Abstract is missing.
- Energy efficiency analysis of HARQ with chase combining in multi-hop wireless sensor networksElieser Botelho Manhas, Marcelo Eduardo Pellenz, Glauber Gomes de Oliveira Brante, Richard Demo Souza, Fernando Rosas. 1-6 [doi]
- STELE: A Simple Technique for Local delay Estimation in WSNCledson Sousa, Ricardo Campanha Carrano, Luiz Claudio Schara Magalhães, Célio Vinicius N. de Albuquerque. 1-6 [doi]
- Task scheduling for energy optimization and temperature improvementsYifan Wang, Zhe Wang, Sanjay Ranka. 1-7 [doi]
- Autonomic data dissemination in highway Vehicular Ad Hoc Networks with diverse traffic conditionsRodolfo Ipolito Meneguette, Guilherme Maia, Edmundo R. M. Madeira, Antonio A. F. Loureiro, Leandro A. Villas. 1-6 [doi]
- Load balancing routing for path length and overhead controlling in Wireless Mesh NetworksMicael O. M. C. de Mello, Vinicius C. M. Borges, Leizer de L. Pinto, Kleber Vieira Cardoso. 1-6 [doi]
- Piccett: Protocol-independent classification of corrupted error-tolerant trafficFlorian Schmidt, Martin Henze, Klaus Wehrle. 1-7 [doi]
- Distributed Q-learning based dynamic spectrum management in cognitive cellular systems: Choosing the right learning rateNils Morozs, Tim Clarke, David Grace, Qiyang Zhao. 1-6 [doi]
- Computational weight of network traffic sampling techniquesJoão Marco C. Silva, Paulo Carvalho, Solange Rito Lima. 1-6 [doi]
- Efficient network service level agreement monitoring for cloud computing systemsAna Cristina Oliveira, Henryson Chagas, Marco Spohn, Reinaldo Gomes, Breno Jacinto Duarte. 1-6 [doi]
- A slot assignment for Wireless Body Area NetworksBandar Alghamdi, Marwane Ayaida, Hacène Fouchal, Hichem Baala. 1-8 [doi]
- Radio-frequency-based Wireless Energy Transfer in LTE-A heterogenous networksMelike Erol-Kantarci, Hussein T. Mouftah. 1-6 [doi]
- Z-Phone: Design and implementation of embedded Voice over Zigbee applicationsApostolos Meliones, Emmanuel Touloupis, J. Perello, A. Serrat. 1-7 [doi]
- A fast regular expression matching engine for NIDS applying prediction schemeLei Jiang, Qiong Dai, Qiu Tang, Jianlong Tan, Binxing Fang. 1-7 [doi]
- Mobility-aware trustworthy crowdsourcing in cloud-centric Internet of ThingsBurak Kantarci, Hussein T. Mouftah. 1-6 [doi]
- Fairness tradeoff analysis during VDSL2 network migration - Simulation and testbed resultsMartin Wolkerstorfer, Driton Statovci. 1-6 [doi]
- Overlay routing network construction by introducing Super-Relay nodesShengwen Tian, Jianxin Liao, Jingyu Wang, Qi Qi. 1-6 [doi]
- Message from the technical program co-chairsSusana Sargento, Sanguthevar Rajasekaran, Mario Dantas. 1 [doi]
- Topological routing for Heterogeneous Wireless Sensor NetworksDaniel L. Guidoni, Fernanda S. H. Souza, Jo Ueyama, Leandro A. Villas. 1-6 [doi]
- GPU-oriented stream data mining traffic classificationPetronio Lopes Jr., Stenio F. L. Fernandes, Wesley Melo, Djamel Fawzi Hadj Sadok. 1-7 [doi]
- Multi-parameter Q-Learning for downlink Inter-Cell Interference Coordination in LTE SONUsama Sallakh, Stephen S. Mwanje, Andreas Mitschele-Thiel. 1-6 [doi]
- MC-SkyNet: Mobile-cloud dynamic partitioning for mobile cloud applicationsNavid Bayat, Hanan Lutfiyya. 1-7 [doi]
- On the capacity and energy efficiency of network scheduling in future ultra-dense networksGeorgios P. Koudouridis. 1-6 [doi]
- A ferry-assisted solution for forwarding function in Wireless Sensor NetworksAit Oualhaj Omar, Abdellatif Kobbane, Essaid Sabir, Mohammed Erradi, Jalel Ben-Othman. 1-6 [doi]
