Abstract is missing.
- Comparing properties of massively multiplayer online worlds and the Internet of ThingsKim J. L. Nevelsteen, Theo G. Kanter, Rahim Rahmani. 1-5 [doi]
- Food and gastronomic heritage: Telling a story of eyes and handsSilvia Mirri, Catia Prandi, Marco Roccetti, Paola Salomoni. 6-9 [doi]
- Network analysis of the Sony Remote Play systemGiacomo Quadrio, Armir Bujari, Claudio E. Palazzi, Daniele Ronzani, Dario Maggiorini, Laura Anna Ripamonti. 10-13 [doi]
- Cyber-healthcare for public healthcare in the developing worldM. Mandava, C. Lubamba, A. Ismail, A. Bagula, Herman Bagula. 14-19 [doi]
- Sequential pattern mining on electronic medical records with handling time intervals and the efficacy of medicinesKeishiro Uragaki, Tomoyuki Hosaka, Yoshitaka Arahori, Muneo Kushima, Tomoyoshi Yamazaki, Kenji Araki, Haruo Yokota. 20-25 [doi]
- A GPU parallel implementation of the Local Principal Component Analysis overcomplete method for DW image denoisingSalvatore Cuomo, Pasquale De Michele, Ardelio Galletti, Livia Marcellino. 26-31 [doi]
- Mitigating traffic problems by integrating smart parking solutions into an interconnected ecosystemMichael Strasser, Daniel Mauser, Sahin Albayrak. 32-37 [doi]
- An architecture for securing federated cloud networks with Service Function ChainingPhilippe Massonet, Sebastien Dupont, Arnaud Michot, Anna Levin, Massimo Villari. 38-43 [doi]
- Crowdsensing and proximity services for impaired mobilityJacopo Cortellazzi, Luca Foschini, Carlos Roberto De Rolt, Antonio Corradi, Carlos Augusto Alperstedt Neto, Graziela Dias Alperstedt. 44-49 [doi]
- IMF remixing for mode demixing in EMD and application for jitter analysisRobertas Damasevicius, Christian Napoli, Tatjana Sidekerskiene, Marcin Wozniak. 50-55 [doi]
- Learning-based Autonomic Decision System for bandwidth-aware routingCarlos Ferreira, Susana Sargento, Arnaldo S. R. Oliveira. 56-63 [doi]
- An efficient transmission scheme for data aggregation in wireless sensor networksJingting Sun, Hui Li, Jinchen An, Kai Pan, Jun Lu. 64-68 [doi]
- Content Consistency Strategy for data storage in Content-Centric NetworkingJingting Sun, Hui Li, Li Xu, Kai Pan, Weijuan Yin. 69-73 [doi]
- Stochastic models for IEEE 802.11pLynda Mokdad, Jalel Ben-Othman, Paolo Ballarini. 74-78 [doi]
- Investigating the effect of User Generated Content in pervasive gamesVlasios Kasapakis, Damianos Gavalas. 79-84 [doi]
- PlayTheCityRE: A visual storytelling system that transforms recorded film memories into visual historyNicola Dusi, Ilaria Ferretti, Marco Furini. 85-90 [doi]
- TSentiment: On gamifying Twitter sentiment analysisMarco Furini, Manuela Montangero. 91-96 [doi]
- Simulation of Massively Multiplayer Online Games communication using OPNET custom applicationSarmad A. Abdulazeez, Abdennour El Rhalibi, Dhiya Al-Jumeily. 97-102 [doi]
- A matching-based strategy for AP selection in sustainable heterogeneous wireless networksHideo Kobayashi, Eiichi Kameda, Norihiko Shinomiya. 103-107 [doi]
- An improved anchor selection strategy for wireless localization of WSN nodesHanen Ahmadi, Federico Viani, Alessandro Polo, Ridha Bouallègue. 108-113 [doi]
- mmWave E-band D2D communications for 5G-underlay networks: Effect of power allocation on D2D and cellular users throughputsZeineb Guizani, Noureddine Hamdi. 114-118 [doi]
- Mobility-aware load distribution scheme for scalable SDN-based mobile networksYeunwoong Kyung, Youngjun Kim, Kiwon Hong, Hyungoo Choi, Mingyu Joo, Jinwoo Park. 119-124 [doi]
- Streaming medical images using video compressionMahmoud Mohamed Shaiboun, Mohamed Shaheen. 125-128 [doi]
- The COLLABORADI project: A rule-based diagnostic imaging prescription systemDomenico Calcaterra, Giuseppe Di Modica, Orazio Tomarchio, Placido Romeo. 129-134 [doi]
- Modeling communication network requirements for an integrated clinical environment in the Prototype Verification SystemCinzia Bernardeschi, Andrea Domenici, Paolo Masci. 135-140 [doi]
- A Differential Evolution approach for classification of Multiple Sclerosis lesionsIvanoe De Falco, Umberto Scafuri, Ernesto Tarantino. 141-146 [doi]
- Using spatial interpolation in the design of a coverage metric for Mobile CrowdSensing systemsMichele Girolami, Stefano Chessa, Mauro Dragone, Mélanie Bouroche, Vinny Cahill. 147-152 [doi]
