Abstract is missing.
- Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networksWassim Fassi Fihri, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd. 1-6 [doi]
- Optimal resource allocation for downlink OFDM-Based cognitive radio networksXu Wang, Sabit Ekin, Erchin Serpedin. 1-6 [doi]
- A recommendation system with secondary usage of HEMS data for products based on IoT technologyKanae Matsui, Hanjong Choi. 1-6 [doi]
- Composite right left handed transmission line in coplanar configurationBouthaina Smari, Mondher Laabidi, Fathi Choubani. 1-5 [doi]
- Autonomous mode selection scheme for underlay device-to-device communicationKwon-Yeol Park, Dong-Woo Kim, Jong-Han Kim, Woon-Haing Hur. 1-5 [doi]
- Detection of malicious vehicles with demerit and reward level systemJihene Rezgui, Cedryk Doucet. 1-6 [doi]
- Providing flexible software as a service for smart grid by relying on big data platformsNikola Dalcekovic, Srdjan Vukmirovic, Ivana Kovacevic, Jelena Stankovski. 1-6 [doi]
- A comparison of migration and multihoming support in IPv6 and XIANandi Zhang, Marvin A. Sirbu, Jon M. Peha. 1-8 [doi]
- An efficient replication scheme to increase file availability in mobile peer to peer systemsMoufida Rahmani, Mahfoud Benchaïba. 1-6 [doi]
- Study and evaluation of voice over IP signaling protocols performances on MIPv6 protocol in mobile 802.11 network: SIP and H.323Azeddine Khiat, Mohamed El Khaili, Jamila Bakkoury, Ayoub Bahnasse. 1-8 [doi]
- Optimization of ldpc codes used in cooperative relay systems: Case of mobile telephonyIdy Diop, Idrissa P. Ndiaye, Papa Alioune Fall, Moussa Diallo. 1-6 [doi]
- Hardware and software implementation of a stereoscopic image compression technique for internet connected devicesGhattas Akkad, Moustapha ElHassan, Rafic Ayoubi. 1-6 [doi]
- Impact of equalization on hybrid communication system for smart gridAmani Aloui, Ons Ben Rhouma, Chiheb Rebai. 1-6 [doi]
- Evaluation of the SFSK-OOK integrated PLC-VLC system under the influence of sunlightS. M. Nlom, Khmaies Ouahada, Alain Richard Ndjiongue, Hendrik C. Ferreira. 1-5 [doi]
- A look into the information your smartphone leaksTimothy A. Chadza, Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, Jonathon A. Chambers. 1-6 [doi]
- Towards an inter-Cloud architecture in healthcare systemAbdesselam Ouardi, Abderrahim Sekkaki, Driss Mammass. 1-6 [doi]
- IoT application of WSN on 5G infrastructureSergio Huertas Martinez, Octavio J. Salcedo Parra, Brayan Steven Reyes Daza. 1-6 [doi]
- Social gene - A new method to find rising starsZhaolong Ning, Yuqing Liu, Xiangjie Kong. 1-6 [doi]
- On predicting the residence time of mobile users at relevant placesAbdessamed Sassi, Salah Eddine Henouda, Abdelmalik Bachir. 1-6 [doi]
- Geographic multicast routing based sleep schedulingLakhdar Derdouri, CongDuc Pham. 1-5 [doi]
- A trust management system model for cloudAhmad Ali, Mansoor Ahmed, Abid Khan, Muhammad Ilyas, Muhammad Saad Razzaq. 1-6 [doi]
- High speed efficient advanced encryption standard implementationSoufiane Oukili, Seddik Bri. 1-4 [doi]
- A hybrid trust based intrusion detection system for wireless sensor networksMert Melih Ozcelik, Erdal Irmak, Suat Ozdemir. 1-6 [doi]
- Standard conformable time domain diversity for DVB-T2 systemB. Akbarian, S. Ghazi-Maghrebi. 1-4 [doi]
- A new band selection approach based on information theory and support vector machine for hyperspectral images reduction and classificationAsma Elmaizi, Elkebir Sarhrouni, Ahmed Hammouch, Chafik Nacir. 1-6 [doi]
- Error correction enhancement with interleaves for DC free codesDadiso F. Musarurwa, Khmaies Ouahada, Hendrik C. Ferreira. 1-5 [doi]
- On neutrality of future networks: SDN as a baselineKhaoula Bel Kamel, Hana Bouafif, Mohamed Karim Sbai. 1-6 [doi]
- Analytical model of funnel based joint dual mobile service discovery and exposureWalid El Ayeb, Zièd Choukair. 1-6 [doi]
- Last significant trend change detection method for offline poisson distribution datasetsAmin Shahraki, Hamed Taherzadeh, Øystein Haugen. 1-7 [doi]
- A real-time risk assessment model for intrusion detection systemsEl Mostapha Chakir, Mohamed Moughit, Youness Idrissi Khamlichi. 1-6 [doi]
- SIEM selection criteria for an efficient contextual securityMoukafih Nabil, Sabir Soukainat, Abdelmajid Lakbabi, Ghizlane Orhanou. 1-6 [doi]
- Combining real-time processing streams to enable demand response in smart gridsIvana Kovacevic, Aleksandar Erdeljan, Srdjan Vukmirovic, Nikola Dalcekovic, Jelena Stankovski. 1-6 [doi]
