Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy, October 19–21, 2020, Proceedings
暂无分享,去创建一个
Giuseppe Piro | Gennaro Boggia | Yaser Jararweh | Claudia Campolo | G. Boggia | C. Campolo | G. Piro | Y. Jararweh
[1] Rachid Benlamri,et al. Leadership, Innovation and Entrepreneurship as Driving Forces of the Global Economy , 2017 .
[2] Alec Wolman,et al. Enabling new mobile applications with location proofs , 2009, HotMobile '09.
[3] Mach Chen,et al. Operations, Administration and Maintenance (OAM) for Deterministic Networks (DetNet) , 2019 .
[4] Bin Li,et al. UAV Communications for 5G and Beyond: Recent Advances and Future Trends , 2019, IEEE Internet of Things Journal.
[5] Hiroyuki Morikawa,et al. Multi-Hop LoRa Networks Enabled by Concurrent Transmission , 2017, IEEE Access.
[6] H.-J. Zepernick,et al. Perceptual-based Quality Metrics for Image and Video Services: A Survey , 2007, 2007 Next Generation Internet Networks.
[7] Michele C. Weigle,et al. RIH-MAC: Receiver-Initiated Harvesting-aware MAC for NanoNetworks , 2014, NANOCOM' 14.
[8] Remi Badonnel,et al. A Study of RPL DODAG Version Attacks , 2014, AIMS.
[9] Daniele Miorandi,et al. AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things , 2016, Inf. Syst..
[10] Wanlei Zhou,et al. Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks , 2013, IEEE Transactions on Mobile Computing.
[11] He Chen,et al. An adaptive transmission protocol for wireless-powered cooperative communications , 2015, 2015 IEEE International Conference on Communications (ICC).
[12] Bhanumathi Velusamy,et al. An Enhanced Channel Access Method to Mitigate the Effect of Interference Among Body Sensor Networks for Smart Healthcare , 2019, IEEE Sensors Journal.
[13] Ian F. Akyildiz,et al. Distributed Timely Throughput Optimal Scheduling for the Internet of Nano-Things , 2016, IEEE Internet of Things Journal.
[14] Xingqin Lin,et al. The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles , 2017, IEEE Communications Magazine.
[15] Sevil Ahmed,et al. Industrial network design using Low-Power Wide-Area Network , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).
[16] Amarsinh Vidhate,et al. Routing in Delay Tolerant Network , 2016 .
[17] Srinivasan Keshav,et al. Very low-cost internet access using KioskNet , 2007, CCRV.
[18] Balkrishna C. Rao,et al. Advances in science and technology through frugality , 2017, IEEE Engineering Management Review.
[19] Avrim Blum,et al. The Bottleneck , 2021, Monopsony Capitalism.
[20] Daniele Miorandi,et al. Internet of Things: Security in the Keys , 2016, Q2SWinet@MSWiM.
[21] Anders Lindgren,et al. Revisiting a remote village scenario and its DTN routing objective , 2014, Comput. Commun..
[22] Giuseppe Piro,et al. Terahertz electromagnetic field propagation in human tissues: A study on communication capabilities , 2016, Nano Commun. Networks.
[23] Gianluigi Ferrari,et al. Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies , 2019, Future Internet.
[24] J. Woo,et al. Normative Data of Handgrip Strength in 26344 Older Adults - A Pooled Dataset from Eight Cohorts in Asia , 2019, The journal of nutrition, health & aging.
[25] Floriano De Rango,et al. Energy Aware Epidemic Strategies for Mobile Opportunistic Networks , 2020, ADHOC-NOW.
[26] Vittoria Musa,et al. A Lean Control Theoretic Approach to Energy-Harvesting in Diffusion-Based Molecular Communications , 2020, IEEE Communications Letters.
[27] Sherali Zeadally,et al. Real-time QoE prediction for multimedia applications in Wireless Mesh Networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[28] Pietro Manzoni,et al. A Low-Cost and Low-Power Messaging System Based on the LoRa Wireless Technology , 2020, Mob. Networks Appl..
[29] Jeannie R. Albrecht,et al. Smart * : An Open Data Set and Tools for Enabling Research in Sustainable Homes , 2012 .
[30] Aravind Srinivasan,et al. Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.
[31] Sebastian Canovas-Carrasco,et al. On the Nature of Energy-Feasible Wireless Nanosensor Networks , 2018, Sensors.
[32] Sema F. Oktug,et al. RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[33] Gabriel A. Maia. CROSS: loCation pROof techniqueS for consumer mobile applicationS , 2019 .
[34] Dave Cavalcanti,et al. Reliable and Available Wireless Technologies , 2020 .
[35] Utz Roedig,et al. Do LoRa Low-Power Wide-Area Networks Scale? , 2016, MSWiM.
[36] Otto Carlos Muniz Bandeira Duarte,et al. Orchestrating Virtualized Network Functions , 2015, IEEE Transactions on Network and Service Management.
[37] L. Angrisani,et al. An Innovative Air Quality Monitoring System based on Drone and IoT Enabling Technologies , 2019, 2019 IEEE International Workshop on Metrology for Agriculture and Forestry (MetroAgriFor).
