Abstract is missing.
- A 3D encryption with shifting mapping substitution mechanismYi-Li Huang, Fang-Yie Leu, Ilsun You, Rong-Yi Su, Po-Hao Su, Hsing-Chung Chen. 1-6 [doi]
- Implement of agent with role-based hierarchy access control for secure grouping IoTsHsing-Chung Chen, Chia-Hui Chang, Fang-Yie Leu. 1-6 [doi]
- APT attack behavior pattern mining using the FP-growth algorithmMungyu Lee, Junho Choi, Chang Choi, PanKoo Kim. 1-4 [doi]
- Optimal dynamic routing protocols for agro-sensor communication in MANETsKazy Noor E. Alam Siddiquee, Faria Farjana Khan, Karl Andersson, Mohammad Shahadat Hossain. 1-5 [doi]
- A cooperative channel control method of ZigBee and WiFi for IoT servicesShu Nishikori, Kazuhiko Kinoshita, Yosuke Tanigawa, Hideki Tode, Takashi Watanabe. 1-6 [doi]
- INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networksMevlut Turker Garip, Paul Hyungmin Kim, Peter Reiher, Mario Gerla. 1-6 [doi]
- An interoperable IP based WSN for smart irrigation systemZainal Abedin, Abu Sayeed Chowdhury, Mohammad Shahadat Hossain, Karl Andersson, Razuan Karim. 1-5 [doi]
- Analyzing HTTPS encrypted traffic to identify user's operating system, browser and applicationJonathan Muehlstein, Yehonatan Zion, Maor Bahumi, Itay Kirshenboim, Ran Dubin, Amit Dvir, Ofir Pele. 1-6 [doi]
- Critical infrastructure network DDoS defense, via cognitive learningTodd Booth, Karl Andersson. 1-6 [doi]
- Using network traffic to verify mobile device forensic artifactsNikunj Malik, Jayanarayan Chandramouli, Prahlad Suresh, Kevin D. Fairbanks, Lanier Watkins, William H. Robinson. 1-6 [doi]
- Time and place: robustness of a traffic analysis attack against web trafficSaman Feghhi, Douglas J. Leith. 1-6 [doi]
- Case study on password complexity enhancement for smart devicesXin Su, Bingying Wang, Chang Choi, Dongmin Choi. 1-5 [doi]
- Security enhancement using maximum ratio combining (MRC) diversity over nakagami-m fading channelsMahmoud A. Khodeir, Mamoun F. Al-Mistarihi, Razan Shatnawi, Laila Alsaleh. 1-5 [doi]
- An adaptive energy detection scheme using EMD for spectrum sensingMahdi H. Al-Badrawi, Amr M. Nasr, Bessam Z. Al-Jewad, Nicholas J. Kirsch. 7-12 [doi]
- Analysis of inversely proportional carrier sense threshold and transmission power settingKoji Yamamoto, Xuedan Yang, Takayuki Nishio, Masahiro Morikura, Hirantha Abeysekera. 13-18 [doi]
- EC-MRPL: An energy-efficient and mobility support routing protocol for Internet of Mobile ThingsMaha Bouaziz, Abderrezak Rachedi, Abdelfettah Belghith. 19-24 [doi]
- On using cashtags to predict companies stock trendsArmir Bujari, Marco Furini, Nicolas Laina. 25-28 [doi]
- Mobile ECG-based drowsiness detectionNipun Gupta, Dina Najeeb, Victor Gabrielian, Ani Nahapetian. 29-32 [doi]
- Autonomous and distributed construction of locality aware skip graphTakahiro Toda, Yosuke Tanigawa, Hideki Tode. 33-36 [doi]
- Mobile web page characteristics: Delivery and stability considerationsAdam Knox, Patrick Seeling. 37-40 [doi]
- Autonomous relocation strategies for cells on wheels in public safety networksLadan Rabieekenari, Kamran Sayrafian, John S. Baras. 41-44 [doi]
- Design and implementation of an interoperable messaging system for IoT healthcare servicesBrian Oryema, Hyun-Su Kim, Wei Li, Jong-Tae Park. 45-52 [doi]
- Enable IoT interoperability in ambient assisted living: Active and healthy aging scenariosDiana C. Yacchirema, Carlos E. Palau, Manuel Esteve. 53-58 [doi]
- From implicit semantics towards ontologies - practical considerations from the INTER-IoT perspectiveMaria Ganzha, Marcin Paprzycki, Wieslaw Pawlowski, Pawel Szmeja, Katarzyna Wasielewska, Carlos E. Palau. 59-64 [doi]
- A survey of open body sensor networks: Applications and challengesNing Yang, Zhelong Wang, Raffaele Gravina, Giancarlo Fortino. 65-70 [doi]
- A disruption tolerant architecture based on MQTT for IoT applicationsJorge E. Luzuriaga, Marco Zennaro, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. 71-76 [doi]
- A new architecture for supply-chain managementMarwa Chamekh, Mohamed Hamdi, Sadok El Asmi. 77-82 [doi]
- Vulnerabilities in hub architecture IoT devicesBogdan Alexandra Visan, Jiyoon Lee, Baijian Yang, Anthony H. Smith, Eric T. Matson. 83-88 [doi]
- Comparing apples to apples in ICNUrs Schnurrenberger. 89-94 [doi]
- Virtual storage and area limited data delivery over named data networkingDaiki Ito, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii. 95-102 [doi]
