Abstract is missing.
- Performance analysis of a rate-adaptive bandwidth allocation scheme in 5G mobile networksDemetris Posnakides, Constandinos X. Mavromoustakis, Georgios Skourletopoulos, George Mastorakis, Evangelos Pallis, Jordi Mongay Batalla. 1-7 [doi]
- Enhancing intelligence in inter-vehicle communications to detect and reduce congestion in urban centersRodolfo Ipolito Meneguette, Geraldo P. R. Filho, Luiz F. Bittencourt, Jo Ueyama, Bhaskar Krishnamachari, Leandro A. Villas. 1-6 [doi]
- Game-theoretic based scheduling for demand-side management in 5G smart gridsFirooz B. Saghezchi, Fatemeh B. Saghezchi, Alberto Nascimento, Jonathan Rodriguez. 8-12 [doi]
- Relaying for 5G: A novel low-error relaying protocolChunbo Luo, Gerard Parr, Sally I. McClean, Cathryn Peoples, Xinheng Wang, James Nightingale, Qi Wang. 13-18 [doi]
- A map-based platform for smart mobility servicesPietro Marchetta, Eduard Natale, Antonio Pescapè, Alessandro Salvi, Stefania Santini. 19-24 [doi]
- Advanced observation and telemetry heart system utilizing wearable ECG device and a Cloud platformIoannis Chatzigiannakis, Emil Stoyanov Valchinov, Athanasios Antoniou, Athanasios P. Kalogeras, Christos E. Alexakos, Panagiotis Konstantinopoulos. 25-30 [doi]
- Federated data centers as smart city stabilizing factorsAlexis I. Aravanis, Terpsichori Helen Velivassaki, Artemis C. Voulkidis, Theodore B. Zahariadis, Panayotis G. Cottis. 31-37 [doi]
- Design and implement delay-aware QoS scheme for 3GPP LTE/LTE-A networks for mixed traffic flowMyasar R. Tabany, Chris G. Guy. 38-44 [doi]
- Advanced vehicular sensing of road artifacts and driver behaviornajah abuali. 45-49 [doi]
- Benchmarking leading-edge mobile devices for data-intensive distributed mobile cloud applicationsNayyab Zia Naqvi, Tim Vansteenkiste-Muylle, Yolande Berbers. 50-57 [doi]
- Performance of two-hop routing in delay tolerant networks with selfish nodesYahui Wu, Hongbin Huang, Su Deng, Chaofan Dai. 58-63 [doi]
- A first study on using MPTCP to reduce latency for cloud based mobile applicationsKarl-Johan Grinnemo, Anna Brunstrom. 64-69 [doi]
- A probabilistic model to corroborate three attacks in vehicular ad hoc networksKarim Laroussi, Boucif Amar Bensaber, Mhamed Mesfioui, Ismail Biskri. 70-75 [doi]
- Online electric vehicle recharge scheduling under different e-mobility operator's pricing modelsIsabel Amigo, Maurice Gagnaire. 76-82 [doi]
- Fair pricing mechanism for coalitions in rural areasVasileios Botsis, Nikolaos D. Doulamis, Emmanouel A. Varvarigos. 83-90 [doi]
- Demand allocation in local RES electricity market among multiple microgrids and multiple utilities through aggregatorsVasileios Botsis, Nikolaos D. Doulamis, Anastasios D. Doulamis, Emmanouel A. Varvarigos. 91-98 [doi]
- Evaluating a cloud federation ecosystem to reduce carbon footprint by moving computational resourcesMaurizio Giacobbe, Antonio Celesti, Maria Fazio, Massimo Villari, Antonio Puliafito. 99-104 [doi]
- RT-SENMOS: Reliable transport for sensor networks with mobile sinksCharilaos Stais, George Xylomenos. 105-110 [doi]
- Utilizing CAN-Bus and smartphones to enforce safe and responsible drivingAbd-Elhamid M. Taha, Nidal Nasser. 111-115 [doi]
- Distributed delivery of popular videos over Ultra-dense networksChia-Cheng Yen, Jia-Shung Wang. 116-121 [doi]