- 2: A Predictive Mobile Target Tracking Algorithm in Wireless Multimedia Sensor NetworksIbtissem Boulanouar, Stéphane Lohier, Abderrezak Rachedi, Gilles Roussel. 1-7 [doi]
- Efficient configuration of monitoring slices for cloud platform administratorsMarcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues, Clarissa Cassales Marquezan, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 1-7 [doi]
- Delay tolerant EPC-BGP for discovery services in EPCGlobal networksMazen G. Khair, Burak Kantarci, Hussein Mouftah. 1-5 [doi]
- A fast mode decision using texture information for intra depth coding in 3DVCJinmi Kang, Kidong Chung. 1-5 [doi]
- A unified framework to semantically characterize functional and geographic properties of sensorsGiuseppe Di Modica, Francesco Pantano, Orazio Tomarchio. 1-6 [doi]
- Anomaly detection using digital signature of network segment with adaptive ARIMA model and Paraconsistent LogicEduardo H. M. Pena, Sylvio Barbon, Joel J. P. C. Rodrigues, Mario Lemes Proença Jr.. 1-6 [doi]
- A distributed POI data model based on the entity-component approachArto Heikkinen, Ari Okkonen, Antti Karhu, Timo Koskela. 1-6 [doi]
- User-hosted SOA infrastructure over XMPPJoao M. Goncalves, Diogo Gomes. 1-6 [doi]
- IB-DFE-based receivers for MC-CDMA systems with interference alignmentJosé Assunção, Adão Silva, Rui Dinis, Atílio Gameiro. 1-6 [doi]
- Energy aware rate selection in Cognitive radio inspired wireless smart objectsMagnus Lundgren, Dan Helgesson, Vangelis Angelakis, Xiaohu Ge, Di Yuan. 1-5 [doi]
- Automating the Hadoop configuration for easy setup in resilient cloud systemsAntonio Celesti, Maria Fazio, Antonio Puliafito, Massimo Villari. 1-4 [doi]
- Bridging the UI gap for authentication in smart environmentsSebastian Unger, Dirk Timmermann. 1-6 [doi]
- Dynamic small cell placement strategies for LTE Heterogeneous NetworksMahmoud H. Qutqut, Hatem Abou-zeid, Hossam S. Hassanein, A. M. Rashwan, Fadi M. Al-Turjman. 1-6 [doi]
- Comparison of SDN OpenFlow network simulator and emulators: EstiNet vs. MininetShie-Yuan Wang. 1-6 [doi]
- KeyNSNishanth Sastry. 1 [doi]
- Entity title architecture extensions towards advanced quality-oriented mobility control capabilitiesFelipe Sampaio Dantas da Silva, José Castillo Lema, Augusto Neto, Flávio Oliveira Silva, Pedro Frosi Rosa, Daniel Corujo, Carlos Guimarães, Rui L. Aguiar. 1-6 [doi]
- Disjunctive rules mining from uncertain databasesManal Alharbi, Priya Periaswamy, Sanguthevar Rajasekaran. 1-6 [doi]
- Energy efficient device discovery for social cloud applications in 3GPP LTE-advanced networksAthul Prasad, Konstantinos Samdanis, Andreas Kunz, JaeSeung Song. 1-6 [doi]
- The lord of the sense: A privacy preserving reputation system for participatory sensing applicationsAntonis Michalas, Nikos Komninos. 1-6 [doi]
- An adaptive data dissemination protocol with dynamic next hop selection for vehicular networksRodrigo B. Soares, Anna Izabel J. Tostes Ribeiro, Eduardo Freire Nakamura, Antonio A. F. Loureiro. 1-7 [doi]
- A simple architecture for secure and private data sharing solutionsAntonio Famulari, Francesco Longo, Giuseppe Campobello, Thomas Bonald, Marco Scarpa. 1-6 [doi]
- Designing and implementing a criticality-based duty-cycled MAC for low-latency mission-critical surveillance applicationsMuhammad Ehsan, CongDuc Pham. 1-6 [doi]
