callback( { "result":{ "query":":facetid:toc:\"db/conf/iscc/iscc2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"206.60" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"223", "@dc":"223", "@oc":"223", "@id":"43304623", "text":":facetid:toc:db/conf/iscc/iscc2017.bht" } }, "hits":{ "@total":"223", "@computed":"223", "@sent":"223", "@first":"0", "hit":[{ "@score":"1", "@id":"2952874", "info":{"authors":{"author":[{"@pid":"178/3163","text":"Mohamed S. Abdalzaher"},{"@pid":"65/3089","text":"Karim G. Seddik"},{"@pid":"89/653","text":"Osamu Muta"}]},"title":"Using repeated game for maximizing high priority data trustworthiness in Wireless Sensor Networks.","venue":"ISCC","pages":"552-557","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AbdalzaherSM17","doi":"10.1109/ISCC.2017.8024586","ee":"https://doi.org/10.1109/ISCC.2017.8024586","url":"https://dblp.org/rec/conf/iscc/AbdalzaherSM17"}, "url":"URL#2952874" }, { "@score":"1", "@id":"2952875", "info":{"authors":{"author":[{"@pid":"178/3163","text":"Mohamed S. Abdalzaher"},{"@pid":"65/3089","text":"Karim G. Seddik"},{"@pid":"89/653","text":"Osamu Muta"}]},"title":"An effective Stackelberg game for high-assurance of data trustworthiness in WSNs.","venue":"ISCC","pages":"1257-1262","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AbdalzaherSM17a","doi":"10.1109/ISCC.2017.8024697","ee":"https://doi.org/10.1109/ISCC.2017.8024697","url":"https://dblp.org/rec/conf/iscc/AbdalzaherSM17a"}, "url":"URL#2952875" }, { "@score":"1", "@id":"2952876", "info":{"authors":{"author":[{"@pid":"203/9569","text":"Keyvan Aghababaiyan"},{"@pid":"49/215","text":"Behrouz Maham"}]},"title":"Error probability analysis of neuro-spike communication channel.","venue":"ISCC","pages":"932-937","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AghababaiyanM17","doi":"10.1109/ISCC.2017.8024645","ee":"https://doi.org/10.1109/ISCC.2017.8024645","url":"https://dblp.org/rec/conf/iscc/AghababaiyanM17"}, "url":"URL#2952876" }, { "@score":"1", "@id":"2952877", "info":{"authors":{"author":[{"@pid":"205/5545","text":"Georgi A. Ajaeiya"},{"@pid":"160/8268","text":"Nareg Adalian"},{"@pid":"36/7745","text":"Imad H. Elhajj"},{"@pid":"71/5990","text":"Ayman I. Kayssi"},{"@pid":"88/5173","text":"Ali Chehab"}]},"title":"Flow-based Intrusion Detection System for SDN.","venue":"ISCC","pages":"787-793","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AjaeiyaAEKC17","doi":"10.1109/ISCC.2017.8024623","ee":"https://doi.org/10.1109/ISCC.2017.8024623","url":"https://dblp.org/rec/conf/iscc/AjaeiyaAEKC17"}, "url":"URL#2952877" }, { "@score":"1", "@id":"2952878", "info":{"authors":{"author":[{"@pid":"139/6593","text":"Bayram Cevdet Akdeniz"},{"@pid":"29/3532","text":"Ali Emre Pusane"},{"@pid":"72/592","text":"Tuna Tugcu"}]},"title":"2-D channel transfer function for Molecular Communication with an absorbing receiver.","venue":"ISCC","pages":"938-942","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AkdenizPT17","doi":"10.1109/ISCC.2017.8024646","ee":"https://doi.org/10.1109/ISCC.2017.8024646","url":"https://dblp.org/rec/conf/iscc/AkdenizPT17"}, "url":"URL#2952878" }, { "@score":"1", "@id":"2952879", "info":{"authors":{"author":[{"@pid":"10/11063","text":"Mustafa Al-Bado"},{"@pid":"s/CJSreenan","text":"Cormac J. Sreenan"},{"@pid":"49/1220","text":"Kenneth N. Brown"}]},"title":"RCBurst: A mechanism to mitigate the impact of hidden terminals in home WLANs.","venue":"ISCC","pages":"918-923","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Al-BadoSB17","doi":"10.1109/ISCC.2017.8024643","ee":"https://doi.org/10.1109/ISCC.2017.8024643","url":"https://dblp.org/rec/conf/iscc/Al-BadoSB17"}, "url":"URL#2952879" }, { "@score":"1", "@id":"2952880", "info":{"authors":{"author":[{"@pid":"118/5729","text":"Mohammad Aghababaie Alavijeh"},{"@pid":"49/215","text":"Behrouz Maham"},{"@pid":"83/514","text":"Zhu Han 0001"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Truthful spectrum auction for efficient anti-jamming in cognitive radio networks.","venue":"ISCC","pages":"742-747","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AlavijehMHS17","doi":"10.1109/ISCC.2017.8024616","ee":"https://doi.org/10.1109/ISCC.2017.8024616","url":"https://dblp.org/rec/conf/iscc/AlavijehMHS17"}, "url":"URL#2952880" }, { "@score":"1", "@id":"2952881", "info":{"authors":{"author":[{"@pid":"184/6155","text":"Hussain Albarakati"},{"@pid":"124/8380","text":"Abdelfattah Amamra"},{"@pid":"91/5543","text":"Raafat S. Elfouly"},{"@pid":"a/RedaAAmmar","text":"Reda A. Ammar"}]},"title":"Reconfigurable underwater embedded systems architectures.","venue":"ISCC","pages":"1372-1379","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AlbarakatiAEA17","doi":"10.1109/ISCC.2017.8024715","ee":"https://doi.org/10.1109/ISCC.2017.8024715","url":"https://dblp.org/rec/conf/iscc/AlbarakatiAEA17"}, "url":"URL#2952881" }, { "@score":"1", "@id":"2952882", "info":{"authors":{"author":[{"@pid":"205/5561","text":"Cristhiana Carine Albert"},{"@pid":"65/2127","text":"Luiz Paulo Luna de Oliveira"},{"@pid":"40/6934","text":"Marta Becker Villamil"}]},"title":"Opinion dynamics: A study of the relation between status and communicability.","venue":"ISCC","pages":"1231-1236","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AlbertOV17","doi":"10.1109/ISCC.2017.8024693","ee":"https://doi.org/10.1109/ISCC.2017.8024693","url":"https://dblp.org/rec/conf/iscc/AlbertOV17"}, "url":"URL#2952882" }, { "@score":"1", "@id":"2952883", "info":{"authors":{"author":[{"@pid":"205/5499","text":"Isam Mashhour Aljawarneh"},{"@pid":"b/PaoloBellavista","text":"Paolo Bellavista"},{"@pid":"90/2390","text":"Antonio Corradi"},{"@pid":"38/5309","text":"Rebecca Montanari"},{"@pid":"11/2127","text":"Luca Foschini 0001"},{"@pid":"205/5517","text":"Andrea Zanotti"}]},"title":"Efficient spark-based framework for big geospatial data query processing and analysis.","venue":"ISCC","pages":"851-856","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AljawarnehBCMFZ17","doi":"10.1109/ISCC.2017.8024633","ee":"https://doi.org/10.1109/ISCC.2017.8024633","url":"https://dblp.org/rec/conf/iscc/AljawarnehBCMFZ17"}, "url":"URL#2952883" }, { "@score":"1", "@id":"2952884", "info":{"authors":{"author":[{"@pid":"150/7911","text":"Naama Amdouni"},{"@pid":"24/3792","text":"Taoufik Aguili"}]},"title":"On the impact of traffic rerouting and set-up delay tolerance on connection provisioning in dynamic WDM transparent networks with QoT constraints.","venue":"ISCC","pages":"333-338","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AmdouniA17","doi":"10.1109/ISCC.2017.8024552","ee":"https://doi.org/10.1109/ISCC.2017.8024552","url":"https://dblp.org/rec/conf/iscc/AmdouniA17"}, "url":"URL#2952884" }, { "@score":"1", "@id":"2952885", "info":{"authors":{"author":[{"@pid":"193/4959","text":"Hamza Ben Ammar"},{"@pid":"60/10808","text":"Soraya Ait Chellouche"},{"@pid":"63/2677","text":"Yassine Hadjadj Aoul"}]},"title":"A Markov chain-based Approximation of CCN caching Systems.","venue":"ISCC","pages":"327-332","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AmmarCA17","doi":"10.1109/ISCC.2017.8024551","ee":"https://doi.org/10.1109/ISCC.2017.8024551","url":"https://dblp.org/rec/conf/iscc/AmmarCA17"}, "url":"URL#2952885" }, { "@score":"1", "@id":"2952886", "info":{"authors":{"author":{"@pid":"79/4240","text":"Alessandro Amoroso"}},"title":"Preliminary considerations on approaching computer forensic.","venue":"ISCC","pages":"117-121","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Amoroso17","doi":"10.1109/ISCC.2017.8024515","ee":"https://doi.org/10.1109/ISCC.2017.8024515","url":"https://dblp.org/rec/conf/iscc/Amoroso17"}, "url":"URL#2952886" }, { "@score":"1", "@id":"2952887", "info":{"authors":{"author":[{"@pid":"96/9718","text":"Adam Amos-Binks"},{"@pid":"159/7153","text":"Joshua Clark"},{"@pid":"205/5557","text":"Kirk Weston"},{"@pid":"159/0102","text":"Michael Winters"},{"@pid":"13/13","text":"Khaled Harfoush"}]},"title":"Efficient attack plan recognition using automated planning.","venue":"ISCC","pages":"1001-1006","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Amos-BinksCWWH17","doi":"10.1109/ISCC.2017.8024656","ee":"https://doi.org/10.1109/ISCC.2017.8024656","url":"https://dblp.org/rec/conf/iscc/Amos-BinksCWWH17"}, "url":"URL#2952887" }, { "@score":"1", "@id":"2952888", "info":{"authors":{"author":[{"@pid":"08/5386","text":"Emilio Ancillotti"},{"@pid":"54/6854-1","text":"Raffaele Bruno 0001"}]},"title":"Comparison of CoAP and CoCoA+ congestion control mechanisms for different IoT application scenarios.","venue":"ISCC","pages":"1186-1192","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AncillottiB17","doi":"10.1109/ISCC.2017.8024686","ee":"https://doi.org/10.1109/ISCC.2017.8024686","url":"https://dblp.org/rec/conf/iscc/AncillottiB17"}, "url":"URL#2952888" }, { "@score":"1", "@id":"2952889", "info":{"authors":{"author":[{"@pid":"61/10089","text":"David Aragão"},{"@pid":"12/3830","text":"Dario Vieira"},{"@pid":"37/3973","text":"Miguel Franklin de Castro"}]},"title":"A mechanism to control the congestion in machine-to-machine communication in LTE-A networks.","venue":"ISCC","pages":"794-797","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AragaoVC17","doi":"10.1109/ISCC.2017.8024624","ee":"https://doi.org/10.1109/ISCC.2017.8024624","url":"https://dblp.org/rec/conf/iscc/AragaoVC17"}, "url":"URL#2952889" }, { "@score":"1", "@id":"2952890", "info":{"authors":{"author":[{"@pid":"170/8311","text":"Tiago Brasileiro Araújo"},{"@pid":"59/4336","text":"Carlos Eduardo Santos Pires"},{"@pid":"170/8225","text":"Thiago Pereira da Nóbrega"}]},"title":"Spark-based Streamlined Metablocking.","venue":"ISCC","pages":"844-850","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/AraujoPN17","doi":"10.1109/ISCC.2017.8024632","ee":"https://doi.org/10.1109/ISCC.2017.8024632","url":"https://dblp.org/rec/conf/iscc/AraujoPN17"}, "url":"URL#2952890" }, { "@score":"1", "@id":"2952891", "info":{"authors":{"author":[{"@pid":"199/8153","text":"Sabrine Aroua"},{"@pid":"60/5168","text":"Inès El Korbi"},{"@pid":"g/YacineGhamriDoudane","text":"Yacine Ghamri-Doudane"},{"@pid":"77/6522","text":"Leïla Azouz Saïdane"}]},"title":"A distributed Cooperative Spectrum Resource Allocation in smart home cognitive wireless sensor networks.","venue":"ISCC","pages":"754-759","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ArouaKGS17","doi":"10.1109/ISCC.2017.8024618","ee":"https://doi.org/10.1109/ISCC.2017.8024618","url":"https://dblp.org/rec/conf/iscc/ArouaKGS17"}, "url":"URL#2952891" }, { "@score":"1", "@id":"2952892", "info":{"authors":{"author":[{"@pid":"148/9126","text":"Martin Backhaus"},{"@pid":"64/4710","text":"Guenter Schaefer"}]},"title":"Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut.","venue":"ISCC","pages":"1332-1337","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BackhausS17","doi":"10.1109/ISCC.2017.8024709","ee":"https://doi.org/10.1109/ISCC.2017.8024709","url":"https://dblp.org/rec/conf/iscc/BackhausS17"}, "url":"URL#2952892" }, { "@score":"1", "@id":"2952893", "info":{"authors":{"author":[{"@pid":"185/7370","text":"Ashutosh Baheti"},{"@pid":"g/ArobindaGupta","text":"Arobinda Gupta"}]},"title":"Non-linear barrier coverage using mobile wireless sensors.","venue":"ISCC","pages":"804-809","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BahetiG17","doi":"10.1109/ISCC.2017.8024626","ee":"https://doi.org/10.1109/ISCC.2017.8024626","url":"https://dblp.org/rec/conf/iscc/BahetiG17"}, "url":"URL#2952893" }, { "@score":"1", "@id":"2952894", "info":{"authors":{"author":[{"@pid":"91/6242","text":"Xu Bai"},{"@pid":"96/1994-3","text":"Lei Jiang 0003"},{"@pid":"147/6772","text":"Qiong Dai"},{"@pid":"23/8420","text":"Jiajia Yang"},{"@pid":"19/336","text":"Jianlong Tan"}]},"title":"Acceleration of RSA processes based on hybrid ARM-FPGA cluster.","venue":"ISCC","pages":"682-688","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BaiJDYT17","doi":"10.1109/ISCC.2017.8024607","ee":"https://doi.org/10.1109/ISCC.2017.8024607","url":"https://dblp.org/rec/conf/iscc/BaiJDYT17"}, "url":"URL#2952894" }, { "@score":"1", "@id":"2952895", "info":{"authors":{"author":[{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"64/4583","text":"Franco Chiaraluce"},{"@pid":"180/5888","text":"Linda Senigagliesi"},{"@pid":"83/522","text":"Luca Spalazzi"},{"@pid":"44/5060","text":"Francesco Spegni"}]},"title":"Security in heterogeneous distributed storage systems: A practically achievable information-theoretic approach.","venue":"ISCC","pages":"1021-1028","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BaldiCSSS17","doi":"10.1109/ISCC.2017.8024659","ee":"https://doi.org/10.1109/ISCC.2017.8024659","url":"https://dblp.org/rec/conf/iscc/BaldiCSSS17"}, "url":"URL#2952895" }, { "@score":"1", "@id":"2952896", "info":{"authors":{"author":[{"@pid":"50/8280","text":"Pradeep Bangera"},{"@pid":"70/654","text":"Syed Hasan"},{"@pid":"50/4752","text":"Sergey Gorinsky"}]},"title":"An advertising revenue model for access ISPs.","venue":"ISCC","pages":"582-589","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BangeraHG17","doi":"10.1109/ISCC.2017.8024591","ee":"https://doi.org/10.1109/ISCC.2017.8024591","url":"https://dblp.org/rec/conf/iscc/BangeraHG17"}, "url":"URL#2952896" }, { "@score":"1", "@id":"2952897", "info":{"authors":{"author":[{"@pid":"148/6376","text":"Yassine Banouar"},{"@pid":"74/2587","text":"Thierry Monteil 0001"},{"@pid":"44/6787","text":"Christophe Chassot"}]},"title":"Analytical model for adaptive QoS management at the Middleware level in IoT.","venue":"ISCC","pages":"1201-1208","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Banouar0C17","doi":"10.1109/ISCC.2017.8024688","ee":"https://doi.org/10.1109/ISCC.2017.8024688","url":"https://dblp.org/rec/conf/iscc/Banouar0C17"}, "url":"URL#2952897" }, { "@score":"1", "@id":"2952898", "info":{"authors":{"author":[{"@pid":"205/5491","text":"Marco Begolo"},{"@pid":"205/5569","text":"Sebastiano Valle"},{"@pid":"140/0821","text":"Marco Zanella"},{"@pid":"31/8928","text":"Armir Bujari"},{"@pid":"63/2763","text":"Ombretta Gaggi"},{"@pid":"43/425","text":"Claudio E. Palazzi"}]},"title":"Multipong: A multiplayer ad-hoc version of Pong.","venue":"ISCC","pages":"23-28","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BegoloVZBGP17","doi":"10.1109/ISCC.2017.8024499","ee":"https://doi.org/10.1109/ISCC.2017.8024499","url":"https://dblp.org/rec/conf/iscc/BegoloVZBGP17"}, "url":"URL#2952898" }, { "@score":"1", "@id":"2952899", "info":{"authors":{"author":[{"@pid":"195/6933","text":"Mauricio Bertanha"},{"@pid":"44/164","text":"Richard W. Pazzi"}]},"title":"JLPR: Joint range-based localization using trilateration and packet routing in Wireless Sensor Networks with mobile sinks.","venue":"ISCC","pages":"645-650","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BertanhaP17","doi":"10.1109/ISCC.2017.8024601","ee":"https://doi.org/10.1109/ISCC.2017.8024601","url":"https://dblp.org/rec/conf/iscc/BertanhaP17"}, "url":"URL#2952899" }, { "@score":"1", "@id":"2952900", "info":{"authors":{"author":[{"@pid":"166/8810","text":"David Beserra"},{"@pid":"09/650","text":"Manuele Kirsch-Pinheiro"},{"@pid":"s/CarineSouveyet","text":"Carine Souveyet"},{"@pid":"b/LuizAngeloBarchet","text":"Luiz Angelo Steffenel"},{"@pid":"m/EdwardDMoreno","text":"Edward David Moreno"}]},"title":"Comparing the performance of OS-level virtualization tools in SoC-based systems: The case of I/O-bound applications.","venue":"ISCC","pages":"627-632","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BeserraKSSM17","doi":"10.1109/ISCC.2017.8024598","ee":"https://doi.org/10.1109/ISCC.2017.8024598","url":"https://dblp.org/rec/conf/iscc/BeserraKSSM17"}, "url":"URL#2952900" }, { "@score":"1", "@id":"2952901", "info":{"authors":{"author":[{"@pid":"135/3117","text":"Lieven Billiet"},{"@pid":"60/5071","text":"Sabine Van Huffel"},{"@pid":"20/6861","text":"Vanya Van Belle"}]},"title":"Interval Coded Scoring extensions for larger problems.","venue":"ISCC","pages":"198-203","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BillietHB17","doi":"10.1109/ISCC.2017.8024529","ee":"https://doi.org/10.1109/ISCC.2017.8024529","url":"https://dblp.org/rec/conf/iscc/BillietHB17"}, "url":"URL#2952901" }, { "@score":"1", "@id":"2952902", "info":{"authors":{"author":[{"@pid":"182/0309","text":"Alex