Abstract is missing.
- A novel driver identification method using wearablesChing-Han Yang, Deron Liang, Chin-Chun Chang. 1-5 [doi]
- Performance of LTE uplink for IoT backhaulEsa Piri, Jarno Pinola. 6-11 [doi]
- PRE-Fog: IoT trace based probabilistic resource estimation at FogMohammad Aazam, Marc St-Hilaire, Chung-Horng Lung, Ioannis Lambadaris. 12-17 [doi]
- Feasibility of software-based duty cycling of GPS for trajectory-based servicesXiaohan Li, Fengpeng Yuan, Janne Lindqvist. 18-26 [doi]
- On my way: Optimizing driving routes for navigation applicationsFengpeng Yuan, Xueyuan Song, Janne Lindqvist. 27-31 [doi]
- Declarative, sliding window aggregations for computations at the edgeChristopher Meiklejohn, Seyed H. Haeri, Peter Van Roy. 32-37 [doi]
- User interface design for privacy awareness in eHealth technologiesIsabel Wagner, Ying He, Duska Rosenberg, Helge Janicke. 38-43 [doi]
- An improved joint power harvesting and communication technology for smartphone centric ubiquitous sensing applicationsHong Nie, Ranjana Joshi, Ziyuan Li. 44-48 [doi]
- Modeling the long term fading behaviour in residential wireless sensor networksFalk-Moritz Schaefer, Rüdiger Kays. 49-53 [doi]
- PAT: A power-aware decision tree algorithm for mobile activity recognitionLuis G. Jaimes, Yueng De La Hoz, Christopher Eggert, Idalides J. Vergara-Laurens. 54-59 [doi]
- LiteLab: Efficient large-scale network experimentsLiang Wang, Arjuna Sathiaseelan, Jon Crowcroft, Jussi Kangasharju. 60-66 [doi]
- A packet rewriting core for Information Centric NetworkingChristopher Scherb, Manolis Sifalakis, Christian F. Tschudin. 67-72 [doi]
- Content-Centric Networking in the Internet of ThingsOtto Waltari, Jussi Kangasharju. 73-78 [doi]
- Scalable mobility management for content sources in Named Data NetworkingShuai Gao, Hongke Zhang. 79-84 [doi]
- Scalable topology-based flow entry management in data centerChi-Hsiang Hung, Chao-Wei Huang, Li-Chun Wang, Chien Chen. 85-90 [doi]
- Feasible cooperative communication with IEEE 802.11a based devices for multi-hop networksKatsuhiro Naito, Kazuo Mori, Hideo Kobayashi. 91-98 [doi]
- Just-in-time reconnaissance and assistance for video game streams and playersBenjamin Falchuk, Euthimios Panagos, K. C. Lee, Shoshana Loeb, Z. Yao. 99-102 [doi]
- Energy saving approaches for video streaming on smartphone based on QoE modelingLuis Guillermo Martinez Ballesteros, Selim Ickin, Markus Fiedler, Jan Markendahl, Konrad Tollmar, Katarzyna Wac. 103-106 [doi]
- Augmented Reality adaptive web contentRamanujam R. Srinivasa, Uthra P. Veluchamy, Joy Bose. 107-110 [doi]
- Distributed anonymous computation of social distanceEdoardo Biagioni. 111-114 [doi]
- Product rating prediction using trust relationships in social networksAnahita Davoudi, Mainak Chatterjee. 115-118 [doi]
- Design and implementation of interoperable IoT healthcare system based on international standardsShu-yuan Ge, Seung-Man Chun, Hyun-Su Kim, Jong-Tae Park. 119-124 [doi]
- Closer destination selection scheme for mobile sink and charger enabled WRSNsYuya Tamura, Kentaroh Toyoda, Iwao Sasase. 125-130 [doi]
- A floor plan creation tool utilizing a smartphone with an ultrasonic sensor gadgetYukitoshi Kashimoto, Yutaka Arakawa, Keiichi Yasumoto. 131-136 [doi]
- An ontological ubiquitous city information platform provided with Cyber-Physical-Social-SystemsAlfio Costanzo, Alberto Faro, Daniela Giordano, Concetto Spampinato. 137-144 [doi]
- Energy-on-Demand system based on combinatorial optimization of appliance operation modesNaoyuki Morimoto. 145-150 [doi]
- Distributed interference management in medical wireless sensor networksHassine Moungla, Kahina Haddadi, Saadi Boudjit. 151-155 [doi]
- Low-complexity LTE-D2D synchronization algorithmsAshok Kumar Reddy Chavva, Sripada K. 156-163 [doi]
- Hybrid scheduling of component carriers for Small Cells in unlicensed spectrumSriram N. Kizhakkemadam, Vyankatesh Porwal, Sai C. Mantripragada, Nagacharan Udupi, Bala K. Chintapenta. 164-170 [doi]
- Downlink resource reuse for Device-to-Device communication underlaying cellular networks using a generalized Knapsack frameworkFoad Hajiaghajani, Mehdi Rasti. 171-176 [doi]
- Fast timer-based maximum function computation over noisy multiple access channelsJiajia Huang, Boon-Hee Soong. 177-182 [doi]
