Abstract is missing.
- SkyTracer: Towards fine-grained identification for Skype traffic via sequence signaturesZhenlong Yuan, Cuilan Du, Xiaoxian Chen, Dawei Wang, Yibo Xue. 1-5 [doi]
- A novel method for information propagation model perceivingChengqi Yi, Yuanyuan Bao, Siqi Sun, Yibo Xue. 6-10 [doi]
- Effective immunization strategy for rumor propagation based on maximum spanning treeYuanyuan Bao, Yan Niu, Chengqi Yi, Yibo Xue. 11-15 [doi]
- Combating False Data Injection Attacks in Smart Grid using Kalman FilterKebina Manandhar, Xiaojun Cao, Fei Hu, Yao Liu. 16-20 [doi]
- Characterizing Application Behaviors for classifying P2P trafficDawei Wang, Luoshi Zhang, Zhenlong Yuan, Yibo Xue, Yingfei Dong. 21-25 [doi]
- Dynamic configuration of batch rekeying interval for secure multicast serviceDong-Hyun Je, Han Seok Kim, Yoon Ho Choi, Seung-Woo Seo. 26-30 [doi]
- Emilie: Enhance the power of traffic identificationYiyang Shao, Baohua Yang, Jingjie Jiang, Yibo Xue, Jun Li. 31-35 [doi]
- Optimal hidden SCADA attacks on power grid: A graph theoretic approachDeepjyoti Deka, Ross Baldick, Sriram Vishwanath. 36-40 [doi]
- P2DR: Privacy-Preserving Demand Response system in smart gridsDepeng Li, Zeyar Aung, John R. Williams, Abel Sanchez. 41-47 [doi]
- Techniques for detecting attacks on critical infrastructureUdaya Kiran Tupakula, Vijay Varadharajan. 48-52 [doi]
- Stack protection in packet processing systemsPeng Wu, Tilman Wolf. 53-57 [doi]
- Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networksHasan Cam, Pierre Mouallem. 58-62 [doi]
- Design of reliable virtual infrastructure using local protectionHao Di, Vishal Anand, Hongfang Yu, Lemin Li, Dan Liao, Gang Sun. 63-67 [doi]
- An overlay network construction technique for minimizing the impact of physical network disruption in cloud storage systemsKatsuya Suto, Hiroki Nishiyama, Nei Kato, Takayuki Nakachi, Tatsuya Fujii, Atsushi Takahara. 68-72 [doi]
- Shadow Computing: An energy-aware fault tolerant computing modelBryan N. Mills, Taieb Znati, Rami G. Melhem. 73-77 [doi]
- On the impact of coding parameters on storage requirement of region-based fault tolerant distributed file system designSujogya Banerjee, Arun Das, Anisha Mazumder, Zahra Derakhshandeh, Arunabha Sen. 78-82 [doi]
- Performance analysis of a cognitive-shared channel with GSC diversity under primary outage probabilityRuifeng Duan, Mohammed Elmusrati. 83-87 [doi]
- Effect of primary power fluctuation on ergodic capacity of a secondary user in a spectrum sharing environmentGosan Noh, Sungmook Lim, Yosub Park, Jihaeng Heo, Daesik Hong. 88-92 [doi]
- Markov Model Bank for heterogenous cognitive radio networks with multiple dissimilar users and channelsXiaohua Li, Chengyu Xiong. 93-97 [doi]
- Cross-layer resource allocation for video streaming over OFDMA cognitive radio networks with imperfect cross-link CSIH. Saki, A. Shojaeifard, Mohammad Shikh-Bahaei. 98-104 [doi]
- Optimal threshold configuration with equality based call admission control with cooperative users (mixed loss and delay system)Sumiko Miyata, Katsunori Yamaoka, Hirotsugu Kinoshita. 105-111 [doi]
- Time-based criteria for performance comparison of resource-intensive user tasks in virtual desktopsMikhail Makarov, Prasad Calyam, Andrei M. Sukhov, Vitaly Samykin. 112-116 [doi]
- Coverage and capacity analysis of hybrid home networksPeerapol Tinnakornsrisuphap, Punyaslok Purkayastha, Bibhu Mohanty. 117-123 [doi]
- Fair queueing without per-flow queues: A Virtual Queueing MachineGary Chang, C. C. Lee. 124-130 [doi]
