


default search action
25th SoftCOM 2017: Split, Croatia
- Dinko Begusic, Nikola Rozic, Josko Radic, Matko Saric:

25th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2017, Split, Croatia, September 21-23, 2017. IEEE 2017, ISBN 978-953-290-078-1 - Syrine Lahmadi, Jamel Bel Hadj Tahar:

Optimization of 60 GHz MIMO antenna by adding ground stub to reduce mutual coupling for WPAN applications. 1-4 - Wassim Ben Chikha

, Slim Chaoui, Rabah Attia:
Performance of AdaBoost classifier in recognition of superposed modulations for MIMO TWRC with physical-layer network coding. 1-5 - Imen Sahnoun, Imran Shafique Ansari, Mohamed M. Abdallah

, Khalid A. Qaraqe
:
Performance analysis of adaptive modulation in underwater visible light communications. 1-6 - Hayfa Ben Thameur, Bertrand Le Gal, Nadia Khouja, Fethi Tlili, Christophe Jégo:

Low complexity ADMM-LP based decoding strategy for LDPC convolutional codes. 1-5 - Einar Broch Johnsen

, Ka I Pun
, Silvia Lizeth Tapia Tarifa:
A formal model of cloud-deployed software and its application to workflow processing. 1-6 - Martina Marjanovic

, Sanja Grubesa
, Ivana Podnar Zarko
:
Air and noise pollution monitoring in the city of Zagreb by using mobile crowdsensing. 1-5 - Adrian Sergiu Darabant, Viorica Varga, Leon Tâmbulea:

A linear approach to distributed database optimization using data reallocation. 1-6 - Hamdija Sinanovic, Sasa Mrdovic

:
Analysis of Mirai malicious software. 1-5 - Alessandro Vercelli

, Innocenzo Rainero
, Helios de Rosario
, Mathew Summers, Rainer Wieching, Georg Aumayr, Stephan Bandelow, Ludovico Ciferri, Marco Bazzani
:
My-active and healthy ageing (My-AHA): An ICT platform to detect frailty risk and propose intervention. 1-4 - Amira Zrelli

, Tahar Ezzeddine:
A novel application of temperature monitoring using an optical fiber sensor based on time offset. 1-5 - Artur Direito

, Susan Michie, Carmen E. Lefevre, Emilly I M. Collins:
Application of the behaviour change wheel framework to the development of interventions within the City4Age project. 1-6 - Nikolina Sever, Luka Humski

, Juraj Ilic, Zoran Skocir, Damir Pintar, Mihaela Vranic
:
Applying the multiclass classification methods for the classification of online social network friends. 1-6 - Wafa Njima, Iness Ahriz

, Rafik Zayani, Michel Terré, Ridha Bouallegue
:
Smart probabilistic approach with RSSI fingerprinting for indoor localization. 1-6 - Mounira Laabidi, Ridha Bouallegue

:
A smart tone reservation scheme for reducing the high PAPR of the FBMC/OQAM signal. 1-5 - Laura Nao, Pierluigi Passaro, Egidio Gioia, Matteo Petracca

:
Asymmetric multiprocessing techniques in smart devices: Application in a drone navigation system. 1-5 - András Balogh, Sándor Imre:

Simulation and analysis of concurrent BLE link layer state machines running within the same physical device. 1-8 - Darije Ramljak:

Business models and value oriented service design elements in ecosystem architecture. 1-6 - Raja Alaya, Rabah Attia:

Characterization of low voltage access network for narrowband powerline communications. 1-6 - Nicoletta Di Blas, Paolo Paolini, Giulia Plotti:

Combining IOT, open data and messaging for prevention of MCI/frailty. 1-5 - Ismael Cuadrado-Cordero

, Anne-Cécile Orgerie
, Jean-Marc Menaud:
Comparative experimental analysis of the quality-of-service and energy-efficiency of VMs and containers' consolidation for cloud applications. 1-6 - Marin Galic

, Dragan Poljak, Vicko Doric:
Comparison of free space, perfect ground and fresnel's equation models to determine electric field radiated by a base station antenna. 1-6 - Ivan Krolo

, Slavko Vujevic
, Tonci Modric
:
Computation of Carson formulas using piecewise quadratic approximation. 1-7 - Andrea Éva Molnár, Viorica Varga, Christian Sacarea

