{"id":110,"date":"2021-12-21T11:08:48","date_gmt":"2021-12-21T16:08:48","guid":{"rendered":"https:\/\/research.ece.ncsu.edu\/netwis2\/?page_id=110"},"modified":"2022-09-12T15:42:58","modified_gmt":"2022-09-12T19:42:58","slug":"projects","status":"publish","type":"page","link":"https:\/\/research.ece.ncsu.edu\/netwis\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"<div class=\"wpv-view-output\" data-toolset-views-view-editor=\"21bd34b1327646119c9ecc4fbc7228ae\"><div class=\"wp-block-toolset-views-view-editor\"><div id=\"wpv-view-layout-153\" class=\"js-wpv-view-layout js-wpv-layout-responsive js-wpv-view-layout-153\" data-viewnumber=\"153\" data-pagination=\"{&quot;id&quot;:&quot;153&quot;,&quot;query&quot;:&quot;normal&quot;,&quot;type&quot;:&quot;disabled&quot;,&quot;effect&quot;:&quot;fade&quot;,&quot;duration&quot;:500,&quot;speed&quot;:5,&quot;pause_on_hover&quot;:&quot;enabled&quot;,&quot;stop_rollover&quot;:&quot;false&quot;,&quot;cache_pages&quot;:&quot;enabled&quot;,&quot;preload_images&quot;:&quot;enabled&quot;,&quot;preload_pages&quot;:&quot;enabled&quot;,&quot;preload_reach&quot;:1,&quot;spinner&quot;:&quot;builtin&quot;,&quot;spinner_image&quot;:&quot;https:\/\/research.ece.ncsu.edu\/netwis\/wp-content\/plugins\/toolset-blocks\/embedded\/res\/img\/ajax-loader.gif&quot;,&quot;callback_next&quot;:&quot;&quot;,&quot;manage_history&quot;:&quot;enabled&quot;,&quot;has_controls_in_form&quot;:&quot;disabled&quot;,&quot;infinite_tolerance&quot;:&quot;0&quot;,&quot;max_pages&quot;:0,&quot;page&quot;:1,&quot;base_permalink&quot;:&quot;\/netwis\/wp-json\/wp\/v2\/pages\/110?wpv_view_count=153&amp;wpv_paged=WPV_PAGE_NUM&quot;,&quot;loop&quot;:{&quot;type&quot;:&quot;&quot;,&quot;name&quot;:&quot;&quot;,&quot;data&quot;:[],&quot;id&quot;:0}}\" data-permalink=\"\/netwis\/wp-json\/wp\/v2\/pages\/110?wpv_view_count=153\">\n<div class=\"js-wpv-loop-wrapper\">\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/nsf-eccs-2030134-mac-on-mac-a-spectrum-orchestrating-control-plane-for-coexisting-wireless-systems-2\/\">MAC-on-MAC: A Spectrum Orchestrating Control Plane for Coexisting Wireless Systems<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation - NeTS Core Program<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: January 2021 - December 2023<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang, Dr. Xin Wang (Stony Brook), Dr. Janise McNair (University of Florida), and Dr. Yong-Kyu Yoon (University of Florida)<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/specees-efficient-monitoring-and-spectrum-utilization-of-multi-layer-wireless-networks-2\/\">SpecEES: Efficient Monitoring and Spectrum Utilization of Multi-Layer Wireless Networks<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation - NeTS Core Program (NSF-NeTS)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: October 2018 - September 2021<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang, Dr. Do Young Eun, and Dr. Huaiyu Dai<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/collaborative-research-on-the-ontology-of-inter-vehicle-networking-with-spatio-temporal-correlation-and-spectrum-cognition\/\">Collaborative Research: On the Ontology of Inter-Vehicle Networking with Spatio-Temporal Correlation and Spectrum Cognition<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation - NeTS Core Program (NSF-NeTS)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2015 - August 2019<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Min Song (Stevens Institute of Technology)<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/cascading-failures-in-inter-dependent-networks-modeling-vulnearability-analysis-and-epidemic-propagation\/\">Cascading Failures in Inter-Dependent Networks: Modeling, Vulnearability Analysis, and Epidemic Propagation<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Army Research Office (ARO)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2015 - August 2019<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/exploring-theoretical-foundation-of-mobile-clouds-from-one-hop-neighbors-to-the-internet\/\">Exploring Theoretical Foundation of Mobile Clouds: From One-Hop Neighbors to the Internet<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation - NeTS Core Program (NSF-NeTS)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2014 - August 2019<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Do Young Eun<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/development-of-platform-and-tools-for-freedm-decentralized-monitoring-and-control\/\">Development of Platform and Tools for FREEDM Decentralized Monitoring and Control<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: NSF ERC - FREEDM Center<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: August 2012 - August 2014<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/a-password-system-based-on-sketches\/\">A Password System Based on Sketches<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Army Research Office (ARO)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2011 - August 2014<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wes Snyder and Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/a-timing-perspective-of-information-dissemination-in-vehicular-networks\/\">A Timing Perspective of Information Dissemination in Vehicular Networks<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation - NeTS Core Program (NSF-NeTS)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2010 - August 2015<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Alexandria Duel-Hallen<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/assessment-of-security-functions-in-smartgrid-systems\/\">Assessment of Security Functions in Smartgrid Systems<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Secure Open System Initiative (SOSI-ARO\/NCSU)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: January 2010 - December 2010<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/satellite-connectivity\/\">Satellite Connectivity<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: ASTREC (NSF-UFL\/NCSU)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: August 2009 - July 