Abstract is missing.
- A blue Monday? Try walking on a yellow pathSilvia Mirri, Marco Roccetti, Paola Salomoni, Catia Prandi. 1-5 [doi]
- Affective impact of social presence in immersive 3D virtual worldsElena Dzardanova, Vlasios Kasapakis, Damianos Gavalas. 6-11 [doi]
- Believable group behaviours for NPCs in FPS gamesLaura Anna Ripamonti, Silvio Gratani, Dario Maggiorini, Davide Gadia, Armir Bujari. 12-17 [doi]
- I want to ride my bicycle: A microservice-based use case for a MaaS architectureFranco Callegati, Giovanni Delnevo, Andrea Melis, Silvia Mirri, Marco Prandini, Paola Salomoni. 18-22 [doi]
- Multipong: A multiplayer ad-hoc version of PongMarco Begolo, Sebastiano Valle, Marco Zanella, Armir Bujari, Ombretta Gaggi, Claudio E. Palazzi. 23-28 [doi]
- A learning algorithm to minimize the expectation time of finding a parking place in urban areaAsma Houissa, Dominique Barth, Nadege Faul, Thierry Mautor. 29-34 [doi]
- Cooperative data muling from ground sensors to base stations using UAVsEmmanuel Tuyishimire, Antoine B. Bagula, Slim Rekhis, Noureddine Boudriga. 35-41 [doi]
- Dynamic timetable information in smart citiesKalliopi Giannakopoulou, Sotiris E. Nikoletseas, Andreas Paraskevopoulos, Christos D. Zaroliagis. 42-47 [doi]
- Flow-aware WPT k-nearest neighbours regression for short-term traffic predictionBin Sun, Wei Cheng, Prashant Goswami, Guohua Bai. 48-53 [doi]
- A cooperative location service for VANETsTawfiq Nebbou, Hacène Fouchal, Mohamed Lehsaini, Marwane Ayaida. 54-58 [doi]
- An efficient and dynamic pseudonyms change system for privacy in VANETWalid Bouksani, Boucif Amar Bensaber. 59-63 [doi]
- Analysis of checkpointing algorithms for primary-backup replicationBerkin Guler, Öznur Özkasap. 64-69 [doi]
- Application-network collaboration using SDN for ultra-low delay teleorchestrasEmmanouil Lakiotakis, Christos Liaskos, Xenofontas A. Dimitropoulos. 70-75 [doi]
- Compressed incremental checkpointing for efficient replicated key-value storesBerkin Guler, Öznur Özkasap. 76-81 [doi]
- A Big Data architecture for knowledge discovery in PubMed articlesFrancesco Gargiulo, Stefano Silvestri, Mario Ciampi. 82-87 [doi]
- Implementing private k-means clustering using a LWE-based cryptosystemAnastasia Theodouli, Konstantinos A. Draziotis, Anastasios Gounaris. 88-93 [doi]
- An approach to share MRI data over the Cloud preserving patients' privacyAntonino Galletta, Lilla Bonanno, Antonio Celesti, Silvia Marino, Placido Bramanti, Massimo Villari. 94-99 [doi]
- DiDiER - digitized services in dietary counselling for people with increased health risks related to malnutrition and food allergiesPatrick Elfert, Marco Eichelberg, Johannes Tröger, Jochen Britz, Jan Alexandersson, Daniel Bieber, Jürgen M. Bauer, Susanne Teichmann, Ludwig Kuhn, Martin Thielen, Janina Sauer, Alexander Munzberg, Norbert Rösch, Julia Woizischke, Rebecca Diekmann, Andreas Hein. 100-104 [doi]
- Cyber-healthcare cloud computing interoperability using the HL7-CDA standardClaude Lubamba, Antoine B. Bagula. 105-110 [doi]
- On the design of an app for foreign languages incidental learningSilvia Mirri, Marco Roccetti, Paola Salomoni, Giacomo Mambelli, Antonella Valva. 111-116 [doi]
- Preliminary considerations on approaching computer forensicAlessandro Amoroso. 117-121 [doi]
- TagLecture: The gamification of video lecture indexing through quality-based tagsMarco Furini, Silvia Mirri, Manuela Montangero. 122-127 [doi]
- TV commercials: Improving viewers engagement through gamification and second screenRoberta De Michele, Marco Furini. 128-133 [doi]
- Location of stations in a one-way electric car sharing systemHatice Calik, Bernard Fortz. 134-139 [doi]
- Reducing logistic vehicle kilometers in a city area based on network changesPieter Vansteenwegen, Corrinne Luteyn. 140-145 [doi]
- Service availability analysis of a multimodal travel planner using Stochastic AutomataSpyridon C. Evangelatos, Zannis Kalampoukis, Ioanna Fergadioti, Stelios Christofi, Bill Karakostas, Yannis Zorgios. 146-151 [doi]
- The impact of quick charging stations on the route planning of Electric VehiclesBülent Çatay, Merve Keskin. 152-157 [doi]
- Dealing with user constraints in MCDM based web service selectionWalid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Ashref Serrai. 158-163 [doi]
- Evaluation of cyclic prefix length in OFDM system based for Rayleigh fading channels under different modulation schemesHamid Nourollahi, Saeed Ghazi-Maghrebi. 164-169 [doi]
