Abstract is missing.
- Resource allocation in cooperative networks: The role of gamesGuoliang Xue. [doi]
- Botnets - Detection, classification and countermeasuresPeter Martini. [doi]
- Enabling flexible packet filtering through the K-map priority elimination techniqueNizar Ben Neji, Adel Bouhoula, Masato Kimura. 1-8 [doi]
- PFS: Probabilistic filter scheduling against distributed denial-of-service attacksDongwon Seo, Heejo Lee, Adrian Perrig. 9-17 [doi]
- Using roadmap profiling to enhance the warning message dissemination in vehicular environmentsManuel Fogue, Piedad Garrido, Francisco J. Martinez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. 18-20 [doi]
- User- and application-centric multihomed flow managementOlivier Mehani, Roksana Boreli, Michael Malier, Thierry Ernst. 26-34 [doi]
- User-centric quality of service provisioningM. E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds. 35-41 [doi]
- How to provision and manage off-the-shelf SIP phones in domestic and SOHO environmentsTiago Cruz, Paulo Simões, João Almeida, João Rodrigues, Edmundo Monteiro, Fernando Bastos, Alexandre Laranjeira. 42-49 [doi]
- Rate equalization: A new approach to fairness in deterministic quality of serviceJorge Arturo Cobb. 50-57 [doi]
- MapCorrect: Automatic correction and validation of road maps using public sensingPatrick Baier, Harald Weinschrott, Frank Dürr, Kurt Rothermel. 58-66 [doi]
- Hiding on the road - Anonymous usage of Location Based ServicesAlan Walsh, Tom Pfeifer. 67-75 [doi]
- On the empirical performance of self-calibrating WiFi location systemsDaniel Turner, Stefan Savage, Alex C. Snoeren. 76-84 [doi]
- A traffic density model for radio overlapping in urban Vehicular Ad hoc NetworksSaeed Bastani, Björn Landfeldt, Lavy Libman. 85-92 [doi]
- High definition video in IEEE 802.15.3c mm-Wave wireless personal area networksSandra Scott-Hayward, Emiliano Garcia-Palacios. 93-100 [doi]
- Performance evaluation of the inter-domain communication in a switched Ethernet based in-car networkHyung Taek Lim, Benjamin Krebs, Lars Völker, Peter Zahrer. 101-108 [doi]
- Service differentiation without prioritization in IEEE 802.11 WLANsSuong H. Nguyen, Lachlan L. H. Andrew, Hai Le Vu. 109-116 [doi]
- Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networksMohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan. 117-122 [doi]
- A power control mechanism for non-cooperative packet forwarding in ad hoc networksYi Sun, Shan Lu, Yuming Ge, Zhongcheng Li, Eryk Dutkiewicz. 123-126 [doi]
- A power-aware framework for distributed data fusion application in wireless sensor networksZongqing Lu, Su-Lim Tan, Jit Biswas. 127-130 [doi]
- Hybrid web server: Traffic analysis and prototypeMatthew Olson, Ken Christensen, SangHak Lee, Jungmee Yun. 131-134 [doi]
- Improving the stability of eXplicit Control Protocol under heterogeneous delaysHairui Zhou, Chengchen Hu, Jian Li, Lina He, Fei Hu. 135-138 [doi]
- Entropy based SYN flooding detectionLaleh Arshadi, Amir-Hossein Jahangir. 139-142 [doi]
- About prefix hijacking in the InternetUli Bornhauser, Peter Martini. 143-146 [doi]
- NAT hole punching revisitedDaniel Maier, Oliver Haase, Jürgen Wäsch, Marcel Waldvogel. 147-150 [doi]
- dVirt: A virtualized infrastructure for experimenting BGP routingIuniana Oprescu, Mickael Meulle, Philippe Owezarski. 151-154 [doi]
- Kernel-based Markov random fields learning for wireless sensor networksWei Zhao, Yao Liang. 155-158 [doi]