- Reduced complexity K-best sphere decoding algorithms for ill-conditioned MIMO channelsIbrahim Al-Nahhal, Masoud Alghoniemy, Osamu Muta, Adel B. Abd El-Rahman. 183-187 [doi]
- A system-level assessment of Uplink CoMP in LTE-A Heterogeneous NetworksMohamad Tavakoli Sanij, Claudio Casetti. 188-193 [doi]
- Performance evaluation of AQM techniques with heterogeneous trafficAndrea Marin, Sabina Rossi, Armir Bujari, Claudio E. Palazzi. 194-199 [doi]
- Regret minimization-based robust game theoretic solution for dynamic spectrum accessYalin Evren Sagduyu, Yi Shi, Allen B. MacKenzie, Y. Thomas Hou. 200-205 [doi]
- Performance analysis of LTE-WiFi very tight couplingYounes Khadraoui, Xavier Lagrange, Annie Gravey. 206-211 [doi]
- Robust routing and link scheduling in cognitive radio networks under channel uncertainty and demand fluctuationsMejdi Kaddour. 212-217 [doi]
- System for fast and seamless communication among user devicesDipin Kollencheri Puthenveettil, Joy Bose. 218-223 [doi]
- A Priority-Weighted Round Robin scheduling strategy for a WBAN based healthcare monitoring systemAudace Manirabona, Saadi Boudjit, Lamia Chaari Fourati. 224-229 [doi]
- A smartphone-based driver fatigue detection using fusion of multiple real-time facial featuresYantao Qiao, Kai Zeng, Lina Xu, Xiaoyu Yin. 230-235 [doi]
- Developing WebRTC-based team apps with a cross-platform mobile frameworkKundan Singh, John F. Buford. 236-242 [doi]
- Side-channel attacks on mobile and wearable systemsAni Nahapetian. 243-247 [doi]
- BeC3: A Crowd-centric composition testbed for the Internet of ThingsZahra Movahedi, Sylvain Cherrier, Yacine Ghamri-Doudane. 248-249 [doi]
- TSA, an SDN architecture including end terminalsCarlos Giraldo Rodriguez, Jorge Fontenla González, Carlos Perez-Garrido, Saber Mhiri, Felipe J. Gil-Castiñeira, Francisco Javier González Castaño. 250-251 [doi]
- Demonstration of a joint power harvesting and communication technology for smartphone centric ubiquitous sensing applicationsHong Nie, Ranjana Joshi, Ziyuan Li. 252-253 [doi]
- Quality-driven mobility management with a network information serviceEsa Piri, Jarmo Prokkola, Mikko Valta. 254-255 [doi]
- Highly efficient environment aware wireless sensor networkTakeo Fujii, Shunsuke Takegi, Taiki Nakayama, Mai Ohta, Osamu Takyu. 256-257 [doi]
- Demonstration of hybrid overlay/underlay waveform generator with spectrally compliant cognitive capability via SD-SMSE frameworkPaul Rose, Ruolin Zhou, Yang Qu, Vasu Chakravarthy, Zhiqiang Wu 0001, Zhiping Zhang. 258-259 [doi]
- Demo: Novel communication scheme for spotty networks and macro network cooperationKenji Yokota, Atsushi Tagami, Katsunori Yamaoka. 260-261 [doi]
- Managing home routers from the cloud using Software Defined NetworkingHassan Habibi Gharakheili, Luke Exton, Vijay Sivaraman. 262-263 [doi]
- Panacea's Cloud: Augmented reality for mass casualty disaster incident triage and co-ordinationJohn Gillis, Prasad Calyam, Olivia Apperson, Salman Ahmad. 264-265 [doi]
- Cost effective digital signage system using low cost information deviceKazuhiro Mishima, Takeshi Sakurada, Yoichi Hagiwara. 266-267 [doi]
- CacheConnect: On-device proxy and web cache for performance increasesTroy A. Johnson, Patrick Seeling. 268-269 [doi]
- GeoSentiment: A tool for analyzing geographically distributed event-related sentimentsCarmelo Pino, Isaak Kavasidis, Concetto Spampinato. 270-271 [doi]
- Massive multiple access wireless LAN using ultra-wideband waveguide floor tilesAkihito Noda, Akimasa Okada, Yudai Fukui, Yuichi Masuda, Hiroyuki Shinoda. 272-273 [doi]
- Implementing Cyber Physical social Systems for smart cities: A semantic web perspectiveAlfio Costanzo, Alberto Faro, Daniela Giordano, Concetto Spampinato. 274-275 [doi]
- Innovative DTLS/TLS security modules embedded in SIM cards for IoT trusted and secure servicesPascal Urien. 276-277 [doi]
- Edu-firewall device: An advanced firewall hardware device for information security educationZouheir Trabelsi, Vasiqullah Molvizadah. 278-279 [doi]
- Demo: Implementation of unconscious bus location sensing system with smartphone devices and beacon devicesKatsuyuki Tanaka, Katsuhiro Naito. 280-281 [doi]
- Demonstration of KAPUER: A privacy policy manager on AndroidArnaud Oglaza, Romain Laborde, Pascale Zaraté. 282-283 [doi]
