Abstract is missing.
- A model for estimating energy consumption based on resources utilizationLucas Venezian Povoa, Pedro W. Bignatto, Carlos E. Monteiro, Daniel Mueller, Cesar A. C. Marcondes, Hermes Senger. 1-6 [doi]
- Smart data centers for green CloudsDario Bruneo, Maria Fazio, Francesco Longo, Antonio Puliafito. 3-8 [doi]
- Empirical evaluation of vector bin packing algorithms for energy efficient data centersLei Shi, John Furlong, Runxin Wang. 9-15 [doi]
- A practical approach to easily monitoring and managing IaaS environmentsPaolo Bellavista, Carlo Giannelli, Massimiliano Mattetti. 16-21 [doi]
- QoS-oriented Service Management in large scale federated cloudsDimosthenis Kyriazis, Konstantinos Kostantos, Andrew Kapsalis, Spyridon V. Gogouvitis, Theodora A. Varvarigou. 22-27 [doi]
- Dynamic Cloud management for efficient stream processingLuca Foschini, Burak Kantarci, Antonio Corradi, Hussein T. Mouftah. 28-34 [doi]
- SE CLEVER: A secure message oriented Middleware for Cloud federationAntonio Celesti, Maria Fazio, Massimo Villari. 35-40 [doi]
- Vehicular Communication projects classification and evaluationBandar Alghamdi, Hacène Fouchal. 43-48 [doi]
- Dynamic query path selection from lattice of cuboids using memory hierarchySantanu Roy, Soumya Sen, Anirban Sarkar, Nabendu Chaki, Narayan C. Debnath. 49-54 [doi]
- Data collection for counting individuals and habitat characterizationNathalie Dessart, Philippe Hunel, Jean-Raphael Gros-Desormeaux. 55-60 [doi]
- Role-Based Access Control modeling and validationRamzi A. Haraty, Mirna Naous. 61-66 [doi]
- Data protection in multipath WSNsQuentin Monnet, Lynda Mokdad, Jalel Ben Ithman. 67-72 [doi]
- Energy, QoS and bursts profile management in uplink IEEE 802.16e mobile WiMAX networksKhalil Ibrahimi, Fatima Zahra Ennouary, El-Houssine Bouyakhf. 73-78 [doi]
- Design Graph Multi-Dimensional Data Model of a Data Warehouse and conversion of its equivalent Object - Oriented SchemaS. Abdul Rahim, Baisakhi Chakraborty, Joyati Debnath, Narayan C. Debnath. 79-84 [doi]
- Performance and reliability analysis of Small Cell Networks with retrials and different breakdowns disciplines: A computational approachNawel Gharbi, Lynda Mokdad, Jalel Ben-Othman. 85-90 [doi]
- An improved authentication scheme for applying RFID in VANETsQingwei Zhang, Mohammed Almulla, Azzedine Boukerche. 91-95 [doi]
- Hierarchical pruning to improve bandwidth utilization of RPF-based broadcastingSindoora Koneru, Bidyut Gupta, Shahram Rahimi, Ziping Liu, Narayan C. Debnath. 96-100 [doi]
- Performance analysis of crosspoint queued crossbar switch with weighted round robin scheduling algorithm under unbalanced bursty trafficSoko Divanovic, Milutin Radonjic, Igor Radusinovic, Gordana Gardasevic. 120-124 [doi]
- A collision prevention mechanism for the multicast transport in IEEE 802.11 networksYousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed. 125-130 [doi]
- An analytical comparison of the Block NAK protocol and the IEEE 802.11aa feedback policy for a reliable multicast transport in the WLANYousri Daldoul, Toufik Ahmed, Djamal-Eddine Meddour. 131-136 [doi]
- An objective multi-factor QoE evaluation based on content classification for H.264/AVC encoded videoJichun Liu, Yang Geng, Deyuan Wang, Wenjing Li, Xuesong Qiu. 137-142 [doi]
- T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systemsMike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos. 143-148 [doi]
- Energy routing in the smart grid for Delay-Tolerant Loads and Mobile Energy BuffersMelike Erol-Kantarci, Jahangir H. Sarker, Hussein T. Mouftah. 149-154 [doi]