- Time Petri Nets for performance evaluation of composite web services architecturesAbdelli Abdelkrim, Walid Serrai, Lynda Mokdad, Youcef Hammal. 122-127 [doi]
- Extensive analysis of the Kad-based distributed computing system DuDEPeter Danielis, Jan Skodzik, Vlado Altmann, Benjamin Kappel, Dirk Timmermann. 128-133 [doi]
- A comparative study of mobile database transaction modelsRamzi A. Haraty. 134-139 [doi]
- Unequal error protection for S3AC coding based on expanding window fountain codesLiuyue Su, Ge Gao, Cheng Yang, Ruimin Hu, Xiaochen Wang, Liuyue Su, Ge Gao, Ruimin Hu, Xiaochen Wang, Cheng Yang, Xin Su. 140-145 [doi]
- Forensic analysis of instagram and path on an iPhone 5s mobile deviceReema Al Mushcab, Pavel Gladyshev. 146-151 [doi]
- Inferring relevance and presence of evidence in service-oriented and SaaS architecturesSameera Al-Mulla, Youssef Iraqi, Stephen D. Wolthusen. 152-159 [doi]
- Genetic algorithm based intrusion detection system for wireless body area networksGeethapriya Thamilarasu. 160-165 [doi]
- Social-based forwarding in multi-channel vehicular networksMatthias Sander Frigau. 166-173 [doi]
- A shim layer for heterogeneous wireless communications scheduling in intelligent transport systemsCristian Roman, Peter Ball, Shumao Ou. 174-179 [doi]
- Internet of Things: Security vulnerabilities and challengesIoannis Andrea, Chrysostomos Chrysostomou, George Hadjichristofi. 180-187 [doi]
- Distributed sensor network for vehicles with prior right detectionRobert Zalman, Ján Kapitulík, Michal Kochlán. 188-192 [doi]
- Monitoring of water level based on acoustic emissionsJuraj Micek, Ondrej Karpis, Veronika Olesnanikova, Michal Kochlán. 193-197 [doi]
- Monitoring and recognition of bird population in protected bird territoryMichal Hodon, Peter Sarafin, Peter Sevcík. 198-203 [doi]
- Maximizing performance of low-power WSN node on the basis of event-driven-programming approach: Minimization of operational energy costs of WSN node control unitMichal Hodon, Michal Chovanec, Lukás Cechovic, Martin Hudik, Jana Milanova, Michal Kochlán, Matús Jurecka, Ján Kapitulík, Peter Sevcík. 204-209 [doi]
- Discovery of services in smart cities of mobile social usersMichele Girolami, Stefano Chessa, Erina Ferro. 210-215 [doi]
- Towards disruption tolerant ICNHasan M. A. Islam, Andrey Lukyanenko, Sasu Tarkoma, Antti Ylä-Jääski. 212-219 [doi]
- Encryption as a service for smart grid advanced metering infrastructureMd. Mahmud Hasan, Hussein T. Mouftah. 216-221 [doi]
- Smartphones as smart cities sensors: MCS scheduling in the ParticipAct projectAntonio Corradi, Giovanni Curatola, Luca Foschini, Raffaele Ianniello, Carlos Roberto De Rolt. 222-228 [doi]
- Finding contextual clues to malware using a large corpusNeil C. Rowe. 229-236 [doi]
- Forensic analysis of windows user space applications through heap allocationsMichael Cohen. 237-244 [doi]
- Events and causal factors charting of kernel traces for root cause analysisYi-Ching Liao, Hanno Langweg. 245-250 [doi]
- High performance fault-tolerance for cloudsDimosthenis Kyriazis, Vasileios I. Anagnostopoulos, Andrea Arcangeli, David Gilbert, Dimitrios Kalogeras, Ronen Kat, Cristian Klein, Panagiotis C. Kokkinos, Yossi Kuperman, Joel Nider, Petter Svärd, Luis Tomas, Emmanouel A. Varvarigos, Theodora A. Varvarigou. 251-257 [doi]
