-
3
-
-
84878465299
-
-
Technical Report
-
Ahmed-Zaid, F., Bai, F., Bai, S., Basnayake, C., Bellur, B., Brovold, S., Brown, G., et al. (2011). Vehicle safety communications–applications (vsc-a) final report: appendix volume 1 system design and objective test. Technical Report.
-
(2011)
Vehicle Safety communications–applications (Vsc-A) Final Report: Appendix Volume 1 System Design and Objective Test
-
-
Ahmed-Zaid, F.1
Bai, F.2
Bai, S.3
Basnayake, C.4
Bellur, B.5
Brovold, S.6
Brown, G.7
-
6
-
-
84863902285
-
A new scalable hybrid routing protocol for vanets
-
Al-Rabayah, M., & Malaney, R. (2012). A new scalable hybrid routing protocol for vanets. IEEE Transactions on Vehicular Technology (TVT), 61(6), 2625–2635.
-
(2012)
IEEE Transactions on Vehicular Technology (TVT)
, vol.61
, Issue.6
, pp. 2625-2635
-
-
Al-Rabayah, M.1
Malaney, R.2
-
7
-
-
84903277128
-
A survey of vehicular ad hoc networks routing protocols
-
Altayeb, M., & Mahgoub, I. (2013). A survey of vehicular ad hoc networks routing protocols. International Journal of Innovation and Applied Studies, 3(3), 829–846.
-
(2013)
International Journal of Innovation and Applied Studies
, vol.3
, Issue.3
, pp. 829-846
-
-
Altayeb, M.1
Mahgoub, I.2
-
8
-
-
80053003491
-
A survey of intelligent transportation systems
-
An, S.H., Lee, B.H., & Shin, D.R. (2011). A survey of intelligent transportation systems. In Proceedings of third international conference on computational intelligence, communication systems and networks (CICSyN).
-
(2011)
Proceedings of Third International Conference on Computational Intelligence, Communication Systems and Networks (Cicsyn)
-
-
An, S.H.1
Lee, B.H.2
Shin, D.R.3
-
11
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., et al. (2011). Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of 20th USENIX security symposium (SEC).
-
(2011)
Proceedings of 20Th USENIX Security Symposium (SEC)
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
-
12
-
-
79960552217
-
A survey and challenges in routing and data dissemination in vehicular ad hoc networks
-
Chen, W., Guha, R. K., Kwon, T. J., Lee, J., & Hsu, Y. Y. (2011). A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wireless Communications and Mobile Computing, 11(7), 787–795.
-
(2011)
Wireless Communications and Mobile Computing
, vol.11
, Issue.7
, pp. 787-795
-
-
Chen, W.1
Guha, R.K.2
Kwon, T.J.3
Lee, J.4
Hsu, Y.Y.5
-
13
-
-
84949671050
-
A cloud computing based network monitoring and threat detection system for critical infrastructures
-
Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W., & Lu, C. (2016). A cloud computing based network monitoring and threat detection system for critical infrastructures. International journal of big data research (elsevier)-special issue on big data from networking perspective 3:10–23.
-
(2016)
International Journal of Big Data Research (Elsevier)-Special Issue on Big Data from Networking Perspective
, vol.3
, pp. 10-23
-
-
Chen, Z.1
Xu, G.2
Mahalingam, V.3
Ge, L.4
Nguyen, J.5
Yu, W.6
Lu, C.7
-
14
-
-
4143084830
-
Svm-based intrusion detection system for wireless ad hoc networks
-
Deng, H., Zeng, Q.A., & Agrawal, D.P. (2003). Svm-based intrusion detection system for wireless ad hoc networks. In Proceedings of IEEE 58th vehicular technology conference, VTC 2003-Fall.
-
(2003)
Proceedings of IEEE 58Th Vehicular Technology Conference, VTC 2003-Fall
-
-
Deng, H.1
Zeng, Q.A.2
Agrawal, D.P.3
-
15
-
-
77956914023
-
Real-time vehicle route guidance using vehicle-to-vehicle communication
-
Ding, J. W., Wang, C. F., Meng, F. H., & Wu, T. Y. (2010). Real-time vehicle route guidance using vehicle-to-vehicle communication. IET Communications, 4(7), 870–883.
-
(2010)
IET Communications
, vol.4
, Issue.7
, pp. 870-883
-
-
Ding, J.W.1
Wang, C.F.2
Meng, F.H.3
Wu, T.Y.4
-
16
-
-
84896802006
-
Computational load analysis of dijkstra, a*, and floyd-warshall algorithms in mesh network
-
Djojo, M., & Karyono, K. (2013). Computational load analysis of dijkstra, a*, and floyd-warshall algorithms in mesh network. In Proceedings of IEEE international conference on robotics, biomimetics, and intelligent computational systems (ROBIONETICS).
-
(2013)
Proceedings of IEEE International Conference on Robotics, Biomimetics, and Intelligent Computational Systems (ROBIONETICS)
-
-
Djojo, M.1
Karyono, K.2
-
18
-
-
84898825834
-
Its for sustainable mobility: A survey on applications and impact assessment tools
-
D’Orey, P., & Ferreira, M. (2014). Its for sustainable mobility: A survey on applications and impact assessment tools. IEEE Transactions on Intelligent Transportation Systems, 15(2), 477–493.