2010<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Janise McNair (UFL) and Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/a-theoretical-foundation-of-spatio-temporal-mobility-modeling-and-induced-link-level-dynamics\/\">A Theoretical Foundation of Spatio-Temporal Mobility Modeling and Induced Link-Level Dynamics<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation - Theoretical Foundation (NSF-TF-SING)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2008 - August 2012<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Do Young Eun and Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/firstcomb-a-case-study-of-the-first-generation-communication-backbone-for-freedm\/\">FirstComb: A Case Study of the First Generation Communication Backbone for FREEDM<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: NSF ERC - FREEDM Center<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: August 2008 - August 2012<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Alex Dean<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/robust-network-architecture-against-random-threats-in-wmd-environments-theoretical-limits-and-recovery-strategies\/\">Robust Network Architecture Against Random Threats in WMD Environments: Theoretical Limits and Recovery Strategies<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Defense Threat Reduction Agency (DoD-DTRA)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: August 2008 - July 2014<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Hamid Krim<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/reliable-medium-access-in-wireless-networks-vulnerabilities-protection-and-recovery\/\">Reliable Medium Access in Wireless Networks: Vulnerabilities, Protection, and Recovery<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Army Research Office (ARO)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: August 2007 - May 2011<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Peng Ning<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/international-research-and-education-in-engineering-iree\/\">International Research and Education in Engineering (IREE)<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation, Electrical & Communications Systems (NSF-ECS)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: May 2009 - Aug. 2009 (Supplemental)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/career-a-unified-study-of-resilience-to-failure-in-multihop-wireless-networks\/\">CAREER: A Unified Study of Resilience-to-Failure in Multihop Wireless Networks<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation, Faculty Early Career Award (CISE) (NSF-CISE)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: March 2006 - February 2011<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/intel-corporation-equipment-donation-wireless-networking-project\/\">Intel Corporation Equipment Donation: Wireless Networking Project<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Intel Corporation<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2006<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/time-and-data-sensitive-wireless-networked-control-systems\/\">Time- and Data-Sensitive Wireless Networked Control Systems<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation, Electrical & Communications Systems (NSF-ECS)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: September 2005 - August 2009<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Mo-Yuen Chow<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/the-impact-of-cross-layer-control-on-service-availability-in-public-access-wireless-networks\/\">The Impact of Cross-Layer Control on Service Availability in Public Access Wireless Networks<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Center for Advanced Computing and Communications (NCSU-CACC)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: July 2004 - June 2005<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Mike Devetsikiotis<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/distributed-inter-system-authentication-mechanisms-for-seamless-roaming-in-multi-network-environments\/\">Distributed Inter-System Authentication Mechanisms for Seamless Roaming in Multi-Network Environments<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: National Science Foundation, Networking Research (NSF-CISE)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: October 2003 - September 2006<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Janise Y. McNair (University of Florida) and Dr. Wenye Wang<\/p><\/div>\n<\/div>\n\n<div class=\"wp-block-toolset-views-view-template-block wpv-block-loop-item php-to-be-replaced-with-shortcode\" data-toolset-views-view-template-block=\"625eb4be453712c8e64646ddbeeffd98\">\n<p class=\"tb-heading\" data-toolset-blocks-heading=\"162c4a2d18f9e5c0f6dcbb3067f406d6\" data-last-update=\"1.4\"><a href=\"https:\/\/research.ece.ncsu.edu\/netwis\/project\/authentication-and-service-management-in-heterogeneous-mobile-environments\/\">Authentication and Service Management in Heterogeneous Mobile Environments<\/a><\/p>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"3e1d2592ce20bdf2bf813c9dfa44c991\"><p>Sponsor: Center for Advanced Computing and Communications (NCSU-CACC)<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>Duration: July 2003 - June 2004<\/p><\/div>\n\n\n\n<div class=\"tb-fields-and-text\" data-toolset-blocks-fields-and-text=\"360284519b991feb492b582c7d84725f\"><p>PI(s): Dr. Wenye Wang and Dr. Mike Devetsikiotis<\/p><\/div>\n<\/div>\n<\/div><\/div>   <div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div> <\/div>\n\n<\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":1,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"class_list":["post-110","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/pages\/110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":24,"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":674,"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/pages\/110\/revisions\/674"}],"wp:attachment":[{"href":"https:\/\/research.ece.ncsu.edu\/netwis\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}