Estimating the cardinality of a mobile peer-to-peer network (Englisch)
- Neue Suche nach: Chen, Shiping
- Neue Suche nach: Chen, Shiping
In:
IEEE journal on selected areas in communications
;
31
, 9
; 359-368
;
2013
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Estimating the cardinality of a mobile peer-to-peer network
-
Beteiligte:Chen, Shiping ( Autor:in )
-
Erschienen in:IEEE journal on selected areas in communications ; 31, 9 ; 359-368
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsort:New York, NY
-
Erscheinungsdatum:2013
-
ISSN:
-
ZDBID:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 53.00
- Weitere Informationen zu Basisklassifikation
- Neue Suche nach: 770/5650
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 31, Ausgabe 9
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Emerging technologies in communicationsOhta, Naohisa / Takahara, Atsushi / Jajszczyk, Andrzej / Saracco, Roberto et al. | 2013
- 6
-
mHealth Technologies for Chronic Diseases and Elders: A Systematic ReviewChiarini, Giovanni / Ray, Pradeep / Akter, Shahriar / Masella, Cristina / Ganz, Aura et al. | 2013
- 19
-
m-Carer: Privacy-Aware Monitoring for People with Mild Cognitive Impairment and DementiaSolanas, Agusti / Martinez-Balleste, Antoni / Perez-Martinez, Pablo A. / Pena, Albert Fernandez de la / Ramos, Javier et al. | 2013
- 28
-
A Novel Cooperation Strategy for Mobile Health ApplicationsSilva, Bruno M. C. / Rodrigues, Joel J. P. C. / Lopes, Ivo M. C. / Machado, Tiago M. F. / Zhou, Liang et al. | 2013
- 37
-
Body Area Network Security: A Fuzzy Attribute-Based Signcryption SchemeHu, Chunqiang / Zhang, Nan / Li, Hongjuan / Cheng, Xiuzhen / Liao, Xiaofeng et al. | 2013
- 47
-
Interconnection Framework for mHealth and Remote Monitoring Based on the Internet of ThingsJara, Antonio J. / Zamora-Izquierdo, Miguel A. / Skarmeta, Antonio F. et al. | 2013
- 66
-
Accelerating Peer-to-Peer File Sharing with Social RelationsHaiyang Wang, / Feng Wang, / Jiangchuan Liu, / Chuang Lin, / Ke Xu, / Chonggang Wang, et al. | 2013
- 75
-
EMD: Energy-Efficient P2P Message Dissemination in Delay-Tolerant Wireless Sensor and Actor NetworksShibo He, / Xu Li, / Jiming Chen, / Peng Cheng, / Youxian Sun, / Simplot-Ryl, D. et al. | 2013
- 85
-
A Scalable Vehicular Network Architecture for Traffic Information SharingJiazhen Zhou, / Hu, R. Q. / Yi Qian, et al. | 2013
- 94
-
On the Impact of Incentives in eMule {Analysis and Measurements of a Popular File-Sharing Application}Carra, D. / Michiardi, P. / Salah, H. / Strufe, T. et al. | 2013
- 105
-
Preventing Piracy Content Propagation in Peer-to-Peer NetworksHongli Zhang, / Lin Ye, / Jiantao Shi, / Xiaojiang Du, / Hsiao-Hwa Chen, et al. | 2013
- 115
-
Self-Adaptive Context Data Distribution with Quality Guarantees in Mobile P2P NetworksFanelli, Mario / Foschini, Luca / Corradi, Antonio / Boukerche, Azzedine et al. | 2013
- 132
-
Inter-Swarm Content Distribution Among Private BitTorrent NetworksChengchen Hu, / Danfeng Shan, / Yu Cheng, / Tao Qin, et al. | 2013
- 142
-
Packet Loss Recovery Scheme with Uniquely-Decodable Codes for Streaming Multimedia over P2P NetworksYu, Qi-Yue / Meng, Wei-Xiao / Lin, Shu et al. | 2013
- 155
-
Celerity: A Low-Delay Multi-Party Conferencing SolutionXiangwen Chen, / Minghua Chen, / Baochun Li, / Yao Zhao, / Yunnan Wu, / Jin Li, et al. | 2013
- 165
-
Waterfall: Video Distribution by Cascading Multiple SwarmsKunwoo Park, / Junghoon Kim, / Kideok Cho, / Kwon, T. T. / Choi, Y. / Pack, S. et al. | 2013
