Abstract is missing.
- Wireless Sensor Networks in industrial environment: Real-life evaluation resultsKonstantin Mikhaylov, Jouni Tervonen, Joni Heikkilä, Janne Kansakoski. 1-7 [doi]
- Video streaming in wireless sensor networks with low-complexity change detection enforcementClaudio Salvadori, Matteo Petracca, Riccardo Pelliccia, Marco Ghibaudi, Paolo Pagano. 8-13 [doi]
- Interconnecting IPv6 wireless sensors with an Android smartphone in the Future InternetPhilipp Schleiss, Nikolaj Torring, Søren Aagaard Mikkelsen, Rune Hylsberg Jacobsen. 14-18 [doi]
- A realization of cognitive pilot channels through wireless billboard channel infrastructure for cognitive radioIvan Ganchev, Zhanlin Ji, Mairtin O'Droma. 19-25 [doi]
- Vehicle-to-infrastructure communication based on 802.11n wireless local area network technologyJanis Jansons, Ernests Petersons, Nikolajs Bogdanovs. 26-31 [doi]
- Should next generation wireless mesh networks consider dynamic channel access?Maryam Amiri Nezhad, Boris Bellalta, Manel Guerrero Zapata, Llorenç Cerdà-Alabern. 32-39 [doi]
- The 802.11g relaying MAC that saves energyMichal Kucharzak, Jacek Kibilda, Marcin Filo, Radoslaw Piesiewicz. 40-45 [doi]
- MTBO - a metric for assessing production failure rates in telecommunications networksYaakov Kogan, Percy Tarapore. 46-51 [doi]
- Investigation of maximum distance reach for spectrally efficient combined WDM systemsVjaceslavs Bobrovs, Aleksejs Udalcovs, Ilja Trifonovs. 52-55 [doi]
- Regulatory framework and technical aspects of broadband access to the Internet in EuropeJanusz Klink, Maria Jolanta Podolska, Tadeus Uhl. 56-63 [doi]
- Comparison of chromatic dispersion compensation techniques for WDM-PON solutionVjaceslavs Bobrovs, Sandis Spolitis, Girts Ivanovs. 64-67 [doi]
- Socio-organism inspired model forming multi-level computational scheme for integrated IoT service architectureYanuarius Teofilus Larosa, Jiann-Liang Chen, Yi-Wei Ma, Sy-Yen Kuo. 68-71 [doi]
- Enabling secure multitenancy in cloud computing: Challenges and approachesTakeshi Takahashi 0001, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo. 72-79 [doi]
- Measures to the supervision system of the regional InternetRytis Rainys, Algimantas Kajackas. 80-83 [doi]
- Using a gateway overlay network to achieve secure and scalable network interconnectionPedro Martinez-Julia, Antonio F. Skarmeta. 84-91 [doi]
- Some results on network mobility stress testingPedro Vale Pinheiro, Fernando Boavida. 92-99 [doi]
- Academic computer network traffic statistical analysisEimantas Garsva, Nerijus Paulauskas, Gediminas Grazulevicius, Lech Gulbinovic. 100-105 [doi]
- A novel fuzzy logic based bufferless routing algorithm for low-power NoCsKonstantinos Tatas, Chrysostomos Chrysostomou. 106-112 [doi]
- Towards a hybrid approach to SoC estimation for a smart Battery Management System (BMS) and battery supported Cyber-Physical Systems (CPS)Ka Lok Man, T. O. Ting, Tomas Krilavicius, Kaiyu Wan, C. Chen, J. Chang, S. H. Poon. 113-116 [doi]
- A self-test and self-repair approach for analog integrated circuitsMouna Karmani, Chiraz Khedhiri, Ka Lok Man, Tomas Krilavicius, Belgacem Hamdi, Amir-Mohammad Rahmani. 117-120 [doi]
- Perceptual voice communications in IEEE802.15.4 networks for the emergency management supportMatteo Petracca, Marco Ghibaudi, Riccardo Pelliccia, Paolo Pagano. 121-126 [doi]
- Understanding mobile phone battery - Human interaction for developing world A perspective of feature phone users in AfricaAmandeep Dhir, Puneet Kaur, Nobert Jere, Ibrahim A. Albidewi. 127-134 [doi]
- Tandem queueing system MAP|M|N|K - N → |M|R|∞ with impatient customers as a model of remote technical supportAlexander N. Dudin, Sergey A. Dudin, Olga S. Dudina. 134-139 [doi]
- Exploring user sociocentric and egocentric behaviors in online and detected social networksAnnalisa Socievole, Salvatore Marano. 140-147 [doi]
- VoIP performance over mobile WiMAX: An urban deployment analysisJoao Henriques, Vitor Bernardo, Paulo Simões, Marília Curado. 148-155 [doi]
- Voice and video streaming in wireless computer networks - evaluation of network delaysDamian Bulira, Krzysztof Walkowiak. 156-161 [doi]
- Probability of handoff to neighbor cells for random waypoint mobility and non-ideal conditionsEnrica Zola, Francisco Barceló-Arroyo. 162-169 [doi]
- An analytical determination of the reading volume for an HF RFID antennaI. Finis, V. Popa, Alexandru Lavric, Adrian I. Petrariu, C. Males. 170-173 [doi]
- Web-based refractive index monitoring system for biological solution, employing LPG-FBG hybrid optical sensorsYutaka Katsuyama, Tsubasa Kanamori, Katsunori Kawanishi, Takahiro Kusuda, Osanori Koyama. 174-181 [doi]
- Cloud controlled intrusion detection and burglary prevention stratagems in home automation systemsAnindya Maiti, S. Sivanesan. 182-186 [doi]
- About M2M standards and their possible extensionsManfred Sneps-Sneppe, Dmitry Namiot. 187-193 [doi]
- Porting smart-M3 platform to MeeGo operation systemKirill Yudenok, Kirill Krinkin, Ekaterina Dashkova, Yevgeni Koucheryavy, Sergey I. Balandin. 194-198 [doi]
- Proximity as a serviceDmitry Namiot, Manfred Sneps-Sneppe. 199-205 [doi]
- Least frequency-delay-product caching replacement for distributed mapping systems in the core-edge network separation architectureJigeon Lee, Zhiliang Wang, Xia Yin, Xingang Shi, Dan Wu, Suogang Li. 206-213 [doi]
- Optimal QoS load balancing mechanism for virtual machines scheduling in eucalyptus cloud computing platformJiann-Liang Chen, Yanuarius Teofilus Larosa, Pei-Jia Yang. 214-221 [doi]
- Optimizing PR-SCTP performance using NR-SACKsMohammad Rajiullah, Anna Brunström. 222-229 [doi]
- SoIP: An all-IP heterogeneous testbed for SIP-based multimedia servicesP. J. Pramod, Mohit Malhotra, Ankith Agarwal, D. S. R. Praveen Varma, B. C. Jinaga, D. K. Jain. 230-238 [doi]
- Time message system for delay tolerant networksVitor Guerra Rolla, Marília Curado. 239-245 [doi]
- A Retrial BMAP/PH/N queueing system with Markov modulated retrialsAlexander N. Dudin, Valentina I. Klimenok. 246-251 [doi]
- Analysis and optimization of routing trust values in a Kademlia-based Distributed Hash Table in a malicious environmentMichael Kohnen. 252-259 [doi]
- Maximum flow trees in overlay multicast: Modeling and optimizationMichal Kucharzak, Krzysztof Walkowiak. 260-267 [doi]
- p-cycle based multicast protection - A new ILP formulationAdam Smutnicki, Krzysztof Walkowiak. 268-274 [doi]