Abstract is missing.
- Towards BRS based model for Wireless Mesh NetworksRachida Boucebsi, Faïza Belala. 1-6 [doi]
- Compose: A Domain Specific Language for scientific code computationBenoit Charroux, Layth Sliman, Yvan Stroppa, N. Grozavu. 1-4 [doi]
- An efficient algorithm for traffic flow optimization in MPLS networksNabil Mesbahi, Hamza Dahmouni. 1-6 [doi]
- ASAP: A passive single-anchor localization technique for wireless sensor networksRoudy Dagher, Nathalie Mitton. 1-6 [doi]
- Enhanced LEAP authentication delay for higher immunity against DoS attackBacem Mbarek, Aref Meddeb, Wafa Ben Jaballah, Mohamed Mosbah. 1-6 [doi]
- b in symbiosis for dynamic applicationsArmel Francklin Simo Tegueu, Pascal Berthou, Slim Abdellatif, Thierry Villemur, Faten Mkacher. 1-6 [doi]
- TRAINS: A throughput-efficient uniform total order broadcast algorithmMichel Simatic, Arthur Foltz, Damien Graux, Nicolas Hascoet, Stephanie Ouillon, Nathan Reboud, Tiezhen Wang. 1-8 [doi]
- Survivable Virtual Network Embedding with resource sharing and optimizationShuopeng Li, Mohand Yazid Saidi, Ken Chen. 1-6 [doi]
- How to secure a collaborative session in a single tenant environmentMohamed Amine Madani, Mohammed Erradi. 1-6 [doi]
- P2PWeb-Live: A client/server and P2P hybrid protocol for IPTV deliverySoufiane Rouibia, Benoît Parrein. 1-6 [doi]
- SDN security problems and solutions analysisAntoine Feghali, Rima Kilany, Maroun Chamoun. 1-5 [doi]
- A novel response-oriented attack classificationSamih Souissi. 1-6 [doi]
- Towards a distributed computation platform tailored for educational process discovery and analysisAwatef Hicheur Cairns, Billel Gueni, Hind Hafdi, Christian Joubert, Nasser Khelifa. 1-8 [doi]
- Connectivity Restoration in Multi-Channel Wireless Sensor NetworksSamira Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane. 1-6 [doi]
- Semantic-based forwarding model for network devicesSalaheddine Hamadi, Khalil Blaiech, Omar Cherkaoui. 1-7 [doi]
- Dynamic channel access scheme for interference mitigation in relay-assisted intra-WBANsMohamad Jaafar Ali, Hassine Moungla, Ahmed Mehaoua. 1-6 [doi]
- Radio resource sharing for MTC in LTE-A: An approach based on the bipartite graphSafa Hamdoun, Abderrezak Rachedi, Yacine Ghamri-Doudane. 1-6 [doi]
- Probabilistic latency for partial orderingPascal Urso, Jordi Martori. 1-8 [doi]
- Data protection by means of fragmentation in distributed storage systemsKatarzyna Kapusta, Gérard Memmi. 1-8 [doi]
- Toward user's devices collaboration to distribute securely the client side storageMayssa Jemel, Ahmed Serhrouchni. 1-6 [doi]
- Towards the ranking of important smart vehicles in VANETs - An information-centric approachJunaid Ahmed Khan, Yacine Ghamri-Doudane, Ali El Masri. 1-6 [doi]
- K-based definition of Real Time Distributed Systems: from a meta-model to maude modulesSahar Smaali, Aicha Choutri, Faiza Belala. 1-6 [doi]
- Survey on packet marking fields and information for IP tracebackMarion Vasseur, Rida Khatoun, Ahmed Serhrouchni. 1-8 [doi]
- Prototyping and performance analysis of a ranging system for localization by UWBNezo Ibrahim Fofana, Adrien van den Bossche, Rejane Dalce, Thierry Val. 1-6 [doi]