- 175
-
On Characterizing Peer-to-Peer Streaming TrafficJie Yang, / Lun Yuan, / Chao Dong, / Gang Cheng, / Ansari, N. / Kato, N. et al. | 2013
- 189
-
Performance Investigation on Request Collisions in Peer-To-Peer Live Streaming Systems: Problems and AlgorithmsChen, Yishuai / Zhang, Baoxian / Chen, Changjia / Meng, Weixiao / Li, Cheng et al. | 2013
- 200
-
Optimal Rate Allocation for P2P Video StreamingLima, Livio / Dalai, Marco / Leonardi, Riccardo / Migliorati, Pierangelo / Bernardini, Riccardo / Rinaldo, Roberto et al. | 2013
- 214
-
Cinematic-Quality VoD in a P2P Storage Cloud: Design, Implementation and MeasurementsFangming Liu, / Shijun Shen, / Bo Li, / Baochun Li, / Hai Jin, et al. | 2013
- 227
-
Effective Utilization of User Resources in PA-VoD Systems with Channel HeterogeneityLe Chang, / Jianping Pan, / Min Xing, et al. | 2013
- 237
-
LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer NetworksLin, Xiaodong et al. | 2013
- 247
-
THUP: A P2P Network Robust to Churn and DoS Attack Based on Bimodal Degree DistributionSuto, K. / Nishiyama, H. / Kato, N. / Nakachi, T. / Fujii, T. / Takahara, A. et al. | 2013
- 257
-
Privacy-Preserving Energy Theft Detection in Smart Grids: A P2P Computing ApproachSalinas, Sergio / Li, Ming / Li, Pan et al. | 2013
- 268
-
Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing SystemsRui Zhang, / Jing Shi, / Yanchao Zhang, / Chi Zhang, et al. | 2013
- 279
-
Efficient Trust Based Information Sharing Schemes over Distributed Collaborative NetworksLin, Huang / Zhu, Xiaoyan / Fang, Yugang / Xing, Dongsheng / Zhang, Chi / Cao, Zhenfu et al. | 2013
- 291
-
TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network CodingChi Cheng, / Tao Jiang, / Qian Zhang, et al. | 2013
- 299
-
A Naming Scheme for P2P Web HostingBari, Md. Faizul / Haque, Md. Rakibul / Ahmed, Reaz / Boutaba, Raouf / Mathieu, Bertrand et al. | 2013
- 310
-
Automatic and Autonomous Load Management in Peer-to-Peer Virtual EnvironmentsAlmashor, Mahathir / Khalil, Ibrahim / Tari, Zahir / Zomaya, Albert Y. et al. | 2013
- 325
-
Call for papers| 2013
- 326
-
Providing Fast Channel Switching in P2P IPTV SystemsManzato, Daniel A. G. / Fonseca, Nelson L. S. da et al. | 2013
- 338
-
A Measurement Study on the Topologies of BitTorrent NetworksSu, Majing / Zhang, Hongli / Du, Xiaojiang / Fang, Binxing / Guizani, Mohsen et al. | 2013
- 348
-
Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based ApproachXu, Chen / Song, Lingyang / Han, Zhu / Zhao, Qun / Wang, Xiaoli / Cheng, Xiang / Jiao, Bingli et al. | 2013
- 359
-
Estimating the Cardinality of a Mobile Peer-to-Peer NetworkShiping Chen, / Yan Qiao, / Shigang Chen, / Jianfeng Li, et al. | 2013
- 369
-
Opportunistic Routing in Intermittently Connected Mobile P2P NetworksWang, Shengling / Liu, Min / Cheng, Xiuzhen / Li, Zhongcheng / Huang, Jianhui / Chen, Biao et al. | 2013
- 379
-
THash: A Practical Network Optimization Scheme for DHT-based P2P ApplicationsSun, Yi / Yang, Y. Richard / Zhang, Xiaobing / Guo, Yang / Li, Jun / Salamatian, Kave et al. | 2013
- 391
-
Coding-Aware Peer-to-Peer Data Repair in Multi-Rate Wireless Networks: A Game Theoretic AnalysisLu, Hsiao-Chen / Liao, Wanjiun / Chen, Meng Chang / Alhussein, Musaed A. et al. | 2013
- 399
-
Vehicular Communications Using DSRC: Challenges, Enhancements, and EvolutionXinzhou Wu, / Subramanian, S. / Guha, R. / White, R. G. / Junyi Li, / Lu, K. W. / Bucceri, A. / Tao Zhang, et al. | 2013
- 409
-