- Multi-agent architecture for reliable Cyber-Physical Systems (CPS)Teodora Sanislav, Sherali Zeadally, George Dan Mois, Hacène Fouchal. 170-175 [doi]
- Queuing and service management for congestion control in wireless sensor networks using Markov ChainsSamy Hafidi, Nawel Gharbi, Lynda Mokdad. 176-181 [doi]
- A novel system for the automatic extraction of a patient problem summaryCrescenzo Diomaiuta, Maria Mercorella, Mario Ciampi, Giuseppe De Pietro. 182-186 [doi]
- Usability evaluation of a geolocation technology: SafemateSantiago Martinez, Berglind Smaradottir, Torunn Kitty Vatnøy, Marius Bjonness. 187-192 [doi]
- The study of the implementation and the extension of the ISO/IEEE-11073 standardsYi Tang, Xiaolian Duan, Ting Fan, Hailing Feng, Wei Jin, Bozhi Shi. 193-197 [doi]
- Interval Coded Scoring extensions for larger problemsLieven Billiet, Sabine Van Huffel, Vanya Van Belle. 198-203 [doi]
- A comprehensive investigation and comparison of Machine Learning Techniques in the domain of heart diseaseSeyedamin Pouriyeh, Sara Vahid, Giovanna Sannino, Giuseppe De Pietro, Hamid R. Arabnia, Juan Gutierrez. 204-207 [doi]
- Eco-aware vehicle routing in urban environmentsJulian Dibbelt, Dionisis Kehagias, Grammati E. Pantziou, Damianos Gavalas, Charalampos Konstantopoulos, Dorothea Wagner, Kalliopi Giannakopoulou, Spyros C. Kontogiannis, Christos D. Zaroliagis. 208-213 [doi]
- Multimodal route and tour planning in urban environmentsJulian Dibbelt, Charalampos Konstantopoulos, Dorothea Wagner, Damianos Gavalas, Spyros C. Kontogiannis, Christos D. Zaroliagis, Vlasios Kasapakis, Grammati E. Pantziou. 214-219 [doi]
- Introducing TLS/DTLS Secure Access Modules for IoT frameworks: Concepts and experimentsPascal Urien. 220-227 [doi]
- Contextual approach for identifying malicious Inter-Component privacy leaks in Android appsDaojuan Zhang, Yuanfang Guo, Dianjie Guo, Rui Wang, Guangming Yu. 228-235 [doi]
- Analysis of LVAD log files for the early detection of pump thrombosisJenny I. Robesaat, Frerk Müller-von Aschwege, Nils Reiss, Thomas Schmidt, Christina Feldmann, Ezin Deniz, Jan D. Schmitto, Andreas Hein. 236-241 [doi]
- The use of predictive models in dynamic treatment planningSaemundur O. Haraldsson, Ragnheidur D. Brynjolfsdottir, John R. Woodward, Kristin Siggeirsdottir, Vilmundur Gudnason. 242-247 [doi]
- Evaluation of touchscreen assistive technology for visually disabled usersBerglind Fjola Smaradottir, Santiago Gil Martinez, Jarle Audun Haland. 248-253 [doi]
- A Use Case based requirements specification approach to support the development of a rehabilitation system for CVD patients: The PATHway projectPaolo Zampognaro, Roselien Buys, Deirdre Walsh, Catherine Woods, Fabio Melillo. 254-259 [doi]
- Usability assessment of a Health KioskJoão Silva, Pedro Brandão, Rui Prior. 260-265 [doi]
- CityCare: Crowdsourcing daily life issue reports in smart citiesAthanasios Bousios, Damianos Gavalas, Lambros Lambrinos. 266-271 [doi]
- Dynamic strategies for the optimal embedding of Virtual InfrastructuresJoão Soares, Joao Aparicio, Susana Sargento. 272-277 [doi]
- Sensing the cities with social-aware unmanned aerial vehiclesStefano Chessa, Michele Girolami, Fabio Mavilia, Gianluca Dini, Pericle Perazzo, Marco Rasori. 278-283 [doi]
- Accurate estimate of Blood Glucose through Interstitial Glucose by Genetic ProgrammingIvanoe De Falco, Umberto Scafuri, Ernesto Tarantino, Antonio Della Cioppa. 284-289 [doi]
- Biologically relevant simulations for validating risk models under small-sample conditionsAlex F. Bokov, Laura S. Manuel, Alfredo Tirado-Ramos, Jon A. Gelfond, Scott D. Pletcher. 290-295 [doi]
- Managing diabetes: Pattern discovery and counselling supported by user data in a mobile platformDiogo Machado, Tiago Paiva, Inês Dutra, Vítor Santos Costa, Pedro Brandão. 296-299 [doi]
- An agent model to support social network-based palliative careNima Moradianzadeh, Pooya Moradian Zadeh, Ziad Kobti, Kathryn Pfaff. 300-305 [doi]
- Big data analytics in genomics: The point on Deep Learning solutionsFabrizio Celesti, Antonio Celesti, Lorenzo Carnevale, Antonino Galletta, Salvatore Campo, Agata Romano, Placido Bramanti, Massimo Villari. 306-309 [doi]
- Two-aggregator topology optimization without splitting in data center networksSoham Das, Sartaj Sahni. 310-315 [doi]
