


default search action
2nd BCFIC 2012: Vilnius, Lithuania
- 2nd Baltic Congress on Future Internet Communications, BCFIC 2012, Vilnius, Lithuania, April 25-27, 2012. IEEE 2012, ISBN 978-1-4673-1672-9

- Konstantin Mikhaylov

, Jouni Tervonen
, Joni Heikkilä, Janne Kansakoski:
Wireless Sensor Networks in industrial environment: Real-life evaluation results. 1-7 - Claudio Salvadori

, Matteo Petracca
, Riccardo Pelliccia, Marco Ghibaudi, Paolo Pagano
:
Video streaming in wireless sensor networks with low-complexity change detection enforcement. 8-13 - Philipp Schleiss

, Nikolaj Torring, Søren Aagaard Mikkelsen, Rune Hylsberg Jacobsen:
Interconnecting IPv6 wireless sensors with an Android smartphone in the Future Internet. 14-18 - Ivan Ganchev

, Zhanlin Ji
, Mairtin O'Droma
:
A realization of cognitive pilot channels through wireless billboard channel infrastructure for cognitive radio. 19-25 - Janis Jansons, Ernests Petersons

, Nikolajs Bogdanovs
:
Vehicle-to-infrastructure communication based on 802.11n wireless local area network technology. 26-31 - Maryam Amiri Nezhad, Boris Bellalta

, Manel Guerrero Zapata
, Llorenç Cerdà-Alabern:
Should next generation wireless mesh networks consider dynamic channel access? 32-39 - Michal Kucharzak, Jacek Kibilda, Marcin Filo, Radoslaw Piesiewicz:

The 802.11g relaying MAC that saves energy. 40-45 - Yaakov Kogan, Percy Tarapore:

MTBO - a metric for assessing production failure rates in telecommunications networks. 46-51 - Vjaceslavs Bobrovs

, Aleksejs Udalcovs
, Ilja Trifonovs:
Investigation of maximum distance reach for spectrally efficient combined WDM systems. 52-55 - Janusz Klink

, Maria Jolanta Podolska, Tadeus Uhl
:
Regulatory framework and technical aspects of broadband access to the Internet in Europe. 56-63 - Vjaceslavs Bobrovs

, Sandis Spolitis
, Girts Ivanovs
:
Comparison of chromatic dispersion compensation techniques for WDM-PON solution. 64-67 - Yanuarius Teofilus Larosa, Jiann-Liang Chen, Yi-Wei Ma, Sy-Yen Kuo

:
Socio-organism inspired model forming multi-level computational scheme for integrated IoT service architecture. 68-71 - Takeshi Takahashi

, Gregory Blanc
, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo:
Enabling secure multitenancy in cloud computing: Challenges and approaches. 72-79 - Rytis Rainys, Algimantas Kajackas:

Measures to the supervision system of the regional Internet. 80-83 - Pedro Martinez-Julia, Antonio F. Skarmeta:

Using a gateway overlay network to achieve secure and scalable network interconnection. 84-91 - Pedro Vale Pinheiro, Fernando Boavida

:
Some results on network mobility stress testing. 92-99 - Eimantas Garsva, Nerijus Paulauskas, Gediminas Grazulevicius

, Lech Gulbinovic:
Academic computer network traffic statistical analysis. 100-105 - Konstantinos Tatas

, Chrysostomos Chrysostomou
:
A novel fuzzy logic based bufferless routing algorithm for low-power NoCs. 106-112 - Ka Lok Man, T. O. Ting

, Tomas Krilavicius
, Kaiyu Wan, C. Chen, J. Chang, Sheung-Hung Poon
:
Towards a hybrid approach to SoC estimation for a smart Battery Management System (BMS) and battery supported Cyber-Physical Systems (CPS). 113-116 - Mouna Karmani, Chiraz Khedhiri, Ka Lok Man, Tomas Krilavicius

, Belgacem Hamdi
, Amir-Mohammad Rahmani:
A self-test and self-repair approach for analog integrated circuits. 117-120 - Matteo Petracca

, Marco Ghibaudi, Riccardo Pelliccia, Paolo Pagano
:
Perceptual voice communications in IEEE802.15.4 networks for the emergency management support. 121-126 - Amandeep Dhir

, Puneet Kaur
, Nobert Rangarirai Jere
, Ibrahim A. Albidewi
:
Understanding mobile phone battery - Human interaction for developing world A perspective of feature phone users in Africa. 127-134 - Alexander N. Dudin, Sergey A. Dudin

, Olga S. Dudina
:
Tandem queueing system MAP|M|N|K - N → |M|R|∞ with impatient customers as a model of remote technical support. 134-139 - Annalisa Socievole

, Salvatore Marano:
Exploring user sociocentric and egocentric behaviors in online and detected social networks. 140-147 - João Henriques, Vitor Bernardo

, Paulo Simões
, Marília Curado
:
VoIP performance over mobile WiMAX: An urban deployment analysis. 148-155 - Damian Bulira, Krzysztof Walkowiak:

Voice and video streaming in wireless computer networks - evaluation of network delays. 156-161 - Enrica Zola

, Francisco Barceló-Arroyo:
Probability of handoff to neighbor cells for random waypoint mobility and non-ideal conditions. 162-169 - Ilie Finis, Valentin Popa

, Alexandru Lavric, Adrian-Ioan Petrariu
, C. Males:
An analytical determination of the reading volume for an HF RFID antenna. 170-173 - Yutaka Katsuyama, Tsubasa Kanamori, Katsunori Kawanishi, Takahiro Kusuda, Osanori Koyama:

Web-based refractive index monitoring system for biological solution, employing LPG-FBG hybrid optical sensors. 174-181 - Anindya Maiti, S. Sivanesan:

Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems. 182-186 - Manfred Sneps-Sneppe, Dmitry Namiot

:
About M2M standards and their possible extensions. 187-193 - Kirill Yudenok, Kirill Krinkin

, Ekaterina Dashkova, Yevgeni Koucheryavy
, Sergey I. Balandin
:
Porting smart-M3 platform to MeeGo operation system. 194-198 - Dmitry Namiot

, Manfred Sneps-Sneppe:
Proximity as a service. 199-205 - Jigeon Lee, Zhiliang Wang, Xia Yin, Xingang Shi, Dan Wu, Suogang Li:

Least frequency-delay-product caching replacement for distributed mapping systems in the core-edge network separation architecture. 206-213 - Jiann-Liang Chen, Yanuarius Teofilus Larosa, Pei-Jia Yang:

Optimal QoS load balancing mechanism for virtual machines scheduling in eucalyptus cloud computing platform. 214-221 - Mohammad Rajiullah, Anna Brunström:

Optimizing PR-SCTP performance using NR-SACKs. 222-229 - P. J. Pramod, Mohit Malhotra, Ankith Agarwal, D. S. R. Praveen Varma, B. C. Jinaga, D. K. Jain:

SoIP: An all-IP heterogeneous testbed for SIP-based multimedia services. 230-238 - Vitor Guerra Rolla, Marília Curado

:
Time message system for delay tolerant networks. 239-245 - Alexander N. Dudin, Valentina I. Klimenok:

A Retrial BMAP/PH/N queueing system with Markov modulated retrials. 246-251 - Michael Kohnen:

Analysis and optimization of routing trust values in a Kademlia-based Distributed Hash Table in a malicious environment. 252-259 - Michal Kucharzak, Krzysztof Walkowiak:

Maximum flow trees in overlay multicast: Modeling and optimization. 260-267 - Adam Smutnicki, Krzysztof Walkowiak:

p-cycle based multicast protection - A new ILP formulation. 268-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














