callback( { "result":{ "query":":facetid:toc:\"db/conf/fnc/fnc2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"184.40" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"92", "@dc":"92", "@oc":"92", "@id":"43395206", "text":":facetid:toc:db/conf/fnc/fnc2014.bht" } }, "hits":{ "@total":"92", "@computed":"92", "@sent":"92", "@first":"0", "hit":[{ "@score":"1", "@id":"3855372", "info":{"authors":{"author":[{"@pid":"26/9024","text":"Hanady M. Abdulsalam"},{"@pid":"52/5013","text":"Bader A. Ali"},{"@pid":"52/4423","text":"Anwar Alyatama"},{"@pid":"205/8098","text":"Eman S. AlRoumi"}]},"title":"Deploying a LEACH Data Aggregation Technique for Air Quality Monitoring in Wireless Sensor Network.","venue":"FNC/MobiSPC","pages":"499-504","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/AbdulsalamAAA14","doi":"10.1016/J.PROCS.2014.07.055","ee":"https://doi.org/10.1016/j.procs.2014.07.055","url":"https://dblp.org/rec/conf/fnc/AbdulsalamAAA14"}, "url":"URL#3855372" }, { "@score":"1", "@id":"3855373", "info":{"authors":{"author":[{"@pid":"177/6153","text":"Sherin Abraham"},{"@pid":"09/1234","text":"Xinrong Li"}]},"title":"A Cost-effective Wireless Sensor Network System for Indoor Air Quality Monitoring Applications.","venue":"FNC/MobiSPC","pages":"165-171","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/AbrahamL14","doi":"10.1016/J.PROCS.2014.07.090","ee":"https://doi.org/10.1016/j.procs.2014.07.090","url":"https://dblp.org/rec/conf/fnc/AbrahamL14"}, "url":"URL#3855373" }, { "@score":"1", "@id":"3855374", "info":{"authors":{"author":[{"@pid":"127/7228","text":"Qasem Abu Al-Haija"},{"@pid":"37/6932","text":"Mahmoud A. Smadi"},{"@pid":"205/8104","text":"Monther Al-Ja'fari"},{"@pid":"205/8135","text":"Abdullah Al-Shua'ibi"}]},"title":"Efficient FPGA Implementation of RSA Coprocessor Using Scalable Modules.","venue":"FNC/MobiSPC","pages":"647-654","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Al-HaijaSAA14","doi":"10.1016/J.PROCS.2014.07.092","ee":"https://doi.org/10.1016/j.procs.2014.07.092","url":"https://dblp.org/rec/conf/fnc/Al-HaijaSAA14"}, "url":"URL#3855374" }, { "@score":"1", "@id":"3855375", "info":{"authors":{"author":[{"@pid":"127/7228","text":"Qasem Abu Al-Haija"},{"@pid":"205/8145","text":"Mashhoor Al Tarayrah"},{"@pid":"140/9453","text":"Hasan Al-Qadeeb"},{"@pid":"140/9528","text":"Abdulmohsen Al-Lwaimi"}]},"title":"A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks.","venue":"FNC/MobiSPC","pages":"639-646","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Al-HaijaTAA14","doi":"10.1016/J.PROCS.2014.07.091","ee":"https://doi.org/10.1016/j.procs.2014.07.091","url":"https://dblp.org/rec/conf/fnc/Al-HaijaTAA14"}, "url":"URL#3855375" }, { "@score":"1", "@id":"3855376", "info":{"authors":{"author":[{"@pid":"167/1103","text":"Rasha Al-Khansa"},{"@pid":"09/3843","text":"Hassan Artail"},{"@pid":"251/5499","text":"David Manuel Gutiérrez Estévez"}]},"title":"LTE-WiFi Carrier Aggregation for Future 5G Systems: A Feasibility Study and Research Challenges.","venue":"FNC/MobiSPC","pages":"133-140","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Al-KhansaAE14","doi":"10.1016/J.PROCS.2014.07.068","ee":"https://doi.org/10.1016/j.procs.2014.07.068","url":"https://dblp.org/rec/conf/fnc/Al-KhansaAE14"}, "url":"URL#3855376" }, { "@score":"1", "@id":"3855377", "info":{"authors":{"author":[{"@pid":"132/0973","text":"Tayseer Alkhdour"},{"@pid":"71/5934","text":"Elhadi M. Shakshuki"}]},"title":"Optimal Placement of RFID Antennas for Outdoor Applications.","venue":"FNC/MobiSPC","pages":"236-241","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/AlkhdourS14","doi":"10.1016/J.PROCS.2014.07.017","ee":"https://doi.org/10.1016/j.procs.2014.07.017","url":"https://dblp.org/rec/conf/fnc/AlkhdourS14"}, "url":"URL#3855377" }, { "@score":"1", "@id":"3855378", "info":{"authors":{"author":[{"@pid":"120/0725","text":"Nariman Ammar"},{"@pid":"71/1236","text":"Zaki Malik"},{"@pid":"47/4717","text":"Abdelmounaam Rezgui"},{"@pid":"32/6754","text":"Mohammed Alodib"}]},"title":"MobiDyC: Private Mobile-based Health Data Sharing through Dynamic Context Handling.","venue":"FNC/MobiSPC","pages":"426-433","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/AmmarMRA14","doi":"10.1016/J.PROCS.2014.07.049","ee":"https://doi.org/10.1016/j.procs.2014.07.049","url":"https://dblp.org/rec/conf/fnc/AmmarMRA14"}, "url":"URL#3855378" }, { "@score":"1", "@id":"3855379", "info":{"authors":{"author":[{"@pid":"18/3590","text":"Habib M. Ammari"},{"@pid":"72/5666-1","text":"Liang Cheng 0001"}]},"title":"MobiSPC 2014 Preface.","venue":"FNC/MobiSPC","pages":"10-11","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/AmmariC14","doi":"10.1016/J.PROCS.2014.07.003","ee":"https://doi.org/10.1016/j.procs.2014.07.003","url":"https://dblp.org/rec/conf/fnc/AmmariC14"}, "url":"URL#3855379" }, { "@score":"1", "@id":"3855380", "info":{"authors":{"author":[{"@pid":"92/9795","text":"Bilal Abu Bakr"},{"@pid":"31/5242","text":"Leszek T. Lilien"}]},"title":"Comparison by Simulation of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM.","venue":"FNC/MobiSPC","pages":"180-187","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/BakrL14","doi":"10.1016/J.PROCS.2014.07.084","ee":"https://doi.org/10.1016/j.procs.2014.07.084","url":"https://dblp.org/rec/conf/fnc/BakrL14"}, "url":"URL#3855380" }, { "@score":"1", "@id":"3855381", "info":{"authors":{"author":[{"@pid":"92/9795","text":"Bilal Abu Bakr"},{"@pid":"31/5242","text":"Leszek T. Lilien"}]},"title":"Extending Lifetime of Wireless Sensor Networks by Management of Spare Nodes.","venue":"FNC/MobiSPC","pages":"493-498","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/BakrL14a","doi":"10.1016/J.PROCS.2014.07.053","ee":"https://doi.org/10.1016/j.procs.2014.07.053","url":"https://dblp.org/rec/conf/fnc/BakrL14a"}, "url":"URL#3855381" }, { "@score":"1", "@id":"3855382", "info":{"authors":{"author":[{"@pid":"205/8056","text":"Akram Bayat"},{"@pid":"16/929","text":"Marc Pomplun"},{"@pid":"67/4024","text":"Duc A. Tran"}]},"title":"A Study on Human Activity Recognition Using Accelerometer Data from Smartphones.","venue":"FNC/MobiSPC","pages":"450-457","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/BayatPT14","doi":"10.1016/J.PROCS.2014.07.009","ee":"https://doi.org/10.1016/j.procs.2014.07.009","url":"https://dblp.org/rec/conf/fnc/BayatPT14"}, "url":"URL#3855382" }, { "@score":"1", "@id":"3855383", "info":{"authors":{"author":[{"@pid":"205/8140","text":"Dylan