networks and intelligence for field operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Matteo Brunati
,
Mauro Conti
,
Alessandro Tezza
A hybrid transmission scheme employing opportunistic transmission and multiuser diversity
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
Nathaly Verónica Orozco Garzón
,
Henry Ramiro Carvajal Mora
,
Celso de Almeida
Backscatter MAC protocol for future Internet of Things networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Md. Abdul Alim
,
Shunsuke Saruwatari
,
Takashi Watanabe
Secure lightweight ECC-based protocol for multi-agent IoT systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Haya Hasan
,
Tasneem Salah
,
Dina Shehada
,
M. Jamal Zemerly
,
Chan Yeob Yeun
,
Mahmoud Al-Qutayri
,
Yousof Al-Hammadi
Self-organizing wireless sensor networks based on biological collective decision making for treating information uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-174
by
Saeko Shigaki
,
Naomi Kuze
,
Daichi Kominami
,
Kenji Kashima
,
Masayuki Murata
Energy-efficient massive cellular IoT shared spectrum access via mobile data aggregators
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ghaith Hattab
,
Danijela Cabric
Completely independent spanning trees for enhancing the robustness in ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-70
by
Axel Moinet
,
Benoît Darties
,
Nicolas Gastineau
,
Jean-Luc Baril
,
Olivier Togni
Stealthy jammer detection algorithm for wide-band radios: A physical layer approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
T. Nawaz
,
L. Marcenaro
,
C. S. Regazzoni
Evaluating LoRa energy efficiency for adaptive networks: From star to mesh topologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Moises Nunez Ochoa
,
Arturo Guizar
,
Mickael Maman
,
Andrzej Duda
An approximation for the distribution of the peak-to-average power ratio in carrier-aggregated OFDM signals using level crossing rate analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mariam Issa
,
Abdel-karim Ajami
,
Hassan Artail
,
Youssef Nasser
Securing cyber physical systems from injection attacks by exploiting random sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Federica Battisti
,
Marco Carli
,
Federica Pascucci
A comprehensive and effective mechanism for DDoS detection in SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mauro Conti
,
Ankit Gangwal
,
Manoj Singh Gaur
Singer cyclic difference sets for an energy-efficient joining scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Elodie Morin
,
Mickael Maman
,
Roberto Guizzetti
,
Andrzej Duda
Collision prevention in distributed 6TiSCH networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ali J. Fahs
,
Rodolphe Bertolini
,
Olivier Alphand
,
Franck Rousseau
,
Karine Altisen
,
Stephane Devismes
Low power radiolocation through long range wide area networks: A performance study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nicola Accettura
,
Samir Medjiah
,
Balakrishna Prabhu
,
Thierry Monteil
Grouping of subcarriers and effective SNR statistics in wideband OFDM systems using EESM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jérôme Gaveau
,
Christophe J. Le Martret
,
Mohamad Assaad
Feature-based diagnostic distortion measure for unsupervised self-guided biomedical signal compressors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jose Santos
,
Dongming Peng
,
Michael Hempel
,
Hamid Sharif
An energy efficient optimum shared cell scheduling for TSCH networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Baver Özceylan
,
Berk Ünlü
,
Buyurman Baykal
LTE signal fingerprinting localization based on CSI
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Giovanni Pecoraro
,
Simone Di Domenico
,
Ernestina Cianca
,
Mauro De Sanctis
Improving resource efficiency with partial resource muting for future wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qi Liao
,
R. L. G. Cavalcante
Adaptive distributed energy-saving data gathering technique for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Ali Kadhum Idrees
,
Hassan Harb
,
Ali Jaber
,
Oussama Zahwe
,
Mohamad Abou Taam
On the feasibility of attribute-based encryption for WLAN access control
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Claudio Pisa
,
Tooska Dargahi
,
Alberto Caponi
,
Giuseppe Bianchi
,
Nicola Blefari-Melazzi