- SACM: Stateful Access Control ModelAndre L. M. dos Santos, Vincent Scarlata, Anderson C. Lima, Inacio C. Alves, Davi di C. Sampaio. 159-162 [doi]
- Frame rate control for video streamingEvan Tan, Chun Tung Chou. 163-166 [doi]
- A simple priority control mechanism for performance improvement of Mobile Ad-hoc NetworksDaiki Nobayashi, Yutaka Fukuda, Takeshi Ikenaga. 167-170 [doi]
- Analysis of quantization effects on performance of hierarchical cooperation schemes in Ad-hoc wireless networksSeyed Pooya Shariatpanahi, Babak Hossein Khalaj. 171-174 [doi]
- Extending node protection concept of p-cycles for an efficient resource utilization in multicast trafficAhmed Frikha, Bernard Cousin, Samer Lahoud. 175-178 [doi]
- Performance modelling of broadcast polling protocol in unsaturated IEEE 802.16 networksJianqing Liu, Sammy Chan, Hai Le Vu. 179-182 [doi]
- Intrusion detection system using Optimum-Path ForestClayton R. Pereira, Rodrigo Nakamura, João Paulo Papa, Kelton A. P. Costa. 183-186 [doi]
- Probability of handoff for users moving with the Random Waypoint mobility modelEnrica Zola, Francisco Barceló-Arroyo. 187-190 [doi]
- Exploring security improvement of wireless networks with directional antennasHongning Dai, Dong Li, Raymond Chi-Wing Wong. 191-194 [doi]
- G-NetMon: A GPU-accelerated network performance monitoring system for large scale scientific collaborationsWenji Wu, Phil DeMar, Donald J. Holmgren, Amitoj Singh, Ruth Pordes. 195-198 [doi]
- Link scheduling in multi-transmit-receive wireless networksHong-Ning Dai, Soung Chang Liew, Liqun Fu. 199-202 [doi]
- Intelligent distributed multimedia collection: Content aggregation and integrationJelle Nelis, Dieter Verslype, Chris Develder. 203-206 [doi]
- Scoresheet-based event relevance determination for energy efficiency in wireless sensor networksSebastian Zöller, Andreas Reinhardt, Stefan Schulte 0002, Ralf Steinmetz. 207-210 [doi]
- RegionDCF: A self-adapting CSMA/round-robin media access protocol for WLANAlberto Riggi, Javier Gomez. 211-214 [doi]
- Evaluation and comparison of MBAC solutionsDoreid Ammar, Thomas Begin, Isabelle Guérin Lassous, Ludovic Noirie. 215-218 [doi]
- Enabling cognition in system of systems: The distributed self-growing architectureMarc Emmelmann, Bernd Bochow. 219-222 [doi]
- Optimal transmission range for multi-hop communication in wireless sensor and actor networksHyunbum Kim, Jorge Arturo Cobb. 223-226 [doi]
- Formal validation of the security properties of AMT's three-way handshakeAli Salem, J. William Atwood. 227-230 [doi]
- A conditional retransmission enabled transport protocol for real-time networked control systemsLi Gui, Yu-Chu Tian, Colin J. Fidge. 231-234 [doi]
- Tracking targets in quantized areas with wireless sensor networksEfren Lopes Souza, Andre Campos, Eduardo Freire Nakamura. 235-238 [doi]
- Enabling self-adaptive QoE/QoS controlSolange Rito Lima, Paulo Carvalho. 239-242 [doi]
- Collaborative data collection in global sensing systemsGreg Bigwoodt, Aline Carneiro Viana, Marcelo Dias de Amorim, Mathias Boc. 243-246 [doi]
- Effective utilization of place as a resource in pocket switched networksMohammad S. Hashemian, Kevin G. Stanley. 247-250 [doi]
- Boundary node selection algorithms in WSNsAli Rafiei, Mehran Abolhasan, Daniel R. Franklin, Farzad Safaei. 251-254 [doi]
