


default search action
International Journal of Communication Systems, Volume 28
Volume 28, Number 1, January 2015
- Suleiman Zubair

, Norsheila Fisal, Mohammed B. Abazeed
, Bala Alhaji Salihu
, Adnan Shahid Khan
:
Lightweight distributed geographical: a lightweight distributed protocol for virtual clustering in geographical forwarding cognitive radio sensor networks. 1-18 - Xiaocheng Wang, Qiaoni Han, Xin-Ping Guan, Kai Ma:

Price-based interference management in dense femtocell systems. 19-37 - Guan Gui, Fumiyuki Adachi

:
Adaptive sparse system identification using normalized least mean fourth algorithm. 38-48 - Xiuquan Qiao, Sida Xue, Junliang Chen, Anna Fensel

:
A lightweight convergent personal mobile service delivery approach based on phone book. 49-70 - Mamoun F. Al-Mistarihi, Rami Mohaisen

, Ashraf Sharaqa
, Mohammad Al-Shurman, Khalid A. Darabkh
:
Performance evaluation of multiuser diversity in multiuser two-hop cooperative multi-relay wireless networks using maximal ratio combining over Rayleigh fading channels. 71-90 - Kayiparambil S. Deepak, Anchare V. Babu

:
Improving energy efficiency of incremental relay based cooperative communications in wireless body area networks. 91-111 - Hongjuan Yang, Peter Han Joo Chong

, Weixiao Meng, Bo Li, Yong Liang Guan
:
Cooperative quadrature physical layer network coding in wireless relay networks. 112-126 - Xiaonan Wang, Huanyan Qian:

Dynamic and hierarchical IPv6 address configuration for a mobile ad hoc network. 127-146 - Iraj Sadegh Amiri

, S. E. Alavi, J. Ali:
High-capacity soliton transmission for indoor and outdoor communications using integrated ring resonators. 147-160 - Petros Nicopolitidis:

Performance fairness across multiple applications in wireless push systems. 161-166 - Yanzhe Che, Qinming He, Xiaoyan Hong, Kevin Chiew:

X-Region: A framework for location privacy preservation in mobile peer-to-peer networks. 167-186 - Ming-Yang Su, Chen-Han Tsai:

Using data mining approaches to identify voice over IP spam. 187-200
Volume 28, Number 2, January 2015
- Yuzhen Huang, Qihui Wu, Jinlong Wang, Yunpeng Cheng, Yuming Zhang:

Unified performance analysis of maximal-ratio combining for spectrum sharing systems with antenna correlation. 201-212 - Sudip Misra, Sukhchain Singh, Manas Khatua, Mohammad S. Obaidat

:
Extracting mobility pattern from target trajectory in wireless sensor networks. 213-230 - Yunchuan Yang, Wenbo Wang, Hui Zhao:

Achievable rate region with secrecy constraints for secure communication in two-way relay networks. 231-249 - Yasmine A. Fahmy, Hoda Hafez, Mohamed M. Khairy:

Time domain leakage in DFT-based channel estimation for OFDM systems with guard bands. 250-261 - Jin Wang, Kejie Lu, Shukui Zhang, Jianxi Fan, Yanqin Zhu, Baolei Cheng:

An efficient communication relay placement algorithm for content-centric wireless mesh networks. 262-280 - Shang-Juh Kao, Hsiu-Lang Wang:

Dynamic Orthogonal Frequency Division Multiple Access resource management for downlink interference avoidance in two-tier networks. 281-295 - Mustapha Khiati, Djamel Djenouri

:
BOD-LEACH: broadcasting over duty-cycled radio using LEACH clustering for delay/power efficient dissimilation in wireless sensor networks. 296-308 - Said Fouchal, Djamel Mansouri, Lynda Mokdad, M. Iouallalen:

Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks. 309-324 - Hai Huang:

Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique. 325-343 - Fan Wu

, Lili Xu:
An improved and provable self-certified digital signature scheme with message recovery. 344-357 - Weiguo Ju, Shanguo Huang, Zhenzhen Xu, Jie Zhang, Wanyi Gu:

Spectrum defragmentation in flexgrid optical networks using a genetic algorithm. 358-373 - Xiong Li

, Jianwei Niu
, Junguo Liao, Wei Liang
:
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. 374-382
- Qi Jiang

, Jianfeng Ma, Guangsong Li, Xinghua Li:
Improvement of robust smart-card-based password authentication scheme. 383-393 - Zhangjun Guan, Xi-Lang Zhou:

An amplify-and-forward and decode-and-forward mixed relay communication system and its performance analysis. 394-400
Volume 28, Number 3, February 2015
- Xiaolin Jia, Quanyuan Feng:

An improved anti-collision protocol for radio frequency identification tag. 401-413 - Yun Jia, Zhongzhao Zhang, Xuezhi Tan, Xin Liu:

Asymmetric active cooperation strategy in spectrum sharing game with imperfect information. 414-425 - Yunji Li

, Xiaolong Yang, Zeyang Dai, Changming Zhao, Keping Long:
A novel rateless codes design scheme based on two-stage encoding and forward equal probability. 426-436 - Ayaz Ahmad

, Nadir Shah:
A joint resource optimization and adaptive modulation framework for uplink single-carrier frequency-division multiple access systems. 437-456 - Lucas Eznarriaga, Cigdem Sengul, Nico Bayer, José Ignacio Moreno

, Patricia Lozano, María Simon:
Experiences with SoftToken: a token-based coordination layer for WLANs. 457-471 - Weidong Wang, Jun-an Yang, Chun Zhang:

A novel compressed sensing ultra-wideband channel estimation method based on non-convex optimization. 472-482 - Yi Wang, Jun-an Yang, Jun Lu, Hui Liu, Lun-wu Wang:

Hierarchical deep belief networks based point process model for keywords spotting in continuous speech. 483-496 - Rajeev Anand Sahu

, Sahadeo Padhye
:
Provable secure identity-based multi-proxy signature scheme. 497-512 - Yuan Sheng Wu, Bing Guo, Yan Shen, Jihe Wang, Xiaobin Liu:

Toward energy-proportional Internet core networks: an energy-minimized routing and virtual topology design for Internet protocol layer. 513-533 - Zuowen Tan:

An efficient pairing-free identity-based authenticated group key agreement protocol. 534-545 - Ahmad M. Rateb

, Sharifah Kamilah Syed Yusof
:
Recovery error bounds on compressed sensing of noisy signals. 546-559 - Zhi Ren, Shuang Peng, Hong Chen, Jun Fang

, Qianbin Chen
:
Epidemic routing based on adaptive compression of vectors: efficient low-delay routing for opportunistic networks based on adaptive compression of vectors. 560-573 - Ahmed Nabih Zaki Rashed

, Abd El Fattah A. Saad:
Transmission behavior improvement of electro-optic modulators for integrated photonic systems in the present communication technology. 574-584 - Min Xiang, Chao Wen, Xing-zhe Hou:

A hybrid relay control mechanism for ribbon topology in low-voltage power line communication networks. 585-600
Volume 28, Number 4, March 2015
- Cristian Tanas, Jordi Herrera-Joancomartí

:
When users become sensors: can we trust their readings? 601-614 - Zhiyu Fan, Yuanan Liu, Hu Li, Dongming Yuan, Hefei Hu:

A servo design for slave clock in IEEE 1588 synchronization networks. 615-624 - Hsu-Yang Kung, Sumalee Chaisit, Nguyen Thi Mai Phuong:

Optimization of an RFID location identification scheme based on the neural network. 625-644 - Jianhong Zhang, Jian Mao:

An improved anonymous multi-receiver identity-based encryption scheme. 645-658 - Young-Sik Jeong, Ji Soo Park, Jong Hyuk Park:

An efficient authentication system of smart device using multi factors in mobile cloud service architecture. 659-674 - Yumin Yuan:

On the security of a proxy signature scheme in the standard model. 675-681 - Quan Sun, Liusheng Huang, Haoran Zhang, Hongli Xu:

Handoff optimization and load balancing in wireless LANs using association control. 682-704 - Lei Tang, Fengfan Yang, Shun-wai Zhang, Lin Luo:

The performance of uplink LDPC-coded multirelay cooperation based on virtual V-BLAST processing. 705-722 - Yonglei Liu, Zhigang Jin:

Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture. 723-742 - Chunyan An, Renchao Xie, Hong Ji, Yi Li:

Pricing and power control for energy-efficient radio resource management in cognitive femtocell networks. 743-761 - Victor Torres-Padrosa, Marc Manzano, Eusebi Calle

, Josep L. Marzo
:
Community-based traffic preservation in telecommunication networks. 762-778 - Harry Leib, Wenjing Lin:

Performance analysis of multi-input multi-output systems with maximum likelihood detection over shadowed fading channels. 779-800
Volume 28, Number 5, March 2015
- Sudip Misra, Shankha Subhra Chatterjee, Mohsen Guizani:

Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks. 801-817 - Minglei Fu

, Maolin He, Zichun Le, Weiwen Wang, Bisheng Quan:
Performance evaluation of the survivability schemes in WOBAN: a quality of recovery (QoR) method. 818-841 - Yongchun Liu, Peng Gong, Xiaopeng Yan, Ping Li:

On the security of a dynamic identity-based remote user authentication scheme with verifiable password update. 842-847 - Xin Liu, Qingfeng Jing, Yun Jia, Weizhi Zhong, Yong Liang Guan

:
Sensing-throughput tradeoff for cooperative multiple-input single-output cognitive radio. 848-860 - Bing Zhang, Maode Ma, Chunfeng Liu, Yantai Shu:

Performance improvements of HCCA scheduling in V2R environments. 861-872 - Manas Kamal Bhuyan, Biplab Ketan Chakraborty:

Motion adaptive video coding scheme for time-varying network. 873-888 - Laisen Nie, Dingde Jiang:

A compressive sensing-based network tomography approach to estimating origin-destination flow traffic in large-scale backbone networks. 889-900 - Zhu Xiao, Zhongfeng Li, Xu Zhang, Enjie Liu, Kechu Yi:

An efficient interference mitigation approach via quasi-access in two-tier macro-femto heterogeneous networks. 901-909 - Cecília A. C. César, Solon V. Carvalho:

A queuing model for distributed scheduling in IEEE 802.16 wireless mesh networks. 910-927 - Giulio Bartoli

, Romano Fantacci
, Francesco Gei, Dania Marabissi, Luigia Micciullo:
A novel emergency management platform for smart public safety. 928-943 - K. Ujwal Deep, Vidhyacharan Bhaskar:

Fast turbo codes with space-time block codes in fast fading channels. 944-951 - Ching-Hsien Hsu, Tai-Lung Chen, Chao-Tung Yang

, Hai-Cheng Chu:
Scheduling contention-free broadcasts in heterogeneous networks. 952-971 - Amjad Mehmood

, Shafiullah Khan, Bilal Shams, Jaime Lloret Mauri:
Energy-efficient multi-level and distance-aware clustering mechanism for WSNs. 972-989 - Enxiao Liu

, Weixiao Meng, Shuai Han:
A dense overlapped linear subarray architecture for interference suppressing in small-scale arrays. 990-1000
Volume 28, Number 6, April 2015
- Nabih Alaoui, Vahid Meghdadi, Jean-Pierre Cances:

Wireless sensor networks with joint network-channel code optimization. 1001-1016 - Yan Gong, Chaoqin Gan, Chenwei Wu:

Highly reliable wavelength-reuse wavelength-division multiplexing semipassive optical access network architecture with double cover area and high network capacity. 1017-1029 - Gaoqi Dou, Chunquan He, Congying Li, Jun Gao:

Orthogonal superimposed training design for block transmission over frequency-selective fading channels. 1030-1036 - Francisco-Javier Rodríguez-Pérez, José Luis González Sánchez, Javier Carmona-Murillo

, David Cortés-Polo
:
An OAM function to improve the packet loss in MPLS-TP domains for prioritized QoS-aware services. 1037-1052 - Fengyu Guo, Long Yu

, Shengwei Tian, Jiong Yu:
A workflow task scheduling algorithm based on the resources' fuzzy clustering in cloud computing environment. 1053-1067 - Ming-Yue Zhai, Ling-Dong Su:

Research on the memory order of the power-line communication channel. 1068-1079 - Jaehyun Hwang, Sang-Seon Byun:

A resilient buffer allocation scheme in active queue management: a stochastic cooperative game theoretic approach. 1080-1099 - Xuexian Hu, Zhenfeng Zhang, Qihui Zhang:

Universally composable three-party password-authenticated key exchange with contributiveness. 1100-1111 - Yass K. Salih, Ong Hang See, Rabha W. Ibrahim

, Salman Yussof
, Azlan Iqbal
:
A novel noncooperative game competing model using generalized simple additive weighting method to perform network selection in heterogeneous wireless networks. 1112-1125 - Heshuai Li, Junhu Zhu, Han Qiu, Qingxian Wang, Tianyang Zhou, Hang Li:

The new threat to internet: DNP attack with the attacking flows strategizing technology. 1126-1139 - Zhaoxi Fang, Feng Liang, Zunyi Wang, Danjiang Chen:

Low complexity timing estimation and resynchronization for asynchronous bidirectional communications with multiple antenna relay. 1140-1150 - Do-hyung Kim

, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom:
End-to-end mobility support in content centric networks. 1151-1167 - Dharmvir Jain, Sanjay Sharma

:
A novel grouped multilevel dynamic space-time trellis coding scheme. 1168-1179 - Salima Smaoui, Imen El Bouabidi, Mohammad S. Obaidat

, Faouzi Zarai
, Kuei-Fang Hsiao, Lotfi Kamoun:
Improved IPSec tunnel establishment for 3GPP-WLAN interworking. 1180-1199
Volume 28, Number 7, May 2015
- Zhibo Wang, Hui Tian, Kun Yang, Ziqiang Liu:

Frequency resource allocation strategy with QoS support in hybrid cellular and Device-to-Device networks. 1201-1218 - Assadallah Sahebalam, Mohammad Osmani-Bojd, Ghosheh Abed Hodtani

:
Ultra-wideband multiple-access relay channel with correlated noises and its diversity analysis. 1219-1249 - Kai Ma, Jie Yang, Guoqiang Hu

, Xinping Guan:
Cooperative Relay-Aware Spectrum leasing based on Nash bargaining solution in cognitive radio networks. 1250-1264 - Young-Pil Kim

, Cheol-Ho Hong, Chuck Yoo:
Performance impact of JobTracker failure in Hadoop. 1265-1281 - Yanjun Liu, Lein Harn, Chin-Chen Chang:

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. 1282-1292 - Dubravko Sabolic:

Modeling and measurement of cross-talk transmission between coupled lines. 1293-1302 - Siguang Chen, Meng Wu, Kun Wang, Zhixin Sun, Weifeng Lu:

Combining network coding and compressed sensing for error correction in wireless sensor networks. 1303-1315 - Mouna Elmachkour, Abdellatif Kobbane

, Essaid Sabir
, Jalel Ben-Othman
, Mohammed El Koutbi:
Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation. 1316-1328 - Ahmet Sayar

:
Ant-based interactive workflow management: a case study on RMI. 1329-1339 - Qi Jiang

, Jianfeng Ma, Youliang Tian:
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. 1340-1351 - Judhistir Mahapatro, Sudip Misra, Manjunatha Mahadevappa

, Nabiul Islam
:
Interference-aware MAC scheduling and admission control for multiple mobile WBANs used in healthcare monitoring. 1352-1366 - Sudip Misra, Goutam Mali, Ayan Mondal

:
Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation. 1367-1386 - Jing Wang, Kaikai Chi, Yang Yang, Xinmei Wang:

Network coding based on hyper-edge decomposition for wireless network with link failures. 1387-1399
Volume 28, Number 8, May 2015
- Mohsen Shakiba, Mohammad Dakhilalian

, Hamid Mala:
Cryptanalysis of mCrypton-64. 1401-1418 - Majid Bayat

, Mohammad Reza Aref:
An attribute-based tripartite key agreement protocol. 1419-1431 - Evaggelos Chatzistavros, Savvas A. Chatzichristofis

, Konstantinos Zagoris, George Stamatelos:
Content-based image retrieval over IEEE 802.11b noisy wireless networks. 1432-1449 - Zhihang Li, Huilin Jiang, Zhiwen Pan, Nan Liu, Xiaohu You

:
Energy spectral efficiency tradeoff in downlink OFDMA network. 1450-1461 - Alireza Alizadeh, Ghosheh Abed Hodtani

:
Analysis of capacity and coverage region for Rayleigh fading MIMO relay channel. 1462-1474 - Raj Johri, Shyam Akashe

, Sanjay Sharma
:
High performance 8 bit cascaded carry look ahead adder with precise power consumption. 1475-1483 - Ioannis V. Loumiotis, Evgenia F. Adamopoulou

, Konstantinos P. Demestichas
, Theodora A. Stamatiadi, Michael E. Theologou:
On the predictability of next generation mobile network traffic using artificial neural networks. 1484-1492 - Ch. Pradeep Reddy

, P. Venkata Krishna
:
Ant-inspired level-based congestion control for wireless mesh networks. 1493-1507 - Qiang Liu, Kun Yang:

Channel capacity analysis of a diffusion-based molecular communication system with ligand receptors. 1508-1520
Volume 28, Number 9, June 2015
- Nasrin Sadeghianpour, Teong Chee Chuah, Su Wei Tan:

Joint channel assignment and routing in multiradio multichannel wireless mesh networks with directional antennas. 1521-1536 - Tao Zhang, Jin Wang:

Performance of fiber delay-line buffers in asynchronous packet-based optical switching networks with wavelength conversion. 1537-1550 - Ke Li, Sheng Wang, Shizhong Xu, Xiong Wang, Jin Ren, Haojun Huang, Bo Zhai:

Multi-topology routing based egress selection approach to achieve hybrid intra-AS and inter-AS traffic engineering. 1551-1571 - Youssouf Ould-Cheikh-Mouhamedou:

Reducing the complexity of distance measurement methods for circular turbo codes that use structured interleavers. 1572-1579 - You-Chiun Wang:

Profit-based exclusive-or coding algorithm for data retransmission in DVB-H with a recovery network. 1580-1597 - Ke Zhang, Chang Duan, Haitao Jia:

Genetic simulated annealing-based coverage-enhancing algorithm for multimedia directional sensor networks. 1598-1609 - Qingchen Zhang, Zhikui Chen, Laurence T. Yang:

A nodes scheduling model based on Markov chain prediction for big streaming data analysis. 1610-1619
Volume 28, Number 10, July 2015
- An Li, Yizhu Xu, Yuhao Wang, Lihua Sun:

Amplify-and-forward-based cooperative jamming strategy with power allocation for secure communication. 1621-1627 - Sukin Kang, Jonguk Kim, Manpyo Hong:

Button-based method for the prevention of near field communication relay attacks. 1628-1639 - Shashika Biyanwilage, Upul Gunawardana, Ranjith Liyanapathirana

:
Power allocation in OFDM cognitive radio relay networks with outdated channel state information. 1640-1656 - Wan Du, David Navarro, Fabien Mieyeville

:
Performance evaluation of IEEE 802.15.4 sensor networks in industrial applications. 1657-1674 - Jui-Chi Chang, Fang-Biau Ueng, Hsuan-Fu Wang, Ming-Hsiao Hsu:

Multiuser MIMO receivers for space frequency block coded SC-FDMA systems. 1675-1691 - Wenjun Xu, Yan Wang, Kai Niu, Zhiqiang He, Jiaru Lin:

Joint overlay and underlay resource allocation with weighted fairness in OFDM-based cognitive radio systems. 1692-1708 - Haifeng Zhou, Liansheng Tan, Fei Ge

, Sammy Chan:
Traffic matrix estimation: Advanced-Tomogravity method based on a precise gravity model. 1709-1728
Volume 28, Number 11, July 2015
- Hoang-Linh To

, Suk Hwan Lee, Won-Joo Hwang:
A burst loss probability model with impatient customer feature for optical burst switching networks. 1729-1740 - Jiann-Liang Chen, San-Peng Kao:

QoS mechanism for virtualized wireless networks with software-defined networking. 1741-1752 - Igor Bisio

, Fabio Lavagetto
, Mario Marchese
, Andrea Sciarrone
:
A smartphone-centric platform for remote health monitoring of heart failure. 1753-1771 - Zhijun Wu, Meng Yue, Douzhe Li, Ke Xie:

SEDP-based detection of low-rate DoS attacks. 1772-1788 - Lei Shi, Zheng Yao, Baoxian Zhang, Cheng Li

, Jian Ma:
An efficient distributed routing protocol for wireless sensor networks with mobile sinks. 1789-1804 - Fenghua Wang, Dongliang Xie, Jingyu Wang

, Peng Zhang, Yan Shi:
Paths selection-based resequencing queue length in concurrent multipath transfer. 1805-1827
Volume 28, Number 12, August 2015
- Michael Slavik, Imad Mahgoub

, Mohammed Alwakeel
:
Efficient multi-hop wireless broadcast protocol in vehicular networks using automated threshold function design. 1829-1846 - Hang Long, Wei Xiang

, Jing Wang, Xiaoli Zhang, Wenbo Wang:
Enhancing secrecy capacity of multi-relay wiretap systems with partial channel state information. 1847-1861 - Kavitha Athota, Atul Negi:

A topology preserving cluster-based channel assignment for wireless mesh networks. 1862-1883 - Jun Liu, Nan Chang, Sanguo Zhang, Zhenming Lei:

Recognizing and characterizing dynamics of cellular devices in cellular data network through massive data analysis. 1884-1897
Volume 28, Number 13, September 2015
- Sung Won Ahn, Chuck Yoo, Shinhyung Lee, Hyung Soo Lee, Sung Jo Kim:

Implementing virtual platform for global-scale cyber physical system networks. 1899-1920 - Min Lin, Heng Wei, Kang An, Jian Ouyang, Yongming Huang:

Effect of imperfect channel state information and co-channel interferences on two-hop fixed gain amplify-and-forward relay networks with beamforming. 1921-1930 - Jun-Da Chen

, Fang-Biau Ueng, Ye-Shun Shen, Yuan-Hung Cheng:
Performance analyses of adaptive noncoherent receivers for MC-CDMA communications. 1931-1954 - Jia-Lun Tsai, Nai-Wei Lo:

A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card. 1955-1963
Volume 28, Number 14, September 2015
- Masafumi Hashimoto, Go Hasegawa

, Masayuki Murata
:
An analysis of energy consumption for TCP data transfer with burst transmission over a wireless LAN. 1965-1986 - Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo:

DNS tunneling detection through statistical fingerprints of protocol messages and machine learning. 1987-2002 - Harris Simaremare

, Abdelhafid Abouaissa
, Riri Fitri Sari
, Pascal Lorenz
:
Security and performance enhancement of AODV routing protocol. 2003-2019 - Hiep H. Nguyen, Suk-Hwan Lee, Won-Joo Hwang:

Optimal resource allocation for energy efficiency in coordinated multicell OFDMA networks. 2020-2034
Volume 28, Number 15, October 2015
- Yahui Wu, Su Deng, Hongbin Huang

:
Performance analysis of hop-limited epidemic routing in DTN with limited forwarding times. 2035-2050 - Basab Chatterjee, B. N. Biswas, Sudhabindu Ray:

A novel DSP-based PFC-DPLL with fuzzy controlled acquisition aid to improve acquisition performance and noise immunity. 2051-2066 - Joona Kannisto, Takeshi Takahashi

, Jarmo Harju, Seppo Heikkinen, Marko Helenius
, Shin'ichiro Matsuo, Bilhanan Silverajan:
A non-repudiable negotiation protocol for security service level agreements. 2067-2081 - Kuo-Lung Wang, Tsan-Pin Wang, Chien-Chao Tseng

:
Reducing wireless multi-hop delay via RSU re-routing in vehicular wireless networks. 2082-2097
Volume 28, Number 16, November 2015
- Yuxi Liu

, Sitong Lv, Peng Chen:
Capacity of SSTS for downlink-distributed antenna systems in multicell environment. 2099-2111 - Panagiotis Melidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Emmanouel A. Varvarigos

:
Green optical backbone networks: virtual topology adaptation using a page rank-based rating system. 2112-2121 - Doraid M. Dalalah

:
Proportional fairness: more secrets revealed. 2122-2144 - Jiankang Ren, Guowei Wu, Xinjiao Li, Poria Pirozmand, Mohammad S. Obaidat

:
Probabilistic response-time analysis for real-time systems in body area sensor networks. 2145-2166
Volume 28, Number 17, November 2015
- Jing Ren, Kejie Lu, Fei Tang, Jin Wang, Jianping Wang, Sheng Wang, Shucheng Liu:

CAKA: a novel cache-aware K-anycast routing scheme for publish/subscribe-based information-centric network. 2167-2179 - Hien Nguyen, Ebtissam Wahman, Niki Pissinou, S. S. Iyengar

, Kia Makki:
Mobile learning object authoring tool and management system for mobile ad hoc wireless networks. 2180-2196 - Najam Ul Hasan, Wanqing Tu

:
On energy-efficient performance-guaranteed channel assignment in cognitive radio-based wireless mesh networks. 2197-2213 - Datong Xu, Pinyi Ren, Li Sun

:
ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells. 2214-2238
Volume 28, Number 18, December 2015
- Sima Ahmadpour

, Zohreh Toghrayee, Tat Chee Wan
:
An extended discrete autoregressive model for variable bit rate video traffic encoded by scalable video codec. 2239-2254 - Soodeh Hosseini, Mohammad Abdollahi Azgomi

, Adel Torkaman Rahmani:
Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks. 2255-2274 - Shuang Qin, Gang Feng:

Performance modeling of data transmission by using random linear network coding in DTNs. 2275-2288 - Huan Yan, Deyun Gao, Wei Su, Han-Chieh Chao

:
A forwarding strategy of counteracting redundancy data in named data networking. 2289-2310 - Jaehyo Jung, Jihoon Lee, Jihwan Lee, Youn Tae Kim:

A smartphone-based U-Healthcare system for real-time monitoring of acute myocardial infarction. 2311-2325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














