


default search action
ISCC 2013: Split, Croatia
- 2013 IEEE Symposium on Computers and Communications, ISCC 2013, Split, Croatia, 7-10 July, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-3755-4

- Dario Bruneo

, Maria Fazio
, Francesco Longo
, Antonio Puliafito:
Smart data centers for green Clouds. 3-8 - Lei Shi, John Furlong, Runxin Wang:

Empirical evaluation of vector bin packing algorithms for energy efficient data centers. 9-15 - Paolo Bellavista

, Carlo Giannelli
, Massimiliano Mattetti:
A practical approach to easily monitoring and managing IaaS environments. 16-21 - Dimosthenis Kyriazis

, Konstantinos Kostantos, Andrew Kapsalis, Spyridon V. Gogouvitis
, Theodora A. Varvarigou:
QoS-oriented Service Management in large scale federated clouds. 22-27 - Luca Foschini

, Burak Kantarci, Antonio Corradi
, Hussein T. Mouftah:
Dynamic Cloud management for efficient stream processing. 28-34 - Antonio Celesti

, Maria Fazio
, Massimo Villari
:
SE CLEVER: A secure message oriented Middleware for Cloud federation. 35-40 - Bandar Alghamdi, Hacène Fouchal

:
Vehicular Communication projects classification and evaluation. 43-48 - Sindoora Koneru

, Bidyut Gupta, Shahram Rahimi
, Ziping Liu, Narayan C. Debnath:
Hierarchical pruning to improve bandwidth utilization of RPF-based broadcasting. 96-100 - Santanu Roy, Soumya Sen

, Anirban Sarkar, Nabendu Chaki
, Narayan C. Debnath:
Dynamic query path selection from lattice of cuboids using memory hierarchy. 49-54 - Nathalie Dessart, Philippe Hunel, Jean-Raphael Gros-Desormeaux:

Data collection for counting individuals and habitat characterization. 55-60 - Ramzi A. Haraty

, Mirna Naous:
Role-Based Access Control modeling and validation. 61-66 - Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman:

Data protection in multipath WSNs. 67-72 - Khalil Ibrahimi

, Fatima Zahra Ennouary, El-Houssine Bouyakhf:
Energy, QoS and bursts profile management in uplink IEEE 802.16e mobile WiMAX networks. 73-78 - S. Abdul Rahim, Baisakhi Chakraborty

, Joyati C. Debnath, Narayan C. Debnath:
Design Graph Multi-Dimensional Data Model of a Data Warehouse and conversion of its equivalent Object - Oriented Schema. 79-84 - Nawel Gharbi, Lynda Mokdad, Jalel Ben-Othman

:
Performance and reliability analysis of Small Cell Networks with retrials and different breakdowns disciplines: A computational approach. 85-90 - Qingwei Zhang

, Mohammed Almulla
, Azzedine Boukerche:
An improved authentication scheme for applying RFID in VANETs. 91-95 - Soko Divanovic, Milutin Radonjic

, Igor Radusinovic, Gordana Gardasevic
:
Performance analysis of crosspoint queued crossbar switch with weighted round robin scheduling algorithm under unbalanced bursty traffic. 120-124 - Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed

:
A collision prevention mechanism for the multicast transport in IEEE 802.11 networks. 125-130 - Yousri Daldoul, Toufik Ahmed

, Djamal-Eddine Meddour:
An analytical comparison of the Block NAK protocol and the IEEE 802.11aa feedback policy for a reliable multicast transport in the WLAN. 131-136 - Jichun Liu, Yang Geng, Deyuan Wang, Wenjing Li, Xuesong Qiu:

An objective multi-factor QoE evaluation based on content classification for H.264/AVC encoded video. 137-142 - Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:

T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems. 143-148 - Melike Erol-Kantarci, Jahangir H. Sarker, Hussein T. Mouftah:

Energy routing in the smart grid for Delay-Tolerant Loads and Mobile Energy Buffers. 149-154 - M. Karthick, Muthukumar Radhakrishnan, Krishna M. Sivalingam