F. Bokov"},{"@pid":"182/0311","text":"Laura S. Manuel"},{"@pid":"55/2731","text":"Alfredo Tirado-Ramos"},{"@pid":"133/6281","text":"Jon A. Gelfond"},{"@pid":"205/5508","text":"Scott D. Pletcher"}]},"title":"Biologically relevant simulations for validating risk models under small-sample conditions.","venue":"ISCC","pages":"290-295","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BokovMTGP17","doi":"10.1109/ISCC.2017.8024544","ee":"https://doi.org/10.1109/ISCC.2017.8024544","url":"https://dblp.org/rec/conf/iscc/BokovMTGP17"}, "url":"URL#2952902" }, { "@score":"1", "@id":"2952903", "info":{"authors":{"author":[{"@pid":"205/5522","text":"Walid Bouksani"},{"@pid":"54/4923","text":"Boucif Amar Bensaber"}]},"title":"An efficient and dynamic pseudonyms change system for privacy in VANET.","venue":"ISCC","pages":"59-63","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BouksaniB17","doi":"10.1109/ISCC.2017.8024505","ee":"https://doi.org/10.1109/ISCC.2017.8024505","url":"https://dblp.org/rec/conf/iscc/BouksaniB17"}, "url":"URL#2952903" }, { "@score":"1", "@id":"2952904", "info":{"authors":{"author":[{"@pid":"205/5510","text":"Athanasios Bousios"},{"@pid":"41/308","text":"Damianos Gavalas"},{"@pid":"92/6147","text":"Lambros Lambrinos"}]},"title":"CityCare: Crowdsourcing daily life issue reports in smart cities.","venue":"ISCC","pages":"266-271","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BousiosGL17","doi":"10.1109/ISCC.2017.8024540","ee":"https://doi.org/10.1109/ISCC.2017.8024540","url":"https://dblp.org/rec/conf/iscc/BousiosGL17"}, "url":"URL#2952904" }, { "@score":"1", "@id":"2952905", "info":{"authors":{"author":[{"@pid":"94/1123","text":"Serdar Boztas"},{"@pid":"13/2591","text":"Benjamin A. Burton"}]},"title":"Randomness testing and comparison of classical and quantum bit generators.","venue":"ISCC","pages":"1029-1032","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BoztasB17","doi":"10.1109/ISCC.2017.8024660","ee":"https://doi.org/10.1109/ISCC.2017.8024660","url":"https://dblp.org/rec/conf/iscc/BoztasB17"}, "url":"URL#2952905" }, { "@score":"1", "@id":"2952906", "info":{"authors":{"author":[{"@pid":"176/1035","text":"Celso A. R. L. Brennand"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"},{"@pid":"123/3499","text":"Rodolfo Ipolito Meneguette"},{"@pid":"64/7382","text":"Leandro A. Villas"}]},"title":"A novel urban traffic management mechanism based on FOG.","venue":"ISCC","pages":"377-382","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BrennandBMV17","doi":"10.1109/ISCC.2017.8024559","ee":"https://doi.org/10.1109/ISCC.2017.8024559","url":"https://dblp.org/rec/conf/iscc/BrennandBMV17"}, "url":"URL#2952906" }, { "@score":"1", "@id":"2952907", "info":{"authors":{"author":[{"@pid":"205/5472","text":"Karla Breschi"},{"@pid":"70/1074","text":"Julien Bernard 0001"}]},"title":"Construction of a minimum energy broadcast backbone with bounded delay in heterogeneous wireless sensor networks.","venue":"ISCC","pages":"1306-1311","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BreschiB17","doi":"10.1109/ISCC.2017.8024705","ee":"https://doi.org/10.1109/ISCC.2017.8024705","url":"https://dblp.org/rec/conf/iscc/BreschiB17"}, "url":"URL#2952907" }, { "@score":"1", "@id":"2952908", "info":{"authors":{"author":[{"@pid":"205/5515","text":"Mariana Ramos de Brito"},{"@pid":"50/5327","text":"Fátima de L. P. Duarte-Figueiredo"}]},"title":"D-Hop: A dynamic and distributed protocol for vehicle routing.","venue":"ISCC","pages":"1073-1078","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/BritoD17","doi":"10.1109/ISCC.2017.8024668","ee":"https://doi.org/10.1109/ISCC.2017.8024668","url":"https://dblp.org/rec/conf/iscc/BritoD17"}, "url":"URL#2952908" }, { "@score":"1", "@id":"2952909", "info":{"authors":{"author":[{"@pid":"83/8057","text":"Hatice Calik"},{"@pid":"86/6723","text":"Bernard Fortz"}]},"title":"Location of stations in a one-way electric car sharing system.","venue":"ISCC","pages":"134-139","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CalikF17","doi":"10.1109/ISCC.2017.8024518","ee":"https://doi.org/10.1109/ISCC.2017.8024518","url":"https://dblp.org/rec/conf/iscc/CalikF17"}, "url":"URL#2952909" }, { "@score":"1", "@id":"2952910", "info":{"authors":{"author":[{"@pid":"73/340","text":"Franco Callegati"},{"@pid":"199/0048","text":"Giovanni Delnevo"},{"@pid":"184/7813","text":"Andrea Melis 0001"},{"@pid":"83/4258","text":"Silvia Mirri"},{"@pid":"53/4448","text":"Marco Prandini"},{"@pid":"82/2986","text":"Paola Salomoni"}]},"title":"I want to ride my bicycle: A microservice-based use case for a MaaS architecture.","venue":"ISCC","pages":"18-22","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CallegatiDMMPS17","doi":"10.1109/ISCC.2017.8024498","ee":"https://doi.org/10.1109/ISCC.2017.8024498","url":"https://dblp.org/rec/conf/iscc/CallegatiDMMPS17"}, "url":"URL#2952910" }, { "@score":"1", "@id":"2952911", "info":{"authors":{"author":[{"@pid":"205/5542","text":"Lorenzo Carnevale"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"09/4135","text":"Maria Fazio"},{"@pid":"150/0117","text":"Placido Bramanti"},{"@pid":"70/450","text":"Massimo Villari"}]},"title":"How to enable clinical workflows to integrate big healthcare data.","venue":"ISCC","pages":"857-862","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CarnevaleCFBV17","doi":"10.1109/ISCC.2017.8024634","ee":"https://doi.org/10.1109/ISCC.2017.8024634","url":"https://dblp.org/rec/conf/iscc/CarnevaleCFBV17"}, "url":"URL#2952911" }, { "@score":"1", "@id":"2952912", "info":{"authors":{"author":[{"@pid":"27/2899","text":"Bülent Çatay"},{"@pid":"205/5481","text":"Merve Keskin"}]},"title":"The impact of quick charging stations on the route planning of Electric Vehicles.","venue":"ISCC","pages":"152-157","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CatayK17","doi":"10.1109/ISCC.2017.8024521","ee":"https://doi.org/10.1109/ISCC.2017.8024521","url":"https://dblp.org/rec/conf/iscc/CatayK17"}, "url":"URL#2952912" }, { "@score":"1", "@id":"2952913", "info":{"authors":{"author":[{"@pid":"166/2649","text":"Marco Cavallo"},{"@pid":"52/6324","text":"Giuseppe Di Modica"},{"@pid":"166/2250","text":"Carmelo Polito"},{"@pid":"43/5379","text":"Orazio Tomarchio"}]},"title":"Multi-job Hadoop scheduling to process geo-distributed big data.","venue":"ISCC","pages":"1175-1181","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CavalloMPT17","doi":"10.1109/ISCC.2017.8024684","ee":"https://doi.org/10.1109/ISCC.2017.8024684","url":"https://dblp.org/rec/conf/iscc/CavalloMPT17"}, "url":"URL#2952913" }, { "@score":"1", "@id":"2952914", "info":{"authors":{"author":[{"@pid":"184/5944","text":"Fabrizio Celesti"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"205/5542","text":"Lorenzo Carnevale"},{"@pid":"202/3093","text":"Antonino Galletta"},{"@pid":"184/5912","text":"Salvatore Campo"},{"@pid":"184/4995","text":"Agata Romano"},{"@pid":"150/0117","text":"Placido Bramanti"},{"@pid":"70/450","text":"Massimo Villari"}]},"title":"Big data analytics in genomics: The point on Deep Learning solutions.","venue":"ISCC","pages":"306-309","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CelestiCCGCRBV17","doi":"10.1109/ISCC.2017.8024547","ee":"https://doi.org/10.1109/ISCC.2017.8024547","url":"https://dblp.org/rec/conf/iscc/CelestiCCGCRBV17"}, "url":"URL#2952914" }, { "@score":"1", "@id":"2952915", "info":{"authors":{"author":{"@pid":"167/4898","text":"Edward W. Chandler"}},"title":"A TDMA data-buffering technique that provides minimum throughput delays while allowing time-slot reassignments without data-transfer interruptions.","venue":"ISCC","pages":"487-492","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Chandler17","doi":"10.1109/ISCC.2017.8024576","ee":"https://doi.org/10.1109/ISCC.2017.8024576","url":"https://dblp.org/rec/conf/iscc/Chandler17"}, "url":"URL#2952915" }, { "@score":"1", "@id":"2952916", "info":{"authors":{"author":[{"@pid":"163/3739","text":"Lunde Chen"},{"@pid":"94/1020","text":"Slim Abdellatif"},{"@pid":"48/5247","text":"Thierry Gayraud"},{"@pid":"80/5491","text":"Pascal Berthou"}]},"title":"A Steiner tree based approach for the efficient support of multipoint communications in a multi-domain context.","venue":"ISCC","pages":"316-321","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ChenAGB17","doi":"10.1109/ISCC.2017.8024549","ee":"https://doi.org/10.1109/ISCC.2017.8024549","url":"https://dblp.org/rec/conf/iscc/ChenAGB17"}, "url":"URL#2952916" }, { "@score":"1", "@id":"2952917", "info":{"authors":{"author":[{"@pid":"115/8601","text":"Gaojie Chen"},{"@pid":"78/2259","text":"Justin P. Coon"}]},"title":"Enhancing secrecy by full-duplex antenna selection in cognitive networks.","venue":"ISCC","pages":"540-545","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ChenC17","doi":"10.1109/ISCC.2017.8024584","ee":"https://doi.org/10.1109/ISCC.2017.8024584","url":"https://dblp.org/rec/conf/iscc/ChenC17"}, "url":"URL#2952917" }, { "@score":"1", "@id":"2952918", "info":{"authors":{"author":[{"@pid":"205/5551","text":"Zitao Chen"},{"@pid":"86/10615","text":"Laizhong Cui"},{"@pid":"74/1552-1","text":"Yong Jiang 0001"},{"@pid":"95/6543-1","text":"Zhi Wang 0001"}]},"title":"Understanding viewing engagement and video quality in a large-scale mobile video system.","venue":"ISCC","pages":"1271-1277","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ChenCJW17","doi":"10.1109/ISCC.2017.8024699","ee":"https://doi.org/10.1109/ISCC.2017.8024699","url":"https://dblp.org/rec/conf/iscc/ChenCJW17"}, "url":"URL#2952918" }, { "@score":"1", "@id":"2952919", "info":{"authors":{"author":[{"@pid":"74/5008","text":"Stefano Chessa"},{"@pid":"57/6165","text":"Michele Girolami"},{"@pid":"151/6127","text":"Fabio Mavilia"},{"@pid":"01/4693","text":"Gianluca Dini"},{"@pid":"116/4720","text":"Pericle Perazzo"},{"@pid":"204/4050","text":"Marco Rasori"}]},"title":"Sensing the cities with social-aware unmanned aerial vehicles.","venue":"ISCC","pages":"278-283","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ChessaGMDPR17","doi":"10.1109/ISCC.2017.8024542","ee":"https://doi.org/10.1109/ISCC.2017.8024542","url":"https://dblp.org/rec/conf/iscc/ChessaGMDPR17"}, "url":"URL#2952919" }, { "@score":"1", "@id":"2952920", "info":{"authors":{"author":[{"@pid":"27/6877","text":"Jacek Cichon"},{"@pid":"65/6606","text":"Maciej Gebala"},{"@pid":"35/3491","text":"Marcin Zawada"}]},"title":"Fault tolerant protocol for data collecting in wireless sensor networks.","venue":"ISCC","pages":"483-486","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CichonGZ17","doi":"10.1109/ISCC.2017.8024575","ee":"https://doi.org/10.1109/ISCC.2017.8024575","url":"https://dblp.org/rec/conf/iscc/CichonGZ17"}, "url":"URL#2952920" }, { "@score":"1", "@id":"2952921", "info":{"authors":{"author":[{"@pid":"23/7643","text":"Gianpiero Costantino"},{"@pid":"192/2137","text":"Antonio La Marra"},{"@pid":"m/FMartinelli","text":"Fabio Martinelli"},{"@pid":"119/6683","text":"Andrea Saracino"},{"@pid":"168/2454","text":"Mina Sheikhalishahi"}]},"title":"Privacy-preserving text mining as a service.","venue":"ISCC","pages":"890-897","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CostantinoMMSS17","doi":"10.1109/ISCC.2017.8024639","ee":"https://doi.org/10.1109/ISCC.2017.8024639","url":"https://dblp.org/rec/conf/iscc/CostantinoMMSS17"}, "url":"URL#2952921" }, { "@score":"1", "@id":"2952922", "info":{"authors":{"author":[{"@pid":"183/1858","text":"Leonardo Cotta"},{"@pid":"28/3311","text":"Pedro O. S. Vaz de Melo"},{"@pid":"l/AntonioAlfredoFerreiraLoureiro","text":"Antonio A. F. Loureiro"}]},"title":"Understanding the role of mobility in real mobile ad-hoc networks connectivity.","venue":"ISCC","pages":"1098-1103","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/CottaML17","doi":"10.1109/ISCC.2017.8024672","ee":"https://doi.org/10.1109/ISCC.2017.8024672","url":"https://dblp.org/rec/conf/iscc/CottaML17"}, "url":"URL#2952922" }, { "@score":"1", "@id":"2952923", "info":{"authors":{"author":[{"@pid":"128/3965","text":"Shuping Dang"},{"@pid":"78/2259","text":"Justin P. Coon"},{"@pid":"115/8601","text":"Gaojie Chen"},{"@pid":"164/5816","text":"David E. Simmons"}]},"title":"Outage performance analysis of multicarrier relay selection for cooperative networks.","venue":"ISCC","pages":"1104-1108","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DangCCS17","doi":"10.1109/ISCC.2017.8024673","ee":"https://doi.org/10.1109/ISCC.2017.8024673","url":"https://dblp.org/rec/conf/iscc/DangCCS17"}, "url":"URL#2952923" }, { "@score":"1", "@id":"2952924", "info":{"authors":{"author":[{"@pid":"88/10960","text":"Soham Das 0001"},{"@pid":"s/SartajSahni","text":"Sartaj Sahni"}]},"title":"Two-aggregator topology optimization without splitting in data center networks.","venue":"ISCC","pages":"310-315","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DasS17","doi":"10.1109/ISCC.2017.8024548","ee":"https://doi.org/10.1109/ISCC.2017.8024548","url":"https://dblp.org/rec/conf/iscc/DasS17"}, "url":"URL#2952924" }, { "@score":"1", "@id":"2952925", "info":{"authors":{"author":[{"@pid":"118/4463","text":"Julian Dibbelt"},{"@pid":"72/1509","text":"Dionisis D. Kehagias"},{"@pid":"88/2963","text":"Grammati E. Pantziou"},{"@pid":"41/308","text":"Damianos Gavalas"},{"@pid":"14/1116","text":"Charalampos Konstantopoulos"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"},{"@pid":"151/1545","text":"Kalliopi Giannakopoulou"},{"@pid":"18/6481","text":"Spyros C. Kontogiannis"},{"@pid":"z/CDZaroliagis","text":"Christos D. Zaroliagis"}]},"title":"Eco-aware vehicle routing in urban environments.","venue":"ISCC","pages":"208-213","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DibbeltKPGKWGKZ17","doi":"10.1109/ISCC.2017.8024531","ee":"https://doi.org/10.1109/ISCC.2017.8024531","url":"https://dblp.org/rec/conf/iscc/DibbeltKPGKWGKZ17"}, "url":"URL#2952925" }, { "@score":"1", "@id":"2952926", "info":{"authors":{"author":[{"@pid":"118/4463","text":"Julian Dibbelt"},{"@pid":"14/1116","text":"Charalampos Konstantopoulos"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"},{"@pid":"41/308","text":"Damianos Gavalas"},{"@pid":"18/6481","text":"Spyros C. Kontogiannis"},{"@pid":"z/CDZaroliagis","text":"Christos D. Zaroliagis"},{"@pid":"133/7681","text":"Vlasios Kasapakis"},{"@pid":"88/2963","text":"Grammati E. Pantziou"}]},"title":"Multimodal route and tour planning in urban environments.","venue":"ISCC","pages":"214-219","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DibbeltKWGKZKP17","doi":"10.1109/ISCC.2017.8024532","ee":"https://doi.org/10.1109/ISCC.2017.8024532","url":"https://dblp.org/rec/conf/iscc/DibbeltKWGKZKP17"}, "url":"URL#2952926" }, { "@score":"1", "@id":"2952927", "info":{"authors":{"author":[{"@pid":"115/6436","text":"William Diego"},{"@pid":"154/3509","text":"Isabelle Hamchaoui"},{"@pid":"37/6765","text":"Fabrice Guillemin"}]},"title":"SloMo: An implicit cross-layer mechanism for a better experience on mobile networks.","venue":"ISCC","pages":"1039-1042","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DiegoHG17","doi":"10.1109/ISCC.2017.8024662","ee":"https://doi.org/10.1109/ISCC.2017.8024662","url":"https://dblp.org/rec/conf/iscc/DiegoHG17"}, "url":"URL#2952927" }, { "@score":"1", "@id":"2952928", "info":{"authors":{"author":[{"@pid":"164/9899","text":"Crescenzo Diomaiuta"},{"@pid":"198/9857","text":"Maria Mercorella"},{"@pid":"59/2982","text":"Mario Ciampi"},{"@pid":"64/4882","text":"Giuseppe De Pietro"}]},"title":"A novel system for the automatic extraction of a patient problem summary.","venue":"ISCC","pages":"182-186","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DiomaiutaMCP17","doi":"10.1109/ISCC.2017.8024526","ee":"https://doi.org/10.1109/ISCC.2017.8024526","url":"https://dblp.org/rec/conf/iscc/DiomaiutaMCP17"}, "url":"URL#2952928" }, { "@score":"1", "@id":"2952929", "info":{"authors":{"author":[{"@pid":"14/3157","text":"Manos Dramitinos"},{"@pid":"02/668","text":"George D. Stamoulis"},{"@pid":"48/4644","text":"Håkon Lønsethagen"}]},"title":"5G wholesale services and pricing.","venue":"ISCC","pages":"570-575","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DramitinosSL17","doi":"10.1109/ISCC.2017.8024589","ee":"https://doi.org/10.1109/ISCC.2017.8024589","url":"https://dblp.org/rec/conf/iscc/DramitinosSL17"}, "url":"URL#2952929" }, { "@score":"1", "@id":"2952930", "info":{"authors":{"author":[{"@pid":"205/5563","text":"Elena