default search action
Journal of Networks, Volume 6
Volume 6, Number 1, 2011
- Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad Ataul Karim:
Guest Editorial. 1-3
- Md. Rakibul Haque, Mahmuda Naznin:
Monitoring Cost Reduction in Sensor Networks using Proximity Queries. 4-11 - Md. Jahedul Islam, Md. Rafiqul Islam:
Impact of GVD and SPM on the Performance of DS-OCDMA. 12-17 - Md. Shamim Ahsan, Man Seop Lee, S. H. Shah Newaz, Syed Md. Asif:
Migration to the Next Generation Optical Access Networks Using Hybrid WDM/TDM-PON. 18-25 - M. M. Hafizur Rahman, Yasushi Inoguchi, Faiz Al Faisal, Monoz Kumar Kundu:
Symmetric and Folded Tori Connected Torus Network. 26-35 - Vikram Arkalgud Chandrasetty, Syed Mahfuzul Aziz:
FPGA Implementation of a LDPC Decoder using a Reduced Complexity Message Passing Algorithm. 36-45 - Roksana Akter, M. Lutfar Rahman:
A Geometric Model to Reduce Interference Computations in Simulation of Large Ad hoc Networks. 46-53
- Peng Zhou:
Implementation of Optimal Pacing Scheme in Xinjiang's Oil and Gas Pipeline Leak Monitoring Network. 54-61 - Ang Gao, Dejun Mu, Yansu Hu:
A QoS Control Approach in Differentiated Web Caching Service. 62-70 - Qi Zhan, Guangxi Zhu, Li Tan, Peng Shang, Gang Su:
A Novel Dynamic Proportional Fair Scheduling Based on Block Diagonal Geometric Mean Decomposition. 71-79 - Hang Qin, Jun Su, Youfu Du:
PCDS: Power Control with Opportunistic Scheduling for Cognitive Radio Networks Reconfiguration. 80-87 - Yong Liu, Lifeng Sun, Shiqiang Yang:
Wireless Video Transmission Scheme Based on Virtual MIMO and Network Coding Technology. 88-95 - Haizheng Yu, Hong Bian:
Threshold-based Message Copies Control in Delay Tolerant Networks. 96-103 - Gang Chen, Xinrong Wu, Wenqiang Zhang, Xiang Zheng:
A Cross-Layer Resource Allocation Algorithm with Dynamic Buffer Allocation Mechanism. 104-111 - Xue-wen Wu, Shi-ming Song, Hui-bin Wang:
A Novel Position-based Multi-hop Broadcast Protocol for Vehicular Ad Hoc Networks. 112-120 - Guoqiang Zheng, Shengyu Tang:
Spatial Correlation-Based MAC Protocol for Event-Driven Wireless Sensor Networks. 121-128 - Zhao Xu, Lei Sun, Wenyan Zhai, Xicheng Chang:
Wireless Ad-hoc Network Model for Video Transmission in the Tunnel of Mine. 129-136 - Xiangbin Yu, Yanfeng Li, Tingting Zhou, Dazhuan Xu:
Performance of Adaptive Modulation with STBC and Imperfect Feedback Information over Rayleigh Fading Channel. 137-144 - Mahmoud T. Qassrawi, Hongli Zhang:
Detecting Malicious Web Servers with Honeyclients. 145-152 - Wei Yang, Guiran Chang, Yu Yao, Xiao-meng Shen:
Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense. 153-162 - Chengjie Gu, Shunyi Zhang, Yanfei Sun:
Pricing Incentive Mechanism based on Multi-stages Traffic Classification Methodology for QoS-enabled Networks. 163-171
Volume 6, Number 2, 2011
- Qinghua Wang, Tingting Zhang, Ilangko Balasingham:
Characterizing the Traffic Load Distribution in Dense Wireless Sensor Networks. 173-180 - Hao Ding, Kun Mean Hou, Jacques Lecoq, Gerard Bohner, Haiying Zhou, Hong Sun:
Toward a Low Cost and Single Chip Holter: SoC-Holter. 181-189 - Zhengbing Hu, Huaiqing Lin, Yonghong Zhou:
A Fuzzy Reputation Management System with Punishment Mechanism for P2P Network. 190-197 - Miao Yu, Jianzhong Chen, Lei Shen, Shiju Li:
Blind Separation of DS-CDMA Signals with ICA Method. 198-205 - Nan Zhang, Jianhua Zhang:
A Self-adapted Anycast Routing Algorithm Based on Mobile Agent in Wireless Sensor Network. 206-213 - Deguang Wang, Zhigang Zhou:
Application of a Collaborative Filtering Recommendation Algorithm Based on Cloud Model in Intrusion Detection. 214-221 - Anbao Wang, Zhenwen Liu:
Analysis and Utilizing of the Error Models in Teaching Wireless Network. 222-229 - Ye Xu, Zhuo Wang:
On Cross-Correlation Evaluation Model of Internet Macroscopic Topology by Genetic Algorithm. 230-237 - Fei Long, Fuchun Sun, Zhian Yang:
A Novel Routing Algorithm Based on Multi-Objective Optimization for Satellite Networks. 238-246 - Zhian Yang, Fei Long, Fuchun Sun:
An Off-line Based QoS Routing Scheme for LEO Satellite Networks. 247-254 - Feixian Sun:
Artificial Immune Danger Theory Based Model for Network Security Evaluation. 255-262 - Kai Shuang, Siyuan Wang, Bo Zhang, Sen Su:
IMS Security Analysis using Multi-attribute Model. 263-271 - Yuwei Zhang, Ye Li, Dengyu Qiao:
Energy-Quality System Design for Wireless Communication. 272-278 - Weimin Li, Xiao-guang Cao, Fang Liu, Zhenming Lei:
Improving DNS cache to alleviate the impact of DNS DDoS attack. 279-286 - Hua-Mei Xin, Lin Xue, Ju Liu:
Positioning Optimization Technique in Non-Line-of-Sight Environment. 287-294 - Hailin Feng, Guanghui Li, Wenwei Lu, Leijun Huang:
Trust Based Secure In-network Data Processing Schema in Wireless Sensor Networks. 295-302 - Yan Xia, Yingzhi Zeng, Zhenghu Gong, Qin Xin:
GDCA: A Distributed Channel Assignment Mechanism for Multi-radio Multi-Channel Wireless Mesh Networks. 303-310 - Yue Yang, Hanping Hu, Wei Xiong, Fan Ding:
A Novel Network Traffic Anomaly Detection Model Based on Superstatistics Theory. 311-318 - Wen Chen, Jinming Yu, Feng Pan:
Optimal Priority-based Call Admission Control Scheme For QoS Provisioning in Heterogeneous Wireless Networks. 319-329 - Guiling Zhang, Yongzhen Ke, Zhichao Li, Mingjie E:
Improvments of Payload-based Intrusion Detection Models by Using Noise Against Fuzzy SVM. 330-340
Volume 6, Number 3, 2011
- Masato Oguchi, Hyung-Jin Choi, Tae-Jin Lee, Seong Keun Oh, Kwan-Ho You:
Guest Editorial. 341-342
- Tomoki Yoshihisa, Shojiro Nishio:
A Communication Protocol for Sensor Database Construction by Rounding Sink. 343-354 - Le Xuan Hung, Murad Khalid, Ravi Sankar, Sungyoung Lee:
An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare. 355-364 - Dang Tu Nguyen, Wook Choi, Minh Thiep Ha, Hyunseung Choo:
An Energy-efficient Multi-candidate Greedy Routing Scheme in Wireless Sensor Networks. 365-377 - Young-il Min, Hwan Min Park, Jun-Hee Jang, Keun-dae Kim, Hyung-Jin Choi:
The Enhanced Decoding Method for QO-SFBC System in Frequency Selective Fading Channel Environment. 378-386 - Taro Tezuka, Akira Maeda:
Image Retrieval with Generative Model for Typicality. 387-399 - Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A Simple Image Encoding Method with Data Lossless Information Hiding. 400-407
- Huaiqing Lin, Zhengbing Hu, Yonghong Zhou:
An Efficient Secure Multicast Communication for P2P Network. 408-415 - Jing Sun, Suixiang Gao, Wenguo Yang, Zhipeng Jiang:
Heuristic Replica Placement Algorithms in Content Distribution Networks. 416-423 - Bin Liu:
A Semi-Supervised Clustering Method For P2P Traffic Classification. 424-431 - Chi Yuan Li, Zhi Qiang Yao:
The Validation of Credit Card Number on the Wired and Wireless Internet. 432-437 - Chenghua Tang, Yi Xie:
Implementation and Realization of Network Security Policy Based on Rule Engine. 438-445 - Shang-Ping Wang, Qiao-Mei Ma, Ya-Ling Zhang, You-Sheng Li:
An Authentication Protocol for RFID Tag and Its Simulation. 446-453 - Ye Xu, Zhuo Wang:
On Internet Topology Modeling and an Improved BA Model. 454-461 - Yu Jiang, Aiqun Hu:
Finding the Most Vital Link with Respect to the Characteristic of Network Communication. 462-469 - Li Wang, Bala Srinivasan, Nandita Bhattacharjee:
Security Analysis and Improvements on WLANs. 470-481 - Linfeng Liu:
A Wireless Sensor Network Architecture for Diversiform Deployment Environments. 482-489 - Jutao Hao, Qingkui Chen, Huan Huo, Jingjing Zhao:
Energy Efficient Clustering Algorithm for Data Gathering in Wireless Sensor Networks. 490-497 - Ruiming Yang, Yipeng Liu, Qun Wan, Wan-Lin Yang:
Compressive Direction Finding Based on Amplitude Comparison. 498-504 - Jianbo Li, Shan Jiang:
A Scalable Clustering Algorithm in Dense Mobile Sensor Networks. 505-512 - Jing (Jonas) Yang, Jianping An, Xiangming Li, Lei Yuan:
An Effective Protocol for Rateless Coding aided Cooperative Communications. 513-520 - Shigen Shen, Guangxue Yue, Qiying Cao, Fei Yu:
A Survey of Game Theory in Wireless Sensor Networks Security. 521-532
Volume 6, Number 4, 2011
- Mohammad S. Obaidat, José Luis Sevillano:
Guest Editorial. 533-535
- Conor McArdle, Daniele Tafani, Liam P. Barry:
Analysis of a Buffered Optical Switch with General Interarrival Times. 536-548 - Monia Najjar, R. Rejeb, Houria Rezig, Mohammad S. Obaidat:
Comparison of the Design Characteristics of MMI Wavelength Demultiplexers Using Different Approaches by Computing the Effective Index. 549-555 - Davide Adami, Christian Callegari, Stefano Giordano, Gianfranco Nencioni, Michele Pagano:
Design and Performance Evaluation of Service Overlay Networks Topologies. 556-566 - Mohamed Faten Zhani, Halima Elbiaze, Farouk Kamoun:
An Empirical Evaluation of Multi-Step Prediction Performance. 567-576 - Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies. 577-586 - Maan A. S. Al-Adwany, Amin M. Abbosh:
Interference Reduction in Overlaid WCDMA and TDMA Systems. 587-594 - Floriano De Rango, Andrea Malfitano, Salvatore Marano:
GCAD: A Novel Call Admission Control Algorithm in IEEE 802.16 based Wireless Mesh Networks. 595-606
- Huaiqing Lin, Yonghong Zhou:
A Secure Protocol for Sharing Trust Data in Hybrid P2P Network. 607-614 - Yingyou Wen, Xuena Peng, Shuyi Chen, Hong Zhao:
Mobile Platform and Secure Access Approach of UMTS Terminal Based on Trusted Computing. 615-622 - Wenxiao Shi, Bin Li, Na Li, Chuanjun Xia:
A Network Architecture for Load Balancing of Heterogeneous Wireless Networks. 623-630 - Yike Yu, Xuefeng Zheng, Hua Sun:
An Identity Based Aggregate Signature from Pairings. 631-637 - Sheng Yu, Shijie Zhou, Leyuan Liu, Rui Yang, Jiaqing Luo:
Detecting Malware Variants by Byte Frequency. 638-645 - Yi Sha, MingMing Li, Jiafu Chu:
A Novel Timing and Frequency Synchronization Technology for OFDM System. 646-653 - Shengbo Hu, Heng Shu, Tiancheng Lin:
Analysis on Stability of a Network Based on RED Scheme. 654-661 - Weibo Liu, Wenping Ma, Yuanyuan Yang:
Analysis and Improvement of the BAN Modified Andrew Secure RPC Protocol. 662-669 - Yu Liu, Qiang Shen, Zhijun Zhao, Hui Tang:
Proactive Location Service in Mobility Management. 670-677 - Hong-yan Qian, Wei-Xin Cai, Xiaolin Qin:
Soft-Handoff in WLAN Realized by Dual Link. 678-685
Volume 6, Number 5, 2011
- Jason C. Hung:
Foreword of Special Issue on "Nomadic Services and Applications". 687-688
- Ding-Jung Chiang, Chien-Liang Chen, Chi-Yi Lin, Timothy K. Shih:
Broadcasting Data Items with Time Constraints Based on On-Demand Multichannel in Ubiquitous Environments. 689-696 - Lawrence Y. Deng, Jason C. Hung, Huan-Chao Keh, Kun-Yi Lin, Yi-Jen Liu, Nan-Ching Huang:
Real-time Hand Gesture Recognition by Shape Context Based Matching and Cost Matrix. 697-704 - Jiung-yao Huang, Huan-Chao Keh, Shu-Shen Wai, Ji-Jen Wu, Chung-Hsien Tsai:
Research of Place-based 3D Augmented Community-Taking The 3D Virtual Campus as an Example. 705-712 - Rong-Chi Chang:
Interactive E-diagnosis: An Efficient Scheme for Medical Diagnosis Support System. 713-720 - Chun-Hong Huang, Su-Li Chin, Li-Hua Hsin, Jason C. Hung, Yi-Pei Yu:
A Web-based E-learning Platform for Physical Education. 721-727 - Shih-Yang Yang, Ching-Ming Chao, Pozung Chen, Chu-Hao Sun:
Incremental Mining of Closed Sequential Patterns in Multiple Data Streams. 728-735 - Kuan-Cheng Lin, Ting-Kuan Wu, Yu-Bin Wang:
Developing a Web-based and Competition-based Quiz Game Environment to Improve Student Motivation. 736-742 - Jason C. Hung:
Using Active RFID to Realize Ubi-media System. 743-749 - Yu-Wei Chan:
On the Design of A Contribution-based, Flexible Locality-Aware P2P Streaming Network. 750-756
- Kefei Cheng, Tingqiang Jia, Meng Gao:
Research and Implementation of Three HTTPS Attacks. 757-764 - Zujue Chen, Shaoqing Liu, Jun Huang:
Multi-tier Grid Routing to Mobile Sink in Large-scale Wireless Sensor Networks. 765-773 - Xiaofei Li, Xuanjing Shen, Haipeng Chen:
ElGamal Digital Signature Algorithm of Adding a Random Number. 774-782 - Wensheng Zhu, Youming Li, Yanjuan Lu, Ming Jin:
Blind Channel Estimation with Lower Complexity Algorithm for OFDM System. 783-790 - Hui Li, Yue-hong Shen, Kun Xu:
Neural Network with Momentum for Dynamic Source Separation and its Convergence Analysis. 791-798 - Kefu Xu, Jianlong Tan, Li Guo, Binxing Fang:
Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection. 799-806 - Jian Kang, Yuan-Zhang Song, Jun-Yao Zhang:
Accurate Detection of Peer-to-Peer Botnet using Multi-Stream Fused Scheme. 807-814 - Lejiang Guo, Qiang Li, Fangxin Chen:
A Novel Cluster-head Selection Algorithm Based on Hybrid Genetic Optimization for Wireless Sensor Networks. 815-822 - Xuena Peng, Yingyou Wen, Hong Zhao:
Security Issues and Solutions in 3G Core Network. 823-830
Volume 6, Number 6, 2011
- Chunlei Wang, Liang Ming, Jinjing Zhao, Dongxia Wang:
A General Framework for Network Survivability Testing and Evaluation. 831-841 - Xiaoxue Ma, Zixian Wang, Ruizhong Du:
Trust Evaluation Model based on Multiple Service Attributes. 842-849 - Hai Zhu, Yuping Wang, Zhanxin Ma, Hecheng Li:
Grid Dependent Tasks Security Scheduling Model and DPSO Algorithm. 850-857 - Dimitris C. Vasiliadis, George E. Rizos, Costas Vassilakis:
Performance Analysis of Dual-Priority Multilayer Multistage Interconnection Networks under Multicast Environment. 858-871 - Yan Zhang:
Precise Location Technology Based on Chirp Spread Spectrum. 872-878 - Yahuan Wei, Taoshen Li, Zhihui Ge:
A Channel Assignment Algorithm for Wireless Mesh Networks Using the Maximum Flow Approach. 879-882 - Yongquan Cai, Fulai Cheng:
A Threshold Signature Scheme with a Weakened Trusted Party. 883-886 - Laishen Xiao, Zhengxia Wang:
Internet of Things: a New Application for Intelligent Traffic Monitoring System. 887-894 - Shaosheng Fan, Hainan Wang:
Multi-direction Fuzzy Morphology Algorithm for Image Edge Detection. 895-898 - Yongquan Cai, Huili Shi:
Rational Secret Sharing Scheme Based on Probability Encryption without Trusted Center. 899-903 - Narisa Zhao, Xiaoming Dai:
Research on the Evolutionary Model of A Kind of Vertex-splitting Network. 904-906 - Yafeng Wang, Min Liang, Wei Xiang:
Semi-Distributed Relay Selection Algorithm for Multi-User Cooperative Wireless Networks. 907-911 - Daogang Peng, Hao Zhang, Cong-Hua Huang, Jiajun Lin, Hui Li:
Study of Immune PID Networked Control System Based on TrueTime. 912-915 - Junnian Wang, Deshun Liu, Chao Liu:
A Modified Mountain Clustering Algorithm based on Hill Valley Function. 916-922 - Dan Yu, Jian Yang:
Highway Incident Detection Research Based on Lipschitz Exponent Algorithm. 923-927 - Xianfeng Zhang, Narisa Zhao:
The Model and Simulation of the Invulnerability of Scale-free Networks Based on "Honeypot". 928-931 - Hongbo Bi, Yubo Zhang, Xueming Li:
Video Watermarking Robust Against Spatio-Temporal Attacks. 932-936
Volume 6, Number 7, 2011
- Tianlong Gu, Shenghui Liu:
Guest Editorial. 937-938
- Xin Yan, Layuan Li, F. J. An:
Multi-Constrained Routing Algorithm for Multimedia Communications in Wireless Sensor Networks. 939-949 - Shenghui Zhao, Guoxin Wu, Guilin Chen, Haibao Chen:
Reputation-aware Service Selection based on QoS Similarity. 950-957 - Li Li, Hua Yan:
Cost Aggregation Strategy with Bilateral Filter Based on Multi-scale Nonlinear Structure Tensor. 958-965 - Lin Guo, Qinghu Chen:
A Collaborative Nonlocal-Means Super-resolution Algorithm Using Zernike Monments. 966-973 - Jie Bai, Kai Sun, Genke Yang:
Mathematical Model and Hybrid Scatter Search for Cost Driven Job-shop Scheduling Problem. 974-981 - Xing Wu, Peihuang Lou, Dunbing Tang:
Multi-objective Genetic Algorithm for System Identification and Controller Optimization of Automated Guided Vehicle. 982-989 - Zhihan Lv, Tengfei Yin, Yong Han, Yong Chen, Ge Chen:
WebVR - - Web Virtual Reality Engine Based on P2P network. 990-998 - Fengjun Shang:
An Energy-Efficient Communication Protocol for Wireless Sensor Networks. 999-1008 - Lei You, Chungui Liu:
Robust Cross-layer Design of Wireless Multimedia Sensor Networks with Correlation and Uncertainty. 1009-1016 - Chung-Hung Tsai:
The E-Commerce Model of Health Websites: An Integration of Web Quality, Perceived Interactivity, and Web Outcomes. 1017-1024 - Erfu Wang, Zhifang Wang, Jing Ma, Qun Ding:
A New Method of Time-frequency Synthesis of Harmonic Signal Extraction from Chaotic Background. 1025-1032 - Jian Yang, Haihang Wang, Jian Wang, Chengxiang Tan, Dingguo Yu:
Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing. 1033-1040 - Juanli Hu, Jiabin Deng, Juebo Wu:
Image Compression Based on Improved FFT Algorithm. 1041-1048 - Qun Ding, Lu Wang, Guanrong Chen:
Correlative Peak Interval Prediction and Analysis of Chaotic Sequences. 1049-1056
- Ming Zhang, Suoping Wang:
An Energy Efficient Dynamic Clustering Protocol Based on Weight in Wireless Sensor Networks. 1057-1064 - Jingjing Wang, Hao Zhang:
Performance of UWB Systems with Direct-Sequence Bipolar Pulse Amplitude Modulation and RAKE Reception over IEEE 802.15.3a Channel. 1065-1071 - Jyotirmoy Karjee, H. S. Jamadagni:
Data Accuracy Estimation for Spatially Correlated Data in Wireless Sensor Networks under Distributed Clustering. 1072-1083 - Tao Feng, Jun Bi, Hongyu Hu, Hui Cao:
Networking as a Service: a Cloud-based Network Architecture. 1084-1090
Volume 6, Number 8, 2011
- Zuo Chen, Qiuwei Yang, Xin Wan, Yuanyan Tu, Fei Yu, Chen Xu:
Automated Trust Negotiation with Time Behavior. 1091-1098 - Yan Gao, Min Wu, Weifeng Du:
Performance Research of Modulation for Optical Wireless Communication System. 1099-1105 - Zuo Chen, Qiuwei Yang, Xin Wan, Yuanyan Tu, Fei Yu, Chen Xu:
Privacy Preservation in Role-based Access Control Model. 1106-1113 - Xiaofeng Xiong, Jiajia Song, Guangxue Yue, Jiansheng Liu, Linquan Xie:
Survey: Research on QoS of P2P Reliable Streaming Media. 1114-1121 - Jiansheng Liu, Jiajia Wei, Guangxue Yue, Linquan Xie, Xiaofeng Xiong:
Application Layer Multicast Technology of Streaming Media. 1122-1128 - Guangxue Yue, Nanqing Wei, Jiansheng Liu, Xiaofeng Xiong, Linquan Xie:
Survey on Scheduling Technologies of P2P Media Streaming. 1129-1136 - Zongpu Jia, Gaolei Wang, Ran Zhao:
A Literature Survey on Handoff for Mobile IPv6. 1137-1144 - Zhanqiang Huo, Shunfu Jin, Zhiheng Wang:
Performance Analysis and Evaluation for Sleep-mode with Uplink/Downlink Traffics in IEEE 802.16e Network. 1145-1152 - Xingwei Wang, Huanyan Zhao, Min Huang, Zhankao Wen, Weixin Wu, Xiaofeng Liu:
ABC Supported Handover Decision Scheme based on multi-PSO with Optimum Mutation. 1153-1162 - Xiaosong Zhang, Ting Chen, Xiao-lin Wang, Yong Huang, Hou-bin Bao:
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network. 1163-1170 - Youyuan Liu:
Stable Routing Algorithm for Mobile Ad Hoc Network. 1171-1178 - Wenjun Xiao, Qin Zhang, Yanxia Liu, Lan Li, Weidong Chen:
CHC: A Robust P2P Overlay Network with Simple Routing and Small-World Features. 1179-1186 - Zenggang Xiong, Xuemin Zhang, Li Liu:
Resource Management Model and ResourceDiscovery Algorithm for P2PGrid. 1187-1194 - Guangxue Yue, Tao Jiang, Jiajin Wang, Zhi Chen, Jiajia Song, Cheng Xu:
Underlying Technology of P2P Media Streaming. 1195-1205 - Bo Hang, Ruimin Hu, Wei Shi:
An Enhanced SYN Cookie Defence Method for TCP DDoS Attack. 1206-1213 - Weihui Dai, Chunshi Wang, Guoxi Li, Fei Yu, Chen Xu:
Research on 3G-based Mobile Self-rescue System for Medical Emergency. 1214-1221 - Minghui Zheng, Jing Zhang, Zhi Zhang:
Mediated Certificateless Signature without Random Oracles. 1222-1229 - Chunxiao Ye, Haibo Hu, Hong Xiang:
Towards Secure Delegation with Chinese Wall Security Policy (CWSP). 1230-1237 - Jun Zhang:
An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Scheme. 1238-1245
Volume 6, Number 9, 2011
- Wenjun Xiao, Mingxin He, Huomin Liang:
CayleyCCC: A Robust P2P Overlay Network with Simple Routing and Small-World Features. 1247-1253 - Yang Lu, Jiguo Li:
A Practical Forward-Secure Public-Key Encryption Scheme. 1254-1261 - Bo Meng, Wei Huang, Dejun Wang:
Automatic Verification of Remote Internet Voting Protocol in Symbolic Model. 1262-1271 - Jun Zhang:
Improvement of a Forward-Secure Multi-Proxy Signature Scheme. 1272-1279 - Gang Yu, Hongzhi Yang, Shuqin Fan, Yong Shen, Wenbao Han:
Efficient Certificateless Signcryption Scheme from Weil Pairing. 1280-1287 - Xing Zhang, Jingsha He, Qian Wei:
Secure and Energy-Efficient Routing for Wireless Sensor Networks. 1288-1295 - Longchang Zhang, Hua Zou, Fangchun Yang:
A Dynamic Web Service Composition Algorithm Based on TOPSIS. 1296-1304 - Xuan Li, Lixin Lin, Xin Liu, Dejian Ye, Weihui Dai:
STB Based Multimedia Information Publication System. 1305-1312 - Yichun Liu, Yinghong Liang, Yuping Hu:
A Fair Payment Protocol for Cascading P2P Transaction. 1313-1320 - Congfeng Jiang, Xianghua Xu, Jian Wan:
Security Aware Parallel and Independent Job Scheduling in Grid Computing Environments Based on Adaptive Job Replication. 1321-1328 - Weihui Dai, Xiang Cai, Haifeng Wu, Weidong Zhao, Xuan Li:
An Integrated Mobile Phone Payment System Based on 3G Network. 1329-1336 - Hui Cui, Tianjie Cao:
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks. 1337-1343 - Yuan Liu:
Wavelet Fuzzy Neural Network based on MQPSO for Network Anomaly Detection. 1344-1350 - Qian Wei, Jingsha He, Xing Zhang:
Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks. 1351-1358 - Yongcai Tao, Song Wu:
Uniform Information Service Interoperation Framework among Heterogeneous Grids. 1359-1366 - Xiangli Li, Kaimin Wei, Xiaolin Sun, Yanhong Gao:
A Performance Value Adaptive Routing for Mobile Ad Hoc Network. 1367-1372 - Lei Zhuang, Chao Wang, Wei Song:
Research of an Optimized Mobile IPv6 Real-time Seamless Handover Technology. 1373-1378 - Lei Shi, Zhanhong Wang, Yao Yao, Lin Wei:
Streaming Media Caching Model Based on Knapsack Problem. 1379-1386
Volume 6, Number 10, 2011
- Fei Yu, Yiqin Lu, Jian Shu, Guangxue Yue, Chin-Chen Chang:
Guest Editorial. 1387-1389
- Dong Chen, Guiran Chang, Xiuying Zheng, Dawei Sun, Jiajia Li, Xingwei Wang:
A Novel P2P Based Grid Resource Discovery Model. 1390-1397 - Li Wang:
KC2A2P : A Knowledge-driven Content and Context-Awareness Adaptive Protocol for Intelligent Communication. 1398-1405 - Zenggang Xiong, Xuemin Zhang, Li Liu, Jianxin Chen:
P2PGridSec: A Reputation-based Security Framework in P2PGrid System. 1406-1413 - Xinlian Zhou, Jianbo Xu:
Research of network topological control algorithm in mWSN. 1414-1421 - Xiufeng Zhao, Qiuliang Xu, Hao Wang, Peng He:
A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity. 1422-1429
- Lianming Xu, Zhongliang Deng, Ling Fang, Yujia Zhu, Wenlong Liu:
Research on an Anti-Perturbation Kalman Filter Algorithm. 1430-1436 - Zhen Luo, Zhishu Li, Biao Cai:
A Self-organized Public-Key Certificate System in P2P network. 1437-1443 - Yufeng Zhu, Xiaoli Ding, Yan Luo, Zhiwei Li:
Analysis on the Application of GPS-RTK Technology using in Yangkou man-made Island in Nantong City. 1444-1451 - Chien-Sheng Chen, Jium-Ming Lin, Wen-Hsiung Liu, Ching-Lung Chi:
Dilution of Position Calculation for MS Location Improvement in Wireless Communication Systems. 1452-1458 - Yuqiao Deng, Ge Song:
Proxy re-signature Scheme Based on Quadratic Residues. 1459-1465 - De-gan Zhang, Yu-xia Hu, Dong Wang, Yan-pin Liang:
A New Algorithm of Service Discovery Based on DHT for Mobile Application. 1466-1474 - Mu Zhou, Yubin Xu, Lin Ma:
Adaptive Autocorrelation Approach for Fingerprint-based Distance Dependent Positioning Algorithms in WLAN Indoor Areas. 1475-1482 - Xue-Qin Zhu, Ying Gui, Hongzhen Xu:
Enhanced Differentiated Surveillance for Static and Random Mobile Sensor Networks. 1483-1490 - Fuhong Lin, Changjia Chen, Hengkui Wu, Hongke Zhang, Ke Xiong:
QHNS: QoS-aware Hierarchical Name System. 1491-1498 - Yue Lu:
A Relatively Optimal Cross-layer Routing Algorithm in Wireless Mesh Network. 1499-1506 - Liyong Bao, Dongfeng Zhao, Yifan Zhao:
A Cluster-based priority Scheduling Algorithm for MAC Layer in Wireless Sensor Networks. 1507-1513 - Chengli Zhao, Yanheng Liu, Zhiheng Yu:
Evaluation for Survivable Networked System Based on Grey Correlation and Improved TOPSIS. 1514-1520
Volume 6, Number 11, 2011
- Amine Dhraief, Abdelfettah Belghith:
Mobility Impact on Session Survivability under the SHIM6 Protocol and Enhancement of its Rehoming Procedure. 1521-1532 - Hazim Anas Haddad, Shinsuke Tamura, Shuji Taniguchi, Tatsuro Yanase:
Development of Anonymous Networks Based on Symmetric Key Encryptions. 1533-1542 - Yuhuang Zheng:
Development of a Ubiquitous Industrial Data Acquisition System for Rotogravure Printing Press. 1543-1548 - Guohong Gao, Wenxian Xiao, Zhen Liu, Wenlong Wan:
An Application of the Modification of Slow Start Algorithm in Campus Network. 1549-1556 - Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme. 1557-1564 - Hui-Gui Rong, Hao Chen:
An Independent Set Packet Classification Algorithm Using Priority Sorting. 1565-1571 - Haoming Guo, Shilong Ma, Feng Liang:
Enabling Awareness Driven Differentiated data service in IOT. 1572-1577 - Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol. 1578-1585 - Liang Dai, Hongke Xu, Ting Chen:
A Task Scheduling Strategy in Heterogeneous Multi-sinks Wireless Sensor Networks. 1586-1593 - Bailin Yang, Zhiyong Zhang, Xun Wang:
Visual Important-Driven Interactive Rendering of 3D Geometry Model over Lossy WLAN. 1594-1601 - Leyou Zhang, Qing Wu, Yupu Hu:
Secure Identity-based Threshold Broadcast Encryption in the Standard Model. 1602-1609 - Ping Wang, Jing Han, Fuqiang Liu, Yang Liu, Jing Xu:
A Power Allocation Algorithm Based on Cooperative Game Theory in Multi-cell OFDM Systems. 1610-1617 - Kaijian Liang, Linfeng Bai, Xilong Qu:
Expectation Value Calculation of Grid QoS Parameters Based on Algorithm Prim. 1618-1624 - Shaobo Zhong, Dongsheng Zou:
Web Page Classification using an ensemble of support vector machine classifiers. 1625-1630 - Huawang Shi:
Integration of Unascertained Method with Neural Networks and Its Application. 1631-1638 - Keshou Wu, Lizhao Liu, Jian Liu, Weifeng Li, Gang Xie, Xiaona Tong, Yun Lin:
Researches on Grid Security Authentication Algorithm in Cloud Computing. 1639-1646 - Chien-Sheng Chen, Yi-Jen Chiu, Ho-Nien Shou, Ching-Lung Chi:
Non-line-of-sight Error Mitigation in Wireless Communication Systems. 1647-1653
Volume 6, Number 12, 2011
- Hailong Wang, Jie Hou, Zhenghu Gong:
Botnet Detection Architecture Based on Heterogeneous Multi-sensor Information Fusion. 1655-1661 - Chengfeng Jian, Haizhong Meng:
XOEM plus OWL-based STEP Product Information Uniform Description and Implementation. 1662-1667 - Yongxian Song, Chenglong Gong, Yuan Feng, Juanli Ma, Xianjin Zhang:
Design of Greenhouse Control System Based on Wireless Sensor Networks and AVR Microcontroller. 1668-1674 - Haitao Zhang, Zhen Li:
Simulation of Networked Control System based on Smith Compensator and Single Neuron Incomplete Differential Forward PID. 1675-1681 - Shaojun Zhong, Zhijuan Deng:
A Web Crawler System Design Based on Distributed Technology. 1682-1689 - Zhijuan Deng, Shaojun Zhong:
A Ranking Method of Retrieval Results Based on Web Comprehending. 1690-1696 - Xiaoming Wang, Guoxiang Yao, Zhen Zhang:
An Encryption Scheme with Hidden Keyword Search for Outsourced Database. 1697-1704 - Fang Yan, Yu-An Tan:
A Method of Object-based De-duplication. 1705-1712 - Lijuan Huang:
Analysis on E-consumers' Purchasing Behavior Based on Data-driving Model. 1713-1718 - Minsheng Tan, Qiang Cui, Lingfeng Zhu, Hui Zhao:
Repair Method of Complex Network Based on Matthew Effect. 1719-1725 - Demin Gao, Huanyan Qian, Zheng Wang, Jiguang Chen:
Study and Design an Anycast Routing Protocol for Wireless Sensor Networks. 1726-1733 - LinGe Wang, YueDou Qi:
Management Model Research of Low-power Wireless Sensor Network. 1734-1739 - Xiangmei Song, Shiguang Ju:
Covert Flow Graph Approach to Identifying Covert Channels. 1740-1746 - Jianyong Li, Jianchun Li, Daoying Huang, Qiang Wei:
A Novel HAVE Message of Peer-to-peer Protocol in BitTorrent Systems. 1747-1753 - Hao Yang, Qingmin Meng, Xiong Gu, Baoyu Zheng:
Image-based Position Estimation and Adaptive Modulation Coding in Vehicular Communication. 1754-1759 - Wei Zhang, Huan Wang, Binbin Yu, Wei Xu, Mingfa Zhu, Limin Xiao, Li Ruan:
A Request Distribution Algorithm for Web Server Cluster. 1760-1766
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.