- An energy-aware end-to-end Crowdsensing platform: SensarenaRim Ben Messaoud, Zeineb Rejiba, Yacine Ghamri-Doudane. 284-285 [doi]
- The Sensorian IoT platformQusay H. Mahmoud, Dhimiter Qendri. 286-287 [doi]
- Indoor air quality monitoring though software defined infrastructuresPetros Spachos, Jieyu Lin, Hadi Bannazadeh, Alberto Leon-Garcia. 288-289 [doi]
- Efficient Sink Location Service for prolonging the network lifetime in wireless sensor networksJeongcheol Lee, Jae-Young Jang, Euisin Lee, Sang-Ha Kim, Mario Gerla. 290-291 [doi]
- Investigation and design of rectangular waveguide using composite right / left handed transmission line (CRLH-TL) structure for microwave and communication consumer applicationsYasser M. Madany, Hassan M. Elkamchouchi, Bishoy I. Halim. 292-294 [doi]
- Optimum number of aggregators based on power consumption, cost, and network lifetime in advanced metering infrastructure architecture for Smart Grid Internet of ThingsAlireza Ghasempour. 295-296 [doi]
- Resource saving: Which resource sharing strategy to protect primary shortest paths?Mohand Yazid Saidi, Bernard Cousin. 297-298 [doi]
- Two level evolutionary algorithm for Capacitated Network Design ProblemMeriem Khelifi, Saadi Boudjit, Mohand Yazid Saidi. 299-300 [doi]
- Train ticket gate system employing optical wireless communicationsKhemry Khourn, Jiang Liu 0005, Shigeru Shimamoto. 301-302 [doi]
- Seamless Push service with flow control for embedded devicesSuresh Kumar Gudla, Sandeep Krishna Panchamukhi, Joy Bose, Girija Saride, Abhishek Maheshwari. 303-304 [doi]
- An overview of mobile device network activities: Characteristics of heterogeneous network interfacesSean Mead, Nagasaiamithkumar Veeramachaneni, Patrick Seeling. 305-306 [doi]
- Negotiator based Quality of Experience framework for videoLina Xu, Yantao Qiao. 307-308 [doi]
- Energy-efficient high-speed search engine using a multi-dimensional TCAM architecture with parallel pipelined subdivided structureMasami Nawa, Kenzo Okuda, Shingo Ata, Yasuto Kuroda, Yuji Yano, Hisashi Iwamoto, Kazunari Inoue, Ikuo Oka. 309-314 [doi]
- Difficulties to enforce your privacy preferences on Android? Kapuer will help youArnaud Oglaza, Romain Laborde, Pascale Zaraté, Abdelmalek Benzekri, François Barrère. 315-316 [doi]
- SyncDS: A digital safe based file synchronization approachMayssa Jemel, Mounira Msahli, Ahmed Serhrouchni. 317-318 [doi]
- Distributed internal anomaly detection system for Internet-of-ThingsNanda Kumar Thanigaivelan, Ethiopia Nigussie, Rajeev Kumar Kanth, Seppo Virtanen, Jouni Isoaho. 319-320 [doi]
- A genetic algorithm-based solution for efficient in-network sensor data annotation in virtualized Wireless Sensor NetworksImran Khan, Jagruti Sahoo, Son N. Han, Roch H. Glitho, Noël Crespi. 321-322 [doi]
- An IoT-based scheme for real time indoor personal exposure assessmentHoussem Eddine Fathallah, Vincent Lecuire, Eric Rondeau, Stephane Le Calve. 323-324 [doi]
- Ergodic capacity in D2D underlay networks with varying user distributionChang Liu, Balasubramaniam Natarajan. 325-329 [doi]
- A comparative study of channel switching latency for conventional and SDN-based routing in multi-hop multi-radio Wireless Mesh NetworksSeyed Dawood Sajjadi Torshizi, Maryam Tanha, Jianping Pan. 330-334 [doi]
- Enhancement of HCCA utilizing capture effect to support high QoS and DCF friendlinessMasanori Kanda, Jiro Katto, Tutomu Murase. 335-338 [doi]
- Single RF based MIMO system using load-modulationChangyoung An, Heung-Gyoon Ryu, Seung Hwan Lee. 339-343 [doi]
- An opportunistic random linear network coding scheme in wireless networksSungjin Park, Howon Lee, In-Ho Lee, Dong-Ho Cho. 344-347 [doi]
- Boosting election prediction accuracy by crowd wisdom on social forumsMing-Hung Wang, Chin-Laung Lei. 348-353 [doi]
- Assessment and visualization of geographically distributed event-related sentiments by mining social networks and newsCarmelo Pino, Isaak Kavasidis, Concetto Spampinato. 354-358 [doi]
- A Bloom-Filter-based socially aware scheme for content replication in mobile ad hoc networksGhada Moualla, Pantelis A. Frangoudis, Yassine Hadjadj Aoul, Soraya Ait Chellouche. 359-365 [doi]
- Discovering key moments in social media streamsCody Buntain, Jimmy Lin, Jennifer Golbeck. 366-374 [doi]
