Abstract is missing.
- Message from the IWCMC 2015 chairsVlatko Lipovac, Borivoj Modlic, Mislav Grgic, Hüseyin Arslan. 1 [doi]
- Multipath TCP over LEO satellite networksPengyuan Du, Xiao Li, You Lu, Mario Gerla. 1-6 [doi]
- DiscoverFriends: Secure social network communication in mobile ad hoc networksEric Chung, Joshua Joy, Mario Gerla. 7-12 [doi]
- A novel social contact graph based routing strategy for Delay Tolerant NetworksTuan Le, Haik Kalantarian, Mario Gerla. 13-18 [doi]
- A context-aware cognitive SIMO transceiver for increased LTE-HetNet system-level DL-throughputImen Mrissa, Faouzi Bellili, Sofiène Affes, Alex Stephenne. 19-25 [doi]
- Analysis on connectivity performance for vehicular ad hoc networks subjected to user behaviorRuifeng Chen, Zhengguo Sheng, Zhangdui Zhong, Minming Ni, David G. Michelson, Victor C. M. Leung. 26-31 [doi]
- A novel method for ergodic sum rate analysis of spatial modulation systems with maximum likelihood receiverShangbin Wu, Piya Patcharamaneepakorn, Cheng-Xiang Wang, El-Hadi M. Aggoune, Mohammed M. Alwakeel, Yejun He. 32-36 [doi]
- On the analysis of QoE in cellular networks: From subjective tests to large-scale traffic measurementsPedro Casas, Martín Varela, Pierdomenico Fiadino, Mirko Schiavone, Helena Rivas, Raimund Schatz. 37-42 [doi]
- YouTube QoE on mobile devices: Subjective analysis of classical vs. adaptive video streamingMichael Seufert, Florian Wamser, Pedro Casas, Ralf Irmer, Phuoc Tran-Gia, Raimund Schatz. 43-48 [doi]
- Adkintun Mobile: Towards using personal and device context in assessing mobile QoSFelipe Lalanne, Nicolas Aguilera, Alvaro Graves, Javier Bustos. 49-54 [doi]
- Distributed power allocation and interference mitigation in two-tier femtocell networks: A game-theoretic approachMaryam Lashgari, Behrouz Maham, Hamed Kebriaei, Walid Saad. 55-60 [doi]
- Reducing the complexity of Resource Allocation for underlaying Device-to-Device communicationsMohammad Tauhidul Islam, Abd-Elhamid M. Taha, Selim G. Akl. 61-66 [doi]
- QoS-provisioning downlink resource management in 4G cellular systemsYou-Chiun Wang, Song-Yun Hsieh. 67-72 [doi]
- Dynamic AIFSN tuning for improving the QoS over IEEE 802.11 WLANsEstefania Coronado, José Villalón, Antonio Garrido. 73-78 [doi]
- Activity dependent power allocation algorithm for IEEE 802.11 networksTomas Cuzanauskas, Arturas Medeisis, Aurimas Anskaitis. 79-83 [doi]
- SLNR beamforming based iterative power allocation in TD-LTE-A downlinkXuanli Wu, Wanjun Zhao, Xuejun Sha, Fabrice Labeau, Ye Wang. 84-89 [doi]
- Cooperative jamming with untrusted SUs for secure communication of two-hop primary systemDawei Wang, Pinyi Ren, Yichen Wang, Qinghe Du, Li Sun. 90-95 [doi]
- Artificial-noise strategy for single-antenna systems over multi-path fading channelsYuli Yang, Bingli Jiao. 96-101 [doi]
- Detecting covert timing channels using non-parametric statistical approachesFahimeh Rezaei, Michael Hempel, Pradhumna Lai Shrestha, Sushanta Mohan Rakshit, Hamid Sharif. 102-107 [doi]
- A longitudinal approach to measuring the impact of mobility on low-latency anonymity networksStephen Doswell, David Kendall, Nauman Aslam, Graham Sexton. 108-113 [doi]
- Channel secondary random process for robust secret key generationAhmed Badawy, Tamer Khattab, Tarek M. Elfouly, Carla-Fabiana Chiasserini, Amr Mohamed, Daniele Trinchero. 114-119 [doi]
- Comparative simulation for physical layer key generation methodsAmal Saad, Amr Mohamed, Tarek M. Elfouly, Tamer Khattab, Mohsen Guizani. 120-125 [doi]
- A new fuzzy location indicator for Interval Type-2 indoor Fuzzy Localization SystemNoura Baccar, Ridha Bouallegue. 126-131 [doi]
- Lognormal mixture Cramer-Rao lower bound for localizationSaliha Buyukcorak, Gunes Karabulut Kurt, Abbas Yongaçoglu. 132-136 [doi]
- A simple ultrasonic Indoor/Outdoor detector for mobile devicesIgor Bisio, Alessandro Delfino, Fabio Lavagetto. 137-141 [doi]
- IO characteristics of modern smartphone platform: Android vs. TizenMyungSik Kim, Hu-ung Lee, Youjip Won. 142-147 [doi]
- Selection probability of data channels in Bluetooth Low EnergyMohamad Omar Al Kalaa, Hazem H. Refai. 148-152 [doi]
- The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channelsOmar Darwish, Ala I. Al-Fuqaha, Muhammad T. Anan, Nidal Nasser. 153-159 [doi]
- Average channel capacity analysis of BDF relaying over alpha-mu fading channelsRuben Boluda-Ruiz, Antonio García-Zambrana, Beatriz Castillo-Vázquez, Carmen Castillo-Vázquez. 160-165 [doi]
- Analysis and characterization of dynamic spectrum sharing in Cognitive Radio NetworksClaudina Rattaro, Laura Aspirot, Pablo Belzarena. 166-171 [doi]
- Overlay cognitive radio networks: A distributed matching scheme for user pairingAnargyros J. Roumeliotis, Stavroula Vassaki, Athanasios D. Panagopoulos. 172-177 [doi]
- Beamforming design and sum rate maximization for the downlink of underlay cognitive radio networksImen Turki, Inès Kammoun, Mohamed Siala. 178-183 [doi]
- Cooperative joint power splitting and allocation approach for simultaneous energy delivery and data transferMahdi Ben Ghorbel, Mohsen Guizani, Bassem Khalfi, Bechir Hamdaoui. 184-187 [doi]
