dblp: Mobile Sensor Networks 2015 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


11th MSN 2015: Shenzhen, China

jump to- Session 1 Wireless Sensor Network (I)
- Session 2: Wireless Sensor Network (II) and Ad Hoc Network
- Session 3: Security and Privacy (I)
- Session 4: Security and Privacy (II)
- Session 5: Cellular Networks and Cyber-physical Systems
- Session 6: Localization
- Session 7: Vehicular Network and Wireless Mesh Network
- Session 8: Miscellaneous (I)
- Session 9: Miscellaneous (II)

- > Home > Conferences and Workshops > MSN
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

11th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2015, Shenzhen, China, December 16-18, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0329-7
Session 1 Wireless Sensor Network (I)
Session 2: Wireless Sensor Network (II) and Ad Hoc Network

Yongrui Chen, Li Gao, Yulong Xing, Weidong Yi:
Cross-Layer Design for Energy-Efficient Reliable Routing in Wireless Sensor Networks. 31-36
Haibin Zhang, Jiajia Liu
, Rong Li:
Fault Detection for Medical Body Sensor Networks Under Bayesian Network Model. 37-42
Hasan Abdulwahid, Bin Dai, Benxiong Huang, Zijing Chen:
Energy-Efficient and Reliable Routing for Mobility Prediction-Based MANETs. 43-51
Yuan Zhang, Sheng Zhong, Haifan Yao:
An Incentive Scheme for Packet Forwarding and Payment Reduction in Wireless Ad-hoc Networks Using XOR Network Coding. 52-59
Session 3: Security and Privacy (I)

Qinghan Xue, Mooi Choo Chuah
:
Cuckoo-Filter Based Privacy-Aware Search over Encrypted Cloud Data. 60-68
Zhuo Chen, Haibo Hu, Jielin Yu:
Privacy-Preserving Large-Scale Location Monitoring Using Bluetooth Low Energy. 69-78
Jinghua Jiang, Xiaolin Gui, Zhenkui Shi, Xingliang Yuan
, Cong Wang
:
Towards Secure and Practical Targeted Mobile Advertising. 79-88
Saurabh Dey, Srinivas Sampalli, Qiang Ye
:
A Context-Adaptive Security Framework for Mobile Cloud Computing. 89-95
Session 4: Security and Privacy (II)

Zhenhua Duan, Yujiang Hui, Cong Tian, Nan Zhang, Bohu Huang:
A Self-ORganizing Trust Model Based on HP2P. 96-101
Ming Zhang
, Boyi Xu, Jie Gong:
An Anomaly Detection Model Based on One-Class SVM to Detect Network Intrusions. 102-107
Rasheed Hussain, Donghyun Kim, Michele Nogueira
, Junggab Son, Alade O. Tokuta, Heekuck Oh:
A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles. 108-115
Chi Yuan, Wenping Chen, Yuqing Zhu, Deying Li, Jie Tan:
A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network. 116-123
Xiaoyan Liu, Zoe Lin Jiang, Siu-Ming Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Jun-bin Fang
:
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks. 124-133
Session 5: Cellular Networks and Cyber-physical Systems

Ouldooz Baghban Karimi, Jiangchuan Liu, Zhi Wang:
Power-Efficient Resource Utilization in Cellular Multimedia Multicast. 134-143
Hao Xu
, Yi-Jin Pan, Nuo Huang
, Zhaohui Yang
, Ming Chen:
Relay-Assisted Device-to-Device Communications for Video Transmission in Cellular Networks. 144-149
Hao Wang, Jianzhong Li, Hong Gao:
Dynamic Resource Allocation of Gateways for Packet Transmission in Cyber-Physical Systems. 150-157
Zhijian He, Yanming Chen, Zhaoyan Shen, Enyan Huang, Shuai Li, Zili Shao
, Qixin Wang
:
Ard-mu-Copter: A Simple Open Source Quadcopter Platform. 158-164
Session 6: Localization

Yixin Wang, Qiang Ye
, Jie Cheng, Lei Wang:
RSSI-Based Bluetooth Indoor Localization. 165-171
Wenneng Ma, Jing Wu, Chengnian Long, Yanmin Zhu:
HiHeading: Smartphone-Based Indoor Map Construction System with High Accuracy Heading Inference. 172-177
Sen Yang, Hongzi Zhu, Guangtao Xue, Minglu Li:
DiSen: Ranging Indoor Casual Walks with Smartphones. 178-185
Session 7: Vehicular Network and Wireless Mesh Network

Chisheng Zhang, Jiannong Cao
, Gang Yao:
CoDA: Connectivity-Oriented Data Dissemination Algorithm for Vehicular Internet Access Networks. 186-193
Qiongqiong Jiang, Yi Zhou, Jun Wang, Yi Wang, Xianyu Wang:
A Lightweight Cross-Layer Cooperative Testbed for Evaluation of Connected Vehicles. 194-201
Guanjie Sun, Shuisheng Lin, Feilong Yu, Bo Yan, Jie Zhang:
Multi-rate Based Channel Assignment Algorithm for Multi-radio Multi-channel Wireless Mesh Networks. 202-207
Wenjia Wu, Junzhou Luo, Ming Yang, Xiaolin Fang:
Joint Node Scheduling and Radio Switching for Energy Efficiency in Multi-radio WLAN Mesh Networks. 208-215
Session 8: Miscellaneous (I)

Xiaoheng Deng, You Wu, Mianxiong Dong, Chenglong Li, Yan Pan:
A Weighted Network Model Based on the Correlation Degree between Nodes. 216-221
Chuanwen Luo, Jiguo Yu
, Dongxiao Yu, Xiuzhen Cheng:
Distributed Algorithms for Maximum Clique in Wireless Networks. 222-226
Daniel Graff, Daniel Röhrig, Reinhardt Karnapke:
On the Need of Systemic Support for Spatio-Temporal Programming of Mobile Robot Swarms. 227-235
Wen Xu, He Chen:
Scalable Rumor Source Detection under Independent Cascade Model in Online Social Networks. 236-242
Zhao Liu, Jianxi Fan, Cheng-Kuan Lin, Baolei Cheng, Jingya Zhou:
Dynamic Reconfiguration of Complete Binary Trees in Faulty Locally Twisted Cubes. 243-249
Session 9: Miscellaneous (II)

Lixin Wang, William Washington, Katrina Gilmore, Chuang Liu
:
Impact of Radio Irregularities on Connectivity of Wireless Networks with Log-Normal Shadowing. 250-257
Xiaochen Fan, Panlong Yang, Qingyu Li:
Fairness Counts: Simple Task Allocation Scheme for Balanced Crowdsourcing Networks. 258-263
Yipeng Wu, Zhihua Yang, Qinyu Zhang
:
A Novel DTN Routing Algorithm in the GEO-Relaying Satellite Network. 264-269
Ran Wang, Jie He, Liyuan Xu, Qin Wang:
Penalty Function Based Anchor-Free Positioning. 270-277

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







