Abstract is missing.
- A MAC address based authentication system applicable to campus-scale networkYoshiaki Watanabe, Makoto Otani, Hirofumi Eto, Kenzi Watanabe, Shin-ichi Tadaki. 1-3 [doi]
- Control scenario based Energy Savings Scheme on SG-BEMSBongGyu Koo, Byungdeok Chung, ChiYoung Jang, KyungGyu Park. 1-3 [doi]
- Multi-cloud service fulfillment architecture for enabling digital rain forestDah-Sheng Lee, Wei-Te Sung, Shuang-Mei Wang, Jin-Yuan Shun. 1-3 [doi]
- Method for visualizing information from large-scale carrier networksNaoki Tateishi, Mitsuho Tahara, Naoyuki Tanji, Hikaru Seshake. 1-6 [doi]
- Services paths planning for Electric Power Communication Network based on improved Ant Colony OptimizationQian Han, Feng Qi, Yulin Su, Qi Li, Xuesong Qiu. 1-3 [doi]
- A risk recommendation approach for information security risk assessmentYa-Chi Chu, Yu-Chih Wei, Wen-Hsuan Chang. 1-3 [doi]
- Experiments with practical on-demand multi-core packet captureMarat Zhanikeev. 1-3 [doi]
- Routing information management for content oriented networks using Bloom FiltersKenji Komatsu, Takuya Asaka. 1-5 [doi]
- Business impact analysis of a mediator between the network management systems of the IP/MPLS network and the transport networkA. M. Hassan, Jörn Altmann. 1-3 [doi]
- Design and develop an OpenFlow Testbed within virtualized architecturePang-Wei Tsai, Yu-Ting Lai, Pei-Wen Cheng, Chu-Sing Yang, Mon-Yen Luo. 1-3 [doi]
- IDS for detecting malicious non-executable files using dynamic analysisAhmad Bazzi, Yoshikuni Onozato. 1-3 [doi]
- OSS data integration using virtual databaseNaoki Take, Manabu Nishio, Hikaru Seshake. 1-6 [doi]
- A cell outage compensation scheme based on immune algorithm in LTE networksZhengxin Jiang, Peng Yu, Yulin Su, Wenjing Li, Xuesong Qiu. 1-6 [doi]
- A distributed energy saving mechanism in wireless access networkYulin Su, Peng Yu, Zhengxin Jiang, Wenjing Li, Xuesong Qiu. 1-3 [doi]
- Error analysis of an estimation method using RTT for available bandwidth of a bottleneck linkMasaharu Imai, Takayuki Ozawa, Yoshio Sugizaki, Koichi Asatani. 1-3 [doi]
- Calibration of DNS delegation misleadingZheng Wang. 1-3 [doi]
- Improved processing speed of traffic classification based on payload signature hierarchyJi-Hyeok Choi, Myung-Sup Kim. 1-3 [doi]
- Psychic: An autonomic inference engine for M2M management in Future InternetR. Kamal, J. H. Lee, C. K. Hwang, S. I. Moon, C. S. Hong, M. J. Choi. 1-6 [doi]
- Analysis of peer cluster layers selection criteria for P2P contents distribution systemsKazunori Ueda, Jun-ichi Akase, Takuya Okubo. 1-6 [doi]
- Incoming traffic modeling of heterogeneous Public Safety NetworkTuyatsetseg Badarch, Otgonbayar Bataa. 1-6 [doi]
- Towards automatic signature generation for identification of HTTP-based applicationsHwan-Hee Kim, Mi-Jung Choi. 1-3 [doi]
- An improvement of OLSR using fuzzy logic based MPR selectionNarangerel Dashbyamba, Celimuge Wu, Satoshi Ohzahata, Toshihiko Kato. 1-6 [doi]
- A no-reference hybrid objective QoE evaluation for MPEG-4 encoded videoFan Liu, Yang Geng, Jichun Liu, Wenjing Li, Xuesong Qiu. 1-3 [doi]
- Hierarchical resource management system on network virtualization platform for reduction of virtual network embedding calculationYohei Katayama, Kazuhisa Yamada, Katsuhiro Shimano, Akihiro Nakao. 1-3 [doi]
- Reception cycle-aware resource block allocation for real time video traffic in 3GPP LTE systemChin Li, Jen-Yi Pan, Ming-Hung Hsu. 1-6 [doi]
- NA-LAR: NAV based load aware routing protocol for wireless mesh networksInsoo Lee, Byungdeok Chung, Dohyeun Kim. 1-3 [doi]
- Managing distributed storage system through network redesignTahani Hussain, Paulvanna Nayaki Marimuthu, Sami J. Habib. 1-6 [doi]
- Integrating legacy forwarding environment to OpenFlow/SDN control planeFernando N. N. Farias, Joao J. Salvatti, Pedro Victor, Antonio Abelém. 1-3 [doi]
- Designing temporally and spatially integrated social mobility models for wireless network researchesZhenwei Ding, Ryoichi Shinkuma, Tatsuro Takahashi. 1-5 [doi]
