Abstract is missing.
- A WAVE/DSRC-based intersection collision warning systemChia-Hsiang Chang, Chih-Hsun Chou, Cheng-Jung Lin, Ming-Da Lee. 1-6 [doi]
- SecSyWiSe: A secure time synchronization scheme in wireless sensor networksJohannes Barnickel, Ulrike Meyer. 1-8 [doi]
- Sharing the dreamLloyd Wood, Peter Holliday, Daniel Floreani, Wesley Eddy. 1-2 [doi]
- Performance evaluation of cooperative peer selection methods for P2P Video-on-DemandMasatoshi Kawarasaki, Kei Suzuki. 1-6 [doi]
- A scalable based multicast model for P2P Conferencing applicationsMourad Amad, Zahir Haddad, Lachemi Khenous, Kamal Kabyl. 1-6 [doi]
- Context management and reasoning for adaptive service provisioningBoris Moltchanov, Michael Knappmeyer, Omri Fuchs, Elio Paschetta. 1-6 [doi]
- The influence of the cryptographic protocols on the quality of the radio transmissionNikitin Valery, Yurkin Dmitry, Naveen K. Chilamkurti. 1-5 [doi]
- Situation awareness mechanisms for cognitive networksAndrej Mihailovic, Ioannis P. Chochliouros, Evangelia Georgiadou, Anastasia S. Spiliopoulou, Evangelos Sfakianakis, Maria Belesioti, Gérard Nguengang, Julien Borgel, Nancy Alonistioti. 1-6 [doi]
- An evaluation of the QoS capabilities of a NGN test-bedBessie Malila, Neco Ventura. 1-6 [doi]
- Experimental application of channel coding for wireless transmission of compressed video dataTomas Fryza, Jan Prokopec. 1-4 [doi]
- Efficient iris recognition method for identificationRajat Garg, Vikrant Gupta, Vineet Agrawal. 1-6 [doi]
- Design of terabyte optical wide area LAN with optimization of a network component-optical splitterGanesh Shanbhag, T. Srinivas. 1-6 [doi]
- Hacking Nintendo Wii to paint virtual graffitiPaola Salomoni, Ludovico Antonio Muratori, Silvia Mirri, Francesco Pozzi. 1-6 [doi]
- ROSA: A step torwards a global virtual networkLoic Baud, Patrick Bellot. 1-6 [doi]
- Vision based hand gesture recognition using finite state machines and fuzzy logicRohit Verma, Ankit Dev. 1-6 [doi]
- Channel estimation for OFDM systems with high mobility fading channelsMahmut Yalcin, Aydin Akan, Hakan Dogan. 1-6 [doi]
- Study of gratings recorded in different holographic recording media for real-time holographic fingerprint sensorK. Kochunarayanan, V. Krishnakumar, Abishek J. Perekkatt, V. P. Mahadevan Pillai, Avinash Kumar Jha, S. K. Sudheer. 1-4 [doi]
- Node pattern simulation of an undersea sensor network using RF electromagnetic communicationsIan Wells, Adam Davies, Xianhui Che, Paul Kear, Gordon Dickers, Xiaochun Gong, Mark Rhodes. 1-4 [doi]
- On suitability of PSD method for opportunity detection in OFDM(A) based cognitive radio systemsSultan Aldirmaz, Asli Birol, Ibrahim Demirdogen, Hüseyin Arslan, Lutfiye Durak. 1-5 [doi]
- Further results on MIMO networks based on the distribution of the eigenvalues of arbitrarily correlated Wishart matricesMarco Chiani, Moe Z. Win, Hyundong Shin. 1-6 [doi]
- The impact of channel reuse on the performance of multi-hop virtual MIMO systemsChiara Buratti, Alberto Zanella. 1-8 [doi]
- Implementation and testing of an EPCglobal-aware Discovery Service for item-level traceabilityUgo Barchetti, Alberto Bucciero, Mario De Blasi, Luca Mainetti, Luigi Patrono. 1-8 [doi]
- UPSR-like p-cycles: A new approach to dual failure protectionAden Grue, Wayne D. Grover. 1-6 [doi]
- On developing smart applications for VANETs: Where are we now? some insights on technical issues and open problemsGustavo Marfia, Giovanni Pau, Marco Roccetti. 1-6 [doi]
- Intelligent coding scheme for wireless image transmission over noisy channelsAlakshendra Tripathi, Nilanjan Guha, Amit Poddar, Nitesh Kumar. 1-7 [doi]
- Some considerations on the design of a P2P infrastructure for massive simulationsGennaro Cordasco, Rosario De Chiara, Ugo Erra, Vittorio Scarano. 1-7 [doi]
- Demand-wise shared protection network design with dual-failure restorabilityBrody Todd, John Doucette. 1-6 [doi]
- Adaptive resource control in 2-hop ad-hoc networksYimeng Yang, Geert J. Heijenk, Boudewijn R. Haverkort. 1-9 [doi]
- Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networksNejla Essaddi, Mohamed Hamdi, Noureddine Boudriga. 1-8 [doi]
- Robust adaptive multiuser detection for CDMA frequency-selective fading channelsHongwei Zhou, Pei Xiao, Colin Cowan. 1-6 [doi]
- Mobility-aware Forwarding mechanism for QoS enhancement in Wireless Mesh BackbonesMartin Krohn, Robil Daher, Martin Arndt, Alexander Gladisch, Djamshid Tavangarian. 1-9 [doi]
- Evaluation of P2P overlays for AoI management in Distributed Virtual EnvironmentsChristian Bettinger, Rainer Oechsle, Markus Esch, Hermann Schloss, Peter Sturm. 1-6 [doi]
- Data reduction using clustering method in wireless sensor networkSaeed Mirshams, Kamal Jamshidi, Ali Bohlooli, Abbas Dehghani. 1-8 [doi]
- Secure aggregation in hybrid mesh/sensor networksRoberto Riggio, Sabrina Sicari. 1-6 [doi]
- Effects of Rayleigh cochannel interference on switch and stay diversity system over correlated Rician fading channelsAleksandra S. Panajotovic, Mihajlo C. Stefanovic, Dragan Lj. Draca, Ivana Petrovic. 1-6 [doi]
- FROV: a distributed broadcast protocol for VANET experimental resultsAlessandro Amoroso, Luca Gandolfi, Simone Grassilli, Marco Roccetti. 1-8 [doi]
- Downlink scheduling for intercell interference fluctuation mitigation in partial-loaded broadband cellular OFDMA systemsÁngela Hernández-Solana, Israel Guío, Antonio Valdovinos. 1-6 [doi]
- A Drowsy Driver Detection and security systemRajat Garg, Vikrant Gupta, Vineet Agrawal. 1-8 [doi]
- Multimedia file exchange and P2P social networking: Efficient allocation of users into communities of interestPantelis N. Karamolegkos, Nikolaos D. Doulamis. 1-4 [doi]
- Experimental study on neighbor selection policy for Phoenix Network Coordinate systemGang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li. 1-5 [doi]
- High-speed infrastructure cellular network for vehicular usersTakahiko Yamada, Phan Thanh Hoa. 1-5 [doi]
- Making task modeling suitable for smart environmentsMaik Wurdel, Christoph Burghardt, Peter Forbrig. 1-6 [doi]
