Abstract is missing.
- 3D radio signal visualization employing droneRyota Hagiwara, Hikari Inata, Yukihiko Okouchi, Jiang Liu, Shigeru Shimamoto. 1-2 [doi]
- Distributed management system for trust and reward in mobile ad hoc networksSonoko Goka, Hiroshi Shigeno. 1-6 [doi]
- Prototype implementation of human management system with BLE beacon devices in natural disastersMizuki Murase, Katsuyuki Tanaka, Katsuhiro Naito. 1-2 [doi]
- CupCarbon-Lab: An IoT emulatorAhcène Bounceur, Olivier Marc, Massinissa Lounis, Julien Soler, Laurent Clavier, Pierre Combeau, Rodolphe Vauzelle, Loïc Lagadec, Reinhardt Euler, Madani Bezoui, Pietro Manzoni. 1-2 [doi]
- Enhanced transmission algorithm for dynamic device-to-device direct discoveryAziza Ben Mosbah, David W. Griffith, Richard Rouil. 1-8 [doi]
- High impedance holographic metasurfaces for conformal and high gain antenna applicationsSamuel Kim, David Shrekenhamer, Jeffrey Will, Ra'id Awadallah, Joseph A. Miragliotta. 1-4 [doi]
- Performance evaluations of multimedia service function chaining in edge cloudsKentaro Imagane, Kenji Kanai, Jiro Katto, Toshitaka Tsuda, Hidenori Nakazato. 1-4 [doi]
- A novel obstacle avoidance system for guiding the visually impaired through the use of fuzzy control logicWafa Elmannai, Khaled M. Elleithy. 1-9 [doi]
- Optimizing energy consumption and user experience in a mobile video streaming scenarioThomas Breitbach, Peter Sanders 0001, Dominik Schultes. 1-9 [doi]
- DEMO: SDN-based network slicing in C-RANSalvatore Costanzo, Ilhem Fajjari, Nadjib Aitsaadi, Rami Langar. 1-2 [doi]
- Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communicationsAbdullah Aydeger, Nico Saputro, Kemal Akkaya, A. Selcuk Uluagac. 1-6 [doi]
- 5G next generation VANETs using SDN and fog computing frameworkAmmara Anjum Khan, Mehran Abolhasan, Wei Ni. 1-6 [doi]
- Tacit computing and its application for open IoT eraMisao Kataoka, Naoto Hosikawa, Hirofumi Noguchi, Tatsuya Demizu, Yoji Yamato. 1-5 [doi]
- A study of channel model parameters for aerial base stations at 2.4 GHz in different environmentsNavuday Sharma, Maurizio Magarini, Laura Dossi, Luca Reggiani, Roberto Nebuloni. 1-6 [doi]
- A smart middleware to perform semantic discovery and trust evaluation for the Internet of ThingsJean Caminha, Angelo Perkusich, Mirko Perkusich. 1-2 [doi]
- Data gathering algorithm for children's observation system: For realizing real-time performance in information terminal bus stopMikiko Sode Tanaka. 1-2 [doi]
- Slotted IEEE 802.11p contention for overhead-free spectrum sensing in CR-VANETsNada Elgaml, Ahmed A. F. Khattab, Hebat-Allah Mourad. 1-6 [doi]
- RehabPartner: Motion tracking assistant using a novel complementary feedback filterShao Loong Lim, Yean Seanglidet, Bu-Sung Lee, Chai Kiat Yeo. 1-6 [doi]
- Prediction of online social networks users' behaviors with a game theoretic approachFelix Zhan, Gabriella Laines, Sarah Deniz, Sahan Paliskara, Irvin Ochoa, Idania Guerra, Shahab Tayeb, Carter Chiu, Matin Pirouz, Elliott Ploutz, Justin Zhan, Laxmi Gewali, Paul Oh. 1-2 [doi]
- Thermal aware scheduling on distributed computing water heatersIssam Raïs, Eddy Caron, Laurent Lefèvre. 1-4 [doi]
