Abstract is missing.
- An efficient approach to prevent Battery Exhaustion Attack on BLE-based mesh networksZonglin Guo, Ian G. Harris, Yutong Jiang, Lih-feng Tsaur. 1-5 [doi]
- Auction-based resource negotiation for flexible video traffic offloading over wireless networksDonghyeok Ho, Gi Seok Park, Hwangjun Song. 6-12 [doi]
- Decentralized AP selection in large-scale wireless LANs considering multi-AP interferencePhillip B. Oni, Steven D. Blostein. 13-18 [doi]
- Duet: An adaptive algorithm for the coexistence of LTE-U and WiFi in Unlicensed spectrumYubing Jian, Uma Parthavi Moravapalle, Chao-Fang Shih, Raghupathy Sivakumar. 19-25 [doi]
- Ensuring k-coverage in Low-Power Wide Area Networks for Internet of ThingsZhuocheng Li, Tuong-Bach Nguyen, Quentin Lampin, Isabelle Sivignon, Steeve Zozor. 26-30 [doi]
- Outage-based cooperative resource competition game in LTE-A small cell networksChia-Lin Tsai, Pei-Rong Li, Kai-Ten Feng. 31-35 [doi]
- A novel MAC protocol for wireless network using multi-beam directional antennasGang Wang, Peng Xiao, Wenming Li. 36-40 [doi]
- Arbitrarily tight bounds on cumulative distribution function of Beckmann distributionBingcheng Zhu, Zhaoquan Zeng, Julian Cheng. 41-45 [doi]
- Cooperative spectrum sharing with energy harvesting best secondary user selection and non-orthogonal multiple accessMd. Fazlul Kader, Muhammad Basit Shahab, Soo Young Shin. 46-51 [doi]
- IP packet header compression and user grouping for LTE Multimedia Broadcast Multicast ServicesChen Jiang, Wenhao Wu, Zhi Ding. 52-57 [doi]
- Low-complexity energy-efficient subcarrier assignment in uplink OFDMA systemsChen Chen, Xunan Li, Xiang Cheng, Na Yi. 58-63 [doi]
- Capacity gains of buffer-aided moving relaysAmmar Zafar, Mohammad Shaqfeh, Hussein M. Alnuweiri, Mohamed-Slim Alouini. 64-69 [doi]
- Carrier-grade performance evaluation in reliable metro networks based on optical packet switchingAhmed Triki, Ion Popescu, Annie Gravey, Philippe Gravey, Takehiro Tsuritani. 70-75 [doi]
- Computing blocking probabilities in survivable elastic optical OFDM networksAnwar Alyatama. 76-82 [doi]
- Dynamic provisioning in virtualized Cloud infrastructure in IP/MPLS-over-WDM networksMohammad Alhowaidi, Pan Yi, Byrav Ramamurthy. 83-87 [doi]
- Error rate analysis of subcarrier QPSK With receiver I/Q imbalances over Gamma-Gamma fading channelsChangle Zhu, Julian Cheng, Naofal Al-Dhahir. 88-94 [doi]
- Leaf-spine architecture for OTN switchingSheldon Walklin. 95-99 [doi]
- A game-theoretic analysis of energy-depleting jamming attacksChiara Pielli, Federico Chiariotti, Nicola Laurenti, Andrea Zanella, Michele Zorzi. 100-104 [doi]
- A novel secure forwarding scheme for Location Based ServiceDi Tang, Jian Gu, Weijia Han, Xiao Ma. 105-109 [doi]
- Assessment of the impact of CFO on RF-DNA fingerprint classification performanceCharles G. Wheeler, Donald R. Reising. 110-114 [doi]
- Cost-sensitive security risk management for large-scale computing infrastructuresNeal Master, Nicholas Bambos. 115-119 [doi]
- Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networksSuman Bhunia, Shamik Sengupta. 120-125 [doi]
- A novel single agent quantum bit commitment schemeLinxi Zhang, Nan Zhao, Changxing Pei, Long Wang. 126-130 [doi]
- An Intrinsic Mode Function based energy detector for spectrum sensing in cognitive radioMahdi H. Al-Badrawi, Nicholas J. Kirsch, Bessam Z. Al-Jewad. 131-136 [doi]