- A Steiner tree based approach for the efficient support of multipoint communications in a multi-domain contextLunde Chen, Slim Abdellatif, Thierry Gayraud, Pascal Berthou. 316-321 [doi]
- Improving the behavior of Interconnection Networks by using multiple internal paths and fan-outsEleftherios Stergiou, Dimitrios Liarokapis, John D. Garofalakis. 322-326 [doi]
- A Markov chain-based Approximation of CCN caching SystemsHamza Ben Ammar, Soraya Ait Chellouche, Yassine Hadjadj Aoul. 327-332 [doi]
- On the impact of traffic rerouting and set-up delay tolerance on connection provisioning in dynamic WDM transparent networks with QoT constraintsNaama Amdouni, Taoufik Aguili. 333-338 [doi]
- Experimental comparison of machine learning-based available bandwidth estimation methods over operational LTE networksNatsuhiko Sato, Takashi Oshiba, Kousuke Nogami, Anan Sawabe, Kozo Satoda. 339-346 [doi]
- Flexible bandwidth allocation for big data transfer with deadline constraintsSrinikethan Madapuzi Srinivasan, Tram Truong Huu, Mohan Gurusamy. 347-352 [doi]
- Balancing overhead-minimization objectives in network probing-path selectionSaw Lin, Vijay Ramachandran, Tinotenda Zinyama. 353-358 [doi]
- On expected transmissions for wireless random linear codingJalaluddin Qureshi, Adeel Malik, Chuan Heng Foh. 359-364 [doi]
- The Socket Store: An app model for the application-network interactionChristos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis. 365-370 [doi]
- A Vertical Handover management scheme for VANET Cloud Computing systemsEmmanouil Skondras, Angelos Michalas, Aggeliki Sgora, Dimitrios D. Vergados. 371-376 [doi]
- A novel urban traffic management mechanism based on FOGCelso A. R. L. Brennand, Azzedine Boukerche, Rodolfo Ipolito Meneguette, Leandro A. Villas. 377-382 [doi]
- Every dog has its day: A comparative study of clustering algorithms in VANETsJun Zhang, Mengying Ren, Houda Labiod, Lyes Khoukhi. 383-389 [doi]
- Content distribution in vehicular networks through information filteringDaniel Inacio, Carlos Senna, Susana Sargento. 390-397 [doi]
- A cooperative and adaptive resource scheduling for Vehicular CloudRodolfo Ipolito Meneguette, Azzedine Boukerche. 398-403 [doi]
- A Software-Defined Address Resolution ProxyJun Li, Zeping Gu, Yongmao Ren, Haibo Wu, Shanshan Shi. 404-410 [doi]
- NERV: A constraint-free network resources manager for virtualized environmentsMauro Moura, Flavio Silva, Pedro Frosi Rosa, Rui L. Aguiar. 411-417 [doi]
- An Autonomic QoS management architecture for Software-Defined Networking environmentsFelipe Volpato, Madalena Pereira da Silva, Alexandre Leopoldo Gonçalves, Mario Antonio Ribeiro Dantas. 418-423 [doi]
- Message bundling on structured overlaysKazuyuki Shudo. 424-431 [doi]
- CREDENCE: A Carrier Grade Software Defined Networking control environment based on the JAIN SLEE component modelJhon Martinez, Pedro Frosi Rosa, Flávio Oliveira Silva, Caio César Ferreira, Pedro Bispo, Daniel Corujo, Rui L. Aguiar. 432-437 [doi]
- DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive dataDali Zhu, Hao Jin, Ying Yang, Di Wu, Weiyi Chen. 438-443 [doi]
- Large-scale discovery and empirical analysis for I2P eepSitesYue Gao, Qingfeng Tan, Jinqiao Shi, Xuebin Wang, Muqian Chen. 444-449 [doi]
- Secure the commodity applications against address exposure attacksXiaoguang Wang, Yong Qi. 450-456 [doi]
- You can run but you cannot hide from memory: Extracting IM evidence of Android appsAntonia Nisioti, Alexios Mylonas, Vasilios Katos, Paul D. Yoo, Anargyros Chryssanthou. 457-464 [doi]
- A Control-theoretic approach for Duty Cycle Adaptation in dynamic wireless sensor networksRaja Al Kiyumi, Chuan Heng Foh, Serdar Vural, Rahim Tafazolli. 465-472 [doi]
- Shooter localization in wireless acoustic sensor networksAndrea Simone Pinna, Giuseppe Portaluri, Stefano Giordano. 473-476 [doi]
- Neutral Operation of the Minimum Energy Node in energy-harvesting environmentsAndre Riker, Marília Curado, Edmundo Monteiro. 477-482 [doi]
- Fault tolerant protocol for data collecting in wireless sensor networksJacek Cichon, Maciej Gebala, Marcin Zawada. 483-486 [doi]
- A TDMA data-buffering technique that provides minimum throughput delays while allowing time-slot reassignments without data-transfer interruptionsEdward W. Chandler. 487-492 [doi]
