


Остановите войну!
for scientists:


default search action
15th CCNC 2018: Las Vegas, NV, USA
- 15th IEEE Annual Consumer Communications & Networking Conference, CCNC 2018, Las Vegas, NV, USA, January 12-15, 2018. IEEE 2018, ISBN 978-1-5386-4790-5
- Shay Gueron
, Nir Drucker
:
Cryptosystems with a multi prime composite modulus. 1-7 - Wafa Ben Jaballah, Mauro Conti, Claudio E. Palazzi
:
The position cheating attack on inter-vehicular online gaming. 1-6 - Andreas Pamboris, Panayiotis Andreou, Herodotos Herodotou, George Samaras:
MULTI-WEAR: A multi-wearable platform for enhancing mobile experiences. 1-6 - Lanier A. Watkins, Amritha Lal Kalathummarath, William H. Robinson:
Network-based detection of mobile malware exhibiting obfuscated or silent network behavior. 1-4 - Jeremiah Pate, Tosiron Adegbija:
AMELIA: An application of the Internet of Things for aviation safety. 1-6 - Cong Pu
, Salam Hajjar:
Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks. 1-6 - Navuday Sharma
, Maurizio Magarini, Laura Dossi, Luca Reggiani, Roberto Nebuloni:
A study of channel model parameters for aerial base stations at 2.4 GHz in different environments. 1-6 - Thomas Breitbach, Peter Sanders, Dominik Schultes:
Optimizing energy consumption and user experience in a mobile video streaming scenario. 1-9 - Mu Mu:
Software defined cognitive networking: Supporting intelligent online video streaming. 1-4 - Vicente J. P. Amorim, Saul E. Delabrida
, Ricardo A. O. Oliveira:
A comparative analysis of wearables operating systems based on functional constraints. 1-6 - Jahanzeb Farooq, Lars Bro, Rasmus Thystrup Karstensen, José Soler
:
A multi-radio, multi-hop ad-hoc radio communication network for Communications-Based Train Control (CBTC): Introducing frequency separation for train-to-trackside communication. 1-7 - Mohamed F. Marzban, Ahmed El Shafie, Rakan C. Chabaan, Naofal Al-Dhahir:
Securing OFDM-based wireless links using temporal artificial-noise injection. 1-6 - Jinping Hao, Hao Liu:
Fast spatial correlation acquisition for hybrid precoding using sequential compressive sensing. 1-6 - Vahid Vahidi, Ebrahim Saberinia:
OFDM high speed train communication systems in 5G cellular networks. 1-6 - Douglas Comer, Adib Rastegarnia:
OSDF: A framework for software defined network programming. 1-4 - Ezedin Barka, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas:
Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments. 1-7 - Khaled Rabieh, Kemal Akkaya, Umit Karabiyik, Jennifer Qamruddin:
A secure and cloud-based medical records access scheme for on-road emergencies. 1-8 - Muhammad Rehan Usman, Muhammad Arslan Usman, Soo Young Shin:
A novel encoding-decoding scheme using huffman coding for multimedia networks. 1-6 - Muhammad Arslan Usman, Muhammad Rehan Usman, Soo Young Shin:
An intrusion oriented heuristic for efficient resource management in end-to-end wireless video surveillance systems. 1-6 - Aziza Ben Mosbah, David W. Griffith, Richard Rouil
:
Enhanced transmission algorithm for dynamic device-to-device direct discovery. 1-8 - Ahcène Bounceur, Laurent Clavier
, Pierre Combeau, Olivier Marc, Rodolphe Vauzelle, Arnaud Masserann, Julien Soler, Reinhardt Euler, Taha Alwajeeh, Vyas Devendra, Umber Noreen, Emilie Soret, Massinissa Lounis:
CupCarbon: A new platform for the design, simulation and 2D/3D visualization of radio propagation and interferences in IoT networks. 1-4 - Kazuki Iehira, Hiroyuki Inoue, Kenji Ishida:
Spoofing attack using bus-off attacks against a specific ECU of the CAN bus. 1-4 - Sangyoun Lee, Young Deok Park, Young-Joo Suh, Seokseong Jeon:
Design and implementation of monitoring system for breathing and heart rate pattern using WiFi signals. 1-7 - Jinyeop Na, Jeongwan Koh, Sangwoo Park, Joonhyuk Kang:
Energy efficiency enhancement on cloud and edge processing by dynamic RRH selection. 1-6 - Guibing Zhu, Chun-Hao Liao, Makoto Suzuki, Yoshiaki Narusue, Hiroyuki Morikawa:
Evaluation of LoRa receiver performance under co-technology interference. 1-7 - Qian Wang, Brian Lee
, Niall Murray, Yuansong Qiao
:
MR-IoT: An information centric MapReduce framework for IoT. 1-6 - Madhan Raj Kanagarathinam, Sukhdeep Singh, Irlanki Sandeep, Abhishek Roy, Navrati Saxena:
D-TCP: Dynamic TCP congestion control algorithm for next generation mobile networks. 1-6 - Junya Yamamoto, Masaki Bandai
:
A flickerless screen-camera communication using interframe difference. 1-4 - Chiara Zizza, Adam Starr, Devin Hudson, Sai Shreya Nuguri, Prasad Calyam, Zhihai He:
Towards a social virtual reality learning environment in high fidelity. 1-4 - Jose Armando Oviedo
, Hamid R. Sadjadpour:
Leveraging edge caching in NOMA systems with QoS requirements. 1-5 - Naoto Horiike, Hiroki Kitagawa, Eiji Okamoto
, Tetsuya Yamamoto:
Chaos MIMO-based downlink non-orthogonal multiple access scheme with physical layer security. 1-7 - Phi-Le Nguyen, Yusheng Ji, Khanh Le, Thanh-Hung Nguyen:
Load balanced and constant stretch routing in the vicinity of holes in WSNs. 1-6 - Tushar Vrind, Diwakar Sharma, Lalit Pathak, Debabrata Das
:
Session cloning protocol between smart devices for connected and un-connected states in B4G and 5G. 1-8 - Ammara Anjum Khan, Mehran Abolhasan
, Wei Ni:
5G next generation VANETs using SDN and fog computing framework. 1-6 - Ahmad Saad, Barbara Staehle, Rudi Knorr:
Predictive medium access control for industrial cognitive radio. 1-8 - Imad Alawe, Yassine Hadjadj Aoul, Adlen Ksentini, Philippe Bertin, Davy Darche:
On the scalability of 5G core network: The AMF case. 1-6 - Takahiko Kato, Masaki Bandai
:
A hop-by-hop window-based congestion control method for named data networking. 1-7 - Ryo Tanabe, Tatsuhiro Kawaguchi, Ryohei Takitoge, Koichiro Ishibashi, Koji Ishibashi
:
Energy-aware receiver-driven medium access control protocol for wireless energy-harvesting sensor networks. 1-6 - Mariem Harmassi, Cyril Faucher, Yacine Ghamri-Doudane:
Smart things: Conditional random field based solution for context awareness at the IoT edge. 1-7 - Samet Tonyali
, Kemal Akkaya:
A scalable protocol stack for IEEE 802.11s-based advanced metering infrastructure networks. 1-6 - Cherita L. Corbett, Jimmy Alexis, Lanier A. Watkins:
Who's driving you? 1-4 - Carla Mouradian, Sami Yangui, Roch H. Glitho:
Robots as-a-service in cloud computing: Search and rescue in large-scale disasters case study. 1-7 - Sarvesh S. Kulkarni, Daniel Jigarjian, Vijay Gehlot, Ivan Ong:
Mitigation of undesirable association behaviors of mobile devices with public WiFi networks. 1-8 - Koudai Kanda, Shin'ichi Arakawa, Satoshi Imai, Toru Katagiri, Motoyoshi Sekiya, Masayuki Murata:
Dynamic resource control method based on real world representation with potential field. 1-6 - Hadi Alasti:
A low complexity and flexible implementation of 2n-QAM for software defined radio applications. 1-6 - Thiago A. L. Genez
, Fung Po Tso
, Lin Cui:
Latency-aware joint virtual machine and policy consolidation for mobile edge computing. 1-6 - Muhammad Azfar Yaqub
, Mohammad Toaha Raza Khan, Syed Hassan Ahmed, Dongkyun Kim:
Receiver-initiated dynamic duty cycle scheduling schemes for underwater wireless sensor networks. 1-6 - Abdullah Aydeger, Nico Saputro
, Kemal Akkaya, A. Selcuk Uluagac:
Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications. 1-6 - Thi-Hanh Nguyen, Phi-Le Nguyen, Phan Thanh Tuyen, Huynh Thi Thanh Binh, Ernest Kurniawan, Yusheng Ji:
Node placement for target coverage and network connectivity in WSNs with multiple sinks. 1-6 - Ahmed El Shafie, Mohamed F. Marzban, Rakan Chabaan, Naofal Al-Dhahir:
A hybrid artificial-noise and secret-key scheme for securing OFDM transmissions in V2G networks. 1-6 - Elissar Khloussy, Yuming Jiang:
The impact of net neutrality on revenue and quality of service in wireless networks. 1-6 - Anan Sawabe, Hiroshi Yoshida, Kousuke Nogami:
Log analysis in a HTTP proxy server for accurately estimating web QoE. 1-7 - Sujit Jos, Kiran Bynam, Jinesh P. Nair, P. S. Chandrashekhar Thejaswi, Changsoon Park, Young-Jun Hong, Youngsoo Kim:
A carrier frequency offset compensation algorithm with synchronization for digital communication receivers. 1-4 - Ismail AlQerm
, Basem Shihada
:
Supervised cognitive system: A new vision for cognitive engine design in wireless networks. 1-8 - Yuki Katsumata, Takuya Shimojo, Ashiq Khan, Akira Yamada, Shigeru Iwashina:
An efficient cost-calculation method for end-to-end slice generation. 1-6 - Samuel Kim, David Shrekenhamer, Jeffrey Will, Ra'id Awadallah, Joseph A. Miragliotta:
High impedance holographic metasurfaces for conformal and high gain antenna applications. 1-4 - Hirotaka Nakano, Yosuke Tanigawa, Hideki Tode:
Dynamic adaptation to environmental changes of optical virtual networking and cloud computing systems for tightly coupling big data and peripheral computer resources. 1-8 - Ryoichi Shinkuma
, Shingo Kato, Masahiro Kanbayashi, Yasuhiro Ikeda, Ryoichi Kawahara, Takanori Hayashi:
System design for predictive road-traffic information delivery using edge-cloud computing. 1-6 - Abbas Soltanian, Diala Naboulsi, Mohammad A. Salahuddin, Roch H. Glitho, Halima Elbiaze, Constant Wette:
ADS: Adaptive and dynamic scaling mechanism for multimedia conferencing services in the cloud. 1-6 - Rihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme. 1-7 - Qing Wei, Li Wang, Zhiyong Feng, Zhi Ding
:
Cooperative coexistence and resource allocation for V2X communications in LTE-unlicensed. 1-6 - Mahmoud Mohamed Bahnasy, Halima Elbiaze, Catherine Truchan:
CPRI over Ethernet: Towards fronthaul/backhaul multiplexing. 1-7 - Davide Aguiari
, Giovanni Delnevo
, Lorenzo Monti
, Vittorio Ghini, Silvia Mirri, Paola Salomoni, Giovanni Pau
, Marcus Im, Rita Tse, Mongkol Ekpanyapong, Roberto Battistini:
Canarin II: Designing a smart e-bike eco-system. 1-6 - Amel Arfaoui, Asma Ben Letaifa
, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
A stochastic game for adaptive security in constrained wireless body area networks. 1-7 - Bouziane Brik, Junaid Ahmed Khan, Yacine Ghamri-Doudane, Nasreddine Lagraa, Abderrahmane Lakas:
GSS-VC: A game-theoretic approach for service selection in vehicular cloud. 1-6 - Ahmed F. Hussein, Hany Elgala, Thomas D. C. Little
:
Visible light communications: Toward multi-service waveforms. 1-6 - Nada Elgaml, Ahmed K. F. Khattab, Hebat-Allah M. Mourad:
Slotted IEEE 802.11p contention for overhead-free spectrum sensing in CR-VANETs. 1-6 - Mohamed Attia, Nour Haidar, Sidi Mohammed Senouci, El-Hassane Aglzim:
Towards an efficient energy management to reduce CO2 emissions and billing cost in smart buildings. 1-6 - Narjes Tahghigh Jahromi, Roch H. Glitho, Adel Larabi, Richard Brunner:
An NFV and microservice based architecture for on-the-fly component provisioning in content delivery networks. 1-7 - Amit Dvir
, Yoram Haddad, Aviram Zilberman:
Wireless controller placement problem. 1-4 - Hichem Sedjelmaci, Imane Horiya Brahmi, Aymen Boudguiga
, Witold Klaudel:
A generic cyber defense scheme based on stackelberg game for vehicular network. 1-6 - Ubaid Abbasi, Halima Elbiaze:
Multimedia streaming using D2D in 5G ultra dense networks. 1-6 - Yisroel Mirsky, Yoram Haddad, Orit Rozenblit, Rina Azoulay:
Predicting wireless coverage maps using radial basis networks. 1-4 - Amrit Kharel, Lei Cao
:
Asymptotic analysis and optimization design of physical layer systematic rateless codes. 1-6 - Lei Zhong, Keno Garlichs, Shigeki Yamada, Kiyoshi Takano, Yusheng Ji:
Mission planning for UAV-based opportunistic disaster recovery networks. 1-6 - Kevin Gatimu, Arul Dhamodaran, Taylor Johnson, Ben Lee:
Experimental study of low-latency HD VoD streaming using flexible dual TCP-UDP streaming protocol. 1-6 - Christopher Scherb, Dennis Grewe, Marco Wagner, Christian F. Tschudin:
Resolution strategies for networking the IoT at the edge via named functions. 1-6 - Lorenzo Monti
, Giovanni Delnevo
:
On improving GlovePi: Towards a many-to-many communication among deaf-blind users. 1-5 - Zhan Liu
, Shaban Shabani, Nicole Glassey Balet
, Maria Sokhn, Fabian Cretton:
How to motivate participation and improve quality of crowdsourcing when building accessibility maps. 1-6 - Salem Alharbi, Peter Rodriguez, Rajaputhri Maharaja, Prashant Iyer, Nivethitha Bose, Zilong Ye:
FOCUS: A fog computing-based security system for the Internet of Things. 1-5 - Ather Sharif, Babak Forouraghi:
evoGraphs - A jQuery plugin to create web accessible graphs. 1-4 - Misao Kataoka, Naoto Hoshikawa, Hirofumi Noguchi, Tatsuya Demizu, Yoji Yamato:
Tacit computing and its application for open IoT era. 1-5 - Ilias Avramidis, Michael Mackay, Fung Po Tso
, Takaaki Fukai, Takahiro Shinagawa
:
Live migration on ARM-based micro-datacentres. 1-6 - Giovanni Delnevo
, Lorenzo Monti
, Francesco Vignola, Paola Salomoni, Silvia Mirri:
AlmaWhere: A prototype of accessible indoor wayfinding and navigation system. 1-6 - Keigo Ogawa, Kenji Kanai, Masaru Takeuchi, Jiro Katto
, Toshitaka Tsuda:
Edge-centric field monitoring system for energy-efficient and network-friendly field sensing. 1-6 - Juan M. Calderón
, Luis Gabriel Jaimes:
A fuzzy control-based approach for the selection of health interventions. 1-6 - Jori Winderickx, Dave Singelée, Nele Mentens
:
HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing. 1-6 - Marco Furini
, Silvia Mirri, Manuela Montangero
:
Topic-based playlist to improve video lecture accessibility. 1-5 - Catia Prandi
, Giovanni Delnevo
, Chiara Ceccarini
:
On augmenting the experience of people with mobility impairments while exploring the city: A case study with wearable devices. 1-5 - Maroi Aloui, Halima Elbiaze, Roch H. Glitho, Sami Yangui:
Analytics as a service architecture for cloud-based CDN: Case of video popularity prediction. 1-4 - Kentaro Imagane, Kenji Kanai, Jiro Katto
, Toshitaka Tsuda, Hidenori Nakazato:
Performance evaluations of multimedia service function chaining in edge clouds. 1-4 - Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache
:
A multi-objective non-dominated sorting genetic algorithm for VNF chains placement. 1-4 - Awantee V. Deshpande, Mihir H. Khandekar, Charuta G. Pethe, Jibi Abraham
:
Network recommendation based on route prediction and mobile tower localisation. 1-4 - Takao Sawa, Naoki Nishimura, Shin Ito:
Wireless optical ethernet modem for underwater vehicles. 1-4 - Issam Raïs
, Eddy Caron, Laurent Lefèvre:
Thermal aware scheduling on distributed computing water heaters. 1-4 - Yutaro Oda, Yosuke Tanigawa, Hideki Tode:
Distributed search for ordered VNFs configuring service chaining based on in-network guidance. 1-4 - Le Luong Vy, Do Sinh, Li-Ping Tung, Bao-Shuh Paul Lin:
A practical model for traffic forecasting based on big data, machine-learning, and network KPIs. 1-4 - Quang Tran Minh, Le Van An, Tran Khanh Dang
, Nam Thoai, Takeshi Kitahara:
An effective flow aggregation for SDN-based background and foreground traffic control. 1-4 - Natsuki Kai, Hiroshi Yoshida, Koichi Nihei:
An ensemble method for estimating TCP throughput on application layer. 1-4 - Yuya Miyazaki, Katsuhiro Naito, Hidekazu Suzuki, Akira Watanabe:
Development of certificate based secure communication for mobility and connectivity protocol. 1-4 - Salvatore Costanzo
, Ilhem Fajjari, Nadjib Aitsaadi, Rami Langar:
A network slicing prototype for a flexible cloud radio access network. 1-4 - Mohamed Nacer Bouatit, Selma Boumerdassi
, Adel Djama:
Experimental evaluation of fault-tolerant mechanisms over Imote2 platform. 1-4 - Amitangshu Pal, Krishna Kant:
E-Darwin2: A smartphone based disaster recovery network using WiFi tethering. 1-5 - Yongtao Shuai, Thorsten Herfet:
Towards reduced latency in adaptive live streaming. 1-4 - Muhammad Arslan Usman, Muhammad Rehan Usman:
Using image steganography for providing enhanced medical data security. 1-4 - Dae-Ho Kim, Goo-Rak Kwon, Jae-Young Pyun, Jong-Woo Kim:
NLOS identification in UWB channel for indoor positioning. 1-4 - Arash Boustani, Navid Alamatsaz, Nima Alamatsaz, Ashkan Boustani:
Traffic volume reduction in smart grid networks by a cooperative intelligent interpolation technique. 1-7 - Vahid Vahidi, Ebrahim Saberinia:
A low complexity and bandwidth efficient procedure for OFDM data reconstruction in DSC 5G networks. 1-4 - Kiho Lim, Kastuv M. Tuladhar:
Trajectory based pre-key exchange scheme for seamless vehicular networks connectivity. 1-5 - Xiaoyan Ma, Rahim Kacimi, Riadh Dhaou:
Adaptive hybrid MAC protocols for UAV-assisted mobile sensor networks. 1-4 - Wanjik Kim, Sukjong Ha, Jeongwan Koh, Joonhyuk Kang:
Artificial noise-aided secure beamforming for multigroup multicast. 1-4 - Fatemeh Khalili, Jeffrey C. Dill:
Near shannon bound performance for low rate short block turbo codes. 1-4 - C. Ramesh, P. Ravi Kumar:
A novel MAC scheduling algorithm for TCP throughput improvement in LTE system. 1-4 - Lalit Pathak, Diwakar Sharma, Tushar Vrind, Debabrata Das
:
Protocol for reduction in network resource wastage for 4G dual SIM dual standby user equipment. 1-4 - Sandesh Kumar Srivastava, Madhan Raj Kanagarathinam, SuneelKumar Diggi, Harikrishnan Natarajan:
CLEH - Cross layer enhanced handover for IMS sessions. 1-4 - Tanguy Ropitault:
Evaluation of RTOT algorithm: A first implementation of OBSS_PD-based SR method for IEEE 802.11ax. 1-7 - Giovanni Delnevo
, Lorenzo Monti
, Federico Foschini, Luca Santonastasi:
On enhancing accessible smart buildings using IoT. 1-6 - Farah Slim, Fabrice Guillemin
, Yassine Hadjadj Aoul:
CLOSE: A costless service offloading strategy for distributed edge cloud. 1-6 - Shao Loong Lim, Seanglidet Yean
, Bu-Sung Lee, Chai Kiat Yeo:
RehabPartner: Motion tracking assistant using a novel complementary feedback filter. 1-6