-
(2014)
IEEE Transactions on Intelligent Transportation Systems
, vol.15
, Issue.2
, pp. 477-493
-
-
D’Orey, P.1
Ferreira, M.2
-
22
-
-
84856834774
-
Progress and challenges in intelligent vehicle area networks
-
Faezipour, M., Nourani, M., Saeed, A., & Addepalli, S. (2012). Progress and challenges in intelligent vehicle area networks. Communication of ACM, 55(2), 90–100.
-
(2012)
Communication of ACM
, vol.55
, Issue.2
, pp. 90-100
-
-
Faezipour, M.1
Nourani, M.2
Saeed, A.3
Addepalli, S.4
-
23
-
-
84963823357
-
Stable and fair power control in vehicle safety networks
-
Fallah, Y. P., Nasiriani, N., & Krishnan, H. (2016). Stable and fair power control in vehicle safety networks. IEEE Transactions on Vehicular Technology, 65(3), 1662–1675.
-
(2016)
IEEE Transactions on Vehicular Technology
, vol.65
, Issue.3
, pp. 1662-1675
-
-
Fallah, Y.P.1
Nasiriani, N.2
Krishnan, H.3
-
25
-
-
84946532406
-
Standards for vehicular communication-from ieee 802.11 p to 5g. e & i
-
Festag, A. (2015). Standards for vehicular communication-from ieee 802.11 p to 5g. e & i. Elektrotechnik und Informationstechnik, 132(7), 409–416.
-
(2015)
Elektrotechnik Und Informationstechnik
, vol.132
, Issue.7
, pp. 409-416
-
-
Festag, A.1
-
26
-
-
84921625399
-
Mac layer challenges and proposed protocols for vehicular ad-hoc networks
-
Springer
-
Gillani, S.A., Shah, P.A., Qayyum, A., & Hasbullah, H.B. (2015). Mac layer challenges and proposed protocols for vehicular ad-hoc networks. In Vehicular ad-hoc networks for smart cities, Springer, pp. 3–13.
-
(2015)
Vehicular Ad-Hoc Networks for Smart Cities
, pp. 3-13
-
-
Gillani, S.A.1
Shah, P.A.2
Qayyum, A.3
Hasbullah, H.B.4
-
27
-
-
84988431735
-
-
Google (2016). Google self-driving car. In http://www.google.com/selfdrivingcar/how/.
-
(2016)
Google Self-Driving Car
-
-
-
28
-
-
84873867183
-
Performance analysis of ad hoc on-demand distance vector routing and dynamic source routing using ns2 simulation
-
Goyal, M.K., Verma, Y.K., Bassi, P., & Misra, P.K. (2013). Performance analysis of ad hoc on-demand distance vector routing and dynamic source routing using ns2 simulation. In Mobile communication and power engineering, Springer, pp. 390–396.
-
(2013)
Mobile Communication and Power Engineering, Springer
, pp. 390-396
-
-
Goyal, M.K.1
Verma, Y.K.2
Bassi, P.3
Misra, P.K.4
-
30
-
-
84970028203
-
Tdma-based mac protocols for vehicular ad hoc networks: A survey, qualitative analysis, and open research issues
-
Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). Tdma-based mac protocols for vehicular ad hoc networks: A survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials, 17(4), 2461–2492.
-
(2015)
IEEE Communications Surveys & Tutorials
, vol.17
, Issue.4
, pp. 2461-2492
-
-
Hadded, M.1
Muhlethaler, P.2
Laouiti, A.3
Zagrouba, R.4
Saidane, L.A.5
-
31
-
-
84928898325
-
-
Technical Report
-
Harding, J., Powell, G., Yoon, R., Fikentscher, J., Doyle, C., Sade, D., Lukuc, M. et al. (2014). Vehicle-to-vehicle communications: Readiness of v2v technology for application. Technical Report.
-
(2014)
Vehicle-To-Vehicle Communications: Readiness of V2v Technology for Application
-
-
Harding, J.1
Powell, G.2
Yoon, R.3
Fikentscher, J.4
Doyle, C.5
Sade, D.6
Lukuc, M.7
-
32
-
-
45749099297
-
A tutorial survey on vehicular ad hoc networks
-
Hartenstein, H., & Laberteaux, L. (2008). A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6), 164–171.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.6
, pp. 164-171
-
-
Hartenstein, H.1
Laberteaux, L.2
-
33
-
-
85006817323
-
Clustering-based device-to-device communication to support diverse applications
-
Hematian, A., Yu, W., Lu, C., Griffith, D., & Golmie, N. (2016). Clustering-based device-to-device communication to support diverse applications. In Proceedings of ACM International Conference on Reliable & Convergent Systems (RACS).