- Max-SINR scheduling in Full-Duplex OFDMA cellular networks with dynamic arrivalsHassan Fawaz, Samer Lahoud, Melhem El Helou, Marc Ibrahim. 493-498 [doi]
- Waterfilling-based resource allocation techniques in downlink Non-Orthogonal Multiple Access (NOMA) with Single-User MIMOMarie-Josepha Youssef, Joumana Farah, Charbel Abdel Nour, Catherine Douillard. 499-506 [doi]
- Mm-Wave STSK-aided Single Carrier block transmission for broadband networkingTalha Faizur Rahman, Aamir Habib, Claudio Sacchi, Mohammed El-Hajjar. 507-514 [doi]
- Content-aware prefetching in Over-The-Top wireless networksJose Silva, André Dias, João Nogueira, Lucas Guardalben, Susana Sargento. 515-522 [doi]
- Cloud-based Adaptive Video Streaming: Content storage vs. transcoding optimization methodsKonrad Karolewicz, Andrzej Beben. 523-528 [doi]
- Flaneur: Augmented exploration of the architectural urbanscapeAnastasia Ioannidi, Damianos Gavalas, Vlasios Kasapakis. 529-533 [doi]
- A Mobile Edge Computing-assisted video delivery architecture for wireless heterogeneous networksYue Li, Pantelis A. Frangoudis, Yassine Hadjadj Aoul, Philippe Bertin. 534-539 [doi]
- Enhancing secrecy by full-duplex antenna selection in cognitive networksGaojie Chen, Justin P. Coon. 540-545 [doi]
- Enhancement of transmission security for OFDM based systemsDimitrios Efstathiou, George D. Papadopoulos, Despoina Tsipouridou, Fotini-Niovi Pavlidou. 546-551 [doi]
- Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor NetworksMohamed S. Abdalzaher, Karim G. Seddik, Osamu Muta. 552-557 [doi]
- SecRoute: End-to-end secure communications for wireless ad-hoc networksGeorge Hatzivasilis, Ioannis Papaefstathiou, Konstantinos Fysarakis, Ioannis G. Askoxylakis. 558-563 [doi]
- A Cloudlet-based task-centric offloading to enable energy-efficient mobile applicationsShichao Guan, Robson Eduardo De Grande, Azzedine Boukerche. 564-569 [doi]
- 5G wholesale services and pricingManos Dramitinos, George D. Stamoulis, Håkon Lønsethagen. 570-575 [doi]
- Modeling profit of sliced 5G networks for advanced network resource management and slice implementationBin Han, Shreya Tayade, Hans D. Schotten. 576-581 [doi]
- An advertising revenue model for access ISPsPradeep Bangera, Syed Hasan, Sergey Gorinsky. 582-589 [doi]
- Boundary-enabled fair scheduling in downlink multi-carrier multiple-access networksTing Yang, Fabien Heliot, Chuan Heng Foh, Klaus Moessner. 590-595 [doi]
- Practical loss inference in uncertain networksXinlei Yu, Yuqi Ye, Jing Wang, Yan Qiao. 596-601 [doi]
- Communication with partial noisy feedbackGang Wang, Yanyuan Qin, Chengjuan Chang. 602-607 [doi]
- Real-time interference mitigation by randomized convex approximationKonstantinos P. Tsoukatos. 608-613 [doi]
- A joint Bloom Filter and cross-encoding for data verification and recovery in cloudShengjun Zhang, Hang Zhou, Yahui Yang, Zhonghai Wu. 614-619 [doi]
- Re-optimizing the embedding of Virtual InfrastructuresJoão Soares, Susana Sargento. 620-626 [doi]
- Comparing the performance of OS-level virtualization tools in SoC-based systems: The case of I/O-bound applicationsDavid Beserra, Manuele Kirsch-Pinheiro, Carine Souveyet, Luiz Angelo Steffenel, Edward David Moreno. 627-632 [doi]
- Deployment orchestration of microservices with geographical constraints for Edge computingMassimo Villari, Antonio Celesti, Giuseppe Tricomi, Antonino Galletta, Maria Fazio. 633-638 [doi]
- Resource-constrained P2P streaming overlay construction for efficient joining under flash crowdsEliseu Cesar Miguel, Ítalo Cunha, Cristiano M. Silva, Fernando Carvalho, Sérgio Vale Aguiar Campos. 639-644 [doi]
- JLPR: Joint range-based localization using trilateration and packet routing in Wireless Sensor Networks with mobile sinksMauricio Bertanha, Richard W. Pazzi. 645-650 [doi]
- On communication cost vs. load balancing in Content Delivery NetworksMahdi Jafari Siavoshani, Seyed Pooya Shariatpanahi, Hamid Ghasemi, Ali Pourmiri. 651-656 [doi]
- HLAF: Heterogeneous-Latency Adaptive Forwarding strategy for Peer-Assisted Video Streaming in NDNYuhang Ye, Brian Lee, Ronan Flynn, Niall Murray, Yuansong Qiao. 657-662 [doi]
- A Reactive Security Framework for operational wind parks using Service Function ChainingKonstantinos Fysarakis, Nikolaos E. Petroulakis, Andreas Roos, Khawar Abbasi, Petra Vizarreta, George Petropoulos, Ermin Sakic, George Spanoudakis, Ioannis G. Askoxylakis. 663-668 [doi]