- Reliable data transfer mechanisms for Smart Grid wide area monitoring networksM. Karthick, Muthukumar Radhakrishnan, Krishna M. Sivalingam. 155-160 [doi]
- Residential energy simulation and scheduling: A case study approachJagannathan Venkatesh, Baris Aksanli, Tajana Simunic Rosing. 161-166 [doi]
- From adaptive to sufficient modulation and coding: Demand oriented mobile power optimizationTugra Sahiner, Gunes Karabulut Kurt, Aysegul Ozbakir. 167-172 [doi]
- O-Gene: Towards an open green network control planePasquale Donadio, Silvia Russo, Roberto Canonico, Giorgio Ventre. 173-178 [doi]
- Efficient fingerprint extraction for high performance Intrusion Detection SystemHaiyang Jiang, Gaogang Xie, Kavé Salamatian. 179-184 [doi]
- Assessing trust in the long-term protection of documentsMartín A. Gagliotti Vigil, Daniel Cabarcas, Johannes Buchmann, Jingwei Huang. 185-191 [doi]
- SAnoVS: Secure anonymous voting scheme for clustered ad hoc networksNicos Komninos, Christos Tselikis, Christos Douligeris. 192-196 [doi]
- Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codesMarco Baldi, Marco Bianchi 0002, Nicola Maturo, Franco Chiaraluce. 197-202 [doi]
- Evaluation of IPv6 with IPSec in IEEE 802.11n wireless LAN using Fedora 15 operating systemSamad S. Kolahi, Yuqing Cao, Hong Chen. 203-206 [doi]
- A truly scalable IP lookup algorithm for next generation internetYi Dai, Liquan Xiao, Kefei Wang, Heying Zhang, Bao-kang Zhao, Shaogang Wang. 207-212 [doi]
- Over-provisioning centric network resource control in Future Internet systemsSandino Jardim, Augusto Neto, José Castillo Lema, Eduardo Cerqueira, Felipe Sampaio Dantas da Silva. 213-218 [doi]
- Characterizing and analysis of the flattening Internet topologyZhengwei Zhao, Jingping Bi. 219-225 [doi]
- Composition of services in pervasive environments: A Divide and Conquer approachGilbert Cassar, Payam M. Barnaghi, Wei Wang 0042, Suparna De, Klaus Moessner. 226-232 [doi]
- Trustworthy incident information sharing in social cyber defense alliancesFlorian Skopik, Qin Li. 233-239 [doi]
- Iterative contending-user estimation method for OFDMA wireless networks with bursty arrivalsRay-Guang Cheng, Chia-Hung Wei, Shiao Li Tsao. 240-245 [doi]
- Comparison of methods for accelerating the response time of TCP sessions over long delay pathsAhmed Yusuf Tambuwal, Raffaello Secchi, Gorry Fairhurst. 246-251 [doi]
- Real-life multipath TCP based make-before-break vertical handoverJari Kellokoski. 252-256 [doi]
- On delay-aware joint uplink/downlink resource allocation in OFDMA networksAhmad M. El-Hajj, Zaher Dawy. 257-262 [doi]
- An improved method for reconstruction of channel taps in OFDM systemsYanhong Ju, Songlin Sun, Fei Qi, Xiaojun Jing, Yueming Lu, Na Chen. 263-268 [doi]
- Fast GPU algorithms for implementing the red-black Gauss-Seidel method for Solving Partial Differential EquationsMahmoud El Maghrbay, Reda A. Ammar, Sanguthevar Rajasekaran. 269-274 [doi]
- A comprehensive approach to reduce the energy cost of network of datacentersBaris Aksanli, Jagannathan Venkatesh, Tajana Rosing, Inder Monga. 275-280 [doi]
- SRIDesk: A Streaming based Remote Interactivity architecture for desktop virtualization systemJiewei Wu, Jiajun Wang, Zhengwei Qi, Haibing Guan. 281-286 [doi]
- A practical viewpoint on the performance of LDPC codes over the fast Rayleigh fading wire-tap channelMarco Baldi, Marco Bianchi 0002, Nicola Maturo, Franco Chiaraluce. 287-292 [doi]
