149 | -- | 162 | Gaurav Sharma, Ashok Kumar. Fuzzy logic based 3D localization in wireless sensor networks using invasive weed and bacterial foraging optimization |
163 | -- | 178 | Gaurav Sharma, Ashok Kumar. Improved DV-Hop localization algorithm using teaching learning based optimization for wireless sensor networks |
179 | -- | 193 | Sofiane Hamrioui, Pascal Lorenz, Jaime Lloret. Self-organizing technique for improving coverage in connected mobile objects networks |
195 | -- | 209 | Julian Romero, Luis Guijarro, Vicent Pla, José R. Vidal. Price competition between a macrocell and a small-cell service provider with limited resources and optimal bandwidth user subscription: a game-theoretical model |
211 | -- | 215 | Lucian Trifina, Daniela G. Tarniceriu. Determining the number of true different permutation polynomials of degrees up to five by Weng and Dong algorithm |
217 | -- | 229 | Yaser Jararweh, Haythem Bany Salameh, Abdallah Alturani, Lo'ai Ali Tawalbeh, Houbing Song. Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks |
231 | -- | 246 | Abdulbaghi Ghaderzadeh, Mehdi Kargahi, Midia Reshadi. ReDePoly: reducing delays in multi-channel P2P live streaming systems using distributed intelligence |
247 | -- | 267 | B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Kostas E. Psannis. Defending against phishing attacks: taxonomy of methods, current issues and future directions |
269 | -- | 280 | Yulin Zhou, Yunfei Chen. Performance analysis of end-to-end SNR estimators for AF relaying |
281 | -- | 295 | Eline De Cuypere, Koen De Turck, Dieter Fiems. A queueing model of an energy harvesting sensor node with data buffering |
297 | -- | 307 | Jiajun Sun, Ningzhong Liu, Dianliang Wu. Budget-constraint mechanism for incremental multi-labeling crowdsensing |
309 | -- | 322 | Ahmad Reza Montazerolghaem, Mohammad Hossein Yaghmaee Moghaddam. Design, implementation and performance evaluation of a proactive overload control mechanism for networks of SIP servers |
323 | -- | 348 | Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Rahul Kumar. Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors |
349 | -- | 365 | Ayesha Haider Ali, Muhammad Mohsin Nazir. Radio resource management with QoS guarantees for LTE-A systems: a review focused on employing the multi-objective optimization techniques |
367 | -- | 385 | Sarra Hammoudi, Zibouda Aliouat, Saad Harous. Challenges and research directions for Internet of Things |