- Improving user experience in low-latency adaptive streaming by stabilizing buffer dynamicsYongtao Shuai, Thorsten Herfet. 375-380 [doi]
- Modeling Cloud gaming experience for Massively Multiplayer Online GamesEya Dhib, Khaled Boussetta, Nawel Zangar, Nabil Tabbane. 381-386 [doi]
- Assessing the efficacy of a diegetic game interface with Oculus RiftPaola Salomoni, Catia Prandi, Marco Roccetti, Lorenzo Casanova, Luca Marchetti. 387-392 [doi]
- Evaluation of scalability and communication in MMOGsSarmad A. Abdulazeez, Abdennour El Rhalibi, Dhiya Al-Jumeily. 393-398 [doi]
- Towards enabling hyper-responsive mobile apps through network edge assistanceMiguel Baguena, George Samaras, Andreas Pamboris, Mihail L. Sichitiu, Peter R. Pietzuch, Pietro Manzoni. 399-404 [doi]
- Power scheduling in privacy enhanced microgrid networks with renewables and storageArif Önder Isikman, Cankal Altun, Suleyman Uludag, Bülent Tavli. 405-410 [doi]
- State-aware allocation of reliable Virtual Software Defined Networks based on bandwidth and energyRafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira, Eduardo Cerqueira, Mario Gerla. 411-416 [doi]
- Cache protection method based on prefix hierarchy for content-oriented networkTakashi Kamimoto, Kenta Mori, Sayaka Umeda, Yuri Ohata, Hiroshi Shigeno. 417-422 [doi]
- Bluetooth Low Energy as enabling technology for Be-In/Be-Out systemsWolfgang Narzt, Stefan Mayerhofer, Otto Weichselbaum, Stefan Haselbock, Niklas Hofler. 423-428 [doi]
- On the effectiveness of video prefetching relying on recommender systems for mobile devicesStefan Wilk, Dominik Schreiber, Denny Stohr, Wolfgang Effelsberg. 429-434 [doi]
- FlowMine: Android app analysis via data flowLovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti. 435-441 [doi]
- AirDraw: Leveraging smart watch motion sensors for mobile human computer interactionsDanial Moazen, Seyed A. Sajjadi, Ani Nahapetian. 442-446 [doi]
- Hierarchy-based monitoring of Vehicular Delay-Tolerant NetworksEwerton Monteiro Salvador, Daniel F. Macedo, José Marcos S. Nogueira, Virgil Del Duca Almeida, Lisandro Zambenedetti Granville. 447-452 [doi]
- Channel estimation in an over-water air-ground channel using low complexity OFDM-OQAM modulationsHosseinali Jamal, David W. Matolak. 453-458 [doi]
- D2CyberSoft: A design automation tool for soft error analysis of Dependable CybercarsArslan Munir, Farinaz Koushanfar. 459-466 [doi]
- A novel On-Board Unit to accelerate the penetration of ITS servicesSergio Martínez Tornell, Subhadeep Patra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni. 467-472 [doi]
- An efficient spreading Epidemic Routing for Delay-Tolerant NetworkTeerapong Choksatid, Worrawat Narongkhachavana, Sumet Prabhavat. 473-476 [doi]
- AKadeMesh: Software-defined overlay adaptation for the management of IEEE 802.11s networksMichael Rethfeldt, Arne Wall, Peter Danielis, Bjorn Konieczek, Dirk Timmermann. 477-482 [doi]
- A2: Agnostic Aggregation in wireless sensor networksJin Cui, Omar Lalami, Jialiang Lu, Fabrice Valois. 483-486 [doi]
- User association for load balancing with uneven user distribution in IEEE 802.11ax networksFengming Cao, Zhenzhe Zhong, Zhong Fan, Mahesh Sooriyabandara, Simon Armour, Ayalvadi Ganesh. 487-490 [doi]
- A new network selection algorithm for group calls over heterogeneous wireless networks with dynamic multi-criteriaEnoruwa Obayiuwana, Olabisi E. Falowo. 491-494 [doi]
- Handling sink group mobility in wireless sensor networksYongbin Yim, Jinhyuk Yim, Euisin Lee, Soochang Park, Sang-Ha Kim, Mario Gerla. 495-498 [doi]
- Joint impacts of atmospheric interferences on optical wireless communicationXian Liu. 499-504 [doi]
- Indoor positioning with OFDM Visible Light CommunicationsMohammadreza Aminikashani, Wenjun Gu, Mohsen Kavehrad. 505-510 [doi]
- A study on correlation properties of shadow fading of millimeter wave frequency spectrumSangkyu Baek, Youngbin Chang, June Hwang, Sooyoung Hur, Byungchuhl Kim. 511-516 [doi]
- Performance analysis of orbital angular momentum(OAM) transmission using dual polarization antenna based uniform circular array architectureLakju Sung, Daehee Park, Dong-Ho Cho. 517-522 [doi]
- Detecting the impact of human mega-events on spectrum usageAbdallah S. Abdallah, Allen B. MacKenzie, Vuk Marojevic, Juha Kalliovaara, Roger B. Bacchus, Ali Riaz, Dennis Roberson, Juhani Hallio, Reijo Ekman. 523-529 [doi]