- On the role of finite queues in cooperative cognitive radio networks with energy harvestingMohamed A. Abd-Elmagid, Tamer A. ElBatt, Karim G. Seddik. 137-143 [doi]
- Content-based interference management for video transmission in D2D communications underlaying LTESabur Baidya, Marco Levorato. 144-149 [doi]
- Disruption Aware Routing and link Scheduling for cognitive radio networksPeng Jiang, Chunsheng Xin, Min Song. 150-154 [doi]
- Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio NetworksYantian Hou, Ming Li, Dejun Yang. 155-161 [doi]
- Learning methods for long-term channel gain prediction in wireless networksFederico Chiariotti, Davide Del Testa, Michele Polese, Andrea Zanella, Giorgio Maria Di Nunzio, Michele Zorzi. 162-166 [doi]
- Dynamic Traffic Diversion in SDN: testbed vs MininetRobert Barrett, Andre Facey, Welile Nxumalo, Josh Rogers, Phil Vatcher, Marc St-Hilaire. 167-171 [doi]
- Efficient multicasting in Content-Centric Networks using locator-based Forwarding stateJ. J. Garcia-Luna-Aceves, Maziar Mirzazad Barijough. 172-177 [doi]
- How clustering affects epidemics in complex networksBo Song, Yurong Song, Guo-Ping Jiang. 178-183 [doi]
- Impact of beacon coverage on clustering strategies for fingerprinting localization systemPampa Sadhukhan, Keshav P. Dahal, Zeeshan Pervez. 184-188 [doi]
- Real-time attack and failure detection for next generation networksChristopher Mansour, Danai Chasaki. 189-193 [doi]
- Topology discovery of Synchronous Optical NETworksBrigitte Jaumard, Ali Muhammad, Rami Fahim. 194-199 [doi]
- Fast Distributed Agreements and safety-critical scenarios in VANETsGérard Le Lann. 200-206 [doi]
- On-demand cache placement protocol for content delivery sensor networksMinkeun Ha, Daeyoung Kim 0001. 207-216 [doi]
- Spatio-Tempo-Socio-Semantic-Aware Model For destination prediction in VANETNardine Basta, Amal El-Nahas, Hans Peter Großmann, Slim Abdennadher. 217-223 [doi]
- Time slotted scheduling for outdoor mmWave mesh networks with performance guaranteeXili Wan, Xinjie Guan, Jun-Bo Wang, Miao Zhao. 224-229 [doi]
- A large-scale data collection scheme for distributed Topic-Based Pub/SubYuuichi Teranishi, Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa. 230-236 [doi]
- An extension of Information-Centric Networking for IoT applicationsToshihiko Kurita, Izuru Sato, Ken-ichi Fukuda, Toshitaka Tsuda. 237-243 [doi]
- Cloud provider selection models for cloud storage services to meet availability requirementsEiji Oki, Ryoma Kaneko, Nattapong Kitsuwan, Takashi Kurimoto, Shigeo Urushidani. 244-248 [doi]
- Effective controller placement in controller-based Named Data NetworksNarjes Aloulou, Mouna Ayari, Mohamed Faten Zhani, Leïla Azouz Saïdane, Guy Pujolle. 249-254 [doi]
- Overlapping user grouping in IoT oriented massive MIMO systemsRun Tian, Yuan Liang, Tongtong Li. 255-259 [doi]
- Robust indoor localization with smartphones through statistical filteringTong Guan, Le Fang, Wen Dong 0001, Chunming Qiao. 260-264 [doi]
- Towards zero packet loss with LISP Mobile NodeMusab Isah, Steven Simpson, Yusuf Sani, Chris Edwards. 265-271 [doi]
- Radio environment map construction using Hidden Markov Model in multiple primary user environmentKoji Ichikawa, Takeo Fujii. 272-276 [doi]
