Abstract is missing.
- Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic SystemAli El Masri, Ahmad Sardouk, Lyes Khoukhi, Leïla Merghem-Boulahia, Dominique Gaïti. 1-5 [doi]
- Handoff Algorithms for Industrial Mobile Wireless Sensor NetworksZinon Zinonos, Vasos Vassiliou. 1-6 [doi]
- IRTIV: Intelligent Routing Protocol Using Real Time Traffic Information in Urban Vehicular EnvironmentOmar Sami Oubbati, Nasreddine Lagraa, Abderrahmane Lakas, Mohamed Bachir Yagoubi. 1-4 [doi]
- Multipath Routing for High-Data Rate Applications in ZigBee Wireless Sensor NetworksBidai Zahia, Maimour Moufida. 1-5 [doi]
- Robust DOA Estimation Using a 2D Novel Smart Antenna ArrayAli Hakam, Raed Shubair, Ehab Salahat, Ammar Saadi. 1-4 [doi]
- A Layer 2 Wired-Wireless Interworking Model to Achieve Throughput ImprovementSoma Pandey, Vijay Pande, Govind R. Kadambi, Yuri Vershinin. 1-4 [doi]
- Communication Architecture for a P2P-Enhanced Virtual Environment Client in a Web BrowserTimo Koskela, Jarkko Vatjus-Anttila, Toni Dahl. 1-5 [doi]
- Virtual Traffic Signals by Cooperation among Vehicle-Mounted Mobile ComputersHiroaki Higaki. 1-6 [doi]
- Node Spatial Correlation Aware Routing Metrics for User-Centric EnvironmentsNamusale Chama, Rute C. Sofia, Susana Sargento. 1-5 [doi]
- Design and Implementation of a Sustainable Wireless BAN Platform for Remote Monitoring of Workers Health Care in Harsh EnvironmentsKarel Heurtefeux, Elyes Ben Hamida, Hamid Menouar. 1-5 [doi]
- IR-UWB Radio Architecture for Wireless Sensors Network Based on Pilot Signal Assisted MACKamran Ayub. 1-5 [doi]
- Privacy-Preserving Medical Reports Publishing for Cluster AnalysisAli Hmood, Benjamin C. M. Fung, Farkhund Iqbal. 1-8 [doi]
- Privacy-Preserving Digital Rights Management based on Attribute-based EncryptionRonald Petrlic, Christoph Sorge. 1-5 [doi]
- The Impact of Redundancy on DSRC Safety Application Reliability under Different Data RatesAhmed Serageldin, Axel W. Krings. 1-5 [doi]
- Inferring Malware Family through Application Protocol Sequences SignatureAmine Boukhtouta, Nour-Eddine Lakhdari, Mourad Debbabi. 1-5 [doi]
- Hardware Design of Anembedded Real-Time Acoustic Source Location DetectorCagin Turkoglu, Serhat Cagdas, Anil Çelebi, Sarp Ertürk. 1-4 [doi]
- Selective Network Coding for Reliable Wireless BroadcastMohammed D. Halloush. 1-5 [doi]
- A Secure Client Side Deduplication Scheme in Cloud Storage EnvironmentsNesrine Kaaniche, Maryline Laurent. 1-7 [doi]
- HRTC: A Hybrid Algorithm for Efficient Congestion Control in Wireless Sensor NetworksCharalambos Sergiou, Vasos Vassiliou. 1-5 [doi]
- On the Management of Cloud Non-Functional Properties: The Cloud Transparency ToolkitClaudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Quang Hieu Vu. 1-4 [doi]
- Fingerprinting Internet DNS Amplification DDoS ActivitiesClaude Fachkha, Elias Bou-Harb, Mourad Debbabi. 1-5 [doi]
- A Comparison of Forensic Acquisition Techniques for Android Devices: A Case Study Investigation of Orweb Browsing SessionsNedaa Al Barghouthy, Andrew Marrington. 1-4 [doi]
