ACM Mobile Ad Hoc Networking and Computing, MobiHoc 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Understanding the impact of limited channel state information on massive MIMO network performances

Jia Liu, Atilla Eryilmaz, Ness B. Shroff, Elizabeth S. Bentley

Understanding the impact of limited channel state information on massive MIMO network performances

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards distributed ensemble clustering for networked sensing systems: a novel geometric approach

Hu Ding, Lu Su, Jinhui Xu

Towards distributed ensemble clustering for networked sensing systems: a novel geometric approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

High-rate WiFi broadcasting in crowded scenarios via lightweight coordination of multiple access points

Hang Qiu, Konstantinos Psounis, Giuseppe Caire, Keith M. Chugg, Kaidong Wang

High-rate WiFi broadcasting in crowded scenarios via lightweight coordination of multiple access points

Details
Discussion Comments: 0
Verification: Authors have not verified information

Solving the crowdsourcing dilemma using the zero-determinant strategy: poster

Qin Hu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie

Solving the crowdsourcing dilemma using the zero-determinant strategy: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition

Sheng Tan, Jie Yang

WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition

Details
Discussion Comments: 0
Verification: Authors have not verified information

Full-duplex delay-and-forward relaying

Kai-Cheng Hsu, Kate Ching-Ju Lin, Hung-Yu Wei

Full-duplex delay-and-forward relaying

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint sensor duty cycle scheduling with coverage guarantee

Kin Sum Liu, Jie Gao, Shan Lin, Hua Huang, Brent Schiller

Joint sensor duty cycle scheduling with coverage guarantee

Details
Discussion Comments: 0
Verification: Authors have not verified information

System intelligence: model, bounds and algorithms

Longbo Huang

System intelligence: model, bounds and algorithms

Details
Discussion Comments: 0
Verification: Author has not verified information

Analysis of region of interest (RoI) of multimedia content using eye-tracker: poster

B. Vinodh, A. Sai Charan, Rolf Assfalg, Hrishikesh Venkataraman

Analysis of region of interest (RoI) of multimedia content using eye-tracker: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Real time capable UWB wireless network sniffer: poster

Georg von Zengen, Colin Wulf, Yannic Schröder, Lars C. Wolf

Real time capable UWB wireless network sniffer: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards secure spectrum auction: both bids and bidder locations matter: poster

Zhili Chen, Lin Chen, Liusheng Huang, Hong Zhong

Towards secure spectrum auction: both bids and bidder locations matter: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the capacity regions of single-channel and multi-channel full-duplex links

Jelena Marasevic, Gil Zussman

On the capacity regions of single-channel and multi-channel full-duplex links

Details
Discussion Comments: 0
Verification: Authors have not verified information

Combinatorics, algorithms and systems for sensor deployment with line-of-sight constraints: poster

Kin Sum Liu, Brent Schiller, Jie Gao, Shan Lin, Joseph S. B. Mitchell

Combinatorics, algorithms and systems for sensor deployment with line-of-sight constraints: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive non-binary classification for network centric handover in heterogeneous networks: poster

M. N. V. Sneha, K. Vamsi Krishna, Hrishikesh Venkataraman

Adaptive non-binary classification for network centric handover in heterogeneous networks: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

The accuracy of Android energy measurements for offloading computational expensive tasks: poster

Quang-Huy Nguyen, Falko Dressler

The accuracy of Android energy measurements for offloading computational expensive tasks: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Supporting real-time wireless traffic through a high-throughput side channel

Haoyang Lu, Wei Gao

Supporting real-time wireless traffic through a high-throughput side channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Indoor localization using multi-range beaconing: poster

Mehdi Golestanian, Christian Poellabauer

Indoor localization using multi-range beaconing: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

The privacy leaky bucket: your mobile devices: poster

Jie Chu, Ping Ji

The privacy leaky bucket: your mobile devices: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Asymptotically optimal algorithm for online reconfiguration of edge-clouds

I-Hong Hou, Tao Zhao, Shiqiang Wang, Kevin Chan

Asymptotically optimal algorithm for online reconfiguration of edge-clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

4G LTE-assisted distributed Device-to-Device communication using android smartphones: demo

Yan-Zhao Hou, Yibing Duan, Junchen Han, Yu Chen, Xiaofeng Tao

4G LTE-assisted distributed Device-to-Device communication using android smartphones: demo

Details
Discussion Comments: 0
Verification: Authors have not verified information

