Abstract is missing.
- Secure spectrum sharing via rate adaptationBehrooz Makki, Thomas Eriksson. 1-5 [doi]
- Network aware application dissemination in prioritized wireless networksDavid Shur, M. Kaplan, Sunil Samtani, T. Doong, S. Kruse, D. Reid, D. Osten, J. Kleffman, R. Coupland. 6-10 [doi]
- Identifying and quantifying the android device users' security risk exposureLukas Jeter, Shivakant Mishra. 11-17 [doi]
- Distributed model consensus for models of locally biased measurements in wireless sensor networksJacob Thompson, Konstantinos Kalpakis. 18-22 [doi]
- Intercarrier interference cancellation for wideband OFDM in high speed aerial vehicle communicationQian Han, Xue Li, Michael A. Temple, Zhiqiang Wu 0001. 23-27 [doi]
- Opportunistic routing using prefix ordering and self-reported social groupsQian Li, J. J. Garcia-Luna-Aceves. 28-34 [doi]
- Performance of convolutional coded OOK IM/DD systems over strong turbulence channelsLuanxia Yang, Julian Cheng, Jonathan F. Holzman. 35-39 [doi]
- Fast wireless data access scheme in wireless networksGiwon Lee, Insun Jang, Sangheon Pack. 40-44 [doi]
- The impacts of user dynamics on energy-based opportunistic cooperative spectrum sensing in Cognitive Radio Networks over log-normal shadowed Rayleigh fading channelsChihkai Chen, Kung Yao. 45-50 [doi]
- The impact of GPS positioning errors on the hop distance in Vehicular Adhoc Networks (VANETs)Wen-Hsing Kuo, Shih-Hau Fang. 51-55 [doi]
- Cost effective ROF communication system for CATV channels over WDM network and fuzzy modeling of the systemMaryam Niknamfar, Yashar Sahraei Manjili, Mohammad Jamshidi, Mehdi Shadaram. 56-60 [doi]
- A road based multi-channel assignment method for VANETTong Zhao, Shanbo Lu, Wei Yan, Xiaoming Li. 61-65 [doi]
- Modeling and delay analysis for converged network-cloud service provisioning systemsQiang Duan. 66-70 [doi]
- The case for heterogeneous WLAN environments for converged networksMarkus Tauber, Saleem N. Bhatti, Nikolay Melnikov, Jürgen Schönwälder. 71-76 [doi]
- Advanced resource provisioning in context-sensitive converged networksJosé Castillo Lema, Elifranio Cruz, Augusto Neto, Eduardo Cerqueira. 77-81 [doi]
- An integrated health management process for automotive cyber-physical systemsChaitanya Sankavaram, Anuradha Kodali, Krishna R. Pattipati. 82-86 [doi]
- Terrain recognition improves the performance of neural-machine interface for locomotion mode recognitionDing Wang, Lin Du, He Huang. 87-91 [doi]
- Networked bio-inspired modules for sensorimotor control of wearable cyber-physical devicesYong-Lae Park, Diana Young, Bor-rong Chen, Robert J. Wood, Radhika Nagpal, Eugene Goldfield. 92-96 [doi]
- Computer aided rehabilitation for patients with rheumatoid arthritisVangelis Metsis, Pat Jangyodsuk, Vassilis Athitsos, Maura Iversen, Fillia Makedon. 97-102 [doi]
- On lossless and lossy compression of step size matrices in JPEG codingWai C. Chu. 103-107 [doi]
- Application layer FEC with long time interleaver and fast tune-in for mobile satellite TV servicesValentina Pullano, Cornelius Hellge, Manuel Hensel, Giovanni Emanuele Corazza, Thomas Schichl. 108-112 [doi]
- An edge router based distributed admissions control over real-time media streamsJun Liu. 113-119 [doi]
- Performance improvement of the segment sync-based spectrum sensing for ATSC TV signalSeung Joon Lee. 118-122 [doi]
- Low RSSI in WLANs: Impact on application-level performanceMarkus Tauber, Saleem N. Bhatti. 123-129 [doi]
- Restorability on 3-connected WDM networks under single and dual physical link failuresJosé M. Gutiérrez López, Michael Jensen, Tahir M. Riaz, Jens Myrup Pedersen. 128-132 [doi]
- Power allocation for time division broadcast protocol over Rayleigh fading channelsDong-Woo Lim, Chang-Jae Chun, Jae Hwan Lee, Hyung-Myung Kim. 133-137 [doi]
- Lagrangian relaxation approach for low complexity channel assignment in multi-cell wlansMohamed Elwekeil, Masoud Alghoniemy, Hiroshi Furukawa, Osamu Muta. 138-142 [doi]
- TFRC-CR: An equation-based transport protocol for cognitive radio networksAbdulla K. Al-Ali, Kaushik R. Chowdhury. 143-148 [doi]
- Utilizing distance distribution in determining topological characteristics of multi-hop wireless networksHusnu S. Narman, Turgay Korkmaz, Suleyman Tek. 149-154 [doi]
- Dual-hop AF systems with maximum end-to-end SNR relay selection over nakagami-m and rician fading linksSamy S. Soliman, Norman C. Beaulieu. 155-161 [doi]
- Coexistence analysis of adjacent long term evolution (LTE) systemsMuhannad Aulama, Mohammed M. Olama. 162-167 [doi]
- On the rate-distortion performance of compressive sensing in wireless sensor networksMina Sartipi. 168-172 [doi]
- Improving service differentiation of immediate and advance reservation in resource-partitioned optical WDM networksDerek R. Rousseau, Joan Triay, Vinod M. Vokkarane. 173-179 [doi]
- Analytical model of 3-level QoS scheduling in hybrid optical networksGiorgio Corazza, Walter Cerroni, Gaia Leli, Carla Raffaelli, Michele Savi, Norvald Stol. 180-184 [doi]
- Context-aware social computing: A cognitive approachMozhgan Tavakolifard. 185-191 [doi]
- Energy and latency impact of outsourcing decisions in mobile image processingAli Zaher, Ali Ahmad, Niklas Durr, Nicolas Oliver Stamer. 190-194 [doi]
- Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networksQiang Liu, Jianping Yin, Paria Jokar, Xiping Hu. 195-199 [doi]
- A framework for optimal assistive robot placement for event recognitionGeorgios Galatas, Alexandros Papangelis, Fillia Makedon. 200-204 [doi]
- Predicting time-delays under real-time scheduling for linear model predictive controlZhenwu Shi, Fumin Zhang. 205-209 [doi]
- Investigation of uncertainties associated with actuation modeling error and sensor noise on real time hybrid simulation performanceAmin Maghareh, Shirley J. Dyke, Ge Ou, Yili Qian. 210-214 [doi]
- Sensor data modeling for smart meters - A methodology to compare different systemsDhiman Chattopadhyay, Ranjan Dasgupta, Arpan Pal. 215-221 [doi]
- QUIT: A cross-layer routing metric based on non-utilized outage capacityBahador Amiri, Hamid R. Sadjadpour. 222-226 [doi]
- Optimal Byzantine attacks on distributed detection in tree-based topologiesBhavya Kailkhura, Swastik Brahma, Pramod K. Varshney. 227-231 [doi]
- Performance evaluation of RODEO: Route degradation optimization for the multi-hop dynamic spectrum access networksErald Troja, Kenneth Ezirim, Shamik Sengupta, Michael Hannon. 232-236 [doi]
- A theoretical framework for solving the optimal admissions control with sigmoidal utility functionsJun Liu. 237-242 [doi]
- Combined green resource and topology management for beyond next generation mobile broadband systemsSalahedin Rehan, David Grace. 242-246 [doi]
- Queueing with transmission rate selection for cognitive radio networks in Nakagami-m fadingWon Mee Jang, Woan Sun Chang. 247-251 [doi]
- (Multiple) Channel acquisition and contention handling mechanisms for dynamic spectrum access in a distributed system of cognitive radio networksKenneth Ezirim, Shamik Sengupta, Erald Troja. 252-256 [doi]
- Deadline-aware co-scheduling using anycast advance reservations in wavelength routed lambda gridsHitesh Kulkarni, Arush Gadkar, Vinod M. Vokkarane. 257-262 [doi]
- Interference aware scheduling for peak channel reuse and max-capacity in smart meter networksKranthimanoj Nagothu, Amir Rajaee, Brian Todd Kelley, Mo M. Jamshidi. 263-267 [doi]
- Coherent power combining on spacecraft via wavefront multiplexing techniquesDonald C. D. Chang, Hen-Geul Yeh, Qubao He. 268-272 [doi]
- Symbol-index-feedback polar coding schemes for low-complexity devicesXudong Ma. 273-277 [doi]
- BER modeling for interference canceling FIR Wiener equalizerTamoghna Roy, A. A. (Louis) Beex. 278-282 [doi]
- The outage performance of realtime transmission in multiple asynchronous relays enhanced OFDM systemYulin Hu, James Gross, Zhizhong Ding. 283-289 [doi]
- Approximating the outage capacity of asymmetric 2×2 dual-polarized MIMO at high SNRFarzad Talebi, Thomas G. Pratt. 290-294 [doi]
- An optimized LDPC product network coding scheme in multiple access relay systemZhanji Wu, Xiang Chen. 295-299 [doi]
- Numerically efficient direct-optimization filter designJuan Fang, I-Tai Lu. 300-304 [doi]
- Cross layer optimization for efficient spectrum utilization in cognitive radiosAli H. Mahdi, Mohamed Abd rabou Kalil, Andreas Mitschele-Thiel. 305-309 [doi]
- Adaptive fault-tolerance fault-tolerance for cyber-physical systemsC. Mani Krishna, Israel Koren. 310-314 [doi]
- The high level architecture RTI as a master to the functional mock-up interface componentsMuhammad Usman Awais, Peter Palensky, Atiyah Elsheikh, Edmund Widl, Matthias Stifter. 315-320 [doi]
- Effects of femtocell deployment on interference to macrocell users in a cellular networkAvani Dalal, Hailong Li, Dharma P. Agrawal. 321-326 [doi]
- Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programmingEdward S. Canepa, Christian G. Claudel. 327-333 [doi]
- Lightweight Internet protocols for web enablement of sensors using constrained gateway devicesSoma Bandyopadhyay, Abhijan Bhattacharyya. 334-340 [doi]
- Ongoing challenges in automated cyberphysical cross-domain designKunal Arya, Joseph Poverelli, Forrest Brewer. 341-347 [doi]
- Self-healing group key distribution with extended revocation capabilityTomasz Rams, Piotr Pacyna. 347-353 [doi]
- Establishing secure measurement matrix for compressed sensing using wireless physical layer securityRuslan Dautov, Gill R. Tsouri. 354-358 [doi]
- TFD: A multi-pattern matching algorithm for large-scale URL filteringZhenlong Yuan, Baohua Yang, Xiaoqi Ren, Yibo Xue. 359-363 [doi]
- VEGK: Virtual ECC group key for wireless sensor networksAhmed E. El-Din, Rabie A. Ramadan, Magda B. Fayek. 364-368 [doi]
- IEEE 802.11 anomaly-based behavior analysisHamid Alipour, Youssif B. Al-Nashif, Salim Hariri. 369-373 [doi]
- A comprehensive platform-independent computational complexity analysis for a class of symmetric cryptosystemsWalid Y. Zibideh, Mustafa M. Matalgah. 374-379 [doi]
- Dynamic RMSA in spectrum-sliced elastic optical networks for high-throughput service provisioningLiang Zhang, Wei Lu, Xiang Zhou, Zuqing Zhu. 380-384 [doi]
- Flexible transport network expansion via open WDM interfacesAnna Manolova Fagertun, Bjarke Skjoldstrup. 385-389 [doi]
- On the efficacy of WDM virtual topology design strategiesXuezhou Ma, Khaled Harfoush. 390-394 [doi]
- Regenerator site selection and regenerator placement for mixed line rate optical networksWeisheng Xie, Jason P. Jue, Xi Wang, Qiong Zhang, Qingya She, Paparao Palacharla, Motoyoshi Sekiya. 395-399 [doi]
- Circuit performance in a packet network: Demonstrating integrated Carrier Ethernet Switch Router (CESR) + Optical Transport Network (OTN)Sarvesh Bidkar, Saurabh Mehta, Deval Bhamare, Nilesh Bajaj, Abhishek Medhekar, Ashwin Gumaste. 400-407 [doi]
- Flexible companding design for PAPR reduction in OFDM and FBMC systemsZihao You, I-Tai Lu, Rui Yang, Jialing Li. 408-412 [doi]
- On the throughput evaluation of wireless mesh network deployed in disaster areasThuan Ngo, Hiroki Nishiyama, Nei Kato, Yoshitaka Shimizu, Kohei Mizuno, Tomoaki Kumagai. 413-417 [doi]
- Improved wideband spectrum sensing techniques using wavelet-based edge detection for cognitive radioSaid Esmael El-Khamy, Mohamed S. El-Mahallawy, El-Nasser S. Youssef. 418-423 [doi]
- Low-complexity iterative demapping for rotated QAM constellations in DVB-T2 systemFeng Yang, Bo Zhang, Lianghui Ding. 424 [doi]
