


default search action
ICUMT 2009: St. Petersburg, Russia
- Proceedings of the International Conference on Ultra Modern Telecommunications, ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia. IEEE 2009, ISBN 978-1-4244-3942-3

- Panupat Poocharoen, Mario E. Magaña, Eduardo Alban:

Partial network coding with cooperation: A cross-layer design for multi-hop wireless networks. 1-8 - Pantelis N. Karamolegkos, Nikolaos D. Doulamis:

Multimedia file exchange and P2P social networking: Efficient allocation of users into communities of interest. 1-4 - Tsutomu Tsuboi

, Jun Yamada, Naoki Yamauchi, Noriaki Yoshikawa:
Cell design for next DSRC applications. 1-5 - Olga D. Sokolova

, Anastasia N. Yurgenson:
A new approach to estimating a network survivability. 1-4 - Tsutomu Tsuboi

, Jun Yamada, Naoki Yamauchi, Michihiro Nakagawa, Tetsuhiro Maruyama:
UWB radio propagation for intra vehicle communications. 1-5 - Nitin Rakesh, Nitin:

Analysis of All to All Broadcast on multi mesh of trees using genetic algorithm. 1-5 - Amit Kumar Singh

, Amrit Kumar Agrawal
, Chandra Bhan Pal:
Hand geometry verification system: A review. 1-7 - Rohit Sharma, Anupam Chahar, Nitish Paliwal, Appoorv Narula, Vigya Jindal:

Multilevel logic transmission using disparate intensity levels of white light and programmable controllers. 1-5 - Sugam Sharma, Mamta Rani:

Three-layer architecture model (TLAM) for energy conservation in wireless sensor networks. 1-5 - Lloyd Wood, Peter Holliday, Daniel Floreani, Wesley M. Eddy:

Sharing the dream. 1-2 - Lloyd Wood, Peter Holliday, Daniel Floreani, Ioannis Psaras:

Moving data in DTNs with HTTP and MIME. 1-4 - Fernando Solano

, Michal Pióro
, José-Luis Marzo
, Ramón Fabregat:
Self-Protection: A novel protection scheme for All-Optical Packet Switching networks. 1-6 - Marc Brogle, Dragan Milic, Luca Bettosini, Torsten Braun

:
A performance comparison of native IP Multicast and IP Multicast tunneled through a Peer-to-Peer overlay network. 1-6 - Sergio Gil-Lopez

, Javier Del Ser
, Ignacio (Iñaki) Olabarrieta
:
A novel heuristic algorithm for multiuser detection in synchronous CDMA wireless sensor networks. 1-6 - Ramu Pillalamarri, G. Sasi Bhushana Rao:

Analysis on size miniaturization in printed circular disc monopole antennas for UWB communications. 1-6 - Mohammad Hossein Madani, Abdolali Abdipour, Abbas Mohammadi

:
Performance degradation of OFDM signals passing through nonlinear circuits. 1-5 - Abdallah Makhoul

, Rachid Saadi, CongDuc Pham:
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks. 1-8 - Andrey Ronzhin

, Victor Budkov
, Alexey Karpov
, Milos Zelezný
:
Multimodal control via heterogeneous devices. 1-6 - Alonso Silva, Patricio Reyes

, Mérouane Debbah:
Congestion in randomly deployed wireless ad-hoc and sensor networks. 1-6 - Alessandro Amoroso, Marco Roccetti

:
On the making of an ubiquitous and altruistic application for medical first responses. 1-6 - Gustavo Marfia

, Giovanni Pau
, Marco Roccetti
:
On developing smart applications for VANETs: Where are we now? some insights on technical issues and open problems. 1-6 - Samir Sebbah, Brigitte Jaumard:

A global approach to fully pre-cross connected protection schemes design using p-structures. 1-6 - Yang Yang, Jian Chen, Leiling Duan, Luoming Meng, Zhipeng Gao, Xuesong Qiu:

A self-configuration management model for clustering-based MANETs. 1-7 - Lee-Chun Ko, Hung-Yuan Chen, Guan-Rong Lin:

A Neighbor-Based Detection Scheme for wireless sensor networks against node replication attacks. 1-6 - Costas Troulos, Vasilis Merekoulias, Vasilis Maglaris:

A business model for managing municipal metropolitan area networks: the special case of Greece. 1-7 - Tadeus Uhl

:
QoS measurement aspects for Triple Play Services. 1-5 - Claudia Campolo, Alessandro Cortese, Antonella Molinaro:

CRaSCH: A cooperative scheme for service channel reservation in 802.11p/WAVE vehicular ad hoc networks. 1-8 - Béla Genge, Piroska Haller

:
A syntactic approach for identifying multi-protocol attacks. 1-5 - Ehsan Pourfakhar, Amir Masoud Rahmani

:
Optimization of multicast routing based on a reliable effective framework in Wireless Mesh Networks. 1-7 - Hideya Ochiai, Kenichi Shimotada, Hiroshi Esaki:

IP over DTN: Large-delay asynchronous packet delivery in the internet. 1-4 - Man Feng, Lenan Wu:

A simulation analysis of anti-interference performance in EBPSK system. 1-3 - Juan M. Vilardy

, Cesar O. Torres, Lorenzo Mattos:
Images encryption via Discrete Fractional Fourier Transform and Jigsaw transform. Case study: Fingerprints. 1-5 - Ziwei Ren, Wenfan Li, Shaoen Wu, Qing Yang, Lei Chen:

Location security in geographic ad hoc routing for VANETs. 1-6 - Javier Del Ser

, Javier Garcia-Frías
, Pedro M. Crespo
:
Iterative concatenated Zigzag decoding and blind data fusion of correlated sensors. 1-6 - Takeshi Tsuchiya

, Hirokazu Yoshinaga, Marc Lihan, Kei'ichi Koyanagi:
Localization algorithms for distributed platform among vehicles. 1-6 - Daniele De Caneva, Pier Luca Montessoro, Davide Pierattoni:

Multipath geographic routing using false destinations. 1-6 - Seung-Kwon Baek, Jae-Su Song, Jin-Up Kim:

An adaptive access selection with multple attributes in cognitive radio network. 1-5 - Venkatkumar Venkatasubramanian, Thomas Haustein:

Subchannel allocation for dynamic spectrum access in underlay OFDMA system. 1-6 - Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester:

Computation of high availability connections in multidomain IP-over-WDM networks. 1-6 - Athanasios Christakidis, Nikolaos Efthymiopoulos, Spyros G. Denazis

, Odysseas G. Koufopavlou:
On the architecture and the design of P2P live streaming system schedulers. 1-8 - Marco Pugliese, Luigi Pomante

, Fortunato Santucci
:
Agent-based scalable design of a cross-layer security framework for Wireless Sensor Networks Monitoring Applications. 1-7 - Václav Valenta, Zbynek Fedra, Roman Marsálek

, Geneviève Baudoin, Martine Villegas:
Analysis of spectrum utilization in suburb environment - evaluation of potentials for cognitive radio. 1-6 - Amjad Osmani

, Abolfazl Toroghi Haghighat, Mehdi Kargahi:
FLS: a fuzzy-based location-service in mobile ad-hoc wireless networks. 1-5 - Marjan Naderan Tahan, Mehdi Dehghan