- Location aware multihop Wireless Sensor NetworkTapio Heikkilä, Jari Rehu, Marko Korkalainen, Kalle Maatta, Vesa Pentikainen. 1-7 [doi]
- Location security in geographic ad hoc routing for VANETsZiwei Ren, Wenfan Li, Shaoen Wu, Qing Yang, Lei Chen. 1-6 [doi]
- Temporal scalability comparison of the H.264/SVC and distributed video codecXin Huang, Anna Ukhanova, Eugeniy Belyaev, Søren Forchhammer. 1-6 [doi]
- Availability-constrained Dedicated Segment Protection in circuit switched mesh networksPéter Babarczi, János Tapolcai, Pin-Han Ho. 1-6 [doi]
- Open Framework Middleware for intelligent WSN topology adaption in smart buildingsRob Brennan, Wei Tai, Declan O Sullivan, Muhammad Sohaib Aslam, Susan Rea, Dirk Pesch. 1-7 [doi]
- Analyzing the capacity of wireless ad hoc networks with rate adaptation capabilityRoya Rezagah, Abbas Mohammadi. 1-7 [doi]
- ROPCORN: Routing protocol for cognitive radio ad hoc networksAhmet Cagatay Talay, Deniz Turgay Altilar. 1-6 [doi]
- Congestion in randomly deployed wireless ad-hoc and sensor networksAlonso Silva, Patricio Reyes, Mérouane Debbah. 1-6 [doi]
- Bio-inspired self-organizing architecture for distributed componentsKi-Won Yeom, Ji-Hyung Park. 1-8 [doi]
- A new approach to video bandwidth predictionMichael P. McGarry, Rami Haddad, John McAlarney. 1-5 [doi]
- A generalized intrusion detection & prevention mechanism for securing MANETsAdnan Nadeem, Michael P. Howarth. 1-6 [doi]
- Performance degradation of OFDM signals passing through nonlinear circuitsMohammad Hossein Madani, Abdolali Abdipour, Abbas Mohammadi. 1-5 [doi]
- Refining fusion of side information for transform domain Distributed Multiview Video CodingYongmin Liu, Rong Ke Liu. 1-5 [doi]
- Private ENUM based number portability administrative system evaluationJan Rudinsky. 1-7 [doi]
- Multipath at the transport layer: An end-to-end resilience mechanismJustin P. Rohrer, Ramya Naidu, James P. G. Sterbenz. 1-7 [doi]
- Localization algorithms for distributed platform among vehiclesTakeshi Tsuchiya, Hirokazu Yoshinaga, Marc Lihan, Kei ichi Koyanagi. 1-6 [doi]
- Enhancing WLAN security with sectored antennasP. Muthu Kannan, Swaminathan Ramamurthy, V. Palanisamy. 1-5 [doi]
- Wireless sensor networks for swift bird farms monitoringAl-Khalid Othman, K. M. Lee, Hushairi Zen, Wan Azlan Wan Zainal Abidin, M. F. M. Sabri. 1-7 [doi]
- Managing availability in wireless inter domain accessEirik Larsen Folstad, Bjarne E. Helvik. 1-6 [doi]
- A parameterized NoC simulator using OMNet++Ruqaiya Al-Badi, Maha Al-Riyami, Nasser Alzeidi. 1-7 [doi]
- Second-order statistics of Amplify-and-Forward multi-hop wireless networks: A framework for computing the end-to-end SNR auto-correlation function over Log-Normal shadowing channelsMarco Di Renzo, Laura Imbriglio, Fabio Graziosi, Fortunato Santucci. 1-6 [doi]
- Scalability in an adaptive cooperative system for wireless sensor networksMarcelo Portela Sousa, Marcelo Sampaio de Alencar, Ajey Kumar, Waslon Terllizzie A. Lopes. 1-6 [doi]
- HEAVEN - A hybrid emulating architecture for vehicular networksDavid Gutierrez-Perez, Eduardo del Arco-Fernandez-Cano, Mark Wilby, Julio Ramiro-Bargueno, Juan Jose Vinagre-Diaz, Antonio J. Caamaño, Javier Ramos. 1-6 [doi]
- Multilevel logic transmission using disparate intensity levels of white light and programmable controllersRohit Sharma, Anupam Chahar, Nitish Paliwal, Appoorv Narula, Vigya Jindal. 1-5 [doi]
- QoS aware distributed matching algorithm for link scheduling in wireless networksAli Ghiasian, Hossein Saidi. 1-6 [doi]
- Fairness optimization of thinning Call Admission Control in wireless networksGeorge Tsiropoulos, Dimitrios Stratogiannis, John D. Kanellopoulos, Panayotis G. Cottis. 1-6 [doi]
- Diversity combining and packet size adaptation for maximizing throughput of ARQ protocols in AWGN and fading channelRajendrakumar Patil, Prasanna Chaporkar, Abhay Karandikar. 1-7 [doi]
- On the making of an ubiquitous and altruistic application for medical first responsesAlessandro Amoroso, Marco Roccetti. 1-6 [doi]
- A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacksLee-Chun Ko, Hung-Yuan Chen, Guan-Rong Lin. 1-6 [doi]
- ADAL: A distributed range-free localization algorithm based on a mobile beacon for wireless sensor networksEsteban Guerrero, Huagang Xiong, Qiang Gao, Gabriel Cova, Ricardo Ricardo, Jose C. Estevez Losada. 1-7 [doi]
- A workflow on the dynamic composition and distribution of orchestration for testbed provisioningChristos Tranoris, Spyros G. Denazis, Anastasius Gavras. 1-6 [doi]
- A COP for cooperation in a P2P streaming protocolMaría Elisa Bertinat, Darío Padula, Franco Robledo Amoza, Pablo Romero, Daniel De Vera, Pablo Rodríguez-Bocca, Gerardo Rubino. 1-7 [doi]
- Rewarding techniques in peer-to-peer video streaming systems with tree and forest topologyPaolo Giacomazzi, Alessandro Poli. 1-8 [doi]
- Performance evaluation of center search algorithms used for dynamic rendezvous-point relocationSamer Sulaiman, Abdelfatteh Haidine, Ralf Lehnert. 1-8 [doi]
- A two stage genetically inspired algorithm for spectrum sharing between two UMTS operatorsGbenga Salami, Rahim Tafazolli. 1-7 [doi]
- Dynamic gateway selection for cross-domain routing with the XLayer communications substrateMarco M. Carvalho, Carlos Perez, Adrian Granados. 1-6 [doi]
- Delay tolerant networks and spatially detailed human mobilityMatthew Stabeler, Davide Cellai, Simon Dobson, Paddy Nixon. 1-2 [doi]
- QoS optimization of in-elastic flows stripped over multiple asymmetric channels in mobile networksSyed Zubair Ahmad, Muhammad Abdul Qadir, Mohammad Saeed Akbar. 1-6 [doi]
- Closed-form scheduling policies for delay-sensitive traffic over fading channelsEnzo Baccarelli, Nicola Cordeschi, Mauro Biagi, Tatiana Patriarca, Valentina Polli. 1-8 [doi]
- TMBF: Bloom filter algorithms of time-dependent multi bit-strings for incremental setMingzhong Xiao, Xiangzhen Kong, Junfei Liu, Ju Ning. 1-4 [doi]
- Multiplayer games over wireless ad hoc networks: Energy and delay analysisArnaud Kaiser, Nadjib Achir, Khaled Boussetta. 1-7 [doi]
- A new approach to estimating a network survivabilityOlga Sokolova, Anastasia Yurgenson. 1-4 [doi]