Bedrossian"},{"@pid":"205/8054","text":"Anas Harb"},{"@pid":"205/8055","text":"Rawad Khalil"},{"@pid":"88/5173","text":"Ali Chehab"},{"@pid":"09/3843","text":"Hassan Ali Artail"}]},"title":""Server-less" Social Network for Enhanced Privacy.","venue":"FNC/MobiSPC","pages":"95-102","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/BedrossianHKCA14","doi":"10.1016/J.PROCS.2014.07.057","ee":"https://doi.org/10.1016/j.procs.2014.07.057","url":"https://dblp.org/rec/conf/fnc/BedrossianHKCA14"}, "url":"URL#3855383" }, { "@score":"1", "@id":"3855384", "info":{"authors":{"author":[{"@pid":"16/4558","text":"M. Behzad"},{"@pid":"157/4695","text":"A. Sana"},{"@pid":"80/2292","text":"M. A. Khan"},{"@pid":"205/8115","text":"Z. Walayat"},{"@pid":"52/7458","text":"U. Qasim"},{"@pid":"13/10456","text":"Zahoor Ali Khan"},{"@pid":"23/8275","text":"Nadeem Javaid"}]},"title":"Design and Development of a Low Cost Ubiquitous Tracking System.","venue":"FNC/MobiSPC","pages":"220-227","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/BehzadSKWQKJ14","doi":"10.1016/J.PROCS.2014.07.014","ee":"https://doi.org/10.1016/j.procs.2014.07.014","url":"https://dblp.org/rec/conf/fnc/BehzadSKWQKJ14"}, "url":"URL#3855384" }, { "@score":"1", "@id":"3855385", "info":{"authors":{"author":{"@pid":"11/3509","text":"Chakib Bekara"}},"title":"Security Issues and Challenges for the IoT-based Smart Grid.","venue":"FNC/MobiSPC","pages":"532-537","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Bekara14","doi":"10.1016/J.PROCS.2014.07.064","ee":"https://doi.org/10.1016/j.procs.2014.07.064","url":"https://dblp.org/rec/conf/fnc/Bekara14"}, "url":"URL#3855385" }, { "@score":"1", "@id":"3855386", "info":{"authors":{"author":[{"@pid":"45/4438","text":"Kemal Bicakci"},{"@pid":"42/6364","text":"Devrim Unal"},{"@pid":"158/5912","text":"Nadir Ascioglu"},{"@pid":"64/2212","text":"Oktay Adalier"}]},"title":"Mobile Authentication Secure Against Man-In-The-Middle Attacks.","venue":"FNC/MobiSPC","pages":"323-329","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/BicakciUAA14","doi":"10.1016/J.PROCS.2014.07.031","ee":"https://doi.org/10.1016/j.procs.2014.07.031","url":"https://dblp.org/rec/conf/fnc/BicakciUAA14"}, "url":"URL#3855386" }, { "@score":"1", "@id":"3855387", "info":{"authors":{"author":[{"@pid":"b/JackBrassil","text":"Jack Brassil"},{"@pid":"205/8116","text":"Chris Pearson"},{"@pid":"205/8058","text":"Lee Fuller"}]},"title":"Indoor Positioning with an Enterprise Radio Access Network.","venue":"FNC/MobiSPC","pages":"313-322","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/BrassilPF14","doi":"10.1016/J.PROCS.2014.07.029","ee":"https://doi.org/10.1016/j.procs.2014.07.029","url":"https://dblp.org/rec/conf/fnc/BrassilPF14"}, "url":"URL#3855387" }, { "@score":"1", "@id":"3855388", "info":{"authors":{"author":{"@pid":"205/8133","text":"Vijayarengan Ramanuja Chary"}},"title":"TELEMODE - A Proposal towards Technology Enhanced Learning, Engineered with MObile DEvices.","venue":"FNC/MobiSPC","pages":"583-586","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Chary14","doi":"10.1016/J.PROCS.2014.07.076","ee":"https://doi.org/10.1016/j.procs.2014.07.076","url":"https://dblp.org/rec/conf/fnc/Chary14"}, "url":"URL#3855388" }, { "@score":"1", "@id":"3855389", "info":{"authors":{"author":[{"@pid":"162/8817","text":"Amine Dahane"},{"@pid":"15/919","text":"Berrached Nasr-Eddine"},{"@pid":"43/7771","text":"Kechar Bouabdellah"}]},"title":"Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks.","venue":"FNC/MobiSPC","pages":"63-70","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/DahaneNB14","doi":"10.1016/J.PROCS.2014.07.040","ee":"https://doi.org/10.1016/j.procs.2014.07.040","url":"https://dblp.org/rec/conf/fnc/DahaneNB14"}, "url":"URL#3855389" }, { "@score":"1", "@id":"3855390", "info":{"authors":{"author":[{"@pid":"53/629","text":"Hong Ding"},{"@pid":"205/8080","text":"Lingling He"},{"@pid":"13/10449","text":"Linhua Zheng"},{"@pid":"205/8113","text":"Jibing Yuan"},{"@pid":"39/10446","text":"Liangjun Xiang"}]},"title":"A New RWLS Positioning Method Basing on Distance Information.","venue":"FNC/MobiSPC","pages":"633-638","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/DingHZYX14","doi":"10.1016/J.PROCS.2014.07.087","ee":"https://doi.org/10.1016/j.procs.2014.07.087","url":"https://dblp.org/rec/conf/fnc/DingHZYX14"}, "url":"URL#3855390" }, { "@score":"1", "@id":"3855391", "info":{"authors":{"author":[{"@pid":"185/1798","text":"Yassine Douga"},{"@pid":"42/119","text":"Malika Bourenane"},{"@pid":"03/6403","text":"Abdelhamid Mellouk"}]},"title":"Adaptive Video Streaming Using TCP Factors Control with User Parameters.","venue":"FNC/MobiSPC","pages":"526-531","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/DougaBM14","doi":"10.1016/J.PROCS.2014.07.062","ee":"https://doi.org/10.1016/j.procs.2014.07.062","url":"https://dblp.org/rec/conf/fnc/DougaBM14"}, "url":"URL#3855391" }, { "@score":"1", "@id":"3855392", "info":{"authors":{"author":[{"@pid":"160/8461","text":"Salam Doumiati"},{"@pid":"09/3843","text":"Hassan Artail"},{"@pid":"251/5499","text":"David Manuel Gutiérrez Estévez"}]},"title":"A Framework for LTE-A Proximity-based Device-to-Device Service Registration and Discovery.","venue":"FNC/MobiSPC","pages":"87-94","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/DoumiatiAE14","doi":"10.1016/J.PROCS.2014.07.054","ee":"https://doi.org/10.1016/j.procs.2014.07.054","url":"https://dblp.org/rec/conf/fnc/DoumiatiAE14"}, "url":"URL#3855392" }, { "@score":"1", "@id":"3855393", "info":{"authors":{"author":[{"@pid":"71/5614","text":"El-Sayed M. El-Alfy"},{"@pid":"82/8092","text":"Feras N. Al-Obeidat"}]},"title":"A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection.","venue":"FNC/MobiSPC","pages":"55-62","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/El-AlfyA14","doi":"10.1016/J.PROCS.2014.07.037","ee":"https://doi.org/10.1016/j.procs.2014.07.037","url":"https://dblp.org/rec/conf/fnc/El-AlfyA14"}, "url":"URL#3855393" }, { "@score":"1", "@id":"3855394", "info":{"authors":{"author":[{"@pid":"27/5634","text":"Haytham Elmiligi"},{"@pid":"69/4864","text":"Fayez Gebali"},{"@pid":"17/914","text":"M. Watheq El-Kharashi"}]},"title":"Power-aware Mapping for 3D-NoC Designs Using Genetic