- Mobility-controlled flying routers for information-centric networkingTaku Kitagawa, Shingo Ala, Suyong Eum, Masayuki Murata. 1-2 [doi]
- Recurrent neural network-based received signal strength estimation using depth images for mmWave communicationsHironao Okamoto, Takayuki Nishio, Masahiro Morikura, Koji Yamamoto. 1-2 [doi]
- Dynamic adaptation to environmental changes of optical virtual networking and cloud computing systems for tightly coupling big data and peripheral computer resourcesHirotaka Nakano, Yosuke Tanigawa, Hideki Tode. 1-8 [doi]
- An intrusion oriented heuristic for efficient resource management in end-to-end wireless video surveillance systemsMuhammad Arslan Usman, Muhammad Rehan Usman, Soo Young Shin. 1-6 [doi]
- Experimental study of low-latency HD VoD streaming using flexible dual TCP-UDP streaming protocolKevin Gatimu, Arul Dhamodaran, Taylor Johnson, Ben Lee. 1-6 [doi]
- Energy-aware receiver-driven medium access control protocol for wireless energy-harvesting sensor networksRyo Tanabe, Tatsuhiro Kawaguchi, Ryohei Takitoge, Koichiro Ishibashi, Koji Ishibashi. 1-6 [doi]
- Evolution of functional core in network-related function calls during Linux kernel developmentShin'ichi Arakawa, Hirotaka Miyakawa, Tetsuya Takine, Masayuki Murata. 1-5 [doi]
- Mitigating Forwarding misbehaviors in RPL-based low power and lossy networksCong Pu, Salam Hajjar. 1-6 [doi]
- Using image steganography for providing enhanced medical data securityMuhammad Arslan Usman, Muhammad Rehan Usman. 1-4 [doi]
- Canarin II: Designing a smart e-bike eco-systemDavide Aguiari, Giovanni Delnevo, Lorenzo Monti, Vittorio Ghini, Silvia Mirri, Paola Salomoni, Giovanni Pau 0001, Marcus Im, Rita Tse, Mongkol Ekpanyapong, Roberto Battistini. 1-6 [doi]
- Session cloning protocol between smart devices for connected and un-connected states in B4G and 5GTushar Vrind, Diwakar Sharma, Lalit Pathak, Debabrata Das. 1-8 [doi]
- Practical green information delivery protocol for sensor-to-vehicle communicationsYuki Goto, Koji Ishibashi. 1-2 [doi]
- CupCarbon: A new platform for the design, simulation and 2D/3D visualization of radio propagation and interferences in IoT networksAhcène Bounceur, Laurent Clavier, Pierre Combeau, Olivier Marc, Rodolphe Vauzelle, Arnaud Masserann, Julien Soler, Reinhardt Euler, Taha Alwajeeh, Vyas Devendra, Umber Noreen, Emilie Soret, Massinissa Lounis. 1-4 [doi]
- Multimedia streaming using D2D in 5G ultra dense networksUbaid Abbasi, Halima Elbiaze. 1-6 [doi]
- Efficient P2P storage scheme with privacy protectionSanghun Choi, Hiromu Asahina, Iwao Sasase. 1-2 [doi]
- A novel encoding-decoding scheme using huffman coding for multimedia networksMuhammad Rehan Usman, Muhammad Arslan Usman, Soo Young Shin. 1-6 [doi]
- Log analysis in a HTTP proxy server for accurately estimating web QoEAnan Sawabe, Hiroshi Yoshida, Kousuke Nogami. 1-7 [doi]
- A generic cyber defense scheme based on stackelberg game for vehicular networkHichem Sedjelmaci, Imane Horiya Brahmi, Aymen Boudguiga, Witold Klaudel. 1-6 [doi]
- Protocol for reduction in network resource wastage for 4G dual SIM dual standby user equipmentLalit Pathak, Diwakar Sharma, Tushar Vrind, Debabrata Das. 1-4 [doi]
- On enhancing accessible smart buildings using IoTGiovanni Delnevo, Lorenzo Monti, Federico Foschini, Luca Santonastasi. 1-6 [doi]
- Practical deployment of network coding for real-time applications in 5G networksFrank Gabriel, Giang T. Nguyen, Robert-Steve Schmoll, Juan A. Cabrera G., Maciej Mühleisen, Frank H. P. Fitzek. 1-2 [doi]
- Cryptosystems with a multi prime composite modulusShay Gueron, Nir Drucker. 1-7 [doi]
- Development of certificate based secure communication for mobility and connectivity protocolYuya Miyazaki, Katsuhiro Naito, Hidekazu Suzuki, Akira Watanabe. 1-4 [doi]
- A novel MAC scheduling algorithm for TCP throughput improvement in LTE systemC. Ramesh, P. Ravi Kumar. 1-4 [doi]
- CLOSE: A costless service offloading strategy for distributed edge cloudFarah Slim, Fabrice Guillemin, Yassine Hadjadj Aoul. 1-6 [doi]
- Cooperative packet transmission scheduling between multicast and unicast flows for communication efficiency in wireles LANYuta Nishida, Yosuke Tanigawa, Hideki Tode. 1-6 [doi]
- ADS: Adaptive and dynamic scaling mechanism for multimedia conferencing services in the cloudAbbas Soltanian, Diala Naboulsi, Mohammad A. Salahuddin, Roch Glitho, Halima Elbiaze, Constant Wette. 1-6 [doi]
- Combination of a wireless sensor network and drone using infrared thermometers for smart agricultureTomoya Moribe, Hiraku Okada, Kentaro Kobayashl, Masaaki Katayama. 1-2 [doi]
- n-QAM for software defined radio applicationsHadi Alasti. 1-6 [doi]
- Who's driving you?Cherita L. Corbett, Jimmy Alexis, Lanier Watkins. 1-4 [doi]
- CPRI over Ethernet: Towards fronthaul/backhaul multiplexingMahmoud Mohamed Bahnasy, Halima Elbiaze, Catherine Truchan. 1-7 [doi]
- Design and implementation of monitoring system for breathing and heart rate pattern using WiFi signalsSangyoun Lee, Young Deok Park, Young-Joo Suh, Seokseong Jeon. 1-7 [doi]
- What can data analysis recommend on design of wearable sensors?Igor Khokhlov, Leon Reznik, Suresh Babu Jothilingam, Rohit Bhaskar. 1-2 [doi]
- Development and evaluation of a healthy coping voice interface application using the Google home for elderly patients with type 2 diabetesAmy Cheng, Vaishnavi Raghavaraju, Jayanth Kanugo, Yohanes P. Handrianto, Yi Shang. 1-5 [doi]
- FOCUS: A fog computing-based security system for the Internet of ThingsSalem Alharbi, Peter Rodriguez, Rajaputhri Maharaja, Prashant Iyer, Nivethitha Bose, Zilong Ye. 1-5 [doi]
- Fast spatial correlation acquisition for hybrid precoding using sequential compressive sensingJinping Hao, Hao Liu. 1-6 [doi]
- Wireless optical ethernet modem for underwater vehiclesTakao Sawa, Naoki Nishimura, Shin Ito. 1-4 [doi]
- Distributed search for ordered VNFs configuring service chaining based on in-network guidanceYutaro Oda, Yosuke Tanigawa, Hideki Tode. 1-4 [doi]
- A flickerless screen-camera communication using interframe differenceJunya Yamamoto, Masaki Bandai. 1-4 [doi]
- Software defined cognitive networking: Supporting intelligent online video streamingMu Mu 0001. 1-4 [doi]
- Adaptive hybrid MAC protocols for UAV-assisted mobile sensor networksXiaoyan Ma, Rahim Kacimi, Riadh Dhaou. 1-4 [doi]
- Smart things: Conditional random field based solution for context awareness at the IoT edgeMariem Harmassi, Cyril Faucher, Yacine Ghamri-Doudane. 1-7 [doi]
