Journal: Telecommunication Systems

Volume 67, Issue 2

149 -- 162Gaurav Sharma, Ashok Kumar. Fuzzy logic based 3D localization in wireless sensor networks using invasive weed and bacterial foraging optimization
163 -- 178Gaurav Sharma, Ashok Kumar. Improved DV-Hop localization algorithm using teaching learning based optimization for wireless sensor networks
179 -- 193Sofiane Hamrioui, Pascal Lorenz, Jaime Lloret. Self-organizing technique for improving coverage in connected mobile objects networks
195 -- 209Julian Romero, Luis Guijarro, Vicent Pla, José R. Vidal. Price competition between a macrocell and a small-cell service provider with limited resources and optimal bandwidth user subscription: a game-theoretical model
211 -- 215Lucian Trifina, Daniela G. Tarniceriu. Determining the number of true different permutation polynomials of degrees up to five by Weng and Dong algorithm
217 -- 229Yaser Jararweh, Haythem Bany Salameh, Abdallah Alturani, Lo'ai Ali Tawalbeh, Houbing Song. Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
231 -- 246Abdulbaghi Ghaderzadeh, Mehdi Kargahi, Midia Reshadi. ReDePoly: reducing delays in multi-channel P2P live streaming systems using distributed intelligence
247 -- 267B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Kostas E. Psannis. Defending against phishing attacks: taxonomy of methods, current issues and future directions
269 -- 280Yulin Zhou, Yunfei Chen. Performance analysis of end-to-end SNR estimators for AF relaying
281 -- 295Eline De Cuypere, Koen De Turck, Dieter Fiems. A queueing model of an energy harvesting sensor node with data buffering
297 -- 307Jiajun Sun, Ningzhong Liu, Dianliang Wu. Budget-constraint mechanism for incremental multi-labeling crowdsensing
309 -- 322Ahmad Reza Montazerolghaem, Mohammad Hossein Yaghmaee Moghaddam. Design, implementation and performance evaluation of a proactive overload control mechanism for networks of SIP servers
323 -- 348Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Rahul Kumar. Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
349 -- 365Ayesha Haider Ali, Muhammad Mohsin Nazir. Radio resource management with QoS guarantees for LTE-A systems: a review focused on employing the multi-objective optimization techniques
367 -- 385Sarra Hammoudi, Zibouda Aliouat, Saad Harous. Challenges and research directions for Internet of Things