- Pricing-based power allocation in wireless network virtualization: A game approachJunyi Wei, Kun Yang, Guopeng Zhang, Zheng Hu. 188-193 [doi]
- Comparison of two majority determination methods of detecting emergency wake-up trigger for ISDB-T Terrestrial digital television receiversSatoshi Takahashi. 194-198 [doi]
- Estimating the number of sources: An efficient maximization approachTara Salman, Ahmed Badawy, Tarek M. Elfouly, Amr Mohamed, Tamer Khattab. 199-204 [doi]
- A priori aided compressive sensing approach for impulsive noise reconstructionSicong Liu, Fang Yang, Wenbo Ding, Jian Song. 205-209 [doi]
- Distributional semantics and unsupervised clustering for sensor relevancy predictionMyriam Leggieri, Brian Davis, John G. Breslin. 210-215 [doi]
- Performance analysis and alternative proposals for DTMB systemYue Liu, Kewu Peng, Jian Song, Tao Cheng. 216-220 [doi]
- Genie-aided adaptive normalized min-sum algorithm for LDPC decodingYue Liu, Kewu Peng, Chang-Yong Pan, Liwen Fan. 221-225 [doi]
- Hardware based analysis of RFID anti-collision protocols based on the standard EPCglobal Class-1 Generation-2Laura Arjona, Hugo Landaluce, Asier Perallos, Nikola Cmiljanic. 226-231 [doi]
- A novel energy-efficient medium access control over saturated IEEE 802.11 WLANsM. F. Tuysuz, M. Ucan, D. Ayneli. 232-237 [doi]
- Enhanced component carrier selection strategy for LTE-A under carrier aggregation modeImen Ben Chaabane, Soumaya Hamouda, Sami Tabbane. 238-243 [doi]
- A full duplex MAC protocol for wireless networksJawad Seddar, Hicham Khalife, Wassim Al Safwi, Vania Conan. 244-249 [doi]
- Synchronization technique for MIMO-OFDM WLAN systems with space time diversityLeïla Nasraoui, Leïla Najjar Atallah, Mohamed Siala. 250-255 [doi]
- A rhombic-DCM constellation for MB-OFDM UWB systemsMoufida Hajjaj, Walid Chainbi, Ridha Bouallegue. 256-261 [doi]
- On the use of mobile sensors for estimating city-wide pollution levelsCarlos T. Calafate, Bertrand Ducourthial. 262-267 [doi]
- RS4VANETs - a decentralized reputation system for assessing the trustworthiness of nodes in vehicular networksClaudio P. Fernandes, Israel de Simas, Emerson Ribeiro de Mello, Michelle Silva Wangham. 268-273 [doi]
- M-PNC: Multi-hop physical layer network coding for shared paths in vehicular networksPratap Kumar Sahu, Abdelhakim Hafid, Soumaya Cherkaoui. 274-279 [doi]
- Beacon-free scalable multi-hop data dissemination in Vehicular Ad hoc NetworksMoumena Chaqfeh, Abderrahmane Lakas. 280-284 [doi]
- Using road IDs to enhance clustering in vehicular ad hoc networksMohamed Hadded, Paul Mühlethaler, Rachid Zagrouba, Anis Laouiti, Leïla Azouz Saïdane. 285-290 [doi]
- Mobile data offloading in urban VANETs on top of a virtualization layerJack Fernando Bravo-Torres, Jose Victor Saians-Vazquez, Martín López Nores, Yolanda Blanco-Fernández, José Juan Pazos Arias. 291-296 [doi]
- ETAR: Efficient Traffic Light Aware Routing Protocol for Vehicular NetworksOmar Sami Oubbati, Abderrahmane Lakas, Nasreddine Lagraa, Mohamed Bachir Yagoubi. 297-301 [doi]
- On sharing resources performance analysis in 3GPP-LTE systems frameworkMohamed Hussein, Serguei Primak, Abdallah Shami. 302-307 [doi]
- Performance of Delay Tolerant Mobile Networks under propagation and buffer capacity constraintsMouna Abdelmoumen, Emna Jaidane, Mounir Frikha, Tijani Chahed. 308-313 [doi]
- Channel assignment with transmission power optimization method for high throughput in multi-access point WLANAmit Kachroo, Junhyuk Park, Hyungwon Kim. 314-319 [doi]
- A distributed open-close access for Small-Cell networks: A random matrix game analysisSamia Ben Chekroun, Essaid Sabir, Abdellatif Kobbane, Hamidou Tembine, El-Houssine Bouyakhf, Khalil Ibrahimi. 320-325 [doi]
- Impact of Hidden Collision on primary users' performance in Dynamic Spectrum AccessMarouane Sebgui, Jalal Almhana, Slimane Bah, Belhaj El Graini. 326-331 [doi]
- Energy consumption performance results Of multiband OFDM UWB systemsHouda Chihi, Abdallah Hamini, Ridha Bouallegue. 332-336 [doi]
- Adaptive packet-combining to counter traffic analysis in Wireless Sensor NetworksSami Alsemairi, Mohamed Younis. 337-342 [doi]
- Energy-efficiency of load-balancing routing for wireless convergecast networks: Centralized versus distributed implementationXin Di, Zhaoyu Zhang, Chen Ao, Jun Tian, Kazuyuki Ozaki, Yun Wen, Hiroshi Fujita. 343-348 [doi]
- MBEEC: A bio-inspired routing protocol with multihop between cluster-heads for energy saving in WSNFrancisco Leonardo Jales Martins, Joaquim Celestino Júnior, Antoniel da Silva Rego, Jose Henrique Brandao Neto, André L. M. dos Santos, Ahmed Patel. 349-354 [doi]
- MOLSR: Mobile-agent based optimized Link State Routing ProtocolWassim El-Hajj, Ghassen Ben Brahim, Haïdar Safa, Maha Akkari. 355-360 [doi]
- Does AODV perform better with energy harvesting?Emad Aldalu, Uthman Baroudi. 361-366 [doi]
- GPS-free robots deployment technique for rescue operation based on landmark's criticalityUthman Baroudi, Gamal Sallam, Mohammed Al-Shaboti, Mohamed Younis. 367-372 [doi]