- Cloudification of Public Services in Smart Cities the CLIPS projectAntonio Filograna, Paolo Smiraglia, Celia Gilsanz, Srdjan Krco, Arturo Medela, Tao Su. 153-158 [doi]
- Are you in or out? Monitoring the human behavior through an occupancy strategyPaolo Barsocchi, Antonino Crivello, Michele Girolami, Fabio Mavilia, Erina Ferro. 159-162 [doi]
- Enriched E-R model to design hybrid database for big data solutionsMassimo Villari, Antonio Celesti, Maurizio Giacobbe, Maria Fazio. 163-166 [doi]
- An efficient approach for Web service selectionWalid Serrai, Abdelli Abdelkrim, Lynda Mokdad, Youcef Hammal. 167-172 [doi]
- Analysis of malware download sites by focusing on time series variation of malwareYasuyuki Tanaka, Atsuhiro Goto. 173-179 [doi]
- A testing framework for Intelligent Transport SystemsHacène Fouchal, Geoffrey Wilhelm, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida. 180-184 [doi]
- MecWilly in your pocket: On evaluating a mobile serious game for kidsCatia Prandi, Silvia Mirri, Paola Salomoni, Elvis Mazzoni. 185-189 [doi]
- Flexible multi-path routing for global optimization in software-defined datacentersWeihua Liu, Weihua Zhou, Yongming Wang, Yuyao Duan, Zhenxiang Gao. 190-195 [doi]
- SMASH: A distributed game engine architectureDario Maggiorini, Laura Anna Ripamonti, Eraldo Zanon, Armir Bujari, Claudio Enrico Palazzi. 196-201 [doi]
- A novel device for self-acquisition of ECG signal in telemedicine systems for chronic patientsMassimiliano Donati, Alessandro Benini, Alessio Celli, Fabrizio Iacopetti, Luca Fanucci. 202-207 [doi]
- A wearable mobility aid for the visually impaired based on embedded 3D vision and deep learningMatteo Poggi, Stefano Mattoccia. 208-213 [doi]
- Using Google Cloud Vision in assistive technology scenariosDavide Mulfari, Antonio Celesti, Maria Fazio, Massimo Villari, Antonio Puliafito. 214-219 [doi]
- Identifying quantitative thresholds for the home health care problemJamal Abdul Nasir, Chuangyin Dang. 220-225 [doi]
- Data window aggregation techniques for energy saving in Wireless Sensor NetworksSomasekhar Reddy Kandukuri, Jean Lebreton, Nour Mohammad Murad, Richard Lorion, Denis Genon-Catalot. 226-231 [doi]
- A clustering based approach for energy efficient routingPavlos Kosmides, Lambros Lambrinos, Vasilis Asthenopoulos, Konstantinos P. Demestichas, Evgenia P. Adamopoulou. 232-237 [doi]
- Performance comparison of non Delay Tolerant VANET routing protocolsIlker Basaran, Hasan Bulut. 238-243 [doi]
- An alternative approach to mobility analysis in vehicular ad hoc networksBahadir K. Polat, Mujdat Soyturk. 244-249 [doi]
- Resource allocation using Nucleolus Value in downlink LTE networksSamia Dardouri, Ridha Bouallegue, Anne Wei. 250-254 [doi]
- An architecture for using commodity devices and smart phones in health systemsGeir Horn, Frank Eliassen, Amir Taherkordi, Salvatore Venticinque, Beniamino Di Martino, Monika Büscher, Lisa Wood. 255-260 [doi]
- Analytic and learning framework for quantifying Value in Value Based CarePrasad Saripalli. 261-266 [doi]
- New trends in Biotechnology: The point on NGS Cloud computing solutionsAntonio Celesti, Maria Fazio, Fabrizio Celesti, Giovanna Sannino, Salvatore Campo, Massimo Villari. 267-270 [doi]
- Trend of FEV1 in Cystic Fibrosis patients: A telehomecare experienceFabrizio Murgia, Irene Tagliente, Italo Zoppis, Giancarlo Mauri, Francesco Sicurello, Francesco Bella, Vanessa Mercuri, Eugenio Santoro, Gianluca Castelnuovo, Sergio Bella. 271-273 [doi]
- Embedded implementation of an eye-in-hand visual servoing control for a Wheelchair Mounted Robotic ArmAlessandro Palla, Luca Sarti, Alessandro Frigerio, Luca Fanucci. 274-277 [doi]
- Modular Health Kiosk for health self-assessmentEduardo Soares, Cristina Oliveira, Joao Maia, Rafael Almeida, Miguel Coimbra, Pedro Brandão, Rui Prior. 278-280 [doi]
- Improving desktop as a Service in OpenStackAntonio Celesti, Davide Mulfari, Maria Fazio, Massimo Villari, Antonio Puliafito. 281-288 [doi]
- A Cloud Platform-as-a-Service for multimedia conferencing service provisioningAhmad Ferdous Bin Alam, Abbas Soltanian, Sami Yangui, Mohammad Ali Salahuddin, Roch H. Glitho, Halima Elbiaze. 289-294 [doi]