:
Conceptual graphs based modeling and querying of XML data. 1-6 - Vladimir Urosevic

, Paolo Paolini, Christos Tatsiopoulos:
Configurable interactive environment for hybrid knowledge- and data-driven geriatric risk assessment. 1-7 - Kaouther Hedhly, Mohamed Laaraiedh, Fatma Abdelkefi, Mohamed Siala:

Cooperative localization based on an evolved variational message passing algorithm. 1-5 - Asma Rebaya, Imen Amari, Kaouther Gasmi, Salem Hasnaoui:

Core number optimization based scheduler to order/map hardware/software applications. 1-6 - Hunor Sándor, Béla Genge, Piroska Haller

, Adrian-Vasile Duka
, Bogdan Crainicu:
Cross-layer anomaly detection in industrial cyber-physical systems. 1-5 - Olfa Ben Rhaiem

, Lamia Chaari Fourati
:
Delay-quality tradeoff for video streaming over MANET using network coding (DQNC). 1-6 - Takumi Harada, Hirotaka Ujikawa

, Manabu Yoshino, Noriyuki Oota, Ken-Ichi Suzuki, Akihiro Otaka:
Dynamic software updating of OLTs without service interruption. 1-5 - Emna Kalai Zaghouani, Adel Benzina

, Rabah Attia:
ECG biometrie template protection based on secure sketch scheme. 1-5 - András Gazdag, Levente Buttyán, Zsolt Szalay

:
Efficient lossless compression of CAN traffic logs. 1-6 - Haitham Y. Adarbah, Shakeel Ahmad:

Efficient route discovery using channel adaptive probabilistic broadcasting in Zigbee wireless sensor networks. 1-5 - Anna Susnjara, Dragan Poljak, Vicko Doric:

Electric field radiated by a dipole antenna above a lossy half space: Comparison of plane wave approximation with the modified image theory approach. 1-5 - Zeljko Martinovic, Martin Dadic, Roman Malaric, Zarko Martinovic:

Electromagnetic analysis of adiabatic coaxial line with applied air gap. 1-4 - Ivan Luburic, Zvonimir Peric, Silvestar Sesnic:

Electromagnetic modeling of the GPR response to the pipe system set in the concrete slab. 1-5 - Máté Horváth

, István Vajda:
Searchable symmetric encryption: Sequential scan can be practical. 1-5 - Amira Zrelli

, Tahar Ezzedine:
Enhanced architecture for SHM system based on optical sensor and WSN. 1-6 - Dani Vladislavic, Darko Huljenic, Julije Ozegovic:

Enhancing VNF's performance using DPDK driven OVS user-space forwarding. 1-5 - Matea Markie:

Evaluation of quiz using a statistical calculation in learning management system. 1-5 - Kameswar Rao Vaddina, Florian Brandner, Gérard Memmi, Pierre Jouvelot:

Experimental energy profiling of energy-critical embedded applications. 1-6 - Petra Ognjenovic:

Experimental verification of the effectiveness of learning and teaching using intelligent tutoring system in secondary school education. 1-5 - Adriana Caione, Alessandro Fiore, Luca Mainetti, Luigi Manco, Roberto Vergallo:

Exploiting an IoT local middleware for the orchestration of mobile device sensors to detect outdoor and indoor user positioning. 1-5 - Bartlomiej Siniarski

, John Murphy, Declan Delaney:
FlowVista: Low-bandwidth SDN monitoring driven by business application interaction. 1-6 - Keyvan Gharouni Saffar, Majid Khabbazian:

Gain analysis of cooperative broadcast in two-dimensional wireless networks. 1-6 - Israel A. C. Leal, Marcelo Sampaio de Alencar, Waslon Terllizzie A. Lopes

:
Genetic algorithm optimization applied to the project of MIMO systems. 1-5 - Ivan Livaja, Dejan Skvorc, Kresimir Pripuzic

:
Geospatial publish / subscribe systems for the Internet of Things. 1-8 - Biljana Risteska Stojkoska, Ivana Nizetic Kosovic, Tomislav Jagust:

How much can we trust RSSI for the IoT indoor location-based services? 1-6 - Ljiljana Seric

, Pero Bogunovic:
Human emotions classification using bag-of-words method on single electrode brain computer interface. 1-5 - Ugur Yesilyurt, Özgür Ertug:

Hybrid ML-MMSE adaptive multiuser detection based on joint channel estimation in SDMA-OFDM systems. 1-5 - Antonio Sunjerga

, Farhad Rachidi, Dragan Poljak:
On wind turbine impedance analysis via different approaches. 1-4 - Luigi Patrono, Patrizio Primiceri, Piercosimo Rametta, Ilaria Sergi, Paolo Visconti

:
An innovative approach for monitoring elderly behavior by detecting home appliance's usage. 1-7 - Luigi Patrono, Piercosimo Rametta, Ilaria Sergi, Rubén Mulero

, Aitor Almeida:
An innovative approach for elderly behavioral analysis by adopting enabling IoT technologies. 1-6 - Adriana Lipovac

, Sibila Isak-Zatega, Pamela Njemcevic:
In-service testing OFDM error floor by constellation analysis. 1-5 - Daniel Fraunholz, Simon Duque Antón

, Hans Dieter Schotten:
Introducing GAMfIS: A generic attacker model for information security. 1-6 - Sanda Dragos, Christian Sacarea

, Diana-Florina Sotropa:
Investigating educational attractors and life tracks in e-learning environments using formal concept analysis. 1-5 - Hamza Salih Erden

:
Investigation of induced CRAH bypass for air-cooled data centers using computational fluid dynamics. 1-6 - Nicola Bryant, Nikki Spencer, Annette C. King, Phil Crooks, Jude Deakin, Stuart Young:

IoT and smart city services to support independence and wellbeing of older people. 1-6 - Youssef Zid, Ridha Bouallegue

, Sonia Zaibi Ammar:
Joint channel network coding for multiple access relay channel with correlated sources. 1-4 - Tomislav Volaric, Hrvoje Ljubic:

Learner and course dashboards for intelligent learning management systems. 1-6 - Dragana Krstic

, Mihajlo C. Stefanovic, Suad Suljovic, Sinisa Minic
:
Level crossing rate of macrodiversity system with three microdiversity receivers over shadowed weibull fading channel. 1-6 - Asif Khan, Aftab Ahmad Khan, Irfan Ullah, Shahid Khattak:

Link level performance prediction of MIMO PIC receivers through QR decomposition of channel matrix. 1-5 - Fulvio Babich, Matteo Noschese, Alessandro Soranzo, Francesca Vatta

:
Low complexity rate compatible puncturing patterns design for LDPC codes. 1-5 - Kaouther Gasmi, Imen Amari, Asma Rebeya, Salem Hasnaoui:

Performance evaluation of MATLAB/Simulink models for fitting embedded multicore systems. 1-6 - Kresimir Malaric, Roman Malaric, Josip Herceg:

Measurement of temperature inside open TEM-cell with thermal camera. 1-5 - Eduard-Florentin Luchian, Adrian Taut, Iustin-Alexandru Ivanciu

, Gabriel Lazar, Virgil Dobrota
:
Mobile wireless sensor network gateway: A raspberry Pi implementation with a VPN backend to OpenStack. 1-5 - Chiara Cogerino, Giovanni Rosso, Ilaria Bosi

, Antonella Frisiello
, Marco Bazzani
:
Multi-modal input devices for active and healthy ageing. 1-5 - Maja Skiljo, Zoran Blazevic, A. Grbavac, M. Kevo, M. Marovic, K. Topic:

Multiple-folded antenna design for maximizing power transfer efficiency at 6.78 MHz. 1-4 - Sanja Grbac Babic, Tihana Galinac Grbac

:
Network analysis of evolving software-systems. 1-5 - Ryma Boussaha, Yacine Challal

, Malika Bessedik, Abdelmadjid Bouabdallah:
Towards authenticated network coding for named data networking. 1-6 - Imen Gaied, Farah Jemili

, Ouajdi Korbaa
:
Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study. 1-6 - Fulvio Babich, Francesca Vatta

:
On the error statistics of turbo decoding for hybrid concatenated codes design. 1-5 - Nouha Dahi, Noureddine Hamdi:

On outage probability of two-way relaying data transmission and energy harvesting. 1-5 - Dragan Poljak:

On radiation mechanism and modeling of dipole antenna in classical electromagnetics: A tribute to first 120 years of the pocklington integral equation. 1-5 - Aya Ayadi

