default search action
Journal of Network and Computer Applications, Volume 31
Volume 31, Number 1, January 2008
- Hsu-Yang Kung, Hao-Hsiang Ku, Che-I Wu, Ching-Yu Lin:
Intelligent and situation-aware pervasive system to support debris-flow disaster prediction and alerting in Taiwan. 1-18 - Mosaab Daoud, Qusay H. Mahmoud:
Monte Carlo simulation-based algorithms for estimating the reliability of mobile agent-based systems. 19-31 - Xiao Qin:
Performance comparisons of load balancing algorithms for I/O-intensive workloads on clusters. 32-46 - Ming-Tsung Chen, Bertrand M. T. Lin, Shian-Shyong Tseng:
Multicast routing and wavelength assignment with delay constraints in WDM networks with heterogeneous capabilities. 47-65
- Tushar M. Raste, D. B. Kulkarni:
Design and implementation scheme for deploying IPv4 over IPv6 tunnel. 66-72
Volume 31, Number 2, April 2008
- Christos Makris, Athanasios K. Tsakalidis:
Trends in peer to peer and service oriented computing. 73-74 - Sinuhé Arroyo, Miguel-Ángel Sicilia, José Manuel López Cobo:
Patterns of message interchange in decoupled hypermedia systems. 75-92 - Serena Pastore:
The service discovery methods issue: A web services UDDI specification framework integrated in a grid environment. 93-107 - Vassiliki Diamadopoulou, Christos Makris, Yannis Panagis, Evangelos Sakkopoulos:
Techniques to support Web Service selection and consumption with QoS characteristics. 108-130 - Konstantinos Votis, Christos Alexakos, Bill Vassiliadis, Spiridon D. Likothanassis:
An ontologically principled service-oriented architecture for managing distributed e-government nodes. 131-148 - Spyros Sioutas, Evangelos Sakkopoulos, Lambros Drossos, Spiros Sirmakessis:
Balanced distributed web service lookup system. 149-162 - Sampath N. Ranasinghe, Vasilis Friderikos, Hamid Aghvami:
Dynamic proxy assisted mobility support for third generation peer-to-peer networks. 163-178 - Dimitris Kanellopoulos, Alkiviadis A. Panagopoulos:
Exploiting tourism destinations' knowledge in an RDF-based P2P network. 179-200
Volume 31, Number 3, August 2008
- Gwo-Jong Yu, Chih-Yung Chang:
Congestion control of bluetooth radio system by piconet restructuring. 201-223 - Dhouha Ayed, Chantal Taconet, Guy Bernard, Yolande Berbers:
CADeComp: Context-aware deployment of component-based applications. 224-257 - Chunlin Li, Layuan Li:
Cross-layer optimization policy for QoS scheduling in computational grid. 258-284 - Lin Chen, Changjun Jiang, Junjie Li:
VGITS: ITS based on intervehicle communication networks and grid technology. 285-302 - Luhua Liao, Lemin Li, Sheng Wang:
Multicast protection scheme in survivable WDM optical networks. 303-316 - James Lembke, Byung Kyu Choi:
Edge-limited scalable QoS flow set-up. 317-337 - Ferhat Khendek, Tong Zheng:
Modeling and analysis of value added services using message sequence charts. 338-356
Volume 31, Number 4, November 2008
- Javier Varona, Cristina Manresa-Yee, Francisco José Perales López:
Hands-free vision-based interface for computer accessibility. 357-374 - Hongjun Liu, Ping Luo, Daoshun Wang:
A scalable authentication model based on public keys. 375-386 - Wen-Hwa Liao, Yucheng Kao, Chien-Ming Fan:
Data aggregation in wireless sensor networks using ant colony algorithm. 387-401 - Vidhyacharan Bhaskar, Patrick Lallement:
Activity routing in a distributed supply chain: Performance evaluation with two inputs. 402-428 - Bing Zheng, Mohammed Atiquzzaman:
A framework to determine bounds of maximum loss rate parameter of RED queue for next generation routers. 429-445 - K. Komathy, P. Narayanasamy:
Trust-based evolutionary game model assisting AODV routing against selfishness. 446-471 - Hongjun Liu, Ping Luo, Daoshun Wang:
A distributed expansible authentication model based on Kerberos. 472-486 - Carles Garrigues, Sergi Robles, Joan Borrell:
Securing dynamic itineraries for mobile agent applications. 487-508 - Haïdar Safa, Mohamad Chouman, Hassan Artail, Marcel Karam:
A collaborative defense mechanism against SYN flooding attacks in IP networks. 509-534 - Prasan Kumar Sahoo, Chih-Yung Chang, Sheng-Wen Chang:
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility. 535-558 - Weili Han, Xingdong Shi, Ronghua Chen:
Process-context aware matchmaking for web service composition. 559-576 - G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venkataram:
An efficient resource allocation scheme for multimedia applications in MANET. 577-584 - Eric Gamess, Rina Surós:
An upper bound model for TCP and UDP throughput in IPv4 and IPv6. 585-602 - Yiouli Kritikou, Panagiotis Demestichas, Evgenia F. Adamopoulou, Konstantinos P. Demestichas, Michael E. Theologou, Maria Paradia:
User Profile Modeling in the context of web-based learning management systems. 603-627 - Venet Osmani, Sasitharan Balasubramaniam, Dmitri Botvich:
Human activity recognition in pervasive health-care: Supporting efficient remote collaboration. 628-655 - Pejman Khadivi, Shadrokh Samavi, Terence D. Todd:
Multi-constraint QoS routing using a new single mixed metrics. 656-676 - Beatriz Prieto, Fernando Tricas, Juan Julián Merelo Guervós, Antonio Mora García, Alberto Prieto:
Visualizing the evolution of a web-based social network. 677-698 - Mouhammd Al-Kasassbeh, Mo Adda:
Analysis of mobile agents in network fault management. 699-711 - Janus S. Liang:
The troubleshooting task implementation in automotive chassis using virtual interactive technique and knowledge-based approach. 712-734 - Xiangyang Wang, Panpan Niu, Wei Qi:
A new adaptive digital audio watermarking based on support vector machine. 735-749 - Hussein Abdel-jaber, Michael E. Woodward, Fadi A. Thabtah, Amer Abu-Ali:
Performance evaluation for DRED discrete-time queueing network analytical model. 750-770 - Yoke Chek Yee, Khong Neng Choong, Andy Lock Yen Low, S. W. Tan:
SIP-based proactive and adaptive mobility management framework for heterogeneous networks. 771-792 - Juan J. Samper, Pedro A. Castillo, Lourdes Araujo, Juan Julián Merelo Guervós, Oscar Cordón, Fernando Tricas:
NectaRSS, an intelligent RSS feed reader. 793-806 - Wen-Hwa Liao, Hsiao-Hsien Wang:
An asynchronous MAC protocol for wireless sensor networks. 807-820 - Jianjun Zhang, Ling Liu, Lakshmish Ramaswamy, Calton Pu:
PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks. 821-850 - Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:
Secure DACS Scheme. 851-861 - Javed I. Khan, Sajid S. Shaikh:
Computing in social networks with relationship algebra. 862-878 - Ibrahim Özçelik:
Interconnection of CAN segments through IEEE 802.16 wireless MAN. 879-890 - Bhuvan Urgaonkar, Prashant J. Shenoy:
Cataclysm: Scalable overload policing for internet applications. 891-920 - Khaled Salah, Prasad Calyam, M. I. Buhari:
Assessing readiness of IP networks to support desktop videoconferencing using OPNET. 921-943 - Haibin Cai, Fang Pu, Runcai Huang, Qiying Cao:
A novel ANN-based service selection model for ubiquitous computing environments. 944-965 - Eleni Georgiou, Marios D. Dikaiakos, Athena Stassopoulou:
On the properties of spam-advertised URL addresses. 966-985
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.