-
(2016)
Proceedings of ACM International Conference on Reliable & Convergent Systems (RACS)
-
-
Hematian, A.1
Yu, W.2
Lu, C.3
Griffith, D.4
Golmie, N.5
-
34
-
-
84979738472
-
Unified device-to-device communications for low-latency and high reliable vehicle-to-x services
-
2016 IEEE 83rd
-
Hu, L., Eichinger, J., Dillinger, M., Botsov, M., & Gozalvez, D. (2016). Unified device-to-device communications for low-latency and high reliable vehicle-to-x services. In Proceedings of IEEE Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd.
-
(2016)
Proceedings of IEEE Vehicular Technology Conference (VTC Spring)
-
-
Hu, L.1
Eichinger, J.2
Dillinger, M.3
Botsov, M.4
Gozalvez, D.5
-
35
-
-
79952833315
-
A cross-layer approach handling link asymmetry for wireless mesh access networks
-
Huang, Y., Yang, X., Yang, S., Yu, W., & Fu, X. (2011). A cross-layer approach handling link asymmetry for wireless mesh access networks. IEEE Transactions on Vehicular Technology (TVT), 60(3), 1045–1058.
-
(2011)
IEEE Transactions on Vehicular Technology (TVT)
, vol.60
, Issue.3
, pp. 1045-1058
-
-
Huang, Y.1
Yang, X.2
Yang, S.3
Yu, W.4
Fu, X.5
-
36
-
-
79952572798
-
A survey of cross-layer design for vanets
-
Jarupan, B., & Ekici, E. (2011). A survey of cross-layer design for vanets. Ad Hoc Networks, 9(5), 966–983.
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.5
, pp. 966-983
-
-
Jarupan, B.1
Ekici, E.2
-
37
-
-
85044935834
-
An efficient directional mac protocol for vehicular ad-hoc networks
-
Ji, S., Kim, J., & You, C. (2015). An efficient directional mac protocol for vehicular ad-hoc networks. Journal of the Institute of Electronics and Information Engineers, 52(4), 9–16.
-
(2015)
Journal of the Institute of Electronics and Information Engineers
, vol.52
, Issue.4
, pp. 9-16
-
-
Ji, S.1
Kim, J.2
You, C.3
-
38
-
-
47749083946
-
Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments
-
VTC Spring 2008. IEEE
-
Jiang, D., & Delgrossi, L. (2008). Ieee 802.11 p: Towards an international standard for wireless access in vehicular environments. In Proceedings of ieee vehicular technology conference, 2008. VTC Spring 2008. IEEE.
-
(2008)
Proceedings of Ieee Vehicular Technology Conference
-
-
Jiang, D.1
Delgrossi, L.2
-
40
-
-
84857921504
-
Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions
-
Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., et al. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.
-
(2011)
IEEE Communications Surveys & Tutorials
, vol.13
, Issue.4
, pp. 584-616
-
-
Karagiannis, G.1
Altintas, O.2
Ekici, E.3
Heijenk, G.4
Jarupan, B.5
Lin, K.6
-
43
-
-
79959374774
-
Dedicated short-range communications (Dsrc) standards in the united states
-
Kenney, J. B. (2011). Dedicated short-range communications (dsrc) standards in the united states. Proceedings of the IEEE, 99(7), 1162–1182.
-
(2011)
Proceedings of the IEEE
, vol.99
, Issue.7
, pp. 1162-1182
-
-
Kenney, J.B.1
-
45
-
-
83755172286
-
Persiangulf: An autonomous combined traffic signal controller and route guidance system
-
VTC Fall
-
Khanjary, M., Faez, K., Meybodi, M., & Sabaei, M. (2011). Persiangulf: an autonomous combined traffic signal controller and route guidance system. In Proceedings of IEEE vehicular technology conference (VTC Fall).
-
(2011)
Proceedings of IEEE Vehicular Technology Conference
-
-
Khanjary, M.1
Faez, K.2
Meybodi, M.3
Sabaei, M.4
-
46
-
-
80053195758
-
Acquiring real time traffic information using vanet and dynamic route guidance
-
Khosroshahi, A., Keshavarzi, P., KoozehKanani, Z., Sobhi, J. (2011). Acquiring real time traffic information using vanet and dynamic route guidance. In Proceedings of IEEE 2nd International Conference on Computing, Control and Industrial Engineering (CCIE).
-
(2011)
Proceedings of IEEE 2Nd International Conference on Computing, Control and Industrial Engineering (CCIE)
-
-
Khosroshahi, A.1
Keshavarzi, P.2
Koozehkanani, Z.3
Sobhi, J.4
-
47
-
-
84966686790
-
Cost effective mobile and static road side unit deployment for vehicular adhoc networks
-
Kim, D., Velasco, Y., Yang, Z., Wang, W., Hussain, R., & Uma, R.N. (2016). Cost effective mobile and static road side unit deployment for vehicular adhoc networks. In Proceedings of international conference on computing, networking and communications (ICNC).
-
(2016)
Proceedings of International Conference on Computing, Networking and Communications (ICNC)
-
-
Kim, D.1
Velasco, Y.2
Yang, Z.3
Wang, W.4
Hussain, R.5
Uma, R.N.6
-
48
-
-
84981319967
-
Prefetching-based data dissemination in vehicular cloud systems
-
Kim, R., Lim, H., & Krishnamachari, B. (2015). Prefetching-based data dissemination in vehicular cloud systems. IEEE Transactions on Vehicular Technology (TVT) PP(99):1–1.
