


default search action
Annales des Télécommunications, Volume 72
Volume 72, Numbers 1-2, February 2017
- Nadjib Aitsaadi, Raouf Boutaba, Yutaka Takahashi:

Cloudification of the internet of things. 1-2 - Fadi M. Al-Turjman:

Information-centric sensor networks for cognitive IoT: an overview. 3-18 - David Perez Abreu

, Karima Velasquez
, Marília Curado
, Edmundo Monteiro
:
A resilient Internet of Things architecture for smart cities. 19-30 - Riccardo Petrolo, Roberto Morabito, Valeria Loscrì

, Nathalie Mitton
:
The design of the gateway for the Cloud of Things. 31-40 - Daniel Happ, Niels Karowski, Thomas Menzel, Vlado Handziski, Adam Wolisz:

Meeting IoT platform requirements with open pub/sub solutions. 41-52 - Francesco Longo

, Dario Bruneo, Salvatore Distefano, Giovanni Merlino
, Antonio Puliafito:
Stack4Things: a sensing-and-actuation-as-a-service framework for IoT and cloud integration. 53-70 - Nikola Dalcekovic, Srdjan Vukmirovic, Sebastijan Stoja, Nemanja Milosevic:

Enabling the IoT paradigm through multi-tenancy supported by scalable data acquisition layer. 71-78 - Husnu S. Narman

, Md. Shohrab Hossain
, Mohammed Atiquzzaman
, Haiying Shen:
Scheduling internet of things applications in cloud computing. 79-93 - Sangeetha Dhamodaran

, Vaidehi Vijayakumar
:
A secure cloud based Personal Health Record framework for a multi owner environment. 95-104 - Karima Velasquez

, David Perez Abreu
, Marília Curado
, Edmundo Monteiro
:
Service placement for latency reduction in the internet of things. 105-115 
Volume 72, Numbers 3-4, April 2017
- Abdelouahid Derhab, Mohamed Guerroumi

, Mohamed F. Younis
:
Wireless and mobile sensing technologies for the future Internet. 117-118 - Fadi Al-Turjman

, Mehmet Karakoc, Melih Günay
:
Path planning for mobile DCs in future cities. 119-129 - Fan Wu

, Lili Xu, Saru Kumari
, Xiong Li
, Muhammad Khurram Khan
, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. 131-144 - Thomas Mansfield, Bogdan V. Ghita

, Marcel Adrian Ambroze
:
Signals of opportunity geolocation methods for urban and indoor environments. 145-155 - Faouzi Sebbak

, Farid Benhammadi:
Majority-consensus fusion approach for elderly IoT-based healthcare applications. 157-171 - Ashfaq Ahmad

, Sheeraz Ahmed
, Muhammad Imran, Masoom Alam, Iftikhar Azim Niaz, Nadeem Javaid
:
On energy efficiency in underwater wireless sensor networks with cooperative routing. 173-188 - Zouina Doukha, Sofian Ali Ben Mussa, Kayhan Zrar Ghafoor

, Iman Loumachi, Samira Moussaoui:
Load balancing aware SDMA-based beaconing approach in vehicular ad hoc networks. 189-197 - Shailendra Shukla

, Rajiv Misra
, Abhishek Agarwal:
Virtual coordinate system using dominating set for GPS-free adhoc networks. 199-208 - Fadi Al-Turjman, Melih Günay

, Irem Kucukoglu
:
The road to dynamic Future Internet via content characterization. 209-219 - Mohammed Boudali, Mustapha Réda Senouci

, Mohamed Aissani, Walid-Khaled Hidouci:
Activities scheduling algorithms based on probabilistic coverage models for wireless sensor networks. 221-232 
Volume 72, Numbers 5-6, June 2017
- Haider Abbas

, Olaf Maennel
, Saïd Assar:
Security and privacy issues in cloud computing. 233-235 - Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti

, Rajkumar Buyya:
Service resizing for quick DDoS mitigation in cloud computing environment. 237-252 - Rooh ul Amin

, Irum Inayat, Basit Shahzad, Kashif Saleem
, AiJun Li:
An empirical study on acceptance of secure healthcare service in Malaysia, Pakistan, and Saudi Arabia: a mobile cloud computing perspective. 253-264 - Ashfaq Hussain Farooqi

, Farrukh Aslam Khan
:
Securing wireless sensor networks for improved performance in cloud-based environments. 265-282 - Yunchuan Sun, Lei Wu, Shizhong Wu, Shoupeng Li, Tao Zhang, Li Zhang, Junfeng Xu, Yongping Xiong, Xuegang Cui:

Attacks and countermeasures in the internet of vehicles. 283-295 - Laisen Nie, Dingde Jiang, Zhihan Lv

:
Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks. 297-305 - Faria Mehak, Rahat Masood

, Muhammad Awais Shibli, Islam Elgedawy
:
EACF: extensible access control framework for cloud environments. 307-323 - Nasir Raza, Imran Rashid, Fazeel Ali Awan:

Security and management framework for an organization operating in cloud environment. 325-333 - Yaser Jararweh

, Mahmoud Al-Ayyoub, Lo'ai Tawalbeh
, Ala Darabseh, Houbing Song
:
Software-defined systems support for secure cloud computing based on data classification. 335-345 - Ayo Gbadeyan, Sergey Butakov

, Shaun Aghili:
IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider. 347-357 - Yang Lu, Gang Wang, Jiguo Li, Jian Shen

:
Efficient designated server identity-based encryption with conjunctive keyword search. 359-370 - Wiem Abderrahim