- Modeling indoor-outdoor propagation in wooden residential area at 2.5 GHz and 3.5 GHz bandsHideki Fukudome, Kohei Akimoto, Suguru Kameda, Noriharu Suematsu, Tadashi Takagi, Kazuo Tsubouchi. 277-281 [doi]
- Optimization of resource allocation in relay assisted multi-user SCMA uplink networkLin Luo, Lihua Li, Xin Su. 282-286 [doi]
- Performance evaluation of PCC OFDM on a software defined radio platformGayathri Kongara, Jean Armstrong. 287-292 [doi]
- Physical gate based preamble obfuscation for securing wireless communicationJames Chacko, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis, Kapil R. Dandekar. 293-297 [doi]
- Pilot hopping in massive MIMO systems with MMSE channel estimationAhmed S. Alwakeel, Ahmed Hesham Mehana, Atif Ghoneim. 298-302 [doi]
- Load-aware and congestion-free state management in network function virtualizationJinwei Liu, Haiying Shen, Hongxin Hu. 303-307 [doi]
- Multicast scheduling for optical data center switches with tunability constraintsKamran Keykhosravi, Houman Rastegarfar, Erik Agrell. 308-312 [doi]
- Network-aware virtual data center resource orchestration in an optical data centerPan Yi, Byrav Ramamurthy. 313-317 [doi]
- Optical circuit granularity impact in TCP-dominant hybrid data center networksHouman Rastegarfar, Kamran Keykhosravi, Krzysztof Szczerba, Erik Agrell, Lloyd LaComb, Madeleine Glick. 318-322 [doi]
- Optical Onion RoutingAnna Engelmann, Admela Jukan. 323-328 [doi]
- SPread: Exploiting fractal social community For efficient multi-coPy routing in VDTNsBo Wu, Kang Chen, Haiying Shen. 329-333 [doi]
- Entropy-based network anomaly DetectionChristian Callegari, Stefano Giordano, Michele Pagano. 334-340 [doi]
- Physical-Layer discrimination of Power Line CommunicationsBrady P. Ross, Timothy J. Carbino, Samuel J. Stone. 341-345 [doi]
- Physical layer security of multiband communications under hostile jammingTianlong Song, Yuan Liang, Tongtong Li. 346-350 [doi]
- PPVC: Privacy Preserving Voronoi Cell for location-based servicesAbdur R. Shahid, Liz Jeukeng, Wei Zeng, Niki Pissinou, S. S. Iyengar, Sartaj Sahni, Maite Varela-Conover. 351-355 [doi]
- Locally Operated Cooperative Key Sharing (LOCKS)Michael Bierma, Aaron Brown, Troy DeLano, Thomas M. Kroeger, Howard Poston. 356-362 [doi]
- Relation discovery of mobile network alarms with sequential pattern miningMihaela Lozonavu, Martha Vlachou-Konchylaki, Vincent Huang. 363-367 [doi]
- Understanding spatial related network challenges from physical and network layersCheng Leong Lim, Cindy Goh, Asiya Khan, Yun Li. 368-373 [doi]
- Dynamic control of data center network and computation resourcesDaniel Miller, Li Xia, Zhengyuan Zhou, Nicholas Bambos. 374-380 [doi]
- Electricity cost and emissions reduction in optical networksArash Deylamsalehi, Dylan A. P. Davis, Vinod M. Vokkarane. 381-386 [doi]
- Secure coded caching in wireless ad hoc networksMohsen Karimzadeh Kiskani, Hamid R. Sadjadpour. 387-391 [doi]
- Performance of route partitioning scheme for hitless defragmentation in elastic optical networksSeydou Ba, Bijoy Chand Chatterjee, Eiji Oki. 392-396 [doi]
- PON bandwidth resource sharing schemes in a multi-operator scenarioChengjun Li, Wei Guo, Wei Wang, Weisheng Hu, Ming Xia. 397-401 [doi]
- Reverse manycast data retrieval in Elastic Optical NetworksJuzi Zhao, Vinod M. Vokkarane. 402-407 [doi]
- Herding packets: Properties needed of metrics for loop-free & best forwarding pathsBradley R. Smith, Judith T. Samson. 408-414 [doi]
