default search action
Journal of Network and Computer Applications, Volume 33
Volume 33, Number 1, January 2010
- Chun-Ta Li, Min-Shiang Hwang:
An efficient biometrics-based remote user authentication scheme using smart cards. 1-5 - Khaled Salah, A. Kahtani:
Performance evaluation comparison of Snort NIDS under Linux and Windows Server. 6-15 - Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis, Elisavet Konstantinou:
A framework for identity privacy in SIP. 16-28 - Jianhong Zhang, Chenglian Liu, Yixian Yang:
An efficient secure proxy verifiably encrypted signature scheme. 29-34 - Nader Mohamed, Jameela Al-Jaroodi:
Self-configured multiple-network-interface socket. 35-42 - Ming-Wen Tong, Zongkai Yang, Qingtang Liu:
A novel model of adaptation decision-taking engine in multimedia adaptation. 43-49 - Youtao Zhang, Jun Yang, Weijia Li, Linzhang Wang, Lingling Jin:
An authentication scheme for locating compromised sensor nodes in WSNs. 50-62
Volume 33, Number 2, March 2010
- Junqi Zhang, Vijay Varadharajan:
Wireless sensor network key management survey and taxonomy. 63-75
- Weili Han, Min Xu, Weidong Zhao, Guofu Li:
A trusted decentralized access control framework for the client/server architecture. 76-83 - Matthias Strobbe, Olivier Van Laere, Samuel Dauwe, Bart Dhoedt, Filip De Turck, Piet Demeester, Christof van Nimwegen, Jeroen Vanattenhoven:
Interest based selection of user generated content for rich communication services. 84-97 - Cheng-Fu Chou, William C. Cheng, Leana Golubchik:
Performance study of online batch-based digital signature schemes. 98-114 - Ming Xu, Shuigeng Zhou, Jihong Guan, Xiaohua Hu:
A path-traceable query routing mechanism for search in unstructured peer-to-peer networks. 115-127 - Eduardo Moschetta, Rodolfo Stoffel Antunes, Marinho P. Barcellos:
Flexible and secure service discovery in ubiquitous computing. 128-140 - Jenn-Wei Lin, Wei-Shou Wang:
An efficient reconstruction approach for improving Bluetree scatternet formation in personal area networks. 141-155 - Ming-Yang Su:
Discovery and prevention of attack episodes by frequent episodes mining and finite state machines. 156-167 - Haïdar Safa, Hassan Artail, Mirna Nahhas:
A cache invalidation strategy for mobile networks. 168-182 - Yuh-Jzer Joung, Zhang-Wen Lin:
On the self-organization of a hybrid peer-to-peer system. 183-202
Volume 33, Number 3, May 2010
- Muhammad Khurram Khan, Mohamed Kamel, Xudong Jiang:
Special issue on: Recent advances and future directions in biometrics personal identification. 205-206 - Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang, Jie Tian:
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. 207-220 - Eryun Liu, Jimin Liang, Liaojun Pang, Min Xie, Jie Tian:
Minutiae and modified Biocode fusion for fingerprint-based key generation. 221-235 - Chulhan Lee, Jaihie Kim:
Cancelable fingerprint templates using minutiae-based bit-strings. 236-246 - Miao Qi, Yinghua Lu, Ning Du, Yinan Zhang, Chengxi Wang, Jun Kong:
A novel image hiding approach based on correlation analysis for secure multimodal biometrics. 247-257 - Kai Cao, Xin Yang, Xunqiang Tao, Peng Li, Yali Zang, Jie Tian:
Combining features for distorted fingerprint matching. 258-267 - Neyire Deniz Sarier:
Improving the accuracy and storage cost in biometric remote authentication schemes. 268-274 - Zhi Liu, Yilong Yin, Hongjun Wang, Shangling Song, Qingli Li:
Finger vein recognition with manifold learning. 275-282 - Dong-Ju Kim, Jeong-Hoon Shin, Kwang-Seok Hong:
Teeth recognition based on multiple attempts in mobile device. 283-292 - David Delgado-Gómez, Federico Sukno, David Aguado, Carlos Santa Cruz, Antonio Artés-Rodríguez:
Individual identification using personality traits. 293-299 - Hunny Mehrotra, Banshidhar Majhi, Phalguni Gupta:
Robust iris indexing scheme using geometric hashing of SIFT keypoints. 300-313 - Jian-Gang Wang, Eric Sung, Wei-Yun Yau:
Incremental two-dimensional linear discriminant analysis with applications to face recognition. 314-322 - Jianzhong Wang, Baoxue Zhang, Shuyan Wang, Miao Qi, Jun Kong:
An adaptively weighted sub-pattern locality preserving projection for face recognition. 323-332 - Kumiko Yasuda, Daigo Muramatsu, Satoshi Shirato, Takashi Matsumoto:
Visual-based online signature verification using features extracted from video. 333-341 - Siraj A. Shaikh, Joseph R. Rabaiotti:
Characteristic trade-offs in designing large-scale biometric-based identity management systems. 342-351
Volume 33, Number 4, July 2010
- Chung-Nan Lee, Yung-Cheng Kao, Ming-Te Tsai:
A vEB-tree-based architecture for interactive video on demand services in peer-to-peer networks. 353-362 - Neelofer Tamboli, Mohamed F. Younis:
Coverage-aware connectivity restoration in mobile sensor networks. 363-374 - Leopoldo Carro-Calvo, Sancho Salcedo-Sanz, José Antonio Portilla-Figueras, Emilio G. Ortíz-García:
A genetic algorithm with switch-device encoding for optimal partition of switched industrial Ethernet networks. 375-382 - Lei Wang, Ruizhong Wei, Yaping Lin, Bo Wang:
A clique base node scheduling method for wireless sensor networks. 383-396 - Feng Zhong, Chai Kiat Yeo, Bu-Sung Lee:
Enabling inter-PMIPv6-domain handover with traffic distributors. 397-409 - Christos Bouras, Vassilis Poulopoulos, Vassilis Tsogkas:
Adaptation of RSS feeds based on the user profile and on the end device. 410-421 - Yuwang Yang, Chunshan Zhong, Yamin Sun, Jingyu Yang:
Network coding based reliable disjoint and braided multipath routing for sensor networks. 422-432 - Arthur C. Callado, Judith Kelner, Djamel Sadok, Carlos Alberto Kamienski, Stenio F. L. Fernandes:
Better network traffic identification through the independent combination of techniques. 433-446 - David González Ortega, Francisco Javier Díaz Pernas, Mario Martínez-Zarzuela, Míriam Antón-Rodríguez, José Fernando Díez Higuera, Daniel Boto-Giralda:
Real-time hands, face and facial features detection and tracking: Application to cognitive rehabilitation tests monitoring. 447-466 - Chih-Peng Lin, Jenhui Chen, Hsing-Lung Chen:
An efficient bandwidth allocation algorithm for real-time VBR stream transmission under IEEE 802.16 wireless networks. 467-476 - Javad Akbari Torkestani, Mohammad Reza Meybodi:
An efficient cluster-based CDMA/TDMA scheme for wireless mobile ad-hoc networks: A learning automata approach. 477-490 - Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Christopher Leckie:
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. 491-502 - Henrique S. L. Pequeno, George A. M. Gomes, Rossana M. C. Andrade, José Neuman de Souza, Miguel Franklin de Castro:
FrameIDTV: A framework for developing interactive applications on digital television environments. 503-511 - Hui Cheng, Xingwei Wang, Shengxiang Yang, Min Huang, Jiannong Cao:
QoS multicast tree construction in IP/DWDM optical internet by bio-inspired algorithms. 512-522
Volume 33, Number 5, September 2010
- Jameela Al-Jaroodi, Nader Mohamed:
Middleware trends for network applications. 523-524 - Chiara Boldrini, Marco Conti, Franca Delmastro, Andrea Passarella:
Context- and social-aware middleware for opportunistic networks. 525-541 - Praveen Madiraju, Srilaxmi Malladi, Janaka Balasooriya, Arthi Hariharan, Sushil K. Prasad, Anu G. Bourgeois:
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware. 542-555 - Jordi Pujol Ahulló, Pedro García López:
Enabling portability in advanced information-centric services over structured peer-to-peer systems. 556-568 - Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Moreira, Cristiano G. Rezende, Antonio Alfredo Ferreira Loureiro, Azzedine Boukerche:
Adaptive security protocol selection for mobile computing. 569-587 - Pedro García López, Raúl Gracia Tinedo, Josep M. Banús Alsina:
Moving routing protocols to the user space in MANET middleware. 588-602 - Víctor Manuel Álvarez García, María del Puerto Paule Ruíz, Juan Ramón Pérez-Pérez:
Voice interactive classroom, a service-oriented software architecture for speech-enabled learning. 603-610 - Yasser Gadallah, Mohamed Adel Serhani, Nader Mohamed:
Middleware support for service discovery in special operations mobile ad hoc networks. 611-619 - Bo Cheng, Yang Zhang, Peng Zhou, Hua Duan, Xiaoxiao Hu, Zheng Wang, Junliang Chen:
Development of Web-Telecom based hybrid services orchestration and execution middleware over convergence networks. 620-630
Volume 33, Number 6, November 2010
- Jason J. Jung, Chung-Ming Ou, Ngoc Thanh Nguyen, Chonggun Kim:
Advances on agent-based network management. 631-632 - Bo Chen:
Agent-based artificial immune system approach for adaptive damage detection in monitoring networks. 633-645 - Mary Wu, ChongGun Kim:
A cost matrix agent for shortest path routing in ad hoc networks. 646-652 - Pradeep Ray, Nandan Parameswaran, Lundy Lewis:
Distributed autonomic management: An approach and experiment towards managing service-centric networks. 653-660 - S. Venkatesan, Chenniappan Chellappan, T. Vengattaraman, P. Dhavachelvan, Anurika Vaish:
Advanced mobile agent security models for code integrity and malicious availability check. 661-671 - Yao-Tien Wang:
A dynamic resource management in mobile agent by artificial neural network. 672-681 - Yue-Shan Chang, Pei-Chun Shih:
A resource-awareness information extraction architecture on mobile grid environment. 682-695 - Umar Manzoor, Samia Nefti:
QUIET: A Methodology for Autonomous Software Deployment using Mobile Agents. 696-706
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.