- Workload regression-based resource provisioning for small cloud providersBruno Yuji Lino Kimura, Roberto Sadao Yokoyama, Thiago Oliveira Miranda. 295-301 [doi]
- Greedy heuristic for replica server placement in Cloud based Content Delivery NetworksJagruti Sahoo, Roch H. Glitho. 302-309 [doi]
- Malachite: Firewall policy comparisonDinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner. 310-317 [doi]
- Intrusion detection in SCADA systems by traffic periodicity and telemetry analysisJiexin Zhang, Shaoduo Gan, Xiaoxue Liu, Peidong Zhu. 318-325 [doi]
- GREP: A group rekeying protocol based on member join historyMarco Tiloca, Gianluca Dini. 326-333 [doi]
- A novel wavelet based independent component analysis method for pre-processing computer video leakage signalJun Shi, Abbas Yongaçoglu, Degang Sun, Dong Wei, Meng Zhang. 334-339 [doi]
- Policy-based dynamic service chaining in Network Functions VirtualizationEder J. Scheid, Cristian Cleder Machado, Ricardo L. dos Santos, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville. 340-345 [doi]
- Crowdsourcing-based mobile network tomography for xG wireless systemsErgin Dinc, Mustafa Ozger, Ahmet F. Ates, Ibrahim Delibalta, Ozgur B. Akan. 346-351 [doi]
- A cross-layer QoS solution for resource optimization in LTE networksNaila Bouchemal, Sondes Kallel, Samir Tohmé. 352-357 [doi]
- Deployment strategies for underwater sensing and processing networksHesham Alhumyani, Reda Ammar, Hussain Albarakati, Ayman Alharbi. 358-363 [doi]
- An adaptive emergency protocol for people evacuation in high-rise buildingsSoledad Escolar, David Villa, Felix Jesús Villanueva, Ruben Cantarero, Juan Carlos López. 364-371 [doi]
- Signals from the depths: Properties of percolation strategies with the Argo datasetFlaviano Di Rienzo, Michele Girolami, Stefano Chessa, Francesco Paparella, Antonio Caruso. 372-378 [doi]
- Mobile sensing framework for task partitioning between cloud and edge device for improved performanceShahnawaz Alam, Keshaw Dewangan, Arijit Sinharay, Avik Ghose. 379-384 [doi]
- ISCRa - an Intelligent Sensing Protocol for Cognitive RadioAriel F. F. Marques, Gilson Miranda, Liberio M. Silva, Raphael S. Avila, Luiz H. A. Correia. 385-390 [doi]
- ANSwer: Combining NFV and SDN features for network resilience strategiesCristian Cleder Machado, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho. 391-396 [doi]
- Towards mitigating Link Flooding Attack via incremental SDN deploymentLei Wang, Qing Li, Yong Jiang, Jianping Wu. 397-402 [doi]
- Hybridtrace: A traceroute tool for hybrid networks composed of SDN and legacy switchesShie-Yuan Wang, Chia-Cheng Wu, Chih-Liang Chou. 403-408 [doi]
- SAVSH: IP source address validation for SDN hybrid networksGuolong Chen, Guangwu Hu, Yong Jiang, Chaoqin Zhang. 409-414 [doi]
- SensIPro: Smart sensor analytics for Internet of thingsSoma Bandyopadhyay, Arijit Ukil, Chetanya Puri, Rituraj Singh, Tulika Bose, Arpan Pal. 415-421 [doi]
- Mobile edge clouds for Information-Centric IoT servicesEleonora Borgia, Raffaele Bruno, Marco Conti, Davide Mascitti, Andrea Passarella. 422-428 [doi]
- Prediction of electrical energy consumption for Internet of Things in disaggregated databasesWesllen Sousa, Eduardo Souto, Thiago S. Rocha, Namedin Pereira, Peeter Kool, Peter Rosengren. 429-434 [doi]
- SPF: An SDN-based middleware solution to mitigate the IoT information explosionMauro Tortonesi, James Michaelis, Alessandro Morelli, Niranjan Suri, Michael A. Baker. 435-442 [doi]
- IacDroid: Preventing Inter-App Communication capability leaks in AndroidDaojuan Zhang, Rui Wang, Zimin Lin, Dianjie Guo, Xiaochun Cao. 443-449 [doi]
- Efficient multi-account detection on UGC sitesXucheng Luo, Fan Zhou, Mengjuan Liu, Yajun Liu, Chunjing Xiao. 450-455 [doi]
- TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platformsXianyi Zheng, Lulu Yang, Jiangang Ma, Gang Shi, Dan Meng. 456-462 [doi]
- A model for identity management with privacy in the cloudJorge Werner, Carla Merkle Westphall. 463-468 [doi]
- Cellular traffic offloading through network-assisted ad-hoc routing in cellular networksJörg Hähner, Klement Streit, Sven Tomforde. 469-476 [doi]