:
Reliable data transfer mechanisms for Smart Grid wide area monitoring networks. 155-160 - Jagannathan Venkatesh, Baris Aksanli

, Tajana Simunic Rosing:
Residential energy simulation and scheduling: A case study approach. 161-166 - Tugra Sahiner, Gunes Karabulut-Kurt

, Aysegul Ozbakir:
From adaptive to sufficient modulation and coding: Demand oriented mobile power optimization. 167-172 - Pasquale Donadio, Silvia Russo, Roberto Canonico

, Giorgio Ventre:
O-Gene: Towards an open green network control plane. 173-178 - Haiyang Jiang, Gaogang Xie, Kavé Salamatian

:
Efficient fingerprint extraction for high performance Intrusion Detection System. 179-184 - Martín A. Gagliotti Vigil

, Daniel Cabarcas, Johannes Buchmann, Jingwei Huang
:
Assessing trust in the long-term protection of documents. 185-191 - Nikos Komninos

, Christos Tselikis, Christos Douligeris:
SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks. 192-196 - Marco Baldi

, Marco Bianchi, Nicola Maturo, Franco Chiaraluce
:
Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes. 197-202 - Samad S. Kolahi, Yuqing Rico Cao, Hong Chen:

Evaluation of IPv6 with IPSec in IEEE 802.11n wireless LAN using Fedora 15 operating system. 203-206 - Yi Dai, Liquan Xiao

, Kefei Wang, Heying Zhang, Bao-kang Zhao, Shaogang Wang:
A truly scalable IP lookup algorithm for next generation internet. 207-212 - Sandino Jardim

, Augusto Neto
, José Castillo Lema
, Eduardo Cerqueira, Felipe Sampaio Dantas da Silva:
Over-provisioning centric network resource control in Future Internet systems. 213-218 - Zhengwei Zhao, Jingping Bi:

Characterizing and analysis of the flattening Internet topology. 219-225 - Gilbert Cassar, Payam M. Barnaghi

, Wei Wang
, Suparna De
, Klaus Moessner
:
Composition of services in pervasive environments: A Divide and Conquer approach. 226-232 - Florian Skopik

, Qin Li:
Trustworthy incident information sharing in social cyber defense alliances. 233-239 - Ray-Guang Cheng

, Chia-Hung Wei, Shiao-Li Tsao:
Iterative contending-user estimation method for OFDMA wireless networks with bursty arrivals. 240-245 - Ahmed Yusuf Tambuwal, Raffaello Secchi, Gorry Fairhurst:

Comparison of methods for accelerating the response time of TCP sessions over long delay paths. 246-251 - Jari Kellokoski:

Real-life multipath TCP based make-before-break vertical handover. 252-256 - Ahmad M. El-Hajj

, Zaher Dawy:
On delay-aware joint uplink/downlink resource allocation in OFDMA networks. 257-262 - Yanhong Ju, Songlin Sun, Fei Qi, Xiaojun Jing, Yueming Lu, Na Chen

:
An improved method for reconstruction of channel taps in OFDM systems. 263-268 - Mahmoud El Maghrbay, Reda A. Ammar, Sanguthevar Rajasekaran:

Fast GPU algorithms for implementing the red-black Gauss-Seidel method for Solving Partial Differential Equations. 269-274 - Baris Aksanli

, Jagannathan Venkatesh, Tajana Rosing, Inder Monga
:
A comprehensive approach to reduce the energy cost of network of datacenters. 275-280 - Jiewei Wu, Jiajun Wang, Zhengwei Qi, Haibing Guan:

SRIDesk: A Streaming based Remote Interactivity architecture for desktop virtualization system. 281-286 - Marco Baldi

, Marco Bianchi, Nicola Maturo, Franco Chiaraluce
:
A practical viewpoint on the performance of LDPC codes over the fast Rayleigh fading wire-tap channel. 287-292 - Jenny Torres

, Michele Nogueira
, Guy Pujolle:
Secure and revocable node authentication in Vehicular Ad-Hoc Networks. 293-298 - Evaldo Souza, Hao Chi Wong, Ítalo Cunha, Antonio A. F. Loureiro, Luiz Filipe M. Vieira, Leonardo B. Oliveira:

End-to-end authentication in Under-Water Sensor Networks. 299-304 - Yusuf Albayram, Sotiris Kentros, Ruhua Jiang, Athanasios Bamis:

A method for improving mobile authentication using human spatio-temporal behavior. 305-311 - Christos Liaskos

, Georgios I. Papadimitriou, Christos Douligeris:
Sensor Swarm query filtering: Heightened attack resilience for broadcast on-demand services. 312-317 - Su Luo, Songlin Sun, Xiaojun Jing, Yueming Lu, Na Chen

:
On using cooperative game theory to solve the wireless scalable video multicasting problem. 318-323 - Marcelo Ribeiro Xavier Silva, Lau Cheuk Lung, Leandro Quibem Magnabosco, Luciana de Oliveira Rech:

BAMcast - byzantine fault-tolerant consensus service for Atomic Multicast in large-scale networks. 324-329 - Haijun Geng, Xia Yin, Xingang Shi, Zhiliang Wang:

MLSA: A link-state multipath routing algorithm. 330-335 - Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:

A weighted QoS aware multipath routing process in Mobile Ad hoc networks. 336-341 - Moyses M. Lima

, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura
, Leandro N. Balico
, Antonio A. F. Loureiro:
Greedy Routing and Data Aggregation in wireless sensor networks. 342-347 - Dossa Massa, Ricardo Morla

:
Abrupt ending of 802.11 AP connections. 348-353 - Shie-Yuan Wang, Hung-Wei Chiu, Jie Zheng, Xiao Chen:

A cooperative approach to fully utilizing the aggregate bandwidth of all service channels in IEEE 802.11p/1609 networks. 354-359 - Yujian Wang, Bin Zhao, Weihua Huang, Wenjun Sun:

Lifetime-optimal transmission scheduling for cluster-based routing in cooperative networks. 360-365 - Mohammadmajid Hormati, Fatna Belqasmi

, Roch H. Glitho
, Ferhat Khendek
:
A DNS protocol - based Service Discovery architecture for disaster response systems. 366-371 - João Batista Pinto Neto, Moyses M. Lima

, Edjair Mota
, Eduardo Cerqueira, Leandro N. Balico
:
Adaptive Contact Volume prediction in Delay Tolerant Networks. 372-376 - Paolo Bellavista

, Antonio Corradi
, Luca Foschini
, Alessandro Pernafini:
Data Distribution Service (DDS): A performance comparison of OpenSplice and RTI implementations. 377-383 - Roei Tell, Peter Izsak, Aidan Shribman, Steve Walsh, Benoit Hudzia:

Leveraging memory mirroring for transparent memory scale-out with zero-downtime failover of remote hosts. 384-390 - Kiyoshi Nakayama, Kyle E. Benson, Vahe Avagyan, Michael B. Dillencourt, Lubomir F. Bic, Nalini Venkatasubramanian:

Tie-set Based Fault Tolerance for autonomous recovery of double-link failures. 391-397 - Fernando Dettoni, Lau Cheuk Lung, Miguel Correia

, Aldelir Fernando Luiz:
Byzantine fault-tolerant state machine replication with twin virtual machines. 398-403 - Takeshi Takahashi

, Joona Kannisto, Jarmo Harju, Seppo Heikkinen, Marko Helenius
, Shin'ichiro Matsuo, Bilhanan Silverajan:
Accountable security mechanism based on security service level agreement. 404-410 - Antti Juvonen, Tuomo Sipola

:
Combining conjunctive rule extraction with diffusion maps for network intrusion detection. 411-416 - Hao Zeng, Dianfu Ma, Yongwang Zhao, Zhuqing Li:

A policy-based architecture for web services authentication. 417-422 - Nabil Ghanmy, Lamia Chaari Fourati

, Lotfi Kamoun:
Enhancement security level and hardware implementation of ECDSA. 423-429 - Maurizio Aiello