[38] Ricardo Neisse,et al. Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[39] Christian Bettstetter,et al. Cooperative Relaying in LoRa Sensor Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[40] Zhi-Hua Zhou,et al. Tri-training: exploiting unlabeled data using three classifiers , 2005, IEEE Transactions on Knowledge and Data Engineering.
[41] Michele C. Weigle,et al. Optimizing Energy Consumption in Terahertz Band Nanonetworks , 2014, IEEE Journal on Selected Areas in Communications.
[42] Ian F. Akyildiz,et al. Femtosecond-Long Pulse-Based Modulation for Terahertz Band Communication in Nanonetworks , 2014, IEEE Transactions on Communications.
[43] Noureddine Moussa,et al. Statistical study of energy and time costs of fault tolerance in Multilevel and EDCR protocols , 2019, 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[44] Anju S Pillai,et al. Fault Tolerance strategies for Wireless Sensor Networks – A Comprehensive Survey , 2018, 2018 3rd International Conference on Inventive Computation Technologies (ICICT).
[45] Y. Charlie Hu,et al. Furion: Engineering High-Quality Immersive Virtual Reality on Today's Mobile Devices , 2017, IEEE Transactions on Mobile Computing.
[46] Thomas Weng,et al. Occupancy-driven energy management for smart building automation , 2010, BuildSys '10.
[47] L. Ferrucci,et al. Short Physical Performance Battery and all-cause mortality: systematic review and meta-analysis , 2016, BMC Medicine.
[48] Christopher Paolini,et al. Upper Bound on LoRa Smart Metering Uplink Rate , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).
[49] Per A. Hallgren,et al. Location-enhanced Authentication using the IoT , 2016, ACSAC 2016.
[50] Hannu Tenhunen,et al. End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..
[51] Sinem Coleri,et al. Relay Selection, Scheduling, and Power Control in Wireless-Powered Cooperative Communication Networks , 2020, IEEE Transactions on Wireless Communications.
[52] Muhammad Omer Farooq,et al. Introducing Scalability in LoRa-Based Networks through Multi-Hop Communication Setups , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[53] Daniele Miorandi,et al. Dynamic Policies in Internet of Things: Enforcement and Synchronization , 2017, IEEE Internet of Things Journal.
[54] Olivier Flauzac,et al. A Low Power LoRa-LoRaWan Relay Function with a Single Input, Single Output Device , 2020, EWSN.
[55] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[56] Gianluca Cena,et al. Evaluating and Modeling IEEE 802.15.4 TSCH Resilience against Wi-Fi Interference in New-Generation Highly-Dependable Wireless Sensor Networks , 2020, Ad Hoc Networks.
[57] Baojiang Cui,et al. Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network , 2019, IEEE Access.
[58] Isabelle Chrisment,et al. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.
[59] Zaenab Muslimin,et al. IoT-based Water Quality Monitoring System for Soft-Shell Crab Farming , 2018, 2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS).
[60] Hwangnam Kim,et al. Drone formation algorithm on 3D space for a drone-based network infrastructure , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[61] Peihua Huang,et al. Ultrahigh-power micrometre-sized supercapacitors based on onion-like carbon. , 2010, Nature nanotechnology.
[62] Hao Jiang,et al. BIER-TE extensions for Packet Replication and Elimination Function (PREF) and OAM , 2018 .
[63] Antonella Molinaro,et al. IoT Services Allocation at the Edge via Named Data Networking: From Optimal Bounds to Practical Design , 2019, IEEE Transactions on Network and Service Management.
[64] Annalisa Socievole,et al. Routing approaches and performance evaluation in delay tolerant networks , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[65] Reza Curtmola,et al. LINK: Location Verification through Immediate Neighbors Knowledge , 2010, MobiQuitous.
[66] Roberto Morabito,et al. Distributing Intelligence to the Edge and Beyond , 2019, ArXiv.
[67] Jianchao Zeng,et al. Circle Formation Control of Large-Scale Intelligent Swarm Systems in a Distributed Fashion , 2009, ISNN.
[68] Pascal Thubert,et al. Meet the PAREO Functions: Towards Reliable and Available Wireless Networks , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[69] Junhee Lee,et al. Performance analysis of IEEE 802.15.4e DSME MAC protocol under WLAN interference , 2012, 2012 International Conference on ICT Convergence (ICTC).
[70] Matthias Baldauf,et al. A survey on context-aware systems , 2007, Int. J. Ad Hoc Ubiquitous Comput..
[71] Abdennaceur Kachouri,et al. Elderly monitoring system in a smart city environment using LoRa and MQTT , 2020, IET Wirel. Sens. Syst..
[72] Fabrice Theoleyre,et al. Operations, Administration and Maintenance (OAM) features for RAW , 2019 .
[73] Zhi-Hua Zhou,et al. Improve Computer-Aided Diagnosis With Machine Learning Techniques Using Undiagnosed Samples , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[74] Cauligi S. Raghavendra,et al. Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[75] Sinem Coleri,et al. Minimum Length Scheduling for Full Duplex Time-Critical Wireless Powered Communication Networks , 2020, IEEE Transactions on Wireless Communications.
[76] Michel Barbeau,et al. Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).
[77] Sergey Andreev,et al. Flexible and Reliable UAV-Assisted Backhaul Operation in 5G mmWave Cellular Networks , 2018, IEEE Journal on Selected Areas in Communications.
[78] Jin Suk Chung,et al. Micro-scale to nano-scale generators for energy harvesting: Self powered piezoelectric, triboelectric and hybrid devices , 2019, Physics Reports.
[79] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[80] Ian F. Akyildiz,et al. Channel Modeling and Capacity Analysis for Electromagnetic Wireless Nanonetworks in the Terahertz Band , 2011, IEEE Transactions on Wireless Communications.
[81] Sebastian Canovas-Carrasco,et al. A nanoscale communication network scheme and energy model for a human hand scenario , 2018, Nano Commun. Networks.
[82] Zhong Lin Wang,et al. Self-powered nanowire devices. , 2010, Nature nanotechnology.
[83] Jenny Torres,et al. Cross-site scripting (XSS) attacks and mitigation: A survey , 2020, Comput. Networks.
[84] Annalisa Socievole,et al. Routing in Mobile Opportunistic Social Networks with Selfish Nodes , 2019, Wirel. Commun. Mob. Comput..
[85] Gregor Verbic,et al. A new dynamic security assessment framework based on semi-supervised learning and data editing , 2019, Electric Power Systems Research.
[86] Zhi-Hua Zhou,et al. Disagreement-based Semi-supervised Learning , 2013 .
[87] Lixia Zhang,et al. Towards Edge Computing over Named Data Networking , 2018, 2018 IEEE International Conference on Edge Computing (EDGE).
[88] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[89] Mohamed-Slim Alouini,et al. FSO-Based Vertical Backhaul/Fronthaul Framework for 5G+ Wireless Networks , 2016, IEEE Communications Magazine.
[90] Colian Giannini,et al. Delay Tolerant Network for smart city: Exploiting bus mobility , 2016, 2016 AEIT International Annual Conference (AEIT).
[91] Adam Wolisz,et al. Distributed wakeup scheduling scheme for supporting periodic traffic in wsns , 2009, 2009 European Wireless Conference.
[92] Gianluca Cena,et al. Energy-Efficient Link Capacity Overprovisioning In Time Slotted Channel Hopping Networks , 2020, 2020 16th IEEE International Conference on Factory Communication Systems (WFCS).
[93] Nedo Celandroni,et al. Performance Analysis of Systematic Upper Layer FEC Codes and Interleaving in Land Mobile Satellite Channels , 2011, IEEE Transactions on Vehicular Technology.
[94] Virender Ranga,et al. Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review , 2020, IEEE Sensors Journal.
[95] Rong Yu,et al. Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.
[96] Gianluca Cena,et al. Optimal retransmission allocation for EDF-based networked real-time applications , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).
[97] Panayotis Antoniadis,et al. Community Networks and Sustainability: A Survey of Perceptions, Practices, and Proposed Solutions , 2017, IEEE Communications Surveys & Tutorials.
[98] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[99] Giuseppe Piro,et al. An Open Source and System-Level Simulator for the Internet of Drones , 2019, 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops).
[100] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[101] Morten Fjeld,et al. LabDesignAR: configuring multi-camera motion capture systems in augmented reality , 2017, VRST.
[102] Gian Paolo Rossi,et al. Leveraging Bus Mobility to Enable Communications in Urban Areas , 2011, ArXiv.
[103] Javier de Lope Asiaín,et al. A Vision-Based Dual Anticipatory/Reactive Control Architecture for Indoor Navigation of an Unmanned Aerial Vehicle Using Visual Topological Maps , 2013, IWINAC.
[104] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[105] Nadeem Javaid,et al. Simultaneous Wireless Information and Power Transfer for Buffer-Aided Cooperative Relaying Systems , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[106] Fred Glover,et al. Tabu Search: A Tutorial , 1990 .
[107] Sajal K. Das,et al. DRIH-MAC: A Distributed Receiver-Initiated Harvesting-Aware MAC for Nanonetworks , 2015, IEEE Transactions on Molecular, Biological and Multi-Scale Communications.
[108] Pan Hui,et al. An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.
[109] Augusto Casaca,et al. An Internet of Things Based Platform for Real-Time Management of Energy Consumption in Water Resource Recovery Facilities , 2018, IFIPIoT@WCC.
[110] Lars C. Wolf,et al. DTN routing in urban public transport systems , 2010, CHANTS '10.
[111] Jacob M. Howe,et al. Detecting Cross-Site Scripting Attacks Using Machine Learning , 2018, AMLTA.
[112] Mikael Gidlund,et al. A Central Intrusion Detection System for RPL-Based Industrial Internet of Things , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).
[113] Qian Ma,et al. Multi-Classification for Malicious URL Based on Improved Semi-Supervised Algorithm , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[114] Qiang Li,et al. Wireless information and power transfer on cooperative multi-path relay channels , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[115] Floriano De Rango,et al. Performance evaluation of scalable and energy efficient dynamic n-epidemic routing in Delay Tolerant Networks , 2013, 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).
[116] Augusto Ciuffoletti,et al. Low-Cost IoT: A Holistic Approach , 2018, J. Sens. Actuator Networks.
[117] Argel A. Bandala,et al. Swarming Algorithm for Unmanned Aerial Vehicle (UAV) Quadrotors - Swarm Behavior for Aggregation, Foraging, Formation, and Tracking , 2014, J. Adv. Comput. Intell. Intell. Informatics.