Algorithms.","venue":"FNC/MobiSPC","pages":"538-543","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/ElmiligiGE14","doi":"10.1016/J.PROCS.2014.07.065","ee":"https://doi.org/10.1016/j.procs.2014.07.065","url":"https://dblp.org/rec/conf/fnc/ElmiligiGE14"}, "url":"URL#3855394" }, { "@score":"1", "@id":"3855395", "info":{"authors":{"author":[{"@pid":"205/8123","text":"Sheikh Ferdoush"},{"@pid":"09/1234","text":"Xinrong Li"}]},"title":"Wireless Sensor Network System Design Using Raspberry Pi and Arduino for Environmental Monitoring Applications.","venue":"FNC/MobiSPC","pages":"103-110","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/FerdoushL14","doi":"10.1016/J.PROCS.2014.07.059","ee":"https://doi.org/10.1016/j.procs.2014.07.059","url":"https://dblp.org/rec/conf/fnc/FerdoushL14"}, "url":"URL#3855395" }, { "@score":"1", "@id":"3855396", "info":{"authors":{"author":[{"@pid":"62/10455","text":"Masoud Oveis Gharan"},{"@pid":"15/3399","text":"Gul N. Khan"}]},"title":"Packet-based Adaptive Virtual Channel Configuration for NoC Systems.","venue":"FNC/MobiSPC","pages":"552-558","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/GharanK14","doi":"10.1016/J.PROCS.2014.07.069","ee":"https://doi.org/10.1016/j.procs.2014.07.069","url":"https://dblp.org/rec/conf/fnc/GharanK14"}, "url":"URL#3855396" }, { "@score":"1", "@id":"3855397", "info":{"authors":{"author":[{"@pid":"140/2269","text":"Hatim Guermah"},{"@pid":"140/2065","text":"Tarik Fissaa"},{"@pid":"28/10222","text":"Hatim Hafiddi"},{"@pid":"98/4821","text":"Mahmoud Nassar"},{"@pid":"21/2690","text":"Abdelaziz Kriouile"}]},"title":"A Semantic Approach for Service Adaptation in Context-aware Environment.","venue":"FNC/MobiSPC","pages":"587-592","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/GuermahFHNK14","doi":"10.1016/J.PROCS.2014.07.077","ee":"https://doi.org/10.1016/j.procs.2014.07.077","url":"https://dblp.org/rec/conf/fnc/GuermahFHNK14"}, "url":"URL#3855397" }, { "@score":"1", "@id":"3855398", "info":{"authors":{"author":[{"@pid":"205/8068","text":"Nikita Gurudath"},{"@pid":"154/5494","text":"H. Bryan Riley"}]},"title":"Drowsy Driving Detection by EEG Analysis Using Wavelet Transform and K-means Clustering.","venue":"FNC/MobiSPC","pages":"400-409","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/GurudathR14","doi":"10.1016/J.PROCS.2014.07.045","ee":"https://doi.org/10.1016/j.procs.2014.07.045","url":"https://dblp.org/rec/conf/fnc/GurudathR14"}, "url":"URL#3855398" }, { "@score":"1", "@id":"3855399", "info":{"authors":{"author":[{"@pid":"16/10701","text":"Sherin Abdel Hamid"},{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"76/3272","text":"Glen Takahara"}]},"title":"Vehicle as a Mobile Sensor.","venue":"FNC/MobiSPC","pages":"286-295","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/HamidHT14","doi":"10.1016/J.PROCS.2014.07.025","ee":"https://doi.org/10.1016/j.procs.2014.07.025","url":"https://dblp.org/rec/conf/fnc/HamidHT14"}, "url":"URL#3855399" }, { "@score":"1", "@id":"3855400", "info":{"authors":{"author":[{"@pid":"205/8112","text":"Luai E. Hasnawi"},{"@pid":"99/1951","text":"Richard A. Thompson"}]},"title":"Photonic Timeslot Interchangers with a Reduced Number of Feed-forward Fiber Delay Lines.","venue":"FNC/MobiSPC","pages":"47-54","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/HasnawiT14","doi":"10.1016/J.PROCS.2014.07.030","ee":"https://doi.org/10.1016/j.procs.2014.07.030","url":"https://dblp.org/rec/conf/fnc/HasnawiT14"}, "url":"URL#3855400" }, { "@score":"1", "@id":"3855401", "info":{"authors":{"author":[{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"},{"@pid":"25/2352","text":"Atif Alamri"}]},"title":"Virtual Machine Resource Allocation for Multimedia Cloud: A Nash Bargaining Approach.","venue":"FNC/MobiSPC","pages":"571-576","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/HassanA14","doi":"10.1016/J.PROCS.2014.07.074","ee":"https://doi.org/10.1016/j.procs.2014.07.074","url":"https://dblp.org/rec/conf/fnc/HassanA14"}, "url":"URL#3855401" }, { "@score":"1", "@id":"3855402", "info":{"authors":{"author":[{"@pid":"07/3173","text":"Hossam S. Hassanein"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"FNC 2014 Preface.","venue":"FNC/MobiSPC","pages":"7-9","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/HassaneinA14","doi":"10.1016/J.PROCS.2014.07.002","ee":"https://doi.org/10.1016/j.procs.2014.07.002","url":"https://dblp.org/rec/conf/fnc/HassaneinA14"}, "url":"URL#3855402" }, { "@score":"1", "@id":"3855403", "info":{"authors":{"author":[{"@pid":"14/10894","text":"Xueheng Hu"},{"@pid":"118/5253","text":"Lei Meng"},{"@pid":"42/6870","text":"Aaron D. Striegel"}]},"title":"Evaluating the Raw Potential for Device-to-Device Caching via Co-location.","venue":"FNC/MobiSPC","pages":"376-383","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/HuMS14","doi":"10.1016/J.PROCS.2014.07.042","ee":"https://doi.org/10.1016/j.procs.2014.07.042","url":"https://dblp.org/rec/conf/fnc/HuMS14"}, "url":"URL#3855403" }, { "@score":"1", "@id":"3855404", "info":{"authors":{"author":[{"@pid":"61/3076","text":"Jen-Fa Huang"},{"@pid":"151/4078","text":"Sheng-Hui Meng"},{"@pid":"151/3987","text":"Ying-Chen Lin"},{"@pid":"124/8368","text":"Kai-Sheng Chen"},{"@pid":"205/8107","text":"An-Chi Huang"}]},"title":"Using Wavelength/Time Signatures Scrambling to Realize Cryptographic Coded-WDM Data Networks.","venue":"FNC/MobiSPC","pages":"39-46","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/HuangMLCH14","doi":"10.1016/J.PROCS.2014.07.024","ee":"https://doi.org/10.1016/j.procs.2014.07.024","url":"https://dblp.org/rec/conf/fnc/HuangMLCH14"}, "url":"URL#3855404" }, { "@score":"1", "@id":"3855405", "info":{"authors":{"author":[{"@pid":"49/4481","text":"Mohsin Iftikhar"},{"@pid":"27/10701","text":"Nada Al-Elaiwi"},{"@pid":"97/466","text":"Mehmet Sabih Aksoy"}]},"title":"Performance Analysis of Priority Queuing Model for Low Power Wireless Body Area Networks (WBANs).","venue":"FNC/MobiSPC","pages":"518-525","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/IftikharAA14","doi":"10.1016/J.PROCS.2014.07.060","ee":"https://doi.org/10.1016/j.procs.2014.07.060","url":"https://dblp.org/rec/conf/fnc/IftikharAA14"}, "url":"URL#3855405" }, { "@score":"1", "@id":"3855406", "info":{"authors":{"author":[{"@pid":"121/0540","text":"Alireza Izaddoost"},{"@pid":"52/3307","text":"Shahram Shah-Heydari"}]},"title":"Topology-based Proactive Network Protection in Large-scale Failure