- Advanced 5G-TCP: Transport protocol for 5G mobile networksIvan Petrov, Toni Janevski. 103-107 [doi]
- Congestion control avoiding excessive rate reduction in named data networkTakahiko Kato, Masaki Bandai. 108-113 [doi]
- Using network traffic to verify mobile device forensic artifactsNikunj Malik, Jayanarayan Chandramouli, Prahlad Suresh, Kevin D. Fairbanks, Lanier Watkins, William H. Robinson. 114-119 [doi]
- Implement of agent with role-based hierarchy access control for secure grouping IoTsHsing-Chung Chen, Chia-Hui Chang, Fang-Yie Leu. 120-125 [doi]
- Detrended fluctuation analysis on ECG device for home environmentAlif Akbar Pranata, Gereziher W. Adhane, Dong Seong Kim. 126-130 [doi]
- WiSDom: A model-driven solitary death prevention system based on WiFi signals and real-time supervised trainingShane Kim, Jihoon Ryoo. 131-136 [doi]
- Hand goniometric measurements using leap motionRicardo Lopez Trejo, Juan-Pablo García-Vázquez, Maria Luisa Gonzalez Ramirez, Luis E. Vizcarra Corral, Israel Rojas Marquez. 137-141 [doi]
- UWB radar based beyond wall sensing and tracking for ambient assisted livingWahab Khawaja, Farshad Koohifar, Ismail Güvenç. 142-147 [doi]
- Inspecting the performance of low-power nodes during the execution of edge computing tasksRoberto Morabito. 148-153 [doi]
- On the study and deployment of mobile edge cloud for tactile Internet using a 5G gaming applicationPatrik J. Braun, Sreekrishna Pandi, Robert-Steve Schmoll, Frank H. P. Fitzek. 154-159 [doi]
- Computation offloading decisions for reducing completion timeSalvador Melendez, Michael P. McGarry. 160-164 [doi]
- Optical virtual network configuration method for tightly coupling big data and peripheral computer resourcesHirotaka Nakano, Yosuke Tanigawa, Hideki Tode. 165-171 [doi]
- Distributed caching in mobile networks with heterogeneous content demandRui Wang, Faezeh Hajiaghajani, Subir Biswas. 172-178 [doi]
- SDN-based IaaS for mobile computingWijaya Ekanayake, Heli Amarasinghe, Ahmed Karmouch. 179-184 [doi]
- Semantic edge computing and IoT architecture for military health services in battlefieldDhananjay Singh, Gaurav Tripathi, Antonio M. Alberti, Antonio J. Jara. 185-190 [doi]
- Fairness in fog networks: Achieving fair throughput performance in MQTT-based IoTsYiming Xu, V. Mahendran, Wei Guo, Sridhar Radhakrishnan. 191-196 [doi]
- Automatic 2.4 GHz communication standard recognition based on ultra-low power receiversMatthias Kuba, Janina Ziller, Tobias Drager, Heinrich Milosiu, Alexander Jaschke, Hans Adel. 197-202 [doi]
- A game theory based power control algorithm for future MTC NOMA networksKang-kang, Zhenni Pan, Jiang Liu 0005, Shigeru Shimamoto. 203-208 [doi]
- Energy-efficient traffic allocation in SDN-basec backhaul networks: Theory and implementationSenay Semu Tadesse, Claudio Casetti, Carla-Fabiana Chiasserini, Giada Landi. 209-215 [doi]
- An energy efficient resource management and planning system for 5G networksMd Munjure Mowla, Iftekhar Ahmad, Daryoush Habibi, Quoc Viet Phung. 216-224 [doi]
- Counter-intuitive channel allocation improvement in distributed cognitive radio networks by adding optimal interference in user's utilityAmulya Bhattarai, Prapun Suksompong, Chalie Charoenlarpnopparut, Patrachart Komolkiti. 225-230 [doi]
- A stackelberg game based analysis for interactions among Internet service provider, content provider, and advertisersCheng Zhang, Bo Gu, Zhi Liu, Kyoko Yamori, Yoshiaki Tanaka. 231-235 [doi]
- Adaptive risk treatment for cloud computing based on Markovian gameManel Medhioub, Tai-Hoon Kim, Mohamed Hamdi. 236-241 [doi]
- Building a policy simulation platform for future smart grid in ChinaHongmin Wang, Song Liu, Leilei Jiang, Peng Liu, Bo Gu. 242-247 [doi]
- Approximate outage probability for multi-user vehicle cooperative communicationChunxiao Li, Anran Zhen, Jun Sun, Meixiang Zhang, Xuelong Hu. 248-253 [doi]
- Joint resource and price competition in wireless sensor network-based service provisionWanyue Sun, Luis Guijarro, Vicent Pla, José R. Vidal. 254-259 [doi]
- Spectrally efficient adaptive generalized spatial modulation MIMO systemsSikandar Afridi, Syed Ali Hassan. 260-263 [doi]
- Energy-aware dynamic resource allocation in virtual sensor networksCarmen Delgado, María Canales, Jorge Ortín, José Ramón Gállego, Alessandro Redondi, Sonda Bousnina, Matteo Cesana. 264-267 [doi]
- Buffer-aware opportunistic routing for wireless sensor networksWenyang Cui, Ye Yao, Liang Song. 268-271 [doi]