-
(2015)
IEEE Transactions on Vehicular Technology (TVT) PP
, Issue.99
, pp. 1
-
-
Kim, R.1
Lim, H.2
Krishnamachari, B.3
-
51
-
-
84875249674
-
Nevada passes law authorizing driverless cars
-
Knapp, A. (2011). Nevada passes law authorizing driverless cars. In: Forbes.
-
(2011)
Forbes
-
-
Knapp, A.1
-
52
-
-
84921395740
-
Enhancing the security of dynamic source routing protocol using energy aware and distributed trust mechanism in manets
-
Springer
-
Kukreja, D., Dhurandher, S. K., & Reddy, B. (2015). Enhancing the security of dynamic source routing protocol using energy aware and distributed trust mechanism in manets. In Intelligent distributed computing (pp. 83–94). Springer.
-
(2015)
Intelligent Distributed Computing
, pp. 83-94
-
-
Kukreja, D.1
Dhurandher, S.K.2
Reddy, B.3
-
56
-
-
82455212970
-
On the effectiveness of an opportunistic traffic management system for vehicular networks
-
Leontiadis, I., Marfia, G., Mack, D., Pau, G., Mascolo, C., & Gerla, M. (2011). On the effectiveness of an opportunistic traffic management system for vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1537–1548.
-
(2011)
IEEE Transactions on Intelligent Transportation Systems
, vol.12
, Issue.4
, pp. 1537-1548
-
-
Leontiadis, I.1
Marfia, G.2
Mack, D.3
Pau, G.4
Mascolo, C.5
Gerla, M.6
-
57
-
-
84894048195
-
Analytical hierarchy process using fuzzy inference technique for real-time route guidance system
-
Li, C., Anavatti, S., & Ray, T. (2014). Analytical hierarchy process using fuzzy inference technique for real-time route guidance system. IEEE Transactions on Intelligent Transportation Systems, 15(1), 84–93.
-
(2014)
IEEE Transactions on Intelligent Transportation Systems
, vol.15
, Issue.1
, pp. 84-93
-
-
Li, C.1
Anavatti, S.2
Ray, T.3
-
58
-
-
39449084181
-
Routing in vehicular ad hoc networks: A survey
-
Li, F., & Wang, Y. (2007). Routing in vehicular ad hoc networks: A survey. IEEE Vehicular Technology Magazine, 2(2), 12–22.
-
(2007)
IEEE Vehicular Technology Magazine
, vol.2
, Issue.2
, pp. 12-22
-
-
Li, F.1
Wang, Y.2
-
60
-
-
84947334365
-
Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks
-
Li, W., & Song, H. (2016). Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960–969.
-
(2016)
IEEE Transactions on Intelligent Transportation Systems
, vol.17
, Issue.4
, pp. 960-969
-
-
Li, W.1
Song, H.2
-
62
-
-
84961720902
-
On false data injection attack against multistep electricity price in electricity market in smart grid
-
Yang X (2016a)
-
Lin, J., & Yu, W. (2014). Yang X (2016a) On false data injection attack against multistep electricity price in electricity market in smart grid. IEEE Transactions on Parallel and Distributed Systems (TPDS), 27, 286–302.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems (TPDS)
, vol.27
, pp. 286-302
-
-
Lin, J.1
Yu, W.2
-
63
-
-
85044974061
-
A real-time en-route route guidance decision scheme for transportation-based cyber-physical systems
-
(b)
-
Lin, J., Yu, W., Yang, X., Yang, Q., Fu, X., & Zhao, W. (2016b). A real-time en-route route guidance decision scheme for transportation-based cyber-physical systems. IEEE Transactions on Vehicular Technology (TVT) PP(99), 1–1.
-
(2016)
IEEE Transactions on Vehicular Technology (TVT)
, vol.99
, pp. 1
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Yang, Q.4
Fu, X.5
Zhao, W.6
-
64
-
-
85027408047
-
On data integrity attack against route guidance in transportation-based cyber-physical systems
-
Lin, J., Yu, W., Zhang, N., Yang, X., & Ge, L. (2017). On data integrity attack against route guidance in transportation-based cyber-physical systems. In Proceedings of Annual IEEE Consumer Communications and Networking (CCNC).
-
(2017)
Proceedings of Annual IEEE Consumer Communications and Networking (CCNC)
-
-
Lin, J.1
Yu, W.2
Zhang, N.3
Yang, X.4
Ge, L.5
-
65
-
-
84954333342
-
A time-recordable cross-layer communication protocol for the positioning of vehicular cyber-physical systems
-
Liu, J., Wan, J., Wang, Q., Zeng, B., & Fang, S. (2016). A time-recordable cross-layer communication protocol for the positioning of vehicular cyber-physical systems. Future Generation Computer Systems, 56, 438–448.