- Server selection and admission control for IP-based video on demand using available bandwidth estimationBrian Meskill, Alan Davy, Brendan Jennings. 255-258 [doi]
- Performance comparison of BER-based routing protocols under realistic conditionsTiguiane Yélémou, Jonathan Ledy, Benoît Hilt, Anne-Marie Poussard, Philippe Meseure. 259-262 [doi]
- A coordination layer to handle real-time communication in Wi-Fi networks with uncontrolled traffic sourcesRobson Costa, Paulo Portugal, Francisco Vasques, Ricardo Moraes, Ricardo Felipe Custódio. 263-266 [doi]
- An experimental study of client-side spotify peering behaviourMartin Ellis, Stephen D. Strowes, Colin Perkins. 267-270 [doi]
- SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNsYi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Selo Sulistyo. 271-274 [doi]
- Providing quality of service over time delay networks by efficient queue managementHao Wang, Chenda Liao, Zuohua Tian. 275-278 [doi]
- A simulation study of application-layer traffic optimization protocol for P2P applicationsByungryeol Sim, Yeonhee Lee, Youngseok Lee. 279-282 [doi]
- Challenges and limits of flooding and gossip routing based route discovery schemesBastian Blywis, Mesut Günes, Felix Juraschek, Oliver Hahm. 283-286 [doi]
- Topology Stability-Aware Multicast Protocol for MANETsJosé Mocito, Oksana Denysyuk, Luís Rodrigues, Hugo Miranda. 287-290 [doi]
- Testing embedded software by metamorphic testing: A wireless metering system case studyFei-Ching Kuo, Tsong Yueh Chen, Wing K. Tam. 291-294 [doi]
- Quantitative analysis for authentication of low-cost RFID tagsIoannis K. Paparrizos, Stylianos Basagiannis, Sophia G. Petridou. 295-298 [doi]
- Interframe spacing adaptation method for IEEE 802.11 WLANs coexisting with IEEE 802.16 networksBoram Choi, Daewon Jung, Hyuk Lim. 299-302 [doi]
- Coverage extension based on incentive scheduler for mobile relaying nodes in wireless networksCédric Gueguen, Abderrezak Rachedi. 303-306 [doi]
- A performance study of network operator-friendly P2P traffic control techniqueHyunYong Lee, Akihiro Nakao. 307-314 [doi]
- LiveShift: Mesh-pull live and time-shifted P2P video streamingFabio Victora Hecht, Thomas Bocek, Richard G. Clegg, Raul Landa, David Hausheer, Burkhard Stiller. 315-323 [doi]
- Environmental context aware trust in mobile P2P networksUpendra Rathnayake, Vijay Sivaraman, Roksana Boreli. 324-332 [doi]
- Improving BitTorrent download times using community partnersMarc Espelt Palau, Pedro García López. 333-340 [doi]
- A performance study of peer-assisted file distribution with heterogeneous swarmsCristina Carbunaru, Yong Meng Teo, Ben Leong. 341-349 [doi]
- Network lifetime maximization in sensor networks with multiple mobile sinksWeifa Liang, Jun Luo. 350-357 [doi]
- Reliable sensor-to-sink data transfer with duty cycles for Wireless Sensor NetworksSirisha Medidi, Vamsi Nandanavanam, Muralidhar Medidi. 358-365 [doi]
- Probabilistic data collection protocols for energy harvesting sensor networksMasaya Yoshida, Tomoya Kitani, Masaki Bandai, Takashi Watanabe, Pai H. Chou, Winston Khoon Guan Seah. 366-373 [doi]
- Energy-efficient retransmission strategies under variable TDMA scheduling in body area networksYuriy Tselishchev, Lavy Libman, Athanassios Boulis. 374-381 [doi]
- SDF - Solar-aware distributed flow in wireless sensor networksImmanuel Schweizer, Nils Fleischhacker, Max Mühlhäuser, Thorsten Strufe. 382-390 [doi]