[118] Owen McAree,et al. Thermal Infrared Imaging from Drones Offers a Major Advance for Spider Monkey Surveys , 2019, Drones.
[119] Antonio Barrientos,et al. Mini-quadrotor attitude control based on Hybrid Backstepping & Frenet-Serret theory , 2010, 2010 IEEE International Conference on Robotics and Automation.
[120] Tarik Taleb,et al. Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.
[121] Marco Zennaro,et al. Alternative Network Deployments: Taxonomy, Characterization, Technologies, and Architectures , 2016, RFC.
[122] Ethan Grossman,et al. Deterministic Networking Use Cases , 2019, RFC.
[123] Mingzhe Jiang,et al. Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..
[124] Christian F. Tschudin,et al. Resolution strategies for networking the IoT at the edge via named functions , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[125] Schahram Dustdar,et al. EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).
[126] Jonathan Loo,et al. The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[127] Mingquan Wu,et al. IPTV Multicast Over Wireless LAN Using Merged Hybrid ARQ With Staggered Adaptive FEC , 2009, IEEE Transactions on Broadcasting.
[128] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[129] Steven C. H. Hoi,et al. Malicious URL Detection using Machine Learning: A Survey , 2017, ArXiv.
[130] Yasuyuki Tanaka,et al. Simulating 6TiSCH networks , 2018, Trans. Emerg. Telecommun. Technol..
[131] Zhang Ren,et al. Time-Varying Formation Tracking for Second-Order Multi-Agent Systems Subjected to Switching Topologies With Application to Quadrotor Formation Flying , 2017, IEEE Transactions on Industrial Electronics.
[132] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..
[133] Débora C. Muchaluat-Saade,et al. Context-Aware Routing in Delay and Disruption Tolerant Networks , 2016, Int. J. Wirel. Inf. Networks.
[134] Xiang Cheng,et al. Relay Selection in Full-Duplex Energy-Harvesting Two-Way Relay Networks , 2017, IEEE Transactions on Green Communications and Networking.
[135] Panita Pongpaibool,et al. Authorization mechanism for MQTT-based Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[136] L. Ferrucci,et al. A short physical performance battery assessing lower extremity function: association with self-reported disability and prediction of mortality and nursing home admission. , 1994, Journal of gerontology.
[137] Yun-Pang Flötteröd,et al. Microscopic Traffic Simulation using SUMO , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).
[138] Dharma P. Agrawal,et al. GPS: Location-Tracking Technology , 2002, Computer.
[139] Roberto Di Pietro,et al. CREPUSCOLO: A collusion resistant privacy preserving location verification system , 2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS).
[140] Craig Hedge,et al. The Immersive Virtual Environment of the digital fulldome: Considerations of relevant psychological processes , 2012, Int. J. Hum. Comput. Stud..
[141] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[142] Davide Perla,et al. A LoRa enabled building automation architecture based on MQTT , 2017, 2017 AEIT International Annual Conference.
[143] David Maxwell Chickering,et al. Learning Bayesian Networks: The Combination of Knowledge and Statistical Data , 1994, Machine Learning.
[144] Ian F. Akyildiz,et al. Energy and spectrum-aware MAC protocol for perpetual wireless nanosensor networks in the Terahertz Band , 2013, Ad Hoc Networks.
[145] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[146] Xiang Cheng,et al. Full-Duplex Energy-Harvesting Relay Networks: Capacity-Maximizing Relay Selection , 2018, Journal of Communications and Information Networks.
[147] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SimuTools.
[148] Mathias Utgård. Idle Listening Reduction Mechanism for Overprovisioned Cells in 6TiSCH Tracks , 2019 .
[149] J. R. Llata,et al. Working Together: A Review on Safe Human-Robot Collaboration in Industrial Environments , 2017, IEEE Access.
[150] Tarcisio F. Maciel,et al. Radio resource allocation framework for quality of experience optimization in wireless networks , 2015, IEEE Network.
[151] Kai-Hsiang Ke,et al. Monitoring of Large-Area IoT Sensors Using a LoRa Wireless Mesh Network System: Design and Evaluation , 2018, IEEE Transactions on Instrumentation and Measurement.
[152] Gianluca Cena,et al. Comparison of Mixed Diversity Schemes to Enhance Reliability of Wireless Networks , 2019, ADHOC-NOW.
[153] Giovanni Emanuele Corazza,et al. Introducing the QEST broker: Scaling the IoT by bridging MQTT and REST , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[154] Yuanyuan Yang,et al. Relay Selection and Power Allocation for Cooperative Communication Networks With Energy Harvesting , 2018, IEEE Systems Journal.
[155] Aria Nosratinia,et al. Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.
[156] Fabrice Theoleyre,et al. Scheduling for IEEE802.15.4-TSCH and slow channel hopping MAC in low power industrial wireless networks: A survey , 2017, Comput. Commun..
[157] Victor I. Chang,et al. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..
[158] Nadine Akkari Adra,et al. Grid Based Energy-Aware MAC Protocol for Wireless Nanosensor Network , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[159] Frank Blumensaat,et al. Synchronous LoRa Mesh Network to Monitor Processes in Underground Infrastructure , 2019, IEEE Access.
