Abstract is missing.
- Optimizing vertical sectorization for high-risesJoydeep Acharya, Salam Akoum. 1-5 [doi]
- Limited channel feedback for RF lens antenna based massive MIMO systemsTaehoon Kwon, Yeon-Geun Lim, Chan-Byoung Chae. 6-10 [doi]
- Experimental investigation of elevation angles and impacts on channel capacity in urban microcellChun Pan, Jianhua Zhang. 11-15 [doi]
- 3-Dimensional channel characteristics on 2-dimensional active array antennasHyoungju Ji, Choelkyu Shin, Younsun Kim, Young-Han Nam. 16-20 [doi]
- MMSE-beamforming for multi-user multiple-input multiple-output systems with distributed antennasJing Zhao, Jingxian Wu, Pingzhi Fan. 21-25 [doi]
- A preliminary 3D mm wave indoor office channel modelShu Sun, Theodore S. Rappaport, Timothy A. Thomas, Amitava Ghosh. 26-31 [doi]
- Multiuser CQI prediction based on quantization error feedback for massive MIMO systemsTaehyoung Kim, Kyungsik Min, Sooyong Choi. 32-36 [doi]
- Enhancing LTE-Advanced network performance using active antenna systemsMeilong Jiang, Moon Il Lee, Ananth V. Kini, Mohsen Hosseinian, Janet Stern-Berkowitz. 37-41 [doi]
- Enabling 3D MIMO in LTE-Advanced - From the CSI acquisition perspectiveYu Zhang, Chao Wei, Ruiming Zheng, Neng Wang, Jilei Hou. 42-46 [doi]
- Practical channel acquisition for massive MIMO systems in LTERunhua Chen, Qiubin Gao, Hui Li, Rakesh Tamrakar, Shaohui Sun. 47-51 [doi]
- Remote mobile screen (RMS): An approach for secure BYOD environmentsSantiago Gimenez Ocano, Byrav Ramamurthy, Yong Wang. 52-56 [doi]
- An effective access control scheme for preventing permission leak in AndroidLongfei Wu, Xiaojiang Du, Hongli Zhang. 57-61 [doi]
- Effective deployment of monitoring points on social networksYuanyuan Bao, Wenting Huang, Chengqi Yi, Jingchi Jiang, Yibo Xue, Yingfei Dong. 62-66 [doi]
- Analysis of Facebook steganographic capabilitiesNathaniel D. Amsden, Lei Chen. 67-71 [doi]
- A practical approach to the attestation of computational integrity in hybrid cloudAndrew Pawloski, Longfei Wu, Xiaojiang Du, Lijun Qian. 72-76 [doi]
- Early detection of DDoS attacks against SDN controllersSeyed Mohammad Mousavi, Marc St-Hilaire. 77-81 [doi]
- Malware detection in the cloud under Ensemble Empirical Mode DecompositionAngelos K. Marnerides, Petros Spachos, Periklis Chatzimisios, Andreas U. Mauthe. 82-88 [doi]
- Loc-Auth: Location-enabled authentication through attribute-based encryptionMarcos Portnoi, Chien-Chung Shen. 89-93 [doi]
- A personalized two-tier cloaking scheme for privacy-aware location-based servicesBen Niu, Xiaoyan Zhu, Weihao Li, Hui Li, Yingjuan Wang, Zongqing Lu. 94-98 [doi]
- On simulation studies of jamming threats against LTE networksSulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, Robert F. Erbacher, Hasan Cam. 99-103 [doi]
- Analysis of data center SDN controller architectures: Technology and business impactsRam Ramki Krishnan, Norival Figueira. 104-109 [doi]
- Performance comparison of parallel graph coloring algorithms on BSP model using hadoopNishant M. Gandhi, Rajiv Misra. 110-116 [doi]
- Towards efficient load distribution in big data cloudZhi Liu, Xiang Wang, Weishen Pan, Baohua Yang, Xiaohe Hu, Jun Li. 117-122 [doi]
- Ultimate control and security over data localization in the cloudFarah Kandah, Adrian Powell. 123-127 [doi]
- Optimizing channel access for bandwidth versus latency in 802.11ac WLANsBushra Anjum. 128-132 [doi]
- Content placement for video streaming over cellular networksZohar Naor, Sajal K. Das, Mayank Raj. 133-137 [doi]
- An optimal resource allocation with joint carrier aggregation in 4G-LTEAhmed Abdel-Hadi, Charles Clancy. 138-142 [doi]
- Dynamic spectrum access for primary operators: Exploiting LTE-A carrier aggregationKhaled Qorany Abdel Faded, Khaled M. F. Elsayed, Ahmed Khattab, Fadel Digham. 143-147 [doi]
