default search action
Journal of Network and Computer Applications, Volume 30
Volume 30, Number 1, January 2007
- Ajith Abraham, Kate A. Smith, Ravi Jain, Lakhmi C. Jain:
Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications. 1-3 - Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan:
VQ-based watermarking scheme with genetic codebook partition. 4-23 - Tai-Wen Yue, Suchen Chiang:
The semipublic encryption for visual cryptography using Q'tron neural networks. 24-41 - Gail-Joon Ahn, Badrinath Mohan, Seng-Phil Hong:
Towards secure information sharing using role-based delegation. 42-59 - Yihua Liao, V. Rao Vemuri, Alejandro Pasos:
Adaptive anomaly detection with evolving connectionist systems. 60-80 - Ajith Abraham, Ravi Jain, Johnson P. Thomas, Sang-Yong Han:
D-SCIDS: Distributed soft computing intrusion detection system. 81-98 - Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. 99-113 - Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson P. Thomas:
Modeling intrusion detection system using hybrid intelligent systems. 114-132
- Ali El Kateeb:
High-speed routers design using data stream distributor unit. 133-144 - Hongsong Chen, Zhenzhou Ji, Mingzeng Hu, Zhongchuan Fu, Ruixiang Jiang:
Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. 145-166 - Khong Neng Choong, Borhanuddin Mohd Ali, Veeraraghavan Prakash, Yoke Chek Yee:
The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme. 167-185 - Hojjat Jafarpour, Nasser Yazdani, Navid Bazzazzadeh:
A scalable group communication mechanism for mobile agents. 186-208 - Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimitrios Gunopulos, Alex Delis:
Distributed middleware architectures for scalable media services. 209-243 - Tainchi Lu, Chinghao Hsu:
Mobile agents for information retrieval in hybrid simulation environment. 244-264 - Hui Guo, Guobin Shen, Zhiguang Wang, Shipeng Li:
Optimized streaming media proxy and its applications. 265-281 - Lei Guo, Hongfang Yu, Lemin Li:
Dynamic survivable algorithm for meshed WDM optical networks. 282-295 - Jenq-Shiou Leu, Yuan-Po Chi, Wei-Kuan Shih:
Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS). 296-307 - Lijun Qian, Ning Song, Xiangfang Li:
Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach. 308-330 - Kwang-Sik Shin, Jin-Ha Jung, Jin Young Cheon, Sang-Bang Choi:
Real-time network monitoring scheme based on SNMP for dynamic information. 331-353 - Xiaobo Zhou, Jianbin Wei, Cheng-Zhong Xu:
Quality-of-service differentiation on the Internet: A taxonomy. 354-383 - Suneuy Kim, Chita R. Das:
An analytical model for interval caching in interactive video servers. 384-413 - Mohammad Saniee Abadeh, Jafar Habibi, Caro Lucas:
Intrusion detection using a fuzzy genetics-based learning algorithm. 414-428
Volume 30, Number 2, April 2007
- Rongxi He, Bin Lin, Lemin Li:
Dynamic service-level-agreement aware shared-path protection in WDM mesh networks. 429-444 - Bruce Stephen, Lykourgos Petropoulakis:
The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement. 445-465 - Liang Wang, Yiping Guo, Ming Fang:
Web search engine based on DNS. 466-478 - Manuel Esteve, Carlos Enrique Palau, J. Martínez-Nohales, Benjamín Molina:
A video streaming application for urban traffic management. 479-498 - M. Can Filibeli, Öznur Özkasap, M. Reha Civanlar:
Embedded web server-based home appliance networks. 499-514 - Xiaobo Zhou, Cheng-Zhong Xu:
Efficient algorithms of video replication and placement on a cluster of streaming servers. 515-540 - Kenneth J. Turner:
Representing and analysing composed web services using Cress. 541-562 - Christos Bouras, Giorgos Kounenis, Ioannis Misedakis:
A web content manipulation technique based on page Fragmentation. 563-585 - Siti Z. Z. Abidin, Min Chen, Phil W. Grant:
Designing interaction protocols using noughts and crosses type games. 586-613 - Alejandro Quintero, Da Yu Li, Harold Castro:
A location routing protocol based on smart antennas for ad hoc networks. 614-636 - Yan Bai, Mabo Robert Ito:
A new technique for minimizing network loss from users' perspective. 637-649 - Lei Guo, Jin Cao, Hongfang Yu, Lemin Li:
A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks. 650-661 - Chin-Chen Chang, Chih-Yang Lin, Keng-Chu Lin:
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. 662-676 - Jin Cao, Lei Guo, Hongfang Yu, Lemin Li:
A novel recursive shared segment protection algorithm in survivable WDM networks. 677-694 - Rongping Lin, Sheng Wang, Lemin Li:
Protections for multicast session in WDM optical networks under reliability constraints. 695-705 - Chan-Ho Min, Sehun Kim:
On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks. 706-727 - Gwo-Jong Yu, Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee:
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system. 728-749 - Kwang-Sik Shin, Jin-Ha Jung, Wan-Oh Yoon, Sang-Bang Choi:
P2P transfer of partial stream in multimedia multicast. 750-774 - Yiqun Xu, Luigi Logrippo, Jacques Sincennes:
Detecting feature interactions in CPL. 775-799 - Ibrahim Özçelik, Hüseyin Ekiz:
Building an interconnection between PROFIBUS and ATM networks. 800-817
Volume 30, Number 3, August 2007
- Xiaobo Zhou, Cheng-Zhong Xu:
Distributed denial-of-service and intrusion detection. 819-822 - Shigang Chen, Yong Tang, Wenliang Du:
Stateful DDoS attacks and targeted filtering. 823-840 - Matthias Bossardt, Thomas Dübendorfer, Bernhard Plattner:
Enhanced Internet security by a distributed traffic control service based on traffic ownership. 841-857 - Vasilios A. Siris, Ilias Stavrakis:
Provider-based deterministic packet marking against distributed DoS attacks. 858-876 - Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Information sharing for distributed intrusion detection systems. 877-899 - Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Jesús D. Jiménez Re, Rafael Marín López:
A network access control approach based on the AAA architecture and authorization attributes. 900-919 - Celia Li, Cungang Yang, Richard Cheung:
Key management for role hierarchy in distributed systems. 920-936 - Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras:
Secure and efficient key management in mobile ad hoc networks. 937-954
- George D. Magoulas, George Ghinea:
Intelligence-based adaptation for ubiquitous multimedia communications. 955-957 - Dietmar Jannach, Klaus Leopold:
Knowledge-based multimedia adaptation for ubiquitous multimedia consumption. 958-982 - Nicola Cranley, Philip Perry, Liam Murphy:
Dynamic content-based adaptation of streamed multimedia. 983-1006 - Michael J. O'Grady, Gregory M. P. O'Hare, C. Donaghey:
Delivering adaptivity through context-awareness. 1007-1033 - Vincent Charvillat, Romulus Grigoras:
Reinforcement learning for dynamic multimedia adaptation. 1034-1058 - Johan Bollen, Michael L. Nelson, Gary Geisler, Raquel Araujo:
Usage derived recommendations for a video digital library. 1059-1083
- Gloria E. Phillips-Wren, Anders I. Mørch, Jeffrey Tweedale, Nikhil Ichalkaranje:
Innovations in agent collaboration, cooperation and Teaming, Part 2. 1085-1088 - Jeffrey Tweedale, Nikhil Ichalkaranje, Christos Sioutis, B. Jarvis, Angela Consoli, Gloria E. Phillips-Wren:
Innovations in multi-agent systems. 1089-1115 - Lin Padgham, Wei Liu:
Internet collaboration and service composition as a loose form of teamwork. 1116-1135 - Antonella Di Stefano, Giuseppe Pappalardo, Corrado Santoro, Emiliano Tramontana:
A framework for the design and automated implementation of communication aspects in multi-agent systems. 1136-1152 - Wei Xu, Jiannong Cao, Beihong Jin, Jing Li, Liang Zhang:
GCS-MA: A group communication system for mobile agents. 1153-1172 - Tom Wanyama, Behrouz Homayoun Far:
A protocol for multi-agent negotiation in a group-choice decision making process. 1173-1195 - Gerhard Weiß, Matthias Nickles, Michael Rovatsos, Felix A. Fischer:
Specifying the intertwining of cooperation and autonomy in agent-based systems. 1196-1215 - Justin Zhijun Zhan, Stan Matwin, LiWu Chang:
Privacy-preserving collaborative association rule mining. 1216-1227 - Abdelhamid Ouardani, Samuel Pierre, Hanifa Boucheneb:
A security protocol for mobile agents based upon the cooperation of sedentary agents. 1228-1243 - Ruth Aguilar-Ponce, Ashok Kumar, J. Luis Tecpanecatl-Xihuitl, Magdy A. Bayoumi:
A network of sensor-based framework for automated visual surveillance. 1244-1271
Volume 30, Number 4, November 2007
- Xiangjian He:
Editorial. 1273-1274 - Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-based egress network access control by using DNS server. 1275-1282 - Yanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian:
Extending metadata with scenarios in adaptive distributed system. 1283-1294 - Michael J. Callaghan, Jim Harkin, E. McColgan, T. Martin McGinnity, Liam P. Maguire:
Client-server architecture for collaborative remote experimentation. 1295-1308 - Carolyn McGregor, Bruce Kneale, Mark B. Tracy:
On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband. 1309-1323 - Wenjing Jia, Huaifeng Zhang, Xiangjian He:
Region-based license plate detection. 1324-1333 - Hatice Gunes, Massimo Piccardi:
Bi-modal emotion recognition from expressive face and body gestures. 1334-1345 - Junjun Xia, Lin Ni, Yuan Miao:
A new digital implementation of ridgelet transform for images of dyadic length. 1346-1355 - Donn Morrison, Liyanage C. De Silva:
Voting ensembles for spoken affect classification. 1356-1365 - Ben-Nian Wang, Yang Gao, Zhaoqian Chen, Jun-Yuan Xie, Shifu Chen:
A two-layered multi-agent reinforcement learning model and algorithm. 1366-1376
- Jung-San Lee, Chin-Chen Chang:
Secure communications for cluster-based ad hoc networks using node identities. 1377-1396 - Christopher J. Martinez, Wei-Ming Lin, Parimal Patel:
Optimal XOR hashing for non-uniformly distributed address lookup in computer networks. 1397-1427 - Bart Duysburgh, Thijs Lambrecht, Filip De Turck, Bart Dhoedt, Piet Demeester:
Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks. 1428-1444 - Sahar A. Al-Talib, Borhanuddin Mohd Ali, Sabira Khatun, Subramaniam Shamala:
Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast. 1445-1454
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.