-
1
-
-
80052002716
-
Optimal Traffic Control: Urban Intersections
-
CRC Press
-
Guberinic, S., Senborn, G., Lazic, B., Optimal Traffic Control: Urban Intersections. 2008, CRC Press.
-
(2008)
-
-
Guberinic, S.1
Senborn, G.2
Lazic, B.3
-
2
-
-
72449121421
-
A decentralized adaptive traffic signal control using V2I communication data
-
C. Priemer, B. Friedrich, A decentralized adaptive traffic signal control using V2I communication data, in: Proc. 12th Int. IEEE Conf. Intell. Transp. Syst., ITS, 2009, pp. 1–6.
-
(2009)
Proc. 12th Int. IEEE Conf. Intell. Transp. Syst., ITS
, pp. 1-6
-
-
Priemer, C.1
Friedrich, B.2
-
3
-
-
0034073903
-
Model formulation and solution algorithm of traffic signal control in an urban network
-
Wey, W., Model formulation and solution algorithm of traffic signal control in an urban network. Comput. Environ. Urban Syst. 24:4 (2000), 355–378.
-
(2000)
Comput. Environ. Urban Syst.
, vol.24
, Issue.4
, pp. 355-378
-
-
Wey, W.1
-
4
-
-
0001813590
-
TRANSYT method for area traffic control
-
Robertson, D., TRANSYT method for area traffic control. Traffic Eng. Control 11:6 (1969), 276–281.
-
(1969)
Traffic Eng. Control
, vol.11
, Issue.6
, pp. 276-281
-
-
Robertson, D.1
-
5
-
-
0032273715
-
An evaluation of SCATS master isolated control
-
M. Besley, R. Akcelik, E. Chung, An evaluation of SCATS master isolated control, in: Proc. 19th ARRB Transp. Res. Conf., TRC, 1998, pp. 1–24.
-
(1998)
Proc. 19th ARRB Transp. Res. Conf., TRC
, pp. 1-24
-
-
Besley, M.1
Akcelik, R.2
Chung, E.3
-
6
-
-
0031682493
-
Intelligent systems for priority at traffic signals in London: The INCOME project
-
N. Hounsell, J. Landles, R. Bretherton, K. Gardener, Intelligent systems for priority at traffic signals in London: The INCOME project, in: Proc. 9th Int. Conf. Road Transp. Inf. Control, RTIC, 1998, pp. 90–94.
-
(1998)
Proc. 9th Int. Conf. Road Transp. Inf. Control, RTIC
, pp. 90-94
-
-
Hounsell, N.1
Landles, J.2
Bretherton, R.3
Gardener, K.4
-
7
-
-
29544443376
-
A visionbased approach to collision prediction at traffic intersections
-
Atev, S., Arumugam, H., Masoud, O., Janardan, R., Papanikolopoulos, N.P., A visionbased approach to collision prediction at traffic intersections. IEEE Trans. Intell. Transp. Syst. 6:4 (2005), 416–423.
-
(2005)
IEEE Trans. Intell. Transp. Syst.
, vol.6
, Issue.4
, pp. 416-423
-
-
Atev, S.1
Arumugam, H.2
Masoud, O.3
Janardan, R.4
Papanikolopoulos, N.P.5
-
8
-
-
15244361970
-
Framework for real-time behavior interpretation from traffic video
-
Kumar, P., Ranganath, S., Huang, W., Sengupta, K., Framework for real-time behavior interpretation from traffic video. IEEE Trans. Intell. Transp. Syst. 6:4 (2005), 43–53.
-
(2005)
IEEE Trans. Intell. Transp. Syst.
, vol.6
, Issue.4
, pp. 43-53
-
-
Kumar, P.1
Ranganath, S.2
Huang, W.3
Sengupta, K.4
-
9
-
-
84952330462
-
A domain-based multi-cluster SIP solution for mobile ad hoc network
-
K.K.R. Choo, A domain-based multi-cluster SIP solution for mobile ad hoc network, in: Int. Conf. Security Privacy Commun. Syst., 2014, pp. 267–281.
-
(2014)
Int. Conf. Security Privacy Commun. Syst.
, pp. 267-281
-
-
Choo, K.K.R.1
-
10
-
-
84986575553
-
Privacy-preserving public auditing protocol for low performance end devices in cloud
-
Li, J., Zhang, L., Liu, J.K., Qian, H., Dong, Z., Privacy-preserving public auditing protocol for low performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11:11 (2016), 2572–2583.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.11
, pp. 2572-2583
-
-
Li, J.1
Zhang, L.2
Liu, J.K.3
Qian, H.4
Dong, Z.5
-
11
-
-
84928914432
-
Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation
-
Nam, J., Choo, K.K.R., Han, S., Kim, M., Paik, J., Won, D., Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation. PLoS One, 10(4), 2015, e0116709.