, Hossein Pedram:
Mobile object tracking techniques in wireless sensor networks. 1-8 - Jan Geldmacher, Klaus Hueske

, Jürgen Götze:
An adaptive and complexity reduced decoding algorithm for convolutional codes and its application to digital broadcasting systems. 1-7 - Matthew Stabeler, Davide Cellai, Simon Dobson

, Paddy Nixon:
Delay tolerant networks and spatially detailed human mobility. 1-2 - Hideya Yoshiuchi, Jiping Lv, Satoshi Yoshizawa, Zhisheng Niu:

A repair mechanism for reliable multicast in Integrated Communication and Broadcast Networks. 1-8 - Eugene S. Myakotnykh, Bjarne E. Helvik

:
Analysis of evolution scenarios for end-to-end quality of services provisioning in the internet. 1-5 - Faisal Aslam, Christian Schindelhauer

, Arne Vater:
Improving geometric distance estimation for sensor networks and unit disk graphs. 1-5 - Riccardo Masiero, Giorgio Quer, Michele Rossi, Michele Zorzi:

A Bayesian analysis of Compressive Sensing data recovery in Wireless Sensor Networks. 1-6 - Rajesh M. Bodade, Sanjay N. Talbar

:
Dynamic iris localisation: A novel approach suitable for fake iris detection. 1-5 - Brody Todd, John Doucette:

Demand-wise shared protection network design with dual-failure restorability. 1-6 - Justin P. Rohrer, Ramya Naidu, James P. G. Sterbenz

:
Multipath at the transport layer: An end-to-end resilience mechanism. 1-7 - Gopinath Rao Sinniah, Zeldy Suryady, Usman Sarwar, Mazlan Abbas:

A gateway solution for IPv6 wireless sensor networks. 1-6 - Jakob Salzmann, Ralf Behnke, Jiaxi You, Dirk Timmermann

:
Free-CLASH - improved localization-free clustering in large wireless sensor networks. 1-6 - P. Muthu Kannan, Swaminathan Ramamurthy, V. Palanisamy:

Enhancing WLAN security with sectored antennas. 1-5 - Zaharina Velikova, Julian Schütte

, Nicolai Kuntze:
Towards security in decentralized workflows. 1-6 - Johannes Barnickel, Ulrike Meyer:

SecSyWiSe: A secure time synchronization scheme in wireless sensor networks. 1-8 - Celimuge Wu

, Kazuya Kumekawa, Toshihiko Kato:
A MANET protocol considering link stability and bandwidth efficiency. 1-8 - Mourad Amad

, Zahir Haddad, Lachemi Khenous, Kamal Kabyl:
A scalable based multicast model for P2P Conferencing applications. 1-6 - Roberto Riggio

, Sabrina Sicari:
Secure aggregation in hybrid mesh/sensor networks. 1-6 - Marcelo Portela Sousa, Marcelo Sampaio de Alencar

, Ajey Kumar, Waslon Terllizzie A. Lopes
:
Scalability in an adaptive cooperative system for wireless sensor networks. 1-6 - Gholamreza Baghersalimi

, Mitra Gilasgar
, Alireza Saberkari:
A 2.4GHz 0.18µm-CMOS sub-harmonic mixer for direct-down conversion receivers. 1-5 - Jae-Hoon Roh, Mi-Yeon Kim, Ho-Kun Moon:

An approach to designing lightweight security protocol on binary CDMA sensor networks. 1-6 - Angela Sara Cacciapuoti

, Marcello Caleffi
, Luigi Paura:
A theoretical model for opportunistic routing in ad hoc networks. 1-7 - Morteza Shahriari Nia, Mohsen Khaxar, Seyed Mahdi Rashti, Nasrollah Moghaddam Charkari

:
Discrete Probabilistic DV-Hop: Reengineering high accuracy range-free WSN localization. 1-6 - Vladimir M. Vishnevsky

, Olga V. Semenova, Sergey Shpilev:
Duplex cyclic polling system to serve mixed queues. 1-7 - Feng He, Lenan Wu:

Analysis of power spectrum of continuous phase waveforms for binary modulation communications. 1-5 - Dmitry Petrov, Valery Volchkov:

Orthogonal well-localized Weyl-Heisenberg basis construction and optimization for multicarrier digital communication systems. 1-4 - Prabhakar Mishra, H. N. Shankar, R. Rajeswari, Mudit Mathur, Pai Dipti G.:

A time-power efficient fixed point single purpose processor for mapping using ultrasound sensors. 1-7 - Monish Chatterjee, Abhijit Sharma

, Uma Bhattacharya
:
Congestion optimized routing in unidirectional de Bruijn WDM networks in presence of node faults. 1-6 - Inge Gronbek, Pratik Biswas:

Ontology-based abstractions for M2M virtual nodes and topologies. 1-8 - Vahid Nazari Talooki

, Jonathan Rodriguez
:
Jitter based comparisons for routing protocols in mobile ad hoc networks. 1-6 - Shereen Abd El-Hameed, Hossam El Deen Mostafa Faheem

, Eman Shaaban
, Said Ghoneimy:
Mobility-aware MAC protocol for delay-sensitive wireless sensor networks. 1-8 - Jakub Gladysz, Krzysztof Walkowiak:

Optimization of survivable networks with simultaneous unicast and anycast flows. 1-6 - Shankar Yanamandram, Hamid Shahnasser:

Analysis of DSRC based MAC protocols for VANETs. 1-6 - Adrian Hornsby, Eloi Bail:

µXMPP: Lightweight implementation for low power operating system Contiki. 1-5 - Ali Ghiasian

, Hossein Saidi
:
QoS aware distributed matching algorithm for link scheduling in wireless networks. 1-6 - Silverio Carlo Spinella, Giuseppe Araniti

, Antonio Iera
, Antonella Molinaro:
Integration of Ad-hoc Networks with infrastructured systems for multicast services provisioning. 1-6 - Enzo Baccarelli, Nicola Cordeschi, Mauro Biagi

, Tatiana Patriarca, Valentina Polli:
Closed-form scheduling policies for delay-sensitive traffic over fading channels. 1-8 - Ammar Metnani, Brigitte Jaumard:

Directed p-cycle protection in dynamic WDM networks. 1-6 - Seyed Mahdi Rashti, Mohsen Mollanoori, Morteza Shahriari Nia, Nasrollah Moghaddam Charkari

:
A prediction-based algorithm for target tracking in wireless sensor networks. 1-5 - Hoang Lan Nguyen, Uyen Trang Nguyen:

Bandwidth efficient multicast routing in multi-channel multi-radio wireless mesh networks. 1-8 - Laura Galluccio

, Sergio Palazzo, Corrado Rametta:
On the efficiency and trustworthiness of DHT-based P2P search algorithms in mobile wireless networks. 1-8 - Marco M. Carvalho

, Carlos Perez, Adrian Granados:
Dynamic gateway selection for cross-domain routing with the XLayer communications substrate. 1-6 - Al-Khalid Othman, K. M. Lee, Hushairi Zen, Wan Azlan Wan Zainal Abidin, Mohamad Faizrizwan Mohd Sabri

:
Wireless sensor networks for swift bird farms monitoring. 1-7 - William Liu

, Harsha R. Sirisena, Krzysztof Pawlikowski:
Weighted algebraic connectivity metric for non-uniform traffic in reliable network design. 1-6 - Iraide Unanue, Javier Del Ser