- DiS-MAC: A MAC protocol for sensor networks used for roadside and highway monitoringTheodora Karveli, Konstantinos Voulgaris, Mohammad Ghavami, A. Hamid Aghvami. 1-6 [doi]
- A cross-layer design approach in cooperative OFDM systems: Application to mobile cell-border situationAbbass Marouni, Youssef Nasser, Maryline Hélard, Haidar El-Mokdad. 1-6 [doi]
- An empirical study on Embeddable Overlay NetworksYao Li, Beixing Deng, Xuan Zhang, Rui Wang, Xing Li. 1-6 [doi]
- A time-power efficient fixed point single purpose processor for mapping using ultrasound sensorsPrabhakar Mishra, H. N. Shankar, R. Rajeswari, Mudit Mathur, Pai Dipti G.. 1-7 [doi]
- An efficient solution for max-min fair rate allocation in P2P simulationAnh Tuan Nguyen, Frank Eliassen. 1-5 [doi]
- Multicast extensions to the Flow-Oriented Routing Protocol and Node Velocity-based Stable Path Routing Protocol for Mobile Ad hoc NetworksNatarajan Meghanathan, Thomas DeMarcus, Ebony Addison. 1-6 [doi]
- A Bayesian analysis of Compressive Sensing data recovery in Wireless Sensor NetworksRiccardo Masiero, Giorgio Quer, Michele Rossi, Michele Zorzi. 1-6 [doi]
- Evaluating the performance of multi-path routing and congestion control in presence of network resource managementLuca Muscariello, Diego Perino. 1-8 [doi]
- Towards an ideal network: Survivability issues in selected topologiesTomasz Gierszewski, Wojciech Molisz. 1-6 [doi]
- A machine vision of non-supervised learning systemSamia Jones. 1-4 [doi]
- A modified Q-parameter anti-collision scheme for RFID systemsYinghua Cui, Yuping Zhao. 1-4 [doi]
- Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networksSlim Rekhis, Noureddine Boudriga. 1-8 [doi]
- FLS: a fuzzy-based location-service in mobile ad-hoc wireless networksAmjad Osmani, Abolfazl Toroghi Haghighat, Mehdi Kargahi. 1-5 [doi]
- Discrete Probabilistic DV-Hop: Reengineering high accuracy range-free WSN localizationMorteza Shahriari Nia, Mohsen Khaxar, Seyed Mahdi Rashti, Nasrollah Moghaddam Charkari. 1-6 [doi]
- Assessment of traffic impact on future cooperative driving systems: Challenges and considerationsFei Liu, Rattaphol Pueboobpaphan, Bart van Arem. 1-5 [doi]
- Partial network coding with cooperation: A cross-layer design for multi-hop wireless networksPanupat Poocharoen, Mario E. Magaña, Eduardo Alban. 1-8 [doi]
- New model of nonhomogeneous trafficCiro D Apice, Olga Galaktionova, Yury Khokhlov, Oksana Sidorova. 1-3 [doi]
- Per sub-block equalization and channel estimation for next generation handheld DVBPaolo Baracca, Stefano Tomasin, Lorenzo Vangelista, Nevio Benvenuto, Alberto Morello. 1-6 [doi]
- Disconnection prediction in mobile P2P networks using publish/subscribeMassimiliano de Leoni, Massimo Mecella, Paolo Manfre, Junio Valerio Franchi, Daniele Graziano. 1-8 [doi]
- SBCL - improved centroid estimationRalf Behnke, Jakob Salzmann, Dirk Timmermann. 1-6 [doi]
- Computation of high availability connections in multidomain IP-over-WDM networksDimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester. 1-6 [doi]
- A self-configuration management model for clustering-based MANETsYang Yang, Jian Chen, Leiling Duan, Luoming Meng, Zhipeng Gao, Xuesong Qiu. 1-7 [doi]
- Orthogonal well-localized Weyl-Heisenberg basis construction and optimization for multicarrier digital communication systemsDmitry Petrov, Valery Volchkov. 1-4 [doi]
- QoS-aware architecture for FHMIP micromobilityNuno Vasco Lopes, Maria João Nicolau, Alexandre Santos. 1-8 [doi]
- A syntactic approach for identifying multi-protocol attacksBéla Genge, Piroska Haller. 1-5 [doi]
- Joint power control, scheduling and routing for multicast in multihop energy harvesting sensor networksVinay Joseph, Vinod Sharma, Utpal Mukherji, Manjunath Kashyap. 1-8 [doi]
- Agent-based scalable design of a cross-layer security framework for Wireless Sensor Networks Monitoring ApplicationsMarco Pugliese, Luigi Pomante, Fortunato Santucci. 1-7 [doi]
- The study of overlay multicast based Internet broadcasting in parallel media stream serverMi-young Kang, Ji-Seung Nam. 1-3 [doi]
- On the adaptivity of today s Energy-Efficient MAC protocols under varying traffic conditionsPhilipp Hurni, Torsten Braun. 1-8 [doi]
- A biometric security based electronic gadget control using hand gesturesRajat Garg, Nadarajan Shriram, Vikrant Gupta, Vineet Agrawal. 1-8 [doi]
- A survey of cognitive radio access to TV White SpacesMaziar Nekovee. 1-8 [doi]
- On congestion-aware broadcasting in V2X networksFatma Hrizi, Fethi Filali. 1-8 [doi]
- An approach to designing lightweight security protocol on binary CDMA sensor networksJae-Hoon Roh, Mi-Yeon Kim, Ho-Kun Moon. 1-6 [doi]
- Hybrid approach to Cognitive radio test bedRamachandra Budihal, Hirisave S. Jamadagni. 1-7 [doi]
- Map-Based Location Service for VANETMounir Boussedjra, Joseph Mouzna, Pradeep Bangera, M. M. Manohara Pai. 1-6 [doi]
- A fair routing protocol using generic utility based approach in Wireless Sensor NetworksAmirHossein Mohajerzadeh, Mohammad Hossein Yaghmaee, Hadi Sadoghi Yazdi, Abbas Ali Rezaee. 1-4 [doi]
- OCR for Malayalam script using neural networksM. Abdul Rahiman, M. S. Rajasree. 1-6 [doi]
- A multi-broadcast communication system for high dynamic vehicular ad-hoc networksAndreas Lehner, Cristina Rico Garcia, Eugen Wige, Thomas Strang. 1-6 [doi]
- An efficient community-centric IPTV deployment model for developing regionsKeoikantse O. A. Marungwana, Lesang Dikgole, Neco Ventura. 1-6 [doi]
- A smart access point solution for heterogeneous flowsClaudio E. Palazzi, Nicola Stievano, Marco Roccetti. 1-7 [doi]
- Mobility in the IP multimedia subsystem: Network centric mobility vs. device centric mobilityTapfuma Mvere, Neco Ventura. 1-5 [doi]
- Analysis of spectrum utilization in suburb environment - evaluation of potentials for cognitive radioVaclav Valenta, Z. Fedra, Roman Marsalek, Geneviève Baudoin, Martine Villegas. 1-6 [doi]
- Duplex cyclic polling system to serve mixed queuesVladimir Vishnevsky, Olga Semenova, Sergey Shpilev. 1-7 [doi]