- SDNScore: A statistical defense mechanism against DDoS attacks in SDN environmentKübra Kalkan, Gürkan Gür, Fatih Alagöz. 669-675 [doi]
- OAuth-IoT: An access control framework for the Internet of Things based on open standardsSavio Sciancalepore, Giuseppe Piro, Daniele Caldarola, Gennaro Boggia, Giuseppe Bianchi. 676-681 [doi]
- Acceleration of RSA processes based on hybrid ARM-FPGA clusterXu Bai, Lei Jiang, Qiong Dai, Jiajia Yang, Jianlong Tan. 682-688 [doi]
- Optimised CSMA/CA protocol for safety messages in vehicular ad-hoc networksGiorgia V. Rossi, Kin K. Leung. 689-696 [doi]
- Optimization and resource management in NOMA wireless networks supporting real and non-real time service bundlingPanagiotis Vamvakas, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou, John S. Baras. 697-703 [doi]
- Selective overlay mode operation for D2D communication in dense 5G cellular networksGadiraju Divija Swetha, Garimella Rama Murthy. 704-709 [doi]
- Enhanced spread in time on-off keying technique for dense Terahertz nanonetworksHakim Mabed. 710-716 [doi]
- Analyzing the IT subsystem failure impact on availability of cloud servicesGuto Leoni Santos, Patricia Takako Endo, Glauco Estacio Gonçalves, Daniel Rosendo, Demis Gomes, Judith Kelner, Djamel Sadok, Mozhgan Mahloo. 717-723 [doi]
- Designing resilient WDM data center networks for dynamic lightpath demandsSaja Al-Mamoori, Arunita Jaekel, Subir Bandyopadhyay. 724-729 [doi]
- Towards an application level elasticity by middlewareTercio de Morais, Nelson Souto Rosa. 730-735 [doi]
- Evaluating the cooling subsystem availability on a Cloud data centerDemis Moacir Gomes, Patricia Takako Endo, Glauco Estacio Gonçalves, Daniel Rosendo, Guto Leoni Santos, Judith Kelner, Djamel Sadok, Mozhgan Mahloo. 736-741 [doi]
- Truthful spectrum auction for efficient anti-jamming in cognitive radio networksMohammad Aghababaie Alavijeh, Behrouz Maham, Zhu Han, Walid Saad. 742-747 [doi]
- Software-Defined Radio proof-of-concept for chaos-based coded modulationsAlexandre Wagemakers, Francisco J. Escribano. 748-753 [doi]
- A distributed Cooperative Spectrum Resource Allocation in smart home cognitive wireless sensor networksSabrine Aroua, Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane. 754-759 [doi]
- Dynamic role assignment in Software-Defined Wireless NetworksPablo Graubner, Markus Sommer, Matthias Hollick, Bernd Freisleben. 760-766 [doi]
- Two Layers Multi-class Detection method for network Intrusion Detection SystemYali Yuan, Liuwei Huo, Dieter Hogrefe. 767-772 [doi]
- Stream learning and anomaly-based intrusion detection in the adversarial settingsEduardo Viegas, Altair Olivo Santin, Vilmar Abreu, Luiz S. Oliveira. 773-778 [doi]
- CEFF: An efficient approach for traffic anomaly detection and classificationGeng Tian, Zhiliang Wang, Xia Yin, Jun Chen, Xingang Shi, Chao Zhou, Zimu Li, Yingya Guo. 779-786 [doi]
- Flow-based Intrusion Detection System for SDNGeorgi A. Ajaeiya, Nareg Adalian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. 787-793 [doi]
- A mechanism to control the congestion in machine-to-machine communication in LTE-A networksDavid Aragão, Dario Vieira, Miguel Franklin de Castro. 794-797 [doi]
- Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networksAlexandros Mavromatis, Georgios Z. Papadopoulos, Xenofon Fafoutis, Angelos Goulianos, George C. Oikonomou, Periklis Chatzimisios, Theo Tryfonas. 798-803 [doi]
- Non-linear barrier coverage using mobile wireless sensorsAshutosh Baheti, Arobinda Gupta. 804-809 [doi]
- Long range communications in urban and rural environmentsRuben Oliveira, Lucas Guardalben, Susana Sargento. 810-817 [doi]
- MiniWorld: Resource-aware distributed network emulation via full virtualizationNils Schmidt, Lars Baumgärtner, Patrick Lampe, Kurt Geihs, Bernd Freisleben. 818-825 [doi]
- Building cost efficient cloud data centers via geographical load balancingYi Xu, Yong Zhan, Du Xu. 826-831 [doi]
- Multi-objective optimization for computation offloading in mobile-edge computingLiqing Liu, Zheng Chang, Xijuan Guo, Tapani Ristaniemi. 832-837 [doi]
- Real-time Task Scheduling for joint energy efficiency optimization in data centersYoushi Wang, Fa Zhang, Rui Wang, Yangguang Shi, Hua Guo, Zhiyong Liu. 838-843 [doi]
- Spark-based Streamlined MetablockingTiago Brasileiro Araújo, Carlos Eduardo Santos Pires, Thiago Pereira da Nóbrega. 844-850 [doi]
