default search action
NTMS 2015: Paris, France
- Mohamad Badra, Azzedine Boukerche, Pascal Urien:
7th International Conference on New Technologies, Mobility and Security, NTMS 2015, Paris, France, July 27-29, 2015. IEEE 2015, ISBN 978-1-4799-8784-9 - Fariborz Entezami, Christos Politis:
3DPBARP: A three dimensions position based adaptive real-time routing protocol for wireless sensor networks. 1-5 - Randika Upathilake, Yingkun Li, Ashraf Matrawy:
A classification of web browser fingerprinting techniques. 1-5 - Omessaad Hamdi, Maïssa Mbaye, Francine Krief:
A cloud-based architecture for network attack signature learning. 1-5 - Ke Ke, Yixi Xie, Yongjie Liu, Chao Hua:
A cognitive two-way relay transmission scheme based on adaptive QAM and wireless network coding. 1-4 - Riccardo Pecori:
A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems. 1-5 - Israel L. C. Vasconcelos, David H. S. Lima, Carlos Mauricio S. Figueiredo, André L. L. de Aquino:
A coverage algorithm for intermittently connected delay tolerant wireless sensor networks. 1-5 - Hitoshi Nakao, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie:
A database driven data channel selection scheme for V2V communication over TV white space. 1-5 - Yuma Moroi, Kazumasa Takami:
A method of securing priority-use routes for emergency vehicles using inter-vehicle and vehicle-road communication. 1-5 - Dragos Ioan Sacaleanu, Lucian Andrei Perisoara, Rodica Stoian, Vasile Lazarescu:
A new energy saving framework for long lasting wireless sensor nodes. 1-5 - Mohamad Badra, Elyes Ben Hamida:
A novel cryptography based privacy preserving solution for urban mobility and traffic control. 1-5 - Sana Tmar-Ben Hamida, Beena Ahmed:
A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis. 1-2 - Claudio Correa, Jo Ueyama, Rodolfo Ipolito Meneguette, Leandro A. Villas, Geraldo P. R. Filho:
Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings. 1-5 - Siddhartha Asthana, Pushpendra Singh, Shraddha Jain:
Adaptive framework for data transmission over GSM voice channel for developing regions. 1-5 - Karel Heurtefeux, Nasreen Mohsin, Hamid Menouar:
An hybrid platform for remote health monitoring: From concept to deployment. 1-2 - Dhouha Ayed, Marie-Noëlle Lepareux, Cyrille Martins:
Analysis of XACML policies with ASP. 1-5 - Cong Sun, Yi-hua Zhu, Liyong Yuan, Kaikai Chi:
Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks. 1-7 - Oriol Pinol Pinol, Shahid Raza, Joakim Eriksson, Thiemo Voigt:
BSD-based elliptic curve cryptography for the open Internet of Things. 1-5 - Mohamed A. Aboul Hassan, Mohamad Yassin, Samer Lahoud, Marc Ibrahim, Dany Mezher, Bernard Cousin, Essam A. Sourour:
Classification and comparative analysis of inter-cell interference coordination techniques in LTE networks. 1-6 - Diulie J. Freitas, Tiago B. Marcondes, Luis Hideo Vasconcelos Nakamura, Jo Ueyama, Pedro Henrique Gomes, Rodolfo Ipolito Meneguette:
Combining cell phones and WSNs for preventing accidents in smart-homes with disabled people. 1-5 - Martin Ussath, Feng Cheng, Christoph Meinel:
Concept for a security investigation framework. 1-5 - Michael Strasser, Sahin Albayrak:
Conceptual architecture for self-discovering in fragmented service systems. 1-5 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar, Christophe Ponchel, Laura Rodriguez Martin:
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs). 1-6 - Xavier Pons Masbernat, Christophe Gruet, Eric Georgeaux, Lirida A. B. Naviner:
D2D broadcast communications for 4G PMR networks. 1-5 - Leandro Aparecido Villas:
Data dissemination in vehicular networks: Challenges, solutions, and future perspectives. 1-5 - Abdelhamid Mammeri, Guangqian Lu, Azzedine Boukerche:
Design of lane keeping assist system for autonomous vehicles. 1-5 - Mahmud Rasih Çelenlioglu, Mohammed Alsadi, Haci Ali Mantar:
Design, implementation and evaluation of SDN-based resource management model. 1-5 - Daishi Irie, Shinya Kurimoto, Hiroyoshi Miwa:
Detecting critical protected links to keep connectivity to servers against link failures. 1-5 - Mingchang Zhao, Abdelhamid Mammeri, Azzedine Boukerche:
Distance measurement system for smart vehicles. 1-5 - Andrej Stefanov:
Distortion analysis of underwater acoustic sensor networks. 1-4 - Medhat H. M. Elsayed, Amr Mohamed:
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation. 1-5 - Luis Hideo Vasconcelos Nakamura, Pedro Felipe do Prado, Rafael Mira De Oliveira Libardi, Luiz Henrique Nunes, Rodolfo Ipolito Meneguette, Júlio Cezar Estrella, Regina H. C. Santana, Marcos José Santana, Stephan Reiff-Marganiec:
Efficient web services selection based on QoS through a distributed parallel semantic approach. 1-5 - Yoann Foquet, Dritan Nace:
Elastic flow rerouting. 1 - Jinsong Hu, Mao Wang, Kingsley Jun Zou, Kristo Wenjie Yang, Min Hua, Jingjing Zhang:
Enhanced LTE physical downlink control channel design for machine-type communications. 1-5 - Yuichi Kumano, Shingo Ata, Nobuyuki Nakamura, Yoshihiro Nakahira, Ikuo Oka:
Enhancing immediacy of identification with multi-stage application identification. 1-2 - Erick Donato, Edmundo R. M. Madeira, Leandro A. Villas:
Impact of desynchronization problem in 1609.4/WAVE multi-channel operation. 1-5 - Nasser Al-Ostath, Fatma Selityn, Zainab Al-Roudhan, Mohammed El-Abd:
Implementation of an emergency vehicle to traffic lights communication system. 1-5 - Luan Cardoso dos Santos, Guilherme Rodrigues Bilar, Fábio Dacêncio Pereira:
Implementation of the fully homomorphic encryption scheme over integers with shorter keys. 1-5 - Tassos Dimitriou, Ebrahim A. Alrashed, Mehmet Hakan Karaata, Ali Hamdan:
Imposter detection for replication attacks in mobile sensor networks. 1-5 - João M. G. Duarte, Eduardo Cerqueira, Leandro A. Villas:
Indoor patient monitoring through Wi-Fi and mobile computing. 1-5 - Luciano Jerez Chaves, Vitor Marge Eichemberger, Islene Calciolari Garcia, Edmundo Roberto Mauro Madeira:
Integrating OpenFlow to LTE: Some issues toward software-defined mobile networks. 1-5 - Chuyen Khoa Huynh, Thanh Mai Nguyen Hoang, Won Cheol Lee:
Interference avoidance for TVWS smart metering system by optimization assignment problem. 1-5 - Miguel Colom, Bertrand Kerautret, Nicolas Limare, Pascal Monasse, Jean-Michel Morel:
IPOL: A new journal for fully reproducible research; analysis of four years development. 1-5 - Florent Calvayrac:
Kullback-Leibler divergence as an estimate of reproducibility of numerical results. 1-5 - Leila Ben Saad, Bernard Tourancheau:
Lifetime optimization of sensor-cloud systems. 1-5 - Victor Tortorello, Luis Hideo Vasconcelos Nakamura, Daniel C. Lobato, Rodolfo Ipolito Meneguette:
MASCA: MAnagement of simultaneous connectivity for applications. 1-5 - Manfred Sneps-Sneppe, Dmitry Namiot:
Metadata in SDN API for WSN. 1-5 - Allan Mariano de Souza, Roberto Sadao Yokoyama, Guilherme Maia, Antonio Alfredo Ferreira Loureiro, Leandro A. Villas:
Minimizing traffic jams in urban Centers using vehicular ad hoc networks. 1-5 - Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari:
Mining social networks for software vulnerabilities monitoring. 1-7 - Kuzman Katkalov, Kurt Stenzel, Marian Borek, Wolfgang Reif:
Modeling information flow properties with UML. 1-5 - Fatna Belqasmi, May El Barachi, José M. Alcaraz Calero, Mohamad Badra, Omar Alfandi:
NGNaaS: NGNs as cloud computing services. 1-6 - Philippe Langlois, Rafife Nheili, Christophe Denis:
Numerical reproducibility: Feasibility issues. 1-5 - Mikhail Zolotukhin, Timo Hämäläinen, Tero Kokkonen, Jarmo Siltanen:
Online detection of anomalous network flows with soft clustering. 1-5 - Hikmat Farhat, Guillaume Feuillade:
On-the-fly algorithm for the service composition problem. 1-6 - Heba Raafat Ahmed, Essam A. Sourour, Hassan M. Elkamchouchi:
Performance of joint transmission CoMP with global precoding matrix and IRC receiver for LTE-A. 1-5 - Soha Farhat, Abed Ellatif Samhat, Samer Lahoud, Bernard Cousin:
Pricing strategies in multi-operator heterogeneous wireless networks. 1-5 - Nobuyuki Teraura, Kouichi Sakurai:
Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones. 1-5 - João Paulo Just Peixoto, Daniel G. Costa:
QoE-aware multiple sinks mobility in wireless sensor networks. 1-4 - Aymen Boudguiga, Antoine Boulanger, Pascale Chiron, Witold Klaudel, Houda Labiod, Jean-Christophe Seguy:
RACE: Risk analysis for cooperative engines. 1-5 - Thomas Pfeiffenberger, Jia Lei Du, Pedro Bittencourt Arruda, Alessandro Anzaloni:
Reliable and flexible communications for power systems: Fault-tolerant multicast with SDN/OpenFlow. 1-6 - Garvita Bajaj, Pushpendra Singh:
Sahyog: A middleware for mobile collaborative applications. 1-5 - Cherif Ghazel, Leïla Azouz Saïdane:
Satisfying QoS requirements in NGN networks using an optimized resource control and management method. 1-5 - Pierpaolo Cincilla, Arnaud Kaiser, Brigitte Lonc, Houda Labiod, Remi Blancher, Christophe Jouvray, Richard Denis, Antoine Boulanger:
Security of C-ITS messages: A practical solution the ISE project demonstrator. 1-2 - Collins Mtita, Maryline Laurent, Pascal Daragon:
Serverless lightweight mutual authentication protocol for small mobile computing devices. 1-5 - Mohamed Lahby, Silki Baghla, Abderrahim Sekkaki:
Survey and comparison of MADM methods for network selection access in heterogeneous networks. 1-6 - Serhat Gezgin, Emel Uras, Emre Eroglu, Levent Altay, Serif Bahtiyar, Gürkan Gür:
System modeling and risk analysis using AADL for critical infrastructure security. 1-2 - Shaolei Chen, Chuangmu Yao, Rui Dai:
The design of a rateless channel coding scheme for deep-space communication. 1-5 - Kashif Habib, Wolfgang Leister:
Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures. 1-5 - Kevan Adlard, Tharanga Ekanayake, Ashraf Matrawy:
Towards power profiling of Android permissions. 1-5 - Sebastian Abt, Reinhard Stampp, Harald Baier:
Towards reproducible cyber-security research through complex node automation. 1-5 - Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei V. Gurtov:
Towards software defined cognitive networking. 1-5 - Riccardo Pecori:
Trust-based storage in a Kademlia network infected by Sybils. 1-5 - P. J. C. Nel, M. J. Thinus Booysen, Brink van der Merwe:
Using thermal transients at the outlet of electrical water heaters to recognise consumption patterns for heating schedule optimisation. 1-5 - Saravanan Yuvaraja, A. Stree Vithya:
UV glass sensor. 1-5 - Budoor Bawazeer, Nadine Akkari Adra, Ghadah Aldabbagh, Nikos Dimitriou:
WiFi/WhiteFi handover: Signaling and performance. 1-6 - David Selvakumar, Kaushik Nanda, Hari Babu Pasupuleti:
Wireless sensor device hardware architecture - Design and analysis for high availability. 1-5 - Mario Köppen, Masato Tsuru:
Zonal fairness in wireless infrastructure. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.