- Analysis of realized peer-to-peer streaming topologies by Kronecker graphsUdo R. Krieger, Philipp M. Eittenberger, Alex Borges Vieira. 131-135 [doi]
- Towards real-time processing for application identification of encrypted trafficYuichi Kumano, Shingo Ata, Nobuyuki Nakamura, Yoshihiro Nakahira, Ikuo Oka. 136-140 [doi]
- Quality evaluation of voice over multiple TCP connectionsKozo Satoda, Koichi Nihei, Hiroshi Yoshida. 141-146 [doi]
- Multilevel interleaved Reed-Solomon codes using soft information for magnetic recording channelsIsmail Demirkan, Gregory Silvus. 147-151 [doi]
- Soft intertrack interference cancellation for two-dimensional magnetic recordingElnaz Banan Sadeghian, John R. Barry. 152-156 [doi]
- Adaptive energy-aware free viewpoint video transmission over wireless networksZhi Liu, Jingyun Feng, Yusheng Ji, Yongbing Zhang. 157-162 [doi]
- Renewable energy-aware grooming in IP-over-WDM networksThilo Schondienst, Vinod M. Vokkarane. 163-167 [doi]
- Network aware job scheduling in green data centersDerya Cavdar, Fatih Alagöz. 168-172 [doi]
- A new approach to coding in content-based MANETsJoshua Joy, Yu-Ting Yu, Victor Perez, Dennis Lu, Mario Gerla. 173-177 [doi]
- Millimeter wave cellular channel models for system evaluationTianyang Bai, Vipul Desai, Robert W. Heath. 178-182 [doi]
- A systemic and cognitive approach for IoT securityArbia Riahi, Enrico Natalizio, Yacine Challal, Nathalie Mitton, Antonio Iera. 183-188 [doi]
- Improving QoS in real-time internet applications: from best-effort to Software-Defined NetworksSergei Gorlatch, Tim Humernbrum, Frank Glinka. 189-193 [doi]
- Coding and signal processing for ultra-high density magnetic recording channelsYong Liang Guan, Guojun Han, Lingjun Kong, Kheong Sann Chan, Kui Cai, JingPing Zheng. 194-199 [doi]
- Coding theory for reliable signal processingAditya Vempaty, Yunghsiang S. Han, Lav R. Varshney, Pramod K. Varshney. 200-205 [doi]
- Joint network channel fountain scheme for reliable communication in wireless networksAhasanun Nessa, Michel Kadoch, Bo Rong. 206-210 [doi]
- Type-aware task placement in geo-distributed data centers with low OPEX using data center resizingLin Gu, Deze Zeng, Song Guo, Shui Yu. 211-215 [doi]
- Security from the transparent computing aspectGuojun Wang, Qin Liu, Yang Xiang, Jianer Chen. 216-220 [doi]
- Survivable virtual optical network mapping in flexible-grid optical networksWeisheng Xie, Jason P. Jue, Qiong Zhang, Xi Wang, Qingya She, Paparao Palacharla, Motoyoshi Sekiya. 221-225 [doi]
- Dynamic Spectrum Access: Current state of the art and future challengesAnirudha Sahoo, Michael R. Souryal. 226-230 [doi]
- Micro base station aided vehicular ad hoc networkingIzhak Rubin, Yu-Yu Lin, Andrea Baiocchi, Francesca Cuomo, Pierpaolo Salvo. 231-235 [doi]
- Algorithmic challenges in flexible optical networksE. A. Varvarigos, K. Christodoulopoulos. 236-241 [doi]
- Recent advances and challenges in human-centric multimedia mobile cloud computingEduardo Cerqueira, Euisin Lee, Jui-Ting Weng, Jae-Han Lim, Joshua Joy, Mario Gerla. 242-246 [doi]
- SocialCloaking: A distributed architecture for K-anonymity location privacy protectionRen-Hung Hwang, Fu-Hui Huang. 247-251 [doi]
- Multi-radio heterogeneous networks: Architectures and performanceNageen Himayat, Shu-ping Yeh, Ali Y. Panah, Shilpa Talwar, Mikhail Gerasimenko, Sergey D. Andreev, Yevgeni Koucheryavy. 252-258 [doi]
- Reduction of data prevention cost and improvement of reliability in MLC NAND flash storage systemDanghui Wang, Jie Guo, Kai Bu, Yiran Chen. 259-263 [doi]