- Costs of a federated and hybrid cloud environment aimed at MapReduce video transcodingAlfonso Panarello, Antonio Celesti, Maria Fazio, Antonio Puliafito, Massimo Villari. 258-263 [doi]
- Exploiting the FIWARE cloud platform to develop a remote patient monitoring systemMaria Fazio, Antonio Celesti, Fermín Galán Márquez, Alex Glikson, Massimo Villari. 264-270 [doi]
- On QoS-aware scheduling of data stream applications over fog computing infrastructuresValeria Cardellini, Vincenzo Grassi, Francesco Lo Presti, Matteo Nardelli 0001. 271-276 [doi]
- A message-based incentive mechanism for opportunistic networking applicationsVinicius F. S. Mota, Daniel F. Macedo, Yacine Ghamri-Doudane, José Marcos S. Nogueira. 277-282 [doi]
- Energy-efficient base station management in heterogeneous networking environmentsGeorgios Kyriazis, Angelos N. Rouskas, George T. Karetsos. 283-288 [doi]
- A two-dimensional structured overlay based on flexible routing tablesMasashi Hojo, Hiroya Nagao, Takehiro Miyao, Kazuyuki Shudo. 289-294 [doi]
- Discovering high-impact routing events using traceroutesMarco Di Bartolomeo, Valentino Di Donato, Maurizio Pizzonia, Claudio Squarcella, Massimo Rimondini. 295-300 [doi]
- A fine-tuned control-theoretic approach for dynamic adaptive streaming over HTTPMaria Silvia Ito, Daniel Bezerra, Stenio Fernandes, Djamel Sadok, Geza Szabo. 301-308 [doi]
- Modeling user interactions for conversion rate prediction in M-CommerceGianni Fenu, Pier Luigi Pau. 309-314 [doi]
- App2net: A platform to transfer and configure applications on programmable virtual networksRicardo Luis dos Santos, Oscar Mauricio Caicedo Rendon, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville. 315-322 [doi]
- A novel tool for cost-efficient broadband development through infrastructure sharingKonstantinos Antonis, Christos Bouras, Georgios Diles, Vasileios Kokkinos, Leonidas Loukopoulos. 323-328 [doi]
- Benchmarking the load scalability of IPv6 transition technologies: A black-box analysisMarius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi. 329-334 [doi]
- A lightweight, non-intrusive approach for orchestrating autonomously-managed network elementsChristos Liaskos. 335-340 [doi]
- Analysing traffic flows through sampling: A comparative studyJoão Marco C. Silva, Paulo Carvalho, Solange Rito Lima. 341-346 [doi]
- Improving network traffic acquisition and processing with the Java Virtual MachineRuediger Gad, Martin Kappes, Inmaculada Medina-Bulo. 347-352 [doi]
- Prediction-based connection manager for vehicular networksJoao Mendes, Filipe Neves, Ricardo Matos, Susana Sargento. 353-358 [doi]
- On the performance of localization prediction methods for vehicular Ad Hoc NetworksLeandro N. Balico, Horacio A. B. F. de Oliveira, Efren Lopes Souza, Richard W. Pazzi, Eduardo Freire Nakamura. 359-364 [doi]
- A prediction-based routing algorithm for Vehicular Ad Hoc NetworksLeandro N. Balico, Horacio A. B. F. de Oliveira, Raimundo S. Barreto, Antonio A. F. Loureiro, Richard W. Pazzi. 365-370 [doi]
- Communication as a service for cloud VANETsMouna Garai, Slim Rekhis, Noureddine Boudriga. 371-377 [doi]
- Social amplification factor for mobile crowd sensing: The ParticipAct experienceStefano Chessa, Michele Girolami, Luca Foschini, Raffaele Ianniello, Antonio Corradi. 378-384 [doi]