- Slow start algorithm for mobile broadband networks including delay unrelated to network congestionTomofumi Koyama, Katsunori Aoki. 148-152 [doi]
- IEEE 802.11 Wi-Fi access point density estimation with capture-recapture modelsAndreas Achtzehn, Ljiljana Simic, Marina Petrova, Petri Mähönen. 153-159 [doi]
- Treatment-based traffic classification for residential wireless networksFeng Li, Mark Claypool, Robert E. Kinicki. 160-165 [doi]
- CORB: Context-aware opportunistic resource-based routing for stationary wireless sensor networksMina Elias, Ahmed Khattab, Khaled M. F. Elsayed. 166-170 [doi]
- A method to improve signal quality in wireless ad-hoc networks with limited mobilityNicholas J. Gurbhoo, Robert F. Kubichek, Suresh Muknahallipatna, Jeff Clune. 171-175 [doi]
- A distributed heuristic solution to the target identifiability problem in directional sensor networksWilson M. Tan, Stephen A. Jarvis. 176-182 [doi]
- Optimum power and rate allocation in cluster based video sensor networksAisha Arar, Amr A. El-Sherif, Amr Mohamed, Victor C. M. Leung. 183-188 [doi]
- Transmission policies for an energy harvesting device with a data queueAlessandro Biason, Michele Zorzi. 189-195 [doi]
- Programming distributed applications with symbolic reasoning on WSNsSalvatore Gaglio, Giuseppe Lo Re, Gloria Martorella, Daniele Peri. 196-201 [doi]
- On reducing routing overhead and redundancy in mobile ad hoc networksYali Wang, J. J. Garcia-Luna-Aceves. 202-206 [doi]
- Energy-efficient cooperative relaying protocol for full-duplex cognitive radio users and delay-aware primary usersAhmed El-Shafie, Tamer Khattab. 207-213 [doi]
- On spectrum sharing between energy harvesting cognitive radio users and primary usersAhmed El-Shafie, Mahmoud Ashour, Tamer Khattab, Amr Mohamed. 214-220 [doi]
- Optimal cooperative cognitive relaying and spectrum access for an energy harvesting cognitive radio: Reinforcement learning approachAhmed El Shane, Tamer Khattab, Hussein Saad, Amr Mohamed. 221-226 [doi]
- Can user gender and recommendation performance be preserved simultaneously?Tingting Feng, Yuchun Guo, Yishuai Chen. 227-231 [doi]
- TV signal classification using fuzzy inference fusionMariam Nabil, Mustafa ElNainay, Mohamed Rizk. 232-236 [doi]
- Spectrum occupancy analysis of cooperative relaying technique for cognitive radio networksMohamed Abdelraheem, Mustafa El-Nainay, Scott F. Midkiff. 237-241 [doi]
- Optimal spectrum access for a rechargeable cognitive radio user based on energy buffer stateAhmed El-Shafie, Mahmoud Ashour, Amr Mohamed, Tamer Khattab. 242-247 [doi]
- Radar in-band interference effects on macrocell LTE uplink deployments in the U.S. 3.5 GHz bandMo Ghorbanzadeh, Eugene Visotsky, Prakash Moorut, Weidong Yang, Charles Clancy. 248-254 [doi]
- A formal analysis of conservative update based approximate countingGil Einziger, Roy Friedman. 255-259 [doi]
- Distributed network flow optimization algorithm with tie-set control based on coloring for SDNGenya Ishigaki, Norihiko Shinomiya. 260-264 [doi]
- Admission control in Flow-Aware Multi-Topology Adaptive RoutingJerzy Domzal, Robert Wójcik, Dawid Kowalczyk, Piotr Gawlowicz, Piotr Jurkiewicz, Andrzej Kamisinski. 265-269 [doi]
- Uplink power optimized in-network content caching for HetNetsMelike Erol-Kantarci. 270-274 [doi]
- An optimal application-aware resource block scheduling in LTETugba Erpek, Ahmed Abdel-Hadi, T. Charles Clancy. 275-279 [doi]
- A heuristic algorithm for joint power-delay minimization in green wireless access networksFarah Moety, Samer Lahoud, Bernard Cousin, Kinda Khawam. 280-286 [doi]
- Energy and performance management in large data centers: A queuing theory perspectiveDan Liao, Ke Li, Gang Sun, Vishal Anand, Yu Gong, Zhi Tan. 287-291 [doi]