- Connectivity as a Service: Towards optical-based network virtualizationYang Wang 0016, Qian Hu, Xiaojun Cao. 264-268 [doi]
- Wide-area overlay networking to manage science DMZ accelerated flowsPrasad Calyam, Alex Berryman, Erik Saule, Hari Subramoni, Paul Schopis, Gordon Springer, Ümit V. Çatalyürek, D. K. Panda. 269-275 [doi]
- Cross-layer optimization for satellite-terrestrial heterogeneous networksJihwan P. Choi, Changhee Joo. 276-281 [doi]
- Optimal Joint Viterbi Detector Decoder (JVDD) over AWGN/ISI channelKheong Sann Chan, Sari Shafidah Binte Shafiee, Elidrissi Moulay Rachid, Yong Liang Guan. 282-286 [doi]
- Battery free wireless sensor networks: Theory and applicationsAli Abedi. 287-291 [doi]
- The cost of loop free alternates in IP over WDMCiril Rozic, Galen H. Sasaki. 292-297 [doi]
- Adding dimensions to wireless systems with orientation-aware devices and reconfigurable antennasD. Tunon, Jean-François Chamberland, Gregory H. Huff. 298-302 [doi]
- Adaptive coverage for high data rate LTE networksRami Sabouni, Roshdy H. M. Hafez, Marc St-Hilaire. 303-307 [doi]
- Evolution to future DWDM centric multi service converged metro networkLynn Lu, Zere Ghebretensae, Björn Skubic, Fabio Cavaliere, Xiaoxia Zhou, Guangquan Wang. 308-311 [doi]
- Vertical constrained coding for phase-change memory with thermal crosstalkKui Cai. 312-316 [doi]
- Highly accurate video object identification utilizing hint informationLiang Peng, Yimin Yang, Xiaojun Qi, Haohong Wang. 317-321 [doi]
- Software-defined cyber-physical multinetworksZhijing Qin, Ngoc Minh Do, Grit Denker, Nalini Venkatasubramanian. 322-326 [doi]
- A socio- and locality-aware overlay for user-centric networkingMartin Florian, Fabian Hartmann, Ingmar Baumgart. 327-333 [doi]
- Some observations on the performance of CCN-FloodingAhmed Waliullah Kazi, Hussein Badr. 334-340 [doi]
- Mapping of delay-sensitive virtual networksKarthikeswar Ivaturi, Tilman Wolf. 341-347 [doi]
- Uplink allocation based on user actions for peer-to-peer Video-on-DemandFilippos Koravos, Leandros Tassiulas. 348-352 [doi]
- Introducing ufo.js: A browser-oriented p2p networkA. Bevilacqua, P. Boemio, S. P. Romano. 353-357 [doi]
- Joint multi-video compression for robot explorationsYu Sun, Michael Turney. 358-362 [doi]
- Human action recognition using meta learning for RGB and depth informationS. Mohsen Amiri, Mahsa T. Pourazad, Panos Nasiopoulos, Victor C. M. Leung. 363-367 [doi]
- Enhancing Cloud Mobile 3D display gaming user experience by asymmetric graphics renderingYao Lu, Yao Liu, Sujit Dey. 368-374 [doi]
- A new rate-complexity-QP algorithm (RCQA) for HEVC intra-picture rate controlLing Tian, Yimin Zhou, Xiaojun Cao. 375-380 [doi]
- Secure trust management for mobile platformsRaimund K. Ege. 381-385 [doi]
- Minimum distortion variance concatenated block codes for embedded source transmissionSuayb S. Arslan. 386-392 [doi]
- DA2RF: A data aggregation algorithm by restricting forwarders for VANETsYuan Yuan, Jie Luo, Wei Yan, Tong Zhao, Shanbo Lu. 393-397 [doi]
- Sober-Drive: A smartphone-assisted drowsy driving detection systemLunbo Xu, Shunyang Li, Kaigui Bian, Tong Zhao, Wei Yan. 398-402 [doi]
- Performance analysis of EDCA with strict priorities broadcast in IEEE802.11p VANETsPing Wang, Fei Wang, Yusheng Ji, Fuqiang Liu, Xinhong Wang. 403-407 [doi]
- SideEye: Mobile assistant for blind spot monitoringSanjeev Singh, Rufeng Meng, Srihari Nelakuditi, Yan Tong, Song Wang. 408-412 [doi]
- FQGwS: A gateway selection algorithm in a hybrid clustered VANET LTE-advanced network: Complexity and performancesGhayet El Mouna Zhioua, Houda Labiod, Nabil Tabbane, Sami Tabbane. 413-417 [doi]