- Towards automatic detection and diagnosis of Internet service anomalies via DNS traffic analysisPierdomenico Fiadino, Alessandro D'Alconzo, Mirko Schiavone, Pedro Casas. 373-378 [doi]
- Experimental evaluation of privacy-preserving aggregation schemes on planetlabFrancesco Randazzo, Daniele Croce, Ilenia Tinnirello, Cettina Barcellona, Maria Luisa Merani. 379-384 [doi]
- Troubleshooting web sessions with CUSUMChristian Callegari, Marco Milanesio, Pietro Michiardi. 385-390 [doi]
- Semantics based analysis of botnet activity from heterogeneous data sourcesSantiago Ruano Rincón, Sandrine Vaton, Antoine Beugnard, Serge Garlatti. 391-396 [doi]
- Optimal wireless network selection following students' online habits using fuzzy AHP and TOPSIS methodsEmil Brajkovic, Tomo Sjekavica, Tomislav Volaric. 397-402 [doi]
- Digital self-interference cancellation for Full-Duplex MIMO systemsDandan Liang, Pei Xiao, Gaojie Chen, Mir Ghoraishi, Rahim Tafazolli. 403-407 [doi]
- Green operation of LTE-A femtocell networks benefiting from centralized controlElias Yaacoub, Abdullah Kadri. 408-412 [doi]
- A novel green handover self-optimization algorithm for LTE-A / 5G HetNetsMaissa Boujelben, Sonia Ben Rejeb, Sami Tabbane. 413-418 [doi]
- A tailored fractional frequency reuse scheme for Heterogeneous NetworksJihene Ben Abderrazak, Hichem Besbes. 419-424 [doi]
- Analysis of uplink effective SINR in LTE networksMarwane Ben Hcine, Ridha Bouallegue. 425-430 [doi]
- Performance investigation of IEEE 802.11af systems under realistic channel conditionsMustafa Can Macit, Habib Senol, Serhat Erküçük. 431-435 [doi]
- On the effect of proportional fairness in energy transfer for wireless powered communication networksM. Majid Butt, Amr Mohamed, Mohsen Guizani. 436-441 [doi]
- A poisson point process model for coverage analysis of multi-hop cooperative networksMuhammad Ahsen, Syed Ali Hassan. 442-447 [doi]
- SNR-based relay selection scheme for cooperative relay networksErdogan Aydin, Haci Illian. 448-453 [doi]
- G-CRLB analysis of time delay based localization for decode-and-forward cooperative relay networks in multipath environmentsGökhan Çelik, Hasari Celebi. 454-459 [doi]
- Performance analysis for interference cancellation at the receiver in D2D communicationJihyung Kim, Jaesheung Shin. 460-464 [doi]
- Performance enhancement of multi-hop wireless systems by optimizing the number and location of relaysSami Baroudi, Yousef R. Shayan. 465-468 [doi]
- Converged heterogeneous networks with transmit order and base-station-to-base-station interference cancellationZekeriya Uykan, Riku Jäntti. 469-473 [doi]
- Distributed latency estimation using global knowledge for mobile collaborative applicationsJan Gäbler, Hartmut König. 474-479 [doi]
- A positioning compatible multi-service transmission system based on the integration of VLC and PLCXu Ma, Wenbo Ding, Fang Yang, Hui Yang, Jian Song. 480-484 [doi]
- 3D localization technique with mobile robot for improving operability of remote-control devicesMasaya Yoshida, Kiyohito Yoshihara, Amarlingam M, Vinod kumar Netad, P. Rajalakshmi. 485-490 [doi]
- Access anomaly of emergency traffic in CSMA/CA of IEEE 802.15.6Mara Bukvic, Jelena V. Misic. 491-496 [doi]
- On interference modeling for the analysis of uplink/downlink interactions in TDD-OFDMA networksAhmad M. El-Hajj, Naeem Akl, Bilal Hammoud, Zaher Dawy. 497-502 [doi]
- GF (q) Precoding: Mutual information analysis in AWGN channelsFan Jiang, Cheng Li, Ramachandran Venkatesan. 503-507 [doi]
- PMIPv6 route optimization for inter- and intra-domain roaming using signaling reduction approach in LTE networksWen-Kang Jia. 508-513 [doi]
- Analysis of energy efficiency on the cell range expansion for cellular-WLAN heterogeneous networkShobanraj Navaratnarajah, Mehrdad Dianati, Muhammad Ali Imran. 514-519 [doi]
- Modeling multi-hop CSMA-based networks through Semi-Markov chainsAndrea Stajkic, Chiara Buratti, Roberto Verdone. 520-525 [doi]
- Design and analysis of a WBAN-based system for firefightersSoumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga. 526-531 [doi]
- Impact of Carrier-Grade NAT on web browsingEnrico Bocchi, Ali Safari Khatouni, Stefano Traverso, Alessandro Finamore, Valeria Di Gennaro, Marco Mellia, Maurizio M. Munafò, Dario Rossi. 532-537 [doi]
- Towards understanding upstream Web trafficDavid Gugelmann, Bernhard Ager, Vincent Lenders, Markus Happe. 538-544 [doi]
- Traffic monitoring in home networks: Enhancing diagnosis and performance trackingZied Aouini, Abdesselem Kortebi, Yacine Ghamri-Doudane. 545-550 [doi]
- An asynchronous cluster head rotation scheme for wireless sensor networksChuang Chen, Fan Rao, Xuedan Zhang, Yuhan Dong. 551-556 [doi]
- A game theory-based approach for robots deploying wireless sensor nodesInes Khoufi, Pascale Minet, Mohammed-Amine Koulali, Mohammed Erradi. 557-562 [doi]
- Three dimensional mobile wireless sensor networks redeployment based on virtual forcesNadia Boufares, Ines Khoufi, Pascale Minet, Leïla Azouz Saïdane, Yosra Ben Saied. 563-568 [doi]
- Mitigating anchor misplacement errors in wireless sensor networksYaser Al Mtawa, Nidal Nasser, Hossam S. Hassanein. 569-575 [doi]