, Pedro J. Sánchez, Jon Casasempere:
H.264/SVC rate-resiliency tradeoff in faulty communications through 802.16e railway networks. 1-6 - Rishvanth Prabakar, Shekhar Rai, Shreya Kumar, Sudheer Sreedhara Krishna, J. P. Raina:

Design and simulation of Optical Frequency Domain reflectometer for short distance fault detection in optical fibers and integrated optical devices using ptolemy-II. 1-3 - Tomasz Gierszewski, Wojciech Molisz:

Towards an ideal network: Survivability issues in selected topologies. 1-6 - András Zahemszky, Somaya Arianfar:

Fast reroute for stateless multicast. 1-6 - Aden Grue, Wayne D. Grover:

UPSR-like p-cycles: A new approach to dual failure protection. 1-6 - Cinara Guellner Ghedini

, Carlos Henrique Costa Ribeiro
:
A framework for vulnerability management in complex networks. 1-8 - Péter Babarczi

, János Tapolcai
, Pin-Han Ho:
Availability-constrained Dedicated Segment Protection in circuit switched mesh networks. 1-6 - Ugo Barchetti, Alberto Bucciero

, Mario De Blasi, Luca Mainetti
, Luigi Patrono
:
Implementation and testing of an EPCglobal-aware Discovery Service for item-level traceability. 1-8 - Adnan Afsar Khan, Costas C. Constantinou

, Ivan Stojmenovic:
Realistic physical layer modelling for georouting protocols in wireless ad-hoc and sensor networks. 1-8 - Eirik Larsen Følstad, Bjarne E. Helvik

:
Managing availability in wireless inter domain access. 1-6 - Dalimir Orfanus, Tales Heimfarth, Flávio Rech Wagner:

Process algebra to model self-organizing behavior in Wireless Sensor Networks. 1-6 - Shengli Yuan, William Waller, Ermelinda DeLaViña:

Heuristic algorithms for finding reliable lightpath under multiple failures. 1-7 - Yasser L. Morgan

:
Accurate positioning using Short-Range Communications. 1-7 - Marco Di Renzo, Laura Imbriglio, Fabio Graziosi

, Fortunato Santucci
:
Second-order statistics of Amplify-and-Forward multi-hop wireless networks: A framework for computing the end-to-end SNR auto-correlation function over Log-Normal shadowing channels. 1-6 - Ian Wells, Adam Davies, Xianhui Che

, Paul Kear, Gordon Dickers, Xiaochun Gong, Mark Rhodes:
Node pattern simulation of an undersea sensor network using RF electromagnetic communications. 1-4 - Esteban Guerrero, Huagang Xiong, Qiang Gao, Gabriel Cova, Ricardo Ricardo, Jose C. Estevez Losada:

ADAL: A distributed range-free localization algorithm based on a mobile beacon for wireless sensor networks. 1-7 - K. S. Sreedevi, R. Vinodkumar, A. P. Detty, S. R. Detty, I. Navas, V. P. Mahadevan Pillai:

Laser ablated nanostructured tin oxide thin films for optoelectronic device applications. 1-5 - Tapio Heikkilä

, Jari Rehu, Marko Korkalainen, Kalle Maatta, Vesa Pentikäinen:
Location aware multihop Wireless Sensor Network. 1-7 - Xiaojun Wen, David I. Laurenson

:
A resource allocation algorithm for cluster-based cooperative MIMO in Wireless Sensor Networks. 1-6 - Michael P. McGarry, Rami J. Haddad

, John McAlarney:
A new approach to video bandwidth prediction. 1-5 - Masatoshi Kawarasaki, Kei Suzuki:

Performance evaluation of cooperative peer selection methods for P2P Video-on-Demand. 1-6 - S. R. Chalana, R. Vinodkumar, A. P. Detty, I. Navas, K. S. Sreedevi, V. P. Mahadevan Pillai:

Laser ablated nanostructured zinc sulphide thin films for optoelectronics device applications. 1-6 - Mohammad Chiniforoushan, Mahmoud Ahmadian:

Joint source-channel coding using typicality of sequences. 1-8 - Aleksandra S. Panajotovic

, Mihajlo C. Stefanovic, Dragan Lj. Draca, Ivana M. Petrovic:
Effects of Rayleigh cochannel interference on switch and stay diversity system over correlated Rician fading channels. 1-6 - John Strassner, James Won-Ki Hong, Sven van der Meer

:
The design of an Autonomic Element for managing emerging networks and services. 1-8 - Edilayne Meneses Salgueiro

, Paulo Roberto Freire Cunha
, Paulo Romero Martins Maciel, José Augusto Suruagy Monteiro
, Ricardo J. P. de B. Salgueiro:
Defining bandwidth constraints with cooperative games. 1-8 - Vigneswara Rao

, Mohd Riduan Ahmad
, Mohamad Kadim Haji Suaidi, Muhammad Syahrir Johal, Eryk Dutkiewicz
:
Concurrent MAC with Short Signaling for multi-hop Wireless Mesh Networks. 1-7 - Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee

:
An efficient energy aware routing protocol for real time traffic in wireless sensor networks. 1-9 - Christian Bettinger, Rainer Oechsle, Markus Esch, Hermann Schloss, Peter Sturm:

Evaluation of P2P overlays for AoI management in Distributed Virtual Environments. 1-6 - Alberto Vigato, Nevio Benvenuto, Stefano Tomasin

, Lorenzo Vangelista
:
On hard and soft detection of space-time block codes by a novel soft output sphere decoder. 1-5 - Shijun Huang, Kai Chen, Chao Liu, Alei Liang, Haibing Guan:

A statistical-feature-based approach to internet traffic classification using Machine Learning. 1-6 - Gaurav Kumar Srivastava, Rajan Vaish, Rahul Vaish:

Innovative and secured user Authentication Methods for novice Visually Impaired users. 1-6 - Arnab Bhattacharya, Sudheer Sreedhara Krishna, Balaji Srinivasan

, Shubhadip Dasgupta:
Implementation of a low cost short-haul optical wireless link. 1-4 - Ihsan Ul Haq, Khawaja M. Yahya, James M. Irvine

, Raziq Yaqub
, Tariq M. Jadoon
:
Seamless handoff based on Network Discovery for Future Heterogeneous Mobile Networks. 1-6 - Wojciech Bober, Chris J. Bleakley

:
Bailigh: Low power cross-layer data gathering protocol for Wireless Sensor Networks. 1-7 - Desislava C. Dimitrova, Hans van den Berg, Geert J. Heijenk

:
Performance of relay-enabled uplink in cellular networks - a flow level analysis. 1-8 - Pasquale Gurzi, Walter Colitti, Kris Steenhaut, Ann Nowé:

Maximum flow based Routing and Wavelength Assignment in all-optical networks. 1-6 - Gbenga Salami, Rahim Tafazolli

:
A two stage genetically inspired algorithm for spectrum sharing between two UMTS operators. 1-7 - Syed Zubair Ahmad, Muhammad Abdul Qadir

, Mohammad Saeed Akbar:
QoS optimization of in-elastic flows stripped over multiple asymmetric channels in mobile networks. 1-6 - Abdallah Jarray, Brigitte Jaumard, Alain C. Houle:

Minimum CAPEX/OPEX design of optical backbone networks. 1-8 - Chiara Buratti, Alberto Zanella

:
The impact of channel reuse on the performance of multi-hop virtual MIMO systems. 1-8 - Hiroshi Fujinoki:

Analysis on ideal network structures to improve reliability by multi-path and multi-homing BGP routing in the Internet. 1-6 - Bassem Zayen, Aawatif Hayar

, Hamza Debbabi, Hichem Besbes:
Application of smoothed estimators in spectrum sensing technique based on model selection. 1-4 - Chia-Hsiang Chang, Chih-Hsun Chou, Cheng-Jung Lin, Ming-Da Lee:

A WAVE/DSRC-based intersection collision warning system. 1-6 - Alisson Barbosa de Souza

, Ana Luiza Bessa Barros, Antônio Sérgio de S. Vieira, Jéssyca Alencar L. e Silva, Joaquim Celestino Júnior:
Survivability on optical networks: Protecting the protection. 1-8 - Claudio E. Palazzi

, Nicola Stievano, Marco Roccetti
:
A smart access point solution for heterogeneous flows. 1-7 - Pavel Krömer

, Václav Snásel, Jan Platos
, Nabil Ouddane:
On turbo code interleavers optimized by bit error rate evolution and free distance evolution. 1-6 - Paola Salomoni, Ludovico Antonio Muratori, Silvia Mirri

, Francesco Pozzi:
Hacking Nintendo Wii to paint virtual graffiti. 1-6 - Nuno Vasco Lopes

, Maria João Nicolau
, Alexandre J. T. Santos
:
QoS-aware architecture for FHMIP micromobility. 1-8 - Alexander V. Shafarenko, Michael P. Fedoruk, Anton Skidin, Sergei K. Turitsyn

:
Efficient weakly-constrained codes for mitigation of patterning effects in Digital Communications. 1-6 - Roya E. Rezagah, Abbas Mohammadi

:
Analyzing the capacity of wireless ad hoc networks with rate adaptation capability. 1-7 - Beomgu Kang, Eunjo Lee, Sungkwon Park:

Popularity-based partial caching management scheme for streaming multimedia on proxy servers over IP networks. 1-7 - Stanislav A. Filin, Hiroshi Harada

, Homare Murakami, Kentaro Ishizu, Goh Miyamoto:
IEEE 1900.4 WG on architecture and enablers for optimized radio & spectrum resource usage. 1-8 - Mi-Young Kang, Ji-Seung Nam:

The study of overlay multicast based Internet broadcasting in parallel media stream server. 1-3 - Muhammad Umer Farooq

, Muddassir Asif, Naeem Zafar Azeemi
:
Performance evaluation of multiple access protocols for RFID testbed environment. 1-7 - Laura Imbriglio, Fabio Graziosi

:
DSVCA: A novel distributed clustering algorithm for Wireless Sensor Networks based on statistical data correlation. 1-6 - Yoshitaka Takahashi, Yoshiaki Shikata, Andreas Frey:

A single-server queueing system with modified service mechanism. 1-6 - T. Sundararajan, V. Nagarajan:

Metro optical Ethernet technologies with modified OAM&P features. 1-8 - Hans-Peter Löb, Christian Liß, Ulrich Rückert, Christian Sauer:

UMAC - A Universal MAC architecture for heterogeneous home networks. 1-6 - Rob Brennan

, Wei Tai, Declan O'Sullivan
, Muhammad Sohaib Aslam, Susan Rea
, Dirk Pesch
:
Open Framework Middleware for intelligent WSN topology adaption in smart buildings. 1-7 - Ángela Hernández-Solana

, Israel Guío, Antonio Valdovinos:
Downlink scheduling for intercell interference fluctuation mitigation in partial-loaded broadband cellular OFDMA systems. 1-6 - Loïc Baud, Patrick Bellot:

ROSA: A step torwards a global virtual network. 1-6 - Eliska Ochodkova, Jiri Dvorský, Václav Snásel, Ajith Abraham:

Testing the properties of large quasigroups. 1-7 - Gianni Fenu

, Gary Steri
:
Two methods for body parameter analysis using Body Sensor Networks. 1-5 - Norulhusna Binti Ahmad

, Sharifah Kamilah Syed Yusof
, Norsheila Fisal:
Single parity check product code in MB-OFDM ultra wideband system. 1-5 - Theofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos:

Empirical calculation of shadowing deviation for complex indoor propagation topologies at 2.4 GHz. 1-6 - Stephan Krause:

Coping with hotspots: AoI adaption strategies for P2P Networked Virtual Environments. 1-6 - Saeed Mirshams, Kamal Jamshidi, Ali Bohlooli

, Abbas Dehghani
:
Data reduction using clustering method in wireless sensor network. 1-8 - Jesus Alonso-Zarate

, Elli Kartsakli
, Angelos Antonopoulos
, Luis Alonso, Christos V. Verikoukis:
Handoff functions for a Distributed Queuing Collision Avoidance Medium Access Control protocol for Wireless LANs. 1-5 - Dmitry Petrov, Yury Tatarinov:

Data migration in the scalable storage cloud. 1-4 - Ki-Won Yeom, Ji-Hyung Park:

Bio-inspired self-organizing architecture for distributed components. 1-8 - Luca Muscariello, Diego Perino, Bruno Nardelli:

Towards real implementations of dynamic robust routing exploiting path diversity. 1-6 - Andrej Mihailovic

, Ioannis P. Chochliouros, Evangelia Georgiadou, Anastasia S. Spiliopoulou, Evangelos Sfakianakis, Maria Belesioti, Gérard Nguengang, Julien Borgel, Nancy Alonistioti:
Situation awareness mechanisms for cognitive networks. 1-6 - MohammadAli Mohammadi

, Mehrdad Ardebilipour, Zahra Mobini:
Relay selection for multiuser MIMO amplify-and-forward relaying systems. 1-6 - S. G. Yew, Chong Eng Tan

:
Effective PRCs positioning for PAPR reduction using PRCs in OFDM systems. 1-5 - Salvatore F. Pileggi

:
A multi-domain framework for Wireless Vehicular Sensor Network. 1-8 - Philipp Hurni, Torsten Braun

:
On the adaptivity of today's Energy-Efficient MAC protocols under varying traffic conditions. 1-8 - Rajesh Joseph, Samuel Varghese, Suresh K. Nair, M. Sreeja:

Effect of ring parameters on wavelength characteristics of erbium fiber lasers. 1-4 - ArunKumar Jayaprakasam, Vinod Sharma:

Cooperative robust sequential detection algorithms for Spectrum Sensing in Cognitive Radio. 1-8 - S. R. Radhakrishnan, M. Satyanarayana, V. Krishnakumar, V. P. Mahadevan Pillai, K. Raghunath:

Lidar measurements on aerosol characteristics at the tropical stations Trivandrum (8.33degree N, 77degree E) and Gadanki (13.5degree N, 79.2degree E). 1-4 - Fabio Dellutri, Vittorio Ottaviani, Daniele Bocci, Giuseppe F. Italiano