IEEE 802.11p Based Vehicular Networking Operational Pilot Field MeasurementSukuvaara, Timo / Ylitalo, Riika / Katz, Marcos et al. | 2013
- 418
-
Intervehicle Communication: Cox-Fox ModelingYoungmin Jeong, / Jo Woon Chong, / Hyundong Shin, / Win, M. Z. et al. | 2013
- 434
-
Wideband Channel Modeling and Intercarrier Interference Cancellation for Vehicle-to-Vehicle Communication SystemsXiang Cheng, / Qi Yao, / Miaowen Wen, / Cheng-Xiang Wang, / Ling-Yang Song, / Bing-Li Jiao, et al. | 2013
- 449
-
A Roadside Scattering Model for the Vehicle-to-Vehicle Communication ChannelLin Cheng, / Stancil, D. D. / Fan Bai, et al. | 2013
- 460
-
Compressive Sensing Based Time Domain Synchronous OFDM Transmission for Vehicular CommunicationsLinglong Dai, / Zhaocheng Wang, / Zhixing Yang, et al. | 2013
- 470
-
CAH-MAC: Cooperative ADHOC MAC for Vehicular NetworksBharati, S. / Weihua Zhuang, et al. | 2013
- 480
-
Persistent Localized Broadcasting in VANETsFiore, M. / Casetti, C. / Chiasserini, C. / Borsetti, D. et al. | 2013
- 491
-
Analytic Design of Active Safety Systems for Vehicular Ad hoc NetworksNekoui, M. / Pishro-Nik, H. et al. | 2013
- 504
-
Dynamic Traffic Control with Fairness and Throughput Optimization Using Vehicular CommunicationsLien-Wu Chen, / Sharma, P. / Yu-Chee Tseng, et al. | 2013
- 513
-
A Holistic Approach to Service Delivery in Driver-in-the-Loop Vehicular CPSXu Li, / Chunming Qiao, / Wagh, A. / Sudhaakar, R. / Addepalli, S. / Changxu Wu, / Sadek, A. et al. | 2013
- 523
-
Secure Cooperative Data Downloading in Vehicular Ad Hoc NetworksYong Hao, / Jin Tang, / Yu Cheng, et al. | 2013
- 538
-
Dynamic Popular Content Distribution in Vehicular Networks using Coalition Formation GamesTianyu Wang, / Lingyang Song, / Zhu Han, / Bingli Jiao, et al. | 2013
- 548
-
From Technological Networks to Social NetworksKwang-Cheng Chen, / Mung Chiang, / Poor, H. V. et al. | 2013
- 573
-
Scaling Laws for Connectivity in Random Threshold Graph Models with Non-Negative Fitness VariablesMakowski, A. M. / Yagan, O. et al. | 2013
- 584
-
Understanding Evolution of Inter-Group Relationships Using Bipartite NetworksGhosh, S. / Saha, S. / Srivastava, A. / Krueger, T. / Ganguly, N. / Mukherjee, A. et al. | 2013
- 595
-
The Role of Persistent Graphs in the Agreement Seeking of Social NetworksGuodong Shi, / Johansson, K. H. et al. | 2013
- 607
-
Incentive Provision and Job Allocation in Social Cloud SystemsYu Zhang, / van der Schaar, M. et al. | 2013
- 618
-
Identifying Leaders and Followers in Online Social NetworksShafiq, M. Z. / Ilyas, M. U. / Liu, A. X. / Radha, H. et al. | 2013
- 629
-
A Distributed Algorithm for Identifying Information Hubs in Social NetworksIlyas, M. U. / Shafiq, M. Z. / Liu, A. X. / Radha, H. et al. | 2013
- 641
-
Fully Anonymous Profile Matching in Mobile Social NetworksXiaohui Liang, / Xu Li, / Kuan Zhang, / Rongxing Lu, / Xiaodong Lin, / Xuemin Shen, et al. | 2013
- 656
-
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social NetworkingRui Zhang, / Jinxue Zhang, / Yanchao Zhang, / Jinyuan Sun, / Guanhua Yan, et al. | 2013
- 669
-
ConSub: Incentive-Based Content Subscribing in Selfish Opportunistic Mobile NetworksHuan Zhou, / Jiming Chen, / Jialu Fan, / Yuan Du, / Das, S. K. et al. | 2013
- 1657
-
Guest Editorial: Signal Processing for Wireless Physical Layer Security}Jorswieck, Eduard / Lai, Lifeng / Ma, Wing-Kin / Poor, H. Vincent / Saad, Walid / Swindlehurst, A. Lee et al. | 2013
- 1660
-
Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential MessagesGeraci, G. / Couillet, R. / Jinhong Yuan, / Debbah, M. / Collings, I. B. et al. | 2013