- Power adjustment mechanism using context information for interference mitigation in two-tier heterogeneous networksReben Kurda, Lila Boukhatem, Tara Ali-Yahiya, Megumi Kaneko. 1-6 [doi]
- A self-organizing and self-configuration algorithm for resource management in service-oriented systemsJavad Zarrin, Rui L. Aguiar, João Paulo Barraca. 1-7 [doi]
- A formal framework for verifying inter-firewalls consistencyMajda Moussa, Hakima Ould-Slimane, Hanifa Boucheneb, Steven Chamberland. 1-7 [doi]
- A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billingFábio Borges, Denise Demirel, Leon Bock, Johannes Buchmann, Max Mühlhäuser. 1-6 [doi]
- High fidelity content-centric experiments with Mini-CCNxCarlos M. S. Cabral, Christian Esteve Rothenberg, Maurício Ferreira Magalhães. 1-6 [doi]
- Efficient communication scheduling in clustered WSNFrancois Avril, Thibault Bernard, Alain Bui. 1-6 [doi]
- A performance model for maximum ratio combining receivers with adaptive modulation and coding in Rice fading correlated channelsRamiro Samano-Robles, Atílio Gameiro. 1-6 [doi]
- A policy based conflict resolution mechanism for MLB and MRO in LTE self-optimizing networksNauman Zia, Stephen S. Mwanje, Andreas Mitschele-Thiel. 1-6 [doi]
- Fairness evaluation of practical spectrum sharing techniques in LTE networksFrancesco Guidolin, Mattia Carpin, Leonardo Badia, Michele Zorzi. 1-6 [doi]
- Security analysis of J-PAKEMohsen Toorani. 1-6 [doi]
- Performability analysis of I/O bound application on container-based server virtualization clusterErico A. C. Guedes, Luis E. T. Silva, Paulo R. M. Maciel. 1-7 [doi]
- Offline preemptive scheduling of power demands to minimize peak power in smart gridsAnshu Ranjan, Pramod P. Khargonekar, Sartaj Sahni. 1-6 [doi]
- On low repair complexity storage codes via group divisible designsBing Zhu, Kenneth W. Shum, Hui Li, Shuo-Yen Robert Li. 1-5 [doi]
- Energy-aware resource selection on opportunistic gridsIzaias De Faria, Mario A. R. Dantas, Miriam A. M. Capretz. 1-6 [doi]
- CloudWave: Where adaptive cloud management meets DevOpsDario Bruneo, Thomas Fritz, Sharon Keidar-Barner, Philipp Leitner, Francesco Longo, Clarissa Cassales Marquezan, Andreas Metzger, Klaus Pohl, Antonio Puliafito, Danny Raz, Andreas Roth, Eliot Salant, Itai Segall, Massimo Villari, Yaron Wolfsthal, Chris Woods. 1-6 [doi]
- Formal modeling and checking of an enhanced variant of the IEEE 802.11 CSMA/CA protocolYoucef Hammal, Jalel Ben-Othman, Lynda Mokdad, Abdelli Abdelkrim. 1-6 [doi]
- Towards performance analysis of wireless sensor networks using Process Mining TechniquesFrancois Despaux, Ye-Qiong Song, Abdelkader Lahmadi. 1-7 [doi]
- Towards misdirected email detection for preventing information leakageTingwen Liu, Yiguo Pu, Jinqiao Shi, Quangang Li, Xiaojun Chen. 1-6 [doi]
- Ferry-assisted greedy perimeter stateless routing protocol for mobile ad hoc networks (FA-GPSR)Yasser Al-Roqi, Stylianos Papanastasiou, Evtim Peytchev. 1-6 [doi]
- Topology construction in RPL networks over beacon-enabled 802.15.4Malisa Vucinic, Gabriele Romaniello, Laurene Guelorget, Bernard Tourancheau, Franck Rousseau, Olivier Alphand, Andrzej Duda, Laurent Damon. 1-7 [doi]
- A performance analysis of the network formation process in IEEE 802.15.4e TSCH wireless sensor/actuator networksDomenico De Guglielmo, Alessio Seghetti, Giuseppe Anastasi, Marco Conti. 1-6 [doi]
