default search action
Peer-to-Peer Networking and Applications, Volume 12
Volume 12, Number 1, January 2019
- Xiaoheng Deng, Jie Luo, Lifang He, Qiang Liu, Xu Li, Lin Cai:
Cooperative channel allocation and scheduling in multi-interface wireless mesh networks. 1-12 - Paulo Henrique Cazarotto, Cristiano André da Costa, Rodrigo da Rosa Righi, Jorge Luis Victória Barbosa:
GTTracker: Location-aware hierarchical model for identifying M-commerce business opportunities. 13-31 - Haijiang Wang, Xiaolei Dong, Zhenfu Cao:
Secure and efficient encrypted keyword search for multi-user setting in cloud computing. 32-42 - AmirHosein Adavoudi-Jolfaei, Maede Ashouri-Talouki, Seyed Farhad Aghili:
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. 43-59 - Michael Lescisin, Qusay H. Mahmoud:
Ad-hoc messaging infrastructure for peer-to-peer communication. 60-73 - Guangyuan Wu, Zhigang Chen, Deyu Zhang, Jiaqi Liu:
Resource allocation algorithm with worst case delay guarantees in energy harvesting body area networks. 74-87 - Saeideh Rahimi, Mohammad Ali Jabraeil Jamali:
A hybrid geographic-DTN routing protocol based on fuzzy logic in vehicular ad hoc networks. 88-101 - Santosh Kumar Das, Sachin Tripathi:
Energy efficient routing formation algorithm for hybrid ad-hoc network: A geometric programming approach. 102-128 - Saied Asghari, Nima Jafari Navimipour:
Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm. 129-142 - Avinash Srinivasan, Hatoon Aldharrab:
XTRA - eXtended bit-Torrent pRotocol for Authenticated covert peer communication - Authenticated covert P2P communication. 143-157 - Jia Wu, Zhigang Chen, Ming Zhao:
Weight distribution and community reconstitution based on communities communications in social opportunistic networks. 158-166 - Abdulhamid Zahedi, Faryad Parma:
An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. 167-176 - Junjie Su, Qian Deng, Dongyang Long:
PCLNC: A low-cost intra-generation network coding strategy for P2P content distribution. 177-188 - Xu Qin, Baoxian Zhang, Cheng Li:
Localized topology control and on-demand power-efficient routing for wireless ad hoc and sensor networks. 189-208 - Mohammad Nikravan, Ali Movaghar, Mehdi Hosseinzadeh:
A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. 209-226 - Mohammad Nikravan, Ali Movaghar, Mehdi Hosseinzadeh:
Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. 227 - Lei Wang, Siran Liu, Mingkai Chen, Guan Gui, Hikmet Sari:
Sidelobe interference reduced scheduling algorithm for mmWave device-to-device communication networks. 228-240 - Robabeh Ghafouri, Ali Movaghar, Mehran Mohsenzadeh:
A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds. 241-268 - Desheng Wang, Wenting Ding, Xiaoqiang Ma, Hongbo Jiang, Feng Wang, Jiangchuan Liu:
MiFo: A novel edge network integration framework for fog computing. 269-279 - Zhiwei Zhao, Zhixin Liu, Panpan Wang, Xinping Guan:
An approach of robust power control for cognitive radio networks based on chance constraints. 280-290
Volume 12, Number 2, March 2019
- Ahmed E. Kamal, Liangxiu Han, Lu Liu, Sohail Jabbar:
Guest editorial: Special issue on software defined networking: Trends, challenges, and prospective smart solutions. 291-294 - Zhijie Fan, Ya Xiao, Amiya Nayak, Chengxiang Tan:
An improved network security situation assessment approach in software defined networks. 295-309 - Xing Yin, Liangmin Wang, Shunrong Jiang:
A hierarchical mobility management scheme based on software defined networking. 310-325 - Tong Bai, Jinzhao Lin, Guoquan Li, Huiqian Wang, Peng Ran, Zhangyong Li, Yu Pang, Wei Wu, Gwanggil Jeon:
An optimized protocol for QoS and energy efficiency on wireless body area networks. 326-336 - Xiaojun Xu, Shuliang Wang, Ying Li:
Identification and predication of network attack patterns in software-defined networking. 337-347 - (Withdrawn) Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network. 348-356
- Zahid Ullah, Imran Ahmed, Kaleem Razzaq Malik, Muhammad Kashif Naseer, Naveed Ahmed:
DSCB: Dual sink approach using clustering in body area network. 357-370 - Syed Bilal Hussian Shah, Zhe Chen, Fuliang Yin, Awais Ahmad:
Water rippling shaped clustering strategy for efficient performance of software define wireless sensor networks. 371-380 - Chenxi Li, Xiaofei Liao, Hai Jin:
Enhancing application performance via DAG-driven scheduling in task parallelism for cloud center. 381-391 - Kaleem Razzaq Malik, Tauqir Ahmad, Muhammad Farhan, Mai Alfawair:
Enhancing SDN performance by enabling reasoning abilities in data traffic control. 392-404 - Bo Yi, Xingwei Wang, Min Huang, Lianbo Ma:
SDN and NFV enabled service function multicast mechanisms over hybrid infrastructure. 405-421 - Zhuo Li, Xin Chen, Lulu Li, Xiangkun Wang:
Joint routing and scheduling for transmission service in software-defined full-duplex wireless networks. 422-429 - Junbi Xiao, Song Chen, Mengmeng Sui:
The strategy of path determination and traffic scheduling in private campus networks based on SDN. 430-439 - Hong Zhong, Jianqiao Sheng, Yan Xu, Jie Cui:
SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers. 440-451 - Tao Hu, Julong Lan, Jianhui Zhang, Wei Zhao:
EASM: Efficiency-aware switch migration for balancing controller loads in software-defined networking. 452-464 - Dongyang Li, Chang-you Xing, Ningyun Dai, Fei Dai, Guomin Zhang:
Estimating SDN traffic matrix based on online adaptive information gain maximization method. 465-480 - Peiying Zhang, Haipeng Yao, Maozhen Li, Yunjie Liu:
Virtual network embedding based on modified genetic algorithm. 481-492 - Nasrin Sultana, Naveen K. Chilamkurti, Wei Peng, Rabei Alhadad:
Survey on SDN based network intrusion detection system using machine learning approaches. 493-501 - Zhaohui Zhang, Lina Ge, Pengwei Wang, Xinxin Zhou:
Behavior Reconstruction Models for Large-scale Network Service Systems. 502-513 - Sahrish Khan Tayyaba, Munam Ali Shah:
Resource allocation in SDN based 5G cellular networks. 514-538
Volume 12, Number 3, May 2019
- Shibo He, Dong-Hoon Shin, Yuanchao Shu:
Editorial: Network coverage: From theory to practice. 539-540 - Chakchai So-In, Tri Gia Nguyen, Gia Nhu Nguyen:
An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks. 541-552 - Mingfeng Huang, Anfeng Liu, Ming Zhao, Tian Wang:
Multi working sets alternate covering scheme for continuous partial coverage in WSNs. 553-567 - Xu Hui, Bailing Wang, Song Jia, Haohan Hong, Xiaolei Zhang:
An algorithm for calculating coverage rate of WSNs based on geometry decomposition approach. 568-576 - Jia Xu, Wei Lu, Lijie Xu, Dejun Yang, Tao Li:
Incentive mechanisms for mobile crowd sensing based on supply-demand relationship. 577-588 - Yanjun Li, Chung Shue Chen, Kaikai Chi, Jianhui Zhang:
Two-tiered relay node placement for WSN-based home health monitoring system. 589-603 - Margarita Vitoropoulou, Vasileios Karyotis, Symeon Papavassiliou:
Sensing and monitoring of information diffusion in complex online social networks. 604-619 - Hassan Harb, Abdallah Makhoul:
Energy-efficient scheduling strategies for minimizing big data collection in cluster-based sensor networks. 620-634 - Wei Li, Jianhui Zhang, Feilong Jiang, Zhi Li, Chong Xu:
Asynchronous neighbor discovery with unreliable link in wireless mobile networks. 635-646 - Md Yeakub Hassan, Faisal Hussain, Salimur Choudhury:
Connectivity preserving obstacle avoidance localized motion planning algorithms for mobile wireless sensor networks. 647-659 - Yushun Tan, Menghui Xiong, Dongsheng Du, Shumin Fei:
Hybrid-triggered state feedback H ∞ control for networked control systems with stochastic nonlinearity and quantization. 660-676 - Daxing Xu, Yan Qin, Heng Zhang, Li Yu, Hailun Wang:
Set-valued Kalman filtering: Event triggered communication with quantized measurements. 677-688
Volume 12, Number 4, July 2019
- Somaieh Zakariayi, Shahram Babaie:
DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks. 689-704 - Chandrima Chakrabarti, Siuli Roy, Souvik Basu:
Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. 705-723 - Rogelio Hasimoto-Beltrán, Francisco de Asís López-Fuentes, Misael Vera-Lopez:
Hierarchical P2P architecture for efficient content distribution. 724-739 - Rui Hou, Lang Zhang, Yong Zheng, Yuzhou Chang, Bing Li, Tao Huang, Jiangtao Luo:
Service-differentiated QoS routing based on ant colony optimisation for named data networking. 740-750 - Marco Antonio D'Alessandro Costa, Marcelo Gonçalves Rubinstein:
Performance analysis of a locality-aware BitTorrent protocol in enterprise networks. 751-762 - Pelayo Nuño, Juan C. Granda, Francisco J. Suárez, Daniel F. García:
Using self-regulation to increase resilience in overlay networks for interactive multimedia communications. 763-776 - Ghofrane Fersi, Maher Ben Jemaa:
An analytical study of the main characteristics of Cluster-based Energy-aware Virtual Ring Routing (CLEVER): Number of clusters, number of hops and cluster diameter. 777-788 - Fan Wu, Wang Yang, Guochao He:
FDCP: cache placement model for information-centric networking using fluid dynamics theory. 789-808 - André Sampaio, Pedro Sousa:
An adaptable and ISP-friendly multicast overlay network. 809-829 - Ahsan Hussain, Bettahally N. Keshavamurthy:
A multi-dimensional routing based approach for efficient communication inside partitioned social networks. 830-849 - Hyunsoo Kwon, Changhee Hahn, Kyungtae Kang, Junbeom Hur:
Secure deduplication with reliable and revocable key management in fog computing. 850-864 - Ricardo Guedes, Vasco Furtado, Tarcisio H. C. Pequeno, Joel J. P. C. Rodrigues:
Pareto set as a model for dispatching resources in emergency Centres. 865-880 - V. Kavidha, S. Ananthakumaran:
Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. 881-892 - Jinguo Li, Mi Wen, Kui Wu, Kejie Lu, Fengyong Li, Hongjiao Li:
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. 893-911 - Anil Thomas, Gunasekaran Raja:
FINDER: A D2D based critical communications framework for disaster management in 5G. 912-923 - Jian Shen, Huijie Yang, Anxi Wang, Tianqi Zhou, Chen Wang:
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. 924-933 - Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang, Hui Li:
Pruneable sharding-based blockchain protocol. 934-950 - Francis N. Nwebonyi, Rolando Martins, Manuel Eduardo Correia:
Reputation based approach for improved fairness and robustness in P2P protocols. 951-968 - Abdessamed Derder, Samira Moussaoui, Zouina Doukha, Abdelwahab Boualouache:
An online target tracking protocol for vehicular Ad Hoc networks. 969-988 - Shubham Gupta, Balu L. Parne, Narendra S. Chaudhari:
PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network. 989-1011
Volume 12, Number 5, September 2019
- Xianfu Meng, Yu Deng:
A time-aware resource search strategy with the ant colony optimization in MANETs. 1013-1027 - Tongrang Fan, Shixun Xiong, Wenbin Zhao, Tao Yu:
Information spread link prediction through multi-layer of social network based on trusted central nodes. 1028-1040 - Chao Sha, Lian-hua Zhong, Yao Bian, Dandan Song, Chunhui Ren:
A type of energy-efficient target tracking approach based on grids in sensor networks. 1041-1060 - Yesudhas Harold Robinson, Eanoch Golden Julie, Raghvendra Kumar, Le Hoang Son:
Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. 1061-1075 - Alagan Ramasamy Rajeswari, Kanagasabai Kulothungan, Sannasi Ganapathy, Arputharaj Kannan:
A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. 1076-1096 - Jian Wang, Yanli Wang, Guosheng Zhao, Zhong-Nan Zhao:
Location protection method for mobile crowd sensing based on local differential privacy preference. 1097-1109 - Sandeep Verma, Neetu Sood, Ajay Kumar Sharma:
A novelistic approach for energy efficient routing using single and multiple data sinks in heterogeneous wireless sensor network. 1110-1136 - Khaled Hamouid, Kamel Adi:
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. 1137-1155 - Balu L. Parne, Shubham Gupta, Narendra S. Chaudhari:
PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks. 1156-1177 - Hui Li, Lishuang Pei, Dan Liao, Gang Sun, Du Xu:
Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET. 1178-1193 - D. Dhanya, D. Arivudainambi:
Dolphin partner optimization based secure and qualified virtual machine for resource allocation with streamline security analysis. 1194-1213 - Ki-Il Kim, Sana Ullah, Christos V. Verikoukis, Han-Chieh Chao:
Editorial on "Special issue on fog computing for healthcare". 1214-1215 - Yannis Nikoloudakis, Evangelos Pallis, George Mastorakis, Constandinos X. Mavromoustakis, Charalabos Skianis, Evangelos K. Markakis:
Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case. 1216-1224 - Iván García-Magariño, José Varela Aldás, Guillermo Palacios Navarro, Jaime Lloret:
Fog computing for assisting and tracking elder patients with neurodegenerative diseases. 1225-1235 - Rida Zojaj Naeem, Saman Bashir, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal:
Fog computing in internet of things: Practical applications and future directions. 1236-1262 - Fouzia Jabeen, Muazzam Maqsood, Mustansar Ali Ghazanfar, Farhan Aadil, Salabat Khan, Muhammad Fahad Khan, Irfan Mehmood:
An IoT based efficient hybrid recommender system for cardiovascular disease. 1263-1276 - Shiyuan Tong, Yun Liu, Hsin-Hung Cho, Hua-Pei Chiang, Zhenjiang Zhang:
Joint radio resource allocation in fog radio access network for healthcare. 1277-1288 - Thaier Hayajneh, Kristen N. Griggs, Muhammad Imran, Bassam Jamil Mohd:
Secure and efficient data delivery for fog-assisted wireless body area networks. 1289-1307 - Jiming Chen, Kaoru Ota, Lu Wang, Jianping He:
Big data and smart computing in network systems. 1308-1310 - Wenbin Yu, Cailian Chen, Zhe Liu, Bo Yang, Xinping Guan:
DSESP: Dual sparsity estimation subspace pursuit for the compressive sensing based close-loop ecg monitoring structure. 1311-1322 - Alberto Aguilar, Camilo Lozoya, Luis Orona:
A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks. 1323-1335 - Huajun Zhang, Erdong Deng, Haojin Zhu, Zhenfu Cao:
Smart contract for secure billing in ride-hailing service via blockchain. 1346-1357 - Zhun Li, ByungSoo Ko, Ho-Jin Choi:
Naive semi-supervised deep learning using pseudo-label. 1358-1368 - Yazhou Yuan, Yuefeng Li, Zhixin Liu, Kit Yan Chan, Shanying Zhu, Xinping Guan:
A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment. 1369-1384 - Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo:
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. 1385-1402 - Lei Shi, Junping Du, MeiYu Liang, Feifei Kou:
Dynamic topic modeling via self-aggregation for short text streams. 1403-1417 - Minghui Zhao, Wei Wang, Yitu Wang, Zhaoyang Zhang:
Load scheduling for distributed edge computing: A communication-computation tradeoff. 1418-1432 - Danfeng Yan, Xuan Zhao, Rongheng Lin, Demeng Bai:
PPQAR: Parallel PSO for quantitative association rule mining. 1433-1444 - Bo Qiao, Hao Yin:
A data-driven and the deep learning based CDN recommendation framework for ICPs. 1445-1453 - Guangsheng Feng, Haibin Lv, Bingyang Li, Chengbo Wang, Hongwu Lv, Huiqiang Wang:
A near-optimal cloud offloading under multi-user multi-radio environments. 1454-1465 - Masoud Tahmasebi, Mohammad Reza Khayyambashi:
An efficient model for vehicular cloud computing with prioritizing computing resources. 1466-1475
Volume 12, Number 6, November 2019
- Yong Jin, Hang Shen, Daniele D'Agostino, Nadjib Achir, James Nightingale:
Guest editorials: Special issue on fog/edge networking for multimedia applications. 1477-1479 - Yan Chen, Yu Wang, Daofu Gong:
Fog computing support scheme based on fusion of location service and privacy preservation for QoS enhancement. 1480-1488 - Feng Wang, Shaojiang Liu, Weichuan Ni, Zhiming Xu, Zhiping Wan:
Heterogeneous mobile network access control technology based on mutual trust mechanism. 1489-1498 - Lu Liu:
Multimedia intelligent fog computing scheme based on robust perception for complex networks. 1499-1510 - Yuan Shu, Fuxi Zhu:
Green communication mobile convergence mechanism for computing self-offloading in 5G networks. 1511-1518 - Di Fan, Chunwei Zhu, Changzhi Lv:
Time delay estimation algorithm based on virtual Array and MUSIC for single sensor system. 1519-1527 - Zengzhen Shao, Shulei Liu, Yanyu Zhao, Yanxiu Liu:
Identifying influential nodes in complex networks based on Neighbours and edges. 1528-1537 - Zengzhen Shao, Shulei Liu, Yanyu Zhao, Yanxiu Liu:
Correction to: Identifying influential nodes in complex networks based on Neighbours and edges. 1538 - Yonggang Xu, Haohao Qi, Tianyi Xu, Qianqian Hua, Hongsheng Yin, Gang Hua:
Queue models for wireless sensor networks based on random early detection. 1539-1549 - Lang Hu, Anfeng Liu, Mande Xie, Tian Wang:
UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City. 1550-1574 - Wenjuan Zhang:
A data fusion privacy protection strategy with low energy consumption based on time slot allocation and relay in WBAN. 1575-1584 - Zijia Yu, Biao Lu:
A multipath routing protocol using congestion control in wireless multimedia sensor networks. 1585-1593 - Rongyu Tian, Hui Zhu:
Complex application identification and private network mining algorithm based on traffic-aware model in large-scale networks. 1594-1605 - Chunguang Zhang, Guangping Zeng, Hongbo Wang, Xuyan Tu:
Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things. 1606-1614 - Suqin Wu:
Communication modulation recognition algorithm based on STFT mechanism in combination with unsupervised feature-learning network. 1615-1623 - Heng Zhang, Zhiguo Shi, Mohammed Chadli, Yanzheng Zhu, Zhaojian Li:
Guest editorial: Networked cyber-physical systems: Optimization theory and applications. 1624-1626 - Jinlong Ma, Zhichao Ju:
Cascading failure model of scale-free networks for avoiding edge failure. 1627-1637 - Qingshan Wang, Haoen Yang, Qi Wang, Wei Huang, Bin Deng:
A deep learning based data forwarding algorithm in mobile social networks. 1638-1650 - Wei Shen, Jiehao Wang:
A robust controller design for networked hydraulic pressure control system based on CPR. 1651-1661 - Mengni Ruan, Xin Chen, Huan Zhou:
Centrality prediction based on K-order Markov chain in Mobile Social Networks. 1662-1672 - Qiaoyan Li, Anfeng Liu, Tian Wang, Mande Xie, Neal N. Xiong:
Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications. 1673-1704 - Yulian Jiang, Yuhang Zhang, Shenquan Wang:
Distributed adaptive consensus control for networked robotic manipulators with time-varying delays under directed switching topologies. 1705-1715 - Kaili Sun, Song Zhu:
The express decay effect of time delays for globally exponentially stable nonlinear stochastic systems. 1716-1725 - Lei Mo, Angeliki Kritikakou:
Mapping imprecise computation tasks on cyber-physical systems. 1726-1740 - Hui Peng, Junzheng Wang, Wei Shen, Dawei Shi:
Cooperative attitude control for a wheel-legged robot. 1741-1752 - Chao Ma, Erlong Kang:
Distributed consensus of networked markov jump multi-agent systems with mode-dependent event-triggered communications and switching topologies. 1753-1760 - Xiaolei Ji, Yang Wang:
Quantized control for nonhomogeneous Markovian jump T-S fuzzy systems with missing measurements. 1761-1773 - Jinhui Wu, Xu Chen, Andong Liu, Li Yu:
Predictive control for visual servoing control of cyber physical systems with packet loss. 1774-1784 - Jian Zhao, Chengzhuo Han, Zhengqi Cui, Rui Wang, Tingting Yang:
Cyber-physical battlefield perception systems based on machine learning technology for data delivery. 1785-1798 - Fei Xiang, Daofu Gong, Jie Li, Fenlin Liu:
A code protection method against function call analysis in P2P network. 1799-1809 - Dongzhe Wang, Shuyuan Wang, Shuai Yuan, Bo Cai, Lixian Zhang:
Guaranteed performance control of switched linear systems: A differential-Riccati-equation-based approach. 1810-1819 - Guangsheng Feng, Chengbo Wang, Bingyang Li, Haibin Lv, Xiaoxiao Zhuang, Hongwu Lv, Huiqiang Wang, Xianlang Hu:
UAV-assisted wireless relay networks for mobile offloading and trajectory optimization. 1820-1834
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.