


default search action
4th ISNCC 2017: Marrakech, Morocco
- 2017 International Symposium on Networks, Computers and Communications, ISNCC 2017, Marrakech, Morocco, May 16-18, 2017. IEEE 2017, ISBN 978-1-5090-4260-9

- Idy Diop

, Idrissa P. Ndiaye, Papa Alioune Fall, Moussa Diallo
:
Optimization of ldpc codes used in cooperative relay systems: Case of mobile telephony. 1-6 - Soufiane Oukili, Seddik Bri:

High speed efficient advanced encryption standard implementation. 1-4 - Kwon-Yeol Park, Dong-Woo Kim, Jong-Han Kim, Woon-Haing Hur:

Autonomous mode selection scheme for underlay device-to-device communication. 1-5 - Gang Liu, Guofang Zhang, Runnan Zhang, Juan Cui, Quan Wang, Shaomin Ji:

An improved blp model with response blind area eliminated. 1-6 - Stephane M. Nlom, Khmaies Ouahada

, Alain Richard Ndjiongue, Hendrik C. Ferreira:
Evaluation of the SFSK-OOK integrated PLC-VLC system under the influence of sunlight. 1-5 - Wassim Fassi Fihri, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd

:
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks. 1-6 - Nandi Zhang, Marvin A. Sirbu

, Jon M. Peha:
A comparison of migration and multihoming support in IPv6 and XIA. 1-8 - A. H. El Fawal, Ali Mansour

, Frédéric Le Roy, D. Le Jeune, A. Hamie
:
RACH overload congestion mechanism for M2M communication in LTE-A: Issues and approaches. 1-6 - Kanae Matsui, Hanjong Choi:

A recommendation system with secondary usage of HEMS data for products based on IoT technology. 1-6 - Ghattas Akkad

, Moustapha El Hassan, Rafic Ayoubi:
Hardware and software implementation of a stereoscopic image compression technique for internet connected devices. 1-6 - A. Abdel Salam, Michele Luglio, Cesare Roseti, Francesco Zampognaro

:
Evaluation of TCP wave performance applied to real HTTP traffic. 1-6 - Dadiso F. Musarurwa, Khmaies Ouahada

, Hendrik C. Ferreira:
Error correction enhancement with interleaves for DC free codes. 1-5 - Abdesselam Ouardi, Abderrahim Sekkaki, Driss Mammass:

Towards an inter-Cloud architecture in healthcare system. 1-6 - Kawtar Zfnebi, Nissrine Souissi

, Kawtar Tikito
:
Driver behavior quantitative models: Identification and classification of variables. 1-6 - Kholoud Alshammari, Alaa E. S. Ahmed:

An efficient approach for detecting nodes failures in wireless sensor network based on clustering. 1-6 - Sergio Huertas Martinez, Octavio J. Salcedo Parra, Brayan Steven Reyes Daza:

IoT application of WSN on 5G infrastructure. 1-6 - El Mostapha Chakir

, Mohamed Moughit
, Youness Idrissi Khamlichi
:
A real-time risk assessment model for intrusion detection systems. 1-6 - Kanae Matsui:

Pleasant sleep provision system during warm nights as a function of smart home. 1-6 - Jihene Rezgui, Cedryk Doucet:

Detection of malicious vehicles with demerit and reward level system. 1-6 - Said Broumi

, Mohamed Talea
, Assia Bakali
, Florentin Smarandache
, P. K. Kishore Kumar:
Shortest path problem on single valued neutrosophic graphs. 1-6 - Amin Shahraki

, Hamed Taherzadeh, Øystein Haugen:
Last significant trend change detection method for offline poisson distribution datasets. 1-7 - Amr M. T. Ali-Eldin

, Eman Abdelrazek Hafez:
Towards a universal architecture for disease data models sharing and evaluation. 1-6 - Thomas Schwarz:

Dodrant-homomorphic encryption for cloud databases using table lookup. 1-6 - Muntaser A. Salman

, Suat Ozdemir
, Fatih V. Celebi:
Fuzzy logic based traffic surveillance system using cooperative V2X protocols with low penetration rate. 1-6 - Mert Melih Ozcelik

, Erdal Irmak
, Suat Ozdemir
:
A hybrid trust based intrusion detection system for wireless sensor networks. 1-6 - Madjed Bencheikh Lehocine, Mohamed Batouche

:
Flexibility of managing VLAN filtering and segmentation in SDN networks. 1-6 - Alsnousi Essa, Ahmed Yassin Al-Dubai

, Imed Romdhani, Mohamed A. Esriaftri:
A new weight based rotating clustering scheme for WSNS. 1-6 - Alma Oracevic

, Selma Dilek
, Suat Özdemir
:
Security in internet of things: A survey. 1-6 - Asma Elmaizi, Elkebir Sarhrouni

, Ahmed Hammouch, Chafik Nacir:
A new band selection approach based on information theory and support vector machine for hyperspectral images reduction and classification. 1-6 - Youssef Seraoui

, Brahim Raouyane, Mostafa Bellafkih
:
An extended IMS framework with a high-performance and scalable distributed storage and computing system. 1-6 - R. Byron Narvaez, D. Martha Villacis, T. Marjorie Chalen, Washington Velasquez

:
Heart rhythm monitoring system and IoT device for people with heart problems. 1-5 - Giuseppe Bianchi, Chiara Carusi, Lorenzo Bracciale