Scenarios.","venue":"FNC/MobiSPC","pages":"111-117","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/IzaddoostS14","doi":"10.1016/J.PROCS.2014.07.061","ee":"https://doi.org/10.1016/j.procs.2014.07.061","url":"https://dblp.org/rec/conf/fnc/IzaddoostS14"}, "url":"URL#3855406" }, { "@score":"1", "@id":"3855407", "info":{"authors":{"author":[{"@pid":"17/848","text":"Nafaâ Jabeur"},{"@pid":"40/1065","text":"Nabil Sahli"},{"@pid":"50/2675","text":"Sherali Zeadally"}]},"title":"ABAMA: An Agent-based Architecture for Mapping Natural Ecosystems onto Wireless Sensor Networks.","venue":"FNC/MobiSPC","pages":"257-265","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/JabeurSZ14","doi":"10.1016/J.PROCS.2014.07.020","ee":"https://doi.org/10.1016/j.procs.2014.07.020","url":"https://dblp.org/rec/conf/fnc/JabeurSZ14"}, "url":"URL#3855407" }, { "@score":"1", "@id":"3855408", "info":{"authors":{"author":[{"@pid":"53/4234","text":"Yaser Jararweh"},{"@pid":"81/4116","text":"Lo'ai Tawalbeh"},{"@pid":"140/8559","text":"Fadi Ababneh"},{"@pid":"39/1037","text":"Abdallah Khreishah"},{"@pid":"140/8435","text":"Fahd Dosari"}]},"title":"Scalable Cloudlet-based Mobile Computing Model.","venue":"FNC/MobiSPC","pages":"434-441","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/JararwehTAKD14","doi":"10.1016/J.PROCS.2014.07.051","ee":"https://doi.org/10.1016/j.procs.2014.07.051","url":"https://dblp.org/rec/conf/fnc/JararwehTAKD14"}, "url":"URL#3855408" }, { "@score":"1", "@id":"3855409", "info":{"authors":{"author":[{"@pid":"43/164","text":"Jason Jaskolka"},{"@pid":"68/5266","text":"Ridha Khédri"},{"@pid":"94/2918","text":"Khair Eddin Sabri"}]},"title":"Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics.","venue":"FNC/MobiSPC","pages":"266-275","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/JaskolkaKS14","doi":"10.1016/J.PROCS.2014.07.022","ee":"https://doi.org/10.1016/j.procs.2014.07.022","url":"https://dblp.org/rec/conf/fnc/JaskolkaKS14"}, "url":"URL#3855409" }, { "@score":"1", "@id":"3855410", "info":{"authors":{"author":[{"@pid":"43/164","text":"Jason Jaskolka"},{"@pid":"68/5266","text":"Ridha Khédri"},{"@pid":"94/2918","text":"Khair Eddin Sabri"}]},"title":"Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-based Covert Channels.","venue":"FNC/MobiSPC","pages":"276-285","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/JaskolkaKS14a","doi":"10.1016/J.PROCS.2014.07.023","ee":"https://doi.org/10.1016/j.procs.2014.07.023","url":"https://dblp.org/rec/conf/fnc/JaskolkaKS14a"}, "url":"URL#3855410" }, { "@score":"1", "@id":"3855411", "info":{"authors":{"author":{"@pid":"63/3219","text":"Yasusi Kanada"}},"title":"Providing Infrastructure Functions for Virtual Networks by Applying Node Plug-in Architecture.","venue":"FNC/MobiSPC","pages":"661-667","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Kanada14","doi":"10.1016/J.PROCS.2014.07.094","ee":"https://doi.org/10.1016/j.procs.2014.07.094","url":"https://dblp.org/rec/conf/fnc/Kanada14"}, "url":"URL#3855411" }, { "@score":"1", "@id":"3855412", "info":{"authors":{"author":[{"@pid":"205/8088","text":"Syed Kazmi"},{"@pid":"19/6373","text":"Ramiro Liscano"},{"@pid":"83/709","text":"Jing Ren"}]},"title":"Determining Fuzzy Link Quality Membership Functions in Wireless Sensor Networks.","venue":"FNC/MobiSPC","pages":"149-156","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/KazmiLR14","doi":"10.1016/J.PROCS.2014.07.073","ee":"https://doi.org/10.1016/j.procs.2014.07.073","url":"https://dblp.org/rec/conf/fnc/KazmiLR14"}, "url":"URL#3855412" }, { "@score":"1", "@id":"3855413", "info":{"authors":{"author":[{"@pid":"60/2458","text":"Farrukh Aslam Khan"},{"@pid":"89/10140","text":"Aftab Ali"},{"@pid":"04/7436","text":"Haider Abbas"},{"@pid":"124/3439","text":"Nur Al Hasan Haldar"}]},"title":"A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks.","venue":"FNC/MobiSPC","pages":"511-517","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/KhanAAH14","doi":"10.1016/J.PROCS.2014.07.058","ee":"https://doi.org/10.1016/j.procs.2014.07.058","url":"https://dblp.org/rec/conf/fnc/KhanAAH14"}, "url":"URL#3855413" }, { "@score":"1", "@id":"3855414", "info":{"authors":{"author":[{"@pid":"118/1375","text":"Marc Koerner"},{"@pid":"24/2656","text":"Odej Kao"}]},"title":"Evaluating SDN based Rack-to-Rack Multi-path Switching for Data-center Networks.","venue":"FNC/MobiSPC","pages":"118-125","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/KoernerK14","doi":"10.1016/J.PROCS.2014.07.063","ee":"https://doi.org/10.1016/j.procs.2014.07.063","url":"https://dblp.org/rec/conf/fnc/KoernerK14"}, "url":"URL#3855414" }, { "@score":"1", "@id":"3855415", "info":{"authors":{"author":[{"@pid":"205/8105","text":"Ravi Teja Koganti"},{"@pid":"54/2949","text":"Deepinder P. Sidhu"}]},"title":"Analysis of Routing and Wavelength Assignment in Large WDM Networks.","venue":"FNC/MobiSPC","pages":"71-78","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/KogantiS14","doi":"10.1016/J.PROCS.2014.07.047","ee":"https://doi.org/10.1016/j.procs.2014.07.047","url":"https://dblp.org/rec/conf/fnc/KogantiS14"}, "url":"URL#3855415" }, { "@score":"1", "@id":"3855416", "info":{"authors":{"author":[{"@pid":"145/7676","text":"Gökhan Kul"},{"@pid":"16/6917","text":"Tansel Özyer"},{"@pid":"99/4050","text":"Bülent Tavli"}]},"title":"IEEE 802.11 WLAN based Real Time Indoor Positioning: Literature Survey and Experimental Investigations.","venue":"FNC/MobiSPC","pages":"157-164","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/KulOT14","doi":"10.1016/J.PROCS.2014.07.078","ee":"https://doi.org/10.1016/j.procs.2014.07.078","url":"https://dblp.org/rec/conf/fnc/KulOT14"}, "url":"URL#3855416" }, { "@score":"1", "@id":"3855417", "info":{"authors":{"author":[{"@pid":"04/9590","text":"Heba A. Kurdi"},{"@pid":"205/8060","text":"Ebtehal T. Alotaibi"}]},"title":"A Hybrid Approach for Scheduling Virtual Machines in Private Clouds.","venue":"FNC/MobiSPC","pages":"249-256","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/KurdiA14","doi":"10.1016/J.PROCS.2014.07.019","ee":"https://doi.org/10.1016/j.procs.2014.07.019","url":"https://dblp.org/rec/conf/fnc/KurdiA14"}, "url":"URL#3855417" }, { "@score":"1", "@id":"3855418", "info":{"authors":{"author":[{"@pid":"04/9590","text":"Heba A. Kurdi"},{"@pid":"182/4296","text":"Ebtesam Aloboud"},{"@pid":"202/0046","text":"Sarah Alhassan"},{"@pid":"205/8060","text":"Ebtehal T. Alotaibi"}]},"title":"An Algorithm for Handling Starvation and Resource Rejection in Public