| Project Title | Domain Name | IEEE Year | DOWNLOAD |
| On Detecting Hidden Wireless Cameras A Traffic Pattern based Approach | Mobile Computing | 2019 |
Download
|
| A Context aware Framework for Detecting Sensor based Threats on Smart Devices | Mobile Computing | 2019 |
Download
|
| High Speed LED to Camera Communication using Color Shift Keying with Flicker Mitigation | Mobile Computing | 2019 |
Download
|
| DeepWear Adaptive Local Offloading for On Wearable Deep Learning | Mobile Computing | 2019 |
Download
|
| Draw It As Shown Behavioral Pattern Lock for Mobile User Authentication | Mobile Computing | 2019 |
Download
|
| Interactive Context for Mobile OS Resource Management | Mobile Computing | 2019 |
Download
|
| A smartphone application for automated decision support in cognitive task based evaluation of central nervous system motor disorders | Mobile Computing | 2019 |
Download
|
| Methodology and Mobile Application for Driver Behavior Analysis and Accident Prevention | Mobile Computing | 2019 |
Download
|
| The Development of an Internet of Things Mobile Application for Tracking an Electric Bus in a Campus | Mobile Computing | 2019 |
Download
|
| Researches on A Tele operated Robot Based on Wi Fi | Mobile Computing | 2019 |
Download
|
| Applications Startups Predicting Future of Smartphones Applications | Mobile Computing | 2019 |
Download
|
| EmoKey An Emotion aware Smartphone Keyboard for Mental Health Monitoring | Mobile Computing | 2019 |
Download
|
| ZnO MoS2 Based Enhanced Humidity Sensor Prototype With Android App Interface for Mobile Platform | Mobile Computing | 2019 |
Download
|
| Demo DroidNet An Android Permission Control Recommendation System Based on Crowdsourcing | Mobile Computing | 2019 |
Download
|
| Accident Alert System Application Using a Privacy Preserving Blockchain Based Incentive Mechanism | Mobile Computing | 2019 |
Download
|
| EasyFind A Mobile Crowdsourced Guiding System with Lost Item Finding Based on IoT Technologies | Mobile Computing | 2019 |
Download
|
| Algorithms for Estimating the Location of Remote Nodes Using Smartphones | Mobile Computing | 2019 |
Download
|
| Adversarial Attacks on Mobile Malware Detection | Mobile Computing | 2019 |
Download
|
| IMIAD Intelligent Malware Identification for Android Platform | Mobile Computing | 2019 |
Download
|
| Voice Recognition based intelligent Wheelchair and GPS Tracking System | Mobile Computing | 2019 |
Download
|
| Privacy and Security Analysis of Cryptocurrency Mobile Applications | Mobile Computing | 2019 |
Download
|
| Smart Switching System Using Bluetooth Technology | Mobile Computing | 2019 |
Download
|
| Evaluation Framework for Detecting Manipulated Smartphone Data | Mobile Computing | 2019 |
Download
|
| Towards Multimodal Learning for Android Malware Detection | Mobile Computing | 2019 |
Download
|
| Bring your own Sensor Use your Android Smartphone as a Sensing Platform | Mobile Computing | 2019 |
Download
|
| Wormhole attack detection algorithms in wireless network coding systems | Mobile Computing | 2015 |
Download
|
| Towards maximizing timely content delievery in delay tolerant networks | Mobile Computing | 2015 |
Download
|
| The Stability region of the delay in Pareto opportunistic networks | Mobile Computing | 2015 |
Download
|
| Privacy preserving and truthful detection of packet dropping attacks in wireless adhoc networks | Mobile Computing | 2015 |
Download
|
| Mobile data gathering with load balanced clustering and dual data uploading in wireless sensor networks | Mobile Computing | 2015 |
Download
|
| Max contribution an online approximation of optimal resource allocation in delay Tolerant Networks | Mobile Computing | 2015 |
Download
|