- Mining user check-in features for location classification in location-based social networksChen Yu, Yang Liu, Dezhong Yao, Hai Jin, Feng Lu, Hanhua Chen, Qiang Ding. 385-390 [doi]
- Minimizing signaling cost in green routing for software defined networksHadi Alizadeh, Didem Goziipek, Seyed M. Buhari, Aysegül Yayimli. 391-396 [doi]
- Evaluating the impact of network I/O on ultra-low delay packet switchingGeorge Baltas, George Xylomenos. 397-402 [doi]
- Optimizing the SDN control-plane performance of the Openvswitch software switchHsing-Yo Pan, Shie-Yuan Wang. 403-408 [doi]
- Two-phase load balancing of In-Memory Key-Value Storages through NFV and SDNAlex F. R. Trajano, Marcial P. Fernandez. 409-414 [doi]
- Container-based network function virtualization for software-defined networksRichard Cziva, Simon Jouet, Kyle J. S. White, Dimitrios P. Pezaros. 415-420 [doi]
- Is it really worth to peer at IXPs? A comparative studyMarco Di Bartolomeo, Giuseppe Di Battista, Roberto di Lallo, Claudio Squarcella. 421-426 [doi]
- Experimenting with alternative path tracing solutionsPietro Marchetta, Walter de Donato, Valerio Persico, Antonio Pescapè. 427-432 [doi]
- QoE-based radio resource allocation in LTE femtocell considering transport limitationsMing Li, Phuong Nga Tran, Huseyin Kerem Tutuncuoglu, Andreas Timm-Giel. 433-438 [doi]
- Design of roadside communication infrastructure with QoS guaranteesCristiano M. Silva, Wagner Meira Jr.. 439-444 [doi]
- Geo-localized content replication for Vehicular Ad-hoc NetworksFabrício A. Silva, Azzedine Boukerche, Thais R. M. Braga Silva, Linnyer Beatrys Ruiz, Antonio A. F. Loureiro. 445-450 [doi]
- Suggestion of routes for vehicles in vehicular networks using the multicommodity flow modelAnna Izabel J. Tostes Ribeiro, Guilherme Maia, Fatima de L. P. Duarte-Figueiredo, Antonio A. F. Loureiro. 451-456 [doi]
- PResync: A method for preventing resynchronization in the IEEE 802.11p standardErick Donato, Guilherme Maia, João M. G. Duarte, Antonio A. F. Loureiro, Edmundo Roberto Mauro Madeira, Leandro A. Villas. 457-462 [doi]
- EDCA virtual collision performance evaluation and mobility modeling in V2I communicationsNaila Bouchemal, Rola Naja, Mahmoud Moubarak, Samir Tohmé. 463-470 [doi]
- Acoustic model parameter estimation using distributed incremental adaptive networksSayed Mostafa Taheri, Hamed Nosrati. 471-476 [doi]
- Performance of perceptual 1-bit compressed sensing for audio compressionHossam M. Kasem, Maha Elsabrouty, Osamu Muta, Hiroshi Furukawa. 477-482 [doi]
- Digital signal processing for a sliceable transceiver for optical access networksSilvia Saldana Cercos, Christoph Wagner, Juan Jose Vegas Olmos, Anna Manolova Fagertun, Idelfonso Tafur Monroy. 483-488 [doi]
- Towards MEF services in a SDN environmentCarlos Ferreira, Joao Aparicio, Susana Sargento, Nuno Farinha, Vitor Mirones. 489-495 [doi]
- An EC-based formalism for policy refinement in software-defined networkingCristian Cleder Machado, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho. 496-501 [doi]
- Constructing an optimal spanning tree over a hybrid network with SDN and legacy switchesShie-Yuan Wang, Chia-Cheng Wu, Chih-Liang Chou. 502-507 [doi]