- Enhancing the lifespan of visual sensor networks using a predetermined node deployment strategySubir Halder, Amrita Ghosal. 1-6 [doi]
- Optimizing network information for radio access technology selectionMelhem El Helou, Marc Ibrahim, Samer Lahoud, Kinda Khawam. 1-6 [doi]
- A self-aware, reconfigurable architecture for context awarenessNicola Bicocchi, Damiano Fontana, Franco Zambonelli. 1-7 [doi]
- TCP-ACC: An active congestion compensation TCP for wireless networksJun Zhang, Jiangtao Wen. 1-7 [doi]
- On exploiting network coding in cache-capable small-cell networksKonstantinos Poularakis, Vasilis Sourlas, Paris Flegkas, Leandros Tassiulas. 1-5 [doi]
- Thermal-aware scheduling for data parallel workloads on multi-core processorsHengxing Tan, Sanjay Ranka. 1-7 [doi]
- What benefits does NDN have in supporting mobilityXiaoke Jiang, Jun Bi, You Wang. 1-6 [doi]
- Characterizing graph-theoretic properties of a large-scale DHT: Measurements vs. simulationsHani Salah, Stefanie Roos, Thorsten Strufe. 1-7 [doi]
- Optimizing the MAC layer in real-time visual sensor networks applications using stencilsNicoletta Triolo, Susanna Pelagatti, Stefano Chessa. 1-7 [doi]
- State-full bandwidth allocation (SBA) for high-fan-out networksSyed Ali Haider, Khurram Kazi, M. Yasin Akhtar Raja. 1-6 [doi]
- LT codes for video streaming in burst erasure channels: An energy analysisRiccardo Bassoli, Vahid Nazari Talooki, Hugo Marques, Jonathan Rodriguez, Seiamak Vahid, Rahim Tafazolli. 1-4 [doi]
- Coordinated multi-surface gateway redeployment for enhanced performance in underwater sensor networksManal Al-Bzoor, Reda A. Ammar, Jun-Hong Cui, Sanguthevar Rajasekaran. 1-6 [doi]
- Distributed mobility management in vehicular networksJonathan Carvalho, Tiago Condeixa, Susana Sargento. 1-7 [doi]
- Optimum receiver of coded M-FSK modulation for power line communicationsMohamed Chaker Bali, Chiheb Rebai. 1-6 [doi]
- Noise floor dependent data fusion for reliable REM generation with a spectrum sensing gridJohannes Brendel, Steffen Riess, Simon Schroeter, Georg Fischer. 1-6 [doi]
- Selective encryption of video transmissions over multi-hop wireless networksChristopher Mansour, Danai Chasaki. 1-5 [doi]
- A self-managed resilient overlay network for interactive multimedia communicationsJuan C. Granda, Pelayo Nuño, Daniel F. García, Francisco J. Suárez. 1-7 [doi]
- Activity recognition for Smart City scenarios: Google Play Services vs. MoST facilitiesGiuseppe Cardone, Andrea Cirri, Antonio Corradi, Luca Foschini, Rebecca Montanari. 1-6 [doi]
- Keynote speakersJoao Gama. 1 [doi]
- Loop detection and automated route aggregation in distance vector routingFrank Bohdanowicz, Christian Henke. 1-6 [doi]
- Sensor coverage maximization with potential fieldsY. Sinan Hanay, Veysel Gazi. 1-6 [doi]
- Message from the general co-chairsRui L. Aguiar, Sartaj Sahni. 1 [doi]
- Adaptive motion-aware FEC-based mechanism to ensure video transmissionRoger Immich, Pedro Borges, Eduardo Cerqueira, Marília Curado. 1-6 [doi]
- Vehicle monitoring system using IEEE 802.11p device and Android applicationVladimir P. Barcelos, Thiago C. Amarante, Carlos Daniel Drury, Luiz H. A. Correia. 1-7 [doi]
- Energy efficiency optimization in MU-MIMO system with spectral efficiency constraintKazi Mohammed Saidul Huq, Shahid Mumtaz, Jonathan Rodriguez, Rui L. Aguiar. 1-5 [doi]
- A performance evaluation method for WSNs securityRoberta Daidone, Gianluca Dini. 1-6 [doi]