Clouds.","venue":"FNC/MobiSPC","pages":"242-248","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/KurdiAAA14","doi":"10.1016/J.PROCS.2014.07.018","ee":"https://doi.org/10.1016/j.procs.2014.07.018","url":"https://dblp.org/rec/conf/fnc/KurdiAAA14"}, "url":"URL#3855418" }, { "@score":"1", "@id":"3855419", "info":{"authors":{"author":[{"@pid":"52/6325","text":"Kun-Chan Lan"},{"@pid":"115/6384","text":"Wen-Yuah Shih"}]},"title":"Early Diagnosis of Parkinson's Disease Using a Smartphone.","venue":"FNC/MobiSPC","pages":"305-312","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/LanS14","doi":"10.1016/J.PROCS.2014.07.028","ee":"https://doi.org/10.1016/j.procs.2014.07.028","url":"https://dblp.org/rec/conf/fnc/LanS14"}, "url":"URL#3855419" }, { "@score":"1", "@id":"3855420", "info":{"authors":{"author":[{"@pid":"191/2005","text":"Ziwei Lei"},{"@pid":"13/10449","text":"Linhua Zheng"},{"@pid":"53/629","text":"Hong Ding"},{"@pid":"33/2972","text":"Haibin Liu"},{"@pid":"205/8143","text":"Yongyong Liu"}]},"title":"Blind Separation of Synchronous-networking Frequency Hopping Signals based on Time-frequency Analysis.","venue":"FNC/MobiSPC","pages":"31-38","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/LeiZDLL14","doi":"10.1016/J.PROCS.2014.07.016","ee":"https://doi.org/10.1016/j.procs.2014.07.016","url":"https://dblp.org/rec/conf/fnc/LeiZDLL14"}, "url":"URL#3855420" }, { "@score":"1", "@id":"3855421", "info":{"authors":{"author":[{"@pid":"02/3672","text":"Heng Li"},{"@pid":"43/5082","text":"Yonghe Liu"},{"@pid":"45/2995","text":"Siwang Zhou"},{"@pid":"90/3055","text":"Hui Xu"}]},"title":"Toward Location based Vehicular Networks in Urban Environments.","venue":"FNC/MobiSPC","pages":"442-449","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/LiLZX14","doi":"10.1016/J.PROCS.2014.07.007","ee":"https://doi.org/10.1016/j.procs.2014.07.007","url":"https://dblp.org/rec/conf/fnc/LiLZX14"}, "url":"URL#3855421" }, { "@score":"1", "@id":"3855422", "info":{"authors":{"author":[{"@pid":"40/1491","text":"Xiang Li"},{"@pid":"32/6458","text":"Mei Yang"},{"@pid":"75/5653","text":"Chaoguang Men"},{"@pid":"98/2589","text":"Yingtao Jiang"},{"@pid":"88/1196","text":"Kalum Priyanath Udagepola"}]},"title":"Access-Pattern Aware Checkpointing Data Storage Scheme for Mobile Computing Environment.","venue":"FNC/MobiSPC","pages":"330-337","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/LiYMJU14","doi":"10.1016/J.PROCS.2014.07.032","ee":"https://doi.org/10.1016/j.procs.2014.07.032","url":"https://dblp.org/rec/conf/fnc/LiYMJU14"}, "url":"URL#3855422" }, { "@score":"1", "@id":"3855423", "info":{"authors":{"author":[{"@pid":"126/5300","text":"Xinye Lin"},{"@pid":"45/2682","text":"Wenbo He"}]},"title":"WiLoVe: A WiFi-coverage based Location Verification System in LBS.","venue":"FNC/MobiSPC","pages":"484-491","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/LinH14","doi":"10.1016/J.PROCS.2014.07.041","ee":"https://doi.org/10.1016/j.procs.2014.07.041","url":"https://dblp.org/rec/conf/fnc/LinH14"}, "url":"URL#3855423" }, { "@score":"1", "@id":"3855424", "info":{"authors":{"author":[{"@pid":"33/2972","text":"Haibin Liu"},{"@pid":"53/629","text":"Hong Ding"},{"@pid":"39/10446","text":"Liangjun Xiang"},{"@pid":"205/8113","text":"Jibing Yuan"},{"@pid":"13/10449","text":"Linhua Zheng"}]},"title":"Outage and BER Performance Analysis of Cascade Channel in Relay Networks.","venue":"FNC/MobiSPC","pages":"23-30","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/LiuDXYZ14","doi":"10.1016/J.PROCS.2014.07.010","ee":"https://doi.org/10.1016/j.procs.2014.07.010","url":"https://dblp.org/rec/conf/fnc/LiuDXYZ14"}, "url":"URL#3855424" }, { "@score":"1", "@id":"3855425", "info":{"authors":{"author":[{"@pid":"33/2972","text":"Haibin Liu"},{"@pid":"53/629","text":"Hong Ding"},{"@pid":"205/8113","text":"Jibing Yuan"},{"@pid":"13/10449","text":"Linhua Zheng"},{"@pid":"42/1503","text":"Shuai Wang"}]},"title":"A Simplified Posteriori Estimator to Cascade Channel based on Amplify-and-Forward Multi-relaying Systems.","venue":"FNC/MobiSPC","pages":"15-22","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/LiuDYZW14","doi":"10.1016/J.PROCS.2014.07.008","ee":"https://doi.org/10.1016/j.procs.2014.07.008","url":"https://dblp.org/rec/conf/fnc/LiuDYZW14"}, "url":"URL#3855425" }, { "@score":"1", "@id":"3855426", "info":{"authors":{"author":[{"@pid":"09/11266","text":"Changsha Ma"},{"@pid":"29/4638","text":"Chang Wen Chen"}]},"title":"Nearby Friend Discovery with Geo-indistinguishability to Stalkers.","venue":"FNC/MobiSPC","pages":"352-359","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MaC14","doi":"10.1016/J.PROCS.2014.07.036","ee":"https://doi.org/10.1016/j.procs.2014.07.036","url":"https://dblp.org/rec/conf/fnc/MaC14"}, "url":"URL#3855426" }, { "@score":"1", "@id":"3855427", "info":{"authors":{"author":[{"@pid":"91/10896","text":"Giuseppe Maggiore"},{"@pid":"79/278","text":"Carlos Santos"},{"@pid":"53/5607","text":"Aske Plaat"}]},"title":"Smarter Smartphones: Understanding and Predicting User Habits from GPS Sensor Data.","venue":"FNC/MobiSPC","pages":"297-304","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MaggioreSP14","doi":"10.1016/J.PROCS.2014.07.027","ee":"https://doi.org/10.1016/j.procs.2014.07.027","url":"https://dblp.org/rec/conf/fnc/MaggioreSP14"}, "url":"URL#3855427" }, { "@score":"1", "@id":"3855428", "info":{"authors":{"author":[{"@pid":"162/0770","text":"Danish Mahmood"},{"@pid":"13/10456","text":"Zahoor Ali Khan"},{"@pid":"52/7458","text":"U. Qasim"},{"@pid":"205/8106","text":"M. Umair Naru"},{"@pid":"162/0815","text":"Sana Mukhtar"},{"@pid":"205/8164","text":"M. I. Akram"},{"@pid":"23/8275","text":"Nadeem Javaid"}]},"title":"Analyzing and Evaluating Contention Access Period of Slotted CSMA/CA for IEEE802.15.4.","venue":"FNC/MobiSPC","pages":"204-211","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MahmoodKQNMAJ14","doi":"10.1016/J.PROCS.2014.07.011","ee":"https://doi.org/10.1016/j.procs.2014.07.011","url":"https://dblp.org/rec/conf/fnc/MahmoodKQNMAJ14"}, "url":"URL#3855428" }, { "@score":"1", "@id":"3855429", "info":{"authors":{"author":[{"@pid":"192/0019","text":"Shaharyar Mahmood"},{"@pid":"157/4740","text":"Hina Nasir"},{"@pid":"162/0719","text":"Subhan Tariq"},{"@pid":"166/8855","text":"Hifsa Ashraf"},{"@pid":"205/8084","text":"M. Pervaiz"},{"@pid":"13/10456","text":"Zahoor Ali Khan"},{"@pid":"23/8275","text":"Nadeem Javaid"}]},"title":"Forwarding