default search action
Journal of Network and Computer Applications, Volume 78
Volume 78, January 2017
- Tshiamo Sigwele, Atm Shafiul Alam, Prashant Pillai, Yim-Fun Hu:
Energy-efficient cloud radio access networks by cloud based workload consolidation for 5G. 1-8 - Pimmy Gandotra, Rakesh Kumar Jha, Sanjeev Jain:
A survey on device-to-device (D2D) communication: Architecture and security issues. 9-29 - Giuseppina Garofalo, Andrea Giordano, Patrizia Piro, Giandomenico Spezzano, Andrea Vinci:
A distributed real-time approach for mitigating CSO and flooding in urban drainage systems. 30-42 - Ehsan Arianyan, Hassan Taheri, Vahid Khoshdel:
Novel fuzzy multi objective DVFS-aware consolidation heuristics for energy and SLA efficient resource management in cloud data centers. 43-61 - Xiumin Wang, Xiaoming Chen, Chau Yuen, Weiwei Wu, Meng Zhang, Cheng Zhan:
Delay-cost tradeoff for virtual machine migration in cloud data centers. 62-72 - Gulshan Kumar, Mritunjay Kumar Rai:
An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs. 73-82 - Fábio D. Rossi, Miguel G. Xavier, César A. F. De Rose, Rodrigo N. Calheiros, Rajkumar Buyya:
E-eco: Performance-aware energy-efficient cloud data center orchestration. 83-96 - Arani Bhattacharya, Pradipta De:
A survey of adaptation techniques in computation offloading. 97-115 - Cui-Yu Kong, I-Hsuan Peng:
Tradeoff design of radio resource scheduling for power and spectrum utilizations in LTE uplink systems. 116-124 - Ying-Dar Lin, Yuan-Cheng Lai, Hung-Yi Teng, Chun-Chieh Liao, Yi-Chih Kao:
Scalable multicasting with multiple shared trees in software defined networking. 125-133 - Abdulbaghi Ghaderzadeh, Mehdi Kargahi, Midia Reshadi:
InFreD: Intelligent Free Rider Detection in collaborative distributed systems. 134-145 - Miguel López-Benítez, Timothy D. Drysdale, Simon Hadfield, Mohamed Ismaeel Maricar:
Prototype for multidisciplinary research in the context of the Internet of Things. 146-161 - Weizhi Meng, Wenjuan Li, Yang Xiang, Kim-Kwang Raymond Choo:
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. 162-169 - Md. Akbar Hossain, Nurul I. Sarkar, Jairo A. Gutiérrez, William Liu:
Performance study of block ACK and reverse direction in IEEE 802.11n using a Markov chain model. 170-179 - Sara Ayoubi, Chadi Assi, Yiheng Chen, Tarek Khalifa, Khaled Bashir Shaban:
Restoration methods for cloud multicast virtual networks. 180-190 - Waqar Ahmad, Osman Hasan, Usman Pervez, Junaid Qadir:
Reliability modeling and analysis of communication networks. 191-215 - Amrita Ghosal, Subir Halder, Stefano Chessa:
Secure key design approaches using entropy harvesting in wireless sensor network: A survey. 216-230 - Mina Mirhosseini, Fatemeh Barani, Hossein Nezamabadi-pour:
QQIGSA: A quadrivalent quantum-inspired GSA and its application in optimal adaptive design of wireless sensor networks. 231-241 - Mukhtiar Ahmed, Mazleena Salleh, Muhammad Ibrahim Channa:
Routing protocols based on node mobility for Underwater Wireless Sensor Network (UWSN): A survey. 242-252 - Qing Li, Yong Jiang, Pengfei Duan, Mingwei Xu, Xi Xiao:
Quokka: Latency-Aware Middlebox Scheduling with dynamic resource allocation. 253-266 - Thaha Muhammed, Riaz Ahmed Shaikh:
An analysis of fault detection strategies in wireless sensor networks. 267-287 - Sheng Wen, Jiao Jiao Jiang, Bo Liu, Yang Xiang, Wanlei Zhou:
Using epidemic betweenness to measure the influence of users in complex networks. 288-299 - Chien-Fu Cheng, Lung-Hao Li:
Data gathering problem with the data importance consideration in Underwater Wireless Sensor Networks. 300-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.