145 | -- | 150 | Yongjun Sun, Fanli Wang, Dongmin Li, Zujun Liu. MIMO blind equalization algorithm based on successive interference cancellation |
151 | -- | 161 | Ali F. Almutairi, Mohannad Hamed, Mohamed Adnan Landolsi, Mishal Al-Gharabally. A genetic algorithm approach for multi-attribute vertical handover decision making in wireless networks |
163 | -- | 182 | Abdelwahed Berguiga, Habib Youssef. A fast handover protocol for 6LoWPAN wireless mobile sensor networks |
183 | -- | 192 | Usama Mir, Loutfi Nuaymi, Mubashir Husain Rehmani, Ubaid Abbasi. Pricing strategies and categories for LTE networks |
193 | -- | 200 | Rodrigo Calderón-Rico, Roberto Carrasco-Alvarez, Javier Vázquez Castillo. Dynamic wavelet-based pilot allocation algorithm for OFDM-based cognitive radio systems |
201 | -- | 215 | Akshita Abrol, Rakesh Kumar Jha, Sanjeev Jain, Preetam Kumar. Joint power allocation and relay selection strategy for 5G network: a step towards green communication |
217 | -- | 230 | Mehdi Ghiyasvand, Azam Ramezanipour. Solving the MCQP, MLT, and MMLT problems and computing weakly and strongly stable quickest paths |
231 | -- | 238 | Yousuf Abo Rahama, Mahmoud H. Ismail, Mohamed S. Hassan. On the distribution of the product and ratio of products of EGK variates with applications |
239 | -- | 258 | Mariusz Mycek, Michal Pióro, Mateusz Zotkiewicz. MIP model for efficient dimensioning of real-world FTTH trees |
259 | -- | 275 | Roberto P. Antonioli, Emanuel B. Rodrigues, Tarcisio F. Maciel, Diego Aguiar Sousa, Francisco Rodrigo Porto Cavalcanti. Adaptive resource allocation framework for user satisfaction maximization in multi-service wireless networks |
277 | -- | 294 | Ammar Boulaiche, Kamel Adi. An auto-learning approach for network intrusion detection |
295 | -- | 318 | Md. Shohrab Hossain, Shaikh Shahriar Hassan, Mohammed Atiquzzaman, William D. Ivancic. Survivability and scalability of space networks: a survey |
319 | -- | 335 | Sweta Jain, Meenu Chawla. A fuzzy logic based buffer management scheme with traffic differentiation support for delay tolerant networks |
337 | -- | 349 | Yanli Chen, Hongxia Wang, Hanzhou Wu, Xingming Sun. A video error concealment method using data hiding based on compressed sensing over lossy channel |
351 | -- | 372 | Wenjing Wang, John Doucette 0001. Optimized design and availability analysis of large-scale shared backup path protected networks |
373 | -- | 384 | Zhirong Luan, Hua Qu, Ji-hong Zhao, Badong Chen, José C. Príncipe. Fairness constrained diffusion adaptive power control for dense small cell network |