Abstract is missing.
- QoS-enabled IPv6 emulation environment based on the Open IMS CoreTomislav Grgic, Niko Boskovic, Maja Matijasevic. 1-5 [doi]
- MHP application for a Self Evaluation ServiceElisa Benetti, Gianluca Mazzini. 1-5 [doi]
- Capacity maximizing cell-selection in heterogeneous cellular networksJeong-Soo Park, Gil-Su Heo, Yong-Hwan Lee. 1-5 [doi]
- Event-based location detectionJohannes Westhuis, Jürgen Dunkel, Ralf Bruns. 1-5 [doi]
- A multi-variate classification approach for the detection of illicit trafficEduardo Rocha, Paulo Salvador, António Nogueira. 1-6 [doi]
- 0.469 PDFSA protocol for RFID arbitrationLuca Barletta, Flaminio Borgonovo, Matteo Cesana. 1-5 [doi]
- Mutual interference evaluation in cognitive radio networks with log-normal shadowingAlice Masini, Gianluca Mazzini, Guido Riva. 1-5 [doi]
- Energy-aware flow allocation algorithm for Energy Efficient Ethernet networksIsaac Seoane, José Alberto Hernández, Pedro Reviriego, David Larrabeiti. 1-5 [doi]
- Distortion estimation algorithms for real-time video streaming: An application scenarioFulvio Babich, Marco D'Orlando, Francesca Vatta. 1-5 [doi]
- A collaborative target tracking algorithm considering energy constraint in WSNsVinh Tran Quang, Phat Nguyen Huu, Takumi Miyoshi. 1-5 [doi]
- Evaluation of a new multipath congestion control scheme using the NetPerfMeter tool-chainThomas Dreibholz, Martin Becke, Hakim Adhari, Erwin P. Rathgeb. 1-6 [doi]
- Observer network Web based statistical evaluationLjiljana Seric, Tihana Bodrozic, Darko Stipanicev, Toni Jakovcevic. 1-5 [doi]
- An improved algorithm for indirect time domain analysis of thin wire structuresSinisa Antonijevic, Vicko Doric, Dragan Poljak. 1-5 [doi]
- A desktop ultra-wideband radio channel analysisZoran Blazevic, Duje Coko, Ivan Plavcic, Toni Jurisic Sokic. 1-3 [doi]
- On the weakness of contactless systems under relay attacksPierre-Henri Thevenon, Olivier Savry, Smail Tedjini. 1-5 [doi]
- 2 of spatial resolutionPiero Campalani, Thi Nhat Thanh Nguyen, Simone Mantovani, Maurizio Bottoni, Gianluca Mazzini. 1-5 [doi]
- Researching the different polarizations of impulsive noisePablo Torio, Manuel García Sánchez. 1-5 [doi]
- Use of NFC and QR code identification in an electronic ticket system for public transportLuka Finzgar, Mira Trebar. 1-6 [doi]
- Multistage SPIT detection in transit VoIPMuhammad Ajmal Azad, Ricardo Morla. 1-9 [doi]
- Design and testing of a diode-based electric field probe prototypeZlatko Zivkovic, Damir Senic, Antonio Sarolic, Ante Vucic. 1-5 [doi]
- Distributed monitoring system for material handlingHeinz Lugo, Julien Viret, Axel Bindel, Paul P. Conway, Andrew West.. 1-6 [doi]
- Context-based natural image parsing: A critical surveyToma Roncevic, Maja Braovic, Darko Stipanicev. 1-5 [doi]
- Energy-aware retransmission scheme for multimedia delivery over wireless networksDeema Abdallah, Sanaa Sharafeddine. 1-5 [doi]
- A channel-aware reservation protocol for cooperative content distribution over OFDMA networksElias Yaacoub, Lina Al-Kanj, Zaher Dawy, Sanaa Sharafeddine, Adnan Abu-Dayya. 1-6 [doi]
- Implicit SIP proxy overload detection mechanism based on response behaviorMarco Happenhofer, Christoph Egger 0002. 1-5 [doi]
- Evolution of wireless sensor networks towards the Internet of Things: A surveyLuca Mainetti, Luigi Patrono, Antonio Vilei. 1-6 [doi]
- Broadband ecosystem for rural areas in the republic of CroatiaAntun Caric, Danijel Mileta, Josip Sajnovic. 1-9 [doi]
- An algorithm to simulate impulsive noisePablo Torio, Manuel García Sánchez, Iñigo Cuiñas. 1-4 [doi]
- HF comparison of image and TL models of a horizontal thin-wire conductor in finitely conductive earthVesna Arnautovski-Toseva, Khalil El Khamlichi Drissi, Kamel Kerroum. 1-5 [doi]
- Using wavelets to define and detect harmonic fingerprints in non-sinusoidal waveformsIleana-Diana Nicolae, Marian-Stefan Nicolae. 1-5 [doi]
- Deploying new hash algorithms in Secure Neighbor DiscoveryValter Vasic, Ana Kukec, Miljenko Mikuc. 1-5 [doi]
