EAI Endorsed Transactions on Cognitive Communications, Volume 1 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 1, Number 1, July 2014

Tao Chen:
Welcome Message from Editor-in-Chief. e1

Fucheng Yang, Lie-Liang Yang:
Energy-Based Cooperative Spectrum Sensing of SC-FDMA Systems. e2

Ahmed El Shafie:
Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging. e3

Dan Shan, Kai Zeng, Weidong Xiang, Paul C. Richardson:
Detecting Multi-ChannelWireless Microphone User Emulation Attacks in White Space with Noise. e4

Ming-Tuo Zhou, Chunyi Song, Chin-Sean Sum, Hiroshi Harada:
Energy/bandwidth-Saving Cooperative Spectrum Sensing for Two-hopWRAN. e5
Volume 1, Number 2, May 2015

Lijun Qian, Oluwaseyi Omotere, Riku Jäntti:
Performance Analysis on the Coexistence of Multiple Cognitive Radio Networks. e1

Marko Höyhtyä, Marja Matinmikko, Xianfu Chen
, Juhani Hallio, Jani Auranen, Reijo Ekman, Juha Röning
, Jan Engelberg, Juha Kalliovaara, Tanim Taher, Ali Riaz, Dennis Roberson:
Spectrum Occupancy Measurements in the 2.3-2.4 GHz band: Guidelines for Licensed Shared Access in Finland. e2

Domenica Borra, Martina Iori
, Claudio Borean, Fabio Fagnani:
A Reputation-based Distributed District Scheduling Algorithm for Smart Grids. e3

Rui Francisco, Artur M. Arsénio:
Switching Brains: Cloud-based Intelligent Resources Management for the Internet of Cognitive Things. e4

Shah Nawaz Khan, Andreas Mitschele-Thiel:
Hypernetworks based Radio Spectrum Profiling in Cognitive Radio Networks. e5

Salvatore Gaglio, Giuseppe Lo Re, Gloria Martorella, Daniele Peri:
High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices. e6
Volume 1, Number 3, October 2015

Xue Li, Zhixin Sun:
An Improved 6LoWPAN Hierarchical Routing Protocol. e1

Jyun-Fan Ke, Wen-Ju Chen, Der-Chen Huang:
A Life Extend Approach Based on Priority Queue N Strategy for Wireless Sensor Network. e2

Bin Sun, Zhi Liu, Haixia Zhang:
Robust and Adaptive Block Tracking Method Based on Particle Filter. e3
Volume 1, Number 4, November 2015

Bo Yang, Bo Li, Mao Yang, Zhongjiang Yan
, Xiaoya Zuo:
Mi-MMAC: MIMO-Based Multi-Channel MAC Protocol for WLAN. e1

Zhu Jiang, Xiong Jiahao, Chen Hongcui, Han Chao:
A Spectrum Allocation Mechanism Based on HJ-DQPSO for Cognitive Radio Networks. e2

Zhe Cui, Ashok K. Agrawala:
WiFi Localization Based on IEEE 802.11 RTS/CTS Mechanism. e3

Alois Goiser:
Low-Complex Reliable Communications between Wireless Network-Nodes. e4

Shin-Fu Wu, Chia-Yung Chang, Shie-Jue Lee:
Time Series Forecasting with Missing Values. e5
Volume 1, Number 5, December 2015

Kui-Ting Chen, Ke Fan, Yijun Dai, Takaaki Baba:
A Particle Swarm Optimization with Adaptive Multi-Swarm Strategy for Capacitated Vehicle Routing Problem. e3

Takafumi Kawasaki, Takeshi Iwamoto, Michito Matsumoto, Takuro Yonezawa, Jin Nakazawa, Kazunori Takashio, Hideyuki Tokuda:
A Method for Detecting Damage of Traffic Marks by Half Celestial Camera Attached to Cars. e2

Junji Takahashi, Yusuke Kobana, Yoshito Tobe, Guillaume Lopez:
Classification of Steps on Road Surface Using Acceleration Signals. e3

Christoph Bodenstein, Armin Zimmermann
:
TimeNET Optimization Environment.

Boris Malinowsky, Hans-Peter Schwefel, Oliver Jung:
Quantitative Safety and Security Analysis from a Communication Perspective.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