- Architecture for context-aware multiparty delivery in mobile heterogeneous networksJosephine Antoniou, Christophoros Christophorou, Christophe Janneteau, Mounir Kellil, Susana Sargento, Augusto Neto, Filipe Cabral Pinto, Nuno Filipe Carapeto, Jose Simoes. 1-6 [doi]
- An analytical model of proportional bandwidth adjustment for a two-tier hierarchical NEMO systemTsang-Ling Sheu, Bing-Chi Kuo. 1-6 [doi]
- A graphical user interface for policy composition in CIM-SPLPedro Goncalves, Carlos Figueira, Ricardo Azevedo, Rui L. Aguiar, José Luís Oliveira. 1-7 [doi]
- Holographic Registration Plates with GPRS (HRPG) network for sea-going vessels to augment the coastal securitySajan Ambadiyil, V. P. Mahadevan Pillai, V. Praveen, K. G. Jayan, S. K. Sudheer. 1-4 [doi]
- EcnLD, ECN loss differentiation to optimize the performance of transport protocols on wireless networksWassim Ramadan, Eugen Dedu, Julien Bourgeois. 1-6 [doi]
- The Riemann sum method for the design of sum-of-cisoids simulators for Rayleigh fading channels in non-isotropic scattering environmentsCarlos A. Gutiérrez-Díaz-de-León, Matthias Pätzold. 1-5 [doi]
- Three-layer architecture model (TLAM) for energy conservation in wireless sensor networksSugam Sharma, Mamta Rani. 1-5 [doi]
- Hand geometry verification system: A reviewAmit Kumar Singh, Amrit Kumar Agrawal, Chandra Bhan Pal. 1-7 [doi]
- Mobile vision robot using the SIFT algorithm for object recognitionJin-Suk Kang, Joongnam Jeon, Youngeun An, Jong-An Park. 1-7 [doi]
- New concept of RFID reader networks structure: hardware and software architectureVladimir Dashevsky, Boris Sokolov. 1-4 [doi]
- DSVCA: A novel distributed clustering algorithm for Wireless Sensor Networks based on statistical data correlationLaura Imbriglio, Fabio Graziosi. 1-6 [doi]
- Management challenges for emerging networks and servicesJianguo Ding, Ilangko Balasingham, Pascal Bouvry. 1-8 [doi]
- Optical properties of cirrus clouds during monsoon over Indian subcontinentV. Krishnakumar, M. Satyanarayana, V. P. Mahadevan Pillai, S. R. Radhakrishnan, K. Raghunath. 1-5 [doi]
- Innovative and secured user Authentication Methods for novice Visually Impaired usersGaurav Kumar Srivastava, Rajan Vaish, Rahul Vaish. 1-6 [doi]
- Integration of Ad-hoc Networks with infrastructured systems for multicast services provisioningSilverio Carlo Spinella, Giuseppe Araniti, Antonio Iera, Antonella Molinaro. 1-6 [doi]
- Parameteric coding of speech signalsVivek Kumar Sehgal, Shilpy Arora, Sahil Jain, Shantanu Agarwal, Ujjawal Khandelwal, Karan Jain. 1-5 [doi]
- A resource allocation algorithm for cluster-based cooperative MIMO in Wireless Sensor NetworksXiaojun Wen, David I. Laurenson. 1-6 [doi]
- SOCIAL-DTN: Why Social Networking Services is more fruitful to Mobile Delay-Tolerant Networks?Anh-Minh Nguyen, Noël Crespi. 1-2 [doi]
- On the architecture and the design of P2P live streaming system schedulersAthanasios Christakidis, Nikolaos Efthymiopoulos, Spyros G. Denazis, Odysseas G. Koufopavlou. 1-8 [doi]
- A multi-domain framework for Wireless Vehicular Sensor NetworkSalvatore F. Pileggi. 1-8 [doi]
- Information flow security for service compositionsSabina Rossi, Damiano Macedonio. 1-8 [doi]
- A platform for secure multi-service vehicular communicationM hamed Chammem, Mohamed Hamdi, Noureddine Boudriga. 1-6 [doi]
- Protecting location privacy through Identity DiffusionLingYan Wang, Shaoen Wu. 1-4 [doi]
- Multipath geographic routing using false destinationsDaniele De Caneva, Pier Luca Montessoro, Davide Pierattoni. 1-6 [doi]
- On the resource allocation problem for a multiservice network link with unicast and multicast connectionsMikhail Luzgachev, Konstantin Samouylov. 1-3 [doi]
- Mobility-aware MAC protocol for delay-sensitive wireless sensor networksShereen Abd El-Hameed, Hossam Faheem, Eman Shaaban, Said Ghoneimy. 1-8 [doi]
- Subchannel allocation for dynamic spectrum access in underlay OFDMA systemVenkatkumar Venkatasubramanian, Thomas Haustein. 1-6 [doi]
- Extending middleware frameworks for Wireless Sensor NetworksSyed Rehan Afzal, Christophe Huygens, Wouter Joosen. 1-7 [doi]
- Bailigh: Low power cross-layer data gathering protocol for Wireless Sensor NetworksWojciech Bober, Chris Bleakley. 1-7 [doi]
- All-optical transport layer and GPON access for immersive communicationsPablo Beltrán Pellicer, Andrea Blanco Redondo, Francisco Cortés, Amador Pozo Espinosa. 1-5 [doi]
- Cell design for next DSRC applicationsTsutomu Tsuboi, Jun Yamada, Naoki Yamauchi, Noriaki Yoshikawa. 1-5 [doi]
- A new approach to the design of wireless data broadcasting systems: An analysis-based cost-effective schemeChristos Liaskos, Sophia G. Petridou, Georgios I. Papadimitriou. 1-8 [doi]
- A multichannel collision free MAC protocol for wireless ad hoc networksGennaro Boggia, Pietro Camarda, Claudia Cormio, Luigi Alfredo Grieco. 1-8 [doi]
- Speech activity and speaker novelty detection methods for meeting processingMasahide Sugiyama, Konstantin Markov, Andrey Ronzhin, Victor Budkov, Alexey Karpov, Maria Prischepa. 1-6 [doi]
- DTNperf::2::: A performance evaluation tool for Delay/Disruption Tolerant NetworkingCarlo Caini, Piero Cornice, Rosario Firrincieli, Marco Livini. 1-6 [doi]
- A MANET protocol considering link stability and bandwidth efficiencyCelimuge Wu, Kazuya Kumekawa, Toshihiko Kato. 1-8 [doi]
- Relay selection for multiuser MIMO amplify-and-forward relaying systemsMohammadAli Mohammadi, Mehrdad Ardebilipour, Z. Mobini. 1-6 [doi]
- A global approach to fully pre-cross connected protection schemes design using p-structuresSamir Sebbah, Brigitte Jaumard. 1-6 [doi]
- Bandwidth allocation in wireless access networks: Bankruptcy game vs cooperative gameStavroula Vassaki, Athanasios D. Panagopoulos, Philip Constantinou. 1-4 [doi]
- Accurate positioning using Short-Range CommunicationsYasser L. Morgan. 1-7 [doi]
- Key distribution scheme without deployment knowledgePranav Agrawal, Joy Kuri. 1-8 [doi]
- Centralized boundary discovery algorithms for anchor-free localization in wireless sensor networksMilan Simek, Dan Komosny, Radim Bürget, Patrik Moravek, Ricardo Silva. 1-7 [doi]
