


default search action
2nd ISNCC 2015: Yasmine Hammamet, Tunisia
- International Symposium on Networks, Computers and Communications, ISNCC 2015, Yasmine Hammamet, Tunisia, May 13-15, 2015. IEEE 2015, ISBN 978-1-4673-7468-2
- Mohammed Alawairdhi:
Static analysis based business logic modelling from legacy system code: Business process model notation (BPMN) extraction using abstract syntax tree (AST). 1-6 - Tobias Rauter, Andrea Höller, Nermin Kajtazovic, Christian Kreiner
:
Towards an automated generation of application confinement policies with binary analysis. 1-6 - Enan A. Khalil
, Suat Özdemir
:
CDS based reliable topology control in WSNs. 1-5 - Sami Mnasri, Adel Thaljaoui, Nejah Nasri, Thierry Val
:
A genetic algorithm-based approach to optimize the coverage and the localization in the wireless audio-sensors networks. 1-6 - Ben Ncira Amel, Rim Bouhouch, Jouani Houda, Salem Hasnaoui, Khaled Jelassi:
Data distribution service on top of Ethernet networks. 1-5 - Ibrahim Yonis Omar, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri:
G-Cloud on Openstack: Adressing access control and regulation requirements. 1-6 - Chourouk Hammami, Achraf Gazdar, Imen Jemili, Abdelfettah Belghith
:
Study of VOD streaming on BitTorrent. 1-6 - Fatma Rhimi, Saloua Ben Yahia, Samir Ben Ahmed
:
Efficient Skyline computation for optimal service composition with fuzzy preference relationships. 1-6 - Majdi Ghannoudi, Walid Chainbi
:
Formal verification for Web service composition: A model-checking approach. 1-6 - Gabriela Mogos
:
Software implementation of Bechmann-Pasquinucci and Peres protocol for qutrits. 1-5 - Sondès Khemiri-Kallel:
4G traffic offloading through wireless network based on next generation hotspots (NGH). 1-6 - Takoua Ghariani, Badii Jouaber:
Energy consumption evaluation for LTE scheduling algorithms. 1-5 - Mumtaz Ahmad:
Collaborative distributed editing (Real number based indexation). 1-6 - Olfa Hammas, Saloua Ben Yahia, Samir Ben Ahmed
:
Adaptive web service composition insuring global QoS optimization. 1-6 - Mohamed Nidhal Mejri, Mohamed Hamdi:
Recent advances in cryptographic solutions for vehicular networks. 1-7 - Soufiene Djahel
, Nafaâ Jabeur
, Robert Barrett, John Murphy:
Toward V2I communication technology-based solution for reducing road traffic congestion in smart cities. 1-6 - Sirikarn Pukkawanna, Youki Kadobayashi, Suguru Yamaguchi:
Network-based mimicry anomaly detection using divergence measures. 1-7 - Aymen Ben Zineb, Mohamed Ayadi, Sami Tabbane:
Cognitive radio networks management using an ANFIS approach with QoS/QoE mapping scheme. 1-6 - M. Fahim Ferdous Khan, Ken Sakamura:
Fine-grained access control to medical records in digital healthcare enterprises. 1-6 - Hatem Ibn-Khedher, Emad Abd-Elrahman
, Hossam Afifi, Jacky Forestier:
Network issues in virtual machine migration. 1-6 - Wojciech Kabacinski
, Janusz Kleban, Marek Michalski
, Mariusz Zal
:
Strict-sense nonblocking networks with three multiplexing and switching levels. 1-6 - Sogand Shirinbab, Lars Lundberg:
Performance implications of over-allocation of virtual CPUs. 1-6 - Audace Manirabona, Saadi Boudjit, Lamia Chaari Fourati
:
Energy aware routing protocol for inter WBANs cooperative Communication. 1-6 - Mahammad A. Safwat:
Dynamic spectrum access with traffic prioritization in Cognitive Radio networks. 1-6 - Azeddien M. Sllame
, Abdelrahem Raey, Basher Mohamed, Abdelhafed Alagel:
Performance comparison of VoIP over wireless ad hoc networks using different routing protocols and queuing techniques. 1-6 - Marek Michalski
, Tytus Sielach:
The analysis of time reaction in OpenFlow switches in NetFPGA cards and ROFL. 1-5 - Moufida Bouslama, Moubarek Traii, Ali Gharsallah, Tayeb A. Denidni:
Reconfigurable new unit-cell frequency selective surface for beam switching applications. 1-4 - Mouna Abdelmoumen, Mounir Frikha, Tijani Chahed:
Performance of Delay Tolerant Mobile Networks and its improvement using mobile relay nodes under buffer constraint. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.