


default search action
7th CCWC 2017: Las Vegas, NV, USA
- IEEE 7th Annual Computing and Communication Workshop and Conference, CCWC 2017, Las Vegas, NV, USA, January 9-11, 2017. IEEE 2017, ISBN 978-1-5090-4228-9

- Lina Chato, Shahab Tayeb, Shahram Latifi:

A genetic algorithm to optimize the adaptive Support Vector Regression model for forecasting the reliability of diesel engine systems. 1-7 - Long Cheng, Yiyang Li, Yani Guan:

Human activity recognition based on compressed sensing. 1-7 - Fatima Zahra Berrehili, Abdelhamid Belmekki:

Risk analysis in Internet of Things using EBIOS. 1-7 - Taif Alobaidi

, Wasfy B. Mikhael:
Two-step Feature Extraction in a Transform domain for face recognition. 1-4 - Tyrone S. Toland:

C2Cloud: A cloud computing framework. 1-7 - Jayasree Baidya, Trina Saha, Ryad Moyashir, Rajesh Palit

:
Design and implementation of a fingerprint based lock system for shared access. 1-6 - Tri Doan, Jugal Kalita:

Overcoming the challenge for text classification in the open world. 1-7 - Marci McBride, Robert Mitchell:

A zoning algorithm for dynamic cyber zone defense. 1-6 - Masaya Yoshikawa, Yusuke Nozaki:

Hierarchical power analysis attack for falsification detection cipher. 1-6 - Rohan N. Pradhan, Mohammad S. Khan

, Mais Nijim, Rajab Challoo:
Network delay modeling in Mobile Wireless Mesh Networks using Network Tomography. 1-8 - Jongouk Choi, Chi Shen, Jens Hannemann

, Siddhartha Bhattacharyya:
Real-time server overloaded monitoring algorithm using back propagation artificial neural network. 1-7 - Lav Gupta, Mohammed Samaka, Raj Jain

, Aiman Erbad
, Deval Bhamare, Chris Metz:
COLAP: A predictive framework for service function chain placement in a multi-cloud environment. 1-9 - Tousif Osman

, Shahreen Shahjahan Psyche, J. M. Shafi Ferdous, Hasan U. Zaman
:
Intelligent traffic management system for cross section of roads using computer vision. 1-7 - Mounika Kasaraneni, Mohammad S. Khan

:
NTLV algorithm: Critical path analysis in connected vehicles using network tomography. 1-5 - Mustafa Kocakulak

, Ismail Butun
:
An overview of Wireless Sensor Networks towards internet of things. 1-6 - Maha Zayoud

, Soraia Oueida
, Yehia Kotb
, Pierre AbiChar:
A probabilistic approach for threaded process learning. 1-6 - Shahab Tayeb, Shahram Latifi, Yoohwan Kim:

A survey on IoT communication and computation frameworks: An industrial perspective. 1-6 - Liqaa Alhafadhi

, Johnson A. Asumadu, Amean Al Safi
:
Total harmonics distortion reduction using adaptive, Weiner, and Kalman filters. 1-8 - Yoshihiro Nozaki, Erik F. Golen, Nirmala Shenoy:

A modular architecture for scalable inter-domain routing. 1-6 - Gasem Rashwan, Salih Kenshil, Mohamed Matin:

Analysis of PAPR hybrid reduction technique based on PTS and SLM. 1-4 - Rohin Mittal, Vaibhav Sinha:

A personalized time-bound activity Recommendation System. 1-7 - Robert W. Thomas, José M. Vidal:

Toward detecting accidents with already available passive traffic information. 1-4 - Mosad Alkhathami, Lubna K. Alazzawi, Ali M. Elkateeb:

Large scale border security systems modeling and simulation with OPNET. 1-8 - Manel Souissi, Aref Meddeb

:
Modelling of clustering with relay nodes in wireless sensor networks. 1-6 - Kenshin Terada, Kodai Ogura, Ryo Katsuma:

Efficient indoor exploration using mobile nodes by maintaining communicable region. 1-7 - Jiaxin Zhou, Jianyong Chen:

Maximum distance estimation of far-field model for underwater magnetic field communication. 1-5 - Sharang Sharma, Manind Gupta, Amit Kumar

, Meenakshi Tripathi
, Manoj Singh Gaur:
Multiple distance sensors based smart stick for visually impaired people. 1-5 - Weilian Su, Jianwen Lin, Tri T. Ha:

Global communication coverage using Cubesats. 1-7 - Qiaozhi Li, Jie Sheng, Ankur Teredesai:

Kernel based principal axis tree. 1-4 - Ahmed Alshammari, Saleh Albdran, Mohammad Matin:

The effect of channel spatial correlation on capacity and energy efficiency of massive MIMO systems. 1-5 - Ajay Nehra, Meenakshi Tripathi

, Manoj Singh Gaur:
FICUR: Employing SDN programmability to secure ARP. 1-8 - Megan Baluch, Tristan Bergstra, Mohamad El-Hajj:

Complex analysis of united states flight data using a data mining approach. 1-6 - Mohamed S. Mohamed

, Sherif Hussein
, Axel Krings:
An Enhanced Voting Algorithm for Hybrid Jamming attacks in VANET. 1-7 - Yu Kawahama, Ryo Katsuma:

High-accuracy localization via measurements of RSSIs and LED light angles for low-cost WMSNs. 1-7 - Miri Kim, Jaehoon Jung, Hyuncheol Kim, Joonki Paik

:
Person re-identification using color name descriptor-based sparse representation. 1-4 - Sultan Alotaibi, Robert Akl:

Self-adjustment downlink transmission power for femtocells in co-channel deployment in heterogeneous networks. 1-6 - Andres Munoz-Arcentales

, Wendy Yanez-Pazmino
, Washington Velasquez Vargas
:
Proposal of a communication structure model for activating reactive signaling in an emergency evacuation systems. 1-5 - Nashwa Nabil Owais, Haytham Tawfeek al Feel, Ehab Ezzat Hassanein:

A step towards the linking of the Culture Heritage in the Egyptian museums. 1-7 - Moises Levy, Jason O. Hallstrom:

A new approach to data center infrastructure monitoring and management (DCIMM). 1-6 - Satoshi Kodama

, Rei Nakagawa, Toshimitsu Tanouchi:
Proposal of the Virtualized Control system for the integrated management of multiple services. 1-5 - Dong Nguyen, Canh Nguyen, Thuan Duong-Ba, Hung Nguyen, Anh Nguyen, Tuan Tran:

Joint network coding and machine learning for error-prone wireless broadcast. 1-7 - Amean Al Safi

, Bradley J. Bazuin:
Toward digital transmitters with Amplitude Shift Keying and Quadrature Amplitude Modulators implementation examples. 1-7 - Jin Lu, Fei Dou:

Bi-subspace saliency detection. 1-7 - Peter Cope, Joseph Campbell, Thaier Hayajneh

:
An investigation of Bluetooth security vulnerabilities. 1-7 - Ravi Shankar

, Km Niharika Pandey, Aradhana Kumari, Vikash Sachan, Ritesh Kumar Mishra
:
C(0) protocol based cooperative wireless communication over Nakagami-m fading channels: PEP and SER analysis at optimal power. 1-7 - Uttara Sawant, Robert Akl:

Performance evaluation of network productivity for LTE heterogeneous networks with reward-penalty weights assessment. 1-6 - Fatma Zubaydi, Assim Sagahyroon, Fadi A. Aloul, Hasan Mir:

MobSpiro: Mobile based spirometry for detecting COPD. 1-4 - Jameela Al-Jaroodi, Brandon Hollein, Nader Mohamed:

Applying software engineering processes for big data analytics applications development. 1-7 - Saleh Albdran, Ahmed Alshammari, Mohammad Abdul Matin:

Spectral and energy efficiency for massive MIMO systems using exponential correlation model. 1-5 - Douglas Comer, Rajas H. Karandikar, Adib Rastegarnia:

DCnet: A new data center network architecture. 1-6 - Siddharth Das:

A volatility-driven stock trading framework based on automated, short-term recommendation method. 1-6 - Shahab Tayeb, Miresmaeil Mirnabibaboli, Lina Chato, Shahram Latifi:

Minimizing energy consumption of smart grid data centers using cloud computing. 1-5 - Mohammed AlMahamdy

, Jeffrey Dill:
Half-iteration early termination of turbo decoding. 1-5 - Sayuri Kohmura, Taro Togawa, Takeshi Otani:

Source separation based on transfer function between microphones and its dispersion. 1-6 - Farzana Haque, Fouzia Tamanna, Rajesh Palit

:
Generation of vital event notifications from DHIS2 for strengthening CRVS system. 1-5 - Nikyle Nguyen, Doina Bein:

Distributed MPI cluster with Docker Swarm mode. 1-7 - Xin Wang, Wenjun Wu, Zhenghui Hu:

Evaluation of software quality in the TopCoder crowdsourcing environment. 1-6 - Debashis Jana

, Ankita Chatterjee, Niladri Chakraborty, Ayoshna Saha, Arnab Kumar Saha, Allama Hossain, Sampriti Podder, Sanchari Das, Ankhi Bhattacharya:
Dynamic Economic Emission Dispatch using self-adaptive multivariate distribution based modified Real Coded Genetic Algorithm. 1-5 - Manel Souissi, Aref Meddeb

:
Design optimization of delay-constrained routing in wireless sensor networks. 1-6 - Saffet Vatansever, Ismail Butun

:
A broad overview of GPS fundamentals: Now and future. 1-6 - Talal Alharbi

, Ahamed Aljuhani, Hang Liu:
Holistic DDoS mitigation using NFV. 1-4 - Eric Watkins, Matt Kloc, Shane Weerasuriya, Mohamad El-Hajj:

Collision analysis of driving scenarios. 1-7 - Moses Amoasi Acquah, Sekyung Han, Hongjoon Kim, Soonwoo Park

, Heeje Han:
Real-Time Peak Control algorithm using Stochastic Optimization. 1-6 - Jihun Lee, Bong-Keun Jeong:

Understanding sensor data with uncertainty using a visual representation. 1-2 - Muhammad Asif Manzoor, Yasser L. Morgan:

Vehicle Make and Model classification system using bag of SIFT features. 1-5 - Ahmad Obeid, Harald Richter:

Routing in CarRing 4 - a transparent communication mean for field buses and LANs. 1-8 - Shumon Alam, Annamalai Annamalai, Cajetan M. Akujuobi:

Optimizations of cooperative spectrum sensing with reporting errors over myriad fading channels. 1-5 - Vikas S. Shah

:
Deterministic consumer applications enabled Policy Architecture of Mobile Edge Computing ecosystem. 1-7 - Romeo Ayemele Djeujo, Christoph Ruland:

Embedding cryptographically secure matrix transformation in structured Compressive Sensing. 1-7 - Thomas Nägele

, Jozef Hooman:
Co-simulation of cyber-physical systems using HLA. 1-6 - Ali Mohammed Mansoor

, Mohammed A. Al-Maqri, Aznul Qalid Md Sabri
, Hamid Abdullah Jalab, Ainuddin Wahid Abdul Wahab
, Wagdy kahtan Al-kopati:
A Feedback-based Admission Control Unit for QoS provision of video Transmission over WLANs. 1-6 - Erol Ozan:

Password-free authentication for social networks. 1-5 - Adnan Quadri, Mohsen Riahi Manesh, Naima Kaabouch:

Noise cancellation in cognitive radio systems: A performance comparison of evolutionary algorithms. 1-7 - Himadri Nath Saha, Abhilasha Mandal, Abhirup Sinha

:
Recent trends in the Internet of Things. 1-4 - Jianle Chen, Tianqi Xiao, Jie Sheng, Ankur Teredesai:

Gender prediction on a real life blog data set using LSI and KNN. 1-6 - Ernesto Zamora Ramos, Masanori Nakakuni, Evangelos A. Yfantis:

Quantitative measures to evaluate neural network weight initialization strategies. 1-7 - Asim Majeed

