Ausgabe 2/2018
Inhalt (15 Artikel)
Self-organizing technique for improving coverage in connected mobile objects networks
Sofiane Hamrioui, Pascal Lorenz, Jaime Lloret
Price competition between a macrocell and a small-cell service provider with limited resources and optimal bandwidth user subscription: a game-theoretical model
Julián Romero, Luis Guijarro, Vicent Pla, Jose R. Vidal
Determining the number of true different permutation polynomials of degrees up to five by Weng and Dong algorithm
Lucian Trifina, Daniela Tarniceriu
Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
Yaser Jararweh, Haythem A. Bany Salameh, Abdallah Alturani, Loai Tawalbeh, Houbing Song
ReDePoly: reducing delays in multi-channel P2P live streaming systems using distributed intelligence
Abdulbaghi Ghaderzadeh, Mehdi Kargahi, Midia Reshadi
Defending against phishing attacks: taxonomy of methods, current issues and future directions
B. B. Gupta, Nalin A. G. Arachchilage, Kostas E. Psannis
Performance analysis of end-to-end SNR estimators for AF relaying
Yulin Zhou, Yunfei Chen
A queueing model of an energy harvesting sensor node with data buffering
Eline De Cuypere, Koen De Turck, Dieter Fiems
Budget-constraint mechanism for incremental multi-labeling crowdsensing
Jiajun Sun, Ningzhong Liu, Dianliang Wu
Design, implementation and performance evaluation of a proactive overload control mechanism for networks of SIP servers
Ahmadreza Montazerolghaem, M. H. Yaghmaee Moghaddam
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Rahul Kumar
Challenges and research directions for Internet of Things
Sarra Hammoudi, Zibouda Aliouat, Saad Harous