- On the potential of ensemble regression techniques for future mobile network planningJessica Moysen, Lorenza Giupponi, Josep Mangues-Bafalluy. 477-483 [doi]
- Identifying latency factors in SDN-based Mobile Core NetworksClarissa Cassales Marquezan, Xueli An, Zoran Despotovic, Ramin Khalili, Artur Hecker. 484-491 [doi]
- Compensating multiuser synchronization errors in 5G communications: The radio resource overheadDimitris Tsolkas, Nikos I. Passas. 492-494 [doi]
- Energy-efficient MAC schemes for Delay-Tolerant Sensor NetworksXiaoli Zhou, Azzedine Boukerche. 495-500 [doi]
- An efficient partial coverage algorithm for wireless sensor networksHabib Mostafaei, Antonio Montieri, Valerio Persico, Antonio Pescapè. 501-506 [doi]
- Localized scheduling for end-to-end delay constrained Low Power Lossy networks with 6TiSCHInes Hosni, Fabrice Theoleyre, Noureddine Hamdi. 507-512 [doi]
- Performance study of co-located IEEE 802.15.4-TSCH networks: Interference and coexistenceSahar Ben Yaala, Fabrice Theoleyre, Ridha Bouallegue. 513-518 [doi]
- SDN verification plane for consistency establishmentAli Hussein, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. 519-524 [doi]
- MARS: An SDN-based malware analysis solutionJoão Marcelo Ceron, Cintia Borges Margi, Lisandro Zambenedetti Granville. 525-530 [doi]
- Improving productivity and reducing cost through the use of visualizations for SDN managementVinicius Tavares Guimaraes, Oscar Mauricio Caicedo Rendon, Glederson Lessa dos Santos, Guilherme da Cunha Rodrigues, Carla Maria Dal Sasso Freitas, Liane Margarida Rockenbach Tarouco, Lisandro Zambenedetti Granville. 531-538 [doi]
- Exploiting path diversity in datacenters using MPTCP-aware SDNSavvas Zannettou, Michael Sirivianos, Fragkiskos Papadopoulos. 539-546 [doi]
- Mediator framework for inserting xDRs into HadoopÓscar Mortágua Pereira, Micael Capitao, Diogo Domingues Regateiro, Rui L. Aguiar, Joao Bica Osorio. 547-554 [doi]
- Application profiling in hierarchical Hadoop for geo-distributed computing environmentsMarco Cavallo, Giuseppe Di Modica, Carmelo Polito, Orazio Tomarchio. 555-560 [doi]
- Leveraging Crowd to improve data credibility for mobile crowdsensingTongqing Zhou, Zhiping Cai, Ming Xu, Yueyue Chen. 561-568 [doi]
- Local programming language barriers in stream-based systemsRuediger Gad, Martin Kappes, Inmaculada Medina-Bulo. 569-574 [doi]
- Architectural recovering model for Distributed Databases: A reliability, availability and serviceability approachRamon Hugo de Souza, Paulo Arion Flores, Mario Antonio Ribeiro Dantas, Frank Siqueira. 575-580 [doi]
- Public integrity auditing for dynamic regenerating code based cloud storageKai He, Chuanhe Huang, Jiaoli Shi, Jinhai Wang. 581-588 [doi]
- Impact of different auto-scaling strategies on adaptive Mobile Cloud Computing systemsMichele Amoretti, Luca Consolini, Alessandro Grazioli, Francesco Zanichelli. 589-596 [doi]
- A scalable architecture for low-latency market-data processing on FPGAQiu Tang, Majing Su, Lei Jiang, Jiajia Yang, Xu Bai. 597-603 [doi]
- Joint analog network coding and channel allocation in the walking scenario for WBANHongyun Zhang, Farzad Safaei, Le Chung Tran. 604-609 [doi]
- Insights on the resilience and capacity of AMI wireless networksJoao R. R. Renofio, Marcelo Eduardo Pellenz, Altair Olivio Santin, Edgard Jamhour, Manoel Camillo Penna, Richard Demo Souza. 610-615 [doi]
- Data recovery in heterogeneous wireless sensor networks based on low-rank tensorsJingfei He, Guiling Sun, Ying Zhang, Tianyu Geng. 616-620 [doi]
- A heuristic approach for overlay content-caching network design in 5G wireless networksAbd AlRahman AlMomani, Antonios Argyriou, Melike Erol-Kantarci. 621-626 [doi]
- Optimizing SLA-driven adaptive routingGeorgios Katsikogiannis, Sarandis Mitropoulos, Christos Douligeris. 627-632 [doi]
- A popularity-driven caching scheme with dynamic multipath routing in CCNWeiyuan Li, Yang Li, Wei Wang, Yonghui Xin, Tao Lin. 633-638 [doi]
- Distributed mobility management in future networks: Tunneling or host routing?Tiago Silvestre Condeixa, Susana Sargento. 639-645 [doi]
- Identification of congestion links under multipath routing with end-to-end measurementsShengli Pan, Qing Jiang, Xiaoyan Nie, Guangmin Hu. 646-650 [doi]