- Supervised cognitive system: A new vision for cognitive engine design in wireless networksIsmail AlQerm, Basem Shihada. 1-8 [doi]
- OFDM high speed train communication systems in 5G cellular networksVahid Vahidi, Ebrahim Saberinia. 1-6 [doi]
- The elimination-selection based algorithm for efficient resource discovery in Internet of Things environmentsLuiz Henrique Nunes, Júlio Cezar Estrella, Charith Perera, Stephan Reiff-Marganiec, Alexandre C. B. Delbem. 1-7 [doi]
- Resolution strategies for networking the IoT at the edge via named functionsChristopher Scherb, Dennis Grewe, Marco Wagner, Christian F. Tschudin. 1-6 [doi]
- A sectorized directional MAC proposal for mitigating deafness and energy consumption in mobile ad hoc networksVincenzo Inzillo, Floriano De Rango, Alfonso Ariza-Quintana. 1-2 [doi]
- The position cheating attack on inter-vehicular online gamingWafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi. 1-6 [doi]
- Reliable low latency wireless mesh networks - From Myth to realitySreekrishna Pandi, Simon Wunderlich, Frank H. P. Fitzek. 1-2 [doi]
- ANTs: Application-driven network trust zones on MAC layer in smart buildingsArne Wall, Hannes Raddatz, Michael Rethfeldt, Peter Danielis, Dirk Timmermann. 1-2 [doi]
- A practical model for traffic forecasting based on big data, machine-learning, and network KPIsLuong-Vy Le, Do Sinh, Li-Ping Tung, Bao-Shuh Paul Lin. 1-4 [doi]
- A multi-objective non-dominated sorting genetic algorithm for VNF chains placementSelma Khebbache, Makhlouf Hadji, Djamal Zeghlache. 1-4 [doi]
- evoGraphs - A jQuery plugin to create web accessible graphsAther Sharif, Babak Forouraghi. 1-4 [doi]
- Combined use of artificial intelligence and crowdsourcing to provide alternative content for images on websitesAndrea Mangiatordi, Marco Lazzari. 1-6 [doi]
- An ensemble method for estimating TCP throughput on application layerNatsuki Kai, Hiroshi Yoshida, Koichi Nihei. 1-4 [doi]
- Dynamic resource control method based on real world representation with potential fieldKoudai Kanda, Shin'ichi Arakawa, Satoshi Imai, Toru Katagiri, Motoyoshi Sekiya, Masayuki Murata. 1-6 [doi]
- A hop-by-hop window-based congestion control method for named data networkingTakahiko Kato, Masaki Bandai. 1-7 [doi]
- Network recommendation based on route prediction and mobile tower localisationAwantee V. Deshpande, Mihir H. Khandekar, Charuta G. Pethe, Jibi Abraham. 1-4 [doi]
- A fuzzy control-based approach for the selection of health interventionsJuan M. Calderón, Luis G. Jaimes. 1-6 [doi]
- AlmaWhere: A prototype of accessible indoor wayfinding and navigation systemGiovanni Delnevo, Lorenzo Monti, Francesco Vignola, Paola Salomoni, Silvia Mirri. 1-6 [doi]
- Eavesdropping prevention for heterogeneous Internet of Things systemsChen-Hung Liao, Hong-Han Shuai, Li-Chun Wang. 1-2 [doi]
- D-TCP: Dynamic TCP congestion control algorithm for next generation mobile networksMadhan Raj Kanagarathinam, Sukhdeep Singh, Irlanki Sandeep, Abhishek Roy, Navrati Saxena. 1-6 [doi]
- Mitigation of undesirable association behaviors of mobile devices with public WiFi networksSarvesh S. Kulkarni, Daniel Jigarjian, Vijay Gehlot, Ivan Ong. 1-8 [doi]
