-
1
-
-
85010331028
-
-
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast, February
-
"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast," http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html, February 2016.
-
(2016)
-
-
-
3
-
-
79959599513
-
Capacity and coverage enhancement in heterogeneous networks
-
S.-P. Yeh, S. Talwar, G. Wu, N. Himayat, and K. Johnsson, "Capacity and coverage enhancement in heterogeneous networks," IEEE Wireless Communications, vol. 18, no. 3, pp. 32-38, 2011.
-
(2011)
IEEE Wireless Communications
, vol.18
, Issue.3
, pp. 32-38
-
-
Yeh, S.-P.1
Talwar, S.2
Wu, G.3
Himayat, N.4
Johnsson, K.5
-
4
-
-
84930739618
-
Network assisted deviceto-device communications: Use cases, design approaches, and performance aspects
-
Springer
-
G. Fodor, S. Sorrentino, and S. Sultana, "Network Assisted Deviceto-Device Communications: Use Cases, Design Approaches, and Performance Aspects," in Smart Device to Smart Device Communication. Springer, 2014, pp. 135-163.
-
(2014)
Smart Device to Smart Device Communication
, pp. 135-163
-
-
Fodor, G.1
Sorrentino, S.2
Sultana, S.3
-
5
-
-
57749199136
-
Cellular controlled short-range communication for cooperative P2P networking
-
F. H. Fitzek, M. Katz, and Q. Zhang, "Cellular controlled short-range communication for cooperative P2P networking," Wireless Personal Communications, vol. 48, no. 1, pp. 141-155, 2009.
-
(2009)
Wireless Personal Communications
, vol.48
, Issue.1
, pp. 141-155
-
-
Fitzek, F.H.1
Katz, M.2
Zhang, Q.3
-
6
-
-
1542358969
-
UCAN: A unified cellular and ad-hoc network architecture
-
ACM
-
H. Luo, R. Ramjee, P. Sinha, L. E. Li, and S. Lu, "UCAN: a unified cellular and ad-hoc network architecture," in Proc. of the 9th annual international conference on Mobile computing and networking. ACM, 2003, pp. 353-367.
-
(2003)
Proc. of the 9th Annual International Conference on Mobile Computing and Networking
, pp. 353-367
-
-
Luo, H.1
Ramjee, R.2
Sinha, P.3
Li, L.E.4
Lu, S.5
-
7
-
-
84963577279
-
A constrained coalition formation game for multihop d2d content uploading
-
March
-
L. Militano, A. Orsino, G. Araniti, A. Molinaro, and A. Iera, "A Constrained Coalition Formation Game for Multihop D2D Content Uploading," IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 2012-2024, March 2016.
-
(2016)
IEEE Transactions on Wireless Communications
, vol.15
, Issue.3
, pp. 2012-2024
-
-
Militano, L.1
Orsino, A.2
Araniti, G.3
Molinaro, A.4
Iera, A.5
-
8
-
-
70449433952
-
Device-to-device communications; Functional prospects for LTE-advanced networks
-
June
-
K. Doppler, M. Rinne, P. Janis, C. Ribeiro, and K. Hugl, "Device-to-Device Communications; Functional Prospects for LTE-Advanced Networks," in Proc. of IEEE International Conference on Communications Workshops (ICC), June 2009, pp. 1-6.
-
(2009)
Proc. of IEEE International Conference on Communications Workshops (ICC)
, pp. 1-6
-
-
Doppler, K.1
Rinne, M.2
Janis, P.3
Ribeiro, C.4
Hugl, K.5
-
9
-
-
84901195217
-
Survey of wireless communication technologies for public safety
-
G. Baldini, S. Karanasios, D. Allen, and F. Vergari, "Survey of wireless communication technologies for public safety," IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 619-641, 2014.