- Design, implementation and performance evaluation of software OpenFlow flow counters in a bare metal commodity switchShie-Yuan Wang, Szu-Yu Liu, Chih-Liang Chou. 651-656 [doi]
- FRT-Skip Graph: A Skip Graph-style structured overlay based on Flexible Routing TablesMasashi Hojo, Ryohei Banno, Kazuyuki Shudo. 657-662 [doi]
- DReAM - a distributed result-aware monitor for Network Functions VirtualizationRicardo J. Pfitscher, Eder J. Scheid, Ricardo L. dos Santos, Rafael R. Obelheiro, Maurício Aronne Pillon, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville. 663-668 [doi]
- Comparing virtualization solutions for NFV deployment: A network management perspectiveLucas Bondan, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville. 669-674 [doi]
- Power-aware design of the optical interconnect for future data centersNabil A. Naas, Hussein T. Mouftah. 675-682 [doi]
- An analytical study for an asynchronous transmission protocol for optical high-speed networks with multiple tunable receivers per nodePeristera A. Baziana. 683-688 [doi]
- Energy efficiency analysis of the Watchful Sleep mode in next-generation passive optical networksRaisa O. C. Hirafuji, Ahmad R. Dhaini, Denis A. Khotimsky, Divanilson R. Campelo. 689-695 [doi]
- Crosstalk-aware Routing and Spectrum assignment in flexible grid networksKonstantinos Manousakis, Georgios Ellinas. 696-701 [doi]
- Data-Sluice: Fine-grained traffic control for Android applicationAndrea Saracino, Fabio Martinelli, Gaetano Alboreto, Gianluca Dini. 702-709 [doi]
- Logical key hierarchy for groups management in Distributed Online Social NetworkAndrea De Salve, Roberto Di Pietro, Paolo Mori, Laura Ricci. 710-717 [doi]
- Internet-of-everything oriented implementation of secure Digital Health (D-Health) systemsGrayson Honan, Alex Page, Övünç Kocabas, Tolga Soyata, Burak Kantarci. 718-725 [doi]
- Real-time path planning to prevent traffic jam through an intelligent transportation systemAllan Mariano de Souza, Roberto Sadao Yokoyama, Guilherme Maia, Antonio A. F. Loureiro, Leandro Aparecido Villas. 726-731 [doi]
- A flow mobility management architecture based on proxy mobile IPv6 for vehicular networksRodolfo Ipolito Meneguette, Azzedine Boukerche, Daniel L. Guidoni, Robson Eduardo De Grande, Antonio A. F. Loureiro, Leandro A. Villas. 732-737 [doi]
- Design and implementation of wireless sensor network node for rotating electrical machineSonia Ben Brahim, Ridha Bouallegue, Jacques David, Tan Hoa Vuong, Maria Pietrzak-David. 738-742 [doi]
- A framework for ontology provisioning in Virtualized Wireless Sensor NetworksRifat Jafrin, Imran Khan, Jagruti Sahoo, Roch H. Glitho. 743-749 [doi]
- Iterative space-frequency equalizer for CE-OFDM mmW based systemsRoberto Magueta, Daniel Castanheira, Adão Silva, Rui Dinis, Atílio Gameiro. 750-755 [doi]
- Smart shires: The revenge of countrysidesStefano Ferretti, Gabriele D'Angelo. 756-759 [doi]
- Development and realization of an artificial patient with hearing impairmentA. Kocian, S. Chessa, W. Grolman. 760-765 [doi]
- A multi-population based parallel genetic algorithm for multiprocessor task scheduling with Communication CostsRashid Morady, Deniz Dal. 766-772 [doi]
- An efficient dynamic scheduling algorithm for periodic tasks in real-time systems using dynamic average estimationAhmed Alsheikhy, Reda Ammar, Raafat S. Elfouly, Mosleh Alharthi, Abdulrahman Alshegaifi. 773-777 [doi]
- Dealing with temporary domain name issues in the DNSXuebiao Yuchi, Xiaodong Lee, Lanlan Pan. 778-783 [doi]
- Doopnet: An emulator for network performance analysis of Hadoop clusters using Docker and MininetYuansong Qiao, Xueyuan Wang, Guiming Fang, Brian Lee. 784-790 [doi]
- Load-aware hybrid scheduling in large compute clustersDi Fu, Jiahai Yang, Xiao Ling, Hui Zhang. 791-796 [doi]
- Probabilistic provisioning and scheduling in uncertain Cloud environmentsMarco L. Della Vedova, Daniele Tessera, Maria Carla Calzarossa. 797-803 [doi]
- Planning for green cloud data centers using sustainable energyChonglin Gu, Zhenlong Li, Chunyan Liu, Hejiao Huang. 804-809 [doi]
