Works (97)

Updated: October 12th, 2025 05:03

2025 article

Synergizing Acoustic and Wi-Fi Signals for Device-Free Gesture Recognition

Li, M., & Wang, W. (2025, April 14). IEEE Transactions on Mobile Computing, Vol. 24, pp. 8167–8179.

By: M. Li n & W. Wang n

author keywords: Acoustics; Wireless fidelity; Sensors; Gesture recognition; Accuracy; Feature extraction; Fresnel reflection; Time-frequency analysis; Frequency measurement; Chirp; Acoustic; Wi-Fi; gesture recognition
topics (OpenAlex): Hand Gesture Recognition Systems; Hearing Impairment and Communication
Sources: Web Of Science, NC State University Libraries
Added: August 25, 2025

2025 article

mSAC: Enhancing Localization with mmWave Sensing and Orthogonal Signals

Li, M., Zhu, H., Wang, W., & Ekici, E. (2025, May 19). IEEE INFOCOM 2025-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS.

By: M. Li n, H. Zhu*, W. Wang n & E. Ekici*

author keywords: Millimeter wave radar; Orthogonal frequency-division multiplexing (OFDM); Integrated sensing and communication (ISAC); Wireless sensing
topics (OpenAlex): Plant Pathogenic Bacteria Studies; Infections and bacterial resistance; Escherichia coli research studies
Sources: Web Of Science, NC State University Libraries
Added: October 7, 2025

2024 article

Effi-Ace: Efficient and Accurate Prediction for High-Resolution Spectrum Tenancy

Zou, R., & Wang, W. (2024, May 20). IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, pp. 2199–2208.

By: R. Zou n & W. Wang n

topics (OpenAlex): Telecommunications and Broadcasting Technologies; Sparse and Compressive Sensing Techniques
Sources: Web Of Science, NC State University Libraries
Added: November 4, 2024

2024 article

FLuMe: Understanding Differential Spectrum Mobility Features in High Resolution

Zou, R., & Wang, W. (2024, August 13). IEEE Transactions on Mobile Computing, Vol. 23, pp. 14186–14200.

By: R. Zou n & W. Wang n

author keywords: Data driven model; data resolution; LTE; spectrum tenancy; Data driven model; data resolution; LTE; spectrum tenancy
topics (OpenAlex): Advanced MIMO Systems Optimization; Advanced Wireless Network Optimization; Wireless Networks and Protocols
Sources: Web Of Science, NC State University Libraries
Added: December 16, 2024

2024 article

Hybrid Zone: Bridging Acoustic and Wi-Fi for Enhanced Gesture Recognition

Li, M., & Wang, W. (2024, May 20). IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, pp. 981–990.

By: M. Li n & W. Wang n

author keywords: Acoustic; Wi-Fi; Gesture recognition
topics (OpenAlex): Indoor and Outdoor Localization Technologies; Speech and Audio Processing; Hand Gesture Recognition Systems
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: November 4, 2024

2023 article

Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog

Wang, J., Wang, W., & Wang, C. (2023, February 16). IEEE Internet of Things Journal, Vol. 10, pp. 11669–11682.

By: J. Wang*, W. Wang n & C. Wang n

author keywords: Task analysis; Internet of Things; Edge computing; Gravity; Delays; Computational modeling; Performance evaluation; Fog computing; performance evaluation; task offloading
topics (OpenAlex): IoT and Edge/Fog Computing; Age of Information Optimization; Context-Aware Activity Recognition Systems
TL;DR: Simulation results show that the proposed gravity model can flexibly describe different offloading schemes in terms of application and node-level behavior, and finds that the expected lifetime and device effort of individual tasks decrease as the network effort decreases over the network size. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 7, 2023

2023 article

TOP: Total Occupancy Guided Prediction of Binary Spectrum Tenancy

Zou, R., & Wang, W. (2023, May 28). ICC 2023 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, pp. 4597–4602.

By: R. Zou n & W. Wang n

author keywords: spectrum tenancy prediction; dynamic spectrum access; data granularity
topics (OpenAlex): Advanced MIMO Systems Optimization; Millimeter-Wave Propagation and Modeling; Wireless Networks and Protocols
TL;DR: This work analytically and numerically shows that the two key assumptions justifying the superior performance of TOP are valid, and significantly improves MLP accuracy from 0.84 to 0.91, outperforming many state-of-the-art prediction schemes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: March 4, 2024

2023 article

The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

Fei, T., & Wang, W. (2023, March 22). Computer Networks, Vol. 228.

By: T. Fei n & W. Wang n

author keywords: Long-term evolution (LTE); Authentication protocol; Analysis and verification
topics (OpenAlex): Advanced Authentication Protocols Security; User Authentication and Security Systems; Wireless Body Area Networks
TL;DR: An enhanced AKA protocol is proposed that essentially relies on the asymmetric encryption rather than symmetric in the AKA protocol, and additional digital signatures to countermeasure these attacks and to mitigate the newly found vulnerabilities through formal verification. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 15, 2023

2023 article

Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments

Wang, J., Pambudi, S. A., Wang, W., & Wang, C. (2023, April 3). IEEE Transactions on Wireless Communications, Vol. 22, pp. 8320–8335.

By: J. Wang*, S. Pambudi n, W. Wang n & C. Wang n

author keywords: Cloud access; mobile ad-hoc network (MANET); performance evaluation
topics (OpenAlex): IoT and Edge/Fog Computing; Opportunistic and Delay-Tolerant Networks; Cloud Computing and Resource Management
TL;DR: A packet mobility model is established that allows CAD and energy consumption to be analyzed as a function of the initial device-cloudlet distance, and it is found that the expected CAD scales either linearly or quadratically under distinct types of packet mobility. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: January 16, 2024

2021 article

Downlink Decoding Based Accurate Measurement of LTE Spectrum Tenancy

Zou, R., & Wang, W. (2021, November 8). IEEE Transactions on Mobile Computing, Vol. 22, pp. 2613–2627.

By: R. Zou n & W. Wang n

author keywords: Long Term Evolution; Downlink; Time measurement; Sensors; Reactive power; Frequency measurement; Uplink; LTE; dynamic spectrum access; measurements; software defined radio; test bed; modeling
topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Advanced MIMO Systems Optimization; Wireless Networks and Protocols
TL;DR: This work builds U-CIMAN to UnCover spectrum occupancy and user Information in Mobile Access Networks and proposes to characterize LTE spectrum occupancy using Vector Autoregression that captures the statistical distributions of spectrum tenancy intervals in multiple channels and the correlations among them. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 30, 2023

2021 article

Temporal and Spectral Analysis of Spectrum Hole Distributions in an LTE Cell

Zou, R., Wang, W., & Dai, H. (2021, December 1). 2021 IEEE Global Communications Conference (GLOBECOM).

By: R. Zou n, W. Wang n & H. Dai n

author keywords: dynamic spectrum access; spectrum hole distribution; measurement granularity; power law
topics (OpenAlex): Advanced MIMO Systems Optimization; Advanced Wireless Network Optimization; Wireless Communication Networks Research
TL;DR: This work analyzes the spectrum hole distributions in fine resolutions along both the temporal and the spectral dimensions, and investigates the performance of two widely used spectrum tenancy models, the Markov and the on/off models, in terms of their capabilities on capturing the distributions of spectrum holes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 23, 2022

2020 article

Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection

Wang, J., Wang, W., Wang, C., & Song, M. (2020, October 21). IEEE Transactions on Mobile Computing, Vol. 5, pp. 1829–1846.