- Providing IaaS resources automatically through prediction and monitoring approachesAriel da Silva Dias, Luis Hideo Vasconcelos Nakamura, Júlio Cezar Estrella, Regina Helena Carlucci Santana, Marcos José Santana. 1-7 [doi]
- Visualization and analysis of interacting occurences in a smart cityLuana Carine Schunke, Luiz Paulo Luna de Oliveira, Marta Becker Villamil. 1-7 [doi]
- A wireless sensor network for the metallurgical gas monitoringYang Li, Wei Huangfu, Xiaodong Peng, Yi Xing, Xu Xu, Zhongshan Zhang, Keping Long. 1-6 [doi]
- Network coding based surveillance applications in presence of erroneous channelsVahid Nazari Talooki, Riccardo Bassoli, Jonathan Rodriguez, Hugo Marques, Rahim Tafazolli. 1-5 [doi]
- Is it possible to find social properties in vehicular networks?Felipe D. da Cunha, Aline Carneiro Viana, Raquel A. F. Mini, Antonio A. F. Loureiro. 1-6 [doi]
- Towards distributed geolocation by employing a delay-based optimization schemeMichael Grey, David Schatz, Michael Rossberg, Günter Schäfer. 1-7 [doi]
- Low-complexity maneuvering control of a UAV-based relay without location information of mobile ground nodesDae Hyung Choi, Byoung Hoon Jung, Dan Keun Sung. 1-6 [doi]
- Heuristics for the design of heterogeneous telecommunication networks with QoSBraulio A. M. Souza, Geraldo R. Mateus, Daniel L. Guidoni, Fernanda S. H. Souza. 1-6 [doi]
- A Facebook event collector framework for profile monitoring purposesHugo Fonseca, Eduardo Rocha, Paulo Salvador, António Nogueira, Diogo Gomes. 1-6 [doi]
- An efficient heuristic candidate selection algorithm for Opportunistic Routing in wireless multihop networksAmir Darehshoorzadeh, Azzedine Boukerche. 1-6 [doi]
- Analysis and performance evaluation of RPL under mobilityCosmin Cobarzan, Julien Montavont, Thomas Noël. 1-6 [doi]
- Role-Based Access control mechanismsÓscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar. 1-7 [doi]
- Interference aware resource allocation for LTE uplink transmissionKai Yang, Steven Martin, Tara Ali-Yahiya. 1-6 [doi]
- Routing with virtual coordinates in mobile sensor networksStefano Chessa, Soledad Escolar, Susanna Pelagatti, Jesús Carretero. 1-6 [doi]
- Green software development for multi-core architecturesFabio Diniz Rossi, Miguel Gomes Xavier, Endrigo D'Agostini Conte, Tiago C. Ferreto, César Augusto Fonticielha De Rose. 1-6 [doi]
- Evaluating secondary transmission opportunities with full duplex radiosLuiz F. S. Oliveira, Diego G. Passos, Célio Vinicius N. de Albuquerque. 1-6 [doi]
- Cardigan: SDN distributed routing fabric going live at an Internet exchangeJonathan Philip Stringer, Dean Pemberton, Qiang Fu, Christopher Lorier, Richard Nelson, Josh Bailey, Carlos N. A. Corrêa, Christian Esteve Rothenberg. 1-7 [doi]
- An efficient name-based loss recovery for wireless content centric networkingGue-Hwan Jung, Woo-Sung Jung, Young-Bae Ko, Jaehoon Kim, Jong Han Park. 1-6 [doi]
- Symbiosis: Sharing mobile resources for stream processingJefferson Morales, Erika Rosas, Nicolas Hidalgo. 1-6 [doi]
- Dictionary construction for sparse representation classification: A novel cluster-based approachWeiyang Liu, YanDong Wen, Hui Li, Bing Zhu. 1-6 [doi]
- Toward assessing Quality of Context parameters in a ubiquitous assisted environmentDébora Cabral Nazário, Igor Vilas Boas Tromel, Mario Antonio Ribeiro Dantas, José Leomar Todesco. 1-6 [doi]