, Enrico Cambiaso
, Silvia Scaglione
, Gianluca Papaleo
:
A similarity based approach for application DoS attacks detection. 430-435 - Liam Keliher, Anthony Z. Delaney:

Cryptanalysis of the Toorani-Falahati Hill Ciphers. 436-440 - Dingde Jiang, Wenhui Zhao, Zhengzheng Xu, Jindi Liu:

An optimization-based robust routing algorithm for IP energy-efficient networks. 441-446 - Jean Marie Vella, Saviour Zammit:

Infrastructure-dependent wireless multicast - improving the code rate. 447-452 - Rodolfo W. L. Coutinho

, Luiz Filipe M. Vieira, Antonio A. F. Loureiro:
DCR: Depth-Controlled Routing protocol for underwater sensor networks. 453-458 - Guilherme Maia, Leandro A. Villas

, Azzedine Boukerche, Aline Carneiro Viana, André L. L. de Aquino, Antonio A. F. Loureiro:
Data dissemination in urban Vehicular Ad hoc Networks with diverse traffic conditions. 459-464 - Özgür Ergül, Özgür B. Akan:

Energy-efficient cooperative spectrum sensing for cognitive radio sensor networks. 465-469 - Panagiotis G. Sarigiannidis

, Malamati D. Louta
, Eleni Balasa, Thomas Lagkas
:
Adaptive sensing policies for cognitive wireless networks using learning automata. 470-475 - Ayman T. Abdel-Hamid, Ahmed H. Zahran

, Tamer A. ElBatt:
Improved spectrum mobility using virtual reservation in collaborative cognitive radio networks. 476-482 - Muhammed Fahim, Mahmoud H. Ismail

, Hazim Tawfik:
Multi-stage energy detection Spectrum Sensing using group intelligence. 483-488 - Jan Skodzik, Peter Danielis, Vlado Altmann, Dirk Timmermann

:
Extensive analysis of a Kad-based distributed storage system for session data. 489-494 - Chao Dai, Yong Jiang, Shu-Tao Xia, Hai-Tao Zheng, Laizhong Cui:

A traffic localization strategy for peer-to-peer live streaming. 495-501 - Laizhong Cui, Nan Lu:

SocialStreaming: P2P-assisted streaming in social networks. 502-507 - Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo:

A method for designing proximity-aware routing algorithms for structured overlays. 508-514 - Luana Carine Schünke, Luiz Paulo Luna de Oliveira, Marta Becker Villamil:

GUGA: A tool for participatory cities. 515-521 - Josip Music, Ivo Stancic, Vlasta Zanchi:

Is it possible to detect mobile phone user's attention based on accelerometer measurment of gait pattern? 522-527 - Thiago Henrique Silva

, Pedro O. S. Vaz de Melo
, Jussara M. Almeida, Antonio A. F. Loureiro:
Challenges and opportunities on the large scale study of city dynamics using participatory sensing. 528-534 - Javier E. Meseguer, Carlos Miguel Tavares Calafate

, Juan-Carlos Cano
, Pietro Manzoni
:
DrivingStyles: A smartphone application to assess driver behavior. 535-540 - Xiangxin Kong, Zhiliang Wang, Xingang Shi, Xia Yin, Dan Li:

Performance evaluation of software-defined networking with real-life ISP traffic. 541-547 - Christos Tsilopoulos, George Xylomenos

:
Scaling Bloom filter-based multicast via filter switching. 548-553 - Miao Li, Jiahai Yang, Changqing An

, Chenxi Li, Fuliang Li:
IPv6 network topology discovery method based on novel graph mapping algorithms. 554-560 - Yiming Zhou, Laizhong Cui, Yong Jiang, Mingwei Xu:

Modeling and optimizing the cache deployment with filter effect in multi-cache system. 561-566 - Roberio Gomes Patricio, Joaquim Celestino Jr.:

Hephaestus: A cloud-based environment to virtual network automation. 567-571 - Abdellah Chehri

, Hussein T. Mouftah, Paul Fortier
:
A sub-optimal receiver performance study over a multipath UWB channel. 572-575 - Lih Chieh Png, Long Xiao, Kiat Seng Yeo