- Implementing an optimal rate allocation tuned to the user quality of experienceMo Ghorbanzadeh, Ahmed Abdel-Hadi, Ashwin Amanna, Johanna Dwyer, T. Charles Clancy. 292-297 [doi]
- Stochastic delay analysis of an architecture integrating VANET with LTE networksSuling Ou, Lei Lei, Kan Zheng, Ying Li. 298-302 [doi]
- Vehicle data activity quantification using spatio-temporal GIS on modelling smart citiesMichael Jensen, José M. Gutiérrez López, Jens Myrup Pedersen. 303-307 [doi]
- A new approach to switch fabrics based on mini-router grids and output queueingTurhan Karadeniz, Ali Dabirmoghaddam, Yusuf Goren, J. J. Garcia-Luna-Aceves. 308-314 [doi]
- Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networksSunho Lim, Lauren M. Huie. 315-319 [doi]
- Efficient information sharing among distributed controllers of OpenFlow network with bi-connectivityJunichi Nagano, Norihiko Shinomiya. 320-324 [doi]
- Novel timing synchronization technique for public safety communication systems employing heterogeneous cognitive radioMasafumi Moriyama, Takeo Fujii. 325-330 [doi]
- A novel application of Massive MIMO: Massive Antenna Systems for Wireless Entrance (MAS-WE)Kazuki Maruta, Atsushi Ohta, Satoshi Kurosaki, Takuto Arai, Masataka Iizuka. 331-335 [doi]
- Vertical beamforming for three-dimensional user placementSalam Akoum, Joydeep Acharya. 336-340 [doi]
- Frequency domain synchronization and cell search in 3GPP LTE SystemsEssam A. Sourour, Mohannad Amer. 341-345 [doi]
- Joint source and relay beamforming design for general MIMO relaying broadcast channelsYun Li, Haibin Wan. 346-351 [doi]
- Asymptotic noisy reference losses of subcarrier BPSK and QPSK systems in lognormal fadingXuegui Song, Fan Yang, Julian Cheng, Naofal Al-Dhahir. 352-356 [doi]
- Bee system-based energy efficient base station operation in mobile cellular networksSanjay Kumar Biswash, Mahasweta Sarkar, Santosh Nagaraj. 357-362 [doi]
- Storming the cloud: A look at denial of service in the Google App EngineBenjamin Ferriman, Tarfa Hamed, Qusay H. Mahmoud. 363-368 [doi]
- Ethernet card discrimination using unintentional cable emissions and constellation-based fingerprintingTimothy J. Carbino, Michael A. Temple, Trevor J. Bihl. 369-373 [doi]
- Evaluation of an entropy-based k-anonymity model for location based servicesVarun Sharma, Chien-Chung Shen. 374-378 [doi]
- e-Health security context management serviceW. Liu, E. K. Park, S. S. Zhu. 379-383 [doi]
- A cognitive engine architecture for professional wireless microphone systemsChristoph König, María Dolores Pérez Guirao. 384-389 [doi]
- A new perspective on satellite communications via incompatible signal polarization features and wavefront multiplexing techniquesDonald C. D. Chang, Joe Lee, Tzer-Hso Lin. 390-394 [doi]
- The scrambler attack: A robust physical layer attack on location privacy in vehicular networksBastian Bloessl, Christoph Sommer, Falko Dressler, David Eckhoff. 395-400 [doi]
- Write-once-memory codes by source polarizationXudong Ma. 401-405 [doi]
- SDN Multi-Domain Orchestration and Control: Challenges and innovative future directionsNorival Figueira, Ram Ramki Krishnan. 406-412 [doi]
- Enhanced dual Bloom filter based on SSD for efficient directory parsing in cloud storage systemManyun Kim, Kyung Hwan Oh, Hee Yong Youn, Sang-Won Lee. 413-417 [doi]
- Real-time CPU based H.265/HEVC encoding solution with x86 platform technologyYang Lu, Qi Zhang, Bin Wei. 418-421 [doi]
- An image coder for the presentation of single-color productsWai C. Chu. 422-426 [doi]
- An image coder for the presentation of products with multiple color choicesWai C. Chu. 427-432 [doi]