- Multi-objective sensor placement using the effective independence model (SPEM) for wireless sensor networks in structural health monitoringMohamed Elsersy, Mohamed Hossam Ahmed, Tarek Mohamed Elfouly, Abderrazak Abdaoui. 576-580 [doi]
- Novel framework for LTE and LTE-Advanced networks dimensioningMarwane Ben Hcine, Ridha Bouallegue. 581-586 [doi]
- Towards bridging the gap between Dalvik bytecode and native code during static analysis of Android applicationsPatrik Lantz, Bjorn Johansson. 587-593 [doi]
- Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasuresIwen Coisel, Ignacio Sanchez, David Shaw. 594-599 [doi]
- Guarantor and reputation based trust model for Social Internet of ThingsHannan Xiao, Nitin Sidhu, Bruce Christianson. 600-605 [doi]
- Selective image encryption scheme based on DWT, AES S-box and chaotic permutationAkram Belazi, Ahmed A. Abd El-Latif, Rhouma Rhouma, Safya Belghith. 606-610 [doi]
- A novel approach to construct S-box based on Rossler systemAkram Belazi, Rhouma Rhouma, Safya Belghith. 611-615 [doi]
- Fast group discovery and non-repudiation in D2D communications using IBEEmad Abd-Elrahman, Hatem Ibn-Khedher, Hossam Afifi, Thouraya Toukabri. 616-621 [doi]
- Energy-aware centrality for information forwarding in mobile social opportunistic networksAnnalisa Socievole, Floriano De Rango. 622-627 [doi]
- Cognitive self-healing system for future mobile networksFedor Chernogorov, Ilmari Repo, Vilho Raisanen, Timo Nihtilä, Janne Kurjenniemi. 628-633 [doi]
- Automatic topology discovery in TDMA-based ad hoc networksChristopher Kramer, Dennis Christmann, Reinhard Gotzhein. 634-639 [doi]
- A high-throughput routing for multiuser diversity multicastAsma Ben Hassouna, Hend Koubaa, Leïla Azouz Saïdane, Farouk Kamoun. 640-646 [doi]
- Energy-efficient Routing technique for Wireless sensor Networks under energy constraintsShady O. Elbassiouny, Ayman M. Hassan. 647-652 [doi]
- BEC: A novel routing protocol for balanced energy consumption in Wireless Body Area NetworksMuhammad Moid Sandhu, Nadeem Javaid, Muhammad Imran, Mohsen Guizani, Zahoor Ali Khan, Umar Qasim. 653-658 [doi]
- A Stable K-hop clustering algorithm for routing in mobile ad hoc networksBadreddine Guizani, Béchir el Ayeb, Abderrafiaa Koukam. 659-664 [doi]
- Light-emitting diodes for visible light communicationChien-Lan Liao, Yung Fu Chang, Chong-Lung Ho, Meng-Chyi Wu, Yuan-Tai Hsieh, Chien-Yu Li, Mau-Phon Houng, Cheng-Fu Yang. 665-667 [doi]
- User-Generated services: Policy Management and access control in a cross-domain environmentVincenzo Catania, Giuseppe La Torre, Salvatore Monteleone, Daniela Panno, Davide Patti. 668-673 [doi]
- Context-aware multi-modal traffic management in ITS: A Q-learning based algorithmAdel Mounir Sareh Said, Ahmed Soua, Emad Abd-Elrahman, Hossam Afifi. 674-679 [doi]
- Novel Integrated power line and visible light communication system with bit division multiplexingJunnan Gao, Fang Yang, Wenbo Ding. 680-684 [doi]
- Power amplifier design using GaN HEMT in class-AB mode for LTE communication bandNabil Khalid, Tahir Abbas, Mojeeb Bin Ihsan. 685-689 [doi]
- RPL protocol adapted for healthcare and medical applicationsFatma Gara, Leila Ben Saad, Rahma Ben Ayed, Bernard Tourancheau. 690-695 [doi]
- On the performance of 6LoWPAN through experimentationGordana Gardasevic, Stefan Mijovic, Andrea Stajkic, Chiara Buratti. 696-701 [doi]
- A low consumption real time environmental monitoring system for smart cities based on ZigBee wireless sensor networkFrancisco Sanchez-Rosario, David Sánchez-Rodríguez, Jesús Bernardino Alonso Hernández, Carlos M. Travieso-Gonzalez, Itziar G. Alonso-González, Carlos Ley-Bosch, Carlos Ramirez-Casanas, Miguel A. Quintana Suarez. 702-707 [doi]
- A WSN for ground-level ozone monitoring based on plant electrical activity analysisSimone Morosi, Marco Dolfi, Enrico Del Re, E. Masi, I. Colzi, S. Mancuso, F. Francini, R. Magliacani, A. Valgimigli, L. Masini. 715-720 [doi]
- Decode-and-Forward vehicular relaying for 2×2 MIMO LTE-advanced downlinkMohamed Fathy Feteiha, Hossam S. Hassanein. 721-726 [doi]
- Task filtering as a task admission control policy in cloud server poolsHaleh Khojasteh, Jelena V. Misic, Vojislav B. Misic. 727-732 [doi]
- AFDAN: Accurate failure detection protocol for MANETsHaroun Benkaouha, Abdelkrim Adelli, Nadjib Badache, Jalel Ben-Othman, Lynda Mokdad. 733-738 [doi]
- Interference Aware Inverse EEDBR protocol for Underwater WSNsMehreen Shah, Nadeem Javaid, Muhammad Imran, Mohsen Guizani, Zahoor Ali Khan, Umar Qasim. 739-744 [doi]
- A small cell deployment strategy towards amorphous coverage in the cellular networkAihong Dong, Xinmin Luo, Qinghe Du. 745-750 [doi]
- Does dynamic still work in today's 'D'HCPHewu Li, Zhouyang Zhao, FengHua Li, Qian Wu. 751-756 [doi]
- SOCLEER: A social-based energy-efficient forwarding protocol for opportunistic networksNelson Machado Junior, Carlos Alberto Vieira Campos. 757-762 [doi]
- Ensuring energy efficiency of power quality applications in smart grids through a framework based on Wireless Sensor and Actuator NetworksIgor Leão dos Santos, Luci Pirmez, Flávia Coimbra Delicato, Luiz F. Rust da Costa Carmo. 763-768 [doi]