- Performance analysis of an adaptive rate-range control algorithm for VANET safety applicationsMuhammad A. Javed, Jamil Y. Khan. 418-423 [doi]
- Practical provably secure multi-node communicationOmar Ali, Mahmoud F. Ayoub, Moustafa Youssef. 424-428 [doi]
- An effective taxi recommender system based on a spatiotemporal factor analysis modelYu-Ling Hsueh, Ren-Hung Hwang, Yu-Ting Chen. 429-433 [doi]
- Evaluation framework for reconstruction of messages in cooperative coding schemes of multiple-sources and multiple-relaysJin-Taek Seong, Heung-No Lee. 434-438 [doi]
- Optimal routing for bidirectional flows with network coding in asymmetric wireless networksHooman Reisi Dehkordi, Lavy Libman. 439-444 [doi]
- Achieving TCP Reno friendliness in FAST TCP over wide area networksJingyuan Wang, Fei Gao, Jiangtao Wen, Chao Li, Zhang Xiong, Yuxing Han. 445-449 [doi]
- A comparative study of routing metrics for reliable multi-path provisioningRuben Rivera, Jorge Crichigno, Nasir Ghani. 450-454 [doi]
- Performance analysis of multicast routing algorithmsDimitri Papadimitriou, Davide Careglio, Piet Demeester. 455-461 [doi]
- How to transfer flows efficiently via the Internet?Sándor Molnár, Zoltán Móczár, Balázs Sonkoly. 462-466 [doi]
- Robust scheduling and congestion control for flexible queueing networksRamtin Pedarsani, Jean C. Walrand, Yuan Zhong. 467-471 [doi]
- Stochastic queue modeling and key design metrics analysis for solar energy powered cellular networksHeng Wang, Hongjia Li, Zejue Wang, Xin Chen, Song Ci. 472-477 [doi]
- Exact BER analysis of subcarrier QAM and PSK intensity modulations in strong turbulenceMd. Zoheb Hassan, Md. Jahangir Hossain, Julian Cheng. 478-483 [doi]
- Scheduling aware dimensioning for Time-Domain Wavelength Interleaved NetworkBogdan Uscumlic, Yvan Pointurier, Annie Gravey, Philippe Gravey, Luay Alahdab. 484-490 [doi]
- Dynamic anycast in inter-datacenter networks over elastic optical infrastructureLiang Zhang, Zuqing Zhu. 491-495 [doi]
- Reliable light-tree construction with weighted SRLGs in optical networksYi Zhu, Kevin K. Goo. 496-501 [doi]
- Spectrum defragmentation implementation based on software defined networking (SDN) in flexi-grid optical networksXiaosong Yu, Yongli Zhao, Jie Zhang, Lingnan Gao, Jiawei Zhang, Xinbo Wang. 502-505 [doi]
- Lowering power consumption in dedicated tributary protection schemes using Digital Subcarrier Optical NetworksMiguel Razo, Marco Tacca, Andrea Fumagalli, Rongqing Hui. 506-511 [doi]
- Blocking resolution for short flows in optical flow switching networksZhengfeng Qian, Kwok-Wai Cheung. 512-516 [doi]
- Improving smartphone downlink performance and energy efficiency with 3-antenna receive diversityJoseph B. Soriaga, Xiaoyin He, Yu-Chin Ou, Christopher Lott, Rashid Attar. 517-522 [doi]
- Achievable angles between two compressed sparse vectors under RIP-induced norm/distance constraintsLing-Hua Chang, Jwo-Yuh Wu. 523-528 [doi]
- Variance detection for non-coherent impulse radio UWB receiversAidong Yang, Hong Nie, Zhimeng Xu, Zhizhang Chen. 529-533 [doi]
- Beampattern analysis for MIMO radar and telecommunication system coexistenceAwais Khawar, Ahmed Abdel-Hadi, T. Charles Clancy, Robert McGwier. 534-539 [doi]
- Maximizing the lifetime of delay-sensitive sensor networks via joint routing and sleep schedulingYunan Gu, Miao Pan, Wei Li. 540-544 [doi]
- Wireless Sensor Network-based air quality monitoring systemSamer Mansour, Nidal Nasser, Lutful Karim, Asmaa Ali. 545-550 [doi]