- Improving the tunnel management performance of secure VPLS architectures with SDNMadhusanka Liyanage, Mika Ylianttila, Andrei Gurtov. 530-536 [doi]
- NRTS: Content name-based real-time streamingKazuhisa Matsuzono, Hitoshi Asaeda. 537-543 [doi]
- Towards energy-autonomous wake-up receiver using Visible Light CommunicationJoyce Sariol Ramos, Ilker Demirkol, Josep Paradells, Daniel Vossing, Karim M. Gad, Martin Kasemann. 544-549 [doi]
- A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networksSamet Tonyali, Kemal Akkaya, Nico Saputro, A. Selcuk Uluagac. 550-555 [doi]
- Adaptive 802.15.4 backoff procedure to survive coexistence with 802.11 in extreme conditionsEugène David Ngangue Ndih, Soumaya Cherkaoui. 556-561 [doi]
- Coexistence of IEEE 802.11n and licensed-assisted access devices using listen-before-talk techniquesClaudio Casetti. 562-567 [doi]
- An integrative methodology to enable compliance-aware data services accelerating consumer regulatory governance paradigms of an enterpriseVikas S. Shah. 568-575 [doi]
- Design and evaluation of adaptive switched digital video systemAdil Alsuhaim, Zhaoyu Jing, James Martin. 576-581 [doi]
- Performance evaluation of low complexity double-sided massive MIMO transceiversStefan Schwarz, Markus Rupp. 582-588 [doi]
- Adaptive Listen-Before-Talk (LBT) scheme for LTE and Wi-Fi systems coexisting in unlicensed bandChung K. Kim, Chan S. Yang, Chung G. Kang. 589-594 [doi]
- Performance analysis of in-band full duplex collision and interference detection in dense networksTom Vermeulen, Fernando Rosas, Marian Verhelst, Sofie Pollin. 595-601 [doi]
- Realtime throughput optimization protocol in IEEE802.11 networksSamir Kant Sahu, Hun-je Yeon. 602-607 [doi]
- Proximity-aware offloading of person-to-person communications in LTE networksChristian Quadri, Sabrina Gaito, Gian Paolo Rossi 0001. 608-613 [doi]
- Cost factor analysis of QoS in LTE/EPC mobile networksWilliam Diego, Isabelle Hamchaoui, Xavier Lagrange. 614-619 [doi]
- CONET: Controlled data packets propagation in vehicular Named Data NetworksSyed Hassan Ahmed, Safdar Hussain Bouk, Muhammad Azfar Yaqub, Dongkyun Kim, Mario Gerla. 620-625 [doi]
- Generalized software defined network platform for Radio Access NetworksAravinthan Gopalasingham, Laurent Roullet, Nessrine Trabelsi, Chung Shue Chen, Abdelkrim Hebbar, Érick Bizouarn. 626-629 [doi]
- Multi-Attribute Caching: Towards efficient cache management in Content-Centric NetworksSheneela Naz, Rao Naveed Bin Rais, Amir Qayyum. 630-633 [doi]
- Investigation of double way-quadrature phase shift key (DW-QPSK) for digital communication consumer applicationsYasser M. Madany. 634-637 [doi]
- Redundancy Control using software defined networkingDouglas Comer, Rajas H. Karandikar, Adib Rastegarnia. 638-641 [doi]
- Inferring network infrastructural behaviour during disastersZafar Gilani, Arjuna Sathiaseelan, Jon Crowcroft, Veljko Pejovic. 642-645 [doi]
- Fair and Delay Adaptive Scheduler (FDAS) preliminary modeling and optimizationAbdelwahab M. Elnaka, Qusay H. Mahmoud, Xining Li. 646-649 [doi]
- Control method to guarantee throughput based on media access control method SP-MAC over WLANYuuki Yamamoto, Ryo Hamamoto, Hiroyasu Obata, Chisa Takano, Kenji Ishida. 650-655 [doi]
- Robust cooperative beamforming against steering vector uncertainty in cognitive radio networksMd Monzurul Alam, Sudeep Bhattarai, Liang Hong, Sachin Shetty. 656-661 [doi]
- Secure beamforming and self-energy recycling with full-duplex wireless-powered relayHongjun Kim, Jinkyu Kang, Seongah Jeong, Kwang-Eog Lee, Joonhyuk Kang. 662-667 [doi]
- Improving the energy efficiency of wireless Network on Chip architectures through online selective buffers and receivers shutdownVincenzo Catania, Andrea Mineo, Salvatore Monteleone, Maurizio Palesi, Davide Patti. 668-673 [doi]
- TCast: A transitional region aware broadcast protocol in variable wireless link qualitiesChunchao Liang, Sunho Lim, Manki Min, Wei Wang. 674-679 [doi]
- Real-time communication in low-power mobile wireless networksBehnam Dezfouli, Marjan Radi, Octav Chipara. 680-686 [doi]
- Q-RoSA: QoE-aware routing for SVC video streaming over ad-hoc networksPham Tran Anh Quang, Kandaraj Piamrat, Kamal Deep Singh, César Viho. 687-692 [doi]