-
(2016)
Future Generation Computer Systems
, vol.56
, pp. 438-448
-
-
Liu, J.1
Wan, J.2
Wang, Q.3
Zeng, B.4
Fang, S.5
-
66
-
-
84889047783
-
A survey of vision-based vehicle detection and tracking techniques in its
-
Liu, Y., Tian, B., Chen, S., Zhu, F., Wang, K. (2013). A survey of vision-based vehicle detection and tracking techniques in its. In Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES).
-
(2013)
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES)
-
-
Liu, Y.1
Tian, B.2
Chen, S.3
Zhu, F.4
Wang, K.5
-
67
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom).
-
(2000)
Proceedings of the 6Th Annual International Conference on Mobile Computing and Networking (Mobicom)
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
68
-
-
0036096757
-
Review of the use of biosensors as analytical tools in the food and drink industries
-
Mello, L. D., & Kubota, L. T. (2002). Review of the use of biosensors as analytical tools in the food and drink industries. Food Chemistry 77(2), 237–256. http://www.sciencedirect.com/science/article/pii/S0308814602001048.
-
(2002)
Food Chemistry
, vol.77
, Issue.2
, pp. 237-256
-
-
Mello, L.D.1
Kubota, L.T.2
-
70
-
-
79959379104
-
Enabling accurate cross-layer phy/mac/net simulation studies of vehicular communication networks
-
Mittag, J., Papanastasiou, S., Hartenstein, H., & Strom, E. G. (2011). Enabling accurate cross-layer phy/mac/net simulation studies of vehicular communication networks. Proceedings of the IEEE, 99(7), 1311–1326.
-
(2011)
Proceedings of the IEEE
, vol.99
, Issue.7
, pp. 1311-1326
-
-
Mittag, J.1
Papanastasiou, S.2
Hartenstein, H.3
Strom, E.G.4
-
72
-
-
78649440010
-
Notes on dsrc & wave standards suite: Its architecture, design, and characteristics
-
Morgan, Y. L. (2010). Notes on dsrc & wave standards suite: Its architecture, design, and characteristics. IEEE Communications Surveys & Tutorials, 12(4), 504–518.
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.4
, pp. 504-518
-
-
Morgan, Y.L.1
-
73
-
-
84910065329
-
Localized routing approach to bypass holes in wireless sensor networks
-
Mostefaoui, A., Melkemi, M., & Boukerche, A. (2014). Localized routing approach to bypass holes in wireless sensor networks. IEEE Transactions on Computers (TC), 63(12), 3053– 3065.
-
(2014)
IEEE Transactions on Computers (TC)
, vol.63
, Issue.12
, pp. 3053-3065
-
-
Mostefaoui, A.1
Melkemi, M.2
Boukerche, A.3
-
74
-
-
33645667497
-
Image sensors and signal processing for digital still cameras
-
CRC Press
-
Nakamura, J. (2005). Image sensors and signal processing for digital still cameras. In Optical science and engineering: CRC Press.
-
(2005)
Optical Science and Engineering
-
-
Nakamura, J.1
-
75
-
-
34547908169
-
Prediction-based routing for vehicular ad hoc networks
-
Namboodiri, V., & Gao, L. (2007). Prediction-based routing for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology (TV), 56(4), 2332–2345.
-
(2007)
IEEE Transactions on Vehicular Technology (TV)
, vol.56
, Issue.4
, pp. 2332-2345
-
-
Namboodiri, V.1
Gao, L.2
-
76
-
-
0033361589
-
5.8 ghz dsrc packet communication system for its services
-
Oh, H., Yae, C., Ahn, D., & Cho, H. (1999). 5.8 ghz dsrc packet communication system for its services. In Proceedings of IEEE Vehicular Technology Conference.
-
(1999)
Proceedings of IEEE Vehicular Technology Conference
-
-
Oh, H.1
Yae, C.2
Ahn, D.3
Cho, H.4
-
77
-
-
84878455853
-
Focal design issues affecting the deployment of wireless sensor networks for intelligent transport systems
-
Owojaiye, G., & Sun, Y. (2012). Focal design issues affecting the deployment of wireless sensor networks for intelligent transport systems. IET Intelligent Transport Systems, 6(4), 432–432.
-
(2012)
IET Intelligent Transport Systems
, vol.6
, Issue.4
, pp. 432
-
-
Owojaiye, G.1
Sun, Y.2
-
78
-
-
70350244874
-
Cap: A context-aware privacy protection system for location-based services
-
Pingley, A., Yu, W., Zhang, N., Fu, X., & Zhao, W. (2009). Cap: A context-aware privacy protection system for location-based services. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS).
-
(2009)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)
-
-
Pingley, A.1
Yu, W.2
Zhang, N.3
Fu, X.4
Zhao, W.5
-
80
-
-
85044936301
-
Network coding and cross-layer approach for reliability and optimization of routing in vanet: A survey
-
Ratwani, V., & Shah, A. (2015). Network coding and cross-layer approach for reliability and optimization of routing in vanet: A survey. International Journal of Computer Applications, 113(13).
-
(2015)
International Journal of Computer Applications
, vol.113
, Issue.13
-
-
Ratwani, V.1
Shah, A.2
-
81
-
-
85044923156
-
-
Sassi, A., Charfi, F., Kamoun, L., Elhillali, Y., & Rivenq, A. (2014). Ofdm transmission performance evaluation in v2x communication. arXiv:14108039.