- A novel communication mode selection technique for DTN over MANET architectureMasaya Ito, Hiroki Nishiyama, Nei Kato. 551-555 [doi]
- Fairness based dynamic channel allocation in wireless mesh networksJianjun Yang, Yin Wang, Kun Hua, Wei Wang. 556-560 [doi]
- Ubiquitous sensor data collection with mobile usersBrendan Mumey, Gang Xu, Edith C. H. Ngai. 561-566 [doi]
- Identifying malicious behavior in MANET through data path informationDanai Chasaki. 567-572 [doi]
- Message prioritization of epidemic forwarding in delay-tolerant networksXu Liu, Yuanzhu Chen, Cheng Li, Walter Taylor, Jason H. Moore. 573-577 [doi]
- ICAN: Information-Centric context-aware ad-hoc networkYu-Ting Yu, Chris Tandiono, Xiao Li, You Lu, M. Y. Sanadidi, Mario Gerla. 578-582 [doi]
- Performance of p-persistent slotted Aloha for underwater sensor networksYanping Zhang. 583-587 [doi]
- Channel assignment in cognitive wireless sensor networksMihaela Cardei, Amalya Mihnea. 588-593 [doi]
- Ensemble Empirical Mode Decomposition for time series prediction in wireless sensor networksGagan Goel, Dimitrios Hatzinakos. 594-598 [doi]
- Online data-centric anomaly detection framework for sensor network deploymentsGiovani Rimon Abuaitah, Bin Wang. 599-604 [doi]
- A globally optimal Neyman-Pearson test for hard decisions fusion in cooperative spectrum sensingAhmed M. Alaa, Omar A. Nasr. 605-610 [doi]
- Distributed framework of downlink CoMP MU-MIMO transmission with adaptive mode switch and power allocationZhiyuan Zong, Hui Feng, Tao Yang, Bo Hu. 611-615 [doi]
- A novel power allocation technique for 4G cellular networksSantosh Nagaraj, Mahasweta Sarkar. 616-620 [doi]
- Cross-layer radio resource allocation for multi-service networks of heterogeneous trafficA. Shojaeifard, H. Saki, M. M. Mahyari, Mohammad Shikh-Bahaei. 621-626 [doi]
- Performance of amplify-and-forward relay networks with interference-limited destination in rician fading environmentsAnas M. Salhab, Fawaz S. Al-Qahtani, Salam A. Zummo, Hussein M. Alnuweiri. 627-631 [doi]
- Link adaptation in closed-loop coded MIMO systems with LMMSE-IC based turbo receiversBaozhu Ning, Raphaël Visoz, Antoine O. Berthet. 632-638 [doi]
- On the marginal area under the receiver operating characteristics of diversity energy detectors in generalized fading channelsEyidayo Adebola, Abiodun Olaluwe, Annamalai Annamalai. 639-643 [doi]
- Achievable rate of a two-way relay channel with structured code under Rayleigh fadingYouvaraj T. Sagar, Jie Yang 0021, Hyuck M. Kwon, Wooseok Nam. 644-648 [doi]
- Stochastic geometry analysis of the average error probability of downlink cellular networksPeng Guan, Marco Di Renzo. 649-655 [doi]
- Network coding in multiple access relay channel with multiple antenna relayLili Wei, Wen Chen 0001, Rose Qingyang Hu, Geng Wu. 656-661 [doi]
- Performance analysis of Spatial Modulation MIMO in a poisson field of interferersWei Lu, Marco Di Renzo. 662-668 [doi]
- Performance analysis of coherently detected FFH/BPSK with maximal ratio combining receiver over Rayleigh fading channel with multitone jamming and imperfect channel estimationYishan He, Yufan Cheng, Gang Wu, Shaoqian Li. 669-673 [doi]
- Spectrum sharing between public safety and commercial users in 4G-LTEHaya Shajaiah, Ahmed Abdel-Hadi, Charles Clancy. 674-679 [doi]
- Chaos-based modulation for blind and coherent signal detection in non-cooperative TDD cellular networks with large antenna arraysJose Luis Lagunas Morales, Sébastien Roy. 680-685 [doi]
- Two-way cyclotomic orthogonal space-time transmission scheme for asynchronous cooperative systemsYudong Ma, Hua Jiang, Sidan Du. 686-690 [doi]