- Specification and Enforcement of Dynamic Authorization Policies Oriented by SituationsBashar Kabbani, Romain Laborde, François Barrère, Abdelmalek Benzekri. 1-6 [doi]
- End to End Mechanism to Protect Sip from Signaling AttacksKhaled Dassouki, Haïdar Safa, Abbas Hijazi. 1-5 [doi]
- Cloudifying the 3GPP IP Multimedia Subsystem: Why and How?Roch H. Glitho. 1-5 [doi]
- Transmission Delay Minimization for Energy Constrained Communication in Wireless Body Area Sensor NetworksAlaa Awad, Medhat Hamdy, Amr Mohamed. 1-5 [doi]
- A New Simulation Model Based on EESM for VANETSJianwei Zhang, Chaoxian Zhang, Weikai Xu, Lin Wang. 1-5 [doi]
- Fall Detection Systems for Elderly Care: A SurveyOmar Mohamed, Ho-Jin Choi, Youssef Iraqi. 1-4 [doi]
- New Pricing Policies for Federated CloudBassem El Zant, Maurice Gagnaire. 1-6 [doi]
- Implementing IPsec in Wireless Sensor NetworksPrabhakar Varadarajan, Garth V. Crosby. 1-5 [doi]
- Insider Threat: Enhancing BPM through Social MediaDimitris Gritzalis, Vasilis Stavrou, Miltiadis Kandias, George Stergiopoulos. 1-6 [doi]
- Efficient Home Energy Management SystemNabih Jaber. 1-4 [doi]
- Characterization of Covert Channels in DNSHamad Binsalleeh, A. Mert Kara, Amr M. Youssef, Mourad Debbabi. 1-5 [doi]
- Towards Scalability for Federated Identity Systems for Cloud-Based EnvironmentsAndre Pereira, João Sobral, Carla Westphall. 1-5 [doi]
- Opportunities and Challenges of Using UAVs for Dubai Smart CityFarhan Mohammed, Ahmed Idries, Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar. 1-4 [doi]
- Checkpoint-based Fault-tolerance for LEACH ProtocolMohamed Lehsaini, Hervé Guyennet. 1-4 [doi]
- Power-Aware ON/OFF Switching Strategies of ENodeB for Green LTE NetworksTallal Elshabrawy, Ramy Mourad. 1-4 [doi]
- Secure and Scalable Aggregation in the Smart GridTassos Dimitriou. 1-5 [doi]
- Group-Based Characterization for the I2P Anonymous File-Sharing EnvironmentJuan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor. 1-5 [doi]
- VANET Inherent Capacity for Offloading Wireless Cellular Infrastructure: An Analytical StudyGhayet El Mouna Zhioua, Houda Labiod, Nabil Tabbane, Sami Tabbane. 1-5 [doi]
- An Approach for the Validation of File Recovery Functions in Digital Forensics' Software ToolsSultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, Omar Alfandi. 1-6 [doi]
- A New Business Model and Architecture for Context-Aware Applications Provisioning in the CloudNadjia Kara, May El Barachi, Abderrahmane El Bardai, Omar Alfandi. 1-5 [doi]
- Mechanism of Reducing Signaling Processing Load in EPC/IMS Using Service-Specific Network VirtualizationManabu Ito, Kiyohide Nakauchi, Yozo Shoji, Yoshinori Kitatsuji. 1-5 [doi]
- A Reasoning System for Composition Verification and Security ValidationGeorge Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Nikos Papadakis. 1-4 [doi]
- Compliance of the Facebook Data Use Policy with the Principles of ISO 29100: 2011Alexandra Michota, Sokratis K. Katsikas. 1-5 [doi]
- Lightweight Balanced Power Saving MAC Protocol for Wireless Sensor NetworksHanen Idoudi. 1-5 [doi]