By: J. Wang n, W. Wang n, C. Wang* & M. Song*

author keywords: Synthetic aperture sonar; Surveillance; Switches; Bandwidth; Wireless fidelity; Analytical models
topics (OpenAlex): Internet Traffic Analysis and Secure E-voting; Cognitive Radio Networks and Spectrum Sensing; Network Security and Intrusion Detection
TL;DR: This work introduces a three-factor space, composed of spectrum, time, and geographic region, over which the SAS problem is formulated by a two-step solution: 3D-tessellation for sweep (monitoring) coverage and graph walk for detecting spectrum culprits, that is, devices responsible for unauthorized spectrum occupancy. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: April 14, 2022

2019 article

Message coverage maximization in infrastructure-based urban vehicular networks

Jalooli, A., Song, M., & Wang, W. (2019, February 11). Vehicular Communications, Vol. 16, pp. 1–14.

By: A. Jalooli*, M. Song* & W. Wang n

author keywords: Vehicular ad-hoc network; Vehicle-to-vehicle; Roadside unit; Safety applications; Traffic efficiency; Intelligent transportation systems
topics (OpenAlex): Vehicular Ad Hoc Networks (VANETs); Opportunistic and Delay-Tolerant Networks; Human Mobility and Location-Based Analysis
TL;DR: This paper develops a message coverage maximization algorithm (MCMA) that carefully deploys the roadside units to achieve the maximum message coverage and demonstrates that MCMA improves traffic efficiency in a post-crash scenario. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: April 22, 2019

2019 article

Resilience of IoT Systems Against Edge-Induced Cascade-of-Failures: A Networking Perspective

Wang, J., Pambudi, S., Wang, W., & Song, M. (2019, April 24). IEEE Internet of Things Journal, Vol. 6, pp. 6952–6963.

By: J. Wang n, S. Pambudi n, W. Wang n & M. Song*

author keywords: Interdependent networks; Internet of Things (IoT) architecture; network resilience
topics (OpenAlex): Infrastructure Resilience and Vulnerability Analysis; Complex Network Analysis Techniques; Smart Grid Security and Resilience
TL;DR: Resilience of an IoT system is quantified by two new metrics, the critical edge disconnecting probability and the maximum intensity of random failures the system can withstand, which are derived for IoT systems with Poisson degree distributions. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 26, 2019

2017 article

Detection of Infections Using Graph Signal Processing in Heterogeneous Networks

Hosseinalipour, S., Wang, J., Dai, H., & Wang, W. (2017, December 1). Globecom 2017 - 2017 Ieee Global Communications Conference.

By: S. Hosseinalipour n, J. Wang n, H. Dai n & W. Wang n

topics (OpenAlex): Complex Network Analysis Techniques; Advanced Graph Neural Networks; Network Security and Intrusion Detection
TL;DR: This paper focuses on infection detection in heterogeneous networks and model the network situation as a graph signal based on the nodes' status, which helps distinguish between random failures and epidemic scenarios. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 article

From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks

Pambudi, S. A., Wang, W., & Wang, C. (2017, December 1). Globecom 2017 - 2017 Ieee Global Communications Conference.

By: S. Pambudi n, W. Wang n & C. Wang*

topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Complex Network Analysis Techniques; Mobile Ad Hoc Networks
TL;DR: A maximum isolation time is introduced that quantifies the steps needed until the last node is isolated by the cascades, and it is shown that it scales non-monotonically to the fraction of initial survivors (non-failure nodes) and increases logarithmically with the network size. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 article

How Durable and Stable Is a File Sharing on the Move in Cellular-Assisted D2D Communications?

Wang, Y., Wang, W., & Song, M. (2017, December 1). Globecom 2017 - 2017 Ieee Global Communications Conference.

By: Y. Wang n, W. Wang n & M. Song*

topics (OpenAlex): Advanced MIMO Systems Optimization; Cooperative Communication and Network Coding; Advanced Wireless Communication Technologies
TL;DR: Both theoretical and simulation results suggest that D2D file sharing is more benefit for popular content among group moving users with longer service lifetime and distance and less delay caused by mobile user handover and peer discovery. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 article

Modeling and Strategy Design for Spectrum Monitoring over a Geographical Region

Wang, J., Wang, W., & Wang, C. (2017, December 1). Globecom 2017 - 2017 Ieee Global Communications Conference.

By: J. Wang n, W. Wang n & C. Wang*

topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Advanced MIMO Systems Optimization; Wireless Networks and Protocols
TL;DR: The dimension of geographical space is introduced into the spectrum monitoring problem, and deployment strategies of multiple monitors are studied, in terms of coverage time and cost. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 article

On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid

Wei, M., Lu, Z., & Wang, W. (2017, November 7). IEEE Systems Journal, Vol. 12, pp. 3404–3413.

By: M. Wei*, Z. Lu* & W. Wang n

author keywords: Communication networks; computer networks; cyber-physical systems; power system faults; power system protection; smart grids
topics (OpenAlex): Smart Grid Security and Resilience; Smart Grid Energy Management; Power Line Communications and Noise; Software-Defined Networks and 5G; Opportunistic and Delay-Tolerant Networks
TL;DR: It is found that information dissemination is not always the winner in the race against fault propagation, and an innovative framework is built, the cascading failure with communications framework, to consolidate both communication networks and power grids. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: December 10, 2018

2017 article

On modeling and understanding vehicle evacuation attacks in VANETs

Wei, M., Lu, Z., & Wang, W. (2017, May 1). 2017 Ieee International Conference on Communications (Icc).

By: M. Wei*, Z. Lu* & W. Wang n

topics (OpenAlex): Vehicular Ad Hoc Networks (VANETs); Opportunistic and Delay-Tolerant Networks; Mobile Ad Hoc Networks
TL;DR: This study demonstrates that there exists a linear relationship between the delay of message dissemination and the impact of the vehicle evacuation attack, which can be used as a guideline on security, reliability, and safety design in real-world VANETs. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2016 article

A Locality-Based Mobile Caching Policy for D2D-Based Content Sharing Network

Wang, Y., Li, Y., Wang, W., & Song, M. (2016, December 1). 2016 Ieee Global Communications Conference (Globecom).

By: Y. Wang n, Y. Li n, W. Wang n & M. Song*

topics (OpenAlex): Caching and Content Delivery; Opportunistic and Delay-Tolerant Networks; Cooperative Communication and Network Coding
TL;DR: This paper aims to design a caching policy by considering the joint impact of locality of real-world mobile data traffic and device contact pattern to improve the success rate of content fetching and derive the content caching probability and hit ratio through mathematical analysis. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2016 article

Data-centric threats and their impacts to real-time communications in smart grid

Wei, M., & Wang, W. (2016, May 11). Computer Networks, Vol. 104, pp. 174–188.

By: M. Wei n & W. Wang n

author keywords: Smart grid; Cyber security; Co-simulation
topics (OpenAlex): Smart Grid Security and Resilience; Network Security and Intrusion Detection; Security and Verification in Computing
TL;DR: The impacts of data-centric attacks in the real-time communication network of smart gird are studied, and further the consequences caused to the power grid are studied. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics

Wang, J., Wang, W., & Wang, C. (2016, December 1). 2016 Ieee Global Communications Conference (Globecom).