- Evaluating pattern for group interactions using second screensPartha Mukherjee, Bernard J. Jansen. 433-437 [doi]
- On effects of imperfect channel state information on null space based cognitive MIMO communicationShabnam Sodagari. 438-444 [doi]
- Opportunistic spectrum sharing using dumb basis patterns: The Line-of-Sight interference scenarioAhmed M. Alaa, Mahmoud H. Ismail, Hazim Tawfik. 445-450 [doi]
- Safety message dissemination in NLOS environments of intersection using TV white spaceJae-Han Lim, Katsuhiro Naito, Ji-Hoon Yun, Danijela Cabric, Mario Gerla. 451-455 [doi]
- Centralized power allocation policy design for cognitive secondary users under a primary type-II HARQ processRoghayeh Joda, Michele Zorzi. 456-461 [doi]
- Power-optimal feedback-based random spectrum access for an energy harvesting cognitive userMahmoud Ashour, Ahmed El-Shafie, Amr Mohamed, Tamer Khattab. 462-468 [doi]
- Towards optimal power control for delay-constrained cognitive radio networksIman Abdalla, Tamer A. ElBatt, Mohammed Nafie, Fadel F. Digham. 469-475 [doi]
- Capacity bounds of finite secondary cognitive radio networksOsama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua. 476-481 [doi]
- A grass-root based radio environment data collections in user participation for improving frequency utilization of cognitive radio and heterogeneous networksYun Li. 482-486 [doi]
- Robust optimization for home-load scheduling under price uncertainty in smart gridsLimei Guo, Hsiao-Chun Wu, Hongting Zhang, Tian Xia, Shahab Mehraeen. 487-493 [doi]
- Network bandwidth utilization forecast model on high bandwidth networksWuchert Yoo, Alex Sim. 494-498 [doi]
- A utility proportional fairness radio resource block allocation in cellular networksMo Ghorbanzadeh, Ahmed Abdel-Hadi, Charles Clancy. 499-504 [doi]
- Enhancing the quality level support for real-time multimedia applications in software-defined networksFrancesco Ongaro, Eduardo Cerqueira, Luca Foschini, Antonio Corradi, Mario Gerla. 505-509 [doi]
- Controlling SIP server overload with priority based request schedulingDemir Y. Yavas, Ibrahim Hökelek, Bilge Günsel. 510-514 [doi]
- A ZigBee based reliable and efficient power metering system for energy management and controllingOktay Cetinkaya, Özgür B. Akan. 515-519 [doi]
- Application based energy consumption characterization of IEEE 802.11n/ac access pointsMehmet Ozgun Demir, Günes Karabulut-Kurt, Mehmet Karaca. 520-524 [doi]
- Green design for smart antenna system using iterative beamforming algorithmsRashi Mehrotra, Ranjan Bose. 525-529 [doi]
- Router power reduction by active performance control realized with support vector machinesHiroshi Kawase, Hiroshi Hasegawa, Ken-ichi Sato. 530-535 [doi]
- Thermal-aware energy-efficient task scheduling for DVFS-enabled data centersDong Han, Tao Shu. 536-540 [doi]
- MAC protocol for wireless sensor networks with on-demand RF recharging of sensor nodesMohammad Shahnoor Islam Khan, Jelena V. Misic, Vojislav B. Misic. 541-545 [doi]
- A cost-efficiency method on beacon nodes placement for wireless localizationZimu Yuan, Wei Li, Junda Zhu, Wei Zhao. 546-550 [doi]
- Compression and data miningDan A. Simovici, Tong Wang, Ping Chen, Dan Pletea. 551-555 [doi]
- Multi-block ADMM for big data optimization in smart gridLanchao Liu, Zhu Han. 556-561 [doi]
- Content wanted: A different shade of D2D communicationsCarla-Fabiana Chiasserini. 562-566 [doi]
- Unmanned aerial vehicles: Communications challenges and future aerial networkingDavid W. Matolak. 567-572 [doi]
- Challenges for cooperative ITS: Improving road safety through the integration of wireless communications, control, and positioningHenk Wymeersch, Gabriel Rodrigues de Campos, Paolo Falcone, Lennart Svensson, Erik G. Ström. 573-578 [doi]
