Abstract is missing.
- UV glass sensorSaravanan Yuvaraja, A. Stree Vithya. 1-5 [doi]
- 3DPBARP: A three dimensions position based adaptive real-time routing protocol for wireless sensor networksFariborz Entezami, Christos Politis. 1-5 [doi]
- Enhanced LTE physical downlink control channel design for machine-type communicationsJinsong Hu, Mao Wang, Kingsley Jun Zou, Kristo Wenjie Yang, Min Hua, Jingjing Zhang. 1-5 [doi]
- RACE: Risk analysis for cooperative enginesAymen Boudguiga, Antoine Boulanger, Pascale Chiron, Witold Klaudel, Houda Labiod, Jean-Christophe Seguy. 1-5 [doi]
- Data dissemination in vehicular networks: Challenges, solutions, and future perspectivesLeandro Aparecido Villas. 1-5 [doi]
- Reliable and flexible communications for power systems: Fault-tolerant multicast with SDN/OpenFlowThomas Pfeiffenberger, Jia Lei Du, Pedro Bittencourt Arruda, Alessandro Anzaloni. 1-6 [doi]
- QoE-aware multiple sinks mobility in wireless sensor networksJoao Paulo Just Peixoto, Daniel G. Costa. 1-4 [doi]
- Security of C-ITS messages: A practical solution the ISE project demonstratorPierpaolo Cincilla, Arnaud Kaiser, Brigitte Lonc, Houda Labiod, Remi Blancher, Christophe Jouvray, Richard Denis, Antoine Boulanger. 1-2 [doi]
- Detecting critical protected links to keep connectivity to servers against link failuresDaishi Irie, Shinya Kurimoto, Hiroyoshi Miwa. 1-5 [doi]
- Adaptive framework for data transmission over GSM voice channel for developing regionsSiddhartha Asthana, Pushpendra Singh, Shraddha Jain. 1-5 [doi]
- A coverage algorithm for intermittently connected delay tolerant wireless sensor networksIsrael L. C. Vasconcelos, David H. S. Lima, Carlos Mauricio S. Figueiredo, André L. L. de Aquino. 1-5 [doi]
- Kullback-Leibler divergence as an estimate of reproducibility of numerical resultsFlorent Calvayrac. 1-5 [doi]
- Distortion analysis of underwater acoustic sensor networksAndrej Stefanov. 1-4 [doi]
- Pricing strategies in multi-operator heterogeneous wireless networksSoha Farhat, Abed Ellatif Samhat, Samer Lahoud, Bernard Cousin. 1-5 [doi]
- Online detection of anomalous network flows with soft clusteringMikhail Zolotukhin, Timo Hämäläinen, Tero Kokkonen, Jarmo Siltanen. 1-5 [doi]
- Modeling information flow properties with UMLKuzman Katkalov, Kurt Stenzel, Marian Borek, Wolfgang Reif. 1-5 [doi]
- Satisfying QoS requirements in NGN networks using an optimized resource control and management methodCherif Ghazel, Leïla Azouz Saidane. 1-5 [doi]
- Indoor patient monitoring through Wi-Fi and mobile computingJoão M. G. Duarte, Eduardo Cerqueira, Leandro A. Villas. 1-5 [doi]
- Elastic flow reroutingYoann Foquet, Dritan Nace. 1 [doi]
- Enhancing immediacy of identification with multi-stage application identificationYuichi Kumano, Shingo Ata, Nobuyuki Nakamura, Yoshihiro Nakahira, Ikuo Oka. 1-2 [doi]
- An hybrid platform for remote health monitoring: From concept to deploymentKarel Heurtefeux, Nasreen Mohsin, Hamid Menouar. 1-2 [doi]
- D2D broadcast communications for 4G PMR networksXavier Pons, Christophe Gruet, Eric Georgeaux, Lirida A. B. Naviner. 1-5 [doi]
- A database driven data channel selection scheme for V2V communication over TV white spaceHitoshi Nakao, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie. 1-5 [doi]
- Sahyog: A middleware for mobile collaborative applicationsGarvita Bajaj, Pushpendra Singh. 1-5 [doi]
- Distance measurement system for smart vehiclesMingchang Zhao, Abdelhamid Mammeri, Azzedine Boukerche. 1-5 [doi]
- Performance of joint transmission CoMP with global precoding matrix and IRC receiver for LTE-AHeba Raafat Ahmed, Essam Sourour, Hassan M. Elkamchouchi. 1-5 [doi]