- An adaptive power management scheme for Ethernet Passive Optical NetworksPanagiotis G. Sarigiannidis, Konstantinos Anastasiou, Eirini D. Karapistoli, Vasiliki L. Kakali, Malamati D. Louta, Pantelis Angelidis. 1-6 [doi]
- A battery recovery aware routing protocol for Wireless Sensor NetworksHacène Fouchal, Ouadoudi Zytoune, Driss Aboutajdine. 1-4 [doi]
- Reliable communications over lossy wireless channels by means of the combination of UDP and Random Linear CodingDavid Gomez, Eduardo Rodriguez, Ramon Aguero, Luis Munoz. 1-6 [doi]
- GP-m: Mobile middleware infrastructure for Ambient Assisted LivingFilippo Palumbo, Davide La Rosa, Stefano Chessa. 1-6 [doi]
- A structured overlay for non-uniform node identifier distribution based on flexible routing tablesTakehiro Miyao, Hiroya Nagao, Kazuyuki Shudo. 1-6 [doi]
- Measuring the Internet's threat level: A global-local approachSpyridon Kollias, Vasileios Vlachos, Alexandros Papanikolaou, Periklis Chatzimisios, Christos Ilioudis, Kostas S. Metaxiotis. 1-6 [doi]
- An adaptive technique to model virtual machine behavior for scalable cloud monitoringClaudia Canali, Riccardo Lancellotti. 1-7 [doi]
- RSforEVN: Node reallocation algorithm for virtual networks adaptationHouda Jmila, Ines Houidi, Djamal Zeghlache. 1-7 [doi]
- Modeling, optimization and performance prediction of parallel algorithmsMartin Hudik, Michal Hodon. 1-7 [doi]
- Network mobility for vehicular networksDiogo Lopes, Susana Sargento. 1-7 [doi]
- A coalitional game-theoretic approach to isolate selfish nodes in multihop cellular networksFirooz B. Saghezchi, Ayman Radwan, Jonathan Rodriguez. 1-6 [doi]
- Monitoring applications and services to improve the Cloud Foundry PaaSAntonio Corradi, Luca Foschini, Sebastiano Fraternale, Diana J. Arrojo, Malgorzata Steinder. 1-6 [doi]
- Introducing collaborations for multi-path selection of multiple selfish overlaysJingyu Wang, Jianxin Liao, Jing Wang, Qi Qi, Shengwen Tian, Tonghong Li. 1-6 [doi]
- Vehicular testbed managementJoão Afonso, André Cardote, Susana Sargento. 1-7 [doi]
- Efficient detection of unauthorized data modification in cloud databasesLuca Ferretti, Fabio Pierazzi, Michele Colajanni, Mirco Marchetti, Marcello Missiroli. 1-6 [doi]
- KeyMGMario Gerla. 1 [doi]
- On the impact of wireless multimedia network for multi-modal activity recognitionAkika Yamashita, Eng Keong Lua, Masato Oguchi. 1-6 [doi]
- E2ECloud: Composition and execution of end-to-end services in the cloudCarlos Alberto Kamienski, Rhodney Simoes, Ernani Azevedo, Ramide Dantas, Cyrus Dias, Djamel Sadok, Stenio Fernandes. 1-6 [doi]
- An efficient event handling protocol for Wireless Sensor and Actor NetworksCharalampos Konstantopoulos, Ioannis E. Venetis, Grammati E. Pantziou, Damianos Gavalas. 1-6 [doi]
- Synchronizing Small Data in a big worldKeith Barber, Khaled Harfoush. 1-6 [doi]
- Towards the emergency for Green Networking with robust algorithmYunlong Song, Min Liu. 1-6 [doi]
- Underwater Sensing and Processing Networks (USPN)Ayman Alharbi, Hesham Alhumyani, Sherif Tolba, Reda A. Ammar, Jun-Hong Cui. 1-7 [doi]
- A QoS-control framework for medical multimedia data transmission in CRN environmentDramane Ouattara, Mohamed Aymen Chalouf, Omessaad Hamdi, Francine Krief. 1-7 [doi]
- Sensitivity inspector: Detecting privacy in smart energy applicationsArijit Ukil, Soma Bandyopadhyay, Arpan Pal. 1-6 [doi]
- Near-clouds: Bringing public clouds to users' doorstepsRizwan Mian, Khalid Elgazzar, Shady Khalifa, Patrick Martin, Gabriel Silberman, Daniel Goldschmidt. 1-6 [doi]