- Optimizing the location deployment of dynamic mobile base stationsSulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, David W. Griffith, Nada Golmie. 579-583 [doi]
- Continuous health condition monitoring by 24×7 sensing and transmission of physiological data over 5-G cellular channelsAmitabh Mishra, Dharma P. Agrawal. 584-590 [doi]
- Challenges in developing intelligent geosystems (and the pros/cons of interdisciplinary research)Tracy Camp, Marc J. Rubin, Santiago Gonzalez. 591-597 [doi]
- Managing competition for (public) resources in human-centric networked environmentsIoannis Stavrakakis, Evangelia Kokolaki. 598-602 [doi]
- Soft decision decoding of RAID stripe for higher endurance of flash memory based solid state drivesRavi Motwani, Chong Ong. 603-607 [doi]
- A study of polar codes for MLC NAND flash memoriesYue Li, Hakim Alhussien, Erich F. Haratsch, Anxiao Andrew Jiang. 608-612 [doi]
- Modified trellis-based Min-max decoder for non-binary LDPC codesXinmiao Zhang. 613-617 [doi]
- Scalable user intent mining using a multimodal Restricted Boltzmann MachineYue Shang, Wanying Ding, Mengwen Liu, Xiaoli Song, Tony Hu, Yuan An, Haohong Wang, Lifan Guo. 618-624 [doi]
- Signal and information processing in mobile cloud computing: Trends and challengesChia-Yu Lin, Li-Chun Wang. 625-629 [doi]
- The affect-aware cityBenjamin Guthier, Rana Abaalkhail, Rajwa Alharthi, Abdulmotaleb El-Saddik. 630-636 [doi]
- Sensing strategies for channel discovery in Cognitive Radio NetworksAbdulkadir Celik, Ramzi Saifan, Ahmed E. Kamal. 637-641 [doi]
- Spectrum assignment in rings with shortest-path routing: Complexity and approximation algorithmsSahar Talebi, Furqan Alam, Iyad Katib, George N. Rouskas. 642-647 [doi]
- Power sensor networks by wireless energy - Current status and future trendsYuanyuan Yang, Cong Wang, Ji Li. 648-652 [doi]
- Data-driven QoE optimization techniques for multi-user wireless networksDaniele Munaretto, Daniel Zucchetto, Andrea Zanella, Michele Zorzi. 653-657 [doi]
- Queueing theory as a modeling tool for bacterial interaction: Implications for microbial fuel cellsUrbashi Mitra, Nicolò Michelusi, Sahand Pirbadian, H. Koorehdavoudi, Mohamed Y. El-Naggar, P. Bogdan. 658-662 [doi]
- Changing health behaviors through social and physical context awarenessGuanling Chen, Xiang Ding, Ke Huang, Xu Ye, Chunhui Zhang. 663-667 [doi]
- Location-based event search in social textsYan Huang, Zhi Liu, Phuc Nguyen. 668-672 [doi]
- Loss aware sample packetization strategy for improvement of body sensor data analysisMing Li, Yu Cao, B. Prabhakaran. 673-678 [doi]
- Elevation domain measurement and modeling of UMa uplink channel with UE on different floorsRuonan Zhang, Lin Cai, Xiaofeng Lu, Pinlu Yang, Jian Zhou. 679-684 [doi]
- AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating systemZili Zha, Min Li, Wanyu Zang, Meng Yu, Songqing Chen. 685-689 [doi]
- On the deployment of information-centric network: Programmability and virtualizationJing Ren, Lemin Li, Huan Chen, Sheng Wang, Shizhong Xu, Gang Sun, Jin Wang, Shucheng Liu. 690-694 [doi]
- VIP: Joint traffic engineering and caching in Named Data NetworksEdmund M. Yeh, Tracey Ho, Ying Cui, Michael Burd, Ran Liu, Derek Leong. 695-699 [doi]
- Exploiting the unexploited of coded caching for wireless content distributionSinong Wang, Xiaohua Tian, Hui Liu. 700-706 [doi]
- Enabling high-level QoS metrics for interactive online applications using SDNSergei Gorlatch, Tim Humernbrum. 707-711 [doi]
- Method for decreasing delay time after bursty loss on handoverYoshiaki Nishikawa, Takahiro Shiroshima. 712-716 [doi]
- Joint optimization of VM placement and request distribution for electricity cost cut in geo-distributed data centersLin Gu, Deze Zeng, Song Guo, Baoliu Ye. 717-721 [doi]