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.2
, pp. 619-641
-
-
Baldini, G.1
Karanasios, S.2
Allen, D.3
Vergari, F.4
-
10
-
-
84923318649
-
Device-to-device communications for national security and public safety
-
G. Fodor, S. Parkvall, S. Sorrentino, P. Wallentin, Q. Lu, and N. Brahmi, "Device-to-Device Communications for National Security and Public Safety," IEEE Access, vol. 2, pp. 1510-1520, 2014.
-
(2014)
IEEE Access
, vol.2
, pp. 1510-1520
-
-
Fodor, G.1
Parkvall, S.2
Sorrentino, S.3
Wallentin, P.4
Lu, Q.5
Brahmi, N.6
-
11
-
-
80052648113
-
Friendship and mobility: User movement in location-based social networks
-
ACM
-
E. Cho, S. A. Myers, and J. Leskovec, "Friendship and mobility: user movement in location-based social networks," in Proc. of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2011, pp. 1082-1090.
-
(2011)
Proc. of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 1082-1090
-
-
Cho, E.1
Myers, S.A.2
Leskovec, J.3
-
12
-
-
78650904582
-
Toward proximity-aware internetworking
-
M. S. Corson, R. Laroia, J. Li, V. Park, T. Richardson, and G. Tsirtsis, "Toward proximity-aware internetworking," IEEE Wireless Communications, vol. 17, no. 6, pp. 26-33, 2010.
-
(2010)
IEEE Wireless Communications
, vol.17
, Issue.6
, pp. 26-33
-
-
Corson, M.S.1
Laroia, R.2
Li, J.3
Park, V.4
Richardson, T.5
Tsirtsis, G.6
-
13
-
-
84966936618
-
Securing network-assisted direct communication: The case of unreliable cellular connectivity
-
IEEE
-
A. Ometov, K. Zhidanov, S. Bezzateev, R. Florea, S. Andreev, and Y. Koucheryavy, "Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity," in Proc. of IEEE 14th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), vol. 1. IEEE, 2015, pp. 826-833.
-
(2015)
Proc. of IEEE 14th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, vol.1
, pp. 826-833
-
-
Ometov, A.1
Zhidanov, K.2
Bezzateev, S.3
Florea, R.4
Andreev, S.5
Koucheryavy, Y.6
-
14
-
-
84971330662
-
Assisted handover based on deviceto-device communications in 3gpp LTE systems
-
A. Orsino, M. Gapeyenko, L. Militano, D. Moltchanov, S. Andreev, Y. Koucheryavy, and G. Araniti, "Assisted Handover Based on Deviceto-Device Communications in 3GPP LTE Systems," in IEEE Globecom Workshop on Emerging Technologies for 5G Wireless Cellular Networks, 2015.
-
(2015)
IEEE Globecom Workshop on Emerging Technologies for 5G Wireless Cellular Networks
-
-
Orsino, A.1
Gapeyenko, M.2
Militano, L.3
Moltchanov, D.4
Andreev, S.5
Koucheryavy, Y.6
Araniti, G.7
-
15
-
-
17144362816
-
Differentiated services QoS issues in next generation radio access network: A new management policy for expedited forwarding per-hop behaviour
-
IEEE
-
G. Araniti, F. Calabro, A. Iera, A. Molinaro, and S. Pulitano, "Differentiated services QoS issues in next generation radio access network: a new management policy for expedited forwarding per-hop behaviour," in Proc. of 60th Vehicular Technology Conference (VTC2004-Fall), vol. 4. IEEE, 2004, pp. 2693-2697.
-
(2004)
Proc. of 60th Vehicular Technology Conference (VTC2004-Fall)
, vol.4
, pp. 2693-2697
-
-
Araniti, G.1
Calabro, F.2
Iera, A.3
Molinaro, A.4
Pulitano, S.5
-
16
-
-
84881294816
-
3GPP LTE traffic offloading onto WiFi direct
-
IEEE
-
A. Pyattaev, K. Johnsson, S. Andreev and Y. Koucheryavy, "3GPP LTE traffic offloading onto WiFi direct," in Proc. of Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 2013, pp. 135-140.