- A design of energy-efficient resource sharing overlay network in Mobile Cloud ComputingWei Liu, Ryoichi Shinkuma, Tatsuro Takahashi. 1-3 [doi]
- Application layer flow classification in SDNHamid Farhadi, Akihiro Nakao. 1-3 [doi]
- Correlation analysis between inference accuracy and inference parameters for stateless firewall policyHyeonwoo Kim, Wooguil Pak, Hongtaek Ju. 1-6 [doi]
- Maximum entropy based randomized routing in data-centric networksKenji Leibnitz, Tetsuya Shimokawa, Ferdinand Peper, Masayuki Murata. 1-6 [doi]
- A ripple form RSRP based algorithm for load balancing in downlink LTE self-optimizing networkFanqin Zhou, Lei Feng, Peng Yu, Wenjing Li. 1-3 [doi]
- Transformation of PSTN to Next Generation NetworkSheng-Wang Yu, Chung-Shih Tang, Kuo-Sheng Lo. 1-6 [doi]
- An energy efficient user context collection method for smartphonesYoonseon Han, Joon-Myung Kang, Sin-Seok Seo, Ahmed Mehaoua, James Won-Ki Hong. 1-6 [doi]
- A tiering architecture for integrated network management systemSeongbok Baik, YooSung Jeon, Chankyou Hwang, Yungwoo Lee. 1-3 [doi]
- Deployment scheduling of Contingency Cellular Network for disaster relief operationsJyh-Shyan Huang, Yan-Song Wang, Yao-Nan Lien. 1-6 [doi]
- Service rate test mechanism and management of broadband access networkWen-Che Yang, Jhih-Dao Jhan, Dong-Yie Chen, Kuo-Hsiang Lai, Rong-Ruey Lee. 1-3 [doi]
- Topology-aware remapping to survive virtual networks against substrate node failuresAiling Xiao, Ying Wang, Luoming Meng, Xuesong Qiu, Wenjing Li. 1-6 [doi]
- A SLA driven VM auto-scaling method in hybrid cloud environmentHyejeong Kang, Jung-In Koh, Yoonhee Kim, Jaegyoon Hahm. 1-6 [doi]
- Analysis and performance evaluation of data transport methods in Content-Centric NetworkingSin-Seok Seo, Joon-Myung Kang, Yoonseon Han, James Won-Ki Hong. 1-3 [doi]
- A M2M horizontal services platform implementation over IP multimedia subsystem (IMS)Jhon Edisson Villarreal Padilla, Jae-Oh Lee, Jung Ho Kim. 1-3 [doi]
- A shortest path based automatic composition method of Semantic Web servicesJie Yang, Zhili Wang, Kan Chen. 1-3 [doi]
- Application traffic classification using statistic signatureHyun-Min An, Myung-Sup Kim, Jae-Hyun Ham. 1-6 [doi]
- Topology construction method for multi-overlay sensor networksShuhei Kajimoto, Takuya Asaka. 1-3 [doi]
- Effectiveness of performance flag selection for enhancing Tor circuitsKale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato. 1-3 [doi]
- An efficient method to maintain the header signatures for internet traffic identificationSung Ho Yoon, Myung-Sup Kim. 1-3 [doi]
- Implementation of a novel management development platform for virtual networksWenyu Shen, Kenji Minato, Yukio Tsukishima, Katsuhiro Shimano. 1-6 [doi]
- Efficiently scheduling Cloud resources for peak or urgent events in telecom systemChia-Chun Shih, Chao-Wen Huang. 1-6 [doi]
- Short Message Service for Internet-Mobile platformYingrong Coral Sung, Jui-Feng Sung. 1-3 [doi]
- Graph clustering based provisioning algorithm for optimal inter-cloud service brokeringTaesang Choi, Younghwa Kim, Sunhee Yang. 1-6 [doi]
- Application of Synchronized Multi-Hop Protocol to time-variable multi-rate and multi-hop wireless networkXinru Yao, Yasushi Wakahara. 1-6 [doi]
- Dynamic cooperating set planning for Coordinated Multi-Point (CoMP) in LTE/LTE-advanced systemsPo-Min Hsu, Jen-Jee Chen, Jia-Ming Liang. 1-6 [doi]
- A best practice of enterprise information integration platform in telecom industryJu-Ting Teng, Yung-Chang Tsai, Wen-Chi Wang, Min-Huang Ku. 1-3 [doi]
- Pricing reserved and On-Demand Schemes of cloud computing based on option pricing modelDeyuan Wang, Ying Wang, Jichun Liu, Ke Xiao, Wenjing Li, Xuesong Qiu. 1-3 [doi]
- Randomized interconnection networks in cloudsHung-Chang Hsiao, Yu-Chang Chao, Cheng-Lung Chu. 1-3 [doi]
- An IPv6-enabled Software-Defined Networking architectureChia-Wei Tseng, Yao-Tsung Yang, Li-Der Chou. 1-3 [doi]