- Service differentiation strategy based on MACB factor for M2M Communications in LTE-A NetworksNawel Zangar, Sami Gharbi, Marwen Abdennebi. 693-698 [doi]
- Dynamic Channel Switching for high-definition peer-to-peer 802.11-based video streamingErin Sullivan, Taylor Johnson, Ben Lee. 699-704 [doi]
- Broker and federation based Cloud networking architecture for IaaS and NaaS QoS guaranteeMohamad Hamze, Nader Mbarek, Olivier Togni. 705-710 [doi]
- A content-based traffic engineering policy for Information-Centric NetworksSerhat Nazim Avci, Cédric Westphal. 711-719 [doi]
- K-anonymous location-based fine-grained access control for mobile cloudYaser Baseri, Abdelhakim Hafid, Soumaya Cherkaoui. 720-725 [doi]
- On mobile traffic distribution over cellular backhauling network nodesSandesh Uppoor, Cezary Ziemlicki, Stefano Secci, Zbigniew Smoreda. 726-731 [doi]
- QoS-aware resource allocation for mobile media services in cloud environmentAmir Karamoozian, Abdelhakim Hafid, Mustapha Boushaba, Mahboubeh Afzali. 732-737 [doi]
- On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacksJörg Daubert, Tim Grube, Max Mühlhäuser, Mathias Fischer. 738-744 [doi]
- SMOV: Array Bound-Check and access in a single instructionAntonio Maia, Leandro Melo, Fernando Magno Quintão Pereira, Omar P. Vilela Neto, Leonardo B. Oliveira. 745-751 [doi]
- Efficient tuning methodologies for a network payload anomaly inspection schemeWilliam Edmonds, Sun-il Kim, Erik MacIntyre, Chockalingam Karuppanchetty, Nnamdi Nwanze. 752-758 [doi]
- What does the memory say? Towards the most indicative features for efficient malware detectionJelena Milosevic, Alberto Ferrante, Miroslaw Malek. 759-764 [doi]
- Simple and compact flow fingerprinting robust to transit through low-latency anonymous networksYang Xue, Eugene Y. Vasserman. 765-773 [doi]
- P2P-based Ultra High Definition multi-view video distribution system with best-effort and bandwidth guaranteed networksYusuke Hirota, Kazuya Takahashi, Hideki Tode, Koso Murakami. 774-775 [doi]
- A probabilistic convergecast protocol for vehicle to infrastructure communication in ITS architectureArslane Hamza Cherif, Khaled Boussetta, Gladys Diaz, Fedoua Didi. 776-777 [doi]
- Piece distribution scheduling for streaming content delivery with pseudo-multicast over wireless LANAkihiro Kanayama, Satoshi Ohzahata, Toshihiko Kato. 778-779 [doi]
- AGC and DCOC algorithms for sliding IF non-coherent ULP wireless receiverAshutosh Deepak Gore, Jinesh P. Nair, Kiran Bynam, Young-Jun Hong, Changsoon Park. 780-784 [doi]
- High performance phase rotated FD-MC-CDMA to exploit full diversityZhiping Zhang, Lin Zhang, Yang Qu, John Ellinger, Zhiqiang Wu 0001. 785-790 [doi]
- Relay-assisted RF harvesting sensor networksDeepak Mishra, Swades De. 791-792 [doi]
- Opportunistic spectrum access enabled heterogeneous wireless networking for smart gridChandra Bajracharya, Danda B. Rawat. 793-797 [doi]
- PLR-delay aware downlink scheduler (PDADS): A novel scheme based on packet prediction mechanismSaloua Hendaoui, Nawel Zangar, Sami Tabbane. 798-799 [doi]
- Assisted network discovery for next generation wireless networksAndrés Arcia-Moret, Arjuna Sathiaseelan, Antonio Araujo, Jose Aguilar, Laudin Molina. 800-801 [doi]
- Design and performance analysis of a GFDM-DCSK communication systemShuying Li, Yaqin Zhao, Liang He, Zhilu Wu, Yuanyuan Li. 802-803 [doi]
- Efficient power allocation in LTE-A based on ordering mechanismBilal Al-Doori, Xian Liu. 804-805 [doi]
- Work in progress: A novel range-queryable distributed data structureCharles Noyes. 806-807 [doi]
- M-parking: Vehicle parking guidance system using hierarchical Wireless Sensor NetworksSarang Deshpande. 808-811 [doi]
- A secure IoT architecture for Smart CitiesShaibal Chakrabarty, Daniel W. Engels. 812-813 [doi]
- Hybrid location tracking in BLE beacon systems with in-network coordinationArzad A. Kherani, Suleep K. Bhogi, Bongjhin Shin. 814-815 [doi]
- Rate adaptation for terahertz communicationsFarnoosh Moshir, Suresh Singh. 816-819 [doi]
- Cooperative spectrum sensing in non-time-slotted full duplex cognitive radio networksSukjong Ha, Wonju Lee, Jinkyu Kang, Joonhyuk Kang. 820-823 [doi]
- Effect of CSI quantization on the average rate in MU-MIMO WLANsSanjeeb Shrestha, Gengfa Fang, Eryk Dutkiewicz, Xiaojing Huang. 824-828 [doi]