- Determination of bit-rate adaptation thresholds for the Opus codec for VoIP servicesYi Han, Damien Magoni, Patrick McDonagh, Liam Murphy. 1-7 [doi]
- Analysis of scalability in distributed virtual environments using the application-layer anycastingPedro Henrique Reis, Ronaldo Celso Messias Correia, Rogério Eduardo Garcia, Celso Olivete Junior, Jorge Marques Prates. 1-6 [doi]
- The TOR data communication system: A surveyRamzi A. Haraty, Bassam Zantout. 1-6 [doi]
- Energy-efficient wireless multimedia sensor networks using FM as a control channelFilipe Sousa, Rui Campos, Manuel Ricardo. 1-7 [doi]
- Linked data for Open Government: The case of BolognaAntonio Corradi, Luca Foschini, Raffaele Ianniello. 1-7 [doi]
- Image segmentation based on complexity mining and mean-shift algorithmJadran Sirotkovic, Hrvoje Dujmic, Vladan Papic. 1-6 [doi]
- Cloud-centric Sensor Networks - Deflating the hypeSharief M. A. Oteafy, Hossam S. Hassanein. 1-5 [doi]
- CARTIM: A proposal toward identification and minimization of vehicular traffic congestion for VANETGuilherme B. Araujo, Matheus M. Queiroz, Fatima de L. P. Duarte-Figueiredo, Anna Izabel J. Tostes Ribeiro, Antonio A. F. Loureiro. 1-6 [doi]
- Towards dynamic network condition-aware video server selection algorithms over wireless networksHyunwoo Nam, Kyung-Hwa Kim, Doru Calin, Henning Schulzrinne. 1-6 [doi]
- Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architecturesGiuseppe Carella, Marius Corici, Paolo Secondo Crosta, Paolo Comi, Thomas Michael Bohnert, Andreea Ancuta Corici, Dragos Vingarzan, Thomas Magedanz. 1-6 [doi]
- Implementation and evaluation of particle filtering for indoor positioningJohan Chateau, Pierre Rousseau, Gregory Albiston, Beverley Cook, Stylianos Papanastasiou, Evtim Peytchev. 1-6 [doi]
- Flow-based conflict detection in OpenFlow networks using first-order logicBruno Lopes Alcantara Batista, Gustavo Augusto Lima de Campos, Marcial P. Fernandez. 1-6 [doi]
- Overlay energy circle formation for cloud data centers with renewable energy futures contractsMelike Erol-Kantarci, Hussein T. Mouftah. 1-6 [doi]
- Network level characterization of adaptive streaming over HTTP applicationsMaria Silvia Ito, Rafael Antonello, Djamel Fawzi Hadj Sadok, Stenio F. L. Fernandes. 1-7 [doi]
- Analysis of SR ARQ delays using data-bundling over Markov channelsIffat Ahmed, Leonardo Badia, Andreas Petlund, Carsten Griwodz, Pål Halvorsen. 1-6 [doi]
- Link sleeping and wake-up optimization for energy aware ISP networksObinna Okonor, Ning Wang, Zhili Sun, Stylianos Georgoulas. 1-7 [doi]
- User-centric Identity Management based on secure elementsDavi da Silva Böger, Luciano Barreto, Joni da Silva Fraga, Pascal Urien, Hassane Aissaoui, Andre Santos, Guy Pujolle. 1-6 [doi]
- IEEE 802.11aa intra-AC prioritization - A new method of increasing the granularity of traffic prioritization in WLANsKatarzyna Kosek-Szott, Marek Natkaniec, Lukasz Prasnal. 1-6 [doi]
- Internet traffic analysis: A case study from two major European operatorsMoufida Feknous, Thierry Houdoin, Bertrand Le Guyader, Joseph De Biasio, Annie Gravey, Jose Alfonso Torrijos Gijon. 1-7 [doi]
- Comparison of delay bounds for Ethernet networks based on simple Network Calculus algorithmsMichael Menth, Mark Schmidt, Sebastian Veith, Stephan Kehrer, Andreas Dreher. 1-7 [doi]