Charge me if you can: charging path optimization and scheduling in mobile networks

Lin Chen, Shan Lin, Hua Huang

Charge me if you can: charging path optimization and scheduling in mobile networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

An efficient approximation algorithm for online multi-tier multi-cell user association

Weng-Chon Ao, Konstantinos Psounis

An efficient approximation algorithm for online multi-tier multi-cell user association

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coexistence features of LTE-U for spectrum sharing with collocated Wi-Fi: demo

Junaid Ansari

Coexistence features of LTE-U for spectrum sharing with collocated Wi-Fi: demo

Details
Discussion Comments: 0
Verification: Author has not verified information

Mobility resilience and overhead constrained adaptation in directional 60 GHz WLANs: protocol design and system implementation

Muhammad Kumail Haider, Edward W. Knightly

Mobility resilience and overhead constrained adaptation in directional 60 GHz WLANs: protocol design and system implementation

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems

Haiming Jin, Lu Su, Houping Xiao, Klara Nahrstedt

INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Throughput characterization of node-based scheduling in multihop wireless networks: a novel application of the Gallai-Edmonds structure theorem

Bo Ji, Yu Sang

Throughput characterization of node-based scheduling in multihop wireless networks: a novel application of the Gallai-Edmonds structure theorem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deploying carrier-grade WiFi: offload traffic, not money

Konstantinos Poularakis, George Iosifidis, Leandros Tassiulas

Deploying carrier-grade WiFi: offload traffic, not money

Details
Author Comments: Public source code (written in C programming language) for optimizing the pricing and deployment of WiFi access points.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A node-based CSMA algorithm for improved delay performance in wireless networks

Sherif ElAzzouni, Eylem Ekici

A node-based CSMA algorithm for improved delay performance in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anonymous category-level joint tag estimation: poster

Min Chen, Jia Liu, Shigang Chen, Qingjun Xiao

Anonymous category-level joint tag estimation: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems

Yanzhi Dou, Kexiong Curtis Zeng, He Li, Yaling Yang, Bo Gao, Chaowen Guan, Kui Ren, Shaoqian Li

P2-SAS: preserving users' privacy in centralized dynamic spectrum access systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed coordination maximization over networks: a stochastic approximation approach

Hyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi

Distributed coordination maximization over networks: a stochastic approximation approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

First learn then earn: optimizing mobile crowdsensing campaigns through data-driven user profiling

Merkourios Karaliopoulos, Iordanis Koutsopoulos, Michalis Titsias

First learn then earn: optimizing mobile crowdsensing campaigns through data-driven user profiling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient online coflow routing and scheduling

Yupeng Li, Shaofeng H.-C. Jiang, Haisheng Tan, Chenzi Zhang, Guihai Chen, Jipeng Zhou, Francis C. M. Lau

Efficient online coflow routing and scheduling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Context aware dynamic log chunking for mobile healthcare applications: poster

Rahul Krishnan Pathinarupothi, Bithin Alangot, P. Venkat Rangan

Context aware dynamic log chunking for mobile healthcare applications: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast and reliable unknown tag detection in large-scale RFID systems

Wei Gong, Jiangchuan Liu, Zhe Yang

Fast and reliable unknown tag detection in large-scale RFID systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anonymous-query based rate control for wireless multicast: approaching optimality with constant feedback

Fei Wu, Yang Yang, Ouyang Zhang, Kannan Srinivasan, Ness B. Shroff

Anonymous-query based rate control for wireless multicast: approaching optimality with constant feedback

Details
Discussion Comments: 0
Verification: Authors have not verified information

PotatoMesh: a solar powered WSN testbed: poster

Björn Gernert, Stephan Rottmann, Lars C. Wolf

PotatoMesh: a solar powered WSN testbed: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Self-adaptive network architecture reconfiguration in CRNs: demo

Haijun Wang, Haitao Zhao, Jiaxun Li, Jibo Wei

Self-adaptive network architecture reconfiguration in CRNs: demo

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reducing computational complexity of coded caching by partitioning users into groups: poster

Wenxin Li, Shangjie Chen, Guanchen He, Xiaohua Tian, Xinbing Wang

Reducing computational complexity of coded caching by partitioning users into groups: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

A novel anti-jamming routing strategy for tactical MANETs: poster

Li Lou, Jian-Hua Fan

A novel anti-jamming routing strategy for tactical MANETs: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analog man-in-the-middle attack against link-based packet source identification