- Iterative concatenated Zigzag decoding and blind data fusion of correlated sensorsJavier Del Ser, Javier Garcia-Frias, Pedro M. Crespo. 1-6 [doi]
- Hierarchical p2p overlays for DVE: An Additively Weighted Voronoi based approachMichele Albano, Laura Ricci, Luca Genovali. 1-8 [doi]
- Cooperative robust sequential detection algorithms for Spectrum Sensing in Cognitive RadioArunKumar Jayaprakasam, Vinod Sharma. 1-8 [doi]
- Communication scheme in trusted sensor networkJun Peng, Yanfen Fan, Fu Jiang, Xiaoyong Zhang, Kuo-Chi Lin. 1-5 [doi]
- An adaptive Cross-Layer multichannel QoS-MAC protocol for cluster based wireless multimedia sensor networksGholam Hossein Ekbatani Fard, Mohammad Hossien Yaghmaee Moghaddam, Reza Monsefi. 1-6 [doi]
- The design of an Autonomic Element for managing emerging networks and servicesJohn Strassner, James Won-Ki Hong, Sven van der Meer. 1-8 [doi]
- Metro optical Ethernet technologies with modified OAM&P featuresT. Sundararajan, V. Nagarajan. 1-8 [doi]
- Analysis of All to All Broadcast on multi mesh of trees using genetic algorithmNitin Rakesh, Nitin Nitin. 1-5 [doi]
- A theoretical model for opportunistic routing in ad hoc networksAngela Sara Cacciapuoti, Marcello Caleffi, Luigi Paura. 1-7 [doi]
- Optimization of multicast routing based on a reliable effective framework in Wireless Mesh NetworksEhsan Pourfakhar, Amir Masoud Rahmani. 1-7 [doi]
- Defining bandwidth constraints with cooperative gamesEdilayne Meneses Salgueiro, Paulo R. F. Cunha, Paulo Romero Martins Maciel, José Augusto Suruagy Monteiro, Ricardo J. P. B. Salgueiro. 1-8 [doi]
- A repair mechanism for reliable multicast in Integrated Communication and Broadcast NetworksHideya Yoshiuchi, Jiping Lv, Satoshi Yoshizawa, Zhisheng Niu. 1-8 [doi]
- Toward new peering strategies for push-pull based P2P streaming systemsAnis Ouali, Brigitte Kerhervé, Brigitte Jaumard. 1-8 [doi]
- Homura and Net-Homura: The creation and web-based deployment of cross-platform 3D gamesChris Carter, Abdennour El Rhalibi, Madjid Merabti, Marc Price. 1-8 [doi]
- Effective SNR mapping algorithms for link prediction model in 802.16eFernando Lopez Aguilar, Gorka Rubio Cidre, Javier Regidor Paris. 1-6 [doi]
- Cluster-based perimeter-coverage technique for heterogeneous wireless sensor networksAndrey Koucheryavy, Ahmed Abd Elftah Salim. 1-7 [doi]
- Performance of relay-enabled uplink in cellular networks - a flow level analysisDesislava C. Dimitrova, Hans van den Berg, Geert J. Heijenk. 1-8 [doi]
- UMAC - A Universal MAC architecture for heterogeneous home networksHans Peter Löb, Christian Liß, Ulrich Rückert, Christian Sauer. 1-6 [doi]
- Aspects of bandwidth scheduling in WiMAX subscriber stationAnton Prokopenko, Yevgeny Ryannel, Sergey Berezin. 1-8 [doi]
- Epidemic information diffusion in realistic vehicular network mobility scenariosClaudia Barberis, Giovanni Malnati. 1-8 [doi]
- Concurrent MAC with Short Signaling for multi-hop Wireless Mesh NetworksVigneswara Rao, Mohd Riduan Ahmad, Mohamad Kadim Haji Suaidi, Muhammad Syahrir Johal, Eryk Dutkiewicz. 1-7 [doi]
- Limited forwarding capability in wireless networks with relayingPejman Khadivi, Tahere Nodehi, Hossein Saidi. 1-6 [doi]
- Towards a concept for inclusion of social network information as context informationKatarina Stanoevska-Slabeva, Thomas Wozniak, Isabella Hoffend, Jana Ebermann. 1-5 [doi]
- Implementation of a low cost short-haul optical wireless linkArnab Bhattacharya 0002, Sudheer Sreedhara Krishna, Balaji Srinivasan, Shubhadip Dasgupta. 1-4 [doi]
- A single-server queueing system with modified service mechanismYoshitaka Takahashi, Yoshiaki Shikata, Andreas Frey. 1-6 [doi]
- Design and simulation of Optical Frequency Domain reflectometer for short distance fault detection in optical fibers and integrated optical devices using ptolemy-IIRishvanth Prabakar, Shekhar Rai, Shreya Kumar, Sudheer Sreedhara Krishna, J. P. Raina. 1-3 [doi]
- A novel heuristic algorithm for multiuser detection in synchronous CDMA wireless sensor networksSergio Gil-Lopez, Javier Del Ser, Ignacio (Iñaki) Olabarrieta. 1-6 [doi]
- Towards user-centric configuration and deployment of multimedia services: A semantic frameworkJorge R. Gomez-Montalvo, Ernesto Exposito, Myriam Lamolle. 1-7 [doi]
- Guard Capacity implementation in OPNET Modeler WiMAX SuiteNatalia Vassileva, Yevgeni Koucheryavy, Francisco Barceló-Arroyo. 1-6 [doi]
- An effective gateway discovery mechanism in an integrated Internet-MANET (IIM)Khaleel Ur Rahman Khan, M. Ehthesham, M. Kumar, Rafi U. Zaman. 1-7 [doi]
- Ontology-based abstractions for M2M virtual nodes and topologiesInge Gronbek, Pratik Biswas. 1-8 [doi]
- Exploiting user and network context for intelligent radio network accessChristian Mannweiler, Andreas Klein, Joerg Schneider, Hans D. Schotten. 1-6 [doi]
- Accurate LIDAR beam formation through optical waveguide true time delaysGanesh Shanbhag, T. Srinivas. 1-6 [doi]
- Optimization of survivable networks with simultaneous unicast and anycast flowsJakub Gladysz, Krzysztof Walkowiak. 1-6 [doi]
- Numerical methods of the queuing theory and their program realizationYuri Ryzhikov. 1-8 [doi]
- Load-sharing overlay network design for ubiquitous video surveillance servicesChih-Sung Chen, Chia-Hui Wang, Haw-Yun Shin, Wu-Hsiao Hsu. 1-7 [doi]
- Handoff functions for a Distributed Queuing Collision Avoidance Medium Access Control protocol for Wireless LANsJesus Alonso-Zarate, Elli Kartsakli, Angelos Antonopoulos, Luis Alonso, Christos V. Verikoukis. 1-5 [doi]
- On the efficiency and trustworthiness of DHT-based P2P search algorithms in mobile wireless networksLaura Galluccio, Sergio Palazzo, Corrado Rametta. 1-8 [doi]
- IP over DTN: Large-delay asynchronous packet delivery in the internetHideya Ochiai, Kenichi Shimotada, Hiroshi Esaki. 1-4 [doi]
- QoS measurement aspects for Triple Play ServicesTadeus Uhl. 1-5 [doi]
- A study of token traversal strategies on tree-based backbones for mobile ad hoc - delay tolerant networksApivadee Piyatumrong, Pascal Bouvry, Frédéric Guinand, Kittichai Lavangnananda. 1-8 [doi]
- Application of smoothed estimators in spectrum sensing technique based on model selectionBassem Zayen, Aawatif Hayar, Hamza Debbabi, Hichem Besbes. 1-4 [doi]