- A new analysis of the DS-CDMA cellular downlink under spatial constraintsMatthew C. Valenti, Don J. Torrieri, Salvatore Talarico. 425-430 [doi]
- An initial study of DSA cost and capacity trades under imperfect awarenessTodd W. Martin, Kuo-Chu Chang. 431-436 [doi]
- e-Healthcare cloud computing application solutions: Cloud-enabling characteristices, challenges and adaptationsW. Liu, E. K. Park. 437-443 [doi]
- Improved P2P content discovery by exploiting user social patternsReza Farahbakhsh, Noël Crespi, Ángel Cuevas, Neetya Shrestha, Mehdi Mani, Poompat Saengudomlert. 444-448 [doi]
- Cloud-hosted key sharing towards secure and scalable mobile applications in cloudsPiotr K. Tysowski, M. Anwarul Hasan. 449-455 [doi]
- DAROS: Distributed user-server assignment and replication for online social networking applicationsThuan Duong-Ba, Thinh P. Nguyen, Duc A. Tran. 456-460 [doi]
- Somersault cloud: Toward a cloud-of-clouds service for personal backupHuajian Mao, Nong Xiao, Yutong Lu, Haifeng Xu. 461-464 [doi]
- Profit maximization and power management of green data centers supporting multiple slasMahdi Ghamkhari, Hamed Mohsenian Rad. 465-469 [doi]
- A low power 100 Gbps DP-QPSK receiver using analog domain signal processingNandakumar Nambath, Anita Gupta, Shalabh Gupta. 470-473 [doi]
- Novel fast MUSIC algorithm for spectral estimation with high subspace dimensionHongting Zhang, Hsiao-Chun Wu, Shih Yu Chang. 474-478 [doi]
- Clustered linear precoding for downlink network MIMO systems with partial CSIMehdi Sadeghzadeh, Hamid-Reza Bahrami, Nghi H. Tran. 479-483 [doi]
- Reduced complexity super-trellis decoding for convolutionally encoded transmission over ISI-channelsFabian Schuh, Andreas Schenk, Johannes B. Huber. 484-489 [doi]
- Exact trigonometric superfast inverse covariance representationsRicardo Merched. 490-495 [doi]
- Performance-complexity trade-offs of the 2-D iterative feedback signal detection algorithmYiming Chen, Shayan Garani Srinivasa. 496-501 [doi]
- Channel capacity related power allocation for distributed sensor networks with application in object classificationGholamreza Alirezaei, Rudolf Mathar. 502-507 [doi]
- Ambiguity resolution in RSS-based emitter geolocationSichun Wang, Robert J. Inkol, Brad R. Jackson, Shanzeng Guo. 508-513 [doi]
- A novel socially-aware opportunistic routing algorithm in mobile social networksGary K. W. Wong, Xiaohua Jia. 514-518 [doi]
- On the optimal transmission distance for power-aware routing in Ad Hoc networksAhmed E. A. A. Abdulla, Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato. 519-523 [doi]
- RFID range extension with low-power wireless edge devicesLi Chen, He Ba, Wendi Heinzelman, Andre Cote. 524-528 [doi]
- CTA: A collaborative tracking algorithm in wireless sensor networksIbtissem Boulanouar, Stéphane Lohier, Abderrezak Rachedi, Gilles Roussel. 529-534 [doi]
- Detection for two-dimensional magnetic recording systemsSeyed Mehrdad Khatami, Bane V. Vasic. 535-539 [doi]
- Testing access control and obligation policiesDianxiang Xu, Michael Sanford, Zhaoliang Liu, Spencer Johnson, Mark Emry, Brad Brockmueller, Michael To. 540-544 [doi]
- Traffic classification: Issues and challengesYibo Xue, Dawei Wang, Luoshi Zhang. 545-549 [doi]
- Channel capacity and soft-decision decoding of LDPC codes for spin-torque transfer magnetic random access memory (STT-MRAM)Kui Cai, Zhiliang Qin, Bingjin Chen. 550-554 [doi]
- QoE evaluation for video streaming over eMBMSUtsaw Kumar, Ozgur Oyman. 555-559 [doi]
- Energy saving improvements in IP networks through table lookup bypass in router line cardsAngelo Coiro, Marco Polverini, Antonio Cianfrani, Marco Listanti. 560-566 [doi]
- A robust optimization approach for energy-aware routing in MPLS networksBernardetta Addis, Antonio Capone, Giuliana Carello, Luca G. Gianoli, Brunilde Sansò. 567-572 [doi]
- Impact of mobile transmitter sources on radio frequency wireless energy harvestingAntonio Hernandez Coarasa, Prusayon Nintanavongsa, Sugata Sanyal, Kaushik R. Chowdhury. 573-577 [doi]
- Energy-efficient IPTV simulcast over fixed WiMAX access systemsYi Zhu, Xiaofeng Gao, Weili Wu, Jason P. Jue. 578-584 [doi]
- Energy budget simulation for deep packet inspectionLorenzo Di Gregorio. 585-589 [doi]
- Analysis of energy efficiency in dynamic optical networks employing solar energy sourcesJiayuan Wang, Anna Manolova Fagertun, Sarah Ruepp, Lars Dittmann. 590-593 [doi]
- Towards 60GHz wireless switching interconnectHars Vardhan, Ravi Prakash. 594-598 [doi]
- Efficient support for video communications in wireless home networksAndrea Vesco, Enrico Masala, Riccardo Scopigno. 599-604 [doi]
- Study on real energy consumption of large-scale campus wireless networkWenqi Sun, Hewu Li, Jianping Wu. 605-609 [doi]
- Protocol independent multicast: From wired to wireless networksAlessandro Russo 0003, Renato Lo Cigno, Izhak Rubin. 610-615 [doi]
- Novel DCF-based multi-user MAC protocol and dynamic resource allocation for OFDMA WLAN systemsTakuya Mishima, Shinichi Miyamoto, Seiichi Sampei, Wenjie Jiang. 616-620 [doi]
- A hierarchical pea-based anomaly detection modelBiming Tian, Kathryn Merrick, Shui Yu, Jiankun Hu. 621-625 [doi]
- HIDEINSIDE - A novel randomized & encrypted antiforensic information hidingAvinash Srinivasan, Srinath Thirthahalli Nazaraj, Angelos Stavrou. 626-631 [doi]
- Towards secure and context-aware information lookup for the Internet of ThingsMichalis Giannikos, Korina Kokoli, Nikos Fotiou, Giannis F. Marias, George C. Polyzos. 632-636 [doi]
- Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutionsRobert Benner, Victor T. E. Echeverria, Uzoma Onunkwo, Jay Patel, David Zage. 637-641 [doi]
- Automated malware classification based on network behaviorSaeed Nari, Ali A. Ghorbani. 642-647 [doi]
- Intra frame constant rate control scheme for high efficiency video codingYimin Zhou, Ling Tian, Xuecheng Ning. 648-652 [doi]
- Mitigating the asymmetric interests among peers in peer-to-peer video-on-demand systemsSaikat Sarkar, Mea Wang. 653-659 [doi]
- A new video sharing by communication and analysis of region of interest on panoramic videoDaisuke Ochi, Hideaki Kimata, Hajime Noto, Akira Kojima. 660-664 [doi]
- Multi-source IPTV networks: Zap time and bandwidth optimizationDaniel Bailey, Yuh-Rong Chen, Sridhar Radhakrishnan, Suleyman Karabuk. 665-670 [doi]
- Low-complexity FPGA implementation of compressive sensing reconstructionJérôme L. V. M. Stanislaus, Tinoosh Mohsenin. 671-675 [doi]
- A novel scalable video streaming system on P2P networksKai-Lung Hua, Ge-Ming Chiu, Tai-Lin Chin, Hsing-Kua Pao, Yi-Chi Cheng, Guan-Ming Su. 676-680 [doi]
- Passenger influence on the performance of time reversal in intra-vehicular environmentFrancois Bellens, David Lautru, Jean-Michel Dricot, François Horlin, Aziz Benlarbi-Delaï, Philippe De Doncker. 681-685 [doi]
- Relay selection and power allocation in amplify-and-forward cognitive radio systemsKrishna Ram Budhathoki, Mehdi Maleki, Hamid-Reza Bahrami. 686-690 [doi]
- Closing the gap to the capacity of APSK: Constellation shaping and degree distributionsXingyu Xiang, Matthew C. Valenti. 691-695 [doi]
- Exploiting cross-layer packet overhearing for opportunistic distributed STC in wireless relay networksAntonios Argyriou. 696-700 [doi]
- Optimal pre-weighting scheme for spatially correlated MIMO-OFDM wireless system with subcarrier cluster constraintJohn F. An. 701-707 [doi]
- Transmit precoding based on outdated interference alignment for two users multi cell MIMO systemDanish Aziz, Andreas Weber. 708-713 [doi]
- Effective capacity optimization for cognitive radio network based on underlay scheme in gamma fading channelsMohamed Elalem, Lian Zhao. 714-718 [doi]
- An improved LFS engine for physical layer security augmentation in cognitive networksPaul K. Harmer, Michael A. Temple. 719-723 [doi]
- Cooperative resource allocation in OFDM-based multicell cognitive radio systemsQianyu Yang, Shaowei Wang, Mengyao Ge. 724-728 [doi]
- A location-aided routing protocol for cognitive radio networksKarim Habak, Mohammed Abdelatif, Hazem Hagrass, Karim Rizc, Moustafa Youssef. 729-733 [doi]
- A priority-aware channel selection scheme for real-time data transmission in cognitive radio networksNorooz Motamedi, Sunil Kumar, Fei Hu, Nathaniel Rowe. 734-739 [doi]
- A neural network approach to category validation of Android applicationsMo Ghorbanzadeh, Yang Chen, Zhongmin Ma, T. Charles Clancy, Robert McGwier. 740-744 [doi]
- Clustering algorithm based on minimal path loss ratio for vehicular communicationY. Harikrishnan, Jianhua He. 745-749 [doi]
- Practical provably secure key sharing for near field communication devicesAhmed Elbagoury, Ahmed Mohsen, Mohamed Ramadan, Moustafa Youssef. 750-755 [doi]
- MAC and application-level broadcast reliability in vanets with channel fadingXiaomin Ma, Xiaoyan Yin, Matthew Wilson, Kishor S. Trivedi. 756-761 [doi]
- Near-optimal packet allocation algorithm for content uploading to media cloud via collaborative wireless networkGe Zhang, Yonggang Wen, Yew-Soon Ong. 762-767 [doi]
- A node management scheme for R2V connections in RSU-supported Vehicular Adhoc NetworksWen-Hsing Kuo, Yen-Shien Tung, Shih-Hau Fang. 768-772 [doi]
- CAREFOR: Collision-aware reliable forwarding technique for vehicular ad hoc networksAnna Maria Vegni, Ahmad Mostafa, Dharma P. Agrawal. 773-777 [doi]
- EgyHet: An energy-saving routing protocol for wireless heterogeneous sensor networksXiao Chen, Zanxun Dai, Hongchi Shi. 778-782 [doi]
- Scheduling problems in interference-aware wireless sensor networksNhat X. Lam, Min Kyung An, Dung T. Huynh, Trac N. Nguyen. 783-789 [doi]
- Scheduled channel access using geographical classificationAshok N. Masilamani, J. J. Garcia-Luna-Aceves. 790-796 [doi]
- Measuring the efficiency of the sensing process in a wireless sensor networkBryan Larish, George F. Riley. 797-801 [doi]
- A realistic and stable Markov-based model for WSNsIrfan S. Al-Anbagi, Mounib Khanafer, Hussein T. Mouftah. 802-807 [doi]
- HarvWSNet: A co-simulation framework for energy harvesting wireless sensor networksAmine Didioui, Carolynn Bernier, Dominique Morche, Olivier Sentieys. 808-812 [doi]
- Ad-hoc networks at global scaleRene L. Cruz. 813-817 [doi]
- Wireless network virtualizationXin Wang, Prashant Krishnamurthy, David Tipper. 818-822 [doi]
- Trends in survivable/secure cognitive networksErik Blasch, Timothy Busch, Sunil Kumar, Khanh D. Pham. 825-829 [doi]
- Storage codes - Coding rate and repair localityHenk D. L. Hollmann. 830-834 [doi]
- Two dimensional-IP routingMingwei Xu, Shu Yang, Dan Wang, Jianping Wu. 835-839 [doi]
- Polar codes for data storage applicationsGabi Sarkis, Warren J. Gross. 840-844 [doi]
- Resilient and efficient MANET aerial communications for search and rescue applicationsWilliam H. Robinson, Adrian P. Lauf. 845-849 [doi]
- Storage replication in information-centric networkingParis Flegkas, Vasilis Sourlas, George Parisis, Dirk Trossen. 850-855 [doi]
- Efficient real-time information delivery in Future Internet Publish-Subscribe NetworksChristos Tsilopoulos, Ioannis Gasparis, George Xylomenos, George C. Polyzos. 856-860 [doi]
- Characterizing throughput bottlenecks for secure GridFTP transfersGayane Vardoyan, Rajkumar Kettimuthu, Michael Link, Steven Tuecke. 861-866 [doi]
- A highly-extensible architecture for networked I/OCynthia Taylor, Joseph Pasquale. 867-871 [doi]
- Reducing P2PSIP session setup delaysJouni Mäenpää. 872-878 [doi]
- SESAME: Smartphone enabled secure access to multiple entitiesAmeva Sanzziri, Anandatirtha Nandugudi, Shambhu Upadhyaya, Chunming Qiao. 879-883 [doi]