- Interference avoidance for TVWS smart metering system by optimization assignment problemChuyen Khoa Huynh, Thanh Mai Nguyen Hoang, Won-Cheol Lee. 1-5 [doi]
- A cognitive two-way relay transmission scheme based on adaptive QAM and wireless network codingKe Ke, Yixi Xie, Yongjie Liu, Chao Hua. 1-4 [doi]
- Analysis of XACML policies with ASPDhouha Ayed, Marie-Noëlle Lepareux, Cyrille Martins. 1-5 [doi]
- Classification and comparative analysis of inter-cell interference coordination techniques in LTE networksMohamed A. Aboul Hassan, Mohamad Yassin, Samer Lahoud, Marc Ibrahim, Dany Mezher, Bernard Cousin, Essam A. Sourour. 1-6 [doi]
- Concept for a security investigation frameworkMartin Ussath, Feng Cheng 0002, Christoph Meinel. 1-5 [doi]
- Design of lane keeping assist system for autonomous vehiclesAbdelhamid Mammeri, Guangqian Lu, Azzedine Boukerche. 1-5 [doi]
- Impact of desynchronization problem in 1609.4/WAVE multi-channel operationErick Donato, Edmundo R. M. Madeira, Leandro A. Villas. 1-5 [doi]
- Efficient web services selection based on QoS through a distributed parallel semantic approachLuis Hideo Vasconcelos Nakamura, Pedro F. do Prado, Rafael Mira De Oliveira Libardi, Luiz Henrique Nunes, Rodolfo Ipolito Meneguette, Júlio Cezar Estrella, Regina H. C. Santana, Marcos José Santana, Stephan Reiff-Marganiec. 1-5 [doi]
- Implementation of the fully homomorphic encryption scheme over integers with shorter keysLuan Cardoso dos Santos, Guilherme Rodrigues Bilar, Fabio Dacencio Pereira. 1-5 [doi]
- Towards power profiling of Android permissionsKevan Adlard, Tharanga Ekanayake, Ashraf Matrawy. 1-5 [doi]
- Wireless sensor device hardware architecture - Design and analysis for high availabilityDavid Selvakumar, Kaushik Nanda, Hari Babu Pasupuleti. 1-5 [doi]
- A cloud-based architecture for network attack signature learningOmessaad Hamdi, Maïssa Mbaye, Francine Krief. 1-5 [doi]
- Conceptual architecture for self-discovering in fragmented service systemsMichael Strasser, Sahin Albayrak. 1-5 [doi]
- Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networksCong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi. 1-7 [doi]
- A new energy saving framework for long lasting wireless sensor nodesDragos Ioan Sacaleanu, Lucian Andrei Pericoara, Rodica Stoian, Vasile Lzarescu. 1-5 [doi]
- Integrating OpenFlow to LTE: Some issues toward software-defined mobile networksLuciano Jerez Chaves, Vitor Marge Eichemberger, Islene Calciolari Garcia, Edmundo Roberto Mauro Madeira. 1-5 [doi]
- Metadata in SDN API for WSNManfred Sneps-Sneppe, Dmitry Namiot. 1-5 [doi]
- The design of a rateless channel coding scheme for deep-space communicationShaolei Chen, Chuangmu Yao, Rui Dai. 1-5 [doi]
- Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphonesNobuyuki Teraura, Kouichi Sakurai. 1-5 [doi]
- A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosisSana Tmar Ben Hamida, Beena Ahmed. 1-2 [doi]
- A method of securing priority-use routes for emergency vehicles using inter-vehicle and vehicle-road communicationYuma Moroi, Kazumasa Takami. 1-5 [doi]
- A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systemsRiccardo Pecori. 1-5 [doi]
- Combining cell phones and WSNs for preventing accidents in smart-homes with disabled peopleDiulie J. Freitas, Tiago B. Marcondes, Luis Hideo Vasconcelos Nakamura, Jo Ueyama, Pedro H. Gomes, Rodolfo Ipolito Meneguette. 1-5 [doi]
- A novel cryptography based privacy preserving solution for urban mobility and traffic controlMohamad Badra, Elyes Ben Hamida. 1-5 [doi]
- Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar, Christophe Ponchel, Laura Rodriguez Martin. 1-6 [doi]
- Mining social networks for software vulnerabilities monitoringSlim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari. 1-7 [doi]
- Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasuresKashif Habib, Wolfgang Leister. 1-5 [doi]
- Numerical reproducibility: Feasibility issuesPhilippe Langlois, Rafife Nheili, Christophe Denis. 1-5 [doi]
- Implementation of an emergency vehicle to traffic lights communication systemNasser Al-Ostath, Fatma Selityn, Zainab Al-Roudhan, Mohammed El-Abd. 1-5 [doi]
- Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementationMedhat H. M. Elsayed, Amr Mohamed. 1-5 [doi]
- IPOL: A new journal for fully reproducible research; analysis of four years developmentMiguel Colom, Bertrand Kerautret, Nicolas Limare, Pascal Monasse, Jean-Michel Morel. 1-5 [doi]
- BSD-based elliptic curve cryptography for the open Internet of ThingsOriol Pinol Pinol, Shahid Raza, Joakim Eriksson, Thiemo Voigt. 1-5 [doi]
- Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settingsClaudio Correa, Jo Ueyama, Rodolfo Ipolito Meneguette, Leandro A. Villas, Geraldo P. R. Filho. 1-5 [doi]
- Imposter detection for replication attacks in mobile sensor networksTassos Dimitriou, Ebrahim A. Alrashed, Mehmet Hakan Karaata, Ali Hamdan. 1-5 [doi]
- On-the-fly algorithm for the service composition problemHikmat Farhat, Guillaume Feuillade. 1-6 [doi]
- System modeling and risk analysis using AADL for critical infrastructure securitySerhat Gezgin, Emel Uras, Emre Eroglu, Levent Altay, Serif Bahtiyar, Gürkan Gür. 1-2 [doi]
- Using thermal transients at the outlet of electrical water heaters to recognise consumption patterns for heating schedule optimisationP. J. C. Nel, M. J. Thinus Booysen, B. van der Merwe. 1-5 [doi]
- Serverless lightweight mutual authentication protocol for small mobile computing devicesCollins Mtita, Maryline Laurent, Pascal Daragon. 1-5 [doi]
- Trust-based storage in a Kademlia network infected by SybilsRiccardo Pecori. 1-5 [doi]
- NGNaaS: NGNs as cloud computing servicesFatna Belqasmi, May El Barachi, Jose M. Alcaraz Calero, Mohamad Badra, Omar Alfandi. 1-6 [doi]
- Design, implementation and evaluation of SDN-based resource management modelMahmud Rasih Celenlioglu, Mohammed Alsadi, Haci Ali Mantar. 1-5 [doi]
- Towards reproducible cyber-security research through complex node automationSebastian Abt, Reinhard Stampp, Harald Baier. 1-5 [doi]
- Lifetime optimization of sensor-cloud systemsLeila Ben Saad, Bernard Tourancheau. 1-5 [doi]
- Survey and comparison of MADM methods for network selection access in heterogeneous networksMohamed Lahby, Silki Baghla, Abderrahim Sekkaki. 1-6 [doi]
- Towards software defined cognitive networkingIjaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei Gurtov. 1-5 [doi]
- Minimizing traffic jams in urban Centers using vehicular ad hoc networksAllan Mariano de Souza, R. S. Yokoyama, Guilherme Maia, Antonio Alfredo Ferreira Loureiro, Leandro A. Villas. 1-5 [doi]
- A classification of web browser fingerprinting techniquesRandika Upathilake, Yingkun Li, Ashraf Matrawy. 1-5 [doi]
- Zonal fairness in wireless infrastructureMario Köppen, Masato Tsuru. 1-5 [doi]
- WiFi/WhiteFi handover: Signaling and performanceBudoor Bawazeer, Nadine Akkari Adra, Ghadah Aldabbagh, Nikos Dimitriou. 1-6 [doi]
- MASCA: MAnagement of simultaneous connectivity for applicationsVictor Tortorello, Luis Hideo Vasconcelos Nakamura, Daniel C. Lobato, Rodolfo Ipolito Meneguette. 1-5 [doi]