default search action
3rd ISNCC 2016: Yasmine Hammamet, Tunisia
- 2016 International Symposium on Networks, Computers and Communications, ISNCC 2016, Yasmine Hammamet, Tunisia, May 11-13, 2016. IEEE 2016, ISBN 978-1-5090-0284-9
- Hideki Yaginuma, Tatsuya Kusakabe:
The spatiotemporal optimization of waste water heat recovery based on game theoretic distributed cooperative control. 1-6 - Kanae Matsui:
Information provision system in a home energy and comfort management system for energy conservation. 1-6 - Samia Kouki, Manel Guenaoui, Mohamed Jemni:
A genetic algorithm for the permutation flow shop-problem: A parametric study. 1-6 - Lynda Aliouane, Mahfoud Benchaïba:
Efficient boundary detection of coverage hole in WSNs. 1-6 - Gabriel Bearare Pereira, Jose Marcos Camara Brito:
Delay and power metric in a cognitive radio system with queue and retransmission over a nakagami-m fading channel. 1-6 - Meriam Bouzouita, Yassine Hadjadj Aoul, Nawel Zangar, Sami Tabbane:
On the risk of congestion collapse in heavily congested M2M networks. 1-5 - Radhia Khdhir, Kais Mnif, Aymen Belghith, Lotfi Kamoun:
An efficient call admission control scheme for LTE and LTE-A networks. 1-6 - Jaweher Zouari, Mohamed Hamdi:
AIDF: An identity as a service framework for the cloud. 1-5 - Betul Karakus, Galip Aydin:
Call center performance evaluation using big data analytics. 1-6 - Kaouther Taleb Ali, Sonia Ben Rejeb, Zièd Choukair:
An enhanced random access scheme and performance evaluation for M2M communications in 5G/HetNets. 1-6 - Salwa Othmen, Faouzi Zarai, Aymen Belghith, Lotfi Kamoun:
Anonymous and secure on-demand routing protocol for multi-hop cellular networks. 1-6 - Cherif Rezgui, Khaled Grayaa:
An enhanced channel estimation technique with adaptive pilot spacing for OFDM system. 1-4 - Ana Paula Teles Ribeiro da Silva, Jose Marcos Camara Brito:
Influence of the channel model in the optimum switching points in a cognitive radio network combined with adaptive modulation. 1-6 - Mariem Ayedi, Noura Sellami, Mohamed Siala:
Efficient nodes identification based on embedded signaling using the fast walsh hadamard transform in multi-sources multi-relays systems. 1-5 - Ahmed Alghamdi, Mesfar Alshamrani, Abdullah Alqahtani, Sultan Safar A. Al Ghamdi, Rami Harrathi:
Secure data aggregation scheme in wireless sensor networks for IoT. 1-5 - Nadia Belguerche, Mahfoud Benchaïba:
Simple relocation methods in wireless sensor and robot networks. 1-6 - Etienne Pardo, David Espes, Philippe Le Parc:
Modular approach for expert system toward anomaly: N-layers. 1-5 - Huu-Nghi Nguyen, Thomas Begin, Anthony Busson, Isabelle Guérin Lassous:
Approximating the end-to-end delay using local measurements: A preliminary study based on conditional expectation. 1-6 - Safia Gueziz, Dris Korichi:
Performance analysis of handover optimization based on media independent handover in new networks NGWN. 1-6 - Guilherme de Souza Lima Moreira, Rausley A. A. de Souza:
On the throughput of cognitive radio networks using eigenvalue-based cooperative spectrum sensing under complex Nakagami-m fading. 1-6 - Jaber Kouki, Haithem Mezni:
Semantic QoS synchronization of Web services. 1-6 - Mallat Yosra, Ayadi Mohamed, Tabaane Sami:
Cognitive QoS-on demand routing protocol (CO-QORP) in cognitive radio Ad-hoc network. 1-4 - Umber Noreen, Ahcène Bounceur, Laurent Clavier, Rahim Kacimi:
Performance evaluation of IEEE 802.15.4 PHY with impulsive network interference in cupcarbon simulator. 1-6 - Safa Mejri, Haifa Touati, Farouk Kamoun:
Preventing unnecessary interests retransmission in named data networking. 1-6 - Farid Lalem, Rahim Kacimi, Ahcène Bounceur, Reinhardt Euler:
Boundary node failure detection in wireless sensor networks. 1-6 - Bacem Mbarek, Aref Meddeb:
Energy efficient security protocols for wireless sensor networks : SPINS vs TinySec. 1-4 - Mete Uzun, Osman Abul:
End-to-end internet speed analysis of mobile networks with mapReduce. 1-6 - Selahattin Kucuk, Fahrettin Arslan, Mehmet Bayrak, Gustavo Contreras:
Load management of industrial facilities electrical system using intelligent supervision, control and monitoring systems. 1-6 - Nabil Ouerhani, Nuria Pazos, Marco Aeberli, Michael Müller:
IoT-based dynamic street light control for smart cities use cases. 1-5 - Asma Garrab, Adel Bouallegue, Ridha Bouallegue:
An intelligent type-2 Fuzzy agent approach in substation environment. 1-5 - Hafedh Ferchichi, Jalel Akaichi:
A formal concept analysis based approach for continuous k-nearest neighbour search in road networks. 1-6 - Abdulmonam Al-Adhab, Hamad Altmimi, Majed Alhawashi, Hussain Alabduljabbar, Farah Harrathi, Hammeed ALmubarek:
IoT for remote elderly patient care based on Fuzzy logic. 1-5 - Betul Dundar, Suat Ozdemir, Diyar Akay:
Opinion mining and fuzzy quantification in hotel reviews. 1-4 - Ilhem Lengliz, Afef Slama:
Enhancing AODV and DSR with the RLT strategy for efficient routing in VANETs. 1-6 - Branislav Edgar Feijo Couceiro, Jose Marcos Camara Brito:
Performance evaluation of the opportunistic spectrum access in a cognitive radio network with cooperative and non-cooperative sensing. 1-6 - Feyza Yildirim Okay, Suat Ozdemir:
A fog computing based smart grid model. 1-6 - Olfa Chabbouh, Sonia Ben Rejeb, Zièd Choukair, Nazim Agoulmine:
A novel cloud RAN architecture for 5G HetNets and QoS evaluation. 1-6 - Asma Selmi, Mohamed Siala, Hatem Boujemaa:
Efficient link adaptation using joint power control, adaptive modulation and coding with enhanced ARQ protocol. 1-4 - Ramadan Arfa, Khalid Abdelkader:
Modeling intelligent agents in computational grid commodity market. 1-6 - Sarah Allali, Hamid Menouar, Mahfoud Benchaïba:
Grid architecture for lightweight WSN-based area monitoring and alerts dissemination. 1-7 - Pedro Ivo de Almeida Guimaraes, Jose Marcos Camara Brito:
Average delay in cognitive radio networks with imperfect sensing using slotted aloha protocol. 1-6 - Imen Dhiab, Yosra Barouni, Sofiane Khalfallah, Jaleleddine Ben Hadj Slama:
Datacenter network architecture performance analysis using content centric communication. 1-4 - Imen Turki, Inès Kammoun, Mohamed Siala:
Cooperative beamforming in multi-cells multi-users networks with quantized feedback. 1-6 - Elike Hodo, Xavier J. A. Bellekens, Andrew W. Hamilton, Pierre-Louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis, Robert C. Atkinson:
Threat analysis of IoT networks using artificial neural network intrusion detection system. 1-6 - Nour El Houda Ben Youssef, Yosra Barouni, Sofiane Khalfallah, Jaleleddine Ben Hadj Slama, Khaled Ben Driss:
Supporting renewable energy resources integration using content-centric networking. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.