, Gianluigi Me
:
Data reverse engineering on a smartphone. 1-8 - Ciro D'Apice

, Rosanna Manzo
, Alexander Pechinkin, Sergey Shorgin
:
Queueing network with negative customers and the route change. 1-5 - Rajat Garg, Nadarajan Shriram, Vikrant Gupta, Vineet Agrawal:

A biometric security based electronic gadget control using hand gestures. 1-8 - Apivadee Piyatumrong

, Pascal Bouvry
, Frédéric Guinand
, Kittichai Lavangnananda:
A study of token traversal strategies on tree-based backbones for mobile ad hoc - delay tolerant networks. 1-8 - Samer Sulaiman, Abdelfatteh Haidine, Ralf Lehnert:

Performance evaluation of center search algorithms used for dynamic rendezvous-point relocation. 1-8 - Yimeng Yang, Geert J. Heijenk

, Boudewijn R. Haverkort
:
Adaptive resource control in 2-hop ad-hoc networks. 1-9 - K. Kochunarayanan, V. Krishnakumar, Abishek J. Perekkatt, V. P. Mahadevan Pillai, Avinash Kumar Jha, S. K. Sudheer:

Study of gratings recorded in different holographic recording media for real-time holographic fingerprint sensor. 1-4 - V. Krishnakumar, M. Satyanarayana, V. P. Mahadevan Pillai, S. R. Radhakrishnan, K. Raghunath:

Optical properties of cirrus clouds during monsoon over Indian subcontinent. 1-5 - Sajan Ambadiyil, V. P. Mahadevan Pillai, V. Praveen, K. G. Jayan, S. K. Sudheer:

Holographic Registration Plates with GPRS (HRPG) network for sea-going vessels to augment the coastal security. 1-4 - Mounir Boussedjra, Joseph Mouzna, Pradeep Bangera, M. M. Manohara Pai:

Map-Based Location Service for VANET. 1-6 - Alakshendra Tripathi, Nilanjan Guha, Amit Poddar, Nitesh Kumar:

Intelligent coding scheme for wireless image transmission over noisy channels. 1-7 - Anh Tuan Nguyen, Frank Eliassen:

An efficient solution for max-min fair rate allocation in P2P simulation. 1-5 - Nitin Munjal, Rajat Moona:

Secure and cost effective transaction model for financial services. 1-6 - M. Abdul Rahiman, M. S. Rajasree:

OCR for Malayalam script using neural networks. 1-6 - Alessandro Amoroso, Luca Gandolfi, Simone Grassilli, Marco Roccetti

:
FROV: a distributed broadcast protocol for VANET experimental results. 1-8 - Rajat Garg, Vikrant Gupta, Vineet Agrawal:

Efficient iris recognition method for identification. 1-6 - María Elisa Bertinat, Darío Padula, Franco Robledo Amoza, Pablo Romero

, Daniel De Vera, Pablo Rodríguez-Bocca
, Gerardo Rubino:
A COP for cooperation in a P2P streaming protocol. 1-7 - V. Suresh, H. V. Shashidhara, C. E. Veni Madhavan:

A perturbative resampling approach to image steganalysis. 1-7 - Francisco Rubio, Dongning Guo, Michael L. Honig, Xavier Mestre:

Large system analysis of beamforming for MIMO systems with limited training. 1-6 - Alberto Diez Albaladejo, Fabricio Carvalho de Gouveia, Irina Boldea, Thomas Magedanz:

Unified policy management in Next Generation Networks. 1-8 - Alexey Anisimov, Sergey D. Andreev

, Andrey M. Turlikov
:
IEEE 802.16m energy-efficient sleep mode operation analysis with mean delay restriction. 1-4 - Edvin Skaljo

, Mujo Hodzic, Ismet Bektas:
Migration from G(E)PON to NGPON. 1-4 - Josephine Antoniou

, Christophoros Christophorou, Christophe Janneteau, Mounir Kellil, Susana Sargento
, Augusto Neto
, Filipe Cabral Pinto, Nuno Filipe Carapeto, Jose Simoes:
Architecture for context-aware multiparty delivery in mobile heterogeneous networks. 1-6 - Pejman Khadivi, Tahere Nodehi, Hossein Saidi

:
Limited forwarding capability in wireless networks with relaying. 1-6 - Shahkar Kakakhail, Sylvain Reynal

, David Declercq, Vincent Heinrich:
An efficient pseudo-codeword search algorithm for Belief Propagation decoding of LDPC codes. 1-5 - Gely Basharin

, Sergey Nikolaevich Klapoushak, Abel Konnon
:
Analytical model of cell supporting dual rate speech codec. 1-6 - Sabina Rossi, Damiano Macedonio:

Information flow security for service compositions. 1-8 - Tomas Fryza

, Jan Prokopec:
Experimental application of channel coding for wireless transmission of compressed video data. 1-4 - Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu:

Traffic performance for a time-out scheme communication system. 1-6 - Lingyan Wang, Shaoen Wu:

Protecting location privacy through Identity Diffusion. 1-4 - Pedro Paulo F. Barcelos

, Maxwell E. Monteiro, Ricardo Simões, Anilton Salles Garcia, Marcelo Eduardo Vieira Segatto:
OOTN -an ontology proposal for optical transport networks. 1-7 - Aravind Kota Gopalakrishna

, Tapas Chakravarty, M. Girish Chandra, P. Balamuralidhar:
On the architecture of vehicle tracking system using wireless sensor devices. 1-5 - Pablo Beltrán Pellicer

, Andrea Blanco Redondo, Francisco Cortés, Amador Pozo Espinosa:
All-optical transport layer and GPON access for immersive communications. 1-5 - Andrea Blanco Redondo, Pablo Beltrán Pellicer

, Joseba Zubía Zaballa:
Enabling technologies for future all-optical packet switched networks. 1-6 - Souad Zid, Ridha Bouallegue

:
Low-complexity PAPR reduction schemes using SLM and PTS approaches for interleaved OFDMA. 1-5 - Christos Liaskos

, Sophia G. Petridou
, Georgios I. Papadimitriou:
A new approach to the design of wireless data broadcasting systems: An analysis-based cost-effective scheme. 1-8 - Ralph Hänsel, Erika Müller:

Improved reconstruction for distributed video coding. 1-5 - Luca Muscariello, Diego Perino:

Evaluating the performance of multi-path routing and congestion control in presence of network resource management. 1-8 - Jan Rudinsky:

Private ENUM based number portability administrative system evaluation. 1-7 - Paolo Giacomazzi, Alessandro Poli:

Rewarding techniques in peer-to-peer video streaming systems with tree and forest topology. 1-8 - Adam Flizikowski

, Rafal Kozik
, Mateusz Majewski, Marcin Przybyszewski:
Evaluation of guard channel admission control schemes for IEEE 802.16 with integrated nb-LDPC codes. 1-8 - Phillippa Rosa Wilson, Vitalis G. Ozianyi, Neco Ventura

:
Monetizing IMS-based IPTV through personalized advertising. 1-7 - Sandy Rahme, Yann Labit, Frédéric Gouaisbaut:

An unknown input sliding observer for anomaly detection in TCP/IP networks. 1-7 - Theodora Karveli, Konstantinos Voulgaris, Mohammad Ghavami

, A. Hamid Aghvami:
DiS-MAC: A MAC protocol for sensor networks used for roadside and highway monitoring. 1-6 - Giuseppe Minutoli, Maria Fazio