, Thin Sek Wong, Yong Liang Guan
:
MIMO-diversity switching techniques for digital transmission in visible light communication. 576-582 - Maha Cherif Dakhli, Rafik Zayani, Ridha Bouallegue

:
A theoretical characterization and compensation of nonlinear distortion effects and performance analysis using polynomial model in MIMO OFDM systems under Rayleigh fading channel. 583-587 - Kadir Türk

, Pingyi Fan
:
On reliable information rate bounds for fading channel with receiver CSI only. 588-592 - Anousheh Tavakoli-Dehkordi, Yifan Chen, Predrag B. Rapajic, Chau Yuen, Yong Huat Chew:

A statistical-based algorithm for event region detection in Wireless Sensor Networks. 593 - Timoteo Lange, Paolo Cemim, Miguel G. Xavier, César A. F. De Rose

:
Optimizing the management of a database in a virtual environment. 594-599 - Aleksandar Antonic, Ivana Podnar Zarko

, Domagoj Jakobovic
:
Inferring presence status on smartphones: The big data perspective. 600-605 - Tania Banerjee-Mishra, Sartaj Sahni:

PUBSUB: An efficient publish/subscribe system. 606-611 - Tian Mi, Sanguthevar Rajasekaran:

A two-pass exact algorithm for selection on Parallel Disk Systems. 612-617 - Demetrio Gomes Mestre, Carlos Eduardo Santos Pires

:
Improving load balancing for MapReduce-based entity matching. 618-624 - Guodong Wang, Yongmao Ren

, Ke Dou, Jun Li:
The effect of the congestion control window size on the TCP incast and its implications. 625-628 - Runxin Wang, Lei Shi, Brendan Jennings

:
Ensemble classifier for traffic in presence of changing distributions. 629-635 - Ke Xu, Min Zhu, Ning Wang

, Song Lin, Haiyang Wang, Tong Li:
The 2ACT model-based evaluation for in-network caching mechanism. 636-641 - Chikara Sasaki, Peng Jiang, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano:

Development and evaluation of LISP-based instant VPN services. 642-647 - Atef Abdelkefi, Yaser Eftekhari, Yuming Jiang

:
Locating disruptions on an Internet path through end-to-end measurements. 648-653 - Janusz Kleban, Urszula Suszynska:

Static dispatching with internal backpressure scheme for SMM Clos-network switches. 654-658 - Ante Prodan

, John K. Debenham:
A measurement protocol for channel assignment based topology control on multi-radio wireless mesh networks. 659-664 - Abdellah Chehri

, Hussein T. Mouftah:
Exploiting multiuser diversity for OFDMA next generation wireless networks. 665-669 - Angelos K. Marnerides

, Simon Malinowski, Ricardo Morla
, Miguel R. D. Rodrigues, Hyong S. Kim:
On the comprehension of DSL SyncTrap events in IPTV networks. 670-675 - Jéferson Campos Nobre, Pedro Arthur Pinheiro Rosa Duarte, Lisandro Zambenedetti Granville

, Liane Margarida Rockenbach Tarouco
:
Self-* properties and P2P technology on disruption-tolerant management. 676-681 - Refaat Mohamed, Mahmoud H. Ismail

, Fatma A. Newagy
, Hebat-Allah M. Mourad:
Probability of error and ergodic capacity of switch-and-examine combining diversity over the α-μ fading channel. 682-687 - Semiha Tedik

, Günes Karabulut-Kurt
:
Fractionally spaced self-interference canceler for full-duplex communication systems. 688-692 - Amira Afifi, Khaled M. F. Elsayed

, Ahmed K. F. Khattab:
Interference-aware radio resource management framework for the 3GPP LTE uplink with QoS constraints. 693-698 - Thomas Jaffre, Pierre-Mickael Grigis, Stylianos Papanastasiou, Evtim Peytchev

:
On the efficacy of WiFi indoor positioning in a practical setting. 699-704 - Xingshen Wei