- Global Vs. Per-domain monitoring of multi-domain networksEmna Salhi, Samer Lahoud, Bernard Cousin. 391-398 [doi]
- Practical machine learning based multimedia traffic classification for distributed QoS managementSebastian Zander, Grenville J. Armitage. 399-406 [doi]
- Extracting baseline patterns in Internet traffic using Robust Principal ComponentsVidarshana W. Bandara, Anura P. Jayasumana. 407-415 [doi]
- S3: Smart selection of sampling function for passive network measurementXingyu Ma, Chengchen Hu, Junchen Jiang, Jing Wang. 416-423 [doi]
- Security and privacy for WLAN roaming with per-connection tariff negotiationJohannes Barnickel, Ulrike Meyer. 424-431 [doi]
- Tor is unfair - And what to do about itFlorian Tschorsch, Björn Scheuermann. 432-440 [doi]
- Flooding attacks detection in traffic of backbone networksOsman Salem, Ali Makke, Jean Tajer, Ahmed Mehaoua. 441-449 [doi]
- Comparison of Authenticated-Encryption schemes in Wireless Sensor NetworksMarcos A. Simplício Jr., Bruno Trevizan de Oliveira, Paulo S. L. M. Barreto, Cintia B. Margi, Tereza Cristina M. B. Carvalho, Mats Näslund. 450-457 [doi]
- Toward a high-fidelity wireless sensor network for rehabilitation supervisionAbdelkrim Hadjidj, Yacine Challal, Abdelmadjid Bouabdallah. 458-465 [doi]
- Efficient temporal compression in wireless sensor networksYao Liang. 466-474 [doi]
- STMP - Sensor data transmission and management protocolNils Aschenbruck, Christoph Fuchs. 475-483 [doi]
- Deployment and mobility for animal social life monitoring based on preferential attachmentMustafa Ilhan Akbas, Matthias R. Brust, Carlos H. C. Ribeiro, Damla Turgut. 484-491 [doi]
- G-local resource management: Achieving global optimization via local inference without message passingChen Liu, Janelle Harms, Mike H. MacGregor. 492-500 [doi]
- Exploiting the full potential of multi-AP diversity in centralized WLANs through back-pressure schedulingAnfu Zhou, Min Liu, Tong Shu, Yilin Song, Zhongcheng Li. 501-509 [doi]
- Design and analysis of effective price for congestion controlHao Wang, Bo Wang, Jiezhi Chen, Zuohua Tian. 510-518 [doi]
- Implementation of WFQ in a distributed open software routerAzeem J. Khan, Anirudha Sahoo, D. Manjunath. 519-527 [doi]
- dMME: Virtualizing LTE mobility managementXueli An, Fabio Pianese, Indra Widjaja, Utku Günay Acer. 528-536 [doi]
- Mercury-like routing for high mobility wireless ad hoc networksAi Hua Ho, Yao Hua Ho, Kien A. Hua. 537-545 [doi]
- Channel sensing order for cognitive radio networks using reinforcement learningAndre C. Mendes, Carlos Henrique Pereira Augusto, Marcel William Rocha da Silva, Raphael M. Guedes, José Ferreira de Rezende. 546-553 [doi]
- Performance of content replication in MobiTribe: A distributed architecture for mobile UGC sharingKanchana Thilakarathna, Henrik Petander, Aruna Seneviratne. 554-562 [doi]
- APAWSAN: Actor positioning for aerial wireless sensor and actor networksMustafa Ilhan Akbas, Damla Turgut. 563-570 [doi]
- Anchor selection and Topology Preserving Maps in WSNs - A Directional Virtual Coordinate based approachDulanjalie C. Dhanapala, Anura P. Jayasumana. 571-579 [doi]
- On area coverage reliability of wireless sensor networksMohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms, Hosam M. F. AboElFotoh. 580-588 [doi]
- AWARE: Activity AWARE network clustering for wireless sensor networksIñigo Urteaga, Na Yu, Nicholas Hubbell, Qi Han. 589-596 [doi]
