Understanding the impact of limited channel state information on massive MIMO network performances
Jia Liu, Atilla Eryilmaz, Ness B. Shroff, Elizabeth S. Bentley
|
Understanding the impact of limited channel state information on massive MIMO network performances
Details
|
|
Verification:
Authors have
not verified
information
|
Towards distributed ensemble clustering for networked sensing systems: a novel geometric approach
Hu Ding, Lu Su, Jinhui Xu
|
Towards distributed ensemble clustering for networked sensing systems: a novel geometric approach
Details
|
|
Verification:
Authors have
not verified
information
|
High-rate WiFi broadcasting in crowded scenarios via lightweight coordination of multiple access points
Hang Qiu, Konstantinos Psounis, Giuseppe Caire, Keith M. Chugg, Kaidong Wang
|
High-rate WiFi broadcasting in crowded scenarios via lightweight coordination of multiple access points
Details
|
|
Verification:
Authors have
not verified
information
|
Solving the crowdsourcing dilemma using the zero-determinant strategy: poster
Qin Hu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie
|
Solving the crowdsourcing dilemma using the zero-determinant strategy: poster
Details
|
|
Verification:
Authors have
not verified
information
|
WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition
Sheng Tan, Jie Yang
|
WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition
Details
|
|
Verification:
Authors have
not verified
information
|
Full-duplex delay-and-forward relaying
Kai-Cheng Hsu, Kate Ching-Ju Lin, Hung-Yu Wei
|
Full-duplex delay-and-forward relaying
Details
|
|
Verification:
Authors have
not verified
information
|
Joint sensor duty cycle scheduling with coverage guarantee
Kin Sum Liu, Jie Gao, Shan Lin, Hua Huang, Brent Schiller
|
Joint sensor duty cycle scheduling with coverage guarantee
Details
|
|
Verification:
Authors have
not verified
information
|
System intelligence: model, bounds and algorithms
Longbo Huang
|
System intelligence: model, bounds and algorithms
Details
|
|
Verification:
Author has
not verified
information
|
Analysis of region of interest (RoI) of multimedia content using eye-tracker: poster
B. Vinodh, A. Sai Charan, Rolf Assfalg, Hrishikesh Venkataraman
|
Analysis of region of interest (RoI) of multimedia content using eye-tracker: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Real time capable UWB wireless network sniffer: poster
Georg von Zengen, Colin Wulf, Yannic Schröder, Lars C. Wolf
|
Real time capable UWB wireless network sniffer: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Towards secure spectrum auction: both bids and bidder locations matter: poster
Zhili Chen, Lin Chen, Liusheng Huang, Hong Zhong
|
Towards secure spectrum auction: both bids and bidder locations matter: poster
Details
|
|
Verification:
Authors have
not verified
information
|
On the capacity regions of single-channel and multi-channel full-duplex links
Jelena Marasevic, Gil Zussman
|
On the capacity regions of single-channel and multi-channel full-duplex links
Details
|
|
Verification:
Authors have
not verified
information
|
Combinatorics, algorithms and systems for sensor deployment with line-of-sight constraints: poster
Kin Sum Liu, Brent Schiller, Jie Gao, Shan Lin, Joseph S. B. Mitchell
|
Combinatorics, algorithms and systems for sensor deployment with line-of-sight constraints: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Adaptive non-binary classification for network centric handover in heterogeneous networks: poster
M. N. V. Sneha, K. Vamsi Krishna, Hrishikesh Venkataraman
|
Adaptive non-binary classification for network centric handover in heterogeneous networks: poster
Details
|
|
Verification:
Authors have
not verified
information
|
The accuracy of Android energy measurements for offloading computational expensive tasks: poster
Quang-Huy Nguyen, Falko Dressler
|
The accuracy of Android energy measurements for offloading computational expensive tasks: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Supporting real-time wireless traffic through a high-throughput side channel
Haoyang Lu, Wei Gao
|
Supporting real-time wireless traffic through a high-throughput side channel
Details
|
|
Verification:
Authors have
not verified
information
|
Indoor localization using multi-range beaconing: poster
Mehdi Golestanian, Christian Poellabauer
|
Indoor localization using multi-range beaconing: poster
Details
|
|
Verification:
Authors have
not verified
information
|
The privacy leaky bucket: your mobile devices: poster
Jie Chu, Ping Ji
|
The privacy leaky bucket: your mobile devices: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Asymptotically optimal algorithm for online reconfiguration of edge-clouds
I-Hong Hou, Tao Zhao, Shiqiang Wang, Kevin Chan
|
Asymptotically optimal algorithm for online reconfiguration of edge-clouds
Details
|
|
Verification:
Authors have
not verified
information
|
4G LTE-assisted distributed Device-to-Device communication using android smartphones: demo
Yan-Zhao Hou, Yibing Duan, Junchen Han, Yu Chen, Xiaofeng Tao
|
4G LTE-assisted distributed Device-to-Device communication using android smartphones: demo
Details
|
|
Verification:
Authors have
not verified
information
|