-
(2014)
Ofdm Transmission Performance Evaluation in V2x Communication.
-
-
Sassi, A.1
Charfi, F.2
Kamoun, L.3
Elhillali, Y.4
Rivenq, A.5
-
82
-
-
80052486886
-
V2x simulation runtime infrastructure vsimrti: An assessment tool to design smart traffic management systems
-
Schnemann, B. (2016). V2x simulation runtime infrastructure vsimrti: An assessment tool to design smart traffic management systems. Computer Networks, 55(14), 3189–3198.
-
(2016)
Computer Networks
, vol.55
, Issue.14
, pp. 3189-3198
-
-
Schnemann, B.1
-
84
-
-
83755188206
-
A fast path planning algorithm for route guidance system
-
Selamat, A., Zolfpour-Arokhlo, M., Hashim, S., & Selamat, M. (2011). A fast path planning algorithm for route guidance system. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC).
-
(2011)
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC)
-
-
Selamat, A.1
Zolfpour-Arokhlo, M.2
Hashim, S.3
Selamat, M.4
-
87
-
-
85027948452
-
Efficient routing on large road networks using hierarchical communities
-
Song, Q., & Wang, X. (2011). Efficient routing on large road networks using hierarchical communities. IEEE Transactions on Intelligent Transportation Systems, 12(1), 132–140.
-
(2011)
IEEE Transactions on Intelligent Transportation Systems
, vol.12
, Issue.1
, pp. 132-140
-
-
Song, Q.1
Wang, X.2
-
89
-
-
84885965762
-
Survey on security threats and protection mechanisms in embedded automotive networks
-
Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaaniche, M., Laarouchi, Y. (2013). Survey on security threats and protection mechanisms in embedded automotive networks. In Proceedings of 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
-
(2013)
Proceedings of 43Rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)
-
-
Studnia, I.1
Nicomette, V.2
Alata, E.3
Deswarte, Y.4
Kaaniche, M.5
Laarouchi, Y.6
-
90
-
-
84866927956
-
A bi-level optimal control approach to route guidance problem considering travelers’ stochastic compliance
-
Sun, W., Hu, L., Li, P., & Wang, H. (2012). A bi-level optimal control approach to route guidance problem considering travelers’ stochastic compliance. In Proceedings of the of Proceedings of International Conference on Modelling, Identification Control (ICMIC).
-
(2012)
Proceedings of the of Proceedings of International Conference on Modelling, Identification Control (ICMIC)
-
-
Sun, W.1
Hu, L.2
Li, P.3
Wang, H.4
-
91
-
-
84893499381
-
Real-time vehicle route guidance based on connected vehicles
-
Physical and Social Computing
-
Tian, D., Yuan, Y., Zhou, J., Wang, Y., Lu, G., Xia, H. (2013). Real-time vehicle route guidance based on connected vehicles. In Proceedings of IEEE International Conference on and IEEE Cyber, Physical and Social Computing.
-
(2013)
Proceedings of IEEE International Conference on and IEEE Cyber
-
-
Tian, D.1
Yuan, Y.2
Zhou, J.3
Wang, Y.4
Lu, G.5
Xia, H.6
-
92
-
-
84881188558
-
Joint power/rate congestion control optimizing packet reception in vehicle safety communications
-
Tielert, T., Jiang, D., Hartenstein, H., & Delgrossi, L. (2013). Joint power/rate congestion control optimizing packet reception in vehicle safety communications. In Proc. of the tenth ACM international workshop on Vehicular inter-networking, systems, and applications (ACM).
-
(2013)
Proc. of the Tenth ACM International Workshop on Vehicular Inter-Networking, Systems, and Applications (ACM)
-
-
Tielert, T.1
Jiang, D.2
Hartenstein, H.3
Delgrossi, L.4
-
93
-
-
69749093972
-
Vehicle-to-vehicle communication: Fair transmit power control for safety-critical information
-
Torrent-Moreno, M., Mittag, J., Santi, P., & Hartenstein, H. (2009). Vehicle-to-vehicle communication: fair transmit power control for safety-critical information. IEEE Transactions on Vehicular Technology (TVT), 58(7), 3684–3703.
-
(2009)
IEEE Transactions on Vehicular Technology (TVT)
, vol.58
, Issue.7
, pp. 3684-3703
-
-
Torrent-Moreno, M.1
Mittag, J.2
Santi, P.3
Hartenstein, H.4
-
96
-
-
46449099851
-
Route planning based on floyd algorithm for intelligence transportation system
-
Wang, J., Sun, Y., Liu, Z., Yang, P., Lin, T. (2007a). Route planning based on floyd algorithm for intelligence transportation system. In Proceedings of the IEEE International Conference on Integration Technology (ICIT).
