Abstract is missing.
- Performance of multi-path and multi-hop underlay cognitive radio network with max-min path selectionKotte Vijith Varma, Hari Krishna Boddapati, Manav R. Bhatnagar, Shankar Prakriya. 1-6 [doi]
- Optimal cluster power for joint spectrum sensing and secondary data transmission in cognitive radio networksAnal Paul, Santi P. Maity. 1-6 [doi]
- Towards modeling vehicular networks with power-performance trade-offsSriram Sankaran, Manish Gupta. 1-6 [doi]
- A simulation framework for radio resource management in WiFi networksKrishna Bharadwaj, S. Kalpalatha, Venkatesh Ramaiyan. 1-6 [doi]
- Dynamic trafile congestion detection in VANETS using a Fuzzy rule-based system and K-means clusteringUrmila Bhanja, Rajesh Kumar, Amlan Routroy, Shivashis Behura, Sudipta Mahapatra. 1-6 [doi]
- Adaptive freezing of backoff in LAA-LTENagapriyanka Parvathareddy, Varada Potnis Kulkarni. 1-5 [doi]
- Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networksAnup Kumar Maurya, V. N. Sastry. 1-6 [doi]
- A privacy-preserving method with flexible charging schedules for electric vehicles in the smart gridSabrina Afrin, Andres Kwasinski. 1-6 [doi]
- A Docker based test-bed for GMPLS simulationB. V. Avinash, M. Sai Siva RamaKrishna, R. Gowrishankar, Siva Sankara Sai Sanagapati, Vikram Seshasai. 1-4 [doi]
- Performance assessment of reparametrized KG distribution in modelling SNR of wireless channelBibhuti Bhusan Pradhan, Lakshi Prosad Roy. 1-6 [doi]
- Adapting BLE protocol for medical standard ECG transmissionSudheer Babu, Sai Prem Shaji, Abhinay Vishwanatham, K. V. Sai Sundar, T. Amar Sainath Reddy, Siva Sankara Sai Sanagapati, Satyabrataa Mohanty. 1-6 [doi]
- Centrality based information blocking and influence minimization in online social networkParamita Dey, Sarbani Roy. 1-6 [doi]
- Design of troposcatter broadband link based on SCFDEAmit Garg, Suvra Shekhar Das. 1-6 [doi]
- Radio over fiber link design for the fronthaul of cellular communication systemsAbhilash Achanta, Balla Ananda Rao, Sai Sundar Kandarpa, Siva Sankara Sai Sanagapati, Krishna Chaitanya Vishnubhatla, Krishna Kumar. 1-4 [doi]
- Optimal placement of colocated and non-colocated LWA nodes in dense deploymentsThomas Valerrian Pasca, R. Adharsh Srivats, A. Antony Franklin, Bheemarjuna Reddy Tamma. 1-6 [doi]
- Testbed implementation and proof-of-concept demonstration for cooperative device-to-device communication frameworkNaveen Gupta, Vibhutesh Kumar Singh, Siddharth Sharma, Vivek Ashok Bohara. 1-6 [doi]
- A novel adaptive TTI bundling scheme in LTE systemC. Ramesh, V. S. S. Karthik. 1-4 [doi]
- GCPiN: Group caching for privacy in named data networkingAmita Ajith Kamath, Chirag Jamadagni, Abhijith Anilkumar, Kevin Mathew, Mohit P. Tahiliani. 1-5 [doi]
- Determination of PSAP and routing of emergency calls in IP multimedia subsystemManish Patel, Manoj Kumar, Pooja Gupta, Jayant Bhatnagar. 1-4 [doi]
- Resource delayed release strategy for dynamic and fast end-to-end service provisioning in SDN-enabled OTN over WDM networksYu Zhou, Byrav Ramamurthy, Bingli Guo, Shanguo Huang. 1-6 [doi]
- Resource usage prediction of cloud workloads using deep bidirectional long short term memory networksShaifu Gupta, Dileep Aroor Dinesh. 1-6 [doi]
