Abstract is missing.
- A receiver-initiated MAC protocol for underwater acoustic sensor networksWen-Hwa Liao, Yu-Chieh Lin, Ssu-Chi Kuai. 1-6 [doi]
- Routing-based and location-aware service discovery in Mobile Ad-hoc NetworksSebastian Schellenberg, Amirhossein Saliminia, Silvia Krug, Jochen Seitz, Thomas Finke, Juergen Schroeder. 7-12 [doi]
- Data Aggregation with multiple sinks in Information-Centric Wireless Sensor NetworkYonghui Shim, Younghan Kim. 13-17 [doi]
- Collaborative data transmission in vehicular ad-hoc networksShou-Chih Lo, Shan-Jung Lin. 18-22 [doi]
- Error-tolerant non-binary error correction code for low power wireless sensor networksYousef Qassim, Mario Edgardo Magaña. 23-27 [doi]
- A virtual machine consolidation framework for CloudStack platformsTanasak Janpan, Vasaka Visoottiviseth, Ryousei Takano. 28-33 [doi]
- Joint pricing and capacity planning for IaaS cloudLing Tang, Jinghui Qian, Lei Xu, Yan Yu. 34-39 [doi]
- A novel VM workload prediction using Grey Forecasting model in cloud data centerJhu-Jyun Jheng, Fan-Hsun Tseng, Han-Chieh Chao, Li-Der Chou. 40-45 [doi]
- An architecture to evaluate Scalability, Adaptability and Accuracy in cloud monitoring systemsGuilherme da Cunha Rodrigues, Glederson Lessa dos Santos, Vinicius Tavares Guimaraes, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 46-51 [doi]
- Profiling cloud applications with hardware performance countersAlexandre Kandalintsev, Renato Lo Cigno, Dzmitry Kliazovich, Pascal Bouvry. 52-57 [doi]
- An SLA-aware load balancing scheme for cloud datacentersChung-Cheng Li, Kuochen Wang. 58-63 [doi]
- Fully-distributed multicast routing protocol for IEEE 802.15.8 peer-aware communicationsJeongseok Yu, Taejin Kim, Woongsoo Na, Hyoungchel Bae, Yunseong Lee, Juho Lee, Zeynep Vatandas, Sungrae Cho, Junbeom Hur. 64-69 [doi]
- Geometric algorithm for height filtering in intruder monitoring systemJaeseok Shim, Yujin Lim, Jaesung Park. 70-74 [doi]
- Dynamic resource allocation for visible light based wireless sensor networkNirzhar Saha, Ratan Kumar Mondal, Md. Shareef Ifthekhar, Yeong Min Jang. 75-78 [doi]
- On the usage of standardised M2M platforms for Smart Energy managementAsma Elmangoush, Ronald Steinke, Adel Al-Hezmi, Thomas Magedanz. 79-84 [doi]
- Two-hop communication scheme for FlashLinQ device-to-device communication systemSueng Jae Bae, Jaheon Gu, Min Young Chung. 85-90 [doi]
- A study on detection of receiving signal status change with array antennaSeiya Kato, Kenta Umebayashi, Yasuo Suzuki. 91-96 [doi]
- Beamspace MIMO system with different elements distances in ESPAR array antennaBong Jun Kim, Heung-Gyoon Ryu. 97-101 [doi]
- Transmission performance evaluation for MU-MIMO systems based on Block Diagonalization method in spatially correlated multipath fading environmentKazuhiro Yamaguchi, Kohei Miyasaka, Takaharu Nagahashi, Takuya Akiyama, Hideaki Matsue. 102-107 [doi]
- Multi-flow transmission scheme in millimeter-wave mobile network with massive antenna structureEun Soo Bae, Jun Suk Kim, Min Young Chung, Sookyang Kang, Sung-Min Oh, Aesoon Park. 108-111 [doi]
- Improved beamforming code book for WiGig using Maximal Ratio CombiningAtchareeya Kongbuntad, Monthippa Uthansakul, Peerapong Uthansakul. 112-115 [doi]
- A noble circularly symmetric Gaussian covariance matrix based channel estimation scheme for large-scale MIMO systemsMohammad Abu Hanif, Moon Ho Lee, Sang Seob Song. 116-119 [doi]
- Study of target tracking and handover in Mobile Wireless Sensor NetworkEhsan Tabatabaei Yazdi, Amir Hossein Moravejosharieh, Sayan Kumar Ray. 120-125 [doi]
- A partitioning scheme to guarantee minimum execution time for multiple applications in sensor network nodesDaehoon Kim, BeomSeok Kim, Jinsung Cho. 126-130 [doi]
- Intrusion tolerance mechanisms using redundant nodes for wireless sensor networksMin Wei, Keecheon Kim. 131-135 [doi]
- Grid-based directional minimum cost routing for massively dense wireless sensor networksJing-Ya Li, Ren-Song Ko. 136-141 [doi]
- Joint channel and flow assignment algorithm for wireless mesh networksHee-Tae Roh, Jang-Won Lee. 142-147 [doi]
- Rich Semantic Content-oriented Routing for mobile Ad Hoc NetworksHuey-Ing Liu, Wen-Jing He. 148-153 [doi]
- Design of hierarchical routing protocol for heterogeneous airborne ad hoc networksChung-Jae Lee, SeokYoon Kang, Ki-Il Kim. 154-159 [doi]
- Self-organized multi-metric routing for QoS in wireless mesh networksJangkyu Yun, Jihun Han, Gihyuk Seong, Wooseong Cho, Jihoon Seo, Murad Khan, Byoungwoong Kim, Gisu Park, Kijun Han. 160-163 [doi]
- A network routing method based on received power of repeater nodes and QoS for mobile ad-hoc networksKazuhiro Yamaguchi, Hayato Iriyama, Yoshihiro Kainuma, Makoto Sugita, Hideaki Matsue. 164-169 [doi]
- FRT-2-Chord: A DHT supporting seamless transition between one-hop and multi-hop lookups with symmetric Routing TableYasuhiro Ando, Hiroya Nagao, Takehiro Miyao, Kazuyuki Shudo. 170-175 [doi]
- An efficient power-saving transmission mechanism in LTE macrocell-femtocell hybrid networksYao-Liang Chung. 176-180 [doi]
- Policy-based pricing for pervasive services in future heterogeneous wireless access networksJairo A. Gutiérrez, Sayan Kumar Ray. 181-185 [doi]
- A novel single-cell transmission scheme for multicast services in LTE-advancedJeehyeon Na, Dae-Ik Kim, Jungmo Moon, Sangho Lee, Yeonseong Shin. 186-191 [doi]
- Interference evaluation of control channels under the co-existence of LTE-FDD and TD-LTEJie Wei, Liaowei Liu, Xiaofeng Zhong, Xiaolong Fu. 192-196 [doi]
- Study of a fast channel estimation technique for LTE Downlink systems based on fast linear Toeplitz system solver with displacement structureAbdelhakim Khlifi, Ridha Bouallegue. 197-201 [doi]
- Requirement identification and experiments for a flexible media format based on mobile and cloud computingRoland M. Wagner, Jing Wang 0002, Yanbo Han. 202-207 [doi]
- Cooperative cache sharing among ISPs for reducing inter-ISP transit cost in content-centric networkingKazuhito Matsuda, Go Hasegawa, Masayuki Murata. 208-213 [doi]
- Publisher mobility support in content centric networksDookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, Yanghee Choi. 214-219 [doi]
- EQVMP: Energy-efficient and QoS-aware virtual machine placement for software defined datacenter networksShao-Heng Wang, Patrick P.-W. Huang, Charles H.-P. Wen, Li-Chun Wang. 220-225 [doi]
- Data center infrastructure management WLAN networks for monitoring and controlling systemsMontri Wiboonrat. 226-231 [doi]
- Clickable and interactive video system using HTML5Helen Prima Dewi Purnamasari, Nadya Syifana. 232-237 [doi]
- Performance evaluation of IPv4/IPv6 transition mechanisms: IPv4-in-IPv6 tunneling techniquesN. Chuangchunsong, Sinchai Kamolphiwong, T. Kamolphiwong, Robert Elz, Panita Pongpaibool. 238-243 [doi]
- Web attack detection using entropy-based analysisThanunchai Threepak, Akkradach Watcharapupong. 244-247 [doi]
- A new application level link aggregation and roaming scheme for android terminalsAkira Hidaka, Koichi Asatani, Kazuhisa Fujimura, Osamu Mizuno. 248-253 [doi]
- QoE assessment of a web-based streaming service in seeking operationHiroaki Tani, Toshiro Nunome. 254-259 [doi]
- Software aging trend analysis of server virtualized systemBiju R. Mohan, G. Ram Mohana Reddy. 260-263 [doi]
- SDN integration in LTE mobile backhaul networksJosé Costa-Requena. 264-269 [doi]
- C-flow: An efficient content delivery framework with OpenFlowDukhyun Chang, Myungchul Kwak, Nakjung Choi, Ted Taekyoung Kwon, Yanghee Choi. 270-275 [doi]
- Performance optimization of media distribution in overlay networks using OpenFlowShimin Sun, Li Han, Sungchol Cho, Sunyoung Han, Junfeng Wang, Béatrice Paillassa. 276-281 [doi]
- Investigating the utility of S-transform for detecting Denial-of-Service and probe attacksSirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi. 282-287 [doi]
- Analysis of BitTorrent inspired by The Application Layer Traffic OptimizationNattee Pinthong, Woraphon Lilakiatsakun. 288-291 [doi]
- Power control under QoS and interference constraint in Femtocell cognitive networksCuong T. Do, Duc Ngoc Minh Dang, Tuan LeAnh, Nguyen H. Tran, Rim Haw, Choong Seon Hong. 292-297 [doi]
- Delay distribution for a new version of a simple mac protocol for cognitive wireless networksAdauto Mendes Bernardes Junior, Jose Marcos Camara Brito. 298-301 [doi]
- Cooperative spectrum sensing and analysis of the optimum users number based on the primary user transmission with relayYannan Zou, Xianzhong Xie, Xiaofeng Hu, Ting Song. 302-307 [doi]
- Proposal of flexible time-slot assignment algorithm for sub-λ switching networkKeisuke Okamoto, Tatsuro Takahashi. 308-313 [doi]
- Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigmJerzy Konorski, Artur Makutunowicz. 314-319 [doi]
- Analysis and suppression of phase noise and IQ imbalance for dual-band MIMO-OFDMJunyeong Bok, Heung-Gyoon Ryu. 320-324 [doi]
- Uplink CoMP and the applications in TD-LTE networks: Principles and the field trialLei Li, Peter Butovitsch, Qixing Wang, Lifeng He, Yi Zheng. 325-329 [doi]
- Performance analysis of Nakagami-m MIMO channel in the presence of multiple keyholeMd. Muzahidul Islam, Md. Razibul Haque, Md. Rezaul Islam, Md. Golam Mostafa. 330-334 [doi]
- A novel reactance domain MUSIC algorithm for direction of arrival estimation using 13-element ESPAR antennasXin Wang, Bong Jun Kim, Heung-Gyoon Ryu. 335-339 [doi]
- Analysis of the match probabilities for the iTrust information network with message forwardingLouise E. Moser, P. Michael Melliar-Smith. 340-345 [doi]
- Empirical evaluation of existing algorithms of spectrum based fault localizationJeongho Kim, Eunseok Lee. 346-351 [doi]
- Copyright protection and distribution system for scanned books/comicsSeonghyun Kim, Sang-Hoon Lee, Taegeun Oh, Nakyeon Choi, Justin Daegull Ryu, Hogab Kang, Sanghoon Lee 0001. 352-355 [doi]
- Performance evaluation of 802.11p WAVE system on embedded boardZhen Qin, Zhen Meng, Xiaoyi Zhang, Bin Xiang, Lin Zhang. 356-360 [doi]
- Network-based content identification system via content-based comics fingerprintJiwoo Kang, Taegeun Oh, Nakyeon Choi, Sang-Hoon Lee, Sanghoon Lee 0001, Hogab Kang. 361-363 [doi]
- Examining the performance of topic modeling techniques in Twitter trends extractionMutia N. Kurniati, Woo-Jong Ryu, Md. Hijbul Alam, SangKeun Lee. 364-369 [doi]
- Load balancing based on dynamic overlay clusteringHojae Lee, Seonghyun Kim, Sooyong Choi, Chungyong Lee, Daesik Hong, Sanghoon Lee 0001, Jungshin Park, Jonghyung Kwun. 370-373 [doi]
- Tracking system for mobile user based on CCTVYong-Ik Yoon, Jee-Ae Chun. 374-378 [doi]
- Experimental evaluation of FairWLANSimao Silva, Ricardo Lopes Pereira, Rui Valadas. 379-384 [doi]
- Expected capacity based handoff scheme for multimedia data in WLANDong-hyun Kim, Seung-Kyu Byun, Jong-Deok Kim. 385-389 [doi]
- Confidential aggregation for wireless transmissionsSoonhwa Sung. 390-394 [doi]
- An efficient uplink admission control for ertPS in IEEE 802.16Minho Park, Dong Kun Noh, Souhwan Jung. 395-400 [doi]
- Cooperative source number estimation for cognitive radio networksSamuli Tiiro, Kenta Umebayashi, Yasuo Suzuki. 401-405 [doi]
- Spectrum handoff model based on Hidden Markov model in Cognitive Radio NetworksChuan Pham, Nguyen H. Tran, Cuong T. Do, Seung-Il Moon, Choong Seon Hong. 406-411 [doi]
- Probability-based spray and wait protocol in Delay Tolerant NetworksEung-Hyup Kim, Jae-Choong Nam, Jae-In Choi, You Ze Cho. 412-416 [doi]
- TDoA localization for wireless networks with imperfect clock synchronizationRyangsoo Kim, Taejin Ha, Hyuk Lim, Daewon Jung. 417-421 [doi]
- A novel scheme for preventing Out-Of-Order Packets in fast handover for Proxy Mobile IPv6Anh Khuong Quoc, Dongsoo S. Kim, Hyunseung Choo. 422-427 [doi]
- Passive packet loss detection in Wi-Fi networks and its effect on HTTP traffic characteristicsSaeed Ullah, Imdad Ullah, Hassaan Khaliq Qureshi, Rim Haw, Sungman Jang, Choong Seon Hong. 428-432 [doi]
- Study on mobile mashup webapp development tools for different devices and user groupsYoon-Seop Chang, Seong Ho Lee, Jae-Chul Kim, Young-jae Lim. 433-438 [doi]
- Content caching with bi-level control for efficient IPTV content steaming serviceJong Geun Park, Hoon Choi, Bhum-Cheol Lee. 439-443 [doi]
- The lexicon-based sentiment analysis for fan page ranking in FacebookPhan Trong Ngoc, Myungsik Yoo. 444-448 [doi]
- Permission-based malware detection mechanisms for smart phonesMing-Yang Su, Wen-Chuan Chang. 449-452 [doi]
- Secure key management scheme based on ECC algorithm for patient's medical information in healthcare systemYoung Sil Lee, Esko Alasaarela, Hoon Jae Lee. 453-457 [doi]
- A collaborative solution for SNMP traces visualizationVinicius Tavares Guimaraes, Glederson Lessa dos Santos, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 458-463 [doi]
- Efficient Bandwidth Estimation for HTTP adaptive streamingDooyeol Yun, Kwangsue Chung, Jinpyo Hong. 464-468 [doi]
- A genetic algorithm based power consumption scheduling in smart grid buildingsEunji Lee, Hyokyung Bahn. 469-474 [doi]