- Secure and revocable node authentication in Vehicular Ad-Hoc NetworksJenny Torres, Michele Nogueira, Guy Pujolle. 293-298 [doi]
- End-to-end authentication in Under-Water Sensor NetworksEvaldo Souza, Hao Chi Wong, Ítalo Cunha, Antonio A. F. Loureiro, Luiz Filipe M. Vieira, Leonardo B. Oliveira. 299-304 [doi]
- A method for improving mobile authentication using human spatio-temporal behaviorYusuf Albayram, Sotiris Kentros, Ruhua Jiang, Athanasios Bamis. 305-311 [doi]
- Sensor Swarm query filtering: Heightened attack resilience for broadcast on-demand servicesChristos Liaskos, Georgios I. Papadimitriou, Christos Douligeris. 312-317 [doi]
- On using cooperative game theory to solve the wireless scalable video multicasting problemSu Luo, Songlin Sun, Xiaojun Jing, Yueming Lu, Na Chen. 318-323 [doi]
- BAMcast - byzantine fault-tolerant consensus service for Atomic Multicast in large-scale networksMarcelo Ribeiro Xavier Silva, Lau Cheuk Lung, Leandro Quibem Magnabosco, Luciana de Oliveira Rech. 324-329 [doi]
- MLSA: A link-state multipath routing algorithmHaijun Geng, Xia Yin, Xingang Shi, Zhiliang Wang. 330-335 [doi]
- A weighted QoS aware multipath routing process in Mobile Ad hoc networksMariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi. 336-341 [doi]
- Greedy Routing and Data Aggregation in wireless sensor networksMoyses M. Lima, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura, Leandro N. Balico, Antonio A. F. Loureiro. 342-347 [doi]
- Abrupt ending of 802.11 AP connectionsDossa Massa, Ricardo Morla. 348-353 [doi]
- A cooperative approach to fully utilizing the aggregate bandwidth of all service channels in IEEE 802.11p/1609 networksShie-Yuan Wang, Hung-Wei Chiu, Jie Zheng, Xiao Chen. 354-359 [doi]
- Lifetime-optimal transmission scheduling for cluster-based routing in cooperative networksYujian Wang, Bin Zhao, Weihua Huang, Wenjun Sun. 360-365 [doi]
- A DNS protocol - based Service Discovery architecture for disaster response systemsMohammadmajid Hormati, Fatna Belqasmi, Roch H. Glitho, Ferhat Khendek. 366-371 [doi]
- Adaptive Contact Volume prediction in Delay Tolerant NetworksJoao Batista Pinto Neto, Moyses M. Lima, Edjair Mota, Eduardo Cerqueira, Leandro N. Balico. 372-376 [doi]
- Data Distribution Service (DDS): A performance comparison of OpenSplice and RTI implementationsPaolo Bellavista, Antonio Corradi, Luca Foschini, Alessandro Pernafini. 377-383 [doi]
- Leveraging memory mirroring for transparent memory scale-out with zero-downtime failover of remote hostsRoei Tell, Peter Izsak, Aidan Shribman, Steve Walsh, Benoit Hudzia. 384-390 [doi]
- Tie-set Based Fault Tolerance for autonomous recovery of double-link failuresKiyoshi Nakayama, Kyle E. Benson, Vahe Avagyan, Michael B. Dillencourt, Lubomir F. Bic, Nalini Venkatasubramanian. 391-397 [doi]
- Byzantine fault-tolerant state machine replication with twin virtual machinesFernando Dettoni, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz. 398-403 [doi]
- Accountable security mechanism based on security service level agreementTakeshi Takahashi, Joona Kannisto, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan. 404-410 [doi]
- Combining conjunctive rule extraction with diffusion maps for network intrusion detectionAntti Juvonen, Tuomo Sipola. 411-416 [doi]
- A policy-based architecture for web services authenticationHao Zeng, Dianfu Ma, Yongwang Zhao, Zhuqing Li. 417-422 [doi]
- Enhancement security level and hardware implementation of ECDSANabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun. 423-429 [doi]
