Search Results - "2014 IEEE International Conference on Communications (ICC)"

Refine Results
  1. 1

    Learning-based optimization of cache content in a small cell base station by Blasco, Pol, Gunduz, Deniz

    “…Optimal cache content placement in a wireless small cell base station (sBS) with limited backhaul capacity is studied. The sBS has a large cache memory and…”
    Get full text
    Conference Proceeding
  2. 2

    Throughput and ergodic capacity of wireless energy harvesting based DF relaying network by Nasir, Ali A., Xiangyun Zhou, Durrani, Salman, Kennedy, Rodney A.

    “…In this paper, we consider a decode-and-forward (DF) relaying network based on wireless energy harvesting. The energy constrained relay node first harvests…”
    Get full text
    Conference Proceeding
  3. 3

    Kronecker product correlation model and limited feedback codebook design in a 3D channel model by Dawei Ying, Vook, Frederick W., Thomas, Timothy A., Love, David J., Ghosh, Amitava

    “…A 2D antenna array introduces a new level of control and additional degrees of freedom in multiple-input-multiple-output (MIMO) systems particularly for the…”
    Get full text
    Conference Proceeding
  4. 4

    A Markov Decision Process-based service migration procedure for follow me cloud by Ksentini, Adlen, Taleb, Tarik, Min Chen

    “…The Follow-Me Cloud (FMC) concept enables service mobility across federated data centers (DCs). Following the mobility of a mobile user, the service located in…”
    Get full text
    Conference Proceeding
  5. 5

    Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT by Xinlei Wang, Jianqing Zhang, Schooler, Eve M., Ion, Mihaela

    “…With the ever increasing number of connected devices and the over abundance of data generated by these devices, data privacy has become a critical concern in…”
    Get full text
    Conference Proceeding
  6. 6

    Design of a low-latency, high-reliability wireless communication system for control applications by Weiner, Matthew, Jorgovanovic, Milos, Sahai, Anant, Nikolie, Borivoje

    “…High-performance industrial control systems with tens to hundreds of sensors and actuators use wired connections between all of their components because they…”
    Get full text
    Conference Proceeding
  7. 7

    Permission-combination-based scheme for Android mobile malware detection by Shuang Liang, Xiaojiang Du

    “…With the increase use of Android mobile phones, more Android malwares are being developed. Android malware detection becomes a crucial task. In this paper, we…”
    Get full text
    Conference Proceeding
  8. 8

    Analysis of network address shuffling as a moving target defense by Carroll, Thomas E., Crouse, Michael, Fulp, Errin W., Berenhaut, Kenneth S.

    “…Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses…”
    Get full text
    Conference Proceeding
  9. 9

    Privacy-area aware dummy generation algorithms for Location-Based Services by Ben Niu, Zhengyan Zhang, Xiaoqing Li, Hui Li

    “…Location-Based Services (LBSs) have been one of the most popular activities in our daily life. Users can send queries to the LBS server easily to learn their…”
    Get full text
    Conference Proceeding
  10. 10

    GEDAR: Geographic and opportunistic routing protocol with Depth Adjustment for mobile underwater sensor networks by Coutinho, Rodolfo W. L., Boukerche, Azzedine, Vieira, Luiz F. M., Loureiro, Antonio A. F.

    “…Efficient protocols for data packet delivery in mobile underwater sensor networks (UWSNs) are crucial to the effective use of this new powerful technology for…”
    Get full text
    Conference Proceeding
  11. 11

    Physical-layer security for indoor visible light communications by Mostafa, Ayman, Lampe, Lutz

    “…This paper considers secure transmission over the visible light communication (VLC) channel by the means of physical-layer security techniques. In particular,…”
    Get full text
    Conference Proceeding
  12. 12

    AF relaying for millimeter wave communication systems with hybrid RF/baseband MIMO processing by Junho Lee, Lee, Yong H.

    “…Due to the high cost and power consumption of radio frequency (RF) chains, millimeter wave (mm-wave) communication systems equipped with large antenna arrays…”
    Get full text
    Conference Proceeding
  13. 13

    A denial of service attack in advanced metering infrastructure network by Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Jianhua Li

    “…Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits a highly complex network configuration. AMI shares information about…”
    Get full text
    Conference Proceeding
  14. 14

    Improving small cell capacity with common-carrier full duplex radios by Goyal, Sanjay, Pei Liu, Panwar, Shivendra, DiFazio, Robert A., Rui Yang, Jialing Li, Bala, Erdem

    “…Recent progress in establishing the capability of radios to operate in full duplex mode on a single channel has been attracting growing attention from many…”
    Get full text
    Conference Proceeding
  15. 15

    Radio resource allocation for physical-layer security in D2D underlay communications by Hang Zhang, Tianyu Wang, Lingyang Song, Zhu Han

    “…Device-to-Device (D2D) communications have been proposed recently to improve the spectral efficiency. In this paper, we consider physical-layer security in D2D…”
    Get full text
    Conference Proceeding
  16. 16

    In-network caching of Internet-of-Things data by Vural, Serdar, Navaratnam, Pirabakaran, Ning Wang, Chonggang Wang, Lijun Dong, Tafazolli, Rahim

    “…The recent forecast of billions of devices, all connected to the Internet and generating low-rate monitoring, measurement, or automation data that many…”
    Get full text
    Conference Proceeding
  17. 17

    Using opcode-sequences to detect malicious Android applications by Jerome, Quentin, Allix, Kevin, State, Radu, Engel, Thomas

    “…Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application submission process and the…”
    Get full text
    Conference Proceeding
  18. 18

    A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces by Wei Peng, Feng Li, Chin-Tser Huang, Xukai Zou

    “…Due to deep automation, the configuration of many Cloud infrastructures is static and homogeneous, which, while easing administration, significantly decreases…”
    Get full text
    Conference Proceeding
  19. 19

    Game-based adaptive security in the Internet of Things for eHealth by Hamdi, Mohamed, Abie, Habtamu

    “…The Internet of Things (IoT) is enabling the deployment of distributed applications based on ubiquitous computing and convergent networks. Due to its…”
    Get full text
    Conference Proceeding
  20. 20

    Distributed cache replacement for caching-enable base stations in cellular networks by Jingxiong Gu, Wei Wang, Aiping Huang, Hangguan Shan, Zhaoyang Zhang

    “…Distributive service data storage at the caching-enabled base stations (BSs) can reduce the traffic load in future cellular networks. Taking the limited…”
    Get full text
    Conference Proceeding