EMBEDDED IEEE 2016 PAPERS download

Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks
S.No Code Title Download
1 NSW16(1) A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
2 NSW16 (2) D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks
3 NSW16 (3) Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks
4 NSW16 (4) Distance-Based Location Management Utilizing Initial Position for Mobile Communication Networks
5 NSW16 (5) Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
6 NSW16 (6) Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
7 NSW16 (7) Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
8 NSW16 (8) Resisting Blackhole Attacks on MANETs
9 NSW16 (9) A Kautz-Based Wireless Sensor and Actuator Network for Real- Time, Fault-Tolerant and Energy-Efficient Transmission
10 NSW16(10) CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks
11 NSW16(11) Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles
12 NSW16(12) Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks
13 NSW16(13) DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
14 NSW16(14) Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
15 NSW16(15) Distributed Emergency Guiding with Evacuation Time Optimization Based on Wireless Sensor Networks
16 NSW16(16) Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks
17 NSW16(17) Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks
18 NSW16(18) Geographic and Opportunistic Routing for Underwater Sensor Networks
19 NSW16(19) iPath: Path Inference in Wireless Sensor Networks
20 NSW16(20) Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks
21 NSW16(21) Location aware sensor routing protocol for mobile wireless sensor networks
22 NSW16(22) Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink
23 NSW16(23) Maximum Data Collection Rate in Rechargeable Wireless Sensor Networks with Multiple Sinks
24 NSW16(24) Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions
25 NSW16(25) NACRP: A Connectivity Protocol for Star Topology Wireless Sensor Networks
26 NSW16(26) Privacy-Preserving Data Aggregation in Mobile Phone Sensing
27 NSW16(27) RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor Networks
28 NSW16(28) Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks
29 NSW16(29) DTMAC: A Delay Tolerant MAC Protocol for Underwater Wireless Sensor Networks
30 NSW16(30) A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
31 NSW16(31) Active Trust: Secure and Trustable Routing in Wireless Sensor Networks
32 NSW16(32) Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
33 NSW16(33) Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing
34 NSW16(34) Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
35 NSW16(35) PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks
36 NSW16(36) Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes
37 NSW16(37) Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
38 NSW16(38) A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks
39 NSW16(39) A Threshold Anonymous Authentication Protocol for VANETs
40 NSW16(40) ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
41 NSW16(41) Coalition Formation for Cooperative Service-Based Message Sharing in Vehicular Ad Hoc Networks
42 NSW16(42) Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks
43 NSW16(43) DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance
44 NSW16(44) Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
45 NSW16(45) LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle- to-Vehicle Safety Communications
46 NSW16(46) SCRP: SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks
47 NSW16(47) Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
48 NSW16(48) A Hop-by-Hop Routing Mechanism for Green Internet
49 NSW16(49) Achieving Optimal Traffic Engineering Using a Generalized Routing Framework
50 NSW16(50)
51 NSW16(51) Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum
52 NSW16(52) Cost-Aware Caching: Caching More (Costly Items) for Less (ISPs Operational Expenditures)
53 NSW16(53) Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under -Hop Interference Models
54 NSW16(54) DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNs
55 NSW16(55) Dynamic Network Control for Confidential Multi-Hop Communications
56 NSW16(56) Embedding IP Unique Shortest Path Topology on a Wavelength- Routed Network: Normal and Survivable Design
57 NSW16(57) Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless Networks
58 NSW16(58) Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing
59 NSW16(59) LAAEM: A Method to Enhance LDoS Attack
60 NSW16(60) Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature
61 NSW16(61) PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
62 NSW16(62) Routing Protocol for Heterogeneous Wireless Mesh Networks
63 NSW16(63) Opportunistic Piggyback Marking for IP Traceback
64 NSW16(64) Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme
65 NSW16(65) Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
66 NSW16(66) Thwarting Selfish Behavior in 802.11 WLANs
67 NSW16(67) Mobility Prediction Based Joint Stable Routing and Channel Assignment for Mobile Ad Hoc Cognitive Networks
68 NSW16(68) Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
69 NSW16(69) Local Anchor Schemes for Seamless and Low-Cost Handover in Coordinated Small Cells
70 NSW16(70) Robotic Message Ferrying for Wireless Networks using Coarse- Grained Backpressure Control
71 NSW16(71) TCP-Aware Back pressure Routing and Scheduling
72 NSW16(72) Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks
Close