[160] Henrik Lehrmann Christiansen,et al. Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[161] Yun Zhou,et al. An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence , 2019, Comput. Secur..
[162] Jon Crowcroft,et al. Opportunistic message routing using multi-layer social networks , 2013, HP-MOSys '13.
[163] H. Tenhunen,et al. A Survey on LoRa for IoT: Integrating Edge Computing , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).
[164] Geoffrey Ye Li,et al. Modulation and Multiple Access for 5G Networks , 2017, IEEE Communications Surveys & Tutorials.
[165] Christian Timmerer,et al. A novel monitoring architecture for media services adaptation based on network QoS to perceived QoS mapping , 2008, Signal Image Video Process..
[166] Chao-Chao Wang,et al. On the Achievable Throughput of Energy-Harvesting Nanonetworks in the Terahertz Band , 2018, IEEE Sensors Journal.
[167] Mario Marchese,et al. IoT Applications and Services in Space Information Networks , 2019, IEEE Wireless Communications.
[168] Giuseppe Piro,et al. Experimental Comparison of Industrial Internet of Things Protocol Stacks in Time Slotted Channel Hopping Scenarios , 2018, 2018 IEEE International Conference on Communications (ICC).
[169] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[170] Manish Kumar,et al. Overview of Path-Planning and Obstacle Avoidance Algorithms for UAVs: A Comparative Study , 2018, Unmanned Syst..
[171] Robert J. Hall,et al. An Internet of Drones , 2016, IEEE Internet Computing.
[172] J. M. Jornet,et al. Joint Energy Harvesting and Communication Analysis for Perpetual Wireless Nanosensor Networks in the Terahertz Band , 2012, IEEE Transactions on Nanotechnology.
[173] Xin-Wei Yao,et al. ECP: A Probing-Based Error Control Strategy for THz-Based Nanonetworks With Energy Harvesting , 2019, IEEE Access.
[174] Prabaharan Poornachandran,et al. ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis , 2019, J. Cyber Secur. Mobil..
[175] Yang Chen,et al. Interactive Correction of Mislabeled Training Data , 2019, 2019 IEEE Conference on Visual Analytics Science and Technology (VAST).
[176] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[177] Levi Lloyd,et al. Using Lexical Features for Malicious URL Detection - A Machine Learning Approach , 2019, ArXiv.
[178] Antonio Franchi,et al. The flying hand: A formation of UAVs for cooperative aerial tele-manipulation , 2014, 2014 IEEE International Conference on Robotics and Automation (ICRA).
[179] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[180] Roberto Marani,et al. Vision-based Assessment of Balance Control in Elderly People , 2020, 2020 IEEE International Symposium on Medical Measurements and Applications (MeMeA).
[181] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[182] Antonella Molinaro,et al. NDNe: Enhancing Named Data Networking to Support Cloudification at the Edge , 2016, IEEE Communications Letters.
[183] Stewart Bryant,et al. Deterministic Networking (DetNet) Data Plane: IP over IEEE 802.1 Time-Sensitive Networking (TSN) , 2020, RFC.
[184] Gunasekaran Manogaran,et al. Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .
[185] Maurizio Mongelli,et al. A neural approach to synchronization in wireless networks with heterogeneous sources of noise , 2016, Ad Hoc Networks.
[186] Abhishek Verma,et al. Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks , 2019, Trans. Emerg. Telecommun. Technol..
[187] Gil Zussman,et al. On the Analysis of the Bluetooth Time Division Duplex Mechanism , 2007, IEEE Transactions on Wireless Communications.
[188] Floriano De Rango,et al. Enhancements of Epidemic Routing in Delay Tolerant Networks from an energy perspective , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[189] Volker Turau,et al. New CAP Reduction Mechanisms for IEEE 802.15.4 DSME to Support Fluctuating Traffic in IoT Systems , 2020, ADHOC-NOW.
[190] Aleksandr Ometov,et al. Effects of Heterogeneous Mobility on D2D- and Drone-Assisted Mission-Critical MTC in 5G , 2017, IEEE Communications Magazine.
[191] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[192] Adam Wolisz,et al. Towards an Affordable Internet Access for Everyone: The Quest for Enabling Universal Service Commitment (Dagstuhl Seminar 14471) , 2014, Dagstuhl Reports.
[193] Yang Liu,et al. Survey on computational-intelligence-based UAV path planning , 2018, Knowl. Based Syst..
[194] Yongdae Kim,et al. Security Analysis of FHSS-type Drone Controller , 2015, WISA.
[195] Baojiang Cui,et al. Malicious URL detection with feature extraction based on machine learning , 2018, Int. J. High Perform. Comput. Netw..
[196] Xiaofei Wang,et al. Convergence of Edge Computing and Deep Learning: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[197] Abhay Shankar Bharadwaj,et al. IoT based solid waste management system: A conceptual approach with an architectural solution as a smart city application , 2016, 2016 IEEE Annual India Conference (INDICON).
[198] Vijay Kumar,et al. Capt: Concurrent assignment and planning of trajectories for multiple robots , 2014, Int. J. Robotics Res..
[199] S. LaValle. Rapidly-exploring random trees : a new tool for path planning , 1998 .