- Evaluation of guard channel admission control schemes for IEEE 802.16 with integrated nb-LDPC codesAdam Flizikowski, Rafal Kozik, Mateusz Majewski, Marcin Przybyszewski. 1-8 [doi]
- An adaptive access selection with multple attributes in cognitive radio networkSeung-Kwon Baek, Jae-Su Song, Jin Up Kim. 1-5 [doi]
- Joint source-channel coding using typicality of sequencesMohammad Chiniforoushan, Mahmoud Ahmadian. 1-8 [doi]
- A selective-abstraction modeling approach for simplifying computer network studiesXianhui Che, Ian Wells. 1-4 [doi]
- Towards real implementations of dynamic robust routing exploiting path diversityLuca Muscariello, Diego Perino, Bruno Nardelli. 1-6 [doi]
- A revised taxonomy of mobility-related requirementsSundar Gopalakrishnan, Guttorm Sindre. 1-7 [doi]
- Simulation analysis of Bluetooth Piconets self-disturbance in industrial applications: A case studyMuhammad Kamran Khan, Ahmad Ali Tabassam, Farhan Azmat Ali. 1-8 [doi]
- A spectral technique for image clusteringElena Tsomko, Hyoung Joong Kim, Ebroul Izquierdo, Valia Guerra-Ones. 1-5 [doi]
- Two methods for body parameter analysis using Body Sensor NetworksGianni Fenu, Gary Steri. 1-5 [doi]
- Service and Resource Discovery supports over P2P overlaysEmanuele Carlini, Massimo Coppola, Patrizio Dazzi, Domenico Laforenza, Susanna Martinelli, Laura Ricci. 1-8 [doi]
- IEEE 1900.4 WG on architecture and enablers for optimized radio & spectrum resource usageStanislav A. Filin, Hiroshi Harada, Homare Murakami, Kentaro Ishizu, Goh Miyamoto. 1-8 [doi]
- Improving geometric distance estimation for sensor networks and unit disk graphsFaisal Aslam, Christian Schindelhauer, Arne Vater. 1-5 [doi]
- Coping with hotspots: AoI adaption strategies for P2P Networked Virtual EnvironmentsStephan Krause. 1-6 [doi]
- Finite dimensional statistical inferenceAntonia Masucci, Øyvind Ryan, Sheng Yang, Mérouane Debbah. 1-6 [doi]
- An efficient energy aware routing protocol for real time traffic in wireless sensor networksAmirHossein Mohajerzadeh, Mohammad Hossein Yaghmaee. 1-9 [doi]
- IEEE 802.16m energy-efficient sleep mode operation analysis with mean delay restrictionAlexey Anisimov, Sergey D. Andreev, Andrey M. Turlikov. 1-4 [doi]
- A DTN testbed architectureEfthymios Koutsogiannis, Sotirios Diamantopoulos, Vassilis Tsaoussidis. 1-2 [doi]
- Aequorin: Design of a system for reduction of the user s stress in one daySatoru Tokuhisa. 1-6 [doi]
- Cooperative RTS/CTS MAC with relay selection in distributed wireless networksXin He, Frank Y. Li. 1-8 [doi]
- Coping with variability of location sensing in large-scale ubicomp environmentsPetr Aksenov, Kris Luyten, Karin Coninx. 1-5 [doi]
- Lidar measurements on aerosol characteristics at the tropical stations Trivandrum (8.33degree N, 77degree E) and Gadanki (13.5degree N, 79.2degree E)S. R. Radhakrishnan, M. Satyanarayana, V. Krishnakumar, V. P. Mahadevan Pillai, K. Reghunath. 1-4 [doi]
- On the broadcast capacity of wireless multihop interference networksCagdas Atici, M. Oguz Sunay. 1-6 [doi]
- On VoWLAN service performance in indoor environmentYan Xiao Ren, Yevgeni Koucheryavy. 1-6 [doi]
- Simulation tool for Wireless Sensor Network constellations in spaceWalter Colitti, Kris Steenhaut, Bart Lemmens, Joris Borms. 1-5 [doi]
- A novel wavelet edge detection algorithm for noisy imagesGaurav Kumar Srivastava, Rohit Verma, Ruchika Mahrishi, Siddavatam Rajesh. 1-8 [doi]
- Minimum CAPEX/OPEX design of optical backbone networksAbdallah Jarray, Brigitte Jaumard, Alain C. Houle. 1-8 [doi]
- Effective PRCs positioning for PAPR reduction using PRCs in OFDM systemsS. G. Yew, Chong Eng Tan. 1-5 [doi]
- Weighted algebraic connectivity metric for non-uniform traffic in reliable network designWilliam Liu, Harsha Sirisena, Krzysztof Pawlikowski. 1-6 [doi]
- An adaptive and complexity reduced decoding algorithm for convolutional codes and its application to digital broadcasting systemsJan Geldmacher, Klaus Hueske, Jürgen Götze. 1-7 [doi]
- Jitter based comparisons for routing protocols in mobile ad hoc networksVahid Nazari Talooki, Jonathan Rodriguez. 1-6 [doi]
- Free-CLASH - improved localization-free clustering in large wireless sensor networksJakob Salzmann, Ralf Behnke, Jiaxi You, Dirk Timmermann. 1-6 [doi]
- Expanded Time-Frequency OFDM and its interference suppression techniquesXiao-Yan Xu, Yong Shang, Haige Xiang. 1-5 [doi]
- Robust MBSFN transmission using the Golden codeMarkus Konrad, Wolfgang H. Gerstacker, Wolfgang Koch. 1-6 [doi]
- Dynamic iris localisation: A novel approach suitable for fake iris detectionRajesh M. Bodade, Sanjay N. Talbar. 1-5 [doi]
- A gateway solution for IPv6 wireless sensor networksGopinath Rao Sinniah, Zeldy Suryady, Usman Sarwar, Mazlan Abbas. 1-6 [doi]
- On the architecture of vehicle tracking system using wireless sensor devicesAravind Kota Gopalakrishna, Tapas Chakravarty, M. Girish Chandra, P. Balamuralidhar. 1-5 [doi]
- Expediency of penetration ratio and evaluation of mean throughput for safety and commercial applications in VANETsBhakthavathsalam Ramaswamy, Starakjeet Nayak, Murthy G. Srikumar. 1-5 [doi]
- Exploring user s habits and virtual communities to improve IP-connectivity managementRoberto Rigolin Ferreira Lopes, Roberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Pravin Pawar, Bert-Jan van Beijnum, Edson dos Santos Moreira. 1-6 [doi]
- Optimizing movement of mobile robot considering motor characteristics in disruption tolerant sensor networksShuntaro Matsubara, Ryohei Suzuki, Masayuki Iwai, Kaoru Sezaki. 1-6 [doi]
- Efficient motion estimation for video coding in wireless surveillance applicationsMuhammad Akram, Naeem Ramzan, Ebroul Izquierdo. 1-4 [doi]
- UWB radio propagation for intra vehicle communicationsTsutomu Tsuboi, Jun Yamada, Naoki Yamauchi, Michihiro Nakagawa, Tetsuhiro Maruyama. 1-5 [doi]
- Directed p-cycle protection in dynamic WDM networksAmmar Metnani, Brigitte Jaumard. 1-6 [doi]
- A 2.4GHz 0.18µm-CMOS sub-harmonic mixer for direct-down conversion receiversGholamreza Baghersalimi, Mitra Gilasgar, Alireza Saberkari. 1-5 [doi]
