Abstract is missing.
- A Q-Learning-based Power-Controlled Routing protocol in multihop wireless ad hoc networkKe Wang, Teck Yoong Chai, Wai-Choong Wong. 1-5 [doi]
- A design of degree distribution for systematic fountain codesLiang Chen, Limin Meng, Zhijiang Xu, Jiangxin Zhang, Wei Jiang. 1-5 [doi]
- A network performance-aware routing for multisite virtual clustersKohei Ichikawa, Susumu Date, Hirotake Abe, Hiroaki Yamanaka, Eiji Kawai, Shinji Shimojo. 1-5 [doi]
- Access LUT without CAM - Improved Pearson hashing for collision reductionChung-Ping Hung, Paul S. Min. 1-5 [doi]
- TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc NetworksJaebeom Kim, Daewook Shin, Young-Bae Ko. 1-6 [doi]
- ADPSM: An Adaptive Delay-based Packet Splitting Mechanism for Concurrent Multipath Transfer over heterogeneous pathsZhenjie Deng, YinLong Liu, Lei Qian, Yahui Hu, Song Ci. 1-6 [doi]
- An analytical method for centroid computing and its application in wireless localizationXue Jun Li. 1-5 [doi]
- Wireless localization based on the time sum of arrival and Taylor expansionXiaoneng Zheng, Jingyu Hua, Zhilong Zheng, Hong Peng, Limin Meng. 1-4 [doi]
- Performance analysis of WDM OPS with a space priority mechanism under self-similar variable length packet trafficSampath K. Kumar, Malla Reddy Perati, T. Adilakshmi. 1-6 [doi]
- An efficient preamble compression for multi clock-rate sampling wireless devicesAnik Sengupta, Rahul Thakur, C. Siva Ram Murthy. 1-6 [doi]
- DCF and EDCA throughput improvement using Selective Anomalous Slot Avoidance (SASA)Teuku Yuliar Arif, Riri Fitri Sari. 1-7 [doi]
- Enhancing group communication systems with mobility supportJan Gäbler, Hartmut König. 1-6 [doi]
- Two traffic distribution approaches in terminal cooperation over heterogeneous wireless networksShoushou Ren, YinLong Liu, Xinghua Yang, Xu Zhou, Hui Tang, Song Ci. 1-6 [doi]
- MERPL: A more memory-efficient storing mode in RPLWei Gan, Zhiqiang Shi, Chen Zhang, Limin Sun, Dan Ionescu. 1-5 [doi]
- Interference alignment for MIMO downlink femtocell networksQingzhong Li, Xuemai Gu, Hanqing Li, Min Jia, Wei-dang Lu. 1-4 [doi]
- Deriving and visualizing the lower bounds of information gain for prefetch systemsChung-Ping Hung, Paul S. Min. 1-6 [doi]
- Hardware-based hash functions for network applicationsFumito Yamaguchi, Hiroaki Nishi. 1-6 [doi]
- Cascade effects of load shedding in coupled networksSotharith Tauch, William Liu, Russel Pears. 1-6 [doi]
- A novel peer selection mechanism in heterogeneous wireless peer-to-peer networksShoushou Ren, YinLong Liu, Xu Zhou, Hui Tang, Song Ci, Min Wang. 1-7 [doi]
- An anti-interference cooperative spectrum sharing strategy with full-duplexWeidang Lu, Jing Wang, Feng Li, Jingyu Hua, Limin Meng, Xinjian Zhao. 1-4 [doi]
- QoS provisioning self co-existence protocol for cognitive radio ad-hoc networksVishram Mishra, Chiew Tong Lau, Syin Chan. 1-6 [doi]
- Study of resource utilization in IEEE 802.15.4 Wireless Body Sensor Network, Part II: Greedy Channel UtilizationAmir Hossein Moravejosharieh, Ehsan Tabatabaei Yazdi, Andreas Willig. 1-6 [doi]
- Network supported congestion avoidance in software-defined networksJochen Gruen, Michael Karl, Thorsten Herfet. 1-6 [doi]
- Evaluation of routing protocols for video transmission over MANETs that use multiple interfaces and multiple channels per nodeChristos Bouras, Vaggelis Kapoulas, Apostolos Gkamas, D. Politaki, E. Tsanai. 1-6 [doi]
- Security testing in Android networks - A practical case studyRay Hunt. 1-6 [doi]
- A study on designing OpenFlow controller RISE 3.0Shuji Ishii, Eiji Kawai, Yoshihiko Kanaumi, Shuichi Saito, Tomoaki Takata, Kazumasa Kobayashi, Shinji Shimojo. 1-5 [doi]
- Survey of sensor selection methods in wireless sensor networksZhenxing Luo, Paul S. Min. 1-5 [doi]
- An integrated management framework for virtual machines, switches, and their SDNsAkiyoshi Sugiki. 1-6 [doi]
- Scheduling soft aperiodic messages on FlexRay in-vehicle networksMenglan Hu, Yang Wang, Wei Shi. 1-6 [doi]
- On the performance of Linux Container with Netmap/VALE for networks virtualizationMaurizio Casoni, Carlo Augusto Grazia, Natale Patriciello. 1-6 [doi]
- A graph-theoretic study of the flattening Internet AS topologyMohammad Z. Masoud, Xiaojun Hei, Wenqing Cheng. 1-6 [doi]
- Sketch-based data recovery in sensor data streamsSitthapon Pumpichet, Xinyu Jin, Niki Pissinou. 1-6 [doi]
- Application of LTE small cells in urban environments for higher capacityZoltán Jakó, Adam Knapp, Sándor Imre, Gábor Jeney. 1-6 [doi]
- Directional medium access control for ad hoc networks: A cooperation-based approachYu Wang, Hari Krishna Garg, Mehul Motani. 1-6 [doi]
- Multimedia optimized routing in OpenFlow networksMichael Karl, Jochen Gruen, Thorsten Herfet. 1-6 [doi]
- Enhancing the performance of HetNets via linear regression estimation of Range Expansion BiasSudeepta Mishra, Anik Sengupta, C. Siva Ram Murthy. 1-6 [doi]
- Loss behavior of an Internet router with self-similar input traffic via Fractal point processRajaiah Dasari, Malla Reddy Perati. 1-6 [doi]
- DIVA - Digital Identity in VANETs: A multi-authority framework for VANETsKamran Zaidi, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan. 1-6 [doi]
- Generalized fairness in QoS schedulingJorge Arturo Cobb. 1-6 [doi]
- Multiple constraints QoS routing using priority metrics with control variablesManeenate Puongmanee, Teerapat Sanguankotchakorn. 1-6 [doi]
- SIEM with LSA technique for Threat identificationPavarit Dairinram, Damras Wongsawang, Pagaporn Pengsart. 1-6 [doi]
- Maximum lifetime of reinforced barrier-coverage in Wireless Sensor NetworksHyunbum Kim, Jorge Arturo Cobb. 1-6 [doi]
- CIAM: An adaptive 2-in-1 missing data estimation algorithm in wireless sensor networksLiqiang Pan, Huijun Gao, Jianzhong Li, Hong Gao, Xintong Guo. 1-6 [doi]
- The performance of massive MIMO systems under correlated channelXin Fang, Sheng Fang, Na Ying, Haiyan Cao, Chao Liu. 1-4 [doi]
- Evaluating the performance of cloud services in a browser-based network measurement platformYao Yeboah Junior, Xiaojun Hei. 1-6 [doi]
- Shortening orphan time in IEEE 802.15.4: What can be gained?Ehsan Tabatabaei Yazdi, Andreas Willig, Krzysztof Pawlikowski. 1-6 [doi]
- A collaborative task planning and development environment on the Cloud/GridDoan B. Hoang, Hoang M. Phung, Elaine Lawrence. 1-6 [doi]
- Domain-based Hybrid OpenFlow Network (HON)Zoebir Bong, Derrick Lim Teck Leong, Bu-Sung Lee. 1-4 [doi]
- Power consumption modeling of femto-assisted cellular networks using Renewal Reward ProcessRahul Thakur, Anik Sengupta, C. Siva Ram Murthy. 1-6 [doi]
- Distributed contention based MAC protocol for cognitive radio networks with QoS provisioningVishram Mishra, Chiew Tong Lau, Syin Chan. 1-6 [doi]
- The evaluation of pilot symbol pattern in OFDM system from practical perspectiveXin Zhang, Liru Lu, Masayuki Oodo, Hiroshi Harada. 1-4 [doi]
- Performance evaluation for cooperative diversity-based wireless body area networkPunyawi Jamjareegulgarn. 1-6 [doi]
- Effective and efficient AI-based approaches to cloud resource provisioningYang Yang, Xiaolin Chang, Xuanni Du, Jiqiang Liu, Lin Li. 1-6 [doi]
- A Cross-layer design approach in OLSR MANET using BER and weighted Connectivity IndexTeerapat Sanguankotchakorn, Sanika K. Wijayasekara, Nobuhiko Sugino. 1-6 [doi]
- RFID in-pipe moisture sensing system for oil and gas quality monitoring in QatarAdnan Nasir, Boon-Hee Soong, Khalid A. Qaraqe. 1-5 [doi]
- Video analytics for surveillance camera networksLekha Chaisorn, Yongkang Wong. 1-6 [doi]
- Queue size analysis of QoS-aware Weighted Hybrid Packet Scheduling Scheme for BWA networksPrasun Chowdhury, Iti Saha Misra. 1-6 [doi]
- Joint routing and random network coding for multi-session networksXiaoli Xu, Yong Liang Guan. 1-5 [doi]
- Probe station placement algorithm for probe set reduction in network fault detection and localizationBalaji Patil, Shakti Kinger, Vinay Kumar Pathak. 1-6 [doi]
- Energy Neutral Clustering for energy harvesting wireless sensors networksShuai Peng, Chor Ping Low. 1-6 [doi]
- Software defined network based adaptive routing for data replication in Data CentersRenuga Kanagavelu, Bu-Sung Lee, Rodel Felipe Miguel, Le Nguyen The Dat, Luke Ng Mingjie. 1-6 [doi]
- Evaluation of link lifetime for the Random Waypoint mobility modelRoberto Ramos Colletti, Renato Mariz de Moraes. 1-5 [doi]
- Performance study of TCP flows with QoS-supported OpenFlow in data center networksPurnima Murali Mohan, Dinil Mon Divakaran, Mohan Gurusamy. 1-6 [doi]
- Prototyping and evaluation of a network-aware Job Management System on a cluster systemYasuhiro Watashiba, Yoshiyuki Kido, Susumu Date, Hirotake Abe, Kohei Ichikawa, Hiroaki Yamanaka, Eiji Kawai, Haruo Takemura. 1-6 [doi]
- Network data classification using graph partitionSahan L. Maldeniya, Ajantha S. Atukorale, Wathsala W. Vithanage. 1-6 [doi]
- Survey of target localization methods in wireless sensor networksZhenxing Luo, Paul S. Min. 1-4 [doi]
- A hierarchical method for user's behavior characteristics visualization and special user identificationWei Li 0029, Guangze Cao, Tao Qin, Ping Cao. 1-5 [doi]
- Optimal energy-efficient relay selection in cooperative cellular networksYun Li, Chao Liao, Xue Zhu, Mahmoud Daneshmand, Chonggang Wang. 1-5 [doi]