- OpenFlow and services in the cloud: Core network demonstratorGoncalo Pardal, João Soares, Rafael Gouveia, Susana Sargento. 508-513 [doi]
- Tool support for the evaluation of anomaly traffic classification for network resilienceAnderson Santos da Silva, Juliano Araujo Wickboldt, Alberto E. Schaeffer Filho, Angelos K. Marnerides, Andreas Mauthe. 514-519 [doi]
- A failure prediction approach based on cloud theory and hidden Markov model in networked computing systemsWeiwei Zheng, Zhili Wang, Haoqiu Huang, Luoming Meng, Xuesong Qiu. 520-525 [doi]
- A metric-correlation-based fault detection approach using clustering analysis in wireless sensor networksQian Liu, Yang Yang, Qiu Xue-song. 526-531 [doi]
- A failure detector that gives information on the degree of confidence in the systemAnubis Graciela de Moraes Rossetto, Cláudio Fernando Resin Geyer, Luciana Arantes, Pierre Sens. 532-537 [doi]
- A sampling algorithm for intermittently connected delay tolerant wireless sensor networksIsrael L. C. Vasconcelos, David H. S. Lima, Carlos Mauricio S. Figueiredo, André L. L. de Aquino. 538-543 [doi]
- Estimating queue formation rate in Wireless Sensor Networks using a fluid dynamic modelCharalambos Sergiou, Vasos Vassiliou, Aristodemos Paphitis. 544-548 [doi]
- Contribution aware task allocation in sensor networksTingting Fu, Peng Liu. 549-554 [doi]
- MuLTI: Multiple location tags inference for users in social networksZejia Chen, Jiahai Yang, Jessie Hui Wang. 555-561 [doi]
- Change data capture in NoSQL databases: A functional and performance comparisonFelipe Mathias Schmidt, Cláudio F. R. Geyer, Alberto E. Schaeffer Filho, Stefan Deßloch, Yong Hu. 562-567 [doi]
- CIUV: Collaborating information against unreliable viewsZimu Yuan, Zhiwei Xu, Guojie Li. 568-573 [doi]
- Cracker: Crumbling large graphs into connected componentsAlessandro Lulli, Laura Ricci, Emanuele Carlini, Patrizio Dazzi, Claudio Lucchese. 574-581 [doi]
- Design and optimization for distributed indexing scheme in switch-centric cloud storage systemYuang Liu, Xiaofeng Gao, Guihai Chen. 582-587 [doi]
- NF-Dedupe: A novel no-fingerprint deduplication scheme for flash-based SSDsZhengguo Chen, Zhiguang Chen, Nong Xiao, Fang Liu. 588-594 [doi]
- Differential spread strategy: An incentive for advertisement disseminationXiao Chen, Min Liu, Yaqin Zhou, Zhongcheng Li, Shuang Chen, Xiangnan He. 595-601 [doi]
- Towards a performance characterization of a parallel file system over virtualized environmentsEduardo Camilo Inacio, Mario A. R. Dantas, Douglas D. J. de Macedo. 595-600 [doi]
- SKVM: Scaling in-memory Key-Value store on multicoreRan Zheng, Wenjin Wang, Hai Jin, Qin Zhang. 601-606 [doi]
- Towards making accessible human-interaction proofs more secure and usableHakan Ezgi Kiziloz, Kemal Bicakci. 607-612 [doi]
- Program partitioning based on static call graph analysis for privilege separationMarkus Trapp, Michael Rossberg, Guenter Schaefer. 613-618 [doi]
- Managing distributed UCONabc policies with authorization assertions and policy templatesMaicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr.. 619-624 [doi]
- AutoBLG: Automatic URL blacklist generator using search space expansion and filtersBo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori. 625-631 [doi]
- Robust data-aided SNR estimation algorithm in high dynamic environmentXianzhong Xie, Yuanyuan Liu, Weijia Lei. 632-636 [doi]
