| Author |
Session |
Start page |
Title |
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| A.F. Loureiro, Antonio |
S6.4 |
470 |
PResync: A Method for Preventing Resynchronization in the IEEE 802.11p Standard |
| S20.1 |
476 |
An Intelligent Transportation System for Detection and Control of Congested Roads in Urban Centers |
| S6.3 |
538 |
Suggestion of Routes for Vehicles in Vehicular Networks Using the Multicommodity Flow Model |
| S20.2 |
552 |
Intelligent Service to Perform Overtaking in Vehicular Networks |
| S6.2 |
695 |
Geo-localized Content Replication for Vehicular Ad-hoc Networks |
| S2.3 |
764 |
A Prediction-based Routing Algorithm for Vehicular Ad Hoc Networks |
| Abdelli, Abdelkrim |
PEDISWESA 2015: PEDISWESA - S1.3 |
977 |
Admission Control Based on WRR in WiMAX Networks |
| PEDISWESA 2015: PEDISWESA - S2.1 |
1022 |
Time Petri Nets for Performance Evaluation of Composite Web Services Architectures |
| Abdolahi, Mostafa |
S27.3 |
577 |
QADC-MORE:A New QoS-Aware Dynamic Credit MORE Protocol for Wireless Mesh Networks |
| Abu Ali, Najah |
DMSS 2015: DMSS-S1.2 |
39 |
Advanced Vehicular Sensing of Road Artifacts and Driver Behavior |
| Agnello, Luca |
S35.2 |
482 |
An Ontology-Based Retrieval System for Mammographic Reports |
| Aguiar, Rui |
S19.1 |
544 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs |
| Akavia, Adi |
S25.4 |
738 |
To Share Content or Not to Share? This is the Peering Question |
| Akiyama, Mitsuaki |
S15.4 |
205 |
AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters |
| Al Mushcab, Reema |
SFCS 2015: SFCS - S1.1 |
1110 |
Forensic Analysis of Instagram and Path on an iPhone 5s Mobile Device |
| Al-Anbagi, Irfan |
S24.4 |
566 |
Mobility Impact on the Performance of Electric-Vehicle-to-Grid Communications in Smart Grid Environment |
| Alaa Eldin, Mahmoud |
S28.2 |
440 |
SISO and MIMO Analog Network Coding Relay Architectures for the Uplink of LTE-Advanced |
| Albuquerque, Celio |
S28.3 |
858 |
Power Control and Channel Allocation Mechanism for Coexistence Between Secondary Cognitive Networks |
| Alexakos, Christos |
SCUCA 2015: SCUCA-S1.2 |
1096 |
Advanced Observation and Telemetry Heart System Utilizing Wearable ECG Device and a Cloud Platform |
| Alharbi, Ayman |
S34.2 |
340 |
Performance Analysis of Efficient Pipeline Architectures for Underwater Big Data Analytics |
| Alhumyani, Hesham |
S34.2 |
340 |
Performance Analysis of Efficient Pipeline Architectures for Underwater Big Data Analytics |
| Alizadeh, Hadi |
S5.1 |
136 |
Minimizing Signaling Cost in Green Routing for Software Defined Networks |
| Almulla, Sameera |
SFCS 2015: SFCS - S1.2 |
1116 |
Inferring Relevance and Presence of Evidence in Service-Oriented and SaaS Architectures |
| Alsheikhy, Ahmed |
S31.1 |
725 |
Hierarchical Performance Modeling of Embedded Systems |
| Altmann, Vlado |
PEDISWESA 2015: PEDISWESA - S2.2 |
1028 |
Extensive Analysis of the Kad-based Distributed Computing System DuDE |
| Amigo, Isabel |
SCUCA 2015: SCUCA-S2.1 |
1052 |
Online Electric Vehicle Recharge Scheduling Under Different e-Mobility Operator's Pricing Models |
| Ammar, Reda |
S34.2 |
340 |
Performance Analysis of Efficient Pipeline Architectures for Underwater Big Data Analytics |
| S31.1 |
725 |
Hierarchical Performance Modeling of Embedded Systems |
| S34.1 |
770 |
Taking Swarms to the Field: A Framework for Underwater Mission Planning |
| Anagnostopoulos, Christos |
S18.1 |
106 |
Epidemic Dissemination Controlled by Wireless Channel Awareness |
| Anagnostopoulos, Vasileios |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Andrea, Ioannis |
SCUCA 2015: SCUCA-S3.3 |
1102 |
Internet of Things: Security Vulnerabilities and Challenges |
| Antoniou, Athanasios |
SCUCA 2015: SCUCA-S1.2 |
1096 |
Advanced Observation and Telemetry Heart System Utilizing Wearable ECG Device and a Cloud Platform |
| Antonis, Konstantinos |
S3.1 |
44 |
A Novel Tool for Cost-Efficient Broadband Development Through Infrastructure Sharing |
| Aparício, João |
S9.1 |
880 |
Towards MEF Services in a SDN Environment |
| Aquino, Andre |
S10.2 |
452 |
A Sampling Algorithm for Intermittently Connected Delay Tolerant Wireless Sensor Networks |
| Arantes, Luciana |
S11.4 |
93 |
A Failure Detector That Gives Information on the Degree of Confidence in the System |
| Aravanis, Alexis |
SCUCA 2015: SCUCA-S1.3 |
1089 |
Federated Data Centers as Smart City Stabilizing Factors |
| Arcangeli, Andrea |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Asif, Waqar |
S27.2 |
130 |
Spectral Partitioning for Node Criticality |
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Bag-Mohammadi, Mozafar |
S27.3 |
577 |
QADC-MORE:A New QoS-Aware Dynamic Credit MORE Protocol for Wireless Mesh Networks |
| Baig, Sobia |
S24.1 |
816 |
Channel Modeling of NB-PLC for Smart Grid |
| Balico, Leandro |
S2.2 |
758 |
On the Performance of Localization Prediction Methods for Vehicular Ad Hoc Networks |
| S2.3 |
764 |
A Prediction-based Routing Algorithm for Vehicular Ad Hoc Networks |
| Ball, Peter |
SCUCA 2015: SCUCA-S3.2 |
1083 |
A Shim Layer for Heterogeneous Wireless Communications Scheduling in Intelligent Transport Systems |
| Baltas, George |
S5.2 |
188 |
Evaluating the Impact of Network I/O on Ultra-Low Delay Packet Switching |
| Barbano, Paolo |
S22.3 |
589 |
Identification of Wireless Network Cards Based on Signatures of Wireless Traffic |
| Baroudi, Sami |
S22.4 |
876 |
Analytical Evaluation of Outage Probability Based on Signal to Interference Ratio for Gaussian-Distributed Users |
| Barraca, João Paulo |
S18.3 |
334 |
IMS Centric Communication Supporting WebRTC Endpoints |
| Barreto, Raimundo |
S2.3 |
764 |
A Prediction-based Routing Algorithm for Vehicular Ad Hoc Networks |
| Ben-Romdhane, Manel |
S14.2 |
370 |
Digital Reconstruction Stage of Parallel FBD Sigma Delta ADC Implementation Based on Programmable Digital Oscillator in SDR Receiver |
| Ben-Yaacov, Dan |
S25.4 |
738 |
To Share Content or Not to Share? This is the Peering Question |
| Berbers, Yolande |
DMSS 2015: DMSS-S1.3 |
14 |
Benchmarking leading-edge mobile devices for data-intensive distributed mobile cloud applications |
| Bettassa Copet, Piergiuseppe |
S18.4 |
394 |
Formal Verification of LTE-UMTS Handover Procedures |
| Bezerra, Daniel |
S1.2 |
167 |
A Fine-Tuned Control-Theoretic Approach for Dynamic Adaptive Streaming Over HTTP |
| Bicakci, Kemal |
S15.1 |
864 |
Towards Making Accessible Human-Interaction Proofs More Secure and Usable |
| Biskri, Ismail |
PEDISWESA 2015: PEDISWESA - S1.4 |
1010 |
A Probabilistic Model to Corroborate Three Attacks in Vehicular Ad Hoc Networks |
| Bittencourt, Luiz |
S20.4 |
662 |
Enhancing Intelligence in Intervehicle Communications to Detect and Reduce Congestion in Urban Centers |
| Boostanpour, Jafar |
S26.1 |
626 |
Cluster-Based Two-Step Target Localization with Incremental Cooperation |
| Borges, Fábio |
S29.1 |
364 |
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks |
| Borges, Guilherme |
S20.3 |
614 |
A Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications |
| Botsis, Vasileios |
SCUCA 2015: SCUCA-S2.2 |
1059 |
Fair Pricing Mechanism for Coalitions in Rural Areas |
| SCUCA 2015: SCUCA-S2.3 |
1075 |
Demand Allocation in Local RES Electricity Market Among Multiple Microgrids and Multiple Utilities Through Aggregators |
| Bouallegue, Ridha |
S14.5 |
810 |
PAPR Reduction in FBMC/OQAM Systems Using Active Constellation Extension and Tone Reservation Approaches |
| Bouchemal, Naila |
S6.5 |
264 |
EDCA Virtual Collision Performance Evaluation and Mobility Modeling in V2I Communications |
| Boucif, Amar Bensaber |
PEDISWESA 2015: PEDISWESA - S1.4 |
1010 |
A Probabilistic Model to Corroborate Three Attacks in Vehicular Ad Hoc Networks |
| Boudriga, Noureddine |
S2.4 |
797 |
Communication as a Service for Cloud VANETs |
| Boukerche, Azzedine |
S21.4 |
244 |
Bundling Communication Messages in Large Scale Cloud Environments |
| S20.1 |
476 |
An Intelligent Transportation System for Detection and Control of Congested Roads in Urban Centers |
| S6.2 |
695 |
Geo-localized Content Replication for Vehicular Ad-hoc Networks |
| Bouras, Christos |
S3.1 |
44 |
A Novel Tool for Cost-Efficient Broadband Development Through Infrastructure Sharing |
| Bozic, Milica |
Odyssey 2015: Odyssey5g-S2.2 |
972 |
Compensation of Nonliner Distortion in MIMO Wireless Systems |
| Braz, Fernando |
S20.2 |
552 |
Intelligent Service to Perform Overtaking in Vehicular Networks |
| Brennand, Celso |
S20.1 |
476 |
An Intelligent Transportation System for Detection and Control of Congested Roads in Urban Centers |
| Brunstrom, Anna |
PEDISWESA 2015: PEDISWESA - S1.2 |
1016 |
A First Study on Using MPTCP to Reduce Latency for Cloud Based Mobile Applications |
| Budimir, Djuradj |
Odyssey 2015: Odyssey5g-S2.1 |
968 |
Predistortion and Postdistortion of Wireless Power Amplifiers for 4G and B4G Wireless Systems |
| Odyssey 2015: Odyssey5g-S2.2 |
972 |
Compensation of Nonliner Distortion in MIMO Wireless Systems |
| Buyya, Rajkumar |
S21.2 |
422 |
The Interplay Between Timeliness and Scalability in Cloud Monitoring Systems |
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Caicedo Rendon, Oscar Mauricio |
S1.4 |
524 |
App2net: A Platform to Transfer and Configure Applications on Programmable Virtual Networks |
| Calheiros, Rodrigo |
S21.2 |
422 |
The Interplay Between Timeliness and Scalability in Cloud Monitoring Systems |
| Campos, Sergio |
S20.2 |
552 |
Intelligent Service to Perform Overtaking in Vehicular Networks |
| Caproni, Ivan |
S19.1 |
544 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs |
| Cardellini, Valeria |
MoCS 2015: MoCS-S2.4 |
944 |