By: J. Wang n, W. Wang n & C. Wang*

topics (OpenAlex): Complex Network Analysis Techniques; Opportunistic and Delay-Tolerant Networks; Opinion Dynamics and Social Influence
TL;DR: This paper analytically relate the extinction time of the virus to the diameter and giant component size of the remaining graph after the initial antidote distribution, taking topological characteristics of the underlying graph into consideration. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

Dominoes with communications: On characterizing the progress of cascading failures in Smart Grid

Wei, M., Lu, Z., & Wang, W. (2016, May 1). 2016 Ieee International Conference on Communications (Icc).

By: M. Wei n, Z. Lu* & W. Wang n

topics (OpenAlex): Smart Grid Security and Resilience; Complex Network Analysis Techniques; Infrastructure Resilience and Vulnerability Analysis
TL;DR: An in-depth inspection of cascading failures in smart grid is taken and insights are provided into the interactions between physical failure propagation and communication message dissemination that show that while ideal communications can undoubtedly help prevent cascades failures, under-achieved communications can, counter-intuitively, exacerbate cascading failure. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

How Robust Is a D2D-Based Messaging Service?

Pambudi, S. A., Wang, W., & Wang, C. (2016, December 1). 2016 Ieee Global Communications Conference (Globecom).

By: S. Pambudi n, W. Wang n & C. Wang*

topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Caching and Content Delivery; Mobile Ad Hoc Networks
TL;DR: A node survival probability that captures the impact of random and targeted node failures due to the open wireless environment is defined and a secondary infection rate is defined that measures how fast message propagates initially and is proportional to the ratio between the number of message-receiving users to all users, which is a good metric for quantifying the D2D-Msg's robustness. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2016 article

How the anti-rumor kills the rumor: Conflicting information propagation in networks

Wang, J., Wang, W., & Wang, C. (2016, May 1). 2016 Ieee International Conference on Communications (Icc).

By: J. Wang n, W. Wang n & C. Wang*

topics (OpenAlex): Complex Network Analysis Techniques; Opinion Dynamics and Social Influence; Evolutionary Game Theory and Cooperation
TL;DR: This work proposes an inference algorithm to study the transient behavior of the competing propagation processes in connected networks, and provides an analytic method to derive the conditional infection count distribution for networks with special topologies to understand the evolution. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

Modeling and estimating the structure of D2D-based mobile social networks

Pambudi, S. A., Wang, W., & Wang, C. (2016, May 1). 2016 Ieee International Conference on Communications (Icc).

By: S. Pambudi n, W. Wang n & C. Wang*

topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Complex Network Analysis Techniques; Advanced MIMO Systems Optimization
TL;DR: A random walk with self loop (RWSL) scheme that quickly converges to its stationary distribution and achieves higher joint degree distribution accuracy, and visits less number of nodes is proposed, compared to existing graph exploration schemes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

To live or to die: Encountering conflict information dissemination over simple networks

Wang, J., & Wang, W. (2016, April 1). IEEE INFOCOM 2016 - the 35th Annual IEEE International Conference on Computer Communications.

By: J. Wang n & W. Wang n

topics (OpenAlex): Complex Network Analysis Techniques; Opinion Dynamics and Social Influence; Opportunistic and Delay-Tolerant Networks
TL;DR: A Susceptible-Infectious-Cured (SIC) propagation model is established to examine two simple network topologies, clique and star, in terms of extinction time and half-life time of information under controllable, epidemic dynamics, and develops a method to estimate the conditional infection count distribution. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 article

Claim What You Need: A Text-Mining Approach on Android Permission Request Authorization

Wei, M. K., Gong, X., & Wang, W. (2015, December 1). 2015 IEEE Global Communications Conference (GLOBECOM).

By: M. Wei n, X. Gong* & W. Wang n

topics (OpenAlex): Advanced Malware Detection Techniques; Software Testing and Debugging Techniques; Software Engineering Research
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

G2G: Privacy-preserving group matching for proximity-based mobile social networks

Zhu, X., Chen, Z., & Wang, W. (2015, November 1). 2015 IEEE/CIC International Conference on Communications in China (ICCC).

By: X. Zhu*, Z. Chen* & W. Wang n

topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Privacy, Security, and Data Protection; Privacy-Preserving Technologies in Data
TL;DR: G2G, a novel privacy-preserving group matching mechanism, which can support group matching with preserving the privacy of all group members by applying permutation function is proposed and an enhanced version G2G+, which can further improve group privacy is designed. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 article

On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures

Sun, L., Wang, W., & Lu, Z. (2015, February 20). IEEE Transactions on Wireless Communications, Vol. 14, pp. 3390–3401.

By: L. Sun n, W. Wang n & Z. Lu n

author keywords: Resilience; cognitive radio networks; topology; generic failures
topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Cooperative Communication and Network Coding; Mobile Ad Hoc Networks
TL;DR: This work first defines two metrics, namely the failure occurrence probability p and failure connection function g(·), to characterize node failures and their spreading properties, respectively, and proves that each blackhole is exponentially bounded based on percolation theory. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

On the Evolution and Impact of Mobile Botnets in Wireless Networks

Lu, Z., Wang, W., & Wang, C. (2015, October 19). IEEE Transactions on Mobile Computing, Vol. 15, pp. 2304–2316.

By: Z. Lu*, W. Wang n & C. Wang*

author keywords: Mobile botnet; malware; proximity propagation; wireless networks; denial-of-service; modeling and evaluation
topics (OpenAlex): Network Security and Intrusion Detection; Opportunistic and Delay-Tolerant Networks; Advanced Malware Detection Techniques
TL;DR: It is found that node mobility can be a trigger to botnet propagation storms: the average size of a botnet increases quadratically over time if the mobility range that each node can reach exceeds a threshold; otherwise, the botnet can only contaminate a limited number of nodes with average size always bounded above. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Safety Can Be Dangerous: Secure Communications Impair Smart Grid Stability under Emergencies

Wei, M., & Wang, W. (2015, December 1). 2015 IEEE Global Communications Conference (GLOBECOM).

By: M. Wei n & W. Wang n

topics (OpenAlex): Smart Grid Security and Resilience; Network Security and Intrusion Detection; Security and Verification in Computing
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

The Impact of Network Size and Mobility on Information Delivery in Cognitive Radio Networks

Sun, L., Wang, W., & Li, Y. (2015, March 2). IEEE Transactions on Mobile Computing, Vol. 15, pp. 217–231.

By: L. Sun n, W. Wang n & Y. Li n

author keywords: Latency; cognitive radio networks; scalability; generic mobility
topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Advanced MIMO Systems Optimization; Opportunistic and Delay-Tolerant Networks
TL;DR: This paper studies the end-to-end latency in CRNs to find the sufficient and necessary conditions for real-time applications in finite networks and large-scale deployments, and provides a general mobility framework which captures most characteristics of the existing mobility models and takes spatial heterogeneity into account. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2014 article

Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming

Lu, Z., Wang, W., & Wang, C. (2014, April 11). IEEE Transactions on Dependable and Secure Computing, Vol. 12, pp. 31–44.

