Abstract is missing.
- A software framework for automatic Web service discovery based on a hybrid matchmakerAsma Adala, Nabil Tabbane, Sami Tabbane. 1-3 [doi]
- Comprehensive performance analysis and comparison of vehicles routing algorithms in smart citiesShen Wang, Soufiene Djahel, Jennifer McManis, Cormac McKenna, Liam Murphy. 1-8 [doi]
- Home network assistant: Towards better diagnostics and increased customer satisfactionAbdesselem Kortebi, Patrick Le Dain, Fabien Dure. 1-6 [doi]
- Supporting cloud deployment in the Guifi.net community networkJavi Jimenez, Roger Baig, Pau Escrich Garcia, Amin M. Khan, Felix Freitag, Leandro Navarro, Ermanno Pietrosemoli, Marco Zennaro, Amir H. Payberah, Vladimir Vlassov. 1-3 [doi]
- A TV white space broadband market model for rural entrepreneursSindiso M. Nleya, Antoine B. Bagula, Marco Zennaro, Ermanno Pietrosemoli. 1-6 [doi]
- Optimization of data harvesters deployment in an urban areas for an emergency scenarioTarek Bouali, El-Hassane Aglzim, Sidi-Mohammed Senouci. 1-6 [doi]
- COMPOSE: Building smart & context-aware mobile applications utilizing IoT technologiesCharalampos Doukas, Fabio Antonelli. 1-6 [doi]
- Improving network migration optimization utilizing memetic algorithmsStefan Türk, Hao Liu, Rico Radeke, Ralf Lehnert. 1-8 [doi]
- WSN lifetime optimization through controlled sink mobility and packet bufferingTifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal. 1-6 [doi]
- On distributed geolocation by employing spring-mass systemsMichael Grey, Michael Rossberg, Martin Backhaus, Guenter Schaefer. 1-7 [doi]
- Load-balanced one-hop overlay source routing over shortest pathShengwen Tian, Jianxin Liao, Jingyu Wang, Jing Wang, Qi Qi, Lei Zhang. 1-3 [doi]
- Outage performance of OFDM-based relaying systems under IQ imbalanceAla Gouissem, Ridha Hamila, Mazen O. Hasna. 1-7 [doi]
- Assigning capacity and prices for telecommunication services to increase possibilities of investment in rural networksAndres Marentes, Yezid Donoso. 1-6 [doi]
- Robust optimization in multi-operators microwave backhaul networksChristelle Caillouet, David Coudert, Alvinice Kodjo. 1-6 [doi]
- V2V2I: Extended inter-vehicles to infrastructure communication paradigmSofiane Imadali, Arnaud Kaiser, Sylvain Decremps, Alexandru Petrescu, Véronique Vèque. 1-3 [doi]
- Integrated multiple services handoff in mobile cloud computingQi Qi, Jianxin Liao, Yufei Cao. 1-3 [doi]
- Novel link availability aware metrics for routing in wireless mesh networksChiraz Houaidia, Adrien van den Bossche, Hanen Idoudi, Thierry Val, Leïla Azouz Saïdane. 1-7 [doi]
- Diversified SLT codes based on feedback for communication over wireless networksLei Zhang, Jianxin Liao, Jingyu Wang, Qi Qi, Tong Xu, Shengwen Tian, Minyan Liao. 1-6 [doi]
- Impact of broadband public infrastructures and services on SEE countries' economyChristos Bouras, Georgios Diles, Vasileios Kokkinos. 1-3 [doi]
- Secrecy coding for the wiretap channel using best known linear codesSalah Al-Hassan, Mohammed Zaki Ahmed, Martin Tomlinson. 1-6 [doi]
- Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networksHichem Sedjelmaci, Sidi-Mohammed Senouci. 1-6 [doi]
- Hybrid power line model based on frequency and time-variant systemPetr Mlynek, Martin Koutny, Jiri Misurec. 1-3 [doi]
- Collision's issue: Towards a new approach to quantify and predict the bandwidth lossesRedouane Belbachir, Mekkakia Maaza Zoulikha, Ali Kies, Belhadri Messabih. 1-7 [doi]
- Cooperative communication strategies for cascaded sources/relays in wireless networksVahid Forutan, Alessandro Nordio, Carla-Fabiana Chiasserini. 1-6 [doi]
- PTA: A Predictive Tracking Algorithm in Wireless Multimedia Sensor NetworksIbtissem Boulanouar, Stéphane Lohier, Abderrezak Rachedi, Gilles Roussel. 1-6 [doi]
- WhispPi: White space monitoring with Raspberry PiAndrés Arcia-Moret, Ermanno Pietrosemoli, Marco Zennaro. 1-6 [doi]
- Diagnosing smartphone's abnormal behavior through robust outlier detection methodsAli El Attar, Rida Khatoun, Marc Lemercier. 1-3 [doi]
- Cloud networking: An overview of virtual network embedding strategiesIlhem Fajjari, Nadjib Aitsaadi, Guy Pujolle. 1-7 [doi]
- Detecting malicious behavior in a vehicular DTN for public transportationYinghui Guo, Sebastian Schildt, Tobias Pögel, Lars C. Wolf. 1-8 [doi]
- Coupling LTE and network coding for efficient dissemination in vehicular networksGuillaume Remy, Sidi-Mohammed Senouci, François Jan, Yvon Gourhant. 1-7 [doi]
- A duty cycle self-adaptation algorithm for the 802.15.4 wireless sensor networksCamila Helena Souza Oliveira, Yacine Ghamri-Doudane, Stéphane Lohier. 1-7 [doi]
- A novel cross layer policy based priority management for radio resource allocation in 4G MIMO OFDMA system (IEEE 802.16m)Mériem Afif, Hermann Sohtsinda, Clency Perrine, Yannis Pousset, Christian Olivier. 1-3 [doi]
- A popularity-aware method for discovering server IP addresses related to websitesLuis Miguel Torres, Eduardo Magaña, Mikel Izal, Daniel Morató. 1-8 [doi]
- Recovering VANET safety messages in transmission holesFaisal Khan, Kamran Sanil, Farhan Elahi, John A. Copeland. 1-5 [doi]
- A call quality assessment and analysis framework for video telephony applications in enterprise networksHimanshu Dadheech, Brendan Jennings, Jonathan Dunne. 1-6 [doi]
- Energy detection performance enhancement for cognitive radio using noise processing approachHussien Al-Hmood, Hamed S. Al-Raweshidy. 1-6 [doi]
- PriBaCC: In-network sensor data processing for efficient smart grid monitoring applicationsNatalie Matta, Rana Rahim-Amoud, Leïla Merghem-Boulahia, Akil Jrad, Florent Nolot. 1-6 [doi]
- System model with adaptive modulation and frequency hopping in wireless networksVitomir Seba, Borivoj Modlic, Gordan Sisul. 1-3 [doi]
- Pamplona-traceroute: Topology discovery and alias resolution to build router level Internet mapsSantiago Garcia-Jimenez, Eduardo Magaña, Daniel Morató, Mikel Izal. 1-8 [doi]
- Optimization of discontinuous reception (DRX) operation during intra-LTE handoverYu Liu, Minh Huynh, Ashima Mangla, Dipak Ghosal. 1-6 [doi]
- Fast and secure implementation of ECC-based concealed data aggregation in WSNMerad Boudia Omar Rafik, Feham Mohammed. 1-7 [doi]
- Quasi-opportunistic contact prediction in delay/disruption tolerant networkFabio Rafael Segundo, Jean-Marie Farines, Eraldo Silveira e Silva. 1-6 [doi]