, Zièd Choukair:
The three-dimensional model for dependability integration in cloud computing. 371-384 
Volume 72, Numbers 7-8, August 2017
- Emmanuel Bertin, Markus Hofmann, Payam M. Barnaghi

:
Virtualized environments, from connectivity to services. 385-386 - Rajeev Agrawal, Anand S. Bedekar

, Troels E. Kolding
, Vishnu Ram:
Cloud RAN challenges and solutions. 387-400 - Marat Zhanikeev

:
Penalty migration as a performance signaling method in energy-efficient clouds. 401-413 - Virginia Pilloni

, Luigi Atzori:
Consensus-based resource allocation among objects in the internet of things. 415-429 - Jörg Niemöller

, Nina Washington:
Subjective perception scoring: psychological interpretation of network usage metrics in order to predict user satisfaction. 431-441 - Enrico Ferrera, Davide Conzon

, Paolo Brizzi, Rosaria Rossini
, Claudio Pastrone, Marc Jentsch, Peeter Kool, Carlos Kamienski
, Djamel Sadok:
XMPP-based infrastructure for IoT network management and rapid services and applications development. 443-457 - Ibrahim Tariq Javed

, Rebecca Copeland, Noël Crespi, Marc Emmelmann, Andreea Ancuta Corici, Ahmed Bouabdallah, Tuo Zhang, Saad El Jaouhari, Felix Beierle, Sebastian Göndör, Axel Küpper, Kevin Corre, Jean-Michel Crom, Frank Oberle, Ingo Friese, Ana Caldeira, Gil Dias, Nuno Santos
, Ricardo Chaves
, Ricardo Lopes Pereira:
Cross-domain identity and discovery framework for web calling services. 459-468 - Bindu Bharti, Ghanshyam Singh

:
Analysis of capacity limits over fading environment with imperfect channel state information for cognitive radio network. 469-482 - Lan Wu, Chenglin Wen:

A new synthesis filter for filter bank systems with transmission delay. 483-490 - Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:

A trust-based security environment in MANET: definition and performance evaluation. 491-498 - Modisa Mosalaosi

, Thomas Joachim Odhiambo Afullo
:
Channel modeling for high-speed indoor powerline communication systems: the lattice approach. 499-511 
Volume 72, Numbers 9-10, October 2017
- Brij B. Gupta

, Dharma P. Agrawal, Shingo Yamaguchi, Nalin Asanka Gamagedara Arachchilage
, Suresh Veluru:
Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions. 513-515 - Brij B. Gupta

, Tafseer Akhtar:
A survey on smart power grid: frameworks, tools, security issues, and solutions. 517-549 - Mouzna Tahir, Abid Khan

, Abdul Hameed
, Masoom Alam, Muhammad Khurram Khan
, Farhana Jabeen
:
Towards a set aggregation-based data integrity scheme for smart grids. 551-561 - Tarunpreet Bhatia

, A. K. Verma:
Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing. 563-576 - Alberto Huertas Celdrán

, Manuel Gil Pérez
, Félix J. García Clemente
, Gregorio Martínez Pérez:
Preserving patients' privacy in health scenarios through a multicontext-aware system. 577-587 - Xiaoqing Tan

, Xu Zhou:
Universal half-blind quantum computation. 589-595 - Junjie Pang, Gaochao Xu, Xiaodong Fu, Kuo Zhao:

Horizon: a QoS management framework for SDN-based data center networks. 597-605 - Chundong Wang

, Zhiyuan Li, Xiu-liang Mo, Hong Yang, Yi Zhao:
An android malware dynamic detection method based on service call co-occurrence matrices. 607-615 - Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:

Multi-user searchable encryption with a designated server. 617-629 - Xin Xie, Huiping Li, Fengping Hu, Mingye Xie, Nan Jiang, Huandong Xiong:

An improved tracking algorithm of floc based on compressed sensing and particle filter. 631-637 
Volume 72, Numbers 11-12, December 2017
- Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi

:
Improving spectrum efficiency in self-organized femtocells using learning automata and fractional frequency reuse. 639-651 - Patrick Tortelier

, Didier Le Ruyet:
Erasure correction-based CSMA/CA. 653-660 - Seok-Hwan Park, Chang-Ick Song:

Fronthaul-aware superposition coding for noncoherent transmission in C-RAN downlink. 661-667 - Thanh-Luan Nguyen

, Dinh-Thuan Do:
A new look at AF two-way relaying networks: energy harvesting architecture and impact of co-channel interference. 669-678 - Elias Yaacoub

:
Femtocells in centralized systems: green operation and radio resource management techniques. 679-691 - Elisa Rojas

, Joaquin Alvarez-Horcajo
, Isaías Martinez-Yelmo
, José M. Arco, Juan A. Carral:
GA3: scalable, distributed address assignment for dynamic data center networks. 693-702 - Zhao-Xu Yang, Guang-She Zhao, Guoqi Li, Hai-Jun Rong:

Matrix differentiation for capacity region of Gaussian multiple access channels under weighted total power constraint. 703-715 - Salah-Eddine Belouanas

, Mehdi Bezahaf, Kim Loan Thai, Prométhée Spathis, Marcelo Dias de Amorim:
Leveraging node gatherings to save cellular resources. 717-730 - Asil Koç

, Ibrahim Altunbas
, Abbas Yongaçoglu:
Relay selection in two-way full-duplex relay networks over Nakagami-m fading channels. 731-742 - Sahar Hoteit

, Stefano Secci, Marco Premoli:
Crowded spot estimator for urban cellular networks. 743-754 - Louis Philippe Sondeck

, Maryline Laurent
, Vincent Frey:
Discrimination rate: an attribute-centric metric to measure privacy. 755-766 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