[200] Lakshminarayanan Subramanian,et al. Technical Report: Design, Implementation and Deployment of Intermittency-aware Cellular Edge Services for Rural areas , 2016, ArXiv.
[201] Theodore Tryfonas,et al. Guard time optimisation and adaptation for energy efficient multi-hop TSCH networks , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[202] Guevara Noubir,et al. Security of GPS/INS Based On-road Location Tracking Systems , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[203] Adha Imam Cahyadi,et al. Path planning and formation control via potential function for UAV Quadrotor , 2014, 2014 International Conference on Advanced Robotics and Intelligent Systems (ARIS).
[204] Yuanchao Shu,et al. A Practical GPS Location Spoofing Attack in Road Navigation Scenario , 2017, HotMobile.
[205] Rui L. Aguiar,et al. Consumer driven information freshness approach for content centric networking , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[206] Djamal Zeghlache,et al. A Dynamic Programming Algorithm for Joint VNF Placement and Chaining , 2016, CAN@CoNEXT.
[207] Giuseppe Piro,et al. On the design of an energy-harvesting protocol stack for Body Area Nano-NETworks , 2015, Nano Commun. Networks.
[208] Steven M. LaValle,et al. Planning algorithms , 2006 .
[209] Francisco del Pozo,et al. Analysis of information and communication needs in rural primary health care in developing countries , 2005, IEEE Transactions on Information Technology in Biomedicine.
[210] Sergei Skorobogatov. Flash Memory 'Bumping' Attacks , 2010, CHES.
[211] Paolo Barsocchi,et al. Monitoring Ancient Buildings: Real Deployment of an IoT System Enhanced by UAVs and Virtual Reality , 2020, IEEE Access.
[212] S. Owen,et al. Effect of intense strength training on standing balance, walking speed, and sit-to-stand performance in older adults. , 2001, The journals of gerontology. Series A, Biological sciences and medical sciences.
[213] Scott Contini,et al. Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions , 2006, ASIACRYPT.
[214] Anders Lindgren,et al. Probabilistic Routing Protocol for Intermittently Connected Networks , 2012, RFC.
[215] António Grilo,et al. LoRaWAN multi-hop uplink extension , 2018, ANT/SEIT.
[216] Moushumi Sen,et al. Challenges in deploying a delay tolerant network , 2008, CHANTS '08.
[217] Scott R. Klemmer,et al. Integrating Physical and Digital Interactions on Walls for Fluid Design Collaboration , 2008, Hum. Comput. Interact..
[218] Antoine Gallais,et al. Thorough IoT testbed characterization: From proof-of-concept to repeatable experimentations , 2017, Comput. Networks.
[219] Jie Wu,et al. Geocommunity-Based Broadcasting for Data Dissemination in Mobile Social Networks , 2012 .
[220] Jon Crowcroft,et al. ML-SOR: Message routing using multi-layer social networks in opportunistic communications , 2015, Comput. Networks.
[222] Pascal Thubert. An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4 , 2019 .
[223] Bruce L. Golden,et al. Optimization approaches for civil applications of unmanned aerial vehicles (UAVs) or aerial drones: A survey , 2018, Networks.
[224] Jaime Lloret,et al. A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes , 2020, IEEE Access.
[225] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[226] Faheem Akhtar,et al. MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique , 2019, IEEE Access.
[227] Mostafa H. Ammar,et al. Mobility as an Alternative Communication Channel: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[228] Md. Arafatur Rahman,et al. Enabling drone communications with WiMAX Technology , 2014, IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications.
[229] David E. Culler,et al. Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.
[230] Konstantin Böttinger,et al. Distributed Anomaly Detection of Single Mote Attacks in RPL Networks , 2019, ICETE.
[231] Henrik Klessig,et al. Requirements and current solutions of wireless communication in industrial automation , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[232] Warnakulasuriya Anil Chandana Fernando,et al. Prediction of perceptual quality for mobile video using fuzzy inference systems , 2015, IEEE Transactions on Consumer Electronics.
[233] Pietro Cassarà,et al. Real-Time Multipath Multimedia Traffic in Cellular Networks for Command and Control Applications , 2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall).
[234] Yisheng Zhong,et al. Time-Varying Formation Control for Unmanned Aerial Vehicles: Theories and Applications , 2015, IEEE Transactions on Control Systems Technology.
[235] Hannah Bast,et al. Sparse map-matching in public transit networks with turn restrictions , 2018, SIGSPATIAL/GIS.
[236] Daniele Miorandi,et al. Security towards the edge: Sticky policy enforcement for networked smart objects , 2017, Inf. Syst..
[237] Thomas R. Gross,et al. Delay Tolerant Networking for the Socio-Economic Development in Rural South Africa , 2016, GOODTECHS.
[238] JeongGil Ko,et al. The Trickle Algorithm , 2011, RFC.
[239] Stefano Chessa,et al. UAVs and UAV Swarms for Civilian Applications: Communications and Image Processing in the SCIADRO Project , 2017, WISATS.
[240] Eduardo Tovar,et al. DynaMO: dynamically tuning DSME networks , 2020, SIGBED.
[241] Ismail Ahmedy,et al. Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.