- Decentralized channel assignment and power allocation in a full-duplex Cognitive radio networkChamara Devanarayana, Attahiru S. Alfa. 829-832 [doi]
- A low complexity algorithm for sampling clock-offset compensation in low power WPAN receiversSujit Jos, Kiran Bynam, Chandrashekhar Thejaswi P. S, Ashutosh Deepak Gore, Young-Jun Hong, Changsoon Park, Jinesh P. Nair, Manoj Choudhary. 833-836 [doi]
- A new security games based reaction algorithm against DOS attacks in VANETsMohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi. 837-840 [doi]
- Average secrecy capacity of the Weibull fading channelXian Liu. 841-844 [doi]
- A novel storage covert channel on wearable devices using status bar notificationsKyle Denney, A. Selcuk Uluagac, Kemal Akkaya, Shekhar Bhansali. 845-848 [doi]
- Analyzing the producer-consumer collusion attack in Content-Centric NetworksAndre Nasserala, Igor Monteiro Moraesy. 849-852 [doi]
- Using Stackelberg game to enhance node protection in WSNsMohamed S. Abdalzaher, Karim Seddik, Osamu Muta, Adel Abdelrahman. 853-856 [doi]
- A pairing algorithm of range information between multiple IR-UWB radar sensorsJeong Woo Choi, Sung Ho Cho. 857-861 [doi]
- Indoor localization using FM and DVB-T signalsRoberto Carvalho, Shan-Ho Yang, Yao Hua Ho, Ling-Jyh Chen. 862-867 [doi]
- Human indoor localization based on ceiling mounted PIR sensor nodesXiaomu Luo, Tong Liu, Baihua Shen, Qinqun, Liwen Gao, Xiaoyan Luo. 868-874 [doi]
- Enriched Training Database for improving the WiFi RSSI-based indoor fingerprinting performanceFilip Lemic, Vlado Handziski, Giuseppe Caso, Luca De Nardis, Adam Wolisz. 875-881 [doi]
- Design choices for the IoT in Information-Centric NetworksAnders Lindgren, Fehmi Ben Abdesslem, Bengt Ahlgren, Olov Schelén, Adeel Mohammad Malik. 882-888 [doi]
- An analysis and improvement of congestion control in the CoAP Internet-of-Things protocolRahul Bhalerao, Sridhar Srinivasa Subramanian, Joseph Pasquale. 889-894 [doi]
- Adaptive duty cycling based multi-hop PSMP for internet of multimedia thingsBilal Afzal, Sheeraz A. Alvi, Ghalib A. Shah. 895-900 [doi]
- Applying nonlinear optimal control strategy for the access management of MTC devicesMeriam Bouzouita, Yassine Hadjadj Aoul, Nawel Zangar, Gerardo Rubino, Sami Tabbane. 901-906 [doi]
- QoE-aware inter-stream synchronization in open N-Screens cloudMu Mu, Steven Simpson, Hans Stokking, Nicholas J. P. Race. 907-915 [doi]
- Simulation based comparative performance analysis of QoS traffic scheduling using fair and delay adaptive scheduler (FDAS) versus WFQ and EDFAbdelwahab M. Elnaka, Qusay H. Mahmoud, Xining Li. 916-923 [doi]
- Visual User Experience Difference: Image compression impacts on the quality of experience in augmented binocular visionPatrick Seeling. 924-929 [doi]
- Impact of technical and Content Quality on Overall Experience of OTT videoWeiwei Li, Petros Spachos, Mark H. Chignell, Alberto Leon-Garcia, Leon Zucherman, Jie Jiang. 930-935 [doi]
- ROAR: An architecture for Real-Time Opportunistic Spectrum Access in Cloud-assisted Cognitive Radio NetworksDanda B. Rawat. 936-941 [doi]
- Secure proximity-based identity pairing using an untrusted signalling serviceTim Panton, David Llewellyn-Jones, Nathan Shone, Mahmoud Hashem Eiza. 942-947 [doi]
- A survey of network function placementXin Li, Chen Qian. 948-953 [doi]
- A Bloom Filter approach for scalable CCN-based discovery of missing physical objectsCédric Westphal, Bertrand Mathieu, Syed Obaid Amin. 954-959 [doi]
- Finding the optimal number of aggregators in machine-to-machine advanced metering infrastructure architecture of smart grid based on cost, delay, and energy consumptionAlireza Ghasempour, Jacob H. Gunther. 960-963 [doi]
- On the performance of wireless source-location using TDOA measurements under poor geometryTong Zhang, Chun Zhang, Sheng Zhang, Zhihua Wang. 964-967 [doi]
- LIPS: Learning Based Indoor Positioning System using mobile phone-based sensorsDavid Mascharka, Eric D. Manley. 968-971 [doi]
- Mobile cyber physical systems for health care: Functions, ambient ontology and e-diagnosticsAlfio Costanzo, Alberto Faro, Daniela Giordano, Carmelo Pino. 972-975 [doi]