Providing a cloud-based smart meter solution to control and monitor electrical quantities of industrial machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Marcelo Dornbusch Lopes
,
Leonardo R. P. Rauta
,
Benjamin W. Mezger
,
Michelle S. Wangham
Complete edge function onloading for effective backend-driven cyber foraging
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Flavio Esposito
,
Andrej Cvetkovski
,
Tooska Dargahi
,
Jianli Pan
The secure mobile teen: Looking at the secret world of children
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-348
by
Massimo Marchiori
Matrix factorization on semantic trajectories for predicting future semantic locations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Antonios Karatzoglou
,
Stefan Christian Lamp
,
Michael Beigl
QoE-driven video enhancements in wireless networks through predictive packet drops
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-361
by
Najwan Khambari
,
Bogdan Ghita
,
Lingfen Sun
Performance evaluation of multiple attribute mobility decision models: A QoE-efficiency perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-166
by
Charles H. F. dos Santos
,
Mathews P. S. de Lima
,
Felipe S. Dantas Silva
,
Augusto Neto
A small cell approach to optimizing the coverage of MTC systems with massive MIMO and random access using stochastic geometry
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-37
by
Rasha Al Khansa
,
Jean J. Saade
,
Hassan A. Artail
,
Mohamad Assaad
Evaluation of the toroidal cellular simulation structure under users' mobility, time-varying traffic, and dynamic channel assignment
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-48
by
S. Lirio Castellanos-Lopez
,
Daniela Toral Valdez
,
Felipe A. Cruz-Pérez
,
Genaro Hernandez-Valdez
Stochastic failure dynamics in communication network under the influence of power failure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Pankaz Das
,
Rezoan A. Shuvro
,
Zhuoyao Wang
,
Mahshid Rahnamay Naeini
,
Nasir Ghani
,
Majeed M. Hayat
A radio resource management scheme in future ultra-dense phantom networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Antonio Di Maria
,
Daniela Panno
Multilayered Wyner-Ziv lattice coding for single-cell point-to-multipoint communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sinda Smirani
,
Juwendo Denis
,
Badii Jouaber
Performance analysis of early packet loss detection in WiFi direct 802.11 networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Gul Zameen Khan
,
Eun-Chan Park
,
Ruben Gonzalez
FFR-aided OFDMA-based networks under spatially correlated shadowing
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-54
by
Jan García-Morales
,
Guillem Femenias
,
Felip Riera-Palou
TruApp: A TrustZone-based authenticity detection service for mobile apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Sileshi Demesie Yalew
,
Pedro Mendonca
,
Gerald Q. Maguire
,
Seif Haridi
,
Miguel Correia
Comparison of similarity approaches for indoor localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-354
by
Wafa Njima
,
Iness Ahriz
,
Rafik Zayani
,
Michel Terre
,
Ridha Bouallegue
Energy-efficient cooperative spectrum sensing with a merged clustering measure
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-43
by
Krzysztof Cichoń
,
Adrian Kliks
,
Hanna Bogucka
Cross-layer analysis of optimal relaying strategies for terahertz-band communication networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qing Xia
,
Josep Miquel Jornet
Lifetime enhancement of disaster recovery systems based on IEEE 802.11s wireless mesh networks using a sleep-wake algorithm with minimum number of neighbors
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-226
by
Christopher Hepner
,
Roland Muenzner
,
Robert Weigel
Smart-phone based monitoring of cancer related fatigue
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-256
by
Vanessa C. Klaas
,
Gerhard Tröster
,
Natalie Büel
,
Heinrich Walt
,
Josef Jenewein
Technology independent scheduling architecture for V2X communications: A flexible approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Carlo Augusto Grazia
,
Maurizio Casoni
Strengthening access control in case of compromised accounts in smart home
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Annanda Thavymony Rath
,
Jean-Noël Colin
Showing 100 out of 128
Load More
Load All