On QoS-aware Scheduling of Data Stream Applications over Fog Computing Infrastructures |
| Cardoso, Andre |
S21.1 |
446 |
VBalance: A Selection Policy of Virtual Machines for Load Balancing in Cloud Computing |
| Carlini, Emanuele |
S16.4 |
687 |
Cracker: Crumbling Large Graphs Into Connected Components |
| Carrero, Marcos Aurelio |
S30.2 |
494 |
An Autonomic in-Network Query Processing for Urban Sensor Networks |
| Carvalho, Márcio |
S21.2 |
422 |
The Interplay Between Timeliness and Scalability in Cloud Monitoring Systems |
| Carvalho, Paulo |
S3.4 |
719 |
Analysing Traffic Flows Through Sampling: A Comparative Study |
| Cechovic, Lukas |
PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
| Celesti, Antonio |
DMSS 2015: DMSS-S2.1 |
22 |
Evaluating a Cloud Federation Ecosystem to Reduce Carbon Footprint by Moving Computational Resources |
| S21.3 |
388 |
An Approach to Reduce Energy Costs Through Virtual Machine Migrations in Cloud Federation |
| MoCS 2015: MoCS-S2.2 |
925 |
Costs of a Federated and Hybrid Cloud Environment Aimed at MapReduce Video Transcoding |
| MoCS 2015: MoCS-S2.3 |
937 |
Exploiting the FIWARE Cloud Platform to Develop a Remote Patient Monitoring System |
| Celestino Júnior, Joaquim |
S21.1 |
446 |
VBalance: A Selection Policy of Virtual Machines for Load Balancing in Cloud Computing |
| Chang, Liang |
S31.4 |
125 |
Stochastic Scheduling Model for Network Attack Emulation |
| Chatzigiannakis, Ioannis |
SCUCA 2015: SCUCA-S1.2 |
1096 |
Advanced Observation and Telemetry Heart System Utilizing Wearable ECG Device and a Cloud Platform |
| Chauhan, Maneesh |
S29.4 |
846 |
Beyond the Limits: Maximization of ICN Caching Capabilities with Global Detour Algorithm |
| Chen, Guihai |
S13.1 |
804 |
Design and Optimization for Distributed Indexing Scheme in Switch-Centric Cloud Storage System |
| Chen, Hanhua |
S8.2 |
149 |
Mining User Check-in Features for Location Classification in Location-based Social Networks |
| Chen, Lin |
S32.1 |
572 |
An ISFA-combined Pilot-Aided Channel Estimation Scheme in Multiband Orthogonal Frequency Division Multiplexing Ultra-Wideband Over Fiber System |
| Chen, Ming |
S32.1 |
572 |
An ISFA-combined Pilot-Aided Channel Estimation Scheme in Multiband Orthogonal Frequency Division Multiplexing Ultra-Wideband Over Fiber System |
| Chen, Shuang |
S8.4 |
595 |
Differential Spread Strategy: An Incentive for Advertisement Dissemination |
| Chen, Xiao |
S8.4 |
595 |
Differential Spread Strategy: An Incentive for Advertisement Dissemination |
| Chen, Xiaojun |
S23.1 |
290 |
Towards Misdirected Email Detection Based on Multi-attributes |
| Chen, Yuxuan |
S31.2 |
620 |
A Version-aware Computation and Storage Trade-off Strategy for Multi-version VoD Systems in the Cloud |
| Chen, Zejia |
S16.1 |
181 |
MuLTI: Multiple Location Tags Inference for Users in Social Networks |
| Chen, Zhengguo |
S13.2 |
790 |
NF-Dedupe: A Novel No-fingerprint Deduplication Scheme for Flash-based SSDs |
| Chen, Zhiguang |
S13.2 |
790 |
NF-Dedupe: A Novel No-fingerprint Deduplication Scheme for Flash-based SSDs |
| Cheng, Weijing |
S26.3 |
75 |
An Energy-Efficient Prediction-based Algorithm for Object Tracking in Sensor Networks |
| Chessa, Stefano |
S8.1 |
99 |
Social Amplification Factor for Mobile Crowd Sensing: The ParticipAct Experience |
| MoCS 2015: MoCS-S1.1 |
905 |
Discovery of Services in Smart Cities of Mobile Social Users |
| Chiu, Dah Ming |
S25.1 |
155 |
CDN Bandwidth Allocation in Weakly Interconnected Networks |
| Chou, Chih-Liang |
S9.3 |
650 |
Constructing an Optimal Spanning Tree Over a Hybrid Network with SDN and Legacy Switches |
| Choumas, Kostas |
S28.1 |
328 |
Virtual 802.11 Wireless Networks with Guaranteed Throughout Sharing |
| Chovanec, Michal |
PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
| Chrysostomou, Chrysostomos |
SCUCA 2015: SCUCA-S3.3 |
1102 |
Internet of Things: Security Vulnerabilities and Challenges |
| Cohen, Michael |
SFCS 2015: SFCS - S2.2 |
1138 |
Forensic Analysis of Windows User Space Applications Through Heap Allocations |
| Comelli, Albert |
S35.2 |
482 |
An Ontology-Based Retrieval System for Mammographic Reports |
| Corradi, Antonio |
S8.1 |
99 |
Social Amplification Factor for Mobile Crowd Sensing: The ParticipAct Experience |
| MoCS 2015: MoCS-S1.3 |
918 |
Smartphones as Smart Cities Sensors: MCS Scheduling in the ParticipAct Project |
| Costa, Luciana |
S18.4 |
394 |
Formal Verification of LTE-UMTS Handover Procedures |
| Cottis, Panayotis |
SCUCA 2015: SCUCA-S1.3 |
1089 |
Federated Data Centers as Smart City Stabilizing Factors |
| Cruz, Bruno |
S18.3 |
334 |
IMS Centric Communication Supporting WebRTC Endpoints |
| Cunha, Felipe |
S20.2 |
552 |
Intelligent Service to Perform Overtaking in Vehicular Networks |
| Curatola, Giovanni |
MoCS 2015: MoCS-S1.3 |
918 |
Smartphones as Smart Cities Sensors: MCS Scheduling in the ParticipAct Project |
| Cziva, Richard |
S5.5 |
346 |
Container-Based Network Function Virtualization for Software-Defined Networks |
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| da Silva, Anderson |
S11.1 |
434 |
Tool Support for the Evaluation of Anomaly Traffic Classification for Network Resilience |
| Dai, Chaofan |
PEDISWESA 2015: PEDISWESA - S1.1 |
1004 |
Performace of Two-hop Routing in Delay Tolerant Networks with Selfish Nodes |
| Dallet, Dominique |
S14.2 |
370 |
Digital Reconstruction Stage of Parallel FBD Sigma Delta ADC Implementation Based on Programmable Digital Oscillator in SDR Receiver |
| Danielis, Peter |
PEDISWESA 2015: PEDISWESA - S2.2 |
1028 |
Extensive Analysis of the Kad-based Distributed Computing System DuDE |
| Dantas, Mario |
S13.3 |
532 |
Towards a Performance Characterization of a Parallel File System Over Virtualized Environments |
| Das, Soham |
S17.1 |
608 |
Two-Aggregator Network Topology Optimization with Splitting |
| Davantel, Luiz Henrique |
S31.3 |
415 |
PowerMannaSim: An Extension with Power Consumption Modeling to MannaSim, a Wireless Sensor Network Module of NS-2 |
| Dazzi, Patrizio |
S16.4 |
687 |
Cracker: Crumbling Large Graphs Into Connected Components |
| de Araújo, Gustavo |
S27.1 |
232 |
Skip Game: An Autonomic Approach for QoS and Energy Management in IEEE 802.15.4 WSN |
| de Donato, Walter |
S7.2 |
81 |
Experimenting with Alternative Path Tracing Solutions |
| De Grande, Robson |
S21.4 |
244 |
Bundling Communication Messages in Large Scale Cloud Environments |
| De Rolt, Carlos |
MoCS 2015: MoCS-S1.3 |
918 |
Smartphones as Smart Cities Sensors: MCS Scheduling in the ParticipAct Project |
| Deltouzos, Konstantinos |
S25.2 |
488 |
Distributed Energy-Efficient Peer-to-Peer VoD System |
| Denazis, Spyros |
S25.2 |
488 |
Distributed Energy-Efficient Peer-to-Peer VoD System |
| Deng, Su |
PEDISWESA 2015: PEDISWESA - S1.1 |
1004 |
Performace of Two-hop Routing in Delay Tolerant Networks with Selfish Nodes |
| Deng, Wenyang |
S31.4 |
125 |
Stochastic Scheduling Model for Network Attack Emulation |
| Dessloch, Stefan |
S16.2 |
500 |
Change Data Capture in NoSQL Databases: A Functional and Performance Comparison |
| Di Bartolomeo, Marco |
S7.1 |
161 |
Is It Really Worth to Peer At IXPs? A Comparative Study |
| S4.4 |
252 |
Discovering High-Impact Routing Events Using Traceroutes |
| Di Battista, Giuseppe |
S7.1 |
161 |
Is It Really Worth to Peer At IXPs? A Comparative Study |
| Di Donato, Valentino |
S4.4 |
252 |
Discovering High-Impact Routing Events Using Traceroutes |
| di Lallo, Roberto |
S7.1 |
161 |
Is It Really Worth to Peer At IXPs? A Comparative Study |
| Diles, Georgios |
S3.1 |
44 |
A Novel Tool for Cost-Efficient Broadband Development Through Infrastructure Sharing |
| Ding, Qiang |
S8.2 |
149 |
Mining User Check-in Features for Location Classification in Location-based Social Networks |
| Dini, Gianluca |
S26.4 |
382 |
Secure Positioning with Non-Ideal Distance Bounding Protocols |
| Djedjig, Nabil |
S30.1 |
644 |
Trust-based RPL for the Internet of Things |
| Donato, Erick |
S6.4 |
470 |
PResync: A Method for Preventing Resynchronization in the IEEE 802.11p Standard |
| Dornelas, Matheus |
S1.1 |
870 |
Benchmark Applications Used in Mobile Cloud Computing: A Systematic Mapping Study |
| dos Santos, Ricardo Luis |
S1.4 |
524 |
App2net: A Platform to Transfer and Configure Applications on Programmable Virtual Networks |
| Doulamis, Anastasios |
SCUCA 2015: SCUCA-S2.3 |
1075 |
Demand Allocation in Local RES Electricity Market Among Multiple Microgrids and Multiple Utilities Through Aggregators |
| Doulamis, Nikolaos |
SCUCA 2015: SCUCA-S2.2 |
1059 |
Fair Pricing Mechanism for Coalitions in Rural Areas |
| SCUCA 2015: SCUCA-S2.3 |
1075 |
Demand Allocation in Local RES Electricity Market Among Multiple Microgrids and Multiple Utilities Through Aggregators |
| Du, Biao |
S31.2 |
620 |
A Version-aware Computation and Storage Trade-off Strategy for Multi-version VoD Systems in the Cloud |
| Duarte, João |
S6.4 |
470 |
PResync: A Method for Preventing Resynchronization in the IEEE 802.11p Standard |
| Duarte-Figueiredo, Fatima |
S6.3 |
538 |
Suggestion of Routes for Vehicles in Vehicular Networks Using the Multicommodity Flow Model |
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ellinas, Georgios |
S32.2 |
713 |
Equalizer Placement and Wavelength Selective Switch Architecture for Optical Network Security |
| Elsabrouty, Maha |
S28.2 |
440 |
SISO and MIMO Analog Network Coding Relay Architectures for the Uplink of LTE-Advanced |
| S12.2 |
458 |
Performance of Perceptual 1-Bit Compressed Sensing for Audio Compression |
| Eshghi, Farshad |
S27.3 |
577 |
QADC-MORE:A New QoS-Aware Dynamic Credit MORE Protocol for Wireless Mesh Networks |
| Eskola, Rasmus |
S25.3 |
676 |
Performance Evaluation of WebRTC Data Channels |
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| F. Brito, Carlos E. |
S30.3 |
315 |
Virtual Broking Coding for Reliable In-Network Storage on WSANs |
| Fagertun, Anna |
S12.3 |
428 |
Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks |
| Farinha, Nuno |
S9.1 |
880 |
Towards MEF Services in a SDN Environment |
| Fazio, Maria |
DMSS 2015: DMSS-S2.1 |
22 |
Evaluating a Cloud Federation Ecosystem to Reduce Carbon Footprint by Moving Computational Resources |
| S21.3 |
388 |
An Approach to Reduce Energy Costs Through Virtual Machine Migrations in Cloud Federation |
| MoCS 2015: MoCS-S2.2 |
925 |
Costs of a Federated and Hybrid Cloud Environment Aimed at MapReduce Video Transcoding |
| MoCS 2015: MoCS-S2.3 |
937 |
Exploiting the FIWARE Cloud Platform to Develop a Remote Patient Monitoring System |
| Fenu, Gianni |
S1.3 |
681 |
Modeling User Interactions for Conversion Rate Prediction in M-Commerce |
| Fernandes, Filipe |
S21.1 |
446 |
VBalance: A Selection Policy of Virtual Machines for Load Balancing in Cloud Computing |
| Fernandes, Stenio |
S1.2 |
167 |
A Fine-Tuned Control-Theoretic Approach for Dynamic Adaptive Streaming Over HTTP |
| Fernandez, Marcial |
S5.4 |
258 |
Two-Phase Load Balancing of In-Memory Key-Value Storages Through NFV and SDN |
| Fernández Anta, Antonio |
S17.4 |
87 |
Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service |
| Ferreira, Bruno |
S20.2 |
552 |
Intelligent Service to Perform Overtaking in Vehicular Networks |
| Ferreira, Carlos |
S9.1 |
880 |
Towards MEF Services in a SDN Environment |
| Ferro, Erina |
MoCS 2015: MoCS-S1.1 |
905 |
Discovery of Services in Smart Cities of Mobile Social Users |
| Figueiredo, Carlos |
S10.2 |
452 |
A Sampling Algorithm for Intermittently Connected Delay Tolerant Wireless Sensor Networks |
| Foschini, Luca |
S8.1 |
99 |
Social Amplification Factor for Mobile Crowd Sensing: The ParticipAct Experience |
| MoCS 2015: MoCS-S1.3 |
918 |
Smartphones as Smart Cities Sensors: MCS Scheduling in the ParticipAct Project |
| Fourneau, Jean Michel |
PEDISWESA 2015: PEDISWESA - S1.3 |
977 |
Admission Control Based on WRR in WiMAX Networks |
| Fu, Tingting |
S10.4 |
303 |
Contribution Aware Task Allocation in Sensor Networks |
| Furukawa, Hiroshi |
S12.2 |
458 |
Performance of Perceptual 1-Bit Compressed Sensing for Audio Compression |
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Gad, Ruediger |
S3.5 |
746 |
Improving Network Traffic Acquisition and Processing with the Java Virtual Machine |
| Gagnaire, Maurice |
SCUCA 2015: SCUCA-S2.1 |
1052 |
Online Electric Vehicle Recharge Scheduling Under Different e-Mobility Operator's Pricing Models |
| Gao, Ge |
PEDISWESA 2015: PEDISWESA - S2.4 |
1034 |
Unequal Error Protection for S3AC Coding Based on Expanding Window Fountain Codes |
| Gao, Xiaofeng |
S13.1 |
804 |
Design and Optimization for Distributed Indexing Scheme in Switch-Centric Cloud Storage System |
| Gao, Zhipeng |
S26.3 |
75 |
An Energy-Efficient Prediction-based Algorithm for Object Tracking in Sensor Networks |
| Garai, Mouna |
S2.4 |
797 |
Communication as a Service for Cloud VANETs |
| Georgescu, Marius |
S3.2 |
238 |
Benchmarking the Load Scalability of IPv6 Transition Technologies: a Black-Box Analysis |
| Geyer, Claudio |
S11.4 |
93 |
A Failure Detector That Gives Information on the Degree of Confidence in the System |
| S16.2 |
500 |
Change Data Capture in NoSQL Databases: A Functional and Performance Comparison |
| S20.3 |
614 |
A Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications |
| Ghamri-Doudane, Yacine |
S30.3 |
315 |
Virtual Broking Coding for Reliable In-Network Storage on WSANs |
| S4.1 |
518 |
A Message-Based Incentive Mechanism for Opportunistic Networking Applications |
| Gholoobi, Amin |
S26.2 |
854 |
Indoor Target Tracking Based on Time Difference of Arrival and Particle Filtering |
| Giacobbe, Maurizio |
DMSS 2015: DMSS-S2.1 |
22 |
Evaluating a Cloud Federation Ecosystem to Reduce Carbon Footprint by Moving Computational Resources |
| S21.3 |
388 |
An Approach to Reduce Energy Costs Through Virtual Machine Migrations in Cloud Federation |
| Gilbert, David |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Girolami, Michele |
S8.1 |
99 |
Social Amplification Factor for Mobile Crowd Sensing: The ParticipAct Experience |
| MoCS 2015: MoCS-S1.1 |
905 |
Discovery of Services in Smart Cities of Mobile Social Users |
| Gladyshev, Pavel |
SFCS 2015: SFCS - S1.1 |
1110 |
Forensic Analysis of Instagram and Path on an iPhone 5s Mobile Device |
| Glikson, Alex |
MoCS 2015: MoCS-S2.3 |
937 |
Exploiting the FIWARE Cloud Platform to Develop a Remote Patient Monitoring System |
| Gouveia, Rafael |
S9.4 |
887 |
OpenFlow and Services in the Cloud: Core Network Demonstrator |
| Gözüpek, Didem |
S5.1 |
136 |
Minimizing Signaling Cost in Green Routing for Software Defined Networks |
| Granville, Lisandro |
S23.3 |
142 |
A DTLS-based Security Architecture for the Internet of Things |
| S21.2 |
422 |
The Interplay Between Timeliness and Scalability in Cloud Monitoring Systems |
| S9.2 |
464 |
An EC-Based Formalism for Policy Refinement in Software-Defined Networking |
| S1.4 |
524 |
App2net: A Platform to Transfer and Configure Applications on Programmable Virtual Networks |
| Grassi, Vincenzo |
MoCS 2015: MoCS-S2.4 |
944 |
On QoS-aware Scheduling of Data Stream Applications over Fog Computing Infrastructures |
| Grinnemo, Karl-Johan |
PEDISWESA 2015: PEDISWESA - S1.2 |
1016 |
A First Study on Using MPTCP to Reduce Latency for Cloud Based Mobile Applications |
| Guelfi, Adilson |
S19.1 |
544 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs |
| Guimarães, Vinícius |
S23.3 |
142 |
A DTLS-based Security Architecture for the Internet of Things |
| Guo, Li |
S23.1 |
290 |
Towards Misdirected Email Detection Based on Multi-attributes |
| Guy, Chris |
DMSS 2015: DMSS-S1.1 |
1 |
Design and Implement Delay-Aware QoS Scheme for 3GPP LTE/LTE-A Networks for Mixed Traffic Flow |
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Hadjichristofi, George |
SCUCA 2015: SCUCA-S3.3 |
1102 |
Internet of Things: Security Vulnerabilities and Challenges |
| Hadjiefthymiades, Stathes |
S18.1 |
106 |
Epidemic Dissemination Controlled by Wireless Channel Awareness |
| Hager, Creighton |
S33.1 |
69 |
Data Authentication for NDN Using Hash Chains |
| Haider, Syed |
S17.3 |
323 |
Analytical Modeling of Reconstruction Delays in Distributed Storage Data Centers |
| Hammal, Youcef |
PEDISWESA 2015: PEDISWESA - S2.1 |
1022 |
Time Petri Nets for Performance Evaluation of Composite Web Services Architectures |
| Han, Song |
S31.1 |
725 |
Hierarchical Performance Modeling of Embedded Systems |
| Hao, Yuwen |
S26.3 |
75 |
An Energy-Efficient Prediction-based Algorithm for Object Tracking in Sensor Networks |
| Hara, Carmem |
S30.2 |
494 |
An Autonomic in-Network Query Processing for Urban Sensor Networks |
| Haraty, Ramzi |
PEDISWESA 2015: PEDISWESA - S2.3 |
982 |
A Comparative Study of Mobile Database Transaction Models |
| Hasan, Md |
MoCS 2015: MoCS-S1.2 |
931 |
Encryption as a Service for Smart Grid Advanced Metering Infrastructure |
| Hatada, Mitsuhiro |
S15.4 |
205 |
AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters |
| Hazeyama, Hiroaki |
S3.2 |
238 |
Benchmarking the Load Scalability of IPv6 Transition Technologies: a Black-Box Analysis |
| He, Jing |
S32.1 |
572 |
An ISFA-combined Pilot-Aided Channel Estimation Scheme in Multiband Orthogonal Frequency Division Multiplexing Ultra-Wideband Over Fiber System |
| He, Xiangnan |
S8.4 |
595 |
Differential Spread Strategy: An Incentive for Advertisement Dissemination |
| Hodon, Michal |
PEDISWESA 2015: PEDISWESA - S3.3 |
993 |
Monitoring and Recognition of Bird Population in Protected Bird Territory |
| PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
| Hojo, Masashi |
S4.3 |
309 |
A Two-dimensional Structured Overlay Based on Flexible Routing Tables |
| Horvath, Mark |
S33.1 |
69 |
Data Authentication for NDN Using Hash Chains |
| Hsueh-Wen, Tseng |
S17.2 |
583 |
An Urgency and Congestion Control Scheme for Larger-scale TCP Incast Problem in Data Center |
| Hu, Ruimin |
PEDISWESA 2015: PEDISWESA - S2.4 |
1034 |
Unequal Error Protection for S3AC Coding Based on Expanding Window Fountain Codes |
| Hu, Yong |
S16.2 |
500 |
Change Data Capture in NoSQL Databases: A Functional and Performance Comparison |
| Huang, Haoqiu |
S11.2 |
175 |
A Failure Prediction Approach Based on Cloud Theory and Hidden Markov Model in Networked Computing Systems |
| S18.2 |
194 |
Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: A Repeated Cooperative Game-theoretic Approach |
| Huang, Hongbin |
PEDISWESA 2015: PEDISWESA - S1.1 |
1004 |
Performace of Two-hop Routing in Delay Tolerant Networks with Selfish Nodes |
| Huang, Weiqing |
S14.4 |
668 |
A Spectrum Efficient Polarized OFDM Scheme for Wireless Depolarized Channel |
| Hudik, Martin |
PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ianniello, Raffaele |
S8.1 |
99 |
Social Amplification Factor for Mobile Crowd Sensing: The ParticipAct Experience |
| MoCS 2015: MoCS-S1.3 |
918 |
Smartphones as Smart Cities Sensors: MCS Scheduling in the ParticipAct Project |
| Ibrahim, Saleh |
S34.2 |
340 |
Performance Analysis of Efficient Pipeline Architectures for Underwater Big Data Analytics |
| Inacio, Eduardo |
S13.3 |
532 |
Towards a Performance Characterization of a Parallel File System Over Virtualized Environments |
| Iqbal, Adnan |
S34.3 |
297 |
Performance Analysis of Data Delivery Reliability Schemes in Underwater Sensor Networks |
| Iraqi, Youssef |
SFCS 2015: SFCS - S1.2 |
1116 |
Inferring Relevance and Presence of Evidence in Service-Oriented and SaaS Architectures |
| Islam, H. |
S29.2 |
212 |
Towards Disruption Tolerant ICN |
| Ito, Maria |
S1.2 |
167 |
A Fine-Tuned Control-Theoretic Approach for Dynamic Adaptive Streaming Over HTTP |
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| J. Tostes, Anna |
S6.3 |
538 |
Suggestion of Routes for Vehicles in Vehicular Networks Using the Multicommodity Flow Model |
| Jeļinskis, Jans |
S31.5 |
777 |
Comprehensive Analysis of AggSessAC Method for Revenue Maximization Using OMNeT++ |
| Jerschow, Yves Igor |
S33.2 |
401 |
Blind Packet Forwarding Using a Locator/Identifier Split Approach |
| Jin, Hai |
S8.2 |
149 |
Mining User Check-in Features for Location Classification in Location-based Social Networks |
| S22.1 |
226 |
Cost Minimization for Code Offloading with Cellular Traffic Aggregation |
| S13.4 |
358 |
SKVM: Scaling In-Memory Key-Value Store on Multicore |
| Jouet, Simon |
S5.5 |
346 |
Container-Based Network Function Virtualization for Software-Defined Networks |
| Julio, Eduardo |
S28.3 |
858 |
Power Control and Channel Allocation Mechanism for Coexistence Between Secondary Cognitive Networks |
| Jurecka, Matus |
PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Kadobayashi, Youki |
S3.2 |
238 |
Benchmarking the Load Scalability of IPv6 Transition Technologies: a Black-Box Analysis |
| Kalogeras, Athanasios |
SCUCA 2015: SCUCA-S1.2 |
1096 |
Advanced Observation and Telemetry Heart System Utilizing Wearable ECG Device and a Cloud Platform |
| Kalogeras, Dimitrios |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Kapitulík, Ján |
PEDISWESA 2015: PEDISWESA - S3.1 |
999 |
Distributed Sensor Network for Vehicles with Prior Right Detection |
| PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
| Kappel, Benjamin |
PEDISWESA 2015: PEDISWESA - S2.2 |
1028 |
Extensive Analysis of the Kad-based Distributed Computing System DuDE |
| Kappes, Martin |
S3.5 |
746 |
Improving Network Traffic Acquisition and Processing with the Java Virtual Machine |
| Karetsos, George |
S4.2 |
409 |
Energy-efficient Base Station Management in Heterogeneous Networking Environments |
| Karpiš, Ondrej |
PEDISWESA 2015: PEDISWESA - S3.2 |
988 |
Monitoring of Water Level Based on Acoustic Emissions |
| Kasem, Hossam |
S12.2 |
458 |
Performance of Perceptual 1-Bit Compressed Sensing for Audio Compression |
| Kat, Ronen |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Katsalis, Kostas |
S28.1 |
328 |
Virtual 802.11 Wireless Networks with Guaranteed Throughout Sharing |
| Kelarestagh, Manoochehr |
S27.3 |
577 |
QADC-MORE:A New QoS-Aware Dynamic Credit MORE Protocol for Wireless Mesh Networks |
| Keliher, Liam |
S23.4 |
899 |
Weak Keys and Plaintext Recovery for the Dhall-Pal Block Cipher |
| Khargonekar, Pramod |
S24.3 |
632 |
Offline First Fit Scheduling in Smart Grids |
| Kiziloz, Hakan Ezgi |
S15.1 |
864 |
Towards Making Accessible Human-Interaction Proofs More Secure and Usable |
| Klein, Cristian |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Kochlan, Michal |
PEDISWESA 2015: PEDISWESA - S3.2 |
988 |
Monitoring of Water Level Based on Acoustic Emissions |
| PEDISWESA 2015: PEDISWESA - S3.1 |
999 |
Distributed Sensor Network for Vehicles with Prior Right Detection |
| PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
| Kodogiannis, Vassilis |
Odyssey 2015: Odyssey5g-S2.1 |
968 |
Predistortion and Postdistortion of Wireless Power Amplifiers for 4G and B4G Wireless Systems |
| Kofuji, Sergio |
S19.1 |
544 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs |
| Kokkinos, Panagiotis |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Kokkinos, Vasileios |
S3.1 |
44 |
A Novel Tool for Cost-Efficient Broadband Development Through Infrastructure Sharing |
| Konstantinopoulos, Panagiotis |
SCUCA 2015: SCUCA-S1.2 |
1096 |
Advanced Observation and Telemetry Heart System Utilizing Wearable ECG Device and a Cloud Platform |
| Kontos, Theofanis |
S18.1 |
106 |
Epidemic Dissemination Controlled by Wireless Channel Awareness |
| Korakis, Thanasis |
S28.1 |
328 |
Virtual 802.11 Wireless Networks with Guaranteed Throughout Sharing |
| Korstanje, Karen |
S23.4 |
899 |
Weak Keys and Plaintext Recovery for the Dhall-Pal Block Cipher |
| Krishnamachari, Bhaskar |
S20.4 |
662 |
Enhancing Intelligence in Intervehicle Communications to Detect and Reduce Congestion in Urban Centers |
| Kuperman, Yossi |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Kyriakides, Ioannis |
S26.2 |
854 |
Indoor Target Tracking Based on Time Difference of Arrival and Particle Filtering |
| Kyriazis, Dimosthenis |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Kyriazis, Georgios |
S4.2 |
409 |
Energy-efficient Base Station Management in Heterogeneous Networking Environments |
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| L. Marcon Jr., Arlindo |
S15.3 |
512 |
Managing Distributed UCONabc Policies with Authorization Assertions and Policy Templates |
| Lahouli, Rihab |
S14.2 |
370 |
Digital Reconstruction Stage of Parallel FBD Sigma Delta ADC Implementation Based on Programmable Digital Oscillator in SDR Receiver |
| Langweg, Hanno |
SFCS 2015: SFCS - S2.3 |
1132 |
Events and Causal Factors Charting of Kernel Traces for Root Cause Analysis |
| Laroussi, Karim |
PEDISWESA 2015: PEDISWESA - S1.4 |
1010 |
A Probabilistic Model to Corroborate Three Attacks in Vehicular Ad Hoc Networks |
| Lassance, Luiz Carlos |
S29.1 |
364 |
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks |
| Lauks, Gunārs |
S31.5 |
777 |
Comprehensive Analysis of AggSessAC Method for Revenue Maximization Using OMNeT++ |
| Lei, Weijia |
S14.1 |
57 |
Robust Data-Aided SNR Estimation Algorithm in High Dynamic Environment |
| Leithardt, Valderi |
S20.3 |
614 |
A Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications |
| Lestas, Marios |
S27.2 |
130 |
Spectral Partitioning for Node Criticality |
| Li, Dagang |
S29.3 |
352 |
Dynamic Ring for Seamless Mobility in Identity Centric Networks |
| Li, Guojie |
S16.3 |
284 |
CIUV: Collaborating Information Against Unreliable Views |
| Li, Jiayun |
S14.3 |
560 |
Construction of Structured Low Density Lattice Codes Based on Finite Fields |
| Li, Ming |
S7.4 |
656 |
QoE-based Radio Resource Allocation in LTE Femtocell Considering Transport Limitations |
| Li, Peng |
S22.1 |
226 |
Cost Minimization for Code Offloading with Cellular Traffic Aggregation |
| Li, Teng |
S32.1 |
572 |
An ISFA-combined Pilot-Aided Channel Estimation Scheme in Multiband Orthogonal Frequency Division Multiplexing Ultra-Wideband Over Fiber System |
| Li, Wenjia |
S33.3 |
112 |
Android Application Recommendation Approach Based on Network Traffic Measurement and Analysis |
| S19.3 |
783 |
Fest: A Feature Extraction and Selection Tool for Android Malware Detection |
| Li, Wenwei |
S33.3 |
112 |
Android Application Recommendation Approach Based on Network Traffic Measurement and Analysis |
| Li, Zhongcheng |
S8.4 |
595 |
Differential Spread Strategy: An Incentive for Advertisement Dissemination |
| Liao, Xiaofei |
S22.1 |
226 |
Cost Minimization for Code Offloading with Cellular Traffic Aggregation |
| Liao, Yi-Ching |
SFCS 2015: SFCS - S2.3 |
1132 |
Events and Causal Factors Charting of Kernel Traces for Root Cause Analysis |
| Liaskos, Christos |
S3.3 |
638 |
A Lightweight, Non-intrusive Approach for Orchestrating Autonomously-managed Network Elements |
| Lima, David |
S10.2 |
452 |
A Sampling Algorithm for Intermittently Connected Delay Tolerant Wireless Sensor Networks |
| Lima, Solange |
S3.4 |
719 |
Analysing Traffic Flows Through Sampling: A Comparative Study |
| Lima, Wesllen |
S24.2 |
822 |
User Activity Recognition for Energy Saving in Smart Home Environment |
| Lin, Siming |
S31.4 |
125 |
Stochastic Scheduling Model for Network Attack Emulation |
| Lin, Yaping |
S23.2 |
707 |
Efficient and Privacy-Preserving Search in Multi-Source Personal Health Record Clouds |
| Liu, Fang |
S13.2 |
790 |
NF-Dedupe: A Novel No-fingerprint Deduplication Scheme for Flash-based SSDs |
| Liu, Min |
S8.4 |
595 |
Differential Spread Strategy: An Incentive for Advertisement Dissemination |
| Liu, Peng |
S10.4 |
303 |
Contribution Aware Task Allocation in Sensor Networks |
| Liu, Qian |
S11.3 |
119 |
A Metric-Correlation-Based Fault Detection Approach Using Clustering Analysis in Wireless Sensor Networks |
| Liu, Qin |
S23.2 |
707 |
Efficient and Privacy-Preserving Search in Multi-Source Personal Health Record Clouds |
| Liu, Tingwen |
S23.1 |
290 |
Towards Misdirected Email Detection Based on Multi-attributes |
| Liu, Xinji |
S14.3 |
560 |
Construction of Structured Low Density Lattice Codes Based on Finite Fields |
| Liu, Yang |
S8.2 |
149 |
Mining User Check-in Features for Location Classification in Location-based Social Networks |
| Liu, Yinlong |
S27.4 |
701 |
A QoE-Oriented Scheduling Scheme for HTTP Streaming Service in LTE System |
| Liu, Yuang |
S13.1 |
804 |
Design and Optimization for Distributed Indexing Scheme in Switch-Centric Cloud Storage System |
| Liu, Yuanyuan |
S14.1 |
57 |
Robust Data-Aided SNR Estimation Algorithm in High Dynamic Environment |
| Liu, Zhiyong |
S17.4 |
87 |
Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service |
| Lo Presti, Francesco |
MoCS 2015: MoCS-S2.4 |
944 |
On QoS-aware Scheduling of Data Stream Applications over Fog Computing Infrastructures |
| Lohier, Stephane |
S30.3 |
315 |
Virtual Broking Coding for Reliable In-Network Storage on WSANs |
| Long, Shuai |
S23.2 |
707 |
Efficient and Privacy-Preserving Search in Multi-Source Personal Health Record Clouds |
| Looga, Vilen |
S22.2 |
272 |
The Great Expectations of Smartphone Traffic Scheduling |
| Loukopoulos, Leonidas |
S3.1 |
44 |
A Novel Tool for Cost-Efficient Broadband Development Through Infrastructure Sharing |
| Lu, Feng |
S8.2 |
149 |
Mining User Check-in Features for Location Classification in Location-based Social Networks |
| S22.1 |
226 |
Cost Minimization for Code Offloading with Cellular Traffic Aggregation |
| Lucchese, Claudio |
S16.4 |
687 |
Cracker: Crumbling Large Graphs Into Connected Components |
| Lukyanenko, Andrey |
S29.2 |
212 |
Towards Disruption Tolerant ICN |
| S29.4 |
846 |
Beyond the Limits: Maximization of ICN Caching Capabilities with Global Detour Algorithm |
| Lulli, Alessandro |
S16.4 |
687 |
Cracker: Crumbling Large Graphs Into Connected Components |
| Luo, Chunbo |
Odyssey 2015: Odyssey5G-S1.3 |
962 |
Relaying for 5G: A Novel Low-Error Relaying Protocol |
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| M. Buhari, Seyed |
S5.1 |
136 |
Minimizing Signaling Cost in Green Routing for Software Defined Networks |
| Ma, Wei |
S27.4 |
701 |
A QoE-Oriented Scheduling Scheme for HTTP Streaming Service in LTE System |
| Macedo, Daniel |
S4.1 |
518 |
A Message-Based Incentive Mechanism for Opportunistic Networking Applications |
| Macedo, Douglas |
S13.3 |
532 |
Towards a Performance Characterization of a Parallel File System Over Virtualized Environments |
| Machado, Cristian |
S9.2 |
464 |
An EC-Based Formalism for Policy Refinement in Software-Defined Networking |
| Maciel, Paulo |
S1.1 |
870 |
Benchmark Applications Used in Mobile Cloud Computing: A Systematic Mapping Study |
| Madeira, Edmundo |
S6.4 |
470 |
PResync: A Method for Preventing Resynchronization in the IEEE 802.11p Standard |
| Maia, Guilherme |
S6.4 |
470 |
PResync: A Method for Preventing Resynchronization in the IEEE 802.11p Standard |
| S20.1 |
476 |
An Intelligent Transportation System for Detection and Control of Congested Roads in Urban Centers |
| S6.3 |
538 |
Suggestion of Routes for Vehicles in Vehicular Networks Using the Multicommodity Flow Model |
| Mannes, Elisa |
S29.1 |
364 |
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks |
| Manousakis, Konstantinos |
S32.2 |
713 |
Equalizer Placement and Wavelength Selective Switch Architecture for Optical Network Security |
| Mao, Sitong |
S22.3 |
589 |
Identification of Wireless Network Cards Based on Signatures of Wireless Traffic |
| Marchetta, Pietro |
S7.2 |
81 |
Experimenting with Alternative Path Tracing Solutions |
| SCUCA 2015: SCUCA-S1.1 |
1046 |
A Map-Based Platform for Smart Mobility Services |
| Marchetto, Guido |
S18.4 |
394 |
Formal Verification of LTE-UMTS Handover Procedures |
| Marnerides, Angelos |
S11.1 |
434 |
Tool Support for the Evaluation of Anomaly Traffic Classification for Network Resilience |
| Marquez, Fermin Galan |
MoCS 2015: MoCS-S2.3 |
937 |
Exploiting the FIWARE Cloud Platform to Develop a Remote Patient Monitoring System |
| Masood, Bilal |
S24.1 |
816 |
Channel Modeling of NB-PLC for Smart Grid |
| Mastorakis, George |
Odyssey 2015: Odyssey5G-S1.1 |
955 |
Performance Analysis of a Rate-Adaptive Bandwidth Allocation Scheme in 5G Mobile Networks |
| Matos, Ricardo |
S2.1 |
752 |
Prediction-based Connection Manager for Vehicular Networks |
| Mauthe, Andreas |
S11.1 |
434 |
Tool Support for the Evaluation of Anomaly Traffic Classification for Network Resilience |
| Mavromoustakis, Constandinos |
Odyssey 2015: Odyssey5G-S1.1 |
955 |
Performance Analysis of a Rate-Adaptive Bandwidth Allocation Scheme in 5G Mobile Networks |
| Maziero, Carlos |
S29.1 |
364 |
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks |
| McClean, Sally |
Odyssey 2015: Odyssey5G-S1.3 |
962 |
Relaying for 5G: A Novel Low-Error Relaying Protocol |
| Medina-Bulo, Inmaculada |
S3.5 |
746 |
Improving Network Traffic Acquisition and Processing with the Java Virtual Machine |
| Medjek, Faiza |
S30.1 |
644 |
Trust-based RPL for the Internet of Things |
| Meira, Wagner |
S6.1 |
732 |
Design of Roadside Communication Infrastructure with QoS Guarantees |
| Mendes, João |
S2.1 |
752 |
Prediction-based Connection Manager for Vehicular Networks |
| Meneguette, Rodolfo |
S20.4 |
662 |
Enhancing Intelligence in Intervehicle Communications to Detect and Reduce Congestion in Urban Centers |
| Meng, Luoming |
S11.2 |
175 |
A Failure Prediction Approach Based on Cloud Theory and Hidden Markov Model in Networked Computing Systems |
| Mesfioui, Mhamed |
PEDISWESA 2015: PEDISWESA - S1.4 |
1010 |
A Probabilistic Model to Corroborate Three Attacks in Vehicular Ad Hoc Networks |
| Metwaly, Kareem |
S28.2 |
440 |
SISO and MIMO Analog Network Coding Relay Architectures for the Uplink of LTE-Advanced |
| Miček, Juraj |
PEDISWESA 2015: PEDISWESA - S3.2 |
988 |
Monitoring of Water Level Based on Acoustic Emissions |
| Mijuskovic, Jelena |
Odyssey 2015: Odyssey5g-S2.1 |
968 |
Predistortion and Postdistortion of Wireless Power Amplifiers for 4G and B4G Wireless Systems |
| Mijuskovic, Jelena |
Odyssey 2015: Odyssey5g-S2.2 |
972 |
Compensation of Nonliner Distortion in MIMO Wireless Systems |
| Milanova, Jana |
PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
| Mini, Raquel |
S20.2 |
552 |
Intelligent Service to Perform Overtaking in Vehicular Networks |
| Miranda Pereira, Rodolfo |
S31.3 |
415 |
PowerMannaSim: An Extension with Power Consumption Modeling to MannaSim, a Wireless Sensor Network Module of NS-2 |
| Mirones, Vitor |
S9.1 |
880 |
Towards MEF Services in a SDN Environment |
| Miyao, Takehiro |
S4.3 |
309 |
A Two-dimensional Structured Overlay Based on Flexible Routing Tables |
| Mokdad, Lynda |
PEDISWESA 2015: PEDISWESA - S1.3 |
977 |
Admission Control Based on WRR in WiMAX Networks |
| PEDISWESA 2015: PEDISWESA - S2.1 |
1022 |
Time Petri Nets for Performance Evaluation of Composite Web Services Architectures |
| Mokryn, Osnat (Ossi) |
S25.4 |
738 |
To Share Content or Not to Share? This is the Peering Question |
| Mongay Batalla, Jordi |
Odyssey 2015: Odyssey5G-S1.1 |
955 |
Performance Analysis of a Rate-Adaptive Bandwidth Allocation Scheme in 5G Mobile Networks |
| Montez, Carlos |
S27.1 |
232 |
Skip Game: An Autonomic Approach for QoS and Energy Management in IEEE 802.15.4 WSN |
| Mori, Tatsuya |
S15.4 |
205 |
AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters |
| Mota, Vinícius |
S4.1 |
518 |
A Message-Based Incentive Mechanism for Opportunistic Networking Applications |
| Mouftah, Hussein |
S24.4 |
566 |
Mobility Impact on the Performance of Electric-Vehicle-to-Grid Communications in Smart Grid Environment |
| MoCS 2015: MoCS-S1.2 |
931 |
Encryption as a Service for Smart Grid Advanced Metering Infrastructure |
| Mounira, Laabidi |
S14.5 |
810 |
PAPR Reduction in FBMC/OQAM Systems Using Active Constellation Extension and Tone Reservation Approaches |
| Muta, Osamu |
S12.2 |
458 |
Performance of Perceptual 1-Bit Compressed Sensing for Audio Compression |
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Nagao, Hiroya |
S4.3 |
309 |
A Two-dimensional Structured Overlay Based on Flexible Routing Tables |
| Naja, Rola |
S6.5 |
264 |
EDCA Virtual Collision Performance Evaluation and Mobility Modeling in V2I Communications |
| Nakamura, Eduardo |
S2.2 |
758 |
On the Performance of Localization Prediction Methods for Vehicular Ad Hoc Networks |
| Nand, Parma |
S8.3 |
279 |
A Framework for Retrieving and Ranking Tweets in Real Time |
| Naqvi, Syeda Nayyab Zia |
DMSS 2015: DMSS-S1.3 |
14 |
Benchmarking leading-edge mobile devices for data-intensive distributed mobile cloud applications |
| Nardelli, Matteo |
MoCS 2015: MoCS-S2.4 |
944 |
On QoS-aware Scheduling of Data Stream Applications over Fog Computing Infrastructures |
| Nascimento, Alberto |
Odyssey 2015: Odyssey5G-S1.2 |
950 |
Game-Theoretic Based Scheduling for Demand-Side Management in 5G Smart Grids |
| Nasrallah, Yamen |
S24.4 |
566 |
Mobility Impact on the Performance of Electric-Vehicle-to-Grid Communications in Smart Grid Environment |
| Nasser, Nidal |
DMSS 2015: DMSS-S2.3 |
34 |
Utilizing CAN-Bus and Smartphones to Enforce Safe and Responsible Driving |
| Natale, Eduard |
SCUCA 2015: SCUCA-S1.1 |
1046 |
A Map-Based Platform for Smart Mobility Services |
| Natkaniec, Marek |
S19.2 |
834 |
Selfish Attacks in IEEE 802.11aa Networks with Intra-AC Prioritization |
| Neves, Diogo Telmo |
S35.1 |
376 |
Towards a Faster and Accurate Supertree Inference |
| Neves, Filipe |
S2.1 |
752 |
Prediction-based Connection Manager for Vehicular Networks |
| Nicopolitidis, Petros |
S32.3 |
893 |
A Novel Fair and Efficient Bandwidth Allocation Scheme for FiWi Networks |
| Nider, Joel |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Nightingale, James |
Odyssey 2015: Odyssey5G-S1.3 |
962 |
Relaying for 5G: A Novel Low-Error Relaying Protocol |
| Niu, Danmei |
S18.2 |
194 |
Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: A Repeated Cooperative Game-theoretic Approach |
| Nogueira, José-Marcos |
S4.1 |
518 |
A Message-Based Incentive Mechanism for Opportunistic Networking Applications |
| Nosrati, Hamed |
S12.1 |
602 |
Acoustic Model Parameter Estimation Using Distributed Incremental Adaptive Networks |
| Nurminen, Jukka |
S25.3 |
676 |
Performance Evaluation of WebRTC Data Channels |
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Okuda, Takeshi |
S3.2 |
238 |
Benchmarking the Load Scalability of IPv6 Transition Technologies: a Black-Box Analysis |
| Olešnaníková, Veronika |
PEDISWESA 2015: PEDISWESA - S3.2 |
988 |
Monitoring of Water Level Based on Acoustic Emissions |
| Oliveira, Horacio |
S2.2 |
758 |
On the Performance of Localization Prediction Methods for Vehicular Ad Hoc Networks |
| S2.3 |
764 |
A Prediction-based Routing Algorithm for Vehicular Ad Hoc Networks |
| Ou, Shumao |
SCUCA 2015: SCUCA-S3.2 |
1083 |
A Shim Layer for Heterogeneous Wireless Communications Scheduling in Intelligent Transport Systems |