By: Z. Lu n, W. Wang n & C. Wang*

author keywords: Smart grid; wireless applications; performance modeling; worst-case analysis; message delay; jamming attacks
topics (OpenAlex): Smart Grid Security and Resilience; Network Security and Intrusion Detection; Security in Wireless Sensor Networks
TL;DR: A lightweight yet promising system, transmitting adaptive camouflage traffic (TACT), is demonstrated, to combat jamming attacks, which minimizes the message delay by generating extra traffic called camouflage to balance the network load at the optimum. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2014 article

Greenbench: A benchmark for observing power grid vulnerability under data-centric threats

Wei, M., & Wang, W. (2014, April 1). 2014 Proceedings Ieee Infocom, pp. 2625–2633.

By: M. Wei n & W. Wang n

topics (OpenAlex): Smart Grid Security and Resilience; Network Security and Intrusion Detection; Security and Verification in Computing
TL;DR: Greenbench is presented, a benchmark that is designed to evaluate real-time power grid dynamics in response to data-centric attacks, and the simulation results provide several counter-intuitive suggestions to both smart grid security research and deployment. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2014 article

How can botnets cause storms? Understanding the evolution and impact of mobile botnets

Lu, Z., Wang, W., & Wang, C. (2014, April 1). 2014 Proceedings Ieee Infocom, pp. 1501–1509.

By: Z. Lu n, W. Wang n & C. Wang*

topics (OpenAlex): Network Security and Intrusion Detection; Opportunistic and Delay-Tolerant Networks; Advanced Malware Detection Techniques
TL;DR: The last chipper time is defined, which is the last time that service requests, even partially, can still be processed on time as the botnet keeps propagating and launching attacks, and reveals that although increasing network bandwidth can help with mobile services; at the same time, it can indeed escalate the risk for services being disrupted by mobile botnets. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2014 article

Message Dissemination in Intermittently Connected D2D Communication Networks

Li, Y., & Wang, W. (2014, April 16). IEEE Transactions on Wireless Communications, Vol. 13, pp. 3978–3990.

By: Y. Li n & W. Wang n

author keywords: Device-to-device (D2D) communication network; message dissemination; dissemination distance; hitting time
topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Mobile Ad Hoc Networks; Wireless Networks and Protocols
TL;DR: How far the message dissemination can reach by time t and how long the dissemination takes to inform nodes located at distanced are studied, especially in dynamic, intermittently connected networks. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2014 article

Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications

Lu, Z., Wang, W., & Wang, C. (2014, July 29). IEEE Transactions on Mobile Computing, Vol. 13, pp. 1746–1759.

By: Z. Lu n, W. Wang n & C. Wang*

author keywords: Performance modeling; wireless network; time-critical messaging; jamming attack detection; smart grid applications
topics (OpenAlex): Smart Grid Security and Resilience; Security in Wireless Sensor Networks; Network Security and Intrusion Detection
TL;DR: There exists a phase transition phenomenon for successful time-critical message delivery under a variety of jamming attacks, and a new metric, message invalidation ratio, is introduced to quantify the performance of time- critical applications. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 article

An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation

Lu, X., Wang, W., & Ma, J. (2013, February 13). IEEE Transactions on Smart Grid, Vol. 4, pp. 170–183.

By: X. Lu n, W. Wang n & J. Ma*

author keywords: Communication infrastructures; DNP3 over TCP/IP; field deployment and performance evaluations; FREEDM systems; smart grid; system design
topics (OpenAlex): Smart Grid Security and Resilience; Power Line Communications and Noise; Smart Grid Energy Management
TL;DR: A case study of a smart grid demonstration project, the Future Renewable Electric Energy Delivery and Management (FREEDM) systems, and measures the message delivery performance of the DNP3-based communication infrastructure, revealing that diverse timing requirements of message deliveries are arguably primary concerns in a way that dominates viabilities of protocols or schemes in the communication infrastructure of the smart grid. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 article

Cyber security in the Smart Grid: Survey and challenges

Wang, W., & Lu, Z. (2013, January 17). Computer Networks, Vol. 57, pp. 1344–1371.

By: W. Wang n & Z. Lu n

author keywords: Smart Grid; Cyber security; Attacks and countermeasures; Cryptography; Security protocols
topics (OpenAlex): Smart Grid Security and Resilience; Network Security and Intrusion Detection; Internet Traffic Analysis and Secure E-voting
TL;DR: This paper focuses on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid, and aims to provide a deep understanding of security vulnerabilities and solutions in the smart grid. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 article

Internode Mobility Correlation for Group Detection and Analysis in VANETs

Li, N. Y., Zhao, N. M., & Wang, N. W. (2013, May 22). IEEE Transactions on Vehicular Technology, Vol. 62, pp. 4590–4601.

By: N. Li n, N. Zhao n & N. Wang n

author keywords: Correlated mobility; group detection; vehicular ad hoc networks
topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Vehicular Ad Hoc Networks (VANETs); Mobile Ad Hoc Networks
TL;DR: A new metric, i.e., dual-locality ratio (DLR), is introduced, which quantifies mobility correlation of nodes and can be used to effectively identify stable user groups, which in turn could be used for network performance enhancement. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 article

PPNA special issue on “the green, reliability and security of machine-to-machine communications”

Li, X., Lin, X., Wang, W., & Mitton, N. (2013, September 25). PPNA special issue on “the green, reliability and security of machine-to-machine communications.” Peer-to-Peer Networking and Applications, Vol. 7, pp. 213–214.

By: X. Li*, X. Lin*, W. Wang n & N. Mitton*

topics (OpenAlex): Vehicular Ad Hoc Networks (VANETs)
TL;DR: This special issue includes six state-of-the-art contributions on the GRS aspects of M2M communications, which identifies that the problem of information cascading and oversampling, which commonly arise in social networks, adversely affects trust management schemes in VANETs. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 article

Scheduling Partition for Order Optimal Capacity in Large-Scale Wireless Networks

Xu, Y., & Wang, W. (2013, March 1). IEEE Transactions on Mobile Computing, Vol. 12, pp. 666–679.

By: Y. Xu n & W. Wang n

author keywords: Wireless multihop networks; capacity scaling; link scheduling; network decomposition; network design
topics (OpenAlex): Mobile Ad Hoc Networks; Advanced Wireless Network Optimization; Cooperative Communication and Network Coding
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 article

Understanding Blackholes in large-scale Cognitive Radio Networks under generic failures

Sun, L., & Wang, W. (2013, April 1). 2013 Proceedings Ieee Infocom, pp. 728–736.

By: L. Sun n & W. Wang n

topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Cooperative Communication and Network Coding; Opportunistic and Delay-Tolerant Networks
TL;DR: The topology of Cognitive Radio Networks is focused on and it is proved that each Blackhole is exponentially bounded based on percolation theory, and an upper bound on the expected size of Blackholes is derived. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2013 article

Wireless Mesh Network in Smart Grid: Modeling and Analysis for Time Critical Communications

Xu, Y., & Wang, W. (2013, June 26). IEEE Transactions on Wireless Communications, Vol. 12, pp. 3360–3371.

By: Y. Xu n & W. Wang n

author keywords: Wireless network; smart grid; time critical communication; network performance; communication delay
topics (OpenAlex): Wireless Networks and Protocols; Smart Grid Security and Resilience; Power Line Communications and Noise
TL;DR: This paper model the smart grid wireless networks and presents the communication delay analysis in typical wireless network deployment scenarios in the grid to provide the delay bounds that can help design satisfactory wireless networks to meet the demanding communication requirements in thesmart grid. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2012 article

Development of distributed grid intelligence platform for solid state transformer

Wang, F., Lu, X., Wang, W., & Huang, A. (2012, November 1). 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 481–485.