, Oussama Ghorbel
, Mohammed S. BenSaleh, Abdelfateh Obeid, Mohamed Abid:
Outlier detection based on data reduction in WSNs for water pipeline. 1-6 - Souhir Faleh, Jamel Belhadj Tahar:

Optimization of a new structure patch antenna for MIMO and 5G applications. 1-5 - Chadi Abou-Rjeily

:
Performance analysis of up-link and down-link mixed RF/FSO links with multiple relays. 1-6 - Kidsanapong Puntsri

:
Pilot-aided phase noise and carriers frequency offset compensation for coherent optical UFMC PON. 1-5 - Ádám Knapp, László Pap:

Performance analysis of pulse position based chirp spread spectrum technique for multiple access. 1-5 - Marko Zec, Miljenko Mikuc:

Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs. 1-6 - Janusz Henryk Klink

, Tadeus Uhl
:
Quality-aware network dimensioning for the VoIP service. 1-6 - Ahmet Kose

, Aleksei Tepljakov
, Sergei Astapov:
Real-time localization and visualization of a sound source for virtual reality applications. 1-6 - Marin Vukovic, Damjan Katusic, Renato Soic, Mario Weber:

Rule-based system for data leak threat estimation. 1-5 - Chiara Taddia, D. Ferraretti, Mirko Pastorelli, Stefania Nanni, Gianluca Mazzini:

Secure management of an Internet voting system: A case study for land reclamation authority. 1-5 - Manel Elleuchi, Manel Boujeleben, Mohamed Abid, Mohammed S. BenSaleh:

Securing RPL-based Internet of Things applied for water pipeline monitoring. 1-7 - Peter Mandl, Pirmin Pezzei, David Veit, Erich Leitgeb

:
Selected health and law issues regarding mobile communications. 1-4 - Hugo Vaz Sampaio

, Shusaburo Motoyama:
Sensor nodes estimation for a greenhouse monitoring system using hierarchical wireless network. 1-5 - Sana Saleem, Shoab Ahmed Khan:

Slot assignment protocol for narrow band waveform for tactical MANETs. 1-6 - Zaineb Gharsallah, Monia Najjar, Vijay Janyani:

Slow light and dynamic buffer capability in two different photonic crystal waveguides. 1-5 - Milan Ramljak:

Smart home medication reminder system. 1-5 - Tomislav Jurin, Barbara Dzaja

, Tonko Kovacevic:
Steganography using local colour statistics. 1-6 - Zhijun Wu, Liang Liu, Changcan Yan, Jia Xu, Jin Lei:

The approach of SWIM data sharing based on multi-dimensional data encryption. 1-6 - Christian Sacarea

, Diana-Florina Sotropa, Diana Troanca:
Symptoms investigation by means of formal concept analysis for enhancing medical diagnoses. 1-5 - Mario Cvetkovic

, Hrvoje Dodig
, Dragan Poljak:
Temperature increase in the extracted and compound eye models. 1-6 - Fabio Angeletti

, Ioannis Chatzigiannakis
, Andrea Vitaletti
:
The role of blockchain and IoT in recruiting participants for digital clinical trials. 1-5 - Stephan Bernhart, Erich Leitgeb

, Gerhard A. Hofbauer, Ulrich Feichter:
Rising edge detection used as TOA estimator for mode S signals with multipath propagation. 1-6 - Emil Brajkovic

, Daniel Vasic:
Tree and word embedding based sentence similarity for evaluation of good answers in intelligent tutoring system. 1-5 - Georg Aumayr, Doris M. Bleier, Gerhard Chroust, Nadine Sturm:

Understanding needs and requirements of the target group: Systematic perspective on interaction between system and environment. 1-6 - David Veit, Erich Leitgeb

, Franz Teschl, Thomas Gigl:
UWB channel measurements for short range radar applications. 1-5 - Naoki Oguchi, Motoyoshi Sekiya:

Virtual data planes for easy creation and operation of end-to-end virtual networks. 1-6 - Domenico Balsamo, Geoff V. Merrett, Bahareh Zaghari

, Yang Wei
, Sarvapali D. Ramchurn
, Sebastian Stein
, Alex S. Weddell
, Steve P. Beeby
:
Wearable and autonomous computing for future smart cities: Open challenges. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