- Coexistence management for heterogeneous networks in white spacesKarim Khalil, Golnaz Farhadi, Akira Ito. 691-697 [doi]
- On relay assignment strategy in wireless cellular environmentChun-Lin Wu, Tsung-Nan Lin, Hsiun-Fu Liu, Zanyu Chen. 698-703 [doi]
- SODCA: A Self-Organized Distributed Channel Access scheme for IEEE 802.11 networksYoussef El Hajj Shehadeh, Mohamad Hotait, Dieter Hogrefe. 704-709 [doi]
- Wide-area centralized radio resource management for DCF-based multi-hop ad hoc wireless networksShinichi Miyamoto, Naoki Hayata, Seiichi Sampei, Wenjie Jiang. 710-715 [doi]
- Concurrency in polygonally arranged wireless Data Centers with all line-of-sight linksHars Vardhan, Ravi Prakash. 716-720 [doi]
- Full duplex device to device communication in cellular networksSanghoon Kim, Wayne E. Stark. 721-725 [doi]
- Acceleration and visualization of Dynamic Network OptimizationYuanzhou Ye, Oswaldo Cadenas, Graham M. Megson. 726-730 [doi]
- Reducing power consumption in LTE data scheduling with the constraints of channel condition and QoSLi-Ping Tung, Ying-Dar Lin, Yu-Hsien Kuo, Yuan-Cheng Lai, Krishna M. Sivalingam. 731-735 [doi]
- Aggregating Internet access in a mesh-backhauled network through MPTCP proxyingThanh-Hieu Nong, Ricky Wong, Wahab Almuhtadi, Jordan Melzer. 736-742 [doi]
- Cost analysis of movement-based location update scheme using an approach of embedded Markov chainXian Wang, Xianfu Lei, Rose Qingyang Hu, Geng Wu. 743-749 [doi]
- Downlink resource allocation with cooperative transmission in EPON-WiMAX integrated networkShang-Hsiu Tien, Hung-Yi Teng, Ren-Hung Hwang. 750-754 [doi]
- FastBeam: Practical fast beamforming for indoor environmentsChao-Fang Shih, Raghupathy Sivakumar. 755-760 [doi]
- Energy detection of unknown deterministic signals in κ-μ and η-μ generalized fading channels with diversity receiversAnnamalai Annamalai, Abiodun Olaluwe. 761-765 [doi]
- Load balancing mechanism for Proxy Mobile IPv6 networks: An IP multicast perspectiveTien-Thinh Nguyen, Christian Bonnet. 766-770 [doi]
- Full-duplex cooperative transmission scheduling in fast-fading MIMO relaying wireless networksQian Gao, Gang Chen 0007, Linchao Liao, Yingbo Hua. 771-775 [doi]
- OTRA-THS MAC to reduce Power Outage Data Collection Latency in a smart meter networkShravan Garlapati, Teja Kuruganti, R. Michael Buehrer, Jeffrey H. Reed. 776-781 [doi]
- PHY-layer authentication using hierarchical modulation and duobinary signalingVireshwar Kumar, Jung-Min Park 0001, T. Charles Clancy, Kaigui Bian. 782-786 [doi]
- PBC: A novel method for identifying QQ trafficXiaoxian Chen, Zhenlong Yuan, Yibo Xue. 787-791 [doi]
- Adaptive load allocation for combining Anomaly Detectors using controlled skipsMario Berger, Felix Erlacher, Christoph Sommer, Falko Dressler. 792-796 [doi]
- An efficient flow-based botnet detection using supervised machine learningMatija Stevanovic, Jens Myrup Pedersen. 797-801 [doi]
- Social network privacy measurement and simulationYong Wang, Raj Kumar Nepali, Jason Nikolai. 802-806 [doi]
- A comprehensive framework for detecting and preventing VoIP fraud and misuseDirk Hoffstadt, Erwin P. Rathgeb, Matthias Liebig, Ralf Meister, Yacine Rebahi, Tran Quang Thanh. 807-813 [doi]
- Coverage aspects of cooperative multi-hop line networks in correlated shadowed environmentMudasar Bacha, Syed Ali Hassan. 814-818 [doi]
- Minimizing channel rental costs for topology control in multihop wireless networksIvan R. Judson, Brendan Mumey. 819-824 [doi]