Nodes Constraint based DBR (CDBR) and EEDBR (CEEDBR) in Underwater WSNs.","venue":"FNC/MobiSPC","pages":"228-235","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MahmoodNTAPKJ14","doi":"10.1016/J.PROCS.2014.07.015","ee":"https://doi.org/10.1016/j.procs.2014.07.015","url":"https://dblp.org/rec/conf/fnc/MahmoodNTAPKJ14"}, "url":"URL#3855429" }, { "@score":"1", "@id":"3855430", "info":{"authors":{"author":[{"@pid":"205/8103","text":"Beza Mamo"},{"@pid":"80/4901","text":"Dejene Ejigu"}]},"title":"A Generic Layered Architecture for Context Aware Applications.","venue":"FNC/MobiSPC","pages":"619-624","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MamoE14","doi":"10.1016/J.PROCS.2014.07.085","ee":"https://doi.org/10.1016/j.procs.2014.07.085","url":"https://dblp.org/rec/conf/fnc/MamoE14"}, "url":"URL#3855430" }, { "@score":"1", "@id":"3855431", "info":{"authors":{"author":[{"@pid":"40/1837","text":"Ying Mao"},{"@pid":"74/1572","text":"Jiayin Wang"},{"@pid":"95/4434","text":"Bo Sheng"}]},"title":"DAB: Dynamic and Agile Buffer-control for Streaming Videos on Mobile Devices.","venue":"FNC/MobiSPC","pages":"384-391","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MaoWS14","doi":"10.1016/J.PROCS.2014.07.043","ee":"https://doi.org/10.1016/j.procs.2014.07.043","url":"https://dblp.org/rec/conf/fnc/MaoWS14"}, "url":"URL#3855431" }, { "@score":"1", "@id":"3855432", "info":{"authors":{"author":[{"@pid":"40/5168","text":"Hamid Mcheick"},{"@pid":"205/4092","text":"Louis Deladiennee"},{"@pid":"205/8094","text":"Mickael Wajnberg"},{"@pid":"184/9581","text":"Benoit Martin"},{"@pid":"205/8153","text":"Marc Abi-Khalil"}]},"title":"Universal Connector Framework for Pervasive Computing Using Cloud Technologies.","venue":"FNC/MobiSPC","pages":"141-148","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/McheickDWMA14","doi":"10.1016/J.PROCS.2014.07.072","ee":"https://doi.org/10.1016/j.procs.2014.07.072","url":"https://dblp.org/rec/conf/fnc/McheickDWMA14"}, "url":"URL#3855432" }, { "@score":"1", "@id":"3855433", "info":{"authors":{"author":[{"@pid":"40/5168","text":"Hamid Mcheick"},{"@pid":"205/8077","text":"Alexandre Poirrier"},{"@pid":"167/7666","text":"Jabril Abdelaziz"},{"@pid":"92/10403","text":"Abbass Lakiss"}]},"title":"Generic Email Connector for Mobile Devices.","venue":"FNC/MobiSPC","pages":"613-618","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/McheickPAL14","doi":"10.1016/J.PROCS.2014.07.083","ee":"https://doi.org/10.1016/j.procs.2014.07.083","url":"https://dblp.org/rec/conf/fnc/McheickPAL14"}, "url":"URL#3855433" }, { "@score":"1", "@id":"3855434", "info":{"authors":{"author":[{"@pid":"15/4135-1","text":"Christopher Miller 0001"},{"@pid":"48/2399","text":"Christian Poellabauer"}]},"title":"Configurable Integrated Monitoring System for Mobile Devices.","venue":"FNC/MobiSPC","pages":"410-417","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MillerP14","doi":"10.1016/J.PROCS.2014.07.046","ee":"https://doi.org/10.1016/j.procs.2014.07.046","url":"https://dblp.org/rec/conf/fnc/MillerP14"}, "url":"URL#3855434" }, { "@score":"1", "@id":"3855435", "info":{"authors":{"author":[{"@pid":"132/1059","text":"Sajjad Ali Mushtaq"},{"@pid":"48/8960","text":"Naheed Sajjad"},{"@pid":"131/6887","text":"Sohail Razzaq"}]},"title":"Decision Making Framework with Stochastic Dynamicity: A Step Forward Towards SDN.","venue":"FNC/MobiSPC","pages":"188-195","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/MushtaqSR14","doi":"10.1016/J.PROCS.2014.07.088","ee":"https://doi.org/10.1016/j.procs.2014.07.088","url":"https://dblp.org/rec/conf/fnc/MushtaqSR14"}, "url":"URL#3855435" }, { "@score":"1", "@id":"3855436", "info":{"authors":{"author":[{"@pid":"205/8108","text":"Rim Nasfi"},{"@pid":"62/5331","text":"Makram Soui"}]},"title":"Extraction of Interesting Adaptation Rules.","venue":"FNC/MobiSPC","pages":"607-612","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/NasfiS14","doi":"10.1016/J.PROCS.2014.07.081","ee":"https://doi.org/10.1016/j.procs.2014.07.081","url":"https://dblp.org/rec/conf/fnc/NasfiS14"}, "url":"URL#3855436" }, { "@score":"1", "@id":"3855437", "info":{"authors":{"author":[{"@pid":"05/4965","text":"Trung Chi Ngo"},{"@pid":"60/5264","text":"Hoon Oh"}]},"title":"A Link Quality Prediction Metric for Location based Routing Protocols under Shadowing and Fading Effects in Vehicular Ad Hoc Networks.","venue":"FNC/MobiSPC","pages":"565-570","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/NgoO14","doi":"10.1016/J.PROCS.2014.07.071","ee":"https://doi.org/10.1016/j.procs.2014.07.071","url":"https://dblp.org/rec/conf/fnc/NgoO14"}, "url":"URL#3855437" }, { "@score":"1", "@id":"3855438", "info":{"authors":{"author":[{"@pid":"71/1132","text":"Mais Nijim"},{"@pid":"150/8385","text":"Soumya Saha"},{"@pid":"03/9995","text":"Yousef Nijim"}]},"title":"Central and Distributed GPU based Parallel Disk Systems for Data Intensive Applications.","venue":"FNC/MobiSPC","pages":"338-343","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/NijimSN14","doi":"10.1016/J.PROCS.2014.07.034","ee":"https://doi.org/10.1016/j.procs.2014.07.034","url":"https://dblp.org/rec/conf/fnc/NijimSN14"}, "url":"URL#3855438" }, { "@score":"1", "@id":"3855439", "info":{"authors":{"author":[{"@pid":"41/4833","text":"Dennis Nikitenko"},{"@pid":"85/10680","text":"Daniel J. Gillis"}]},"title":"Touching the Data: Exploring Data Sonification on Mobile Touchscreen Devices.","venue":"FNC/MobiSPC","pages":"360-367","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/NikitenkoG14","doi":"10.1016/J.PROCS.2014.07.038","ee":"https://doi.org/10.1016/j.procs.2014.07.038","url":"https://dblp.org/rec/conf/fnc/NikitenkoG14"}, "url":"URL#3855439" }, { "@score":"1", "@id":"3855440", "info":{"authors":{"author":[{"@pid":"08/9942","text":"Kenneth Sorle Nwizege"},{"@pid":"153/6951","text":"Mauro Bottero"},{"@pid":"99/10779","text":"Shedrack Mmeah"},{"@pid":"159/2465","text":"Emmanuel D. Nwiwure"}]},"title":"Vehicles-to-Infrastructure Communication Safety Messaging in DSRC.","venue":"FNC/MobiSPC","pages":"559-564","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/NwizegeBMN14","doi":"10.1016/J.PROCS.2014.07.070","ee":"https://doi.org/10.1016/j.procs.2014.07.070","url":"https://dblp.org/rec/conf/fnc/NwizegeBMN14"}, "url":"URL#3855440" }, { "@score":"1", "@id":"3855441", "info":{"authors":{"author":[{"@pid":"124/2767","text":"Marvin C. Offiah"},{"@pid":"122/3344","text":"Susanne