Overload control in the network domain of LTE/LTE-A based machine type communications Zahra AlavikiaAbdorasoul Ghasemi OriginalPaper 08 June 2016 Pages: 1 - 16
Using wireless underground sensor networks for mine and miner safety M. Alper AkkaĹź OriginalPaper 10 June 2016 Pages: 17 - 26
SALA: Smartphone-Assisted Localization Algorithm for Positioning Indoor IoT Devices Jaehoon (Paul) JeongSolchan YeonSang-Chul Kim OriginalPaper 10 June 2016 Pages: 27 - 47
LiPro: light-based indoor positioning with rotating handheld devices Bo XieShimin GongGuang Tan OriginalPaper 11 June 2016 Pages: 49 - 59
Cooperative spectrum sensing in the presence of primary user emulation attack in cognitive radio network: multi-level hypotheses test approach Morteza SharifiAbbas Ali SharifiMir Javad Musevi Niya OriginalPaper 13 June 2016 Pages: 61 - 68
SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system Hanguang LuoGuangjun WenZhong Huang OriginalPaper 14 June 2016 Pages: 69 - 78
Data offloading and task allocation for cloudlet-assisted ad hoc mobile clouds Xijuan GuoLiqing LiuTapani Ristaniemi OriginalPaper 15 June 2016 Pages: 79 - 88
Scheduled WiFi using distributed contention in WLANs: algorithms, experiments, and case-studies Chao-Fang ShihBhuvana KrishnaswamyRaghupathy Sivakumar OriginalPaper 18 June 2016 Pages: 89 - 112
Mining user preferences of new locations on location-based social networks: a multidimensional cloud model approach Fan WangXiangwu MengChaohui Zhang OriginalPaper 21 June 2016 Pages: 113 - 125
SNR based secure communication via untrusted amplify-and-forward relay nodes using artificial noise Siddhartha SarmaJoy Kuri OriginalPaper 22 June 2016 Pages: 127 - 138
Practical deniable authentication for pervasive computing environments Fagen LiJiaojiao HongAnyembe Andrew Omala OriginalPaper 25 June 2016 Pages: 139 - 149
Adaptive wireless communications under competition and jamming in energy constrained networks Zaheer KhanJanne LehtomäkiMarkku Juntti OriginalPaper 28 June 2016 Pages: 151 - 171
Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing Sujoy SahaSubrata NandiSajal K. Das OriginalPaper 29 June 2016 Pages: 173 - 194
Multi-pair two-way relaying systems with physical layer network coding Ning XieShengli ZhangHui Wang OriginalPaper 29 June 2016 Pages: 195 - 208
Graph cut based clustering for cognitive radio ad hoc networks without common control channels Huyin ZhangNing XuZhiyong Wang OriginalPaper 04 July 2016 Pages: 209 - 221
Adaptive A-MPDU retransmission scheme with two-level frame aggregation compensation for IEEE 802.11n/ac/ad WLANs Jilong LiuMingwu YaoZhiliang Qiu OriginalPaper 07 July 2016 Pages: 223 - 234
Enhancing QoE for video streaming in MANETs via multi-constraint routing Chhagan LalVijay LaxmiMauro Conti OriginalPaper 08 July 2016 Pages: 235 - 256
A novel method for measurement points selection in access points localization Xiaoling YangBing Chen OriginalPaper 18 July 2016 Pages: 257 - 270
A conflict avoidance scheme between mobility load balancing and mobility robustness optimization in self-organizing networks Miaona HuangJun Chen OriginalPaper 19 July 2016 Pages: 271 - 281
A novel collaborative approach for location prediction in mobile networks Mehdi SepahkarMohammad Reza Khayyambashi OriginalPaper 13 July 2016 Pages: 283 - 294
A QoS routing strategy using fuzzy logic for NGEO satellite IP networks Zhuqing JiangChonghua LiuQishuo Lu OriginalPaper 23 July 2016 Pages: 295 - 307
\(\hbox {S}^2\)DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks Michele TortelliAlessandra RizzardiAlberto Coen-Porisini OriginalPaper 23 July 2016 Pages: 309 - 328
Cross layer scheme for quality of service aware multicast routing in mobile ad hoc networks Alireza Shams ShafighBeatriz Lorenzo VeigaSavo Glisic OriginalPaper 12 September 2016 Pages: 329 - 343