- Video streaming over software defined networks with server load balancingSelin Yilmaz, A. Murat Tekalp, Bige D. Unluturk. 722-726 [doi]
- Using link awareness for HTTP Adaptive Streaming over changing wireless conditionsVishwanath Ramamurthi, Ozgur Oyman, Jeffrey R. Foerster. 727-731 [doi]
- Bandwidth allocation for video delivery in wireless networks with QoE constraints for spatially random user populationWei Song, Kai Dong. 732-736 [doi]
- QoE-aware adaptive bitrate video streaming over mobile networks with caching proxyKai Dong, Jun He, Wei Song. 737-741 [doi]
- An application-layer approach for energy-efficient multimedia streamingYongxin Liu, Mea Wang. 742-748 [doi]
- User-aware DASH over Wi-FiWei Chen, Liangping Ma, Gregory Sternberg, Yuriy A. Reznik, Chien-Chung Shen. 749-753 [doi]
- A hybrid model to extend vehicular intercommunication V2V through D2D architectureEmad Abd-Elrahman, Adel Mounir Sareh Said, Thouraya Toukabri, Hossam Afifi, Michel Marot. 754-759 [doi]
- OmniView: A mobile collaborative system for assisting drivers with a map of surrounding trafficRufeng Meng, Srihari Nelakuditi, Song Wang, Romit Roy Choudhury. 760-765 [doi]
- A fully-distributed directional-to-directional MAC protocol for mobile ad hoc networksJianyu Niu, Ruonan Zhang, Lin Cai, Jianping Yuan. 766-770 [doi]
- FaLL: A fair and low latency queuing scheme for data center networksLin Xue, Chui-Hui Chiu, Suman Kumar, Praveenkumar Kondikoppa, Seung-Jong Park. 771-777 [doi]
- A highly deterministic hashing scheme using bitmap filter for high speed networkingHai Sun, Yan Lindsay Sun, Victor C. Valgenti, Min Sik Kim. 778-784 [doi]
- CORD: Content oriented routing with directoriesJ. J. Garcia-Luna-Aceves, Qian Li, Turhan Karadeniz. 785-790 [doi]
- LG-CDS: Local group connected dominating set for multicasting in MANETsPavel Nekrasov, Denis Fakhriev. 791-795 [doi]
- Network topology inference with partial path informationB. Holbert, Srikar Tati, Simone Silvestri, Thomas F. La Porta, Ananthram Swami. 796-802 [doi]
- Content-aware instantly decodable network coding over wireless networksYasaman Keshtkarjahromi, Hulya Seferoglu, Rashid Ansari, Ashfaq A. Khokhar. 803-809 [doi]
- Scheduling end-to-end flexible resource reservation requests for multiple end sitesLi Shi, Sushant Sharma, Dimitrios Katramatos, Dantong Yu. 810-816 [doi]
- Optimizing circuit allocation for bandwidth reservations in dynamic virtual circuit networksLi Shi, Sushant Sharma, Dimitrios Katramatos, Dantong Yu. 817-823 [doi]
- Investigating the prefix-level characteristics: A case study in an IPv6 networkFuliang Li, Tian Pan, Jiahai Yang, Changqing An, Xingwei Wang, Jianping Wu. 824-829 [doi]
- Boosting multi-socket cache-coherency with low-latency silicon photonic interconnectsPaolo Grani, Robert Hendry, Sandro Bartolini, Keren Bergman. 830-836 [doi]
- UltraFlow: Elastic, flexible and dual-mode long-reach optical access networkShuang Yin, Thomas Shunrong Shen, Leonid G. Kazovsky. 837-841 [doi]
- WA-Method-TLV improves reliability of GMPLS WDM networks against multiple link failuresYue Fei, Yamini Jayabal, Zhen Lu, Miguel Razo, Marco Tacca, Andrea Fumagalli, Rongqing Hui, Gabriele Galimberti, Giovanni Martinelli. 842-846 [doi]
- Light-hierarchy for provisioning multiple multicast requests in sparse splitting WDM networksDinh Danh Le, Fen Zhou, Miklós Molnár. 847-852 [doi]
- Multicast 1+1 protection: The case for simple network codingMirzad Mohandespour, Ahmed E. Kamal. 853-857 [doi]
- Profiling transport performance for big data transfer over dedicated channelsDaqing Yun, Chase Qishi Wu, Nageswara S. V. Rao, Bradley W. Settlemyer, Josh Lothian, Rajkumar Kettimuthu, Venkatram Vishwanath. 858-862 [doi]
- Understanding social effects in online networksHuda Alhazmi, Swapna S. Gokhale, Derek Doran. 863-868 [doi]