- Multi-level resilience in networked environments: Concepts & principlesMuhammad Azizi Mohd Ariffin, Angelos K. Marnerides, Andreas U. Mauthe. 272-275 [doi]
- User cooperative mobility for QoS improvement in ad-hoc networksTianran Luo, Tutomu Murase. 276-279 [doi]
- A methodology for measuring UAV-to-UAV communications performanceFrancisco Fabra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni. 280-286 [doi]
- CUSCUS: An integrated simulation architecture for distributed networked control systemsNicola Roberto Zema, Angelo Trotta, Guillaume Sanahuja, Enrico Natalizio, Marco Di Felice, Luciano Bononi. 287-292 [doi]
- Optimized spatial CSMA for VANETs: A comparative study using a simple stochastic model and simulation resultsYounes Bouchaala, Paul Mühlethaler, Oyunchimeg Shagdar, Nadjib Achir. 293-298 [doi]
- SafeRNet: Safe transportation routing in the era of Internet of vehicles and mobile crowd sensingQun Liu, Suman Kumar, Vijay Kumar Mago. 299-304 [doi]
- Outlier rejection for networked control systems based on middlewareWoo Hyun Ko, P. R. Kumar. 305-312 [doi]
- On data integrity attacks against route guidance in transportation-based cyber-physical systemsJie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Linqiang Ge. 313-318 [doi]
- Product authentication using hash chains and printed QR codesHarshith Keni, Montana Earle, Manki Min. 319-324 [doi]
- Modeling and verification of temporal properties in cyber-physical systemsImen Graja, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem. 325-330 [doi]
- Synchronized audio capture with an array of mobile devicesNick Schaafsma, Ani Nahapetian. 331-336 [doi]
- Ant colony optimisation - A solution to efficient anonymous group communication?Tim Grube, Sascha Hauke, Jörg Daubert, Max Mühlhäuser. 337-340 [doi]
- Creating a secure processing tree for anonymous distributed data processing in the cloudEmmanuel S. Peters, Nicholas F. Maxemchuk. 341-344 [doi]
- Reliability analysis of trust based federated identity management in InterCloud: A graph coloring approachUthpala Subodhani Premarathne. 345-348 [doi]
- An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputationHeesuk Son, Namyong Kang, Bumjin Gwak, Dongman Lee. 349-352 [doi]
- On delivery control for floating contents sharing with epidemic broadcastingRyo Hagihara, Yasuhiro Yamasaki, Hiroyuki Ohsaki. 353-356 [doi]
- Cross layer attacks on GSM mobile networks using software defined radiosKamrul Hasan, Sachin Shetty, Taiwo Oyedare. 357-360 [doi]
- Fitness evaluation for channel assignment algorithms in IEEE 802.11 WMNsYing Qu, Bryan Ng, Hang Yu, Peter Andreae, Winston K. G. Seah. 361-364 [doi]
- QoS-aware distributed cloud storage service based on erasure code in multi-cloud environmentWei-Tsung Su, Cheng-Yi Dai. 365-368 [doi]
- Peer provided cell-like networks built out of thin airAndrés Arcia-Moret, Zafar Gilani, Arjuna Sathiaseelan, Jon Crowcroft. 369-372 [doi]
- Multipath TCP over network coding for wireless networksPaul-Louis Ageneau, Nadia Boukhatem. 373-376 [doi]
- Cheating-resilient incentive scheme for mobile crowdsensing systemsCong Zhao, Xinyu Yang, Wei Yu 0002, Xianghua Yao, Jie Lin, Xin Li. 377-382 [doi]
- DExaS: Delegated experience as a service for mobile and wearable devicesRasib Khan, Ragib Hasan. 383-388 [doi]
- Resource utilization for access to web-based services: Browser versus mobile applicationHesham H. Salman, Patrick Seeling. 389-394 [doi]
- Selecting the optimal buffer management for opportunistic networks both in pedestrian and vehicular contextsJorge Herrera-Tapia, Enrique Hernández-Orallo, Andrés Tomás, Pietro Manzoni, Carlos Miguel Tavares Calafate, Juan-Carlos Cano. 395-400 [doi]
- Towards designing an intelligent experience sampling method for emotion detectionSurjya Ghosh, Niloy Ganguly, Bivas Mitra, Pradipta De. 401-406 [doi]
- Coalition game for video content clustering in content delivery networksNesrine Ben Hassine, Pascale Minet, Mohammed-Amine Koulali, Mohammed Erradi, Dana Marinca, Dominique Barth. 407-413 [doi]
- Device-to-device commercial content dissemination in social wireless networksFaezeh Hajiaghajani, Subir Biswas. 414-419 [doi]
- Enabling context-aware HTTP with mobile edge hintPeng Qian, Ning Wang, Gerry Foster, Rahim Tafazolli. 420-426 [doi]
- MS-Stream: A multiple-source adaptive streaming solution enhancing consumer's perceived qualityJoachim Bruneau-Queyreix, Mathias Lacaud, Daniel Négru, Jordi Mongay Batalla, Eugen Borcoci. 427-434 [doi]
