Abstract is missing.
- Simplified Swarm Optimization Algorithm for reliability redundancy allocation problemsChia-Ling Huang, Wei-Chang Yeh. 1-4 [doi]
- Predictive data mining for Converged Internet of Things: A Mobile Health perspectiveJames Jin Kang, Sasan Adibi, Henry Larkin, Tom H. Luan. 5-10 [doi]
- Cost modelling and validation in network optimizationRonald G. Addie, Yu Peng, Mostfa Albdair, Chang Xing, David Fatseas, Moshe Zukerman. 11-16 [doi]
- Path based p-cycles for resilient MPLS network designJing Zhang, Richard J. Harris. 17-23 [doi]
- Measuring broadband performance using M-Lab: Why averages tell a poor taleXiaohong Deng, Jordan Hamilton, Jason Thorne, Vijay Sivaraman. 24-29 [doi]
- Modeling crowdsourcing platforms to enable workforce dimensioningChristian Schwartz, Kathrin Borchert, Matthias Hirth, Phuoc Tran-Gia. 30-37 [doi]
- Verifiably anonymous data collection on webHuafei Zhu, Shuoping Wang, Peipei Tang. 38-43 [doi]
- Enabling efficient publicly verifiable outsourcing computation for matrix multiplicationHongwei Li, Shenmin Zhang, Tom H. Luan, Hao Ren, Yuanshun Dai, Liang Zhou. 44-50 [doi]
- Building high capacity, power efficient and survivable MANETsRobert Hunjet. 51-58 [doi]
- Innovative route maintenance based on link failure prediction for Mobile Ad Hoc NetworksMohammed M. Kadhum. 59-64 [doi]
- GradeTrust: A secure trust based routing protocol for MANETsDavid Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray. 65-70 [doi]
- A True Bayesian Estimate concept in LTE downlink scheduling algorithmKhairul Anwar Bin Kamarul Hatta, Kuokkwee Wee, Wooi Ping Cheah, Yit Yin Wee. 71-76 [doi]
- Performance of optical receivers using photodetectors with different fields of view in an indoor cellular communication systemCuiwei He, Thomas Q. Wang, Md. Abdullah Masum, Jean Armstrong. 77-82 [doi]
- Base station sleeping mechanism based on traffic prediction in heterogeneous networksJinming Hu, Wei Heng, Guodong Zhang, Chao Meng. 83-87 [doi]
- Fast and energy efficient data storage for information discovery in multi-dimensional WSNsMenik Tissera, Robin Doss, Gang Li, Lynn Batten. 88-93 [doi]
- Adaptive channel utilisation in IEEE 802.15.4 Wireless Body Sensor Networks: Adaptive Phase-Shifting ApproachAmir Hossein Moravejosharieh, Ehsan Tabatabaei Yazdi, Krzysztof Pawlikowski, Harsha R. Sirisena. 94-99 [doi]
- OTAP arbitration effects in randomly deployed WSN'sCraig G. Walker, Adnan Al-Anbuky, Quan Bai. 100-105 [doi]
- The effect of carrier sensing mechanisms on wireless mesh network goodputYing Qu, Bryan Ng. 106-113 [doi]
- A deterministic node mobility model for mobile Ad Hoc wireless network using Signum-based discrete-time chaotic mapWimol San-Um, Patinya Ketthong, Jeerana Noymanee. 114-119 [doi]
- Protecting services from security mis-configurationNabeel Hadaad, Luke Drury, Ronald G. Addie. 120-125 [doi]
- Green-PolyH: A green traffic engineering solution over uncertain demandsAlejandro Ruiz-Rivera, Kwan-Wu Chin, Sieteng Soh. 126-130 [doi]
- FLEO: A flow-level network simulator for traffic engineering analysisGilbert Anggono, Tim Moors. 131-136 [doi]
- Predicting the region of interest for dynamic foveated streamingAyub Bokani, Mahbub Hassan, Salil S. Kanhere. 137-142 [doi]
- Dimensioning approach to provision M2M services on legacy GPRS and UMTS Cellular NetworksHatim Al Abri, Kevin M. Sowerby. 143-148 [doi]
- Cross layer rendezvous in cognitive radio ad-hoc networksMd. Akbar Hossain, Nurul I. Sarkar. 149-154 [doi]
- Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection techniqueSaifur Rahman Sabuj, Masanori Hamamura, Shougo Kuwamura. 155-160 [doi]
- A closed-form expression for coverage probability of random cellular network in composite Rayleigh-Lognormal fading channelsSinh Cong Lam, Roshanak Heidary, Kumbesan Sandrasegaran. 161-165 [doi]
- The role of ICT services on indonesian Small to Medium Enterprise productivitySusanti Rachman, Mark A. Gregory, Seema W. Narayan. 166-172 [doi]