- Cascade with varying activation probability model for influence maximization in social networksZhiyi Lu, Yi Long, Victor O. K. Li. 869-873 [doi]
- Performance evaluation of social relation opportunistic routing in dynamic social networksGary K. W. Wong, Yanan Chang, Xiaohua Jia, Kirk H. M. Wong, Wing-Yi Hui. 874-878 [doi]
- Evaluating classification schemes for second screen interactionsPartha Mukherjee, Bernard J. Jansen. 879-883 [doi]
- Compressive sensing and reception for MIMO-OFDM based cognitive radioJingwei Xu, Gwan S. Choi. 884-888 [doi]
- An iterative LR-aided MMSE extended soft MIMO decoding algorithmMehnaz Rahman, Ehsan Rohani, Gwan S. Choi. 889-894 [doi]
- A novel sparse system estimation method based on least squares, ℓ1-norm minimization and shrinkageAlexandre de M. Torturela, Rodrigo C. de Lamare, César A. Medina, Raimundo Sampaio Neto. 895-899 [doi]
- An asynchronous two-way relay system with full delay diversity in time-varying multipath environmentsAhmad Salim, Tolga M. Duman. 900-904 [doi]
- Social caching and content retrieval in Disruption Tolerant Networks (DTNs)Tuan Le, You Lu, Mario Gerla. 905-910 [doi]
- Evaluating the gap between compressive sensing and distributed source coding in WSNMichele Rossi, Mohsen Hooshmand, Davide Zordan, Michele Zorzi. 911-917 [doi]
- Distributed minimum euclidean distance based precoding for wireless sensor networkViet-Hoa Nguyen, Olivier Berder, Charlotte Langlais, Baptiste Vrigneau. 918-923 [doi]
- Multi-channel network coding in tree-based wireless sensor networksMansour Abdulaziz, Robert Simon. 924-930 [doi]
- Stochastic performance trade-offs in the design of real-time wireless sensor networksYunbo Wang, Mehmet C. Vuran, Steve Goddard. 931-937 [doi]
- A delay-aware probability-based MAC protocol for underwater acoustic sensor networksYu Han, Yunsi Fei. 938-944 [doi]
- Effects of calibration RFID tags on performance of inertial navigation in indoor environmentGuanxiong Liu, Yishuang Geng, Kaveh Pahlavan. 945-949 [doi]
- Inter-domain routing and name resolution using border nodesSebastian Schellenberg, Silvia Krug, Thomas Finke, Peggy Begerow, Jochen Seitz. 950-956 [doi]
- On the reliability in d-dimensional broadcast wireless networksXiaomin Ma, Gregory Butron. 957-961 [doi]
- Interference-based optimal power-efficient access scheme for cognitive radio networksAhmed H. Anwar, Ahmed El-Shafie, Amr Mohamed, Tamer A. ElBatt, Mohsen Guizani. 962-967 [doi]
- Fixed complexity error pattern estimationJuhee Yun, Jaekwon Kim. 968-971 [doi]
- Bounds on outage probabilities for diversity receptions over arbitrarily correlated Rician channelsBingcheng Zhu, Julian Cheng, Naofal Al-Dhahir, Lenan Wu. 972-976 [doi]
- Application of index coding in information-centric networksMohsen Karimzadeh Kiskani, Hamid R. Sadjadpour. 977-983 [doi]
- PSUN: An OFDM scheme for coexistence with pulsed radarSeungmo Kim, Jung-Min "Jerry" Park, Kaigui Bian. 984-988 [doi]
- Resource allocation for two-sources single-relay AF-OFDMA systemsHanan Al-Tous, Imad Barhumi. 989-993 [doi]
- Downlink multiuser MIMO methods for spatial diversity gain over a frequency flat or selective fading channelNing Kong, Zhensheng Zhang, John Cartelli, Northrop Grumman, Bo Li. 994-998 [doi]
- Analyzing the benefits of pattern diversity for MIMO wireless systemsGeorge D. Sworo, Kapil R. Dandekar, Moshe Kam. 999-1003 [doi]
- Carrier frequency offset correction for uplink multi-user MIMO for next generation Wi-FiNirav Shah, Monisha Ghosh, Pengfei Xia, Zihao You, Frank LaSita, Robert L. Olesen, Oghenekome Oteri. 1004-1008 [doi]
- Taking advantage of multiuser diversity and beamforming in wireless cellular networksJose Armando Oviedo, Hamid R. Sadjadpour. 1009-1013 [doi]