| Interference based topology control algorithm for delay constrained mobile adhoc networks | Mobile Computing | 2015 |
Download
|
| Impact of location popularity on throughput and delay in mobile adhoc networks | Mobile Computing | 2015 |
Download
|
| High throughput reliable muticast in multi hop wireless mesh networks | Mobile Computing | 2015 |
Download
|
| Forwarding redundancy in opportunistic mobile networks investigation Elimination and Exploitation | Mobile Computing | 2015 |
Download
|
| Cooperative load balancing and dynamic channel allocation for cluster based mobile Adhoc Networks | Mobile Computing | 2015 |
Download
|
| COCOWA A collaborative contact based watchdog for detecting selfish nodes | Mobile Computing | 2015 |
Download
|
| Attack resilient mix zones over road networks architecture and algorithms | Mobile Computing | 2015 |
Download
|
| A historical beacon aided localization algorithm for mobile sensor networks | Mobile Computing | 2015 |
Download
|
| White Rate A Context Aware Approach to Wireless Rate Adaptation | Mobile Computing | 2015 |
Download
|
| Two Tier Het Nets with Cognitive Femto cells Downlink Performance Modeling and Analysis in a Multichannel Environment | Mobile Computing | 2015 |
Download
|
| Security Analysis of Handover Key Management in 4G LTESAE Networks | Mobile Computing | 2015 |
Download
|
| RF Sensing of Activities from Non Cooperative Subjects in Device Free Recognition Systems Using Ambient and Local Signals | Mobile Computing | 2015 |
Download
|
| Radio Resource Allocation and Green Operation for Mobile Access Networks Based on Radio over Fiber | Mobile Computing | 2015 |
Download
|
| Profiling aquatic diffusion process using robotic sensor networks | Mobile Computing | 2015 |
Download
|
| Optimizing Spatial and Temporal Reuse in Wireless Networks by Decentralized Partially Observable Markov Decision Processes | Mobile Computing | 2015 |
Download
|
| Opportunistic Channel Sharing in Cognitive Radio Networks | Mobile Computing | 2015 |
Download
|
| Minimum Latency Multiple Data MULE Trajectory Planning in Wireless Sensor Networks | Mobile Computing | 2015 |
Download
|
| Investigating the Privacy versus Forwarding Accuracy Tradeoff in Opportunistic Interest Casting | Mobile Computing | 2015 |
Download
|
| Face to Face Proximity Estimation Using Bluetooth on Smart phones | Mobile Computing | 2015 |
Download
|
| Evaluating Service Disciplines for On Demand Mobile Data Collection in Sensor Networks | Mobile Computing | 2015 |
Download
|
| Efficient Rekeying Framework for Secure | Mobile Computing | 2015 |
Download
|
| Efficient Authentication for Mobile and Pervasive Computing | Mobile Computing | 2015 |
Download
|
| DOTS A Propagation Delay Aware Opportunistic MAC Protocol for Mobile Underwater Networks | Mobile Computing | 2015 |
Download
|
| Data Retrieval Scheduling for Multi Item Requests in Multi Channel Wireless Broadcast Environments | Mobile Computing | 2015 |
Download
|
| Capacitive Touch Communication A Technique to Input Data through Devices Touch Screen | Mobile Computing | 2015 |
Download
|
| Calibrating Indoor Positioning Systems | Mobile Computing | 2015 |
Download
|
| An Automatic Robust and Efficient Multi User Breadcrumb System for Emergency Response Applications | Mobile Computing | 2015 |
Download
|
| A Two Phase Dispatch Heuristic to Schedule the Movement of Multi Attribute Mobile Sensors in a Hybrid Wireless Sensor Network | Mobile Computing | 2015 |
Download
|
| EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks | Mobile Computing | 2013 |
Download
|
| On Quality of Monitoring for Multi channel Wireless Infrastructure Networks | Mobile Computing | 2013 |
Download
|
| Optimal Multicast Capacity and Delay Tradeoffs in MANETs | Mobile Computing | 2013 |
Download
|