- An efficient algorithm to optimize interference and system capacity for cognitive wireless networksManish Wadhwa, Min Song, Chunsheng Xin, Komalpreet Kaur. 884-889 [doi]
- Fairness issue in message delivery in delay- and Disruption-Tolerant Networks for disaster areasAsato Takahashi, Hiroki Nishiyama, Nei Kato. 890-894 [doi]
- Architecture and protocols for LTE-based device to device communicationBalaji Raghothaman, Eric Deng, Ravikumar Pragada, Gregory Sternberg, Tao Deng, Kiran Vanganuru. 895-899 [doi]
- A MAC protocol for wireless personal area networksGang Ding, Richard Farley. 900-904 [doi]
- Mechanisms for coexistence of collocated WLAN and bluetooth in the same deviceAriton E. Xhafa, Yanjun Sun. 905-910 [doi]
- A stackelberg game for cooperative cognitive radio network with active SUsHeejun Roh, Cheoulhoon Jung, Wonjun Lee, Ding-Zhu Du. 911-915 [doi]
- Caching for IPTV distribution with time-shiftHenrik Abrahamsson, Mats Björkman. 916-921 [doi]
- Enhanced measurement-based admission control for flow-aware networksRobert Wójcik, Jerzy Domzal, Andrzei Jajszczvk. 922-926 [doi]
- Monitoring VoIP call quality using improved simplified E-modelHaytham Assem, David Malone, Jonathan Dunne, Pat O'Sullivan. 927-931 [doi]
- Assessment of speech quality degradation indicators for "continuity" dimension in super wideband telephony contextSibiri Tiémounou, Régine Le Bouquin-Jeannès, Vincent Barriac. 932-936 [doi]
- Practical multipath load balancing with QoSBradley R. Smith, Lincoln Thurlow. 937-943 [doi]
- A deterministic loss model based analysis of CUBICRodolfo I. Ledesma Goyzueta, Yu Chen. 944-949 [doi]
- Design of LDPC coding schemes for exploitation of bit error rate diversity across dies in NAND flash memoryRavi Motwani, Chong Ong. 950-954 [doi]
- Effective cache management and performance limits in information-centric networksVasilis Sourlas, Leandros Tassiulas. 955-960 [doi]
- Modulation coding for flash memoriesYongjune Kim, B. V. K. Vijaya Kumar, Kyoung Lae Cho, Hongrak Son, Jaehong Kim, Jun Jin Kong, Jaejin Lee. 961-967 [doi]
- Storage and network resource usage in reactive and proactive replicated storage systemsRossana Motta, Joseph Pasquale. 968-972 [doi]
- LCS-MANET: A mobile storage architecture with location centric storage algorithm in manetsShuai Zhao, Le Chang, Tong Zhao, Wei Yan. 973-977 [doi]
- Simple, exact placement of data in containersS. J. Thomas Schwarz, Ignacio Corderi, Darrell D. E. Long, Jehan-François Pâris. 978-982 [doi]
- Performance analysis of hierarchical selection diversity combining in Rayleigh fadingSébastien Roy. 983-987 [doi]
- Turbo equalization of precoded collaborative MIMO for the uplink of LTE-advancedKarim A. Banawan, Essam Sourour. 988-993 [doi]
- Qos-aware discrete bit loading for OFDMA networksAlireza Sani, Aliazam Abbasfar. 994-998 [doi]
- A queueing theoretic model for opportunistic network codingJ. T. Charith Gunasekara, Attahiru Sule Alfa, Pradeepa Yahampath. 999-1004 [doi]
- Performance of cooperative relaying with adaptive modulation and selection combiningWei Song 0001, Peijian Ju, Dizhi Zhou. 1005-1009 [doi]
- Energy balanced chain in IEEE 802.15.4 low rate WPANKunjie Xu, Mu Zhou. 1010-1015 [doi]
- Survivable cloud networking servicesFeng Gu, Hamad Alazemi, Ammar Rayes, Nasir Ghani. 1016-1020 [doi]
- System resilience modeling and enhancement for the cloudManghui Tu, Dianxiang Xu. 1021-1025 [doi]
- Cross-layer detection of stealthy jammers in multihop cognitive radio networksLijun Qian, Xiangfang Li, Shuangqing Wei. 1026-1030 [doi]
- Packet-pair sizing for controlling packet dispersion on wired heterogeneous networksKhondaker M. Salehin, Roberto Rojas-Cessa. 1031-1035 [doi]
- Stability metrics and criteria for path-vector routingDimitri Papadimitriou, Albert Cabellos-Aparicio, Florin Coras. 1036-1042 [doi]
- Uncovering the evolution from finite to infinite high-priority capacity in a priority queueJoris Walraevens, Thomas Demoor, Dieter Fiems, Herwig Bruneel. 1043-1047 [doi]
- TCP-FITDC: An adaptive approach to TCP incast avoidance for data center applicationsJun Zhang, Jiangtao Wen, Jingyuan Wang, Wenlai Zhao. 1048-1052 [doi]
- Analysis of adaptive queueing policies via adiabatic approachLeena Zacharias, Thinh P. Nguyen, Yevgeniy Kovchegov, Kyle Bradford. 1053-1057 [doi]
- Filtering network traffic based on protocol encapsulation rulesIvano Cerrato, Marco Leogrande, Fulvio Risso. 1058-1063 [doi]
- A quality of experience handover system for heterogeneous multimedia wireless networksCarlos Quadros, Eduardo Cerqueira, Augusto Neto, Antonio Pescapè, Andre Riker, Roger Immich, Marília Curado. 1064-1068 [doi]
- A novel optical wireless MIMO architecture and its applicationMingbo Niu, Julian Cheng, Jonathan F. Holzman. 1069-1073 [doi]
- Multi-objective QoS routing for wireless sensor networksHind Alwan, Anjali Agarwal. 1074-1079 [doi]
- Multiple packet reception in asynchronous wireless networksAntonios Argyriou. 1080-1084 [doi]
- On optimal input design and model selection for communication channelsYanyan Li, Seddik M. Djouadi, Mohammed M. Olama. 1085-1089 [doi]
- An efficient hybrid model and dynamic performance analysis for multihop wireless networksKunjie Xu, David Tipper, Prashant Krishnamurthy, Yi Qian. 1090-1096 [doi]
- Elastic optical networking and low-latency high-radix optical switches for future cloud computingS. J. B. Yoo, Yawei Yin, Roberto Proietti. 1097-1101 [doi]
- Inter-domain QoT-aware RWA for translucent optical networksJuzi Zhao, Suresh Subramaniam, Maïté Brandt-Pearce. 1102-1106 [doi]
- Spatio-temporal analysis for smart grids with wind generation integrationMiao He, Lei Yang, Junshan Zhang, Vijay Vittal. 1107-1111 [doi]
- Towards an enterprise self-healing system against botnets attacksAdeeb M. Alhomoud, Irfan-Ullah Awan, Jules Pagna Disso. 1112-1117 [doi]
- Interest propagation in named data manetsYu-Ting Yu, Raheleh B. Dilmaghani, Seraphin Calo, M. Y. Sanadidi, Mario Gerla. 1118-1122 [doi]
- Pics-on-wheels: Photo surveillance in the vehicular cloudMario Gerla, Jui-Ting Weng, Giovanni Pau. 1123-1127 [doi]
- SenSec: Mobile security through passive sensingJiang Zhu, Pang Wu, Xiao Wang, Joy Zhang. 1128-1133 [doi]
- Enhancing dependability in Future Internet systems by applying over-provisioning centric resource allocation controlSandino Jardim, Augusto Neto, J. Castillo, Eduardo Cerqueira, H. Barros. 1134-1138 [doi]
- Multiple object tracking in sensor networks using distributed clique findingNauman Javed, Tilman Wolf. 1139-1145 [doi]
- Improving fairness of OBS routing protocols in multimode fiber networksSana Tariq, Mostafa A. Bassiouni, Guifang Li. 1146-1150 [doi]
- ROUTE-O-MATIC: A comprehensive framework for reactive mesh routing protocolsMohamad Sbeiti, Carsten Vogel, Andreas Wolff, Christian Wietfeld. 1151-1155 [doi]
- Interplay between TVWS and DSRC: Optimal strategy for QoS of safety message dissemination in VANETJae-Han Lim, Wooseong Kim, Katsuhiro Naito, Mario Gerla. 1156-1161 [doi]
- Coordinated partial co-channel deployment in two-layer networksNancy Diaa El-Din, Essam A. Sourour, Karim G. Seddik, Ibrahim A. Ghaleb. 1162-1167 [doi]
- Rate adaptation based on inherent frame delivery ratio for wireless networksChaoYi Bian, Shanbo Lu, Tong Zhao, Xiaoming Li, Wei Yan. 1168-1172 [doi]
- Throughput enabled rate adaptation in wireless networksDuy Nguyen, J. J. Garcia-Luna-Aceves, Cédric Westphal. 1173-1178 [doi]
- Optimal density and power allocation of D2D communication under heterogeneous networks on multi-bands with outage constraintsZiyang Liu, Hao Chen, Tao Peng 0001, Wenbo Wang 0007. 1179-1183 [doi]
- Rate selection analysis under semi-persistent scheduling in LTE networksDonald Parruca, James Gross. 1184-1190 [doi]