- A novel serious game engineering based interactive visualization and evaluation platform for cellular technologiesPratip Chakraborty, Nandish P. Kuruvatti, Hans D. Schotten. 1-6 [doi]
- Flexibility of managing VLAN filtering and segmentation in SDN networksMadjed Bencheikh Lehocine, Mohamed Batouche. 1-6 [doi]
- Multidimensional database modeling: Literature survey and research agenda in the big data eraAlfredo Cuzzocrea, Rim Moussa. 1-6 [doi]
- Shortest path problem on single valued neutrosophic graphsSaid Broumi, Mohamed Talea, Assia Bakali, Florentin Smarandache, P. K. Kishore Kumar. 1-6 [doi]
- An online approach for joint task assignment and worker evaluation in crowd-sourcingGiuseppe Bianchi, Chiara Carusi, Lorenzo Bracciale. 1-8 [doi]
- EVNDN: Enhanced vehicular named data networkingMohamed Tarroumi, Issam Jabri. 1-6 [doi]
- Speeding up construction of distributed quadtrees for big-data analytics applications using dilated integers and hashmapsMayumbo Nyirenda, David Zulu. 1-6 [doi]
- Towards a universal architecture for disease data models sharing and evaluationAmr M. T. Ali-Eldin, Eman Abdelrazek Hafez. 1-6 [doi]
- Secure genomic data evaluation in cloud environmentsAdil Bouti, Jörg Keller 0001. 1-6 [doi]
- Optimal vertical handover based on TOPSIS algorithm and utility function in heterogeneous wireless networksMohamed Lahby, Abderrahim Sekkaki. 1-6 [doi]
- Pleasant sleep provision system during warm nights as a function of smart homeKanae Matsui. 1-6 [doi]
- An extended IMS framework with a high-performance and scalable distributed storage and computing systemYoussef Seraoui, Brahim Raouyane, Mostafa Bellafkih. 1-6 [doi]
- Security in internet of things: A surveyAlma Oracevic, Selma Dilek, Suat Özdemir. 1-6 [doi]
- Authenticated compressive sensing imagingWu Tao, Christoph Ruland. 1-6 [doi]
- Assurance of QoS in the integration of cloud services and internet of thingsHourieh Khodkari, Saeed Ghazi-Maghrebi, Abbas Asosheh. 1-5 [doi]
- Implementation of new broker based on the eTOM framework for dynamic supply of resources during the composition of virtual networksErrais Mohammed, Sekkaki Abderrahim. 1-6 [doi]
- Evaluation of TCP wave performance applied to real HTTP trafficA. Abdelsalam, Michele Luglio, Cesare Roseti, Francesco Zampognaro. 1-6 [doi]
- Miniaturized printed rectangular monopole antenna with a new DGS for WLAN applicationsFarouk Chetouah, Nacerdine Bouzit, Idris Messaoudene, Salih Aidel, Massinissa Belazzoug, Youcef Braham Chaouche. 1-4 [doi]
- Fuzzy logic based traffic surveillance system using cooperative V2X protocols with low penetration rateMuntaser A. Salman, Suat Ozdemir, Fatih V. Celebi. 1-6 [doi]
- A new weight based rotating clustering scheme for WSNSAlsnousi Essa, Ahmed Yassin Al-Dubai, Imed Romdhani, Mohamed A. Esriaftri. 1-6 [doi]
- Dodrant-homomorphic encryption for cloud databases using table lookupThomas Schwarz. 1-6 [doi]
- An efficient approach for detecting nodes failures in wireless sensor network based on clusteringKholoud Alshammari, Alaa E. S. Ahmed. 1-6 [doi]
- Heart rhythm monitoring system and IoT device for people with heart problemsR. Byron Narvaez, D. Martha Villacis, T. Marjorie Chalen, W. Velasquez. 1-5 [doi]
- Driver behavior quantitative models: Identification and classification of variablesKawtar Zfnebi, Nissrine Souissi, Kawtar Tikito. 1-6 [doi]
- Antenna array performances improved by double negative metamaterialsKhaoula Mabrouki, Belgacem Aouadi, Jamel Belhadj Tahar. 1-4 [doi]
- Multi-objective virtual machine placement optimization for cloud computingSerap Dorterler, Murat Dorterler, Suat Özdemir. 1-6 [doi]
- An improved blp model with response blind area eliminatedGang Liu, Guofang Zhang, Runnan Zhang, Juan Cui, Quan Wang, Shaomin Ji. 1-6 [doi]
- RACH overload congestion mechanism for M2M communication in LTE-A: Issues and approachesA. H. El Fawal, Ali Mansour, Frédéric Le Roy, D. Le Jeune, A. Hamie. 1-6 [doi]
- Managing the mobile Ad-hoc cloud ecosystem using software defined networking principlesVenkatraman Balasubramanian, Ahmed Karmouch. 1-6 [doi]
- Context aware traffic identification kit (TriCK) for network selection in future HetNets/5G networksLina Xu. 1-5 [doi]
- A multi-layer perceptron approach for flow-based anomaly detectionLennart Van Efferen, Amr M. T. Ali-Eldin. 1-6 [doi]
- Modelling of a MAC protocol for mobile M2M communicationsMustafa Mehmet-Ali, Farshad Keyvan Ghazvini, Mahmoud Doughan. 1-6 [doi]