- 1672
-
Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference ChannelHo, Z. / Jorswieck, E. / Engelmann, S. et al. | 2013
- 1687
-
Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix IndicesChih-Yao Wu, / Pang-Chang Lan, / Ping-Cheng Yeh, / Chia-Han Lee, / Chen-Mou Cheng, et al. | 2013
- 1701
-
On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast ChannelFakoorian, S. A. A. / Swindlehurst, A. L. et al. | 2013
- 1714
-
Transmit Solutions for MIMO Wiretap Channels using Alternating OptimizationQiang Li, / Mingyi Hong, / Hoi-To Wai, / Ya-Feng Liu, / Wing-Kin Ma, / Zhi-Quan Luo, et al. | 2013
- 1728
-
On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap ChannelsPin-Hsun Lin, / Szu-Hsiang Lai, / Shih-Chun Lin, / Hsuan-Jung Su, et al. | 2013
- 1741
-
On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative JammingKi-Hong Park, / Tian Wang, / Alouini, Mohamed-Slim et al. | 2013
- 1751
-
Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy OutageTzu-Han Chou, / Draper, S. C. / Sayeed, A. M. et al. | 2013
- 1765
-
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy FeedbackSalimi, S. / Skoglund, M. / Golic, J. D. / Salmasizadeh, M. / Aref, M. R. et al. | 2013
- 1779
-
Secure Key Generation in Sensor Networks Based on Frequency-Selective ChannelsWilhelm, M. / Martinovic, I. / Schmitt, J. B. et al. | 2013
- 1791
-
Wireless User Authentication via Comparison of Power Spectral DensitiesTugnait, J. K. et al. | 2013
- 1803
-
BANA: Body Area Network Authentication Exploiting Channel CharacteristicsLu Shi, / Ming Li, / Shucheng Yu, / Jiawei Yuan, et al. | 2013
- 1817
-
PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless NetworksShan, D. / Kai Zeng, / Weidong Xiang, / Richardson, P. / Yan Dong, et al. | 2013
- 1828
-
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's ReceiverSheikholeslami, A. / Goeckel, D. / Pishro-Nik, H. et al. | 2013
- 1840
-
Exploiting Partial Channel State Information for Secrecy over Wireless ChannelsBloch, M. R. / Laneman, J. N. et al. | 2013
- 1850
-
On the Resilience of Wireless Multiuser Networks to Passive and Active EavesdroppersChorti, A. / Perlaza, S. M. / Zhu Han, / Poor, H. V. et al. | 2013
- 1864
-
Waveform Design for Secure SISO Transmissions and MulticastingMing Li, / Kundu, S. / Pados, D. A. / Batalama, S. N. et al. | 2013
- 1875
-
Intrinsic Information of Wideband ChannelsYuan Shen, / Win, M. Z. et al. | 2013
- 1889
-
Distributed Network SecrecyLee, J. / Conti, A. / Rabbachin, A. / Win, M. Z. et al. | 2013
- 1901
-
Polar Coding for Bidirectional Broadcast Channels with Common and Confidential MessagesAndersson, M. / Schaefer, R. F. / Oechtering, T. J. / Skoglund, M. et al. | 2013
- 1909
-
Secrecy Capacity per Unit CostEl-Halabi, M. / Tie Liu, / Georghiades, C. N. et al. | 2013
- 1921
-
Limits of Reliable Communication with Low Probability of Detection on AWGN ChannelsBash, B. A. / Goeckel, D. / Towsley, D. et al. | 2013
- 1931
-
Sum Secure Degrees of Freedom of Two-Unicast Layered Wireless NetworksJianwei Xie, / Ulukus, S. et al. | 2013
- 1944
-
Achieving Full Secrecy Rate with Low Packet Delays: An Optimal Control ApproachZhoujia Mao, / Koksal, C. E. / Shroff, N. B. et al. | 2013
- 1957
-
Admissible Length Study in Anonymous Networking: A Detection Theoretic PerspectiveMishra, A. / Venkitasubramaniam, P. et al. | 2013
- 1973
-
Authors Information| 2013
- 1974
-
Open Access| 2013
- c1
-
Table of contents| 2013
- c2
-
Staff list| 2013