


default search action
FNC/MobiSPC 2016: Montreal, Quebec, Canada
- Elhadi M. Shakshuki:

The 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, August 15-18, 2016, Montreal, Quebec, Canada. Procedia Computer Science 94, Elsevier 2016 - Ansar-Ul-Haque Yasar

, Jamal Bentahar
:
Preface. 1-3 - Stéphane Galland, Ramiro Liscano:

Preface. 4-6 - Hossam S. Hassanein, Nadia Tawbi

:
Keynote I and Keynote II. 7 - Ichiro Satoh:

Self-Adaptively Auto-scaling for Mobile Cloud Applications. 9-16 - Gabriel Orsini, Dirk Bade, Winfried Lamersdorf:

Generic Context Adaptation for Mobile Cloud Computing Environments. 17-24 - Mehdi Boukhechba, Abdenour Bouzouane, Sébastien Gaboury, Charles Gouin-Vallerand, Sylvain Giroux, Bruno Bouchard:

Hybrid Battery-friendly Mobile Solution for Extracting Users' Visited Places. 25-32 - Konstantin Holl, Vaninha Vieira, Igor Faria

:
An Approach for Evaluating and Improving the Test Processes of Mobile Application Developments. 33-40 - Konstantin Holl, Claudia Nass

, Karina Villela, Vaninha Vieira:
Towards a Lightweight Approach for On-site Interaction Evaluation of Safety-critical Mobile Systems. 41-48 - Andraws I. Swidan, Haytham Bani Abdelghany, Ramzi R. Saifan, Zeljko Zilic:

Mobility and Direction Aware Ad-hoc on Demand Distance Vector Routing Protocol. 49-56 - Pedro E. López-de-Teruel, Félix J. García

, Óscar Cánovas:
Validating Passive Localization Methods for Occupancy Sensing Systems in Wireless Environments: A Case Study. 57-64 - Lyan Alwakeel

, Achraf Gazdar, Abdullah Alghamdi:
A Novel Interaction Technique for Transferring Files between Smartphones and Public Displays. 65-74 - Reem Al-Nanih

, Olga Ormandjieva:
Mapping HCI Principles to Design Quality of Mobile User Interfaces in Healthcare Applications. 75-82 - Yang Hu, John C. S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang:

Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices. 83-90 - C. B. Tokpo Ovengalt, Karim Djouani

, Anish Mathew Kurien, Abdelghani Chibani:
Towards a Scalable and Optimised Context Broker for Seamless Interoperability within IoT Systems. 91-96 - Rüdiger Pryss

, Philip Geiger, Marc Schickler, Johannes Schobel, Manfred Reichert:
Advanced Algorithms for Location-Based Smart Mobile Augmented Reality Applications. 97-104 - Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke:

Partitioning Application Using Graph Theory for Mobile Devices in Pervasive Computing Environments. 105-112 - Sleiman Rabah, Fatna Belqasmi

, Rabeb Mizouni
, Rachida Dssouli:
An Elastic Hybrid Sensing Platform: Architecture and Research Challenges. 113-120 - Pablo A. Pico-Valencia

, Juan Antonio Holgado Terriza
:
An Agent Middleware for Supporting Ecosystems of Heterogeneous Web Services. 121-128 - Yashar Fazili

, Alireza Nafarieh, Bill Robertson:
Multi SLA Aware Green Provisioning Mechanism for WDM Networks. 129-136 - Mayra Samaniego

, Ralph Deters
:
Management and Internet of Things. 137-143 - Emmanuel Kaku, Richard K. Lomotey, Ralph Deters

:
Using Provenance and CoAP to track Requests/Responses in IoT. 144-151 - Byunghun Song, Junho Shin, Youngmin Kwon, Jongpil Jeong

, Yongserk Kim:
On Bandwidth-efficient Handoff Scheme for PMIPv6 Networks. 152-159 - Majid Al-Ruithe, Elhadj Benkhelifa

, Khawar Hameed:
A Conceptual Framework for Designing Data Governance for Cloud Computing. 160-167 - Haroon Malik, Elhadi M. Shakshuki

:
Mining Collective Opinions for Comparison of Mobile Apps. 168-175 - Afaf Mousa, Jamal Bentahar