-
(2007)
Proceedings of the IEEE International Conference on Integration Technology (ICIT)
-
-
Wang, J.1
Sun, Y.2
Liu, Z.3
Yang, P.4
Lin, T.5
-
97
-
-
40649122297
-
The application of radio frequency identification technology on tires tracking
-
Wang, Y., Wu, Y., Liu, Y., Tang, A. (2007b). The application of radio frequency identification technology on tires tracking. In Proceedings of the 2007 IEEE International Conference on Automation and Logistics.
-
(2007)
Proceedings of the 2007 IEEE International Conference on Automation and Logistics
-
-
Wang, Y.1
Wu, Y.2
Liu, Y.3
Tang, A.4
-
100
-
-
84918801896
-
A cloud computing based system for cyber security management
-
Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., & Lu, C. (2015). A cloud computing based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems (IJPEDS) 30(1), 29–45.
-
(2015)
International Journal of Parallel, Emergent and Distributed Systems (IJPEDS)
, vol.30
, Issue.1
, pp. 29-45
-
-
Xu, G.1
Yu, W.2
Chen, Z.3
Zhang, H.4
Moulema, P.5
Fu, X.6
Lu, C.7
-
101
-
-
14944368943
-
Vehicle-to-vehicle safety messaging in dsrc
-
Xu, Q., Mak, T., Ko, J, Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in dsrc. In Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks.
-
(2004)
Proceedings of the 1St ACM International Workshop on Vehicular Ad Hoc Networks
-
-
Xu, Q.1
Mak, T.2
Ko, J.3
Sengupta, R.4
-
102
-
-
84870811328
-
Intelligent transportation system based on internet of things
-
Y Z, X Z, S Z, s G
-
Y Z, X Z, S Z, s G. (2012). Intelligent transportation system based on internet of things. In Proceedings of World Automation Congress (WAC).
-
(2012)
Proceedings of World Automation Congress (WAC)
-
-
-
103
-
-
84872510520
-
Research and development of intelligent transportation systems
-
Yan, X., Zhang, H., Wu, C. (2012). Research and development of intelligent transportation systems. In Proceedings of 11th International Symposium on Distributed Computing and Applications to Business, Engineering Science (DCABES).
-
(2012)
Proceedings of 11Th International Symposium on Distributed Computing and Applications to Business, Engineering Science (DCABES)
-
-
Yan, X.1
Zhang, H.2
Wu, C.3
-
104
-
-
76549100100
-
Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios
-
Yang, Q., Lim, A., Li, S., Fang, J., & Agrawal, P. (2010). Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios. Mobile Networks and Applications, 15(1), 36–60.
-
(2010)
Mobile Networks and Applications
, vol.15
, Issue.1
, pp. 36-60
-
-
Yang, Q.1
Lim, A.2
Li, S.3
Fang, J.4
Agrawal, P.5
-
105
-
-
84894537318
-
On false data-injection attacks against power system state estimation: Modeling and countermeasures
-
Yang, Q., Yang, J., Yu, W., An, D., Zhang, N., & Zhao, W. (2014). On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed System (TPDS), 25(3), 717–729.
-
(2014)
IEEE Transactions on Parallel and Distributed System (TPDS)
, vol.25
, Issue.3
, pp. 717-729
-
-
Yang, Q.1
Yang, J.2
Yu, W.3
An, D.4
Zhang, N.5
Zhao, W.6
-
106
-
-
84919466772
-
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
-
Yang, X., Lin, J., Yu, W., Moulema, P., Fu, X., & Zhao, W. (2015). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers (TC), 64(1), 4–18.
-
(2015)
IEEE Transactions on Computers (TC)
, vol.64
, Issue.1
, pp. 4-18
-
-
Yang, X.1
Lin, J.2
Yu, W.3
Moulema, P.4
Fu, X.5
Zhao, W.6
-
109
-
-
24344483199
-
Peer-to-peer system-based active worm attacks: Modeling and analysis
-
Yu, W., Boyer, P.C., Chellappan, S., Xuan, D. (2005). Peer-to-peer system-based active worm attacks: Modeling and analysis. In Proceedings of the IEEE International Conference on Communications (ICC).
-
(2005)
Proceedings of the IEEE International Conference on Communications (ICC)
-
-
Yu, W.1
Boyer, P.C.2
Chellappan, S.3
Xuan, D.4
-
110
-
-
39049123320
-
On detecting camouflaging worm
-
Yu, W., Wang, X., Calyam, P., Xuan, D., Zhao, W. (2006). On detecting camouflaging worm. In Proceedings of Annual Computer Security Applications Conference (ACSAC).
-
(2006)
Proceedings of Annual Computer Security Applications Conference (ACSAC)
-
-
Yu, W.1
Wang, X.2
Calyam, P.3
Xuan, D.4
Zhao, W.5
-
111
-
-
77956179239
-
Self-disciplinary worms: Modeling and countermeasures
-
Yu, W., Zhang, N., Fu, X., & Zhao, W. (2010). Self-disciplinary worms: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed Systems (TPDS), 21(10), 1501– 1514.