- Towards optimal cache decision for campus networks with content-centric network routersMuhui Shen, Bing Chen, Xiaojun Zhu 0001, Yanchao Zhao. 810-815 [doi]
- Content aware multi-path forwarding strategy in Information Centric NetworkingYonghui Xin, Yang Li, Wei Wang, Weiyuan Li, Xin Chen. 816-823 [doi]
- A novel cooperative caching scheme for Content Centric Mobile Ad Hoc NetworksYinLong Liu, Dali Zhu, Wei Ma. 824-829 [doi]
- An efficient KP-ABE scheme for content protection in Information-Centric NetworkingJinmiao Wang, Bo Lang. 830-837 [doi]
- Primary user activity classification aided channel assignment in cognitive radio networksGulnur Selda Uyanik, Sema Oktug. 838-842 [doi]
- Fuzzy-based assignment algorithm for channel sensing task in cognitive radio networksMariam Nabil, Mustafa ElNainay. 843-848 [doi]
- Wideband spectrum sensing technique based on multitask compressive sensingOsama Elnahas, Maha Elsabrouty. 849-854 [doi]
- Spectrum resource management and interference mitigation for D2D communications with awareness of BER constraint in mmWave 5G underlay networkZeineb Guizani, Noureddine Hamdi. 855-860 [doi]
- DBuffer: A state machine oriented control system for DASHDaniel Bezerra, Maria Silvia Ito, Wesley Melo, Djamel Sadok, Judith Kelner. 861-867 [doi]
- Cross-network and cross-layer optimized video streaming over LTE and WCDMA downlinkZhenjie Deng, Yanwei Liu, Jinxia Liu, Xin Chen, Antonios Argyriou, Zhen Xu, Song Ci. 868-873 [doi]
- Multi-locality correlation feature learning for image recognitionShuzhi Su, Hong-Wei Ge, Yun-Hao Yuan. 874-879 [doi]
- Goodput guaranteed buffer management strategy for streaming data with packet dependenciesJinghong Wu, Hong Ni, Xuewen Zeng, Xiaozhou Ye. 880-885 [doi]
- Risk-based model for availability estimation of SAF redundancy modelsGlauco Estacio Gonçalves, Patricia Takako Endo, Moisés Rodrigues, Judith Kelner, Djamel Fawzi Hadj Sadok, Calin Curescu. 886-891 [doi]
- On composing a resilient tree in a network with intermittent links based on stress centralityGenya Ishigaki, Norihiko Shinomiya. 892-894 [doi]
- Resilient composition of Web services through nondeterministic planningJhonatan Alves, Jerusa Marchi, Renato Fileto, Mario A. R. Dantas. 895-900 [doi]
- Practical multiple node failure recovery in distributed storage systemsMay Itani, Sanaa Sharafeddine, Islam Elkabbani. 901-907 [doi]
- Quality of context and grid computing: An user satisfaction and system performance trade off modelAndre Luiz Tinassi D'Amato, Mario A. R. Dantas. 908-913 [doi]
- A novel energy efficient platform based model to enable mobile Cloud applicationsShichao Guan, Robson Eduardo De Grande, Azzedine Boukerche. 914-919 [doi]
- Reducing the performance gap of remote GPU virtualization with InfiniBand Connect-IBCarlos Reaño, Federico Silla. 920-925 [doi]
- Isolating bandwidth guarantees from work conservation in the cloudLong Li, Ke Liu, Binzhang Fu, Mingyu Chen, Lixin Zhang. 926-931 [doi]
- DPListCF: A differentially private approach for listwise collaborative filteringYuncheng Wu, Juru Zeng, Hong Chen, Yao Wu, WenJuan Liang, Hui Peng, Cuiping Li. 932-937 [doi]
- Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDNHani Salah, Thorsten Strufe. 938-945 [doi]
- A differential private collaborative filtering framework based on privacy-relevance of topicsTingting Feng, Yuchun Guo, Yishuai Chen. 946-951 [doi]
- Big Data Analytics: Security and privacy challengesYoussef Gahi, Mouhcine Guennoun, Hussein T. Mouftah. 952-957 [doi]
- QoS-based Distributed Time Synchronization mechanism for high intensity vehicular networksYamen Y. Nasrallah, Irfan S. Al-Anbagi, Hussein T. Mouftah. 958-963 [doi]
- Dédalo: A middleware with a single point of access for heterogeneous distributed computing environmentsEduardo Camilo Inacio, Frank Siqueira, Mario A. R. Dantas. 964-969 [doi]
- Smart multihoming in smart shires: Mobility and communication management for smart services in countrysidesStefano Ferretti, Gabriele D'Angelo, Vittorio Ghini. 970-975 [doi]
- A quality-aware delay-tolerant approach for navy communicationsTiago Almeida, Lucas Guardalben, Susana Sargento. 976-981 [doi]
- FOX: A traffic management system of computer-based vehicles FOGCelso A. R. L. Brennand, Felipe Domingos da Cunha, Guilherme Maia, Eduardo Cerqueira, Antonio A. F. Loureiro, Leandro A. Villas. 982-987 [doi]
