Search Results - "2014 IEEE International Conference on Communications (ICC)"
-
1
Learning-based optimization of cache content in a small cell base station
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Optimal cache content placement in a wireless small cell base station (sBS) with limited backhaul capacity is studied. The sBS has a large cache memory and…”
Get full text
Conference Proceeding -
2
Throughput and ergodic capacity of wireless energy harvesting based DF relaying network
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…In this paper, we consider a decode-and-forward (DF) relaying network based on wireless energy harvesting. The energy constrained relay node first harvests…”
Get full text
Conference Proceeding -
3
Kronecker product correlation model and limited feedback codebook design in a 3D channel model
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…A 2D antenna array introduces a new level of control and additional degrees of freedom in multiple-input-multiple-output (MIMO) systems particularly for the…”
Get full text
Conference Proceeding -
4
A Markov Decision Process-based service migration procedure for follow me cloud
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…The Follow-Me Cloud (FMC) concept enables service mobility across federated data centers (DCs). Following the mobility of a mobile user, the service located in…”
Get full text
Conference Proceeding -
5
Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…With the ever increasing number of connected devices and the over abundance of data generated by these devices, data privacy has become a critical concern in…”
Get full text
Conference Proceeding -
6
Design of a low-latency, high-reliability wireless communication system for control applications
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…High-performance industrial control systems with tens to hundreds of sensors and actuators use wired connections between all of their components because they…”
Get full text
Conference Proceeding -
7
Permission-combination-based scheme for Android mobile malware detection
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…With the increase use of Android mobile phones, more Android malwares are being developed. Android malware detection becomes a crucial task. In this paper, we…”
Get full text
Conference Proceeding -
8
Analysis of network address shuffling as a moving target defense
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses…”
Get full text
Conference Proceeding -
9
Privacy-area aware dummy generation algorithms for Location-Based Services
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Location-Based Services (LBSs) have been one of the most popular activities in our daily life. Users can send queries to the LBS server easily to learn their…”
Get full text
Conference Proceeding -
10
GEDAR: Geographic and opportunistic routing protocol with Depth Adjustment for mobile underwater sensor networks
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Efficient protocols for data packet delivery in mobile underwater sensor networks (UWSNs) are crucial to the effective use of this new powerful technology for…”
Get full text
Conference Proceeding -
11
Physical-layer security for indoor visible light communications
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…This paper considers secure transmission over the visible light communication (VLC) channel by the means of physical-layer security techniques. In particular,…”
Get full text
Conference Proceeding -
12
AF relaying for millimeter wave communication systems with hybrid RF/baseband MIMO processing
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Due to the high cost and power consumption of radio frequency (RF) chains, millimeter wave (mm-wave) communication systems equipped with large antenna arrays…”
Get full text
Conference Proceeding -
13
A denial of service attack in advanced metering infrastructure network
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits a highly complex network configuration. AMI shares information about…”
Get full text
Conference Proceeding -
14
Improving small cell capacity with common-carrier full duplex radios
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Recent progress in establishing the capability of radios to operate in full duplex mode on a single channel has been attracting growing attention from many…”
Get full text
Conference Proceeding -
15
Radio resource allocation for physical-layer security in D2D underlay communications
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Device-to-Device (D2D) communications have been proposed recently to improve the spectral efficiency. In this paper, we consider physical-layer security in D2D…”
Get full text
Conference Proceeding -
16
In-network caching of Internet-of-Things data
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…The recent forecast of billions of devices, all connected to the Internet and generating low-rate monitoring, measurement, or automation data that many…”
Get full text
Conference Proceeding -
17
Using opcode-sequences to detect malicious Android applications
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application submission process and the…”
Get full text
Conference Proceeding -
18
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Due to deep automation, the configuration of many Cloud infrastructures is static and homogeneous, which, while easing administration, significantly decreases…”
Get full text
Conference Proceeding -
19
Game-based adaptive security in the Internet of Things for eHealth
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…The Internet of Things (IoT) is enabling the deployment of distributed applications based on ubiquitous computing and convergent networks. Due to its…”
Get full text
Conference Proceeding -
20
Distributed cache replacement for caching-enable base stations in cellular networks
Published in 2014 IEEE International Conference on Communications (ICC) (01-06-2014)“…Distributive service data storage at the caching-enabled base stations (BSs) can reduce the traffic load in future cellular networks. Taking the limited…”
Get full text
Conference Proceeding