- Trusted Platform Module for Smart CardsRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 1-5 [doi]
- Distributed Semantic Discovery for Web-of-Things Enabled Smart BuildingsGérôme Bovet, Jean Hennebert. 1-5 [doi]
- WiMesh: A Tool for the Performance Evaluation of Multi-Radio Wireless Mesh NetworksStefano Avallone, Giovanni Di Stasi. 1-5 [doi]
- Measurement Based Call Admission Control (CAC) to Improve QoS for IEEE 802.11E WLANArshad Hussain, Najeeb ul Hassan, Farah Nadeem. 1-4 [doi]
- An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality ReductionAntti Juvonen, Timo Hämäläinen 0002. 1-5 [doi]
- Study of Connectivity in a Vehicular Ad Hoc Network with Random Node Speed DistributionSepehr Keykhaie, Arman Mahmoudifar. 1-4 [doi]
- A Cross-layer Based Packet Scheduling Scheme for Multimedia Traffic in Satellite LTE NetworksGbolahan Aiyetoro, Fambirai Takawira. 1-6 [doi]
- On the Tradeoff between Performance and User Privacy in Information Centric NetworkingGiulia Mauri, Giacomo Verticale. 1-5 [doi]
- Partial Constrained Group Decoding: A New Interference Mitigation Technique for the Next Generation NetworksOmar Abu-Ella, Mohammed Elmusrati. 1-5 [doi]
- On Performance of SISO Nanonetworks-based Molecular CommunicationsSaied M. Abd El-atty, Z. M. Gharsseldien, Konstantinos Lizos. 1-5 [doi]
- Towards a Data Semantics Management System for Internet TrafficBassem Mokhtar, Mohamed Eltoweissy. 1-5 [doi]
- Analyzing Metropolitan-Area Networking within Public Transportation Systems for Smart City ApplicationsTorsten Zimmermann, Hanno Wirtz, Oscar Puñal, Klaus Wehrle. 1-5 [doi]
- Transmission Power Control Based on Packet Reception RateMaciej Nikodem, Mariusz Slabicki, Tomasz Surmacz, Bartosz Wojciechowski. 1-4 [doi]
- Cooperation Metric for IEEE 802.11 Wireless NetworksRasool Sadeghi, João Paulo Barraca, Rui L. Aguiar. 1-5 [doi]
- Utilizing M2M Technologies for Building Reliable Smart CitiesAndreea Corici, Asma Elmangoush, Ronald Steinke, Thomas Magedanz, Joyce B. Mwangama, Neco Ventura. 1-5 [doi]
- Multidimensional Diversity Employment for Software Behavior EncryptionMohamed Azab. 1-5 [doi]
- TAR Channel Access Mechanism: A Study of a Highway Ramp Car Merge CaseInes Khoufi, Anis Laouiti, Bachar Wehbi. 1-5 [doi]
- A Distributed Joint Channel and Slot Assignment for Convergecast in Wireless Sensor NetworksRidha Soua, Pascale Minet, Erwan Livolant. 1-5 [doi]
- Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast ProtocolsBjörn Lichtblau, Andreas Dittrich. 1-6 [doi]
- A MAC Scheme-Based Cooperative Codes for Vehicular Connectivity in AHVNSaied M. Abd El-atty, Konstantinos Lizos. 1-5 [doi]
- A Self-disclosure Framework for Social Mobile ApplicationsAmr Ali Eldin, Jan van den Berg. 1-5 [doi]
- Impulsive Noise Mitigation in a MIMO-OFDM Communication SystemAli Hakam, Noha Abou Aly, Shihab Jimaa. 1-5 [doi]
- Aerial Mast vs Aerial Bridge Autonomous UAV Relay: A Simulation-Based ComparisonChahine Ben Moussa, François Gagnon, Ouassima Akhrif, Samuel Gagne. 1-5 [doi]
- A Factorial Space for a System-Based Detection of Botcloud ActivityBadis Hammi, Rida Khatoun, Guillaume Doyen. 1-5 [doi]