- An ALM matrix completion algorithm for recovering weather monitoring dataYuqing Chen, Ying Xu, Renfa Li. 988-995 [doi]
- Hierarchical Cuckoo Search-based routing in Wireless Sensor NetworksChérifa Boucetta, Hanen Idoudi, Leïla Azouz Saidane. 996-998 [doi]
- COLLEGA middleware for the management of participatory Mobile Health CommunitiesCarlos Roberto De Rolt, Rebecca Montanari, Marcelo Luiz Brocardo, Luca Foschini, Julio Da Silva Dias. 999-1005 [doi]
- Proportional fair rate allocation for private shared networksSaman Feghhi, Douglas J. Leith, Mohammad Karzand. 1006-1011 [doi]
- Over-The-Top Catch-up TV content-aware cachingJoão Nogueira, Daniel Gonzalez, Lucas Guardalben, Susana Sargento. 1012-1017 [doi]
- Frequency-selective massive MIMO channel estimation and feedback in angle-time domainAhmed Nasser, Maha Elsabrouty. 1018-1023 [doi]
- A novel optimization scheme for caching in locality-aware P2P networksShaoduo Gan, Jiexin Zhang, Jie Yu, Xiaoling Li, Jun Ma, Lei Luo, Qingbo Wu. 1024-1031 [doi]
- NFRs based web services scoring as web serviceTaycir Bouasker, Mahjoub Langar, Riadh Robbana. 1032-1038 [doi]
- A Communication Supportable Generic Model for Mobile VPN on Android OSChunle Fu, Qinggang He, BaiLing Wang, Xixian Han. 1039-1046 [doi]
- An efficient Minimum Spanning Tree algorithmAbdullah Al Mamun, Sanguthevar Rajasekaran. 1047-1052 [doi]
- Blind decryption for cloud computingYoussef Gahi, Farid Bourennani, Mouhcine Guennoun, Hussein T. Mouftah. 1053-1057 [doi]
- On the error detection capability of combined LDPC and CRC codes for space telecommand transmissionsMarco Baldi, Nicola Maturo, Giacomo Ricciutelli, Franco Chiaraluce. 1058-1065 [doi]
- Hidden terminal management for uplink traffic in rate-controlled WiFi networksMustafa Al-Bado, Cigdem Sengul, Cormac J. Sreenan, Kenneth N. Brown. 1066-1071 [doi]
- Capacity analysis and waveform design of a non-orthogonal waveform superposition scheme for high reliable communicationsYing Wang, Yongming Wang. 1072-1077 [doi]
- Transmission power management for throughput maximization in harvesting enabled D2D networkUmber Saleem, Hassaan Khaliq Qureshi, Sobia Jangsher, Muhammad Saleem. 1078-1083 [doi]
- Mobile behaviometric framework for sociability assessment and identification of smartphone usersFazel Anjomshoa, Matthew Catalfamo, Daniel Hecker, Nicklaus Helgeland, Andrew Rasch, Burak Kantarci, Melike Erol-Kantarci, Stephanie Schuckers. 1084-1089 [doi]
- A comprehensive trust-based item evaluation model for recommendation in social networkLaizhong Cui, Peng Ou, Nan Lu, Guanjing Zhang. 1090-1096 [doi]
- Improving population estimation from mobile calls: A clustering approachAlessandro Lulli, Lorenzo Gabrielli, Patrizio Dazzi, Matteo Dell'Amico, Pietro Michiardi, Mirco Nanni, Laura Ricci. 1097-1102 [doi]
- A new model for nickname detection based on network structure and similarity propagationZhaoli Liu, Tao Qin, Dan Zhao, Xiaohong Guan, Tao Yang. 1103-1108 [doi]
- Identity-based authentication scheme for the Internet of ThingsOla Salman, Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. 1109-1111 [doi]
- Enhanced traffic offloading with D2D communications under noise rise constraintEmna Fakhfakh, Soumaya Hamouda, Sami Tabbane. 1112-1116 [doi]
- Adaptive access protocol for heavily congested M2M networksMeriam Bouzouita, Yassine Hadjadj Aoul, Nawel Zangar, Sami Tabbane. 1117-1119 [doi]
- A fast tags polling protocol for multireader RFID systemsMaurizio A. Bonuccelli. 1120-1127 [doi]
- Smart grid power scheduling via bottom left decreasing height packingAnshu Ranjan, Pramod P. Khargonekar, Sartaj Sahni. 1128-1133 [doi]
- Comparative evaluation of Smart Grid AMI networks: Performance under privacyUtku Ozgur, Samet Tonyali, Kemal Akkaya, Fatih Senel. 1134-1136 [doi]
- Minimizing computing-plus-communication energy consumptions in virtualized networked data centersMohammad Shojafar, Claudia Canali, Riccardo Lancellotti, Enzo Baccarelli. 1137-1144 [doi]
- A storage approach for OpenFlow switch based on Protocol Oblivious ForwardingJinghong Wu, Hong Ni, Xuewen Zeng, Li Ding, Xiaozhou Ye. 1145-1150 [doi]