- Self-organizing Energy-Saving mechanism with base stations cooperation for heterogeneous cellular networksZifan Li, Peng Yu, Wenjing Li, Xuesong Qiu. 1-3 [doi]
- Load distribution of an OpenFlow controller for role-based network access controlTakayuki Sasaki, Yoichi Hatano, Kentaro Sonoda, Yoichiro Morita, Hideyuki Shimonishi, Toshihiko Okamura. 1-6 [doi]
- Virtual machine placement algorithms to minimize physical machine countSatoru Ohta. 1-3 [doi]
- End-to-end path loss inference algorithm with network tomographyXiangyu Cao, Ying Wang, Xuesong Qiu, Luoming Meng. 1-3 [doi]
- Cognitive rate adaptation for high throughput IEEE 802.11n WLANsShinnazar Seytnazarov, Young-Tak Kim. 1-6 [doi]
- Theil-Equilibrium based Cooperation Mechanism for multi-services in ubiquitous stub enironmentsNan Mu, Lanlan Rui, Shao-yong Guo, Xuesong Qiu. 1-3 [doi]
- A dynamic network access control mechanism for virtual desktop environmentJhih-Yan Lin, Chu-Chuan Lee, Chao-Chun Yen, Shih-Chun Hsu, Cheng-Hung Hsieh, Chun-Hao Lin. 1-3 [doi]
- The improvement of auto-scaling mechanism for distributed database - A case study for MongoDBChao-Wen Huang, Wan-Hsun Hu, Chia-Chun Shih, Bo-Ting Lin, Chien-Wei Cheng. 1-3 [doi]
- The design of integrated mobile SNS gateway structureShinho Lee, Insik Jung, Hyeonwoo Kim, Hongtaek Ju. 1-3 [doi]
- A server-assisted provisioning method for machine-to-machine gatewayMasaharu Hattori, Hikaru Yagi, Kiyohito Yoshihara. 1-3 [doi]
- An efficient and reliable MAC for Vehicular Ad Hoc NetworksDuc Ngoc Minh Dang, Hanh Ngoc Dang, Cuong The Do, Choong Seon Hong. 1-5 [doi]
- Performance improvement of payload signature-based traffic classification system using application traffic temporal localityJun-Sang Park, Sung Ho Yoon, Myung-Sup Kim. 1-6 [doi]
- A cost-effective approach to evaluating security vulnerability scannerYuan-Hsin Tung, Shian-Shyong Tseng, Jen-Feng Shih, Hwai-Ling Shan. 1-3 [doi]
- A prototype of service platform uniting network control in multiple OpenFlow domainsYuya Inoue, Yusuke Hirota, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami. 1-3 [doi]
- Resource relation map based fault diagnosis and fault tolerance methods for home network environmentsJeu-Young Kim, Jihyun Lee, Jiyeon Son, Jun-Hee Park. 1-5 [doi]
- A successful application of big data storage techniques implemented to criminal investigation for telecomJu-Chi Tseng, Hsin-Cheng Tseng, Chih-Wei Liu, Chia-Chun Shih, Kuo-Yu Tseng, Cheng-Yu Chou, Chia-Hsuan Yu, Fang-Sun Lu. 1-3 [doi]
- Distributed connection admission control integrated with pricing for QoS provisioning and revenue maximization in wireless random access networksBo Gu, Cheng Zhang, Kyoko Yamori, Yoshiaki Tanaka. 1-5 [doi]
- Fast Overlapping Algebraic TracebackDung Tien Ngo, Choong Seon Hong. 1-3 [doi]
- Bandwidth guaranteed method to relocate virtual machines for edge cloud architectureKonomi Mochizuki, Hirofumi Yamazaki, Akira Misawa. 1-6 [doi]
- Time-dependent pricing for revenue maximization of network service providers considering users preferenceCheng Zhang, Bo Gu, Sugang Xu, Kyoko Yamori, Yoshiaki Tanaka. 1-6 [doi]
- A workload prediction-based multi-VM provisioning mechanism in cloud computingShengming Li, Ying Wang, Xuesong Qiu, Deyuan Wang, Lijun Wang. 1-6 [doi]
- A novel network-centric infrastructure for social networking services using a messaging networkTakafumi Hayashi, Hideyuki Fukuhara, Y. Abe, Masayuki Hisada, J. Yamazaki, H. Tokura, Toshiaki Miyazaki, Jiro Iwase. 1-3 [doi]
- A new digital convergence technique in BSS - A case study of integrated telecom order systemChiao-Yi Wang, Ginn-Feng Liu, Chun-Chen Chang, Chih-Ying Liu. 1-3 [doi]
- Comparisons of power-saving efficiency for QoS traffics in LTE network by burst schedulingYen-Wen Chen, Meng-Hsien Lin, Yung-Ta Su, Addison Y. S. Su. 1-6 [doi]
- Korea Micro Energy Grid TechnologyDaekyo Jung, SungMin Rue, Yoonkee Kim, Byung-Deok Chung. 1-5 [doi]