Rosenthal"},{"@pid":"59/292","text":"Markus Borschbach"}]},"title":"Assessing the Utility of Mobile Applications with Support for or as Replacement of Hearing Aids.","venue":"FNC/MobiSPC","pages":"593-600","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/OffiahRB14","doi":"10.1016/J.PROCS.2014.07.079","ee":"https://doi.org/10.1016/j.procs.2014.07.079","url":"https://dblp.org/rec/conf/fnc/OffiahRB14"}, "url":"URL#3855441" }, { "@score":"1", "@id":"3855442", "info":{"authors":{"author":[{"@pid":"66/2541","text":"Kimio Oguchi"},{"@pid":"205/8070","text":"Shou Maruta"},{"@pid":"88/1359","text":"Dai Hanawa"}]},"title":"Human Positioning Estimation Method Using Received Signal Strength Indicator (RSSI) in a Wireless Sensor Network.","venue":"FNC/MobiSPC","pages":"126-132","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/OguchiMH14","doi":"10.1016/J.PROCS.2014.07.066","ee":"https://doi.org/10.1016/j.procs.2014.07.066","url":"https://dblp.org/rec/conf/fnc/OguchiMH14"}, "url":"URL#3855442" }, { "@score":"1", "@id":"3855443", "info":{"authors":{"author":[{"@pid":"67/4835","text":"Sang Min Park"},{"@pid":"160/2619","text":"Seungbum Ju"},{"@pid":"27/6188","text":"Jaiyong Lee"}]},"title":"Efficient Routing for Traffic Offloading in Software-defined Network.","venue":"FNC/MobiSPC","pages":"674-679","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/ParkJL14","doi":"10.1016/J.PROCS.2014.07.096","ee":"https://doi.org/10.1016/j.procs.2014.07.096","url":"https://dblp.org/rec/conf/fnc/ParkJL14"}, "url":"URL#3855443" }, { "@score":"1", "@id":"3855444", "info":{"authors":{"author":[{"@pid":"47/8853","text":"Mahdi Pirmoradian"},{"@pid":"122/5261","text":"Olayinka Adigun"},{"@pid":"05/3024","text":"Christos Politis"}]},"title":"Sensing Optimization in Cooperative Cognitive Radio Networks.","venue":"FNC/MobiSPC","pages":"577-582","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/PirmoradianAP14","doi":"10.1016/J.PROCS.2014.07.075","ee":"https://doi.org/10.1016/j.procs.2014.07.075","url":"https://dblp.org/rec/conf/fnc/PirmoradianAP14"}, "url":"URL#3855444" }, { "@score":"1", "@id":"3855445", "info":{"authors":{"author":[{"@pid":"97/7551","text":"Sriram Nandha Premnath"},{"@pid":"h/ZygmuntJHaas","text":"Zygmunt J. Haas"}]},"title":"A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems.","venue":"FNC/MobiSPC","pages":"474-483","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/PremnathH14","doi":"10.1016/J.PROCS.2014.07.033","ee":"https://doi.org/10.1016/j.procs.2014.07.033","url":"https://dblp.org/rec/conf/fnc/PremnathH14"}, "url":"URL#3855445" }, { "@score":"1", "@id":"3855446", "info":{"authors":{"author":[{"@pid":"10/3162","text":"Juwel Rana"},{"@pid":"11/7210","text":"Johannes Bjelland"},{"@pid":"34/8344","text":"Thomas Couronné"},{"@pid":"115/7749","text":"Pål Sundsøy"},{"@pid":"146/3527","text":"Daniel T. Wagner"},{"@pid":"82/8305","text":"Andrew C. Rice"}]},"title":"A Handset-centric View of Smartphone Application Use.","venue":"FNC/MobiSPC","pages":"368-375","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/RanaBCSWR14","doi":"10.1016/J.PROCS.2014.07.039","ee":"https://doi.org/10.1016/j.procs.2014.07.039","url":"https://dblp.org/rec/conf/fnc/RanaBCSWR14"}, "url":"URL#3855446" }, { "@score":"1", "@id":"3855447", "info":{"authors":{"author":[{"@pid":"141/5633","text":"Liudmila Rozanova"},{"@pid":"205/8126","text":"Vadim Alekseev"},{"@pid":"143/7457","text":"Alexander Temerev"}]},"title":"Heterogeneous Epidemic Model for Assessing Data Dissemination in Opportunistic Networks.","venue":"FNC/MobiSPC","pages":"601-606","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/RozanovaAT14","doi":"10.1016/J.PROCS.2014.07.080","ee":"https://doi.org/10.1016/j.procs.2014.07.080","url":"https://dblp.org/rec/conf/fnc/RozanovaAT14"}, "url":"URL#3855447" }, { "@score":"1", "@id":"3855448", "info":{"authors":{"author":[{"@pid":"280/3475","text":"Fahad Saleem"},{"@pid":"280/3026","text":"Yousra Moeen"},{"@pid":"186/8416","text":"Muzammil Behzad"},{"@pid":"205/8158","text":"M. A. Hasnat"},{"@pid":"13/10456","text":"Zahoor Ali Khan"},{"@pid":"52/7458","text":"Umar Qasim"},{"@pid":"23/8275","text":"Nadeem Javaid"}]},"title":"IDDR: Improved Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks.","venue":"FNC/MobiSPC","pages":"212-219","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/SaleemMBHKQJ14","doi":"10.1016/J.PROCS.2014.07.012","ee":"https://doi.org/10.1016/j.procs.2014.07.012","url":"https://dblp.org/rec/conf/fnc/SaleemMBHKQJ14"}, "url":"URL#3855448" }, { "@score":"1", "@id":"3855449", "info":{"authors":{"author":[{"@pid":"119/2340","text":"Hossein Shams"},{"@pid":"63/426","text":"Kamran Zamanifar"}]},"title":"MVCC: An Architectural Pattern for Developing Context-aware Frameworks.","venue":"FNC/MobiSPC","pages":"344-351","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/ShamsZ14","doi":"10.1016/J.PROCS.2014.07.035","ee":"https://doi.org/10.1016/j.procs.2014.07.035","url":"https://dblp.org/rec/conf/fnc/ShamsZ14"}, "url":"URL#3855449" }, { "@score":"1", "@id":"3855450", "info":{"authors":{"author":{"@pid":"86/5593","text":"Nidhi Sharma"}},"title":"Space Time Block Code for Next Generation Multi-user MIMO Systems.","venue":"FNC/MobiSPC","pages":"172-179","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Sharma14","doi":"10.1016/J.PROCS.2014.07.082","ee":"https://doi.org/10.1016/j.procs.2014.07.082","url":"https://dblp.org/rec/conf/fnc/Sharma14"}, "url":"URL#3855450" }, { "@score":"1", "@id":"3855451", "info":{"authors":{"author":[{"@pid":"179/9313","text":"Mridula Sharma"},{"@pid":"27/5634","text":"Haytham Elmiligi"},{"@pid":"69/4864","text":"Fayez Gebali"}]},"title":"SMARTs: A Tool to Simulate and Analyze the Performance of Real-time Multi-core Systems.","venue":"FNC/MobiSPC","pages":"544-551","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/SharmaEG14","doi":"10.1016/J.PROCS.2014.07.067","ee":"https://doi.org/10.1016/j.procs.2014.07.067","url":"https://dblp.org/rec/conf/fnc/SharmaEG14"}, "url":"URL#3855451" }, { "@score":"1", "@id":"3855452", "info":{"authors":{"author":[{"@pid":"167/5151","text":"Admar Ajith Kumar Somappa"},{"@pid":"74/6402","text":"Knut Øvsthus"},{"@pid":"34/5592","text":"Lars Michael Kristensen"}]},"title":"Towards a Dual-mode Adaptive MAC Protocol (DMA-MAC) for Feedback-based Networked Control