- WoO based user centric Energy Management System in the internet of thingsZia Ush-Shamszaman, Sanghong Lee, Ilyoung Chong. 475-480 [doi]
- User-friendly demand side management for smart grid networksHyoungchel Bae, Jongha Yoon, Yunseong Lee, Juho Lee, Taejin Kim, Jeongseok Yu, Sungrae Cho. 481-485 [doi]
- An evaluation of load distribution method on multi-source P2P sensor data stream delivery systemTomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi. 486-491 [doi]
- Pipeline architecture for mobile data analysisArlindo F. da Conceição, Jimmy V. Sánchez, Bruno Gabriel dos Santos, Dario Vieira, Vladimir Rocha. 492-496 [doi]
- QoE-enhanced adaptation algorithm over DASH for multimedia streamingDongeun Suh, Insun Jang, Sangheon Pack. 497-501 [doi]
- Data dissemination on MANET using content delivery network (CDN) techniqueNattiya Khaitiyakun, Teerapat Sanguankotchakorn, Apinun Tunpan. 502-506 [doi]
- A sequential pattern mining using dynamic in stream environmentPilsun Choi, Hwan Kim, Buhyun Hwang. 507-511 [doi]
- Dynamic transmission control to save power considering communication qualityYutaka Fukuda, Yasuaki Yamashita, Takeshi Ikenaga. 512-516 [doi]
- FTTx with dynamic wavelength and bandwidth allocationPichittra Kanjanopas, Rachata Maneekut, Pasu Kaewplung. 517-520 [doi]
- Efficiency of different modulation types in optical systems with limited bandwidthJ. Siuzdak. 521-526 [doi]
- Joint source-channel distortion model for optimal FEC code rate decisionTae-jun Jung, Kwang-deok Seo, Yo-Won Jeong. 527-529 [doi]
- Effects of MLSE equalization for constant envelope modulation signals affected by ADC nonlinearityRyuta Fukunaga, Osamu Muta, Hiroshi Furukawa. 530-535 [doi]
- New quasi-orthogonal differential detection for differential space-time modulationHojun Kim, Taejin Jung. 536-540 [doi]
- Data aggregation using temporal and spatial correlations in Advanced Metering InfrastructureKyung Choi, Kijoon Chae. 541-544 [doi]
- Approximate recovery of network coded real-time informationMinhae Kwon, Hyunggon Park. 545-549 [doi]
- Partial Swarm Merger: Increasing BitTorrent content availabilityAntónio Homem Ferreira, Ricardo Lopes Pereira, Fernando M. Silva. 550-555 [doi]
- Indoor TD-LTE small cell deployment study: Benefit of adding cells is not always existingYi Wu, Peter Butovitsch. 556-560 [doi]
- Path selection in inter-domain dynamic circuit network (DCN) based on a probabilistic link failure modelTananun Orawiwattanakul, Hideki Otsuki, Eiji Kawai, Shinji Shimojo, Kazutsuna Yamaji, Motonori Nakamura. 561-566 [doi]
- IASM: An Integrated Attribute Similarity for complex networks generationBassant E. Youssef, Hoda M. Hassan. 567-571 [doi]
- Optimization of broadband wireless networks with centralized control using memetic algorithmShih-Cheng Horng, Feng-Yi Yang. 572-577 [doi]
- Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networksBruce Ndibanje, Hoon Jae Lee. 578-582 [doi]
- Towards a trust management for VANETsYeongkwun Kim, Injoo Kim, Charlie Y. Shim. 583-587 [doi]
- Resource allocation policy to avoid interference between cellular and D2D Links/ and D2D links in mobile networksHyung-sub Kim, Jee-hyeon Na, Eunsun Cho. 588-591 [doi]
- A security mechanism of Smart Grid AMI network through smart device mutual authenticationSangji Lee, Jinsuk Bong, Sunhee Shin, Yongtae Shin. 592-595 [doi]