Abstract is missing.
- Updating guaranteed bandwidth in multi-domain software defined networksFranciscus X. A. Wibowo, Mark A. Gregory. 1-6 [doi]
- A multi-level hybrid chaotic system with a novel damping approach to achieve variable ratesAmmar Moufak Dukhan, Dhammika Jayalath, Bouchra Senadji, Jasmine Banks. 1-6 [doi]
- Agriculture internet of things: AG-IoTM. Ammad Uddin, Ali Mansour, Denis Le Jeune, El-Hadi M. Aggoune. 1-6 [doi]
- Latency estimation for fog-based internet of thingsJianhua Li, Tiehua Zhang, Jiong Jin, Yingying Yang, Dong Yuan, Longxiang Gao. 1-6 [doi]
- Experimental investigation of cascaded SMF-MMF-dithering technique for nonlinear compensation in fiber-wireless systemThavamaran Kanesan, H. M. Hizan, S. K. Sadon, Gee-Kung Chang. 1-3 [doi]
- Traffic engineering cooperating with traffic monitoring for the case with incomplete informationKodai Satake, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata. 1-7 [doi]
- Performance of multilevel differential polarization shift keying with estimation of inclined polarization axes over atmospheric turbulence channelYusuke Ito, Kouji Ohuchi. 1-6 [doi]
- ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approachSoo-Yeon Lee, Sa-rang Wi, Eunil Seo, Jun-Kwon Jung, Tai-Myoung Chung. 1-6 [doi]
- A universal iot joining protocol for DIY applicationsTyler Nicholas Edward Steane, P. J. Radcliffe. 1-3 [doi]
- Software defined industry automation networksKhandakar Ahmed, Nazmus S. Nafi, Jan Olaf Blech, Mark A. Gregory, Heinrich-Wilhelm Schmidt. 1-3 [doi]
- Automated parking lot management system using embedded robot type smart car based on wireless sensorsYeJi Kang, Doyeon Jung, Inshil Doh. 1-6 [doi]
- An augmented smart home system based on the internet of people conceptYinjun Tu, Yudong Lei, Hanxuan Li, Yifu Wang, Yifeng Chen. 1-3 [doi]
- Latency optimal broadcasting in noisy wireless mesh networksQin Xin 0001, Yan Xia. 1-7 [doi]
- Pain modelling in an artificial immune system based MANETLincy Elizebeth Jim, Mark A. Gregory. 1-6 [doi]
- Charging infrastructure placement for electric vehicles: An optimization prospectiveWaleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, Alagan Anpalagan. 1-6 [doi]
- Detecting IoT zombie attacks on web serversSujatha Sivabalan, P. J. Radcliffe. 1-3 [doi]
- A CDMA-based dynamic power and bandwidth allocation (DPBA) scheme for multiclass EPONElie Inaty, Robert Raad. 1-8 [doi]
- Energy and rate modeling of data download over LTE with respect to received signal characteristicsKubra Uludag, Ömer Korçak. 1-6 [doi]
- Distance-based location privacy protection in social networksMohammad Reza Nosouhi, Youyang Qu, Shui Yu, Yong Xiang, Damien Manuel. 1-6 [doi]
- Handover management for distributed mobility management in SDN-based mobile networksD. Battulga, J. Ankhzaya, B. Ankhbayar, U. Ganbayar, S. H. Sodbileg. 1-6 [doi]
- On cycle based schedulers with time alternating prioritiesWojtek Burakowski, Maciek Sosnowski. 1-6 [doi]
- Can observed entropy detect congestion in Ad-Hoc networks?XiaoJie Liu, Ulrich Speidel. 1-6 [doi]
- A QoE-driven optimization strategy for dynamic adaptive streaming over HTTPZiwei Wang, Xiuhua Jiang. 1-7 [doi]
- User behavior analysis based on user interest by web log miningXipei Luo, Jing Wang, Qiwei Shen, Jingyu Wang, Qi Qi. 1-5 [doi]
- Flow-based load balancing of web traffic using OpenFlowAnees Al-Najjar, Samuel Teed, Jadwiga Indulska, Marius Portmann. 1-6 [doi]
- Topic modeling for situation understanding in telecommunication networksH. Joe Steinhauer, Tove Helldin, Alexander Karlsson, Gunnar Mathiason. 1-6 [doi]
- A crowd sourced framework for neighbour assisted medical emergency systemAkbar Hossain, Farhaan Mirza, M. Asif Naeem, Jairo A. Gutiérrez. 1-6 [doi]
- Tactical line-of-sight MIMO communication system for contested networksAsanka Kekirigoda, Kin-Ping Hui. 1-6 [doi]
- Recurrence behaviour of BGP trafficBahaa Al-Musawi, Philip Branch, Grenville Armitage. 1-7 [doi]
- Fast and efficient physical layer authentication for 5G HetNet handoverTing Ma, Feng Hu, Maode Ma. 1-3 [doi]
