


default search action
2nd ISNCC 2015: Yasmine Hammamet, Tunisia
- International Symposium on Networks, Computers and Communications, ISNCC 2015, Yasmine Hammamet, Tunisia, May 13-15, 2015. IEEE 2015, ISBN 978-1-4673-7468-2

- Mohammed Alawairdhi:

Static analysis based business logic modelling from legacy system code: Business process model notation (BPMN) extraction using abstract syntax tree (AST). 1-6 - Tobias Rauter, Andrea Höller, Nermin Kajtazovic, Christian Kreiner

:
Towards an automated generation of application confinement policies with binary analysis. 1-6 - Enan A. Khalil

, Suat Özdemir
:
CDS based reliable topology control in WSNs. 1-5 - Sami Mnasri, Adel Thaljaoui

, Nejah Nasri, Thierry Val
:
A genetic algorithm-based approach to optimize the coverage and the localization in the wireless audio-sensors networks. 1-6 - Ben Ncira Amel, Rim Bouhouch, Jouani Houda, Salem Hasnaoui, Khaled Jelassi:

Data distribution service on top of Ethernet networks. 1-5 - Ibrahim Yonis Omar, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:

G-Cloud on Openstack: Adressing access control and regulation requirements. 1-6 - Chourouk Hammami, Achraf Gazdar, Imen Jemili, Abdelfettah Belghith

:
Study of VOD streaming on BitTorrent. 1-6 - Fatma Rhimi, Saloua Ben Yahia, Samir Ben Ahmed

:
Efficient Skyline computation for optimal service composition with fuzzy preference relationships. 1-6 - Majdi Ghannoudi, Walid Chainbi

:
Formal verification for Web service composition: A model-checking approach. 1-6 - Gabriela Mogos

:
Software implementation of Bechmann-Pasquinucci and Peres protocol for qutrits. 1-5 - Sondès Khemiri-Kallel:

4G traffic offloading through wireless network based on next generation hotspots (NGH). 1-6 - Takoua Ghariani, Badii Jouaber:

Energy consumption evaluation for LTE scheduling algorithms. 1-5 - Mumtaz Ahmad:

Collaborative distributed editing (Real number based indexation). 1-6 - Olfa Hammas, Saloua Ben Yahia, Samir Ben Ahmed

:
Adaptive web service composition insuring global QoS optimization. 1-6 - Mohamed Nidhal Mejri, Mohamed Hamdi:

Recent advances in cryptographic solutions for vehicular networks. 1-7 - Soufiene Djahel

, Nafaâ Jabeur
, Robert Barrett, John Murphy:
Toward V2I communication technology-based solution for reducing road traffic congestion in smart cities. 1-6 - Sirikarn Pukkawanna, Youki Kadobayashi, Suguru Yamaguchi:

Network-based mimicry anomaly detection using divergence measures. 1-7 - Aymen Ben Zineb, Mohamed Ayadi, Sami Tabbane:

Cognitive radio networks management using an ANFIS approach with QoS/QoE mapping scheme. 1-6 - M. Fahim Ferdous Khan, Ken Sakamura:

Fine-grained access control to medical records in digital healthcare enterprises. 1-6 - Hatem Ibn-Khedher, Emad Abd-Elrahman

, Hossam Afifi, Jacky Forestier:
Network issues in virtual machine migration. 1-6 - Wojciech Kabacinski

, Janusz Kleban, Marek Michalski
, Mariusz Zal
:
Strict-sense nonblocking networks with three multiplexing and switching levels. 1-6 - Sogand Shirinbab, Lars Lundberg:

Performance implications of over-allocation of virtual CPUs. 1-6 - Audace Manirabona, Saadi Boudjit, Lamia Chaari Fourati

:
Energy aware routing protocol for inter WBANs cooperative Communication. 1-6 - Mahammad A. Safwat:

Dynamic spectrum access with traffic prioritization in Cognitive Radio networks. 1-6 - Azeddien M. Sllame

, Abdelrahem Raey, Basher Mohamed, Abdelhafed Alagel:
Performance comparison of VoIP over wireless ad hoc networks using different routing protocols and queuing techniques. 1-6 - Marek Michalski

, Tytus Sielach:
The analysis of time reaction in OpenFlow switches in NetFPGA cards and ROFL. 1-5 - Moufida Bouslama, Moubarek Traii, Ali Gharsallah, Tayeb A. Denidni:

Reconfigurable new unit-cell frequency selective surface for beam switching applications. 1-4 - Mouna Abdelmoumen, Mounir Frikha

, Tijani Chahed:
Performance of Delay Tolerant Mobile Networks and its improvement using mobile relay nodes under buffer constraint. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