, Wenzhong Li, Xiaoliang Wang, Sanglu Lu, Xiaoming Fu
:
Recovering erroneous data bits using error estimating code. 705-710 - Fabien Geyer, Emanuel Heidinger, Stefan Schneele, Alexander von Bodisco:

Evaluation of Audio/Video Bridging forwarding method in an avionics switched ethernet context. 711-716 - Sofiene Jelassi, Gerardo Rubino:

Connections analysis of voice traffic over MANETs and their impact on delay variation. 717-723 - Kadir Türk

:
Throughput improvement of oversampled WiMAX receiver in frequency selective channel. 724-728 - Ante Kristic

, Julije Ozegovic, Ivan Kedzo:
Mathematical model of simplified Constrained Priority Countdown Freezing protocol. 729-734 - Jadranka Marasovic, Tea Marasovic, Marija Dapic:

Fair division methods approach as the option of learning process modeling. 735-739 - Rajib Nath, Douglas M. Carmean, Tajana Simunic Rosing:

Power modeling and thermal management techniques for manycores. 740-746 - Marek Gotfryd, Bartosz Pawlowicz

:
Modeling of a dynamic RFID system. 747-752 - Hongke Hu, Yong Jiang, Laizhong Cui, Shu-Tao Xia, Hai-Tao Zheng:

An optimal segment replication strategy in P2P-VoD systems. 753-758 - Yonggong Wang, Gaogang Xie, Mohamed Ali Kâafar

, Steve Uhlig
:
LMD: A local minimum driven and self-organized method to obtain locators. 759-764 - Fung Po Tso

, Dimitrios P. Pezaros:
Baatdaat: Measurement-based flow scheduling for cloud data centers. 765-770 - Mohamed Said Seddiki, Bilel Nefzi, Ye-Qiong Song

, Mounir Frikha
:
Queuing analysis of dynamic resource allocation for virtual routers. 771-776 - Cao Di, Lotfi Mhamdi

:
Scheduling multicast traffic in partially buffered crossbar switches. 777-782 - Mohamed Aymen Chalouf, Francine Krief, Nader Mbarek, Tayeb Lemlouma:

Improvement of a service level negotiation protocol using formal verification. 783-788 - Anhtuan Le

, Jonathan Loo
, Yuan Luo, Aboubaker Lasebae:
The impacts of internal threats towards Routing Protocol for Low power and lossy network performance. 789-794 - Julien Beaudaux, Antoine Gallais

, Thomas Noël:
Localized MAC duty-cycling adaptations for global energy-efficiency in Wireless Sensor Networks. 795-800 - Manal Al-Bzoor, Yibo Zhu, Jun Liu, Reda A. Ammar, Jun-Hong Cui, Sanguthevar Rajasekaran:

An adaptive surface sink redeployment strategy for Underwater Sensor Networks. 801-806 - Adriana Gomes Penaranda, Andre Ricardo Melo Araujo, Fabíola Guerra Nakamura, Eduardo Freire Nakamura

:
Deriving lower bounds for energy consumption in Wireless Sensor Networks. 807-813 - Elias Amaral Santos, Eros Comunello

, Douglas D. J. de Macedo
, Miriam A. M. Capretz, Thiago Coelho Prado, Mario A. R. Dantas
:
An analysis of replication and retrieval of medical image data using a database management system and a distributed file system. 814-819 - David Plonka, Paul Barford:

Assessing performance of Internet services on IPv6. 820-826 - Michael Taynnan Barros

, Reinaldo Gomes, Marcelo Sampaio de Alencar
, Anderson F. B. F. da Costa
:
IP traffic classifiers applied to DiffServ networks. 827-832 - Vlado Altmann, Peter Danielis, Jan Skodzik, Frank Golatowski

, Dirk Timmermann
:
Optimization of ad hoc device and service discovery in large scale networks. 833-838 - Vladimir Plestina

, Vladan Papic
:
Object classification inwater sports. 839-844 - Barbara Dzaja

, Niksa Antisic, Mirjana Bonkovic:
Local colour statistics for edge definition. 845-849 - Pjero Petej, Sven Gotovac:

Comparison of stamp classification using SVM and random ferns. 850-854 - Michael Grafl, Christian Timmerer, Hermann Hellwagner