- A credit-aware clustering scheme for the proximate sharing of geo data downloadingChung-Ming Huang, Duy-Tuan Dao, Ping-Yi Lu. 1-6 [doi]
- Use of coordinated multipoint transmission /reception for enhanced backhauling in nomadic relayKhalid Hasan, Nazmus S. Nafi, Khandakar Ahmed, Mark A. Gregory, Edward Mutafungwa. 1-6 [doi]
- Demand management using utility based real time pricing for smart grid with a new cost functionKhandakar Tanvir Ahmed, Md. Nabid Hasan, Md. Farhad Hossain, Kumudu S. Munasinghe, Abbas Jamalipour. 1-6 [doi]
- Increased block size and Bitcoin blockchain dynamicsJohannes Göbel, Anthony E. Krzesinski. 1-6 [doi]
- Towards optimal sensitivity-based anonymization for big dataMohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan. 1-6 [doi]
- A deep learning approach to fingerprinting indoor localization solutionsLinchen Xiao, Arash Behboodi, Rudolf Mathar. 1-7 [doi]
- Experimental evaluation of the impact of DoS attacks in SDNTalal Alharbi, Siamak Layeghy, Marius Portmann. 1-6 [doi]
- Analysis of a semi blind pilot decontamination method in massive MIMONusrat Fatema, Yong Xiang, Iynkaran Natgunanathan. 1-6 [doi]
- Hardware accelerator for coordinated radioresource scheduling in 5G ultra-high-density distributed antenna systemsYuki Arikawa, Takeshi Sakamoto, Shunji Kimura. 1-6 [doi]
- Adaptive data transfer methods via policy evolution for UAV swarmsPhillip Smith, Robert Hunjed, Aldeida Aleti, Jan Carlo Barca. 1-8 [doi]
- Design and field test of an autonomous IoT WSN platform for environmental monitoringFan Wu 0004, Christoph Rüdiger, Mehmet Rasit Yuce. 1-6 [doi]
- On the symbol error probability for QPSK with quantized observationsSamiru Gayan, Rajitha Senanayake, Jamie S. Evans. 1-6 [doi]
- Proposal of optical wireless turbo coded APPM systemRan Sun, Hiromasa Habuchi, Yusuke Kozawa. 1-5 [doi]
- Dynamic attack detection and mitigation in IoT using SDNSuman Sankar Bhunia, Mohan Gurusamy. 1-6 [doi]
- A new ensemble classifier for multivariate medical dataMd. Rajib Hasan, Hamid Gholamhosseini, Nurul I. Sarkar. 1-6 [doi]
- High-level concepts for northbound APIs: An interview studyAndrew Curtis-Black, Matthias Galster, Andreas Willig. 1-8 [doi]
- A sustainable vehicular based energy efficient data dissemination approachSalman Naseer, William Liu, Nurul I. Sarkar, Peter Han Joo Chong, Edmund Lai, Rangarao Venkatesha Prasad. 1-8 [doi]
- Green topological potential-based optimization for power and spectral efficiency tradeoff in LTE HetNetsTakoua Ghariani, Badii Jouaber. 1-6 [doi]
- Connecting the unconnected 10% of New Zealanders by 2025: Is a MahiTahi approach possible?Maria Villapol, William Liu, Jairo A. Gutiérrez, Luca Chiaraviglio, Arjuna Sathiaseelan, Jinsong Wu, Antoine Bagula, Junaid Qadir, Jian Song, Wenjun Zhang, Mark A. Gregory, Ji Wu. 1-7 [doi]
- Dynamic attack mitigation using SDNSharon Ezekiel, Dinil Mon Divakaran, Mohan Gurusamy. 1-6 [doi]
- Beyond line-of-sight range extension in contested environments with OPAL using autonomous unmanned aerial vehiclesKin-Ping Hui, Damien Phillips, Asanka Kekirigoda. 1-5 [doi]
- Experimental evaluation of mutual interference in co-located IEEE 802.15.4-based wireless body sensor networksAmirhossein Moravejosharieh, Kourosh Ahmadi. 1-6 [doi]
- A testbed implementation of a trust-aware RPL routing protocolDavid Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray. 1-6 [doi]
- Competition, regulation and institutional framework in telecommunications, implications for NGN in MexicoOscar Felipe Saenz de Miera Berglind. 1-6 [doi]
- Evaluating network intrusion detection systems for high-speed networksQinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee. 1-6 [doi]
- SCDMA capability of high-density code-shift keying using dual MPOMs in optical-wireless channelTakashi Tokunaga, Hiromasa Habuchi, Yusuke Kozawa, Ran Sun. 1-6 [doi]
- Maximizing communication opportunity for collaborative spectrum sensing in cognitive radio networksTomohiro Nishida, Masahiro Sasabe, Shoji Kasahara. 1-6 [doi]
