


default search action
Computers & Electrical Engineering, Volume 64
Volume 64, November 2017
- Faroudja Abid, Latifa Hamami, Faiza Badache, Houssem Derdour:
A system on chip for automatic karyotyping system. 1-14 - Hassan A. Salamy:
An effective approach to schedule time reduction on multi-core embedded systems. 15-33 - Zhiting Song, Yanming Sun
, Jiafu Wan
, Peipei Liang:
Data quality management for service-oriented manufacturing cyber-physical systems. 34-44 - Guo Sheng, Yuxin Wang, Zhihan Lv
, Houbing Song
:
Multiple-antenna systems and multiuser communications: Fundamentals and an overview of software-based modeling techniques. 45-64 - Subhas Barman
, Samiran Chattopadhyay
, Debasis Samanta, Gaurang Panchal
:
A novel secure key-exchange protocol using biometrics of the sender and receiver. 65-82 - Sanjeev Sharma
, Vimal Bhatia
, Anubha Gupta
:
Sparsity-based narrowband interference mitigation in ultra wide-band communication for 5G and beyond. 83-95 - Songyang Wu, Yong Zhang, Wei Cao:
Network security assessment using a semantic reasoning and graph based approach. 96-109 - Cataldo Basile
, Daniele Canavese
, Christian Pitscheider, Antonio Lioy
, Fulvio Valenza
:
Assessing network authorization policies via reachability analysis. 110-131 - Yixiong Feng, Zhaoxi Hong, Jin Cheng, Guangdong Tian, Huan Zhang, Jianrong Tan:
Environmental-friendly reliability allocation for product platform based on expert measurement and ICN. 132-144
- Mehdi Shadaram, Mubashir Husain Rehmani
, Vyasa Sai:
Introduction to the special section on "Architectures and Technologies for WSNs, WMNs, VANETs, and Cellular Networks". 145-147 - T. P. Rani, C. Jayakumar:
Unique identity and localization based replica node detection in hierarchical wireless sensor networks. 148-162 - Ramaswamy Pillai Vinob Chander
, Saswati Mukherjee, Susan Elias:
An applications interoperability model for heterogeneous internet of things environments. 163-172 - N. V. S. Sree Rathna Lakshmi
, S. Babu, N. Bhalaji
:
Analysis of clustered QoS routing protocol for distributed wireless sensor network. 173-181 - Apostolis Xenakis
, Fotis Foukalas, George I. Stamoulis, Ioannis Katsavounidis:
Topology control with coverage and lifetime optimization of wireless sensor networks with unequal energy distribution. 182-199 - Avinash More, Vijay T. Raisinghani
:
A node failure and battery-aware coverage protocol for wireless sensor networks. 200-219 - Mojtaba Jamshidi, Ehsan Zangeneh, Mehdi Esnaashari
, Mohammad Reza Meybodi:
A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. 220-232 - Seyed Mostafa Bozorgi
, Ali Shokouhi Rostami, Ali Asghar Rahmani Hosseinabadi
, Valentina Emilia Balas
:
A new clustering protocol for energy harvesting-wireless sensor networks. 233-247 - Maya Shelke
, Akshay Malhotra, Parikshit Mahalle
:
A packet priority intimation-based data transmission for congestion free traffic management in wireless sensor networks. 248-261 - Govind P. Gupta, Manoj Misra, Kumkum Garg:
Towards scalable and load-balanced mobile agents-based data aggregation for wireless sensor networks. 262-276 - S. S. Rajasekar, C. Palanisamy:
Optimized location-based service selection for QoS improvement in wireless networks. 277-287 - Nimisha Ghosh, Riddhiman Sett, Indrajit Banerjee
:
An efficient trajectory based routing scheme for delay-sensitive data in wireless sensor network. 288-304 - Michael Short
:
Eligible earliest deadline first: Server-based scheduling for master-slave industrial wireless networks. 305-321 - Kannan R.
, S. Solai Manohar, M. Senthil Kumaran:
Pre-channel scheduling and Priority-based reservation in medium access control for industrial wireless sensor network applications. 322-336 - S. R. Jino Ramson
, D. Jackuline Moni:
Wireless sensor networks based smart bin. 337-353 - Scott Ryan Sleep, Arek Dadej
, Ivan Lee
:
Representing arbitrary sensor observations for target tracking in wireless sensor networks. 354-364 - N. Kanthimathi, Dejey
:
Void handling using Geo-Opportunistic Routing in underwater wireless sensor networks. 365-379 - Murat Dener
:
WiSeN: A new sensor node for smart applications with wireless sensor networks. 380-394 - Zahra Niroumand, Hadi S. Aghdasi:
A geographic cross-layer routing adapted for disaster relief operations in wireless sensor networks. 395-406 - Hui Lin, Jia Hu, Li Xu, Youliang Tian, Lei Liu, Stewart Blakeway:
A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks. 407-419 - Saleem Iqbal, Abdul Hanan Abdullah, Kashif Naseer Qureshi
:
Channel quality and utilization metric for interference estimation in Wireless Mesh Networks. 420-435 - Tasneem Darwish
, Kamalrulnizam Abu Bakar
, Ahlam Hashim Mohsin:
Green geographical routing in vehicular ad hoc networks: Advances and challenges. 436-449 - Nasser Torabi, Behrouz Shahgholi Ghahfarokhi
:
Survey of medium access control schemes for inter-vehicle communications. 450-472 - Ahmed I. Saleh, Samah A. Gamel
, Khaled M. Abo-Al-Ez
:
A Reliable Routing Protocol for Vehicular Ad hoc Networks. 473-495 - Malika Sadou, Louiza Bouallouche-Medjkoune
:
Efficient message delivery in hybrid sensor and vehicular networks based on mathematical linear programming. 496-505 - Peppino Fazio
, Floriano De Rango, Mauro Tropea
, Miroslav Voznák
:
Cell Permanence Time and mobility analysis in infrastructure networks: Analytical/statistical approaches and their applications. 506-523 - Mohsen Ghadyani, Ali Shahzadi
:
Multiple random access for massive MIMO framework: A unified Compressive Sensing based approach. 524-536 - Abidulkarim K. I. Yasari
, Liza Abdul Latiff, Rudzidatul Akmam Dziyauddin, Moneer Ali Lilo
, Yazan Aljeroudi, Hayfaa Abdulzahra Atee
:
Flexible online multi-objective optimization framework for ISA100.11a standard in beacon-enabled CSMA/CA mode. 537-551 - Murugan Krishnamoorthy, Varalakshmi Perumal:
Secure and efficient hand-over authentication in WLAN using elliptic curve RSA. 552-566 - Kavitha N. S., P. Malathi:
Analysis of congestion control based on Engset loss formula-inspired queue model in wireless networks. 567-579 - M. Lavanya
, V. Natarajan:
Lightweight key agreement protocol for IoT based on IKEv2. 580-594 - K. G. Preetha, A. Unnikrishnan:
Enhanced domination set based routing in mobile ad hoc networks with reliable nodes. 595-604

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.