Dzardanova"},{"@pid":"133/7681","text":"Vlasios Kasapakis"},{"@pid":"41/308","text":"Damianos Gavalas"}]},"title":"Affective impact of social presence in immersive 3D virtual worlds.","venue":"ISCC","pages":"6-11","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/DzardanovaKG17","doi":"10.1109/ISCC.2017.8024496","ee":"https://doi.org/10.1109/ISCC.2017.8024496","url":"https://dblp.org/rec/conf/iscc/DzardanovaKG17"}, "url":"URL#2952930" }, { "@score":"1", "@id":"2952931", "info":{"authors":{"author":[{"@pid":"58/8848","text":"Dimitrios Efstathiou"},{"@pid":"p/GeorgeDPapadopoulos","text":"George D. Papadopoulos"},{"@pid":"04/5697","text":"Despoina Tsipouridou"},{"@pid":"77/2216","text":"Fotini-Niovi Pavlidou"}]},"title":"Enhancement of transmission security for OFDM based systems.","venue":"ISCC","pages":"546-551","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/EfstathiouPTP17","doi":"10.1109/ISCC.2017.8024585","ee":"https://doi.org/10.1109/ISCC.2017.8024585","url":"https://dblp.org/rec/conf/iscc/EfstathiouPTP17"}, "url":"URL#2952931" }, { "@score":"1", "@id":"2952932", "info":{"authors":{"author":[{"@pid":"205/5531","text":"Patrick Elfert"},{"@pid":"30/5664","text":"Marco Eichelberg"},{"@pid":"53/10244","text":"Johannes Tröger"},{"@pid":"156/5783","text":"Jochen Britz"},{"@pid":"40/581","text":"Jan Alexandersson"},{"@pid":"182/6481","text":"Daniel Bieber"},{"@pid":"200/2186","text":"Jürgen M. Bauer"},{"@pid":"205/5556","text":"Susanne Teichmann"},{"@pid":"205/5552","text":"Ludwig Kuhn"},{"@pid":"40/9380","text":"Martin Thielen"},{"@pid":"205/5559","text":"Janina Sauer"},{"@pid":"205/5519","text":"Alexander Münzberg"},{"@pid":"93/8171","text":"Norbert Rösch"},{"@pid":"205/5490","text":"Julia Woizischke"},{"@pid":"205/5503","text":"Rebecca Diekmann"},{"@pid":"25/4650","text":"Andreas Hein 0001"}]},"title":"DiDiER - digitized services in dietary counselling for people with increased health risks related to malnutrition and food allergies.","venue":"ISCC","pages":"100-104","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ElfertETBABBTKT17","doi":"10.1109/ISCC.2017.8024512","ee":"https://doi.org/10.1109/ISCC.2017.8024512","url":"https://dblp.org/rec/conf/iscc/ElfertETBABBTKT17"}, "url":"URL#2952932" }, { "@score":"1", "@id":"2952933", "info":{"authors":{"author":[{"@pid":"149/5011","text":"Spyridon C. Evangelatos"},{"@pid":"205/5520","text":"Zannis Kalampoukis"},{"@pid":"205/5479","text":"Ioanna Fergadioti"},{"@pid":"185/7346","text":"Stelios Christofi"},{"@pid":"34/5428","text":"Bill Karakostas"},{"@pid":"03/3754","text":"Yannis Zorgios"}]},"title":"Service availability analysis of a multimodal travel planner using Stochastic Automata.","venue":"ISCC","pages":"146-151","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/EvangelatosKFCK17","doi":"10.1109/ISCC.2017.8024520","ee":"https://doi.org/10.1109/ISCC.2017.8024520","url":"https://dblp.org/rec/conf/iscc/EvangelatosKFCK17"}, "url":"URL#2952933" }, { "@score":"1", "@id":"2952934", "info":{"authors":{"author":[{"@pid":"d/IvanoeDeFalco","text":"Ivanoe De Falco"},{"@pid":"73/4826","text":"Umberto Scafuri"},{"@pid":"29/3971","text":"Ernesto Tarantino"},{"@pid":"60/2630","text":"Antonio Della Cioppa"}]},"title":"Accurate estimate of Blood Glucose through Interstitial Glucose by Genetic Programming.","venue":"ISCC","pages":"284-289","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/FalcoSTC17","doi":"10.1109/ISCC.2017.8024543","ee":"https://doi.org/10.1109/ISCC.2017.8024543","url":"https://dblp.org/rec/conf/iscc/FalcoSTC17"}, "url":"URL#2952934" }, { "@score":"1", "@id":"2952935", "info":{"authors":{"author":[{"@pid":"57/3779","text":"Joumana Farah"},{"@pid":"202/5593","text":"Elie Sfeir"},{"@pid":"72/1588","text":"Charbel Abdel Nour"},{"@pid":"70/3031","text":"Catherine Douillard"}]},"title":"New efficient energy-saving techniques for resource allocation in downlink OFDMA transmission systems.","venue":"ISCC","pages":"1056-1062","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/FarahSND17","doi":"10.1109/ISCC.2017.8024665","ee":"https://doi.org/10.1109/ISCC.2017.8024665","url":"https://dblp.org/rec/conf/iscc/FarahSND17"}, "url":"URL#2952935" }, { "@score":"1", "@id":"2952936", "info":{"authors":{"author":[{"@pid":"205/5568","text":"Hassan Fawaz"},{"@pid":"82/4450","text":"Samer Lahoud"},{"@pid":"127/4749","text":"Melhem El Helou"},{"@pid":"06/5704","text":"Marc Ibrahim"}]},"title":"Max-SINR scheduling in Full-Duplex OFDMA cellular networks with dynamic arrivals.","venue":"ISCC","pages":"493-498","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/FawazLHI17","doi":"10.1109/ISCC.2017.8024577","ee":"https://doi.org/10.1109/ISCC.2017.8024577","url":"https://dblp.org/rec/conf/iscc/FawazLHI17"}, "url":"URL#2952936" }, { "@score":"1", "@id":"2952937", "info":{"authors":{"author":[{"@pid":"205/5505","text":"Hayfa Fhima"},{"@pid":"14/2445","text":"Rafik Zayani"},{"@pid":"02/9206","text":"Hmaied Shaiek"},{"@pid":"47/5704","text":"Daniel Roviras"},{"@pid":"143/5145","text":"Bruno Sens Chang"},{"@pid":"43/5509","text":"Ridha Bouallegue"}]},"title":"Widely linear equalizer performance with multiple independent interferences.","venue":"ISCC","pages":"912-917","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/FhimaZSRCB17","doi":"10.1109/ISCC.2017.8024642","ee":"https://doi.org/10.1109/ISCC.2017.8024642","url":"https://dblp.org/rec/conf/iscc/FhimaZSRCB17"}, "url":"URL#2952937" }, { "@score":"1", "@id":"2952938", "info":{"authors":{"author":[{"@pid":"35/4324","text":"Marco Furini"},{"@pid":"83/4258","text":"Silvia Mirri"},{"@pid":"46/3976","text":"Manuela Montangero"}]},"title":"TagLecture: The gamification of video lecture indexing through quality-based tags.","venue":"ISCC","pages":"122-127","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/FuriniMM17","doi":"10.1109/ISCC.2017.8024516","ee":"https://doi.org/10.1109/ISCC.2017.8024516","url":"https://dblp.org/rec/conf/iscc/FuriniMM17"}, "url":"URL#2952938" }, { "@score":"1", "@id":"2952939", "info":{"authors":{"author":[{"@pid":"123/8682","text":"Konstantinos Fysarakis"},{"@pid":"90/3857","text":"Nikolaos E. Petroulakis"},{"@pid":"98/3419","text":"Andreas Roos"},{"@pid":"205/5498","text":"Khawar Abbasi"},{"@pid":"191/2277","text":"Petra Vizarreta"},{"@pid":"45/10104","text":"George P. Petropoulos"},{"@pid":"161/4526","text":"Ermin Sakic"},{"@pid":"13/1166","text":"George Spanoudakis"},{"@pid":"62/5706","text":"Ioannis G. Askoxylakis"}]},"title":"A Reactive Security Framework for operational wind parks using Service Function Chaining.","venue":"ISCC","pages":"663-668","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/FysarakisPRAVPS17","doi":"10.1109/ISCC.2017.8024604","ee":"https://doi.org/10.1109/ISCC.2017.8024604","url":"https://dblp.org/rec/conf/iscc/FysarakisPRAVPS17"}, "url":"URL#2952939" }, { "@score":"1", "@id":"2952940", "info":{"authors":{"author":[{"@pid":"202/3093","text":"Antonino Galletta"},{"@pid":"160/6868","text":"Lilla Bonanno"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"199/5062","text":"Silvia Marino"},{"@pid":"150/0117","text":"Placido Bramanti"},{"@pid":"70/450","text":"Massimo Villari"}]},"title":"An approach to share MRI data over the Cloud preserving patients' privacy.","venue":"ISCC","pages":"94-99","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GallettaBCMBV17","doi":"10.1109/ISCC.2017.8024511","ee":"https://doi.org/10.1109/ISCC.2017.8024511","url":"https://dblp.org/rec/conf/iscc/GallettaBCMBV17"}, "url":"URL#2952940" }, { "@score":"1", "@id":"2952941", "info":{"authors":{"author":[{"@pid":"33/3099-3","text":"Yue Gao 0003"},{"@pid":"91/10661","text":"Qingfeng Tan"},{"@pid":"53/10661","text":"Jinqiao Shi"},{"@pid":"46/7821","text":"Xuebin Wang"},{"@pid":"205/5571","text":"Muqian Chen"}]},"title":"Large-scale discovery and empirical analysis for I2P eepSites.","venue":"ISCC","pages":"444-449","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GaoTSWC17","doi":"10.1109/ISCC.2017.8024569","ee":"https://doi.org/10.1109/ISCC.2017.8024569","url":"https://dblp.org/rec/conf/iscc/GaoTSWC17"}, "url":"URL#2952941" }, { "@score":"1", "@id":"2952942", "info":{"authors":{"author":[{"@pid":"91/3633-1","text":"Francesco Gargiulo 0001"},{"@pid":"158/3403","text":"Stefano Silvestri"},{"@pid":"59/2982","text":"Mario Ciampi"}]},"title":"A Big Data architecture for knowledge discovery in PubMed articles.","venue":"ISCC","pages":"82-87","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GargiuloSC17","doi":"10.1109/ISCC.2017.8024509","ee":"https://doi.org/10.1109/ISCC.2017.8024509","url":"https://dblp.org/rec/conf/iscc/GargiuloSC17"}, "url":"URL#2952942" }, { "@score":"1", "@id":"2952943", "info":{"authors":{"author":[{"@pid":"151/1545","text":"Kalliopi Giannakopoulou"},{"@pid":"n/SotirisENikoletseas","text":"Sotiris E. Nikoletseas"},{"@pid":"129/9391","text":"Andreas Paraskevopoulos"},{"@pid":"z/CDZaroliagis","text":"Christos D. Zaroliagis"}]},"title":"Dynamic timetable information in smart cities.","venue":"ISCC","pages":"42-47","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GiannakopoulouN17","doi":"10.1109/ISCC.2017.8024502","ee":"https://doi.org/10.1109/ISCC.2017.8024502","url":"https://dblp.org/rec/conf/iscc/GiannakopoulouN17"}, "url":"URL#2952943" }, { "@score":"1", "@id":"2952944", "info":{"authors":{"author":[{"@pid":"205/5526","text":"Mario Alejandro Gironza-Ceron"},{"@pid":"205/5485","text":"William Fernando Villota-Jacome"},{"@pid":"72/9568","text":"Armando Ordóñez 0001"},{"@pid":"136/7344","text":"Felipe Estrada Solano"},{"@pid":"136/7456","text":"Oscar Maurício Caicedo Rendón"}]},"title":"SDN management based on Hierarchical Task Network and Network Functions Virtualization.","venue":"ISCC","pages":"1360-1365","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Gironza-CeronVO17","doi":"10.1109/ISCC.2017.8024713","ee":"https://doi.org/10.1109/ISCC.2017.8024713","url":"https://dblp.org/rec/conf/iscc/Gironza-CeronVO17"}, "url":"URL#2952944" }, { "@score":"1", "@id":"2952945", "info":{"authors":{"author":[{"@pid":"203/6321","text":"Demis Moacir Gomes"},{"@pid":"18/8101","text":"Patricia Takako Endo"},{"@pid":"55/7441","text":"Glauco Estácio Gonçalves"},{"@pid":"203/6322","text":"Daniel Rosendo"},{"@pid":"205/5478","text":"Guto Leoni Santos"},{"@pid":"10/1554","text":"Judith Kelner"},{"@pid":"s/DjamelSadok","text":"Djamel Sadok"},{"@pid":"121/8769","text":"Mozhgan Mahloo"}]},"title":"Evaluating the cooling subsystem availability on a Cloud data center.","venue":"ISCC","pages":"736-741","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GomesEGRSKSM17","doi":"10.1109/ISCC.2017.8024615","ee":"https://doi.org/10.1109/ISCC.2017.8024615","url":"https://dblp.org/rec/conf/iscc/GomesEGRSKSM17"}, "url":"URL#2952945" }, { "@score":"1", "@id":"2952946", "info":{"authors":{"author":[{"@pid":"20/9378","text":"Pablo Graubner"},{"@pid":"205/5537","text":"Markus Sommer"},{"@pid":"95/1816","text":"Matthias Hollick"},{"@pid":"f/BerndFreisleben","text":"Bernd Freisleben"}]},"title":"Dynamic role assignment in Software-Defined Wireless Networks.","venue":"ISCC","pages":"760-766","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GraubnerSHF17","doi":"10.1109/ISCC.2017.8024619","ee":"https://doi.org/10.1109/ISCC.2017.8024619","url":"https://dblp.org/rec/conf/iscc/GraubnerSHF17"}, "url":"URL#2952946" }, { "@score":"1", "@id":"2952947", "info":{"authors":{"author":[{"@pid":"133/4780","text":"Ilias Gravalos"},{"@pid":"04/7881","text":"Apostolos Siokis"},{"@pid":"90/3123","text":"Panagiotis C. Kokkinos"},{"@pid":"65/3440","text":"Emmanouel A. Varvarigos"}]},"title":"Routing algorithm with smart energy management on VCSEL interconnected networks.","venue":"ISCC","pages":"1049-1055","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GravalosSKV17","doi":"10.1109/ISCC.2017.8024664","ee":"https://doi.org/10.1109/ISCC.2017.8024664","url":"https://dblp.org/rec/conf/iscc/GravalosSKV17"}, "url":"URL#2952947" }, { "@score":"1", "@id":"2952948", "info":{"authors":{"author":[{"@pid":"174/6748","text":"Shichao Guan"},{"@pid":"72/6645","text":"Robson Eduardo De Grande"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"}]},"title":"A Cloudlet-based task-centric offloading to enable energy-efficient mobile applications.","venue":"ISCC","pages":"564-569","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GuanGB17","doi":"10.1109/ISCC.2017.8024588","ee":"https://doi.org/10.1109/ISCC.2017.8024588","url":"https://dblp.org/rec/conf/iscc/GuanGB17"}, "url":"URL#2952948" }, { "@score":"1", "@id":"2952949", "info":{"authors":{"author":[{"@pid":"202/7119","text":"Berkin Guler"},{"@pid":"o/OznurOskasap","text":"Öznur Özkasap"}]},"title":"Analysis of checkpointing algorithms for primary-backup replication.","venue":"ISCC","pages":"64-69","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GulerO17","doi":"10.1109/ISCC.2017.8024506","ee":"https://doi.org/10.1109/ISCC.2017.8024506","url":"https://dblp.org/rec/conf/iscc/GulerO17"}, "url":"URL#2952949" }, { "@score":"1", "@id":"2952950", "info":{"authors":{"author":[{"@pid":"202/7119","text":"Berkin Guler"},{"@pid":"o/OznurOskasap","text":"Öznur Özkasap"}]},"title":"Compressed incremental checkpointing for efficient replicated key-value stores.","venue":"ISCC","pages":"76-81","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/GulerO17a","doi":"10.1109/ISCC.2017.8024508","ee":"https://doi.org/10.1109/ISCC.2017.8024508","url":"https://dblp.org/rec/conf/iscc/GulerO17a"}, "url":"URL#2952950" }, { "@score":"1", "@id":"2952951", "info":{"authors":{"author":[{"@pid":"53/7677-2","text":"Nguyen Viet Ha 0002"},{"@pid":"21/6463","text":"Kazumi Kumazoe"},{"@pid":"20/5737","text":"Kazuya Tsukamoto"},{"@pid":"18/5957","text":"Masato Tsuru"}]},"title":"Masking lossy networks by TCP tunnel with Network Coding.","venue":"ISCC","pages":"1290-1295","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HaKTT17","doi":"10.1109/ISCC.2017.8024702","ee":"https://doi.org/10.1109/ISCC.2017.8024702","url":"https://dblp.org/rec/conf/iscc/HaKTT17"}, "url":"URL#2952951" }, { "@score":"1", "@id":"2952952", "info":{"authors":{"author":[{"@pid":"205/5554","text":"Samy Hafidi"},{"@pid":"30/4830","text":"Nawel Gharbi"},{"@pid":"22/5508","text":"Lynda Mokdad"}]},"title":"Queuing and service management for congestion control in wireless sensor networks using Markov Chains.","venue":"ISCC","pages":"176-181","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HafidiGM17","doi":"10.1109/ISCC.2017.8024525","ee":"https://doi.org/10.1109/ISCC.2017.8024525","url":"https://dblp.org/rec/conf/iscc/HafidiGM17"}, "url":"URL#2952952" }, { "@score":"1", "@id":"2952953", "info":{"authors":{"author":[{"@pid":"199/3341","text":"Wajdi Hajji"},{"@pid":"75/803","text":"Fung Po Tso 0001"},{"@pid":"27/1570-1","text":"Lin Cui 0001"},{"@pid":"49/1051","text":"Dimitrios P. Pezaros"}]},"title":"Experimental evaluation of SDN-controlled, joint consolidation of policies and virtual machines.","venue":"ISCC","pages":"1338-1343","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HajjiTCP17","doi":"10.1109/ISCC.2017.8024710","ee":"https://doi.org/10.1109/ISCC.2017.8024710","url":"https://dblp.org/rec/conf/iscc/HajjiTCP17"}, "url":"URL#2952953" }, { "@score":"1", "@id":"2952954", "info":{"authors":{"author":[{"@pid":"69/110-4","text":"Bin Han 0004"},{"@pid":"182/7266","text":"Shreya Tayade"},{"@pid":"83/8184","text":"Hans D. Schotten"}]},"title":"Modeling profit of sliced 5G networks for advanced network resource management and slice implementation.","venue":"ISCC","pages":"576-581","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HanTS17","doi":"10.1109/ISCC.2017.8024590","ee":"https://doi.org/10.1109/ISCC.2017.8024590","url":"https://dblp.org/rec/conf/iscc/HanTS17"}, "url":"URL#2952954" }, { "@score":"1", "@id":"2952955", "info":{"authors":{"author":[{"@pid":"148/1056","text":"Saemundur O. Haraldsson"},{"@pid":"205/5471","text":"Ragnheidur D. Brynjolfsdottir"},{"@pid":"47/2379","text":"John R. Woodward"},{"@pid":"202/9437","text":"Kristin Siggeirsdottir"},{"@pid":"45/10747","text":"Vilmundur Gudnason"}]},"title":"The use of predictive models in dynamic treatment planning.","venue":"ISCC","pages":"242-247","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HaraldssonBWSG17","doi":"10.1109/ISCC.2017.8024536","ee":"https://doi.org/10.1109/ISCC.2017.8024536","url":"https://dblp.org/rec/conf/iscc/HaraldssonBWSG17"}, "url":"URL#2952955" }, { "@score":"1", "@id":"2952956", "info":{"authors":{"author":[{"@pid":"123/5483","text":"George Hatzivasilis"},{"@pid":"19/4489","text":"Ioannis Papaefstathiou"},{"@pid":"123/8682","text":"Konstantinos Fysarakis"},{"@pid":"62/5706","text":"Ioannis G. Askoxylakis"}]},"title":"SecRoute: End-to-end secure communications for wireless ad-hoc networks.","venue":"ISCC","pages":"558-563","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HatzivasilisPFA17","doi":"10.1109/ISCC.2017.8024587","ee":"https://doi.org/10.1109/ISCC.2017.8024587","url":"https://dblp.org/rec/conf/iscc/HatzivasilisPFA17"}, "url":"URL#2952956" }, { "@score":"1", "@id":"2952957", "info":{"authors":{"author":[{"@pid":"205/5564","text":"Asma Houissa"},{"@pid":"43/2906","text":"Dominique Barth"},{"@pid":"205/5548","text":"Nadege Faul"},{"@pid":"22/962","text":"Thierry Mautor"}]},"title":"A learning algorithm to minimize the expectation time of finding a parking place in urban area.","venue":"ISCC","pages":"29-34","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HouissaBFM17","doi":"10.1109/ISCC.2017.8024500","ee":"https://doi.org/10.1109/ISCC.2017.8024500","url":"https://dblp.org/rec/conf/iscc/HouissaBFM17"}, "url":"URL#2952957" }, { "@score":"1", "@id":"2952958", "info":{"authors":{"author":[{"@pid":"185/1485","text":"Alexis Huf"},{"@pid":"155/5140","text":"Ivan Luiz Salvadori"},{"@pid":"32/5988","text":"Frank Siqueira"}]},"title":"Planning and execution of heterogeneous service compositions.","venue":"ISCC","pages":"987-993","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/HufSS17","doi":"10.1109/ISCC.2017.8024654","ee":"https://doi.org/10.1109/ISCC.2017.8024654","url":"https://dblp.org/rec/conf/iscc/HufSS17"}, "url":"URL#2952958" }, { "@score":"1", "@id":"2952959", "info":{"authors":{"author":[{"@pid":"205/5502","text":"Daniel Inacio"},{"@pid":"38/1256","text":"Carlos R. Senna"},{"@pid":"94/4930","text":"Susana Sargento"}]},"title":"Content distribution in vehicular networks through information filtering.","venue":"ISCC","pages":"390-397","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/InacioSS17","doi":"10.1109/ISCC.2017.8024561","ee":"https://doi.org/10.1109/ISCC.2017.8024561","url":"https://dblp.org/rec/conf/iscc/InacioSS17"}, "url":"URL#2952959" }, { "@score":"1", "@id":"2952960", "info":{"authors":{"author":[{"@pid":"205/5496","text":"Anastasia Ioannidi"},{"@pid":"41/308","text":"Damianos Gavalas"},{"@pid":"133/7681","text":"Vlasios Kasapakis"}]},"title":"Flaneur: Augmented exploration of the architectural urbanscape.","venue":"ISCC","pages":"529-533","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/IoannidiGK17","doi":"10.1109/ISCC.2017.8024582","ee":"https://doi.org/10.1109/ISCC.2017.8024582","url":"https://dblp.org/rec/conf/iscc/IoannidiGK17"}, "url":"URL#2952960" }, { "@score":"1", "@id":"2952961", "info":{"authors":{"author":[{"@pid":"143/2279","text":"Elena Ivannikova"},{"@pid":"78/10268","text":"Gil David"},{"@pid":"h/TimoHamalainen2","text":"Timo Hämäläinen 0002"}]},"title":"Anomaly detection approach to keystroke dynamics based user authentication.","venue":"ISCC","pages":"885-889","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/IvannikovaDH17","doi":"10.1109/ISCC.2017.8024638","ee":"https://doi.org/10.1109/ISCC.2017.8024638","url":"https://dblp.org/rec/conf/iscc/IvannikovaDH17"}, "url":"URL#2952961" }, { "@score":"1", "@id":"2952962", "info":{"authors":{"author":[{"@pid":"53/9959","text":"Kübra Kalkan"},{"@pid":"96/6018","text":"Gürkan Gür"},{"@pid":"47/3101","text":"Fatih Alagöz"}]},"title":"SDNScore: A statistical defense mechanism against DDoS attacks in SDN environment.","venue":"ISCC","pages":"669-675","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KalkanGA17","doi":"10.1109/ISCC.2017.8024605","ee":"https://doi.org/10.1109/ISCC.2017.8024605","url":"https://dblp.org/rec/conf/iscc/KalkanGA17"}, "url":"URL#2952962" }, { "@score":"1", "@id":"2952963", "info":{"authors":{"author":[{"@pid":"194/9946","text":"Konstantinos Karamitsios"},{"@pid":"42/5675","text":"Theofanis Orphanoudakis"}]},"title":"Efficient IoT data aggregation for connected health applications.","venue":"ISCC","pages":"1182-1185","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KaramitsiosO17","doi":"10.1109/ISCC.2017.8024685","ee":"https://doi.org/10.1109/ISCC.2017.8024685","url":"https://dblp.org/rec/conf/iscc/KaramitsiosO17"}, "url":"URL#2952963" }, { "@score":"1", "@id":"2952964", "info":{"authors":{"author":[{"@pid":"201/0032","text":"Konrad Karolewicz"},{"@pid":"53/637","text":"Andrzej Beben"}]},"title":"Cloud-based Adaptive Video Streaming: Content storage vs. transcoding optimization methods.","venue":"ISCC","pages":"523-528","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KarolewiczB17","doi":"10.1109/ISCC.2017.8024581","ee":"https://doi.org/10.1109/ISCC.2017.8024581","url":"https://dblp.org/rec/conf/iscc/KarolewiczB17"}, "url":"URL#2952964" }, { "@score":"1", "@id":"2952965", "info":{"authors":{"author":[{"@pid":"205/5529","text":"Sotirios Katsikeas"},{"@pid":"123/8682","text":"Konstantinos Fysarakis"},{"@pid":"145/4883","text":"Andreas I. Miaoudakis"},{"@pid":"205/5535","text":"Amaury Van Bemten"},{"@pid":"62/5706","text":"Ioannis G. Askoxylakis"},{"@pid":"19/4489","text":"Ioannis Papaefstathiou"},{"@pid":"84/7618","text":"Anargyros Plemenos"}]},"title":"Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol.","venue":"ISCC","pages":"1193-1200","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KatsikeasFMBAPP17","doi":"10.1109/ISCC.2017.8024687","ee":"https://doi.org/10.1109/ISCC.2017.8024687","url":"https://dblp.org/rec/conf/iscc/KatsikeasFMBAPP17"}, "url":"URL#2952965" }, { "@score":"1", "@id":"2952966", "info":{"authors":{"author":[{"@pid":"91/4091","text":"Nobutaka Kawaguchi"},{"@pid":"183/1837","text":"Hideyuki Tomimura"},{"@pid":"205/5562","text":"Tetsutoshi Komiyama"},{"@pid":"205/5487","text":"Kosuke Kubota"},{"@pid":"22/2083","text":"Mamoru Tsuichihara"}]},"title":"Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train.","venue":"ISCC","pages":"871-878","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KawaguchiTKKT17","doi":"10.1109/ISCC.2017.8024636","ee":"https://doi.org/10.1109/ISCC.2017.8024636","url":"https://dblp.org/rec/conf/iscc/KawaguchiTKKT17"}, "url":"URL#2952966" }, { "@score":"1", "@id":"2952967", "info":{"authors":{"author":[{"@pid":"205/5514","text":"Hassan Hakim Khalili"},{"@pid":"205/5550","text":"Peter R. Green"},{"@pid":"28/10821","text":"Danielle George"},{"@pid":"72/3275","text":"Graham Watson"},{"@pid":"98/11083","text":"Werner Schiffers"}]},"title":"Wireless sensor networks for monitoring gas turbine engines during development.","venue":"ISCC","pages":"1325-1331","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KhaliliGGWS17","doi":"10.1109/ISCC.2017.8024708","ee":"https://doi.org/10.1109/ISCC.2017.8024708","url":"https://dblp.org/rec/conf/iscc/KhaliliGGWS17"}, "url":"URL#2952967" }, { "@score":"1", "@id":"2952968", "info":{"authors":{"author":[{"@pid":"175/2267","text":"Raja Al Kiyumi"},{"@pid":"17/6484","text":"Chuan Heng Foh"},{"@pid":"94/3176","text":"Serdar Vural"},{"@pid":"18/380","text":"Rahim Tafazolli"}]},"title":"A Control-theoretic approach for Duty Cycle Adaptation in dynamic wireless sensor networks.","venue":"ISCC","pages":"465-472","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KiyumiFVT17","doi":"10.1109/ISCC.2017.8024572","ee":"https://doi.org/10.1109/ISCC.2017.8024572","url":"https://dblp.org/rec/conf/iscc/KiyumiFVT17"}, "url":"URL#2952968" }, { "@score":"1", "@id":"2952969", "info":{"authors":{"author":[{"@pid":"164/7946","text":"Luis Augusto Dias Knob"},{"@pid":"81/9978","text":"Rafael Pereira Esteves"},{"@pid":"52/4475","text":"Lisandro Zambenedetti Granville"},{"@pid":"20/369","text":"Liane Margarida Rockenbach Tarouco"}]},"title":"Mitigating elephant flows in SDN-based IXP networks.","venue":"ISCC","pages":"1352-1359","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KnobEGT17","doi":"10.1109/ISCC.2017.8024712","ee":"https://doi.org/10.1109/ISCC.2017.8024712","url":"https://dblp.org/rec/conf/iscc/KnobEGT17"}, "url":"URL#2952969" }, { "@score":"1", "@id":"2952970", "info":{"authors":{"author":[{"@pid":"72/712","text":"Kostas Kolomvatsos"},{"@pid":"07/5736","text":"Christos Anagnostopoulos"},{"@pid":"71/5300","text":"Angelos K. Marnerides"},{"@pid":"87/3074","text":"Qiang Ni"},{"@pid":"39/3808","text":"Stathes Hadjiefthymiades"},{"@pid":"49/1051","text":"Dimitrios P. Pezaros"}]},"title":"Uncertainty-driven ensemble forecasting of QoS in Software Defined Networks.","venue":"ISCC","pages":"1284-1289","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KolomvatsosAMNH17","doi":"10.1109/ISCC.2017.8024701","ee":"https://doi.org/10.1109/ISCC.2017.8024701","url":"https://dblp.org/rec/conf/iscc/KolomvatsosAMNH17"}, "url":"URL#2952970" }, { "@score":"1", "@id":"2952971", "info":{"authors":{"author":[{"@pid":"51/2813","text":"Michael E. Kounavis"},{"@pid":"47/10696","text":"Sergej Deutsch"},{"@pid":"44/6372","text":"David Durham"},{"@pid":"205/5533","text":"Saeedeh Komijani"}]},"title":"Non-recursive computation of the probability of more than two people having the same birthday.","venue":"ISCC","pages":"1263-1270","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KounavisDDK17","doi":"10.1109/ISCC.2017.8024698","ee":"https://doi.org/10.1109/ISCC.2017.8024698","url":"https://dblp.org/rec/conf/iscc/KounavisDDK17"}, "url":"URL#2952971" }, { "@score":"1", "@id":"2952972", "info":{"authors":{"author":[{"@pid":"162/1555","text":"Konrad-Felix Krentz"},{"@pid":"m/CMeinel","text":"Christoph Meinel"},{"@pid":"169/8075","text":"Hendrik Graupner"}]},"title":"Secure self-seeding with power-up SRAM states.","venue":"ISCC","pages":"1251-1256","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KrentzMG17","doi":"10.1109/ISCC.2017.8024696","ee":"https://doi.org/10.1109/ISCC.2017.8024696","url":"https://dblp.org/rec/conf/iscc/KrentzMG17"}, "url":"URL#2952972" }, { "@score":"1", "@id":"2952973", "info":{"authors":{"author":[{"@pid":"45/2372","text":"Salma Ktari"},{"@pid":"40/6812","text":"Stefano Secci"},{"@pid":"16/10042","text":"Damien Lavaux"}]},"title":"Bayesian diagnosis and reliability analysis of Private Mobile Radio networks.","venue":"ISCC","pages":"1245-1250","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/KtariSL17","doi":"10.1109/ISCC.2017.8024695","ee":"https://doi.org/10.1109/ISCC.2017.8024695","url":"https://dblp.org/rec/conf/iscc/KtariSL17"}, "url":"URL#2952973" }, { "@score":"1", "@id":"2952974", "info":{"authors":{"author":[{"@pid":"205/5507","text":"Emmanouil Lakiotakis"},{"@pid":"31/8282","text":"Christos Liaskos"},{"@pid":"88/3080","text":"Xenofontas A. Dimitropoulos"}]},"title":"Application-network collaboration using SDN for ultra-low delay teleorchestras.","venue":"ISCC","pages":"70-75","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LakiotakisLD17","doi":"10.1109/ISCC.2017.8024507","ee":"https://doi.org/10.1109/ISCC.2017.8024507","url":"https://dblp.org/rec/conf/iscc/LakiotakisLD17"}, "url":"URL#2952974" }, { "@score":"1", "@id":"2952975", "info":{"authors":{"author":[{"@pid":"12/10813","text":"Zhaogeng Li"},{"@pid":"79/3662","text":"Jun Bi"},{"@pid":"59/10222","text":"Yiran Zhang"},{"@pid":"39/2813","text":"Chuang Wang"}]},"title":"EAalo: Enhanced coflow scheduling without prior knowledge in a datacenter network.","venue":"ISCC","pages":"1136-1141","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiBZW17","doi":"10.1109/ISCC.2017.8024678","ee":"https://doi.org/10.1109/ISCC.2017.8024678","url":"https://dblp.org/rec/conf/iscc/LiBZW17"}, "url":"URL#2952975" }, { "@score":"1", "@id":"2952976", "info":{"authors":{"author":[{"@pid":"61/500-11","text":"Yue Li 0011"},{"@pid":"24/4899","text":"Pantelis A. Frangoudis"},{"@pid":"63/2677","text":"Yassine Hadjadj Aoul"},{"@pid":"67/5111","text":"Philippe Bertin"}]},"title":"A Mobile Edge Computing-assisted video delivery architecture for wireless heterogeneous networks.","venue":"ISCC","pages":"534-539","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiFAB17","doi":"10.1109/ISCC.2017.8024583","ee":"https://doi.org/10.1109/ISCC.2017.8024583","url":"https://dblp.org/rec/conf/iscc/LiFAB17"}, "url":"URL#2952976" }, { "@score":"1", "@id":"2952977", "info":{"authors":{"author":[{"@pid":"l/JunLi2","text":"Jun Li 0002"},{"@pid":"205/5486","text":"Zeping Gu"},{"@pid":"37/7868","text":"Yongmao Ren"},{"@pid":"30/4276-1","text":"Haibo Wu 0001"},{"@pid":"155/8482","text":"Shanshan Shi"}]},"title":"A Software-Defined Address Resolution Proxy.","venue":"ISCC","pages":"404-410","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiGRWS17","doi":"10.1109/ISCC.2017.8024563","ee":"https://doi.org/10.1109/ISCC.2017.8024563","url":"https://dblp.org/rec/conf/iscc/LiGRWS17"}, "url":"URL#2952977" }, { "@score":"1", "@id":"2952978", "info":{"authors":{"author":[{"@pid":"62/3171","text":"Man Li"},{"@pid":"85/7641","text":"Cheng Ling"},{"@pid":"164/0467","text":"Jing-Yang Gao"}]},"title":"An efficient CNN-based classification on G-protein Coupled Receptors using TF-IDF and N-gram.","venue":"ISCC","pages":"924-931","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiLG17","doi":"10.1109/ISCC.2017.8024644","ee":"https://doi.org/10.1109/ISCC.2017.8024644","url":"https://dblp.org/rec/conf/iscc/LiLG17"}, "url":"URL#2952978" }, { "@score":"1", "@id":"2952979", "info":{"authors":{"author":[{"@pid":"41/6495","text":"Wenzhuo Li"},{"@pid":"53/2571","text":"Chuang Lin"},{"@pid":"46/10074","text":"Chao Xue"}]},"title":"Design and analysis of a new distributed scheduling approach.","venue":"ISCC","pages":"1142-1149","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiLX17","doi":"10.1109/ISCC.2017.8024679","ee":"https://doi.org/10.1109/ISCC.2017.8024679","url":"https://dblp.org/rec/conf/iscc/LiLX17"}, "url":"URL#2952979" }, { "@score":"1", "@id":"2952980", "info":{"authors":{"author":[{"@pid":"41/6495","text":"Wenzhuo Li"},{"@pid":"53/2571","text":"Chuang Lin"},{"@pid":"185/8808","text":"Puheng Zhang"},{"@pid":"157/7918","text":"Mao Miao"}]},"title":"Probe sharing: A simple technique to improve on sparrow.","venue":"ISCC","pages":"863-870","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiLZM17","doi":"10.1109/ISCC.2017.8024635","ee":"https://doi.org/10.1109/ISCC.2017.8024635","url":"https://dblp.org/rec/conf/iscc/LiLZM17"}, "url":"URL#2952980" }, { "@score":"1", "@id":"2952981", "info":{"authors":{"author":[{"@pid":"79/4275","text":"Xianfeng Li"},{"@pid":"205/5547","text":"Wencong Xie"}]},"title":"CRAFT: A Cache Reduction Architecture for Flow Tables in Software-Defined Networks.","venue":"ISCC","pages":"967-972","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiX17","doi":"10.1109/ISCC.2017.8024651","ee":"https://doi.org/10.1109/ISCC.2017.8024651","url":"https://dblp.org/rec/conf/iscc/LiX17"}, "url":"URL#2952981" }, { "@score":"1", "@id":"2952982", "info":{"authors":{"author":[{"@pid":"79/4275","text":"Xianfeng Li"},{"@pid":"205/5477","text":"Jiaojiao Yan"}]},"title":"LEPR: Link Stability Estimation-based Preemptive Routing protocol for Flying Ad Hoc Networks.","venue":"ISCC","pages":"1079-1084","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiY17","doi":"10.1109/ISCC.2017.8024669","ee":"https://doi.org/10.1109/ISCC.2017.8024669","url":"https://dblp.org/rec/conf/iscc/LiY17"}, "url":"URL#2952982" }, { "@score":"1", "@id":"2952983", "info":{"authors":{"author":[{"@pid":"32/2151","text":"Limin Li"},{"@pid":"65/7182","text":"Yahui Yang"},{"@pid":"01/868","text":"Zhonghai Wu"}]},"title":"FMR-PDP: Flexible multiple-replica provable data possession in cloud storage.","venue":"ISCC","pages":"1115-1121","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiYW17","doi":"10.1109/ISCC.2017.8024675","ee":"https://doi.org/10.1109/ISCC.2017.8024675","url":"https://dblp.org/rec/conf/iscc/LiYW17"}, "url":"URL#2952983" }, { "@score":"1", "@id":"2952984", "info":{"authors":{"author":[{"@pid":"07/1429","text":"Han Li"},{"@pid":"78/5323-3","text":"Pei Zhang 0003"},{"@pid":"63/1480","text":"Zhanfeng Wang"},{"@pid":"90/197","text":"Fei Du"},{"@pid":"195/4297","text":"Ye Kuang"},{"@pid":"74/626","text":"Ying An"}]},"title":"Changing IP geolocation from arbitrary database query towards multi-databases fusion.","venue":"ISCC","pages":"1150-1157","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiZWDKA17","doi":"10.1109/ISCC.2017.8024680","ee":"https://doi.org/10.1109/ISCC.2017.8024680","url":"https://dblp.org/rec/conf/iscc/LiZWDKA17"}, "url":"URL#2952984" }, { "@score":"1", "@id":"2952985", "info":{"authors":{"author":[{"@pid":"31/8282","text":"Christos Liaskos"},{"@pid":"89/4915","text":"Ageliki Tsioliaridou"},{"@pid":"33/2939","text":"Sotiris Ioannidis"}]},"title":"The Socket Store: An app model for the application-network interaction.","venue":"ISCC","pages":"365-370","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiaskosTI17","doi":"10.1109/ISCC.2017.8024557","ee":"https://doi.org/10.1109/ISCC.2017.8024557","url":"https://dblp.org/rec/conf/iscc/LiaskosTI17"}, "url":"URL#2952985" }, { "@score":"1", "@id":"2952986", "info":{"authors":{"author":[{"@pid":"205/5480","text":"Saw Lin"},{"@pid":"60/5282","text":"Vijay Ramachandran"},{"@pid":"205/5528","text":"Tinotenda Zinyama"}]},"title":"Balancing overhead-minimization objectives in network probing-path selection.","venue":"ISCC","pages":"353-358","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LinRZ17","doi":"10.1109/ISCC.2017.8024555","ee":"https://doi.org/10.1109/ISCC.2017.8024555","url":"https://dblp.org/rec/conf/iscc/LinRZ17"}, "url":"URL#2952986" }, { "@score":"1", "@id":"2952987", "info":{"authors":{"author":[{"@pid":"03/1280","text":"Liqing Liu"},{"@pid":"54/2780-1","text":"Zheng Chang 0001"},{"@pid":"34/5161","text":"Xijuan Guo"},{"@pid":"71/1177","text":"Tapani Ristaniemi"}]},"title":"Multi-objective optimization for computation offloading in mobile-edge computing.","venue":"ISCC","pages":"832-837","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LiuCGR17","doi":"10.1109/ISCC.2017.8024630","ee":"https://doi.org/10.1109/ISCC.2017.8024630","url":"https://dblp.org/rec/conf/iscc/LiuCGR17"}, "url":"URL#2952987" }, { "@score":"1", "@id":"2952988", "info":{"authors":{"author":[{"@pid":"184/6166","text":"Claude Lubamba"},{"@pid":"65/326","text":"Antoine B. Bagula"}]},"title":"Cyber-healthcare cloud computing interoperability using the HL7-CDA standard.","venue":"ISCC","pages":"105-110","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/LubambaB17","doi":"10.1109/ISCC.2017.8024513","ee":"https://doi.org/10.1109/ISCC.2017.8024513","url":"https://dblp.org/rec/conf/iscc/LubambaB17"}, "url":"URL#2952988" }, { "@score":"1", "@id":"2952989", "info":{"authors":{"author":{"@pid":"78/1045","text":"Hakim Mabed"}},"title":"Enhanced spread in time on-off keying technique for dense Terahertz nanonetworks.","venue":"ISCC","pages":"710-716","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Mabed17","doi":"10.1109/ISCC.2017.8024611","ee":"https://doi.org/10.1109/ISCC.2017.8024611","url":"https://dblp.org/rec/conf/iscc/Mabed17"}, "url":"URL#2952989" }, { "@score":"1", "@id":"2952990", "info":{"authors":{"author":[{"@pid":"205/0102","text":"Diogo Machado"},{"@pid":"81/10557","text":"Tiago Paiva"},{"@pid":"62/1328","text":"Inês Dutra"},{"@pid":"71/1213","text":"Vítor Santos Costa"},{"@pid":"45/3616","text":"Pedro Brandão"}]},"title":"Managing diabetes: Pattern discovery and counselling supported by user data in a mobile platform.","venue":"ISCC","pages":"296-299","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MachadoPDCB17","doi":"10.1109/ISCC.2017.8024545","ee":"https://doi.org/10.1109/ISCC.2017.8024545","url":"https://dblp.org/rec/conf/iscc/MachadoPDCB17"}, "url":"URL#2952990" }, { "@score":"1", "@id":"2952991", "info":{"authors":{"author":[{"@pid":"159/9383","text":"Saja Al-Mamoori"},{"@pid":"j/ArunitaJaekel","text":"Arunita Jaekel"},{"@pid":"73/3006","text":"Subir Bandyopadhyay"}]},"title":"Designing resilient WDM data center networks for dynamic lightpath demands.","venue":"ISCC","pages":"724-729","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MamooriJB17","doi":"10.1109/ISCC.2017.8024613","ee":"https://doi.org/10.1109/ISCC.2017.8024613","url":"https://dblp.org/rec/conf/iscc/MamooriJB17"}, "url":"URL#2952991" }, { "@score":"1", "@id":"2952992", "info":{"authors":{"author":[{"@pid":"52/11068","text":"Zhifei Mao"},{"@pid":"96/6129-2","text":"Jing Ma 0002"},{"@pid":"52/146","text":"Yuming Jiang 0001"},{"@pid":"86/508-2","text":"Bin Yao 0002"}]},"title":"Performance evaluation of WiFi Direct for data dissemination in mobile social networks.","venue":"ISCC","pages":"1213-1218","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MaoMJY17","doi":"10.1109/ISCC.2017.8024690","ee":"https://doi.org/10.1109/ISCC.2017.8024690","url":"https://dblp.org/rec/conf/iscc/MaoMJY17"}, "url":"URL#2952992" }, { "@score":"1", "@id":"2952993", "info":{"authors":{"author":[{"@pid":"186/5638","text":"Mohammad Reza Mardani"},{"@pid":"186/5661","text":"Salman Mohebi"},{"@pid":"49/215","text":"Behrouz Maham"},{"@pid":"09/3625","text":"Mehdi Bennis"}]},"title":"Delay-sensitive resource allocation for relay-aided M2M communication over LTE-advanced networks.","venue":"ISCC","pages":"1033-1038","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MardaniMMB17","doi":"10.1109/ISCC.2017.8024661","ee":"https://doi.org/10.1109/ISCC.2017.8024661","url":"https://dblp.org/rec/conf/iscc/MardaniMMB17"}, "url":"URL#2952993" }, { "@score":"1", "@id":"2952994", "info":{"authors":{"author":[{"@pid":"133/5048","text":"Dionisis Margaris"},{"@pid":"24/4310","text":"Costas Vassilakis"}]},"title":"Improving collaborative filtering's rating prediction quality in dense datasets, by pruning old ratings.","venue":"ISCC","pages":"1168-1174","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MargarisV17","doi":"10.1109/ISCC.2017.8024683","ee":"https://doi.org/10.1109/ISCC.2017.8024683","url":"https://dblp.org/rec/conf/iscc/MargarisV17"}, "url":"URL#2952994" }, { "@score":"1", "@id":"2952995", "info":{"authors":{"author":[{"@pid":"205/5527","text":"Jhon Martinez"},{"@pid":"25/6464","text":"Pedro Frosi Rosa"},{"@pid":"02/979","text":"Flávio Oliveira Silva 0001"},{"@pid":"92/11260","text":"Caio César Ferreira"},{"@pid":"28/3005","text":"Pedro Bispo"},{"@pid":"65/5952","text":"Daniel Corujo"},{"@pid":"53/223","text":"Rui L. Aguiar"}]},"title":"CREDENCE: A Carrier Grade Software Defined Networking control environment based on the JAIN SLEE component model.","venue":"ISCC","pages":"432-437","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MartinezRSFBCA17","doi":"10.1109/ISCC.2017.8024567","ee":"https://doi.org/10.1109/ISCC.2017.8024567","url":"https://dblp.org/rec/conf/iscc/MartinezRSFBCA17"}, "url":"URL#2952995" }, { "@score":"1", "@id":"2952996", "info":{"authors":{"author":[{"@pid":"257/5579","text":"Santiago G. Martinez"},{"@pid":"166/7996","text":"Berglind Smaradottir"},{"@pid":"146/2153","text":"Torunn Kitty Vatnøy"},{"@pid":"205/5513","text":"Marius Bjonness"}]},"title":"Usability evaluation of a geolocation technology: Safemate.","venue":"ISCC","pages":"187-192","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MartinezSVB17","doi":"10.1109/ISCC.2017.8024527","ee":"https://doi.org/10.1109/ISCC.2017.8024527","url":"https://dblp.org/rec/conf/iscc/MartinezSVB17"}, "url":"URL#2952996" }, { "@score":"1", "@id":"2952997", "info":{"authors":{"author":[{"@pid":"189/4017","text":"Alexandros Mavromatis"},{"@pid":"137/6695","text":"Georgios Z. Papadopoulos"},{"@pid":"15/6081","text":"Xenofon Fafoutis"},{"@pid":"58/2717","text":"Angelos A. Goulianos"},{"@pid":"51/6801","text":"George C. Oikonomou"},{"@pid":"45/1358","text":"Periklis Chatzimisios"},{"@pid":"03/4038","text":"Theo Tryfonas"}]},"title":"Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks.","venue":"ISCC","pages":"798-803","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MavromatisPFGOC17","doi":"10.1109/ISCC.2017.8024625","ee":"https://doi.org/10.1109/ISCC.2017.8024625","url":"https://dblp.org/rec/conf/iscc/MavromatisPFGOC17"}, "url":"URL#2952997" }, { "@score":"1", "@id":"2952998", "info":{"authors":{"author":[{"@pid":"123/3499","text":"Rodolfo Ipolito Meneguette"},{"@pid":"b/AzzedineBoukerche","text":"Azzedine Boukerche"}]},"title":"A cooperative and adaptive resource scheduling for Vehicular Cloud.","venue":"ISCC","pages":"398-403","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MeneguetteB17","doi":"10.1109/ISCC.2017.8024562","ee":"https://doi.org/10.1109/ISCC.2017.8024562","url":"https://dblp.org/rec/conf/iscc/MeneguetteB17"}, "url":"URL#2952998" }, { "@score":"1", "@id":"2952999", "info":{"authors":{"author":[{"@pid":"157/7918","text":"Mao Miao"},{"@pid":"121/5533","text":"Xiaohui Luo"},{"@pid":"05/6995","text":"Fengyuan Ren"},{"@pid":"180/5887","text":"Wenxue Cheng"},{"@pid":"56/2373-5","text":"Jing Xie 0005"},{"@pid":"41/6495","text":"Wenzhuo Li"},{"@pid":"97/6143","text":"Xiaolan Liu"}]},"title":"Renovate high performance user-level stacks' innovation utilizing commodity network adaptors.","venue":"ISCC","pages":"906-911","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MiaoLRCXLL17","doi":"10.1109/ISCC.2017.8024641","ee":"https://doi.org/10.1109/ISCC.2017.8024641","url":"https://dblp.org/rec/conf/iscc/MiaoLRCXLL17"}, "url":"URL#2952999" }, { "@score":"1", "@id":"2953000", "info":{"authors":{"author":[{"@pid":"189/9964","text":"Roberta De Michele"},{"@pid":"35/4324","text":"Marco Furini"}]},"title":"TV commercials: Improving viewers engagement through gamification and second screen.","venue":"ISCC","pages":"128-133","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MicheleF17","doi":"10.1109/ISCC.2017.8024517","ee":"https://doi.org/10.1109/ISCC.2017.8024517","url":"https://dblp.org/rec/conf/iscc/MicheleF17"}, "url":"URL#2953000" }, { "@score":"1", "@id":"2953001", "info":{"authors":{"author":[{"@pid":"205/5483","text":"Eliseu César Miguel"},{"@pid":"80/186","text":"Ítalo Cunha"},{"@pid":"147/1083","text":"Cristiano M. Silva"},{"@pid":"70/6653-3","text":"Fernando Carvalho 0003"},{"@pid":"01/2746","text":"Sérgio Vale Aguiar Campos"}]},"title":"Resource-constrained P2P streaming overlay construction for efficient joining under flash crowds.","venue":"ISCC","pages":"639-644","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MiguelCSCC17","doi":"10.1109/ISCC.2017.8024600","ee":"https://doi.org/10.1109/ISCC.2017.8024600","url":"https://dblp.org/rec/conf/iscc/MiguelCSCC17"}, "url":"URL#2953001" }, { "@score":"1", "@id":"2953002", "info":{"authors":{"author":[{"@pid":"83/4258","text":"Silvia Mirri"},{"@pid":"r/MarcoRoccetti","text":"Marco Roccetti"},{"@pid":"82/2986","text":"Paola Salomoni"},{"@pid":"205/5470","text":"Giacomo Mambelli"},{"@pid":"177/9789","text":"Antonella Valva"}]},"title":"On the design of an app for foreign languages incidental learning.","venue":"ISCC","pages":"111-116","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MirriRSMV17","doi":"10.1109/ISCC.2017.8024514","ee":"https://doi.org/10.1109/ISCC.2017.8024514","url":"https://dblp.org/rec/conf/iscc/MirriRSMV17"}, "url":"URL#2953002" }, { "@score":"1", "@id":"2953003", "info":{"authors":{"author":[{"@pid":"83/4258","text":"Silvia Mirri"},{"@pid":"r/MarcoRoccetti","text":"Marco Roccetti"},{"@pid":"82/2986","text":"Paola Salomoni"},{"@pid":"31/9459","text":"Catia Prandi"}]},"title":"A blue Monday? Try walking on a yellow path.","venue":"ISCC","pages":"1-5","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MirriRSP17","doi":"10.1109/ISCC.2017.8024495","ee":"https://doi.org/10.1109/ISCC.2017.8024495","url":"https://dblp.org/rec/conf/iscc/MirriRSP17"}, "url":"URL#2953003" }, { "@score":"1", "@id":"2953004", "info":{"authors":{"author":[{"@pid":"205/5518","text":"Nima Moradianzadeh"},{"@pid":"46/7858","text":"Pooya Moradian Zadeh"},{"@pid":"36/167","text":"Ziad Kobti"},{"@pid":"205/5546","text":"Kathryn Pfaff"}]},"title":"An agent model to support social network-based palliative care.","venue":"ISCC","pages":"300-305","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MoradianzadehZK17","doi":"10.1109/ISCC.2017.8024546","ee":"https://doi.org/10.1109/ISCC.2017.8024546","url":"https://dblp.org/rec/conf/iscc/MoradianzadehZK17"}, "url":"URL#2953004" }, { "@score":"1", "@id":"2953005", "info":{"authors":{"author":[{"@pid":"205/5509","text":"Fausto da S. Moraes"},{"@pid":"32/10675","text":"Kleber Vieira Cardoso"},{"@pid":"40/1526","text":"Vinicius C. M. Borges"}]},"title":"Improving video content access with proactive D2D caching and online social networking.","venue":"ISCC","pages":"1043-1048","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MoraesCB17","doi":"10.1109/ISCC.2017.8024663","ee":"https://doi.org/10.1109/ISCC.2017.8024663","url":"https://dblp.org/rec/conf/iscc/MoraesCB17"}, "url":"URL#2953005" }, { "@score":"1", "@id":"2953006", "info":{"authors":{"author":[{"@pid":"131/1588","text":"Tercio de Morais"},{"@pid":"r/NelsonSoutoRosa","text":"Nelson Souto Rosa"}]},"title":"Towards an application level elasticity by middleware.","venue":"ISCC","pages":"730-735","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MoraisR17","doi":"10.1109/ISCC.2017.8024614","ee":"https://doi.org/10.1109/ISCC.2017.8024614","url":"https://dblp.org/rec/conf/iscc/MoraisR17"}, "url":"URL#2953006" }, { "@score":"1", "@id":"2953007", "info":{"authors":{"author":[{"@pid":"205/5489","text":"Mauro Moura"},{"@pid":"02/979","text":"Flávio Oliveira Silva 0001"},{"@pid":"25/6464","text":"Pedro Frosi Rosa"},{"@pid":"53/223","text":"Rui L. Aguiar"}]},"title":"NERV: A constraint-free network resources manager for virtualized environments.","venue":"ISCC","pages":"411-417","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/MouraSRA17","doi":"10.1109/ISCC.2017.8024564","ee":"https://doi.org/10.1109/ISCC.2017.8024564","url":"https://dblp.org/rec/conf/iscc/MouraSRA17"}, "url":"URL#2953007" }, { "@score":"1", "@id":"2953008", "info":{"authors":{"author":[{"@pid":"125/8670","text":"Juliano Fischer Naves"},{"@pid":"32/6032","text":"Igor Monteiro Moraes"}]},"title":"Mitigating the ACK counterfeiting attack in Delay and Disruption Tolerant Networks.","venue":"ISCC","pages":"1015-1020","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/NavesM17","doi":"10.1109/ISCC.2017.8024658","ee":"https://doi.org/10.1109/ISCC.2017.8024658","url":"https://dblp.org/rec/conf/iscc/NavesM17"}, "url":"URL#2953008" }, { "@score":"1", "@id":"2953009", "info":{"authors":{"author":[{"@pid":"201/6706","text":"Tawfiq Nebbou"},{"@pid":"47/3278","text":"Hacène Fouchal"},{"@pid":"50/8093","text":"Mohamed Lehsaini"},{"@pid":"02/10627","text":"Marwane Ayaida"}]},"title":"A cooperative location service for VANETs.","venue":"ISCC","pages":"54-58","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/NebbouFLA17","doi":"10.1109/ISCC.2017.8024504","ee":"https://doi.org/10.1109/ISCC.2017.8024504","url":"https://dblp.org/rec/conf/iscc/NebbouFLA17"}, "url":"URL#2953009" }, { "@score":"1", "@id":"2953010", "info":{"authors":{"author":[{"@pid":"195/6935","text":"Tomo Nikolovski"},{"@pid":"44/164","text":"Richard W. Pazzi"},{"@pid":"41/11063","text":"Ademar Takeo Akabane"},{"@pid":"64/7382","text":"Leandro A. Villas"}]},"title":"Efficient Encounter-based Event Dissemination Protocol (E-BED) for urban and highway Vehicular Ad Hoc Networks.","venue":"ISCC","pages":"1085-1090","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/NikolovskiPAV17","doi":"10.1109/ISCC.2017.8024670","ee":"https://doi.org/10.1109/ISCC.2017.8024670","url":"https://dblp.org/rec/conf/iscc/NikolovskiPAV17"}, "url":"URL#2953010" }, { "@score":"1", "@id":"2953011", "info":{"authors":{"author":[{"@pid":"200/1283","text":"Antonia Nisioti"},{"@pid":"12/8421","text":"Alexios Mylonas"},{"@pid":"89/1496","text":"Vasilios Katos"},{"@pid":"51/6407","text":"Paul D. Yoo"},{"@pid":"01/7570","text":"Anargyros Chryssanthou"}]},"title":"You can run but you cannot hide from memory: Extracting IM evidence of Android apps.","venue":"ISCC","pages":"457-464","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/NisiotiMKYC17","doi":"10.1109/ISCC.2017.8024571","ee":"https://doi.org/10.1109/ISCC.2017.8024571","url":"https://dblp.org/rec/conf/iscc/NisiotiMKYC17"}, "url":"URL#2953011" }, { "@score":"1", "@id":"2953012", "info":{"authors":{"author":[{"@pid":"205/5511","text":"Hamid Nourollahi"},{"@pid":"165/7528","text":"Saeed Ghazi-Maghrebi"}]},"title":"Evaluation of cyclic prefix length in OFDM system based for Rayleigh fading channels under different modulation schemes.","venue":"ISCC","pages":"164-169","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/NourollahiG17","doi":"10.1109/ISCC.2017.8024523","ee":"https://doi.org/10.1109/ISCC.2017.8024523","url":"https://dblp.org/rec/conf/iscc/NourollahiG17"}, "url":"URL#2953012" }, { "@score":"1", "@id":"2953013", "info":{"authors":{"author":[{"@pid":"178/5228","text":"Ruben Oliveira"},{"@pid":"27/1247","text":"Lucas Guardalben"},{"@pid":"94/4930","text":"Susana Sargento"}]},"title":"Long range communications in urban and rural environments.","venue":"ISCC","pages":"810-817","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/OliveiraGS17","doi":"10.1109/ISCC.2017.8024627","ee":"https://doi.org/10.1109/ISCC.2017.8024627","url":"https://dblp.org/rec/conf/iscc/OliveiraGS17"}, "url":"URL#2953013" }, { "@score":"1", "@id":"2953014", "info":{"authors":{"author":[{"@pid":"38/9818","text":"Jianhua Pang"},{"@pid":"69/6137-3","text":"Sheng Zhang 0003"},{"@pid":"200/0073","text":"Wencang Bai"}]},"title":"A novel framework for enhancement of the low lighting video.","venue":"ISCC","pages":"1366-1371","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Pang0B17","doi":"10.1109/ISCC.2017.8024714","ee":"https://doi.org/10.1109/ISCC.2017.8024714","url":"https://dblp.org/rec/conf/iscc/Pang0B17"}, "url":"URL#2953014" }, { "@score":"1", "@id":"2953015", "info":{"authors":{"author":[{"@pid":"205/5504","text":"Nikolaos Papadis"},{"@pid":"08/9977","text":"Eleni Stai"},{"@pid":"22/6452","text":"Vasileios Karyotis"}]},"title":"A path-based recommendations approach for online systems via hyperbolic network embedding.","venue":"ISCC","pages":"973-980","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/PapadisSK17","doi":"10.1109/ISCC.2017.8024652","ee":"https://doi.org/10.1109/ISCC.2017.8024652","url":"https://dblp.org/rec/conf/iscc/PapadisSK17"}, "url":"URL#2953015" }, { "@score":"1", "@id":"2953016", "info":{"authors":{"author":[{"@pid":"45/10104","text":"George P. Petropoulos"},{"@pid":"89/1954","text":"Konstantinos V. Katsaros"},{"@pid":"203/8781","text":"Maria-Evgenia Xezonaki"}]},"title":"OpenFlow-compliant topology management for SDN-enabled Information Centric Networks.","venue":"ISCC","pages":"951-954","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/PetropoulosKX17","doi":"10.1109/ISCC.2017.8024648","ee":"https://doi.org/10.1109/ISCC.2017.8024648","url":"https://dblp.org/rec/conf/iscc/PetropoulosKX17"}, "url":"URL#2953016" }, { "@score":"1", "@id":"2953017", "info":{"authors":{"author":[{"@pid":"205/5516","text":"Andrea Simone Pinna"},{"@pid":"154/8270","text":"Giuseppe Portaluri"},{"@pid":"80/6788","text":"Stefano Giordano"}]},"title":"Shooter localization in wireless acoustic sensor networks.","venue":"ISCC","pages":"473-476","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/PinnaPG17","doi":"10.1109/ISCC.2017.8024573","ee":"https://doi.org/10.1109/ISCC.2017.8024573","url":"https://dblp.org/rec/conf/iscc/PinnaPG17"}, "url":"URL#2953017" }, { "@score":"1", "@id":"2953018", "info":{"authors":{"author":[{"@pid":"153/2230","text":"Gevorg Poghosyan"},{"@pid":"01/7553","text":"Ioannis Pefkianakis"},{"@pid":"36/9977","text":"Pascal Le Guyadec"},{"@pid":"c/VassilisChristophides","text":"Vassilis Christophides"}]},"title":"Extracting usage patterns of home IoT devices.","venue":"ISCC","pages":"1318-1324","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/PoghosyanPGC17","doi":"10.1109/ISCC.2017.8024707","ee":"https://doi.org/10.1109/ISCC.2017.8024707","url":"https://dblp.org/rec/conf/iscc/PoghosyanPGC17"}, "url":"URL#2953018" }, { "@score":"1", "@id":"2953019", "info":{"authors":{"author":[{"@pid":"31/7462","text":"Seyed Amin Pouriyeh"},{"@pid":"205/5476","text":"Sara Vahid"},{"@pid":"53/8145","text":"Giovanna Sannino"},{"@pid":"64/4882","text":"Giuseppe De Pietro"},{"@pid":"a/HRArabnia","text":"Hamid R. Arabnia"},{"@pid":"21/1913","text":"Juan B. Gutierrez"}]},"title":"A comprehensive investigation and comparison of Machine Learning Techniques in the domain of heart disease.","venue":"ISCC","pages":"204-207","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/PouriyehVSPAG17","doi":"10.1109/ISCC.2017.8024530","ee":"https://doi.org/10.1109/ISCC.2017.8024530","url":"https://dblp.org/rec/conf/iscc/PouriyehVSPAG17"}, "url":"URL#2953019" }, { "@score":"1", "@id":"2953020", "info":{"authors":{"author":[{"@pid":"151/7164","text":"Lukasz Prasnal"},{"@pid":"66/3224","text":"Marek Natkaniec"}]},"title":"Robust traffic differentiation with intra-AC prioritization in multirate IEEE 802.11aa networks.","venue":"ISCC","pages":"1278-1283","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/PrasnalN17","doi":"10.1109/ISCC.2017.8024700","ee":"https://doi.org/10.1109/ISCC.2017.8024700","url":"https://dblp.org/rec/conf/iscc/PrasnalN17"}, "url":"URL#2953020" }, { "@score":"1", "@id":"2953021", "info":{"authors":{"author":[{"@pid":"14/6841-2","text":"Tao Qin 0002"},{"@pid":"62/8555","text":"Yukun Liu"},{"@pid":"16/10143","text":"Chenxu Wang"},{"@pid":"67/1120-6","text":"Tao Yang 0006"},{"@pid":"39/3205","text":"Chao He"}]},"title":"From online to offline: Charactering user's online music listening behavior for efficacious offline radio program arrangement.","venue":"ISCC","pages":"1219-1224","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/QinLWYH17","doi":"10.1109/ISCC.2017.8024691","ee":"https://doi.org/10.1109/ISCC.2017.8024691","url":"https://dblp.org/rec/conf/iscc/QinLWYH17"}, "url":"URL#2953021" }, { "@score":"1", "@id":"2953022", "info":{"authors":{"author":[{"@pid":"56/8319","text":"Jalaluddin Qureshi"},{"@pid":"63/9216","text":"Adeel Malik"},{"@pid":"17/6484","text":"Chuan Heng Foh"}]},"title":"On expected transmissions for wireless random linear coding.","venue":"ISCC","pages":"359-364","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/QureshiMF17","doi":"10.1109/ISCC.2017.8024556","ee":"https://doi.org/10.1109/ISCC.2017.8024556","url":"https://dblp.org/rec/conf/iscc/QureshiMF17"}, "url":"URL#2953022" }, { "@score":"1", "@id":"2953023", "info":{"authors":{"author":[{"@pid":"140/4361","text":"Talha Faizur Rahman"},{"@pid":"130/5349","text":"Aamir Habib"},{"@pid":"57/2254","text":"Claudio Sacchi"},{"@pid":"74/2700","text":"Mohammed El-Hajjar"}]},"title":"Mm-Wave STSK-aided Single Carrier block transmission for broadband networking.","venue":"ISCC","pages":"507-514","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/RahmanHSE17","doi":"10.1109/ISCC.2017.8024579","ee":"https://doi.org/10.1109/ISCC.2017.8024579","url":"https://dblp.org/rec/conf/iscc/RahmanHSE17"}, "url":"URL#2953023" }, { "@score":"1", "@id":"2953024", "info":{"authors":{"author":[{"@pid":"205/5572","text":"Samira Reihanian"},{"@pid":"55/11444","text":"Ehsan Arbabi"},{"@pid":"49/215","text":"Behrouz Maham"}]},"title":"Random sparse representation for thermal to visible face recognition.","venue":"ISCC","pages":"1380-1385","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ReihanianAM17","doi":"10.1109/ISCC.2017.8024716","ee":"https://doi.org/10.1109/ISCC.2017.8024716","url":"https://dblp.org/rec/conf/iscc/ReihanianAM17"}, "url":"URL#2953024" }, { "@score":"1", "@id":"2953025", "info":{"authors":{"author":[{"@pid":"192/4793","text":"Paulo H. L. Rettore"},{"@pid":"192/4796","text":"Andre B. Campolina"},{"@pid":"64/7382","text":"Leandro A. Villas"},{"@pid":"l/AntonioAlfredoFerreiraLoureiro","text":"Antonio A. F. Loureiro"}]},"title":"A method of eco-driving based on intra-vehicular sensor data.","venue":"ISCC","pages":"1122-1127","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/RettoreCVL17","doi":"10.1109/ISCC.2017.8024676","ee":"https://doi.org/10.1109/ISCC.2017.8024676","url":"https://dblp.org/rec/conf/iscc/RettoreCVL17"}, "url":"URL#2953025" }, { "@score":"1", "@id":"2953026", "info":{"authors":{"author":[{"@pid":"28/11298","text":"Andre Riker"},{"@pid":"c/MariliaCurado","text":"Marília Curado"},{"@pid":"m/EdmundoMonteiro","text":"Edmundo Monteiro"}]},"title":"Neutral Operation of the Minimum Energy Node in energy-harvesting environments.","venue":"ISCC","pages":"477-482","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/RikerCM17","doi":"10.1109/ISCC.2017.8024574","ee":"https://doi.org/10.1109/ISCC.2017.8024574","url":"https://dblp.org/rec/conf/iscc/RikerCM17"}, "url":"URL#2953026" }, { "@score":"1", "@id":"2953027", "info":{"authors":{"author":[{"@pid":"25/505","text":"Laura Anna Ripamonti"},{"@pid":"205/5524","text":"Silvio Gratani"},{"@pid":"62/2483","text":"Dario Maggiorini"},{"@pid":"47/8294","text":"Davide Gadia"},{"@pid":"31/8928","text":"Armir Bujari"}]},"title":"Believable group behaviours for NPCs in FPS games.","venue":"ISCC","pages":"12-17","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/RipamontiGMGB17","doi":"10.1109/ISCC.2017.8024497","ee":"https://doi.org/10.1109/ISCC.2017.8024497","url":"https://dblp.org/rec/conf/iscc/RipamontiGMGB17"}, "url":"URL#2953027" }, { "@score":"1", "@id":"2953028", "info":{"authors":{"author":[{"@pid":"201/8542","text":"Jenny Inge Röbesaat"},{"@pid":"59/7923","text":"Frerk Müller-von Aschwege"},{"@pid":"205/5538","text":"Nils Reiss"},{"@pid":"90/390-3","text":"Thomas Schmidt 0003"},{"@pid":"205/5494","text":"Christina Feldmann"},{"@pid":"205/5560","text":"Ezin Deniz"},{"@pid":"205/5539","text":"Jan D. Schmitto"},{"@pid":"25/4650","text":"Andreas Hein 0001"}]},"title":"Analysis of LVAD log files for the early detection of pump thrombosis.","venue":"ISCC","pages":"236-241","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/RobesaatARSFDSH17","doi":"10.1109/ISCC.2017.8024535","ee":"https://doi.org/10.1109/ISCC.2017.8024535","url":"https://dblp.org/rec/conf/iscc/RobesaatARSFDSH17"}, "url":"URL#2953028" }, { "@score":"1", "@id":"2953029", "info":{"authors":{"author":[{"@pid":"164/8098","text":"Carlos Roberto De Rolt"},{"@pid":"11/2127","text":"Luca Foschini 0001"},{"@pid":"44/1768","text":"Fernando Ostuni Gauthier"},{"@pid":"205/5488","text":"Danilo Hasse"},{"@pid":"38/5309","text":"Rebecca Montanari"}]},"title":"Competence-based mobile Community Response Networks.","venue":"ISCC","pages":"994-1000","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/RoltFGHM17","doi":"10.1109/ISCC.2017.8024655","ee":"https://doi.org/10.1109/ISCC.2017.8024655","url":"https://dblp.org/rec/conf/iscc/RoltFGHM17"}, "url":"URL#2953029" }, { "@score":"1", "@id":"2953030", "info":{"authors":{"author":[{"@pid":"133/4878","text":"Giorgia V. Rossi"},{"@pid":"04/2707","text":"Kin K. Leung"}]},"title":"Optimised CSMA/CA protocol for safety messages in vehicular ad-hoc networks.","venue":"ISCC","pages":"689-696","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/RossiL17","doi":"10.1109/ISCC.2017.8024608","ee":"https://doi.org/10.1109/ISCC.2017.8024608","url":"https://dblp.org/rec/conf/iscc/RossiL17"}, "url":"URL#2953030" }, { "@score":"1", "@id":"2953031", "info":{"authors":{"author":[{"@pid":"205/5536","text":"Mahdi Saleh"},{"@pid":"205/5530","text":"Sami Serbey"},{"@pid":"205/5532","text":"Bouchra Fahs"}]},"title":"Data mining approach for estimating cloud-covered areas in MODIS satellite images.","venue":"ISCC","pages":"1164-1167","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SalehSF17","doi":"10.1109/ISCC.2017.8024682","ee":"https://doi.org/10.1109/ISCC.2017.8024682","url":"https://dblp.org/rec/conf/iscc/SalehSF17"}, "url":"URL#2953031" }, { "@score":"1", "@id":"2953032", "info":{"authors":{"author":[{"@pid":"160/7642","text":"Xiaokang Sang"},{"@pid":"61/591","text":"Qian Wu"},{"@pid":"51/8276","text":"Hewu Li"}]},"title":"iScan: Efficient WiFi Scan for mobile device based on client and network behavior learning.","venue":"ISCC","pages":"1109-1114","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SangWL17","doi":"10.1109/ISCC.2017.8024674","ee":"https://doi.org/10.1109/ISCC.2017.8024674","url":"https://dblp.org/rec/conf/iscc/SangWL17"}, "url":"URL#2953032" }, { "@score":"1", "@id":"2953033", "info":{"authors":{"author":[{"@pid":"66/11074","text":"Teodora Sanislav"},{"@pid":"50/2675","text":"Sherali Zeadally"},{"@pid":"35/11070","text":"George Dan Mois"},{"@pid":"47/3278","text":"Hacène Fouchal"}]},"title":"Multi-agent architecture for reliable Cyber-Physical Systems (CPS).","venue":"ISCC","pages":"170-175","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SanislavZMF17","doi":"10.1109/ISCC.2017.8024524","ee":"https://doi.org/10.1109/ISCC.2017.8024524","url":"https://dblp.org/rec/conf/iscc/SanislavZMF17"}, "url":"URL#2953033" }, { "@score":"1", "@id":"2953034", "info":{"authors":{"author":[{"@pid":"205/5478","text":"Guto Leoni Santos"},{"@pid":"18/8101","text":"Patricia Takako Endo"},{"@pid":"55/7441","text":"Glauco Estácio Gonçalves"},{"@pid":"203/6322","text":"Daniel Rosendo"},{"@pid":"203/6321","text":"Demis Gomes"},{"@pid":"10/1554","text":"Judith Kelner"},{"@pid":"s/DjamelSadok","text":"Djamel Sadok"},{"@pid":"121/8769","text":"Mozhgan Mahloo"}]},"title":"Analyzing the IT subsystem failure impact on availability of cloud services.","venue":"ISCC","pages":"717-723","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SantosEGRGKSM17","doi":"10.1109/ISCC.2017.8024612","ee":"https://doi.org/10.1109/ISCC.2017.8024612","url":"https://dblp.org/rec/conf/iscc/SantosEGRGKSM17"}, "url":"URL#2953034" }, { "@score":"1", "@id":"2953035", "info":{"authors":{"author":[{"@pid":"205/5567","text":"Natsuhiko Sato"},{"@pid":"97/5055","text":"Takashi Oshiba"},{"@pid":"80/6240","text":"Kousuke Nogami"},{"@pid":"151/3997","text":"Anan Sawabe"},{"@pid":"02/5339","text":"Kozo Satoda"}]},"title":"Experimental comparison of machine learning-based available bandwidth estimation methods over operational LTE networks.","venue":"ISCC","pages":"339-346","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SatoONSS17","doi":"10.1109/ISCC.2017.8024553","ee":"https://doi.org/10.1109/ISCC.2017.8024553","url":"https://dblp.org/rec/conf/iscc/SatoONSS17"}, "url":"URL#2953035" }, { "@score":"1", "@id":"2953036", "info":{"authors":{"author":[{"@pid":"205/5544","text":"Antoine Saverimoutou"},{"@pid":"19/3021","text":"Bertrand Mathieu"},{"@pid":"66/942","text":"Sandrine Vaton"}]},"title":"Which secure transport protocol for a reliable HTTP/2-based web service: TLS or QUIC?","venue":"ISCC","pages":"879-884","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SaverimoutouMV17","doi":"10.1109/ISCC.2017.8024637","ee":"https://doi.org/10.1109/ISCC.2017.8024637","url":"https://dblp.org/rec/conf/iscc/SaverimoutouMV17"}, "url":"URL#2953036" }, { "@score":"1", "@id":"2953037", "info":{"authors":{"author":[{"@pid":"167/3357","text":"Nils Schmidt"},{"@pid":"48/9378","text":"Lars Baumgärtner"},{"@pid":"204/6408","text":"Patrick Lampe"},{"@pid":"g/KurtGeihs","text":"Kurt Geihs"},{"@pid":"f/BerndFreisleben","text":"Bernd Freisleben"}]},"title":"MiniWorld: Resource-aware distributed network emulation via full virtualization.","venue":"ISCC","pages":"818-825","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SchmidtBLGF17","doi":"10.1109/ISCC.2017.8024628","ee":"https://doi.org/10.1109/ISCC.2017.8024628","url":"https://dblp.org/rec/conf/iscc/SchmidtBLGF17"}, "url":"URL#2953037" }, { "@score":"1", "@id":"2953038", "info":{"authors":{"author":[{"@pid":"160/0146","text":"Savio Sciancalepore"},{"@pid":"55/7732","text":"Giuseppe Piro"},{"@pid":"205/5565","text":"Daniele Caldarola"},{"@pid":"73/6219","text":"Gennaro Boggia"},{"@pid":"22/3090-1","text":"Giuseppe Bianchi 0001"}]},"title":"OAuth-IoT: An access control framework for the Internet of Things based on open standards.","venue":"ISCC","pages":"676-681","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SciancaleporePC17","doi":"10.1109/ISCC.2017.8024606","ee":"https://doi.org/10.1109/ISCC.2017.8024606","url":"https://dblp.org/rec/conf/iscc/SciancaleporePC17"}, "url":"URL#2953038" }, { "@score":"1", "@id":"2953039", "info":{"authors":{"author":[{"@pid":"176/1033","text":"Walid Serrai"},{"@pid":"122/0336","text":"Abdelkrim Abdelli"},{"@pid":"22/5508","text":"Lynda Mokdad"},{"@pid":"205/5501","text":"Ashref Serrai"}]},"title":"Dealing with user constraints in MCDM based web service selection.","venue":"ISCC","pages":"158-163","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SerraiAMS17","doi":"10.1109/ISCC.2017.8024522","ee":"https://doi.org/10.1109/ISCC.2017.8024522","url":"https://dblp.org/rec/conf/iscc/SerraiAMS17"}, "url":"URL#2953039" }, { "@score":"1", "@id":"2953040", "info":{"authors":{"author":[{"@pid":"168/2454","text":"Mina Sheikhalishahi"},{"@pid":"m/FMartinelli","text":"Fabio Martinelli"}]},"title":"Privacy preserving clustering over horizontal and vertical partitioned data.","venue":"ISCC","pages":"1237-1244","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SheikhalishahiM17","doi":"10.1109/ISCC.2017.8024694","ee":"https://doi.org/10.1109/ISCC.2017.8024694","url":"https://dblp.org/rec/conf/iscc/SheikhalishahiM17"}, "url":"URL#2953040" }, { "@score":"1", "@id":"2953041", "info":{"authors":{"author":{"@pid":"53/4994","text":"Kazuyuki Shudo"}},"title":"Message bundling on structured overlays.","venue":"ISCC","pages":"424-431","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Shudo17","doi":"10.1109/ISCC.2017.8024566","ee":"https://doi.org/10.1109/ISCC.2017.8024566","url":"https://dblp.org/rec/conf/iscc/Shudo17"}, "url":"URL#2953041" }, { "@score":"1", "@id":"2953042", "info":{"authors":{"author":[{"@pid":"s/RKShyamasundar","text":"R. K. Shyamasundar"},{"@pid":"98/2644","text":"N. V. Narendra Kumar"},{"@pid":"205/5543","text":"Priyanka Teltumde"}]},"title":"Realizing software vault on Android through information-flow control.","venue":"ISCC","pages":"1007-1014","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ShyamasundarKT17","doi":"10.1109/ISCC.2017.8024657","ee":"https://doi.org/10.1109/ISCC.2017.8024657","url":"https://dblp.org/rec/conf/iscc/ShyamasundarKT17"}, "url":"URL#2953042" }, { "@score":"1", "@id":"2953043", "info":{"authors":{"author":[{"@pid":"57/7800","text":"Mahdi Jafari Siavoshani"},{"@pid":"55/10543","text":"Seyed Pooya Shariatpanahi"},{"@pid":"188/6194","text":"Hamid Ghasemi"},{"@pid":"33/81","text":"Ali Pourmiri"}]},"title":"On communication cost vs. load balancing in Content Delivery Networks.","venue":"ISCC","pages":"651-656","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SiavoshaniSGP17","doi":"10.1109/ISCC.2017.8024602","ee":"https://doi.org/10.1109/ISCC.2017.8024602","url":"https://dblp.org/rec/conf/iscc/SiavoshaniSGP17"}, "url":"URL#2953043" }, { "@score":"1", "@id":"2953044", "info":{"authors":{"author":[{"@pid":"72/11037","text":"João Marco C. Silva"},{"@pid":"119/9001","text":"Kalil Araujo Bispo"},{"@pid":"52/5239-2","text":"Paulo Carvalho 0002"},{"@pid":"37/5677","text":"Solange Rito Lima"}]},"title":"LiteSense: An adaptive sensing scheme for WSNs.","venue":"ISCC","pages":"1209-1212","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SilvaB0L17","doi":"10.1109/ISCC.2017.8024689","ee":"https://doi.org/10.1109/ISCC.2017.8024689","url":"https://dblp.org/rec/conf/iscc/SilvaB0L17"}, "url":"URL#2953044" }, { "@score":"1", "@id":"2953045", "info":{"authors":{"author":[{"@pid":"13/3798","text":"João Silva"},{"@pid":"45/3616","text":"Pedro Brandão"},{"@pid":"28/3351","text":"Rui Prior"}]},"title":"Usability assessment of a Health Kiosk.","venue":"ISCC","pages":"260-265","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SilvaBP17","doi":"10.1109/ISCC.2017.8024539","ee":"https://doi.org/10.1109/ISCC.2017.8024539","url":"https://dblp.org/rec/conf/iscc/SilvaBP17"}, "url":"URL#2953045" }, { "@score":"1", "@id":"2953046", "info":{"authors":{"author":[{"@pid":"156/3489-1","text":"José Silva 0001"},{"@pid":"84/7333","text":"André Dias"},{"@pid":"31/9235","text":"João Nogueira"},{"@pid":"27/1247","text":"Lucas Guardalben"},{"@pid":"94/4930","text":"Susana Sargento"}]},"title":"Content-aware prefetching in Over-The-Top wireless networks.","venue":"ISCC","pages":"515-522","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SilvaDNGS17","doi":"10.1109/ISCC.2017.8024580","ee":"https://doi.org/10.1109/ISCC.2017.8024580","url":"https://dblp.org/rec/conf/iscc/SilvaDNGS17"}, "url":"URL#2953046" }, { "@score":"1", "@id":"2953047", "info":{"authors":{"author":[{"@pid":"202/2597","text":"Michael D. Silva"},{"@pid":"173/5375","text":"Ivan Oliveira Nunes"},{"@pid":"59/3719","text":"Raquel A. F. Mini"},{"@pid":"l/AntonioAlfredoFerreiraLoureiro","text":"Antonio A. F. Loureiro"}]},"title":"ST-Drop: A novel buffer management strategy for D2D opportunistic networks.","venue":"ISCC","pages":"1300-1305","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SilvaNML17","doi":"10.1109/ISCC.2017.8024704","ee":"https://doi.org/10.1109/ISCC.2017.8024704","url":"https://dblp.org/rec/conf/iscc/SilvaNML17"}, "url":"URL#2953047" }, { "@score":"1", "@id":"2953048", "info":{"authors":{"author":[{"@pid":"83/10399","text":"Emmanouil Skondras"},{"@pid":"19/967","text":"Angelos Michalas"},{"@pid":"32/2864","text":"Aggeliki Sgora"},{"@pid":"67/2009","text":"Dimitrios D. Vergados"}]},"title":"A Vertical Handover management scheme for VANET Cloud Computing systems.","venue":"ISCC","pages":"371-376","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SkondrasMSV17","doi":"10.1109/ISCC.2017.8024558","ee":"https://doi.org/10.1109/ISCC.2017.8024558","url":"https://dblp.org/rec/conf/iscc/SkondrasMSV17"}, "url":"URL#2953048" }, { "@score":"1", "@id":"2953049", "info":{"authors":{"author":[{"@pid":"166/7996","text":"Berglind Fjola Smaradottir"},{"@pid":"205/5541","text":"Santiago Gil Martinez"},{"@pid":"212/2108","text":"Jarle Audun Håland"}]},"title":"Evaluation of touchscreen assistive technology for visually disabled users.","venue":"ISCC","pages":"248-253","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SmaradottirMH17","doi":"10.1109/ISCC.2017.8024537","ee":"https://doi.org/10.1109/ISCC.2017.8024537","url":"https://dblp.org/rec/conf/iscc/SmaradottirMH17"}, "url":"URL#2953049" }, { "@score":"1", "@id":"2953050", "info":{"authors":{"author":[{"@pid":"56/5666","text":"João Soares"},{"@pid":"150/5610","text":"Joao Aparicio"},{"@pid":"94/4930","text":"Susana Sargento"}]},"title":"Dynamic strategies for the optimal embedding of Virtual Infrastructures.","venue":"ISCC","pages":"272-277","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SoaresAS17","doi":"10.1109/ISCC.2017.8024541","ee":"https://doi.org/10.1109/ISCC.2017.8024541","url":"https://dblp.org/rec/conf/iscc/SoaresAS17"}, "url":"URL#2953050" }, { "@score":"1", "@id":"2953051", "info":{"authors":{"author":[{"@pid":"56/5666","text":"João Soares"},{"@pid":"94/4930","text":"Susana Sargento"}]},"title":"Re-optimizing the embedding of Virtual Infrastructures.","venue":"ISCC","pages":"620-626","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SoaresS17","doi":"10.1109/ISCC.2017.8024597","ee":"https://doi.org/10.1109/ISCC.2017.8024597","url":"https://dblp.org/rec/conf/iscc/SoaresS17"}, "url":"URL#2953051" }, { "@score":"1", "@id":"2953052", "info":{"authors":{"author":[{"@pid":"116/2869","text":"Ahmed Soua"},{"@pid":"51/10643","text":"Ridha Soua"}]},"title":"SuPRANO: On the localization of connected vehicles in hostile environments: A Semi-suPervised manifold leaRning technique.","venue":"ISCC","pages":"1067-1072","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SouaS17","doi":"10.1109/ISCC.2017.8024667","ee":"https://doi.org/10.1109/ISCC.2017.8024667","url":"https://dblp.org/rec/conf/iscc/SouaS17"}, "url":"URL#2953052" }, { "@score":"1", "@id":"2953053", "info":{"authors":{"author":[{"@pid":"68/3473","text":"Stavros Souravlas"},{"@pid":"43/5958","text":"Angelo Sifaleras"}]},"title":"On minimizing memory and computation overheads for binary-tree based data replication.","venue":"ISCC","pages":"1296-1299","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SouravlasS17","doi":"10.1109/ISCC.2017.8024703","ee":"https://doi.org/10.1109/ISCC.2017.8024703","url":"https://dblp.org/rec/conf/iscc/SouravlasS17"}, "url":"URL#2953053" }, { "@score":"1", "@id":"2953054", "info":{"authors":{"author":[{"@pid":"205/5523","text":"Srinikethan Madapuzi Srinivasan"},{"@pid":"34/7684","text":"Tram Truong Huu"},{"@pid":"m/GMohan","text":"Mohan Gurusamy"}]},"title":"Flexible bandwidth allocation for big data transfer with deadline constraints.","venue":"ISCC","pages":"347-352","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SrinivasanHG17","doi":"10.1109/ISCC.2017.8024554","ee":"https://doi.org/10.1109/ISCC.2017.8024554","url":"https://dblp.org/rec/conf/iscc/SrinivasanHG17"}, "url":"URL#2953054" }, { "@score":"1", "@id":"2953055", "info":{"authors":{"author":[{"@pid":"63/5636","text":"Eleftherios Stergiou"},{"@pid":"35/6216","text":"Dimitrios Liarokapis"},{"@pid":"19/3135","text":"John D. Garofalakis"}]},"title":"Improving the behavior of Interconnection Networks by using multiple internal paths and fan-outs.","venue":"ISCC","pages":"322-326","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/StergiouLG17","doi":"10.1109/ISCC.2017.8024550","ee":"https://doi.org/10.1109/ISCC.2017.8024550","url":"https://dblp.org/rec/conf/iscc/StergiouLG17"}, "url":"URL#2953055" }, { "@score":"1", "@id":"2953056", "info":{"authors":{"author":[{"@pid":"01/5401-7","text":"Bin Sun 0007"},{"@pid":"89/2506","text":"Wei Cheng"},{"@pid":"50/9379","text":"Prashant Goswami"},{"@pid":"44/1642","text":"Guohua Bai"}]},"title":"Flow-aware WPT k-nearest neighbours regression for short-term traffic prediction.","venue":"ISCC","pages":"48-53","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SunCGB17","doi":"10.1109/ISCC.2017.8024503","ee":"https://doi.org/10.1109/ISCC.2017.8024503","url":"https://dblp.org/rec/conf/iscc/SunCGB17"}, "url":"URL#2953056" }, { "@score":"1", "@id":"2953057", "info":{"authors":{"author":[{"@pid":"204/6360","text":"Gadiraju Divija Swetha"},{"@pid":"81/2699","text":"Garimella Rama Murthy"}]},"title":"Selective overlay mode operation for D2D communication in dense 5G cellular networks.","venue":"ISCC","pages":"704-709","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/SwethaM17","doi":"10.1109/ISCC.2017.8024610","ee":"https://doi.org/10.1109/ISCC.2017.8024610","url":"https://dblp.org/rec/conf/iscc/SwethaM17"}, "url":"URL#2953057" }, { "@score":"1", "@id":"2953058", "info":{"authors":{"author":[{"@pid":"205/5553","text":"Hussein Taleb"},{"@pid":"127/4749","text":"Melhem El Helou"},{"@pid":"02/3994","text":"Kinda Khawam"},{"@pid":"82/4450","text":"Samer Lahoud"},{"@pid":"05/3990-1","text":"Steven Martin 0001"}]},"title":"Centralized and distributed RRH clustering in Cloud Radio Access Networks.","venue":"ISCC","pages":"1091-1097","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/TalebHKLM17","doi":"10.1109/ISCC.2017.8024671","ee":"https://doi.org/10.1109/ISCC.2017.8024671","url":"https://dblp.org/rec/conf/iscc/TalebHKLM17"}, "url":"URL#2953058" }, { "@score":"1", "@id":"2953059", "info":{"authors":{"author":[{"@pid":"88/3775","text":"Yi Tang"},{"@pid":"148/2365","text":"Xiaolian Duan"},{"@pid":"143/0221","text":"Ting Fan"},{"@pid":"205/5492","text":"Hailing Feng"},{"@pid":"66/2173","text":"Wei Jin"},{"@pid":"205/5495","text":"Bozhi Shi"}]},"title":"The study of the implementation and the extension of the ISO/IEEE-11073 standards.","venue":"ISCC","pages":"193-197","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/TangDFFJS17","doi":"10.1109/ISCC.2017.8024528","ee":"https://doi.org/10.1109/ISCC.2017.8024528","url":"https://dblp.org/rec/conf/iscc/TangDFFJS17"}, "url":"URL#2953059" }, { "@score":"1", "@id":"2953060", "info":{"authors":{"author":[{"@pid":"205/5473","text":"Hayfa Ben Thameur"},{"@pid":"03/4695","text":"Bertrand Le Gal"},{"@pid":"96/8335","text":"Nadia Khouja"},{"@pid":"88/2536","text":"Fethi Tlili"},{"@pid":"31/6022","text":"Christophe Jégo"}]},"title":"A survey on decoding schedules of LDPC convolutional codes and associated hardware architectures.","venue":"ISCC","pages":"898-905","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ThameurGKTJ17","doi":"10.1109/ISCC.2017.8024640","ee":"https://doi.org/10.1109/ISCC.2017.8024640","url":"https://dblp.org/rec/conf/iscc/ThameurGKTJ17"}, "url":"URL#2953060" }, { "@score":"1", "@id":"2953061", "info":{"authors":{"author":[{"@pid":"129/2234","text":"Anastasia Theodouli"},{"@pid":"75/7248","text":"Konstantinos A. Draziotis"},{"@pid":"g/AGounaris","text":"Anastasios Gounaris"}]},"title":"Implementing private k-means clustering using a LWE-based cryptosystem.","venue":"ISCC","pages":"88-93","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/TheodouliDG17","doi":"10.1109/ISCC.2017.8024510","ee":"https://doi.org/10.1109/ISCC.2017.8024510","url":"https://dblp.org/rec/conf/iscc/TheodouliDG17"}, "url":"URL#2953061" }, { "@score":"1", "@id":"2953062", "info":{"authors":{"author":[{"@pid":"15/9003","text":"Geng Tian"},{"@pid":"58/5311","text":"Zhiliang Wang"},{"@pid":"77/5776","text":"Xia Yin"},{"@pid":"85/5901","text":"Jun Chen"},{"@pid":"93/5648","text":"Xingang Shi"},{"@pid":"72/4184","text":"Chao Zhou"},{"@pid":"87/5323","text":"Zimu Li"},{"@pid":"155/8107","text":"Yingya Guo"}]},"title":"CEFF: An efficient approach for traffic anomaly detection and classification.","venue":"ISCC","pages":"779-786","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/TianWYCSZLG17","doi":"10.1109/ISCC.2017.8024622","ee":"https://doi.org/10.1109/ISCC.2017.8024622","url":"https://dblp.org/rec/conf/iscc/TianWYCSZLG17"}, "url":"URL#2953062" }, { "@score":"1", "@id":"2953063", "info":{"authors":{"author":[{"@pid":"156/8881","text":"Sherif Tolba"},{"@pid":"a/RedaAAmmar","text":"Reda Ammar"}]},"title":"Virtual Tether Search: A self-constraining search algorithm for swarms in an open ocean.","venue":"ISCC","pages":"1128-1135","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/TolbaA17","doi":"10.1109/ISCC.2017.8024677","ee":"https://doi.org/10.1109/ISCC.2017.8024677","url":"https://dblp.org/rec/conf/iscc/TolbaA17"}, "url":"URL#2953063" }, { "@score":"1", "@id":"2953064", "info":{"authors":{"author":{"@pid":"38/3807","text":"Konstantinos P. Tsoukatos"}},"title":"Real-time interference mitigation by randomized convex approximation.","venue":"ISCC","pages":"608-613","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Tsoukatos17","doi":"10.1109/ISCC.2017.8024595","ee":"https://doi.org/10.1109/ISCC.2017.8024595","url":"https://dblp.org/rec/conf/iscc/Tsoukatos17"}, "url":"URL#2953064" }, { "@score":"1", "@id":"2953065", "info":{"authors":{"author":[{"@pid":"193/6058","text":"Emmanuel Tuyishimire"},{"@pid":"65/326","text":"Antoine B. Bagula"},{"@pid":"01/5254","text":"Slim Rekhis"},{"@pid":"28/3198","text":"Noureddine Boudriga"}]},"title":"Cooperative data muling from ground sensors to base stations using UAVs.","venue":"ISCC","pages":"35-41","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/TuyishimireBRB17","doi":"10.1109/ISCC.2017.8024501","ee":"https://doi.org/10.1109/ISCC.2017.8024501","url":"https://dblp.org/rec/conf/iscc/TuyishimireBRB17"}, "url":"URL#2953065" }, { "@score":"1", "@id":"2953066", "info":{"authors":{"author":{"@pid":"66/4100","text":"Pascal Urien"}},"title":"Introducing TLS/DTLS Secure Access Modules for IoT frameworks: Concepts and experiments.","venue":"ISCC","pages":"220-227","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/Urien17","doi":"10.1109/ISCC.2017.8024533","ee":"https://doi.org/10.1109/ISCC.2017.8024533","url":"https://dblp.org/rec/conf/iscc/Urien17"}, "url":"URL#2953066" }, { "@score":"1", "@id":"2953067", "info":{"authors":{"author":[{"@pid":"115/6478","text":"Panagiotis Vamvakas"},{"@pid":"42/64","text":"Eirini-Eleni Tsiropoulou"},{"@pid":"62/4765","text":"Symeon Papavassiliou"},{"@pid":"b/JohnSBaras","text":"John S. Baras"}]},"title":"Optimization and resource management in NOMA wireless networks supporting real and non-real time service bundling.","venue":"ISCC","pages":"697-703","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/VamvakasTPB17","doi":"10.1109/ISCC.2017.8024609","ee":"https://doi.org/10.1109/ISCC.2017.8024609","url":"https://dblp.org/rec/conf/iscc/VamvakasTPB17"}, "url":"URL#2953067" }, { "@score":"1", "@id":"2953068", "info":{"authors":{"author":[{"@pid":"53/2185","text":"Pieter Vansteenwegen"},{"@pid":"205/5475","text":"Corrinne Luteyn"}]},"title":"Reducing logistic vehicle kilometers in a city area based on network changes.","venue":"ISCC","pages":"140-145","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/VansteenwegenL17","doi":"10.1109/ISCC.2017.8024519","ee":"https://doi.org/10.1109/ISCC.2017.8024519","url":"https://dblp.org/rec/conf/iscc/VansteenwegenL17"}, "url":"URL#2953068" }, { "@score":"1", "@id":"2953069", "info":{"authors":{"author":[{"@pid":"120/2495-1","text":"Eduardo Viegas 0001"},{"@pid":"38/5417","text":"Altair Olivo Santin"},{"@pid":"176/5736","text":"Vilmar Abreu"},{"@pid":"o/LuizSOliveira","text":"Luiz S. Oliveira"}]},"title":"Stream learning and anomaly-based intrusion detection in the adversarial settings.","venue":"ISCC","pages":"773-778","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ViegasSAO17","doi":"10.1109/ISCC.2017.8024621","ee":"https://doi.org/10.1109/ISCC.2017.8024621","url":"https://dblp.org/rec/conf/iscc/ViegasSAO17"}, "url":"URL#2953069" }, { "@score":"1", "@id":"2953070", "info":{"authors":{"author":[{"@pid":"70/450","text":"Massimo Villari"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"201/8043","text":"Giuseppe Tricomi"},{"@pid":"202/3093","text":"Antonino Galletta"},{"@pid":"09/4135","text":"Maria Fazio"}]},"title":"Deployment orchestration of microservices with geographical constraints for Edge computing.","venue":"ISCC","pages":"633-638","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/VillariCTGF17","doi":"10.1109/ISCC.2017.8024599","ee":"https://doi.org/10.1109/ISCC.2017.8024599","url":"https://dblp.org/rec/conf/iscc/VillariCTGF17"}, "url":"URL#2953070" }, { "@score":"1", "@id":"2953071", "info":{"authors":{"author":[{"@pid":"204/3581","text":"Felipe Volpato"},{"@pid":"21/3058","text":"Madalena Pereira da Silva"},{"@pid":"43/4251","text":"Alexandre Leopoldo Gonçalves"},{"@pid":"d/MarioARDantas","text":"Mário Antônio Ribeiro Dantas"}]},"title":"An Autonomic QoS management architecture for Software-Defined Networking environments.","venue":"ISCC","pages":"418-423","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/VolpatoSGD17","doi":"10.1109/ISCC.2017.8024565","ee":"https://doi.org/10.1109/ISCC.2017.8024565","url":"https://dblp.org/rec/conf/iscc/VolpatoSGD17"}, "url":"URL#2953071" }, { "@score":"1", "@id":"2953072", "info":{"authors":{"author":[{"@pid":"73/6827","text":"Alexandre Wagemakers"},{"@pid":"94/8707","text":"Francisco J. Escribano"}]},"title":"Software-Defined Radio proof-of-concept for chaos-based coded modulations.","venue":"ISCC","pages":"748-753","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WagemakersE17","doi":"10.1109/ISCC.2017.8024617","ee":"https://doi.org/10.1109/ISCC.2017.8024617","url":"https://dblp.org/rec/conf/iscc/WagemakersE17"}, "url":"URL#2953072" }, { "@score":"1", "@id":"2953073", "info":{"authors":{"author":[{"@pid":"32/4635","text":"Shie-Yuan Wang"},{"@pid":"88/1509","text":"Chun-Hao Chang"},{"@pid":"127/3915","text":"Yi-Hsuan Hsieh"},{"@pid":"80/6966","text":"Chih-Liang Chou"}]},"title":"Design and implementation of a Packet-in buffer system for SDN switches.","venue":"ISCC","pages":"955-960","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WangCHC17","doi":"10.1109/ISCC.2017.8024649","ee":"https://doi.org/10.1109/ISCC.2017.8024649","url":"https://dblp.org/rec/conf/iscc/WangCHC17"}, "url":"URL#2953073" }, { "@score":"1", "@id":"2953074", "info":{"authors":{"author":[{"@pid":"32/4635","text":"Shie-Yuan Wang"},{"@pid":"205/5534","text":"Chen Jhong"},{"@pid":"80/6966","text":"Chih-Liang Chou"}]},"title":"Performance evaluation of OpenFlow scheduled bundles for consistent updates.","venue":"ISCC","pages":"961-966","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WangJC17","doi":"10.1109/ISCC.2017.8024650","ee":"https://doi.org/10.1109/ISCC.2017.8024650","url":"https://dblp.org/rec/conf/iscc/WangJC17"}, "url":"URL#2953074" }, { "@score":"1", "@id":"2953075", "info":{"authors":{"author":[{"@pid":"38/2429-3","text":"Xiaoguang Wang 0003"},{"@pid":"01/2240","text":"Yong Qi"}]},"title":"Secure the commodity applications against address exposure attacks.","venue":"ISCC","pages":"450-456","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WangQ17","doi":"10.1109/ISCC.2017.8024570","ee":"https://doi.org/10.1109/ISCC.2017.8024570","url":"https://dblp.org/rec/conf/iscc/WangQ17"}, "url":"URL#2953075" }, { "@score":"1", "@id":"2953076", "info":{"authors":{"author":[{"@pid":"71/4292","text":"Gang Wang"},{"@pid":"163/7315","text":"Yanyuan Qin"},{"@pid":"205/5566","text":"Chengjuan Chang"}]},"title":"Communication with partial noisy feedback.","venue":"ISCC","pages":"602-607","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WangQC17","doi":"10.1109/ISCC.2017.8024594","ee":"https://doi.org/10.1109/ISCC.2017.8024594","url":"https://dblp.org/rec/conf/iscc/WangQC17"}, "url":"URL#2953076" }, { "@score":"1", "@id":"2953077", "info":{"authors":{"author":[{"@pid":"164/4602","text":"Youshi Wang"},{"@pid":"10/1849-1","text":"Fa Zhang 0001"},{"@pid":"06/2293-28","text":"Rui Wang 0028"},{"@pid":"135/8716","text":"Yangguang Shi"},{"@pid":"12/5941","text":"Hua Guo"},{"@pid":"16/5205-2","text":"Zhiyong Liu 0002"}]},"title":"Real-time Task Scheduling for joint energy efficiency optimization in data centers.","venue":"ISCC","pages":"838-843","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WangZWSGL17","doi":"10.1109/ISCC.2017.8024631","ee":"https://doi.org/10.1109/ISCC.2017.8024631","url":"https://dblp.org/rec/conf/iscc/WangZWSGL17"}, "url":"URL#2953077" }, { "@score":"1", "@id":"2953078", "info":{"authors":{"author":[{"@pid":"205/5497","text":"Guang Wei"},{"@pid":"94/8072","text":"Hailong Yang"},{"@pid":"26/2404","text":"Zhongzhi Luan"},{"@pid":"08/4002","text":"Depei Qian"}]},"title":"iDPL: A scalable and flexible inter-continental testbed for data placement research and experiment.","venue":"ISCC","pages":"1158-1163","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WeiYLQ17","doi":"10.1109/ISCC.2017.8024681","ee":"https://doi.org/10.1109/ISCC.2017.8024681","url":"https://dblp.org/rec/conf/iscc/WeiYLQ17"}, "url":"URL#2953078" }, { "@score":"1", "@id":"2953079", "info":{"authors":{"author":[{"@pid":"205/5521","text":"Jingbang Wu"},{"@pid":"15/6740","text":"Huimei Lu"},{"@pid":"98/2912-2","text":"Yong Xiang 0002"}]},"title":"Measurement and comparison of Sub-1GHz and IEEE 802.11p in vehicular networks.","venue":"ISCC","pages":"1063-1066","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WuLX17","doi":"10.1109/ISCC.2017.8024666","ee":"https://doi.org/10.1109/ISCC.2017.8024666","url":"https://dblp.org/rec/conf/iscc/WuLX17"}, "url":"URL#2953079" }, { "@score":"1", "@id":"2953080", "info":{"authors":{"author":[{"@pid":"93/582","text":"Yao Wu"},{"@pid":"172/5536","text":"Yuncheng Wu"},{"@pid":"167/9115","text":"Juru Zeng"},{"@pid":"52/4150-1","text":"Hong Chen 0001"},{"@pid":"03/6827-1","text":"Cuiping Li 0001"}]},"title":"PIE: A personalized incentive for location-aware mobile crowd sensing.","venue":"ISCC","pages":"981-986","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/WuWZCL17","doi":"10.1109/ISCC.2017.8024653","ee":"https://doi.org/10.1109/ISCC.2017.8024653","url":"https://dblp.org/rec/conf/iscc/WuWZCL17"}, "url":"URL#2953080" }, { "@score":"1", "@id":"2953081", "info":{"authors":{"author":[{"@pid":"14/5580","text":"Yi Xu"},{"@pid":"15/1522","text":"Yong Zhan"},{"@pid":"65/95","text":"Du Xu"}]},"title":"Building cost efficient cloud data centers via geographical load balancing.","venue":"ISCC","pages":"826-831","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/XuZX17","doi":"10.1109/ISCC.2017.8024629","ee":"https://doi.org/10.1109/ISCC.2017.8024629","url":"https://dblp.org/rec/conf/iscc/XuZX17"}, "url":"URL#2953081" }, { "@score":"1", "@id":"2953082", "info":{"authors":{"author":[{"@pid":"88/3999-3","text":"Ting Yang 0003"},{"@pid":"16/5700","text":"Fabien Héliot"},{"@pid":"17/6484","text":"Chuan Heng Foh"},{"@pid":"59/3145","text":"Klaus Moessner"}]},"title":"Boundary-enabled fair scheduling in downlink multi-carrier multiple-access networks.","venue":"ISCC","pages":"590-595","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/YangHFM17","doi":"10.1109/ISCC.2017.8024592","ee":"https://doi.org/10.1109/ISCC.2017.8024592","url":"https://dblp.org/rec/conf/iscc/YangHFM17"}, "url":"URL#2953082" }, { "@score":"1", "@id":"2953083", "info":{"authors":{"author":[{"@pid":"147/5908","text":"Mohamad Yassin"},{"@pid":"07/5527","text":"Karine Guillouard"},{"@pid":"96/1488","text":"Meryem Ouzzif"},{"@pid":"205/5540","text":"Roland Picard"},{"@pid":"34/2140","text":"Denis Aluze"}]},"title":"A programmable Controller for unified management of virtualized network infrastructures.","venue":"ISCC","pages":"1344-1351","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/YassinGOPA17","doi":"10.1109/ISCC.2017.8024711","ee":"https://doi.org/10.1109/ISCC.2017.8024711","url":"https://dblp.org/rec/conf/iscc/YassinGOPA17"}, "url":"URL#2953083" }, { "@score":"1", "@id":"2953084", "info":{"authors":{"author":[{"@pid":"182/6803","text":"Yuhang Ye"},{"@pid":"42/5859-1","text":"Brian Lee 0001"},{"@pid":"41/1480","text":"Ronan Flynn"},{"@pid":"05/9290","text":"Niall Murray"},{"@pid":"07/1610","text":"Yuansong Qiao"}]},"title":"HLAF: Heterogeneous-Latency Adaptive Forwarding strategy for Peer-Assisted Video Streaming in NDN.","venue":"ISCC","pages":"657-662","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/YeLFMQ17","doi":"10.1109/ISCC.2017.8024603","ee":"https://doi.org/10.1109/ISCC.2017.8024603","url":"https://dblp.org/rec/conf/iscc/YeLFMQ17"}, "url":"URL#2953084" }, { "@score":"1", "@id":"2953085", "info":{"authors":{"author":[{"@pid":"205/5493","text":"Marie-Josepha Youssef"},{"@pid":"57/3779","text":"Joumana Farah"},{"@pid":"72/1588","text":"Charbel Abdel Nour"},{"@pid":"70/3031","text":"Catherine Douillard"}]},"title":"Waterfilling-based resource allocation techniques in downlink Non-Orthogonal Multiple Access (NOMA) with Single-User MIMO.","venue":"ISCC","pages":"499-506","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/YoussefFND17","doi":"10.1109/ISCC.2017.8024578","ee":"https://doi.org/10.1109/ISCC.2017.8024578","url":"https://dblp.org/rec/conf/iscc/YoussefFND17"}, "url":"URL#2953085" }, { "@score":"1", "@id":"2953086", "info":{"authors":{"author":[{"@pid":"202/7128","text":"Xinlei Yu"},{"@pid":"205/5506","text":"Yuqi Ye"},{"@pid":"02/736","text":"Jing Wang"},{"@pid":"65/7820","text":"Yan Qiao"}]},"title":"Practical loss inference in uncertain networks.","venue":"ISCC","pages":"596-601","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/YuYWQ17","doi":"10.1109/ISCC.2017.8024593","ee":"https://doi.org/10.1109/ISCC.2017.8024593","url":"https://dblp.org/rec/conf/iscc/YuYWQ17"}, "url":"URL#2953086" }, { "@score":"1", "@id":"2953087", "info":{"authors":{"author":[{"@pid":"188/9655","text":"Yali Yuan"},{"@pid":"205/5570","text":"Liuwei Huo"},{"@pid":"h/DieterHogrefe","text":"Dieter Hogrefe"}]},"title":"Two Layers Multi-class Detection method for network Intrusion Detection System.","venue":"ISCC","pages":"767-772","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/YuanHH17","doi":"10.1109/ISCC.2017.8024620","ee":"https://doi.org/10.1109/ISCC.2017.8024620","url":"https://dblp.org/rec/conf/iscc/YuanHH17"}, "url":"URL#2953087" }, { "@score":"1", "@id":"2953088", "info":{"authors":{"author":[{"@pid":"10/6882","text":"Paolo Zampognaro"},{"@pid":"183/9653","text":"Roselien Buys"},{"@pid":"183/9572","text":"Deirdre Walsh"},{"@pid":"183/9749","text":"Catherine Woods"},{"@pid":"117/6159","text":"Fabio Melillo"}]},"title":"A Use Case based requirements specification approach to support the development of a rehabilitation system for CVD patients: The PATHway project.","venue":"ISCC","pages":"254-259","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZampognaroBWWM17","doi":"10.1109/ISCC.2017.8024538","ee":"https://doi.org/10.1109/ISCC.2017.8024538","url":"https://dblp.org/rec/conf/iscc/ZampognaroBWWM17"}, "url":"URL#2953088" }, { "@score":"1", "@id":"2953089", "info":{"authors":{"author":[{"@pid":"184/6136","text":"Daojuan Zhang"},{"@pid":"78/8545","text":"Yuanfang Guo"},{"@pid":"164/6071","text":"Dianjie Guo"},{"@pid":"06/2293-32","text":"Rui Wang 0032"},{"@pid":"58/7673","text":"Guangming Yu"}]},"title":"Contextual approach for identifying malicious Inter-Component privacy leaks in Android apps.","venue":"ISCC","pages":"228-235","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZhangGGWY17","doi":"10.1109/ISCC.2017.8024534","ee":"https://doi.org/10.1109/ISCC.2017.8024534","url":"https://dblp.org/rec/conf/iscc/ZhangGGWY17"}, "url":"URL#2953089" }, { "@score":"1", "@id":"2953090", "info":{"authors":{"author":[{"@pid":"72/3527-15","text":"Qiang Zhang 0015"},{"@pid":"183/1853","text":"Chenwei Liu"},{"@pid":"203/9561","text":"Shangru Zhong"},{"@pid":"64/9060","text":"Kai Lei"}]},"title":"Spam comments detection with self-extensible dictionary and text-based features.","venue":"ISCC","pages":"1225-1230","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZhangLZL17","doi":"10.1109/ISCC.2017.8024692","ee":"https://doi.org/10.1109/ISCC.2017.8024692","url":"https://dblp.org/rec/conf/iscc/ZhangLZL17"}, "url":"URL#2953090" }, { "@score":"1", "@id":"2953091", "info":{"authors":{"author":[{"@pid":"29/4190-19","text":"Jun Zhang 0019"},{"@pid":"182/6317","text":"Mengying Ren"},{"@pid":"18/5416","text":"Houda Labiod"},{"@pid":"74/90","text":"Lyes Khoukhi"}]},"title":"Every dog has its day: A comparative study of clustering algorithms in VANETs.","venue":"ISCC","pages":"383-389","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZhangRLK17","doi":"10.1109/ISCC.2017.8024560","ee":"https://doi.org/10.1109/ISCC.2017.8024560","url":"https://dblp.org/rec/conf/iscc/ZhangRLK17"}, "url":"URL#2953091" }, { "@score":"1", "@id":"2953092", "info":{"authors":{"author":[{"@pid":"169/1771","text":"Yaogong Zhang"},{"@pid":"41/3241","text":"Yuan Wang"},{"@pid":"27/967","text":"Jiahui Liu"},{"@pid":"35/3032","text":"Yalou Huang"},{"@pid":"26/6047","text":"Maoqiang Xie"}]},"title":"Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association prediction.","venue":"ISCC","pages":"943-950","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZhangWLHX17","doi":"10.1109/ISCC.2017.8024647","ee":"https://doi.org/10.1109/ISCC.2017.8024647","url":"https://dblp.org/rec/conf/iscc/ZhangWLHX17"}, "url":"URL#2953092" }, { "@score":"1", "@id":"2953093", "info":{"authors":{"author":[{"@pid":"190/1632","text":"Shengjun Zhang"},{"@pid":"26/3707","text":"Hang Zhou"},{"@pid":"65/7182","text":"Yahui Yang"},{"@pid":"01/868","text":"Zhonghai Wu"}]},"title":"A joint Bloom Filter and cross-encoding for data verification and recovery in cloud.","venue":"ISCC","pages":"614-619","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZhangZYW17","doi":"10.1109/ISCC.2017.8024596","ee":"https://doi.org/10.1109/ISCC.2017.8024596","url":"https://dblp.org/rec/conf/iscc/ZhangZYW17"}, "url":"URL#2953093" }, { "@score":"1", "@id":"2953094", "info":{"authors":{"author":[{"@pid":"61/5029","text":"Dali Zhu"},{"@pid":"06/1958","text":"Hao Jin"},{"@pid":"181/2848","text":"Ying Yang"},{"@pid":"52/328-4","text":"Di Wu 0004"},{"@pid":"76/5098","text":"Weiyi Chen"}]},"title":"DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data.","venue":"ISCC","pages":"438-443","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZhuJYWC17","doi":"10.1109/ISCC.2017.8024568","ee":"https://doi.org/10.1109/ISCC.2017.8024568","url":"https://dblp.org/rec/conf/iscc/ZhuJYWC17"}, "url":"URL#2953094" }, { "@score":"1", "@id":"2953095", "info":{"authors":{"author":[{"@pid":"70/8084","text":"Dimitrios Zorbas"},{"@pid":"139/7433","text":"Patrice Raveneau"},{"@pid":"g/YacineGhamriDoudane","text":"Yacine Ghamri-Doudane"},{"@pid":"89/4888","text":"Christos Douligeris"}]},"title":"On the optimal number of chargers in battery-less wirelessly powered sensor networks.","venue":"ISCC","pages":"1312-1317","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscc/ZorbasRGD17","doi":"10.1109/ISCC.2017.8024706","ee":"https://doi.org/10.1109/ISCC.2017.8024706","url":"https://dblp.org/rec/conf/iscc/ZorbasRGD17"}, "url":"URL#2953095" }, { "@score":"1", "@id":"3015165", "info":{"title":"2017 IEEE Symposium on Computers and Communications, ISCC 2017, Heraklion, Greece, July 3-6, 2017","venue":"ISCC","publisher":"IEEE Computer Society","year":"2017","type":"Editorship","key":"conf/iscc/2017","ee":"https://ieeexplore.ieee.org/xpl/conhome/8016448/proceeding","url":"https://dblp.org/rec/conf/iscc/2017"}, "url":"URL#3015165" } ] } } } )