default search action
Journal of Networks, Volume 7
Volume 7, Number 1, 2012
- Mohammad S. Obaidat, José Luis Sevillano:
Guest Editorial. 1-3
- Issa Traoré, Isaac Woungang, Ahmed Awad El Sayed Ahmed, Mohammad S. Obaidat:
Software Performance Modeling using the UML: a Case Study. 4-20 - Raffaele Bolla, Riccardo Rapuzzi, Matteo Repetto:
User-Centric Mobility for Multimedia Communication: Experience and Evaluation from a Live Demo. 21-36 - Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch:
Tracking Per-Flow State - Binned Duration Flow Tracking. 37-51 - Yang Hong, Changcheng Huang, James Yan:
Impact of Retransmission Mechanism on SIP Overload: Stability Condition and Overload Control. 52-62 - Juan Segovia, Pere Vilà, Eusebi Calle, José-Luis Marzo:
Improving the Resilience of Transport Networks to Large-scale Failures. 63-72
- Alia Bellabas, Samer Lahoud, Miklós Molnár:
Performance Evaluation of Efficient Solutions for the QoS Unicast Routing. 73-80 - Lingxi Li, Dongsoo S. Kim:
Bounded Length Least-Cost Path Estimation in Wireless Sensor Networks Using Petri Nets. 81-87 - Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. 88-100 - Hao Chen, Tong Yang, Jianfu Teng, Hong He:
Interference Analysis of TD-SCDMA System and CDMA2000 System. 101-109 - Xiaohui Chen, Jing He, Bangjun Lei, Tingyao Jiang:
An Improved Localization Algorithm of Nodes in Wireless Sensor Network. 110-115 - Yaser M. Khamayseh, Ruba Al-Salah, Muneer O. Bani Yassein:
Malicious Nodes Detection in MANETs: Behavioral Analysis Approach. 116-125 - Matthias Vodel, Mirko Caspar, Wolfram Hardt:
Wake-Up-Receiver Concepts - Capabilities and Limitations. 126-134 - Jian Wang, Xingshu Chen, Dengqi Yang:
An Improved Adaptive Routing Algorithm Based on Link Analysis. 135-140 - Ya-qin Fan, Chi Li, Chao Sun:
Based on combination of L2TP and IPSec VPN security technology research. 141-148 - Yulong Huang, Zhihao Chen, Jianqing Xi:
A New RFID Tag Code Transformation Approach in Internet of Things. 149-156 - Xu Wu:
A Distributed Trust Evaluation Model for Mobile P2P Systems. 157-164 - Zhigang Liang, Yuhai Chen:
The Design and Implementation of Single Sign-on Based on Hybrid Architecture. 165-172 - Shunan Ma, Jingsha He, Feng Gao:
An Access Control Model based on Multi-factors Trust. 173-178 - Gengxin Sun, Fengjing Shao, Sheng Bin:
A Private Data Transfer Protocol Based On A New High Secure Computer Architecture. 179-186 - Yanchao Niu, Deyun Gao, Shuai Gao, Ping Chen:
A Robust Localization in Wireless Sensor Networks against Wormhole Attack. 187-194 - Jian Shu, Ming Hong, Linlan Liu, Yebin Chen:
A Water Quality Monitoring Method Based on Fuzzy Comprehensive Evaluation in Wireless Sensor Networks. 195-202 - Jingjing Wang, Hao Zhang, Tingting Lv, T. Aaron Gulliver:
Capacity of 60 GHz Wireless Communication Systems over Fading Channels. 203-209 - Guoqiong Liao:
Data Synchronization and Resynchronization for Heterogeneous Databases Replication in Middleware-based Architecture. 210-217
Volume 7, Number 2, 2012
- Xi Chen, Shiguo Lian, Chu-Sing Yang, Stefanos Gritzalis:
Guest Editorial. 219-221 - Hui Xu, Xiang Gu:
Extensive Design for Attack's Recognition and Resistance of Survivable Network. 222-228 - Lei Huang, Jiabing Wang, Xing He:
A Graph Clustering Algorithm Providing Scalability. 229-235 - Qian Mao, Chuan Qin:
A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism. 236-242 - Peng Liu, Chuang Xu, Xiaoxuan Wang, Xiaoying Wang, Gonghua Xu:
A Statistical Amalgamation Approach for Ontologies. 243-248 - Yan Liu, Lian Liu, Junyong Luo:
Adaptive Ant Colony Clustering Method Applied to Finding Closely Communicating Community. 249-258 - Jianwen Sun, Zongkai Yang, Sanya Liu, Pei Wang:
Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace. 259-266 - Peng Xiao, Jingsha He, Yingfang Fu:
A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks. 267-274 - Yubo Song, Kan Zhou, Xi Chen:
Fake BTS Attacks of GSM System on Software Radio Platform. 275-281 - Ting Cui, Chenhui Jin:
Lower Bounds of Differential and Linear Active S-boxes for Generalized Feistel Network with SP Type F-function. 282-287 - Grant P. Millar, Emmanouil A. Panaousis, Christos Politis:
Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions. 288-299 - Lansheng Han, Xiao Qu, Yuan Li, Tao Yin:
The Probability of Trojan Attacks on Multi-level Security Strategy based Network. 300-304 - Sugang Ma:
A Review on Cloud Computing Development. 305-310
- Alireza Shameli-Sendi, Michel R. Dagenais, Masoume Jabbarifar, Mario Couture:
Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model. 311-321 - Feng Gao, Jingsha He, Shunan Ma:
Trust Based Privacy Protection Method in Pervasive Computing. 322-328 - Yang Lu:
Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System. 329-336 - Nan Feng, Jing Xie:
A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment. 337-344 - Hui Chen:
The Impact of Comments and Recommendation System on Online Shopper Buying Behaviour. 345-350 - Zhuoqun Xia, Zhigang Chen, Xiaoheng Deng, Ming Zhao:
An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game. 351-356 - Yong Xu, Tingting Yan:
Design and Analysis on Error Handing and Controlling Protocol in Mobile Payment. 357-364 - Yinghua Xue, Hongpeng Liu:
Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse. 365-369 - Peiyi Zhu, Weili Xiong, Ningning Qin, Baoguo Xu:
D-S Theory Based on an Improved PSO for Data Fusion. 370-376 - Chuiwei Lu, Zhengbing Hu:
A Fuzzy Search Algorithm for Structured P2P Network Based on Multi-dimensional Semantic Matrix. 377-384 - Hongwei Chen, Hui Xu, Li Chen:
Incentive Mechanisms for P2P Network Nodes based on Repeated Game. 385-392 - Jun Tu, De-hua Li, Yingjiang Zhang, Zhiwei Ye, Wangyu Tong:
QoS Study Based On IEEE 802.16 Bandwidth Scheduling Strategy. 393-399 - Tongying Li, Zhenchao Zhang:
Vibration Data Processing Based on Petri Network in Wireless Sensor Networks. 400-407
Volume 7, Number 3, 2012
- Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad A. Karim, Nurul I. Sarkar:
Guest Editorial. 409-411 - Md. Motaharul Islam, Eui-nam Huh:
Virtualization in Wireless Sensor Network: Challenges and Opportunities. 412-418 - Md. Jahedul Islam, Md. Rafiqul Islam:
Effect of Polarization Mode Dispersion on the BER Performance of Optical CDMA. 419-426 - Md. Shohrab Hossain, Mohammed Atiquzzaman, William D. Ivancic:
Cost and Efficiency Analysis of NEMO Protocol Entities. 427-440 - Vikram Arkalgud Chandrasetty, Syed Mahfuzul Aziz:
A Highly Flexible LDPC Decoder using Hierarchical Quasi-Cyclic Matrix with Layered Permutation. 441-449 - Md. Mahiuddin, Md. Saiful Islam:
Analysis of Performance Limitations in Fiber Bragg Grating Based Optical Add-Drop Multiplexer due to Crosstalk. 450-455 - M. M. Hafizur Rahman, Yukinori Sato, Yasushi Inoguchi:
High Performance Hierarchical Torus Network Under Adverse Traffic Patterns. 456-467 - M. M. Hafizur Rahman, Yukinori Sato, Yasushi Inoguchi:
Dynamic Communication Performance Enhancement in Hierarchical Torus Network by Selection Algorithm. 468-479 - Tamal Chakraborty, Atri Mukhopadhyay, Suman Bhunia, Iti Saha Misra, Salil Kumar Sanyal:
An Optimization Technique for Improved VoIP Performance over Wireless LAN. 480-493
- Hongzeng He, Jingbo Sun, Yue Wang, Qi Liu, Jian Yuan:
Cluster Analysis Based Switching-off Scheme of Base Stations for Energy Saving. 494-501 - Yingying Qin, Rongbo Zhu:
Efficient Routing Algorithm Based on Decision-making Sequence in Wireless Mesh Networks. 502-509 - Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games. 510-516 - Tengyue Mao, Zhengquan Xu, Rui Hou, Min Peng:
Efficient Satellite Scheduling Based on Improved Vector Evaluated Genetic Algorithm. 517-523 - Feng Liang, Haoming Guo, Shengwei Yi, Shilong Ma:
A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems. 524-531 - Yongsheng Huang, Huamei Du, Genglu Zhang:
Clustering Model of P2P CDN Based on The Prediction of User Requirements. 532-539 - Liyun Su, Qian Yang, Yuli Zhang, Jiaojun Li:
Noise Immunity of Duffing Oscillator And Its Applications in Weak UWB Signal Detection. 540-546 - Lizheng Guo, Shuguang Zhao, Shigen Shen, Changyuan Jiang:
Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm. 547-553 - Fangfeng Zhang, Jun Liu, Chunling Zuo:
Evolution Modeling of Complex Network Dynamics. 554-561 - Yuan Zhang, Shexiang Ma:
Power Allocation for Tri-node Cooperative Communication of Gaussian Channel Gains. 562-567 - Kaijian Liang, Linfeng Bai, Quan Liang, Xilong Qu:
Efficient Resource Reservation Scheme in Service-Oriented Network Environment. 568-575 - Zhitong Huang, Yuefeng Ji:
Future Unified Communication Based on Ubiquitous Hierarchical Generalized-Sensor Network Architecture. 576-583 - Li Yang, DaiYun Weng:
Research of Wireless Sensor Routing Algorithm Based on Uneven Clustering. 584-590 - Hui-Huang Chen, Ai-Min Lin:
Complex Network Characteristics and Invulnerability Simulating Analysis of Supply Chain. 591-597 - Hongzhe Xu, Jun Huang, Yaoming Zhou:
Reliability Modeling and Analysis of SCI Topological Network. 598-604
Volume 7, Number 4, 2012
- Xianzhong Chen, Yanchun Shen:
Research of RA Coding Algorithm Based on AWGN Channel. 605-612 - Min Huang, Qinpei Liang, Jianqing Xi:
A Parallel Disjointed Multi-path Routing Algorithm based on OLSR and Energy in Ad Hoc Networks. 613-620 - Xinlian Zhou, Bin Xiao:
A Clustering-Based K-Coverage Algorithm for Mobile Wireless Sensor Networks. 621-627 - Yanchun Shen, Dongmei Li, Yinpu Zhang:
Study on Channel Estimate and Joint Detection in 3G Network. 628-635 - Jun Zheng, Jiantao Gu, Jiansheng Gao:
Research of Financial Informationization Construction system based on VPN Technology. 636-643 - Jiantao Gu, Jun Zheng, Shufen Zhang:
A Graphical User Interface in WLAN Monitoring and Management System. 644-651 - Ming Lu:
Study on Secret Key Management Project of WSN Based on ECC. 652-659 - Zhihong Qian, Xue Wang, Shuang Zhu:
A Preamble Pattern Identification based Synchronization System for UWB-based Wireless Networks. 660-666 - Lina Lan, Jingli Mao, Xuerong Gou:
A Novel Lightweight Main Memory Database for Telecom Network Performance Management System. 667-674 - Yi-li Tan, Ye Zhao, Yourong Wang:
Power Network Voronoi Diagram and Dynamic Construction. 675-682 - Haoming Guo, Feng Liang, Yunzhen Liu:
Research on Sensor Cooperation for Distributed Emergency Response System. 683-690 - Sihai Zheng, Layuan Li, Yong Li:
A QoS Routing Protocol for Mobile Ad Hoc Networks Based on Multipath. 691-698 - Lu Lou, Xin Xu, Zhili Chen:
Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks. 699-706 - Jun Chen, Yuesheng Gu, Yanpei Liu:
Grid Service Concurrency Control Protocol. 707-714 - Min Zhao, Tao Zhang, Fangbin Ge, Zhijian Yuan:
RobotDroid: A Lightweight Malware Detection Framework On Smartphones. 715-722 - Xiaobo Wang, Xianwei Zhou, Junde Song:
Hypergraph based Model and Architecture for Planet Surface Networks and Orbit Access. 723-729 - Yinpu Zhang:
Study on Airspace Covert Communication Algorithm of Covert Communication System. 730-737 - Yongquan Cai, Zhanhai Luo, Yi Yang:
Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol. 738-745 - Yan-Pei Liu, Yuesheng Gu, Jun Chen:
A New Control Structure Model Based on Object-oriented Petri Nets. 746-753
Volume 7, Number 5, 2012
- Carmen Mas Machuca, Norbert Hanik:
Guest Editorial. 755-756
- Abdulamir Ali, Jochen Leibrich, Werner Rosenkranz:
Design Considerations and Performance Comparison of High-Order Modulation Formats using OFDM. 757-763 - Vincenzo Eramo, Lorenzo Piazzo, Angelo Germoni, Antonio Cianfrani, Marco Listanti:
Dimensioning of Optical Codes in OCDM/WDM Optical Packet Switches. 764-769 - Oscar Gaete, Leonardo D. Coelho, Bernhard Spinnler:
Performance of Stereo Multiplexing in Single Channel and DWDM Systems Using Direct Detection with Optimum Dispersion Maps. 770-775 - Brian Thomas Teipen, Michael H. Eiselt, Klaus Grobe, Jörg-Peter Elbers:
Adaptive Data Rates for Flexible Transceivers in Optical Networks. 776-782 - João Santos, João Pedro, Paulo P. Monteiro, João Pires:
Optimization Framework for Supporting 40 Gb/s and 100 Gb/s Services over Heterogeneous Optical Transport Networks. 783-790 - Slavisa Aleksic, Naida Fehratovic:
Scalability Analysis of Optical Intrasystem Interconnects. 791-799 - Ramon Aparicio-Pardo, Belen Garcia-Manrubia, Nina Skorin-Kapov, Pablo Pavón-Mariño:
Heuristic Approaches for Periodic Reconfiguration of Lightpath-based Networks under Multi-hour Traffic. 800-811 - Burak Kantarci, Hussein T. Mouftah:
Delay-Constrained Admission and Bandwidth Allocation for Long-Reach EPON. 812-820 - Xiaowen Dong, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:
Energy Efficient Optical Networks with Minimized Non-Renewable Power Consumption. 821-831
- Xiang Gao, Yintang Yang, Duan Zhou, Jianxian Zhang, Changchun Chai:
Target Tracking Approximation Algorithms with Particle Filter Optimization and Fault-Tolerant Analysis in Wireless Sensor Networks. 832-837 - Yongxian Song, Juanli Ma, Xianjin Zhang, Yuan Feng:
Design of Wireless Sensor Network-Based Greenhouse Environment Monitoring and Automatic Control System. 838-844 - Hua Liang, Feng Zeng:
A Research on HCCA Mechanism of Wireless LAN Access. 845-849 - Fei Shao, Guoping Jiang:
Traffic Driven Epidemic Spreading in Homogeneous Networks with Community Structure. 850-855 - Zhiwen Wang, Lu Liu:
Co-occurrence Relation of DNS Queries Based Research on Botnet Activities. 856-862 - Qin Qia, Zhiwen Wang:
A New Attack Detection in Large Scale Network based on Entropy. 863-868 - Jun Wang, Weiru Chen:
A Dynamic Length Mechanism for Unite Frame on MAC Layer of FCS Based on UWB. 869-875 - Jin Qi, Shunyi Zhang, Lu Cao, Yanfei Sun, Ling Tan:
Cognitive Networks Autonomic Decision-making Approach Based on Influence Diagram. 876-883 - Xiangbin Yu, Xiaomin Chen, Yuyu Xin, Qiuming Zhu, Dazhuan Xu:
Multi-amplitude Differential Space-time Block Coding Scheme for Square/Non-Square Code Matrix in MIMO Systems. 884-892
Volume 7, Number 6, 2012
- Wenjia Niu, Gang Li:
Guest Editorial. 893-894 - Nicholas Charles Patterson, Michael Hobbs:
Virtual World Security Inspection. 895-907 - Huy Quan Vu, Shaowu Liu, Xinghua Yang, Zhi Li, Yongli Ren:
Identifying Microphone from Noisy Recordings by Using Representative Instance One Class-Classification Approach. 908-917 - Haibo Li, Yang Li, Zhijun Zhao, Tao Lin, Hui Tang, Song Ci:
A SIP-based Real-time Traffic Mobility Support Scheme in Named Data Networking. 918-925 - Jun Lei, Xinghua Yang, Yinlong Liu, Yifang Qin, Hui Tang, Zhijun Zhao:
Using Physical-level Context Awareness to Improve Service Ranking in Wireless Sensor Network. 926-934 - Gleb Beliakov, John Yearwood, Andrei V. Kelarev:
Application of Rank Correlation, Clustering and Classification in Information Security. 935-945 - Md. Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy, Lynn Margaret Batten:
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods. 946-955
- Cui-Qin Dai, Fang-Lan Liao, Zu-Fan Zhang:
Packet Scheduling for Downlink OFDMA Wireless Systems with Heterogeneous Traffic. 956-961 - Nancy El Rachkidy, Alexandre Guitton, Michel Misson:
Pivot Routing Improves Wireless Sensor Networks Performance. 962-971 - Weizheng Ren, Yansong Cui:
A Parallel Rough Set Tracking Algorithm for Wireless Sensor Networks. 972-979 - Ciro D'Apice, Rosanna Manzo, Benedetto Piccoli:
On the Validity of Fluid-dynamic Models for Data Networks. 980-990 - Xiaohui Chen, Jinpeng Chen, Jing He, Bangjun Lei:
An Improved Localization Algorithm for Wireless Sensor Network Based on the Selection of Benchmark Anchor Node. 991-996 - Qian He, Yong Wang, Bang Zhao, Linlin Yao, Hong-Bin Chen:
FRPWPS: A Filter Driver and Reverse Proxy Based Web Protection System. 997-1005
Volume 7, Number 7, 2012
- Shifei Ding:
Guest Editorial. 1007-1008 - Haiping Huang, Hao Chen, Ruchuan Wang, Qian Mao, Renyuan Cheng:
(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks. 1009-1016 - Liang Ma, Qi Zhu:
A New Algorithm of Spectrum Allocation Based on the Balance between Supply and Demand in Cognitive Radio Networks. 1017-1023 - Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang:
Long-lived Self-healing Group Key Distribution Scheme in Wireless Sensor Networks. 1024-1030 - Zhenxin Liu, Xiaohong Yu, Qing Yang:
Research on Evolution and Synchronization of Space Information Support Power Networks. 1031-1037 - Hao Zhang, Xue-rong Cui, T. Aaron Gulliver:
Threshold Selection for TOA Estimation based on Skewness and Slope in Ultra-wideband Sensor Networks. 1038-1045 - Wenzhu Sun, Hongyu Wang, Daxing Qian:
A Novel Error Resilient Scheme for Wavelet-based Image Coding Over Packet Networks. 1046-1053 - Xiaoxiao Liu, Jun Steed Huang, Zujue Chen:
The Research of Ranging with Timing over Packet Network for the Mine Safety Application. 1054-1062 - Luliang Tang, Fangzhen Huang, Xueyan Zhang, Hong Xu:
Road Network Change Detection Based on Floating Car Data. 1063-1070 - Xiangli Wang, Layuan Li:
Research of an Adaptive Aggregation Routing Algorithm in Wireless Sensor Networks. 1071-1077 - Qiang Li:
Applying Stochastic Integer Programming to Optimization of Resource Scheduling in Cloud Computing. 1078-1084 - Yueheng Li, Meiyan Ju, Huibin Wang, Xiaomin Sun:
A Novel Sensor Node Management Approach Based on Particle Filtering Prediction. 1085-1091 - Yongquan Cai, Jiong Tian, Hui Xu:
An Identification System of Original Painting Artworks Based on Smart Card. 1092-1098 - Jingjun Miao, Liangmin Wang:
Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection. 1099-1105 - Di Wu, Jing Cao, Yan Ling, Jiangchuan Liu, Limin Sun:
Routing Algorithm Based on Multi-Community Evolutionary Game for VANET. 1106-1115 - Guanghui Li, Hong Li, Hailin Feng, Zhi Wang, Ziwei Xuan:
The Effect of Wireless Sensor Nodes Deployment Density in Forest Fire Monitoring Quality Evaluation. 1116-1122 - Ruining Huang, Lei Li, Yunjiang Lou:
Research and Construction the Net Monitor System. 1123-1130
- Bing Chen, Chengxiang Tan, Bo Jin, Xiang Zou, Yuebo Dai:
RFID-based Electronic Identity Security Cloud Platform in Cyberspace. 1131-1138 - Jingyang Wang, Yu Hua, Min Huang, Liwei Guo, Wanzhen Zhou:
Reach on Policy-based Transmition Control Technology in MPLS Communication Network. 1139-1146
Volume 7, Number 8, 2012
- Yixian Yang, Xiaojun Wang:
Guest Editorial. 1147-1149 - Weiwei Zhang, Ru Zhang, Xianyi Liu, Chunhua Wu, Xinxin Niu:
A Video Watermarking Algorithm of H.264/AVC for Content Authentication. 1150-1154 - Bin Sheng:
A Novel Pilot Cancellation Scheme for OFDM Systems in Time-Varying Channels. 1155-1159 - Bin Sheng:
Pilot Power Allocation for OFDM in DAS. 1160-1163 - Yongli An, Xiaohong Huang, Kaiyu Zhu, Yang Xiao:
Multi-users Cooperative Transmitting Algorithm in Cognitive WLAN. 1164-1169 - Xi Liu, Wenquan Feng, Chunsheng Li, Chao Ma:
A Carrier Estimation Method for MF-TDMA Signal Monitoring. 1170-1175 - Lei Xu, Xiaolong Xu, Yue Zhuo:
P2P Botnet Detection Using Min-Vertex Cover. 1176-1181 - Zhihua Huang, Songnian Lu, Aixin Zhang, Jie Gu:
Impact of Feedback on Trust in P2P Networks. 1182-1188 - Rui Zhang, Guoliang Ding:
Network Coding Scheme of Wireless Node with Unequal Data Arriving Rates. 1189-1194 - Huisheng Liu, Zhenxing Wang, Yu Wang:
Semi-supervised Encrypted Traffic Classification Using Composite Features Set. 1195-1200 - Jianyi Zhang, Yangxi Ou, Dan Li, Yang Xin:
A Prior-based Transfer Learning Method for the Phishing Detection. 1201-1207 - Hongjiang Lei, Chao Gao, Yongcai Guo, Zhi Ren, Jun Huang:
Wait-Time-based Multi-channel MAC Protocol for Wireless Mesh Networks. 1208-1213 - Rongrong Fu, Kangfeng Zheng, Tianliang Lu, Dongmei Zhang, Yixian Yang:
Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks. 1214-1219 - Jiayin Wang, Yubin Xu, Lin Ma, Liang Chen:
Call Admission Control in CDMA2000/WLAN Network Based on User Position Information. 1220-1226 - Tianliang Lu, Kangfeng Zheng, Rongrong Fu, Yingqing Liu, Bin Wu, Shize Guo:
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus. 1227-1232 - Hongguang Lan, Yilei Sun, Xiaohan Xia, Ming Ma, Jianjun Wu:
A Seamless Media Stream Delivery Scheme between MSS and UMTS with SIP-based Soft Handover. 1233-1238 - Min Li, Zheli Liu, Jingwei Li, Chunfu Jia:
Format-Preserving Encryption for Character Data. 1239-1244 - Tingting Fu, Peng Liu, Y. Fun Hu:
Enable Energy Efficiency of Object Tracking using Sentinel based Multisensor Sleep Scheduling. 1245-1250 - Wei Gao, Tianwei Xu:
Characteristics of Optimal Function for Ontology Similarity Measure via Multi-dividing. 1251-1259 - Qingli Zhao, Weiqiang Pan:
An Improved Penalty-SA Based Resource Allocation Algorithm for OFDMA Cellular Systems. 1260-1265 - Li Li, Degong Duan, Hongan Li, Zhao Dong:
Research on Downstream Encryption Scheme Based on Timestamp in GEPON Network. 1266-1271 - Min Zhang, Jie Zhang, Zhengping Jin, Hua Zhang, Qiao-Yan Wen:
A Light-Weight Rainbow Signature Scheme for WSN. 1272-1279 - Wenjing Kang, Gongliang Liu:
Super-Resolution Information Collection in Underwater Sensor Networks with Random Node Deployment: A Compressed Sensing Approach. 1280-1287 - Wei Li, Dawu Gu, Xiaoling Xia, Ya Liu, Zhiqiang Liu:
Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher. 1288-1294 - Youhua Ma, Zhiyong Liu, Gongliang Liu, Xingpeng Mao:
Joint Relay Selection and Power Allocation for Cooperative Communication over Frequency Selective Fading Channels. 1295-1300 - Gongliang Liu, Wenjing Kang, Hongdan Wang, Xin Ge:
Power Allocation Algorithm for IDMA-based Multi-Beam Satellite Communication Systems. 1301-1307
Volume 7, Number 9, 2012
- Zhengtao Yu, Binghai Zhou:
Guest Editorial. 1309-1310 - Xue-rong Cui, Hao Zhang, T. Aaron Gulliver:
Threshold Selection for Ultra-Wideband TOA Estimation based on Neural Networks. 1311-1318 - Zhangfeng Hu, Shanzhi Chen, Bo Hu:
Reconsidering Architecture for Future Ubiquitous Internet. 1319-1326 - Ziqian Wan, Gang Liang, Tao Li:
Multi-core Processors based Network Intrusion Detection Method. 1327-1333 - Jian Guo, Lijuan Sun, Ruchuan Wang:
A Cross-layer and Multipath based Video Transmission Scheme for Wireless Multimedia Sensor Networks. 1334-1340 - Jun-jun Wu, Ming-wei Fang, Xinfang Zhang, Tongyang Wang:
Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment. 1341-1348 - Dengyuan Xu, Benniu Zhang, Zhongwei Hou:
Novel PIT Localization Algorithm based on Coverage of Anchors in WSN. 1349-1354 - Qiang Fan, Jing Fan, Jie Li, Xiaofang Wang:
A Multi-hop Energy-efficient Sleeping MAC Protocol based on TDMA Scheduling for Wireless Mesh Sensor Networks. 1355-1361 - Yourui Huang, Liguo Qu, Chaoli Tang:
Optimal Coverage Scheme based on QPSO in Wireless Sensor Networks. 1362-1368 - Xin Song, Rongcui Wang, Ying Yuan:
Local Mapping Based Modeling Sensor Network Data Algorithm for Query Processing. 1369-1375 - Hongjun Dai, Yu Liu, Fenghua Guo, Zhiping Jia:
A Malicious Node Detection Algorithm Based on Principle of Maximum Entropy in WSNs. 1376-1383 - Chang Liu, Hong Jiang, De-Long Zeng:
Unitary Matrix Pencil Algorithm for Range-Based 3D Localization of Wireless Sensor Network Nodes. 1384-1390 - Yu Song, Hongwei Liu, Ming Hao, Xiaozong Yang:
Multi-Channel Contention Estimate (MCCE): An Approach to Assign Channels for Multiple Rendezvous MAC Protocols in Ad hoc Networks. 1391-1399 - Xin Huang, Xiao Ma, Bangdao Chen, Andrew Markham, Qinghua Wang, Andrew William Roscoe:
Human Interactive Secure ID Management in Body Sensor Networks. 1400-1406 - Fengjun Shang, Jianbo Liu:
Multi-hop Topology Control Algorithm for Wireless Sensor Networks. 1407-1414 - Mei-Wen Huang, Hsu-Jung Liu, Min-Rui Lin, Wen-Shyong Hsieh:
A Novel Mobile Sink Nodes Protocol for Grid Sensor Networks. 1415-1422
- Nafei Zhu, Jingsha He:
Experimental Study of the Similarity of Network Nodes based on RTT. 1423-1430 - Mehrnoush Masihpour, Mehran Abolhasan, Daniel Robert Franklin:
NFMIC Cooperative Communication Methods for Body Area Networks. 1431-1440 - Dewiani, Kouji Hirata, Khamisi Kalegele, Yoshinobu Higami, Shin-ya Kobayashi:
Dynamic Routing and Wavelength Assignment with Backward Reservation in Wavelength-routed Multifiber WDM Networks. 1441-1448 - Liangli Ma, Jingchun Sun, Yongjie Li:
Comparing General Paradigms on Data Secrecy Protection for Outsourced Files in Mobile Cloud Computing. 1449-1455 - Ning Du, Huijing Yang, Chunying Wang:
An Optimized OSPF Routing Protocol for Mobile Ad-hoc Networks. 1456-1463 - Dandan Han, Jing Zhang:
An Optimized Gnutella-like P2P Protocol in Mobile Networks. 1464-1471 - Jinxin Zhang, Mangui Liang, Zhaowei Wang:
Multi-Priority Frame Forwarding in Tree-Based Routing Ethernet. 1472-1478 - Yingan Cui, Xue Li, Xiaogang Chen:
The Research of Polarization Phenomenon in Blogosphere. 1479-1485 - Daru Pan, Mu Lin, Liangjie Chen, Jiaping Sun:
An Improved Spray and Wait with Probability Choice Routing for Opportunistic Networks. 1486-1492
Volume 7, Number 10, 2012
- Rudy Deca, Omar Cherkaoui, Yvon Savaria:
Rule-Based Network Service Provisioning. 1493-1504 - Mohamed K. Watfa:
A 4-Node Coverage Approach to the Localization Problem in UWSNs. 1505-1514 - Arockia Xavier Annie Rayan, Yogesh Palanichamy:
Enhanced Link based Congestion Control (ELCC) in Peer-to-Peer (P2P) based Video on Demand (VoD) System. 1515-1522 - Jiping Xiong, Lifeng Xuan, Tao Huang, Jian Zhao:
Novel Covert Data Channel in Wireless Sensor Networks Using Compressive Sensing. 1523-1529 - Jie Zeng, Meng Zhang, Hu Sheng, Jinxiu Luo:
The Intelligent Video Playback System Based on RFID Technology. 1530-1537 - Jing Ma, Shuli Sun:
Centralized Fusion Estimators for Multi-sensor Systems with Multiplicative Noises and Missing Measurements. 1538-1545 - Hao Wang, Guozhen Tan, Ji-xiang Yang:
An Improved VANET Intelligent Forward Decision-making Routing Algorithm. 1546-1553 - Ziyi Fu, Juanjuan Bai, Qiang Wang:
A Novel Dynamic Bandwidth Allocation Algorithm with Correction-based the Multiple Traffic Prediction in EPON. 1554-1560 - Zi'ao Zhan, Qixing Xu:
A Stochastic Push Scheme of Streaming Media Partial Content based on P2P. 1561-1567 - Qilie Liu, Xiang Pang, Yong Wang, Yingjun Pan, Leilei Li:
An Improved Path Management Policy for the Ferry in Opportunistic Networks. 1568-1575 - Min Xiang, Ling Luo, Changjiang Jiang, Zhiyong Luo:
A Novel Polymorphic Ant Colony -Based Clustering Mechanism for Wireless Sensor Networks. 1576-1583 - Ke Xu, Wen Cui, Jun Tie, Xinfang Zhang:
An Algorithm for Detecting Group in Mobile Social Network. 1584-1591 - William W. Guo, Mark Looi:
A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection in Wireless Sensor Networks. 1592-1599 - Zhenjing Yao, Tao Gao, Guo Li:
The Optimized Pseudorandom Digital Modulation Excitation Sequences for Multichannel Ultrasonic Ranging system. 1600-1608 - Qingliang Wang, LiFang Zhai, Zheng-Tao Jiang, Yunbing Hou:
Progress and Research of Network System Survivability Scheme with Cooperative Information Management. 1609-1615 - Qi Xie:
Provably Secure Self-certified Multi-proxy Signature with Message Recovery. 1616-1623 - Wenxian Wang, Xingshu Chen, Haizhou Wang:
IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems. 1624-1630 - Qinwen Han, Lingqiu Zeng:
FPGA Implementation for Low-Rank Channel Estimation of OFDM. 1631-1638 - Xiaoqing Zuo, Yongchuan Zhang, Chong Feng:
A Compute Method of Road Travel Speed based on Mobile Phone Handover Location. 1639-1645 - Youjun Bu, Wei He, Kunpeng Jiang, Liang Zhao:
A Novel Multi-Next Hop Routing Algorithm based on Node Potential. 1646-1653 - Lei Yu, Yang Lu, Xiaojuan Zhu:
Smart Hospital based on Internet of Things. 1654-1661 - Li Yi, Huachun Zhou, Fei Ren, Hongke Zhang:
Analysis of Route Optimization Mechanism for Distributed Mobility Management. 1662-1669 - Xiaoting Han, Li Niu:
Word of Mouth Propagation in Online Social Networks. 1670-1676 - Bin Zhuge, Guo-Wei Dai, Lei Wan, Huan-Huan Song, Hua Wang, Weiming Wang:
The Design and Research of Cluster Router Based on ForCES Protocol. 1677-1686 - Yiran Wang, Bo Zhang, Shujian Li:
Differential Coherent Algorithm for Interferometric Acquisition of GNSS-R Software Receiver. 1687-1695
Volume 7, Number 11, 2012
- Mohammad S. Obaidat, José Luis Sevillano:
Guest Editorial. 1697-1699 - Scott Fowler, Katrin Hameseder, Anders Peterson:
An Empirical Evaluation of Web System Access for Smartphone Clients. 1700-1713 - Junyu Lai, Bernd E. Wolfinger, Stephan Heckmüller:
Decreasing the Call Blocking Probability of Broadband IPTV Services in Stationary and Peak-hour Scenarios. 1714-1727 - Peppino Fazio, Floriano De Rango, Cesare Sottile:
An On Demand Interference Aware Routing Protocol for VANETS. 1728-1738 - Kishore Angrishi, Ulrich Killat:
A Node Operating Point Approach for Stochastic Analysis with Network Calculus. 1739-1748 - Paul Davern, Noor Nashid, Cormac J. Sreenan, Ahmed H. Zahran:
Client-Side Framework for Automated Evaluation of Mechanisms to Improve HTTP Performance. 1749-1759 - Alireza Abdollahpouri, Bernd E. Wolfinger:
Multicast Gain for IPTV Transmission in WiMAX Multi-hop Relay Networks. 1760-1772 - Antonio Bueno, Pere Vilà, Ramón Fabregat:
Charging Multicast Services: A Cost Distribution Scheme Comparative Study. 1773-1781
- Zi Yin, Xiaoyan Tang, Qian Ma:
Research on Emergence Mechanism of College Instant Messaging Community Network. 1782-1789 - Dongxiao Niu, Ling Ji, Mian Xing, Jianjun Wang:
Multi-variable Echo State Network Optimized by Bayesian Regulation for Daily Peak Load Forecasting. 1790-1795 - Bin Lu, Yongjuan Chang:
SPA Comprehensive Evaluation Model and its Application in the Risk Assessment of Electric Power Information Network. 1796-1802 - Jun Zhang:
Arbitrated Quantum Signature protocol using EPR pairs. 1803-1810 - Hu Zhang, Zhuohua Fan, Jia-heng Zheng, Quanming Liu:
An Improving Deception Detection Method in Computer-Mediated Communication. 1811-1816 - Feng Wang, Weihong Bi, Kuan Wang, Wenqiu Feng:
Study on High-order Polarization Mode Dispersion and its Compensation Method in High-speed Optical Communication Systems. 1817-1823 - Feng Wang, Xueying Zhang, Maofeng Wang, Guijun Chen:
Energy-Efficient Routing Algorithm for WSNs in Underground mining. 1824-1829 - Hongtao Liu, Lianglun Cheng:
A Novel Cross-layer Congestion Control Strategy for Wireless Sensor Networks. 1830-1836 - Shengquan Liao, Chunming Wu, Qiang Yang, Ming Jiang:
An Efficient Name Resolving Mechanism for Inter-domain Policy in Content-Centric Networks. 1837-1844 - Zhimin Li, Xin Xu, Cunhua Li:
Provably Secure Certificate-based Signature Scheme for Ad Hoc Networks. 1845-1851 - Xiaoyan Yu, Zhenyu Yu:
A Distributed Architecture of Video Conference Using P2P Technology. 1852-1859 - Xiaohui Chen, Canfeng Gong, Jiangbo Min:
A Node Localization Algorithm for Wireless Sensor Networks based on Particle Swarm Algorithm. 1860-1867 - Feng Wang, Xuande Ji, Yuyan Wang:
UWB Autocorrelation Receiver Based on Average Differential Transmitted Reference. 1868-1875 - Zheng Wan:
Priority based Dynamic Packet Assignment for Multipath Routing in Multihop Networks. 1876-1883 - Jindong Zhao, Shuanhu Wu, Chunxiao Mu, Baode Fan, Yunhong Lu:
Study and Prediction of Wireless Link Quality for Adaptive Channel Hopping. 1884-1891 - Bencan Gong, Shouzhi Xu:
Unequal Density-based Node Deployment and Clustering Routing Protocol in Wireless Sensor Networks. 1892-1899 - Lizhong Xu, Jiahua Zhang, Hua Harry Li, Pengfei Ye, Xijun Yan, Xiaofang Li:
An Improved MAC Protocal for Marine-Environment Monitoring WSN System. 1900-1907
Volume 7, Number 12, 2012
- Salahuddin Muhammad Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad Ataul Karim, Nurul I. Sarkar:
Guest Editorial. 1909-1911
- Md. Humayun Kabir, Md. Al-Farabi Khan:
A Probabilistic Scheme for Reducing the Packet Loss in Mobile IPv6. 1912-1924 - Tamal Chakraborty, Iti Saha Misra, Salil Kumar Sanyal:
Proactive QoS Enhancement Technique for Efficient VoIP Performance over Wireless LAN and Cognitive Radio Network. 1925-1942 - Mahdi N. Al-Ameen, Charles Gatz, Matthew K. Wright:
SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure. 1943-1951 - Budhaditya Bhattacharyya, Iti Saha Misra, Salil Kumar Sanyal:
Analysis and Optimization of Error Performance of a WiMAX Transceiver using Novel Adaptive Cyclic Prefix Strategy under AWGN and Rayleigh Fading Scenario. 1952-1966 - Fariha Tasmin Jaigirdar, Mohammad Mahfuzul Islam:
Assurance of the Maximum Destruction in Battlefield using Cost-Effective Approximation Techniques. 1967-1977 - Debasmita Mukherjee, Sriyankar Acharyya:
New Variants of Ant Colony Optimization for Network Routing. 1978-1989
- Jiandong Li, Xuelian Cai, Jin Yang, Lina Zhu:
Scalable Cluster-based Routing in Large Wireless Sensor Networks. 1990-1995 - Xuelian Cai, Jiandong Li, Lina Zhu:
Performance of Routing Protocols in Very Large Scale Wireless Sensor Networks. 1996-2002 - Yongxian Song, Ting Chen, Juanli Ma, Yuan Feng, Xianjin Zhang:
Design and Analysis for Reliability of Wireless Sensor Network. 2003-2010 - Yongxian Song, Rongbiao Zhang, Zhuo Shen:
Analysis of Energy Consumption of Virtual MIMO Wireless Sensor Network. 2011-2018 - Jing Wang, Zhijing Liu, Hui Zhao:
Group Recommendation Based on the PageRank. 2019-2024 - Zhiming Zhang, Changgen Jiang:
False Data Injection-Resilient Security Routing Protocol for Wireless Sensor Networks. 2025-2030 - Shunyuan Sun, Xiaoying Bin, Zhiyong Wang, Baoguo Xu:
Using WPSO in Clustering Protocol of the WSN. 2031-2036 - Yuanbin Mo, Jizhong Liu, Baolei Wang, Q. M. Jonathan Wu:
A Novel Swarm Intelligence Algorithm and Its Application in Solving Wireless Sensor Networks Coverage Problems. 2037-2043 - Rongbiao Zhang, Yongxian Song, Fuhuan Chu, Biqi Sheng:
Study of Wireless Sensor Networks Routing Metric for High Reliable Transmission. 2044-2050 - Jun Li, Shuang Hong, Sha Xia, Shengmei Luo:
Neural Network Based Popularity Prediction For IPTV System. 2051-2056 - Zheng Wan:
Evaluation on Multiple Video Streaming in IEEE 802.11e Multihop Networks. 2057-2062 - Haiping Huang, Yi Dou, Jiutian Chen, Juan Feng, Xiaolin Qin:
Secure Query in Wireless Sensor Network Using Underground Parties. 2063-2069 - Shengbo Hu, Heng Shu, Yali Liu, Bing Si, Fuyu Yan:
Strategies for Sensor Node Deployment Based on Spatial Correlation for Methane Sensor Network. 2070-2075 - Xiong Luo, Yuechao Ni, Xue Bai:
Cluster Head Optimization Strategy for Wireless Sensor Network Based on Univariate Marginal Distribution Algorithm. 2076-2081 - Mingxiang Guan, Le Wang, Yunfeng Xing:
A Novel Method of High Dynamic Carrier Acquisition and Track for HAPS Communication Networks. 2082-2088 - Hongtao Liu, Lianglun Cheng:
Available Bandwidth Estimation Strategy Based on the Network Allocation Vector. 2089-2095 - Linlan Liu, Haili Zhang, Jian Shu, Yubin Chen, Yebin Chen:
An Improved Three-dimensional Localization Scheme based on APIT. 2096-2103 - Mingchuan Zhang, Ruijuan Zheng, Qingtao Wu, Wangyang Wei:
A Novel Multi-x Cooperative Decision-making Mechanism for Cognitive Internet of Things. 2104-2111
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.