- Proposal of ad-hoc multicasting based on OFDM cooperative communicationKatsuhiro Naito, Kazuo Mori, Hideo Kobayashi. 825-830 [doi]
- Opportunistic large array with limited participation: An energy-efficient cooperative multi-hop networkRafay Iqbal Ansari, Syed Ali Hassan. 831-835 [doi]
- On Least Expected Transmissions multicasting in wireless networksChristos A. Papageorgiou, Kostas Christodoulopoulos, Nikos Doulamis, Emmanouel A. Varvarigos. 836-841 [doi]
- SMP-Sync: Time synchronization using seawater movement pattern for underwater wireless networksSungryul Kim, Younghwan Yoo. 842-846 [doi]
- A software defined wireless sensor networkToshiaki Miyazaki, Shoichi Yamaguchi, Koji Kobayashi, Junji Kitamichi, Song Guo, Tsuneo Tsukahara, Takafumi Hayashi. 847-852 [doi]
- Distributed RSS-based localization in wireless sensor networks using convex relaxationSlavisa Tomic, Marko Beko, Rui Dinis, Miroslava Raspopovic. 853-857 [doi]
- Reliable multihop intra-cluster communication for Wireless Sensor NetworksLina Xu, Michael J. O'Grady, Gregory M. P. O'Hare, Rem W. Collier. 858-863 [doi]
- Using network traffic to infer power levels in wireless sensor nodesLanier Watkins, Garth V. Crosby, Afsana Sharmin. 864-870 [doi]
- Use of radio propagation maps in a single moving beacon assisted localization in MANETsJoseph Miles, Suresh Muknahallipatna, Robert F. Kubichek, J. E. McInroy, H. Muralidhara. 871-877 [doi]
- High-throughput programmable systolic array FFT architecture and FPGA implementationsJ. Greg Nash. 878-884 [doi]
- Towards easier compliance with out-of-band emissions regulationsAhmed Selim, Arman Farhang, Linda Doyle. 885-888 [doi]
- An ultra-high speed OFDMA system for optical access networksMichael Dreschmann, Joachim Meyer, Philipp C. Schindler, Rene Schmogrow, Juerg Leuthold, Wolfgang Freude, Jürgen Becker. 889-894 [doi]
- DS-Dedupe: A scalable, low network overhead data routing algorithm for inline cluster deduplication systemZhen Sun, Nong Xiao, Fang Liu, Yinjin Fu. 895-899 [doi]
- PXFS: A persistent storage model for extreme ScaleShuangyang Yang, Maciej Brodowicz, Walter B. Ligon III, Hartmut Kaiser. 900-906 [doi]
- Reliability challenges for storing exabytesAhmed Amer, Darrell D. E. Long, S. J. Thomas Schwarz. 907-913 [doi]
- An analytical QoS model for IEEE 802.11-based single and multihop wireless networksSajjad Pourmohammad, Reza Soosahabi, Dmitri D. Perkins, Afef Fekih. 914-920 [doi]
- A blocking probability estimator for the multi-application and multi-resource constraint problemShuyi Yan, Miguel Razo, Marco Tacca, Andrea Fumagalli. 921-926 [doi]
- Congestion control in Flow-Aware Resilient Multi-ring NetworksJerzy Domzal. 927-931 [doi]
- Making inter-domain routing power-aware?Junxiao Shi, Beichuan Zhang. 932-938 [doi]
- Emerging cyberworld attack vectors: Modification, customization, secretive communications, and digital forensics in PC video gamesMichael Ebrahimi, Lei Chen. 939-944 [doi]
- Best relay selection for underlay cognitive radio systems with collision probability minimizationYahya H. Ezzeldin, Ahmed Sultan, Moustafa Youssef. 945-949 [doi]
- Reduced complexity QoS aware resource allocation technique for MISO-OFDMA systemsMahmoud M. Selim, Said Elnoubi, Hossam M. H. Shalaby, Osamu Muta, Hiroshi Furukawa. 950-954 [doi]
- Optimal primary-secondary user pairing and power allocation in cognitive cooperative multiple access channelsSaygin Baksi, Onur Kaya. 955-960 [doi]
- Antenna array design using generalized fitness functionsRobert F. Kubichek, Srinivasa Yasasvy Sateesh Bhamidipati, Suresh Muknahallipatna. 961-965 [doi]