By: F. Wang n, X. Lu n, W. Wang n & A. Huang n

topics (OpenAlex): Distributed and Parallel Computing Systems; Microgrid Control and Optimization; Smart Grid Security and Resilience
TL;DR: A platform intended as a distributed controller for grid intelligence (DGI) system at FREEDM Systems Center serves as both a hard real-time local converter controller and a communication node for distributed deployment of energy management schemes. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 article

Enabling adaptive rate and relay selection for 802.11 mobile ad hoc networks

Mehta, N., Duel-Hallen, A., & Wang, W. (2012, June 1). 2012 Ieee International Conference on Communications (Icc), pp. 4150–4154.

By: N. Mehta n, A. Duel-Hallen n & W. Wang n

topics (OpenAlex): Wireless Networks and Protocols; Cooperative Communication and Network Coding; Mobile Ad Hoc Networks
TL;DR: This work proposes a novel method to reduce the effect of the feedback delay at the MAC layer in the presence of Rayleigh fading, which significantly improves the throughput, delay, and packet delivery ratio for high mobile velocities relative to previously proposed approaches that employ outdated CSI at the transmitter. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries, ORCID
Added: August 6, 2018

2012 article

Geo-dissemination in vehicular ad hoc networks

Li, Y., & Wang, W. (2012, June 1). 2012 Ieee International Conference on Communications (Icc).

By: Y. Li n & W. Wang n

topics (OpenAlex): Vehicular Ad Hoc Networks (VANETs); Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks
TL;DR: This paper analyzes how far a geo-dissemination can possibly reach over a period of time t, and what is the latency for a message to reach locations that are d distance far from the source (denoted as the stopping time τ). (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 article

Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming

Lu, N. Z., Wang, N. W., & Wang, C. (2012, March 1). 2012 Proceedings IEEE Infocom, pp. 3066–3070.

By: N. Lu n, N. Wang n & C. Wang*

topics (OpenAlex): Smart Grid Security and Resilience; Security in Wireless Sensor Networks; Mobile Ad Hoc Networks
TL;DR: It is demonstrated via experiments that transmitting camouflage traffic can decrease the probability that a message is not delivered on time in order of magnitude for smart grid applications, indicating that the worst-case message delay is a U-shaped function of network traffic load. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 article

On latency distribution and scaling: from finite to large Cognitive Radio Networks under general mobility

Sun, L., & Wang, W. (2012, March 1). 2012 Proceedings IEEE Infocom, pp. 1287–1295.

By: L. Sun n & W. Wang n

topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Advanced MIMO Systems Optimization; Mobile Ad Hoc Networks
TL;DR: This paper studies the end-to-end latency in Cognitive Radio Networks and considers a general mobility framework that captures most characteristics of the existing models and accounts for spatial heterogeneity resulting from the scenario that some locations are more likely to be visited by mobile nodes. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 article

On the connectivity of large multi-channel cognitive radio networks

Sun, L., & Wang, W. (2012, June 1). 2012 Ieee International Conference on Communications (Icc), pp. 1854–1858.

By: L. Sun n & W. Wang n

topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Cooperative Communication and Network Coding; Advanced MIMO Systems Optimization
TL;DR: The sufficient and necessary condition to achieve full connectivity is λ = Θ(log n/πr2 Ps), where λ is the density, n is the number and r is the transmission range of secondary users respectively, and Ps is the probability that any two secondary users can communicate with each other without interfering with primary users. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 article

The latency of gaining α-reliability for message dissemination in vehicle-to-vehicle networks

Li, N. Y., Wang, N. W., & Duel-Hallen, A. (2012, December 1). 2012 Ieee Global Communications Conference (Globecom), pp. 5550–5555.

By: N. Li n, N. Wang n & A. Duel-Hallen n

topics (OpenAlex): Vehicular Ad Hoc Networks (VANETs); Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks
TL;DR: Under a 1-Dimensional (1-D) network scenario with unreliable channel and constrained vehicle mobility, the minimum latency of gaining almost sure α-reliability is derived, denoted as tmin(α), which is dominated by the first attempt to send the message to a destination. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries, ORCID
Added: August 6, 2018

2012 article

Understanding the tempo-spatial limits of information dissemination in multi-channel Cognitive Radio Networks

Sun, N. L., & Wang, W. (2012, March 1). 2012 Proceedings IEEE Infocom, pp. 1278–1286.

By: N. Sun n & W. Wang n

topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Advanced MIMO Systems Optimization; Wireless Communication Security Techniques
TL;DR: The sufficient and necessary conditions under which there exist spatial and temporal limits of information dissemination in CRNs are determined and it is found that when information cannot be disseminated to the entire network, the limiting dissemination radius is statistically dominated by an exponential distribution, while the limiting information propagation speed approaches to zero. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 article

A survey on the communication architectures in smart grid

Wang, W., Xu, Y., & Khanna, M. (2011, August 1). Computer Networks, Vol. 55, pp. 3604–3629.

By: W. Wang n, Y. Xu n & M. Khanna n

author keywords: Smart grid; Power communications; Communication networks; Communication protocols; Grid standards
topics (OpenAlex): Smart Grid Security and Resilience; Power Line Communications and Noise; Smart Grid Energy Management
TL;DR: This survey attempts to summarize the current state of research efforts in the communication networks of smart grid, which may help to identify the research problems in the continued studies. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (Web of Science; OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2011 article

From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic

Lu, Z., Wang, W., & Wang, C. (2011, April 1). 2011 Proceedings Ieee Infocom, pp. 1871–1879.

By: Z. Lu n, W. Wang n & C. Wang*

topics (OpenAlex): Security in Wireless Sensor Networks; Network Security and Intrusion Detection; Smart Grid Security and Resilience
TL;DR: A new metric, message invalidation ratio, is introduced, to quantify the performance of time-critical applications and shows that there in general exists a phase transition phenomenon for a time- critical application under jamming attacks. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 article

Information delivery in large wireless networks with minimum energy expense

Xu, Y., & Wang, W. (2011, April 1). 2011 Proceedings Ieee Infocom, pp. 1584–1592.

By: Y. Xu n & W. Wang n

topics (OpenAlex): Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks; Cooperative Communication and Network Coding
TL;DR: This work provides the fundamental understandings of energy needs and the efficient solutions for energy usages in major communication scenarios, which contribute to the rational dimensioning and wise utilization of the energy resources in large wireless networks. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 article

Intermittently Connected Vehicle-to-Vehicle Networks: Detection and Analysis

Li, N. Y., Zhao, N. M., & Wang, N. W. (2011, December 1). 2011 Ieee Global Telecommunications Conference (Globecom 2011).

By: N. Li n, N. Zhao n & N. Wang n

topics (OpenAlex): Human Mobility and Location-Based Analysis; Opportunistic and Delay-Tolerant Networks; Vehicular Ad Hoc Networks (VANETs)
TL;DR: This paper observes that mobility of vehicle shows temporal locality similarity and introduces a new metric, namely \emph{dual locality ratio} (DLR), which represents the mobility correlation of vehicles, and demonstrates applications of DLR for improving performances of data forwarding and clustering in vehicle-to-vehicle networks. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 article

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP

Lu, N. X., Lu, N. Z., Wang, N. W., & Ma, N. J. (2011, December 1). 2011 Ieee Global Telecommunications Conference (Globecom 2011).