- Scenic Athens: A personalized scenic route planner for touristsDamianos Gavalas, Vlasios Kasapakis, Grammati E. Pantziou, Charalampos Konstantopoulos, Nikolaos Vathis, Konstantinos Mastakas, Christos D. Zaroliagis. 1151-1156 [doi]
- HaRTKad: A P2P-based concept for deterministic communication and its limitationsBjörn Konieczek, Jan Skodzik, Peter Danielis, Vlado Altmann, Michael Rethfeldt, Dirk Timmermann. 1157-1162 [doi]
- Double rate OFDM system in time varying channelAshraf Y. Hassan. 1163-1170 [doi]
- Joint power control and sub-channel allocation for co-channel OFDMA femtocellsShiva Kazemi, Mehdi Rasti. 1171-1176 [doi]
- Taking swarms to the field: Constrained Spiral Flocking for underwater searchSherif Tolba, Reda Ammar, Sanguthevar Rajasekaran. 1177-1184 [doi]
- Retweeting behavior prediction using probabilistic matrix factorizationKai Zhang, Xiao-chun Yun, Jiguang Liang, Xiao-Yu Zhang, Chao Li, Bin Tian. 1185-1192 [doi]
- Measuring the users and conversations of a vibrant online emotional support systemMaria Carla Calzarossa, Luisa Massari, Derek Doran, Samir Yelne, Nripesh Trivedi, Glen Moriarty. 1193-1199 [doi]
- FSF: Friendship and selfishness forwarding for Delay Tolerant NetworksCamilo Batista Souza, Edjair de Souza Mota, Leandro Galvao, Pietro Manzoni, Juan-Carlos Cano, Carlos T. Calafate. 1200-1207 [doi]
- Time patterns for cyber-physical systemsImen Graja, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem. 1208-1211 [doi]
- Car parking occupancy detection using smart camera networks and Deep LearningGiuseppe Amato, Fabio Carrara, Fabrizio Falchi, Claudio Gennaro, Claudio Vairo. 1212-1217 [doi]
- MSER-based text detection and communication algorithm for autonomous vehiclesAbdelhamid Mammeri, Azzedine Boukerche, El-Hebri Khiari. 1218-1223 [doi]
- Multi Topology Routing based IP Fast Re-Route for Software Defined NetworksSelcuk Cevher, Mustafa Ulutas, Sedat Altun, Ibrahim Hökelek. 1224-1226 [doi]
- Session-aware congestion control for TCP Incast in datacenter networksDagang Li, Shuyi Li, Zheng Du. 1227-1232 [doi]
- OpenFlow-based mechanisms for QoS in LTE backhaul networksLuciano Jerez Chaves, Islene Calciolari Garcia, Edmundo Roberto Mauro Madeira. 1233-1238 [doi]
- Priority-based and Throughput-guaranteed Transport protocol for data center networksZongyi Zhao, Qing Li, Mingwei Xu, Lei Wang, Meng Chen. 1239-1244 [doi]
- Modeling NDN PIT to analyze the limits of timeout on the effectiveness of flooding attacksFlavio Guimaraes, Antonio A. Rocha, Célio Vinicius N. Albuquerque, Igor G. Ribeiro. 1245-1250 [doi]
- Evaluating privacy attacks in Named Data NetworkErtugrul Dogruluk, Antonio D. Costa, Joaquim H. Macedo. 1251-1256 [doi]
- Flexible and robust Enterprise Right ManagementLuigi Catuogno, Clemente Galdi, Daniel Riccio. 1257-1262 [doi]
- On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructureDiana Berbecaru, Antonio Lioy. 1263-1269 [doi]
- Design and analysis of a Threshold Offloading (TO) algorithm for LTE femtocell/macrocell networksWei-Han Chen, Yi Ren, Jyh-Cheng Chen. 1270-1275 [doi]
- Robust available bandwidth estimation against dynamic behavior of packet scheduler in operational LTE networksTakashi Oshiba, Kousuke Nogami, Koichi Nihei, Kozo Satoda. 1276-1283 [doi]
- A distributed joint power control and mode selection scheme for D2D-enabled cellular systemsAlireza Abedin, Mehdi Rasti. 1284-1289 [doi]
- Characterizing the SINRs region corresponding to a given target-rate in OFDMA networksFahime Khoramnejad, Mehdi Rasti, Hossein Pedram. 1290-1293 [doi]
- An improved trie-based name lookup scheme for Named Data NetworkingDagang Li, Junmao Li, Zheng Du. 1294-1296 [doi]
- Efficient, problem tailored big data processing using framework delegationNickolas Davis, Matthew Broomfield, Abdelmounaam Rezgui. 1297-1299 [doi]
- Adaptively modeling multi-feature preferences for personalized searchXuying Meng, Zhiwei Xu, Miao Wang, Hanwen Zhang, Yujun Zhang. 1300-1305 [doi]
- An OCCI-compliant framework for fine-grained resource-aware management in Mobile Cloud NetworkingAndy Edmonds, Giuseppe Carella, Faqir Zarrar Yousaf, Carlos Goncalves, Thomas Michael Bohnert, Thijs Metsch, Paolo Bellavista, Luca Foschini. 1306-1313 [doi]