- On stabilizing buffer dynamics for adaptive video streaming with a small buffering delayYongtao Shuai, Thorsten Herfet. 435-440 [doi]
- Self-refining skip graph: Skip graph approaching to an ideal topologyTakafumi Kawaguchi, Ryohei Banno, Masashi Hojo, Masaaki Ohnishi, Kazuyuki Shudo. 441-448 [doi]
- A multi-group signature scheme for local broadcastingKenta Nomura, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii. 449-454 [doi]
- A new WSN deployment approach for air pollution monitoringAhmed Boubrima, Walid Bechkit, Hervé Rivano. 455-460 [doi]
- An approach for precise, scalable, and platform independent clock synchronizationHenning Puttnies, Dirk Timmermann, Peter Danielis. 461-466 [doi]
- CoAP for content-centric networksSridhar Srinivasa Subramanian, Joseph Pasquale, George C. Polyzos. 467-472 [doi]
- Conditional subscription and notification in information centric networksLijun Dong, Guoqiang Wang. 473-479 [doi]
- Evaluating the use of TLS and DTLS protocols in IoT middleware systems applied to E-healthRamão Tiago Tiburski, Leonardo Albernaz Amaral, Everton de Matos, Dario F. G. de Azevedo, Fabiano Hessel. 480-485 [doi]
- From threads to events: Adapting a lightweight middleware for Contiki OSUzair A. Noman, Behailu Negash, Amir M. Rahmani, Pasi Liljeberg, Hannu Tenhunen. 486-491 [doi]
- Interaction based routing algorithm for opportunistic mobile social networksYing Li, Radim Bartos. 492-497 [doi]
- Pulse position coded PDUs: A new approach to networking energy economyDezhi Feng, Faezeh Hajiaghajani, Saptarshi Das, Subir Biswas. 498-503 [doi]
- Sensorian Hub: An IFTTT-based platform for collecting and processing sensor dataDylan Kauling, Qusay H. Mahmoud. 504-509 [doi]
- Opportunistic communications in WSN using UAVXiaoyan Ma, Simona Chisiu, Rahim Kacimi, Riadh Dhaou. 510-515 [doi]
- Time and frequency dispersion characteristics of the UAS wireless channel in residential and mountainous desert terrainsRichard M. Gutierrez, Hanguang Yu, Yu Rong, Daniel W. Bliss. 516-521 [doi]
- A programmable SDN+NFV-based architecture for UAV telemetry monitoringKyle J. S. White, Ewen Denney, Matt D. Knudson, Angelos K. Mamerides, Dimitrios P. Pezaros. 522-527 [doi]
- Control integrated query processing system for coordination of multiple UAVsSangwoo Shim, Taehun Kim, Soon J. Hyun. 528-533 [doi]
- MAC-layer coexistence analysis of LTE and WLAN systems via listen-before-talkYao Ma, Daniel G. Kuester. 534-541 [doi]
- Scalable MAC protocol for D2D communication for future 5G networksBushra Ismaiel, Mehran Abolhasan, David B. Smith, Wei Ni, Daniel Robert Franklin. 542-547 [doi]
- Starvation mitigation for dense WLANs through distributed channel selection: Potential game approachBo Yin, Shotaro Kamiya, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura, Hirantha Abeysekera. 548-553 [doi]
- TTL-based efficient forwarding for the backhaul tier in nanonetworksHang Yu, Bryan Ng, Winston K. G. Seah, Ying Qu. 554-559 [doi]
- iDFR: Intelligent directional flooding-based routing protocols for underwater sensor networksSyed Hassan Ahmed, Sungwon Lee, Junhwan Park, Dongkyun Kim, Danda B. Rawat. 560-565 [doi]
- OpenStackEmu - A cloud testbed combining network emulation with OpenStack and SDNCristian Hernandez Benet, Robayet Nasim, Kyoomars Alizadeh Noghani, Andreas Kassler. 566-568 [doi]
- Securing the IoT with TLS/DTLS server stacks embedded in secure elements: An ePlug usecasePascal Urien. 569-570 [doi]
- Pulsed power network with power sources and consumers operated on exhibition tableHisayoshi Sugiyama. 571-572 [doi]
- Low-cost managed digital signage system with signage device using small-sized and low-cost information deviceKazuhiro Mishima, Takeshi Sakurada, Yoichi Hagiwara. 573-575 [doi]
- Demonstration of a P2P assisted video streaming with WebRTC and network codingPatrik J. Braun, Péter Ekler, Frank H. P. Fitzek. 576-577 [doi]
- 2: Internet of humans-based platform for disaster relief and emergency communicationDhafer Ben Arbia, Muhammad Mahtab Alam, Rabah Attia, Elyes Ben Hamida, Abdullah Kadri. 578-579 [doi]
- A multiple-source adaptive streaming solution enhancing consumer's perceived qualityJoachim Bruneau-Queyreix, Mathias Lacaud, Daniel Négru. 580-581 [doi]
- Demo: Prototype implementation of ID card based momentum measurement systemNaoki Yamamoto, Toshifumi Watanabe, Mizuki Murase, Katsuhiro Naito, Nobuyuki Ito, Katsuhiko Kaji, Naoya Chujo, Tadanori Mizuno. 582-583 [doi]
