default search action
International Journal of Communication Systems, Volume 28
Volume 28, Number 1, January 2015
- Suleiman Zubair, Norsheila Fisal, Mohammed B. Abazeed, Bala Alhaji Salihu, Adnan Shahid Khan:
Lightweight distributed geographical: a lightweight distributed protocol for virtual clustering in geographical forwarding cognitive radio sensor networks. 1-18 - Xiaocheng Wang, Qiaoni Han, Xin-Ping Guan, Kai Ma:
Price-based interference management in dense femtocell systems. 19-37 - Guan Gui, Fumiyuki Adachi:
Adaptive sparse system identification using normalized least mean fourth algorithm. 38-48 - Xiuquan Qiao, Sida Xue, Junliang Chen, Anna Fensel:
A lightweight convergent personal mobile service delivery approach based on phone book. 49-70 - Mamoun F. Al-Mistarihi, Rami Mohaisen, Ashraf Sharaqa, Mohammad Al-Shurman, Khalid A. Darabkh:
Performance evaluation of multiuser diversity in multiuser two-hop cooperative multi-relay wireless networks using maximal ratio combining over Rayleigh fading channels. 71-90 - Kayiparambil S. Deepak, Anchare V. Babu:
Improving energy efficiency of incremental relay based cooperative communications in wireless body area networks. 91-111 - Hongjuan Yang, Peter Han Joo Chong, Weixiao Meng, Bo Li, Yong Liang Guan:
Cooperative quadrature physical layer network coding in wireless relay networks. 112-126 - Xiaonan Wang, Huanyan Qian:
Dynamic and hierarchical IPv6 address configuration for a mobile ad hoc network. 127-146 - Iraj Sadegh Amiri, S. E. Alavi, J. Ali:
High-capacity soliton transmission for indoor and outdoor communications using integrated ring resonators. 147-160 - Petros Nicopolitidis:
Performance fairness across multiple applications in wireless push systems. 161-166 - Yanzhe Che, Qinming He, Xiaoyan Hong, Kevin Chiew:
X-Region: A framework for location privacy preservation in mobile peer-to-peer networks. 167-186 - Ming-Yang Su, Chen-Han Tsai:
Using data mining approaches to identify voice over IP spam. 187-200
Volume 28, Number 2, January 2015
- Yuzhen Huang, Qihui Wu, Jinlong Wang, Yunpeng Cheng, Yuming Zhang:
Unified performance analysis of maximal-ratio combining for spectrum sharing systems with antenna correlation. 201-212 - Sudip Misra, Sukhchain Singh, Manas Khatua, Mohammad S. Obaidat:
Extracting mobility pattern from target trajectory in wireless sensor networks. 213-230 - Yunchuan Yang, Wenbo Wang, Hui Zhao:
Achievable rate region with secrecy constraints for secure communication in two-way relay networks. 231-249 - Yasmine A. Fahmy, Hoda Hafez, Mohamed M. Khairy:
Time domain leakage in DFT-based channel estimation for OFDM systems with guard bands. 250-261 - Jin Wang, Kejie Lu, Shukui Zhang, Jianxi Fan, Yanqin Zhu, Baolei Cheng:
An efficient communication relay placement algorithm for content-centric wireless mesh networks. 262-280 - Shang-Juh Kao, Hsiu-Lang Wang:
Dynamic Orthogonal Frequency Division Multiple Access resource management for downlink interference avoidance in two-tier networks. 281-295 - Mustapha Khiati, Djamel Djenouri:
BOD-LEACH: broadcasting over duty-cycled radio using LEACH clustering for delay/power efficient dissimilation in wireless sensor networks. 296-308 - Said Fouchal, Djamel Mansouri, Lynda Mokdad, M. Iouallalen:
Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks. 309-324 - Hai Huang:
Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique. 325-343 - Fan Wu, Lili Xu:
An improved and provable self-certified digital signature scheme with message recovery. 344-357 - Weiguo Ju, Shanguo Huang, Zhenzhen Xu, Jie Zhang, Wanyi Gu:
Spectrum defragmentation in flexgrid optical networks using a genetic algorithm. 358-373 - Xiong Li, Jianwei Niu, Junguo Liao, Wei Liang:
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. 374-382
- Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li:
