Latest
- PRepChain: A versatile privacy-preserving reputation system for dynamic supply chain environments
- Demo: TOSense – What Did You Just Agree to?
- VAlign-GLAR: Graph Retrieval-Based Vulnerability Intelligence Alignment via Structured LLM-Guided Inference
- BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning
- Evaluating Honeyfile Realism and Enticement Metrics
- Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence
- TOSense: We Read, You Click
- What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation?
- Zero Trust Driven Access Control Delegation Using Blockchain
- BeyondLife: Third-Party Digital Will Application
- LSTM-H: A Hybrid Deep Learning Model for Accurate Livestock Movement Prediction in UAV-Based Monitoring Systems
- Navigating the Gray Interventions: The Impact of Soft Moderation Techniques Across Social Media Platforms
- DeepSneak: User GPS Trajectory Reconstruction from Federated Route Recommendation Models
- Predicting IoT Device Vulnerability Fix Times with Survival and Failure Time Models
- BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management
- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention
- Instance-Wise Monotonic Calibration by Constrained Transformation
- Label Shift Estimation With Incremental Prior Update
- Revisit Time Series Classification Benchmark: The Impact of Temporal Information for Classification
- Unsupervised Power Load Super-Resolution Based on Contrastive and Internal Learning
- VEH-Attack: Stealthy Tracking of Train Passengers With Side-Channel Attack on Vibration Energy Harvesting Wearables
- Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning
- Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement
- Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English
- Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities
- Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation
- Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics
- Synthetic Trajectory Generation Through Convolutional Neural Networks
- Honeyfile Camouflage: Hiding Fake Files in Plain Sight
- Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler
- Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity
- SoK: Can Trajectory Generation Combine Privacy and Utility?
- SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
- SoK: Trusting Self-Sovereign Identity
- VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models
- Challenges in Designing Blockchain for Cyber-Physical Systems
- Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning
- OCHJRNChain: A Blockchain-Based Security Data Sharing Framework for Online Car-Hailing Journey
- Optimally Mitigating Backdoor Attacks in Federated Learning
- Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
- Enabling Safe ITS: EEG-Based Microsleep Detection in VANETs
- Advanced Networking and Applications for Metaverse and Web 3.0
- Reinforcing Industry 4.0 With Digital Twins and Blockchain-Assisted Federated Learning
- Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach
- A blockchain framework data integrity enhanced recommender system
- A blockchain-based IoT data marketplace
- A systematic review of federated learning from clients' perspective: challenges and solutions
- BAILIF: A Blockchain Agnostic Interoperability Framework
- Barriers to blockchain-based decentralised energy trading: a systematic review
- DualVAE: Controlling Colours of Generated and Real Images
- False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
- Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads
- Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT
- Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots
- Trust and Reputation Management for Blockchain-enabled IoT
- VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms
- Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
- <i>CredTrust</i>: Credential Based Issuer Management for Trust in Self-Sovereign Identity
- A Decentralized Architecture for Trusted Dataset Sharing Using Smart Contracts and Distributed Storage
- A machine learning and blockchain based secure and cost-effective framework for minor medical consultations
- A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases
- A review on Virtual Reality and Augmented Reality use-cases of Brain Computer Interface based applications for smart cities
- A survey of data minimisation techniques in blockchain-based healthcare
- A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions
- AI for Next Generation Computing: Emerging Trends and Future Directions
- AQA: An Adaptive Quality Assessment Framework for Online Review Systems
- Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores
- Blockchain-Based Decentralized Federated Learning
- Chain or DAG? Underlying data structures, architectures, topologies and consensus in distributed ledger technology: A review, taxonomy and research issues
- Consensus Algorithms on Appendable-Block Blockchains: Impact and Security Analysis
- Deep Reinforcement Learning for Dynamic Things of Interest Recommendation in Intelligent Ambient Environment
- DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains
- Device Identification in Blockchain-Based Internet of Things
- DIMY: Enabling privacy-preserving contact tracing
- Estimating Passenger Queue for Bus Resource Optimization Using LoRaWAN-Enabled Ultrasonic Sensors
- Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications
- Guest Editorial: Special Issue on Recent Advances on Blockchain for Network and Service Management
- HARB: A Hypergraph-Based Adaptive Consortium Blockchain for Decentralized Energy Trading
- IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?
- Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines
- Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News
- MetaGanFi: Cross-Domain Unseen Individual Identification Using WiFi Signals
- Monetizing Parking IoT Data via Demand Prediction and Optimal Space Sharing
- Privacy in targeted advertising on mobile devices: a survey
- PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains
- Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks
- TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces
- Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings
- WIDE: A witness-based data priority mechanism for vehicular forensics
- The Road to Accountable and Dependable Manufacturing
- Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy
- A Novel Blockchain-as-a-Service (BaaS) Platform for Local 5G Operators
- A Novel Model-Based Security Scheme for LoRa Key Generation
- Appendable-Block Blockchains
- Attacking with bitcoin: Using bitcoin to build resilient botnet armies
- B-FERL: Blockchain based framework for securing smart vehicles
- BlockTorrent: A privacy-preserving data availability protocol for multiple stakeholder scenarios
- Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study
- Context-Induced Activity Monitoring for On-Demand Things-of-Interest Recommendation in an Ambient Intelligent Environment
- Contextual Bandit Learning for Activity-Aware Things-of-Interest Recommendation in an Assisted Living Environment
- Cost-Effective Blockchain-based IoT Data Marketplaces with a Credit Invariant
- Cost-effective IoT devices as trustworthy data sources for a blockchain-based water management system in precision agriculture
- Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions
- DaaS: Dew Computing as a Service for Intelligent Intrusion Detection in Edge-of-Things Ecosystem
- Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
- Deception for Cyber Defence: Challenges and Opportunities
- Detecting Internet of Things Bots: A Comparative Study
- Editor's note
- EMPOWERING SUSTAINABLE ENERGY INFRASTRUCTURES VIA AI-ASSISTED WIRELESS COMMUNICATIONS
- Energy and Service-priority aware Trajectory Design for UAV-BSs using Double Q-Learning
- Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples
- Gate-ID: WiFi-Based Human Identification Irrespective of Walking Directions in Smart Home
- IEEE International Conference on Pervasive Computing and Communications (PerCom) 2020
- In Situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources
- In-situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources
- MB-EHR: A Multilayer Blockchain-based EHR
- MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System
- Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
- Temporary immutability: A removable blockchain solution for prosumer-side energy trading
- Towards a blockchain powered IoT data marketplace
- Towards Automated Data Sharing in Personal Data Stores
- Towards Privacy-preserving Digital Contact Tracing
- Traceable, trustworthy and privacy preserving agri-food supply chains
- TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply Chains
- Trust-Based Blockchain Authorization for IoT
- VID: Human identification through vein patterns captured from commodity depth cameras
- Forthcoming applications of quantum computing: peeking into the future
- A Decentralized Peer-to-Peer Remote Health Monitoring System
- A journey in applying blockchain for cyberphysical systems
- A Novel Modeling Involved Security Approach for LoRa Key Generation
- A QoS-aware, Energy-efficient Trajectory Optimization for UAV Base Stations using Q-Learning
- A Relational Network Framework for Interoperability in Distributed Energy Trading
- A Survey of COVID-19 Contact Tracing Apps
- A Technology-driven Overview on Blockchain-based Academic Certificate Handling
- A unified framework for data integrity protection in people-centric smart cities
- ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile Crowdsensing
- Adaptive Two-Dimensional Embedded Image Clustering
- Adversarial Multi-view Networks for Activity Recognition
- Blockchain and Cyberphysical Systems
- Blockchain-based Verifiable Credential Sharing with Selective Disclosure
- Brain2Object: Printing Your Mind from Brain Signals with Spatial Correlation Embedding
- Context-based Smart Contracts For Appendable-block Blockchains
- Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals
- EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights
- Energy-aware Demand Selection and Allocation for Real-time IoT Data Trading
- Evaluating Emergency Evacuation Events Using Building WiFi Data
- Exploiting constrained IoT devices in a trustless blockchain-based water management system
- HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
- Identifying highly influential travellers for spreading disease on a public transport system
- Interoperability and Synchronization Management of Blockchain-Based Decentralized e-Health Systems
- Is Privacy Regulation Slowing Down Research on Pervasive Computing?
