Officers and Executive Staff
暂无分享,去创建一个
Gianluca Setti | Ieee Transactions | Francesca Maradei | Ieee Electromagnetic | Ieee Communications | Ieee Signal
[1] Michele Zorzi,et al. Cost- and Collision-Minimizing Forwarding Schemes for Wireless Sensor Networks: Design, Analysis and Experimental Validation , 2009, IEEE Trans. Mob. Comput..
[2] Zhu Han,et al. Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks: A Game-Theoretic Modeling Approach , 2009, IEEE Transactions on Mobile Computing.
[3] Volker Wille,et al. Continuous versus Discrete Model in Autodiagnosis Systems for Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[4] Fang Liu,et al. SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[5] John C. S. Lui,et al. DCAR: Distributed Coding-Aware Routing in Wireless Networks , 2010, IEEE Trans. Mob. Comput..
[6] Yuguang Fang,et al. Stochastic Traffic Engineering in Multihop Cognitive Wireless Mesh Networks , 2010, IEEE Transactions on Mobile Computing.
[7] Sajal K. Das,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .
[8] Luca Vollero,et al. Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations , 2010, IEEE Transactions on Mobile Computing.
[9] Ian F. Akyildiz,et al. XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[10] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[11] Hossam S. Hassanein,et al. Fair Class-Based Downlink Scheduling with Revenue Considerations in Next Generation Broadband Wireless Access Systems , 2009, IEEE Transactions on Mobile Computing.
[12] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[13] Polly Huang,et al. Accuracy Performance Analysis between War Driving and War Walking in Metropolitan Wi-Fi Localization , 2010, IEEE Transactions on Mobile Computing.
[14] Matteo Mazzotti,et al. Robust Multilayer Control for Enhanced Wireless Telemedical Video Streaming , 2010, IEEE Transactions on Mobile Computing.
[15] K. J. Ray Liu,et al. A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement , 2010, IEEE Transactions on Mobile Computing.
[16] Saswati Sarkar,et al. Economy of Spectrum Access in Time Varying Multichannel Networks , 2010, IEEE Transactions on Mobile Computing.
[17] Kai-Ten Feng,et al. Wireless Location Tracking Algorithms for Environments with Insufficient Signal Sources , 2009, IEEE Transactions on Mobile Computing.
[18] Pin-Han Ho,et al. Extended Knowledge-Based Reasoning Approach to Spectrum Sensing for Cognitive Radio , 2010, IEEE Transactions on Mobile Computing.
[19] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[20] Yuguang Fang,et al. Impacts of Topology and Traffic Pattern on Capacity of Hybrid Wireless Networks , 2009, IEEE Transactions on Mobile Computing.
[21] Kai-Ten Feng,et al. Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks , 2009, IEEE Transactions on Mobile Computing.
[22] Weijia Jia,et al. Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[23] Sujit Dey,et al. Model-Based Techniques for Data Reliability in Wireless Sensor Networks , 2009, IEEE Transactions on Mobile Computing.
[24] Zhi Ding,et al. Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks , 2009, IEEE Transactions on Mobile Computing.
[25] Raouf Boutaba,et al. Toward Reliable and Efficient Reporting in Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[26] Andrea Conti,et al. Mathematical Evaluation of Environmental Monitoring Estimation Error through Energy-Efficient Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[27] Kang G. Shin,et al. In-Band Spectrum Sensing in IEEE 802.22 WRANs for Incumbent Protection , 2010, IEEE Transactions on Mobile Computing.
[28] Allen B. MacKenzie,et al. Effect of Selfish Node Behavior on Efficient Topology Design , 2008, IEEE Transactions on Mobile Computing.
[29] Polychronis Koutsakis,et al. A New Call Admission Control Mechanism for Multimedia Traffic over Next-Generation Wireless Cellular Networks , 2008, IEEE Transactions on Mobile Computing.
[30] Tei-Wei Kuo,et al. A Maximum-Residual Multicast Protocol for Large-Scale Mobile Ad Hoc Networks , 2009, IEEE Transactions on Mobile Computing.
[31] Deepa Kundur,et al. On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks , 2009, IEEE Transactions on Mobile Computing.