By: N. Lu n, N. Lu n, N. Wang n & N. Ma*

topics (OpenAlex): Smart Grid Security and Resilience; Software-Defined Networks and 5G; Network Time Synchronization Technologies
TL;DR: A micro smart grid is established to measure the delay performance of a predominant SCADA protocol, distributed network protocol 3.0 (DNP3) over TCP/IP, and results indicate that DNP3 over UDP can be further optimized in terms of delay efficiency, and a lightweight communication protocol is essential for time-critical smart grid applications. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 article

On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks

Sun, L., & Wang, W. (2011, April 1). 2011 Proceedings Ieee Infocom, pp. 246–250.

By: L. Sun n & W. Wang n

topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Advanced MIMO Systems Optimization; Opportunistic and Delay-Tolerant Networks
TL;DR: It is shown that the dissemination latency depends on the stationary spatial distribution and mobility capability α (characterizing the region that a mobile secondary user can reach) of secondary users and that as the network grows to infinity, the latency asymptotically scales linearly with the “distance” between the source and the destination. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 article

On the Access Time in Mobile Hybrid Networks

Zheng, N. H., & Wang, N. W. (2011, December 1). 2011 Ieee Global Telecommunications Conference (Globecom 2011).

By: N. Zheng n & N. Wang n

topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Mobile Ad Hoc Networks; Caching and Content Delivery
TL;DR: A theoretical framework to analyze the packet propagation speed in MHNs is proposed, and it is shown that there is a unified lower bound on the access time regardless of data forwarding schemes. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 article

Toward robust multi-hop data forwarding in large scale wireless networks

Xing, F., & Wang, W. (2011, May 21). Computer Networks, Vol. 55, pp. 2608–2621.

By: F. Xing* & W. Wang n

author keywords: Multi-hop routing; Network robustness; Wireless networks; Performance evaluation
topics (OpenAlex): Cooperative Communication and Network Coding; Mobile Ad Hoc Networks; Wireless Networks and Protocols
TL;DR: This paper proposes to design a network topology and data forwarding algorithms, namely PROACtive, in order to distribute data packets among cooperative nodes only, subject to k-connectivity constraint, and shows that there exists a trade-off between achieving network robustness and k-connected with high probability. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2010 article

All-Terminal Network Reliability Optimization in Fading Environment via Cross Entropy Method

Kharbash, S., & Wang, W. (2010, May 1). 2010 Ieee International Conference on Communications - ICC 2010.

By: S. Kharbash n & W. Wang n

topics (OpenAlex): Advanced Wireless Network Optimization; Advanced MIMO Systems Optimization; Reliability and Maintenance Optimization
TL;DR: This paper presents a new algorithm that can be readily applied to solve all-terminal network reliability optimization problem of a wireless network in a fading environment that uses a global stochastic optimization technique, Cross Entropy (CE) to generate the optimal network topology and control nodes transmission powers such that all- terminal network reliability is maximized. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 article

Characterizing the Spread of Correlated Failures in Large Wireless Networks

Xu, Y., & Wang, W. (2010, March 1). 2010 Proceedings Ieee Infocom.

By: Y. Xu n & W. Wang n

topics (OpenAlex): Mobile Ad Hoc Networks; Complex Network Analysis Techniques; Cooperative Communication and Network Coding
TL;DR: The spread of correlated failures is characterized in this paper, which lays the foundation for evaluating and improving the failure resilience of existing wireless networks. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 article

On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks

Lu, Z., Wang, W., & Wang, C. (2010, March 1). 2010 Proceedings Ieee Infocom.

By: Z. Lu n, W. Wang n & C. Wang*

topics (OpenAlex): Wireless Networks and Protocols; Mobile Ad Hoc Networks; Cooperative Communication and Network Coding
TL;DR: This paper defines and study two general classes of backoff misbehavior, and introduces a new performance metric, namely order gain, which is to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 article

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks

Yi, C., & Wang, W. (2010, March 1). 2010 Proceedings Ieee Infocom.

By: C. Yi n & W. Wang n

topics (OpenAlex): Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks; Cooperative Communication and Network Coding
TL;DR: The results provide a theoretical understanding of to what extent ad hoc nodes can benefit from base stations in multi-hop wireless networks and study a hybrid network architecture that makes a significant connectivity improvement with transmission range larger than r_{\beta}$ larger than $r_{\alpha}$ forAd hoc nodes. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 article

Review and evaluation of security threats on the communication networks in the smart grid

Lu, Z., Lu, X., Wang, W., & Wang, C. (2010, October 1). Military Communications Conference, 2010 (Milcom 2010), pp. 1830–1835.

By: Z. Lu n, X. Lu n, W. Wang n & C. Wang*

topics (OpenAlex): Smart Grid Security and Resilience; Network Security and Intrusion Detection; Internet Traffic Analysis and Secure E-voting
TL;DR: This work provides initial experimental data of DoS attacks against a power network and shows that the network performance degrades dramatically only when the DoS attack intensity approaches to the maximum. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 article

The Limit of Information Propagation Speed in Large-Scale Multihop Wireless Networks

Xu, Y., & Wang, W. (2010, August 18). IEEE/ACM Transactions on Networking, Vol. 19, pp. 209–222.

By: Y. Xu n & W. Wang n

author keywords: Information propagation; multihop communication; network connectivity; packet delay; wireless network
topics (OpenAlex): Mobile Ad Hoc Networks; Cooperative Communication and Network Coding; Opportunistic and Delay-Tolerant Networks
TL;DR: The speed limit of information propagation in large-scale multihop wireless networks is investigated, which provides fundamental understanding of the fastest information transportation and delivery that a wireless network is able to accommodate. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2010 article

Topology-Incurred Delay for Information Dissemination in Large Multi-Channel Cognitive Radio Networks

Sun, L., & Wang, W. (2010, December 1). 2010 Ieee Global Telecommunications Conference Globecom 2010.

By: L. Sun n & W. Wang n

topics (OpenAlex): Cognitive Radio Networks and Spectrum Sensing; Cooperative Communication and Network Coding; Advanced MIMO Systems Optimization
TL;DR: The nature of topology-incurred end-to-end delay in large multi-channel CR networks is investigated and the conditions under which the asymptotic topology -incurred delay scales linearly with the Euclidean distance are identified. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2009 journal article

An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks

Mobile Networks and Applications, 15(5), 693–709.

By: A. Agarwal n & W. Wang n

author keywords: performance evaluation; wireless mesh; denial of service; implementation
topics (OpenAlex): Mobile Ad Hoc Networks; Security in Wireless Sensor Networks; Opportunistic and Delay-Tolerant Networks
TL;DR: It is found that medium errors have significant impact on the performance of WMNs when a path-based DoS attack is carried out, and the impact is exacerbated by the MAC layer retransmissions. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: March 1, 2020

2009 article

Editorial

Wang, W., & Devetsikiotis, M. (2009, March 12). Mobile Networks and Applications, Vol. 14, pp. 365–367.

