Default Cover Image

2015 IEEE Symposium on Computers and Communication (ISCC)

July 6 2015 to July 9 2015

Larnaca, Cyprus

Table of Contents

IndexFreely available from IEEE.pp. 1-1
ProgramFreely available from IEEE.pp. 1-28
CommitteesFreely available from IEEE.pp. 1-5
Relaying for 5G: A novel low-error relaying protocolFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
A map-based platform for smart mobility servicesFull-text access may be available. Sign in or learn about subscription options.pp. 19-24
Design and implement delay-aware QoS scheme for 3GPP LTE/LTE-A networks for mixed traffic flowFull-text access may be available. Sign in or learn about subscription options.pp. 38-44
Advanced vehicular sensing of road artifacts and driver behaviorFull-text access may be available. Sign in or learn about subscription options.pp. 45-49
Performance of two-hop routing in delay tolerant networks with selfish nodesFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
A first study on using MPTCP to reduce latency for cloud based mobile applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 64-69
A probabilistic model to corroborate three attacks in vehicular ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Online electric vehicle recharge scheduling under different e-mobility operator's pricing modelsFull-text access may be available. Sign in or learn about subscription options.pp. 76-82
Fair pricing mechanism for coalitions in rural areasFull-text access may be available. Sign in or learn about subscription options.pp. 83-90
RT-SENMOS: Reliable transport for sensor networks with mobile sinksFull-text access may be available. Sign in or learn about subscription options.pp. 105-110
Utilizing CAN-Bus and smartphones to enforce safe and responsible drivingFull-text access may be available. Sign in or learn about subscription options.pp. 111-115
Distributed delivery of popular videos over Ultra-dense networksFull-text access may be available. Sign in or learn about subscription options.pp. 116-121
Time Petri Nets for performance evaluation of composite web services architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
Extensive analysis of the Kad-based distributed computing system DuDEFull-text access may be available. Sign in or learn about subscription options.pp. 128-133
A comparative study of mobile database transaction modelsFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Forensic analysis of instagram and path on an iPhone 5s mobile deviceFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Inferring relevance and presence of evidence in service-oriented and SaaS architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 152-159
Genetic algorithm based intrusion detection system for wireless body area networksFull-text access may be available. Sign in or learn about subscription options.pp. 160-165
Social-based forwarding in multi-channel vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 166-173
A shim layer for heterogeneous wireless communications scheduling in intelligent transport systemsFull-text access may be available. Sign in or learn about subscription options.pp. 174-179
Internet of Things: Security vulnerabilities and challengesFull-text access may be available. Sign in or learn about subscription options.pp. 180-187
Distributed sensor network for vehicles with prior right detectionFull-text access may be available. Sign in or learn about subscription options.pp. 188-192
Monitoring of water level based on acoustic emissionsFull-text access may be available. Sign in or learn about subscription options.pp. 193-197
Monitoring and recognition of bird population in protected bird territoryFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Discovery of services in smart cities of mobile social usersFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
Encryption as a service for smart grid advanced metering infrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 216-221
Finding contextual clues to malware using a large corpusFull-text access may be available. Sign in or learn about subscription options.pp. 229-236
Forensic analysis of windows user space applications through heap allocationsFull-text access may be available. Sign in or learn about subscription options.pp. 237-244
Events and causal factors charting of kernel traces for root cause analysisFull-text access may be available. Sign in or learn about subscription options.pp. 245-250
Energy-efficient base station management in heterogeneous networking environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
A two-dimensional structured overlay based on flexible routing tablesFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
Discovering high-impact routing events using traceroutesFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
A fine-tuned control-theoretic approach for dynamic adaptive streaming over HTTPFull-text access may be available. Sign in or learn about subscription options.pp. 301-308
Modeling user interactions for conversion rate prediction in M-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
A lightweight, non-intrusive approach for orchestrating autonomously-managed network elementsFull-text access may be available. Sign in or learn about subscription options.pp. 335-340
Analysing traffic flows through sampling: A comparative studyFull-text access may be available. Sign in or learn about subscription options.pp. 341-346
Improving network traffic acquisition and processing with the Java Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 347-352
Prediction-based connection manager for vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 353-358
Communication as a service for cloud VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 371-377
Mining user check-in features for location classification in location-based social networksFull-text access may be available. Sign in or learn about subscription options.pp. 385-390
Minimizing signaling cost in green routing for software defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
Evaluating the impact of network I/O on ultra-low delay packet switchingFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
Optimizing the SDN control-plane performance of the Openvswitch software switchFull-text access may be available. Sign in or learn about subscription options.pp. 403-408
Two-phase load balancing of In-Memory Key-Value Storages through NFV and SDNFull-text access may be available. Sign in or learn about subscription options.pp. 409-414
Container-based network function virtualization for software-defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 415-420
Is it really worth to peer at IXPs? A comparative studyFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
Experimenting with alternative path tracing solutionsFull-text access may be available. Sign in or learn about subscription options.pp. 427-432
Design of roadside communication infrastructure with QoS guaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 439-444
EDCA virtual collision performance evaluation and mobility modeling in V2I communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 463-470
Acoustic model parameter estimation using distributed incremental adaptive networksFull-text access may be available. Sign in or learn about subscription options.pp. 471-476
Performance of perceptual 1-bit compressed sensing for audio compressionFull-text access may be available. Sign in or learn about subscription options.pp. 477-482
Towards MEF services in a SDN environmentFull-text access may be available. Sign in or learn about subscription options.pp. 489-495
Constructing an optimal spanning tree over a hybrid network with SDN and legacy switchesFull-text access may be available. Sign in or learn about subscription options.pp. 502-507
OpenFlow and services in the cloud: Core network demonstratorFull-text access may be available. Sign in or learn about subscription options.pp. 508-513
A metric-correlation-based fault detection approach using clustering analysis in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 526-531
Estimating queue formation rate in Wireless Sensor Networks using a fluid dynamic modelFull-text access may be available. Sign in or learn about subscription options.pp. 544-548
Contribution aware task allocation in sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 549-554
MuLTI: Multiple location tags inference for users in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 555-561
CIUV: Collaborating information against unreliable viewsFull-text access may be available. Sign in or learn about subscription options.pp. 568-573
Cracker: Crumbling large graphs into connected componentsFull-text access may be available. Sign in or learn about subscription options.pp. 574-581
Design and optimization for distributed indexing scheme in switch-centric cloud storage systemFull-text access may be available. Sign in or learn about subscription options.pp. 582-587
NF-Dedupe: A novel no-fingerprint deduplication scheme for flash-based SSDsFull-text access may be available. Sign in or learn about subscription options.pp. 588-594
SKVM: Scaling in-memory Key-Value store on multicoreFull-text access may be available. Sign in or learn about subscription options.pp. 601-606
Towards making accessible human-interaction proofs more secure and usableFull-text access may be available. Sign in or learn about subscription options.pp. 607-612
Showing 100 out of 174