| Ou, Zhonghong |
S22.2 |
272 |
The Great Expectations of Smartphone Traffic Scheduling |
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| P. R. Filho, Geraldo |
S20.4 |
662 |
Enhancing Intelligence in Intervehicle Communications to Detect and Reduce Congestion in Urban Centers |
| Pallis, Evangelos |
Odyssey 2015: Odyssey5G-S1.1 |
955 |
Performance Analysis of a Rate-Adaptive Bandwidth Allocation Scheme in 5G Mobile Networks |
| Pan, Hsing-Yo |
S5.3 |
220 |
Optimizing the SDN Control-Plane Performance of the Openvswitch Software Switch |
| Panarello, Alfonso |
MoCS 2015: MoCS-S2.2 |
925 |
Costs of a Federated and Hybrid Cloud Environment Aimed at MapReduce Video Transcoding |
| Papadimitriou, Georgios |
S32.3 |
893 |
A Novel Fair and Efficient Bandwidth Allocation Scheme for FiWi Networks |
| Paphitis, Aristodemos |
S10.3 |
829 |
Estimating Queue Formation Rate in Wireless Sensor Networks Using a Fluid Dynamic Model |
| Pardal, Gonçalo |
S9.4 |
887 |
OpenFlow and Services in the Cloud: Core Network Demonstrator |
| Parr, Gerard |
Odyssey 2015: Odyssey5G-S1.3 |
962 |
Relaying for 5G: A Novel Low-Error Relaying Protocol |
| Pau, Pier Luigi |
S1.3 |
681 |
Modeling User Interactions for Conversion Rate Prediction in M-Commerce |
| Pazzi, Richard |
S2.2 |
758 |
On the Performance of Localization Prediction Methods for Vehicular Ad Hoc Networks |
| S2.3 |
764 |
A Prediction-based Routing Algorithm for Vehicular Ad Hoc Networks |
| Peng, Ti-Hsiang |
S17.2 |
583 |
An Urgency and Congestion Control Scheme for Larger-scale TCP Incast Problem in Data Center |
| Peoples, Cathryn |
Odyssey 2015: Odyssey5G-S1.3 |
962 |
Relaying for 5G: A Novel Low-Error Relaying Protocol |
| Perazzo, Pericle |
S26.4 |
382 |
Secure Positioning with Non-Ideal Distance Bounding Protocols |
| Perera, Rivindu |
S8.3 |
279 |
A Framework for Retrieving and Ranking Tweets in Real Time |
| Persico, Valerio |
S7.2 |
81 |
Experimenting with Alternative Path Tracing Solutions |
| Pescapé, Antonio |
S7.2 |
81 |
Experimenting with Alternative Path Tracing Solutions |
| SCUCA 2015: SCUCA-S1.1 |
1046 |
A Map-Based Platform for Smart Mobility Services |
| Pezaros, Dimitrios |
S5.5 |
346 |
Container-Based Network Function Virtualization for Software-Defined Networks |
| Pizzonia, Maurizio |
S4.4 |
252 |
Discovering High-Impact Routing Events Using Traceroutes |
| Pontes, Elvis |
S19.1 |
544 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs |
| Portugal, Paulo |
S27.1 |
232 |
Skip Game: An Autonomic Approach for QoS and Energy Management in IEEE 802.15.4 WSN |
| Posnakides, Demetris |
Odyssey 2015: Odyssey5G-S1.1 |
955 |
Performance Analysis of a Rate-Adaptive Bandwidth Allocation Scheme in 5G Mobile Networks |
| Pöttner, Wolf-Bastian |
S10.1 |
840 |
Opportunistic Data Aggregation in Delay Tolerant Networks |
| Prasnal, Lukasz |
S19.2 |
834 |
Selfish Attacks in IEEE 802.11aa Networks with Intra-AC Prioritization |
| Pu, Yiguo |
S23.1 |
290 |
Towards Misdirected Email Detection Based on Multi-attributes |
| Puliafito, Antonio |
DMSS 2015: DMSS-S2.1 |
22 |
Evaluating a Cloud Federation Ecosystem to Reduce Carbon Footprint by Moving Computational Resources |
| S21.3 |
388 |
An Approach to Reduce Energy Costs Through Virtual Machine Migrations in Cloud Federation |
| MoCS 2015: MoCS-S2.2 |
925 |
Costs of a Federated and Hybrid Cloud Environment Aimed at MapReduce Video Transcoding |
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Qayyum, Rehan |
S34.3 |
297 |
Performance Analysis of Data Delivery Reliability Schemes in Underwater Sensor Networks |
| Qian, Lei |
S27.4 |
701 |
A QoE-Oriented Scheduling Scheme for HTTP Streaming Service in LTE System |
| Quesado, Eder |
S1.1 |
870 |
Benchmark Applications Used in Mobile Cloud Computing: A Systematic Mapping Study |
| Qureshi, Hassaan Khaliq |
S27.2 |
130 |
Spectral Partitioning for Node Criticality |
| S34.3 |
297 |
Performance Analysis of Data Delivery Reliability Schemes in Underwater Sensor Networks |
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Rajarajan, Muttukrishnan |
S27.2 |
130 |
Spectral Partitioning for Node Criticality |
| Rajasekaran, Sanguthevar |
S34.1 |
770 |
Taking Swarms to the Field: A Framework for Underwater Mission Planning |
| Ramos, Heitor |
S20.1 |
476 |
An Intelligent Transportation System for Detection and Control of Congested Roads in Urban Centers |
| Ranjan, Anshu |
S24.3 |
632 |
Offline First Fit Scheduling in Smart Grids |
| Rathgeb, Erwin |
S33.2 |
401 |
Blind Packet Forwarding Using a Locator/Identifier Split Approach |
| Rebai, Chiheb |
S14.2 |
370 |
Digital Reconstruction Stage of Parallel FBD Sigma Delta ADC Implementation Based on Programmable Digital Oscillator in SDR Receiver |
| Refaei, Tamer |
S33.1 |
69 |
Data Authentication for NDN Using Hash Chains |
| Rekhis, Slim |
S2.4 |
797 |
Communication as a Service for Cloud VANETs |
| Ren, Zhiyuan |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Ricci, Laura |
S16.4 |
687 |
Cracker: Crumbling Large Graphs Into Connected Components |
| Rimondini, Massimo |
S4.4 |
252 |
Discovering High-Impact Routing Events Using Traceroutes |
| Rodrigues, Guilherme |
S23.3 |
142 |
A DTLS-based Security Architecture for the Internet of Things |
| S21.2 |
422 |
The Interplay Between Timeliness and Scalability in Cloud Monitoring Systems |
| Rodriguez, Jonathan |
Odyssey 2015: Odyssey5G-S1.2 |
950 |
Game-Theoretic Based Scheduling for Demand-Side Management in 5G Smart Grids |
| Rolim, Carlos |
S20.3 |
614 |
A Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications |
| Roman, Cristian |
SCUCA 2015: SCUCA-S3.2 |
1083 |
A Shim Layer for Heterogeneous Wireless Communications Scheduling in Intelligent Transport Systems |
| Rossberg, Michael |
S15.2 |
506 |
Program Partitioning Based on Static Call Graph Analysis for Privilege Separation |
| Rossetto, Anubis |
S11.4 |
93 |
A Failure Detector That Gives Information on the Degree of Confidence in the System |
| S20.3 |
614 |
A Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications |
| Rouskas, Angelos |
S4.2 |
409 |
Energy-efficient Base Station Management in Heterogeneous Networking Environments |
| Roviras, Daniel |
S14.5 |
810 |
PAPR Reduction in FBMC/OQAM Systems Using Active Constellation Extension and Tone Reservation Approaches |
| Rowe, Neil |
SFCS 2015: SFCS - S2.1 |
1124 |
Finding Contextual Clues to Malware Using a Large Corpus |
| Rui, Lanlan |
S18.2 |
194 |
Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: A Repeated Cooperative Game-theoretic Approach |
| Ruiz, Linnyer |
S31.3 |
415 |
PowerMannaSim: An Extension with Power Consumption Modeling to MannaSim, a Wireless Sensor Network Module of NS-2 |
| S6.2 |
695 |
Geo-localized Content Replication for Vehicular Ad-hoc Networks |
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| S. Oliveira, Camila H. |
S30.3 |
315 |
Virtual Broking Coding for Reliable In-Network Storage on WSANs |
| Sadok, Djamel |
S1.2 |
167 |
A Fine-Tuned Control-Theoretic Approach for Dynamic Adaptive Streaming Over HTTP |
| Saghezchi, Fatemeh |
Odyssey 2015: Odyssey5G-S1.2 |
950 |
Game-Theoretic Based Scheduling for Demand-Side Management in 5G Smart Grids |
| Saghezchi, Firooz |
Odyssey 2015: Odyssey5G-S1.2 |
950 |
Game-Theoretic Based Scheduling for Demand-Side Management in 5G Smart Grids |
| Saha, Sumanta |
S29.4 |
846 |
Beyond the Limits: Maximization of ICN Caching Capabilities with Global Detour Algorithm |
| Sahni, Sartaj |
S17.1 |
608 |
Two-Aggregator Network Topology Optimization with Splitting |
| S24.3 |
632 |
Offline First Fit Scheduling in Smart Grids |
| Saldaña Cercós, Silvia |
S12.3 |
428 |
Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks |
| Salvi, Alessandro |
SCUCA 2015: SCUCA-S1.1 |
1046 |
A Map-Based Platform for Smart Mobility Services |
| Sander Frigau, Matthias |
SCUCA 2015: SCUCA-S3.1 |
1067 |
Social-based Forwarding in Multi-channel Vehicular Networks |
| Santin, Altair |
S15.3 |
512 |
Managing Distributed UCONabc Policies with Authorization Assertions and Policy Templates |
| Santini, Stefania |
SCUCA 2015: SCUCA-S1.1 |
1046 |
A Map-Based Platform for Smart Mobility Services |
| Santos, Aldri |
S30.2 |
494 |
An Autonomic in-Network Query Processing for Urban Sensor Networks |
| Santos, Carlos Raniery |
S21.2 |
422 |
The Interplay Between Timeliness and Scalability in Cloud Monitoring Systems |
| Santos, Gléderson |
S23.3 |
142 |
A DTLS-based Security Architecture for the Internet of Things |
| Santos, Tatiana |
S20.3 |
614 |
A Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications |
| Šarafín, Peter |
PEDISWESA 2015: PEDISWESA - S3.3 |
993 |
Monitoring and Recognition of Bird Population in Protected Bird Territory |
| Sargento, Susana |
S2.1 |
752 |
Prediction-based Connection Manager for Vehicular Networks |
| S9.1 |
880 |
Towards MEF Services in a SDN Environment |
| S9.4 |
887 |
OpenFlow and Services in the Cloud: Core Network Demonstrator |
| Sarigiannidis, Antonis |
S32.3 |
893 |
A Novel Fair and Efficient Bandwidth Allocation Scheme for FiWi Networks |
| Sarigiannidis, Panagiotis |
S32.3 |
893 |
A Novel Fair and Efficient Bandwidth Allocation Scheme for FiWi Networks |
| Schaefer, Guenter |
S15.2 |
506 |
Program Partitioning Based on Static Call Graph Analysis for Privilege Separation |
| Schaeffer-Filho, Alberto |
S11.1 |
434 |
Tool Support for the Evaluation of Anomaly Traffic Classification for Network Resilience |
| S9.2 |
464 |
An EC-Based Formalism for Policy Refinement in Software-Defined Networking |
| S16.2 |
500 |
Change Data Capture in NoSQL Databases: A Functional and Performance Comparison |
| Schmidt, Felipe Mathias |
S16.2 |
500 |