- Optimal throughput for 802.11 DCF with multiple packet receptionMingrui Zou, Sammy Chan, Hai Le Vu, Chongbin Xu, Li Ping. 597-603 [doi]
- An evaluation of live adaptive HTTP segment streaming request strategiesTomas Kupka, Pål Halvorsen, Carsten Griwodz. 604-612 [doi]
- Smooth control of Adaptive Media Playout to acquire IDMS in cluster-based applicationsFernando Boronat, Mario Montagud, Vicente Vidal. 613-621 [doi]
- A Nash Stackelberg approach for network pricing, revenue maximization and vertical handover decision makingMariem Zekri, Makhlouf Hadji, Badii Jouaber, Djamal Zeghlache. 622-629 [doi]
- Performance comparison of NBI suppression methods for MIMO OSTBC-OFDM systemsGeorgi Iliev, Vladimir Poulkov, Miglen Ovtcharov. 630-633 [doi]
- Channel Characteristic Aware Spectrum Aggregation algorithm in Cognitive Radio networksJintao Lin, Lianfeng Shen, Nan Bao, Bailong Su, Zhipeng Deng, Dayang Wang. 634-639 [doi]
- Wi-Design: A modelling and optimization tool for wireless embedded systems in buildingsAlan McGibney, Antony Guinard, Dirk Pesch. 640-648 [doi]
- Design and deployment tool for in-building wireless sensor networks: A performance discussionAntony Guinard, Muhammad Sohaib Aslam, Davide Pusceddu, Susan Rea, Alan McGibney, Dirk Pesch. 649-656 [doi]
- Human society inspired routing for wireless sensor networkHamideh Sadat Cheraghchi, Abbas Nayebi. 657-665 [doi]
- A tree-based approach to design Heterogeneous Sensor Networks based on small world conceptsDaniel L. Guidoni, Azzedine Boukerche, Leandro A. Villas, Raquel A. F. Mini, Antonio Alfredo Ferreira Loureiro. 666-672 [doi]
- Scalability issues in localizing ThingsWalid M. Ibrahim, Abd-Elhamid M. Taha, Hossam S. Hassanein. 673-680 [doi]
- A novel teletraffic-based power saving scheme for cellular networks with microcellsZiaul Haq Abbas, Frank Yong Li. 681-687 [doi]
- Evaluation of protocol treatment in 3G networksPatrik Arlos, Ravichandra Kommalapati, Markus Fiedler. 688-696 [doi]
- Effective Web service discovery in mobile environmentsKhalid Elgazzar, Hossam S. Hassanein, Patrick Martin. 697-705 [doi]
- Evaluation of lifetime in wireless sensor networksLynda Mokdad. 706-710 [doi]
- Fault management for VoIP applications over wireless and wired NGN networks: An operational prospectiveLuca Monacelli, Roberto Francescangeli. 711-718 [doi]
- An empirical study on the interactions between ALTO-assisted P2P overlays and ISP networksChaojiong Wang, Ning Wang, Michael P. Howarth, George Pavlou. 719-726 [doi]
- Wireless technology agnostic real-time localization in urban areasMohamed Amine Abid, Soumaya Cherkaoui. 727-733 [doi]
- Providing mobile Internet service using MOnetary Wireless NETworking (MOWNET)Abbas Nayebi, Amin Dahesh, Hamid Sarbazi-Azad. 734-737 [doi]
- Learning mechanisms for achieving context awareness and intelligence in Cognitive Radio networksKok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal. 738-745 [doi]
- Implementation and performance analysis of advanced IT services based on open source JAIN SLEEMauro Femminella, Roberto Francescangeli, Emanuele Maccherani, Luca Monacelli. 746-753 [doi]
- Enhancing the security of mobile health monitoring systems through trust negotiationsMahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung. 754-757 [doi]
- Extracting the independence signature from packet pair dispersion data in a closed-loop system for end-to-end bandwidth probingMartin J. Tunnicliffe, Mehri Hosseinpour. 758-763 [doi]
