default search action
31st MILCOM 2012: Tampa, FL, USA
- 31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, October 29 - November 1, 2012. IEEE 2012, ISBN 978-1-4673-1729-0
- Zhiqiang Liu, T. C. Yang:
Time reversal multicarrier communications over long multipath fading channels. 1-6 - Andreas Ramstad Urke, Lars Erling Bråten, Knut Øvsthus:
TCP challenges in hybrid military satellite networks; measurements and comparison. 1-6 - Du Zheng, Helen Tang, F. Richard Yu:
A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications. 1-6 - David Brunnenmeyer, Scott Mills, Samir Patel, Cesar Suarez, Ling-Bing Kung:
Ka and Ku operational considerations for military SATCOM applications. 1-7 - Patrick Shahan, David A. Heide, Aaron E. Cohen:
Comparison of TSVCIS voice at 8000 and 12000 bps VERSUS CVSD at 16000 bps. 1-4 - Suzanne Hassell, Paul Beraud, Alen Cruz, Gangadhar Ganga, Steve Martin, Justin Toennies, Pablo Vazquez, Gary Wright, Daniel Gomez, Frank Pietryka, Niraj Srivastava, Travis Hester, David Hyde, Brian Mastropietro:
Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation. 1-6 - Glen Nakamoto, Robert C. Durst, Chris Growney, Jason Andresen, Jamie Ma, Nirav Trivedi, Randy Quang, David Pisano:
Identity-Based Internet Protocol Networking. 1-6 - Joël Trubuil, André Goalic, Nicolas Beuzelin:
An overview of channel coding for underwater acoustic communications. 1-7 - Eric Redding, Tom Rittenbach, Hiroshi Satake, John Kisor, Dhaval Shah:
Government Reference Architecture dataplane gateway. 1-6 - Bjørnar Libæk, Mariann Hauge, Lars Landmark, Øivind Kure:
Admission control and flow termination in mobile ad-hoc networks with Pre-congestion Notification. 1-8 - Igor Pedan, Bow-Nan Cheng:
An open source situational awareness display for administering heterogeneous networks on the tactical edge. 1-6 - Leonid Veytser, Bow-Nan Cheng, Randy Charland:
Integrating radio-to-router protocols into EMANE. 1-6 - Randy Charland, Leonid Veytser, Bow-Nan Cheng:
Integrating multiple radio-to-router interfaces to open source dynamic routers. 1-6 - Michael Vitt, George F. Elmasry, Manoj Jain:
Adaptation of RSVP-AGG protocol to tactical networks - A tactical edge open architecture concept. 1-5 - Paul C. Hershey, Mu-Cheng Wang, Chris Graham, Steven A. Davidson, Michael Sica, Jason Dudash:
A policy-based approach to automated data reduction for intelligence, surveillance, and reconnaissance systems. 1-6 - Jon R. Ward, Mohamed F. Younis:
On the use of distributed relays to increase base station anonymity in Wireless Sensor Networks. 1-6 - Glenn Carl, Joshua Van Hook:
Using hybrid simulation/emulation for experimental assessment of routing policy on mission outcomes. 1-7 - Junghoon Lee, George F. Elmasry, Keith Whittaker, Steve Lescrinier:
Wred performance analysis and design for tactical satellite communication. 1-6 - Lan K. Nguyen, Richard B. Wells:
A quick pull-in timing recovery technique for frequency hopped systems. 1-6 - Justin P. Rohrer, Kamakshi Sirisha Pathapati, Truc Anh N. Nguyen, James P. G. Sterbenz:
Opportunistic transport for disrupted airborne networks. 1-9 - Timothy Shroyer:
Satcom-on-the-move why one size doesn't fit all. 1-6 - Hira Agrawal, Lisa Bahler, Josephine Micallef, Shane Snyder, Alexandr Virodov:
Detection of global, metamorphic malware variants using control and data flow analysis. 1-6 - Dannie M. Stanley, Zhui Deng, Dongyan Xu, Rick Porter, Shane Snyder:
Guest-transparent instruction authentication for self-patching kernels. 1-6 - Mark Henry, George Vachula, Gregary B. Prince, John Pehowich:
A comparison of open architecture standards for the development of complex military systems: GRA, FACE, SCA NeXT (4.0). 1-9 - Chandana K. K. Jayasooriya, Hyuck M. Kwon, Ryan Syslo, Yang-Ki Hong, Jaejin Lee, Gavin Abo:
High-efficiency ferrite meander antenna (HEMA) for LTE applications. 1-6 - James Offner, Thomas Saam:
Criteria for multi-carrier X-band intermodulation products in the receive band. 1-6 - Vijitha Weerackody, Enrique Cuevas:
Adjacent satellite interference from a network Of MF-TDMA satellite communications on-the-move terminals. 1-6 - Rohit Murthy:
Performance criteria affecting pointing error and the impact on total cost of ownership. 1-6 - Michael Clark:
Robust wireless channel based secret key extraction. 1-6 - Lino Gonzalez, Mike Tracey, Wendy Lui, Richard E. Greel, Vasile Aghinii:
How to evaluate SOTM antennas, modems, and architectures. 1-6 - Jerome Sonnenberg, David B. Chester, James E. Schroeder, Keith Olds:
Quantifying the relative merits of genetic and swarm algorithms for network optimization in cognitive radio networks. 1-8 - Ramon Segura, Olivier Gauvry, Andre Terrasse, Alain Delay, Philippe Loussouarn, Arnaud Duvivier:
Next generation NATO satcom management and control services. 1-6 - Jessica Connah, Abigail Solomon, John McInnes, Olwen Worthington, Dale Chambers:
Openness in military systems part 1: Analysis & applications. 1-6 - Ehsan Hosseini, Erik Perrins:
The Cramér-Rao bound for data-aided synchronization of SOQPSK. 1-6 - Michael A. Koets, Mark Tapley, Buddy Walls, Jennifer L. Alvarez, Wojciech Toczynski, B. David Moore, Jeremy Pruitt:
Enabling fractionated spacecraft communications using F6WICS. 1-5 - Hong-Jun Noh, Jaesung Lim:
Partitioned cyclic code shift keying for JTIDS. 1-6 - Aaron M. Rosenfeld, Robert N. Lass, Dustin S. Ingram, William C. Regli, Joseph P. Macker:
A comparison of group-based data persistence techniques in MANETs. 1-6 - Bow-Nan Cheng, Randy Charland, Paul Christensen, Andrea Coyle, Igor Pedan, Leonid Veytser, James Wheeler:
Comparing radio-to-router interface implementations on experimental CoTs and open source routers. 1-6 - Don J. Torrieri, Matthew C. Valenti:
Guard zones and the near-far problem in DS-CDMA ad hoc networks. 1-6 - Don J. Torrieri:
Direction finding of a compromised node in a spread-spectrum network. 1-6 - Michael Lundberg, Xinyu Wang, Emre Ertekin, Darnell Rhodes:
The impact of enclave network devices to the tactical inter-service architecture. 1-6 - Luis Bastos, Hermann Wietgrefe:
Tactical troposcatter applications in challenging climate zones. 1-6 - Mudhakar Srivatsa, Sihyung Lee, Tarek F. Abdelzaher:
Mining diverse opinions. 1-7 - Saul Foresta, Rich Hoffmann, Louis Coryell, Robert Pinto:
Low cost MEMS based INS for land-based military SATCOM OTM. 1-6 - Mário Marques da Silva, Rui Dinis, Paulo Montezuma:
Iterative FDE receivers for UWB systems with strong interference levels. 1-6 - Linqiang Ge, Hui Liu, Difan Zhang, Wei Yu, Rommie L. Hardy, Robert J. Reschly:
On effective sampling techniques for host-based intrusion detection in MANET. 1-6 - Philip B. Charlesworth, Stuart M. Allen:
Use of dynamic flight paths to enhance support to priority subscribers on a communications UAV. 1-6 - Jong-Kwan Lee, Kyu-Man Lee, Jaesung Lim:
Distributed dynamic slot assignment scheme for fast broadcast transmission in tactical ad hoc networks. 1-6 - Sébastien Marcille, Philippe Ciblat, Christophe J. Le Martret:
Optimal resource allocation in HARQ-based OFDMA wireless networks. 1-6 - Xinlei (Oscar) Wang, Kai Zeng, Kannan Govindan, Prasant Mohapatra:
Chaining for securing data provenance in distributed information networks. 1-6 - Alexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James H. Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang:
Building an operation support system for a fast reconfigurable network experimentation testbed. 1-6 - Hiren J. Patel, Rusty Baldwin:
GPU accelerated Differential Power Analysis. 1-5 - Hiren J. Patel, Rusty Baldwin:
Differential Power Analysis using wavelet decomposition. 1-5 - John J. Windish:
Synchronization performance using Scale Time Offset Robust Modulation. 1-6 - Joseph P. Macker, David J. Claypool:
Dynamic communities in evolving network graphs. 1-6 - Joseph P. Macker, Brian Adamson, David J. Claypool:
Temporal stability for dynamic network relay sets. 1-6 - Jeffrey P. Long, Jose A. Torres:
High throughput Farrow re-samplers utilizing reduced complexity FIR filters. 1-6 - Chihkai Chen, Kung Yao:
Distributed energy-based spectrum sensing with opportunistic cooperative diversity for Cognitive Radio Networks over non-identical fading channels. 1-6 - Ashok N. Masilamani, J. J. Garcia-Luna-Aceves:
VCMA: Efficient channel access in wireless mesh networks using virtual coordinates. 1-6 - Qi Zeng, Husheng Li, Lijun Qian:
GPS spoofing attack on time synchronization in wireless networks and detection scheme design. 1-5 - B. Q. Kan:
Towards minimizing delay in MHWN based on activity estimation. 1-6 - Taehun An, Dongjin Kim, Iickho Song, Moo Song Yeu, Hwang-Ki Min, Seungwon Lee, Wonju Lee:
Cooperative spectrum sensing based on generalized likelihood ratio test under impulsive noise circumstances. 1-6 - Patrick Loos, Jan Mietzner, Patrick Nickel, Gerhard Bauch, Askold Meusling:
Design of a multitone firefly time synchronization scheme for responsive vehicle-protection jammers. 1-6 - John Cartmell, John Tomici:
Non-satellite based field communications system for battlefield deployments. 1-6 - William Harbison, Rohit Gupta:
Optimal PSD limit accommodation in heterogeneous SHF SATCOM networks. 1-6 - David S. Alberts, Marius S. Vassiliou, Jonathan R. Agre:
C2 information quality: An enterprise systems perspective. 1-7 - Alberto Domingo, Hermann Wietgrefe:
A NNEC-compliant approach for a Future Mission Network. 1-8 - Mohammad Iftekhar Husain, Suyash Mahant, Ramalingam Sridhar:
CD-PHY: Physical layer security in wireless networks through constellation diversity. 1-9 - Ratish J. Punnoose, David Counsil, Derek Young:
Focusing a radio signal and simultaneously nulling it at another location using time-reversal: Experimental results. 1-6 - Yilin Shen, Thang N. Dinh, My T. Thai:
Adaptive algorithms for detecting critical links and nodes in dynamic networks. 1-6 - Yupeng Jia, Azadeh Vosoughi:
Cramér-Rao bound for channel estimation in amplify-and-forward relaying networks. 1-6 - Jan Nilsson, Ulf Sterner:
Robust MPR-based flooding in mobile ad-hoc networks. 1-6 - Alan J. Michaels:
Pulse rotation modulations for spread spectrum communication systems. 1-6 - Gregory Rucker, Robert G. Cole, Derya Cansever, Amitabh Mishra:
Games applied to jam resistant DSA radios. 1-6 - Somdatta Nath:
Web services: Design choices for space ground system integration. 1-6 - Espen Skjervold, Ketil Lund, Trude Hafsøe Bloebaum, Frank T. Johnsen:
Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids. 1-8 - Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, Bontae Koo:
Cooperative jammer design in cellular network with internal eavesdroppers. 1-5 - Sanghoon Kim, Wayne E. Stark:
On the effects of transmit power control on the performance of wireless networks. 1-6 - James M. Metzler, Brian R. Holmes, Matthew P. Renodin:
An architecture to support information availability in the tactical domain. 1-6 - Fabio Pozzo, Lucio Marcenaro, Carlo S. Regazzoni, Vincenzo Gesmundo:
Location Aware Optimized Link State Routing protocol. 1-6 - Xiaohua Li, Jared Feldman, Wednel Cadeau:
An OFDM-based distributed transmission scheme for uncoordinated transmitters without carrier frequency and timing synchronization. 1-6 - Jason D. Ellis, Michael B. Pursley:
Adaptive-rate channel coding for packet radio systems with higher layer fountain coding. 1-6 - Robert Lange, Frank Heine, Matthias Motzigemba, Michael Lutzer, Rolf Meyer:
Roadmap to wide band optical GEO relay networks. 1-5 - Xiao Ma, Mohammed M. Olama, P. Teja Kuruganti, Stephen F. Smith, Seddik M. Djouadi:
Determining system parameters for optimal performance of hybrid DS/FFH spread-spectrum. 1-6 - Vítor G. Andrezo Carneiro, Gilberto Kirk Rodrigues, Maria Thereza M. Rocco Giraldi:
Performance analysis of a 2D double hard-limited OCDMA system over FSO link under strong turbulence for defense applications. 1-6 - Jeremy Mange, Dionysios Kountanis:
Non-linear programming approach to simulation of the general adversarial agents problem. 1-5 - Chalena M. Jimenez, Kevin W. Richardson, Donald R. Stephens:
SCA4 - An evolved framework. 1-6 - Chung-Yu Lou, Babak Daneshrad:
PER prediction for convolutionally coded MIMO OFDM systems - An analytical approach. 1-6 - Sungjoon Park, Wayne E. Stark:
Opportunistic dual timer relay selection in MIMO relay networks. 1-6 - Gaelen Pereira, Babak Daneshrad, Bruce Fette:
Increasing Network Area Spectral Efficiency by combining multiple PHY techniques. 1-6 - Mark Rahmes, Kathy Wilder, J. Harlan Yates, Kevin L. Fox, Margaret M. Knepper, Jay Hackett:
A qualitative and quantitative method for predicting sentiment toward deployed U.S. forces. 1-6 - Jarno Pinola, Jarmo Prokkola, Esa Piri:
An experimental study on jamming tolerance of 3G/WCDMA. 1-7 - Olwen Worthington, Jessica Connah, Dale Chambers, Abigail Solomon, John McInnes:
Openness in military systems part 2: Case studies. 1-6 - Marcelo Camilo, David F. C. Moura, Juraci Ferreira Galdino, Ronaldo M. Salles:
Anti-jamming defense mechanism in cognitive radios networks. 1-6 - Damien Roque, Cyrille Siclet, Jean-Marc Brossier:
A low-complexity multicarrier scheme with LDPC coding for mobile-to-mobile environment. 1-6 - Xilin Cheng, Rui Cao, Liuqing Yang:
Practical implementation of hybrid DLT codes for cooperative relay communications. 1-6 - Dexin Wang, Liuqing Yang:
Cooperative robust localization against malicious anchors based on semi-definite programming. 1-6 - Mazda Salmanian, Ming Li:
Enabling secure and reliable policy-based routing in MANETs. 1-7 - David Dubois, Howard Gans, Terence Lei, Rolando Ventura:
Front End Mission Modeling. 1-6 - Kiran Vanganuru, Steven Ferrante, Gregory Sternberg:
System capacity and coverage of a cellular network with D2D mobile relays. 1-6 - Arun S. Maiya, Francisco Loaiza-Lemos, Robert M. Rolfe:
Supervised learning in the wild: Text classification for critical technologies. 1-6 - Colin Brown, Philip J. Vigneron:
Signal recovery for CPM in frequency flat fast fading channels. 1-6 - Scott Newman, Jeffrey Schindler, Jiral Shah, Sandra Tinta:
Laboratory evaluation of military radios and network architectures. 1-8 - Liangbin Li, Ramesh Annavajjala, Toshiaki Koike-Akino, Philip V. Orlik:
Robust receiver algorithms to mitigate partial-band and partial-time interference in ldpc-coded OFDM systems. 1-6 - Fernando Ramírez-Mireles:
Analysis of M-ary UWB FSK detected using two passband filters considering antenna and multipath effects. 1-6 - Ossama Younis, David Shallcross, Latha A. Kant, Kenneth Young, Charles Graff, Mitesh P. Patel:
TDMA scheduling and channel assignment for cognitive tactical networks. 1-6 - Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan:
A cyber-physical approach to a wide-area actionable system for the power grid. 1-6 - Yahya S. Khiabani, Shuangqing Wei:
ARQ-based key scheduling algorithm over correlated erasure channels. 1-6 - Bassam S. Farroha, Deborah L. Farroha:
Architecting dynamic cyber defense for a secure multi-tenant cloud services environment. 1-6 - Bassam S. Farroha, Deborah L. Farroha:
The trust engineering framework: Architecting native security to defend against the next generation threats. 1-6 - Bassam S. Farroha, Deborah L. Farroha:
An adaptive SoS framework for integrating dynamic cyber defense. 1-6 - Deborah L. Farroha, Bassam S. Farroha:
An agile enabler framework: Architecting services in the clouds. 1-6 - John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang:
The Xenon separation VMM: Secure virtualization infrastructure for military clouds. 1-6 - Tolga Numanoglu, Baris Karadeniz, Furuzan Atay Onat, Ahmet Ertugrul Kolagasioglu:
An embedded radio software emulation platform using OPNET and VxWorks to develop distributed algorithms for military ad-hoc networks. 1-6 - Clement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Wireless multicast with cooperative relaying. 1-6 - Arian Shoari, Alireza Seyedi:
Detection of a non-cooperative transmitter in Rayleigh fading with binary observations. 1-5 - Mark R. Heckman, Roger R. Schell, Edwards E. Reed:
A high-assurance, virtual guard architecture. 1-9 - Jiaxi Jin, Wei Si, David Starobinski, Ari Trachtenberg:
Prioritized data synchronization for disruption tolerant networks. 1-8 - Soumya Sen, David J. Dorsey, Roch Guérin, Mung Chiang:
Analysis of Slotted Aloha with multipacket messages in clustered surveillance networks. 1-6 - Mingxi Wang, Yahong Rosa Zheng, Chengshan Xiao, Weiliang Zeng:
A low complexity algorithm for linear precoder design with finite alphabet inputs. 1-5 - Leonard E. Lightfoot, Ellen Laubie:
Channel characterization and throughput tradeoff for wireless sensor networks. 1-5 - Feng Lin, Zhen Hu, Robert C. Qiu, Michael C. Wicks:
A combination of quickest detection with oracle approximating shrinkage estimation and its application to spectrum sensing in cognitive radio. 1-6 - Lin-Nan Lee, Mustafa Eroz, Liping Chen, Rajeev Gopal:
Scrambled Code Multiple Access waveform for micro satellite terminals. 1-6 - Thomas R. Mason, Carlyn H. Weaver, Marc A. Camacho:
Position, navigation, and timing in the Common Operating Environment: Prototyping the PNT User equipment Modernization Architecture. 1-6 - Basil Etefia, Mario Gerla, Lixia Zhang:
Supporting military communications with Named Data Networking: An emulation analysis. 1-6 - Nadine E. Miner, Brian P. Van Leeuwen, Kimberly M. Welch, M. Donan Estill, Mark A. Smith, Hai D. Le, Craig R. Lawton:
Evaluating communications system performance effects at a system of systems level. 1-6 - Mahdi Orooji, Erfan Soltanmohammadi, Mort Naraghi-Pour:
Performance analysis of spectrum monitoring for cognitive radios. 1-6 - Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour:
Distributed detection in wireless sensor networks in the presence of misbehaving nodes. 1-6 - Paul G. Elliot, E. N. Rosario, R. J. Davis:
Novel Quadrifilar Helix Antenna combining GNSS, Iridium, and a UHF communications monopole. 1-6 - Fan Yang, Xi Zhang, Zhong-Pei Zhang:
Time-domain preamble-based SNR estimation for OFDM systems in doubly selective channels. 1-5 - João Alves, John R. Potter, Giovanni Zappa, Piero Guerrini, Robert Been:
A testbed for collaborative development of underwater communications and networking. 1-8 - P. Teja Kuruganti, Xiao Ma, Seddik M. Djouadi:
Experimental validation of stochastic wireless Urban channel model: Estimation and prediction. 1-5 - Cem Tekin, Mingyan Liu:
Online learning in decentralized multi-user spectrum access with synchronized explorations. 1-6 - Bishwaroop Ganguly, Buster O. Holzbauer, Koushik Kar, Kevin Battle:
Loss-Tolerant TCP (LT-TCP): Implementation and experimental evaluation. 1-6 - Xia Li, Zhen Hu, Robert C. Qiu, Michael C. Wicks:
Experimental demonstration of cognitive radar for target localization under strong interference. 1-6 - Kyung-Seop Shin, Woo-Chan Kim, Sungjin Park, Dong-Ho Cho:
Cooperative communication with joint optimization of cluster size and resource allocation in wireless sensor networks. 1-5 - Daryl Leon Wasden, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny:
Design and implementation of a multicarrier spread spectrum communication system. 1-7 - Ning Zhang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation. 1-6 - Lifeng Lai:
Quickest change point identification across a sensor array. 1-5 - Matthew Gillen, Joseph P. Loyall, Kyle Usbeck, Kelly Hanlon, Andrew Scally, Joshua Sterling, Richard Newkirk, Ralph Kohler:
Beyond line-of-sight information dissemination for Force Protection. 1-6 - Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Abhrajit Ghosh, Yitzchak M. Gottlieb, Michael Kaplan, Kathleen Kurachik, Gary Levin, Yow-Jia Lin, Alexander Poylisher, Angelo Sapello, Florin Sultan, Akshay Vashist, Michelle Wolberg, Kimberly Moeltner:
TITAN: Integrated network management in tactical mobile ad hoc networks. 1-6 - Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Yitzchak M. Gottlieb, Angelo Sapello, Kaustubh Sinkar, Kimberly Moeltner:
A GNU-based packet radio for network management field testing. 1-6 - David King, Gerardo Orlando, James Kohler:
A case for trusted sensors: Encryptors with Deep Packet Inspection capabilities. 1-6 - Tadilo Endeshaw Bogale, Luc Vandendorpe:
Multi-cycle cyclostationary based spectrum sensing algorithm for OFDM signals with noise uncertainty in cognitive radio networks. 1-6 - David Kidston, Minghui Shi:
A multicast routing technique for tactical networks. 1-6 - Michael Badger, Dennis Bushmitch, Richard S. Cozby, Jon Ellis, John H. Fikus, Rachel Marrotta, Christopher Morey, Kurt Rausch, Bill Roberts, Edward Slatt:
Automated Performance Assessment Framework innovation (APAFI) project. 1-6 - Dennis Bushmitch, John Fikus, Michael Hamrick, Anthony Khouzam, David Morris:
The normalized Bushmitch-Fikus-Hamrick (NBFH) metric. 1-6 - So-Ra Kim, Heung-Gyoon Ryu:
Analysis and design of QAPM modulation using compressive sensing for low power communication. 1-5 - MinWoo Lee, Jong-Kwan Lee, Hongjun Noh, Jaesung Lim:
Stability of reservation-contention resolution diversity slotted ALOHA for satellite networks. 1-6 - Sungnam Lee, Hyojeong Shin, Hojung Cha:
A pedestrian tracking system using group mobility information. 1-6 - Miguel Luzio, Rui Dinis, Paulo Montezuma, Vitor Astucia, Marko Beko:
Efficient receivers for SC-FDE with offset modulations. 1-6 - Michael Badger, Dennis Bushmitch, Vivek Agnish, Richard S. Cozby, John Fikus, Frank Halloran, Kirk Chang, Paul McCabe, Shobha Erramilli:
Laboratory-based end-to-end network System of Systems Integration, design and risk reduction: Critical activity for System of Systems Integration Directorate and the Army. 1-6 - Ningning Cheng, Prasant Mohapatra, Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli, Srikanth V. Krishnamurthy:
Inferring user relationship from hidden information in WLANs. 1-6 - Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang:
Measuring bias in the mixing time of social graphs due to graph sampling. 1-6 - Yavuz Yapici:
Iterative channel estimation for time-varying relay networks with optimal energy allocation. 1-6 - Saleem N. Bhatti, Randall J. Atkinson:
Secure & agile wide-area virtual machine mobility. 1-8 - Sankrith Subramanian, Eduardo L. Pasiliao, John M. Shea, Marco M. Carvalho, Warren E. Dixon:
Throughput maximization in CSMA networks with collisions. 1-6 - Zhen Kan, Eduardo L. Pasiliao, J. Willard Curtis, Warren E. Dixon:
Particle filter based average consensus target tracking with preservation of network connectivity. 1-6 - Bruce F. McGuffin, Daniel W. Bliss:
Mobile MIMO capacity in network interference: Informed and Uninformed Transmitters. 1-6 - Jeffrey Boksiner, Yuriy Posherstnik, Howard McDonald, Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang, Apurva N. Mody, Matthew Sherman:
Policy-based spectrum management architecture. 1-6 - Jeffrey Cleveland, Joseph P. Loyall, James Hanna:
Fault tolerance requirements of tactical Information Management systems. 1-8 - Zhenghao Zhang, Matthew Trinkle, Lijun Qian, Husheng Li:
Quickest detection of GPS spoofing attack. 1-6 - Bruce F. McGuffin:
Spectral efficiency of signal processing radios in interference limited environments: Array processing, MIMO, and MUD. 1-7 - Ronggong Song, Helen Tang:
LAA: Link-layer anonymous access for tactical MANETs. 1-7 - Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour:
Spectrum monitoring for cognitive radios in Rayleigh fading channel. 1-6 - Jonathan J. Edwards, J. David Brown, Peter C. Mason:
Using covert timing channels for attack detection in MANETs. 1-7 - Chan-ho An, Janghoon Yang, Rong Ran, Ui-Young Pak, Young-Jae Ryu, Dong Ku Kim:
Enhanced monopulse MIMO radar using reliable αβ filtering. 1-6 - Pengkai Zhao, You Lu, Babak Daneshrad, Mario Gerla:
Cooperative spatial scheduling in distributed MIMO MAC with interference/concurrency awareness. 1-6 - Daniel J. Jakubisin, R. Michael Buehrer:
Improved modulation classification using a factor-graph-based iterative receiver. 1-6 - Ahsen U. Ahmed, Steve C. Thompson, David W. Chi, James R. Zeidler:
Subcarrier based threshold performance enhancement in Constant Envelope OFDM. 1-6 - Udayan Kumar, Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor:
Polite: A policy framework for building managed mobile apps. 1-6 - Di Fang, Sixi Su, Tiejun Lv, Hui Gao, Wei Long:
Joint quantization strategy for uplink cooperative cellular interference alignment with limited feedback. 1-5 - Syed Amaar Ahmad, Claudio R. C. M. da Silva, Luiz A. DaSilva:
Relay feedback-based power control in multihop wireless networks. 1-6 - Gaelen Pereira, Babak Daneshrad:
Addressing IQ mismatch in Spatial Interference Suppression systems. 1-7 - Richard Booton:
Multiple layered method of terminal slot contention resolution for the Integrated Waveform (DAMA UHF SATCOM). 1-6 - Thomas R. Halford, Thomas A. Courtade, Kurt A. Turck:
The user capacity of barrage relay networks. 1-6 - Christian Sonnenberg:
Modeling handheld usability for military-based devices. 1-6 - Leemon C. Baird III, Martin C. Carlisle, William L. Bahn, Eric Smith:
The Glowworm hash: Increased speed and security for BBC unkeyed jam resistance. 1-6 - Madhabi Manandhar, Daniel L. Noneaker:
Iterative decoding in SFH communications with Reed-Solomon codes and channel estimation. 1-6 - Russell A. Fink, Emre Gunduzhan, Bruce P. Benjamin, Derya Cansever, Mars Gralia, Peter Dinsmore:
IPsec tunnels vs. identity-only obfuscation techniques for moving target networks. 1-6 - Giacomo Benincasa, Enrico Casini, Rita Lenzi, Alessandro Morelli, Erika Benvegnu, Niranjan Suri, Kevin Boner, Scott Watson:
Extending Service-Oriented Architectures to the tactical edge. 1-7 - Muhammad Nazmul Islam, Shantharam Balasubramanian, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella:
Implementation of distributed time exchange based cooperative forwarding. 1-6 - Stephen Gundry, Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs. 1-6 - Nam P. Nguyen, My T. Thai:
Finding overlapped communities in online social networks with Nonnegative Matrix Factorization. 1-6 - Kanghee Lee, Hyuck M. Kwon, Wenhao Xiong, Hyunggi Kim, Sangku Lee:
Relay selection for AF SISO wireless relay networks under jamming environment with relay power constraint. 1-5 - Jaime C. Acosta, Brenda G. Medina:
Survivability prediction of ad hoc networks under attack. 1-6 - Jae-Joon Lee, Dongwook Kim, Jaesung Lim:
Adaptive virtual slot for enhancing QoS of voice communication in MIL-STD-188-220. 1-6 - Jeong Ho Yeo, Joon Ho Cho:
Properization of second-order cyclostationary random processes and its application to signal presence detection. 1-6 - Matthew J. La Pan, T. Charles Clancy, Robert W. McGwier:
Jamming attacks against OFDM timing synchronization and signal acquisition. 1-7 - Seokwon Lee, Sungsoo Park, Gosan Noh, Yosub Park, Daesik Hong:
Energy-efficient spectram access for ultra low power sensor networks. 1-6 - Renju Wu, Ruohan Cao, Tiejun Lv:
Multi-group multiuser two-way relay with superposition coding. 1-5 - Hyunkeun Shin, Sangjae Park, Eun Kyung Kim, Jaesung Lim:
An efficient FSN assignment scheme for mitigating multi-hop delay in MIL-STD-188-220D networks. 1-6 - Fábio Silva, Rui Dinis, Paulo Montezuma:
Frequency-domain receiver design for fast varying channels. 1-7 - Darcy Swain, David Fritz, Howard McDonald:
A phased approach to policy-based Spectrum operations. 1-6 - Johan Sigholm, Massimiliano Raciti:
Best-effort Data Leakage Prevention in inter-organizational tactical MANETs. 1-7 - Yi Shi, Yalin E. Sagduyu, Jason H. Li:
Low complexity multi-layer optimization for multi-hop wireless networks. 1-6 - Rajeev Gopal, Russell J. F. Fang:
High-capacity Ka commercial communications satellite architectures for defense applications. 1-6 - Shanzeng Guo:
Performance analysis of wireless intruder geolocation in campus wireless networks. 1-6 - Yueh-Chi Chang, Brandon Mui, John Hanlin, Aravind Movva:
NMT X/Ka tri-band antennas. 1-4 - H. D. Mustafa, Sunil H. Karamchandani, Shukla Shubham, S. N. Merchant, Uday B. Desai:
MPTA: Modified polymer textile antennas for green symbiotic cloud communications. 1-6 - João Guerreiro, Rui Dinis, Paulo Montezuma:
ML-based receivers for underwater networks using OFDM signals with strong nonlinear distortion effects. 1-7 - Alessandro Morelli, Ralph Kohler, Cesare Stefanelli, Niranjan Suri, Mauro Tortonesi:
Supporting COTS applications in Tactical Edge Networks. 1-7 - Akshay Vashist, Ritu Chadha, Michael Kaplan, Kimberly Moeltner:
Detecting communication anomalies in tactical networks via graph learning. 1-6 - Bruce Bennett, Chris Peterson, Dan Gilbert, Emre Ertekin, John Herbert, John Kim:
An enterprise-wide approach to GIG internet protocol multicast. 1-6 - Florence McAtee, Sathya Narayanan, Geoffrey G. Xie:
Performance analysis of message prioritization in delay tolerant networks. 1-6 - Xiaopeng Huang, Victor B. Lawrence:
Resource allocation for OFDM underwater acoustic cooperative transmission with limited feedback. 1-6 - Bruce Bennett, Kensing Quock, Christopher Catlin, Wayne Adams, Sean E. A. Daisley, Joshua Friedman, Andrew Melchior:
Evaluation of the expansion of Joint IP Modem to support DVB-RCS2 (April 2012). 1-6 - Kenneth Y. Jo, David M. Cascio:
Performance of Combatant Command satellite (COCOMSat) communications in contested environments. 1-6 - Bruce Bennett, Gloria Witherspoon, Troy Barker:
High definition video transcoding for transport over satellite (April 2012). 1-5 - Ali Gorcin, Hüseyin Arslan:
Template matching for signal identification in cognitive radio systems. 1-6 - Partha P. Pal, Michael Atighetchi, Andrew Gronosky, Joseph P. Loyall, Charles Payne, Asher Sinclair, Brandon Froberg, Robert Grant:
Cooperative red teaming of a prototype surivable service-oriented system. 1-6 - Edward Chow, Farrokh Vatan, George Paloulian, Steve Frisbie, Zuzana Srostlik, Vasilios Kalomiris, Daniel Apgar:
Dynamic communication resource negotiations. 1-6 - Lawrence Young, Mark Ishii:
One Force Tactical Communications System: Connecting the Tactical Edge at AEWE Spiral G. 1-4 - Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
Optimization of a finite frequency-hopping ad hoc network in Nakagami fading. 1-6 - Xiang Mao, Yonggang Liu, Janise McNair:
A solution for Co-Service of real-time and non-realtime traffic in cellular cognitive radio networks. 1-6 - SaiDhiraj Amuru, Claudio R. C. M. da Silva:
Cumulant-based channel estimation algorithm for modulation classification in frequency-selective fading channels. 1-6 - Richard E. Harang, Peter Guarino:
Clustering of Snort alerts to identify patterns and reduce analyst workload. 1-6 - Bilal A. Ranjha, M. I. Sakib Chowdhury, Mohsen Kavehrad:
Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency Offset. 1-6 - Eric Graves, Ben Landers, David Greene, Tan F. Wong:
Certification codes for maliciousness detection in Physical-layer Network Coding. 1-6 - Dung T. Nguyen, Nam P. Nguyen, My T. Thai:
Sources of misinformation in Online Social Networks: Who to suspect? 1-6 - Yunbin Deng, Glen Colby, James T. Heaton, Geoffrey S. Meltzner:
Signal processing advances for the MUTE sEMG-based silent speech recognition system. 1-6 - Li Li, Humphrey Rutagemwa, Thomas Kunz:
Minimum Connected Dominating Set in realistic tactical radio network conditions. 1-6 - Jingwei Huang, David M. Nicol:
Security and provenance in M3GS for cross-domain information sharing. 1-6 - Matthew Rebholz, Bruce F. McGuffin:
Simulation of moderate time-scale Dynamic Spectrum Access with wide-area spectrum sensors. 1-6 - Stephen M. Dudley, Michael Klingler:
Network management for multi-network terminals. 1-6 - Jacob Green, John Schultz:
Collaborative applications at the Tactical Edge through resilient group dissemination in DTN. 1-6 - Yao Xiao, Hao Feng, Leonard J. Cimini Jr.:
Spatial reuse in multi-hop linear wireless cooperative networks. 1-5 - Humphrey Rutagemwa, Li Li, Philip J. Vigneron:
Cross-layer modeling and analysis of multihop tactical networking in convoy topology. 1-6 - Andrew Robertson, Joseph Molnar:
The false positive congestion problem and probabilistic spectrum sensing. 1-6 - Jeffrey Connor, Thomas Green, Aleksandar Jovancevic, John Koss, Rajesh Krishnan, Marissa C. Norko, William Ogle, John Weinfield:
Scalable spectrum situational awareness using devices of opportunity. 1-5 - Sankarkumar Thandapani, Aravind Kailas:
On accurately predicting mote deaths. 1-6 - Sourabh Khire, Scott Robertson, Nikil Jayant, Elena A. Wood, Max E. Stachura, Tamer Goksel:
Region-of-interest video coding for enabling surgical telementoring in low-bandwidth scenarios. 1-6 - Hao Feng, Leonard J. Cimini Jr.:
On optimum relay deployment in a multi-hop linear network with cooperation. 1-6 - Qiao-long Li:
Information-guided randomization for wireless physical layer secure transmission. 1-6 - Shane A. Fink, Vincent W. S. Chan, Christopher C. Yu:
Link state distribution rate scaling for maintaining topology in mobile wireless networks. 1-6 - Andrew D. Jurik, Shaun T. Hutton, Julie A. Tarr:
Hamming Masks: Toward defending constrained networked systems. 1-6 - Gunjan Verma, Ananthram Swami, Kevin S. Chan:
The effect of zealotry in the naming game model of opinion dynamics. 1-6 - Bow-Nan Cheng, Scott Moore:
A comparison of MANET routing protocols on airborne tactical networks. 1-6 - Rob Torres, John Border, George Choquette, Jun Xu, Je-Hong Jong:
Congestion control using RED and TCP window adjustment. 1-6 - Katie Schroth, Nicholas V. Burkhardt, Ting-Shuo Che, David Pisano:
IP networking over the AEHF MILSATCOM system. 1-6 - Farzad Talebi, Thomas G. Pratt:
Bounding the ergodic capacity of asymmetric 2×2 dual-polarized channels. 1-6 - Anjali Sridhar, Klara Nahrstedt, Long H. Vu:
Sangam - efficient cellular-WiFi group framework for file sharing service. 1-6 - Aubrey N. Beal, J. Phillip Bailey, Sidni A. Hale, Robert Neal Dean, Michael C. Hamilton, Jitendra K. Tugnait, Daniel W. Hahs, Ned J. Corron:
Design and simulation of a high frequency exact solvable chaotic oscillator. 1-6 - Clay K. Dubendorfer, Benjamin W. P. Ramsey, Michael A. Temple:
An RF-DNA verification process for ZigBee networks. 1-6 - Stephen J. Tarsa, H. T. Kung:
Output compression for IC fault detection using compressive sensing. 1-6 - Jianmin Zou, Janusz Kusyk, M. Ümit Uyar, Stephen Gundry, Ceni Safak Sahin:
Bio-inspired and Voronoi-based algorithms for self-positioning autonomous mobile nodes. 1-6 - Daniel Denkovski, Marko Angjelicinoski, Vladimir Atanasovski, Liljana Gavrilovska:
Practical assessment of RSS-based localization in indoor environments. 1-6 - Young-Hyun Oh, David J. Thuente:
Limitations of Quorum-based Rendezvous and key establishment schemes against sophisticated jamming attacks. 1-6 - Brittany Clore, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
Validating a custom IPv6 security application using OPNET modeler. 1-6 - Joanna Sliwa, Bartosz Jasiul:
Efficiency of dynamic content adaptation based on semantic description of web service call context. 1-6 - Anthony J. McAuley, Latha A. Kant, Kaustubh Sinkar, Charles Graff, Mitesh P. Patel:
Understanding the delay and loss tradeoffs in large wireless military networks using queuing analysis and MAC models. 1-6 - Luoyang Fang, Dongliang Duan, Liuqing Yang:
A new DFT-based frequency estimator for single-tone complex sinusoidal signals. 1-6 - Natalia A. Schmid, Marwan Alkhweldi, Matthew C. Valenti:
Distributed estimation of a parametric field using sparse noisy data. 1-6 - Xiaotian Zhou, Liuqing Yang, Dongfeng Yuan:
A bipartite matching based user grouping method for grouped OFDM-IDMA systems. 1-6 - Pan Deng, Liuqing Yang:
Lightweight One-Time Signature for multicast authentication. 1-6 - Nizar Tayem:
Estimation 2D DOA of coherent signals using a new antenna array configuration. 1-5 - Stephen Kuhn, Stephen Taylor:
A forensic hypervisor for process tracking and exploit discovery. 1-5 - Vincent Urias, Brian P. Van Leeuwen, Bryan Richardson:
Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed. 1-8 - Jaime C. Acosta, Humberto Mendoza, Brenda G. Medina:
An efficient common substrings algorithm for on-the-fly behavior-based malware detection and analysis. 1-6 - François Lucas, Christophe Guettier:
Hybrid solving technique for vehicle planning with communication constraints. 1-6 - P. Teja Kuruganti, James J. Nutaro, Seddik M. Djouadi:
Event-based transmission line matrix method for simulating site-specific multipath propagation characteristics. 1-6 - Javier Schloemann, R. Michael Buehrer:
On the value of collaboration in anchorless robot self-localization. 1-6 - Soon-Young Oh, Bao-Hong Shen, Mario Gerla:
Network coding over a MANET proactive link state routing protocol and TDMA scheduling. 1-6 - Claudiu Danilov, Thomas R. Henderson, Orlie Brewer, Jae H. Kim, Joseph P. Macker, Brian Adamson:
Elastic multicast for tactical communications. 1-6 - Claudiu Danilov, Thomas R. Henderson, Thomas Goff, Orlie Brewer, Jae H. Kim, Joseph P. Macker, Brian Adamson:
Adaptive routing for tactical communications. 1-7 - William M. S. Stout, Rusty O. Baldwin:
Network performance impact of access control policies in Tactical Wireless Networks. 1-6 - Emeka E. Egbogah, Abraham O. Fapojuwo, Liqi Shi:
An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks. 1-7 - Obulapathi N. Challa, Janise McNair:
CubeSat Torrent: Torrent like distributed communications for CubeSat satellite clusters. 1-6 - David Ripplinger, Aradhana Narula-Tam, Katherine Szeto:
Scheduling vs. random access in frequency hopped airborne networks. 1-6 - Defeng Xu, Rajive L. Bagrodia:
JamDetect: A system to detect RAA aware jamming attacks in IEEE802.11 networks. 1-6 - Bala Chidambaram, Yueli Yang:
Cyber Analysis System Toolkit: A high-fidelity, virtual cyber test-bed for network modeling and experimentation. 1-5 - Zhiqiang Wu, T. C. Yang, Zhiqiang Liu, Vasu Chakarvarthy:
Modulation detection of underwater acoustic communication signals through cyclostationary analysis. 1-6 - Marwen Bouanen, François Gagnon, Georges Kaddoum, Denis Couillard, Claude Thibeault:
An LPI design for secure OFDM systems. 1-6 - Marco M. Carvalho, Richard Ford:
NextVC2 - A next generation virtual world command and control. 1-6 - Jasen Kintner, Zach Mildon, Sun-il Kim:
Tiny Bubbles: A fault-tolerant distributed overlay for networks with block-churn. 1-6 - John Lee, Latha A. Kant, Anthony J. McAuley, Kaustubh Sinkar, Charles Graff, Mitesh P. Patel:
Planning & design of routing architectures for multi-tier military networks. 1-7 - Jonathan D. Ashdown, Gary J. Saulnier, Tristan J. Lawry, Kyle R. Wilt, Henry A. Scarton:
High-rate ultrasonic communication through metallic barriers using MIMO-OFDM techniques. 1-6 - Rita Lenzi, Niranjan Suri, Andrzej Uszok, James Hanna, James R. Milligan:
Supporting information management and information superiority via federation services. 1-6 - Rumi Ghosh, J. J. Garcia-Luna-Aceves:
Link state routing in regions of interest. 1-6 - John Ellinger, Randy Depoy, Josh Sanderson, Kaiyu Huang, Zhiqiang Wu:
Blind frequency offset estimation and intercarrier interference cancelation for FD-MC-CDMA systems in aerial vehicle communication. 1-6 - Florin Sultan, Alexander Poylisher, Constantin Serban, John Lee, Ritu Chadha, C. Jason Chiang:
TimeSync: Virtual time for scalable, high-fidelity hybrid network emulation. 1-6 - Hellen Maziku, Sachin Shetty, Keesook Han, Tamara Rogers:
Enhancing the classification accuracy of IP geolocation. 1-6 - Trevor Cook, Lisa Scott:
Type based abstraction for QoI aware applications. 1-6 - Ali Gorcin, Hüseyin Arslan:
Identification of OFDM signals under multipath fading channels. 1-7 - Zhiyuan Yan, Hongmei Xie:
Enhanced algebraic error control for random linear network coding. 1-6 - Victor Firoiu, Haiyang Liu:
BRAVO: Potential field-based routing and network coding for efficient wireless MANETs. 1-6 - Paul Potier, Lijun Qian, Harold Zheng, Sherry Wang:
Performance management in cognitive radio ad hoc networks using congestion based metric. 1-6 - Robert J. Hall:
A geocast-based algorithm for a field common operating picture. 1-6 - Thomas Tsou, Thomas Cooper, Robert W. McGwier, T. Charles Clancy, Jeffrey H. Reed:
Development of an open-source GSM femtocell and integrated core infrastructure. 1-6 - Parul Pandey, Hariharasudhan Viswanathan, Dario Pompili:
Leveraging mobile grid computing for Interference Alignment and Cancelation. 1-6 - Hsieh-Chung Chen, Tsung-Han Lin, H. T. Kung, Chit-Kwan Lin, Youngjune Gwon:
Determining RF angle of arrival using COTS antenna arrays: A field evaluation. 1-6 - Feng Shi, Zhiyuan Yan:
Quasi-cyclic low-density parity-check stabilizer codes. 1-6 - William S. Hortos:
Effects of energy harvesting on quality-of-service in transient wireless sensor networks. 1-9 - Ashwin J. Pereira, Paul A. Pharris, Justin N. Oursler, Adrian P. Lauf:
Distributed aerial Reconnaissance Ad-hoc networking protocol. 1-6 - Daniel T. Bennett, Timothy X. Brown:
Optimal data scheduling of mobile clients serviced using beamforming antennas. 1-10 - Ali A. Elghariani, Michael D. Zoltowski:
Branch and Bound with M algorithm for near optimal MIMO detection with higher order QAM constellation. 1-5 - Sang Wu Kim:
Securing wireless network coding against pollution attack at the physical layer. 1-6 - Gregory R. Steinbrecher:
Cross-layer design to maintain earthquake sensor network connectivity after loss of infrastructure. 1-6 - Qing Chen, Mustafa Cenk Gursoy:
Spectrum and energy efficiency in two-way multi-relay networks with selective relaying. 1-6 - Thang N. Dinh, Yilin Shen, My T. Thai:
An efficient spectral bound for link vulnerability assessment in large-scale networks. 1-6 - Sung-Hyung Lee, Hyun-Jin Lee, Jae-Hyun Kim, Mijeong Hoh, Sang-heon Shin, Taewan Kim, Byeong-Hee Roh:
Active buffer management algorithm for silence suppressed voice applications. 1-4 - Ali A. Elghariani, Michael D. Zoltowski:
Detection of Code Spread OFDM based on 0-1 Integer Quadratic Programming. 1-6 - Chris McLain, Sunil Panthi, Mark Sturza, James Hetrick:
High throughput Ku-band satellites for aeronautical applications. 1-6 - Jeffrey Boksiner, Chrysanthos Chrysanthou, Jonathan Lee, Mashuk Billah, Timothy Bocskor, David Barton, James Breakall:
Modeling of radiowave propagation in tunnels. 1-6 - Joe Vanderpoorten, Julie Cohen, Jay Moody, Charles Cornell, Arnold Streland, Steve Breese:
Transformational Satellite Communications System (TSAT) lessons learned: Perspectives from TSAT program leaders. 1-6 - Miriam Tauil, Latha A. Kant, Anthony J. McAuley, Charles Graff, Mitesh P. Patel:
Capacity estimation and waveform assignment in military networks. 1-6 - Minh Dao, Dzung T. Nguyen, Trac D. Tran, Sang Chin:
Chemical plume detection in hyperspectral imagery via joint sparse representation. 1-5 - Ping Wang, Xi Zhang, Mei Song, Xue Chen:
Energy efficient stochastic power scheduling scheme for wireless cellular networks. 1-6 - Moazzam Khan, Zehui Bi, John A. Copeland:
Software updates as a security metric: Passive identification of update trends and effect on machine infection. 1-6 - Chitradeep Majumdar, S. N. Merchant, Uday B. Desai:
Novel energy efficient relaying schemes for wireless sensor networks. 1-6 - Deli Liu, Haijun Zhang, Wei Zheng, Xiangming Wen:
The sub-channel allocation algorithm in femtocell networks based on Ant Colony Optimization. 1-6 - Ukash Nakarmi, Nazanin Rahnavard:
BCS: Compressive sensing for binary sparse signals. 1-5 - Han-Ting Chiang, James S. Lehnert:
Optimal jamming with codewords. 1-6 - Eyidayo Adebola, Oluwatobi Olabiyi, Annamalai Annamalai:
Some remarks on the Dirac delta function approximation for ASER analysis of digital modulations over fading channels. 1-6 - Eyidayo Adebola, Oluwatobi Olabiyi, Annamalai Annamalai:
Cross-layer throughput optimization for delay and QoS constrained applications. 1-6 - Behzad Kasiri, Jun Cai, Attahiru Sule Alfa:
Lightweight key management in distributed multi-channel cognitive radio networks. 1-6 - Andrej Bevec, Peter Bothner, Philip Chan, Ikechi Nigel Chike, Michael Masciulli, Michael Markowski, G. Welles Still:
Modeling mobile network connectivity in the presence of jamming. 1-4 - Yu-Ting Yu, Thomas Punihaole, Mario Gerla, M. Y. Sanadidi:
Content routing in the Vehicle Cloud. 1-6 - David Shur, Sunil Samtani, Mariusz A. Fecko, Kyriakos Manousakis, Vikram Kaul, William C. Regli, Joseph B. Kopena:
SISTO: A proposal for serverless information services for tactical operations. 1-6 - Aik-Tuan Lee, Mario Gerla:
Performance evaluation of wireless network coding in TDMA networks. 1-6 - Kei Kinoshita, Hideki Ochiai:
Energy minimization of wireless sensor networks based on modulation and coding optimization under finite frame length constraint. 1-5 - Zheng Chang, Tapani Ristaniemi:
Resource allocation for cooperative relay-assisted OFDMA networks with imperfect CSI. 1-6 - Sheetal Doshi, Unghee Lee, Bradley Bressler, Rajive L. Bagrodia, Michael DiGennaro, Joseph Oleksa, Yong Chen:
Operationally realistic testing of network centric tactical applications in a lab environment. 1-6 - Tuan Nguyen, Steven Lam, Ceasar Castro, Roger Ogden, Cam Tran, Albert Legaspi:
Naval Task Force interface for Coalition Networks for Secure Information Sharing (CoNSIS). 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.