- Multi-user networked framework for virtual reality platformAnkush Rai, R. Jagadeesh Kannan, Sakkaravarthi Ramanathan. 584-585 [doi]
- A versatile prototyping platform for monitoring and control applications using IPv6 over WSNQianjun Tang, Diandi Zhu, Zhipeng Wang, Ronggang Chen, Ting Yu, Abdelhakim Hafid. 586-587 [doi]
- A context-aware authentication service for smart homesYosef Ashibani, Dylan Kauling, Qusay H. Mahmoud. 588-589 [doi]
- Demo: Implementation of cooperative bus location system with BLE devices and smartphonesKatsuyuki Tanaka, Katsuhiro Naito. 590-591 [doi]
- Demonstrating BPMN4CPS: Modeling anc verification of cyber-physical systemsImen Graja, Aicha Mechim, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem. 593 [doi]
- Prototypes of using directional antenna for railroad crossing safety applicationsXiaofu Ma, Sayantan Guha, Jun Sung Choi, Christopher R. Anderson, Randall Nealy, Jared Withers, Jeffrey H. Reed, Carl B. Dietrich. 594-596 [doi]
- A prototype for value-added video service provisioning in content delivery networksNarjes T. Jahromi, Sami Yangui, Sandhya Shanmugasundaram, Aida Rangy, Roch H. Glitho, Adel Larabi, Daniel Smith, Richard Brunner. 597-598 [doi]
- Hidden android permissions: Remote code execution and shell access using a live wallpaperQusay H. Mahmoud, Dylan Kauling, Shaun Zanin. 599-600 [doi]
- CUSCUS: CommUnicationS-control distributed simulatorNicola Roberto Zema, Angelo Trotta, Guillaume Sanahuja, Enrico Natalizio, Marco Di Felice, Luciano Bononi. 601-602 [doi]
- Demo: SDN@Play as a strategy to enhance the multicast delivery rate in WLANsEstefania Coronado, Roberto Riggio, Jose Miguel Villalón Millán, Antonio Garrido. 603-604 [doi]
- Demonstration of 5G connected carsSreekrishna Pandit, Frank H. P. Fitzek, Simone Redana. 605-606 [doi]
- Demonstration of mobile edge cloud for tactile Internet using a 5G gaming applicationSreekrishna Pandi, Robert-Steve Schmoll, Patrik J. Braun, Frank H. P. Fitzek. 607-608 [doi]
- An OpenAirlnterface based implementation of dynamic spectrum-level slicing across heterogeneous networksAnteneh A. Gebremariam, Mainak Chowdhury, Andrea J. Goldsmith, Fabrizio Granelli. 609-610 [doi]
- A dynamic, plug-and-play and efficient video surveillance platform for smart citiesGabriele Baldoni, Marcello Melita, Sergio Micalizzi, Corrado Rametta, Giovanni Schembra, Alessandro Vassallo. 611-612 [doi]
- HEVC tile based streaming to head mounted displaysRobert Skupin, Yago Sanchez, Dimitri Podborski, Cornelius Hellge, Thomas Schierl. 613-615 [doi]
- End-user agnostic join and fork framework for TCP flows in SDNWei Guo, V. Mahendran, Sridhar Radhakrishnan. 616-617 [doi]
- Towards non-intrusive continuous healthcare monitoring with the Smart Hospital GownMaya Guru, Ragib Hasan, Rasib Khan. 618-619 [doi]
- The intelligent parking lot based on ZigBee technology and SVMYanan Zhang, Yuren Du, Anran Zhen, Chunxiao Li, Xuelong Hu. 620-621 [doi]
- Interactive demonstration on the use of existing apps on mobile technologies to teach basic photographic techniques to participants who are blind, visually impaired and sighted together: A demonstration of an exercise using apps and cameras on iOS and Android platforms to image "the body" and handwritingSimon Hayhoe, Noemi Pena-Sanchez. 622-623 [doi]
- Intelligent traffic light control system based on real time traffic flowsZhijun Li, Chunxiao Li, Yanan Zhang, Xuelong Hu. 624-625 [doi]
- A fast and loop-free update mechanism in software defined networkingTao Liu, Wendong Wang, Xiangyang Gong, Xirong Que, Shiduan Cheng. 626-627 [doi]
- A new advantage distillation scheme over MIMO wiretap channels based on feedback bitsYuwen Cao, Xueqin Jiang, Miaowen Wen, Enjian Bai, Yun Wu, Jun Li. 628-629 [doi]
- A nimble decompression algorithm for ZigBee firmware update in smart home environmentTuo Feng, Kun Yang. 630-631 [doi]
- A novel cleaning approach of environmental sensing data streamsSamia Tasnim, Niki Pissinou, S. S. Iyengar. 632-633 [doi]
- A novel pricing policy for G2V and V2G servicesChekired Djabir Abd Eldjalil, Dhaou Said, Lyes Khoukhi, Hussein T. Mouftah. 634-635 [doi]
- A transmission protocol for fully automated valet parking using DSRCBernd Schäufele, Oliver Sawade, Daniel Becker, Ilja Radusch. 636-637 [doi]
- Adaptive sphere decoder for 1-bit ADC MIMO-constant envelope modulation detectionDoaa Abdelhameed, Hany S. Hussein, Ehab Mahmoud Mohamed. 638-639 [doi]