- Disaster detection by group learning using SVDD for Emergency Rescue Evacuation Support SystemKen Komaki, Hiroko Higuchi, Haruka Iwahashi, Tomohiro Kitamura, Toshiki Yamasaki, Tomotaka Wada, Kazuhiro Ohtsuki. 173-178 [doi]
- How RTT between the control and data plane on a SDN network impacts on the perceived performanceHung D. Vu, Jason But. 179-184 [doi]
- Design and implementation of microstrip antenna array on Ku-Band for satellite TV receptionRahyanditya Ilham, Adit Kurniawan. 185-190 [doi]
- FPGA-based efficient modular multiplication for Elliptic Curve CryptographyMd. Selim Hossain, Yinan Kong. 191-195 [doi]
- Throughput comparison of IEEE 802.11ac and IEEE 802.11n in an indoor environment with interferenceZawar Shah, Siddarth Rau, Adeel Baig. 196-201 [doi]
- Promoting cooperation in mobile ad hoc networksAnthony E. Krzesinski. 202-207 [doi]
- Link capacity estimation in wireless software defined networksFarzaneh Pakzad, Marius Portmann, Jared Hayward. 208-213 [doi]
- Third-party customization of residential Internet sharing using SDNHassan Habibi Gharakheili, Luke Exton, Vijay Sivaraman, John Matthews, Craig Russell. 214-219 [doi]
- Flow entry conflict detection scheme for software-defined networkChun-Chih Lo, Pei-Yu Wu, Yau-Hwang Kuo. 220-225 [doi]
- Dynamic access point association using Software Defined NetworkingKeshav Sood, Shigang Liu, Shui Yu, Yong Xiang. 226-231 [doi]
- An OCML-M algorithm in OFDM timing synchronizationZhao Chen, Bin Chen, Ming-hui Mao. 232-236 [doi]
- Global and local knowledge in SDNMatt Stevens, Bryan Ng, David Streader, Ian Welch. 237-243 [doi]
- Low complexity Wireless Indoor Positioning approaches based on fingerprinting techniquesKriangkrai Maneerat, Chutima Prommak. 244-249 [doi]
- A novel WiMAX ranging scheme for periodic M2M applications in smart gridNazmus S. Nafi, Reduan H. Khan, Khandakar Ahmed, Manoj Datta, Mark A. Gregory. 250-255 [doi]
- Generalized model of function based collaboration in Smart Identifier NetworkWei Quan, Zhongbai Jiang, Fei Song, Mingchuan Zhang, Hongke Zhang. 256-260 [doi]
- Multi-resource schedulable unit for adaptive application-driven unified resource management in data centersDavid Manuel Gutiérrez Estévez, Min Luo. 261-268 [doi]
- LB-VoIP: Enhancing access control of VoIP for secure networksBingjie Han, Jianfeng Guan, Wei Quan, Changqiao Xu. 269-273 [doi]
- Improved detection of primary user emulation attacks in cognitive radio networksFan Jin, Vijay Varadharajan, Udaya Kiran Tupakula. 274-279 [doi]
- VirtMonE: Efficient detection of elephant flows in virtualized data centersSadia Bashir, Nadeem Ahmed. 280-285 [doi]
- The double-edged sword: Revealing the critical role of structural hole in forming trust for securing Wireless sensor networksMing Xiang, William Liu, Quan Bai, Adnan Al-Anbuky. 286-291 [doi]
- A new method for monitoring GPON based on optical codingHuda Saleh Abbas, Mark A. Gregory. 292-297 [doi]
- A SINET-based communication architecture for Smart GridZhongbai Jiang, Wei Quan, Jianfeng Guan, Hongke Zhang. 298-301 [doi]
- Clouds selection for network appliances based on trust credibilitySaurabh Kumar Garg, Longxiang Gao, James Montgomery. 302-307 [doi]
- EHOPES: Data-centered Fog platform for smart livingJianhua Li, Jiong Jin, Dong Yuan, Marimuthu Palaniswami, Klaus Moessner. 308-313 [doi]
- State analysis of Mobile Ad Hoc Network nodesLincy Elizebeth Jim, Mark A. Gregory. 314-319 [doi]
- An LQI based dual-channel routing protocol for Wireless Body Area networksSobia Omer, Rein Vesilo, Eryk Dutkiewicz, Qi Zhang. 320-325 [doi]
- Evaluation of dynamic circuit switching to reduce congestion in TorTimothy Girry Kale, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato. 326-331 [doi]
- Empirical evaluation of MDP-based DASH playerAyub Bokani, Sayed Amir Hoseini, Mahbub Hassan, Salil S. Kanhere. 332-337 [doi]