- Multi-tone almost blank subframes for enhanced inter-cell interference coordination in LTE HetNetsZanyu Chen, Tsungnan Lin, Dahau Din. 1014-1018 [doi]
- Efficient downlink scheduling with discontinuous reception (DRX) mechanism in LTE networkYu Liu, Minh Huynh, Dipak Ghosal. 1019-1023 [doi]
- Advanced base station precoding and user receiver designs for LTE-Advanced networksRana A. Abdelaal, Alireza Shahan Behbahani, Ahmed M. Eltawil. 1024-1028 [doi]
- Joint placement and power control of LTE Femto Base Stations in enterprise environmentsVanlin Sathya, Arun Ramamurthy, Bheemarjuna Reddy Tamma. 1029-1033 [doi]
- Impact of acknowledgments on application performance in 4G LTE networksBrett Levasseur, Mark Claypool, Robert E. Kinicki. 1034-1038 [doi]
- Radio access network coordination framework toward 5G mobile wireless networksNgoc-Dung Dào, Hang Zhang, Xu Li, Philippe Leroux. 1039-1043 [doi]
- Batch-based CP-ABE with attribute revocation mechanism for the Internet of ThingsLyes Touati, Yacine Challal. 1044-1049 [doi]
- A distributed cross-layer routing protocol with channel assignment in multi-channel MANETYali Wang, J. J. Garcia-Luna-Aceves. 1050-1054 [doi]
- Hybrid WiFi/UWB, cooperative localization using Particle FilterNader Bargshady, Kaveh Pahlavan, Nayef A. Alsindi. 1055-1060 [doi]
- A joint power adaptation and spectrum handoff scheme in mobile cognitive radio networksDan Wang, Yi Song, Zhitao Yang. 1061-1065 [doi]
- An optimal operating frequency selection scheme in spectrum handoff for cognitive radio networksZhitao Yang, Yi Song, Dan Wang. 1066-1070 [doi]
- Creating logical zones for hierarchical traffic engineering optimization in SDN-empowered 5GXu Li, Hang Zhang. 1071-1075 [doi]
- All that is solid melts into bits: Advanced ICT technologies for converting fashion into museum exhibitsGustavo Marfia, I. Tolic, A. Mascio, Giovanni Matteucci, Marco Roccetti. 1076-1080 [doi]
- Caching over-the-top services, the Netflix caseStefan A. Jensen, Michael Jensen, José M. Gutiérrez López. 1081-1086 [doi]
- BlueFall: Testing swarming protocols through mobile phonesMatteo Pozza, Claudio Enrico Palazzi, Armir Bujari. 1087-1091 [doi]
- Recommendation scheme based on converging properties for contents broadcastingJian Sun, Xiaofeng Zhong, Xuan Zhou, Xiaolong Fu. 1092-1097 [doi]
- Using computer gaming models to understand the behavior of industrial machinesS. Melicchio, Marco Roccetti, Gustavo Marfia, Alessandro Amoroso. 1098-1101 [doi]
- An architectural model for communication between the iDTV and mobile devicesEucassio Goncalves Lima, Ricardo de Andrade Lira Rabelo. 1102-1105 [doi]
- Survey of solutions for Peer-to-Peer MMOGsSarmad A. Abdulazeez, Abdennour El Rhalibi, Madjid Merabti, Dhiya Al-Jumeily. 1106-1110 [doi]
- Design issues and solutions in a modern home automation systemMattia Gamba, Alessandro Gonella, Claudio E. Palazzi. 1111-1115 [doi]
- Energy-efficient on-board processing technique for wireless epileptic seizure detection systemsRamy Hussein, Amr Mohamed, Masoud Alghoniemy. 1116-1121 [doi]
- Online negative public sentiment does not matter? - Empirical evidence from social media and movie industryWei Wang, Wei Ning, Haibo Wang. 1122-1126 [doi]
- A framework for privacy information protection on AndroidPeng Jia, Xiang He, Liang Liu, Binjie Gu, Yong Fang. 1127-1131 [doi]
- Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challengesLei Chen, Lanchuan Xu, Xiaohui Yuan, Narasimha Shashidhar. 1132-1136 [doi]
- A security-enhanced routing algorithm with path randomizationMario Pagan, Audrey Hession, Shengli Yuan. 1137-1141 [doi]
- Secure communication scheme for wireless sensor networks to maintain anonymityKanwalinderjit Kaur Gagneja. 1142-1147 [doi]