- A similarity based approach for application DoS attacks detectionMaurizio Aiello, Enrico Cambiaso, Silvia Scaglione, Gianluca Papaleo. 430-435 [doi]
- Cryptanalysis of the Toorani-Falahati Hill CiphersLiam Keliher, Anthony Z. Delaney. 436-440 [doi]
- An optimization-based robust routing algorithm for IP energy-efficient networksDingde Jiang, Wenhui Zhao, Zhengzheng Xu, Jindi Liu. 441-446 [doi]
- Infrastructure-dependent wireless multicast - improving the code rateJean Marie Vella, Saviour Zammit. 447-452 [doi]
- DCR: Depth-Controlled Routing protocol for underwater sensor networksRodolfo W. L. Coutinho, Luiz Filipe M. Vieira, Antonio A. F. Loureiro. 453-458 [doi]
- Data dissemination in urban Vehicular Ad hoc Networks with diverse traffic conditionsGuilherme Maia, Leandro A. Villas, Azzedine Boukerche, Aline Carneiro Viana, André L. L. de Aquino, Antonio A. F. Loureiro. 459-464 [doi]
- Energy-efficient cooperative spectrum sensing for cognitive radio sensor networksÖzgür Ergül, Özgür B. Akan. 465-469 [doi]
- Adaptive sensing policies for cognitive wireless networks using learning automataPanagiotis G. Sarigiannidis, Malamati D. Louta, Eleni Balasa, Thomas Lagkas. 470-475 [doi]
- Improved spectrum mobility using virtual reservation in collaborative cognitive radio networksAyman T. Abdel-Hamid, Ahmed H. Zahran, Tamer A. ElBatt. 476-482 [doi]
- Multi-stage energy detection Spectrum Sensing using group intelligenceMuhammed Fahim, Mahmoud H. Ismail, Hazim Tawfik. 483-488 [doi]
- Extensive analysis of a Kad-based distributed storage system for session dataJan Skodzik, Peter Danielis, Vlado Altmann, Dirk Timmermann. 489-494 [doi]
- A traffic localization strategy for peer-to-peer live streamingChao Dai, Yong Jiang, Shu-Tao Xia, Hai-Tao Zheng, Laizhong Cui. 495-501 [doi]
- SocialStreaming: P2P-assisted streaming in social networksLaizhong Cui, Nan Lu. 502-507 [doi]
- A method for designing proximity-aware routing algorithms for structured overlaysTakehiro Miyao, Hiroya Nagao, Kazuyuki Shudo. 508-514 [doi]
- GUGA: A tool for participatory citiesLuana Carine Schunke, Luiz Paulo Luna de Oliveira, Marta Becker Villamil. 515-521 [doi]
- Is it possible to detect mobile phone user's attention based on accelerometer measurment of gait pattern?Josip Music, Ivo Stancic, Vlasta Zanchi. 522-527 [doi]
- Challenges and opportunities on the large scale study of city dynamics using participatory sensingThiago H. Silva, Pedro O. S. Vaz de Melo, Jussara M. Almeida, Antonio A. F. Loureiro. 528-534 [doi]
- DrivingStyles: A smartphone application to assess driver behaviorJavier E. Meseguer, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 535-540 [doi]
- Performance evaluation of software-defined networking with real-life ISP trafficXiangxin Kong, Zhiliang Wang, Xingang Shi, Xia Yin, Dan Li. 541-547 [doi]
- Scaling Bloom filter-based multicast via filter switchingChristos Tsilopoulos, George Xylomenos. 548-553 [doi]
- IPv6 network topology discovery method based on novel graph mapping algorithmsMiao Li, Jiahai Yang, Changqing An, Chenxi Li, Fuliang Li. 554-560 [doi]
- Modeling and optimizing the cache deployment with filter effect in multi-cache systemYiming Zhou, Laizhong Cui, Yong Jiang, Mingwei Xu. 561-566 [doi]
- Hephaestus: A cloud-based environment to virtual network automationRoberio Gomes Patricio, Joaquim Celestino. 567-571 [doi]
- A sub-optimal receiver performance study over a multipath UWB channelAbdellah Chehri, Hussein T. Mouftah, Paul Fortier. 572-575 [doi]