- Digital reconstruction stage of parallel FBD sigma delta ADC implementation based on programmable digital oscillator in SDR receiverRihab Lahouli, Manel Ben-Romdhane, Chiheb Rebai, Dominique Dallet. 637-642 [doi]
- Construction of structured low density lattice codes based on finite fieldsJia-Yun Li, Shu-Tao Xia, Xin-Ji Liu. 643-648 [doi]
- A spectrum efficient polarized OFDM scheme for wireless depolarized channelDong Wei, Meng Zhang, Wei Fan, Wei-qing Huang. 649-656 [doi]
- PAPR reduction in FBMC/OQAM systems using active constellation extension and tone reservation approachesMounira Laabidi, Rafik Zayani, Daniel Roviras, Ridha Bouallegue. 657-662 [doi]
- An intelligent transportation system for detection and control of congested roads in urban centersCelso A. R. L. Brennand, Allan Mariano de Souza, Guilherme Maia, Azzedine Boukerche, Heitor S. Ramos, Antonio A. F. Loureiro, Leandro A. Villas. 663-668 [doi]
- Intelligent service to perform overtaking in vehicular networksBruno Ferreira, Felipe D. da Cunha, Raquel A. F. Mini, Antonio A. F. Loureiro, Fernando A. F. Braz, Sérgio V. A. Campos. 669-676 [doi]
- Performance evaluation of WebRTC data channelsRasmus Eskola, Jukka K. Nurminen. 676-680 [doi]
- A novel engine to underlie the data transmission of social urban sensing applicationsCarlos Oberdan Rolim, Anubis Graciela de Moraes Rossetto, Valderi R. Q. Leithardt, Guilherme A. Borges, Cláudio F. R. Geyer, Tatiana F. M. dos Santos, Adriano M. Souza. 677-682 [doi]
- Two-aggregator network topology optimization with splittingSoham Das, Sartaj Sahni. 683-688 [doi]
- Analytical modeling of reconstruction delays in distributed storage data centersSyed Ali Haider. 689-693 [doi]
- Multi-resource energy-efficient routing in cloud data centers with network-as-a-serviceLin Wang, Antonio Fernández Anta, Fa Zhang, Jie Wu, Zhiyong Liu. 694-699 [doi]
- Predicting model for identifying the malicious activity of nodes in MANETsAnderson A. A. Silva, Elvis Pontes, Adilson Eduardo Guelfi, I. Caproni, R. Aguiar, Fen Zhou, Sergio Takeo Kofuji. 700-707 [doi]
- Selfish attacks in IEEE 802.11aa networks with intra-AC prioritizationLukasz Prasnal, Szymon Szott, Marek Natkaniec. 708-713 [doi]
- Fest: A feature extraction and selection tool for Android malware detectionKai Zhao, Dafang Zhang, Xin Su, Wenjia Li. 714-720 [doi]
- Epidemic information dissemination controlled by wireless channel awarenessTheofanis Kontos, Christos Anagnostopoulos, Stathes Hadjiefthymiades, Evangelos Zervas. 721-726 [doi]
- Incentive mechanism for cooperative content discovery in mobile wireless networks: A repeated cooperative game-theoretic approachHaoqiu Huang, Lanlan Rui, Weiwei Zheng, Danmei Niu, Yinglin Xiong, Pan Zhang, Xuesong Qiu. 727-731 [doi]
- IMS centric communication supporting WebRTC endpointsBruno Simoes Cruz, João Paulo Barraca. 732-737 [doi]
- Formal verification of LTE-UMTS handover proceduresPiergiuseppe Bettassa Copet, Guido Marchetto, Riccardo Sisto, Luciana Costa. 738-744 [doi]
- Channel modeling of NB-PLC for Smart GridBilal Masood, Sobia Baig. 745-750 [doi]
- User activity recognition for energy saving in smart home environmentWesllen S. Lima, Eduardo Souto, Thiago S. Rocha, Richard W. Pazzi, Ferry Pramudianto. 751-757 [doi]