- Secure function chaining enabled by Information-Centric NetworkingMehdi Bahrami, Liguang (Ted) Xie, Lei Liu, Akira Ito, Yang Peng, Sevak Mnatsakanyan, Zilong Ye, Huiping Guo. 415-421 [doi]
- A Cloud Access Security Broker based approach for encrypted data search and sharingChuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang. 422-426 [doi]
- An erasure code with reduced average locality for distributed storage systemsMostafa Shahabinejad, Masoud Ardakani, Majid Khabbazian. 427-431 [doi]
- An improved SDN-based fabric for flexible data center networksWei Hou, Linda Shi, Yingzhe Wang, Fan Wang, Hui Lyu, Marc St-Hilaire. 432-436 [doi]
- Cloud bursting approach based on predicting requests for business-critical web systemsYukio Ogawa, Go Hasegawa, Masayuki Murata. 437-441 [doi]
- Towards proactive SDN-controller attack and failure resilienceMohamed Azab, José A. B. Fortes. 442-448 [doi]
- An AMP based decoder for massive MU-MIMO-OFDM with low-resolution ADCsChen Cao, Hongxiang Li, Zixia Hu. 449-453 [doi]
- An iterative FFT-based antenna subset modulation for secure millimeter wave communicationsChen Chen 0002, Yue Dong, Xiang Cheng, Na Yi. 454-459 [doi]
- Pilot hopping in multi-cell massive MIMO systems: Pilot assignment and new resultsAhmed S. Alwakeel, Ahmed Hesham Mehana, Atif Ghoneim. 460-464 [doi]
- A new mining method to detect real time substance use events from wearable biosensor data streamJin Wang, Hua Fang, Stephanie Carreiro, Honggang Wang, Edward W. Boyer. 465-470 [doi]
- Distributed cache for efficient content sharing in heterogeneous networksJianbin Chuan, Li Wang, Shuangshuang Ma. 471-475 [doi]
- Improving Shuffle I/O performance for big data processing using hybrid storageXiaojun Ruan, Haiquan Chen. 476-480 [doi]
- A Bayesian and smart gateway based communication for noisy IoT scenarioCristanel Razafimandimby, Valeria Loscrì, Anna Maria Vegni, Alessandro Neri. 481-485 [doi]
- Accurately initializing real time clocks to provide synchronized time in sensor networksHessam Mohammadmoradi, Omprakash Gnawali, Alex Szalay. 486-490 [doi]
- Enabling multi-hop ad hoc networks through WiFi Direct multi-group networkingColin Funai, Cristiano Tapparello, Wendi B. Heinzelman. 491-497 [doi]
- Enhancing performance and longevity of multi-radio multi-channel hetnets through dynamic path-assignmentPaulo Alexandre Regis, Suman Bhunia, Shamik Sengupta. 498-503 [doi]
- Fog-enabled WSN system for animal behavior analysis in precision dairyKriti Bhargava, Stepan Ivanov, Chamil Kulatunga, William Donnelly. 504-510 [doi]
- Enabling proactive self-healing by data mining network failure logsUmair Sajid Hashmi, Arsalan Darbandi, Ali Imran. 511-517 [doi]
- Randomized load balancing with a helperChunpu Wang, Chen Feng, Julian Cheng. 518-524 [doi]
- SEINA: A stealthy and effective internal attack in Hadoop systemsJiayin Wang, Teng Wang, Zhengyu Yang, Ying Mao, Ningfang Mi, Bo Sheng. 525-530 [doi]
- Taming memory related performance pitfalls in linux CgroupsZhenyun Zhuang, Cuong Tran 0003, Jerry Weng, Haricharan Ramachandra, Badri Sridharan. 531-535 [doi]
- Toward carrier-scale general-purpose nodeTomohiro Korikawa, Akio Kawabata, Akeo Masuda. 536-540 [doi]
- Understanding IP address multiplexing with large-scale SSL/TLS flow analysisDawei Wang, Qingin He, Liping Qian, Yibo Xue, Yingfei Dong. 541-545 [doi]