- Design and development of dual-band multi-stage RF energy harvesting circuit for low power applicationsAnkush Jolly, Mansi Peer, Vivek Ashok Bohara, Siddhant Verma. 1-5 [doi]
- SDTMA-NDN: Scientific data transfer management architecture using named data networkingMohammad Alhowaidi, Byrav Ramamurthy, Brian Bockelman, David Swanson. 1-6 [doi]
- Reduction of congestion in a Manhattan grid road network by detouring of vehiclesSayan Sen Sarma, Koushik Sinha, Goutam Chakraborty, Bhabani P. Sinha. 1-6 [doi]
- A QoS-aware MAC protocol for large-scale networks in Internet of ThingsA. Kalita, N. Ahmed, H. Rahman, Md. I. Hussain. 1-6 [doi]
- Strategic decision for crowd-sensing: An approach based on Markov decision processArpita Ray, Chandreyee Chowdhury, Sarbani Roy. 1-6 [doi]
- On placement and efficient resource allocation of LAA/LTE-U base stations in HetNetAnand M. Baswade, Kiran M. R. Shashi, Bheemarjuna Reddy Tamma, A. Antony Franklin. 1-6 [doi]
- A numerical approximation method for RSS-based user positioning in distributed massive MIMOK. N. R. Surya Vara Prasad, Ekram Hossain, Vijay K. Bhargava. 1-6 [doi]
- Design of photonic crystal based demultiplexer for CWDM technologySwaran Saseendran, Kaustav Bhowmick, T. Sreenivasulu. 1-4 [doi]
- Partial diffusion over distributed networks to reduce inter-node communicationSaurav Gupta, Ajit Kumar Sahoo, Upendra Kumar Sahoo. 1-6 [doi]
- Performance analysis of multiantenna two-way relay network with co-channel interferenceImtiyaz Khan, Krishna Kanth Dhulipudi, Poonam Singh. 1-6 [doi]
- Design of an active queue management technique based on neural networks for congestion controlSukant Kishoro Bisoy, Pratik Kumar Pandey, Bibudhendu Pati. 1-6 [doi]
- Using a UNPCC based classification algorithm for detection of PUE attackers in cognitive wireless sensor networksPinaki Sankar Chatterjee, Monideepa Roy. 1-6 [doi]
- Achievable rate and power efficiency in uplink massive MIMO system under antenna correlationVarun Kumar, Sudhansu Arya, Sarat Kumar Patra. 1-5 [doi]
- EECP: An energy efficient coverage preserving protocol for heterogeneous sensor networksSonam Maurya, Vinod Kumar Jain. 1-6 [doi]
- Performance analysis of integrated SAC-OCDMA and OFDM technique over FSOUrmila Bhanja, Arpita Khuntia, Swati Alamasety. 1-6 [doi]
- Cost-efficient virtual network function chaining over NFV-based telecommunications networksCarlos Galdamez, Raj Pamula, Zilong Ye. 1-6 [doi]
- Relay based wireless networks with joint modulation, power allocation and relay selectionSonal Baghel, Laxminarayana S. Pillutla. 1-6 [doi]
- Network-wide volume anomaly detection using alternate matrix decomposition techniquesAwnish Kumar, Vijaya V. Saradhi, T. Venkatesh. 1-6 [doi]
- Reduced complexity detection of under-determined single carrier spatial modulation systems with multiple active antennasR. Mohaneesh, P. Revan Datta, N. Sai Krishna, P. Rohith Sai Kashyap, Arpita Thakre. 1-4 [doi]
- Multiple service chain placement and routing in a network-enabled cloudAbhishek Gupta 0003, Brigitte Jaumard, Massimo Tornatore, Goutam Das, Biswanath Mukherjee. 1-6 [doi]