- Efficient spark-based framework for big geospatial data query processing and analysisIsam Mashhour Aljawarneh, Paolo Bellavista, Antonio Corradi, Rebecca Montanari, Luca Foschini, Andrea Zanotti. 851-856 [doi]
- How to enable clinical workflows to integrate big healthcare dataLorenzo Carnevale, Antonio Celesti, Maria Fazio, Placido Bramanti, Massimo Villari. 857-862 [doi]
- Probe sharing: A simple technique to improve on sparrowWenzhuo Li, Chuang Lin, Puheng Zhang, Mao Miao. 863-870 [doi]
- Locating victims of destructive targeted attacks based on Suspicious Activity Spike TrainNobutaka Kawaguchi, Hideyuki Tomimura, Tetsutoshi Komiyama, Kosuke Kubota, Mamoru Tsuichihara. 871-878 [doi]
- Which secure transport protocol for a reliable HTTP/2-based web service: TLS or QUIC?Antoine Saverimoutou, Bertrand Mathieu, Sandrine Vaton. 879-884 [doi]
- Anomaly detection approach to keystroke dynamics based user authenticationElena Ivannikova, Gil David, Timo Hämäläinen 0002. 885-889 [doi]
- Privacy-preserving text mining as a serviceGianpiero Costantino, Antonio La Marra, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi. 890-897 [doi]
- A survey on decoding schedules of LDPC convolutional codes and associated hardware architecturesHayfa Ben Thameur, Bertrand Le Gal, Nadia Khouja, Fethi Tlili, Christophe Jégo. 898-905 [doi]
- Renovate high performance user-level stacks' innovation utilizing commodity network adaptorsMao Miao, Xiaohui Luo, Fengyuan Ren, Wenxue Cheng, Jing Xie, Wenzhuo Li, Xiaolan Liu. 906-911 [doi]
- Widely linear equalizer performance with multiple independent interferencesHayfa Fhima, Rafik Zayani, Hmaied Shaiek, Daniel Roviras, Bruno Sens Chang, Ridha Bouallegue. 912-917 [doi]
- RCBurst: A mechanism to mitigate the impact of hidden terminals in home WLANsMustafa Al-Bado, Cormac J. Sreenan, Kenneth N. Brown. 918-923 [doi]
- An efficient CNN-based classification on G-protein Coupled Receptors using TF-IDF and N-gramMan Li, Cheng Ling, Jing-Yang Gao. 924-931 [doi]
- Error probability analysis of neuro-spike communication channelKeyvan Aghababaiyan, Behrouz Maham. 932-937 [doi]
- 2-D channel transfer function for Molecular Communication with an absorbing receiverBayram Cevdet Akdeniz, Ali Emre Pusane, Tuna Tugcu. 938-942 [doi]
- Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association predictionYaogong Zhang, Yuan Wang, Jiahui Liu, Yalou Huang, Maoqiang Xie. 943-950 [doi]
- OpenFlow-compliant topology management for SDN-enabled Information Centric NetworksGeorge Petropoulos, Konstantinos V. Katsaros, Maria-Evgenia Xezonaki. 951-954 [doi]
- Design and implementation of a Packet-in buffer system for SDN switchesShie-Yuan Wang, Chun-Hao Chang, Yi-Hsuan Hsieh, Chih-Liang Chou. 955-960 [doi]
- Performance evaluation of OpenFlow scheduled bundles for consistent updatesShie-Yuan Wang, Chen Jhong, Chih-Liang Chou. 961-966 [doi]
- CRAFT: A Cache Reduction Architecture for Flow Tables in Software-Defined NetworksXianfeng Li, Wencong Xie. 967-972 [doi]
- A path-based recommendations approach for online systems via hyperbolic network embeddingNikolaos Papadis, Eleni Stai, Vasileios Karyotis. 973-980 [doi]
- PIE: A personalized incentive for location-aware mobile crowd sensingYao Wu, Yuncheng Wu, Juru Zeng, Hong Chen, Cuiping Li. 981-986 [doi]
- Planning and execution of heterogeneous service compositionsAlexis Huf, Ivan Luiz Salvadori, Frank Siqueira. 987-993 [doi]
- Competence-based mobile Community Response NetworksCarlos Roberto De Rolt, Luca Foschini, Fernando Gauthier, Danilo Hasse, Rebecca Montanari. 994-1000 [doi]
- Efficient attack plan recognition using automated planningAdam Amos-Binks, Joshua Clark, Kirk Weston, Michael Winters, Khaled Harfoush. 1001-1006 [doi]
- Realizing software vault on Android through information-flow controlR. K. Shyamasundar, N. V. Narendra Kumar, Priyanka Teltumde. 1007-1014 [doi]
- Mitigating the ACK counterfeiting attack in Delay and Disruption Tolerant NetworksJuliano Fischer Naves, Igor Monteiro Moraes. 1015-1020 [doi]
- Security in heterogeneous distributed storage systems: A practically achievable information-theoretic approachMarco Baldi, Franco Chiaraluce, Linda Senigagliesi, Luca Spalazzi, Francesco Spegni. 1021-1028 [doi]
- Randomness testing and comparison of classical and quantum bit generatorsSerdar Boztas, Benjamin A. Burton. 1029-1032 [doi]
