Abstract is missing.
- Distributed communication in bare-bones wireless networksBogdan S. Chlebus, Shailesh Vaya. 1 [doi]
- When can multi-agent rendezvous be executed in time linear in the diameter of a plane configuration?Peter Hegarty, Anders Martinsson, Dmitry Zhelezov. 2 [doi]
- A predictive retransmission scheme for cooperative routing in intermittently connected sensor networksMd. Majharul Islam Rajib, Asis Nasipuri. 3 [doi]
- Connectedness-aware copy-adaptive routing protocol in intermittently connected networksYing Li, Radim Bartos. 4 [doi]
- Modular randomized byzantine k-set agreement in asynchronous message-passing systemsAchour Mostéfaoui, Hamouma Moumen, Michel Raynal. 5 [doi]
- Tight self-stabilizing mobile byzantine-tolerant atomic registerSilvia Bonomi, Antonella Del Pozzo, Maria Potop-Butucaru. 6 [doi]
- Fast consensus under eventually stabilizing message adversariesManfred Schwarz, Kyrill Winkler, Ulrich Schmid. 7 [doi]
- A communication-efficient leader election algorithm in partially synchronous systems prone to crash-recovery and omission failuresChristian Fernández-Campusano, Mikel Larrea, Roberto Cortiñas, Michel Raynal. 8 [doi]
- Layered security for storage at the edge: on decentralized multi-factor access controlErtem Esiner, Anwitaman Datta. 9 [doi]
- Scaling architecture-on-demand based optical networksHugo Meyer, José Carlos Sancho, Milica Mrdakovic, Shuping Peng, Dimitra Simeonidou, Wang Miao, Nicola Calabretta. 10 [doi]
- Stability and optimization of DNS-based request redirection in CDNsWalid Benchaita, Samir Ghamri-Doudane, Sébastien Tixeuil. 11 [doi]
- Distributed low overhead ID in a wireless sensor networkMd. Rakibul Haque, Mahmuda Naznin, Rifat Shahriyar. 12 [doi]
- Bitcoin meets strong consistencyChristian Decker, Jochen Seidel, Roger Wattenhofer. 13 [doi]
- Retricoin: Bitcoin based on compact proofs of retrievabilityBinanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai. 14 [doi]
- STIC-D: algorithmic techniques for efficient parallel pagerank computation on real-world graphsParitosh Garg, Kishore Kothapalli. 15 [doi]
- Opacity proof for CaPR+ algorithmAnshu S. Anand, R. K. Shyamasundar, Sathya Peri. 16 [doi]
- String matching query verification on cloud-hosted databasesFaizal Riaz-ud-Din, Robin Doss, Wanlei Zhou. 17 [doi]
- D8-tree: a de-normalized approach for multidimensional data analysis on key-value databasesCesare Cugnasco, Yolanda Becerra, Jordi Torres, Eduard Ayguadé. 18 [doi]
- Stabilization and fault-tolerance in presence of unchangeable environment actionsMohammad Roohitavaf, Sandeep S. Kulkarni. 19 [doi]
- Debunking the myth that tight packing is energy conservingSwetha P. T. Srinivasan, Umesh Bellur, Ramamurthy Badrinath. 20 [doi]
- Local checkability, no strings attachedKlaus-Tycho Förster, Thomas Luedi, Jochen Seidel, Roger Wattenhofer. 21 [doi]
- Group mutual exclusion in linear time and spaceYuan He, Krishnan Gopalakrishnan, Eli Gafni. 22 [doi]
- Compact routing messages in self-healing treesArmando Castañeda, Danny Dolev, Amitabh Trehan. 23 [doi]
- Augmenting anycast network flowsSebastian Brandt, Klaus-Tycho Förster, Roger Wattenhofer. 24 [doi]
- Collaborative cellular tail energy reduction: feasibility and fairnessGirisha De Silva, Bin Bin Chen, Mun Choon Chan. 25 [doi]
- Mapping workflow resource requests for bandwidth efficiency in data centersVishal Girisagar, Tram Truong Huu, Mohan Gurusamy. 26 [doi]
- Counting with TinyTable: every bit counts!Gil Einziger, Roy Friedman. 27 [doi]
- Evacuating two robots from multiple unknown exits in a circleJurek Czyzowicz, Stefan Dobrev, Konstantinos Georgiou, Evangelos Kranakis, Fraser MacQuarrie. 28 [doi]
- On perfectly secret message transmission in digraphs tolerating dual failuresRavi Kishore, Chiranjeevi Vanarasa, Tushant Jha, Kannan Srinathan. 29 [doi]
- Shared-object system equilibria: delay and throughput analysisIosif Salem, Elad Michael Schiller, Marina Papatriantafilou, Philippas Tsigas. 30 [doi]
- Dynamic server consolidation algorithms: a profit model for evaluation and an improvementAnshu Yadav, Varsha Apte. 31 [doi]
- A secure credit card protocol over NFCOliver Jensen, Mohamed G. Gouda, Lili Qiu. 32 [doi]
- BluePark: tracking parking and un-parking events in indoor garagesSonia Soubam, Dipyaman Banerjee, Vinayak S. Naik, Dipanjan Chakraborty 0001. 33 [doi]
- A human mobility based knowledge sharing approach for post disaster need assessment using DTNSouvik Basu, Siuli Roy, DasBit Sipra, Somprakash Bandyopadhyay. 34 [doi]
- Finding occupancy in buses using crowdsourced data from smartphonesMegha Chaudhary, Aneesh Bansal, Divya Bansal, Bhaskaran Raman, K. K. Ramakrishnan, Naveen Aggarwal. 35 [doi]
- Self-optimisation using runtime code generation for wireless sensor networksCaroline Quéva, Damien Couroussé, Henri-Pierre Charles. 36 [doi]
- Incremental time series algorithms for IoT analytics: an example from autoregressionDebnath Mukherjee, Suman Datta. 37 [doi]
- An enhanced automated system for evaluating harsh driving using smartphone sensorsAvik Ghose, Arijit Chowdhury, Vivek Chandel, Tanushree Banerjee, Tapas Chakravarty. 38 [doi]
- A cloud security framework for a data centric WSN applicationSayantani Saha, Rounak Das, Suman Datta, Sarmistha Neogy. 39 [doi]
- A new routing protocol for WBAN to enhance energy consumption and network lifetimeSriyanjana Adhikary, Sankhayan Choudhury, Samiran Chattopadhyay. 40 [doi]
- Entity reconciliation in a multi-camera networkRaghu K. Ganti, Mudhakar Srivatsa, B. S. Manjunath. 41 [doi]
- Conversational intelligence analysisAlice Toniolo, Alun D. Preece, Will Webberley, Timothy J. Norman, Paul Sullivan, Timothy Dropps. 42 [doi]
- Automatic detection of cyberbullying on social networks based on bullying featuresRui Zhao, Anna Zhou, Kezhi Mao. 43 [doi]
- A study on Singapore hazeBing Tian Dai, Kasthuri Jayarajah, Ee-Peng Lim, Archan Misra, Shriguru Nayak. 44 [doi]
- On analyzing geotagged tweets for location-based patternsPhilips Kokoh Prasetyo, Palakorn Achananuparp, Ee-Peng Lim. 45 [doi]
- Privacy, security, risk, and trust concerns in e-commerceGhadeer Neama, Rana Alaskar, Mohammad Alkandari. 46 [doi]
- Intelligent detection of MAC spoofing attack in 802.11 networkChafika Benzaid, Abderrahman Boulgheraif, Fatma Zohra Dahmane, Ameer Al-Nemrat, Khaled Zeraoulia. 47 [doi]