:
An Efficient QoS-aware Web Services Selection Using Social Spider Algorithm. 176-182 - Mohammad Tawalbeh, Alan Eardley, Lo'ai Tawalbeh

:
Studying the Energy Consumption in Mobile Devices. 183-189 - Yonis Gulzar

, Ali Amer Alwan
, Norsaremah Salleh
, Imad Fakhri Al Shaikhli, Syed Idrees Mairaj Alvi:
A Framework for Evaluating Skyline Queries over Incomplete Data. 191-198 - Choukri Djellali, Mehdi Adda

:
A New Categorization Numerical Scheme for Mobile Robotic Computing Using Odor Data-set Recognition as a Case. 199-206 - Mohammed M. Alqahtani, Anthony S. Atkins:

A Mobile Enterprise Solution for a Communication Portal: A Case Study in Front Desk Outsourcing Company. 207-214 - Vishal Krishna Singh

, Saurabh Verma, Manish Kumar
:
Privacy Preserving In-network Aggregation in Wireless Sensor Networks. 216-223 - Björn A. Johnsson

, Gunnar Weibull:
End-User Composition of Graphical User Interfaces for PalCom Systems. 224-231 - Tarik Ghalut, Hadi Larijani, Alireza Shahrabi

:
QoE-aware Optimization of Video Stream Downlink Scheduling Over LTE Networks Using RNNs and Genetic Algorithm. 232-239 - Jen-Fa Huang, Kai-Sheng Chen

, Ting-Ju Su:
Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks. 240-247 - Mrim Alnfiai

, Srinivas Sampalli:
SingleTapBraille: Developing a Text Entry Method Based on Braille Patterns Using a Single Tap. 248-255 - Darshil Rami, Saja Al-Mamoori, Arunita Jaekel:

Energy Aware Scheduling and Routing of Periodic Lightpath Demands in Optical Grid Networks. 256-263 - Alaa Eddien Abdallah

:
Smart Partial Flooding Routing Algorithms for 3D Ad Hoc Networks. 264-271 - Mourad Ouadou, Ouadoudi Zytoune

, Driss Aboutajdine, Yassin El Hillali, Atika Menhaj-Rivenq:
Improved Cluster-tree Topology Adapted for Indoor environement in Zigbee Sensor Network. 272-279 - Fábio de Oliveira Torres, Diego Lisboa Cardoso

, Luiz Felipe Coelho e Silva:
Interference Mitigation in Next Generation Networks Using Clustering and Intelligence Techniques. 280-287 - Emmanuel M. Migabo, Karim Djouani

, Thomas O. Olwal
, Anish Mathew Kurien:
A Survey on Energy Efficient Network Coding for Multi-hop Routing in Wireless Sensor Networks. 288-294 - Emad E. Abdallah

, Ebaa Fayyoumi
:
Assistive Technology for Deaf People Based on Android Platform. 295-301 - Mahmoud Khasawneh

, Anjali Agarwal:
A Collaborative Approach towards Securing Spectrum Sensing in Cognitive Radio Networks. 302-309 - Alireza Nafarieh, Yashar Fazili

, Mohammad Raza, William Robertson:
Greenness Link State Advertisement Extension for WDM Networks. 310-317 - Muhammad H. Raza, Vellanki Pavan Kumar, Ali Nafarieh, William Robertson:

An Analysis of the Effects of Network Implementation Choices on Healthcare Applications. 318-323 - Haroon Malik, Elhadi M. Shakshuki

:
Performance Evaluation of Techniques to Detect Discontinuity in Large-scale-systems. 324-331 - Muhammad Usman

, Luk Knapen
, Ansar-Ul-Haque Yasar
, Yves Vanrompay, Tom Bellemans
, Davy Janssens
, Geert Wets
:
A coordinated Framework for Optimized Charging of EV Fleet in Smart Grid. 332-339 - Luemba A. Mpiana, Karim Djouani

, Yskandar Hamam:
Optimized Spectrum Selection through Instantaneous Channels Characteristics Evaluation in Cognitive Radio. 341-346 - Amr Ergawy, Boris Magnusson:

Synchronizing Device Discovery on Loss of Update Messages in the Pervasive Middleware Palcom. 347-352 - Abedalmotaleb Zadin, Thomas Fevens, Taoufik Bdiri:

Impact of Varying Node Velocity and HELLO Interval Duration on Position-based Stable Routing in Mobile Ad Hoc Networks. 353-358 - Mingchu Li

, Junlong Wang, Kun Lu, Cheng Guo, Xing Tan:
A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks. 360-365 - Kun Lu, Junlong Wang, Ling Xie, Qilong Zhen, Mingchu Li

:
An EigenTrust-based Hybrid Trust Model in P2P File Sharing Networks. 366-371 - Kulanda Duysebekova, Vasily Serbin, Abu Kuandykov

, Turar Duysebekov, Madina Alimanova
, Sayatbek Orazbekov, Dinara Kozhamzharova
, Laura Alimzhanova
:
The Solution of Semi-empirical Equation of Turbulent Diffusion in Problems of Polluting Impurity Transfer by Gauss Approach. 372-379 - Qian Gao, Xiangjun Dong:

A Context-awareness Based Dynamic Personalized Hierarchical Ontology Modeling Approach. 380-385 - Yongho Kim, Eric T. Matson:

A Realistic Decision Making for Task Allocation in Heterogeneous Multi-agent Systems. 386-391 - Victor Raskin, Julia Taylor Rayz:

Towards a Semantic Theory of Robotic Non-cooperation. 392-397 - Hyeonjun Park, Bumjoo Lee, Dong Han Kim

:
Violin Musical Tone Analysis Using Robot Finger. 398-403 - Mauricio Gomez, Yongho Kim, James Goppert, Eric T. Matson:

Using Online Model Checking Technique for Survivability, Evaluating Different Scenarios on Runtime. 404-409 - Ahmed S. Hassan, Ahmed A. Morgan

, M. Watheq El-Kharashi:
An Enhanced Network-on-chip Simulation for Cluster-based Routing. 410-417 - Marwah Hemdi, Ralph Deters

:
Data Management in Mobile Enterprise Applications. 418-423 - Jabril Abdelaziz, Mehdi Adda

, Hamid Mcheick
:
Toward Service Aggregation for Edge Computing. 424-428 - Lynda Sellami

, Djilali Idoughi, Abderrahmane Baadache, Pierre F. Tiako:
A Novel Detection Intrusion Approach for Ubiquitous and Pervasive Environments. 429-434 - Sandeep Mehmi, Harsh Kumar Verma, Amrit Lal Sangal

:
Comparative Analysis of Cloudlet Completion Time in Time and Space Shared Allocation Policies During Attack on Smart Grid Cloud. 435-440 - Shafiq ur Réhman, Muhammad Umair Khan

:
A Reliable and Secure Virtualized Clinical Assistance Tool for Doctors and Patients. 441-446 - Shafiq ur Réhman, Muhammad Umair Khan

:
Security and Reliability Requirements for a Virtual Classroom. 447-452 - Devanshu Trivedi, Pavol Zavarsky, Sergey Butakov:

Enhancing Relational Database Security by Metadata Segregation. 453-458 - Parul Khanna, Pavol Zavarsky, Dale Lindskog:

Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks. 459-464 - Monika, Pavol Zavarsky, Dale Lindskog:

Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization. 465-472 - T. A. Abdulrahman, O. H. Isiwekpeni, N. T. Surajudeen-Bakinde, Abdulrahaman Okino Otuoze

:
Design, Specification and Implementation of a Distributed Home Automation System. 473-478 - Elhadj Benkhelifa

, Thomas Welsh
, Lo'ai Tawalbeh
, Yaser Jararweh
, Mahmoud Al-Ayyoub:
Leveraging Software-Defined-Networking for Energy Optimisation in Mobile-Cloud-Computing. 479-484 - Nabeel Khan

, Adil Al-Yasiri:
Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework. 485-490 - Anton Gulenko, Marcel Wallschläger

, Florian Schmidt, Odej Kao, Feng Liu:
A System Architecture for Real-time Anomaly Detection in Large-scale NFV Systems. 491-496 - Marc Koerner, Odej Kao:

MAC Based Dynamic VLAN Tagging with OpenFlow for WLAN Access Networks. 497-501 - A. B. Zurin Zuraida, S. D. Syed Fairuz, S. Risby M. S.:

Conceptual Design of Wireless DAQ System for Vehicle Blast Testing. 502-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