- Offline first fit scheduling in smart gridsAnshu Ranjan, Pramod P. Khargonekar, Sartaj Sahni. 758-763 [doi]
- Mobility impact on the performance of electric vehicle-to-grid communications in smart grid environmentYamen Y. Nasrallah, Irfan S. Al-Anbagi, Hussein T. Mouftah. 764-769 [doi]
- VBalance: A selection policy of virtual machines for load balancing in cloud computingFilipe Fernandes S. B. de Matos, Joaquim Celestino Jr., André Ribeiro Cardoso. 770-775 [doi]
- The interplay between timeliness and scalability in cloud monitoring systemsGuilherme da Cunha Rodrigues, Rodrigo N. Calheiros, Marcio Barbosa de Carvalho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco, Rajkumar Buyya. 776-781 [doi]
- An approach to reduce energy costs through virtual machine migrations in cloud federationMaurizio Giacobbe, Antonio Celesti, Maria Fazio, Massimo Villari, Antonio Puliafito. 782-787 [doi]
- Bundling communication messages in large scale cloud environmentsAli Sianati, Azzedine Boukerche, Robson Eduardo De Grande. 788-795 [doi]
- Towards misdirected email detection based on multi-attributesYiguo Pu, Jinqiao Shi, Xiaojun Chen 0004, Li Guo, Tingwen Liu. 796-802 [doi]
- Efficient and privacy-preserving search in multi-source personal health record cloudsXin Yao, Yaping Lin, Qin Liu, Shuai Long. 803-808 [doi]
- A DTLS-based security architecture for the Internet of ThingsGlederson Lessa dos Santos, Vinicius Tavares Guimaraes, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 809-815 [doi]
- Weak keys and plaintext recovery for the Dhall-Pal Block CipherKaren Korstanje, Liam Keliher. 816-821 [doi]
- Cost minimization for code offloading with cellular traffic aggregationJiao Song, Feng Lu, Hai Jin, Zaiyang Tang, Peng Li, Xiaofei Liao, Xia Xie. 822-827 [doi]
- The great expectations of smartphone traffic schedulingVilen Looga, Zhonghong Ou, Yu Xiao, Antti Ylä-Jääski. 828-834 [doi]
- Identification of wireless network cards based on signatures of wireless trafficSiTong Mao, Paolo Emilio Barbano, Yi Xie. 835-840 [doi]
- Analytical evaluation of outage probability based on signal to interference ratio for Gaussian-distributed usersSami Baroudi, Yousef R. Shayan. 841-844 [doi]
- Virtual 802.11 wireless networks with guaranteed throughout sharingKostas Katsalis, Kostas Choumas, Thanasis Korakis, Leandros Tassiulas. 845-850 [doi]
- Beyond the limits: Maximization of ICN caching capabilities with global detour algorithmSumanta Saha, Maneesh Chauhan, Andrey Lukyanenko. 846-853 [doi]
- SISO and MIMO analog network coding relay architectures for the uplink of LTE-AdvancedKareem Metwaly, Mahmoud Alaa Eldin, Maha Elsabrouty. 851-856 [doi]
- CDN bandwidth allocation in weakly interconnected networksJiqiang Wu, Yipeng Zhou, Dah-Ming Chiu, Zirong Zhu. 857-862 [doi]
- Distributed energy-efficient peer-to-peer VoD systemKonstantinos Deltouzos, Spyros G. Denazis. 863-868 [doi]
- To share content or not to share? This is the peering questionOsnat Mokryn, Adi Akavia, Dan Ben-Yaacov. 869-876 [doi]
- Spectral partitioning for node criticalityWaqar Asif, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan. 877-882 [doi]
- QADC-MORE: A new QoS-aware dynamic credit MORE protocol for wireless mesh networksMostafa Abdolahi, Farshad Eshghi, Manoochehr Kelarestaghi, Mozafar Bag Mohammadi. 883-888 [doi]