-
(2015)
PLoS One
, vol.10
, Issue.4
, pp. e0116709
-
-
Nam, J.1
Choo, K.K.R.2
Han, S.3
Kim, M.4
Paik, J.5
Won, D.6
-
12
-
-
84958037736
-
A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering
-
W.J. Seo, R. Islam, M.K. Khan, K.K.R. Choo, A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering, in: Int. Conf. Security Privacy Commun. Syst., 2015, pp. 649–664.
-
(2015)
Int. Conf. Security Privacy Commun. Syst.
, pp. 649-664
-
-
Seo, W.J.1
Islam, R.2
Khan, M.K.3
Choo, K.K.R.4
-
13
-
-
33745224554
-
A realtime dynamic traffic control system based on wireless sensor network
-
W. Chen, L. Chen, Z. Chen, T. Shiliang, A realtime dynamic traffic control system based on wireless sensor network, in: Proc. 34th Int. Conf. Par. Process., ICPP, 2005, pp. 258–264.
-
(2005)
Proc. 34th Int. Conf. Par. Process., ICPP
, pp. 258-264
-
-
Chen, W.1
Chen, L.2
Chen, Z.3
Shiliang, T.4
-
14
-
-
84959934623
-
An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
-
Deniz, F., Bagci, H., Korpeoglu, I., Yaz, A., An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks. Ad Hoc Networks, 2016, 104–117.
-
(2016)
Ad Hoc Networks
, pp. 104-117
-
-
Deniz, F.1
Bagci, H.2
Korpeoglu, I.3
Yaz, A.4
-
15
-
-
37249060744
-
Protocols for traffic safety using wireless sensor network
-
Y. Lai, Y. Zheng, J. Cao, Protocols for traffic safety using wireless sensor network, in: Proc. 7th Int. Conf. Alg. Archi. Par. Process., IC3PP, 2007, pp. 37–48.
-
(2007)
Proc. 7th Int. Conf. Alg. Archi. Par. Process., IC3PP
, pp. 37-48
-
-
Lai, Y.1
Zheng, Y.2
Cao, J.3
-
16
-
-
84977492315
-
A lightweight radio propagation model for vehicular communication in road tunnels
-
Qureshi, M.A., Noor, R.M., Shamim, A., Shamshirband, S., Choo, K.K.R., A lightweight radio propagation model for vehicular communication in road tunnels. PLoS One, 11(3), 2016, e0152727.
-
(2016)
PLoS One
, vol.11
, Issue.3
, pp. e0152727
-
-
Qureshi, M.A.1
Noor, R.M.2
Shamim, A.3
Shamshirband, S.4
Choo, K.K.R.5
-
17
-
-
84978312778
-
Distributed aggregate privacy-preserving authentication in VANETs
-
in press
-
Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C., Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst., 2016, 10.1109/TITS.2016.2579162 in press.
-
(2016)
IEEE Trans. Intell. Transp. Syst.
-
-
Zhang, L.1
Wu, Q.2
Domingo-Ferrer, J.3
Qin, B.4
Hu, C.5
-
18
-
-
77952252546
-
A scalable robust authentication protocol for secure vehicular communications
-
Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J., A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59:4 (2010), 1606–1617.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.4
, pp. 1606-1617
-
-
Zhang, L.1
Wu, Q.2
Solanas, A.3
Domingo-Ferrer, J.4
-
19
-
-
84978708856
-
Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response
-
Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., Qin, B., Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. 65:8 (2016), 2562–2574.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.8
, pp. 2562-2574
-
-
Zhang, L.1
Hu, C.2
Wu, Q.3
Domingo-Ferrer, J.4
Qin, B.5
-
20
-
-
84857066203
-
Traffic light control using VANET system architecture
-
M. Abbas, M. Karsiti, M. Napiah, B. Samir, Traffic light control using VANET system architecture, in: Proc. Nat. Postgraduate Conf., NPC, 2011, pp. 1–6.
-
(2011)
Proc. Nat. Postgraduate Conf., NPC
, pp. 1-6
-
-
Abbas, M.1
Karsiti, M.2
Napiah, M.3
Samir, B.4
-
21
-
-
84883668869
-
Adaptive traffic light control using VANET: A case study
-
S. Kwatirayo, J. Almhana, Z. Liu, Adaptive traffic light control using VANET: A case study, in: Proc. 9th Int. Wireless Commun. Mobile Comput. Conf., IWCMC, 2013, pp. 752–757.