- MIMO-diversity switching techniques for digital transmission in visible light communicationLih Chieh Png, Long Xiao, Kiat Seng Yeo, Thin Sek Wong, Yong Liang Guan. 576-582 [doi]
- A theoretical characterization and compensation of nonlinear distortion effects and performance analysis using polynomial model in MIMO OFDM systems under Rayleigh fading channelMaha Cherif Dakhli, Rafik Zayani, Ridha Bouallegue. 583-587 [doi]
- On reliable information rate bounds for fading channel with receiver CSI onlyKadir Türk, Pingyi Fan. 588-592 [doi]
- A statistical-based algorithm for event region detection in Wireless Sensor NetworksAnousheh Tavakoli-Dehkordi, Yifan Chen, Predrag B. Rapajic, Chau Yuen, Yong Huat Chew. 593 [doi]
- Optimizing the management of a database in a virtual environmentTimoteo Lange, Paolo Cemim, Miguel G. Xavier, César A. F. De Rose. 594-599 [doi]
- Inferring presence status on smartphones: The big data perspectiveAleksandar Antonic, Ivana Podnar Zarko, Domagoj Jakobovic. 600-605 [doi]
- PUBSUB: An efficient publish/subscribe systemTania Banerjee-Mishra, Sartaj Sahni. 606-611 [doi]
- A two-pass exact algorithm for selection on Parallel Disk SystemsTian Mi, Sanguthevar Rajasekaran. 612-617 [doi]
- Improving load balancing for MapReduce-based entity matchingDemetrio Gomes Mestre, Carlos Eduardo Santos Pires. 618-624 [doi]
- The effect of the congestion control window size on the TCP incast and its implicationsGuodong Wang, Yongmao Ren, Ke Dou, Jun Li. 625-628 [doi]
- Ensemble classifier for traffic in presence of changing distributionsRunxin Wang, Lei Shi, Brendan Jennings. 629-635 [doi]
- The 2ACT model-based evaluation for in-network caching mechanismKe Xu, Min Zhu, Ning Wang, Song Lin, Haiyang Wang, Tong Li. 636-641 [doi]
- Development and evaluation of LISP-based instant VPN servicesChikara Sasaki, Peng Jiang, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano. 642-647 [doi]
- Locating disruptions on an Internet path through end-to-end measurementsAtef Abdelkefi, Yaser Eftekhari, Yuming Jiang. 648-653 [doi]
- Static dispatching with internal backpressure scheme for SMM Clos-network switchesJanusz Kleban, Urszula Suszynska. 654-658 [doi]
- A measurement protocol for channel assignment based topology control on multi-radio wireless mesh networksAnte Prodan, John K. Debenham. 659-664 [doi]
- Exploiting multiuser diversity for OFDMA next generation wireless networksAbdellah Chehri, Hussein T. Mouftah. 665-669 [doi]
- On the comprehension of DSL SyncTrap events in IPTV networksAngelos K. Marnerides, Simon Malinowski, Ricardo Morla, Miguel R. D. Rodrigues, Hyong S. Kim. 670-675 [doi]
- Self-* properties and P2P technology on disruption-tolerant managementJéferson Campos Nobre, Pedro Arthur Pinheiro Rosa Duarte, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 676-681 [doi]
- Probability of error and ergodic capacity of switch-and-examine combining diversity over the α-μ fading channelRefaat Mohamed, Mahmoud H. Ismail, Fatma A. Newagy, Hebat-Allah M. Mourad. 682-687 [doi]
- Fractionally spaced self-interference canceler for full-duplex communication systemsSemiha Tedik, Günes Karabulut-Kurt. 688-692 [doi]
- Interference-aware radio resource management framework for the 3GPP LTE uplink with QoS constraintsAmira Afifi, Khaled M. F. Elsayed, Ahmed A. F. Khattab. 693-698 [doi]
- On the efficacy of WiFi indoor positioning in a practical settingThomas Jaffre, Pierre-Mickael Grigis, Stylianos Papanastasiou, Evtim Peytchev. 699-704 [doi]