-
(2010)
IEEE Transactions on Parallel and Distributed Systems (TPDS)
, vol.21
, Issue.10
, pp. 1501-1514
-
-
Yu, W.1
Zhang, N.2
Fu, X.3
Zhao, W.4
-
112
-
-
84893536420
-
A cloud computing based architecture for cyber security situation awareness
-
Yu, W., Xu, G., Chen, Z., & Moulema, P. (2013). A cloud computing based architecture for cyber security situation awareness. In: Proceedings of 4th International Workshop on Security and Privacy in Cloud Computing (SPCC).
-
(2013)
Proceedings of 4Th International Workshop on Security and Privacy in Cloud Computing (SPCC)
-
-
Yu, W.1
Xu, G.2
Chen, Z.3
Moulema, P.4
-
113
-
-
85013480688
-
Towards energy efficiency in ultra dense networks
-
Yu, W., Xu, H., Hematian, A., Griffith, D., & Golmie, N. (2016a). Towards energy efficiency in ultra dense networks. In Proceedings of IEEE International Performance Computing and Communications Conference (IPCCC).
-
(2016)
Proceedings of IEEE International Performance Computing and Communications Conference (IPCCC)
-
-
Yu, W.1
Xu, H.2
Hematian, A.3
Griffith, D.4
Golmie, N.5
-
114
-
-
84991794228
-
Ultra dense networks: State of art and future directions
-
Yu, W., Xu, H., Zhang, H., Griffith, D., & Golmie, N. (2016b). Ultra dense networks: State of art and future directions. In Proceedings of IEEE International Conference on Computer Communication and Networks (ICCCN).
-
(2016)
Proceedings of IEEE International Conference on Computer Communication and Networks (ICCCN)
-
-
Yu, W.1
Xu, H.2
Zhang, H.3
Griffith, D.4
Golmie, N.5
-
115
-
-
82455210975
-
Data-driven intelligent transportation systems: A survey
-
Zhang, J., Wang, F. Y., Wang, K., Lin, W. H., Xu, X., & Chen, C. (2011). Data-driven intelligent transportation systems: A survey. IEEE Transactions on Intelligent Transportation Systems, 12(4), 1624–1639.
-
(2011)
IEEE Transactions on Intelligent Transportation Systems
, vol.12
, Issue.4
, pp. 1624-1639
-
-
Zhang, J.1
Wang, F.Y.2
Wang, K.3
Lin, W.H.4
Xu, X.5
Chen, C.6
-
116
-
-
84878908141
-
Traffic routing guidance algorithm based on backpressure with a trade-off between user satisfaction and traffic load
-
VTC Fall
-
Zhang, R., Li, Z., Feng, C., & Jiang, S. (2012). Traffic routing guidance algorithm based on backpressure with a trade-off between user satisfaction and traffic load. In Proceedings of IEEE Vehicular Technology Conference (VTC Fall).
-
(2012)
Proceedings of IEEE Vehicular Technology Conference
-
-
Zhang, R.1
Li, Z.2
Feng, C.3
Jiang, S.4
-
117
-
-
44849121977
-
Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks
-
Zhao, J., & Cao, G. (2008). Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks. IEEE transactions on vehicular technology (TVT), 57(3), 1910–1922.
-
(2008)
IEEE Transactions on Vehicular Technology (TVT)
, vol.57
, Issue.3
, pp. 1910-1922
-
-
Zhao, J.1
Cao, G.2
-
120
-
-
84879212186
-
A loose virtual clustering based routing for power heterogeneous manets
-
Zhao, P., Yang, X., Yu, W., & Fu, X. (2013). A loose virtual clustering based routing for power heterogeneous manets. IEEE Transactions on Vehicular Technology (TVT), 62(5), 2290–2302.
-
(2013)
IEEE Transactions on Vehicular Technology (TVT)
, vol.62
, Issue.5
, pp. 2290-2302
-
-
Zhao, P.1
Yang, X.2
Yu, W.3
Fu, X.4
-
121
-
-
84944096310
-
Design and verification for transportation system security
-
Zheng, B., Li, W., Deng, P., Grardy, L., Zhu, Q., Shankar, N. (2015a). Design and verification for transportation system security. In Proceedings of 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
-
(2015)
Proceedings of 52Nd ACM/EDAC/IEEE Design Automation Conference (DAC)
-
-
Zheng, B.1
Li, W.2
Deng, P.3
Grardy, L.4
Zhu, Q.5
Shankar, N.6
-
122
-
-
84967108842
-
Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions
-
Zheng, K., Zheng, Q., Chatzimisios, P., Xiang, W., & Zhou, Y. (2015b). Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions. IEEE Communications Surveys & Tutorials, 17(4), 2377–2396.
-
(2015)
IEEE Communications Surveys & Tutorials
, vol.17
, Issue.4
, pp. 2377-2396
-
-
Zheng, K.1
Zheng, Q.2
Chatzimisios, P.3
Xiang, W.4
Zhou, Y.5
-
123
-
-
0346752334
-
Mac for dedicated short range communications in intelligent transport system
-
Zhu, J., & Roy, S. (2003). Mac for dedicated short range communications in intelligent transport system. IEEE Communications Magazine, 41(12), 60–67.
-
(2003)
IEEE Communications Magazine
, vol.41
, Issue.12
, pp. 60-67
-
-
Zhu, J.1
Roy, S.2
|