- Design and control in elastic optical networks: Issues, challenges, and research directionsEiji Oki, Bijoy Chand Chatterjee. 546-549 [doi]
- A dynamic compression technique for streaming kinect-based Point Cloud dataCarlos Moreno, Yilin Chen, Ming Li. 550-555 [doi]
- A high performance media server and QoS routing for SVC streaming based on Software-Defined NetworkingWei-En Liang, Chung-An Shen. 556-560 [doi]
- Patch-based HDR video processing for fast moving object reconstructionYu-Fu Mai, Ching-Te Chiu. 561-565 [doi]
- Study of user QoE improvement for dynamic adaptive streaming over HTTP (MPEG-DASH)Shuai Zhao, Zhu Li, Deep Medhi, PoLin Lai, Shan Liu. 566-570 [doi]
- Coexistence in millimeter-wave WBAN: A game theoretic approachM. D. Nashid Anjum, Hua Fang. 571-576 [doi]
- Energy management of end users modeling their reaction from a GENCO's point of viewMehdi Rahmani-andebili, Haiying Shen. 577-581 [doi]
- Joint RRH selection and beamforming in distributed antenna systems with energy harvestingYanjie Dong, Md. Jahangir Hossain, Julian Cheng, Victor C. M. Leung. 582-586 [doi]
- Network power saving based on Pareto optimal control with evolutionary approachYosuke Akishita, Yuichi Ohsita, Masayuki Murata. 587-593 [doi]
- Short term power load forecasting using Deep Neural NetworksGhulam Mohi-Ud-Din, Angelos K. Marnerides. 594-598 [doi]
- Traffic and grid-based parking lot allocation for PEVs considering driver behavioral modelMehdi Rahmani-andebili, Haiying Shen. 599-603 [doi]
- Improving performance in industrial Internet of Things using multi-radio nodes and multiple gatewaysJyotirmoy Banik, Ricardo Arjona, Marco Tacca, Miguel Razo, Andrea Fumagalli, Kumaran Vijayasankar, Arvind Kandhalu. 604-608 [doi]
- Symmetric connectivity in WSNs equipped with multiple directional antennasTien Tran, Min Kyung An, Dung T. Huynh. 609-614 [doi]
- Throughput improvement by disruption-suppressed channel switching in multi-channel ad-hoc networksMasaki Inokuchi, Hirofumi Ueda, Gen Motoyoshi. 615-619 [doi]
- Throughput optimization in multi-hop wireless networks with reconfigurable antennasYantian Hou, Ming Li, Kai Zeng. 620-626 [doi]
- True ConvergeCast scheduling in Wireless Sensor NetworksMahesh Bakshi, Brigitte Jaumard, Lata Narayanan. 627-631 [doi]
- A new index of hidden workload for firewall rule processing on virtual machineDai Suzuki, Satoshi Imai, Toru Katagiri. 632-637 [doi]
- CORAL: A multi-core lock-free rate limiting frameworkZhe Fu, Zhi Liu, Jiaqi Gao, Wenzhe Zhou, Wei Xu, Jun Li. 638-642 [doi]
- Delay and quality metrics in Voice over LTE (VoLTE) networks: An end-terminal perspectiveNajmeddine Majed, Stephane Ragot, Xavier Lagrange, Alberto Blanc. 643-648 [doi]
- Traffic engineering in the peer-to-peer SDNHemin Yang, George F. Riley. 649-655 [doi]
- An approach to online network monitoring using clustered patternsJinoh Kim, Alex Sim, Sang C. Suh, Ikkyun Kim. 656-661 [doi]
- Enhancing the security of IoT enabled robotics: Protecting TurtleBot file system and communicationMichael Horton, Lei Chen, Biswanath Samanta. 662-666 [doi]
- Efficient key management for Big Data gathering in dynamic sensor networksFarah I. Kandah, Oliver Nichols, Li Yang. 667-671 [doi]
- Rapid detection of disobedient forwarding on compromised OpenFlow switchesYen-Chun Chiu, Po-Ching Lin. 672-677 [doi]