- Analysis on size miniaturization in printed circular disc monopole antennas for UWB communicationsRamu Pillalamarri, G. Sasi Bhushana Rao. 1-6 [doi]
- OOTN -an ontology proposal for optical transport networksPedro Barcelos, Maxwell E. Monteiro, Ricardo Simões, Anilton S. Garcia, Marcelo Eduardo Vieira Segatto. 1-7 [doi]
- Laser ablated nanostructured zinc sulphide thin films for optoelectronics device applicationsS. R. Chalana, R. Vinodkumar, A. P. Detty, I. Navas, K. S. Sreedevi, V. P. Mahadevan Pillai. 1-6 [doi]
- Low-complexity PAPR reduction schemes using SLM and PTS approaches for interleaved OFDMASouad Zid, Ridha Bouallegue. 1-5 [doi]
- Unified policy management in Next Generation NetworksAlberto Diez Albaladejo, Fabricio Carvalho de Gouveia, Irina Boldea, Thomas Magedanz. 1-8 [doi]
- A statistical-feature-based approach to internet traffic classification using Machine LearningShijun Huang, Kai Chen, Chao Liu, Alei Liang, Haibing Guan. 1-6 [doi]
- Queueing network with negative customers and the route changeCiro D Apice, Rosanna Manzo, Alexander Pechinkin, Sergey Shorgin. 1-5 [doi]
- Empirical calculation of shadowing deviation for complex indoor propagation topologies at 2.4 GHzTheofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos. 1-6 [doi]
- Performance evaluation of inter-vehicle communication in a unidirectional dynamic traffic flow with shockwaveWei Lu, Yuanlv Bao, Xiaoyan Sun, Zhe Wang. 1-6 [doi]
- Linear detector performance in ill-conditioned MIMO OFDM channelRehoboam Radzokota, Eugene Golovins, Neco Ventura. 1-7 [doi]
- DroidGlove: An android-based application for wrist rehabilitationDario Deponti, Dario Maggiorini, Claudio E. Palazzi. 1-7 [doi]
- Fast reroute for stateless multicastAndrás Zahemszky, Somaya Arianfar. 1-6 [doi]
- Coordinate-based routing: Refining nodeIds in structured peer-to-peer systemsFabian Hartmann, Bernhard Heep. 1-6 [doi]
- Elimination of RLAN interference on weather radars by channel allocation in 5 GHz bandZoltán Horváth, David Varga. 1-6 [doi]
- µXMPP: Lightweight implementation for low power operating system ContikiHornsby Adrian, Eloi Bail. 1-5 [doi]
- Price bargaining integration with dynamic Call Admission Control in wireless multiservice networksDimitrios Stratogiannis, George Tsiropoulos, John D. Kanellopoulos, Panayotis G. Cottis. 1-6 [doi]
- Process algebra to model self-organizing behavior in Wireless Sensor NetworksDalimir Orfanus, Tales Heimfarth, Flávio Rech Wagner. 1-6 [doi]
- A performance comparison of native IP Multicast and IP Multicast tunneled through a Peer-to-Peer overlay networkMarc Brogle, Dragan Milic, Luca Bettosini, Torsten Braun. 1-6 [doi]
- A context-aware handoff scheme and all-ip mobile multicast service for heterogeneous wireless networksChih-Chao Wen, Cheng-Shong Wu, Wu-Shian Lee, Hui-Kai Su. 1-7 [doi]
- Queueing systems with general renovationIvan Zaryadov. 1-4 [doi]
- Discovery of Physical Neighbors for P2P 3D streamingChang-Hua Wu, Shun-Yun Hu, Li-Ming Tseng. 1-6 [doi]
- A novel prevent-scan Handoff technique for IEEE 802.11 WLANsAhmed Riadh Rebai, Hussein M. Alnuweiri, Saïd Hanafi. 1-5 [doi]
- Analysis of evolution scenarios for end-to-end quality of services provisioning in the internetEugene S. Myakotnykh, Bjarne E. Helvik. 1-5 [doi]
- Evolution of context-aware user profilesJan Thomsen, Yves Vanrompay, Yolande Berbers. 1-6 [doi]
- Secure and cost effective transaction model for financial servicesNitin Munjal, Rajat Moona. 1-6 [doi]
- Images encryption via Discrete Fractional Fourier Transform and Jigsaw transform. Case study: FingerprintsJuan M. Vilardy, Cesar O. Torres, Lorenzo Mattos. 1-5 [doi]
- Assessing data quality by a cross-layer approachMattia Monga, Sabrina Sicari. 1-8 [doi]
- An efficient pseudo-codeword search algorithm for Belief Propagation decoding of LDPC codesShahkar Kakakhail, Sylvain Reynal, David Declercq, Vincent Heinrich. 1-5 [doi]
- Multimodal control via heterogeneous devicesAndrey Ronzhin, Victor Budkov, Alexey Karpov, Milos Zelezný. 1-6 [doi]
- Two-layer network coordinate system for Internet distance predictionChengbo Dong, Guodong Wang, Xuan Zhang, Beixing Deng, Jia Liu, Xing Li. 1-6 [doi]
- Data reverse engineering on a smartphoneFabio Dellutri, Vittorio Ottaviani, Daniele Bocci, Giuseppe F. Italiano, Gianluigi Me. 1-8 [doi]
- Towards security in decentralized workflowsZaharina Velikova, Julian Schütte, Nicolai Kuntze. 1-6 [doi]
- Seamless handoff based on Network Discovery for Future Heterogeneous Mobile NetworksIhsan ul Haq, Khawaja M. Yahya, James M. Irvine, Raziq Yaqub, Tariq M. Jadoon. 1-6 [doi]
- Virtual business networks with Cloud Computing and virtual machinesGiuseppe Minutoli, Maria Fazio, Maurizio Paone, Antonio Puliafito. 1-6 [doi]
- Large system analysis of beamforming for MIMO systems with limited trainingFrancisco Rubio, Dongning Guo, Michael L. Honig, Xavier Mestre. 1-6 [doi]
- Bandwidth efficient multicast routing in multi-channel multi-radio wireless mesh networksHoang Lan Nguyen, Uyen Trang Nguyen. 1-8 [doi]
- Large-scale face images retrieval: A distribution coding approachJean-Paul Kouma, Haibo Li. 1-6 [doi]
- A framework for vulnerability management in complex networksCinara Guellner Ghedini, Carlos Henrique Costa Ribeiro. 1-8 [doi]
- Laser ablated nanostructured tin oxide thin films for optoelectronic device applicationsK. S. Sreedevi, R. Vinodkumar, A. P. Detty, S. R. Detty, I. Navas, V. P. Mahadevan Pillai. 1-5 [doi]
- Popularity-based partial caching management scheme for streaming multimedia on proxy servers over IP networksBeomgu Kang, Eunjo Lee, Sungkwon Park. 1-7 [doi]
- Effect of ring parameters on wavelength characteristics of erbium fiber lasersRajesh Joseph, Samuel Varghese, Suresh K. Nair, M. Sreeja. 1-4 [doi]
- Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networksAbdallah Makhoul, Rachid Saadi, CongDuc Pham. 1-8 [doi]
- On turbo code interleavers optimized by bit error rate evolution and free distance evolutionPavel Krömer, Václav Snásel, Jan Platos, Nabil Ouddane. 1-6 [doi]