Change Data Capture in NoSQL Databases: A Functional and Performance Comparison |
| Schumaker, Michelle |
S33.1 |
69 |
Data Authentication for NDN Using Hash Chains |
| Semprebom, Tiago |
S27.1 |
232 |
Skip Game: An Autonomic Approach for QoS and Energy Management in IEEE 802.15.4 WSN |
| Sens, Pierre |
S11.4 |
93 |
A Failure Detector That Gives Information on the Degree of Confidence in the System |
| Sergiou, Charalambos |
S10.3 |
829 |
Estimating Queue Formation Rate in Wireless Sensor Networks Using a Fluid Dynamic Model |
| Serrai, Walid |
PEDISWESA 2015: PEDISWESA - S1.3 |
977 |
Admission Control Based on WRR in WiMAX Networks |
| PEDISWESA 2015: PEDISWESA - S2.1 |
1022 |
Time Petri Nets for Performance Evaluation of Composite Web Services Architectures |
| Ševčík, Peter |
PEDISWESA 2015: PEDISWESA - S3.3 |
993 |
Monitoring and Recognition of Bird Population in Protected Bird Territory |
| PEDISWESA 2015: PEDISWESA - S3.4 |
1040 |
Maximizing Performance of Low-Power WSN Node on the Basis of Event-Driven-Programming Approach |
| Sha, Wenpeng |
S29.3 |
352 |
Dynamic Ring for Seamless Mobility in Identity Centric Networks |
| Shayan, Yousef |
S22.4 |
876 |
Analytical Evaluation of Outage Probability Based on Signal to Interference Ratio for Gaussian-Distributed Users |
| Shi, Jinqiao |
S23.1 |
290 |
Towards Misdirected Email Detection Based on Multi-attributes |
| Shudo, Kazuyuki |
S4.3 |
309 |
A Two-dimensional Structured Overlay Based on Flexible Routing Tables |
| Sianati, Ali |
S21.4 |
244 |
Bundling Communication Messages in Large Scale Cloud Environments |
| Silva, Anderson |
S19.1 |
544 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs |
| Silva, Bruno |
S1.1 |
870 |
Benchmark Applications Used in Mobile Cloud Computing: A Systematic Mapping Study |
| Silva, Cristiano |
S6.1 |
732 |
Design of Roadside Communication Infrastructure with QoS Guarantees |
| Silva, Fabrício |
S6.2 |
695 |
Geo-localized Content Replication for Vehicular Ad-hoc Networks |
| Silva, Francisco Airton |
S1.1 |
870 |
Benchmark Applications Used in Mobile Cloud Computing: A Systematic Mapping Study |
| Silva, João Marco |
S3.4 |
719 |
Analysing Traffic Flows Through Sampling: A Comparative Study |
| Silva, Rone |
S30.2 |
494 |
An Autonomic in-Network Query Processing for Urban Sensor Networks |
| Silva, Thais |
S31.3 |
415 |
PowerMannaSim: An Extension with Power Consumption Modeling to MannaSim, a Wireless Sensor Network Module of NS-2 |
| S6.2 |
695 |
Geo-localized Content Replication for Vehicular Ad-hoc Networks |
| Simsek, Irfan |
S33.2 |
401 |
Blind Packet Forwarding Using a Locator/Identifier Split Approach |
| Sisto, Riccardo |
S18.4 |
394 |
Formal Verification of LTE-UMTS Handover Procedures |
| Skodzik, Jan |
PEDISWESA 2015: PEDISWESA - S2.2 |
1028 |
Extensive Analysis of the Kad-based Distributed Computing System DuDE |
| Skourletopoulos, Georgios |
Odyssey 2015: Odyssey5G-S1.1 |
955 |
Performance Analysis of a Rate-Adaptive Bandwidth Allocation Scheme in 5G Mobile Networks |
| Skrastiņš, Andris |
S31.5 |
777 |
Comprehensive Analysis of AggSessAC Method for Revenue Maximization Using OMNeT++ |
| Soares, João |
S9.4 |
887 |
OpenFlow and Services in the Cloud: Core Network Demonstrator |
| Sobral, João |
S35.1 |
376 |
Towards a Faster and Accurate Supertree Inference |
| Song, Jiao |
S22.1 |
226 |
Cost Minimization for Code Offloading with Cellular Traffic Aggregation |
| Souto, Eduardo |
S24.2 |
822 |
User Activity Recognition for Energy Saving in Smart Home Environment |
| Souza, Adriano |
S20.3 |
614 |
A Novel Engine to Underlie the Data Transmission of Social Urban Sensing Applications |
| Souza, Allan |
S20.1 |
476 |
An Intelligent Transportation System for Detection and Control of Congested Roads in Urban Centers |
| Souza, Efren |
S2.2 |
758 |
On the Performance of Localization Prediction Methods for Vehicular Ad Hoc Networks |
| Squarcella, Claudio |
S7.1 |
161 |
Is It Really Worth to Peer At IXPs? A Comparative Study |
| S4.4 |
252 |
Discovering High-Impact Routing Events Using Traceroutes |
| Stais, Charilaos |
DMSS 2015: DMSS-S2.2 |
28 |
RT-SENMOS: Reliable Transport for Sensor Networks with Mobile Sinks |
| Stavrou, Stavros |
S26.2 |
854 |
Indoor Target Tracking Based on Time Difference of Arrival and Particle Filtering |
| Stihler, Maicon |
S15.3 |
512 |
Managing Distributed UCONabc Policies with Authorization Assertions and Policy Templates |
| Su, Liuyue |
PEDISWESA 2015: PEDISWESA - S2.4 |
1034 |
Unequal Error Protection for S3AC Coding Based on Expanding Window Fountain Codes |
| Su, Xin |
S33.3 |
112 |
Android Application Recommendation Approach Based on Network Traffic Measurement and Analysis |
| S19.3 |
783 |
Fest: A Feature Extraction and Selection Tool for Android Malware Detection |
| PEDISWESA 2015: PEDISWESA - S2.4 |
1034 |
Unequal Error Protection for S3AC Coding Based on Expanding Window Fountain Codes |
| Sun, Bo |
S15.4 |
205 |
AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters |
| Svärd, Petter |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Szabó, Géza |
S1.2 |
167 |
A Fine-Tuned Control-Theoretic Approach for Dynamic Adaptive Streaming Over HTTP |
| Szott, Szymon |
S19.2 |
834 |
Selfish Attacks in IEEE 802.11aa Networks with Intra-AC Prioritization |
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Tabany, Myasar |
DMSS 2015: DMSS-S1.1 |
1 |
Design and Implement Delay-Aware QoS Scheme for 3GPP LTE/LTE-A Networks for Mixed Traffic Flow |
| Tafur Monroy, Idelfonso |
S12.3 |
428 |
Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks |
| Taha, Abd-Elhamid |
DMSS 2015: DMSS-S2.3 |
34 |
Utilizing CAN-Bus and Smartphones to Enforce Safe and Responsible Driving |
| Taheri, Sayed Mostafa |
S12.1 |
602 |
Acoustic Model Parameter Estimation Using Distributed Incremental Adaptive Networks |
| S26.1 |
626 |
Cluster-Based Two-Step Target Localization with Incremental Cooperation |
| Tandjaoui, Djamel |
S30.1 |
644 |
Trust-based RPL for the Internet of Things |
| Tarkoma, Sasu |
S29.2 |
212 |
Towards Disruption Tolerant ICN |
| Tarouco, Liane |
S23.3 |
142 |
A DTLS-based Security Architecture for the Internet of Things |
| Tassiulas, Leandros |
S28.1 |
328 |
Virtual 802.11 Wireless Networks with Guaranteed Throughout Sharing |
| Thamilarasu, Geethapriya |
SFCS 2015: SFCS - S1.3 |
1146 |
Genetic Algorithm Based Intrusion Detection System for Wireless Body Area Networks |
| Timm-Giel, Andreas |
S7.4 |
656 |
QoE-based Radio Resource Allocation in LTE Femtocell Considering Transport Limitations |
| Timmermann, Dirk |
PEDISWESA 2015: PEDISWESA - S2.2 |
1028 |
Extensive Analysis of the Kad-based Distributed Computing System DuDE |
| Tohme, Samir |
S6.5 |
264 |
EDCA Virtual Collision Performance Evaluation and Mobility Modeling in V2I Communications |
| Tolba, Sherif |
S34.1 |
770 |
Taking Swarms to the Field: A Framework for Underwater Mission Planning |
| Tomás, Luis |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Trajano, Alex |
S5.4 |
258 |
Two-Phase Load Balancing of In-Memory Key-Value Storages Through NFV and SDN |
| Tran, Phuong Nga |
S7.4 |
656 |
QoE-based Radio Resource Allocation in LTE Femtocell Considering Transport Limitations |
| Trapp, Markus |
S15.2 |
506 |
Program Partitioning Based on Static Call Graph Analysis for Privilege Separation |
| Tütüncüoğlu, Hüseyin |
S7.4 |
656 |
QoE-based Radio Resource Allocation in LTE Femtocell Considering Transport Limitations |
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ueyama, Jo |
S20.4 |
662 |
Enhancing Intelligence in Intervehicle Communications to Detect and Reduce Congestion in Urban Centers |
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Valchinov, Emil |
SCUCA 2015: SCUCA-S1.2 |
1096 |
Advanced Observation and Telemetry Heart System Utilizing Wearable ECG Device and a Cloud Platform |
| Vansteenkiste-Muylle, Tim |
DMSS 2015: DMSS-S1.3 |
14 |
Benchmarking leading-edge mobile devices for data-intensive distributed mobile cloud applications |
| Varvarigos, Emmanouel |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| SCUCA 2015: SCUCA-S2.2 |
1059 |
Fair Pricing Mechanism for Coalitions in Rural Areas |
| SCUCA 2015: SCUCA-S2.3 |
1075 |
Demand Allocation in Local RES Electricity Market Among Multiple Microgrids and Multiple Utilities Through Aggregators |
| Varvarigou, Theodora |
MoCS 2015: MoCS-S2.1 |
911 |
High performance fault-tolerance for clouds |
| Vasconcelos, Israel |
S10.2 |
452 |
A Sampling Algorithm for Intermittently Connected Delay Tolerant Wireless Sensor Networks |
| Vaskovic, Mina |
Odyssey 2015: Odyssey5g-S2.1 |
968 |
Predistortion and Postdistortion of Wireless Power Amplifiers for 4G and B4G Wireless Systems |
| Vassiliou, Vasos |
S10.3 |
829 |
Estimating Queue Formation Rate in Wireless Sensor Networks Using a Fluid Dynamic Model |
| Vegas Olmos, Juan Jose |
S12.3 |
428 |
Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks |
| Velivassaki, Terpsichori-Helen |
SCUCA 2015: SCUCA-S1.3 |
1089 |
Federated Data Centers as Smart City Stabilizing Factors |
| Villari, Massimo |
DMSS 2015: DMSS-S2.1 |
22 |
Evaluating a Cloud Federation Ecosystem to Reduce Carbon Footprint by Moving Computational Resources |
| S21.3 |
388 |
An Approach to Reduce Energy Costs Through Virtual Machine Migrations in Cloud Federation |
| MoCS 2015: MoCS-S2.2 |
925 |
Costs of a Federated and Hybrid Cloud Environment Aimed at MapReduce Video Transcoding |
| MoCS 2015: MoCS-S2.3 |
937 |
Exploiting the FIWARE Cloud Platform to Develop a Remote Patient Monitoring System |
| Villas, Leandro |
S6.4 |
470 |
PResync: A Method for Preventing Resynchronization in the IEEE 802.11p Standard |
| S20.1 |
476 |