- Delay-sensitive resource allocation for relay-aided M2M communication over LTE-advanced networksMohammad Reza Mardani, Salman Mohebi, Behrouz Maham, Mehdi Bennis. 1033-1038 [doi]
- SloMo: An implicit cross-layer mechanism for a better experience on mobile networksWilliam Diego, Isabelle Hamchaoui, Fabrice Guillemin. 1039-1042 [doi]
- Improving video content access with proactive D2D caching and online social networkingFausto da S. Moraes, Kleber Vieira Cardoso, Vinicius C. M. Borges. 1043-1048 [doi]
- Routing algorithm with smart energy management on VCSEL interconnected networksIlias Gravalos, Apostolos Siokis, Panagiotis C. Kokkinos, Emmanouel A. Varvarigos. 1049-1055 [doi]
- New efficient energy-saving techniques for resource allocation in downlink OFDMA transmission systemsJoumana Farah, Elie Sfeir, Charbel Abdel Nour, Catherine Douillard. 1056-1062 [doi]
- Measurement and comparison of Sub-1GHz and IEEE 802.11p in vehicular networksJingbang Wu, Huimei Lu, Yong Xiang. 1063-1066 [doi]
- SuPRANO: On the localization of connected vehicles in hostile environments: A Semi-suPervised manifold leaRning techniqueAhmed Soua, Ridha Soua. 1067-1072 [doi]
- D-Hop: A dynamic and distributed protocol for vehicle routingMariana Ramos de Brito, Fatima de L. P. Duarte-Figueiredo. 1073-1078 [doi]
- LEPR: Link Stability Estimation-based Preemptive Routing protocol for Flying Ad Hoc NetworksXianfeng Li, Jiaojiao Yan. 1079-1084 [doi]
- Efficient Encounter-based Event Dissemination Protocol (E-BED) for urban and highway Vehicular Ad Hoc NetworksTomo Nikolovski, Richard W. Pazzi, Ademar Takeo Akabane, Leandro A. Villas. 1085-1090 [doi]
- Centralized and distributed RRH clustering in Cloud Radio Access NetworksHussein Taleb, Melhem El Helou, Kinda Khawam, Samer Lahoud, Steven Martin. 1091-1097 [doi]
- Understanding the role of mobility in real mobile ad-hoc networks connectivityLeonardo Cotta, Pedro O. S. Vaz de Melo, Antonio A. F. Loureiro. 1098-1103 [doi]
- Outage performance analysis of multicarrier relay selection for cooperative networksShuping Dang, Justin P. Coon, Gaojie Chen, David E. Simmons. 1104-1108 [doi]
- iScan: Efficient WiFi Scan for mobile device based on client and network behavior learningXiaokang Sang, Qian Wu, Hewu Li. 1109-1114 [doi]
- FMR-PDP: Flexible multiple-replica provable data possession in cloud storageLimin Li, Yahui Yang, Zhonghai Wu. 1115-1121 [doi]
- A method of eco-driving based on intra-vehicular sensor dataPaulo H. L. Rettore, Andre B. Campolina, Leandro A. Villas, Antonio A. F. Loureiro. 1122-1127 [doi]
- Virtual Tether Search: A self-constraining search algorithm for swarms in an open oceanSherif Tolba, Reda Ammar. 1128-1135 [doi]
- EAalo: Enhanced coflow scheduling without prior knowledge in a datacenter networkZhaogeng Li, Jun Bi, Yiran Zhang, Chuang Wang. 1136-1141 [doi]
- Design and analysis of a new distributed scheduling approachWenzhuo Li, Chuang Lin, Chao Xue. 1142-1149 [doi]
- Changing IP geolocation from arbitrary database query towards multi-databases fusionHan Li, Pei Zhang, Zhanfeng Wang, Fei Du, Ye Kuang, Ying An. 1150-1157 [doi]
- iDPL: A scalable and flexible inter-continental testbed for data placement research and experimentGuang-wei, Hailong Yang, Zhongzhi Luan, Depei Qian. 1158-1163 [doi]
- Data mining approach for estimating cloud-covered areas in MODIS satellite imagesMahdi Saleh, Sami Serbey, Bouchra Fahs. 1164-1167 [doi]
- Improving collaborative filtering's rating prediction quality in dense datasets, by pruning old ratingsDionisis Margaris, Costas Vassilakis. 1168-1174 [doi]
- Multi-job Hadoop scheduling to process geo-distributed big dataMarco Cavallo, Giuseppe Di Modica, Carmelo Polito, Orazio Tomarchio. 1175-1181 [doi]
- Efficient IoT data aggregation for connected health applicationsKonstantinos Karamitsios, Theofanis Orphanoudakis. 1182-1185 [doi]
- Comparison of CoAP and CoCoA+ congestion control mechanisms for different IoT application scenariosEmilio Ancillotti, Raffaele Bruno. 1186-1192 [doi]
- Lightweight & secure industrial IoT communications via the MQ telemetry transport protocolSotirios Katsikeas, Konstantinos Fysarakis, Andreas I. Miaoudakis, Amaury Van Bemten, Ioannis G. Askoxylakis, Ioannis Papaefstathiou, Anargyros Plemenos. 1193-1200 [doi]
- Analytical model for adaptive QoS management at the Middleware level in IoTYassine Banouar, Thierry Monteil 0001, Christophe Chassot. 1201-1208 [doi]
