Abstract is missing.
- An Enhanced Quality of Context Evaluating Approach in the e-Health Sensor PlatformDébora Cabral Nazário, Adroaldo de Andrade, Lucas Borges, Willian Romeu Ramos, José Leomar Todesco, Mario Antonio Ribeiro Dantas. 1-7 [doi]
- Recommendations for IPsec Configuration on Homenet and M2M DevicesDaniel Migault, Daniel Palomares, Tobias Guggemos, Aurélien Wally, Maryline Laurent, Jean-Philippe Wary. 9-17 [doi]
- Autonomic Management of Replica Voting based Data Collection Systems in Malicious EnvironmentsKaliappa Ravindran, Arun Adiththan, Mohammad Rabby, Jinu Jose. 19-28 [doi]
- Spraying Techniques for Securing Key Exchange in Large Ad-hoc NetworksAriel Stulman, Alan Stulman. 29-34 [doi]
- On the Impact of Cross-Layer Information Leakage on Anonymity in CrowdsAndriy Panchenko. 35-42 [doi]
- A Proxy Gateway Solution to Provide QoS in Tactical Networks and Disaster Recovery ScenariosAlessandro Morelli, Cesare Stefanelli, Mauro Tortonesi, Rita Lenzi, Niranjan Suri. 43-50 [doi]
- A Managing QoE Approach for Provisioning User Experience Aware Services Using SDNMadalena P. da Silva, Mario A. R. Dantas, Alexandre L. Gonçalves, Alex R. Pinto. 51-58 [doi]
- Evaluation of Quality Service Voice over Internet Protocol in WiMAX Networks based on IP/MPLS EnvironmentRocio C. Garcia, Brayan S. Reyes Daza, Octavio J. Salcedo Parra. 59-66 [doi]
- Architectural Design of an Optimal Routed Network-based Mobility Management Function for SDN-based EPC NetworksWen-Kang Jia. 67-74 [doi]
- OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous NetworksMarkus Jung, Anton Hergenröder. 75-82 [doi]
- Can We Predict Future Link States in Wireless Smart Grid?Takuma Hamagami, Kentaro Yanagihara, Shinsuke Hara. 83-90 [doi]
- Sharing the Cost of Lunch: Energy Apportionment PoliciesEkhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund. 91-97 [doi]
- Inferring Smartphone Positions Based on Collecting the Environment's Response to Vibration Motor ActuationIrina Diaconita, Andreas Reinhardt, Delphine Christin, Christoph Rensing. 99-106 [doi]
- Location Assisted Coding (LAC): Embracing Interference in Free Space Optical CommunicationsThai Duong, Duong Nguyen-Huu, Thinh P. Nguyen. 107-114 [doi]
- Reliability Evaluation of Imperfect K-Terminal Stochastic Networks using Polygon-to Chain and Series-parallel ReductionsMohamed Larbi Rebaiaia, Daoud Aït-Kadi. 115-122 [doi]
- Bounding Degrees on RPLFadwa Boubekeur, Lélia Blin, Rémy Léone, Paolo Medagliani. 123-130 [doi]
- Performance Evaluation of the VB-TDMA Protocol for Long-term Tracking and Monitoring of Mobile Entities in the OutdoorsIon Emilian Radoi, Janek Mann, D. K. Arvind. 131-138 [doi]
- An Open Source Platform for Perceived Video Quality EvaluationLamine Amour, Sami Souihi, Said Hoceini, Abdelhamid Mellouk. 139-140 [doi]
- Noah: Keyed Noise Flooding for Wireless ConfidentialitySang-Yoon Chang, Jemin Lee, Yih-Chun Hu. 141-148 [doi]
- Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained NetworksZeinab Fawaz, Ahmed Mostefaoui, Hassan Noura. 149-156 [doi]
- Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri NetLishi Chen, Chun-Yan Liu, Hejiao Huang. 157-164 [doi]
- E-BIAS: A Pervasive EEG-Based Identification and Authentication SystemJavad Sohankar, Koosha Sadeghi, Ayan Banerjee, Sandeep K. S. Gupta. 165-172 [doi]
- QoS Management for WiFi MAC Layer Processing in the Cloud: Demo DescriptionJonathan Vestin, Andreas Kassler. 173-174 [doi]