- Distributed responder ARP: Using SDN to re-engineer ARP from within the networkMark Matties. 678-683 [doi]
- Post-quantum hybrid security mechanism for MIMO systemsYousef Qassim, Mario Edgardo Magaña, Attila Yavuz. 684-689 [doi]
- Software Defined Networking enabled resilience for IEC 61850-based substation communication systemsHellen Maziku, Sachin Shetty. 690-694 [doi]
- Advertisement removal of Android applications by reverse engineeringJen-Yi Pan, Sheng-Hao Ma. 695-700 [doi]
- A network-centric architecture for building the cloud continuumA. Carrega, M. Repetto. 701-705 [doi]
- Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCATalal Halabi, Martine Bellaïche. 706-710 [doi]
- Federated Cloud computing as System of SystemsYahav Biran, George Collins, Syed Azam, Joel Dubow. 711-718 [doi]
- Resource allocation for IoT applications in cloud environmentsAnand Singh, Yannis Viniotis. 719-723 [doi]
- Variability management in Infrastructure as a Service: Scenarios in cloud deployment modelsAteeq Khan, Johannes Hintsch, Gunter Saake, Klaus Turowski. 724-728 [doi]
- Modeling of free riders in P2P live streaming systemsIstiaque Shahriar, Dongyu Qiu, Brigitte Jaumard. 729-734 [doi]
- Channel Selection scheme for Cooperative Routing protocols in Cognitive Radio NetworksArsany Guirguis, Mustafa ElNainay. 735-739 [doi]
- Cluster-Based Dynamic Backup in Cognitive Radio NetworksFarah I. Kandah, Jesse Whitehead. 740-744 [doi]
- Cognitive mission planning and system orchestrationMark Rahmes, Richard Clouse, Jay Virts, George Yakimovicz, Bernard Rees, Wade Talbert. 745-749 [doi]
- Stability analysis of a cognitive radio system with a dedicated relayDoaa Kiwan, Amr A. El-Sherif, Tamer A. ElBatt. 750-756 [doi]
- An analytical study of the Primary User activity pattern effect on the performance of cooperative opportunistic networksMohamed Abdelraheem, Mustafa ElNainay. 757-761 [doi]
- Performance study of dedicated in-band Control Channels for Cognitive Radio NetworksAyman Sabbah, Omneya Issa, Bernard Doray. 762-766 [doi]
- An interference-aware small cell on/off mechanism in hyper dense small cell networksLi-Ping Tung, Li-Chun Wang, Kuan-Sheng Chen. 767-771 [doi]
- A study of single-sided HPC communication paradigm using Chameleon bare-metal clusterJustin Y. Shi, Travis Evans, Kimberly A. Kosman, Yasin Celik. 772-777 [doi]
- Spatial-temporal campus crime pattern mining from historical alert messagesShela Wu, John Male, Eduard C. Dragut. 778-782 [doi]
- IoTOne: Integrated platform for heterogeneous IoT devicesNathaniel Gyory, M. Chuah. 783-787 [doi]
- A survey of social-based routing protocols in Delay Tolerant NetworksJacqueline Hom, Lauren Good, Shuhui Yang. 788-792 [doi]
- Does bad news spread faster?Anna Fang, Zina Ben-Miled. 793-797 [doi]
- A command-level study of Linux kernel bugsYiliang Shi, Danny V. Murillo, Simeng Wang, Jinrui Cao, Mai Zheng. 798-802 [doi]
- Energy-efficient sparse routing protocol for Delay Tolerant NetworksMax Hastings, Shuhui Yang. 803-807 [doi]
- Obfuscating function call topography to test structural malware detection against evasion attacksAndrew Choliy, Feng Li, Tianchong Gao. 808-813 [doi]
- Investigating and securing communications in the Controller Area Network (CAN)Zachary King, Shucheng Yu. 814-818 [doi]
- Applying rating systems to challenge based cybersecurity educationAndrew Samuels, Feng Li, Connie Justice. 819-824 [doi]