- Spoofing attack using bus-off attacks against a specific ECU of the CAN busKazuki Iehira, Hiroyuki Inoue, Kenji Ishida. 1-4 [doi]
- A hybrid artificial-noise and secret-key scheme for securing OFDM transmissions in V2G networksAhmed El-Shafie, Mohamed F. Marzban, Rakan Chabaan, Naofal Al-Dhahir. 1-6 [doi]
- On augmenting the experience of people with mobility impairments while exploring the city: A case study with wearable devicesCatia Prandi, Giovanni Delnevo, Chiara Ceccarini. 1-5 [doi]
- Securing OFDM-based wireless links using temporal artificial-noise injectionMohamed F. Marzban, Ahmed El-Shafie, Rakan C. Chabaan, Naofal Al-Dhahir. 1-6 [doi]
- A scalable protocol stack for IEEE 802.11s-based advanced metering infrastructure networksSamet Tonyali, Kemal Akkaya. 1-6 [doi]
- System design for predictive road-traffic information delivery using edge-cloud computingRyoichi Shinkuma, Shingo Kato, Masahiro Kanbayashi, Yasuhiro Ikeda, Ryoichi Kawahara, Takanori Hayashi. 1-6 [doi]
- StepByWatch: A smartwatch-based enhanced navigation system for visually impaired usersOmbretta Gaggi, Claudio E. Palazzi, Matteo Ciman, Armir Bujari. 1-5 [doi]
- A comparative analysis of wearables operating systems based on functional constraintsVicente J. P. Amorim, Saul E. Delabrida, Ricardo A. O. Oliveira. 1-6 [doi]
- Prototype implementation of RFID based health management system with low-power ARM microcomputerToshifumi Watanabe, Mizuki Murase, Katsuhiro Naito, Nobuyuki Ito, Katsuhiko Kaji, Naoya Chujo, Tadanori Mizuno. 1-2 [doi]
- Assessing the benefit of ALTO-guidance for P2P live-streaming user experience in heterogeneous environments (Poster)Jan Seedorf, Saverio Niccolini, Rolf Winter, Martin Stiemerling, Ettore Ferranti. 1-2 [doi]
- A stochastic game for adaptive security in constrained wireless body area networksAmel Arfaoui, Asma Ben Letaifa, Ali Kribeche, Sidi-Mohammed Senouci, Mohamed Hamdi. 1-7 [doi]
- Crowd-based positioning of UAVs as access pointsDorin Rautu, Riadh Dhaou, Emmanuel Chaput. 1-6 [doi]
- Towards an efficient energy management to reduce CO2 emissions and billing cost in smart buildingsMohamed Attia, Nour Haidar, Sidi-Mohammed Senouci, El-Hassane Aglzim. 1-6 [doi]
- Utilization-based parking space suggestion in smart cityChia-Ying Lin, Yi-Lung Lu, Meng-Hsun Tsai, Hui-Ling Chang. 1-6 [doi]
- Smart bracelets: Towards automating personal safety using wearable smart jewelryJayun Patel, Ragib Hasan. 1-2 [doi]
- Live migration on ARM-based micro-datacentresIlias Avramidis, Michael Mackay, Fung Po Tso, Takaaki Fukai, Takahiro Shinagawa. 1-6 [doi]
- A multi-radio, multi-hop ad-hoc radio communication network for Communications-Based Train Control (CBTC): Introducing frequency separation for train-to-trackside communicationJahanzeb Farooq, Lars Bro, Rasmus Thystrup Karstensen, José Soler. 1-7 [doi]
- Visible light communications: Toward multi-service waveformsAhmed F. Hussein, Hany Elgala, Thomas D. C. Little. 1-6 [doi]
- Adaptive spray: An efficient restricted epidemic routing scheme for delay tolerant networksTai Duy Nguyen, Quang Tran Minh, Vu Pham Tran, Yusheng Ji, Shigeki Yamada. 1-2 [doi]
- Mission planning for UAV-based opportunistic disaster recovery networksLei Zhong, Keno Garlichs, Shigeki Yamada, Kiyoshi Takano, Yusheng Ji. 1-6 [doi]