-
(2013)
Proc. 9th Int. Wireless Commun. Mobile Comput. Conf., IWCMC
, pp. 752-757
-
-
Kwatirayo, S.1
Almhana, J.2
Liu, Z.3
-
22
-
-
84877865598
-
Adaptive traffic signal control with vehicular ad hoc networks
-
Pandit, K., Ghosal, D., Zhang, H., Adaptive traffic signal control with vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62:4 (2013), 1459–1471.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.4
, pp. 1459-1471
-
-
Pandit, K.1
Ghosal, D.2
Zhang, H.3
-
23
-
-
84866627419
-
Fog computing and its role in the Internet of things
-
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of things, in: Proc. 1st ed Workshop Mobile Cloud Comput., MCC, 2012, pp. 13–16.
-
(2012)
Proc. 1st ed Workshop Mobile Cloud Comput., MCC
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
24
-
-
84912130127
-
The Fog computing paradigm: Scenarios and security issues
-
FedCSIS, 2014, September
-
I. Stojmenovic, S. Wen, The Fog computing paradigm: Scenarios and security issues, in: Proc. Comput. Sci. Inform. Syst., FedCSIS, 2014, September 2014, pp. 1–8.
-
(2014)
Proc. Comput. Sci. Inform. Syst.
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
25
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
B. Waters, A. Juels, J. Halderman, E. Felten, New client puzzle outsourcing techniques for DoS resistance, in: Proc. 11th ACM Conf. Comput. Commun. Security, CCS, 2004, pp. 246–256.
-
(2004)
Proc. 11th ACM Conf. Comput. Commun. Security, CCS
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.3
Felten, E.4
-
26
-
-
1542341270
-
Location-based authentication: Grounding cyberspace for better security
-
Denning, D., MacDoran, P., Location-based authentication: Grounding cyberspace for better security. Comput. Fraud Secur. 1996:2 (1996), 12–16.
-
(1996)
Comput. Fraud Secur.
, vol.1996
, Issue.2
, pp. 12-16
-
-
Denning, D.1
MacDoran, P.2
-
27
-
-
73849121409
-
A location based encryption technique and some of its applications
-
L. Scott, D. Denning, A location based encryption technique and some of its applications, in: Proc. Inst. Navigation Nat. Tech. Meeting, 2003, pp. 734–740.
-
(2003)
Proc. Inst. Navigation Nat. Tech. Meeting
, pp. 734-740
-
-
Scott, L.1
Denning, D.2
-
28
-
-
84874889982
-
A geographic location-based security mechanism for intelligent vehicular networks
-
G. Yan, J. Lin, D. Rawat, W. Yang, A geographic location-based security mechanism for intelligent vehicular networks, in: Proc. Intell. Comput. Inform. Sci., ICICIS, 2011, pp. 693–698.
-
(2011)
Proc. Intell. Comput. Inform. Sci., ICICIS
, pp. 693-698
-
-
Yan, G.1
Lin, J.2
Rawat, D.3
Yang, W.4
-
29
-
-
74249090961
-
An efficient geographic location-based security mechanism for vehicular adhoc networks
-
G. Yan, S. Olariu, An efficient geographic location-based security mechanism for vehicular adhoc networks, in: Proc. 6th Int. Conf. Mobile Adhoc Sensor Syst., MASS, 2009, pp. 804–809.
-
(2009)
Proc. 6th Int. Conf. Mobile Adhoc Sensor Syst., MASS
, pp. 804-809
-
-
Yan, G.1
Olariu, S.2
-
30
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
T. Aura, P. Nikander, J. Leiwo, DOS-resistant authentication with client puzzles, in: Proc. 8th Int. Workshop Security Prot., SPW 2000, pp. 170–177.
-
(2000)
Proc. 8th Int. Workshop Security Prot., SPW
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
31
-
-
84932611037
-
An intelligent traffic light scheduling algorithm through VANETs
-
M. Younes, A. Boukerche, An intelligent traffic light scheduling algorithm through VANETs, in: 39th Conf. Local Comput. Networks, LCN, 2014, pp. 637–642.
-
(2014)
39th Conf. Local Comput. Networks, LCN
, pp. 637-642
-
-
Younes, M.1
Boukerche, A.2
-
32
-
-
84958926233
-
Practical secure and privacy-preserving scheme for value-added applications in VANETs
-
Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J., Liu, B., Practical secure and privacy-preserving scheme for value-added applications in VANETs. Comput. Commun. 71 (2015), 50–60.
-
(2015)
Comput. Commun.
, vol.71
, pp. 50-60
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
Liu, B.5
|