- Achieving energy efficient and reliable communication in WSN with coded GMSK system under various channel conditionsRajoua Anane, Mehdi Bouallegue, Kosai Raoof, Ridha Bouallegue. 769-775 [doi]
- Prolonging stability period of CDS based WSNsEnan A. Khalil, Suat Özdemir. 776-781 [doi]
- Ant Colony Optimization based hierarchical data dissemination in WSNChérifa Boucetta, Hanen Idoudi, Leïla Azouz Saïdane. 782-787 [doi]
- Centralized energy monitoring over wireless sensor networksHacène Fouchal, Michel Herbin, Frédéric Blanchard. 788-792 [doi]
- Cross-layer wireless networking for low energy sensor networksMigdat Hodzic, Indira Muhic, Tony Altwies, Don Wanless. 793-798 [doi]
- SafeMatch: Energy-efficient private matching in mobile social networksYi-Hui Lin, Wen-Tsuen Chen, Wen Chan Shih. 799-804 [doi]
- Traditional TCP congestion control algorithms evaluation in wired-cum-wireless networksM. C. Dias, L. A. Caldeira, A. Perkusich. 805-810 [doi]
- Analysis of DoS attacks at MAC Layer in mobile adhoc networksChaminda Alocious, Hannan Xiao, Bruce Christianson. 811-816 [doi]
- Optimizing ring signature keys for e-votingJosé Luis Tornos, José Luis Salazar, Joan Josep Piles. 817-821 [doi]
- Vulnerabilities of fuzzy vault schemes using biometric data with tracesMaryam Lafkih, Patrick Lacharme, Christophe Rosenberger, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, Driss Aboutajdine. 822-827 [doi]
- Weaknesses of two RFID protocols regarding de-synchronization attacksMete Akgün, M. Ufuk Çaglayan. 828-833 [doi]
- QoS provision inter-cell Interference Coordination approach based on joint transmission and Superposition CodingYosra Abbes, Jihene Ben Abderrazak, Sameh Najeh, Hichem Besbes. 834-839 [doi]
- Near-orthogonal randomized space-time block codes for multi-hop cooperative networksSidra Shaheen Syed, Syed Ali Hassan, Sajid Ali. 840-845 [doi]
- A scalable family of unitary and differential space-time codes for UWB communicationsChadi Abou-Rjeily, Karl Fayad. 846-851 [doi]
- A capacity-approaching multi-user BICM-ID scheme for multiple access channelYushu Zhang, Kewu Peng, Shuang Chen, Jian Song. 852-856 [doi]
- Simplified universal soft demapper for gray-mapped constellationShuang Chen, Kewu Peng, Fang Yang. 857-861 [doi]
- A new tone reservation scheme for PAPR reduction in FBMC/OQAM systemsMounira Laabidi, Rafik Zayani, Ridha Bouallegue. 862-867 [doi]
- On error variance for autoregressive process-based spectrum occupancy prediction with energy detector for cognitive networksAli Boyaci, Fatma Nur Aki, Serhan Yarkan. 868-873 [doi]
- Hybrid RSSD/AOA cooperative localization for 4G wireless networks with uncooperative emittersLeila Gazzah, Leïla Najjar Atallah, Hichem Besbes. 874-879 [doi]
- Periodic collection of spectrum occupancy data by energy constrained cognitive IoT devicesGeorge Stamatakis, Elias Z. Tragos, Apostolos Traganitis. 880-885 [doi]
- A dynamic femto cell architecture using TV Whitespace improving user experience of urban CrowdsAlexis Sultan, Majed ElKouki, Hossam Afifi, Vincent Gauthier, Michel Marot. 886-891 [doi]
- Simultaneous sense and access for cognitive radio networks: A throughput optimization perspectiveVishnu Vikyath Gowravajhala. 892-898 [doi]
- Incentive for cooperation in Cognitive Radio Networks with group communitiesAykut Saner Demirkol, Tuna Tugcu. 899-903 [doi]
- Resilient Tit-For-Tat (RTFT) A game solution for wireless misbehaviourJacob Abegunde, Hannan Xiao, Joseph Spring. 904-909 [doi]
- Impacts of routing attacks on Surveillance Wireless Sensor NetworksSeyyit Alper Sert, Adnan Yazici, Ahmet Cosar. 910-915 [doi]
- SensorWatermark: a scheme of software watermark using code obfuscation and tamperproofing for WSNEmanuele N. de L. F. Jorge, Luci Pirmez, Claudio M. de Farias, Rafael de O. Costa, Davidson R. Boccardo, Luiz F. R. da Costa Carmo. 916-922 [doi]
- MANET security through a distributed policy-based evaluation of node behaviourArash Tajalli-Yazdi, Hanan Lutfiyya, David Kidston. 923-928 [doi]
- Using K-nearest neighbor algorithm to reduce false negatives in P2P secure routing protocolsHaïdar Safa, Wassim El-Hajj, Fatima K. Abu Salem, Marwa Moutaweh. 929-934 [doi]
- A symmetric cryptographic construct for securing wireless sensor network communicationsA. A. Adekunle. 935-940 [doi]
- End-to-end throughput evaluation of consensus TPC algorithm in multihop wireless networksYu Yu, Shashi Shah, Yasuo Tan, Yuto Lim. 941-946 [doi]
- Issues and challenges in dense WiFi networksZhenzhe Zhong, Parag Kulkarni, Fengming Cao, Zhong Fan, Simon Armour. 947-951 [doi]
- Enabling vertical handover management based on decision making in heterogeneous wireless networksMurad Khan, Changsu Jung, Paul Chiedozie Uzoh, Cao Zhenbo, Jinbae Kim, Yongtak Yoon, Aamir Nadeem, Kijun Han. 952-957 [doi]
- Learning gain mechanism to promote the femtocells hybrid access modeSihame El-Hammani, Khalil Ibrahimi, El-Houssine Bouyakhf. 958-963 [doi]
- An NC-DTN framework for many-to-many bulk data dissemination in OLSR MANETPreechai Mekbungwan, Apinun Tunpan, Kanchana Kanchanasut. 964-969 [doi]