- Edge-centric field monitoring system for energy-efficient and network-friendly field sensingKeigo Ogawa, Kenji Kanai, Masaru Takeuchi, Jiro Katto, Toshitaka Tsuda. 1-6 [doi]
- On improving GlovePi: Towards a many-to-many communication among deaf-blind usersLorenzo Monti, Giovanni Delnevo. 1-5 [doi]
- Receiver-initiated dynamic duty cycle scheduling schemes for underwater wireless sensor networksMuhammad Azfar Yaqub, Mohammad Toaha Raza Khan, Syed Hassan Ahmed, Dongkyun Kim. 1-6 [doi]
- An efficient alternative to personalized page rank for friend recommendationsFelix Zhan, Brandon Waters, Maria Mijangos, LeAnn Chung, Raghav Bhagat, Tanvi Bhagat, Matin Pirouz, Carter Chiu, Shahab Tayeb, Elliott Ploutz, Justin Zhan, Laxmi Gewali. 1-2 [doi]
- NLOS identification in UWB channel for indoor positioningDae Ho Kim, Goo-Rak Kwon, Jae-Young Pyun, Jong Woo Kim. 1-4 [doi]
- Towards reduced latency in adaptive live streamingYongtao Shuai, Thorsten Herfet. 1-4 [doi]
- Evaluation of RTOT algorithm: A first implementation of OBSS_PD-based SR method for IEEE 802.11axTanguy Ropitault. 1-7 [doi]
- Load balanced and constant stretch routing in the vicinity of holes in WSNsPhi-Le Nguyen, Yusheng Ji, Khanh Le, Thanh-Hung Nguyen. 1-6 [doi]
- A low complexity and bandwidth efficient procedure for OFDM data reconstruction in DSC 5G networksVahid Vahidi, Ebrahim Saberinia. 1-4 [doi]
- Traffic volume reduction in smart grid networks by a cooperative intelligent interpolation techniqueArash Boustani, Navid Alamatsaz, Nima Alamatsaz, Ashkan Boustani. 1-7 [doi]
- MR-IoT: An information centric MapReduce framework for IoTQian Wang, Brian Lee, Niall Murray, Yuansong Qiao. 1-6 [doi]
- Trajectory based pre-key exchange scheme for seamless vehicular networks connectivityKiho Lim, Kastuv M. Tuladhar. 1-5 [doi]
- Perils of using CQIC in LTE network and a quick fix with delayed ACKZhenzhe Zhong, Isabelle Hamchaoui, Rida Khatoun. 1-2 [doi]
- When smart comes to town: A mobile platform for smart district servicesGianluca Rizzo, Zhan Liu, Maria Sokhn, Yann Bocchi, Antonio J. Jara. 1-2 [doi]
- Latency-aware joint virtual machine and policy consolidation for mobile edge computingThiago A. L. Genez, Fung Po Tso, Lin Cui. 1-6 [doi]
- CLEH - Cross layer enhanced handover for IMS sessionsSandesh Kumar Srivastava, Madhan Raj Kanagarathinam, SuneelKumar Diggi, Harikrishnan Natarajan. 1-4 [doi]
- Inter ecosystem compatibility for the Internet of Things using a web browserKapil Kumar, Joy Bose. 1-2 [doi]
- HTTP/2 performance evaluation with latency and packet lossesNaoki Oda, Saneyasu Yamaguchi. 1-2 [doi]
- Analytics as a service architecture for cloud-based CDN: Case of video popularity predictionMaroi Aloui, Halima Elbiaze, Roch H. Glitho, Sami Yangui. 1-4 [doi]
- A new dominating tree routing algorithm for efficient leader election in IoT networksAhcène Bounceur, Madani Bezoui, Massinissa Lounis, Reinhardt Euler, Ciprian Teodorov. 1-2 [doi]
- E-Darwin2: A smartphone based disaster recovery network using WiFi tetheringAmitangshu Pal, Krishna Kant. 1-5 [doi]
- A network slicing prototype for a flexible cloud radio access networkSalvatore Costanzo, Ilhem Fajjari, Nadjib Aitsaadi, Rami Langar. 1-4 [doi]