- LiteSense: An adaptive sensing scheme for WSNsJoão Marco C. Silva, Kalil Araujo Bispo, Paulo Carvalho 0002, Solange Rito Lima. 1209-1212 [doi]
- Performance evaluation of WiFi Direct for data dissemination in mobile social networksZhifei Mao, Jing Ma, Yuming Jiang, Bin Yao. 1213-1218 [doi]
- From online to offline: Charactering user's online music listening behavior for efficacious offline radio program arrangementTao Qin, Yukun Liu, Chenxu Wang, Tao Yang, Chao He. 1219-1224 [doi]
- Spam comments detection with self-extensible dictionary and text-based featuresQiang Zhang, Chenwei Liu, Shangru Zhong, Kai Lei. 1225-1230 [doi]
- Opinion dynamics: A study of the relation between status and communicabilityCristhiana Carine Albert, Luiz Paulo Luna de Oliveira, Marta Becker Villamil. 1231-1236 [doi]
- Privacy preserving clustering over horizontal and vertical partitioned dataMina Sheikhalishahi, Fabio Martinelli. 1237-1244 [doi]
- Bayesian diagnosis and reliability analysis of Private Mobile Radio networksSalma Ktari, Stefano Secci, Damien Lavaux. 1245-1250 [doi]
- Secure self-seeding with power-up SRAM statesKonrad-Felix Krentz, Christoph Meinel, Hendrik Graupner. 1251-1256 [doi]
- An effective Stackelberg game for high-assurance of data trustworthiness in WSNsMohamed S. Abdalzaher, Karim G. Seddik, Osamu Muta. 1257-1262 [doi]
- Non-recursive computation of the probability of more than two people having the same birthdayMichael E. Kounavis, Sergej Deutsch, David Durham, Saeedeh Komijani. 1263-1270 [doi]
- Understanding viewing engagement and video quality in a large-scale mobile video systemZitao Chen, Laizhong Cui, Yong Jiang, Zhi Wang. 1271-1277 [doi]
- Robust traffic differentiation with intra-AC prioritization in multirate IEEE 802.11aa networksLukasz Prasnal, Marek Natkaniec. 1278-1283 [doi]
- Uncertainty-driven ensemble forecasting of QoS in Software Defined NetworksKostas Kolomvatsos, Christos Anagnostopoulos, Angelos K. Marnerides, Qiang Ni, Stathes Hadjiefthymiades, Dimitrios P. Pezaros. 1284-1289 [doi]
- Masking lossy networks by TCP tunnel with Network CodingNguyen Viet Ha, Kazumi Kumazoe, Kazuya Tsukamoto, Masato Tsuru. 1290-1295 [doi]
- On minimizing memory and computation overheads for binary-tree based data replicationStavros Souravlas, Angelo Sifaleras. 1296-1299 [doi]
- ST-Drop: A novel buffer management strategy for D2D opportunistic networksMichael D. Silva, Ivan Oliveira Nunes, Raquel A. F. Mini, Antonio A. F. Loureiro. 1300-1305 [doi]
- Construction of a minimum energy broadcast backbone with bounded delay in heterogeneous wireless sensor networksKarla Breschi, Julien Bernard. 1306-1311 [doi]
- On the optimal number of chargers in battery-less wirelessly powered sensor networksDimitrios Zorbas, Patrice Raveneau, Yacine Ghamri-Doudane, Christos Douligeris. 1312-1317 [doi]
- Extracting usage patterns of home IoT devicesGevorg Poghosyan, Ioannis Pefkianakis, Pascal Le Guyadec, Vassilis Christophides. 1318-1324 [doi]
- Wireless sensor networks for monitoring gas turbine engines during developmentHassan H. Khalili, Peter R. Green, Danielle George, Graham Watson, Werner Schiffers. 1325-1331 [doi]
- Worst-case attacker models for two-layered networks based on the Minimum Overlay CutMartin Backhaus, Guenter Schaefer. 1332-1337 [doi]
- Experimental evaluation of SDN-controlled, joint consolidation of policies and virtual machinesWajdi Hajji, Fung Po Tso, Lin Cui, Dimitrios P. Pezaros. 1338-1343 [doi]
- A programmable Controller for unified management of virtualized network infrastructuresMohamad Yassin, Karine Guillouard, Meryem Ouzzif, Roland Picard, Denis Aluze. 1344-1351 [doi]
- Mitigating elephant flows in SDN-based IXP networksLuis Augusto Dias Knob, Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 1352-1359 [doi]
- SDN management based on Hierarchical Task Network and Network Functions VirtualizationMario Alejandro Gironza-Ceron, William Fernando Villota-Jacome, Armando Ordóñez, Felipe Estrada Solano, Oscar Mauricio Caicedo Rendon. 1360-1365 [doi]
- A novel framework for enhancement of the low lighting videoJianhua Pang, Sheng Zhang 0003, Wencang Bai. 1366-1371 [doi]
- Reconfigurable underwater embedded systems architecturesHussain Albarakati, Abdelfattah Amamra, Raafat S. Elfouly, Reda S. Ammar. 1372-1379 [doi]
- Random sparse representation for thermal to visible face recognitionSamira Reihanian, Ehsan Arbabi, Behrouz Maham. 1380-1385 [doi]