- Antenna selection for massive MIMO Kronecker channel models using non-central principal component analysisM. T. A. Rana, Rein Vesilo, Ahsan Saadat. 1-7 [doi]
- Extrapolation of customer demand, and implications for broadband access network designBob Warfield. 1-5 [doi]
- LED-WSN: Light weight edge computed dynamic wireless sensor network routing protocolCraig Walker, Adnan Al-Anbuky. 1-8 [doi]
- MPTCP energy enhancement paradox: A Q-learning approachMohammad Javad Shamani, Saeid Rezaei, Guillaume Jourjon, Aruna Seneviratne. 1-4 [doi]
- A disaster recovery system for location identification-based low power wide area networks (LPWAN)James Jin Kang, Iryna Khodasevych, Sasan Adibi. 1-6 [doi]
- A game-theoretic approach to network slicingXu Yang, Yue Liu, Ka Seng Chou, Laurie G. Cuthbert. 1-4 [doi]
- Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networksKaixing Huang, Chunjie Zhou, Yu-Chu Tian, Weixun Tu, Yuan Peng. 1-6 [doi]
- Fake VIP attacks and their mitigation via double-blind reputationJerzy Konorski. 1-8 [doi]
- Optimal pricing strategy for 5G in rural areas with unmanned aerial vehicles and large cellsLuca Chiaraviglio, William Liu, Jairo A. Gutiérrez, Nicola Blefari-Melazzi. 1-7 [doi]
- Priority based resource allocation for LTE-A femtocell networksAbdullah Omar Arafat, Nazmus S. Nafi, Mark A. Gregory. 1-6 [doi]
- An analysis of personal wireless network security in Tonga: A study of Nuku'alofaPaula Raymond Lutui, Osai Tete'imoana, George Maeakafa. 1-4 [doi]
- Toward a programmable software-defined IoT architecture for sensor service provision on demandThi Minh Chau Nguyen, Doan B. Hoang, Thanh Dat Dang. 1-6 [doi]
- PA VIF: A passive aggressive visual information fidelity for full reference image quality assessmentXiaoyu Ma, Xiuhua Jiang. 1-6 [doi]
- Optimisation of relay-assisted wireless systems in quasi-static environments using ray tracingAsh Bellett, Gayathri Kongara. 1-6 [doi]
- Keynote topic: Network cloudification: SDN-NFV and 5G-MEC with edge and fog computingYing-Dar Lin. 1-8 [doi]
- Secure low energy AODV protocol for wireless sensor networksEwa Niewiadomska-Szynkiewicz, Filip Nabrdalik. 1-6 [doi]
- A smart city cyber security platform for narrowband networksAsmaa Elsaeidy, Ibrahim Elgendi, Kumudu S. Munasinghe, Dharmendra Sharma, Abbas Jamalipour. 1-6 [doi]
- A pathway to solving the Wi-Fi tragedy of the commons in apartment blocksFrank den Hartog, Alessandro Raschellà, Faycal Bouhafs, Pia Kempker, Bert Boltjes, Mir Seyedebrahimi. 1-6 [doi]
- Adaptive error control code implementation framework for software defined wireless sensor network (SDWSN)Rajan Kadel, Khandakar Ahmed, Anuj Nepal. 1-6 [doi]
- Inverse pulse position modulation schemes for simultaneous visible light wireless information and power transferRyota Kimoto, Yusuke Kozawa, Yohtaro Umeda, Hiromasa Habuchi. 1-6 [doi]
- Effect of the number of participating nodes on recovery of WSN coverage holesAli Rafiei, Mehran Abolhasan, Daniel Robert Franklin, Farzad Safaei, Stephen Smith, Wei Ni. 1-8 [doi]
- NTaaS: Network trustworthiness as a serviceMing Xiang, William Liu, Quan Bai, Adnan Al-Anbuky, Jinsong Wu, Arjuna Sathiaseelan. 1-6 [doi]
- Sustainable massive data dissemination by using software defined connectivity approachRashmi Munjal, William Liu, Xue Jun Li, Jairo A. Gutiérrez, Marija Furdek. 1-6 [doi]
- Practical service allocation in mobile edge computing systemsSung-Yeon Kim, Xavier De Foy, Alex Reznik. 1-6 [doi]
- On energy and data delivery in wireless local area networks with RF charging nodesKwan-Wu Chin. 1-7 [doi]
- On the study of interference mitigation and QoS protocol for wireless body area networks using real-time schedulingDa-Ren Chen, Ping Feng Wang, Wei-Min Chiu. 1-6 [doi]
- Proposal and development of TCP multi-pathization method with SDN by IoT devicesKaori Iwata, Yoshihiro Ito. 1-6 [doi]
- IEEE 802.11 HCCA for tactile applicationsYe Feng, Chamil Jayasundara, Ampalavanapillai Nirmalathas, Elaine Wong 0001. 1-3 [doi]
- Optimal-coherent and adaptive software defined inference of network traffics (OCcASION)Mehdi Malboubi. 1-7 [doi]