:
An online approach for joint task assignment and worker evaluation in crowd-sourcing. 1-8 - Behnam Akbarian, Saeed Ghazi-Maghrebi

:
Standard conformable time domain diversity for DVB-T2 system. 1-4 - Hourieh Khodkari, Saeed Ghazi-Maghrebi

, Abbas Asosheh:
Assurance of QoS in the integration of cloud services and internet of things. 1-5 - Xu Wang, Sabit Ekin, Erchin Serpedin

:
Optimal resource allocation for downlink OFDM-Based cognitive radio networks. 1-6 - Wu Tao, Christoph Ruland

:
Authenticated compressive sensing imaging. 1-6 - Khaoula Mabrouki, Belgacem Aouadi, Jamel Belhadj Tahar:

Antenna array performances improved by double negative metamaterials. 1-4 - Walid El Ayeb, Zièd Choukair:

Analytical model of funnel based joint dual mobile service discovery and exposure. 1-6 - Pratip Chakraborty, Nandish P. Kuruvatti, Hans D. Schotten:

A novel serious game engineering based interactive visualization and evaluation platform for cellular technologies. 1-6 - Serap Dorterler, Murat Dörterler

, Suat Özdemir
:
Multi-objective virtual machine placement optimization for cloud computing. 1-6 - Lakhdar Derdouri, Congduc Pham:

Geographic multicast routing based sleep scheduling. 1-5 - Khaoula Bel Kamel, Hana Bouafif, Mohamed Karim Sbai:

On neutrality of future networks: SDN as a baseline. 1-6 - Bouthaina Smari, Mondher Labidi, Fathi Choubani:

Composite right left handed transmission line in coplanar configuration. 1-5 - Amani Aloui, Ons Ben Rhouma, Chiheb Rebai

:
Impact of equalization on hybrid communication system for smart grid. 1-6 - Mustafa Mehmet-Ali, Farshad Keyvan Ghazvini, Mahmoud Doughan:

Modelling of a MAC protocol for mobile M2M communications. 1-6 - Abdessamed Sassi, Salah Eddine Henouda, Abdelmalik Bachir:

On predicting the residence time of mobile users at relevant places. 1-6 - Ivana Kovacevic

, Aleksandar Erdeljan
, Srdjan Vukmirovic, Nikola Dalcekovic, Jelena Stankovski:
Combining real-time processing streams to enable demand response in smart grids. 1-6 - Moufida Rahmani, Mahfoud Benchaïba:

An efficient replication scheme to increase file availability in mobile peer to peer systems. 1-6 - Timothy A. Chadza, Francisco J. Aparicio-Navarro

, Konstantinos G. Kyriakopoulos, Jonathon A. Chambers:
A look into the information your smartphone leaks. 1-6 - Mohamed Lahby

, Abderrahim Sekkaki:
Optimal vertical handover based on TOPSIS algorithm and utility function in heterogeneous wireless networks. 1-6 - Alfredo Cuzzocrea, Rim Moussa:

Multidimensional database modeling: Literature survey and research agenda in the big data era. 1-6 - Farouk Chetouah

, Nacerdine Bouzit, Idris Messaoudene, Salih Aidel
, Massinissa Belazzoug, Youcef Braham Chaouche
:
Miniaturized printed rectangular monopole antenna with a new DGS for WLAN applications. 1-4 - Mohamed Tarroumi, Issam Jabri:

EVNDN: Enhanced vehicular named data networking. 1-6 - Adil Bouti, Jörg Keller:

Secure genomic data evaluation in cloud environments. 1-6 - Errais Mohammed, Abderrahim Sekkaki:

Implementation of new broker based on the eTOM framework for dynamic supply of resources during the composition of virtual networks. 1-6 - Ahmad Ali

, Mansoor Ahmed
, Abid Khan
, Muhammad Ilyas, Muhammad Saad Razzaq:
A trust management system model for cloud. 1-6 - Nikola Dalcekovic, Srdjan Vukmirovic, Ivana Kovacevic

, Jelena Stankovski:
Providing flexible software as a service for smart grid by relying on big data platforms. 1-6 - Zhaolong Ning, Yuqing Liu, Xiangjie Kong

:
Social gene - A new method to find rising stars. 1-6 - Mayumbo Nyirenda, David Zulu:

Speeding up construction of distributed quadtrees for big-data analytics applications using dilated integers and hashmaps. 1-6 - Venkatraman Balasubramanian

, Ahmed Karmouch:
Managing the mobile Ad-hoc cloud ecosystem using software defined networking principles. 1-6 - Lina Xu:

Context aware traffic identification kit (TriCK) for network selection in future HetNets/5G networks. 1-5 - Nabil Moukafih

, Sabir Soukainat, Abdelmajid Lakbabi, Ghizlane Orhanou:
SIEM selection criteria for an efficient contextual security. 1-6 - Lennart Van Efferen, Amr M. T. Ali-Eldin

:
A multi-layer perceptron approach for flow-based anomaly detection. 1-6 - Azeddine Khiat

, Mohamed El Khaili
, Jamila Bakkoury, Ayoub Bahnasse
:
Study and evaluation of voice over IP signaling protocols performances on MIPv6 protocol in mobile 802.11 network: SIP and H.323. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