[32] Paolo Santi,et al. WiQoSM: An Integrated QoS-Aware Mobility and User Behavior Model for Wireless Data Networks , 2008, IEEE Transactions on Mobile Computing.
[33] Bin Tang,et al. Benefit-Based Data Caching in Ad Hoc Networks , 2008, IEEE Trans. Mob. Comput..
[34] Marco Fiore,et al. Information Density Estimation for Content Retrieval in MANETs , 2009, IEEE Transactions on Mobile Computing.
[35] Thomas F. La Porta,et al. Data dissemination with ring-based index for wireless sensor networks , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[36] Kyriakos Mouratidis,et al. Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments , 2009, IEEE Transactions on Mobile Computing.
[37] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[38] Prashant J. Shenoy,et al. Chameleon: Application-Level Power Management , 2008, IEEE Transactions on Mobile Computing.
[39] Ekram Hossain,et al. Tandem Queue Models with Applications to QoS Routing in Multihop Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[40] Wendi B. Heinzelman,et al. Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[41] Xia Li,et al. TCP Performance in IEEE 802.11-Based Ad Hoc Networks with Multiple Wireless Lossy Links , 2007, IEEE Transactions on Mobile Computing.
[42] Chao Chen,et al. Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding , 2009, IEEE Transactions on Mobile Computing.
[43] Sajal K. Das,et al. Distributed Algorithm for En Route Aggregation Decision in Wireless Sensor Networks , 2009, IEEE Transactions on Mobile Computing.
[44] Victor C. M. Leung,et al. A Mobile-Directory Approach to Service Discovery in Wireless Ad Hoc Networks , 2008, IEEE Transactions on Mobile Computing.
[45] Xue Wang,et al. Distributed Energy Optimization for Target Tracking in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[46] Enzo Baccarelli,et al. Minimization of Download Times for Large Files over Wireless Channels , 2007, IEEE Transactions on Mobile Computing.
[47] Kang G. Shin,et al. Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks , 2008, IEEE Transactions on Mobile Computing.
[48] Kang G. Shin,et al. OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[49] Yuguang Fang,et al. A Two-Layer Key Establishment Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[50] Prasun Sinha,et al. Structure-Free Data Aggregation in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[51] Stathes Hadjiefthymiades,et al. Enhancing Situation-Aware Systems through Imprecise Reasoning , 2008, IEEE Transactions on Mobile Computing.
[52] Yunsi Fei,et al. QELAR: A Machine-Learning-Based Adaptive Routing Protocol for Energy-Efficient and Lifetime-Extended Underwater Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[53] Raheem A. Beyah,et al. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[54] Michele Garetto,et al. Analysis of Random Mobility Models with Partial Differential Equations , 2007, IEEE Transactions on Mobile Computing.
[55] Eylem Ekici,et al. SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas , 2010, IEEE Transactions on Mobile Computing.
[56] Lang Tong,et al. Energy-Aware Adaptive Routing for Large-Scale Ad Hoc Networks: Protocol and Performance Analysis , 2007, IEEE Transactions on Mobile Computing.
[57] Konstantinos Psounis,et al. Contention-Aware Performance Analysis of Mobility-Assisted Routing , 2009, IEEE Transactions on Mobile Computing.
[58] Ding-Zhu Du,et al. Connected Dominating Sets in Wireless Networks with Different Transmission Ranges , 2007, IEEE Transactions on Mobile Computing.
[59] Hossam S. Hassanein,et al. Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[60] Michele Zorzi,et al. Cost and Collision Minimizing Forwarding Schemes for Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[61] Yu-Chee Tseng,et al. The Orphan Problem in ZigBee Wireless Networks , 2009, IEEE Transactions on Mobile Computing.
[62] Xiaodong Wang,et al. Cross-Layer Design of Wireless Mesh Networks with Network Coding , 2008, IEEE Transactions on Mobile Computing.
[63] Shiow-yang Wu,et al. Activity-Based Proactive Data Management in Mobile Environments , 2010, IEEE Transactions on Mobile Computing.
[64] Sajal K. Das,et al. Energy-Efficient Reprogramming of a Swarm of Mobile Sensors , 2010, IEEE Transactions on Mobile Computing.