- A QoE-oriented scheduling scheme for HTTP streaming service in LTE systemYinLong Liu, Dali Zhu, Wei Ma, Lei Qian. 889-894 [doi]
- Cluster-based two-step target localization with incremental cooperationJafar Boostanpour, Sayed Mostafa Taheri, Hossein Zamiri-Jafarian. 895-900 [doi]
- An energy-efficient prediction-based algorithm for object tracking in sensor networksWeijing Cheng, Zhipeng Gao, Jingchen Zheng, Yuwen Hao. 901-906 [doi]
- Secure positioning with non-ideal distance bounding protocolsPericle Perazzo, Gianluca Dini. 907-912 [doi]
- An ISFA-combined pilot-aided channel estimation scheme in multiband orthogonal frequency division multiplexing ultra-wideband over fiber systemJing He, Teng Li, Xuejie Wen, Ming Chen, Lin Chen. 913-917 [doi]
- Equalizer placement and wavelength selective switch architecture for optical network securityKonstantinos Manousakis, Georgios Ellinas. 918-923 [doi]
- Optimized access control enforcement over encrypted content in information-centric networksElisa Mannes, Carlos Maziero, Luiz Lassance, Fábio Borges. 924-929 [doi]
- Dynamic ring for seamless mobility in identity centric networksDagang Li, Wenpeng Sha. 930-935 [doi]
- Hierarchical performance modeling of embedded systemsAhmed Alsheikhy, Song Han, Reda Ammar. 936-942 [doi]
- A version-aware computation and storage trade-off strategy for multi-version VoD systems in the cloudHui Zhao, Qinghua Zheng, Weizhan Zhang, Biao Du, Yuxuan Chen. 943-948 [doi]
- PowerMannaSim: An extension with power consumption modeling to MannaSim, a Wireless Sensor Network module of NS-2Rodolfo Miranda Pereira, Linnyer Beatrys Ruiz, Luiz Henrique C. Davantel, Thais R. M. Braga Silva. 949-955 [doi]
- Comprehensive analysis of AggSessAC method for revenue maximization using OMNeT++Andris Skrastins, Jans Jelinskis, Gunars Lauks. 956-961 [doi]
- Trust-based RPL for the Internet of ThingsNabil Djedjig, Djamel Tandjaoui, Faiza Medjek. 962-967 [doi]
- An autonomic in-network query processing for urban sensor networksMarcos A. Carrero, Rone I. da Silva, Aldri L. dos Santos, Carmem S. Hara. 968-973 [doi]
- Virtual broking coding for reliable in-network storage on WSANsCamila Helena Souza Oliveira, Yacine Ghamri-Doudane, Carlos Eduardo F. Brito, Stéphane Lohier. 974-981 [doi]
- Data authentication for NDN using hash chainsTamer Refaei, Márk Horváth, Michelle Schumaker, Creighton Hager. 982-987 [doi]
- Android app recommendation approach based on network traffic measurement and analysisXin Su, Dafang Zhang, Wenjia Li, Wenwei Li. 988-994 [doi]
- Towards a faster and accurate supertree inferenceDiogo Telmo Neves, João Luís Sobral. 995-1000 [doi]
- An ontology-based retrieval system for mammographic reportsAlbert Comelli, Luca Agnello, Salvatore Vitabile. 1001-1006 [doi]
- Taking swarms to the field: A framework for underwater mission planningSherif Tolba, Reda A. Ammar, Sanguthevar Rajasekaran. 1007-1013 [doi]
- Performance analysis of efficient pipeline architectures for underwater big data analyticsAyman Alharbi, Saleh Ibrahim, Reda Ammar, Hesham Alhumyani. 1014-1019 [doi]
- Performance analysis of data delivery reliability schemes in underwater sensor networksRehan Qayyum, Adnan Iqbal, Hassaan Khaliq Qureshi. 1020-1025 [doi]