


default search action
ICFNDS 2017: Cambridge, UK
- Mohammad Hammoudeh, Robert M. Newman:

Proceedings of the International Conference on Future Networks and Distributed Systems, ICFNDS 2017, Cambridge, United Kingdom, July 19-20, 2017. ACM 2017, ISBN 978-1-4503-4844-7 - Zan Li:

Intelligent FH Sequence for High Security Satellite Communication: The Generation, Performance Analysis and Application. 1:1 - Julie A. McCann:

From IoT to Ephemeral Computing: Understanding Cyber-Physical Interactions. 2 - Liangxiu Han

:
Towards Sustainable Smart Society: Big Data Driven Approaches. 3 - Muhammad Ali Imran:

Distributed, Autonomous and Resilient Networks: Joint RAN and Backhaul Optimisation. 4 - Motaz Daadoo, Amna Eleyan

, Derar Eleyan
:
Optimization Water Leakage Detection using Wireless Sensor Networks (OWLD). 5:1-5:11 - Diaa M. Uliyan

, Hamid Abdullah Jalab, Abdelrahman Abuarqoub, Muhannad A. Abu-Hashem
:
Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor. 6:1-6:6 - Kelvin O. O. Anoh, Bamidele Adebisi

, Olamide Jogunola
, Mohammad Hammoudeh
:
Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing System. 7 - Yahya Atwady, Mohammad Hammoudeh

:
A Survey on Authentication Techniques for the Internet of Things. 8 - Eman Yasser Daraghmi, Amna Eleyan

:
An Improved Dynamic Load Balancing Algorithm applied to a Cafeteria System in a University Campus. 9:1-9:11 - Afnan Aloraini, Mohammad Hammoudeh

:
A Survey on Data Confidentiality and Privacy in Cloud Computing. 10:1-10:7 - Beatrice Rossi, Marco Patanè, Pasqualina Fragneto, Andrea Fusiello:

Robust Localization in Wireless Sensor Networks via Low-rank and 'Sparse Matrix Decomposition. 11:1-11:10 - Gökçe Çaylak Kayaturan, Alexei Vernitski:

Encoding Shortest Paths in Triangular Grids for Delivery Without Errors. 12:1-12:5 - Yousef-Awwad Daraghmi

, Motaz Daadoo, Derar Eleyan
:
User Centered Method for Enhancing the Adoption of Software Systems in Palestine. 13:1-13:11 - Muhannad A. Abu-Hashem

, Diaa M. Uliyan
, Abdelrahman Abuarqoub:
A Shared Memory Method For Enhancing The HTNGH AlgorithmPerformance: Proposed Method. 14:1-14:6 - Sahrish Khan Tayyaba

, Munam Ali Shah
, Omair Ahmad Khan, Abdul Wahab Ahmed:
Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead. 15:1-15:8 - Chenxi Li, Zan Li, Lei Guan, Peihan Qi, Jiangbo Si, Benjian Hao:

Measuring the Complexity of Chaotic Time Series by Fuzzy Entropy. 16:1-16:7 - Jie Jiang, Riccardo Pozza

, Kristrún Gunnarsdóttir
, Nigel Gilbert
, Klaus Moessner:
Recognising Activities at Home: Digital and Human Sensors. 17:1-17:11 - Ahmed Qaddus, Saleem Aslam, Abid Ali Minhas

, Abdulaziz S. Almazyad
:
5G Hetrogeneous Cellular Networks a Viable Mode for Implementing Future Smart Grid Networks. 18 - Mai Alfawair:

A Cloud Storage Architecture for High Data Availability, Reliability, and Fault-tolerance. 19:1-19:6 - Marwa Boulakbech, Nizar Messai, Yacine Sam, Thomas Devogele, Mohammad Hammoudeh

:
IoT Mashups: From IoT Big Data to IoT Big Service. 20 - Majdi M. Mafarja

, Derar Eleyan
, Salwani Abdullah, Seyedali Mirjalili
:
S-Shaped vs. V-Shaped Transfer Functions for Ant Lion Optimization Algorithm in Feature Selection Problem. 21:1-21:7 - Abdelhamied A. Ateya

, Ammar Muthanna
, Irina A. Gudkova
, Anastasia Vybornova
, Andrey Koucheryavy
:
Intelligent core network for Tactile Internet system. 22:1-22:6 - Ammar Muthanna

, Abdukodir Khakimov
, Irina A. Gudkova
, Alexander Paramonov
, Andrei Vladyko
, Ruslan Kirichek:
OpenFlow switch buffer configuration method. 23:1-23:5 - Hatem Hassan, Ahmad Mostafa, Ahmed Shawish:

ESSAC: Enhanced Scalable Secure Access Control Framework for Cloud Storage. 24:1-24:8 - Imad Ez-Zazi

, Mounir Arioua
, Ahmed El Oualkadi
, Younes el Assari
:
Joint FEC/CRC coding scheme for energy constrained IOT devices. 25:1-25:8 - Younes el Assari

, Mounir Arioua
, Ahmed El Oualkadi
, Imad Ez-Zazi
:
Zone Divisional Approach for Energy Balanced Clustering Protocol in Wireless Sensor Network. 26:1-26:7 - Ibrahim Ghafir, Vaclav Prenosil

, Mohammad Hammoudeh
, Liangxiu Han
, Umar Raza
:
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence. 27 - Youness Riouali, Laila Benhlima, Slimane Bah:

Toward a Global WSN-Based System to Manage Road Traffic. 28:1-28:6 - Pablo C. Calcina-Ccori

, Laisa Caroline de Paula Costa
, Geovane Fedrecheski, John Esquiagola
, Marcelo Zuffo
, Flávio S. Corrêa da Silva:
Agile servient integration with the Swarm: Automatic code generation for nodes in the Internet of Things. 30:1-30:6 - Mohammad Saleh, Jaafar Gaber

, Maxime Wack:
Sensor Networks Applications Performance Measures for IEEE802.11n WiFi Security Protocols. 31:1-31:4 - Levis Zerpa

:
The Message-Passing Interface and Parallel SAT-Solvers. 32:1-32:7 - Monther Aldwairi

, Hesham H. Alsaadi
:
FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool. 33:1-33:6 - Steve Moffat, Mohammad Hammoudeh

, Robert Hegarty
:
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT. 34 - S. D. Zhi, Y. B. Wei, Z. H. Yu:

Air Quality Monitoring Platform based on Remote Unmanned Aerial Vehicle with Wireless Communication. 35:1-35:7 - Z. H. Yu, Y. B. Wei, S. D. Zhi:

The design and application of information management system for precast concretes based on IOT. 36:1-36:4 - Umar Raza

, James Lomax, Ibrahim Ghafir, Rupak Kharel, Ben Whiteside:
An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processes. 37:1-37:8 - Adam Coates, Mohammad Hammoudeh

, Kieran Gerard Holmes:
Internet of Things for Buildings Monitoring: Experiences and Challenges. 38 - J. K. Mohsin, Liangxiu Han

, Mohammad Hammoudeh
, Robert Hegarty
:
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments. 39:1-39:10 - Kieran Gerard Holmes, Adam Coates, Mohammad Hammoudeh

:
Motion Capture Using the Internet of Things Technology: A Tutorial. 40 - Sobia Arshad, Muhammad Awais Azam

, Syed Hassan Ahmed
, Jonathan Loo
:
Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT): The Case of Smart Campus. 41:1-41:6 - Syed Bilal Hussain Shah, Fuliang Yin, Inam Ullah Khan, Zhe Chen, Muhammad Zakarya

:
Collating and Analysing State-of-the-Art Hierarchical Routing Protocols in WSN to Increase Network Lifetime and Conserve Energy. 42:1-42:10 - Umber Noreen, Ahcène Bounceur, Laurent Clavier

:
Modeling Interference for Wireless Sensor Network Simulators. 43:1-43:6 - Peter Barker, Mohammad Hammoudeh

:
A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor Networks. 44:1-44:8 - Samia Bouyakoub, Abdelkader Belkhir

, Fayçal M'hamed Bouyakoub
, Wassila Guebli
:
Smart airport: an IoT-based Airport Management System. 45:1-45:7 - Musa Abubakar Muhammad, Aladdin Ayesh

, Pooneh Bagheri Zadeh:
Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access Control. 46:1-46:8 - Mazhar Hussain Malik, Abdul Majeed, Mehmet Emin Aydin

, Mubasher Hussain Malik:
A Parametric Study for Congestion Control in Queuing Networks. 47 - Nicolas Velasquez, Camilo Medina, Diego M. Castro

, Juan Camilo Acosta
, Diego Mendez
:
Design and Development of an IoT System Prototype for Outdoor Tracking. 48:1-48:6 - Camilo Rodriguez, Diego M. Castro

, William Coral Cuellar
, Jose L. Cabra, Nicolas Velasquez, Julián Colorado, Diego Mendez
, Luis Carlos Trujillo Arboleda
:
IoT system for Human Activity Recognition using BioHarness 3 and Smartphone. 49:1-49:7 - Abdelrahman Abuarqoub, Hesham Abusaimeh

, Mohammad Hammoudeh
, Diaa M. Uliyan
, Muhannad A. Abu-Hashem
, Sharefa Murad, Mudhafar M. Al-Jarrah, Fayez Al-Fayez
:
A Survey on Internet of Thing Enabled Smart Campus Applications. 50:1-50:7 - Hadeel Samara, Sharefa Murad, Abdallah Qusef

, Abdelrahman Abuarqoub:
Backshoring: Main Drives and Effects. 51:1-51:5 - Jibran Saleem, Bamidele Adebisi

, Ruth Ande, Mohammad Hammoudeh
:
A state of the art survey - Impact of cyber attacks on SME's. 52 - Muath Sabha

, Jacquleen Joubran Abu Daoud:
Adaptive Camera Placement for Open Heritage Sites. 53:1-53:7 - Mudhafar M. Al-Jarrah, Zaid H. Al-Taie, Abdelrahman Abuarqoub:

Steganalysis Using LSB-Focused Statistical Features. 54:1-54:5 - Kelvin O. O. Anoh, Bamidele Adebisi

, Mohammad Hammoudeh
:
A Comparison of ICF and Companding for Impulsive Noise Mitigation in Powerline Communication Systems. 55:1-55:6 - Asad Ali Khan

, Majid Hussain, M. Zafrullah, M. Sultan Zia:
A Convergence Time Optimization Paradigm for OSPF based Networks Through SDN SPF Protocol Computer Communications and Networks (CCN)/Delay Tolerant Networks. 56:1-56:6 - Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:

An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security. 57:1-57:6 - Ulfat Imdad, Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:

Auto Configuration Based Enhanced and Secure Domain Naming Service for IPV-6 Internet of Things. 58:1-58:5 - Muhammad Yasir, Muhammad Asif Habib, Muhammad Shahid, Mudassar Ahmad:

Agent-based Modeling and Simulation of Virus on a Scale-Free Network. 59:1-59:6 - Muhammad Naeem, Rehan Ashraf, Nouman Ali

, Mudassar Ahmad, Muhammad Asif Habib:
Bottom up Approach for Better Requirements Elicitation. 60:1-60:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