- Intelligent Dashboard for augmented reality based incident command response co-ordinationMark Vassell, Olivia Apperson, Prasad Calyam, John Gillis, Salman Ahmad. 976-979 [doi]
- Dynamic cache optimization for DASH clients in Content Delivery NetworksAntti Heikkinen, Tiia Ojanperä, Janne Vehkaperä. 980-983 [doi]
- A low complex spread spectrum scheme for ZigBee based smart home networksChatura Seneviratne, Henry Leung. 984-987 [doi]
- AC3N: Anonymous communication in Content-Centric NetworkingGene Tsudik, Ersin Uzun, Christopher A. Wood. 988-991 [doi]
- A new group Diffie-Hellman key generation proposal for secure VANET communicationsMohamed Nidhal Mejri, Nadjib Achir, Mohamed Hamdi. 992-995 [doi]
- Farthest destination selection and Shortest Path Connection strategy for efficient multicasting in Vehicular Ad Hoc NetworksJeongcheol Lee, Hoewon Kim, Euisin Lee, Sang-Ha Kim, Mario Gerla. 996-999 [doi]
- Highway and rate prediction downlink scheduler (HRPDS) for LTE-A real time applicationsSaloua Hendaoui, Nawel Zangar, Sami Tabbane. 1000-1005 [doi]
- A control theoretic strategy for intelligent interface selection in heterogeneous network environmentsYue Li, Yassine Hadjadj Aoul, Philippe Bertin, Gerardo Rubino. 1006-1011 [doi]
- E-NC: PSO based enforced network coding in vehicular networksPratap Kumar Sahu, Abdelhakim Hafid, Jagruti Sahoo, Soumaya Cherkaoui. 1012-1017 [doi]
- Heuristic procedure to optimize SFN with BDM-aided local service insertionHaining Duan, Kewu Peng, Yu Zhang, Jian Song. 1018-1023 [doi]
- Machine learning-based spectrum decision algorithms for Wireless Sensor NetworksVinicius F. e Silva, Daniel F. Macedo, Jesse L. Leoni. 1024-1029 [doi]
- A Non Destructive Interference based receiver-initiated MAC protocol for wireless sensor networksYe Liu, Qi Chen, Hao Liu, Chen Hu, Qing Yang. 1030-1035 [doi]
- OA-DVFA: A Distributed Virtual Forces-based Algorithm to monitor an area with unknown obstaclesInes Khoufi, Pascale Minet, Anis Laouiti. 1036-1041 [doi]
- Dimensioning virtualized wireless access networks from a common pool of resourcesMohammad J. Abdel-Rahman, Kleber V. Cardoso, Allen B. MacKenzie, Luiz A. DaSilva. 1042-1047 [doi]
- Resisting blackhole attacks on MANETsMohamed A. Abdelshafy, Peter J. B. King. 1048-1053 [doi]
- Choose wisely: Topology control in Energy-Harvesting wireless sensor networksXin Wang, Vijay S. Rao, R. Venkatesha Prasad, Ignas G. Niemegeers. 1054-1059 [doi]
- A first-hop traffic analysis attack against a femtocellSaman Feghhi, Douglas J. Leith. 1060-1065 [doi]
- Design and performance analysis of secure and dependable cybercars: A steer-by-wire case studyArslan Munir, Farinaz Koushanfar. 1066-1073 [doi]
- The robustness of Microsoft Windows and Apple Mac OS X against ARP cache poisoning based network attacksZouheir Trabelsi. 1074-1079 [doi]
- Hey, I know you are moving: producer movement status privacy in information-centric networkingQingji Zheng, Qi Li, Aytac Azgin, Syed Obaid Amin. 1080-1085 [doi]
- Smartphone reconnaissance: Operating system identificationNicholas Ruffing, Ye Zhu, Rudy Libertini, Yong Guan, Riccardo Bettati. 1086-1091 [doi]
- Exploiting network awareness to enhance DASH over wirelessFrancesco Bronzino, Dragoslav Stojadinovic, Cédric Westphal, Dipankar Raychaudhuri. 1092-1100 [doi]
- A Wi-Fi P2P communication platform between wireless LAN memory cards: Prototype implementation and performance evaluationMasato Yasuda, Prakash Chaki, Gen Motoyoshi. 1101-1106 [doi]
- Leaky streams: Identifying variable bitrate DASH videos streamed over encrypted 802.11n connectionsAndrew Reed, Benjamin Klimkowski. 1107-1112 [doi]
- Approach to optimal WRR weight assignment method in delay-limited environmentSho Noda, Katsunori Yamaoka. 1113-1118 [doi]
- Personalizing Pedestrian Accessible way-finding with mPASSSilvia Mirri, Catia Prandi, Paola Salomoni. 1119-1124 [doi]
- Portable 3D visual sensor based indoor localization on mobile deviceXiang He, Daniel N. Aloi, Jia Li. 1125-1128 [doi]
- Employing semantic analysis for enhanced accessibility features in MathJaxDavide Cervone, Peter Krautzberger, Volker Sorge. 1129-1134 [doi]
- The utility of tables for screen reader usersSteven Gardiner, Anthony Tomasic, John Zimmerman. 1135-1140 [doi]
- Fostering accessible urban mobility through smart mobile applicationsClaudio E. Palazzi, Armir Bujari. 1141-1145 [doi]