:
Developing countries and Internet-of-Everything (IoE). 1-4 - Lanier A. Watkins, Sean Beck, Jared Zook, Anna L. Buczak, Jeffrey S. Chavis, William H. Robinson

, Jose Andre Morales, Samuel Mishra:
Using semi-supervised machine learning to address the Big Data problem in DNS networks. 1-6 - Omar Alaql, Kambiz Ghazinour, Cheng-Chang Lu:

No-reference image quality metric based on features evaluation. 1-7 - Ankita Chatterjee, Mainak Biswas, Debasis Maji, Debashis Jana, Subhajit Brojabasi, Gautam Sarkar, Ayoshna Saha, Arnab Kumar Saha, Allama Hossain, Sampriti Podder, Sanchari Das, Ankhi Bhattacharya:

Discrete Wavelet Transform based V-I image fusion with Artificial Bee Colony Optimization. 1-4 - Guntur Dharma Putra

, Azkario Rizky Pratama
, Alexander Lazovik
, Marco Aiello
:
Comparison of energy consumption in Wi-Fi and bluetooth communication in a Smart Building. 1-6 - Ali Adib Arnab, Sadia Afrin Raka, F. M. Fahad, Hasan U. Zaman

:
A cost effective way to build a web controlled search and CO detector rover. 1-6 - Jithin Jagannath

, Daniel O'Connor, Nicholas Polosky, Brendan Sheaffer, Svetlana Foulke, Lakshmi Narasimhan Theagarajan, Pramod K. Varshney:
Design and evaluation of hierarchical hybrid automatic modulation classifier using software defined radios. 1-7 - Asim Majeed

:
Efficient edge analytics in Internet-of-Things (IoT). 1-4 - Luis Gabriel Jaimes, Kanwalinderjit Gagneja

, Mustafa Ilhan Akbas
, Idalides J. Vergara-Laurens:
Future stress, forecasting physiological signals. 1-5 - Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia:

Scalability in mobile Ad hoc networks with Brownian mobility. 1-2 - Evangelos A. Yfantis, Masanori Nakakuni, Ernesto Zamora Ramos:

Low-bandwidth transmission algorithm for reliable wireless communication. 1-5 - Ahmed Saeed, Alaa E. El-Rouby, Yehea I. Ismail, Hani F. Ragai

:
Clock signal characterization for signal integrity. 1-6 - Weilian Su, Kim Hong Tan, Ric A. Romero, Tri T. Ha:

MAC sub-layer design to reduce interference in LTE networks. 1-8 - Daisuke Horie, Ryo Katsuma:

Recognizing AR markers using optical illusion markers and a low-cost camera. 1-7 - Anh Nguyen, Quang Hoang, Hung Nguyen, Dong Nguyen, Tuan Tran:

Evaluating marijuana-related tweets on Twitter. 1-7 - Hiroki Shinba, Minoru Watanabe:

Optically reconfigurable gate array platform for mono-instruction set computer architecture. 1-4 - Farheen Fauziya, Brejesh Lall, Monika Agrawal:

Vector sensor based channel equalizer for underwater communication systems. 1-5 - Salih Kenshil, Gasem Rashwan, Mohamed Matin:

Analysis of optical OFDM based wireless LAN. 1-5 - Efe Francis Orumwense, Thomas J. Afullo, Viranjay M. Srivastava

:
On increasing the energy efficiency of cognitive radio network base stations. 1-6 - Assim Sagahyroon:

Remote patients monitoring: Challenges. 1-4 - Robert Mitchell, Andrew Fisher, Scott Watson, John Jarocki:

Linkography ontology refinement and cyber security. 1-9 - Wanlin Cui, Yeseong Kim, Tajana Simunic Rosing:

Cross-platform machine learning characterization for task allocation in IoT ecosystems. 1-7 - Joseph Santiago, Eric Cotto, Luis Gabriel Jaimes, Idalides J. Vergara-Laurens:

Fall detection system for the elderly. 1-4 - Jing Pang:

Spectrum energy based voice activity detection. 1-5 - Juho Lee, Sungkwon Park:

New interconnection methodology of TSNs using V2X communication. 1-6 - Liu Wei, Yeongkwang Park, Yongbeom Cho:

Implementation of HEVC decoder in distributed mobile embedded system. 1-5 - Natasha Madhav

, Meera K. Joseph
:
Cloud for Engineering Education: Learning networks for effective student engagement. 1-4 - Ahamed Aljuhani, Talal Alharbi

:
Virtualized Network Functions security attacks and vulnerabilities. 1-4 - Sultan Almuhammadi

, Ahmad Amro:
Double-Hashing Operation Mode for Encryption. 1-7 - Ismail Butun

:
Privacy and trust relations in Internet of Things from the user point of view. 1-5 - Hasan U. Zaman

, Chowdhury Erfan Shourov, Abdullah-Al Mahmood, Noor E. Alam Siddique:
Conversion of wasted heat energy into electrical energy using TEG. 1-5 - Ahmed S. Sajit

, Michael A. Turi:
SEU tolerance of FinFET 6T SRAM, 8T SRAM and DICE memory cells. 1-5 - Asim Majeed

:
Internet of Things (IoT): A verification framework. 1-3 - Washington Velasquez Vargas

, Andres Munoz-Arcentales
, Joaquin Salvachua Rodriguez:
A distributed system model for managing data ingestion in a wireless sensor network. 1-5 - P. Maitreyi, M. Sreenivas Rao:

Design of Binary Spray and wait protocol for intermittently connected mobile networks. 1-3 - Kyle McHugh, Walter Akpedeye, Thaier Hayajneh

:
Next generation wireless-LAN: Security issues and performance analysis. 1-7 - Michael A. Turi, José G. Delgado-Frias:

An implemented, initialization algorithm for many-dimension, Monte Carlo circuit simulations using Spice. 1-4 - Raisa Nusrat, Rajesh Palit

:
Simplified FADE with sharing feature (SFADE+): A overlay approach for cloud storage system. 1-6 - Weilian Su, Wei Gee Ng, Tri Ha:

Maximizing available diversity in a MIMO fading channel. 1-7 - Mohammad A. Qayum

, Abdel-Hameed A. Badawy, Jeanine E. Cook:
StAdHyTM: A Statically Adaptive Hybrid Transactional Memory: A scalability study on large parallel graphs. 1-7 - Hoang Nguyen, Hakduran Koc:

Input/output processing using on-chip memory for Cyber Physical System. 1-6 - K. M. Ragibul Haque, M. Abu Muyeed, Shahriar Sadat, Rajesh Palit

:
Jol-Shinchon: Design and development of a sensor based intelligent auto irrigation system. 1-5 - Ilmi Yoon, Gary Ng, Xuejing Dong, Haichuan Duan, Anu Aggarwal, Rujoota Shah, Gloria Ku:

SuperCaly: Smart life assistance by integrating a calendar app with location tracking, media organization and social connection. 1-7 - Long Cheng, Yani Guan, Kecheng Zhu, Yiyang Li:

Recognition of human activities using machine learning methods with wearable sensors. 1-7 - Jigar Jadav, Andrew M. Burke, Pratik Dhiman, Michael Kollmer, Charles C. Tappert:

Classification of Student Web Queries. 1-7 - Ziyang Zhang, Yuhong Liu, Zhigang Jin, Rui Zhang:

Selecting influential and trustworthy neighbors for collaborative filtering recommender systems. 1-7 - Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia:

Performance evaluation of VoIP calls over MANET for different voice codecs. 1-6 - Abdallah Aldosary

, Ivica Kostanic:
The impact of tree-obstructed propagation environments on the performance of wireless sensor networks. 1-7 - Youness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui:

Compressive sensing: Performance comparison of sparse recovery algorithms. 1-7 - Douglas Comer, Rajas H. Karandikar, Adib Rastegarnia:

Resilient packet delivery through software defined redundancy: An experimental study. 1-6 - Tarek Elderini

, Naima Kaabouch, Hector Reyes:
Outage probability estimation technique based on a Bayesian model for cognitive radio networks. 1-6 - Shawn Ricardo, Doina Bein, Anand Panagadan:

Low-cost, real-time obstacle avoidance for mobile robots. 1-7 - Johannes Richter

, Detlef Streitferdt
, Elena Rozova:
On the development of intelligent optical inspections. 1-6 - Sung Sik Nam, Changseok Yoon, Mohamed-Slim Alouini

:
Performance analysis of a threshold-based parallel multiple beam selection scheme for WDM-based systems for Gamma-Gamma distributions. 1-7 - Chandra N. Sekharan:

A probabilistic graphical model for learning as search. 1-4 - Eric J. Balster, Frank A. Scarpino, Andrew M. Kordik, Kerry L. Hill:

A simulator for spotlight SAR image formation. 1-5 - M. K. Chae, Abeer Alsadoon

, P. W. C. Prasad
, Amr Elchouemi:
Spam filtering email classification (SFECM) using gain and graph mining algorithm. 1-7 - James H. Jones, Tahir M. Khan

:
A method and implementation for the empirical study of deleted file persistence in digital devices and media. 1-7 - Jigar Jadav, Andrew M. Burke, Greg Goldberg, Dawn Lindelin, Andrew Preciado, Charles C. Tappert, Michael Kollmer:

Correlation discovery between high school Student Web Queries and their Grade Point Average. 1-7 - Venkatraman Balasubramanian

, Ahmed Karmouch:
An infrastructure as a Service for Mobile Ad-hoc Cloud. 1-7 - Hakduran Koc, Mehmet Ucar:

MMC-based phase partitioning for data intensive applications. 1-4 - Atheer Bassel

, Mohd Jan Nordin:
Mutation and memory mechanism for improving Glowworm Swarm Optimization algorithm. 1-7 - Xiangrong Ma, Zhao Fu, Yingtao Jiang, Mei Yang, Haroon Stephen:

On a cyberinfrastructure platform for multidisciplinary, data-intensive scientific research. 1-6 - Hengameh Bahrami, Khosrow Hajsadeghi:

Circuit design to improve security of telecommunication devices. 1-4 - James A. Jerkins:

Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. 1-5 - Matthew Beck, Wei Hao, Alina Campan:

Accelerating the Mobile cloud: Using Amazon Mobile Analytics and k-means clustering. 1-7 - Homar Baez, Idalides J. Vergara-Laurens, Luz Torres-Molina, Luis Gabriel Jaimes, Miguel A. Labrador:

A real-time flood alert system for parking lots. 1-5 - Abdulrahman Aldhaheri, Jeongkyu Lee:

Event detection on large social media using temporal analysis. 1-6 - Liqaa F. Nawaf

, Stuart M. Allen
, Omer F. Rana
:
Internet Transit Access Point placement and bandwidth allocation in Wireless Mesh Networks. 1-8 - Wei Liu, Kiyohide Nakauchi, Yozo Shoji

:
A location-aided flooding mechanism in community-based IoT networks. 1-6 - Elizabeth M. Okumu, Mqhele E. Dlodlo

:
Energy efficient transmit antenna selection for MIMO systems: A cross layer approach. 1-6 - Mohsen Riahi Manesh, Adnan Quadri, Sriram Subramaniam, Naima Kaabouch:

An optimized SNR estimation technique using particle swarm optimization algorithm. 1-6 - Dong Hyun Jeong

, Bong-Keun Jeong, Soo-Yeon Ji
:
Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions. 1-7 - Maged M. Eljazzar, Elsayed E. Hemayed:

Enhancing electric load forecasting of ARIMA and ANN using adaptive Fourier series. 1-6 - Anas Bushnag, Ausif Mahmood:

A specialized event-driven network simulator for security and anonymity applications of Wireless Sensor Networks. 1-6 - Kishore Kumar Reddy N. G., Rajeshwari K.:

Interactive clothes based on IOT using NFC and Mobile Application. 1-4 - Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:

Techniques for dealing with uncertainty in cognitive radio networks. 1-6 - Abdlmagid Basere, Ivica Kostanic:

Spatial sampling requirements for Received Signal Level measurements in cellular networks. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