- The application of GIS in designing of wireless communication systems with SC combining in the presence of Ricean fadingDragana Krstic, Goran Stamenovic, Stefan Panic, Zoran Popovic, Dejan D. Rancic, Mihajlo C. Stefanovic. 1-5 [doi]
- Reducing the number of iterations in iterative demodulation with turbo decodingSalim Haddad, Amer Baghdadi, Michel Jézéquel. 1-6 [doi]
- Massey Omura multiple users key distributionDanilo Merlanti, Gianluca Mazzini. 1-5 [doi]
- Next generation network and regulatory challengesIgnac Lovrek, Drazen Lucic, Gasper Gacina. 1-9 [doi]
- Power efficient femtocell distribution strategiesYoram Haddad 0001, Yisroel Mirsky. 1-5 [doi]
- Lightweight matrix-based authentication protocol for RFIDVinod Ramachandra, Musfiq Rahman, Srinivas Sampalli. 1-6 [doi]
- Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wildTimo Kasper, David Oswald, Christof Paar. 1-6 [doi]
- Infrastructure-dependent wireless multicast over 802.11n WLANJean Marie Vella, Saviour Zammit. 1-5 [doi]
- RFID tag readability around white wine bottlesIsabel Expósito, Iñigo Cuiñas. 1-5 [doi]
- Accelerometer-based gesture classification using principal component analysisTea Marasovic, Vladan Papic. 1-5 [doi]
- Lightning electromagnetic field of a double-peaked channel-base currentVesna Javor. 1-5 [doi]
- Towards assessment of IPv6 readiness, deployment and transition plans in CroatiaVelimir Svedek, Ognjen Dobrijevic, Maja Matijasevic, Ivana Golub, Tomislav Stivojevic. 1-7 [doi]
- Multicore SIP parsing with imperative and declarative implementationsI. Skuliber, V. Jankovic, R. Zec. 1-7 [doi]
- Modeling filtering predicates composition with Finite State AutomataMarco Leogrande, Luigi Ciminiera, Fulvio Risso. 1-5 [doi]
- RFID and WSNs for traceability of agricultural goods from Farm to Fork: Electromagnetic and deployment aspects on wine test-casesLuca Catarinucci, Iñigo Cuiñas, Isabel Expósito, Riccardo Colella, José Antonio Gay-Fernández, Luciano Tarricone. 1-4 [doi]
- Joint modeling of network related events with multi-dimensional Markov Modulated Deterministic ProcessesPaulo Salvador, António Nogueira, Rui Valadas, António Pacheco. 1-7 [doi]
- Signal modeling and processing for physiological sensing through UWB radarsMarco Baldi, Franco Chiaraluce, Matteo Moretti, Francesco Venieri, Blerina Zanaj. 1-5 [doi]
- Code assignment and reassignment to reduce new code blocking in WCDMA networksVipin Balyan, Davinder S. Saini. 1-5 [doi]
- Analysis of arrays of printed strip dipole antennasRuzhdi Sefa, Faton Tefiku, Arianit Maraj. 1-5 [doi]
- XCS based hidden firmware modification on embedded devicesBoldizsár Bencsáth, Levente Buttyán, Tamás Paulik. 1-5 [doi]
- Efficient motion estimation algorithm using edge feature and arithmetic coding for video compression on WVSNsPhat Nguyen Huu, Vinh Tran Quang, Takumi Miyoshi. 1-5 [doi]
- Analysis of grounding electrode input impedance calculationDamir Cavka, Dragan Poljak. 1-5 [doi]
- Assessment of SAR distribution in the human eye and pregnant woman models exposed to RF radiation using FEKO software packageZlatko Zivkovic, Duje Despalatovic, Dragan Poljak, Antonio Sarolic, Khalil El Khamlichi Drissi. 1-5 [doi]
- System performance enhancement for T-code familyS. Saleh Hosseini Bidaki, Mostafa Shahabinejad. 1-5 [doi]
- Next generation access and investment issuesIvana Drazic Lutilsky, Domagoj Jurjevic, Marina Ivic. 1-7 [doi]
- Design and development of a social shopping experience in the IoT domain: The ShopLovers solutionUgo Biader Ceipidor, Carlo Maria Medaglia, Valentina Volpi, Alice Moroni, Serena Sposato, Manuele Tamburrano. 1-5 [doi]
- The P2P-RPL routing protocol for IPv6 sensor networks: Testbed experimentsEmmanuel Baccelli, Matthias Philipp, Mukul Goyal. 1-6 [doi]
- Path following for indoor robots with RFID received signal strengthRan Liu, Philipp Vorst, Artur Koch, Andreas Zell. 1-7 [doi]
- Design and FDTD analysis of single-band and dual-band antennas for RFID and WiMAX applicationsNazish Irfan, Mustapha C. E. Yagoub, Khelifa Hettak. 1-5 [doi]
- Performance analysis of a new Mobility/QoS-aware architectureNuno Vasco Lopes, Maria João Nicolau, Alexandre Santos. 1-8 [doi]
- Design and implementation of Web service honeypotAbdallah Ghourabi, Tarek Abbes, Adel Bouhoula. 1-5 [doi]