- A real-time performance evaluation of tightly coupled LTE Wi-Fi radio access networksThomas Valerrian Pasca, Sumanta Patro, Bheemarjuna Reddy Tamma, A. Antony Franklin. 1-6 [doi]
- Communication recurrence and similarity detection in network flowsAnuja Tayal, Neminath Hubballi, Nikhil Tripathi. 1-6 [doi]
- Performance analysis of cooperative multi-hop CRNs over Nakagami-m fading channelsMadhav Bhatt, Hari Krishna Boddapati, Shankar Prakriya, Manav R. Bhatnagar. 1-6 [doi]
- Video delivery services in media cloud with abandonment: An analytical approachSampa Sahoo, Maneesha Nidhi, Kshira Sagar Sahoo, Bibhudatta Sahoo, Ashok Kumar Turuk. 1-6 [doi]
- Fragmentation-aware routing, wavelength and spectrum assignment (RWSA) scheme in flex-grid optical networksRuman Dutta, S. Sai Krishna, R. Gowrishankar, G. J. Subhanu, Siva Sankara Sai Sanagapati, Prabhat Praveen Behere, Bhyri Sai Kishore. 1-6 [doi]
- Adaptive predistortion technique for nonlinear LED with dimming control in VLC systemParag Aggarwal, Rizwana Ahmad, Vivek Ashok Bohara, Anand Srivastava. 1-6 [doi]
- Security service level agreement measurement in cloud: A proof of concept implementationHimanshu Dogra, Sudhakar Verma, Neminath Hubballi, Mayank Swarnkar. 1-6 [doi]
- Enhancing visibility into home networks using SDNPrithvi Sriram, Veera Raghava Datla, Hassan Habibi Gharakheili, Vijay Sivaraman. 1-6 [doi]
- End device energy optimization in ASPL for semantic sensor networkSushovan Das, Suman Bhowmik, Chandan Giri. 1-6 [doi]
- Dynamic spectrum sharing and resource allocation for multiceli LTE-A systemSanjana Vishwanath Manturshettar, Sanjitha Kumar, Tejas Reddy, Vamsi Krishna Tumuluru. 1-5 [doi]
- Social spider optimizer based large MIMO detectorArijit Datta, Vimal Bhatia. 1-6 [doi]
- SMEAD: A secured mobile enabled assisting device for diabetics monitoringM. Saravanan, R. Shubha, Achsah Mary Marks, Vishakh Iyer. 1-6 [doi]
- An efficient ML frequency estimation of a sinusoid using the Secant methodPushpendra Singh, Amit Singhal, Shiv Dutt Joshi. 1-5 [doi]
- Privacy-preserving services in VANET with misbehavior detectionNandan Parikh, Manik Lal Das. 1-6 [doi]
- Polling vs no polling: QoS driven performance analysis of IEEE 802.15.6 for varying data rate in WBANRajni Gupta, Gitanjali Pradhan, Suparna Biswas. 1-6 [doi]
- Average SINR analysis of mm-wave MIMO system at 60 GHz band using first and second order momentsAnand Agrawal, Rakhesh Singh Kshetrimayum. 1-6 [doi]
- A novel RACH mechanism for machine type communications in cellular networksYeduri Sreenivasa Reddy, Ankit Dubey, Abhinav Kumar. 1-6 [doi]
- Primary user activity modeling using multi-term parameter estimation in cognitive radio systemsSisaara Perera, Nuwan Balasuriya, Manoj Sithara. 1-4 [doi]
- NoiseSense: Crowdsourced context aware sensing for real time noise pollution monitoring of the cityJoy Dutta, Pradip Pramanick, Sarbani Roy. 1-6 [doi]
- Implementation and validation of random exponential marking (REM) in ns-3Isha Tarte, Aparna R. Joshi, R. S. Navya, Mohit P. Tahiliani. 1-6 [doi]
- Evaluating the applicability of bandwidth allocation models for EON slot allocationGilvan M. Durães, Alexandre C. Fontinele, Andre B. Soares, Rafael F. Reale, Romildo M. S. Bezerra, Joberto S. B. Martins. 1-6 [doi]
- Effect of mode-switching on TCP short flows during D2D communication in LTE-A networksAbhijan Bhattacharyya, Bhaskar Sardar, Debashis Saha. 1-6 [doi]
- On resolving network view inconsistencies in SDN control planeP. V. Mithun, Sarath Babu, B. S. Manoj. 1-6 [doi]
- Modeling spatial distribution of base stations in the Indian scenarioPrathyusha Devi Kosala, Dhanuja Elizabeth Thomas, Abhinav Kumar. 1-6 [doi]
- A hierarchical cyber physical system for integrated demand side management of power usage in buildingsY. Vasavada, P. S. Kalyan Sasidhar. 1-6 [doi]
- Performance evaluation of memory guided directional MAC protocol in the presence of relaysShweta Mudliar, Laxminarayana S. Pillutla. 1-6 [doi]
- DNS spoofing in local networks made easyNikhil Tripathi, Mayank Swarnkar, Neminath Hubballi. 1-6 [doi]
- A 2D lens antenna for high gain and low cross polarization level in W-bandBajra Panjar Mishra, Sudhakar Sahu, Surya K. Pathak, S. K. S. Parashar. 1-4 [doi]
- Privacy-preserving blockchain based IoT ecosystem using attribute-based encryptionYogachandran Rahulamathavan, Raphael C.-W. Phan, Muttukrishnan Rajarajan, Sudip Misra, Ahmet Kondoz. 1-6 [doi]
- A graph based formalism for detecting flow conflicts in software defined networkBiswajit Halder, Mridul Sankar Barik, Chandan Mazumdar. 1-6 [doi]
- 5G RAN optimizations through radio shared data layer (RSDL)Srinivas Kumar Tangudu, Niraj Nanavaty, Rajesh Banda, Subramanya Chandrashekar, Raghuram Krishnamurthy, Srinivas Bandi. 1-4 [doi]
- Time synchronized diagnostic event data recording based on AUTOSARShilpa Raju, G. Jeyakumar, Arup Mukherji, Jignesh K. Thanki. 1-6 [doi]
- A low overhead video compression technique for energy-starved wireless multimedia sensor networkTamal Pal, DasBit Sipra. 1-6 [doi]
- SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applicationsA. Mukherjee, Sudip Misra, P. Mangrulkar, Muttukrishnan Rajarajan, Yogachandran Rahulamathavan. 1-6 [doi]
- FSNRP: Fuzzy-controlled priority scheduling of non-real time data packets in mobile ad-hoc networksAbu Sufian, Anuradha Banerjee, Paramartha Dutta. 1-5 [doi]
- Experimental evaluation of cybersecurity threats to the smart-homeArunan Sivanathan, Franco Loi, Hassan Habibi Gharakheili, Vijay Sivaraman. 1-6 [doi]
- A URL address aware classification of malicious websites for online security during web-surfingGoutam Chakraborty, Tsai Tzung Lin. 1-6 [doi]
- New heuristics for strong minimum energy topology with reduced time complexityB. S. Panda, B. K. Bhatta, Deepak Mishra 0001, Swades De. 1-6 [doi]
- An improved signal detection method for high mobility SC-OSTBC systemJyoti P. Patra, Poonam Singh, Bibhuti Bhusan Pradhan. 1-5 [doi]
- Towards policy-driven power management for cloud computingT. Varsha Ram, Sriram Sankaran. 1-5 [doi]
- Channel estimation improvement in massive MIMO systems based on pilot decontaminationMohsen Hosseinzadeh, Hassan Aghaeinia, Mohammad Kazemi. 1-6 [doi]
- Communication deployability in disaster management: Taxonomy, recent developments and future challengesVipin Kumar Pandey, Suddhasil De. 1-6 [doi]
- Aircraft network deployment optimization with k-survivabilityAlireza Zamani, Fabien Geyer, Alexandros Elefsiniotis, Anke Schmeink. 1-6 [doi]
- Binary cat swarm optimization for cryptanalysisSeeven Amic, K. M. Sunjiv Soyjaudah, Gianeshwar Ramsawock. 1-6 [doi]
- Sequential bidding auction mechanism for spectrum sharing in cognitive radio networksMonisha Devi, Nityananda Sarma, Sanjib Kumar Deka, Prakash Chauhan. 1-6 [doi]
- DCoE: Game-theoretic dynamic coalition extension with micro-grid failure in smart gridAyan Mondal, Sudip Misra. 1-6 [doi]
- A survey of scheduling policies in software defined networksAnuradha Banerjee, Flavio Esposito. 1-6 [doi]
- A graph theory based generic risk assessment framework for internet of things (IoT)V. L. Shivraj, M. A. Rajan, P. Balamuralidhar. 1-6 [doi]
- A model to incorporate automated negotiation in IoTMohammad Irfan Bala, Mohammad Ahsan Chishti. 1-4 [doi]
- R2D2: Rotating-turret 2D-scanning and dead-reckoning for remotely operated rovers over resource constrained network systemsAnandarup Mukherjee, Sudip Misra, Parakh Khandelwal. 1-6 [doi]
- OpenDaylight controller - Enhancements for a smoother software defined networkShameemraj M. Nadaf, Arun Kumar A. V., Hemant Kumar Rath, Anantha Simha. 1-6 [doi]
- Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversarySarbani Ghose, Sushmita Ruj. 1-6 [doi]
- Survivability enhancement of backbone optical networks leveraging seismic zone informationAnuj Agrawal, Purva Sharma, Vimal Bhatia, Shashi Prakash. 1-6 [doi]
- ProDiP: PDF based dropbox deployment for improved performance of DTN placed for emergency situation handling in a smart cityNabanita Das, DasBit Sipra. 1-6 [doi]
- Placement of access points with minimal wastage of transmission power in an indoor environmentGoutam K. Audhya, Koushik Sinha, Pratham Majumder, Satya Ranjan Das. 1-6 [doi]
- On the coverage probability of cellular networks with underlaid clustered device-to-device networks using power controlThavishi Illandara, Kasun T. Hemachandra, Tharaka Samarasinghe. 1-6 [doi]
- Secure key-exchange for implantable sensors using inductive couplingPriti Kumari, Tricha Anjali. 1-6 [doi]
- u-OCEAN: An underwater omnidirectional communication environment using acoustic sensor nodesSudip Misra, Anandarup Mukherjee, Dibyajyoti Pal, Sunayan Dalal. 1-6 [doi]
- Quality evaluation of high resolution videos viewed on a mobile device in an online streaming environmentDebajyoti Pal, Tuul Triyason, Vajirasak Vanijja. 1-6 [doi]
- A finite jitter buffer model for time division multiplexing over packet networksUsha Rani Seshasayee, Rathinam Manivasakan. 1-4 [doi]
- Secure lightweight routing(SLR) strategy for wireless body area networksMoumita Roy, Chandreyee Chowdhury, Arnab Kundu, Nauman Aslam. 1-4 [doi]
- Differentiated network services for data-intensive science using application-aware SDNDeepak Nadig Anantha, Byrav Ramamurthy, Brian Bockelman, David Swanson. 1-6 [doi]
- Consolidated caching with cache splitting and trans-rating in mobile edge computing networksShashwat Kumar, A. Antony Franklin. 1-6 [doi]
- Cloud enabled cognitive radio adhoc vehicular networking (CRAVENET) with security aware resource management and internet of vehicles (IoV) applicationsSachin Sharma, M. Baig Awan, Seshadri Mohan. 1-6 [doi]