- Buffer-aided link selection for incremental relaying systemsMostafa Darabi, Behrouz Maham, Yan Zhang. 1-6 [doi]
- Distributed cooperative Q-learning for mobility-sensitive handover optimization in LTE SONStephen S. Mwanje, Andreas Mitschele-Thiel. 1-6 [doi]
- Replicator dynamics for distributed Inter-Cell Interference CoordinationAmine Adouane, Kinda Khawam, Johanne Cohen, Dana Marinca, Samir Tohmé. 1-7 [doi]
- Dynamic Virtual Machine Migration in a vehicular cloudTarek K. Refaat, Burak Kantarci, Hussein T. Mouftah. 1-6 [doi]
- A device discovery scheme for proximity services in LTE networksDimitris Tsolkas, Nikos I. Passas, Lazaros F. Merakos, Apostolis K. Salkintzis. 1-6 [doi]
- A framework for rendering high resolution synthetic aperture radar images on heterogeneous architecturesWilliam Chapman, Sanjay Ranka, Sartaj Sahni, Mark S. Schmalz, Linda Moore, Bracy Elton. 1-6 [doi]
- Decomposition of memory consumption footprints to identify problematic threadsOzdinc Celikel, Armend Vraniqi, Tolga Ovatman. 1-5 [doi]
- On the performance of DPI signature matching with dynamic priorityWesley Melo, Petronio Lopes Jr., Rafael Antonello, Stenio F. L. Fernandes, Djamel Fawzi Hadj Sadok. 1-6 [doi]
- REINVENT: Accessing vehicular networks in mobile applicationsFilipe Oliveira, Susana Sargento, Jose Maria Fernandes, André Cardote. 1-6 [doi]
- Study on adaptive priority-based service-differentiation scheme for IEEE 802.15.4 Wireless Sensor NetworksQiong Liu, Andreas Czylwik. 1-6 [doi]
- Comparative analysis of broadband penetration and digital public services in South East EuropeKonstantinos Antonis, Christos Bouras, Fabrizio D'Elia, Annalisa Di Vincenzo, Georgios Diles, Vasileios Kokkinos, Andreas Koskeris. 1-6 [doi]
- Controlling messages for probabilistic routing protocols in Delay-Tolerant NetworksAhmed El Ouadrhiri, Imane Rahmouni, Mohamed El-Kamili, Ismail Berrada. 1-6 [doi]
- Online stream processing of machine-to-machine communications traffic: A platform comparisonRoberto Coluccio, Giacomo Ghidini, Andrea Reale, David Levine, Paolo Bellavista, Stephen P. Emmons, Jeffrey O. Smith. 1-7 [doi]
- Enhancing OLSR protocol performance through improved detection of Spatial DependenceElmano Ramalho Cavalcanti, Marco Aurélio Spohn. 1-6 [doi]
- A texture analysis approach to supervised face segmentationVictor R. S. Laboreiro, Thelmo P. de Araujo, José Everardo Bessa Maia. 1-6 [doi]
- Programmable Mobile Core NetworkShanmugalingam Sivasothy, Philippe Bertin. 1-7 [doi]
- An efficient MAC-signature scheme for authentication in XOR network codingAlireza Esfahani, Alberto Nascimento, Jonathan Rodriguez, Jose Carlos Neves. 1-5 [doi]
- Novel cell selection algorithm for improving average user's effective data rate in LTE HetNetsMohamed A. Aboul Hassan, Essam A. Sourour, Shawki E. Shaaban. 1-6 [doi]
- Low complexityadaptive detection of distributed SFBC in open-loop CoMPAhmad A. Aziz El-Banna, Maha Elsabrouty, Adel Abdelrahman, Seiichi Sampei. 1-5 [doi]
- An efficient and robust protocol to disseminate data in highway environments with different traffic conditionsLeandro A. Villas, Tiago P. C. de Andrade, Nelson L. S. Da Fonseca. 1-6 [doi]
- Emotion analysis from speech using temporal contextual trajectoriesHaythem Balti, Adel S. Elmaghraby. 1-7 [doi]
- Topology selection criteria for a virtual topology controller based on neural memoriesY. Sinan Hanay, Shin'ichi Arakawa, Masayuki Murata. 1-4 [doi]