Yu-Chih Tung, Kang G. Shin, Kyu-Han Kim

Analog man-in-the-middle attack against link-based packet source identification

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rate maximization under reactive jamming attacks: poster

Salvatore D'Oro, Eylem Ekici, Sergio Palazzo

Rate maximization under reactive jamming attacks: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

GAVEL: strategy-proof ascending bid auction for dynamic licensed shared access

Saravana Rathinakumar, Mahesh K. Marina

GAVEL: strategy-proof ascending bid auction for dynamic licensed shared access

Details
Discussion Comments: 0
Verification: Authors have not verified information

P2hub private personal data hub for mobile devices: poster

Michael Haus, Vittorio Cozzolino, Aaron Yi Ding, Jörg Ott

P2hub private personal data hub for mobile devices: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals

Linsong Cheng, Jiliang Wang

How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards in-situ sensor network assisted remote sensing of crop parameters: poster

Jan Bauer, Bastian Siegmann, Thomas Jarmer, Nils Aschenbruck

Towards in-situ sensor network assisted remote sensing of crop parameters: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint selection and transmission scheduling of point-to-point communication requests in multi-channel wireless networks

Peng-Jun Wan

Joint selection and transmission scheduling of point-to-point communication requests in multi-channel wireless networks

Details
Discussion Comments: 0
Verification: Author has not verified information

Geo-spatial resource allocation for heterogeneous vehicular communications: poster

Matthias Wilhelm, Takamasa Higuchi, Onur Altintas

Geo-spatial resource allocation for heterogeneous vehicular communications: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hybrid routing in wireless networks with diverse connectivity

Chen Yang, Radu Stoleru

Hybrid routing in wireless networks with diverse connectivity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Integration of different cryptographic techniques for real-time V2V communication: poster

Nagarjuna Chidara, Chinmayi Nibhanupudi, Hrishikesh Venkataraman

Integration of different cryptographic techniques for real-time V2V communication: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Posted pricing for robust crowdsensing

Kai Han, He Huang, Jun Luo

Posted pricing for robust crowdsensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Throughput-optimal broadcast in wireless networks with dynamic topology

Abhishek Sinha, Leandros Tassiulas, Eytan Modiano

Throughput-optimal broadcast in wireless networks with dynamic topology

Details
Discussion Comments: 0
Verification: Authors have not verified information

Throughput-optimal multi-hop broadcast algorithms

Abhishek Sinha, Georgios S. Paschos, Eytan Modiano

Throughput-optimal multi-hop broadcast algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Full-duplex wireless based on a small-form-factor analog self-interference canceller: demo

Tingjun Chen, Jin Zhou, Nicole Grimwood, Rel Fogel, Jelena Marasevic, Harish Krishnaswamy, Gil Zussman

Full-duplex wireless based on a small-form-factor analog self-interference canceller: demo

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-channel access and rendezvous in CRNs: demo

Jiaxun Li, Haitao Zhao, Haijun Wang, Li Zhou, Jibo Wei

Multi-channel access and rendezvous in CRNs: demo

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint property estimation for multiple RFID tag sets using snapshots of variable lengths

Qingjun Xiao, Shigang Chen, Min Chen

Joint property estimation for multiple RFID tag sets using snapshots of variable lengths

Details
Discussion Comments: 0
Verification: Authors have not verified information

LocalCoin: An ad-hoc payment scheme for areas with high connectivity: poster

Dimitris Chatzopoulos, Sujit Gujar, Boi Faltings, Pan Hui

LocalCoin: An ad-hoc payment scheme for areas with high connectivity: poster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Monitoring vital signs using millimeter wave

Zhicheng Yang, Parth H. Pathak, Yunze Zeng, Xixi Liran, Prasant Mohapatra

Monitoring vital signs using millimeter wave

Details
Discussion Comments: 0
Verification: Authors have not verified information

On LTE-WiFi coexistence and inter-operator spectrum sharing in unlicensed bands: altruism, cooperation and fairness

Cengis Hasan, Mahesh K. Marina, Ursula Challita

On LTE-WiFi coexistence and inter-operator spectrum sharing in unlicensed bands: altruism, cooperation and fairness

Details
Discussion Comments: 0
Verification: Authors have not verified information

IQ-Hopping: distributed oblivious channel selection for wireless networks

Apurv Bhartia, Deeparnab Chakrabarty, Krishna Chintalapudi, Lili Qiu, Bozidar Radunovic, Ramachandran Ramjee

IQ-Hopping: distributed oblivious channel selection for wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information