Systems.","venue":"FNC/MobiSPC","pages":"505-510","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/SomappaOK14","doi":"10.1016/J.PROCS.2014.07.056","ee":"https://doi.org/10.1016/j.procs.2014.07.056","url":"https://dblp.org/rec/conf/fnc/SomappaOK14"}, "url":"URL#3855452" }, { "@score":"1", "@id":"3855453", "info":{"authors":{"author":[{"@pid":"120/3097","text":"Alexander Stanik"},{"@pid":"118/1375","text":"Marc Koerner"},{"@pid":"72/271","text":"Leonidas Lymberopoulos"}]},"title":"SLA-driven Federated Cloud Networking: Quality of Service for Cloud-based Software Defined Networks.","venue":"FNC/MobiSPC","pages":"655-660","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/StanikKL14","doi":"10.1016/J.PROCS.2014.07.093","ee":"https://doi.org/10.1016/j.procs.2014.07.093","url":"https://dblp.org/rec/conf/fnc/StanikKL14"}, "url":"URL#3855453" }, { "@score":"1", "@id":"3855454", "info":{"authors":{"author":[{"@pid":"42/6870","text":"Aaron Striegel"},{"@pid":"57/1180-1","text":"Shu Liu 0001"},{"@pid":"14/10894","text":"Xueheng Hu"},{"@pid":"118/5253","text":"Lei Meng"}]},"title":"LTE and WiFi: Experiences with Quality and Consumption.","venue":"FNC/MobiSPC","pages":"418-425","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/StriegelLHM14","doi":"10.1016/J.PROCS.2014.07.048","ee":"https://doi.org/10.1016/j.procs.2014.07.048","url":"https://dblp.org/rec/conf/fnc/StriegelLHM14"}, "url":"URL#3855454" }, { "@score":"1", "@id":"3855455", "info":{"authors":{"author":{"@pid":"35/2000","text":"Edward R. Sykes"}},"title":"A Cloud-based Interaction Management System Architecture for Mobile Devices.","venue":"FNC/MobiSPC","pages":"625-632","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/Sykes14","doi":"10.1016/J.PROCS.2014.07.086","ee":"https://doi.org/10.1016/j.procs.2014.07.086","url":"https://dblp.org/rec/conf/fnc/Sykes14"}, "url":"URL#3855455" }, { "@score":"1", "@id":"3855456", "info":{"authors":{"author":[{"@pid":"157/3841","text":"Vijey Thayananthan"},{"@pid":"205/8087","text":"Ahmed Alzranhi"}]},"title":"Enhancement of Energy Conservation Technologies in Wireless Sensor Network.","venue":"FNC/MobiSPC","pages":"79-86","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/ThayananthanA14","doi":"10.1016/J.PROCS.2014.07.052","ee":"https://doi.org/10.1016/j.procs.2014.07.052","url":"https://dblp.org/rec/conf/fnc/ThayananthanA14"}, "url":"URL#3855456" }, { "@score":"1", "@id":"3855457", "info":{"authors":{"author":[{"@pid":"188/7522","text":"Amara Umar"},{"@pid":"205/8158","text":"M. A. Hasnat"},{"@pid":"186/8416","text":"Muzammil Behzad"},{"@pid":"205/8127","text":"I. Baseer"},{"@pid":"13/10456","text":"Zahoor Ali Khan"},{"@pid":"52/7458","text":"Umar Qasim"},{"@pid":"23/8275","text":"Nadeem Javaid"}]},"title":"On Enhancing Network Reliability and Throughput for Critical-range based Applications in UWSNs.","venue":"FNC/MobiSPC","pages":"196-203","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/UmarHBBKQJ14","doi":"10.1016/J.PROCS.2014.07.089","ee":"https://doi.org/10.1016/j.procs.2014.07.089","url":"https://dblp.org/rec/conf/fnc/UmarHBBKQJ14"}, "url":"URL#3855457" }, { "@score":"1", "@id":"3855458", "info":{"authors":{"author":[{"@pid":"185/6129","text":"Raviraj Vaghani"},{"@pid":"l/ChungHorngLung","text":"Chung-Horng Lung"}]},"title":"A Comparison of Data Forwarding Schemes for Network Resiliency in Software Defined Networking.","venue":"FNC/MobiSPC","pages":"680-685","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/VaghaniL14","doi":"10.1016/J.PROCS.2014.07.097","ee":"https://doi.org/10.1016/j.procs.2014.07.097","url":"https://dblp.org/rec/conf/fnc/VaghaniL14"}, "url":"URL#3855458" }, { "@score":"1", "@id":"3855459", "info":{"authors":{"author":[{"@pid":"151/3291","text":"Damián Vicino"},{"@pid":"l/ChungHorngLung","text":"Chung-Horng Lung"},{"@pid":"w/GAWainer","text":"Gabriel A. Wainer"},{"@pid":"37/6988","text":"Olivier Dalle"}]},"title":"Evaluating the Impact of Software-defined Networks' Reactive Routing on BitTorrent Performance.","venue":"FNC/MobiSPC","pages":"668-673","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/VicinoLWD14","doi":"10.1016/J.PROCS.2014.07.095","ee":"https://doi.org/10.1016/j.procs.2014.07.095","url":"https://dblp.org/rec/conf/fnc/VicinoLWD14"}, "url":"URL#3855459" }, { "@score":"1", "@id":"3855460", "info":{"authors":{"author":[{"@pid":"27/10801","text":"Xuyu Wang"},{"@pid":"52/3003","text":"Shiwen Mao"},{"@pid":"82/3121","text":"Santosh Pandey"},{"@pid":"65/6018","text":"Prathima Agrawal"}]},"title":"CA2T: Cooperative Antenna Arrays Technique for Pinpoint Indoor Localization.","venue":"FNC/MobiSPC","pages":"392-399","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/WangMPA14","doi":"10.1016/J.PROCS.2014.07.044","ee":"https://doi.org/10.1016/j.procs.2014.07.044","url":"https://dblp.org/rec/conf/fnc/WangMPA14"}, "url":"URL#3855460" }, { "@score":"1", "@id":"3855461", "info":{"authors":{"author":[{"@pid":"80/5294-7","text":"Miao Wang 0007"},{"@pid":"292/9191","text":"Guiling Wang 0001"},{"@pid":"181/2690-2","text":"Jie Tian 0002"},{"@pid":"70/4113","text":"Hanwen Zhang"},{"@pid":"76/5703","text":"Yujun Zhang"}]},"title":"An Accurate and Multi-faceted Reputation Scheme for Cloud Computing.","venue":"FNC/MobiSPC","pages":"466-473","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/WangWTZZ14","doi":"10.1016/J.PROCS.2014.07.021","ee":"https://doi.org/10.1016/j.procs.2014.07.021","url":"https://dblp.org/rec/conf/fnc/WangWTZZ14"}, "url":"URL#3855461" }, { "@score":"1", "@id":"3855462", "info":{"authors":{"author":[{"@pid":"37/1629","text":"Lin Zhang"},{"@pid":"99/6241","text":"Kun Hua"},{"@pid":"70/5417-1","text":"Honggang Wang 0001"},{"@pid":"89/1873","text":"Guanqun Qian"},{"@pid":"89/5992-29","text":"Li Zhang 0029"}]},"title":"Sentiment Analysis on Reviews of Mobile Users.","venue":"FNC/MobiSPC","pages":"458-465","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/fnc/ZhangHWQZ14","doi":"10.1016/J.PROCS.2014.07.013","ee":"https://doi.org/10.1016/j.procs.2014.07.013","url":"https://dblp.org/rec/conf/fnc/ZhangHWQZ14"}, "url":"URL#3855462" }, { "@score":"1", "@id":"3963919", "info":{"title":"The 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20, 2014, Niagara Falls, Canada","venue":["FNC/MobiSPC","Procedia Computer Science"],"volume":"34","publisher":"Elsevier","year":"2014","type":"Editorship","key":"conf/fnc/2014","ee":"https://www.sciencedirect.com/science/journal/18770509/34/","url":"https://dblp.org/rec/conf/fnc/2014"}, "url":"URL#3963919" } ] } } } )