Computer Science & Engineering: Recent submissions
Now showing items 1001-1020 of 2402
-
Discovering influential users in micro-blog marketing with influence maximization mechanism
(2012 , Conference Paper)Micro-blog marketing has become a main business model for social networks nowadays. On social networking sites (e.g., Twitter), micro-blog marketing enables the advertisers to put ads to attract customers to buy their ... -
Cognitive transmission based on data priority classification in WSNs for Smart Grid
(2012 , Conference Paper)Smart Grid integrates digital processing, sensor technology, automatic control and communication to the traditional power grid to achieve more efficient electricity distribution and management. Applying wireless sensor ... -
EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks
(2012 , Conference Paper)We propose an energy-aware MAC protocol, referred to as EM-MAC, for multi-hop wireless networks with multi-channel access capabilities. EM-MAC relies on iMAC's efficient channel selection mechanism to resolve the medium ... -
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ... -
Message from the IWCMC 2012 chairs
(2012 , Other)Presents the welcome message from the conference proceedings. -
Carrier aggregation for LTE-advanced: Uplink multiple access and transmission enhancement features
(2013 , Article)Multiple access and transmission enhancement in support of carrier aggregation techniques has been actively studied in the 3GPP LTEAdvanced standardization process of the nextgeneration mobile broadband communication ... -
Exploring blind online scheduling for mobile cloud multimedia services
(2013 , Article)Mobile cloud is a new emerging technology which can be used to enable users to enjoy abundant multimedia applications in a pervasive computing environment. Therefore, the scheduling of massive multimedia flows with ... -
A measurement study on the topologies of BitTorrent networks
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Article)BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ... -
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks
(2013 , Article)Wireless sensor networks (WSNs) are widely applicable in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust ... -
Copy limited flooding over opportunistic networks
(2013 , Conference Paper)Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ... -
A survey on communication infrastructure for micro-grids
(2013 , Conference Paper)A micro-grid is a small scale power supply network that is designed to provide electricity to a small community with its own renewable energy sources. Due to distributed generation variability, security and load sharing ... -
Taking advantage of multi-user diversity in OFDM systems
(2013 , Conference Paper)A multi-user diversity approach, called Opportunistic Interference Management (OIM), is considered in connection with Orthogonal Frequency Division Multiplexing (OFDM) systems. The OIM is applied to each consecutive group ... -
Social interaction increases capacity of wireless networks
(2013 , Conference Paper)A network model with both social and communication characteristics is considered. Different capacity regions are computed as a function of the social network size for each node. It has been shown that as the social ... -
Capacity and delay analysis for data gathering with compressive sensing in wireless sensor networks
(2013 , Article)Compressive sensing (CS) provides a new paradigm for efficient data gathering in wireless sensor networks (WSNs). In this paper, with the assumption that sensor data is sparse we apply the theory of CS to data gathering ... -
Resource allocation with incomplete information for QoE-driven multimedia communications
(2013 , Article)Most existing Quality of Experience (QoE)-driven multimedia resource allocation methods assume that the QoE model of each user is known to the controller before the start of the multimedia playout. However, this assumption ... -
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ... -
Cloud-assisted mobile computing and pervasive services [Guest Editorial]
(2013 , Other)[No abstract available] -
Joint physical-application layer security for wireless multimedia delivery
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless networks, compared to traditional wired networks, are more likely to suffer from malicious ... -
An enhanced public key infrastructure to secure smart grid wireless communication networks
(2014 , Article)It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ... -
Exploiting 4G mobile user cooperation for energy conservation: Challenges and opportunities
(2013 , Article)Recent years have witnessed tremendous success and popularity of mobile applications and services, resulting in an explosive growth in the number of mobile devices, as well as in the range and types of things these devices ...