- Hybrid detection method for cognitive radioTanuja Satish Dhope, Dina Simunic, Ramjee Prasad. 1-5 [doi]
- Case study on performance of a Group Communication System in the realm of voice over IPStefan Kohlhauser, Thomas Turek, Josef Mitterbauer, Heimo Zeilinger, Michael Kreilmeier. 1-5 [doi]
- Influence of human head and hand on PIFA antenna matching properties and SARAntonio Sarolic, Damir Senic, Zlatko Zivkovic, Ante Zorica. 1-5 [doi]
- MPeersim: Simulation environment for mobile P2P networksMuhammad Adeel, Laurissa N. Tokarchuk. 1-6 [doi]
- Towards RFID traceability systems of farmed fish supply chainMira Trebar, Andrej Grah, Alejandro Álvarez-Melcón, Alfredo Parreno. 1-6 [doi]
- Multi code assignment with minimum number of rakes for OVSF CDMAVipin Balyan, Davinder S. Saini. 1-5 [doi]
- Hierarchical Duty Cycle Management (HDCM) protocolDanilo Blasi. 1-6 [doi]
- An architecture for threats detection in mobile operators networksMario Di Mauro, Roberto Garufi, Fabio Postiglione, Paolo Addesso, Rocco Restaino, Maurizio Longo, Andrea Senatore, Anton Luca Robustelli. 1-5 [doi]
- Optimized resource allocation for video transmission over multihop networks with end-to-end statistical delay boundAmin Abdel Khalek, Zaher Dawy. 1-6 [doi]
- SystemC modeling of RFID systems for robustness analysisGilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély. 1-5 [doi]
- A linear regression based cost function for WSN localizationFrank Vanheel, Jo Verhaevert, Eric Laermans, Ingrid Moerman, Piet Demeester. 1-5 [doi]
- Peer-to-peer for unreliable multicastDanilo Merlanti, Gianluca Mazzini. 1-5 [doi]
- Availability modeling of grid computing environments using SANsReza Entezari-Maleki, Ali Movaghar. 1-6 [doi]
- Impulsive noise rejection by polarization orthogonality in OFDMPablo Torio, Manuel García Sánchez. 1-4 [doi]
- The enhancement of system performance in quasi-orthogonal space-time-frequency codesMostafa Shahabinejad, Alireza Morsali. 1-5 [doi]
- Minimization of energy consumption in passive HF contactless and RFID systemsPierre-Henri Thevenon, Olivier Savry, Smail Tedjini. 1-5 [doi]
- NEPI: An integration framework for Network ExperimentationAlina Quereilhac, Mathieu Lacage, Claudio Daniel Freire, Thierry Turletti, Walid Dabbous. 1-5 [doi]
- Findings of the public consultation on network neutrality in Croatia: Report and analysisZdravko Jukic, Mario Weber, Maja Matijasevic. 1-9 [doi]
- Proof of proximity with 802.11 wireless LANTill Wollenberg, Thomas Mundt. 1-7 [doi]
- Workshop: The electronic communications regulatory challenges - Experiences from the looking to the future project Croatian approach to digital dividendIvancica Sakal, Zeljko Tabakovic, Sonja Grgic, Dijana Tralic. 1-9 [doi]
- RecoMMobile: A spatiotemporal recommender system for mobile usersIgor Sambolec, Ivan Rukavina, Vedran Podobnik. 1-7 [doi]
- Using temporal neural networks to forecasting of broadband network faultsZeljko Deljac, Marijan Kunstic, Boris Spahija. 1-5 [doi]
- Overview of looking to the future projectMario Weber, Gordan Jezic, Miljenko Krvisek. 1-8 [doi]
- Turbo codes construction for robust hybrid multitransmission schemesFulvio Babich, Francesca Vatta. 1-5 [doi]
- SIP proxy high-load detection by continuous analysis of response delay valuesChristoph Egger 0002, Marco Happenhofer, Peter Reichl. 1-5 [doi]
- Experimental validation of wireless localization techniques in IEEE802.15.4 networksBesem Abid, Matteo Petracca, Paolo Pagano, Stefano Bocchino, Daniele Alessandrelli. 1-5 [doi]
- Towards a framework for evaluating the benefits of RFID adoption in supply chainsLuca Cremona, Matteo Della Bordella, Luca Mainetti, Luca Mari, Luigi Patrono, Aurelio Ravarini. 1-6 [doi]
- th anniversary of birth of Nikola TeslaDragan Poljak, Zoran Blazevic, Silvestar Sesnic, Mario Cvetkovic. 1-5 [doi]
- Energy-efficient cryptography: Application of KATANSergey P. Panasenko, Sergey A. Smagin. 1-5 [doi]
- Throughput analysis of a cognitive multi-hop IEEE 802.11-based WLAN overlaid on a cellular networkHosein Soleimani, Farid Ashtiani. 1-5 [doi]