, Maurizio Paone, Antonio Puliafito
:
Virtual business networks with Cloud Computing and virtual machines. 1-6 - Mikhail Luzgachev, Konstantin E. Samouylov

:
On the resource allocation problem for a multiservice network link with unicast and multicast connections. 1-3 - Dario Deponti, Dario Maggiorini

, Claudio E. Palazzi
:
DroidGlove: An android-based application for wrist rehabilitation. 1-7 - Fabian Hartmann, Bernhard Heep:

Coordinate-based routing: Refining nodeIds in structured peer-to-peer systems. 1-6 - Fernando López Aguilar

, Gorka Rubio Cidre
, Javier Regidor Paris:
Effective SNR mapping algorithms for link prediction model in 802.16e. 1-6 - Lu Wei

, Olav Tirkkonen
:
Approximation to the condition number distribution of almost square matrices. 1-5 - Gholam Hossein Ekbatani Fard

, Mohammad Hossien Yaghmaee Moghaddam
, Reza Monsefi
:
An adaptive Cross-Layer multichannel QoS-MAC protocol for cluster based wireless multimedia sensor networks. 1-6 - Yao Li, Beixing Deng, Xuan Zhang, Rui Wang, Xing Li:

An empirical study on Embeddable Overlay Networks. 1-6 - Michael Pitman, Neco Ventura

:
The use of resource list servers in IMS presence for developing networks. 1-7 - Jianguo Ding

, Ilangko Balasingham, Pascal Bouvry
:
Management challenges for emerging networks and services. 1-8 - Bessie Malila

, Neco Ventura
:
An evaluation of the QoS capabilities of a NGN test-bed. 1-6 - Panagiotis Tsiakas

, Avner Dor, Konstantinos N. Voudouris, Marios G. Hadjinicolaou:
Load balancing in limited intra-cell interference (LICI) networks based on maximum graph-flow algorithms. 1-5 - Andrey Koucheryavy

, Ahmed Abd Elftah Salim:
Cluster-based perimeter-coverage technique for heterogeneous wireless sensor networks. 1-7 - Jorge R. Gomez-Montalvo

, Ernesto Exposito
, Myriam Lamolle
:
Towards user-centric configuration and deployment of multimedia services: A semantic framework. 1-7 - Anton Prokopenko, Yevgeny Ryannel, Sergey Berezin:

Aspects of bandwidth scheduling in WiMAX subscriber station. 1-8 - Carlo Caini

, Piero Cornice, Rosario Firrincieli, Marco Livini:
DTNperf2: A performance evaluation tool for Delay/Disruption Tolerant Networking. 1-6 - Keoikantse O. A. Marungwana, Lesang Dikgole, Neco Ventura

:
An efficient community-centric IPTV deployment model for developing regions. 1-6 - Rohit Verma, Ankit Dev:

Vision based hand gesture recognition using finite state machines and fuzzy logic. 1-6 - Bhakthavathsalam Ramaswamy, Starakjeet Nayak, Murthy G. Srikumar:

Expediency of penetration ratio and evaluation of mean throughput for safety and commercial applications in VANETs. 1-5 - Chengbo Dong, Guodong Wang, Xuan Zhang, Beixing Deng, Jia Liu, Xing Li:

Two-layer network coordinate system for Internet distance prediction. 1-6 - Fatma Hrizi, Fethi Filali

:
On congestion-aware broadcasting in V2X networks. 1-8 - Takahiko Yamada, Phan Thanh Hoa:

High-speed infrastructure cellular network for vehicular users. 1-5 - Rajat Garg, Vikrant Gupta, Vineet Agrawal:

A Drowsy Driver Detection and security system. 1-8 - Andreas Lehner, Cristina Rico Garcia, Eugen Wige, Thomas Strang:

A multi-broadcast communication system for high dynamic vehicular ad-hoc networks. 1-6 - Xianhui Che

, Ian Wells:
A selective-abstraction modeling approach for simplifying computer network studies. 1-4 - Cagdas Atici, M. Oguz Sunay:

On the broadcast capacity of wireless multihop interference networks. 1-6 - Christian Mannweiler, Andreas Klein, Jörg Schneider, Hans D. Schotten:

Exploiting user and network context for intelligent radio network access. 1-6 - Claudia Barberis, Giovanni Malnati:

Epidemic information diffusion in realistic vehicular network mobility scenarios. 1-8 - Anh-Minh Nguyen, Noël Crespi:

SOCIAL-DTN: Why Social Networking Services is more fruitful to Mobile Delay-Tolerant Networks? 1-2 - Boris Moltchanov, Michael Knappmeyer, Omri Fuchs, Elio Paschetta:

Context management and reasoning for adaptive service provisioning. 1-6 - Muhammad Akram, Naeem Ramzan

, Ebroul Izquierdo:
Efficient motion estimation for video coding in wireless surveillance applications. 1-4 - Shuntaro Matsubara, Ryohei Suzuki, Masayuki Iwai, Kaoru Sezaki:

Optimizing movement of mobile robot considering motor characteristics in disruption tolerant sensor networks. 1-6 - Norazizah Mohd Aripin, Rozeha A. Rashid

, Norsheila Fisal, Sharifah Kamilah Syed Yusof
:
Evaluation of required sensing time for multimedia transmission over cognitive Ultra Wideband system. 1-5 - David Gutiérrez-Pérez, Eduardo del Arco-Fernández-Cano

, Mark Richard Wilby, Julio Ramiro-Bargueno
, Juan José Vinagre-Díaz
, Antonio J. Caamaño
, Javier Ramos
:
HEAVEN - A hybrid emulating architecture for vehicular networks. 1-6 - Satoru Tokuhisa

:
Aequorin: Design of a system for reduction of the user's stress in one day. 1-6 - Pedro Gonçalves

, Carlos Figueira, Ricardo Azevedo, Rui L. Aguiar
, José Luís Oliveira
:
A graphical user interface for policy composition in CIM-SPL. 1-7 - Tapfuma Mvere, Neco Ventura

:
Mobility in the IP multimedia subsystem: Network centric mobility vs. device centric mobility. 1-5 - Arnaud Kaiser, Nadjib Achir, Khaled Boussetta:

Multiplayer games over wireless ad hoc networks: Energy and delay analysis. 1-7 - Mingzhong Xiao, Xiangzhen Kong, Junfei Liu, Ju Ning:

TMBF: Bloom filter algorithms of time-dependent multi bit-strings for incremental set. 1-4 - Dmitry Efrosinin

, Olga V. Semenova:
Optimal control of M/M/1 queueing system with constant retrial rate and non-reliable removable server. 1-6 - Wei Lu, Yuanlv Bao, Xiaoyan Sun, Zhe Wang:

Performance evaluation of inter-vehicle communication in a unidirectional dynamic traffic flow with shockwave. 1-6 - Khaleel Ur Rahman Khan

, M. Ehthesham, M. Kumar, Rafi U. Zaman
:
An effective gateway discovery mechanism in an integrated Internet-MANET (IIM). 1-7 - Stavroula Vassaki, Athanasios D. Panagopoulos

, Philip Constantinou:
Bandwidth allocation in wireless access networks: Bankruptcy game vs cooperative game. 1-4 - Yinghua Cui, Yuping Zhao:

A modified Q-parameter anti-collision scheme for RFID systems. 1-4 - Syed Rehan Afzal, Christophe Huygens

, Wouter Joosen:
Extending middleware frameworks for Wireless Sensor Networks. 1-7 - Salih M. Salih:

Two-dimensional wavelet transform model for MC-CDMA. 1-5 - Milan Simek, Dan Komosny, Radim Burget, Patrik Moravek, Ricardo M. Silva:

Centralized boundary discovery algorithms for anchor-free localization in wireless sensor networks. 1-7 - Mattia Monga

, Sabrina Sicari:
Assessing data quality by a cross-layer approach. 1-8 - Ganesh Shanbhag, T. Srinivas:

Accurate LIDAR beam formation through optical waveguide true time delays. 1-6 - Ganesh Shanbhag, T. Srinivas:

Design of terabyte optical wide area LAN with optimization of a network component-optical splitter. 1-6 - Anis Ouali, Brigitte Kerhervé, Brigitte Jaumard:

Toward new peering strategies for push-pull based P2P streaming systems. 1-8 - Jan Thomsen, Yves Vanrompay, Yolande Berbers:

Evolution of context-aware user profiles. 1-6 - Xin He, Frank Y. Li:

Cooperative RTS/CTS MAC with relay selection in distributed wireless networks. 1-8 - Chih-Sung Chen, Chia-Hui Wang

, Haw-Yun Shin, Wu-Hsiao Hsu:
Load-sharing overlay network design for ubiquitous video surveillance services. 1-7 - Mahmut Yalçin, Aydin Akan

, Hakan Dogan:
Channel estimation for OFDM systems with high mobility fading channels. 1-6 - Xiaoyan Xu, Yong Shang, Haige Xiang:

Expanded Time-Frequency OFDM and its interference suppression techniques. 1-5 - Adnan Nadeem, Michael P. Howarth:

A generalized intrusion detection & prevention mechanism for securing MANETs. 1-6 - Jun Peng, Yanfen Fan, Fu Jiang, Xiaoyong Zhang, Kuo-Chi Lin:

Communication scheme in trusted sensor network. 1-5 - Chi-Sheng Lin, Che-Kang Sun, Jia-Chin Lin, Bo-Chiuan Chen:

Performance evaluations of channel estimations in IEEE 802.11p environments. 1-5 - Ahmed Riadh Rebai, Hussein M. Alnuweiri, Saïd Hanafi:

A novel prevent-scan Handoff technique for IEEE 802.11 WLANs. 1-5 - Gaurav Kumar Srivastava, Rohit Verma, Ruchika Mahrishi, Siddavatam Rajesh

:
A novel wavelet edge detection algorithm for noisy images. 1-8 - Hongwei Zhou, Pei Xiao, Colin Cowan:

Robust adaptive multiuser detection for CDMA frequency-selective fading channels. 1-6 - Zoltán Horváth, Dávid Varga:

Elimination of RLAN interference on weather radars by channel allocation in 5 GHz band. 1-6 - Changqing Luo

, F. Richard Yu
, Hong Ji, Victor C. M. Leung
:
TCP-aware cross-layer design in cognitive radio networks. 1-5 - Stylianos Dimitriou, Vassilis Tsaoussidis

:
Effective buffer and storage management in DTN nodes. 1-3 - Paolo Baracca, Stefano Tomasin

, Lorenzo Vangelista
, Nevio Benvenuto, Alberto Morello:
Per sub-block equalization and channel estimation for next generation handheld DVB. 1-6 - Maria João Barros, Halid Hrasnica

, Spyridon L. Tompros, Michael Caragiozidis:
AIM architecture evaluation and validation testbed. 1-5 - Pranav Agrawal, Joy Kuri:

Key distribution scheme without deployment knowledge. 1-8 - Vinay Joseph

, Vinod Sharma, Utpal Mukherji, Manjunath Kashyap:
Joint power control, scheduling and routing for multicast in multihop energy harvesting sensor networks. 1-8 - Vivek Kumar Sehgal

, Shilpy Arora, Sahil Jain, Shantanu Agarwal, Ujjawal Khandelwal, Karan Jain:
Parameteric coding of speech signals. 1-5 - Ivan Zaryadov

:
Queueing systems with general renovation. 1-4 - Nejla Essaddi

, Mohamed Hamdi, Noureddine Boudriga:
Efficient coverage criterion for accurate target tracking using cooperative wireless sensor networks. 1-8 - Yongmin Liu, Rong Ke Liu:

Refining fusion of side information for transform domain Distributed Multiview Video Coding. 1-5 - M'hamed Chammem, Mohamed Hamdi, Noureddine Boudriga:

A platform for secure multi-service vehicular communication. 1-6 - Gennaro Cordasco

, Rosario De Chiara, Ugo Erra
, Vittorio Scarano
:
Some considerations on the design of a P2P infrastructure for massive simulations. 1-7 - Rehoboam Radzokota, Eugene Golovins, Neco Ventura

:
Linear detector performance in ill-conditioned MIMO OFDM channel. 1-7 - Slim Rekhis

, Noureddine Boudriga:
Pattern-based digital investigation of x-hole attacks in wireless adhoc and sensor networks. 1-8 - Roberto Rigolin Ferreira Lopes

, Roberto Sadao Yokoyama, Bruno Yuji Lino Kimura, Pravin Pawar, Bert-Jan van Beijnum, Edson dos Santos Moreira:
Exploring user's habits and virtual communities to improve IP-connectivity management. 1-6 - Jean-Paul Kouma, Haibo Li:

Large-scale face images retrieval: A distribution coding approach. 1-6 - Gennaro Boggia, Pietro Camarda, Claudia Cormio, Luigi Alfredo Grieco:

A multichannel collision free MAC protocol for wireless ad hoc networks. 1-8 - Xin Huang, Anna Ukhanova, Eugeniy Belyaev, Søren Forchhammer

:
Temporal scalability comparison of the H.264/SVC and distributed video codec. 1-6 - Ciro D'Apice

, Olga Galaktionova, Yury Khokhlov, Oksana Sidorova:
New model of nonhomogeneous traffic. 1-3 - Michele Albano

, Laura Ricci
, Luca Genovali:
Hierarchical p2p overlays for DVE: An Additively Weighted Voronoi based approach. 1-8 - Ruqaiya Al-Badi, Maha Al-Riyami, Nasser Alzeidi:

A parameterized NoC simulator using OMNet++. 1-7 - Walter Colitti, Kris Steenhaut, Bart Lemmens, Joris Borms:

Simulation tool for Wireless Sensor Network constellations in space. 1-5 - Rajendrakumar A. Patil

, Prasanna Chaporkar, Abhay Karandikar:
Diversity combining and packet size adaptation for maximizing throughput of ARQ protocols in AWGN and fading channel. 1-7 - Muhammad Kamran Khan, Ahmad Ali Tabassam, Farhan Azmat Ali:

Simulation analysis of Bluetooth Piconets self-disturbance in industrial applications: A case study. 1-8 - Ramachandra Budihal, Hirisave S. Jamadagni:

Hybrid approach to Cognitive radio test bed. 1-7 - Markus Gerald Konrad, Wolfgang H. Gerstacker, Wolfgang Koch:

Robust MBSFN transmission using the Golden code. 1-6 - Wassim Ramadan, Eugen Dedu, Julien Bourgeois

:
EcnLD, ECN loss differentiation to optimize the performance of transport protocols on wireless networks. 1-6 - Abbass Marouni, Youssef Nasser

, Maryline Hélard, Haidar El-Mokdad:
A cross-layer design approach in cooperative OFDM systems: Application to mobile cell-border situation. 1-6 - Carlos A. Gutiérrez-Díaz-de-León

, Matthias Pätzold
:
The Riemann sum method for the design of sum-of-cisoids simulators for Rayleigh fading channels in non-isotropic scattering environments. 1-5 - Tsang-Ling Sheu, Bing-Chi Kuo:

An analytical model of proportional bandwidth adjustment for a two-tier hierarchical NEMO system. 1-6 - Christos Tranoris

, Spyros G. Denazis
, Anastasius Gavras
:
A workflow on the dynamic composition and distribution of orchestration for testbed provisioning. 1-6 - George Tsiropoulos, Dimitrios Stratogiannis, John D. Kanellopoulos, Panayotis G. Cottis:

Fairness optimization of thinning Call Admission Control in wireless networks. 1-6 - Elena Tsomko, Hyoung Joong Kim, Ebroul Izquierdo, Valia Guerra-Ones:

A spectral technique for image clustering. 1-5 - Dimitrios Stratogiannis, George Tsiropoulos, John D. Kanellopoulos, Panayotis G. Cottis:

Price bargaining integration with dynamic Call Admission Control in wireless multiservice networks. 1-6 - Natarajan Meghanathan

, Thomas DeMarcus, Ebony Addison:
Multicast extensions to the Flow-Oriented Routing Protocol and Node Velocity-based Stable Path Routing Protocol for Mobile Ad hoc Networks. 1-6 - Sultan Aldirmaz, Asli Birol, Ibrahim Demirdogen, Hüseyin Arslan

, Lutfiye Durak
:
On suitability of PSD method for opportunity detection in OFDM(A) based cognitive radio systems. 1-5 - Antonia Masucci, Øyvind Ryan, Sheng Yang, Mérouane Debbah:

Finite dimensional statistical inference. 1-6 - Amir Hossein Mohajerzadeh, Mohammad Hossein Yaghmaee

, Hadi Sadoghi Yazdi, Abbas Ali Rezaee
:
A fair routing protocol using generic utility based approach in Wireless Sensor Networks. 1-4 - Ahmet Cagatay Talay, Deniz Turgay Altilar

:
ROPCORN: Routing protocol for cognitive radio ad hoc networks. 1-6 - Sundar Gopalakrishnan, Guttorm Sindre

:
A revised taxonomy of mobility-related requirements. 1-7 - Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li:

Experimental study on neighbor selection policy for Phoenix Network Coordinate system. 1-5 - Marco Chiani

, Moe Z. Win
, Hyundong Shin:
Further results on MIMO networks based on the distribution of the eigenvalues of arbitrarily correlated Wishart matrices. 1-6 - Massimiliano de Leoni

, Massimo Mecella
, Paolo Manfre, Junio Valerio Franchi, Daniele Graziano:
Disconnection prediction in mobile P2P networks using publish/subscribe. 1-8 - Emanuele Carlini

, Massimo Coppola, Patrizio Dazzi
, Domenico Laforenza, Susanna Martinelli, Laura Ricci
:
Service and Resource Discovery supports over P2P overlays. 1-8 - Matteo Mordacchini

, Patrizio Dazzi
, Gabriele Tolomei
, Ranieri Baraglia, Fabrizio Silvestri
, Salvatore Orlando
:
Challenges in designing an interest-based distributed aggregation of users in P2P systems. 1-8 - Chang-Hua Wu, Shun-Yun Hu, Li-Ming Tseng:

Discovery of Physical Neighbors for P2P 3D streaming. 1-6 - Masahide Sugiyama, Konstantin Markov, Andrey Ronzhin

, Victor Budkov
, Alexey Karpov
, Maria Prischepa:
Speech activity and speaker novelty detection methods for meeting processing. 1-6 - Petr Aksenov, Kris Luyten, Karin Coninx:

Coping with variability of location sensing in large-scale ubicomp environments. 1-5 - Brian J. d'Auriol

, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee:
Visualizations of human activities in sensor-enabled ubiquitous environments. 1-6 - Chih-Chao Wen, Cheng-Shong Wu, Wu-Shian Lee, Hui-Kai Su:

A context-aware handoff scheme and all-ip mobile multicast service for heterogeneous wireless networks. 1-7 - Katarina Stanoevska-Slabeva, Thomas Wozniak, Isabella Hoffend, Jana Ebermann:

Towards a concept for inclusion of social network information as context information. 1-5 - Ralf Behnke, Jakob Salzmann, Dominik Lieckfeldt, Dirk Timmermann

:
sDLS - Distributed Least Squares localization for large Wireless Sensor Networks. 1-6 - Yan Xiao Ren, Yevgeni Koucheryavy

:
On VoWLAN service performance in indoor environment. 1-6 - Vladimir Dashevsky, Boris V. Sokolov

:
New concept of RFID reader networks structure: hardware and software architecture. 1-4 - Ralf Behnke, Jakob Salzmann, Dirk Timmermann

:
SBCL - improved centroid estimation. 1-6 - Maik Wurdel, Christoph Burghardt, Peter Forbrig:

Making task modeling suitable for smart environments. 1-6 - Timothy J. Harrold, Lingfeng (Stephen) Wang, Mark A. Beach

, Gbenga Salami, Allahyar Yarmohammad, Oliver Holland:
Spectrum sharing and cognitive radio. 1-8 - (Withdrawn) Mobile vision robot using the SIFT algorithm for object recognition. 1-7

- Chris Carter, Abdennour El Rhalibi, Madjid Merabti, Marc Price:

Homura and Net-Homura: The creation and web-based deployment of cross-platform 3D games. 1-8 - Efthymios Koutsogiannis, Sotirios Diamantopoulos

, Vassilis Tsaoussidis
:
A DTN testbed architecture. 1-2 - Fei Liu, Rattaphol Pueboobpaphan

, Bart van Arem
:
Assessment of traffic impact on future cooperative driving systems: Challenges and considerations. 1-5 - Alexander Chuykov:

H.264/AVC analysis of quality in wireless channel. 1-3 - Martin Krohn, Robil Daher, Martin Arndt, Alexander Gladisch, Djamshid Tavangarian:

Mobility-aware Forwarding mechanism for QoS enhancement in Wireless Mesh Backbones. 1-9 - Maziar M. Nekovee

:
A survey of cognitive radio access to TV White Spaces. 1-8 - Yuri Ryzhikov:

Numerical methods of the queuing theory and their program realization. 1-8 - Natalia Vassileva, Yevgeni Koucheryavy

, Francisco Barceló-Arroyo:
Guard Capacity implementation in OPNET Modeler WiMAX Suite. 1-6 - Samia Jones:

A machine vision of non-supervised learning system. 1-4 - Valery Nikitin, Dmitry Yurkin, Naveen K. Chilamkurti:

The influence of the cryptographic protocols on the quality of the radio transmission. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