- Monetizing IMS-based IPTV through personalized advertisingPhillippa Rosa Wilson, Vitalis G. Oziyani, Neco Ventura. 1-7 [doi]
- Improved reconstruction for distributed video codingRalph Hänsel, Erika Müller. 1-5 [doi]
- Challenges in designing an interest-based distributed aggregation of users in P2P systemsMatteo Mordacchini, Patrizio Dazzi, Gabriele Tolomei, Ranieri Baraglia, Fabrizio Silvestri, Salvatore Orlando. 1-8 [doi]
- The use of resource list servers in IMS presence for developing networksMichael Pitman, Neco Ventura. 1-7 [doi]
- Analysis of power spectrum of continuous phase waveforms for binary modulation communicationsFeng He, Lenan Wu. 1-5 [doi]
- Load balancing in limited intra-cell interference (LICI) networks based on maximum graph-flow algorithmsPanagiotis Tsiakas, Avner Dor, Konstantinos N. Voudouris, Marios G. Hadjinicolaou. 1-5 [doi]
- Mobile object tracking techniques in wireless sensor networksMarjan Naderan Tahan, Mehdi Dehghan, Hossein Pedram. 1-8 [doi]
- Migration from G(E)PON to NGPONEdvin Skaljo, Mujo Hodzic, Ismet Bektas. 1-4 [doi]
- AIM architecture evaluation and validation testbedMaria João Barros, Halid Hrasnica, Spyridon L. Tompros, Michael Caragiozidis. 1-5 [doi]
- Moving data in DTNs with HTTP and MIMELloyd Wood, Peter Holliday, Daniel Floreani, Ioannis Psaras. 1-4 [doi]
- Data migration in the scalable storage cloudDmitry Petrov, Yury Tatarinov. 1-4 [doi]
- Realistic physical layer modelling for georouting protocols in wireless ad-hoc and sensor networksAdnan Afsar Khan, Costas C. Constantinou, Ivan Stojmenovic. 1-8 [doi]
- Heuristic algorithms for finding reliable lightpath under multiple failuresShengli Yuan, William Waller, Ermelinda DeLa Viña. 1-7 [doi]
- Survivability on optical networks: Protecting the protectionAlisson Barbosa de Souza, Ana Luiza Bessa Barros, Antônio Sérgio de S. Vieira, Jéssyca Alencar L. e Silva, Joaquim Celestino Júnior. 1-8 [doi]
- Maximum flow based Routing and Wavelength Assignment in all-optical networksPasquale Gurzi, Walter Colitti, Kris Steenhaut, Ann Nowé. 1-6 [doi]
- Traffic performance for a time-out scheme communication systemKentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu. 1-6 [doi]
- Evaluation of required sensing time for multimedia transmission over cognitive Ultra Wideband systemNorazizah Mohd Aripin, Rozeha A. Rashid, Norsheila Fisal, Sharifah Kamilah Syed Yusof. 1-5 [doi]
- Analysis on ideal network structures to improve reliability by multi-path and multi-homing BGP routing in the InternetHiroshi Fujinoki. 1-6 [doi]
- H.264/SVC rate-resiliency tradeoff in faulty communications through 802.16e railway networksIraide Unanue, Javier Del Ser, Pedro Sanchez, Jon Casasempere. 1-6 [doi]
- Efficient weakly-constrained codes for mitigation of patterning effects in Digital CommunicationsAlexander V. Shafarenko, Michael Fedoruk, Anton Skidin, Sergei K. Turitsyn. 1-6 [doi]
- sDLS - Distributed Least Squares localization for large Wireless Sensor NetworksRalf Behnke, Jakob Salzmann, Dominik Lieckfeldt, Dirk Timmermann. 1-6 [doi]
- Spectrum sharing and cognitive radioTimothy J. Harrold, Lingfeng (Stephen) Wang, Mark A. Beach, Gbenga Salami, Allahyar Yarmohammad, Oliver Holland. 1-8 [doi]
- Enabling technologies for future all-optical packet switched networksAndrea Blanco Redondo, Pablo Beltrán Pellicer, Joseba Zubía Zaballa. 1-6 [doi]
- Optimal control of M/M/1 queueing system with constant retrial rate and non-reliable removable serverDmitry Efrosinin, Olga Semenova. 1-6 [doi]
- Analysis of DSRC based MAC protocols for VANETsShankar Yanamandram, Hamid Shahnasser. 1-6 [doi]
- Performance evaluations of channel estimations in IEEE 802.11p environmentsChi-Sheng Lin, Che-Kang Sun, Jia-Chin Lin, Bo-Chuan Chen. 1-5 [doi]
- Effective buffer and storage management in DTN nodesStylianos Dimitriou, Vassilis Tsaoussidis. 1-3 [doi]
- Congestion optimized routing in unidirectional de Bruijn WDM networks in presence of node faultsMonish Chatterjee, Abhijit Sharma, Uma Bhattacharya. 1-6 [doi]
- A prediction-based algorithm for target tracking in wireless sensor networksSeyed Mahdi Rashti, Mohsen Mollanoori, Morteza Shahriari Nia, Nasrollah Moghaddam Charkari. 1-5 [doi]
- Visualizations of human activities in sensor-enabled ubiquitous environmentsBrian J. d Auriol, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee. 1-6 [doi]
- TCP-aware cross-layer design in cognitive radio networksChangqing Luo, F. Richard Yu, Hong Ji, Victor C. M. Leung. 1-5 [doi]
- Two-dimensional wavelet transform model for MC-CDMASalih M. Salih. 1-5 [doi]
- Approximation to the condition number distribution of almost square matricesLu Wei, Olav Tirkkonen. 1-5 [doi]
- An unknown input sliding observer for anomaly detection in TCP/IP networksSandy Rahme, Yann Labit, Frédéric Gouaisbaut. 1-7 [doi]
- Single parity check product code in MB-OFDM ultra wideband systemNorulhusna Ahmad, Sharifah Kamilah Syed Yusof, Norsheila Fisal. 1-5 [doi]
- A simulation analysis of anti-interference performance in EBPSK systemMan Feng, Lenan Wu. 1-3 [doi]
- A business model for managing municipal metropolitan area networks: the special case of GreeceCostas Troulos, Vasilis Merekoulias, Vasilis Maglaris. 1-7 [doi]
- A perturbative resampling approach to image steganalysisV. Suresh, H. V. Shashidhara, C. E. Veni Madhavan. 1-7 [doi]
- Testing the properties of large quasigroupsEliska Ochodkova, Jiri Dvorský, Václav Snásel, Ajith Abraham. 1-7 [doi]
- CRaSCH: A cooperative scheme for service channel reservation in 802.11p/WAVE vehicular ad hoc networksClaudia Campolo, Alessandro Cortese, Antonella Molinaro. 1-8 [doi]
- On hard and soft detection of space-time block codes by a novel soft output sphere decoderAlberto Vigato, Nevio Benvenuto, Stefano Tomasin, Lorenzo Vangelista. 1-5 [doi]
- Performance evaluation of multiple access protocols for RFID testbed environmentMuhammad Umer Farooq, Muddassir Asif, Naeem Zafar Azeemi. 1-7 [doi]
- Self-Protection: A novel protection scheme for All-Optical Packet Switching networksFernando Solano, Michal Pióro, José-Luis Marzo, Ramón Fabregat. 1-6 [doi]