- Recover algorithm of distributed compressed sensing based on FOCUSSYulong Gao, Yanping Chen. 970-974 [doi]
- Framework design of monitoring system for traffic based on embedded and RFID technologySi Tian, Shuo Shi, Xuemai Gu. 975-980 [doi]
- Adaptive Preamble Padding with Retransmission Control for ZigBee network under Wi-Fi interferenceTianyu Du, Zhipeng Wang, Dimitrios Makrakis, Hussein T. Mouftah. 981-986 [doi]
- A coalitional-game-based incentive mechanism for content caching in heterogeneous Delay Tolerant NetworksOmar Ait Oualhaj, Abdellatif Kobbane, Mouna Elmachkour, Essaid Sabir, Jalel Ben-Othman. 987-992 [doi]
- Proactive maintenance in RPL for 6LowPANNesrine Khelifi, Sharief M. A. Oteafy, Hossam S. Hassanein, Habib Youssef. 993-999 [doi]
- Frame design for 5G multicarrier modulationsSimone Morosi, Massimiliano Biagini, Fabrizio Argenti, Enrico Del Re, L. Yessenturayeva. 1000-1005 [doi]
- Sensor device virtualization for mobile cloud systemsJin-Hwan Jeong. 1006-1011 [doi]
- Two-step LMMSE channel estimator for Unique Word MB-OFDM based UWB systemsMoufida Hajjaj, Walid Chainbi, Ridha Bouallegue. 1012-1016 [doi]
- CADMANT: Context Anomaly Detection for MAintenance and Network TroubleshootingEloy Martinez, Enda Fallon, Sheila Fallon, MingXue Wang. 1017-1022 [doi]
- ECAB: An Efficient Context-Aware multi-hop Broadcasting protocol for wireless sensor networksDhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Mohamed Mosbah. 1023-1029 [doi]
- TweetGlue: Leveraging a crowd tracking infrastructure for mobile social augmented realityTakamasa Higuchi, Hiroki Iwahashi, Hirozumi Yamaguchi, Teruo Higashino. 1030-1035 [doi]
- Performance evaluation of distributed data delivery on mobile devices using WebRTCArto Heikkinen, Timo Koskela, Mika Ylianttila. 1036-1042 [doi]
- A framework on spatio-temporal resource searchQing Guo, Ouri Wolfson, Daniel Ayala. 1043-1048 [doi]
- ReSCUE: Relatively Stable Clustering for Unbiased Environments in VANETsMuhammed Nur Avcil, Mujdat Soyturk. 1049-1055 [doi]
- Energy-efficient AF OSTBC-MIMO systems for two-way relaying considering circuit energy consumptionEmna Ben Yahia, Noureddine Hamdi. 1056-1061 [doi]
- Elimination beam-forming in downlink multi-user MIMO systemsM. Hassan, A. Esswie, M. Abdelsalam, M. Sameh. 1062-1067 [doi]
- Dynamic optimization of QoS for moving users in an OFDMA network with semi-smart antennasAini Li, Laurie G. Cuthbert, Yapeng Wang. 1068-1072 [doi]
- Fuzzy logic-based downlink subchannel allocation for capacity maximization in OFDMA femtocellsSyed Waqar Hasan, Syed Ali Hassan. 1073-1078 [doi]
- Full-feedback backoff algorithm for distributed wireless networksXin Zhou, Changwen Zheng, Ming-xue Liao. 1079-1084 [doi]
- Compensation of phase offsets in MIMO systems using an efficient differential STBCEmna Ben Slimane, Slaheddine Jarboui, Ammar Bouallègue. 1085-1089 [doi]
- A survey of technologies for the internet of thingsVangelis Gazis, Manuel Görtz, Marco Huber, Alessandro Leonardi, Kostas Mathioudakis, Alexander Wiesmaier, Florian Zeiger, Emmanouil Vasilomanolakis. 1090-1095 [doi]
- RAL: a RESTful M2M communications framework for IoTMoreno Dissegna, Riccardo Manfrin, Marco Rotoloni, Lorenzo Vangelista, Michele Zorzi. 1096-1101 [doi]
- The SA-based group handoff scheme for heterogeneous wireless networks in M2M communicationsHeng-Hao Pul, Chung-Ju Chang, Ray-Guang Cheng. 1102-1106 [doi]
- CSMA/CA with RTS/CTS overhead reduction for M2M Communication with Finite Retransmission StrategyBaher Mawlawi, Jean-Baptiste Dore. 1107-1111 [doi]
- Throughput enhancement schemes for IEEE 802.11ah based on multi-layer cooperationBaofeng Ji, Sudan Chen, Kang Song, Chunguo Li, Hongjun Chen, Zhiqun Li. 1112-1116 [doi]
- M2M remote telemetry and cloud IoT big data processing in viticultureGeorge Suciu, Alexandru Vulpe, Octavian Fratu, Victor Suciu. 1117-1121 [doi]
- Maximizing the spectral and energy efficiency of ARQ with a fixed outage probabilityAmir Hadjtaieb, Ali Chelli, Mohamed-Slim Alouini. 1122-1126 [doi]
- Adaptive Modulation and Coding based error resilience for transmission of compressed videoRyan Perera, Anil Fernando, Hemantha Kodikara Arachchi, Muhammad Ali Imran. 1127-1132 [doi]
- System level power consumption model for mobile phones as part of E3FFirat C. Nur, Muhammad Ali Imran, Oluwakayode Onireti, Kamran Arshad. 1133-1138 [doi]
- Subband approach for wideband self-interference cancellation in full-duplex transceiverMir Ghoraishi, Wei Jiang, Pei Xiao, Rahim Tafazolli. 1139-1143 [doi]
- An architectural framework for 5G indoor communicationsKishor Chandra, R. Venkatesha Prasad, Ignas G. Niemegeers. 1144-1149 [doi]
- Reduced out-of-band radiation-based filter optimization for UFMC systems in 5GMithun Mukherjee, Lei Shu, Vikas Kumar, Prashant Kumar, Rakesh Matam. 1150-1155 [doi]
- BER-based BLER prediction for LTE FDD DL channel with small delay dispersionMirza Hamza, Vlatko Lipovac, Adriana Lipovac. 1156-1161 [doi]
- Location accuracy impact on cell outage detection in LTE-A networksSergey Chernov, Dmitry Petrov, Tapani Ristaniemi. 1162-1167 [doi]