[242] Guojun Wang,et al. Secure VANETs: Trusted Communication Scheme Between Vehicles and Infrastructure Based on Fog Computing , 2019, Studies in Informatics and Control.
[243] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[244] T. Humphreys. STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .
[245] Fernand Meyer,et al. A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.
[246] He Chen,et al. Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.
[247] Christian Nyberg,et al. A Routing Protocol for LoRA Mesh Networks , 2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[248] Dorian Gálvez-López,et al. Bags of Binary Words for Fast Place Recognition in Image Sequences , 2012, IEEE Transactions on Robotics.
[249] Xu Zhang,et al. A Practical Marine Wireless Sensor Network Monitoring System Based on LoRa and MQTT , 2019, 2019 IEEE 2nd International Conference on Electronics Technology (ICET).
[250] Sushil Jajodia,et al. Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.
[251] Yan Liu,et al. Social-Aware Computing based Congestion Control in Delay Tolerant Networks , 2017, Mob. Networks Appl..
[252] Alex Pentland,et al. DakNet: rethinking connectivity in developing nations , 2004, Computer.
[253] Tao Zhang,et al. An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[254] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[255] Floriano De Rango,et al. Epidemic Strategies in Delay Tolerant Networks from an Energetic Point of View: Main Issues and Performance Evaluation , 2015, J. Networks.
[256] Adam Wolisz,et al. EvalVid - A Framework for Video Transmission and Quality Evaluation , 2003, Computer Performance Evaluation / TOOLS.
[257] Luigi Alfredo Grieco,et al. QuakeSense, a LoRa-compliant Earthquake Monitoring Open System , 2019, 2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications (DS-RT).
[258] Hanno Wirtz,et al. Analyzing Metropolitan-Area Networking within Public Transportation Systems for Smart City Applications , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[259] Gianluca Dini,et al. Key propagation in wireless sensor networks , 2015, Comput. Electr. Eng..
[260] Volker Turau,et al. openDSME: Reliable Time-Slotted Multi-Hop Communication for IEEE 802.15.4 , 2019 .
[261] Qin Wang,et al. A Realistic Energy Consumption Model for TSCH Networks , 2014, IEEE Sensors Journal.
[262] F. Javier López-Martínez,et al. Quality Assessment in 3G/4G Wireless Networks , 2014, Wirel. Pers. Commun..
[263] Javier de Lope,et al. Navigation and Self-Semantic Location of Drones in Indoor Environments by Combining the Visual Bug Algorithm and Entropy-Based Vision , 2017, Frontiers Neurorobotics.
[264] Travis E. Oliphant,et al. Guide to NumPy , 2015 .
[265] Alexander L. Wolf,et al. Content-based publish/subscribe networking and information-centric networking , 2011, ICN '11.
[266] Miguel L. Pardal,et al. Witness-Based Location Proofs for Mobile Devices , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[267] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[268] Xu Chen,et al. In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning , 2018, IEEE Network.
[269] Erina Ferro,et al. Environmental Monitoring for Smart Cities , 2017, IEEE Sensors Journal.
[270] Thomas Noël,et al. Importance of Repeatable Setups for Reproducible Experimental Results in IoT , 2016, PE-WASUN@MSWiM.
[271] Alexander Brem,et al. Frugal innovation-past, present, and future , 2017, IEEE Engineering Management Review.
[272] Daniele Miorandi,et al. A secure and quality-aware prototypical architecture for the Internet of Things , 2016, Inf. Syst..
[273] Partha Pratim Ray. A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..
[274] Sergey Gorinsky,et al. Cost-Effective Multi-Mode Offloading with peer-assisted communications , 2015, Ad Hoc Networks.
[275] Dan Liu,et al. An Adaptive Spray and Wait Routing Algorithm Based on Quality of Node in Delay Tolerant Network , 2019, IEEE Access.
[276] Fabrice Theoleyre,et al. RAW use cases , 2000 .
[277] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[278] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[279] Dong Yue,et al. Decentralized Adaptive Event-Triggered $H_\infty$ Filtering for a Class of Networked Nonlinear Interconnected Systems , 2019, IEEE Transactions on Cybernetics.
[280] Siddhartha Chauhan,et al. Cluster Head Failure Detection and Correction Algorithm for WSN , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).
[281] Twan Basten,et al. Topology Management and TSCH Scheduling for Low-Latency Convergecast in In-Vehicle WSNs , 2019, IEEE Transactions on Industrial Informatics.
[282] Pietro Manzoni,et al. Simulating Opportunistic Networks: Survey and Future Directions , 2017, IEEE Communications Surveys & Tutorials.
[283] Andrew Malis,et al. DetNet Data Plane Framework , 2020 .
[284] Akram Alomainy,et al. Nano-Communication for Biomedical Applications: A Review on the State-of-the-Art From Physical Layers to Novel Networking Concepts , 2016, IEEE Access.
[285] Guy Pujolle,et al. A new approach to realize drone swarm using ad-hoc network , 2017, 2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).
[286] Jean Meunier,et al. Walking gait dataset : point clouds , skeletons and silhouettes Technical Report Number 1379 , 2018 .
[287] Shrikanth Narayanan,et al. Environmental Sound Recognition With Time–Frequency Audio Features , 2009, IEEE Transactions on Audio, Speech, and Language Processing.