Charge me if you can: charging path optimization and scheduling in mobile networks
Lin Chen, Shan Lin, Hua Huang
|
Charge me if you can: charging path optimization and scheduling in mobile networks
Details
|
|
Verification:
Authors have
not verified
information
|
An efficient approximation algorithm for online multi-tier multi-cell user association
Weng-Chon Ao, Konstantinos Psounis
|
An efficient approximation algorithm for online multi-tier multi-cell user association
Details
|
|
Verification:
Authors have
not verified
information
|
Coexistence features of LTE-U for spectrum sharing with collocated Wi-Fi: demo
Junaid Ansari
|
Coexistence features of LTE-U for spectrum sharing with collocated Wi-Fi: demo
Details
|
|
Verification:
Author has
not verified
information
|
Mobility resilience and overhead constrained adaptation in directional 60 GHz WLANs: protocol design and system implementation
Muhammad Kumail Haider, Edward W. Knightly
|
Mobility resilience and overhead constrained adaptation in directional 60 GHz WLANs: protocol design and system implementation
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems
Haiming Jin, Lu Su, Houping Xiao, Klara Nahrstedt
|
INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Throughput characterization of node-based scheduling in multihop wireless networks: a novel application of the Gallai-Edmonds structure theorem
Bo Ji, Yu Sang
|
Throughput characterization of node-based scheduling in multihop wireless networks: a novel application of the Gallai-Edmonds structure theorem
Details
|
|
Verification:
Authors have
not verified
information
|
Deploying carrier-grade WiFi: offload traffic, not money
Konstantinos Poularakis, George Iosifidis, Leandros Tassiulas
|
Deploying carrier-grade WiFi: offload traffic, not money
Details
|
|
Author Comments:
Public source code (written in C programming language) for optimizing the pricing and deployment of WiFi access points.
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
A node-based CSMA algorithm for improved delay performance in wireless networks
Sherif ElAzzouni, Eylem Ekici
|
A node-based CSMA algorithm for improved delay performance in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Anonymous category-level joint tag estimation: poster
Min Chen, Jia Liu, Shigang Chen, Qingjun Xiao
|
Anonymous category-level joint tag estimation: poster
Details
|
|
Verification:
Authors have
not verified
information
|
P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems
Yanzhi Dou, Kexiong Curtis Zeng, He Li, Yaling Yang, Bo Gao, Chaowen Guan, Kui Ren, Shaoqian Li
|
P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed coordination maximization over networks: a stochastic approximation approach
Hyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi
|
Distributed coordination maximization over networks: a stochastic approximation approach
Details
|
|
Verification:
Authors have
not verified
information
|
First learn then earn: optimizing mobile crowdsensing campaigns through data-driven user profiling
Merkourios Karaliopoulos, Iordanis Koutsopoulos, Michalis Titsias
|
First learn then earn: optimizing mobile crowdsensing campaigns through data-driven user profiling
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient online coflow routing and scheduling
Yupeng Li, Shaofeng H.-C. Jiang, Haisheng Tan, Chenzi Zhang, Guihai Chen, Jipeng Zhou, Francis C. M. Lau
|
Efficient online coflow routing and scheduling
Details
|
|
Verification:
Authors have
not verified
information
|
Context aware dynamic log chunking for mobile healthcare applications: poster
Rahul Krishnan Pathinarupothi, Bithin Alangot, P. Venkat Rangan
|
Context aware dynamic log chunking for mobile healthcare applications: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Fast and reliable unknown tag detection in large-scale RFID systems
Wei Gong, Jiangchuan Liu, Zhe Yang
|
Fast and reliable unknown tag detection in large-scale RFID systems
Details
|
|
Verification:
Authors have
not verified
information
|
Anonymous-query based rate control for wireless multicast: approaching optimality with constant feedback
Fei Wu, Yang Yang, Ouyang Zhang, Kannan Srinivasan, Ness B. Shroff
|
Anonymous-query based rate control for wireless multicast: approaching optimality with constant feedback
Details
|
|
Verification:
Authors have
not verified
information
|
PotatoMesh: a solar powered WSN testbed: poster
Björn Gernert, Stephan Rottmann, Lars C. Wolf
|
PotatoMesh: a solar powered WSN testbed: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Self-adaptive network architecture reconfiguration in CRNs: demo
Haijun Wang, Haitao Zhao, Jiaxun Li, Jibo Wei
|
Self-adaptive network architecture reconfiguration in CRNs: demo
Details
|
|
Verification:
Authors have
not verified
information
|
Reducing computational complexity of coded caching by partitioning users into groups: poster
Wenxin Li, Shangjie Chen, Guanchen He, Xiaohua Tian, Xinbing Wang
|
Reducing computational complexity of coded caching by partitioning users into groups: poster
Details
|
|
Verification:
Authors have
not verified
information
|
A novel anti-jamming routing strategy for tactical MANETs: poster
Li Lou, Jian-Hua Fan
|