- Recovering erroneous data bits using error estimating codeXingshen Wei, Wenzhong Li, Xiaoliang Wang, Sanglu Lu, Xiaoming Fu. 705-710 [doi]
- Evaluation of Audio/Video Bridging forwarding method in an avionics switched ethernet contextFabien Geyer, Emanuel Heidinger, Stefan Schneele, Alexander von Bodisco. 711-716 [doi]
- Connections analysis of voice traffic over MANETs and their impact on delay variationSofiene Jelassi, Gerardo Rubino. 717-723 [doi]
- Throughput improvement of oversampled WiMAX receiver in frequency selective channelKadir Türk. 724-728 [doi]
- Mathematical model of simplified Constrained Priority Countdown Freezing protocolAnte Kristic, Julije Ozegovic, Ivan Kedzo. 729-734 [doi]
- Fair division methods approach as the option of learning process modelingJadranka Marasovic, Tea Marasovic, Marija Dapic. 735-739 [doi]
- Power modeling and thermal management techniques for manycoresRajib Nath, Douglas Carmean, Tajana Simunic Rosing. 740-746 [doi]
- Modeling of a dynamic RFID systemMarek Gotfryd, Bartosz Pawlowicz. 747-752 [doi]
- An optimal segment replication strategy in P2P-VoD systemsHongke Hu, Yong Jiang, Laizhong Cui, Shu-Tao Xia, Hai-Tao Zheng. 753-758 [doi]
- LMD: A local minimum driven and self-organized method to obtain locatorsYonggong Wang, Gaogang Xie, Mohamed Ali Kâafar, Steve Uhlig. 759-764 [doi]
- Baatdaat: Measurement-based flow scheduling for cloud data centersFung Po Tso, Dimitrios P. Pezaros. 765-770 [doi]
- Queuing analysis of dynamic resource allocation for virtual routersMohamed Said Seddiki, Bilel Nefzi, Ye-Qiong Song, Mounir Frikha. 771-776 [doi]
- Scheduling multicast traffic in partially buffered crossbar switchesCao Di, Lotfi Mhamdi. 777-782 [doi]
- Improvement of a service level negotiation protocol using formal verificationMohamed Aymen Chalouf, Francine Krief, Nader Mbarek, Tayeb Lemlouma. 783-788 [doi]
- The impacts of internal threats towards Routing Protocol for Low power and lossy network performanceAnhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae. 789-794 [doi]
- Localized MAC duty-cycling adaptations for global energy-efficiency in Wireless Sensor NetworksJulien Beaudaux, Antoine Gallais, Thomas Noël. 795-800 [doi]
- An adaptive surface sink redeployment strategy for Underwater Sensor NetworksManal Al-Bzoor, Yibo Zhu, Jun Liu, Reda A. Ammar, Jun-Hong Cui, Sanguthevar Rajasekaran. 801-806 [doi]
- Deriving lower bounds for energy consumption in Wireless Sensor NetworksAdriana Gomes Penaranda, Andre Ricardo Melo Araujo, Fabíola Guerra Nakamura, Eduardo Freire Nakamura. 807-813 [doi]
- An analysis of replication and retrieval of medical image data using a database management system and a distributed file systemElias Amaral Santos, Eros Comunello, Douglas D. J. de Macedo, Miriam A. M. Capretz, Thiago Coelho Prado, M. A. R. Dantas. 814-819 [doi]
- Assessing performance of Internet services on IPv6David Plonka, Paul Barford. 820-826 [doi]
- IP traffic classifiers applied to DiffServ networksMichael Taynnan Barros, Reinaldo Gomes, Marcelo Sampaio de Alencar, Anderson F. B. F. da Costa. 827-832 [doi]
- Optimization of ad hoc device and service discovery in large scale networksVlado Altmann, Peter Danielis, Jan Skodzik, Frank Golatowski, Dirk Timmermann. 833-838 [doi]
- Object classification inwater sportsVladimir Plestina, Vladan Papic. 839-844 [doi]
- Local colour statistics for edge definitionBarbara Dzaja, Niksa Antisic, Mirjana Bonkovic. 845-849 [doi]
- Comparison of stamp classification using SVM and random fernsPjero Petej, Sven Gotovac. 850-854 [doi]