-
(2013)
Proc. of Wireless Communications and Networking Conference Workshops (WCNCW)
, pp. 135-140
-
-
Pyattaev, A.1
Johnsson, K.2
Andreev, S.3
Koucheryavy, Y.4
-
19
-
-
85010354672
-
-
Open-Source OpenVPN development community
-
Open-Source OpenVPN development community, "Easy-RSA-A Shellbased CA Utility," https://github.com/OpenVPN/easy-rsa, 2013.
-
(2013)
Easy-RSA-A Shellbased CA Utility
-
-
-
21
-
-
84900425671
-
Towards the era of wireless keys: How the IoT can change authentication paradigm
-
IEEE
-
V. Petrov, S. Edelev, M. Komar, and Y. Koucheryavy, "Towards the era of wireless keys: How the IoT can change authentication paradigm," in Proc. of World Forum on Internet of Things (WF-IoT). IEEE, 2014, pp. 51-56.
-
(2014)
Proc. of World Forum on Internet of Things (WF-IoT)
, pp. 51-56
-
-
Petrov, V.1
Edelev, S.2
Komar, M.3
Koucheryavy, Y.4
-
22
-
-
84975763827
-
-
Computer Networks
-
A. Ometov, A. Orsino, L. Militano, G. Araniti, D. Moltchanov, and S. Andreev, "A novel security-centric framework for D2D connectivity based on spatial and social proximity," Computer Networks, 2016.
-
(2016)
A Novel Security-centric Framework for D2D Connectivity Based on Spatial and Social Proximity
-
-
Ometov, A.1
Orsino, A.2
Militano, L.3
Araniti, G.4
Moltchanov, D.5
Andreev, S.6
-
23
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra and E. R. Verheul, "Selecting cryptographic key sizes," Journal of cryptology, vol. 14, no. 4, pp. 255-293, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
24
-
-
3142543313
-
Determining strengths for public keys used for exchanging symmetric keys
-
April
-
H. Orman and P. Hoffman, "Determining Strengths For Public Keys Used For Exchanging Symmetric Keys," The Internet Society, April 2004.
-
(2004)
The Internet Society
-
-
Orman, H.1
Hoffman, P.2
-
26
-
-
0001698236
-
Cooperation and trust: Some theoretical notes
-
Oxford, England: Univer. Nebraska Press
-
M. Deutsch and M. Jones, "Cooperation and trust: Some theoretical notes." in Proc. of Nebraska Symposium on Motivation, vol. XIII. Oxford, England: Univer. Nebraska Press, 1962, pp. 275-320.
-
(1962)
Proc. of Nebraska Symposium on Motivation
, vol.13
, pp. 275-320
-
-
Deutsch, M.1
Jones, M.2
-
27
-
-
84925885847
-
Trust in interpersonal relationships
-
W. Pearce, "Trust in interpersonal relationships," Speech Monographs, vol. 41, no. 3, pp. 236-244, 1974.
-
(1974)
Speech Monographs
, vol.41
, Issue.3
, pp. 236-244
-
-
Pearce, W.1
-
28
-
-
84963063075
-
Trust as a social reality
-
J. D. Lewis and A. Weigert, "Trust as a social reality," Social forces, vol. 63, no. 4, pp. 967-985, 1985.
-
(1985)
Social Forces
, vol.63
, Issue.4
, pp. 967-985
-
-
Lewis, J.D.1
Weigert, A.2
-
29
-
-
0038615891
-
On-line trust: Concepts, evolving themes, a model
-
C. L. Corritore, B. Kracher, and S. Wiedenbeck, "On-line trust: concepts, evolving themes, a model," International Journal of Human-Computer Studies, vol. 58, no. 6, pp. 737-758, 2003.
-
(2003)
International Journal of Human-Computer Studies
, vol.58
, Issue.6
, pp. 737-758
-
-
Corritore, C.L.1
Kracher, B.2
Wiedenbeck, S.3
|