default search action
7th CCWC 2017: Las Vegas, NV, USA
- IEEE 7th Annual Computing and Communication Workshop and Conference, CCWC 2017, Las Vegas, NV, USA, January 9-11, 2017. IEEE 2017, ISBN 978-1-5090-4228-9
- Lina Chato, Shahab Tayeb, Shahram Latifi:
A genetic algorithm to optimize the adaptive Support Vector Regression model for forecasting the reliability of diesel engine systems. 1-7 - Long Cheng, Yiyang Li, Yani Guan:
Human activity recognition based on compressed sensing. 1-7 - Fatima Zahra Berrehili, Abdelhamid Belmekki:
Risk analysis in Internet of Things using EBIOS. 1-7 - Taif Alobaidi, Wasfy B. Mikhael:
Two-step Feature Extraction in a Transform domain for face recognition. 1-4 - Tyrone S. Toland:
C2Cloud: A cloud computing framework. 1-7 - Jayasree Baidya, Trina Saha, Ryad Moyashir, Rajesh Palit:
Design and implementation of a fingerprint based lock system for shared access. 1-6 - Tri Doan, Jugal Kalita:
Overcoming the challenge for text classification in the open world. 1-7 - Marci McBride, Robert Mitchell:
A zoning algorithm for dynamic cyber zone defense. 1-6 - Masaya Yoshikawa, Yusuke Nozaki:
Hierarchical power analysis attack for falsification detection cipher. 1-6 - Rohan N. Pradhan, Mohammad S. Khan, Mais Nijim, Rajab Challoo:
Network delay modeling in Mobile Wireless Mesh Networks using Network Tomography. 1-8 - Jongouk Choi, Chi Shen, Jens Hannemann, Siddhartha Bhattacharyya:
Real-time server overloaded monitoring algorithm using back propagation artificial neural network. 1-7 - Lav Gupta, Mohammed Samaka, Raj Jain, Aiman Erbad, Deval Bhamare, Chris Metz:
COLAP: A predictive framework for service function chain placement in a multi-cloud environment. 1-9 - Tousif Osman, Shahreen Shahjahan Psyche, J. M. Shafi Ferdous, Hasan U. Zaman:
Intelligent traffic management system for cross section of roads using computer vision. 1-7 - Mounika Kasaraneni, Mohammad S. Khan:
NTLV algorithm: Critical path analysis in connected vehicles using network tomography. 1-5 - Mustafa Kocakulak, Ismail Butun:
An overview of Wireless Sensor Networks towards internet of things. 1-6 - Maha Zayoud, Soraia Oueida, Yehia Kotb, Pierre AbiChar:
A probabilistic approach for threaded process learning. 1-6 - Shahab Tayeb, Shahram Latifi, Yoohwan Kim:
A survey on IoT communication and computation frameworks: An industrial perspective. 1-6 - Liqaa Alhafadhi, Johnson A. Asumadu, Amean Al Safi:
Total harmonics distortion reduction using adaptive, Weiner, and Kalman filters. 1-8 - Yoshihiro Nozaki, Erik F. Golen, Nirmala Shenoy:
A modular architecture for scalable inter-domain routing. 1-6 - Gasem Rashwan, Salih Kenshil, Mohamed Matin:
Analysis of PAPR hybrid reduction technique based on PTS and SLM. 1-4 - Rohin Mittal, Vaibhav Sinha:
A personalized time-bound activity Recommendation System. 1-7 - Robert W. Thomas, José M. Vidal:
Toward detecting accidents with already available passive traffic information. 1-4 - Mosad Alkhathami, Lubna K. Alazzawi, Ali M. Elkateeb:
Large scale border security systems modeling and simulation with OPNET. 1-8 - Manel Souissi, Aref Meddeb:
Modelling of clustering with relay nodes in wireless sensor networks. 1-6 - Kenshin Terada, Kodai Ogura, Ryo Katsuma:
Efficient indoor exploration using mobile nodes by maintaining communicable region. 1-7 - Jiaxin Zhou, Jianyong Chen:
Maximum distance estimation of far-field model for underwater magnetic field communication. 1-5 - Sharang Sharma, Manind Gupta, Amit Kumar, Meenakshi Tripathi, Manoj Singh Gaur:
Multiple distance sensors based smart stick for visually impaired people. 1-5 - Weilian Su, Jianwen Lin, Tri T. Ha:
Global communication coverage using Cubesats. 1-7 - Qiaozhi Li, Jie Sheng, Ankur Teredesai:
Kernel based principal axis tree. 1-4 - Ahmed Alshammari, Saleh Albdran, Mohammad Matin:
The effect of channel spatial correlation on capacity and energy efficiency of massive MIMO systems. 1-5 - Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur:
FICUR: Employing SDN programmability to secure ARP. 1-8 - Megan Baluch, Tristan Bergstra, Mohamad El-Hajj:
Complex analysis of united states flight data using a data mining approach. 1-6 - Mohamed S. Mohamed, Sherif Hussein, Axel Krings:
An Enhanced Voting Algorithm for Hybrid Jamming attacks in VANET. 1-7 - Yu Kawahama, Ryo Katsuma:
High-accuracy localization via measurements of RSSIs and LED light angles for low-cost WMSNs. 1-7 - Miri Kim, Jaehoon Jung, Hyuncheol Kim, Joonki Paik:
Person re-identification using color name descriptor-based sparse representation. 1-4 - Sultan Alotaibi, Robert Akl:
Self-adjustment downlink transmission power for femtocells in co-channel deployment in heterogeneous networks. 1-6 - Andres Munoz-Arcentales, Wendy Yanez-Pazmino, Washington Velasquez Vargas:
Proposal of a communication structure model for activating reactive signaling in an emergency evacuation systems. 1-5 - Nashwa Nabil Owais, Haytham Tawfeek al Feel, Ehab Ezzat Hassanein:
A step towards the linking of the Culture Heritage in the Egyptian museums. 1-7 - Moises Levy, Jason O. Hallstrom:
A new approach to data center infrastructure monitoring and management (DCIMM). 1-6 - Satoshi Kodama, Rei Nakagawa, Toshimitsu Tanouchi:
Proposal of the Virtualized Control system for the integrated management of multiple services. 1-5 - Dong Nguyen, Canh Nguyen, Thuan Duong-Ba, Hung Nguyen, Anh Nguyen, Tuan Tran:
Joint network coding and machine learning for error-prone wireless broadcast. 1-7 - Amean Al Safi, Bradley J. Bazuin:
Toward digital transmitters with Amplitude Shift Keying and Quadrature Amplitude Modulators implementation examples. 1-7 - Jin Lu, Fei Dou:
Bi-subspace saliency detection. 1-7 - Peter Cope, Joseph Campbell, Thaier Hayajneh:
An investigation of Bluetooth security vulnerabilities. 1-7 - Ravi Shankar, Km Niharika Pandey, Aradhana Kumari, Vikash Sachan, Ritesh Kumar Mishra:
C(0) protocol based cooperative wireless communication over Nakagami-m fading channels: PEP and SER analysis at optimal power. 1-7 - Uttara Sawant, Robert Akl:
Performance evaluation of network productivity for LTE heterogeneous networks with reward-penalty weights assessment. 1-6 - Fatma Zubaydi, Assim Sagahyroon, Fadi A. Aloul, Hasan Mir:
MobSpiro: Mobile based spirometry for detecting COPD. 1-4 - Jameela Al-Jaroodi, Brandon Hollein, Nader Mohamed:
Applying software engineering processes for big data analytics applications development. 1-7 - Saleh Albdran, Ahmed Alshammari, Mohammad Abdul Matin:
Spectral and energy efficiency for massive MIMO systems using exponential correlation model. 1-5 - Douglas Comer, Rajas H. Karandikar, Adib Rastegarnia:
DCnet: A new data center network architecture. 1-6 - Siddharth Das:
A volatility-driven stock trading framework based on automated, short-term recommendation method. 1-6 - Shahab Tayeb, Miresmaeil Mirnabibaboli, Lina Chato, Shahram Latifi:
Minimizing energy consumption of smart grid data centers using cloud computing. 1-5 - Mohammed AlMahamdy, Jeffrey Dill:
Half-iteration early termination of turbo decoding. 1-5 - Sayuri Kohmura, Taro Togawa, Takeshi Otani:
Source separation based on transfer function between microphones and its dispersion. 1-6 - Farzana Haque, Fouzia Tamanna, Rajesh Palit:
Generation of vital event notifications from DHIS2 for strengthening CRVS system. 1-5 - Nikyle Nguyen, Doina Bein:
Distributed MPI cluster with Docker Swarm mode. 1-7 - Xin Wang, Wenjun Wu, Zhenghui Hu:
Evaluation of software quality in the TopCoder crowdsourcing environment. 1-6 - Debashis Jana, Ankita Chatterjee, Niladri Chakraborty, Ayoshna Saha, Arnab Kumar Saha, Allama Hossain, Sampriti Podder, Sanchari Das, Ankhi Bhattacharya:
Dynamic Economic Emission Dispatch using self-adaptive multivariate distribution based modified Real Coded Genetic Algorithm. 1-5 - Manel Souissi, Aref Meddeb:
Design optimization of delay-constrained routing in wireless sensor networks. 1-6 - Saffet Vatansever, Ismail Butun:
A broad overview of GPS fundamentals: Now and future. 1-6 - Talal Alharbi, Ahamed Aljuhani, Hang Liu:
Holistic DDoS mitigation using NFV. 1-4 - Eric Watkins, Matt Kloc, Shane Weerasuriya, Mohamad El-Hajj:
Collision analysis of driving scenarios. 1-7 - Moses Amoasi Acquah, Sekyung Han, Hongjoon Kim, Soonwoo Park, Heeje Han:
Real-Time Peak Control algorithm using Stochastic Optimization. 1-6 - Jihun Lee, Bong-Keun Jeong:
Understanding sensor data with uncertainty using a visual representation. 1-2 - Muhammad Asif Manzoor, Yasser L. Morgan:
Vehicle Make and Model classification system using bag of SIFT features. 1-5 - Ahmad Obeid, Harald Richter:
Routing in CarRing 4 - a transparent communication mean for field buses and LANs. 1-8 - Shumon Alam, Annamalai Annamalai, Cajetan M. Akujuobi:
Optimizations of cooperative spectrum sensing with reporting errors over myriad fading channels. 1-5 - Vikas S. Shah:
Deterministic consumer applications enabled Policy Architecture of Mobile Edge Computing ecosystem. 1-7 - Romeo Ayemele Djeujo, Christoph Ruland:
Embedding cryptographically secure matrix transformation in structured Compressive Sensing. 1-7 - Thomas Nägele, Jozef Hooman:
Co-simulation of cyber-physical systems using HLA. 1-6 - Ali Mohammed Mansoor, Mohammed A. Al-Maqri, Aznul Qalid Md Sabri, Hamid Abdullah Jalab, Ainuddin Wahid Abdul Wahab, Wagdy kahtan Al-kopati:
A Feedback-based Admission Control Unit for QoS provision of video Transmission over WLANs. 1-6 - Erol Ozan:
Password-free authentication for social networks. 1-5 - Adnan Quadri, Mohsen Riahi Manesh, Naima Kaabouch:
Noise cancellation in cognitive radio systems: A performance comparison of evolutionary algorithms. 1-7 - Himadri Nath Saha, Abhilasha Mandal, Abhirup Sinha:
Recent trends in the Internet of Things. 1-4 - Jianle Chen, Tianqi Xiao, Jie Sheng, Ankur Teredesai:
Gender prediction on a real life blog data set using LSI and KNN. 1-6 - Ernesto Zamora Ramos, Masanori Nakakuni, Evangelos A. Yfantis:
Quantitative measures to evaluate neural network weight initialization strategies. 1-7 - Asim Majeed:
Developing countries and Internet-of-Everything (IoE). 1-4 - Lanier A. Watkins, Sean Beck, Jared Zook, Anna L. Buczak, Jeffrey S. Chavis, William H. Robinson, Jose Andre Morales, Samuel Mishra:
Using semi-supervised machine learning to address the Big Data problem in DNS networks. 1-6 - Omar Alaql, Kambiz Ghazinour, Cheng-Chang Lu:
No-reference image quality metric based on features evaluation. 1-7 - Ankita Chatterjee, Mainak Biswas, Debasis Maji, Debashis Jana, Subhajit Brojabasi, Gautam Sarkar, Ayoshna Saha, Arnab Kumar Saha, Allama Hossain, Sampriti Podder, Sanchari Das, Ankhi Bhattacharya:
Discrete Wavelet Transform based V-I image fusion with Artificial Bee Colony Optimization. 1-4 - Guntur Dharma Putra, Azkario Rizky Pratama, Alexander Lazovik, Marco Aiello:
Comparison of energy consumption in Wi-Fi and bluetooth communication in a Smart Building. 1-6 - Ali Adib Arnab, Sadia Afrin Raka, F. M. Fahad, Hasan U. Zaman:
A cost effective way to build a web controlled search and CO detector rover. 1-6 - Jithin Jagannath, Daniel O'Connor, Nicholas Polosky, Brendan Sheaffer, Svetlana Foulke, Lakshmi Narasimhan Theagarajan, Pramod K. Varshney:
Design and evaluation of hierarchical hybrid automatic modulation classifier using software defined radios. 1-7 - Asim Majeed:
Efficient edge analytics in Internet-of-Things (IoT). 1-4 - Luis Gabriel Jaimes, Kanwalinderjit Gagneja, Mustafa Ilhan Akbas, Idalides J. Vergara-Laurens:
Future stress, forecasting physiological signals. 1-5 - Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia:
Scalability in mobile Ad hoc networks with Brownian mobility. 1-2 - Evangelos A. Yfantis, Masanori Nakakuni, Ernesto Zamora Ramos:
Low-bandwidth transmission algorithm for reliable wireless communication. 1-5 - Ahmed Saeed, Alaa E. El-Rouby, Yehea I. Ismail, Hani F. Ragai:
Clock signal characterization for signal integrity. 1-6 - Weilian Su, Kim Hong Tan, Ric A. Romero, Tri T. Ha:
MAC sub-layer design to reduce interference in LTE networks. 1-8 - Daisuke Horie, Ryo Katsuma:
Recognizing AR markers using optical illusion markers and a low-cost camera. 1-7 - Anh Nguyen, Quang Hoang, Hung Nguyen, Dong Nguyen, Tuan Tran:
Evaluating marijuana-related tweets on Twitter. 1-7 - Hiroki Shinba, Minoru Watanabe:
Optically reconfigurable gate array platform for mono-instruction set computer architecture. 1-4 - Farheen Fauziya, Brejesh Lall, Monika Agrawal:
Vector sensor based channel equalizer for underwater communication systems. 1-5 - Salih Kenshil, Gasem Rashwan, Mohamed Matin:
Analysis of optical OFDM based wireless LAN. 1-5 - Efe Francis Orumwense, Thomas J. Afullo, Viranjay M. Srivastava:
On increasing the energy efficiency of cognitive radio network base stations. 1-6 - Assim Sagahyroon:
Remote patients monitoring: Challenges. 1-4 - Robert Mitchell, Andrew Fisher, Scott Watson, John Jarocki:
Linkography ontology refinement and cyber security. 1-9 - Wanlin Cui, Yeseong Kim, Tajana Simunic Rosing:
Cross-platform machine learning characterization for task allocation in IoT ecosystems. 1-7 - Joseph Santiago, Eric Cotto, Luis Gabriel Jaimes, Idalides J. Vergara-Laurens:
Fall detection system for the elderly. 1-4 - Jing Pang:
Spectrum energy based voice activity detection. 1-5 - Juho Lee, Sungkwon Park:
New interconnection methodology of TSNs using V2X communication. 1-6 - Liu Wei, Yeongkwang Park, Yongbeom Cho:
Implementation of HEVC decoder in distributed mobile embedded system. 1-5 - Natasha Madhav, Meera K. Joseph:
Cloud for Engineering Education: Learning networks for effective student engagement. 1-4 - Ahamed Aljuhani, Talal Alharbi:
Virtualized Network Functions security attacks and vulnerabilities. 1-4 - Sultan Almuhammadi, Ahmad Amro:
Double-Hashing Operation Mode for Encryption. 1-7 - Ismail Butun:
Privacy and trust relations in Internet of Things from the user point of view. 1-5 - Hasan U. Zaman, Chowdhury Erfan Shourov, Abdullah-Al Mahmood, Noor E. Alam Siddique:
Conversion of wasted heat energy into electrical energy using TEG. 1-5 - Ahmed S. Sajit, Michael A. Turi:
SEU tolerance of FinFET 6T SRAM, 8T SRAM and DICE memory cells. 1-5 - Asim Majeed:
Internet of Things (IoT): A verification framework. 1-3 - Washington Velasquez Vargas, Andres Munoz-Arcentales, Joaquin Salvachua Rodriguez:
A distributed system model for managing data ingestion in a wireless sensor network. 1-5 - P. Maitreyi, M. Sreenivas Rao:
Design of Binary Spray and wait protocol for intermittently connected mobile networks. 1-3 - Kyle McHugh, Walter Akpedeye, Thaier Hayajneh:
Next generation wireless-LAN: Security issues and performance analysis. 1-7 - Michael A. Turi, José G. Delgado-Frias:
An implemented, initialization algorithm for many-dimension, Monte Carlo circuit simulations using Spice. 1-4 - Raisa Nusrat, Rajesh Palit:
Simplified FADE with sharing feature (SFADE+): A overlay approach for cloud storage system. 1-6 - Weilian Su, Wei Gee Ng, Tri Ha:
Maximizing available diversity in a MIMO fading channel. 1-7 - Mohammad A. Qayum, Abdel-Hameed A. Badawy, Jeanine E. Cook:
StAdHyTM: A Statically Adaptive Hybrid Transactional Memory: A scalability study on large parallel graphs. 1-7 - Hoang Nguyen, Hakduran Koc:
Input/output processing using on-chip memory for Cyber Physical System. 1-6 - K. M. Ragibul Haque, M. Abu Muyeed, Shahriar Sadat, Rajesh Palit:
Jol-Shinchon: Design and development of a sensor based intelligent auto irrigation system. 1-5 - Ilmi Yoon, Gary Ng, Xuejing Dong, Haichuan Duan, Anu Aggarwal, Rujoota Shah, Gloria Ku:
SuperCaly: Smart life assistance by integrating a calendar app with location tracking, media organization and social connection. 1-7 - Long Cheng, Yani Guan, Kecheng Zhu, Yiyang Li:
Recognition of human activities using machine learning methods with wearable sensors. 1-7 - Jigar Jadav, Andrew M. Burke, Pratik Dhiman, Michael Kollmer, Charles C. Tappert:
Classification of Student Web Queries. 1-7 - Ziyang Zhang, Yuhong Liu, Zhigang Jin, Rui Zhang:
Selecting influential and trustworthy neighbors for collaborative filtering recommender systems. 1-7 - Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia:
Performance evaluation of VoIP calls over MANET for different voice codecs. 1-6 - Abdallah Aldosary, Ivica Kostanic:
The impact of tree-obstructed propagation environments on the performance of wireless sensor networks. 1-7 - Youness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui:
Compressive sensing: Performance comparison of sparse recovery algorithms. 1-7 - Douglas Comer, Rajas H. Karandikar, Adib Rastegarnia:
Resilient packet delivery through software defined redundancy: An experimental study. 1-6 - Tarek Elderini, Naima Kaabouch, Hector Reyes:
Outage probability estimation technique based on a Bayesian model for cognitive radio networks. 1-6 - Shawn Ricardo, Doina Bein, Anand Panagadan:
Low-cost, real-time obstacle avoidance for mobile robots. 1-7 - Johannes Richter, Detlef Streitferdt, Elena Rozova:
On the development of intelligent optical inspections. 1-6 - Sung Sik Nam, Changseok Yoon, Mohamed-Slim Alouini:
Performance analysis of a threshold-based parallel multiple beam selection scheme for WDM-based systems for Gamma-Gamma distributions. 1-7 - Chandra N. Sekharan:
A probabilistic graphical model for learning as search. 1-4 - Eric J. Balster, Frank A. Scarpino, Andrew M. Kordik, Kerry L. Hill:
A simulator for spotlight SAR image formation. 1-5 - M. K. Chae, Abeer Alsadoon, P. W. C. Prasad, Amr Elchouemi:
Spam filtering email classification (SFECM) using gain and graph mining algorithm. 1-7 - James H. Jones, Tahir M. Khan:
A method and implementation for the empirical study of deleted file persistence in digital devices and media. 1-7 - Jigar Jadav, Andrew M. Burke, Greg Goldberg, Dawn Lindelin, Andrew Preciado, Charles C. Tappert, Michael Kollmer:
Correlation discovery between high school Student Web Queries and their Grade Point Average. 1-7 - Venkatraman Balasubramanian, Ahmed Karmouch:
An infrastructure as a Service for Mobile Ad-hoc Cloud. 1-7 - Hakduran Koc, Mehmet Ucar:
MMC-based phase partitioning for data intensive applications. 1-4 - Atheer Bassel, Mohd Jan Nordin:
Mutation and memory mechanism for improving Glowworm Swarm Optimization algorithm. 1-7 - Xiangrong Ma, Zhao Fu, Yingtao Jiang, Mei Yang, Haroon Stephen:
On a cyberinfrastructure platform for multidisciplinary, data-intensive scientific research. 1-6 - Hengameh Bahrami, Khosrow Hajsadeghi:
Circuit design to improve security of telecommunication devices. 1-4 - James A. Jerkins:
Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. 1-5 - Matthew Beck, Wei Hao, Alina Campan:
Accelerating the Mobile cloud: Using Amazon Mobile Analytics and k-means clustering. 1-7 - Homar Baez, Idalides J. Vergara-Laurens, Luz Torres-Molina, Luis Gabriel Jaimes, Miguel A. Labrador:
A real-time flood alert system for parking lots. 1-5 - Abdulrahman Aldhaheri, Jeongkyu Lee:
Event detection on large social media using temporal analysis. 1-6 - Liqaa F. Nawaf, Stuart M. Allen, Omer F. Rana:
Internet Transit Access Point placement and bandwidth allocation in Wireless Mesh Networks. 1-8 - Wei Liu, Kiyohide Nakauchi, Yozo Shoji:
A location-aided flooding mechanism in community-based IoT networks. 1-6 - Elizabeth M. Okumu, Mqhele E. Dlodlo:
Energy efficient transmit antenna selection for MIMO systems: A cross layer approach. 1-6 - Mohsen Riahi Manesh, Adnan Quadri, Sriram Subramaniam, Naima Kaabouch:
An optimized SNR estimation technique using particle swarm optimization algorithm. 1-6 - Dong Hyun Jeong, Bong-Keun Jeong, Soo-Yeon Ji:
Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions. 1-7 - Maged M. Eljazzar, Elsayed E. Hemayed:
Enhancing electric load forecasting of ARIMA and ANN using adaptive Fourier series. 1-6 - Anas Bushnag, Ausif Mahmood:
A specialized event-driven network simulator for security and anonymity applications of Wireless Sensor Networks. 1-6 - Kishore Kumar Reddy N. G., Rajeshwari K.:
Interactive clothes based on IOT using NFC and Mobile Application. 1-4 - Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Techniques for dealing with uncertainty in cognitive radio networks. 1-6 - Abdlmagid Basere, Ivica Kostanic:
Spatial sampling requirements for Received Signal Level measurements in cellular networks. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.