


default search action
SpringSim 2012: Orlando, Florida, USA
- Abdolreza Abhari:
2012 Spring Simulation Multiconference, SpringSim '12, Orlando, FL, USA - March 26 - 29, 2012, Proceedings of the 15th Communications and Networking Simulation Symposium. SCS/ACM 2012, ISBN 978-1-61839-785-0 - Touhid Ghasemi, Abdolreza Abhari:
A distributed fuzzy recommendation system. 1 - Daniel Günther, Nathan Kerr, Paul Müller:
A simulation model for evaluating the impact of communication services in a functional-block-based network protocol graph. 2 - Lev B. Sofman, Michel Grech:
Backhaul optimization for traffic aggregation. 3 - Atsuji Sekiguchi, Kuniaki Shimada, Yuji Wada, Akio Ooba, Ryouji Yoshimi, Akiko Matsumoto:
Configuration management technology using tree structures of ICT systems. 4 - Philogene A. Boampong, Luay A. Wahsheh:
Different facets of security in the cloud. 5 - Rouzbeh Behrouz, Abdolreza Abhari:
Improving set-up phase of LEACH protocol via fuzzy logic. 6 - Yulios Zavala, Jeferson Wilian de Godoy Stênico, Lee Luan Ling:
Internet traffic classification using multifractal analysis approach. 7 - Shikharesh Majumdar, Muhammad Asif, Jose Orlando Melendez, Ravishankar Kanagasundaram, David T. Lau, Biswajit Nandy, Marzia Zaman, Pradeep Srivastava, Nishith Goel:
Middleware architecture for sensor-based bridge infrastructure management. 8 - Michael T. Ferreira, Ikechukwu Azogu, Hong Liu:
Simulation of anti-relay attack schemes for RFID ETC system. 9 - Mohammed Omari, Ahmed Amine Nair:
Simulation of power-saving mechanisms to enhance the CSMA/CA protocol in wireless network. 10 - Mohammed Omari, Sarah Rezzougui, Nora Talhaoui:
Simulation of reducing re-association and reauthentication phases for low handoff latency. 11 - Ting Li, Nathanael Van Vorst, Rong Rong, Jason Liu:
Simulation studies of OpenFlow-based in-network caching strategies. 12 - Ali Elrashidi, Abdelrahman Elleithy, Majed Albogame, Khaled M. Elleithy:
Underwater wireless sensor network communication using electromagnetic waves at resonance frequency 2.4 GHz. 13 - Shalini Potham, Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
A use of matrix with GVT computation in optimistic time warp algorithm for parallel simulation. 14 - Salah Sharieh, Franya Franek, Alexander Ferworn:
Using cloud computing for medical applications. 15 - Hala ElAarag, Matt Wozniak:
Using fuzzy inference to improve TCP congestion control over wireless networks. 16 - Shahin Talaei, Abdolreza Abhari:
Which type of overlay network performs better for multimedia distribution and information sharing? 17

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.