- Analysis of the vulnerability of the incumbent frequency to inference attacks in spectrum sharingAzza Ben Mosbah, Timothy A. Hall, Michael R. Souryal, Hossam Afifi. 640-642 [doi]
- Direction-of-arrival estimation in sensor arrays for moving terminalsDah-Chung Chang, Bo-Wei Zheng. 643-644 [doi]
- Enhanced adaptive control CRE in heterogeneous networksSho Nakazawa, Norihiro Naganuma, Hiroyuki Otsuka. 645-646 [doi]
- An efficient algorithm for virtual network function placement and chainingOussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. 647-652 [doi]
- Building an NFV-based vRGW: Lessons learnedJorge Proença, Tiago Cruz, Paulo Simões 0001, Gonçalo Gaspar, Bruno Parreira, Alexandre Laranjeira, Fernando Bastos. 653-658 [doi]
- Distributed network anomaly detection on an event processing frameworkAtanas Pamukchiev, Simon Jouet, Dimitrios P. Pezaros. 659-664 [doi]
- Load based automatic scaling in virtual IP based multimedia subsystemAbdul Basit Alvi, Tahir Masood, Usama Mehboob. 665-670 [doi]
- NFV and SDN-based cost-efficient and agile value-added video services provisioning in content delivery networksNarjes T. Jahromi, Sami Yangui, Adel Larabi, Daniel Smith, Mohammad A. Salahuddin, Roch H. Glitho, Richard Brunner, Halima Elbiaze. 671-677 [doi]
- Scheduling with task duplication for application offloadingArani Bhattacharya, Ansuman Banerjee, Pradipta De. 678-683 [doi]
- User selection for multi-user mmWave systems with phased-zero-forcing hybrid precoderSeongbae Jun, Donggu Kim, Joonhyuk Kang. 684-686 [doi]
- A fully distributed satisfactory power control for QoS self-provisioning in 5G networksHajar El Hammouti, Essaid Sabir, Hamidou Tembine. 688-691 [doi]
- Semantic edge caching and prefetching in 5GCan Mehteroglu, Yunus Durmus, Ertan Onur. 692-695 [doi]
- Real-time pricing for on-demand bandwidth reservation in SDN-enabled networksBo Gu, Mianxiong Dong, Cheng Zhang, Zhi Liu, Yoshiaki Tanaka. 696-699 [doi]
- SDN@Play: A multicast rate adaptation mechanism for IEEE 802.11 WLANsEstefania Coronado, Roberto Riggio, José Villalón, Antonio Garrido. 700-703 [doi]
- Access point virtualization for multiple services in heterogeneous WLANsKazuki Ginnan, Keita Kawano, Kazuhiko Kinoshita, Takashi Watanabe. 704-707 [doi]
- Power-saving for wireless stations using RTS/CTS handshake and burst transmission in wireless LANsKohei Omori, Yosuke Tanigawa, Hideki Tode. 708-711 [doi]
- A centralized approach for setting floating content parameters in VANETsAntonio Di Maio, Ridha Soua, Maria Rita Palattella, Thomas Engel, Gianluca Rizzo. 712-715 [doi]
- Network traffic analysis of the steam game systemArmir Bujari, Giacomo Quadrio, Claudio E. Palazzi, Daniele Ronzani, Dario Maggiorini, Laura Anna Ripamonti. 716-719 [doi]
- Home-to-home communications for smart community with Internet of ThingsJinsoo Han, Wan-Ki Park, Il-Woo Lee, Hak-Gyun Roh, Sang-Ha Kim. 720-723 [doi]
- A sensing-as-a-service context-aware system for Internet of Things environmentsEverton de Matos, Leonardo Albernaz Amaral, Ramão Tiago Tiburski, Matheus Crespi Schenfeld, Dario F. G. de Azevedo, Fabiano Hessel. 724-727 [doi]
- An efficient computation offloading architecture for the Internet of Things (IoT) devicesRaj Mani Shukla, Arslan Munir. 728-731 [doi]
- An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environmentsHayat Routaib, Elarbi Badidi, Essaid Sabir, Mohammed Elkoutbi. 732-736 [doi]
- Supporting distributed real-time debugging in online gamesDario Festa, Dario Maggiorini, Laura Anna Ripamonti, Armir Bujari. 737-740 [doi]
- Achieving power and energy efficiency in self-organizing networksBilal Maaz, Kinda Khawam, Samir Tohmé, Jad Nasreddine, Samer Lahoud. 741-747 [doi]
- Ad-hoc mobile network architecture using distributed P-GW on unlicensed bands for LTEKenichi Kawamura, Naoki Takaya. 748-753 [doi]
- Autonomous off-peak data transfer by passively estimating overall LTE cell loadEiji Takahashi, Takayuki Suzuki, Takeo Onishi, Kozo Satoda. 754-759 [doi]
- CC-OffGrid: A content-centric communication system in infrastructure-less mobile environmentsMeihong Zhu, Ying Cui, Liang Qian. 760-766 [doi]
- Energy-efficient lookahead face routing using coverage range in wireless networksHyunchong Cho, Sangdae Kim, Cheonyong Kim, Seungmin Oh, Sang-Ha Kim. 767-771 [doi]
- Experimental work on WiGig coverage area management and beamforming training using Wi-Fi fingerprintEhab Mahmoud Mohamed, Kei Sakaguchi, Seiichi Sampei. 772-777 [doi]