Improvement of robust smart-card-based password authentication scheme. 383-393 - Zhangjun Guan, Xi-Lang Zhou:
An amplify-and-forward and decode-and-forward mixed relay communication system and its performance analysis. 394-400
Volume 28, Number 3, February 2015
- Xiaolin Jia, Quanyuan Feng:
An improved anti-collision protocol for radio frequency identification tag. 401-413 - Yun Jia, Zhongzhao Zhang, Xuezhi Tan, Xin Liu:
Asymmetric active cooperation strategy in spectrum sharing game with imperfect information. 414-425 - Yunji Li, Xiaolong Yang, Zeyang Dai, Changming Zhao, Keping Long:
A novel rateless codes design scheme based on two-stage encoding and forward equal probability. 426-436 - Ayaz Ahmad, Nadir Shah:
A joint resource optimization and adaptive modulation framework for uplink single-carrier frequency-division multiple access systems. 437-456 - Lucas Eznarriaga, Cigdem Sengul, Nico Bayer, José Ignacio Moreno, Patricia Lozano, María Simon:
Experiences with SoftToken: a token-based coordination layer for WLANs. 457-471 - Weidong Wang, Jun-an Yang, Chun Zhang:
A novel compressed sensing ultra-wideband channel estimation method based on non-convex optimization. 472-482 - Yi Wang, Jun-an Yang, Jun Lu, Hui Liu, Lun-wu Wang:
Hierarchical deep belief networks based point process model for keywords spotting in continuous speech. 483-496 - Rajeev Anand Sahu, Sahadeo Padhye:
Provable secure identity-based multi-proxy signature scheme. 497-512 - Yuan Sheng Wu, Bing Guo, Yan Shen, Jihe Wang, Xiaobin Liu:
Toward energy-proportional Internet core networks: an energy-minimized routing and virtual topology design for Internet protocol layer. 513-533 - Zuowen Tan:
An efficient pairing-free identity-based authenticated group key agreement protocol. 534-545 - Ahmad M. Rateb, Sharifah Kamilah Syed Yusof:
Recovery error bounds on compressed sensing of noisy signals. 546-559 - Zhi Ren, Shuang Peng, Hong Chen, Jun Fang, Qianbin Chen:
Epidemic routing based on adaptive compression of vectors: efficient low-delay routing for opportunistic networks based on adaptive compression of vectors. 560-573 - Ahmed Nabih Zaki Rashed, Abd El Fattah A. Saad:
Transmission behavior improvement of electro-optic modulators for integrated photonic systems in the present communication technology. 574-584 - Min Xiang, Chao Wen, Xing-zhe Hou:
A hybrid relay control mechanism for ribbon topology in low-voltage power line communication networks. 585-600
Volume 28, Number 4, March 2015
- Cristian Tanas, Jordi Herrera-Joancomartí:
When users become sensors: can we trust their readings? 601-614 - Zhiyu Fan, Yuanan Liu, Hu Li, Dongming Yuan, Hefei Hu:
A servo design for slave clock in IEEE 1588 synchronization networks. 615-624 - Hsu-Yang Kung, Sumalee Chaisit, Nguyen Thi Mai Phuong:
Optimization of an RFID location identification scheme based on the neural network. 625-644 - Jianhong Zhang, Jian Mao:
An improved anonymous multi-receiver identity-based encryption scheme. 645-658 - Young-Sik Jeong, Ji Soo Park, Jong Hyuk Park:
An efficient authentication system of smart device using multi factors in mobile cloud service architecture. 659-674 - Yumin Yuan:
On the security of a proxy signature scheme in the standard model. 675-681 - Quan Sun, Liusheng Huang, Haoran Zhang, Hongli Xu:
Handoff optimization and load balancing in wireless LANs using association control. 682-704 - Lei Tang, Fengfan Yang, Shun-wai Zhang, Lin Luo:
The performance of uplink LDPC-coded multirelay cooperation based on virtual V-BLAST processing. 705-722 - Yonglei Liu, Zhigang Jin:
Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture. 723-742 - Chunyan An, Renchao Xie, Hong Ji, Yi Li:
Pricing and power control for energy-efficient radio resource management in cognitive femtocell networks. 743-761 - Victor Torres-Padrosa, Marc Manzano, Eusebi Calle, Josep L. Marzo:
Community-based traffic preservation in telecommunication networks. 762-778 - Harry Leib, Wenjing Lin:
Performance analysis of multi-input multi-output systems with maximum likelihood detection over shadowed fading channels. 779-800
Volume 28, Number 5, March 2015
- Sudip Misra, Shankha Subhra Chatterjee, Mohsen Guizani:
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks. 801-817 - Minglei Fu, Maolin He, Zichun Le, Weiwen Wang, Bisheng Quan:
Performance evaluation of the survivability schemes in WOBAN: a quality of recovery (QoR) method. 818-841 - Yongchun Liu, Peng Gong, Xiaopeng Yan, Ping Li:
On the security of a dynamic identity-based remote user authentication scheme with verifiable password update. 842-847 - Xin Liu, Qingfeng Jing, Yun Jia, Weizhi Zhong, Yong Liang Guan:
Sensing-throughput tradeoff for cooperative multiple-input single-output cognitive radio. 848-860 - Bing Zhang, Maode Ma, Chunfeng Liu, Yantai Shu:
Performance improvements of HCCA scheduling in V2R environments. 861-872 - Manas Kamal Bhuyan, Biplab Ketan Chakraborty:
Motion adaptive video coding scheme for time-varying network. 873-888 - Laisen Nie, Dingde Jiang:
A compressive sensing-based network tomography approach to estimating origin-destination flow traffic in large-scale backbone networks. 889-900 - Zhu Xiao, Zhongfeng Li, Xu Zhang, Enjie Liu, Kechu Yi:
An efficient interference mitigation approach via quasi-access in two-tier macro-femto heterogeneous networks. 901-909 - Cecília A. C. César, Solon V. Carvalho:
A queuing model for distributed scheduling in IEEE 802.16 wireless mesh networks. 910-927 - Giulio Bartoli, Romano Fantacci, Francesco Gei, Dania Marabissi, Luigia Micciullo:
A novel emergency management platform for smart public safety. 928-943 - K. Ujwal Deep, Vidhyacharan Bhaskar:
Fast turbo codes with space-time block codes in fast fading channels. 944-951 - Ching-Hsien Hsu, Tai-Lung Chen, Chao-Tung Yang, Hai-Cheng Chu:
Scheduling contention-free broadcasts in heterogeneous networks. 952-971 - Amjad Mehmood, Shafiullah Khan, Bilal Shams, Jaime Lloret Mauri:
Energy-efficient multi-level and distance-aware clustering mechanism for WSNs. 972-989 - Enxiao Liu, Weixiao Meng, Shuai Han:
A dense overlapped linear subarray architecture for interference suppressing in small-scale arrays. 990-1000
Volume 28, Number 6, April 2015
- Nabih Alaoui, Vahid Meghdadi, Jean-Pierre Cances:
Wireless sensor networks with joint network-channel code optimization. 1001-1016 - Yan Gong, Chaoqin Gan, Chenwei Wu:
Highly reliable wavelength-reuse wavelength-division multiplexing semipassive optical access network architecture with double cover area and high network capacity. 1017-1029 - Gaoqi Dou, Chunquan He, Congying Li, Jun Gao:
Orthogonal superimposed training design for block transmission over frequency-selective fading channels. 1030-1036 - Francisco-Javier Rodríguez-Pérez, José Luis González Sánchez, Javier Carmona-Murillo, David Cortés-Polo:
An OAM function to improve the packet loss in MPLS-TP domains for prioritized QoS-aware services. 1037-1052 - Fengyu Guo, Long Yu, Shengwei Tian, Jiong Yu:
A workflow task scheduling algorithm based on the resources' fuzzy clustering in cloud computing environment. 1053-1067 - Ming-Yue Zhai, Ling-Dong Su:
Research on the memory order of the power-line communication channel. 1068-1079 - Jaehyun Hwang, Sang-Seon Byun:
A resilient buffer allocation scheme in active queue management: a stochastic cooperative game theoretic approach. 1080-1099 - Xuexian Hu, Zhenfeng Zhang, Qihui Zhang:
Universally composable three-party password-authenticated key exchange with contributiveness. 1100-1111 - Yass K. Salih, Ong Hang See, Rabha W. Ibrahim, Salman Yussof, Azlan Iqbal:
A novel noncooperative game competing model using generalized simple additive weighting method to perform network selection in heterogeneous wireless networks. 1112-1125 - Heshuai Li, Junhu Zhu, Han Qiu, Qingxian Wang, Tianyang Zhou, Hang Li:
The new threat to internet: DNP attack with the attacking flows strategizing technology. 1126-1139 - Zhaoxi Fang, Feng Liang, Zunyi Wang, Danjiang Chen:
Low complexity timing estimation and resynchronization for asynchronous bidirectional communications with multiple antenna relay. 1140-1150 - Do-hyung Kim, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
End-to-end mobility support in content centric networks. 1151-1167 - Dharmvir Jain, Sanjay Sharma:
A novel grouped multilevel dynamic space-time trellis coding scheme. 1168-1179 - Salima Smaoui, Imen El Bouabidi, Mohammad S. Obaidat, Faouzi Zarai, Kuei-Fang Hsiao, Lotfi Kamoun:
Improved IPSec tunnel establishment for 3GPP-WLAN interworking. 1180-1199
Volume 28, Number 7, May 2015
- Zhibo Wang, Hui Tian, Kun Yang, Ziqiang Liu:
Frequency resource allocation strategy with QoS support in hybrid cellular and Device-to-Device networks. 1201-1218 - Assadallah Sahebalam, Mohammad Osmani-Bojd, Ghosheh Abed Hodtani:
Ultra-wideband multiple-access relay channel with correlated noises and its diversity analysis. 1219-1249 - Kai Ma, Jie Yang, Guoqiang Hu, Xinping Guan:
Cooperative Relay-Aware Spectrum leasing based on Nash bargaining solution in cognitive radio networks. 1250-1264 - Young-Pil Kim, Cheol-Ho Hong, Chuck Yoo:
Performance impact of JobTracker failure in Hadoop. 1265-1281 - Yanjun Liu, Lein Harn, Chin-Chen Chang:
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. 1282-1292 - Dubravko Sabolic:
Modeling and measurement of cross-talk transmission between coupled lines. 1293-1302 - Siguang Chen, Meng Wu, Kun Wang, Zhixin Sun, Weifeng Lu:
Combining network coding and compressed sensing for error correction in wireless sensor networks. 1303-1315 - Mouna Elmachkour, Abdellatif Kobbane, Essaid Sabir, Jalel Ben-Othman, Mohammed El Koutbi:
Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation. 1316-1328 - Ahmet Sayar:
Ant-based interactive workflow management: a case study on RMI. 1329-1339 - Qi Jiang, Jianfeng Ma, Youliang Tian:
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. 1340-1351 - Judhistir Mahapatro, Sudip Misra, Manjunatha Mahadevappa, Nabiul Islam:
Interference-aware MAC scheduling and admission control for multiple mobile WBANs used in healthcare monitoring. 1352-1366 - Sudip Misra, Goutam Mali, Ayan Mondal:
Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation. 1367-1386 - Jing Wang, Kaikai Chi, Yang Yang, Xinmei Wang:
Network coding based on hyper-edge decomposition for wireless network with link failures. 1387-1399
Volume 28, Number 8, May 2015
- Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala:
Cryptanalysis of mCrypton-64. 1401-1418 - Majid Bayat, Mohammad Reza Aref:
An attribute-based tripartite key agreement protocol. 1419-1431 - Evaggelos Chatzistavros, Savvas A. Chatzichristofis, Konstantinos Zagoris, George Stamatelos:
Content-based image retrieval over IEEE 802.11b noisy wireless networks. 1432-1449 - Zhihang Li, Huilin Jiang, Zhiwen Pan, Nan Liu, Xiaohu You:
Energy spectral efficiency tradeoff in downlink OFDMA network. 1450-1461 - Alireza Alizadeh, Ghosheh Abed Hodtani:
Analysis of capacity and coverage region for Rayleigh fading MIMO relay channel. 1462-1474 - Raj Johri, Shyam Akashe, Sanjay Sharma:
High performance 8 bit cascaded carry look ahead adder with precise power consumption. 1475-1483 - Ioannis V. Loumiotis, Evgenia F. Adamopoulou, Konstantinos P. Demestichas, Theodora A. Stamatiadi, Michael E. Theologou:
On the predictability of next generation mobile network traffic using artificial neural networks. 1484-1492 - Ch. Pradeep Reddy, P. Venkata Krishna:
Ant-inspired level-based congestion control for wireless mesh networks. 1493-1507 - Qiang Liu, Kun Yang:
Channel capacity analysis of a diffusion-based molecular communication system with ligand receptors. 1508-1520
Volume 28, Number 9, June 2015
- Nasrin Sadeghianpour, Teong Chee Chuah, Su Wei Tan:
Joint channel assignment and routing in multiradio multichannel wireless mesh networks with directional antennas. 1521-1536 - Tao Zhang, Jin Wang:
Performance of fiber delay-line buffers in asynchronous packet-based optical switching networks with wavelength conversion. 1537-1550 - Ke Li, Sheng Wang, Shizhong Xu, Xiong Wang, Jin Ren, Haojun Huang, Bo Zhai:
Multi-topology routing based egress selection approach to achieve hybrid intra-AS and inter-AS traffic engineering. 1551-1571 - Youssouf Ould-Cheikh-Mouhamedou:
Reducing the complexity of distance measurement methods for circular turbo codes that use structured interleavers. 1572-1579 - You-Chiun Wang:
Profit-based exclusive-or coding algorithm for data retransmission in DVB-H with a recovery network. 1580-1597 - Ke Zhang, Chang Duan, Haitao Jia:
Genetic simulated annealing-based coverage-enhancing algorithm for multimedia directional sensor networks. 1598-1609 - Qingchen Zhang, Zhikui Chen, Laurence T. Yang:
A nodes scheduling model based on Markov chain prediction for big streaming data analysis. 1610-1619
Volume 28, Number 10, July 2015
- An Li, Yizhu Xu, Yuhao Wang, Lihua Sun:
Amplify-and-forward-based cooperative jamming strategy with power allocation for secure communication. 1621-1627 - Sukin Kang, Jonguk Kim, Manpyo Hong:
Button-based method for the prevention of near field communication relay attacks. 1628-1639 - Shashika Biyanwilage, Upul Gunawardana, Ranjith Liyanapathirana:
Power allocation in OFDM cognitive radio relay networks with outdated channel state information. 1640-1656 - Wan Du, David Navarro, Fabien Mieyeville:
Performance evaluation of IEEE 802.15.4 sensor networks in industrial applications. 1657-1674 - Jui-Chi Chang, Fang-Biau Ueng, Hsuan-Fu Wang, Ming-Hsiao Hsu:
Multiuser MIMO receivers for space frequency block coded SC-FDMA systems. 1675-1691 - Wenjun Xu, Yan Wang, Kai Niu, Zhiqiang He, Jiaru Lin:
Joint overlay and underlay resource allocation with weighted fairness in OFDM-based cognitive radio systems. 1692-1708 - Haifeng Zhou, Liansheng Tan, Fei Ge, Sammy Chan:
Traffic matrix estimation: Advanced-Tomogravity method based on a precise gravity model. 1709-1728
Volume 28, Number 11, July 2015
- Hoang-Linh To, Suk Hwan Lee, Won-Joo Hwang:
A burst loss probability model with impatient customer feature for optical burst switching networks. 1729-1740 - Jiann-Liang Chen, San-Peng Kao:
QoS mechanism for virtualized wireless networks with software-defined networking. 1741-1752 - Igor Bisio, Fabio Lavagetto, Mario Marchese, Andrea Sciarrone:
A smartphone-centric platform for remote health monitoring of heart failure. 1753-1771 - Zhijun Wu, Meng Yue, Douzhe Li, Ke Xie:
SEDP-based detection of low-rate DoS attacks. 1772-1788 - Lei Shi, Zheng Yao, Baoxian Zhang, Cheng Li, Jian Ma:
An efficient distributed routing protocol for wireless sensor networks with mobile sinks. 1789-1804 - Fenghua Wang, Dongliang Xie, Jingyu Wang, Peng Zhang, Yan Shi:
Paths selection-based resequencing queue length in concurrent multipath transfer. 1805-1827
Volume 28, Number 12, August 2015
- Michael Slavik, Imad Mahgoub, Mohammed Alwakeel:
Efficient multi-hop wireless broadcast protocol in vehicular networks using automated threshold function design. 1829-1846 - Hang Long, Wei Xiang, Jing Wang, Xiaoli Zhang, Wenbo Wang:
Enhancing secrecy capacity of multi-relay wiretap systems with partial channel state information. 1847-1861 - Kavitha Athota, Atul Negi:
A topology preserving cluster-based channel assignment for wireless mesh networks. 1862-1883 - Jun Liu, Nan Chang, Sanguo Zhang, Zhenming Lei:
Recognizing and characterizing dynamics of cellular devices in cellular data network through massive data analysis. 1884-1897
Volume 28, Number 13, September 2015
- Sung Won Ahn, Chuck Yoo, Shinhyung Lee, Hyung Soo Lee, Sung Jo Kim:
Implementing virtual platform for global-scale cyber physical system networks. 1899-1920 - Min Lin, Heng Wei, Kang An, Jian Ouyang, Yongming Huang:
Effect of imperfect channel state information and co-channel interferences on two-hop fixed gain amplify-and-forward relay networks with beamforming. 1921-1930 - Jun-Da Chen, Fang-Biau Ueng, Ye-Shun Shen, Yuan-Hung Cheng:
Performance analyses of adaptive noncoherent receivers for MC-CDMA communications. 1931-1954 - Jia-Lun Tsai, Nai-Wei Lo:
A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card. 1955-1963
Volume 28, Number 14, September 2015
- Masafumi Hashimoto, Go Hasegawa, Masayuki Murata:
An analysis of energy consumption for TCP data transfer with burst transmission over a wireless LAN. 1965-1986 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:
DNS tunneling detection through statistical fingerprints of protocol messages and machine learning. 1987-2002 - Harris Simaremare, Abdelhafid Abouaissa, Riri Fitri Sari, Pascal Lorenz:
Security and performance enhancement of AODV routing protocol. 2003-2019 - Hiep H. Nguyen, Suk-Hwan Lee, Won-Joo Hwang:
Optimal resource allocation for energy efficiency in coordinated multicell OFDMA networks. 2020-2034
Volume 28, Number 15, October 2015
- Yahui Wu, Su Deng, Hongbin Huang:
Performance analysis of hop-limited epidemic routing in DTN with limited forwarding times. 2035-2050 - Basab Chatterjee, B. N. Biswas, Sudhabindu Ray:
A novel DSP-based PFC-DPLL with fuzzy controlled acquisition aid to improve acquisition performance and noise immunity. 2051-2066 - Joona Kannisto, Takeshi Takahashi, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan:
A non-repudiable negotiation protocol for security service level agreements. 2067-2081 - Kuo-Lung Wang, Tsan-Pin Wang, Chien-Chao Tseng:
Reducing wireless multi-hop delay via RSU re-routing in vehicular wireless networks. 2082-2097
Volume 28, Number 16, November 2015
- Yuxi Liu, Sitong Lv, Peng Chen:
Capacity of SSTS for downlink-distributed antenna systems in multicell environment. 2099-2111 - Panagiotis Melidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Emmanouel A. Varvarigos:
Green optical backbone networks: virtual topology adaptation using a page rank-based rating system. 2112-2121 - Doraid M. Dalalah:
Proportional fairness: more secrets revealed. 2122-2144 - Jiankang Ren, Guowei Wu, Xinjiao Li, Poria Pirozmand, Mohammad S. Obaidat:
Probabilistic response-time analysis for real-time systems in body area sensor networks. 2145-2166
Volume 28, Number 17, November 2015
- Jing Ren, Kejie Lu, Fei Tang, Jin Wang, Jianping Wang, Sheng Wang, Shucheng Liu:
CAKA: a novel cache-aware K-anycast routing scheme for publish/subscribe-based information-centric network. 2167-2179 - Hien Nguyen, Ebtissam Wahman, Niki Pissinou, S. S. Iyengar, Kia Makki:
Mobile learning object authoring tool and management system for mobile ad hoc wireless networks. 2180-2196 - Najam Ul Hasan, Wanqing Tu:
On energy-efficient performance-guaranteed channel assignment in cognitive radio-based wireless mesh networks. 2197-2213 - Datong Xu, Pinyi Ren, Li Sun:
ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells. 2214-2238
Volume 28, Number 18, December 2015
- Sima Ahmadpour, Zohreh Toghrayee, Tat Chee Wan:
An extended discrete autoregressive model for variable bit rate video traffic encoded by scalable video codec. 2239-2254 - Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks. 2255-2274 - Shuang Qin, Gang Feng:
Performance modeling of data transmission by using random linear network coding in DTNs. 2275-2288 - Huan Yan, Deyun Gao, Wei Su, Han-Chieh Chao:
A forwarding strategy of counteracting redundancy data in named data networking. 2289-2310 - Jaehyo Jung, Jihoon Lee, Jihwan Lee, Youn Tae Kim:
A smartphone-based U-Healthcare system for real-time monitoring of acute myocardial infarction. 2311-2325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.