- Collecting router information for error diagnosis and troubleshooting in home networksAndreas Müller 0003, Gerhard Miinz, Georg Carle. 764-769 [doi]
- Session mobility in multimedia services enabled by the cloud and peer-to-peer paradigmsDan Johansson. 770-776 [doi]
- Flock detection based duty cycle scheduling in mobile wireless sensor networksXiaoguang Zhang 0002, Zheng Da Wu. 777-784 [doi]
- Mobile VoIP user experience in LTEKarl Andersson, Seraj Al Mahmud Mostafa, Raihan Ui-Islam. 785-788 [doi]
- Proposal of ride-sharing system using harmonic aggregation of user demandsSatoko Itaya, Rie Tanaka, Naoki Yoshinaga 0002, Taku Konishi, Shinichi Doi, Keiji Yamada. 789-792 [doi]
- Sensor monitoring of bridge movement: A system architectureRobert Brännström, Daniel Granlund. 793-796 [doi]
- Data gathering in vehicular networks: The VESPA experienceThierry Delot, Sergio Ilarri. 797-804 [doi]
- Position verification for vehicular networks via analyzing two-hop neighbors informationMervat Abu-Elkheir, Sherin Abdel Hamid, Hossam S. Hassanein, Ibrahim M. El-Henawy, Samir Elmougy. 805-812 [doi]
- Providing accident detection in vehicular networks through OBD-II devices and Android-based smartphonesJorge Zaldivar, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 813-819 [doi]
- Evaluating the robustness of the DGT approach for smartphone-based vehicular networksMarco Picone, Michele Amoretti, Francesco Zanichelli. 820-826 [doi]
- Detecting faulty and malicious vehicles using rule-based communications data miningJihene Rezgui, Soumaya Cherkaoui. 827-834 [doi]
- The impact of the reliability on the fairness between the unicast and the multicast in highly loaded WLANsYousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed. 835-840 [doi]
- Raptor-based reliable unicast content delivery in wireless network environmentsMiguel Baguena, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 841-849 [doi]
- A light weight security scheme for HWMP protocol using Elliptic Curve techniqueJalel Ben-Othman, Yesica Imelda Saavedra Benitez. 850-854 [doi]
- SINR analysis of time and frequency offsets in OFDM systemsShahrouz Sharifi, Babak Hossein Khalaj. 855-859 [doi]
- Analyses of MAC performance for Multi-Carrier based wireless sensor networksFei Qin, John E. Mitchell. 860-866 [doi]
- Wireless sensor networks for social network data collectionErick Stattner, Martine Collard, Philippe Hunel, Nicolas Vidot. 867-874 [doi]
- Studying the feasibility of IEEE 802.15.4-Based WSNs for gas and fire tracking applications through simulationCarlos Lino, Carlos Miguel Tavares Calafate, Arnoldo Diaz-Ramirez, Pietro Manzoni, Juan-Carlos Cano. 875-881 [doi]
- An energy-aware spatial correlation mechanism to perform efficient data collection in WSNsLeandro A. Villas, Azzedine Boukerche, Daniel L. Guidoni, Regina Borges de Araujo, Antonio Alfredo Ferreira Loureiro. 882-889 [doi]
- A study of topology formation in 802.11s multiradio wireless mesh networksJean-Charles Grégoire, Claude Roy, Zbigniew Dziong. 890-896 [doi]
- Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advancedDaniel Seither, André König, Matthias Hollick. 897-904 [doi]
- Improving the link lifetime in VANETsMarwane Ayaida, Lissan Afilal, Hacène Fouchal, Haytem El Mehraz. 905-912 [doi]
- Adaptive congestion control of DSRC vehicle networks for collaborative road safety applicationsWenyang Guan, Jianhua He, Lin Bai, Zuoyin Tang. 913-917 [doi]