, Wael Chérif, Daniel Négru, Stefano Battista:
Scalable video coding guidelines and performance evaluations for adaptive media delivery of high definition content. 855-861 - Zuleika Nascimento

, Djamel Sadok, Stenio F. L. Fernandes:
Comparative study of a Hybrid Model for network traffic identification and its optimization using Firefly Algorithm. 862-867 - Z. Berkay Celik, Sema Oktug

:
Detection of Fast-Flux Networks using various DNS feature sets. 868-873 - Filip Belic, Goran Martinovic:

Model of influence of MRP on network performances. 874-879 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:

Basic classifiers for DNS tunneling detection. 880-885 - Ahmed Jedda, Arnaud Casteigts, Guy-Vincent Jourdan, Hussein T. Mouftah:

BSF-UED: A new time-efficient Bluetooth Scatternet Formation algorithm based on Unnecessary-Edges Deletion. 886-891 - Lijun Wang, Lanlan Rui, Xuesong Qiu, Wenjing Li, Kangming Jiang:

A self-adaptive recovery strategy for service composition in ubiquitous stub environments. 892-897 - Simone Brienza, Domenico De Guglielmo, Giuseppe Anastasi, Marco Conti

, Vincenzo Neri:
Strategies for optimal MAC parameter setting in IEEE 802.15.4 wireless sensor networks: A performance comparison. 898-903 - Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi

, Sushanta Karmakar:
RelBAS: Reliable data gathering from border area sensors. 904-909 - Irfan S. Al-Anbagi

, Melike Erol-Kantarci, Hussein T. Mouftah:
A traffic adaptive inter-cluster head delay control scheme in WSNs. 910-915 - Maha Sliti

, Noureddine Boudriga:
Optical stateful security filtering approach based on code words. 916-921 - Fernanda Sumika H. Souza, Daniel L. Guidoni, Geraldo Robson Mateus:

A column generation-based heuristic for the GRWA with protection and QoS in WDM optical networks. 922-927 - Bogdan Uscumlic, Lida Sadeghioon, Annie Gravey

, Philippe Gravey:
The cost of traffic protection in bidirectional optical packet switching rings. 928-933 - Lih Chieh Png, Kiat Seng Yeo

:
Optical infrastructure for visible light communication for public housing and commercial buildings. 934-939 - Rene Golembewski, Steve Goering, Guenter Schaefer:

Capabilities and objectives of distributed image processing on smart camera systems. 940-945 - Elena Ivannikova, Timo Hämäläinen

, Kari Luostarinen:
Information-theoretic approach to variable selection in predictive models applied to paper machine data. 946-950 - Tea Marasovic, Vladan Papic

:
A novel feature descriptor for gesture classification using smartphone accelerometers. 951-955 - Srdjana Dragicevic, Stipe Celar

:
Method for elicitation, documentation and validation of software user requirements (MEDoV). 956-961 - Rahma Bouaziz:

An MDE approach for domain based architectural components modelling. 962-968 - Carmine Benedetto, Enzo Mingozzi, Carlo Vallati

:
A handoff algorithm based on link quality prediction for mass transit wireless mesh networks. 969-974 - Felipe D. da Cunha

, Ítalo Cunha, Hao Chi Wong, Antonio A. F. Loureiro, Leonardo B. Oliveira:
ID-MAC: An identity-based MAC protocol for Wireless Sensor Networks. 975-981 - Zinon Zinonos

, Vasos Vassiliou
, Chrysostomos Chrysostomou
:
Handoff triggering for wireless sensor networks with performance needs. 982-988 - Shoushou Ren, Yinlong Liu, Xu Zhou, Hui Tang, Song Ci:

A utility-based terminal selection mechanism for terminal cooperation in heterogeneous wireless networks. 989-994 - Lucas Venezian Povoa

, Pedro W. Bignatto, Carlos E. Monteiro, Daniel Mueller, Cesar Augusto Cavalheiro Marcondes
, Hermes Senger
:
A model for estimating energy consumption based on resources utilization. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