- Evaluation of LoRa receiver performance under co-technology interferenceGuibing Zhu, Chun-Hao Liao, Makoto Suzuki, Yoshiaki Narusue, Hiroyuki Morikawa. 1-7 [doi]
- A mechanism for congestion control based on traffic measurement with OpenFlow in disasterYuki Kobayashi, Jun Nishiyama, Hiroshi Shigeno. 1-2 [doi]
- Energy efficiency enhancement on cloud and edge processing by dynamic RRH selectionJinyeop Na, Jeongwan Koh, Sangwoo Park, Joonhyuk Kang. 1-6 [doi]
- Demonstration of augmented-reality optical narrowcastingNarkis Shatz, John Bortz, Mark Squire. 1-2 [doi]
- An efficient cost-calculation method for end-to-end slice generationYuki Katsumata, Takuya Shimojo, Ashiq Khan, Akira Yamada, Shigeru Iwashina. 1-6 [doi]
- GSS-VC: A game-theoretic approach for service selection in vehicular cloudBouziane Brik, Junaid Ahmed Khan, Yacine Ghamri-Doudane, Nasreddine Lagraa, Abderrahmane Lakas. 1-6 [doi]
- Chaos MIMO-based downlink non-orthogonal multiple access scheme with physical layer securityNaoto Horiike, Hiroki Kitagawa, Eiji Okamoto, Tetsuya Yamamoto. 1-7 [doi]
- Android system security evaluationIgor Khokhlov, Leon Reznik. 1-2 [doi]
- Network-based detection of mobile malware exhibiting obfuscated or silent network behaviorLanier Watkins, Amritha Lal Kalathummarath, William H. Robinson. 1-4 [doi]
- Towards a social virtual reality learning environment in high fidelityChiara Zizza, Adam Starr, Devin Hudson, Sai Shreya Nuguri, Prasad Calyam, Zhihai He. 1-4 [doi]
- Implementation of condition-aware receiver-initiated MAC protocol to realize energy-harvesting wireless sensor networksTatsuhiro Kawaguchi, Ryo Tanabe, Ryohei Takitouge, Koichiro Ishibashi, Koji Ishibashi. 1-3 [doi]
- Cooperative coexistence and resource allocation for V2X communications in LTE-unlicensedQing Wei, Li Wang, Zhiyong Feng, Zhi Ding. 1-6 [doi]
- AMELIA: An application of the Internet of Things for aviation safetyJeremiah Pate, Tosiron Adegbija. 1-6 [doi]
- Predictive medium access control for industrial cognitive radioAhmad Saad, Barbara Staehle, Rudi Knorr. 1-8 [doi]
- Easy accessible virtual computer room for BYOD environmentKazuhiro Mishima, Takeshi Sakurada, Yoichi Hagiwara. 1-2 [doi]
- The impact of net neutrality on revenue and quality of service in wireless networksElissar Khloussy, Yuming Jiang. 1-6 [doi]
- Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environmentsEzedin Barka, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas. 1-7 [doi]
- Robots as-a-service in cloud computing: Search and rescue in large-scale disasters case studyCarla Mouradian, Sami Yangui, Roch H. Glitho. 1-7 [doi]
- MULTI-WEAR: A multi-wearable platform for enhancing mobile experiencesAndreas Pamboris, Panayiotis Andreou, Herodotos Herodotou, George Samaras. 1-6 [doi]
- Node placement for target coverage and network connectivity in WSNs with multiple sinksThi Hanh Nguyen, Phi-Le Nguyen, Phan Thanh Tuyen, Huynh Thi Thanh Binh, Ernest Kurniawan, Yusheng Ji. 1-6 [doi]
- An effective flow aggregation for SDN-based background and foreground traffic controlTran Minh Quang, Le Van An, Tran Khanh Dang, Nam Thoai, Takeshi Kitahara. 1-4 [doi]
- OSDF: A framework for software defined network programmingDouglas Comer, Adib Rastegarnia. 1-4 [doi]