An Intelligent Transportation System for Detection and Control of Congested Roads in Urban Centers |
| S20.4 |
662 |
Enhancing Intelligence in Intervehicle Communications to Detect and Reduce Congestion in Urban Centers |
| Vitabile, Salvatore |
S35.2 |
482 |
An Ontology-Based Retrieval System for Mammographic Reports |
| Voulkidis, Artemis |
SCUCA 2015: SCUCA-S1.3 |
1089 |
Federated Data Centers as Smart City Stabilizing Factors |
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Wagner, Christoph |
S12.3 |
428 |
Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks |
| Wang, Jessie |
S16.1 |
181 |
MuLTI: Multiple Location Tags Inference for Users in Social Networks |
| Wang, Jia-Shung |
DMSS 2015: DMSS-S2.4 |
8 |
Distributed Delivery of Popular Videos over Ultra-dense Networks |
| Wang, Lin |
S17.4 |
87 |
Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service |
| Wang, Qi |
Odyssey 2015: Odyssey5G-S1.3 |
962 |
Relaying for 5G: A Novel Low-Error Relaying Protocol |
| Wang, Shie-Yuan |
S5.3 |
220 |
Optimizing the SDN Control-Plane Performance of the Openvswitch Software Switch |
| S9.3 |
650 |
Constructing an Optimal Spanning Tree Over a Hybrid Network with SDN and Legacy Switches |
| Wang, Wenjin |
S13.4 |
358 |
SKVM: Scaling In-Memory Key-Value Store on Multicore |
| Wang, Xiaochen |
PEDISWESA 2015: PEDISWESA - S2.4 |
1034 |
Unequal Error Protection for S3AC Coding Based on Expanding Window Fountain Codes |
| Wang, Xinheng |
Odyssey 2015: Odyssey5G-S1.3 |
962 |
Relaying for 5G: A Novel Low-Error Relaying Protocol |
| Wang, Yumei |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Wei, Dong |
S14.4 |
668 |
A Spectrum Efficient Polarized OFDM Scheme for Wireless Depolarized Channel |
| Wei, Fan |
S14.4 |
668 |
A Spectrum Efficient Polarized OFDM Scheme for Wireless Depolarized Channel |
| Wen, Xuejie |
S32.1 |
572 |
An ISFA-combined Pilot-Aided Channel Estimation Scheme in Multiband Orthogonal Frequency Division Multiplexing Ultra-Wideband Over Fiber System |
| White, Kyle |
S5.5 |
346 |
Container-Based Network Function Virtualization for Software-Defined Networks |
| Wickboldt, Juliano |
S11.1 |
434 |
Tool Support for the Evaluation of Anomaly Traffic Classification for Network Resilience |
| S9.2 |
464 |
An EC-Based Formalism for Policy Refinement in Software-Defined Networking |
| S1.4 |
524 |
App2net: A Platform to Transfer and Configure Applications on Programmable Virtual Networks |
| Wolf, Lars |
S10.1 |
840 |
Opportunistic Data Aggregation in Delay Tolerant Networks |
| Wolthusen, Stephen |
SFCS 2015: SFCS - S1.2 |
1116 |
Inferring Relevance and Presence of Evidence in Service-Oriented and SaaS Architectures |
| Wu, Chia-Cheng |
S9.3 |
650 |
Constructing an Optimal Spanning Tree Over a Hybrid Network with SDN and Legacy Switches |
| Wu, Jie |
S17.4 |
87 |
Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service |
| Wu, Jiqiang |
S25.1 |
155 |
CDN Bandwidth Allocation in Weakly Interconnected Networks |
| Wu, Yahui |
PEDISWESA 2015: PEDISWESA - S1.1 |
1004 |
Performace of Two-hop Routing in Delay Tolerant Networks with Selfish Nodes |
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Xia, Shutao |
S14.3 |
560 |
Construction of Structured Low Density Lattice Codes Based on Finite Fields |
| Xiang, Bin |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Xiao, Nong |
S13.2 |
790 |
NF-Dedupe: A Novel No-fingerprint Deduplication Scheme for Flash-based SSDs |
| Xiao, Yu |
S22.2 |
272 |
The Great Expectations of Smartphone Traffic Scheduling |
| Xie, Xia |
S22.1 |
226 |
Cost Minimization for Code Offloading with Cellular Traffic Aggregation |
| Xie, Xianzhong |
S14.1 |
57 |
Robust Data-Aided SNR Estimation Algorithm in High Dynamic Environment |
| Xie, Yi |
S22.3 |
589 |
Identification of Wireless Network Cards Based on Signatures of Wireless Traffic |
| Xiong, Yinglin |
S18.2 |
194 |
Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: A Repeated Cooperative Game-theoretic Approach |
| Xu, Zhiwei |
S16.3 |
284 |
CIUV: Collaborating Information Against Unreliable Views |
| Xue-song, Qiu |
S11.3 |
119 |
A Metric-Correlation-Based Fault Detection Approach Using Clustering Analysis in Wireless Sensor Networks |
| S11.2 |
175 |
A Failure Prediction Approach Based on Cloud Theory and Hidden Markov Model in Networked Computing Systems |
| S18.2 |
194 |
Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: A Repeated Cooperative Game-theoretic Approach |
| Xylomenos, George |
DMSS 2015: DMSS-S2.2 |
28 |
RT-SENMOS: Reliable Transport for Sensor Networks with Mobile Sinks |
| S5.2 |
188 |
Evaluating the Impact of Network I/O on Ultra-Low Delay Packet Switching |
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Yagi, Takeshi |
S15.4 |
205 |
AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters |
| Yamaguchi, Suguru |
S3.2 |
238 |
Benchmarking the Load Scalability of IPv6 Transition Technologies: a Black-Box Analysis |
| Yang, Cheng |
PEDISWESA 2015: PEDISWESA - S2.4 |
1034 |
Unequal Error Protection for S3AC Coding Based on Expanding Window Fountain Codes |
| Yang, Jiahai |
S16.1 |
181 |
MuLTI: Multiple Location Tags Inference for Users in Social Networks |
| Yang, Ting-Ting |
S17.2 |
583 |
An Urgency and Congestion Control Scheme for Larger-scale TCP Incast Problem in Data Center |
| Yang, Yang |
S11.3 |
119 |
A Metric-Correlation-Based Fault Detection Approach Using Clustering Analysis in Wireless Sensor Networks |
| Yao, Dezhong |
S8.2 |
149 |
Mining User Check-in Features for Location Classification in Location-based Social Networks |
| Yao, Xin |
S23.2 |
707 |
Efficient and Privacy-Preserving Search in Multi-Source Personal Health Record Clouds |
| Yayimli, Aysegul |
S5.1 |
136 |
Minimizing Signaling Cost in Green Routing for Software Defined Networks |
| Yen, Chia-Cheng |
DMSS 2015: DMSS-S2.4 |
8 |
Distributed Delivery of Popular Videos over Ultra-dense Networks |
| Yin, Yanlong |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Yla-Jaaski, Antti |
S29.2 |
212 |
Towards Disruption Tolerant ICN |
| Ylä-Jääski, Antti |
S22.2 |
272 |
The Great Expectations of Smartphone Traffic Scheduling |
| Yu, Chen |
S8.2 |
149 |
Mining User Check-in Features for Location Classification in Location-based Social Networks |
| Yuan, Zimu |
S16.3 |
284 |
CIUV: Collaborating Information Against Unreliable Views |
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Zahariadis, Theodore |
SCUCA 2015: SCUCA-S1.3 |
1089 |
Federated Data Centers as Smart City Stabilizing Factors |
| Zaicaner, Germano |
S1.1 |
870 |
Benchmark Applications Used in Mobile Cloud Computing: A Systematic Mapping Study |
| Zaiyang, Tang |
S22.1 |
226 |
Cost Minimization for Code Offloading with Cellular Traffic Aggregation |
| Žalman, Róbert |
PEDISWESA 2015: PEDISWESA - S3.1 |
999 |
Distributed Sensor Network for Vehicles with Prior Right Detection |
| Zamiri, Hossein |
S26.1 |
626 |
Cluster-Based Two-Step Target Localization with Incremental Cooperation |
| Zayani, Rafik |
S14.5 |
810 |
PAPR Reduction in FBMC/OQAM Systems Using Active Constellation Extension and Tone Reservation Approaches |
| Zervas, Evangelos |
S18.1 |
106 |
Epidemic Dissemination Controlled by Wireless Channel Awareness |
| Zhang, Dafang |
S33.3 |
112 |
Android Application Recommendation Approach Based on Network Traffic Measurement and Analysis |
| S19.3 |
783 |
Fest: A Feature Extraction and Selection Tool for Android Malware Detection |
| Zhang, Fa |
S17.4 |
87 |
Multi-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service |
| Zhang, Lin |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Zhang, Meng |
S14.4 |
668 |
A Spectrum Efficient Polarized OFDM Scheme for Wireless Depolarized Channel |
| Zhang, Pan |
S18.2 |
194 |
Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: A Repeated Cooperative Game-theoretic Approach |
| Zhang, Qin |
S13.4 |
358 |
SKVM: Scaling In-Memory Key-Value Store on Multicore |
| Zhang, Weizhan |
S31.2 |
620 |
A Version-aware Computation and Storage Trade-off Strategy for Multi-version VoD Systems in the Cloud |
| Zhang, Xiaoyi |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Zhang, Yuan |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Zhao, Hui |
S31.2 |
620 |
A Version-aware Computation and Storage Trade-off Strategy for Multi-version VoD Systems in the Cloud |
| Zhao, Kai |
S19.3 |
783 |
Fest: A Feature Extraction and Selection Tool for Android Malware Detection |
| Zheng, Jingchen |
S26.3 |
75 |
An Energy-Efficient Prediction-based Algorithm for Object Tracking in Sensor Networks |
| Zheng, Qinghua |
S31.2 |
620 |
A Version-aware Computation and Storage Trade-off Strategy for Multi-version VoD Systems in the Cloud |
| Zheng, Ran |
S13.4 |
358 |
SKVM: Scaling In-Memory Key-Value Store on Multicore |
| Zheng, Weiwei |
S11.2 |
175 |
A Failure Prediction Approach Based on Cloud Theory and Hidden Markov Model in Networked Computing Systems |
| S18.2 |
194 |
Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: A Repeated Cooperative Game-theoretic Approach |
| Zhili, Wang |
S11.2 |
175 |
A Failure Prediction Approach Based on Cloud Theory and Hidden Markov Model in Networked Computing Systems |
| Zhou, Fen |
S19.1 |
544 |
Predicting Model for Identifying the Malicious Activity of Nodes in MANETs |
| Zhou, Yaqin |
S8.4 |
595 |
Differential Spread Strategy: An Incentive for Advertisement Dissemination |
| Zhou, YiPeng |
S25.1 |
155 |
CDN Bandwidth Allocation in Weakly Interconnected Networks |
| Zhou, Zhouyi |
S31.4 |
125 |
Stochastic Scheduling Model for Network Attack Emulation |
| Zhu, Konglin |
S7.3 |
199 |
Modeling and Crowdtesting Application-Based QoE in Mobile Networks |
| Zhu, Zirong |
S25.1 |
155 |
CDN Bandwidth Allocation in Weakly Interconnected Networks |