Abstract is missing.
- QoS and QoE in the Next Generation Networks and Wireless NetworksPascal Lorenz. 3-16 [doi]
- Practical Instantaneous Frequency Analysis ExperimentsRoman Korkikian, David Naccache, Guilherme Ozari de Almeida, Rodrigo Portella do Canto. 17-34 [doi]
- The Impact of Initial Delays in OSPF RoutingAnne Bouillard, Claude Jard, Aurore Junier. 37-57 [doi]
- Managing Virtual Entities in MMOGs: A Voronoi-Based ApproachLaura Ricci, Luca Genovali, Barbara Guidi. 58-73 [doi]
- Host Identity Detection in IPv6 NetworksLibor Polcak, Martin Holkovic, Petr Matousek. 74-89 [doi]
- The Use of Twitter by Local Government in Northern IrelandTiago Picão, Fiona McMahon, Valerie Purchase, Maurice D. Mulvenna. 93-106 [doi]
- Multi-channel Attribution Modeling on User JourneysFlorian Nottorf. 107-125 [doi]
- When Loyalty Points Become Virtual Currencies: Transforming Business Models for Online PlatformsUschi Buchinger, Heritiana Ranaivoson, Pieter Ballon. 126-141 [doi]
- Digital Cities Web Marketing Strategies in Italy: The Path Towards Citizen EmpowermentElena Bellio, Luca Buccoliero. 142-159 [doi]
- Estimating the Effort in the Development of Distance Learning PathsMilena Casagranda, Luigi Colazzo, Andrea Molinari. 160-179 [doi]
- Modal and Chromatic Dispersion Analysis Within a Measured 1, 4 km MIMO Multimode ChannelAndreas Ahrens, Steffen Schröder, Steffen Lochmann. 183-196 [doi]
- Long-Reach PONs Employing Directly Modulated Lasers for Provisioning of OFDM-UWB Radio Signals in Sparse Geographical AreasTiago M. F. Alves, Adolfo V. T. Cartaxo. 197-206 [doi]
- InCC: Evading Interception and Inspection by Mimicking Traffic in Network FlowsLuis Campo-Giralte, Isaac Martín de Diego, Cristina Conde, Enrique Cabello. 209-225 [doi]
- A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access ControlLan Zhou, Vijay Varadharajan, Michael Hitchens. 226-251 [doi]
- IPv6 Network Attack Detection with HoneydV6Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack. 252-269 [doi]
- Youtube User and Usage Profiling: Stories of Political Horror and Security SuccessMiltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis. 270-289 [doi]
- Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary CircuitsPetr Svenda, Martin Ukrop, Vashek Matyás. 290-305 [doi]
- Self-contained Data Protection Scheme Based on CP-ABEBo Lang, Runhua Xu, Yawei Duan. 306-321 [doi]
- An Efficient Framework for Evaluating the Risk of Zero-Day VulnerabilitiesMassimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang. 322-340 [doi]
- Optimal Distribution of Computational Power in Free Viewpoint Interpolation by Depth Hypothesis Density Adaptation in Plane SweepingPatrik Goorts, Steven Maesen, Maarten Dumont, Sammy Rogmans, Philippe Bekaert. 343-358 [doi]
- Effect of the Front-End Processing on Speaker Verification Performance Using PCA and Scores Level FusionNassim Asbai, Messaoud Bengherabi, Farid Harizi, Abderrahmane Amrouche. 359-368 [doi]
- Automatic Geographic Enrichment by Multi-modal Bike SensingSteven Verstockt, Viktor Slavkovikj, Pieterjan De Potter, Olivier Janssens, Jürgen Slowack, Rik Van de Walle. 369-384 [doi]
- Reliability of Cooperative Vehicular Applications on Real Scenarios Over an IEEE 802.11p Communications ArchitectureUnai Hernández-Jayo, Idoia De-la-Iglesia. 387-401 [doi]
- Transmitter-Side Antennas Correlation in SVD-assisted MIMO SystemsAndreas Ahrens, Francisco Cano-Broncano, César Benavente-Peces. 402-417 [doi]