By: W. Wang n & M. Devetsikiotis n

topics (OpenAlex): Opportunistic and Delay-Tolerant Networks; Mobile Ad Hoc Networks; Network Traffic and Congestion Control
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2009 article

Topology Stability Analysis and Its Application in Hierarchical Mobile Ad Hoc Networks

Xu, N. Y., & Wang, N. W. (2009, March 1). IEEE Transactions on Vehicular Technology, Vol. 58, pp. 1546–1560.

By: N. Xu n & N. Wang n

author keywords: Clustering; hierarchical architecture; mobility network topology; wireless ad hoc networks
topics (OpenAlex): Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks; Wireless Networks and Protocols
TL;DR: A clustering algorithm and a hierarchical routing protocol are proposed that work together to achieve the maximum network stability and the fundamental understanding of the bounds on network stability is provided. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

Finding the Fastest Path in Wireless Networks

Xu, Y., & Wang, W. (2008, January 1). 2008 Ieee International Conference on Communications, Proceedings, Vols 1-13, pp. 3188–3192.

By: Y. Xu n & W. Wang n

topics (OpenAlex): Mobile Ad Hoc Networks; Cooperative Communication and Network Coding; Energy Efficient Wireless Sensor Networks
TL;DR: This paper shows that the end-to-end packet delay depends largely on the locations of the relay nodes that forward the packet and there exists a shortest-delay path theoretically, and proposes a routing algorithm to locate a fast relay path in actual networks to achieve the near-shortest packet delay. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

On the Devolution of Large-Scale Sensor Networks in the Presence of Random Failures

Xing, F., & Wang, W. (2008, January 1). 2008 Ieee International Conference on Communications, Proceedings, Vols 1-13, pp. 2304–2308.

By: F. Xing n & W. Wang n

topics (OpenAlex): Energy Efficient Wireless Sensor Networks; Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks
TL;DR: A new metric is defined called the first partition time, which is the first time that a network starts to discomposes to multiple isolated small components, and the devolution process in a geometric random graph from a percolation-based connectivity perspective is analyzed. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures

Xing, F., & Wang, W. (2008, December 3). IEEE Transactions on Dependable and Secure Computing, Vol. 7, pp. 284–299.

By: F. Xing* & W. Wang n

author keywords: Network survivability; node misbehaviors; semi-Markov process; node behavior modeling; node isolation problem; k-connectivity; wireless ad hoc networks
topics (OpenAlex): Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks; Wireless Networks and Protocols
TL;DR: A novel semi-Markov process model is proposed to characterize the evolution of node behaviors and the effects of node misbehaviors on both topological survivability and network performance and is validated by simulations and numerical analysis. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

Self-Orienting Wireless Multimedia Sensor Networks for Maximizing Multimedia Coverage

Tezcan, N., & Wang, W. (2008, January 1). 2008 Ieee International Conference on Communications, Proceedings, Vols 1-13, pp. 2206–2210.

By: N. Tezcan n & W. Wang n

topics (OpenAlex): Energy Efficient Wireless Sensor Networks; Indoor and Outdoor Localization Technologies; Energy Harvesting in Wireless Networks
TL;DR: This paper proposes a distributed algorithm to detect a node's multimedia coverage and then determine its orientation, while minimizing the effect of occlusions and total overlapping regions in the sensing field, and shows that using distributed messaging and self-orientation having occlusion-free viewpoints significantly increase the multimedia coverage. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

Self-orienting wireless multimedia sensor networks for occlusion-free viewpoints

Tezcan, N., & Wang, W. (2008, June 15). Computer Networks, Vol. 52, pp. 2558–2567.

By: N. Tezcan n & W. Wang n

author keywords: multimedia coverage; multimedia sensor network; visible field of view; occlusion; self-orientation; distributed algorithm
topics (OpenAlex): Indoor and Outdoor Localization Technologies; Energy Efficient Wireless Sensor Networks; Underwater Vehicles and Communication Systems
TL;DR: This paper proposes a new algorithm to determine a node's multimedia coverage and find the sensor orientation that minimizes the negative effect of occlusions and overlapping regions in the sensing field, and shows that the occlusion-free viewpoint approach increases the multimedia coverage significantly. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2007 article

A Dynamic TCP-Aware Call Admission Control Scheme for Generic Next Generation Packet-Switched Wireless Networks

Wang, X., Eun, D., & Wang, W. (2007, September 1). IEEE Transactions on Wireless Communications, Vol. 6, pp. 3344–3352.

By: X. Wang*, D. Eun n & W. Wang n

Contributors: X. Wang*, D. Eun n & W. Wang n

author keywords: admission control; wireless networks; TCP
topics (OpenAlex): Advanced Wireless Network Optimization; Wireless Communication Networks Research; Network Traffic and Congestion Control
TL;DR: This work proposes a TCP-aware CAC scheme to regulate the packet-level dynamics of TCP flows and demonstrates that the proposed scheme can effectively improve the system performance in terms of call blocking probability, call-level throughput (call/min) and link utilization. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2007 article

A unified mobility model for analysis and simulation of mobile wireless networks

Zhao, M., & Wang, W. (2007, September 14). Wireless Networks, Vol. 15, pp. 365–389.

By: M. Zhao n & W. Wang n

author keywords: Mobility model; Smooth movement; Semi-Markov process; Stochastic analysis; Network performance evaluation; Mobile wireless networks
topics (OpenAlex): Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks; Wireless Networks and Protocols
TL;DR: This model is proved to be smooth and steady because there is no speed decay problem for arbitrary starting speed, while maintaining uniform spatial node distribution regardless of node placement, and can be easily and flexibly applied for simulating node mobility in wireless networks. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2007 article

An Experimental Study on Security Protocols in Wlans

Agarwal, A. K., & Wang, W. (2007, December 29). Signals and Communication Technology.

By: A. Agarwal n & W. Wang n

Ed(s):

topics (OpenAlex): IPv6, Mobility, Handover, Networks, Security; Wireless Networks and Protocols; Mobile Ad Hoc Networks
TL;DR: It is suggested to provide substantial security at a reasonable cost of overhead with respect to mobile scenarios and traffic streams, and it is noticed that authentication time will be a more significant factor contributing towards QoS degradation than cryptographic cost, which is critical to real-time service in wireless networks. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2007 chapter

On the Resilient Overlay Topology Formation in Multi-hop Wireless Networks

In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 1–12).

By: F. Xing n & W. Wang n

topics (OpenAlex): Mobile Ad Hoc Networks; Cooperative Communication and Network Coding; Opportunistic and Delay-Tolerant Networks
TL;DR: This paper proposes a new distributed topology control protocol called PROACtive, which helps to design overlay topologies in multi-hop wireless networks such that the overlays achieve perfect resilience, in terms of all cooperative nodes included but misbehaving nodes excluded, and preserve the k-connectivity with high probability. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: March 1, 2020

2006 article

A simulation study of IP‐based vertical handoff in wireless convergent networks

Song, J. K., & Wang, W. (2006, July 27). Wireless Communications and Mobile Computing, Vol. 6, pp. 629–650.

