default search action
Annales des Télécommunications, Volume 72
Volume 72, Numbers 1-2, February 2017
- Nadjib Aitsaadi, Raouf Boutaba, Yutaka Takahashi:
Cloudification of the internet of things. 1-2 - Fadi M. Al-Turjman:
Information-centric sensor networks for cognitive IoT: an overview. 3-18 - David Perez Abreu, Karima Velasquez, Marília Curado, Edmundo Monteiro:
A resilient Internet of Things architecture for smart cities. 19-30 - Riccardo Petrolo, Roberto Morabito, Valeria Loscrì, Nathalie Mitton:
The design of the gateway for the Cloud of Things. 31-40 - Daniel Happ, Niels Karowski, Thomas Menzel, Vlado Handziski, Adam Wolisz:
Meeting IoT platform requirements with open pub/sub solutions. 41-52 - Francesco Longo, Dario Bruneo, Salvatore Distefano, Giovanni Merlino, Antonio Puliafito:
Stack4Things: a sensing-and-actuation-as-a-service framework for IoT and cloud integration. 53-70 - Nikola Dalcekovic, Srdjan Vukmirovic, Sebastijan Stoja, Nemanja Milosevic:
Enabling the IoT paradigm through multi-tenancy supported by scalable data acquisition layer. 71-78 - Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman, Haiying Shen:
Scheduling internet of things applications in cloud computing. 79-93 - Sangeetha Dhamodaran, Vaidehi Vijayakumar:
A secure cloud based Personal Health Record framework for a multi owner environment. 95-104 - Karima Velasquez, David Perez Abreu, Marília Curado, Edmundo Monteiro:
Service placement for latency reduction in the internet of things. 105-115
Volume 72, Numbers 3-4, April 2017
- Abdelouahid Derhab, Mohamed Guerroumi, Mohamed F. Younis:
Wireless and mobile sensing technologies for the future Internet. 117-118 - Fadi Al-Turjman, Mehmet Karakoc, Melih Günay:
Path planning for mobile DCs in future cities. 119-129 - Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. 131-144 - Thomas Mansfield, Bogdan V. Ghita, Marcel Adrian Ambroze:
Signals of opportunity geolocation methods for urban and indoor environments. 145-155 - Faouzi Sebbak, Farid Benhammadi:
Majority-consensus fusion approach for elderly IoT-based healthcare applications. 157-171 - Ashfaq Ahmad, Sheeraz Ahmed, Muhammad Imran, Masoom Alam, Iftikhar Azim Niaz, Nadeem Javaid:
On energy efficiency in underwater wireless sensor networks with cooperative routing. 173-188 - Zouina Doukha, Sofian Ali Ben Mussa, Kayhan Zrar Ghafoor, Iman Loumachi, Samira Moussaoui:
Load balancing aware SDMA-based beaconing approach in vehicular ad hoc networks. 189-197 - Shailendra Shukla, Rajiv Misra, Abhishek Agarwal:
Virtual coordinate system using dominating set for GPS-free adhoc networks. 199-208 - Fadi Al-Turjman, Melih Günay, Irem Kucukoglu:
The road to dynamic Future Internet via content characterization. 209-219 - Mohammed Boudali, Mustapha Réda Senouci, Mohamed Aissani, Walid-Khaled Hidouci:
Activities scheduling algorithms based on probabilistic coverage models for wireless sensor networks. 221-232
Volume 72, Numbers 5-6, June 2017
- Haider Abbas, Olaf Maennel, Saïd Assar:
Security and privacy issues in cloud computing. 233-235 - Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya:
Service resizing for quick DDoS mitigation in cloud computing environment. 237-252 - Rooh ul Amin, Irum Inayat, Basit Shahzad, Kashif Saleem, AiJun Li:
An empirical study on acceptance of secure healthcare service in Malaysia, Pakistan, and Saudi Arabia: a mobile cloud computing perspective. 253-264 - Ashfaq Hussain Farooqi, Farrukh Aslam Khan:
Securing wireless sensor networks for improved performance in cloud-based environments. 265-282 - Yunchuan Sun, Lei Wu, Shizhong Wu, Shoupeng Li, Tao Zhang, Li Zhang, Junfeng Xu, Yongping Xiong, Xuegang Cui:
Attacks and countermeasures in the internet of vehicles. 283-295 - Laisen Nie, Dingde Jiang, Zhihan Lv:
Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks. 297-305 - Faria Mehak, Rahat Masood, Muhammad Awais Shibli, Islam Elgedawy:
EACF: extensible access control framework for cloud environments. 307-323 - Nasir Raza, Imran Rashid, Fazeel Ali Awan:
Security and management framework for an organization operating in cloud environment. 325-333 - Yaser Jararweh, Mahmoud Al-Ayyoub, Lo'ai Tawalbeh, Ala Darabseh, Houbing Song:
Software-defined systems support for secure cloud computing based on data classification. 335-345 - Ayo Gbadeyan, Sergey Butakov, Shaun Aghili:
IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider. 347-357 - Yang Lu, Gang Wang, Jiguo Li, Jian Shen:
Efficient designated server identity-based encryption with conjunctive keyword search. 359-370 - Wiem Abderrahim, Zièd Choukair:
The three-dimensional model for dependability integration in cloud computing. 371-384
Volume 72, Numbers 7-8, August 2017
- Emmanuel Bertin, Markus Hofmann, Payam M. Barnaghi:
Virtualized environments, from connectivity to services. 385-386 - Rajeev Agrawal, Anand S. Bedekar, Troels E. Kolding, Vishnu Ram:
Cloud RAN challenges and solutions. 387-400 - Marat Zhanikeev:
Penalty migration as a performance signaling method in energy-efficient clouds. 401-413 - Virginia Pilloni, Luigi Atzori:
Consensus-based resource allocation among objects in the internet of things. 415-429 - Jörg Niemöller, Nina Washington:
Subjective perception scoring: psychological interpretation of network usage metrics in order to predict user satisfaction. 431-441 - Enrico Ferrera, Davide Conzon, Paolo Brizzi, Rosaria Rossini, Claudio Pastrone, Marc Jentsch, Peeter Kool, Carlos Kamienski, Djamel Sadok:
XMPP-based infrastructure for IoT network management and rapid services and applications development. 443-457 - Ibrahim Tariq Javed, Rebecca Copeland, Noël Crespi, Marc Emmelmann, Andreea Ancuta Corici, Ahmed Bouabdallah, Tuo Zhang, Saad El Jaouhari, Felix Beierle, Sebastian Göndör, Axel Küpper, Kevin Corre, Jean-Michel Crom, Frank Oberle, Ingo Friese, Ana Caldeira, Gil Dias, Nuno Santos, Ricardo Chaves, Ricardo Lopes Pereira:
Cross-domain identity and discovery framework for web calling services. 459-468 - Bindu Bharti, Ghanshyam Singh:
Analysis of capacity limits over fading environment with imperfect channel state information for cognitive radio network. 469-482 - Lan Wu, Chenglin Wen:
A new synthesis filter for filter bank systems with transmission delay. 483-490 - Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
A trust-based security environment in MANET: definition and performance evaluation. 491-498 - Modisa Mosalaosi, Thomas Joachim Odhiambo Afullo:
Channel modeling for high-speed indoor powerline communication systems: the lattice approach. 499-511
Volume 72, Numbers 9-10, October 2017
- Brij B. Gupta, Dharma P. Agrawal, Shingo Yamaguchi, Nalin Asanka Gamagedara Arachchilage, Suresh Veluru:
Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions. 513-515 - Brij B. Gupta, Tafseer Akhtar:
A survey on smart power grid: frameworks, tools, security issues, and solutions. 517-549 - Mouzna Tahir, Abid Khan, Abdul Hameed, Masoom Alam, Muhammad Khurram Khan, Farhana Jabeen:
Towards a set aggregation-based data integrity scheme for smart grids. 551-561 - Tarunpreet Bhatia, A. K. Verma:
Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing. 563-576 - Alberto Huertas Celdrán, Manuel Gil Pérez, Félix J. García Clemente, Gregorio Martínez Pérez:
Preserving patients' privacy in health scenarios through a multicontext-aware system. 577-587 - Xiaoqing Tan, Xu Zhou:
Universal half-blind quantum computation. 589-595 - Junjie Pang, Gaochao Xu, Xiaodong Fu, Kuo Zhao:
Horizon: a QoS management framework for SDN-based data center networks. 597-605 - Chundong Wang, Zhiyuan Li, Xiu-liang Mo, Hong Yang, Yi Zhao:
An android malware dynamic detection method based on service call co-occurrence matrices. 607-615 - Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Multi-user searchable encryption with a designated server. 617-629 - Xin Xie, Huiping Li, Fengping Hu, Mingye Xie, Nan Jiang, Huandong Xiong:
An improved tracking algorithm of floc based on compressed sensing and particle filter. 631-637
Volume 72, Numbers 11-12, December 2017
- Maryam Nasr-Esfahani, Behrouz Shahgholi Ghahfarokhi:
Improving spectrum efficiency in self-organized femtocells using learning automata and fractional frequency reuse. 639-651 - Patrick Tortelier, Didier Le Ruyet:
Erasure correction-based CSMA/CA. 653-660 - Seok-Hwan Park, Chang-Ick Song:
Fronthaul-aware superposition coding for noncoherent transmission in C-RAN downlink. 661-667 - Thanh-Luan Nguyen, Dinh-Thuan Do:
A new look at AF two-way relaying networks: energy harvesting architecture and impact of co-channel interference. 669-678 - Elias Yaacoub:
Femtocells in centralized systems: green operation and radio resource management techniques. 679-691 - Elisa Rojas, Joaquin Alvarez-Horcajo, Isaías Martinez-Yelmo, José M. Arco, Juan A. Carral:
GA3: scalable, distributed address assignment for dynamic data center networks. 693-702 - Zhao-Xu Yang, Guang-She Zhao, Guoqi Li, Hai-Jun Rong:
Matrix differentiation for capacity region of Gaussian multiple access channels under weighted total power constraint. 703-715 - Salah-Eddine Belouanas, Mehdi Bezahaf, Kim Loan Thai, Prométhée Spathis, Marcelo Dias de Amorim:
Leveraging node gatherings to save cellular resources. 717-730 - Asil Koç, Ibrahim Altunbas, Abbas Yongaçoglu:
Relay selection in two-way full-duplex relay networks over Nakagami-m fading channels. 731-742 - Sahar Hoteit, Stefano Secci, Marco Premoli:
Crowded spot estimator for urban cellular networks. 743-754 - Louis Philippe Sondeck, Maryline Laurent, Vincent Frey:
Discrimination rate: an attribute-centric metric to measure privacy. 755-766
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.