- Antenna array geometry for mobile ad-hoc networksRobert F. Kubichek, Srinivasa Yasasvy Sateesh Bhamidipati, Suresh Muknahallipatna. 966-970 [doi]
- A RESTfull architecture for enabling rapid development and deployment of companion robot applicationsRazieh Safaripour, Ferhat Khendek, Roch H. Glitho, Fatna Belqasmi. 971-976 [doi]
- Hybrid Peer-to-Peer DNSRicardo Sancho, Ricardo Lopes Pereira. 977-981 [doi]
- Big Data as an e-Health ServiceW. Liu, E. K. Park. 982-988 [doi]
- Hypervisor-based cloud intrusion detection systemJason Nikolai, Yong Wang. 989-993 [doi]
- CCF: Fast and scalable connected component computation in MapReduceHakan Kardes, Siddharth Agrawal, Xin Wang, Ang Sun. 994-998 [doi]
- Hierarchical management architecture and testbed for mobile video service optimizationTiia Ojanperä, Markus Luoto, Mikko Uitto, Heli Kokkoniemi-Tarkkanen. 999-1005 [doi]
- A rate adaptation approach for streaming multiview plus depth contentBasak Oztas, Mahsa T. Pourazad, Panos Nasiopoulos, Iraj Sodagar, Victor C. M. Leung. 1006-1010 [doi]
- Coherent PONs for next generation access: OIDMA versus OCDMAEslam A. El-Fiky, Ziad A. El-Sahn, Hossam M. H. Shalaby. 1011-1015 [doi]
- Greedy Failure-Carrying PacketsChristoph Werle, Oliver P. Waldhorst. 1016-1022 [doi]
- Persistent dataset generation using real-time operative frameworkMaher Salem, Sven Reissmann, Ulrich Buehler. 1023-1027 [doi]
- A novel method for estimating the variable and constant components of one-way delays without using the synchronized clocksJun Liu. 1028-1033 [doi]
- A utility proportional fairness approach for resource allocation in 4G-LTEAhmed Abdel-Hadi, Charles Clancy. 1034-1040 [doi]
- Advance bandwidth reservation with deadline constraint in high-performance networksPoonam Dharam, Chase Qishi Wu, Yongqiang Wang. 1041-1045 [doi]
- Low complexity all-optical network coder architectureEric D. Manley. 1046-1050 [doi]
- A dual-mode message delivery system with time constrained paging mechanismTsang-Ling Sheu, Hsu-Ching Cheng. 1051-1055 [doi]
- Packet loss consideration of P2P-based VoD system with interleaved video frame distributionChing-Lung Chang, Chi-Han Hung. 1056-1060 [doi]
- Genetic algorithm-based energy efficient multicast scheduling for WiMAX relay networksZi-Tsan Chou, Yu-Jen Hou. 1061-1065 [doi]
- Design and implementation of sequential repair and backup routing protocol for wireless mesh networkJih-Ching Chiu, Chun-Yao Zheng, Yao-Chin Huang, Kai-Ming Yang. 1066-1070 [doi]
- Quick event detection and reporting in low-duty-cycled wireless sensor networksMeng-Shiuan Pan, Ping-Lin Liu. 1071-1075 [doi]
- Multi-channel cluster PAN for TVWS bandIn Jang, Kwang-il Hwang. 1076-1080 [doi]
- Pairwise key distribution scheme for two-tier sensor networksKanwalinderjit Kaur Gagneja. 1081-1085 [doi]
- A geocasting application for ambulance servicePei-Hsuan Lee, Tsung-Chuan Huang. 1086-1090 [doi]
- Biometric gait recognition based on wireless acceleration sensor using k-nearest neighbor classificationSangil Choi, Ik-Hyun Youn, Richelle LeMay, Scott Burns, Jong-Hoon Youn. 1091-1095 [doi]
- A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networksFei Wang, Yujun Zhang, Yongjun Xu, Lin Wu, Boyu Diao. 1096-1102 [doi]
- Compression/transmission power allocation in multimedia Wireless Sensor NetworksMing Yang, Lei Chen, Weiqiang Xiong. 1103-1107 [doi]
- Generative models for cellular social networksDeepjyoti Deka, Sriram Vishwanath. 1108-1112 [doi]
- Distributed dynamic channel assignment in wireless networksChadi Kari, Narasimha Shashidhar, Sotiris Kentros. 1113-1117 [doi]