- Massive video multicasting in cellular networks using network coded cooperative communicationSreekrishna Pandi, Roberto Torre Arranz, Giang T. Nguyen, Frank H. P. Fitzek. 1-2 [doi]
- An innovative security architecture for low cost low power IoT devices based on secure elements: A four quarters security architecturePascal Urien. 1-2 [doi]
- Artificial noise-aided secure beamforming for multigroup multicastWanjik Kim, Sukjong Ha, Jeongwan Koh, Joonhyuk Kang. 1-4 [doi]
- Dynamic power saving techniques for mobile hotspotRaj Kumar Saranappa, Vimal Bastin Edwin Joseph, Debabrata Das. 1-2 [doi]
- How to motivate participation and improve quality of crowdsourcing when building accessibility mapsZhan Liu, Shaban Shabani, Nicole Glassey Balet, Maria Sokhn, Fabian Cretton. 1-6 [doi]
- On the scalability of 5G core network: The AMF caseImad Alawe, Yassine Hadjadj Aoul, Adlen Ksentini, Philippe Bertin, Davy Darche. 1-6 [doi]
- Enhanced multi-RAT support for 5GArjun Nanjundappa, Sukhdeep Singh, Gaurav Jain. 1-2 [doi]
- Experimental evaluation of fault-tolerant mechanisms over Imote2 platformMohamed Nacer Bouatit, Selma Boumerdassi, Adel Djama. 1-4 [doi]
- Near shannon bound performance for low rate short block turbo codesFatemeh Khalili, Jeffrey C. Dill. 1-4 [doi]
- An NFV and microservice based architecture for on-the-fly component provisioning in content delivery networksNarjes Tahghigh Jahromi, Roch H. Glitho, Adel Larabi, Richard Brunner. 1-7 [doi]
- A carrier frequency offset compensation algorithm with synchronization for digital communication receiversSujit Jos, Kiran Bynam, Jinesh P. Nair, P. S. Chandrashekhar Thejaswi, Changsoon Park, Young-Jun Hong, Youngsoo Kim. 1-4 [doi]
- Proposal of virtual musical instrument using single camera and verification of playabilityJunnosuke Tanaka, Ryo Katsuma. 1-2 [doi]
- Prototype implementation of BLE based automated data collection scheme in agricultural measurement systemKatsuyuki Tanaka, Mizuki Murase, Katsuhiro Naito. 1-2 [doi]
- A secure and cloud-based medical records access scheme for on-road emergenciesKhaled Rabieh, Kemal Akkaya, Umit Karabiyik, Jennifer Qamruddin. 1-8 [doi]
- Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption schemeRihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane. 1-7 [doi]
- Leveraging edge caching in NOMA systems with QoS requirementsJose Armando Oviedo, Hamid R. Sadjadpour. 1-5 [doi]
- Demonstration of VR / AR offloading to Mobile Edge Cloud for low latency 5G gaming applicationRobert-Steve Schmoll, Sreekrishna Pandi, Patrik J. Braun, Frank H. P. Fitzek. 1-3 [doi]
- Topic-based playlist to improve video lecture accessibilityMarco Furini, Silvia Mirri, Manuela Montangero. 1-5 [doi]
- Wireless controller placement problemAmit Dvir, Yoram Haddad 0001, Aviram Zilberman. 1-4 [doi]
- Predicting wireless coverage maps using radial basis networksYisroel Mirsky, Yoram Haddad 0001, Orit Rozenblit, Rina Azoulay. 1-4 [doi]
- Asymptotic analysis and optimization design of physical layer systematic rateless codesAmrit Kharel, Lei Cao. 1-6 [doi]
- HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computingJori Winderickx, Dave Singelée, Nele Mentens. 1-6 [doi]