


default search action
13th MOBICOM 2007: Montréal, Québec, Canada
- Evangelos Kranakis, Jennifer C. Hou, Ram Ramanathan:

Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montréal, Québec, Canada, September 9-14, 2007. ACM 2007, ISBN 978-1-59593-681-3 - Leonidas J. Guibas:

The geometry of mobility. 1
Medium access control
- Matthew Andrews, Lisa Zhang:

Scheduling algorithms for multi-carrier wireless data systems. 3-14 - Kai Xing, Xiuzhen Cheng, Liran Ma

, Qilian Liang:
Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks. 15-26 - Nicholas B. Chang, Mingyan Liu:

Optimal channel probing and transmission scheduling for opportunistic spectrum access. 27-38
Sensor networks
- Wei Wang, Vikram Srinivasan, Kee Chaing Chua:

Trade-offs between mobility and density for coverage in wireless sensor networks. 39-50 - Mo Li

, Yunhao Liu:
Rendered path: range-free localization in anisotropic sensor networks with holes. 51-62 - Ai Chen, Santosh Kumar, Ten-Hwang Lai:

Designing localized algorithms for barrier coverage. 63-74 - Paul Balister, Béla Bollobás, Amites Sarkar, Santosh Kumar:

Reliable density estimates for coverage and connectivity in thin strips of finite length. 75-86
Security and privacy
- Juan José Jaramillo

, R. Srikant:
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks. 87-98 - Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan

, David Wetherall:
802.11 user fingerprinting. 99-110 - Neal Patwari, Sneha Kumar Kasera:

Robust location distinction using temporal link signatures. 111-122 - Hui Zang, Jean Bolot:

Mining call and mobility data to improve paging efficiency in cellular networks. 123-134
Cross-layer echniques
- Prasanna Chaporkar, Alexandre Proutière:

Adaptive network coding and scheduling for maximizing throughput in wireless networks. 135-146 - Grace R. Woo, Pouya Kheradpour, Dawei Shen, Dina Katabi:

Beyond the bits: cooperative packet recovery using physical layer information. 147-158
Mobility/interference models
- Han Cai, Do Young Eun

:
Crossing over the bounded domain: from exponential to power-law inter-meeting time in manet. 159-170 - Lili Qiu, Yin Zhang, Feng Wang, Mi Kyung Han, Ratul Mahajan:

A general model of wireless interference. 171-182 - Thomas Karagiannis, Jean-Yves Le Boudec, Milan Vojnovic:

Power law and exponential decay of inter contact times between mobile devices. 183-194 - Xiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley

, Honggang Zhang:
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. 195-206
Challenges
- J. J. Garcia-Luna-Aceves, Hamid R. Sadjadpour, Zheng Wang:

Challenges: towards truly scalable ad hoc networks. 207-214 - Jedrzej Rybicki, Björn Scheuermann, Wolfgang Kiess, Christian Lochert, Pezhman Fallahi, Martin Mauve:

Challenge: peers on wheels - a road to new traffic information systems. 215-221 - Moustafa Youssef

, Matthew Mah, Ashok K. Agrawala:
Challenges: device-free passive localization for wireless environments. 222-229
Measurements
- Wei Wang, Vikram Srinivasan, Mehul Motani

:
Adaptive contact probing mechanisms for delay tolerant applications. 230-241 - Anand Kashyap, Samrat Ganguly, Samir R. Das:

A measurement-based approach to modeling link capacity in 802.11-based wireless networks. 242-253 - Ioannis Broustis, Konstantina Papagiannaki, Srikanth V. Krishnamurthy

, Michalis Faloutsos
, Vivek Mhatre:
MDG: measurement-driven guidelines for 802.11 wlan design. 254-265
Routing and multicasting
- Xiang-Yang Li, Shaojie Tang, Ophir Frieder:

Multicast capacity for large scale wireless ad hoc networks. 266-277 - Sheng Zhong, Fan Wu:

On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. 278-289 - Utku Günay Acer

, Shivkumar Kalyanaraman, Alhussein A. Abouzeid
:
Weak state routing for large scale dynamic networks. 290-301
Extended abstracts
- Gentian Jakllari

, Stephan J. Eidenbenz, Nicolas W. Hengartner, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
Revisiting minimum cost reliable routing in wireless mesh networks. 302-305 - Qunfeng Dong, Jianming Wu, Wenjun Hu, Jon Crowcroft:

Practical network coding in wireless networks. 306-309 - Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj:

SecNav: secure broadcast localization and time synchronization in wireless networks. 310-313 - Vartika Bhandari, Vivek Raghunathan, Bach Duy Bui, Marco Caccamo:

Real-time implications of multiple transmission rates in wireless networks. 314-317 - Ashwini Kumar, Kang G. Shin:

Towards context-aware wireless spectrum agility. 318-321 - Tie Luo

, Mehul Motani
, Vikram Srinivasan:
Altruistic cooperation for energy-efficient multi-channel MAC protocols. 322-325 - Kyu-Han Kim, Kang G. Shin:

Self-healing multi-radio wireless mesh networks. 326-329 - Li (Erran) Li, Richard Alimi, Ramachandran Ramjee, Jingpu Shi, Yanjun Sun, Harish Viswanathan, Yang Richard Yang:

Superposition coding for wireless mesh networks. 330-333 - Nathanael Thompson, Petros Zerfos, Haiyun Luo, Jatinder Pal Singh, Zuoning Yin:

Authentication on the edge: distributed authentication for a global open wi-fi network. 334-337 - Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy

:
Mining behavioral groups in large wireless LANs. 338-341 - Nabeel Ahmed, Vivek Shrivastava, Arunesh Mishra, Suman Banerjee, Srinivasan Keshav

, Konstantina Papagiannaki:
Interference mitigation in enterprise wlans through speculative scheduling. 342-345 - Jerry T. Chiang, Yih-Chun Hu:

Cross-layer jamming detection and mitigation in wireless broadcast networks. 346-349 - Mesut Ali Ergin, Kishore Ramachandran, Marco Gruteser:

Understanding the effect of access point density on wireless LAN performance. 350-353 - Glenn Judd, Xiaohui Wang, Peter Steenkiste

:
Low-overhead channel-aware rate adaptation. 354-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