- On improving network capacity for downlink and uplink of two-tier LTE-FDD networksAbdellaziz Walid, Essaid Sabir, Abdellatif Kobbane, Tarik Taleb, Mohammed El Koutbi. 1168-1173 [doi]
- Channel reciprocity based frequency domain CQI feedback algorithm in TD-LTE-A systemsXuanli Wu, Nannan Fu, Lukuan Sun, Ye Wang. 1174-1179 [doi]
- A downlink scheduling scheme for trunking multimedia services in TD-LTE public networksShaochuan Wu, Renqiang Sun, Kangjian Ma, Yang Liu. 1180-1185 [doi]
- Clustering in cognitive radio for multimedia streaming over wireless Sensor networksAbbas Bradai, Kamal Singh, Abderrezak Rachedi, Toufik Ahmed. 1186-1192 [doi]
- A novel efficient approach for protecting integrity of data aggregation in wireless sensor networksHaythem Hayouni, Mohamed Hamdi, Tai-Hoon Kim. 1193-1198 [doi]
- Social delay tolerant approach for safety services in vehicular networksHuong Nguyen Minh, Abderrahim Benslimane, Milena Radenkovic. 1199-1204 [doi]
- Reducing transmission interferences for safety message dissemination in VANETsFatima Zohra Bousbaa, Fen Zhou, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahim Benslimane. 1205-1210 [doi]
- Low-Power link quality estimation in smart grid environmentsSana Rekik, Nouha Baccour, Mohamed Jmaiel, Khalil Drira. 1211-1216 [doi]
- Controlling the degradation of Wireless Sensor NetworksAlba Rozas, Javier Blesa, Elena Romero, Álvaro Araujo. 1217-1223 [doi]
- Utilization of convex optimization for data fusion-driven sensor management in WSNsMohammadreza Soltani, Michael Hempel, Hamid Sharif. 1224-1229 [doi]
- Cloud-based Self-Organizing Localization for wireless sensor networks in mixture environments of LOS and NLOSTakamasa Kitanouma, Yuto Takashima, Naotoshi Adachi, Yasuhisa Takizawa. 1230-1235 [doi]
- User-aware cell switch-off algorithmsIbrahim Aydin, Halim Yanikomeroglu, Ümit Aygölü. 1236-1241 [doi]
- Weighted SLNR-based precoding algorithm for downlink multi-stream CoMP-JP systemChunyang Tian, Wei Wu, Xuanli Wu, Xuejun Sha. 1242-1247 [doi]
- Dynamic threshold adjustment in a proximity-based location tracking system using reference modulesGel Han, Gudrun Klinker. 1248-1253 [doi]
- Regression forecasting model to improve localization accuracyNajah A. Abu Ali, Mervat Abu-Elkheir. 1254-1259 [doi]
- A matching-theoretic approach to energy-efficient partner selection in wireless networksMohammed W. Baidas, Masoud M. Afghah. 1260-1265 [doi]
- Efficient estimator for distributed RSS-based localization in wireless sensor networksSlavisa Tomic, Marko Beko, Rui Dinis, Vlatko Lipovac. 1266-1271 [doi]
- Control and data channel resource allocation in macro-femto Heterogeneous NetworksArsalan Saeed, Efstathios Katranaras, Mehrdad Dianati, Muhammad Ali Imran. 1272-1276 [doi]
- Hybrid RSS-AoA technique for 3-D node localization in wireless sensor networksSlavisa Tomic, Milica Marikj, Marko Beko, Rui Dinis, Nuno Orfao. 1277-1282 [doi]
- Low-complexity distributed power control for utility maximization in wireless networksKonstantinos P. Tsoukatos. 1283-1288 [doi]
- Stochastic geometry-based analysis of multiple region reverse frequency allocation scheme in downlink HetNetsRehan Zahid, Syed Ali Hassan. 1289-1294 [doi]
- Modeling LTE group paging mechanism for Machine-Type CommunicationsCheng-Ting Chang, Shun-Ren Yang. 1295-1300 [doi]
- Improvement of security protocol for Machine Type Communications in LTE-advancedHyoung-Kee Choi, Chan-Kyu Han, Daesung Choi. 1301-1306 [doi]
- A scheduled grouping scheme for MTC device ID sharingChi-Wei Tseng, Rubbens Boisguene, Chih-Wei Huang, Phone Lin, Yuichi Kawamoto. 1307-1311 [doi]
- Experimental implementation of cooperative transmission range extension in indoor environmentsMuhammad Shahmeer Omar, Syed Ahsan Raza, Shahroze Humayun Kabir, Muddassar Hussain, Syed Ali Hassan. 1312-1317 [doi]
- Implementation of an RFID relay attack countermeasureSghaier Guizani. 1318-1323 [doi]
- Low cost QoS and RF power measuring tool for 2G/3G mobile network using Android OS platformElson Agastra, Algenti Lala, Bexhet Kamo, Domeniko Kina. 1324-1328 [doi]
- Deploying public surface transit to forward messages in DTNSeilendria A. Hadiwardoyo, Alexandre J. T. Santos. 1329-1335 [doi]
- Relay antenna selection for V2V communications using PLNC over cascaded fading channelsSerdar Ozgur Ata, Ibrahim Altunbas. 1336-1340 [doi]
- Demonstration and implementation of energy efficiency in cooperative networksShahroze Humayun Kabir, Muhammad Shahmeer Omar, Syed Ahsan Raza, Muddassar Hussain, Syed Ali Hassan. 1341-1346 [doi]
- Estimating the upper bound of transmission capacity in linear VANETWeisen Shi, Xinxin He, Tao Luo, Lei Ding. 1347-1351 [doi]
- QoS-OLSR protocol based on intelligent water drop for Vehicular ad-hoc networksDoaa Al-Terri, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Raed M. Shubair, Yousof Al-Hammadi. 1352-1357 [doi]
- Experimental measurement for vehicular communication evaluation using OBU ARADA SystemAymen Sassi, Faiza Charfi, Lotfi Kamoun, Yassin Elhillali, Atika Rivenq. 1358-1364 [doi]
- Hierarchical aggregation for delay-sensitive vehicular sensingJagruti Sahoo, Soumaya Cherkaoui, Abdelhakim Hafid. 1365-1370 [doi]
- Scan-Or-Not-to-Scan - balancing network selection accuracy and energy consumptionTimothy Casey, Gabriel-Miro Muntean. 1371-1376 [doi]
- Increasing communication reliability in manufacturing environmentsMilena Radenkovic, Ivaylo Kostadinov, Bartosz Wietrzyk. 1377-1383 [doi]
- An instance-based physical violence detection algorithm for school bullying preventionLiang Ye, Hany Ferdinando, Tapio Seppänen, Tuija Huuki, Esko Alasaarela. 1384-1388 [doi]
- Maximum number of co-channel interfering tiers for cellular systems operating at Millimeter Wave carrier frequenciesKwashie Amartei Anang, Predrag B. Rapajic, David L. Larkai. 1389-1394 [doi]
- Hardware implementation on m parameter ML estimation of Nakagami-m fading channelXuhong Chen, Shanyun Liu, Pingyi Fan. 1395-1399 [doi]
- RSSI-based dynamic coalition formation for cooperative interference management in femtocell networksYuan-Yuan Shi, Gang Zhu, Siyu Lin, Shengfeng Xu. 1400-1405 [doi]
- Self-optimization of cell sizes in cellular networksCharalampos Papaioannou, Oluwakayode Onireti, Muhammad Ali Imran, Kamran Arshad. 1406-1411 [doi]
- Nyquist-I pulses designed to suppress the effect of ICI power in OFDM systemsShaharyar Kamal, Cesar A. Azurdia-Meza, Kyesan Lee. 1412-1417 [doi]
- Near capacity LDPC coded MU-BICM-ID for 5GShuang Chen, Kewu Peng, Yushu Zhang, Jian Song. 1418-1423 [doi]
- Dynamic frequency allocation for D2D communication based on IAR messages in OFDMA networksLeila Melki, Sameh Najeh, Hichem Besbes. 1424-1428 [doi]
- A suboptimal scheme for uplink NOMA in 5G systemsShuang Chen, Kewu Peng, Huangping Jin. 1429-1434 [doi]
- Overhead reduced preamble-based channel estimation for MIMO-FBMC systemsSohail Taheri, Mir Ghoraishi, Pei Xiao. 1435-1439 [doi]
- Energy detection and machine learning for the identification of wireless MAC technologiesSamer A. Rajab, Walid Balid, Mohamad Omar Al Kalaa, Hazem H. Refai. 1440-1446 [doi]
- An efficient and fair MAC scheme for Wireless Mesh Networks using beamforming antennasAli El Masri, Lyes Khoukhi, Abdelhakim Hafid, Ahmad Sardouk, Dominique Gaïti. 1447-1451 [doi]
- Intra-cluster multichannel scheduling algorithm for Cognitive Radio Sensor NetworksOns Mabrouk, Pascale Minet, Hanen Idoudi, Leïla Azouz Saïdane. 1452-1457 [doi]
- Hierarchical MAC protocol with multi-channel allocation for enhancing IEEE 802.11ah relay networksSaurabh Kumar, HoChul Lim, Hyungwon Kim. 1458-1463 [doi]
- Performance analysis of AODV and AOMDV over SMAC and IEEE 802.15.4 in Wireless Multimedia Sensor NetworkAmira Ben Ammar, Olfa Bouattay, Ali Dziri, Michel Terré, Habib Youssef. 1464-1468 [doi]
- RP-MAC: A cross-layer duty cycle MAC protocol with a Reduced Pipelined-forwarding feature for Wireless Sensor NetworksHo Sy Khanh, Cheol-Young Ock, Myung-Kyun Kim. 1469-1474 [doi]
- Delay based channel allocations in multi-hop cognitive radio networksZhihui Shu, Yi Qian, Rose Qingyang Hu. 1475-1480 [doi]
- Scalable video transmission system: Design and field trialHuangping Jin, Kewu Peng, Jiachen Huang, Chang-Yong Pan. 1481-1485 [doi]
- Reliable streaming protocol for lossy networksMathias Brulatout, Hicham Khalife, Vania Conan, Jeremie Leguay, Emmanuel Lochin, Jérôme Lacan. 1486-1491 [doi]
- Multimedia over massive MIMO wireless systemsHaichao Wang, Xiaohu Ge, Ran Zi, Jing Zhang, Qiang Ni. 1492-1497 [doi]
- EMULSIoN: Environment Mitigation on mULtimedia StreamIng NetworksSean Hayes, Enda Fallon, Ronan Flynn, Gabriel-Miro Muntean, Niall Murray. 1498-1503 [doi]
- Multi-Path approach for real-time service delivery optimization over HetNetsAnwar Fouad, Emad Abd-Elrahman, Ahmed Yehya. 1504-1509 [doi]
- Toward Quality of Experience models of cloud-based mobile servicesNouha Samet, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabbane. 1510-1514 [doi]
- On the perceived quality evaluation of opportunistic Mobile P2P Scalable Video streamingConstandinos X. Mavromoustakis, George Mastorakis, Evangelos Pallis, Charalampos Mysirlidis, Tasos Dagiuklas, Ilias Politis, Ciprian Dobre, Katerina Papanikolaou. 1515-1519 [doi]
- Compressed sensing-based time-varying channel estimation in UWA-OFDM networksYi Zhang, Ramachandran Venkatesan, C. Li, Octavia A. Dobre. 1520-1525 [doi]
- Comprehensive study of spectrum utilization for 802.11b/g/n networksWalid Balid, Samer A. Rajab, Hazem H. Refai. 1526-1531 [doi]
- The r-l square point process: The effect of coordinated multipoint joint transmissionIyad Lahsen Cherif, Lynda Zitoune, Véronique Vèque. 1532-1537 [doi]
- Network coding tree algorithm for multiple access systemZhengchuan Chen, Ke Xiong, Pingyi Fan, Chen Chen. 1538-1543 [doi]
- A novel approach for indoor wave propagation modelingM. Ayadi, A. Ben Zeinab, S. Tabbane. 1544-1547 [doi]
- RSSI-based localization in wireless sensor networks using Regression TreeHanen Ahmadi, Ridha Bouallegue. 1548-1553 [doi]
- Comparative study of learning-based localization algorithms for Wireless Sensor Networks: Support Vector regression, Neural Network and Naïve BayesHanen Ahmadi, Ridha Bouallegue. 1554-1558 [doi]