- Scalable video coding guidelines and performance evaluations for adaptive media delivery of high definition contentMichael Grafl, Christian Timmerer, Hermann Hellwagner, Wael Chérif, Daniel Negru, Stefano Battista. 855-861 [doi]
- Comparative study of a Hybrid Model for network traffic identification and its optimization using Firefly AlgorithmZuleika Nascimento, Djamel Sadok, Stenio F. L. Fernandes. 862-867 [doi]
- Detection of Fast-Flux Networks using various DNS feature setsZ. Berkay Celik, Sema Oktug. 868-873 [doi]
- Model of influence of MRP on network performancesFilip Belic, Goran Martinovic. 874-879 [doi]
- Basic classifiers for DNS tunneling detectionMaurizio Aiello, Maurizio Mongelli, Gianluca Papaleo. 880-885 [doi]
- BSF-UED: A new time-efficient Bluetooth Scatternet Formation algorithm based on Unnecessary-Edges DeletionAhmed Jedda, Arnaud Casteigts, Guy-Vincent Jourdan, Hussein T. Mouftah. 886-891 [doi]
- A self-adaptive recovery strategy for service composition in ubiquitous stub environmentsLijun Wang, Lanlan Rui, Xuesong Qiu, Wenjing Li, Kangming Jiang. 892-897 [doi]
- Strategies for optimal MAC parameter setting in IEEE 802.15.4 wireless sensor networks: A performance comparisonSimone Brienza, Domenico De Guglielmo, Giuseppe Anastasi, Marco Conti, Vincenzo Neri. 898-903 [doi]
- RelBAS: Reliable data gathering from border area sensors Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar. 904-909 [doi]
- A traffic adaptive inter-cluster head delay control scheme in WSNsIrfan S. Al-Anbagi, Melike Erol-Kantarci, Hussein T. Mouftah. 910-915 [doi]
- Optical stateful security filtering approach based on code wordsMaha Sliti, Noureddine Boudriga. 916-921 [doi]
- A column generation-based heuristic for the GRWA with protection and QoS in WDM optical networksFernanda Sumika H. Souza, Daniel L. Guidoni, Geraldo R. Mateus. 922-927 [doi]
- The cost of traffic protection in bidirectional optical packet switching ringsBogdan Uscumlic, Lida Sadeghioon, Annie Gravey, Philippe Gravey. 928-933 [doi]
- Optical infrastructure for visible light communication for public housing and commercial buildingsLih Chieh Png, Kiat Seng Yeo. 934-939 [doi]
- Capabilities and objectives of distributed image processing on smart camera systemsRene Golembewski, Steve Goering, Guenter Schaefer. 940-945 [doi]
- Information-theoretic approach to variable selection in predictive models applied to paper machine dataElena Ivannikova, Timo Hämäläinen 0002, Kari Luostarinen. 946-950 [doi]
- A novel feature descriptor for gesture classification using smartphone accelerometersTea Marasovic, Vladan Papic. 951-955 [doi]
- Method for elicitation, documentation and validation of software user requirements (MEDoV)Srdjana Dragicevic, Stipe Celar. 956-961 [doi]
- An MDE approach for domain based architectural components modellingRahma Bouaziz. 962-968 [doi]
- A handoff algorithm based on link quality prediction for mass transit wireless mesh networksCarmine Benedetto, Enzo Mingozzi, Carlo Vallati. 969-974 [doi]
- ID-MAC: An identity-based MAC protocol for Wireless Sensor NetworksFelipe D. da Cunha, Ítalo Cunha, Hao Chi Wong, Antonio A. F. Loureiro, Leonardo B. Oliveira. 975-981 [doi]
- Handoff triggering for wireless sensor networks with performance needsZinon Zinonos, Vasos Vassiliou, Chrysostomos Chrysostomou. 982-988 [doi]
- A utility-based terminal selection mechanism for terminal cooperation in heterogeneous wireless networksShoushou Ren, YinLong Liu, Xu Zhou, Hui Tang, Song Ci. 989-994 [doi]