[288] Sema F. Oktug,et al. New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.
[289] Roch H. Glitho,et al. A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.
[290] Adhitya Bhawiyuga,et al. LoRa-MQTT Gateway Device for Supporting Sensor-to-Cloud Data Transmission in Smart Aquaculture IoT Application , 2019, 2019 International Conference on Sustainable Information Engineering and Technology (SIET).
[291] Minghui Chen,et al. Relay Selection for Radio Frequency Energy-Harvesting Wireless Body Area Network With Buffer , 2018, IEEE Internet of Things Journal.
[292] Mustapha Réda Senouci,et al. Scheduling Algorithms for IEEE 802.15.4 TSCH Networks: A Survey , 2018, Advances in Computing Systems and Applications.
[293] Jonathan Loo,et al. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..
[294] Roland Siegwart,et al. Visual place recognition with probabilistic voting , 2016, 2017 IEEE International Conference on Robotics and Automation (ICRA).
[295] Wes McKinney,et al. Data Structures for Statistical Computing in Python , 2010, SciPy.
[296] Rishipal Singh,et al. Trajectory planning and optimization for UAV communication: A review , 2020 .
[297] Ismail Güvenç,et al. UAV Air-to-Ground Channel Characterization for mmWave Systems , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[298] Xiang Cheng,et al. Relay Selection in Two-Way Full-Duplex Energy-Harvesting Relay Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[299] Christian Tschudin,et al. Named functions and cached computations , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[300] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[301] Yuhui Shi,et al. ?Hybrid Particle Swarm Optimization and Genetic Algorithm for Multi-UAV Formation Reconfiguration , 2013, IEEE Computational Intelligence Magazine.
[302] P. Barsocchi,et al. Experimental video broadcasting in DVB-RCS/S2 with land mobile satellite channel: A reliability issue , 2008, 2008 IEEE International Workshop on Satellite and Space Communications.
[303] Ulrike Gretzel,et al. Smart tourism: foundations and developments , 2015, Electronic Markets.
[304] Halikul Lenando,et al. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network , 2018, Mob. Inf. Syst..
[305] Kevin M. Passino,et al. Swarm Stability and Optimization , 2011 .
[306] Kenneth G. Paterson,et al. On the Security of the TLS Protocol: A Systematic Analysis , 2013, IACR Cryptol. ePrint Arch..
[307] Yang Yang,et al. Data Offloading for Deadline-Varying Tasks in Mobile Edge Computing , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[308] Xiujian Chou,et al. High-Performance PZT-Based Stretchable Piezoelectric Nanogenerator , 2018, ACS Sustainable Chemistry & Engineering.
[309] Yaochu Jin,et al. Multi-train: A semi-supervised heterogeneous ensemble classifier , 2017, Neurocomputing.
[310] He Chen,et al. Distributed Multi-Relay Selection in Accumulate-Then-Forward Energy Harvesting Relay Networks , 2016, IEEE Transactions on Green Communications and Networking.
[311] Furkan Yusuf Yavuz,et al. Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..
[312] Giuseppe Anastasi,et al. Improving network formation in IEEE 802.15.4e DSME , 2017, Comput. Commun..
[313] Yu Zhang,et al. A Survey on Fault Diagnosis in Wireless Sensor Networks , 2018, IEEE Access.
[314] Kumpati S. Narendra,et al. Learning automata - an introduction , 1989 .
[315] Oussama Khatib,et al. Real-Time Obstacle Avoidance for Manipulators and Mobile Robots , 1985, Autonomous Robot Vehicles.
[316] Norman W. Finn,et al. Deterministic Networking Problem Statement , 2019, RFC.
[317] Peter I. Corke,et al. Visual Place Recognition: A Survey , 2016, IEEE Transactions on Robotics.
[318] A. Barabasi,et al. Taming complexity , 2005 .
[319] Sridhar Radhakrishnan,et al. Towards SDN-based fog computing: MQTT broker virtualization for effective and reliable delivery , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).
[320] Yimin Zhou,et al. Robust Drones Formation Control in 5G Wireless Sensor Network Using mmWave , 2018, Wirel. Commun. Mob. Comput..
[321] Victor-Valeriu Patriciu,et al. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment , 2016 .
[322] Eduardo Tovar,et al. Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).
[323] Fabrice Theoleyre,et al. Experimental analysis and characterization of a wireless sensor network environment , 2010, PE-WASUN '10.
[324] Yang Lu,et al. Industry 4.0: A survey on technologies, applications and open research issues , 2017, J. Ind. Inf. Integr..
[325] Lei Yang,et al. Security and Privacy in the Internet of Things , 2017 .
[326] Marco Zennaro,et al. LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations , 2020, Future Internet.
[327] Massimiliano Pierobon,et al. A routing framework for energy harvesting wireless nanosensor networks in the Terahertz Band , 2014, Wirel. Networks.
[328] Igor Bisio,et al. Contact graph routing in DTN space networks: overview, enhancements and performance , 2015, IEEE Communications Magazine.
[329] Junhee Lee,et al. Performance evaluation of IEEE 802.15.4e DSME MAC protocol for wireless sensor networks , 2012, 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT).
[330] Michel Barbeau,et al. Geocaching-inspired Resilient Path Planning for Drone Swarms , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).