- Hybrid cognitive engine for radio systems adaptationIsmail AlQerm, Basem Shihada. 778-783 [doi]
- Impact of timing on the proximity services (ProSe) synchronization functionSamantha Gamboa, Fernando J. Cintron, David W. Griffith, Richard Rouil. 784-790 [doi]
- Learning based spectral clustering for LTE downlink CoMP systemsVéronique Capdevielle, Pantelis Monogioudis, Carl Weaver, Jean-Michel Pugeat, Steve Myers. 791-795 [doi]
- Multicast throughput subject to delay in multi-rate wireless networksAsma Ben Hassouna, Hend Koubaa, Leïla Azouz Saïdane. 796-801 [doi]
- Prioritized network coding scheme for multi-layer video streamingHana Baccouch, Paul-Louis Ageneau, Nicolas Tizon, Nadia Boukhatem. 802-809 [doi]
- Real and simulator testbeds for content dissemination in high-density large-scale WANETYu-Jen Lai, Youyang Ng, Takeshi Sakoda, Yosuke Bando, Arata Miyamoto, Masahiro Ishiyama, Ken-ichi Maeda, Yusuke Doi. 810-817 [doi]
- Resource pooling via dynamic spectrum-level slicing across heterogeneous networksAnteneh A. Gebremariam, Mainak Chowdhury, Andrea J. Goldsmith, Fabrizio Granelli. 818-823 [doi]
- Uplink successful transmission probability in energy-harvesting cellular networksAleksandar Ichkov, Ivana Nikoloska, Zoran Hadzi-Velkov, Liljana Gavrilovska. 824-828 [doi]
- A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applicationsHayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Lionel Brunie, Osama Younes, Mohiy M. Hadhoud. 829-834 [doi]
- An off-the-shelf, low detectability, low data rate, timing-based covert channel for IEEE 802.11 wireless networksT. Owens Walker, Kevin D. Fairbanks. 835-840 [doi]
- Design and evaluation of a novel ECU architecture for secure and dependable automotive CPSBikash Poudel, Arslan Munir. 841-847 [doi]
- Paillier-encrypted databases with fast aggregated queriesNir Drucker, Shay Gueron. 848-853 [doi]
- sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android appsJyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan. 854-860 [doi]
- A method for updating attractor sets in noise-induced virtual network topology controlKoki Sakamoto, Toshihiko Ohba, Shin'ichi Arakawa, Masayuki Murata. 861-866 [doi]
- An optimal resource allocation algorithm for D2D communication underlaying cellular networksFaisal Hussain, Md Yeakub Hassan, Md Sakhawat Hossen, Salimur Choudhury. 867-872 [doi]
- Distributed scheme for interference mitigation of coexisting WBANs using Latin rectanglesMohamad Ah, Hassine Moungla, Mohamed F. Younis, Ahmed Mehaoua. 873-878 [doi]
- Energy aware and signal quality aware data aggregation touting in wireless nanosensor networksHong-Hsu Yen. 879-884 [doi]
- Hop counts reduction of ZigBee nodes by cooperating wireless LAN in ZigBee networkSeiya Dejima, Yosuke Tanigawa, Hideki Tode. 885-890 [doi]
- Identifying link layer home network topologies using HTIPYoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Manabu Okamoto. 891-898 [doi]
- L-SCN: Layered SCN architecture with supernodes and Bloom filtersMikael Gasparian, Torsten Braun, Eryk Schiller. 899-904 [doi]
- A multiple region reverse frequency allocation scheme for downlink capacity enhancement in 5G HetNetsAneeqa Ijaz, Syed Ali Hassan, Dushantha Nalin K. Jayakody. 905-910 [doi]
- A reduced-complexity demapping algorithm for gray-labeled PSK constellationsIn-Woong Kang, Ho Jae Kim, Hyoung-Nam Kim, Lajos Hanzo. 911-915 [doi]
- A stochastic geometry approach for analysing secrecy rate of multi-power level CRNsShabnam Khomejani, Huan Xuan Nguyen, Arumugam Nallanathan, Hamid Aghvami. 916-921 [doi]
- Design of user selection algorithm in full-duplex cellular systemSeunghun Yu, Jeongwan Koh, Joonhyuk Kang. 922-927 [doi]
- Estimating the distance between macro base station and users in heterogeneous networksLin Zhang, Wenli Zhou, Wanbin Tang, Gang Wu, Zhi Chen. 928-932 [doi]
- Partnership and data forwarding model for data acquisition in UAV-aided sensor networksSay Sotheara, Hikari Inata, Mohamad Erick Ernawan, Zhenni Pan, Jiang Liu 0005, Shigeru Shimamoto. 933-938 [doi]
- Real time detection of MAC layer DoS attacks in IEEE 802.11 wireless networksMallesham Dasari. 939-944 [doi]
- Reliable video multicast based on AL-FEC and H.264/AVC video traffic characteristicsHyun Seob Oh, Jung Gwon Shin, Wha Sook Jeon, Dong Geun Jeong. 945-950 [doi]
- Experimental evaluation on 5G radio access employing multi-user MIMO at 15 GHz bandKiichi Tateishi, Daisuke Kurita, Atsushi Harada, Yoshihisa Kishiyama, Shoji Itoh, Hideshi Murai, Arne Simonsson, Peter Ökvist. 951-956 [doi]