- Shibboleth based Authentication, Authorization, Accounting and Auditing in Wireless Mesh NetworksEryk Schiller, Alexey Monakhov, Peter Kropf. 918-926 [doi]
- A study on path behavior characteristics of IPv6 based reflector attacksS. P. Meenakshi, S. V. Raghavan, S. M. Bhaskar. 927-933 [doi]
- Improving the network performance and management of operability regionsSeyed A. Shahrestani. 934-938 [doi]
- Z-Monitor: Monitoring and analyzing IEEE 802.15.4-based Wireless Sensor NetworksAnis Koubaa, Shafique Chaudhry, Olfa Gaddour, Rihab Chaari, Nada Al-Elaiwi, Hanan Al-Soli, Hichem Boujelben. 939-947 [doi]
- Planet YouTube: Global, measurement-based performance analysis of viewer;'s experience watching user generated videosDilip Kumar Krishnappa, Samamon Khemmarat, Michael Zink. 948-956 [doi]
- Comparative performance analysis of the PermaDozer protocol in diverse deploymentsMatthias Keller, Matthias Woehrle, Roman Lim, Jan Beutel, Lothar Thiele. 957-965 [doi]
- Wireless Sensor Network Platforms - Datasheets versus measurementsPeter Trenkamp, Markus Becker, Carmelita Görg. 966-973 [doi]
- Design methods for Wireless Sensor Network Building Energy Monitoring SystemsInkeun Cho, Chung-Ching Shen, Siddharth Potbhare, Shuvra S. Bhattacharyya, Neil Goldsman. 974-981 [doi]
- Measuring the state-of-charge - Analysis and impact on wireless sensor networksLeander B. Hörmann, Philipp M. Glatz, Christian Steger, Reinhold Weiss. 982-985 [doi]
- Implementation of a data collection mechanism in electronic triage system using wireless sensor devicesAnuj Ratna Bajracharya, Akira Uchiyama, Akihito Hiromori, Hirozumi Yamaguchi, Teruo Higashino. 986-989 [doi]
- Optical wireless sensor network design for a conducting chamberAbhishek Borkar, Prabhat Ranjan. 990-993 [doi]
- Resilient data aggregation for unattended WSNsJens-Matthias Bohli, Panos Papadimitratos, Donato Verardi, Dirk Westhoff. 994-1002 [doi]
- Design and evaluation of an adaptive sampling strategy for a wireless air pollution sensor networkManik Gupta, Lamling Venus Shum, Eliane L. Bodanese, Stephen Hailes. 1003-1010 [doi]
- Optimized data-available storage for energy-limited wireless sensor networksJens Kamenik, Oliver E. Theel. 1011-1019 [doi]
- A-stack: A real-time protocol stack for IEEE 802.15.4 radiosEmre I. Cosar, Aamir Mahmood, Mikael Björkbom. 1020-1023 [doi]
- iHorse - A WSN-based equine monitoring systemAndré Rodrigues, Jorge Sá Silva, Fernando Boavida, Tiago Camilo. 1024-1031 [doi]
- SmartMeter.KOM: A low-cost wireless sensor for distributed power meteringAndreas Reinhardt, Dominic Burkhardt, Parag S. Mogre, Manzil Zaheer, Ralf Steinmetz. 1032-1039 [doi]
- A wireless sensor network test-bed for structural health monitoring of bridgesAthanassios Boulis, Rodney Berriman, Saeed Attar, Yuriy Tselishchev. 1040-1043 [doi]
- Using sensor technology to protect an endangered species: A case studyAndré Sieber, Reinhardt Karnapke, Jörg Nolte, Thomas Martschei. 1044-1047 [doi]
- DuDE: A distributed computing system using a decentralized P2P environmentJan Skodzik, Peter Danielis, Vlado Altmann, Jens Rohrbeck, Dirk Timmermann, Thomas Bahls, Daniel Duchow. 1048-1055 [doi]
- Subversion over OpenNetInf and CCNxBengt Ahlgren, Börje Ohlman, Erik Axelsson, Lars Brown. 1056-1063 [doi]
- Energy-aware service executionWaltenegus Dargie, Anja Strunk, Alexander Schill. 1064-1071 [doi]