default search action
2nd BCFIC 2012: Vilnius, Lithuania
- 2nd Baltic Congress on Future Internet Communications, BCFIC 2012, Vilnius, Lithuania, April 25-27, 2012. IEEE 2012, ISBN 978-1-4673-1672-9
- Konstantin Mikhaylov, Jouni Tervonen, Joni Heikkilä, Janne Kansakoski:
Wireless Sensor Networks in industrial environment: Real-life evaluation results. 1-7 - Claudio Salvadori, Matteo Petracca, Riccardo Pelliccia, Marco Ghibaudi, Paolo Pagano:
Video streaming in wireless sensor networks with low-complexity change detection enforcement. 8-13 - Philipp Schleiss, Nikolaj Torring, Søren Aagaard Mikkelsen, Rune Hylsberg Jacobsen:
Interconnecting IPv6 wireless sensors with an Android smartphone in the Future Internet. 14-18 - Ivan Ganchev, Zhanlin Ji, Mairtin O'Droma:
A realization of cognitive pilot channels through wireless billboard channel infrastructure for cognitive radio. 19-25 - Janis Jansons, Ernests Petersons, Nikolajs Bogdanovs:
Vehicle-to-infrastructure communication based on 802.11n wireless local area network technology. 26-31 - Maryam Amiri Nezhad, Boris Bellalta, Manel Guerrero Zapata, Llorenç Cerdà-Alabern:
Should next generation wireless mesh networks consider dynamic channel access? 32-39 - Michal Kucharzak, Jacek Kibilda, Marcin Filo, Radoslaw Piesiewicz:
The 802.11g relaying MAC that saves energy. 40-45 - Yaakov Kogan, Percy Tarapore:
MTBO - a metric for assessing production failure rates in telecommunications networks. 46-51 - Vjaceslavs Bobrovs, Aleksejs Udalcovs, Ilja Trifonovs:
Investigation of maximum distance reach for spectrally efficient combined WDM systems. 52-55 - Janusz Klink, Maria Jolanta Podolska, Tadeus Uhl:
Regulatory framework and technical aspects of broadband access to the Internet in Europe. 56-63 - Vjaceslavs Bobrovs, Sandis Spolitis, Girts Ivanovs:
Comparison of chromatic dispersion compensation techniques for WDM-PON solution. 64-67 - Yanuarius Teofilus Larosa, Jiann-Liang Chen, Yi-Wei Ma, Sy-Yen Kuo:
Socio-organism inspired model forming multi-level computational scheme for integrated IoT service architecture. 68-71 - Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo:
Enabling secure multitenancy in cloud computing: Challenges and approaches. 72-79 - Rytis Rainys, Algimantas Kajackas:
Measures to the supervision system of the regional Internet. 80-83 - Pedro Martinez-Julia, Antonio F. Skarmeta:
Using a gateway overlay network to achieve secure and scalable network interconnection. 84-91 - Pedro Vale Pinheiro, Fernando Boavida:
Some results on network mobility stress testing. 92-99 - Eimantas Garsva, Nerijus Paulauskas, Gediminas Grazulevicius, Lech Gulbinovic:
Academic computer network traffic statistical analysis. 100-105 - Konstantinos Tatas, Chrysostomos Chrysostomou:
A novel fuzzy logic based bufferless routing algorithm for low-power NoCs. 106-112 - Ka Lok Man, T. O. Ting, Tomas Krilavicius, Kaiyu Wan, C. Chen, J. Chang, Sheung-Hung Poon:
Towards a hybrid approach to SoC estimation for a smart Battery Management System (BMS) and battery supported Cyber-Physical Systems (CPS). 113-116 - Mouna Karmani, Chiraz Khedhiri, Ka Lok Man, Tomas Krilavicius, Belgacem Hamdi, Amir-Mohammad Rahmani:
A self-test and self-repair approach for analog integrated circuits. 117-120 - Matteo Petracca, Marco Ghibaudi, Riccardo Pelliccia, Paolo Pagano:
Perceptual voice communications in IEEE802.15.4 networks for the emergency management support. 121-126 - Amandeep Dhir, Puneet Kaur, Nobert Jere, Ibrahim A. Albidewi:
Understanding mobile phone battery - Human interaction for developing world A perspective of feature phone users in Africa. 127-134 - Alexander N. Dudin, Sergey A. Dudin, Olga S. Dudina:
Tandem queueing system MAP|M|N|K - N → |M|R|∞ with impatient customers as a model of remote technical support. 134-139 - Annalisa Socievole, Salvatore Marano:
Exploring user sociocentric and egocentric behaviors in online and detected social networks. 140-147 - João Henriques, Vitor Bernardo, Paulo Simões, Marília Curado:
VoIP performance over mobile WiMAX: An urban deployment analysis. 148-155 - Damian Bulira, Krzysztof Walkowiak:
Voice and video streaming in wireless computer networks - evaluation of network delays. 156-161 - Enrica Zola, Francisco Barceló-Arroyo:
Probability of handoff to neighbor cells for random waypoint mobility and non-ideal conditions. 162-169 - Ilie Finis, Valentin Popa, Alexandru Lavric, Adrian-Ioan Petrariu, C. Males:
An analytical determination of the reading volume for an HF RFID antenna. 170-173 - Yutaka Katsuyama, Tsubasa Kanamori, Katsunori Kawanishi, Takahiro Kusuda, Osanori Koyama:
Web-based refractive index monitoring system for biological solution, employing LPG-FBG hybrid optical sensors. 174-181 - Anindya Maiti, S. Sivanesan:
Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems. 182-186 - Manfred Sneps-Sneppe, Dmitry Namiot:
About M2M standards and their possible extensions. 187-193 - Kirill Yudenok, Kirill Krinkin, Ekaterina Dashkova, Yevgeni Koucheryavy, Sergey I. Balandin:
Porting smart-M3 platform to MeeGo operation system. 194-198 - Dmitry Namiot, Manfred Sneps-Sneppe:
Proximity as a service. 199-205 - Jigeon Lee, Zhiliang Wang, Xia Yin, Xingang Shi, Dan Wu, Suogang Li:
Least frequency-delay-product caching replacement for distributed mapping systems in the core-edge network separation architecture. 206-213 - Jiann-Liang Chen, Yanuarius Teofilus Larosa, Pei-Jia Yang:
Optimal QoS load balancing mechanism for virtual machines scheduling in eucalyptus cloud computing platform. 214-221 - Mohammad Rajiullah, Anna Brunström:
Optimizing PR-SCTP performance using NR-SACKs. 222-229 - P. J. Pramod, Mohit Malhotra, Ankith Agarwal, D. S. R. Praveen Varma, B. C. Jinaga, D. K. Jain:
SoIP: An all-IP heterogeneous testbed for SIP-based multimedia services. 230-238 - Vitor Guerra Rolla, Marília Curado:
Time message system for delay tolerant networks. 239-245 - Alexander N. Dudin, Valentina I. Klimenok:
A Retrial BMAP/PH/N queueing system with Markov modulated retrials. 246-251 - Michael Kohnen:
Analysis and optimization of routing trust values in a Kademlia-based Distributed Hash Table in a malicious environment. 252-259 - Michal Kucharzak, Krzysztof Walkowiak:
Maximum flow trees in overlay multicast: Modeling and optimization. 260-267 - Adam Smutnicki, Krzysztof Walkowiak:
p-cycle based multicast protection - A new ILP formulation. 268-274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.