- Leveraging lightweight blockchain to establish data integrity for surveillance cameras
- Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings
- Passive Activity Classification of Smart Homes through Wireless Packet Sniffing
- Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT
- Privacy in targeted advertising: A survey
- Protecting Private Attributes in App Based Mobile User Profiling
- Prototype Similarity Learning for Activity Recognition
- Recommender Systems for the Internet of Things: A Survey
- Selected papers from the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
- Special issue on \"Crowd-sensed Big Data for Internet of Things Services\"
- Special Issue on Data Distribution in Industrial and Pervasive Internet
- Towards a Distributed Defence Mechanism Against IoT-based Bots
- Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs
- Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs
- Trust Management in Decentralized IoT Access Control System
- A Trust Architecture for Blockchain in IoT
- AETD: An application-aware, energy-efficient trajectory design for flying base stations
- An Experimental Study for Tracking Crowd in Smart Cities
- Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
- CROWD MANAGEMENT
- Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
- Editorial: Receiving the Baton
- Energy Efficient Legitimate Wireless Surveillance of UAV Communications
- Experiences With IoT and AI in a Smart Campus for Optimizing Classroom Usage
- Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting
- Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations
- Guest Editorial: Introduction to the Special Section on Sensor Data Computing as a Service in Internet of Things
- How mobility patterns drive disease spread: A case study using public transit passenger card travel data
- HydraDoctor: Real-time Liquids Intake Monitoring by Collaborative Sensing
- Impact of consensus on appendable-block blockchain for IoT
- Improving IoT Data Quality in Mobile Crowd Sensing: A Cross Validation Approach
- Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
- LSB: A Lightweight Scalable Blockchain for IoT security and anonymity
- Measuring and Modeling Car Park Usage: Lessons Learned from a Campus Field-Trial
- MOF-BC: A memory optimized and flexible blockchain for large scale networks
- MRA: A modified reverse auction based framework for incentive mechanisms in mobile crowdsensing systems
- On the Activity Privacy of Blockchain for IoT
- Passenger Demand Forecasting with Multi-Task Convolutional Recurrent Neural Networks
- Peer-to-Peer EnergyTrade: A Distributed Private Energy Trading Platform
- Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs
- Recent Trends in User Authentication - A Survey
- Recharging of Flying Base Stations using Airborne RF Energy Sources
- Reminder Care System: An Activity-Aware Cross-Device Recommendation System
- Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs
- Smart user identification using cardiopulmonary activity
- Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization
- Spatio-Temporal Graph Convolutional and Recurrent Networks for Citywide Passenger Demand Prediction
- SPB: A Secure Private Blockchain-Based Solution for Distributed Energy Trading
- STG2Seq: Spatial-Temporal Graph to Sequence Model for Multi-step Passenger Demand Forecasting
- The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings
- The Proposal of a Blockchain-Based Architecture for Transparent Certificate Handling
- Towards a Privacy-Preserving Way of Vehicle Data Sharing - A Case for Blockchain Technology?
- TrustChain: Trust Management in Blockchain and IoT supported Supply Chains
- Zero-Shot Object Detection with Textual Descriptions
- A Blockchain Based Liability Attribution Framework for Autonomous Vehicles
- A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks
- A Secure and Efficient Direct Power Load Control Framework Based on Blockchain
- Algorithmic Governance in Smart Cities The Conundrum and the Potential of Pervasive Computing Solutions
- Automatic Device Classification from Network Traffic Streams of Internet of Things
- B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication
- BRRA: A Bid-Revisable Reverse Auction based Framework for Incentive Mechanisms in Mobile Crowdsensing Systems
- Converting Your Thoughts to Texts: Enabling Brain Typing via Deep Feature Learning of EEG Signals
- Data-Driven Monitoring and Optimization of Classroom Usage in a Smart Campus
- Demo Abstract: A Tool to Access and Visualize Classroom Attendance Data from a Smart Campus
- Demo: A Delay-Tolerant Payment Scheme on the Ethereum Blockchain
- Dependable IoT using blockchain-based technology
- Enabling Efficient and High Quality Zooming for Online Video Streaming using Edge Computing
- Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems
- Multi-Agent Systems: A Survey
- Optimal Prizes for All-Pay Contests in Heterogeneous Crowdsourcing
- ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains
- Realizing a Smart University Campus: Vision, Architecture, and Implementation
- Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept
- SPB: A Secure Private Blockchain-based Solution for Energy Trading