- An adaptive coding and modulation based multicast scheme to reduce bandwidth consumption in the next generation satellite TV systemsJunyu Lai, Wei Zhang, Jie Zhao, Weinan Zhang, Yang Zhang. 825-830 [doi]
- An efficient binary-search based heuristic for extended Unsplittable Flow ProblemErdal Akin, Turgay Korkmaz. 831-836 [doi]
- Efficient and reliable transmission in Flow-Aware Networks - an integrated approach based on SDN conceptJerzy Domzal, Robert Wójcik, Edyta Biernacka. 837-842 [doi]
- Application identification via network traffic classificationBaris Yamansavascilar, M. Amaç Güvensan, A. Gökhan Yavuz, M. Elif Karsligil. 843-848 [doi]
- Using DEVS for modeling and simulating a Fog Computing environmentMohammad Etemad, Mohammad Aazam, Marc St-Hilaire. 849-854 [doi]
- WPAN node with Wake-Up Receiver using CSMA/CA and a channel occupation schemeJosua Arndt, Nils Herjurgen, Vahid Bonehi, Ralf Wunderlich, Stefan Heinen. 855-859 [doi]
- Application-level scheme to enhance VANET event-driven multi-hop safety-related servicesXiaomin Ma, Gabe Kanelopoulos, Kishor S. Trivedi. 860-864 [doi]
- Geo-routing in urban Vehicular Ad-hoc Networks: A literature reviewMehdi Tavakoli Garrosi, Marcel Kalac, Torsten Lorenzen. 865-871 [doi]
- Proposal of multi-lingual sentence reading for mobile communicationToshiyuki Maeda, Masumi Yajima. 872-875 [doi]
- Social factors for data sparsity problem of trust models in MANETsAntesar M. Shabut, Keshav P. Dahal. 876-880 [doi]
- Preliminary experiments for a GPS improvement system using short-range communicationTadashi Ogino. 881-885 [doi]
- Analyzing the relative cost concept in elastic optical networksAnwar Alyatama. 886-890 [doi]
- Energy efficiency benefits of introducing optical switching in Data Center NetworksArtur Pilimon, Alexandra Zeimpeki, Anna Manolova Fagertun, Sarah Ruepp. 891-895 [doi]
- A lightweight network anomaly detection techniqueJinoh Kim, Wucherl Yoo, Alex Sim, Sang C. Suh, Ikkyun Kim. 896-900 [doi]
- A live network AS-level traffic characterizationQuentin Grandemange, Olivier Ferveur, Marion Gilson, Eric Gnaedinger. 901-905 [doi]
- Moving peers in distributed, location-based peer-to-peer overlaysTobias Amft, Kalman Graffi. 906-911 [doi]
- On the vulnerability of multi-level communication network under catastrophic eventsPankaz Das, Mahshid Rahnamay-Naeini, Nasir Ghani, Majeed M. Hayat. 912-916 [doi]
- Routing algorithm for multiple unsplittable flows between two cloud sites with QoS guaranteesErdal Akin, Turgay Korkmaz. 917-923 [doi]
- How partial behavioral networks drive econometric bias and inefficiencyMark Abdollahian, Zining Yang, Patrick deWerk Neal. 924-928 [doi]
- Survey on energy-efficient hard drive disksEvans Oliech, Xiaojun Ruan. 929-931 [doi]
- Personalizable neurological user authentication frameworkDennis Frank, Jasmine Mabrey, Kenji Yoshigoe. 932-936 [doi]
- Exploitations of wireless interfaces via network scanningNathalie Domingo, Bryan Pearson, Yier Jin. 937-941 [doi]
- Radio receiver design for Unmanned Aerial wildlife trackingDaniel Webber, Nathan Hui, Ryan Kastner, Curt Schurgers. 942-946 [doi]
- Change detection by deep neural networks for synthetic aperture radar imagesFrank Liao, Elizabeth Koshelev, Malcolm Milton, Yuanwei Jin, Enyue Lu. 947-951 [doi]
