default search action
Journal of Network and Computer Applications, Volume 36
Volume 36, Number 1, January 2013
- Abdelkrim Hadjidj, Marion Souil, Abdelmadjid Bouabdallah, Yacine Challal, Henry L. Owen:
Wireless sensor networks for rehabilitation applications: Challenges and opportunities. 1-15 - Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung:
Intrusion detection system: A comprehensive review. 16-24 - Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior:
An intrusion detection and prevention system in cloud computing: A systematic review. 25-41 - Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan:
A survey of intrusion detection techniques in Cloud. 42-57 - Fadoua Mhiri, Kaouthar Sethom, Ridha Bouallegue:
A survey on interference management techniques in femtocell self-organizing networks. 58-65 - Md. Mahedi Hassan, Poo Kuan Hoong:
Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain. 66-76 - Rodrigo Palucci Pantoni, Dennis Brandão:
A gradient based routing scheme for street lighting wireless sensor networks. 77-90 - D. Satish Kumar, N. Nagarajan:
Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks. 91-102 - Christos Emmanouilidis, Remous-Aris Koutsiamanis, Aimilia Tasidou:
Mobile guides: Taxonomy of architectures, context awareness, technologies and applications. 103-125 - Saleem-Ullah Lar, Xiaofeng Liao:
An initiative for a classified bibliography on TCP/IP congestion control. 126-133 - A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar:
Wireless Sensor Network transport protocol: A critical review. 134-146
- Slimane Bah, Roch H. Glitho, Rachida Dssouli:
A SIP servlets-based framework for service provisioning in stand-alone MANETs. 147-155 - Seung-Wan Han, In-Seon Jeong, Seung-Ho Kang:
Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks. 156-166 - Junjie Xiong, Yangfan Zhou, Michael R. Lyu, Evan F. Y. Young:
MDiag: Mobility-assisted diagnosis for wireless sensor networks. 167-177 - Wen Tao Zhu:
Towards secure and communication-efficient broadcast encryption systems. 178-186 - Bing Hu, Kwan L. Yeung, Zhaoyang Zhang:
An efficient single-iteration single-bit request scheduling algorithm for input-queued switches. 187-194 - Kemal Akkaya, Izzet F. Senturk, Shanthi Vemulapalli:
Handling large-scale node failures in mobile sensor/robot networks. 195-210 - Zhanfeng Wang, Ming Chen, Chang-you Xing, Jing Feng, Xianglin Wei, Huali Bai:
Multi-manifold model of the Internet delay space. 211-218 - Jeroen Famaey, Frédéric Iterbeke, Tim Wauters, Filip De Turck:
Towards a predictive cache replacement strategy for multimedia content. 219-227 - Huan Dai, Zhaomin Zhu, Xiaofeng Gu:
Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network. 228-234 - Adeela Waqar, Asad Raza, Haider Abbas, Muhammad Khurram Khan:
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata. 235-248 - Pekka Jäppinen, Renata Guarneri, Luís M. Correia:
An applications perspective into the Future Internet. 249-254 - Isabel de la Torre Díez, Saúl Álvaro-Muñoz, Miguel López Coronado, Joel J. P. C. Rodrigues:
Development and performance evaluation of a new RSS tool for a Web-based system: RSS_PROYECT. 255-261 - Marjan Naderan Tahan, Mehdi Dehghan, Hossein Pedram:
Sensing task assignment via sensor selection for maximum target coverage in WSNs. 262-273 - Reinaldo Bezerra Braga, Igor A. Chaves, Carina Teixeira de Oliveira, Rossana M. C. Andrade, José Neuman de Souza, Hervé Martin, Bruno Schulze:
RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments. 274-283 - Lo-Yao Yeh, Chun-Chuan Yang, Jee-Gong Chang, Yi-Lang Tsai:
A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs. 284-292 - Minwoo Kim, Karam Park, Won Woo Ro:
Benefits of using parallelized non-progressive network coding. 293-305 - Ting Yang, Yugeng Sun, Javid Taheri, Albert Y. Zomaya:
DLS: A dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks. 306-315 - Kaiping Xue, Changsha Ma, Peilin Hong, Rong Ding:
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. 316-323 - Md. Rafiqul Islam, Jemal H. Abawajy:
A multi-tier phishing detection and filtering approach. 324-335 - Vishnu Monn Baskaran, Yoong Choon Chang, Jonathan Loo, KokSheik Wong:
Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing. 336-352 - Mingfu Li, Yueh-Lin Wu, Chia-Rong Chang:
Available bandwidth estimation for the network paths with multiple tight links and bursty traffic. 353-367 - Fadi M. Al-Turjman, Hossam S. Hassanein, Mohamed Ibnkahla:
Quantifying connectivity in wireless sensor networks with grid-based deployments. 368-377 - Xun Yi, Eiji Okamoto:
Practical Internet voting system. 378-387 - Yuehua Wang, Zhong Zhou, Ling Liu, Wei Wu:
Replica-aided load balancing in overlay networks. 388-401 - Domenico Rosaci, Giuseppe M. L. Sarnè:
Cloning mechanisms to improve agent performances. 402-408 - Mohsen Hooshmand, S. Mohamad R. Soroushmehr, Pejman Khadivi, Shadrokh Samavi, Shahram Shirani:
Visual sensor network lifetime maximization by prioritized scheduling of nodes. 409-419 - Weigang Hou, Lei Guo, Xiaoxue Gong:
Survivable power efficiency oriented integrated grooming in green networks. 420-428 - Jesús L. Alvaro, Beatriz Barros:
A new cloud computing architecture for music composition. 429-443 - I-Hsuan Peng, Yen-Wen Chen:
Energy consumption bounds analysis and its applications for grid based wireless sensor networks. 444-451 - Khaled Salah, Mohamed Hamawi:
Performance of IP-forwarding of Linux hosts with multiple network interfaces. 452-465 - Imran Baig, Muhammad Ayaz, Varun Jeoti:
On the peak-to-average power ratio reduction in mobile WiMAX: A discrete cosine transform matrix precoding based random-interleaved orthogonal frequency division multiple access uplink system. 466-475 - Mary Looney, Oliver Gough:
A provision aware proportional fair sharing three colour marker. 476-483 - María-Victoria Belmonte, Manuel Díaz, José-Luis Pérez-de-la-Cruz, Ana Reyna:
COINS: COalitions and INcentiveS for effective Peer-to-Peer downloads. 484-497 - Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang:
An novel three-party authenticated key exchange protocol using one-time key. 498-503 - Eugénia Moreira Bernardino, Anabela Moreira Bernardino, Juan Manuel Sánchez-Pérez, Juan Antonio Gómez Pulido, Miguel A. Vega-Rodríguez:
Swarm optimisation algorithms applied to large balanced communication networks. 504-522 - Haythem Bany Salameh, Osamah S. Badarneh:
Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks. 523-532 - Ting-Yi Chang, Yan-Ru Ke:
A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system. 533-542 - Sepideh Adabi, Ali Movaghar, Amir Masoud Rahmani, Hamid Beigy:
Market_based grid resource allocation using new negotiation model. 543-565
Volume 36, Number 2, March 2013
- Bingdong Li, Jeff Springer, George Bebis, Mehmet Hadi Gunes:
A survey of network flow applications. 567-581 - Shams Qazi, Raad Raad, Yi Mu, Willy Susilo:
Securing DSR against wormhole attacks in multirate ad hoc networks. 582-592 - Ahmed Hassan Mohammed, Bin Dai, Benxiong Huang, Muhammad Azhar Iqbal, Guan Xu, Peng Qin, Shui Yu:
A survey and tutorial of wireless relay network protocols based on network coding. 593-610 - Xiaobing He, Michael Niedermeier, Hermann de Meer:
Dynamic key management in wireless sensor networks: A survey. 611-622 - Sudhanshu Tyagi, Neeraj Kumar:
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. 623-645 - Md. Rafiqul Islam, Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Classification of malware based on integrated static and dynamic features. 646-656
- Kun Huang, Gaogang Xie, Rui Li, Shuai Xiong:
Fast and deterministic hash table lookup using discriminative bloom filters. 657-666 - Chiapin Wang:
Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approach. 667-676 - Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Windows Mobile LiveSD Forensics. 677-684 - Sardar Muhammad Bilal, Carlos Jesus Bernardos, Carmen Guerrero:
Position-based routing in vehicular networks: A survey. 685-697 - Mathias Kretschmer, Philipp Batroff, George Ghinea:
Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies. 698-710 - Najme Mansouri, Gholamhosein Dastghaibyfard, Ehsan Mansouri:
Combination of data replication and scheduling algorithm for improving data availability in Data Grids. 711-722 - Dimitris C. Vasiliadis, George E. Rizos, Costas Vassilakis:
Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively 2-class priority routing traffic. 723-737 - Shiliang Luo, Xu Lu, Lianglun Cheng:
TSOIA: An efficient node selection algorithm facing the uncertain process for Internet of Things. 738-743 - Gimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis:
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs. 744-755 - Kuang-Yow Lian, Sung-Jung Hsiao, Wen-Tsai Sung:
Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks. 756-767 - Po-Ching Lin, Jia-Hau Lee:
Re-examining the performance bottleneck in a NIDS with detailed profiling. 768-780 - Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia:
Quantitative survivability evaluation of three virtual machine-based server architectures. 781-790 - Chuan Xu, C. Du, Guofeng Zhao, Shui Yu:
A novel model for user clicks identification based on hidden semi-Markov. 791-798 - Jian An, Xiaolin Gui, Wendong Zhang, Jinghua Jiang, Jianwei Yang:
Research on social relations cognitive model of mobile nodes in Internet of Things. 799-810 - Yanheng Liu, Longxiang Suo, Dayang Sun, Aimin Wang:
A virtual square grid-based coverage algorithm of redundant node for wireless sensor network. 811-817 - Peng Xiao, Zhigang Hu, Dongbo Liu, Guofeng Yan, Xilong Qu:
Virtual machine power measuring technique with bounded error in cloud environments. 818-828 - Gaik-Yee Chan, Chien-Sing Lee, Swee-Huay Heng:
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. 829-842 - Yuhuai Peng, Yao Yu, Lei Guo, Dingde Jiang, Qiming Gai:
An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks. 843-857 - Shahram Jamali, Seyyed Nasser Seyyed Hashemi, Amir-Masoud Eftekhari-Moghadam:
On the use of a full information feedback to stabilize RED. 858-869 - Abraham Martín-Campillo, Jon Crowcroft, Eiko Yoneki, Ramon Martí:
Evaluating opportunistic networks in disaster scenarios. 870-880 - Mahesh Kumar, Shishir Kumar:
AGRIB-BHF: A sustainable and fault tolerant aggregation. 881-886 - Mahmoud Al-shugran, Osman Ghazali, Suhaidi Hassan, Kashif Nisar, A. Suki M. Arif:
A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network. 887-897 - Laisen Nie, Dingde Jiang, Lei Guo:
A power laws-based reconstruction approach to end-to-end network traffic. 898-907 - Enver Ever, Orhan Gemikonakli, Altan Koçyigit, Eser Gemikonakli:
A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues. 908-926 - Hu Xiong, Zhong Chen, Fagen Li:
New identity-based three-party authenticated key agreement protocol with provable security. 927-932 - Kashif Nisar, Angela Amphawan, Suhaidi Hassan, Nurul I. Sarkar:
A comprehensive survey on scheduler for VoIP over WLAN. 933-948 - Mohamed K. Watfa, Haitham Al-Hassanieh, Samir Salmen:
A novel solution to the energy hole problem in sensor networks. 949-958
Volume 36, Number 3, May 2013
- Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:
Guest Editorial on Vehicular Networking Protocols. 959-960 - António Fonseca, Teresa Maria Vazão:
Applicability of position-based routing for VANET in highways and urban environment. 961-973 - Rajashree Nair, Ben Soh, Naveen K. Chilamkurti, Jong Hyuk Park:
Structure-free message aggregation and routing in traffic information system (SMART). 974-980 - Salim Bitam, Abdelhamid Mellouk:
Bee life-based multi constraints multicast routing optimization for vehicular ad hoc networks. 981-991 - Zhenxia Zhang, Azzedine Boukerche, Hussam M. Soliman Ramadan:
Design and evaluation of a fast MAC layer handoff management scheme for WiFi-based multichannel Vehicular Mesh Networks. 992-1000 - Angelos Antonopoulos, Charalabos Skianis, Christos V. Verikoukis:
Network coding-based cooperative ARQ scheme for VANETs. 1001-1007 - Navid Tadayon, Sasan Khoshroo, Elaheh Askari, Honggang Wang, Howard Michel:
Power management in SMAC-based energy-harvesting wireless sensor networks using queuing analysis. 1008-1017 - Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Xingang Liu:
Performance improvement of QO-STBC over time-selective channel for wireless network. 1018-1026 - Jaime Lloret, Alejandro Canovas, Angel Catala, Miguel Garcia:
Group-based protocol and mobility model for VANETs to offer internet access. 1027-1038
- Md. Humayun Kabir, Mohammad Mukhtaruzzaman, Mohammed Atiquzzaman:
Efficient route optimization scheme for nested-NEMO. 1039-1049 - Liren Zhang, Abderrahmane Lakas, Hesham El-Sayed, Ezedin Barka:
Mobility analysis in vehicular ad hoc network (VANET). 1050-1056 - Yejun Liu, Qingyang Song, Rui Ma, Bing Li, Bo Gong:
Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network. 1057-1069 - Jian-Zhen Luo, Shun-Zheng Yu:
Position-based automatic reverse engineering of network protocols. 1070-1077 - Masoud Zarifneshat, Pejman Khadivi:
Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models. 1078-1090
Volume 36, Number 4, July 2013
- Ebrahim Mahdipour, Amir Masoud Rahmani, Saeed Setayeshi:
Importance sampling for Jackson networks with customer impatience until the end of service. 1091-1101 - Christophe Dumez, Mohamed Bakhouya, Jaafar Gaber, Maxime Wack, Pascal Lorenz:
Model-driven approach supporting formal verification for web service composition protocols. 1102-1115 - Nader Mohamed, Jameela Al-Jaroodi, Abdulla Eid:
A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud. 1116-1130 - Ammar Haider, Iqbal Gondal, Joarder Kamruzzaman:
Social-connectivity-aware vertical handover for heterogeneous wireless networks. 1131-1139 - A. Cagatay Talay, D. Turgay Altilar:
Self adaptive routing for dynamic spectrum access in cognitive radio networks. 1140-1151 - Jasone Astorga, Marina Aguado, Nerea Toledo, Marivi Higuero:
A high performance link layer mobility management strategy for professional private broadband networks. 1152-1163 - Chien-Chao Tseng, Chia-Liang Lin, Li-Hsing Yen, Jyun-Yan Liu, Cheng-Yuan Ho:
Can: A context-aware NAT traversal scheme. 1164-1173 - Geetha Dundesh Devanagavi, N. Nalini, Rajashekhar C. Biradar:
Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach. 1174-1185 - Chao-Yang Lee, Liang-Cheng Shiu, Fu-Tian Lin, Chu-Sing Yang:
Distributed topology control algorithm on broadcasting in wireless sensor network. 1186-1195 - El-Sayed M. El-Alfy, Mujahid N. Syed, Shokri Z. Selim:
A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks. 1196-1207 - Ying-Dar Lin, Cheng-Yuan Ho, Yuan-Cheng Lai, Tzu-Hsiung Du, Shun-Lee Chang:
Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems. 1208-1218 - Anwar Saif, Mohamed Othman:
SRA-MSDU: Enhanced A-MSDU frame aggregation with selective retransmission in 802.11n wireless networks. 1219-1229 - Muhammad Hamad Alizai, Hanno Wirtz, Bernhard Kirchen, Klaus Wehrle:
Portable wireless-networking protocol evaluation. 1230-1242
- Mohammad Masdari, Sadegh Mohammadzadeh Bazarchi, Moazam Bidaki:
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks. 1243-1260 - Aishwarya Bakshi, Amir Talaei-Khoei, Pradeep Ray:
Adaptive policy framework: A systematic review. 1261-1271
Volume 36, Number 5, September 2013
- Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:
Guest editorial on vehicular communications and applications. 1273-1274 - Claudia Campolo, Hector Agustin Cozzetti, Antonella Molinaro, Riccardo Scopigno:
Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks. 1275-1286 - Yazhi Liu, Jianwei Niu, Jian Ma, Lei Shu, Takahiro Hara, Wendong Wang:
The insights of message delivery delay in VANETs with a bidirectional traffic model. 1287-1294 - Ramon Bauza, Javier Gozálvez:
Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications. 1295-1307 - Nitin Maslekar, Joseph Mouzna, Mounir Boussedjra, Houda Labiod:
CATS: An adaptive traffic signal system based on car-to-car communication. 1308-1315 - Kai Lin:
Research on adaptive target tracking in vehicle sensor networks. 1316-1323 - Nerea Toledo, Jean-Marie Bonnin, Marivi Higuero:
Performance evaluation of user applications in the ITS scenario: An analytical assessment of the NeMHIP. 1324-1336 - Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juan Hernández-Serrano, Juanjo Alins:
COACH: COllaborative certificate stAtus CHecking mechanism for VANETs. 1337-1351 - Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:
Privacy preserving broadcast message authentication protocol for VANETs. 1352-1364
- Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao:
An enhanced smart card based remote user password authentication scheme. 1365-1371 - Hai Van Luu, Xueyan Tang:
Constructing rings overlay for robust data collection in wireless sensor networks. 1372-1386 - Ting Chen, Xiaosong Zhang, Hong-yuan Li, Dong Wang, Yue Wu:
Propagation modeling of active P2P worms based on ternary matrix. 1387-1394 - Sulma Rashid, Abdul Hanan Abdullah, Qaisar Ayub, Mohd Soperi Mohd Zahid:
Dynamic Prediction based Multi Queue (DPMQ) drop policy for probabilistic routing protocols of delay tolerant network. 1395-1402
Volume 36, Number 6, November 2013
- Weiming Shen, Weidong Li:
Collaboration technologies and applications. 1403-1404 - Steven Latré, Jeroen Famaey, John Strassner, Filip De Turck:
Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation. 1405-1417 - Yuanhao Xu, Guofu Yin, Yong Nie, Zhengwei He, Xiaolin Dai:
Research on an active knowledge push service based on collaborative intent capture. 1418-1430 - Tao Wu, Xiaobing Pei, Yongzhong Lu, Changqing Chen, Liang Gao:
A distributed collaborative product design environment based on semantic norm model and role-based access control. 1431-1440 - Amy J. C. Trappey, Charles V. Trappey, Squall Chun-Yi Wu, Chin-Yuan Fan, Yi-Liang Lin:
Intelligent patent recommendation system for innovative design collaboration. 1441-1450 - Diego Carvalho Soares, Flávia Maria Santoro, Fernanda Araújo Baião:
Discovering collaborative knowledge-intensive processes through e-mail mining. 1451-1465 - Pedro Antunes, David Simões, Luís Carriço, José A. Pino:
An end-user approach to business process modeling. 1466-1479 - Rahat Iqbal, Nazaraf Shah, Anne E. James, Tomasz Cichowicz:
Integration, optimization and usability of enterprise applications. 1480-1488 - Leijie Fu, Pingyu Jiang, Wei Cao:
Modeling and performance analysis of product development process network. 1489-1502 - Ta-Ping Lu, Amy J. C. Trappey, Yi-Kuang Chen, Yu-Da Chang:
Collaborative design and analysis of supply chain network management key processes model. 1503-1511 - Yuan Cheng, Fazhi He, Xiantao Cai, Dejun Zhang:
A group Undo/Redo method in 3D collaborative modeling systems with performance evaluation. 1512-1522 - Jiancheng Shi, Jianhua Liu, Ruxin Ning, Weiwei Hou:
A collisions evaluation method in virtual environment for collaborativeassembly. 1523-1530 - Bin Guo, Daqing Zhang, Zhu Wang, Zhiwen Yu, Xingshe Zhou:
Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things. 1531-1539 - Yang Yang, Xinyu Li, Liang Gao, Xinyu Shao:
A new approach for predicting and collaborative evaluating the cutting force in face milling based on gene expression programming. 1540-1550 - Jesús Gallardo, Ana I. Molina, Crescencio Bravo, Miguel A. Redondo:
A model-driven and task-oriented method for the development of collaborative systems. 1551-1565 - María-Blanca Ibáñez-Espiga, José Jesús García Rueda, David Maroto, Carlos Delgado Kloos:
Collaborative learning in multi-user virtual environments. 1566-1576
- Weiming Shen, Weidong Li:
Collaboration computing technologies and applications. 1577-1578 - Dujuan Gu, Xiaohan Liu, Gang Qin, Shuangjian Yan, Ze Luo, Baoping Yan:
VNET6: IPv6 virtual network for the collaboration between applications and networks. 1579-1588 - Anbazhagan Rajesh, Rangaswamy Nakkeeran:
Investigation on uplink collaborative contention-based bandwidth request for WiMAX three hop relay networks. 1589-1598 - Yuanyuan Pan, Jianqing Li:
Cooperative pseudonym change scheme based on the number of neighbors in VANETs. 1599-1609 - Damià Castellà Martínez, Francesc Giné, Francesc Solsona, Josep L. Lérida:
Analyzing locality over a P2P computing architecture. 1610-1619 - Josep Rius, Fernando Cores, Francesc Solsona:
Cooperative scheduling mechanism for large-scale peer-to-peer computing systems. 1620-1631 - Sheng-Cheng Yeh, Ming-Yang Su, Hui-Hui Chen, Chun-Yuen Lin:
An efficient and secure approach for a cloud collaborative editing. 1632-1641 - Hongchen Wu, Xinjun Wang, Zhaohui Peng, Qingzhong Li:
Div-clustering: Exploring active users for social collaborative recommendation. 1642-1650 - Li Ho Leung, Vincent T. Y. Ng:
Discovering associations between news and contents in social network sites with the D-Miner service framework. 1651-1659 - Xiaogang Wang, Ming Yang, Junzhou Luo:
A novel sequential watermark detection model for efficient traceback of secret network attack flows. 1660-1670 - Jian Jiang, Wei Li, Junzhou Luo, Jing Tan:
A network accountability based verification mechanism for detecting inter-domain routing path inconsistency. 1671-1683 - Junping Wang, Qiliang Zhu, Yan Ma:
An agent-based hybrid service delivery for coordinating internet of things and 3rd party service providers. 1684-1695 - Wenfeng Li, Ye Zhong, Xun Wang, Yulian Cao:
Resource virtualization and service selection in cloud logistics. 1696-1704
- Mojtaba Seyedzadegan, Mohamed Othman, Borhanuddin Mohd Ali, Shamala Subramaniam:
Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks. 1705-1723 - Wu-Hsiao Hsu, Yuh-Pyng Shieh:
Virtual network mapping algorithm in the cloud infrastructure. 1724-1734 - Juan Felipe Botero, Miguel Molina, Xavier Hesselbach-Serra, José Roberto Amazonas:
A novel paths algebra-based strategy to flexibly solve the link mapping stage of VNE problems. 1735-1752
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.