- Hybrid digital-analog source and channel coding with adaptationMinh-Quang Nguyen, Hang Nguyen, Eric Renault, Yusheng Ji. 957-962 [doi]
- Improved link adaptation using truncated channel inversion for MU-MIMO systemsGibum Kim, Myeungsuk Oh, Hyuncheol Park. 963-967 [doi]
- On generalized spatial modulation for multiuser wireless communicationsChristopher Downey, Sandeep Narayanan, Mark F. Flanagan. 968-973 [doi]
- Online mobile user speed estimation: Performance and tradeoff considerationsMajed Haddad, Dalia-Georgiana Herculea, Chung Shue Chen, Eitan Altman, Véronique Capdevielle. 974-979 [doi]
- Performance analysis of multiuser detection and decoding for subcarrier hopping multiple accessYuta Hori, Hideki Ochiai. 980-985 [doi]
- Physical-layer security enhancement via power allocation between pilot and data jammingSungjun Ahn, Seungjae Jung, Wonju Lee, Joonhyuk Kang. 986-991 [doi]
- Random cognitive radio network performance in Rayleigh-lognormal environmentSaifur Rahman Sabuj, Masanori Hamamura. 992-997 [doi]
- Successive bandwidth division NOMA systems: Uplink power allocation with proportional fairnessSoma Qureshi, Syed Ali Hassan, Dushantha Nalin K. Jayakody. 998-1003 [doi]
- Geometric group key-sharing scheme using euclidean distanceJun Hamasaki, Keiichi Iwamura. 1004-1005 [doi]
- IoT security (IoTSec) considerations, requirements, and architecturesDaniel Minoli, Kazem Sohraby, Jacob Kouns. 1006-1007 [doi]
- On data integrity attacks against optimal power flow in power grid systemsQingyu Yang, Yuanke Liu, Wei Yu 0002, Dou An, Xinyu Yang, Jie Lin. 1008-1009 [doi]
- Positioning noncooperative receiver using full-duplex relay techniqueBo Chang, Chuanxue Jin, Zhi Chen, Wanbin Tang, Lin Zhang. 1010-1011 [doi]
- Scheduling aware DRX cycle activation in LTE systemC. Ramesh, K. Gangatharan. 1012-1013 [doi]
- Security camera movie and ERP data matching system to prevent theftYoji Yamato, Yoshifumi Fukumoto, Hiroki Kumazaki. 1014-1015 [doi]
- Smart energy efficient gateway for Internet of mobile thingsIgor Tcarenko, Yuxiang Huan, David Juhasz, Amir M. Rahmani, Zhuo Zou, Tomi Westerlund, Pasi Liljeberg, Li-Rong Zheng, Hannu Tenhunen. 1016-1017 [doi]
- Time synchronization for SHCS-MAC based multi-hop cognitive radio networksJaeho Ahn, Kiwoong Kwon, Mi-Jeong Hoh, Daeyoung Kim 0001. 1018-1019 [doi]
- Using deep learning for alcohol consumption recognitionJoseph P. Bernstein, Brandon J. Mendez, Peng Sun, Yang Liu, Yi Shang. 1020-1021 [doi]
- Using network traffic to infer compromised neighbors in wireless sensor nodesJ. M. Chandramouli, Juan Ramos, Lakshmi Srinivasan, Prahlad Suresh, Prashanth Kannan, Garth V. Crosby, Lanier Watkins. 1022-1023 [doi]
- Cryptographic key generation using ECG signalSanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho. 1024-1031 [doi]
- Distributed discussion diarisationPascal Bissig, Klaus-Tycho Foerster, Simon Tanner, Roger Wattenhofer. 1032-1037 [doi]
- Towards still image experience predictions in augmented vision settingsBrian Bauman, Patrick Seeling. 1038-1043 [doi]
- Economic viability of HTC and MTC service provision on a common network infrastructureAngel Sanchis-Cano, Luis Guijarro, Vicent Pla, José R. Vidal. 1044-1050 [doi]
- Economic analysis of a centralized brokering platform for wireless sensor dataLuis Guijarro, Maurizio Naldi, Vicent Pla, José R. Vidal. 1051-1056 [doi]
- Fitting like a GlovePi: A wearable device for deaf-blind peopleSilvia Mirri, Catia Prandi, Paola Salomoni, Lorenzo Monti. 1057-1062 [doi]
- How web design influences user experience: A multi-modal method for real-time assessment during web browsingCristina Liviana Caldiroli, Roberta Garbo, Federica Pallavicini, Alessandro Antonietti, Andrea Mangiatordi, Fabrizia Mantovani. 1063-1066 [doi]
- Towards accessible graphs in HTML-based scientific articlesSilvia Mirri, Silvio Peroni, Paola Salomoni, Fabio Vitali, Vincenzo Rubano. 1067-1072 [doi]
- Improving EPUB3 ebooks accessibility through Javascript and CSSAndrea Mangiatordi, Francesca Scenini. 1073-1076 [doi]
- Evaluation of a collaborative photography workshop using the iPad 2 as an accessible technology for participants who are blind, visually impaired and sighted working collaborativelySimon Hayhoe, Noemi Pena-Sanchez, Karl Bentley. 1077-1082 [doi]
- On using on-the-fly students' notes in video lecture indexingMarco Furini, Silvia Mirri. 1083-1088 [doi]