- SpeedyChain: A framework for decoupling data from blockchain for smart cities
- Toward Mitigation-as-a-Service in Cooperative Network Defenses
- Trust and Privacy Challenges in Social Participatory Networks
- Understanding Crowd Density with A Smartphone Sensing System
- Wi-Access: Second Factor User Authentication leveraging WiFi Signals
- Wi-Sign: Device-free Second Factor User Authentication
- WITS: an IoT-endowed computational framework for activity recognition in personalized smart homes
- Applications and Challenges of Wearable Visual Lifeloggers
- Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
- BlockChain: A Distributed Solution to Automotive Security and Privacy
- EGAIM: Enhanced Genetic Algorithm based Incentive Mechanism for Mobile Crowdsensing
- Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval
- Instrumenting Wireless Sensor Networks - A survey on the metrics that matter
- LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
- PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications
- Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs
- Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems
- Towards an optimized blockchain for IoT
- VeinDeep: Smartphone Unlock using Vein Patterns
- Wi-Auth: WiFi based Second Factor User Authentication
- WiCare: Towards In-Situ Breath Monitoring
- A Context-based Privacy Preserving Framework for Wearable Visual Lifeloggers
- Blockchain in internet of things: Challenges and Solutions
- Carrots and Sticks - Incentives that Make Mobile Crowdsensing Work (CASPer 2016 Keynote Paper)
- Comprehensive Mobile Bandwidth Traces from Vehicular Networks
- Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs
- Energy Harvesting Wearables Can Tell Which Train Route You Have Taken
- Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles
- Human Identification Using WiFi Signal
- Implementation and Evaluation of Adaptive Video Streaming based on Markov Decision Process
- Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay Contests
- Message dissemination in vehicular networks
- On the Importance of Link Characterization for Aerial Wireless Sensor Networks
- Platform zero: a step closer to ubiquitous computing
- QuickFind: Fast and Contact-free Object Detection Using a Depth Sensor
- Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna
- SenseFlow: An Experimental Study for Tracking People
- Smart Cities: Intelligent Environments and Dumb People?
- Towards Policy Enforcement Point as a Service (PEPS)
- WashInDepth: Lightweight hand wash monitor using depth sensor
- WiFi-ID: Human Identification using WiFi signal
- A Socially-Aware Incentive Scheme for Social Participatory Sensing
- Crowdsourcing with Tullock Contests: A New Perspective
- Ear-Phone: A context-aware noise mapping using smart phones
- Empirical Evaluation of MDP-based DASH Player
- EPLA: Energy-balancing Packets Scheduling for Airborne Relaying Networks
- From MANET to people-centric networking: Milestones and open research challenges
- Lightweight Clustering of Spatio-Temporal Data in Resource Constrained Mobile Sensing
- Optimizing HTTP-Based Adaptive Streaming in Vehicular Environment Using Markov Decision Process
- Predicting the Region of Interest for Dynamic Foveated Streaming
- RFT: Identifying Suitable Neighbors for Concurrent Transmissions in Point-to-Point Communications
- SenseFlow: An experimental study of people tracking
- Sparse Representation Based Acoustic Rangefinders: From Sensor Platforms to Mobile Devices
- Trust-based privacy-aware participant selection in social participatory sensing
- A Distributed Mechanism for Dynamic Resource Trading in Cooperative Mobile Video Streaming
- A Reputation Framework for Social Participatory Sensing Systems
- Can smart plugs predict electric power consumption? A case study
- Characterising User Targeting For In-App Mobile Ads
- Creating Personal Bandwidth Maps using Opportunistic Throughput Measurements
- On the need for a reputation system in mobile phone based sensing
- Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing
- ProfileGuard: Privacy preserving obfuscation for mobile user profiles
- Randomised Multipath Routing for Secure Data Collection
- Reliable Positioning with Hybrid Antenna Model for Aerial Wireless Sensor and Actor Networks
- SEW-ing a Simple Endorsement Web to Incentivize Trustworthy Participatory Sensing
- Trajectory Approximation for Resource Constrained Mobile Sensor Networks
- TrustMeter: A Trust Assessment Scheme for Collaborative Privacy Mechanisms in Participatory Sensing Applications
- κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks
- A trust framework for social participatory sensing systems
- A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing
- Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
- ConferenceSense: Monitoring of public events using phone sensors
- Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)
- HTTP-based Adaptive Streaming for Mobile Clients using Markov Decision Process
- HUBCODE: hub-based forwarding using network coding in delay tolerant networks
- IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications
- Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces
- Performance analysis of geography-limited broadcasting in multihop wireless networks
- Platform Zero: A Context-based Computing Platform for Collaboration
- Priority-based coverage path planning for Aerial Wireless Sensor Networks
- Providing Trustworthy Contributions via a Reputation Framework in Social Participatory Sensing Systems
- Trust Assessment in Social Participatory Networks
- Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks
- Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)
- A Privacy-Preserving Reputation System for Participatory Sensing
- Improving QoS in High-Speed Mobility Using Bandwidth Maps
- On the characterisation of vehicular mobility in a large-scale public transport network
- On the Use of Location Window in Geo-Intelligent HTTP Adaptive Video Streaming
- Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna
- Towards changing the user perception of mobile communications through geotagged information
- A pragmatic approach to area coverage in hybrid wireless sensor networks
- A survey on privacy in mobile participatory sensing applications
- Automatic Image Capturing and Processing for PetrolWatch
- Empirical Evaluation of HTTP Adaptive Streaming under Vehicular Mobility
- Link Characterization for Aerial Wireless Sensor Networks
- Mobile Broadband Performance Measured from High-Speed Regional Trains
- Multipath Fading Effect on Spatial Packet Loss Correlation in Wireless Networks
- A Bayesian Routing Framework for Delay Tolerant Networks
- Are You Contributing Trustworthy Data? The Case for a Reputation System in Participatory Sensing
- Authentication and Confidentiality in Wireless Ad Hoc Networks
- Characterization of a Large-scale Delay Tolerant Network
- Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks
- Ear-Phone: An End-to-End Participatory Urban Noise Mapping System
- Mitigating the Effect of Interference in Wireless Sensor Networks
- Poster Abstract: Experimental Evaluation of Multi-Hop Routing Protocols for Wireless Sensor Networks
- Preserving privacy in participatory sensing systems
- Quality Improvement of Mobile Video Using Geo-intelligent Rate Adaptation
- Safety Assurance and Rescue Communication Systems in High-Stress Environments: A Mining Case Study
- Analysis of Per-Node Traffic Load in Multi-Hop Wireless Sensor Networks
- Attacks and Security Mechanisms
- Cluster-based Channel Assignment in Multi-radio Multi-channel Wireless Mesh Networks
- HUBCODE: Message Forwarding using Hub-based Network Coding in Delay Tolerant Networks
- Multi-Channel Interference in Wireless Sensor Networks
- Poster Abstract: Ear-Phone Assessment of Noise Pollution with Mobile Phones
- Towards Privacy-Sensitive Participatory Sensing
- Automatic collection of fuel prices from a network of mobile cameras
- Performance Evaluation of a Wireless Sensor Network Based Tracking System
- Analysis of resource reservation aggregation in on-board networks
- Design, analysis, and implementation of a novel low complexity scheduler for joint resource allocation
- Design, analysis, and implementation of a novel multiple resource scheduler
- Detection and Tracking Using Wireless Sensor Networks
- Distance-based local geocasting in multi-hop wireless networks
- Ensuring area coverage in hybrid wireless sensor networks
- Securing channel assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
- Topology control and channel assignment in multi-radio multi-channel wireless mesh networks
- Adaptive Position Update in Geographic Routing
- Efficient boundary estimation for practical deployment of mobile sensors in hybrid sensor networks
- INDICT: INtruder Detection, Identification, Containment and Termination
- QoS driven parallelization of resources to reduce file download delay
- Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
- A novel tuneable low-intensity adversarial attack
- A parallelized file-transfer-protocol for on-board IP networks
- Aggregation policies over RSVP tunnels
- An evaluation of fair packet schedulers using a novel measure of instantaneous fairness
- Implementation and performance analysis of a packet scheduler on a programmable network processor
- On large scale deployment of parallelized file transfer protocol
- Performance of a Bluetooth IP network for streaming high quality audio
- Probabilistic coverage in wireless sensor networks
- Service-oriented middleware for peer-to-peer computing
- On the latency and fairness characteristics of pre-order deficit round Robin
- On-board RSVP: An extension of RSVP to support real-time services in on-board IP networks
- Anchored opportunity queueing: a low-latency scheduler for fair arbitration among virtual channels
- Fair and efficient packet scheduling using Elastic Round Robin
- Low-latency guaranteed-rate scheduling using Elastic Round Robin
- On the latency bound of deficit round robin
- On the latency bound of pre-order deficit round robin
- Fair, efficient and low-latency packet scheduling using nested deficit round robin
- Fair, efficient and scalable scheduling without per-flow state
- A Round-Robin scheduling strategy for reduced delays in wormhole switches with virtual lanes