default search action
ISCC 2013: Split, Croatia
- 2013 IEEE Symposium on Computers and Communications, ISCC 2013, Split, Croatia, 7-10 July, 2013. IEEE Computer Society 2013, ISBN 978-1-4799-3755-4
- Dario Bruneo, Maria Fazio, Francesco Longo, Antonio Puliafito:
Smart data centers for green Clouds. 3-8 - Lei Shi, John Furlong, Runxin Wang:
Empirical evaluation of vector bin packing algorithms for energy efficient data centers. 9-15 - Paolo Bellavista, Carlo Giannelli, Massimiliano Mattetti:
A practical approach to easily monitoring and managing IaaS environments. 16-21 - Dimosthenis Kyriazis, Konstantinos Kostantos, Andrew Kapsalis, Spyridon V. Gogouvitis, Theodora A. Varvarigou:
QoS-oriented Service Management in large scale federated clouds. 22-27 - Luca Foschini, Burak Kantarci, Antonio Corradi, Hussein T. Mouftah:
Dynamic Cloud management for efficient stream processing. 28-34 - Antonio Celesti, Maria Fazio, Massimo Villari:
SE CLEVER: A secure message oriented Middleware for Cloud federation. 35-40 - Bandar Alghamdi, Hacène Fouchal:
Vehicular Communication projects classification and evaluation. 43-48 - Sindoora Koneru, Bidyut Gupta, Shahram Rahimi, Ziping Liu, Narayan C. Debnath:
Hierarchical pruning to improve bandwidth utilization of RPF-based broadcasting. 96-100 - Santanu Roy, Soumya Sen, Anirban Sarkar, Nabendu Chaki, Narayan C. Debnath:
Dynamic query path selection from lattice of cuboids using memory hierarchy. 49-54 - Nathalie Dessart, Philippe Hunel, Jean-Raphael Gros-Desormeaux:
Data collection for counting individuals and habitat characterization. 55-60 - Ramzi A. Haraty, Mirna Naous:
Role-Based Access Control modeling and validation. 61-66 - Quentin Monnet, Lynda Mokdad, Jalel Ben-Othman:
Data protection in multipath WSNs. 67-72 - Khalil Ibrahimi, Fatima Zahra Ennouary, El-Houssine Bouyakhf:
Energy, QoS and bursts profile management in uplink IEEE 802.16e mobile WiMAX networks. 73-78 - S. Abdul Rahim, Baisakhi Chakraborty, Joyati C. Debnath, Narayan C. Debnath:
Design Graph Multi-Dimensional Data Model of a Data Warehouse and conversion of its equivalent Object - Oriented Schema. 79-84 - Nawel Gharbi, Lynda Mokdad, Jalel Ben-Othman:
Performance and reliability analysis of Small Cell Networks with retrials and different breakdowns disciplines: A computational approach. 85-90 - Qingwei Zhang, Mohammed Almulla, Azzedine Boukerche:
An improved authentication scheme for applying RFID in VANETs. 91-95 - Soko Divanovic, Milutin Radonjic, Igor Radusinovic, Gordana Gardasevic:
Performance analysis of crosspoint queued crossbar switch with weighted round robin scheduling algorithm under unbalanced bursty traffic. 120-124 - Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed:
A collision prevention mechanism for the multicast transport in IEEE 802.11 networks. 125-130 - Yousri Daldoul, Toufik Ahmed, Djamal-Eddine Meddour:
An analytical comparison of the Block NAK protocol and the IEEE 802.11aa feedback policy for a reliable multicast transport in the WLAN. 131-136 - Jichun Liu, Yang Geng, Deyuan Wang, Wenjing Li, Xuesong Qiu:
An objective multi-factor QoE evaluation based on content classification for H.264/AVC encoded video. 137-142 - Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems. 143-148 - Melike Erol-Kantarci, Jahangir H. Sarker, Hussein T. Mouftah:
Energy routing in the smart grid for Delay-Tolerant Loads and Mobile Energy Buffers. 149-154 - M. Karthick, Muthukumar Radhakrishnan, Krishna M. Sivalingam:
Reliable data transfer mechanisms for Smart Grid wide area monitoring networks. 155-160 - Jagannathan Venkatesh, Baris Aksanli, Tajana Simunic Rosing:
Residential energy simulation and scheduling: A case study approach. 161-166 - Tugra Sahiner, Gunes Karabulut-Kurt, Aysegul Ozbakir:
From adaptive to sufficient modulation and coding: Demand oriented mobile power optimization. 167-172 - Pasquale Donadio, Silvia Russo, Roberto Canonico, Giorgio Ventre:
O-Gene: Towards an open green network control plane. 173-178 - Haiyang Jiang, Gaogang Xie, Kavé Salamatian:
Efficient fingerprint extraction for high performance Intrusion Detection System. 179-184 - Martín A. Gagliotti Vigil, Daniel Cabarcas, Johannes Buchmann, Jingwei Huang:
Assessing trust in the long-term protection of documents. 185-191 - Nikos Komninos, Christos Tselikis, Christos Douligeris:
SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks. 192-196 - Marco Baldi, Marco Bianchi, Nicola Maturo, Franco Chiaraluce:
Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes. 197-202 - Samad S. Kolahi, Yuqing Rico Cao, Hong Chen:
Evaluation of IPv6 with IPSec in IEEE 802.11n wireless LAN using Fedora 15 operating system. 203-206 - Yi Dai, Liquan Xiao, Kefei Wang, Heying Zhang, Bao-kang Zhao, Shaogang Wang:
A truly scalable IP lookup algorithm for next generation internet. 207-212 - Sandino Jardim, Augusto Neto, José Castillo Lema, Eduardo Cerqueira, Felipe Sampaio Dantas da Silva:
Over-provisioning centric network resource control in Future Internet systems. 213-218 - Zhengwei Zhao, Jingping Bi:
Characterizing and analysis of the flattening Internet topology. 219-225 - Gilbert Cassar, Payam M. Barnaghi, Wei Wang, Suparna De, Klaus Moessner:
Composition of services in pervasive environments: A Divide and Conquer approach. 226-232 - Florian Skopik, Qin Li:
Trustworthy incident information sharing in social cyber defense alliances. 233-239 - Ray-Guang Cheng, Chia-Hung Wei, Shiao-Li Tsao:
Iterative contending-user estimation method for OFDMA wireless networks with bursty arrivals. 240-245 - Ahmed Yusuf Tambuwal, Raffaello Secchi, Gorry Fairhurst:
Comparison of methods for accelerating the response time of TCP sessions over long delay paths. 246-251 - Jari Kellokoski:
Real-life multipath TCP based make-before-break vertical handover. 252-256 - Ahmad M. El-Hajj, Zaher Dawy:
On delay-aware joint uplink/downlink resource allocation in OFDMA networks. 257-262 - Yanhong Ju, Songlin Sun, Fei Qi, Xiaojun Jing, Yueming Lu, Na Chen:
An improved method for reconstruction of channel taps in OFDM systems. 263-268 - Mahmoud El Maghrbay, Reda A. Ammar, Sanguthevar Rajasekaran:
Fast GPU algorithms for implementing the red-black Gauss-Seidel method for Solving Partial Differential Equations. 269-274 - Baris Aksanli, Jagannathan Venkatesh, Tajana Rosing, Inder Monga:
A comprehensive approach to reduce the energy cost of network of datacenters. 275-280 - Jiewei Wu, Jiajun Wang, Zhengwei Qi, Haibing Guan:
SRIDesk: A Streaming based Remote Interactivity architecture for desktop virtualization system. 281-286 - Marco Baldi, Marco Bianchi, Nicola Maturo, Franco Chiaraluce:
A practical viewpoint on the performance of LDPC codes over the fast Rayleigh fading wire-tap channel. 287-292 - Jenny Torres, Michele Nogueira, Guy Pujolle:
Secure and revocable node authentication in Vehicular Ad-Hoc Networks. 293-298 - Evaldo Souza, Hao Chi Wong, Ítalo Cunha, Antonio A. F. Loureiro, Luiz Filipe M. Vieira, Leonardo B. Oliveira:
End-to-end authentication in Under-Water Sensor Networks. 299-304 - Yusuf Albayram, Sotiris Kentros, Ruhua Jiang, Athanasios Bamis:
A method for improving mobile authentication using human spatio-temporal behavior. 305-311 - Christos Liaskos, Georgios I. Papadimitriou, Christos Douligeris:
Sensor Swarm query filtering: Heightened attack resilience for broadcast on-demand services. 312-317 - Su Luo, Songlin Sun, Xiaojun Jing, Yueming Lu, Na Chen:
On using cooperative game theory to solve the wireless scalable video multicasting problem. 318-323 - Marcelo Ribeiro Xavier Silva, Lau Cheuk Lung, Leandro Quibem Magnabosco, Luciana de Oliveira Rech:
BAMcast - byzantine fault-tolerant consensus service for Atomic Multicast in large-scale networks. 324-329 - Haijun Geng, Xia Yin, Xingang Shi, Zhiliang Wang:
MLSA: A link-state multipath routing algorithm. 330-335 - Mariem Thaalbi, Nabil Tabbane, Tarek Bejaoui, Ahmed Meddahi:
A weighted QoS aware multipath routing process in Mobile Ad hoc networks. 336-341 - Moyses M. Lima, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura, Leandro N. Balico, Antonio A. F. Loureiro:
Greedy Routing and Data Aggregation in wireless sensor networks. 342-347 - Dossa Massa, Ricardo Morla:
Abrupt ending of 802.11 AP connections. 348-353 - Shie-Yuan Wang, Hung-Wei Chiu, Jie Zheng, Xiao Chen:
A cooperative approach to fully utilizing the aggregate bandwidth of all service channels in IEEE 802.11p/1609 networks. 354-359 - Yujian Wang, Bin Zhao, Weihua Huang, Wenjun Sun:
Lifetime-optimal transmission scheduling for cluster-based routing in cooperative networks. 360-365 - Mohammadmajid Hormati, Fatna Belqasmi, Roch H. Glitho, Ferhat Khendek:
A DNS protocol - based Service Discovery architecture for disaster response systems. 366-371 - João Batista Pinto Neto, Moyses M. Lima, Edjair Mota, Eduardo Cerqueira, Leandro N. Balico:
Adaptive Contact Volume prediction in Delay Tolerant Networks. 372-376 - Paolo Bellavista, Antonio Corradi, Luca Foschini, Alessandro Pernafini:
Data Distribution Service (DDS): A performance comparison of OpenSplice and RTI implementations. 377-383 - Roei Tell, Peter Izsak, Aidan Shribman, Steve Walsh, Benoit Hudzia:
Leveraging memory mirroring for transparent memory scale-out with zero-downtime failover of remote hosts. 384-390 - Kiyoshi Nakayama, Kyle E. Benson, Vahe Avagyan, Michael B. Dillencourt, Lubomir F. Bic, Nalini Venkatasubramanian:
Tie-set Based Fault Tolerance for autonomous recovery of double-link failures. 391-397 - Fernando Dettoni, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz:
Byzantine fault-tolerant state machine replication with twin virtual machines. 398-403 - Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan:
Accountable security mechanism based on security service level agreement. 404-410 - Antti Juvonen, Tuomo Sipola:
Combining conjunctive rule extraction with diffusion maps for network intrusion detection. 411-416 - Hao Zeng, Dianfu Ma, Yongwang Zhao, Zhuqing Li:
A policy-based architecture for web services authentication. 417-422 - Nabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun:
Enhancement security level and hardware implementation of ECDSA. 423-429 - Maurizio Aiello, Enrico Cambiaso, Silvia Scaglione, Gianluca Papaleo:
A similarity based approach for application DoS attacks detection. 430-435 - Liam Keliher, Anthony Z. Delaney:
Cryptanalysis of the Toorani-Falahati Hill Ciphers. 436-440 - Dingde Jiang, Wenhui Zhao, Zhengzheng Xu, Jindi Liu:
An optimization-based robust routing algorithm for IP energy-efficient networks. 441-446 - Jean Marie Vella, Saviour Zammit:
Infrastructure-dependent wireless multicast - improving the code rate. 447-452 - Rodolfo W. L. Coutinho, Luiz Filipe M. Vieira, Antonio A. F. Loureiro:
DCR: Depth-Controlled Routing protocol for underwater sensor networks. 453-458 - Guilherme Maia, Leandro A. Villas, Azzedine Boukerche, Aline Carneiro Viana, André L. L. de Aquino, Antonio A. F. Loureiro:
Data dissemination in urban Vehicular Ad hoc Networks with diverse traffic conditions. 459-464 - Özgür Ergül, Özgür B. Akan:
Energy-efficient cooperative spectrum sensing for cognitive radio sensor networks. 465-469 - Panagiotis G. Sarigiannidis, Malamati D. Louta, Eleni Balasa, Thomas Lagkas:
Adaptive sensing policies for cognitive wireless networks using learning automata. 470-475 - Ayman T. Abdel-Hamid, Ahmed H. Zahran, Tamer A. ElBatt:
Improved spectrum mobility using virtual reservation in collaborative cognitive radio networks. 476-482 - Muhammed Fahim, Mahmoud H. Ismail, Hazim Tawfik:
Multi-stage energy detection Spectrum Sensing using group intelligence. 483-488 - Jan Skodzik, Peter Danielis, Vlado Altmann, Dirk Timmermann:
Extensive analysis of a Kad-based distributed storage system for session data. 489-494 - Chao Dai, Yong Jiang, Shu-Tao Xia, Hai-Tao Zheng, Laizhong Cui:
A traffic localization strategy for peer-to-peer live streaming. 495-501 - Laizhong Cui, Nan Lu:
SocialStreaming: P2P-assisted streaming in social networks. 502-507 - Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo:
A method for designing proximity-aware routing algorithms for structured overlays. 508-514 - Luana Carine Schünke, Luiz Paulo Luna de Oliveira, Marta Becker Villamil:
GUGA: A tool for participatory cities. 515-521 - Josip Music, Ivo Stancic, Vlasta Zanchi:
Is it possible to detect mobile phone user's attention based on accelerometer measurment of gait pattern? 522-527 - Thiago Henrique Silva, Pedro O. S. Vaz de Melo, Jussara M. Almeida, Antonio A. F. Loureiro:
Challenges and opportunities on the large scale study of city dynamics using participatory sensing. 528-534 - Javier E. Meseguer, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni:
DrivingStyles: A smartphone application to assess driver behavior. 535-540 - Xiangxin Kong, Zhiliang Wang, Xingang Shi, Xia Yin, Dan Li:
Performance evaluation of software-defined networking with real-life ISP traffic. 541-547 - Christos Tsilopoulos, George Xylomenos:
Scaling Bloom filter-based multicast via filter switching. 548-553 - Miao Li, Jiahai Yang, Changqing An, Chenxi Li, Fuliang Li:
IPv6 network topology discovery method based on novel graph mapping algorithms. 554-560 - Yiming Zhou, Laizhong Cui, Yong Jiang, Mingwei Xu:
Modeling and optimizing the cache deployment with filter effect in multi-cache system. 561-566 - Roberio Gomes Patricio, Joaquim Celestino Jr.:
Hephaestus: A cloud-based environment to virtual network automation. 567-571 - Abdellah Chehri, Hussein T. Mouftah, Paul Fortier:
A sub-optimal receiver performance study over a multipath UWB channel. 572-575 - Lih Chieh Png, Long Xiao, Kiat Seng Yeo, Thin Sek Wong, Yong Liang Guan:
MIMO-diversity switching techniques for digital transmission in visible light communication. 576-582 - Maha Cherif Dakhli, Rafik Zayani, Ridha Bouallegue:
A theoretical characterization and compensation of nonlinear distortion effects and performance analysis using polynomial model in MIMO OFDM systems under Rayleigh fading channel. 583-587 - Kadir Türk, Pingyi Fan:
On reliable information rate bounds for fading channel with receiver CSI only. 588-592 - Anousheh Tavakoli-Dehkordi, Yifan Chen, Predrag B. Rapajic, Chau Yuen, Yong Huat Chew:
A statistical-based algorithm for event region detection in Wireless Sensor Networks. 593 - Timoteo Lange, Paolo Cemim, Miguel G. Xavier, César A. F. De Rose:
Optimizing the management of a database in a virtual environment. 594-599 - Aleksandar Antonic, Ivana Podnar Zarko, Domagoj Jakobovic:
Inferring presence status on smartphones: The big data perspective. 600-605 - Tania Banerjee-Mishra, Sartaj Sahni:
PUBSUB: An efficient publish/subscribe system. 606-611 - Tian Mi, Sanguthevar Rajasekaran:
A two-pass exact algorithm for selection on Parallel Disk Systems. 612-617 - Demetrio Gomes Mestre, Carlos Eduardo Santos Pires:
Improving load balancing for MapReduce-based entity matching. 618-624 - Guodong Wang, Yongmao Ren, Ke Dou, Jun Li:
The effect of the congestion control window size on the TCP incast and its implications. 625-628 - Runxin Wang, Lei Shi, Brendan Jennings:
Ensemble classifier for traffic in presence of changing distributions. 629-635 - Ke Xu, Min Zhu, Ning Wang, Song Lin, Haiyang Wang, Tong Li:
The 2ACT model-based evaluation for in-network caching mechanism. 636-641 - Chikara Sasaki, Peng Jiang, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano:
Development and evaluation of LISP-based instant VPN services. 642-647 - Atef Abdelkefi, Yaser Eftekhari, Yuming Jiang:
Locating disruptions on an Internet path through end-to-end measurements. 648-653 - Janusz Kleban, Urszula Suszynska:
Static dispatching with internal backpressure scheme for SMM Clos-network switches. 654-658 - Ante Prodan, John K. Debenham:
A measurement protocol for channel assignment based topology control on multi-radio wireless mesh networks. 659-664 - Abdellah Chehri, Hussein T. Mouftah:
Exploiting multiuser diversity for OFDMA next generation wireless networks. 665-669 - Angelos K. Marnerides, Simon Malinowski, Ricardo Morla, Miguel R. D. Rodrigues, Hyong S. Kim:
On the comprehension of DSL SyncTrap events in IPTV networks. 670-675 - Jéferson Campos Nobre, Pedro Arthur Pinheiro Rosa Duarte, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco:
Self-* properties and P2P technology on disruption-tolerant management. 676-681 - Refaat Mohamed, Mahmoud H. Ismail, Fatma A. Newagy, Hebat-Allah M. Mourad:
Probability of error and ergodic capacity of switch-and-examine combining diversity over the α-μ fading channel. 682-687 - Semiha Tedik, Günes Karabulut-Kurt:
Fractionally spaced self-interference canceler for full-duplex communication systems. 688-692 - Amira Afifi, Khaled M. F. Elsayed, Ahmed K. F. Khattab:
Interference-aware radio resource management framework for the 3GPP LTE uplink with QoS constraints. 693-698 - Thomas Jaffre, Pierre-Mickael Grigis, Stylianos Papanastasiou, Evtim Peytchev:
On the efficacy of WiFi indoor positioning in a practical setting. 699-704 - Xingshen Wei, Wenzhong Li, Xiaoliang Wang, Sanglu Lu, Xiaoming Fu:
Recovering erroneous data bits using error estimating code. 705-710 - Fabien Geyer, Emanuel Heidinger, Stefan Schneele, Alexander von Bodisco:
Evaluation of Audio/Video Bridging forwarding method in an avionics switched ethernet context. 711-716 - Sofiene Jelassi, Gerardo Rubino:
Connections analysis of voice traffic over MANETs and their impact on delay variation. 717-723 - Kadir Türk:
Throughput improvement of oversampled WiMAX receiver in frequency selective channel. 724-728 - Ante Kristic, Julije Ozegovic, Ivan Kedzo:
Mathematical model of simplified Constrained Priority Countdown Freezing protocol. 729-734 - Jadranka Marasovic, Tea Marasovic, Marija Dapic:
Fair division methods approach as the option of learning process modeling. 735-739 - Rajib Nath, Douglas M. Carmean, Tajana Simunic Rosing:
Power modeling and thermal management techniques for manycores. 740-746 - Marek Gotfryd, Bartosz Pawlowicz:
Modeling of a dynamic RFID system. 747-752 - Hongke Hu, Yong Jiang, Laizhong Cui, Shu-Tao Xia, Hai-Tao Zheng:
An optimal segment replication strategy in P2P-VoD systems. 753-758 - Yonggong Wang, Gaogang Xie, Mohamed Ali Kâafar, Steve Uhlig:
LMD: A local minimum driven and self-organized method to obtain locators. 759-764 - Fung Po Tso, Dimitrios P. Pezaros:
Baatdaat: Measurement-based flow scheduling for cloud data centers. 765-770 - Mohamed Said Seddiki, Bilel Nefzi, Ye-Qiong Song, Mounir Frikha:
Queuing analysis of dynamic resource allocation for virtual routers. 771-776 - Cao Di, Lotfi Mhamdi:
Scheduling multicast traffic in partially buffered crossbar switches. 777-782 - Mohamed Aymen Chalouf, Francine Krief, Nader Mbarek, Tayeb Lemlouma:
Improvement of a service level negotiation protocol using formal verification. 783-788 - Anhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae:
The impacts of internal threats towards Routing Protocol for Low power and lossy network performance. 789-794 - Julien Beaudaux, Antoine Gallais, Thomas Noël:
Localized MAC duty-cycling adaptations for global energy-efficiency in Wireless Sensor Networks. 795-800 - Manal Al-Bzoor, Yibo Zhu, Jun Liu, Reda A. Ammar, Jun-Hong Cui, Sanguthevar Rajasekaran:
An adaptive surface sink redeployment strategy for Underwater Sensor Networks. 801-806 - Adriana Gomes Penaranda, Andre Ricardo Melo Araujo, Fabíola Guerra Nakamura, Eduardo Freire Nakamura:
Deriving lower bounds for energy consumption in Wireless Sensor Networks. 807-813 - Elias Amaral Santos, Eros Comunello, Douglas D. J. de Macedo, Miriam A. M. Capretz, Thiago Coelho Prado, Mario A. R. Dantas:
An analysis of replication and retrieval of medical image data using a database management system and a distributed file system. 814-819 - David Plonka, Paul Barford:
Assessing performance of Internet services on IPv6. 820-826 - Michael Taynnan Barros, Reinaldo Gomes, Marcelo Sampaio de Alencar, Anderson F. B. F. da Costa:
IP traffic classifiers applied to DiffServ networks. 827-832 - Vlado Altmann, Peter Danielis, Jan Skodzik, Frank Golatowski, Dirk Timmermann:
Optimization of ad hoc device and service discovery in large scale networks. 833-838 - Vladimir Plestina, Vladan Papic:
Object classification inwater sports. 839-844 - Barbara Dzaja, Niksa Antisic, Mirjana Bonkovic:
Local colour statistics for edge definition. 845-849 - Pjero Petej, Sven Gotovac:
Comparison of stamp classification using SVM and random ferns. 850-854 - Michael Grafl, Christian Timmerer, Hermann Hellwagner, Wael Chérif, Daniel Négru, Stefano Battista:
Scalable video coding guidelines and performance evaluations for adaptive media delivery of high definition content. 855-861 - Zuleika Nascimento, Djamel Sadok, Stenio F. L. Fernandes:
Comparative study of a Hybrid Model for network traffic identification and its optimization using Firefly Algorithm. 862-867 - Z. Berkay Celik, Sema Oktug:
Detection of Fast-Flux Networks using various DNS feature sets. 868-873 - Filip Belic, Goran Martinovic:
Model of influence of MRP on network performances. 874-879 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:
Basic classifiers for DNS tunneling detection. 880-885 - Ahmed Jedda, Arnaud Casteigts, Guy-Vincent Jourdan, Hussein T. Mouftah:
BSF-UED: A new time-efficient Bluetooth Scatternet Formation algorithm based on Unnecessary-Edges Deletion. 886-891 - Lijun Wang, Lanlan Rui, Xuesong Qiu, Wenjing Li, Kangming Jiang:
A self-adaptive recovery strategy for service composition in ubiquitous stub environments. 892-897 - Simone Brienza, Domenico De Guglielmo, Giuseppe Anastasi, Marco Conti, Vincenzo Neri:
Strategies for optimal MAC parameter setting in IEEE 802.15.4 wireless sensor networks: A performance comparison. 898-903 - Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
RelBAS: Reliable data gathering from border area sensors. 904-909 - Irfan S. Al-Anbagi, Melike Erol-Kantarci, Hussein T. Mouftah:
A traffic adaptive inter-cluster head delay control scheme in WSNs. 910-915 - Maha Sliti, Noureddine Boudriga:
Optical stateful security filtering approach based on code words. 916-921 - Fernanda Sumika H. Souza, Daniel L. Guidoni, Geraldo Robson Mateus:
A column generation-based heuristic for the GRWA with protection and QoS in WDM optical networks. 922-927 - Bogdan Uscumlic, Lida Sadeghioon, Annie Gravey, Philippe Gravey:
The cost of traffic protection in bidirectional optical packet switching rings. 928-933 - Lih Chieh Png, Kiat Seng Yeo:
Optical infrastructure for visible light communication for public housing and commercial buildings. 934-939 - Rene Golembewski, Steve Goering, Guenter Schaefer:
Capabilities and objectives of distributed image processing on smart camera systems. 940-945 - Elena Ivannikova, Timo Hämäläinen, Kari Luostarinen:
Information-theoretic approach to variable selection in predictive models applied to paper machine data. 946-950 - Tea Marasovic, Vladan Papic:
A novel feature descriptor for gesture classification using smartphone accelerometers. 951-955 - Srdjana Dragicevic, Stipe Celar:
Method for elicitation, documentation and validation of software user requirements (MEDoV). 956-961 - Rahma Bouaziz:
An MDE approach for domain based architectural components modelling. 962-968 - Carmine Benedetto, Enzo Mingozzi, Carlo Vallati:
A handoff algorithm based on link quality prediction for mass transit wireless mesh networks. 969-974 - Felipe D. da Cunha, Ítalo Cunha, Hao Chi Wong, Antonio A. F. Loureiro, Leonardo B. Oliveira:
ID-MAC: An identity-based MAC protocol for Wireless Sensor Networks. 975-981 - Zinon Zinonos, Vasos Vassiliou, Chrysostomos Chrysostomou:
Handoff triggering for wireless sensor networks with performance needs. 982-988 - Shoushou Ren, Yinlong Liu, Xu Zhou, Hui Tang, Song Ci:
A utility-based terminal selection mechanism for terminal cooperation in heterogeneous wireless networks. 989-994 - Lucas Venezian Povoa, Pedro W. Bignatto, Carlos E. Monteiro, Daniel Mueller, Cesar Augusto Cavalheiro Marcondes, Hermes Senger:
A model for estimating energy consumption based on resources utilization. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.