- SDR based indoor localization using ambient WiFi and GSM signalsVarun Nambiar, Edwin Vattapparamban, Ali Ihsan Yurekli, Ismail Güvenç, Mohammad Mozaffari, Walid Saad. 952-957 [doi]
- Wireless Mesh networking Protocol for sustained throughput in edge computingJosiah Burchard, Dmitrii Chemodanov, John Gillis, Prasad Calyam. 958-962 [doi]
- Channel blocking analysis and availability prediction in cognitive radio networksMuhammad Rehan Usman, Muhammad Arslan Usman, Soo Young Shin. 963-968 [doi]
- Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networksAndrea S. Marcano, Henrik Lehrmann Christiansen. 969-974 [doi]
- Rate optimization for energy efficient system with M-QAMRanda Jaouadi, Guillaume Andrieux, Jean-Yves Baudais, Jean-Francois Diouris. 975-979 [doi]
- Relay selection of relay-assisted Device-to-Device and uplink communication underlying cellular networksJen-Yi Pan, Ming-Hung Hsu. 980-985 [doi]
- A generalized optimization framework for control plane in tactical wireless networkingBrian Jalaian, Venkat Dasari, Mehul Motani. 986-990 [doi]
- Analysis and improvement of the 3-star algorithm for the STP-MSP problem in Wireless Sensor NetworksShuo-Han Chen, Chi-Heng Lee, Tseng-Yi Chen, Hsin-Wen Wei, Tsan-sheng Hsu, Wei Kuan Shih. 991-995 [doi]
- Opportunistic scheduling for network coded data in wireless multicast networksNadieh Moghadam, Mohammad Mohebbi, Hongxiang Li. 996-1000 [doi]
- A mobile ad hoc cloud for automated video surveillance systemMinSeok Jang, Myong-Soon Park, Sayed Chhattan Shah. 1001-1005 [doi]
- Adaptive Location-Aware Routing with Directional Antennas in mobile adhoc networksTaku Noguchi, Takahiko Kobayashi. 1006-1011 [doi]
- Channel access proposal for enabling quick discovery for D2D wireless networksHuan-Bang Li, Ryu Miura, Fumihide Kojima. 1012-1016 [doi]
- Dynamic replication control strategy for Opportunistic NetworksSalem Sati, Andre Ippisch, Kalman Graffi. 1017-1023 [doi]
- MobiBone: An energy-efficient and adaptive network protocol to support short rendezvous between static and mobile wireless sensor nodesKui Zhang, Eyuel D. Ayele, Nirvana Meratnia, Paul J. M. Havinga, Peng Guo, Youxin Wu. 1024-1030 [doi]
- Neighbor discovery utilizing in-band full duplex in wireless clique networksYuichi Miyaji, Hideyuki Uehara. 1031-1035 [doi]
- Optimal sensor density and placement in power-constrained Wireless Sensor NetworksMarwan Alkhweld. 1036-1040 [doi]
- An enhanced MMSE subchannel decision feedback equalizer with ICI suppression for FBMC/OQAM systemsChih-Wei Chen, Fumiaki Maehara. 1041-1045 [doi]
- Set reconciliation with an inaccurate oracleMark Bilinski, Ryan Gabrys. 1046-1050 [doi]
- Low energy scheduling of minimal active time slots for multi-channel multi-hop convergence wireless sensor networksSaurabh Kumar, Hyungwon Kim. 1051-1057 [doi]
- A cooperative packet-loss-tolerant algorithm for Wireless Networked Robots rendezvousSabato Manfredi, Claudio Pascariello, Nicola Roberto Zema, Isabelle Fantoni, Michal Król. 1058-1062 [doi]
- Clustering algorithm for improved network lifetime of mobile wireless sensor networksJ. Corn, J. W. Bruce. 1063-1067 [doi]
- Tag-based data exchange in disaster relief scenariosMichal Król, Enrico Natalizio, Nicola Roberto Zema. 1068-1072 [doi]
- Reference-shifted DCSK modulation scheme for secure communicationHua Yang, Guoping Jiang, Ling-Ling Xia, Xiao Tu. 1073-1076 [doi]