By: J. Song n & W. Wang n

author keywords: handoff; heterogeneous wireless networks; mobile IP; UMTS/WLANs
topics (OpenAlex): IPv6, Mobility, Handover, Networks, Security; Wireless Networks and Protocols; Wireless Communication Networks Research
TL;DR: The performance of a transport layer handoff approach, mobile stream control transmission protocol (mSCTP), is evaluated and that of a network layer solution, MIP is compared by introducing handoff delay, end-to-end transmission throughput, and packet loss. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2006 article

Energy-efficient bandwidth allocation in wireless networks: Algorithms, analysis, and simulations

IEEE Transactions on Wireless Communications, Vol. 5, pp. 1103–1114.

By: W. Wang, X. Wang & A. Nilsson

author keywords: wireless networks; energy consumption; and connection admission control
topics (OpenAlex):
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2006 article

Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes

Xing, F., & Wang, W. (2006, January 1). 2006 IEEE International Conference on Communications, pp. 1879–1884.

By: F. Xing n & W. Wang n

topics (OpenAlex): Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks; Wireless Networks and Protocols
TL;DR: This work proposes a novel model to characterize node misbehaviors based on a semi-Markov process and analyzes the impact of node misbehavior on network connectivity in a mobile ad hoc network stochastically. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2006 article

On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility

Agarwal, A. K., & Wang, W. (2006, November 21). Mobile Networks and Applications, Vol. 12, pp. 93–110.

By: A. Agarwal n & W. Wang n

author keywords: wireless local area networks; quality of service; quality of protection; security protocols; mobile IP; performance analysis
topics (OpenAlex): Wireless Networks and Protocols; IPv6, Mobility, Handover, Networks, Security; Mobile Ad Hoc Networks
TL;DR: A quality of protection (QoP) model is introduced to indicate the benefits and the performance cost of security protocols in terms of authentication time, cryptographic overhead and throughput and it is found that some protocols are robust against mobility with little variation in system performance; thus, it is possible to provision steady service by choosing security protocols when users' mobility pattern is unknown. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2006 article

TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks

Tezcan, N., & Wang, W. (2006, January 1). 2006 IEEE International Conference on Communications, pp. 3359–3364.

By: N. Tezcan n & W. Wang n

topics (OpenAlex): Energy Efficient Wireless Sensor Networks; Energy Harvesting in Wireless Networks; Mobile Ad Hoc Networks
TL;DR: Through extensive simulations in ns2, it is demonstrated that the two-tier scheduling can reduce average energy consumption up to 40% while balancing the residual energy of sensors. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2006 article

WSN03-4: A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks.

Zhao, M., & Wang, W. (2006, November 1). Globecom.

By: M. Zhao n & W. Wang n

topics (OpenAlex): Mobile Ad Hoc Networks; Opportunistic and Delay-Tolerant Networks; Wireless Networks and Protocols
TL;DR: Through steady state analysis, it is demonstrated that SMS model has no average speed decay problem and always maintains a uniform spatial node distribution. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2005 article

A cost-minimization algorithm for fast location tracking in mobile wireless networks

Wang, W., & Xue, G. (2005, November 18). Computer Networks, Vol. 50, pp. 2713–2726.

By: W. Wang n & G. Xue*

author keywords: wireless networks; location tracking; partition; optimization
topics (OpenAlex): Wireless Communication Networks Research; Indoor and Outdoor Localization Technologies; Wireless Networks and Protocols
TL;DR: A new location tracking algorithm is developed to determine the position of mobile terminals under delay constraints, while minimizing the average locating cost based on a unimodal property, and it is demonstrated that the new algorithm has a lower computational complexity compared to existing algorithms. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2005 article

A survey of cross-layer performance enhancements for Mobile IP networks

McNair, J., Tugcu, T., Wang, W., & Xie, J. (2005, June 28). Computer Networks, Vol. 49, pp. 119–146.

By: J. McNair*, T. Tugcu*, W. Wang n & J. Xie*

author keywords: mobile IP; mobility; authentication; handoff
topics (OpenAlex): IPv6, Mobility, Handover, Networks, Security; Wireless Networks and Protocols; Mobile Ad Hoc Networks
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2005 article

Integration of authentication and mobility management in third generation and WLAN data networks

Wang, W., Liang, W., & Agarwal, A. K. (2005, August 30). Wireless Communications and Mobile Computing, Vol. 5, pp. 665–678.

By: W. Wang n, W. Liang n & A. Agarwal n

author keywords: authentication; mobility management; 3G systems; wireless local area networks (WLANs)
topics (OpenAlex): IPv6, Mobility, Handover, Networks, Security; Wireless Networks and Protocols; Mobile Ad Hoc Networks
TL;DR: This work introduces a new authentication architecture for fast authentication during inter-networking handoff and large-scale heterogeneous networks based on IP infrastructure and shows that the new architecture can reduce authentication latency significantly and be adaptive to user mobility and traffic. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2004 article

On performance analysis of challenge/response based authentication in wireless networks

Liang, W., & Wang, W. (2004, December 31). Computer Networks, Vol. 48, pp. 267–288.

By: W. Liang n & W. Wang n

author keywords: wireless networks; challenge/response authentication; security association; performance analysis
topics (OpenAlex): Mobile Ad Hoc Networks; IPv6, Mobility, Handover, Networks, Security; Opportunistic and Delay-Tolerant Networks
TL;DR: The impact of authentication on the security and quality of service (QoS) through the authentication in wireless networks is analyzed quantitatively and the concept of security levels is proposed to describe the protection of communications with regard to the nature of security. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2004 article

The Predictive User Mobility Profile Framework for Wireless Multimedia Networks

Akyildiz, I. F., & Wang, W. (2004, December 1). IEEE/ACM Transactions on Networking, Vol. 12, pp. 1021–1035.

By: I. Akyildiz* & W. Wang n

author keywords: mobility and resource management; quality of service (QoS); user mobility profile (UMP); wireless network
topics (OpenAlex): Wireless Communication Networks Research; Mobile Ad Hoc Networks; Wireless Networks and Protocols
TL;DR: Simulation results are shown to indicate that the proposed schemes are effective on mobility and resource management by evaluating blocking/dropping probabilities and location tracking costs in wireless networks. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

conference paper

Joint effects of radio channels and node mobility on link dynamics in wireless networks

Wang, W. Y., & Zhao, M. 27th ieee conference on computer communications (infocom), vols 1-5, 1606–1614.

By: W. Wang & M. Zhao

Source: NC State University Libraries
Added: August 6, 2018

conference paper

Measuring performance impact of security protocols in wireless local area networks

Agarwal, A. K., & Wang, W. Y. 2nd International Conference on Broadband Networks (Broadnets 2005), 625-.

By: A. Agarwal & W. Wang

Source: NC State University Libraries
Added: August 6, 2018

journal article

Modeling and analysis of single-hop mobile cloudlet

Li, Y. J., & Wang, W. Y. Advances in Mobile Cloud Computing Systems, 231–256.

By: Y. Li & W. Wang

Source: NC State University Libraries
Added: August 6, 2018

conference paper

On the resilience of D2D-based social networking service against random failures

Pambudi, S. A., Wang, W. Y., & Wang, C. 2016 ieee global communications conference (globecom).

By: S. Pambudi, W. Wang & C. Wang

Source: NC State University Libraries
Added: August 6, 2018

conference paper

The speed of information propagation in large wireless networks

Xu, Y., & Wang, W. Y. 27th IEEE Conference on Computer Communications (Infocom), vols 1-5, 403–411.

By: Y. Xu & W. Wang

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.