


default search action
SoftCOM 2011: Split, Croatia
- 19th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011, Split, Croatia, September 15-17, 2011. IEEE 2011, ISBN 978-1-4577-1439-9

- Frank Vanheel, Jo Verhaevert, Eric Laermans, Ingrid Moerman, Piet Demeester:

A linear regression based cost function for WSN localization. 1-5 - Tea Marasovic, Vladan Papic:

Accelerometer-based gesture classification using principal component analysis. 1-5 - Sinisa Antonijevic, Vicko Doric, Dragan Poljak:

An improved algorithm for indirect time domain analysis of thin wire structures. 1-5 - Pablo Torío, Manuel García Sánchez, Iñigo Cuiñas:

An algorithm to simulate impulsive noise. 1-4 - Damir Cavka, Dragan Poljak:

Analysis of grounding electrode input impedance calculation. 1-5 - Mario Di Mauro, Roberto Garufi, Fabio Postiglione, Paolo Addesso, Rocco Restaino, Maurizio Longo, Andrea Senatore, Anton Luca Robustelli:

An architecture for threats detection in mobile operators networks. 1-5 - Velimir Svedek, Ognjen Dobrijevic, Maja Matijasevic, Ivana Golub, Tomislav Stivojevic:

Towards assessment of IPv6 readiness, deployment and transition plans in Croatia. 1-7 - Zlatko Zivkovic, Duje Despalatovic, Dragan Poljak, Antonio Sarolic, Khalil El Khamlichi Drissi:

Assessment of SAR distribution in the human eye and pregnant woman models exposed to RF radiation using FEKO software package. 1-5 - Reza Entezari-Maleki, Ali Movaghar:

Availability modeling of grid computing environments using SANs. 1-6 - Antun Caric, Danijel Mileta, Josip Sajnovic:

Broadband ecosystem for rural areas in the republic of Croatia. 1-9 - Jeong-Soo Park, Gil-Su Heo, Yong-Hwan Lee:

Capacity maximizing cell-selection in heterogeneous cellular networks. 1-5 - Stefan Kohlhauser, Thomas Turek, Josef Mitterbauer, Heimo Zeilinger, Michael Kreilmeier:

Case study on performance of a Group Communication System in the realm of voice over IP. 1-5 - Ivancica Sakal, Zeljko Tabakovic, Sonja Grgic, Dijana Tralic:

Workshop: The electronic communications regulatory challenges - Experiences from the looking to the future project Croatian approach to digital dividend. 1-9 - Ugo Biader Ceipidor, Carlo Maria Medaglia, Valentina Volpi, Alice Moroni, Serena Sposato, Manuele Tamburrano:

Design and development of a social shopping experience in the IoT domain: The ShopLovers solution. 1-5 - Nazish Irfan, Mustapha C. E. Yagoub, Khelifa Hettak:

Design and FDTD analysis of single-band and dual-band antennas for RFID and WiMAX applications. 1-5 - Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:

Design and implementation of Web service honeypot. 1-5 - Zlatko Zivkovic, Damir Senic, Antonio Sarolic, Ante Vucic:

Design and testing of a diode-based electric field probe prototype. 1-5 - Zoran Blazevic, Duje Coko, Ivan Plavcic, Toni Jurisic Sokic:

A desktop ultra-wideband radio channel analysis. 1-3 - Heinz Lugo, Julien Viret, Axel Bindel, Paul P. Conway, Andrew A. West:

Distributed monitoring system for material handling. 1-6 - Deema Abdallah, Sanaa Sharafeddine:

Energy-aware retransmission scheme for multimedia delivery over wireless networks. 1-5 - Isaac Seoane, José Alberto Hernández, Pedro Reviriego, David Larrabeiti:

Energy-aware flow allocation algorithm for Energy Efficient Ethernet networks. 1-5 - Sergey P. Panasenko, Sergey A. Smagin:

Energy-efficient cryptography: Application of KATAN. 1-5 - Thomas Dreibholz, Martin Becke, Hakim Adhari, Erwin P. Rathgeb:

Evaluation of a new multipath congestion control scheme using the NetPerfMeter tool-chain. 1-6 - Johannes Westhuis, Jürgen Dunkel, Ralf Bruns:

Event-based location detection. 1-5 - Luca Mainetti, Luigi Patrono, Antonio Vilei:

Evolution of wireless sensor networks towards the Internet of Things: A survey. 1-6 - Besem Abid, Matteo Petracca, Paolo Pagano, Stefano Bocchino, Daniele Alessandrelli:

Experimental validation of wireless localization techniques in IEEE802.15.4 networks. 1-5 - Danilo Blasi:

Hierarchical Duty Cycle Management (HDCM) protocol. 1-6 - Marco Happenhofer, Christoph Egger:

Implicit SIP proxy overload detection mechanism based on response behavior. 1-5 - Pablo Torío, Manuel García Sánchez:

Impulsive noise rejection by polarization orthogonality in OFDM. 1-4 - Antonio Sarolic, Damir Senic, Zlatko Zivkovic, Ante Zorica:

Influence of human head and hand on PIFA antenna matching properties and SAR. 1-5 - Jean Marie Vella, Saviour Zammit:

Infrastructure-dependent wireless multicast over 802.11n WLAN. 1-5 - Vesna Javor:

Lightning electromagnetic field of a double-peaked channel-base current. 1-5 - Vinod Ramachandra, Musfiq Rahman, Srinivas Sampalli:

Lightweight matrix-based authentication protocol for RFID. 1-6 - Marco Leogrande, Luigi Ciminiera, Fulvio Risso:

Modeling filtering predicates composition with Finite State Automata. 1-5 - Eduardo Rocha, Paulo Salvador, António Nogueira:

A multi-variate classification approach for the detection of illicit traffic. 1-6 - Ivan Skuliber, Vedrana Jankovic, Ruzica Zec:

Multicore SIP parsing with imperative and declarative implementations. 1-7 - Muhammad Ajmal Azad, Ricardo Morla:

Multistage SPIT detection in transit VoIP. 1-9 - Alice Masini, Gianluca Mazzini, Guido Riva:

Mutual interference evaluation in cognitive radio networks with log-normal shadowing. 1-5 - Alina Quereilhac, Mathieu Lacage, Claudio Daniel Freire, Thierry Turletti, Walid Dabbous:

NEPI: An integration framework for Network Experimentation. 1-5 - Ivana Drazic Lutilsky, Domagoj Jurjevic, Marina Ivic:

Next generation access and investment issues. 1-7 - Amin Abdel Khalek, Zaher Dawy:

Optimized resource allocation for video transmission over multihop networks with end-to-end statistical delay bound. 1-6 - Emmanuel Baccelli, Matthias Philipp, Mukul Goyal:

The P2P-RPL routing protocol for IPv6 sensor networks: Testbed experiments. 1-6 - Luca Barletta, Flaminio Borgonovo, Matteo Cesana:

0.469 PDFSA protocol for RFID arbitration. 1-5 - Vinh Tran-Quang, Phat Nguyen Huu, Takumi Miyoshi:

A collaborative target tracking algorithm considering energy constraint in WSNs. 1-5 - Vipin Balyan, Davinder S. Saini:

Code assignment and reassignment to reduce new code blocking in WCDMA networks. 1-5 - Vipin Balyan, Davinder S. Saini:

Multi code assignment with minimum number of rakes for OVSF CDMA. 1-5 - Elias Yaacoub, Lina Al-Kanj, Zaher Dawy, Sanaa Sharafeddine, Adnan A. Abu-Dayya:

A channel-aware reservation protocol for cooperative content distribution over OFDMA networks. 1-6 - Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély:

SystemC modeling of RFID systems for robustness analysis. 1-5 - Ileana-Diana Nicolae, Marian-Stefan Nicolae:

Using wavelets to define and detect harmonic fingerprints in non-sinusoidal waveforms. 1-5 - Ljiljana Seric, Tihana Bodrozic, Darko Stipanicev, Toni Jakovcevic:

Observer network Web based statistical evaluation. 1-5 - Elisa Benetti, Gianluca Mazzini:

MHP application for a Self Evaluation Service. 1-5 - Salim Haddad, Amer Baghdadi, Michel Jézéquel:

Reducing the number of iterations in iterative demodulation with turbo decoding. 1-6 - Danilo Merlanti, Gianluca Mazzini:

Massey Omura multiple users key distribution. 1-5 - Mario Weber, Gordan Jezic, Miljenko Krvisek:

Overview of looking to the future project. 1-8 - Phat Nguyen Huu, Vinh Tran-Quang, Takumi Miyoshi:

Efficient motion estimation algorithm using edge feature and arithmetic coding for video compression on WVSNs. 1-5 - Danilo Merlanti, Gianluca Mazzini:

Peer-to-peer for unreliable multicast. 1-5 - Paulo Salvador, António Nogueira, Rui Valadas, António Pacheco:

Joint modeling of network related events with multi-dimensional Markov Modulated Deterministic Processes. 1-7 - Dragana Krstic, Goran Stamenovic, Stefan Panic, Zoran Popovic, Dejan D. Rancic, Mihajlo C. Stefanovic:

The application of GIS in designing of wireless communication systems with SC combining in the presence of Ricean fading. 1-5 - Vesna Arnautovski-Toseva, Khalil El Khamlichi Drissi, Kamel Kerroum:

HF comparison of image and TL models of a horizontal thin-wire conductor in finitely conductive earth. 1-5 - Ruzhdi Sefa, Faton Tefiku, Arianit Maraj:

Analysis of arrays of printed strip dipole antennas. 1-5 - Toma Roncevic, Maja Braovic, Darko Stipanicev:

Context-based natural image parsing: A critical survey. 1-5 - Tanuja Satish Dhope, Dina Simunic, Ramjee Prasad:

Hybrid detection method for cognitive radio. 1-5 - Zdravko Jukic, Mario Weber, Maja Matijasevic:

Findings of the public consultation on network neutrality in Croatia: Report and analysis. 1-9 - Ignac Lovrek, Drazen Lucic, Gasper Gacina:

Next generation network and regulatory challenges. 1-9 - Valter Vasic, Ana Kukec, Miljenko Mikuc:

Deploying new hash algorithms in Secure Neighbor Discovery. 1-5 - Fulvio Babich, Marco D'Orlando, Francesca Vatta:

Distortion estimation algorithms for real-time video streaming: An application scenario. 1-5 - Muhammad Adeel, Laurissa N. Tokarchuk:

MPeersim: Simulation environment for mobile P2P networks. 1-6 - Pierre-Henri Thevenon, Olivier Savry, Smail Tedjini:

Minimization of energy consumption in passive HF contactless and RFID systems. 1-5 - Mostafa Shahabinejad, Alireza Morsali:

The enhancement of system performance in quasi-orthogonal space-time-frequency codes. 1-5 - S. Saleh Hosseini Bidaki, Mostafa Shahabinejad:

System performance enhancement for T-code family. 1-5 - Dragan Poljak, Zoran Blazevic, Silvestar Sesnic, Mario Cvetkovic:

Full wave model versus transmission line representation of Tesla's wave propagation: 155th anniversary of birth of Nikola Tesla. 1-5 - Marco Baldi, Franco Chiaraluce, Matteo Moretti, Francesco Venieri, Blerina Zanaj:

Signal modeling and processing for physiological sensing through UWB radars. 1-5 - Nuno Vasco Lopes, Maria João Nicolau, Alexandre J. T. Santos:

Performance analysis of a new Mobility/QoS-aware architecture. 1-8 - Yoram Haddad, Yisroel Mirsky:

Power efficient femtocell distribution strategies. 1-5 - Till Wollenberg, Thomas Mundt:

Proof of proximity with 802.11 wireless LAN. 1-7 - Tomislav Grgic, Niko Boskovic, Maja Matijasevic:

QoS-enabled IPv6 emulation environment based on the Open IMS Core. 1-5 - Isabel Expósito, Iñigo Cuiñas:

RFID tag readability around white wine bottles. 1-5 - Luca Catarinucci, Iñigo Cuiñas, Isabel Expósito, Riccardo Colella, José Antonio Gay-Fernández, Luciano Tarricone:

RFID and WSNs for traceability of agricultural goods from Farm to Fork: Electromagnetic and deployment aspects on wine test-cases. 1-4 - Igor Sambolec, Ivan Rukavina, Vedran Podobnik:

RecoMMobile: A spatiotemporal recommender system for mobile users. 1-7 - Pablo Torío, Manuel García Sánchez:

Researching the different polarizations of impulsive noise. 1-5 - Christoph Egger, Marco Happenhofer, Peter Reichl:

SIP proxy high-load detection by continuous analysis of response delay values. 1-5 - Hosein Soleimani, Farid Ashtiani:

Throughput analysis of a cognitive multi-hop IEEE 802.11-based WLAN overlaid on a cellular network. 1-5 - Mira Trebar, Andrej Grah, Alejandro Álvarez-Melcón, Alfredo Parreno:

Towards RFID traceability systems of farmed fish supply chain. 1-6 - Luca Cremona, Matteo Della Bordella, Luca Mainetti, Luca Mari, Luigi Patrono, Aurelio Ravarini:

Towards a framework for evaluating the benefits of RFID adoption in supply chains. 1-6 - Fulvio Babich, Francesca Vatta:

Turbo codes construction for robust hybrid multitransmission schemes. 1-5 - Luka Finzgar, Mira Trebar:

Use of NFC and QR code identification in an electronic ticket system for public transport. 1-6 - Zeljko Deljac, Marijan Kunstic, Boris Spahija:

Using temporal neural networks to forecasting of broadband network faults. 1-5 - Piero Campalani, Thi Nhat Thanh Nguyen, Simone Mantovani, Maurizio Bottoni, Gianluca Mazzini:

Validation of PM MAPPER aerosol optical thickness retrievals at 1×1 km2 of spatial resolution. 1-5 - Ran Liu, Philipp Vorst, Artur Koch, Andreas Zell:

Path following for indoor robots with RFID received signal strength. 1-7 - Pierre-Henri Thevenon, Olivier Savry, Smail Tedjini:

On the weakness of contactless systems under relay attacks. 1-5 - Timo Kasper, David F. Oswald, Christof Paar:

Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild. 1-6 - Boldizsár Bencsáth, Levente Buttyán, Tamás Paulik:

XCS based hidden firmware modification on embedded devices. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