A novel anti-jamming routing strategy for tactical MANETs: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Analog man-in-the-middle attack against link-based packet source identification
Yu-Chih Tung, Kang G. Shin, Kyu-Han Kim
|
Analog man-in-the-middle attack against link-based packet source identification
Details
|
|
Verification:
Authors have
not verified
information
|
Rate maximization under reactive jamming attacks: poster
Salvatore D'Oro, Eylem Ekici, Sergio Palazzo
|
Rate maximization under reactive jamming attacks: poster
Details
|
|
Verification:
Authors have
not verified
information
|
GAVEL: strategy-proof ascending bid auction for dynamic licensed shared access
Saravana Rathinakumar, Mahesh K. Marina
|
GAVEL: strategy-proof ascending bid auction for dynamic licensed shared access
Details
|
|
Verification:
Authors have
not verified
information
|
P2hub private personal data hub for mobile devices: poster
Michael Haus, Vittorio Cozzolino, Aaron Yi Ding, Jörg Ott
|
P2hub private personal data hub for mobile devices: poster
Details
|
|
Verification:
Authors have
not verified
information
|
How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals
Linsong Cheng, Jiliang Wang
|
How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals
Details
|
|
Verification:
Authors have
not verified
information
|
Towards in-situ sensor network assisted remote sensing of crop parameters: poster
Jan Bauer, Bastian Siegmann, Thomas Jarmer, Nils Aschenbruck
|
Towards in-situ sensor network assisted remote sensing of crop parameters: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Joint selection and transmission scheduling of point-to-point communication requests in multi-channel wireless networks
Peng-Jun Wan
|
Joint selection and transmission scheduling of point-to-point communication requests in multi-channel wireless networks
Details
|
|
Verification:
Author has
not verified
information
|
Geo-spatial resource allocation for heterogeneous vehicular communications: poster
Matthias Wilhelm, Takamasa Higuchi, Onur Altintas
|
Geo-spatial resource allocation for heterogeneous vehicular communications: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Hybrid routing in wireless networks with diverse connectivity
Chen Yang, Radu Stoleru
|
Hybrid routing in wireless networks with diverse connectivity
Details
|
|
Verification:
Authors have
not verified
information
|
Integration of different cryptographic techniques for real-time V2V communication: poster
Nagarjuna Chidara, Chinmayi Nibhanupudi, Hrishikesh Venkataraman
|
Integration of different cryptographic techniques for real-time V2V communication: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Posted pricing for robust crowdsensing
Kai Han, He Huang, Jun Luo
|
Posted pricing for robust crowdsensing
Details
|
|
Verification:
Authors have
not verified
information
|
Throughput-optimal broadcast in wireless networks with dynamic topology
Abhishek Sinha, Leandros Tassiulas, Eytan Modiano
|
Throughput-optimal broadcast in wireless networks with dynamic topology
Details
|
|
Verification:
Authors have
not verified
information
|
Throughput-optimal multi-hop broadcast algorithms
Abhishek Sinha, Georgios S. Paschos, Eytan Modiano
|
Throughput-optimal multi-hop broadcast algorithms
Details
|
|
Verification:
Authors have
not verified
information
|
Full-duplex wireless based on a small-form-factor analog self-interference canceller: demo
Tingjun Chen, Jin Zhou, Nicole Grimwood, Rel Fogel, Jelena Marasevic, Harish Krishnaswamy, Gil Zussman
|
Full-duplex wireless based on a small-form-factor analog self-interference canceller: demo
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-channel access and rendezvous in CRNs: demo
Jiaxun Li, Haitao Zhao, Haijun Wang, Li Zhou, Jibo Wei
|
Multi-channel access and rendezvous in CRNs: demo
Details
|
|
Verification:
Authors have
not verified
information
|
Joint property estimation for multiple RFID tag sets using snapshots of variable lengths
Qingjun Xiao, Shigang Chen, Min Chen
|
Joint property estimation for multiple RFID tag sets using snapshots of variable lengths
Details
|
|
Verification:
Authors have
not verified
information
|
LocalCoin: An ad-hoc payment scheme for areas with high connectivity: poster
Dimitris Chatzopoulos, Sujit Gujar, Boi Faltings, Pan Hui
|
LocalCoin: An ad-hoc payment scheme for areas with high connectivity: poster
Details
|
|
Verification:
Authors have
not verified
information
|
Monitoring vital signs using millimeter wave
Zhicheng Yang, Parth H. Pathak, Yunze Zeng, Xixi Liran, Prasant Mohapatra
|
Monitoring vital signs using millimeter wave
Details
|
|
Verification:
Authors have
not verified
information
|
On LTE-WiFi coexistence and inter-operator spectrum sharing in unlicensed bands: altruism, cooperation and fairness
Cengis Hasan, Mahesh K. Marina, Ursula Challita
|
On LTE-WiFi coexistence and inter-operator spectrum sharing in unlicensed bands: altruism, cooperation and fairness
Details
|
|
Verification:
Authors have
not verified
information
|
IQ-Hopping: distributed oblivious channel selection for wireless networks
Apurv Bhartia, Deeparnab Chakrabarty, Krishna Chintalapudi, Lili Qiu, Bozidar Radunovic, Ramachandran Ramjee
|
IQ-Hopping: distributed oblivious channel selection for wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|