1657 | -- | 1673 | Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Halabi Hasbullah. Performance comparison of end-to-end mobility management protocols for TCP |
1674 | -- | 1690 | Allen Lehopotseng Ramaboli, Olabisi Emmanuel Falowo, H. Anthony Chan. Bandwidth aggregation in heterogeneous wireless networks: A survey of current approaches and issues |
1691 | -- | 1708 | Sazia Parvin, Farookh Khadeer Hussain, Omar Khadeer Hussain, Song Han, Biming Tian, Elizabeth Chang. Cognitive radio network security: A survey |
1709 | -- | 1719 | Shajulin Benedict. Energy-aware performance analysis methodologies for HPC architectures - An exploratory study |
1720 | -- | 1727 | Tarek Moulahi, Salem Nasri, Hervé Guyennet. Broadcasting based on dominated connecting sets with MPR in a realistic environment for WSNs & ad hoc |
1728 | -- | 1739 | JungYul Choi, Mingon Kim, Hongkyu Jeong, Hong-Shik Park. Power-saving mechanisms for energy efficient IEEE 802.16e/m |
1740 | -- | 1748 | Jihao Yin, Chongyang Fu, Jiankun Hu. Using incremental subspace and contour template for object tracking |
1749 | -- | 1761 | Hamid Shokrzadeh, Siavash Khorsandi, Abolfazl Toroghi Haghighat. Optimized query-driven appointment routing based on Expectation-Maximization in wireless sensor networks |
1762 | -- | 1770 | Kwangcheol Shin, Kyungjun Kim, Soontae Kim. Traffic management strategy for delay-tolerant networks |
1771 | -- | 1780 | M. S. Kakkasageri, S. S. Manvi. Multiagent driven dynamic clustering of vehicles in VANETs |
1781 | -- | 1792 | Alexandre Aguiar Amaral, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Joel José Puga Coelho Rodrigues, Mario Lemes Proença Jr.. Inference of network anomaly propagation using spatio-temporal correlation |
1793 | -- | 1806 | Qi Shi, Ning Zhang, David Llewellyn-Jones. Efficient autonomous signature exchange on ubiquitous networks |
1807 | -- | 1817 | Victoria Ying Zhang, Albert Kai-Sun Wong. Kernel-based particle filtering for indoor tracking in WLANs |
1818 | -- | 1830 | Mourad Amad, Ahmed Meddahi, Djamil Aïssani, Zonghua Zhang. HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity |
1831 | -- | 1838 | Sandeep K. Sood. A combined approach to ensure data security in cloud computing |
1839 | -- | 1846 | Zuowen Tan. A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments |
1847 | -- | 1862 | Bo Dong, Qinghua Zheng, Feng Tian, Kuo-Ming Chao, Rui Ma, Rachid Anane. An optimized approach for storing and accessing small files on cloud storage |
1863 | -- | 1878 | Rafael Antonello, Stenio F. L. Fernandes, Carlos Alberto Kamienski, Djamel Sadok, Judith Kelner, István Gódor, Géza Szabó, Tord Westholm. Deep packet inspection tools and techniques in commodity platforms: Challenges and trends |
1879 | -- | 1890 | Mari Carmen Domingo. An overview of the internet of underwater things |
1891 | -- | 1900 | Javier Barrachina, Piedad Garrido, Manuel Fogue, Francisco J. Martinez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. VEACON: A Vehicular Accident Ontology designed to improve safety on the roads |
1901 | -- | 1917 | Adamu Murtala Zungeru, Li-minn Ang, Kah Phooi Seng. Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks |
1918 | -- | 1933 | Mohamed Bakillah, Mir Abolfazl Mostafavi, Steve H. L. Liang, Alexander Zipf. Real time query propagation strategies with Lightweight Coordination Calculus (LCC) for ad hoc networks of geospatial databases |
1934 | -- | 1952 | Giancarlo Fortino, Antonio Guerrieri, Gregory M. P. O'Hare, Antonio G. Ruzzelli. A flexible building management framework based on wireless sensor and actuator networks |
1953 | -- | 1963 | Linfeng Liu, Ruchuan Wang, Fu Xiao. Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes |
1964 | -- | 1972 | Gurpreet Singh, Neeraj Kumar, Anil K. Verma. Ant colony algorithms in MANETs: A review |
1973 | -- | 1978 | S. Sudha, N. Ammasaigounden. An aggregate marker for bandwidth fairness in DiffServ |
1979 | -- | 1989 | Li Li, Qing-Shan Jia, Hengtao Wang, Ruixi Yuan, Xiaohong Guan. A systematic method for network topology reconfiguration with limited link additions |
1990 | -- | 2002 | Chih-Lin Hu, Tzu-Han Kuo. A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems |
2003 | -- | 2015 | Miguel Franklin de Castro, Levi Bayde Ribeiro, Camila Helena Souza Oliveira. An autonomic bio-inspired algorithm for wireless sensor network self-organization and efficient routing |
2016 | -- | 2027 | Mohammad Hassan Hajiesmaili, Ahmad Khonsari, Ali Sehati, Mohammad Sadegh Talebi. Content-aware rate allocation for efficient video streaming via dynamic network utility maximization |
2028 | -- | 2036 | Javad Akbari Torkestani. A distributed resource discovery algorithm for P2P grids |
2037 | -- | 2050 | D. Gregor, Sergio L. Toral Marín, T. Ariza, Federico Barrero. An ontology-based semantic service for cooperative urban equipments |
2051 | -- | 2058 | Qingyang Song, Zhaolong Ning, Shiqiang Wang, Abbas Jamalipour. Link stability estimation based on link connectivity changes in mobile ad-hoc networks |
2059 | -- | 2067 | Süleyman Kardas, Serkan Celik, Muhammet Yildiz, Albert Levi. PUF-enhanced offline RFID security and privacy |
2068 | -- | 2080 | Khalid A. Darabkh, Shereen S. Ismail, Mohammad Al-Shurman, Iyad F. Jafar, Eman Alkhader, Mamoun F. Al-Mistarihi. Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks |
2081 | -- | 2091 | Yi Xie, J. Hu, S. Tang, X. Huang. A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network |
2092 | -- | 2104 | Yuan-Cheng Lai, Yen Hung Chen. A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks |