Abstract is missing.
- Event-based estimation of user experience for network video streamingYongfeng Huang, Jin Xiao, James Won-Ki Hong, Ahmed Mehaoua, Raouf Boutaba. 1-8 [doi]
- Web application virtualization for IPTVKi-Hoon Lee, Dong Hoon Kim, Gyu-Tae Baek. 1-4 [doi]
- Data aggregation for Vehicular Ad-hoc Network using particle swarm optimizationMuhammad Shoaib, Wang-Cheol Song. 1-6 [doi]
- Application of fuzzy TOPSIS for weighting the system attributes in overlay networksFaisal Kaleem, Abolfazl Mehbodniya, Kang K. Yen, Fumiyuki Adachi. 1-6 [doi]
- Displaying network topology by hierarchical layout with interest levelYuichi Sakuraba. 1-4 [doi]
- A cooperative MAC providing alternate path for the poor linkMohammad Helal Uddin Ahmed, Rim Haw, Choong Seon Hong, Md. Obaidur Rahman. 1-6 [doi]
- An architecture on proactive detecting, quarantining, and terminating resource leakage of Java-based applicationsShao-Chen Chang, Min-Huang Ku, Han-Ching Tsao, Teh-Sheng Huang. 1-5 [doi]
- A game-theoretic analysis of interaction between overlay routing and multihomingXun Shao, Go Hasegawa, Yoshiaki Taniguchi, Hirotaka Nakano. 1-7 [doi]
- An image-based annotation technique to overlay users' knowledge on existing systemsYuto Kawabata, Kenichi Nishikawa, Takeshi Masuda, Ikuya Takahashi. 1-4 [doi]
- Proposed IMS Architectures for evaluation QoE of the IPTV serviceJhon Edisson Villarreal Padilla, Jae-Oh Lee, Jung Ho Kim. 1-4 [doi]
- Application-centric Wi-Fi energy management on smart phoneJian Li, Jin Xiao, James Won-Ki Hong, Raouf Boutaba. 1-8 [doi]
- Distributed GMPLS optical control in translucent wavelength convertible WDM networksXin Wang, Filippos Balasis, Sugang Xu, Yoshiaki Tanaka. 1-8 [doi]
- Mobility-aware charger deployment for wireless rechargeable sensor networksTe-Chuan Chiu, Yuan-Yao Shih, Ai-Chun Pang, Jeu-Yih Jeng, Pi-Cheng Hsiu. 1-7 [doi]
- Intelligent M2M network using healthcare sensorsSeung-Hwan Shin, Rossi Kamal, Rim Haw, Seung-Il Moon, Choong Seon Hong, Mi-Jung Choi. 1-4 [doi]
- Design of the mitigation information network in urban areaAkito Takashi, Syou Yamamoto, Koichi Asatani, Osamu Mizuno. 1-4 [doi]
- A novel navigation system using augmented reality technology for distribution work at optical connector panelsIkutaro Ogushi, Kazunori Katayama, Yuji Azuma. 1-7 [doi]
- Pricing control for hybrid overlay/underlay spectrum access in Cognitive Radio networksCuong T. Do, Choong Seon Hong, Jinpyo Hong. 1-6 [doi]
- Carrier-grade distributed open cloud computing for telecom operatorsDapeng Wang, Jing Li, Kai Xing, Shan Jin, Kevin Liu. 1-8 [doi]
- An efficient robust header compression mechanism for Long Term Evolution Advanced relay architectureYingrong Coral Sung, Meng-Hsun Tsai, Hong-Yuh Lee. 1-4 [doi]
- QoS-aware service selection in virtualization-based Cloud computingRuozhou Yu, Xudong Yang, Jun Huang, Qiang Duan, Yan Ma, Yoshiaki Tanaka. 1-8 [doi]
- A load balancing algorithm with QoS support over heterogeneous wireless networksMd. Golam Rabiul Alam, Choong Seon Hong, Seung-Il Moon, Eung Jun Cho. 1-4 [doi]
- Application traffic identification based on remote subnet groupingJae Yoon Chung, Jian Li, Yeongrak Choi, James Won-Ki Hong. 1-8 [doi]
- Towards smart phone traffic classificationMin Hur, Myung-Sup Kim. 1-4 [doi]
- Applicaion-level traffic analysis of smartphone users using embedded agentsHyo-Sik Ham, Mi-Jung Choi. 1-4 [doi]
- A scientific workflow supported environment over hybrid infrastructure for aerodynamics designSeoyoung Kim, Hyejeong Kang, Yoonhee Kim. 1-6 [doi]
- Implementation of virtual network management system with SLA on NetFPGALi-Der Chou, Yao-Tsung Yang, Yi-Shou Chen, Te-Chin Chang, Ce-Kuen Shieh, Sheng-Wei Huang. 1-6 [doi]
- Design of Contingency Cellular NetworkJyh-Shyan Huang, Yao-Nan Lien, Chih-Lin Hu. 1-4 [doi]
- Context management for user-centric context-aware services over pervasive networksSin-Seok Seo, Joon-Myung Kang, Yoonseon Han, James Won-Ki Hong. 1-4 [doi]
- Design and implementation of Group Accounting System based on 3GPP Policy and Charging ControlHsiou-Wen Chu, Chien-Wei Cheng, Jeu-Yih Jeng. 1-4 [doi]
- Energy/carbon management network for IT equipmentsSungbong Chang, Hyungsoo Kim, Byungdeok Chung, Hyunchul Jung. 1-5 [doi]
- Design and implementation of database schema evolution for service continuity of web-based internet applicationsYi-Chang Chen, Jeu-Yih Jeng, Teh-Sheng Huang, Phone Lin. 1-4 [doi]
- Peer-to-Peer contents distribution system using multiple peer clustersKazunori Ueda, Takuya Okubo. 1-6 [doi]
- Energy reducing dynamic multi-dimensional resource allocation in cloud data centerBo Yin, Lin Lin. 1-4 [doi]
- Two-phase online memory leak detectionJui-Shan Liang, Hung-Wei Kao, Han-Ching Tsao, Shao-Chen Chang, Meng-Hsun Tsai, Kuan-Hsien Li, Yingrong Coral Sung. 1-4 [doi]
- DDoS attack forecasting system architecture using HoneynetDongwoo Kwon, James Won-Ki Hong, Hong-Taek Ju. 1-4 [doi]
- Integrated analysis method on HTTP trafficChang-Gyu Jin, Mi-Jung Choi. 1-6 [doi]
- Integrated hybrid MAC and topology control scheme for M2M area networksEui Jik Kim, Sung-Phil Heo, Hak Jin Chong, Han-Wook Jung. 1-5 [doi]
- An energy efficient resource management method in virtualized cloud environmentYanfei Li, Ying Wang, Bo Yin, Lu Guan. 1-8 [doi]
- OPERAS': Generating and improving network operational workflows on-the-flyShuntaro Kashihara, Masanori Miyazawa, Michiaki Hayashi. 1-8 [doi]
- Smart moving: A SPaT-based advanced driving-assistance systemCheng-Hsuan Cho, Han Su, Yi-Hong Chu, Wen-Yao Chang, Frank Chee-Da Tsai. 1-7 [doi]
- UM3 data exchange model and encoding rulesWunbae Jeon, Hak Jin Chong, Han-Wook Jung. 1-5 [doi]
- Study on traffic classification taxonomy for multilateral and hierarchical traffic classificationJi Hye Kim, Sung Ho Yoon, Myung-Sup Kim. 1-4 [doi]
- Applying Tesseract-OCR to detection of image spam mailsDaisuke Yamakawa, Noriaki Yoshiura. 1-4 [doi]
- Data allocation method considering server performance and data access frequency with consistent hashingHikotoshi Nakazato, Manabu Nishio, Masakatsu Fujiwara. 1-8 [doi]
- A threat model for security specification in security evaluation by ISO/IEC 19791Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara. 1-8 [doi]
- A bandwidth management method using available wavelength resources in backend servers for network services based on distributed componentsYuya Inoue, Masanori Yamazaki, Yusuke Hirota, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami. 1-4 [doi]
- Performance analysis of multi-layered protection switching with control-forwarding separationKwangtae Jeong, Chang-Hwan Lee, Young-Tak Kim. 1-4 [doi]
- Test tool for equivalence of access control listHirokazu Sayama, Noriaki Yoshiura. 1-4 [doi]
- Problems and feasibility consideration of service-forcused monitoring OSS over mobile networksHideki Toube, Shinya Aoyama, Hiroki Muramatsu, Osamu Nakamura, Kazuhide Takahashi. 1-4 [doi]
- Dynamic bandwidth reallocation for NG-SDH networks based on Real-time Traffic Flow AnalysisTsan-Chang Kuo, Min-Chia Chang, Chuan Yin, Been-Huang Liao. 1-7 [doi]
- Optimization of energy saving in celluar networks using ant colony algorithmDuowei Jin, Peng Yu, Zhaowei Qu, Wenjing Li. 1-4 [doi]
- A dynamic resource allocation method in IaaS based on deadline timeLu Guan, Ying Wang, Yanfei Li. 1-4 [doi]
- An improved network performance anomaly detection and localization algorithmGuanjue Wang, Yan Qiao, Xuesong Qiu, Luoming Meng. 1-4 [doi]
- Customer energy management platform in the Smart GridJisun Lee, Yoonkee Kim, Jakyung Hahn, Hoseok Seo. 1-4 [doi]
- Challenges of system virtualizationCheng-Yu Chou, Chih-Wei Liu, Kuo-Yu Tseng, Chien-Wei Cheng, Fang-Sun Lu. 1-5 [doi]
- MDA-based network management information model transformation from UML to Web ServicesBo Wang, Zhili Wang, Xue-Song Qiu. 1-4 [doi]
- An enhanced multi-channel MAC protocol for wireless ad hoc networksDuc Ngoc Minh Dang, Nguyen Tran Quang, Choong Seon Hong, Jinpyo Hong. 1-4 [doi]
- A seamless content delivery scheme for flow mobility in Content Centric NetworkRim Haw, Choong Seon Hong. 1-5 [doi]
- Flattening and preferential attachment in the internet evolutionMiao Li, Hui Wang, Jiahai Yang. 1-8 [doi]
- Misconfiguration detection for cloud datacenters using decision tree analysisTetsuya Uchiumi, Shinji Kikuchi, Yasuhide Matsumoto. 1-4 [doi]
- A light-weight periodic data collection approach of TR-069 managed CPEsWen-Che Yang, Dong-Yie Chen, Kuo-Hsiang Lai, Rong-Ruey Lee. 1-7 [doi]