- Machine learning with the internet of virtual thingsGérôme Bovet, Antonio Ridi, Jean Hennebert. 1-8 [doi]
- Network security management using a novel firewall Cloud-based serviceFouad Amine Guenane. 1-6 [doi]
- Towards enhanced reactive routing in urban Vehicular Ad hoc NetworksBoubakeur Moussaoui, Soufiene Djahel, Hakima Khelifi, Salah Merniz. 1-6 [doi]
- Toward a collaborative management of a P2P distribution protocol: Local vision vs. global visionImane Mnie-Filali, Soufiane Rouibia, Dino Lopez Pacheco, Guillaume Urvoy-Keller. 1-7 [doi]
- A self-adaptive ALM architecture for P2P media streamingMourad Amad, Ahmed Meddahi, Gilles Vanwormhoudt. 1-6 [doi]
- Dynamic deployment of access and usage control policies using aspectsSamiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens. 1-6 [doi]
- Distributed collaborative system for heterogeneous swarms of autonomous mobile robotsVincent Autefage, Serge Chaumette, Damien Magoni. 1-7 [doi]
- Signaling and QoS control in resilient cognitive radio networksDramane Ouattara, Mohamed Aymen Chalouf, Martin Peres, Francine Krief. 1-6 [doi]
- A comparative study of supervised learning techniques for ECG T-wave anomalies detection in a WBS contextMedina Hadjem, Farid Naït-Abdesselam. 1-6 [doi]
- An approach to weave seamlessly non-functional requirements with functional requirements in Web Service compositionIlyass El Kassmi, Zahi Jarir. 1-6 [doi]
- D2D group communications securityEmad Abd-Elrahman, Hatem Ibn-Khedher, Hossam Afifi. 1-6 [doi]
- Overlay interconnection for end-user applications and wireless sensor networks in MANETsMohammadmajid Hormati, Fatna Belqasmi, Ferhat Khendek, Roch H. Glitho. 1-6 [doi]
- Impact of Sybil attacks on Web services trust assessmentZohra Saoud, Noura Faci, Zakaria Maamar, Djamal Benslimane. 1-6 [doi]
- Optimal data placement to improve data dissemination in vehicular networksLilia Idir, Stefano Paris, Farid Naït-Abdesselam. 1-6 [doi]
- Taxonomy of attacks on industrial control protocolsZakarya Drias, Ahmed Serhrouchni, Olivier Vogel. 1-6 [doi]
- Collaborative computing in heterogeneous wireless sensor networksChiraz Trabelsi, Nicolas Gouvy, Kahina Hassam. 1-6 [doi]
- Original secure architecture for IoT based on SDNOlivier Flauzac, Carlos Gonzalez, Florent Nolot. 1-6 [doi]
- QEMSS: A selection scheme for participatory sensing tasksRim Ben Messaoud, Yacine Ghamri-Doudane. 1-6 [doi]
- Improving trickle fairness: Locally-calculated redundancy constantsTitouan Coladon, Malisa Vucinic, Bernard Tourancheau. 1-6 [doi]
- MAC-network cross-layer energy optimization model for Wireless Body Area NetworksLaaziz Lahlou, Amira Meharouech, Jocelyne Elias, Ahmed Mehaoua. 1-5 [doi]
- IMRR and IMPR routing protocols for inter and intra wireless mesh CommunicationsHajer Bargaoui, Nader Mbarek, Olivier Togni, Mounir Frikha. 1-6 [doi]
- An overview of localization algorithms in mobile wireless sensor networksManel Khelifi, Ilham Benyahia, Samira Moussaoui, Farid Naït-Abdesselam. 1-6 [doi]
- How to prevent cyber-attacks in inter-vehicle communication network?Hichem Sedjelmaci, Tarek Bouali, Mohamed Ayoub Messous, Sidi-Mohammed Senouci. 1-6 [doi]
- Ontological approach for Data WareHouse designBouchra Aadil, Abderrahim Ait Wakrime, Larbi Kzaz, Abderrahim Sekkaki. 1-7 [doi]