MOBILE COMPUTING

CODETITLE             
ITnTMC001A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access
ITnTMC002A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks
ITnTMC003Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks
ITnTMC004Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays
ITnTMC005An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA+ Systems
ITnTMC006A Trigger Identification Service for Defending Reactive Jammers in WSN
ITnTMC007A Cost Analysis Framework for NEMO Prefix Delegation-Based Schemes
ITnTMC008A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
ITnTMC009Approximation Algorithms for Data Broadcast in Wireless Networks
ITnTMC010Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation
ITnTMC011Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
ITnTMC012Chip Error Pattern Analysis in IEEE 802.15.4
ITnTMC013Converge Cast: On the Capacity and Delay Tradeoffs
ITnTMC014Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
ITnTMC015Coverage Verification without Location Information
ITnTMC016Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video Streaming
ITnTMC017Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobile WiMAX Networks
ITnTMC018Cooperative Download in Vehicular Environments
ITnTMC019Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
ITnTMC020Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks
ITnTMC021Efficient Virtual Backbone Constructionwith Routing Cost Constraint in WirelessNetworks Using Directional Antennas
ITnTMC022Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals
ITnTMC023Incentive Compatible Privacy-Preserving Distributed Classification
ITnTMC024Iterative Trust and Reputation Management Using Belief Propagation
ITnTMC025JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks
ITnTMC026Large Margin Gaussian Mixture Models with Differential Privacy
ITnTMC027Low Energy Online Self-Test of Embedded Processors in Dependable WSN Nodes
ITnTMC028Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
ITnTMC029M-Score: A Misuseability Weight Measure
ITnTMC030On Privacy of Encrypted Speech Communications
ITnTMC031On the Security and Efficiency of Content Distribution via Network Coding
ITnTMC032On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
ITnTMC033Packet-Hiding Methods for Preventing Selective Jamming Attacks
ITnTMC034pCloud: A Distributed System for Practical PIR
ITnTMC035Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
ITnTMC036Quantitative Analysis of Consensus Algorithms
ITnTMC037Recommendation Models for Open Authorization
ITnTMC038Remote Attestation with Domain-Based Integrity Model and Policy Analysis
ITnTMC039Resilient Authenticated Execution of Critical Applications in Untrusted Environments
ITnTMC040Revisiting Defenses against Large-Scale Online Password Guessing Attacks
ITnTMC041Risk-Aware Mitigation for MANET Routing Attacks
ITnTMC042Secure Failure Detection and Consensus in Trusted Pals
ITnTMC043Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi agent Systems
ITnTMC044Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
ITnTMC045Improving QoS in High-Speed Mobility Using Bandwidth Mapsy
ITnTMC046Jointly Optimal Source-Flow, Transmit-Power, and Sending-Rate Control for Maximum-Throughput Delivery of VBR Traffic over Faded Link
ITnTMC047Low Power Consumption Solutions for Mobile Instant Messaging
ITnTMC048Heuristic Burst Construction Algorithm for Improving Downlink Capacity in IEEE 802.16 OFDMA Systems
ITnTMC049Measurement-Based Bandwidth Scavenging in Wireless Networks
ITnTMC050Mobile Ad Hoc Nanonetworks with Collision-Based Molecular Communication
ITnTMC051Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC
ITnTMC052Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Studys
ITnTMC053Maximum Entropy Principle-Based Algorithm for Simultaneous Resource Location and Multihop Routing in Multiagent Networks
ITnTMC054MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet
ITnTMC055Mobile Data Offloading through Opportunistic Communications and Social Participation
ITnTMC056Moderated Group Authoring System for Campus-Wide Workgroups
ITnTMC057On the Cost of Knowledge of Mobility in Dynamic Networks:An Information-Theoretic Approach
ITnTMC058On Reliable Broadcast in Low Duty-Cycle Wireless Sensor Networks
ITnTMC059Network Connectivity with a Family of Group Mobility Models
ITnTMC060OMAN: A Mobile Ad Hoc Network Design System
ITnTMC061OLM: Opportunistic Layered Multicasting for Scalable IPTV over Mobile WiMAX
ITnTMC062Nature-Inspired Self-Organization, Control, and Optimization in Heterogeneous Wireless Networks
ITnTMC063On the Origins of Heavy-Tailed Delay in Dynamic Spectrum Access Networks
ITnTMC064Network Coding in Cooperative Communications: Friend or Foe?
ITnTMC065Positional Accuracy Measurement and Error Modeling for Mobile Tracking
ITnTMC066Radio Resource Management of Composite Wireless Networks: Predictive and Reactive Approaches
ITnTMC067Risk-Aware Distributed Beacon Scheduling for Tree-Based ZigBee Wireless Networks
ITnTMC068Resource-Optimized Quality-Assured Ambiguous Context Mediation Framework in Pervasive Environments
ITnTMC069Relay-Assisted Transmission with Fairness Constraint for Cellular Networks
ITnTMC070RAM: Rate Adaptation in Mobile Environments
ITnTMC071ProSpect: A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel
ITnTMC072Principal Component Localization in Indoor WLAN Environments
ITnTMC073Soft-TDMAC: A Software-Based802.11 Overlay TDMA MAC with Microsecond Synchronization
ITnTMC074Robust Relative Location Estimation in Wireless Sensor Networks with Inexact Position Problems
ITnTMC075Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks
ITnTMC076Scalable Activity-Travel Pattern Monitoring Framework for Large-Scale City Environment
ITnTMC077Shaping Throughput Profiles in Multihop Wireless Networks:A Resource-Biasing Approach
ITnTMC078Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
ITnTMC079Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks
ITnTMC080SenseLess: A Database-Driven White Spaces Network
ITnTMC081Robust Topology Engineering in Multiradio Multichannel Wireless Networks
ITnTMC082Stateless Multicast Protocol for Ad Hoc Networks
ITnTMC083Understanding the Interaction between Packet Forwarding and Channel Access in Multihop Wireless Networks
ITnTMC084Who, When, Where: Timeslot Assignment to Mobile Clients
ITnTMC085TV White Space in Europe
ITnTMC086Target Tracking in Wireless Sensor Networks Based on the Combination of KF and MLE Using Distance Measurements
ITnTMC087Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
ITnTMC088The Digital Marauder’s Map:A WiFi Forensic Positioning Tool
ITnTMC089The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks