default search action
Journal of Network and Computer Applications, Volume 34
Volume 34, Number 1, January 2011
- S. Subashini, V. Kavitha:
A survey on security issues in service delivery models of cloud computing. 1-11 - Dai-Rui Lin, Chih-I Wang, D. J. Guan:
Efficient vehicle ownership identification scheme based on triple-trapdoor chameleon hash function. 12-19
- Sireesha Muppala, Xiaobo Zhou:
Coordinated session-based admission control with statistical learning for multi-tier internet applications. 20-29 - Neeraj Kumar, Manoj Kumar, R. B. Patel:
Capacity and interference aware link scheduling with channel assignment in wireless mesh networks. 30-38 - Marcela M. Mejia, Néstor M. Peña, Jose L. Muñoz, Oscar Esparza, Marco A. Alzate:
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs. 39-51 - Sanaa Sharafeddine, Rakan Maddah:
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications. 52-61 - Sanaa Sharafeddine:
Capacity assignment in multiservice packet networks with soft maximum waiting time guarantees. 62-72 - Xiong Li, Jianwei Niu, Jian Ma, Wendong Wang, Chenglian Liu:
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. 73-79 - Biming Tian, Song Han, Jiankun Hu, Tharam S. Dillon:
A mutual-healing key distribution scheme in wireless sensor networks. 80-88 - Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiatsos:
A dynamic management scheme for DVEs. 89-101 - Hyuck Han, Hyungsoo Jung, Hyeonsang Eom, Heon Young Yeom:
An efficient skyline framework for matchmaking applications. 102-115 - Song Wang, Jinli Cao, Jiankun Hu:
A frequency domain subspace blind channel estimation method for trailing zero OFDM systems. 116-120 - Chih-Lin Hu, Chien-An Cho:
User-provided multimedia content distribution architecture in mobile and ubiquitous communication networks. 121-136 - Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar:
Peer-to-peer multipoint video conferencing with layered video. 137-150 - Joel J. P. C. Rodrigues, Orlando R. E. Pereira, Paulo A. C. S. Neves:
Biofeedback data visualization for body sensor networks. 151-158 - Atif Bin Mansoor, Hassan Masood, Mustafa Mumtaz, Shoab A. Khan:
A feature level multimodal approach for palmprint identification using directional subband energies. 159-171 - Mingyu Lim, Bart Kevelham, Niels A. Nijdam, Nadia Magnenat-Thalmann:
Rapid development of distributed applications using high-level communication support. 172-182 - Xiaohong Huang, Maode Ma:
A performance model for differentiated service over single-hop passive star coupled WDM optical networks. 183-193 - Aristides Mpitziopoulos, Charalampos Konstantopoulos, Damianos Gavalas, Grammati E. Pantziou:
A pervasive assistive environment for visually impaired people using wireless sensor network infrastructure. 194-206 - Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar, Ahmad Khademzadeh:
VWCA: An efficient clustering algorithm in vehicular ad hoc networks. 207-222 - Pejman Goudarzi:
Improving rate allocation for ephemeral traffic using a second-order algorithm. 223-231 - Tzu-Chi Huang:
Universal connection architecture for interactive applications to achieve distributed computing. 232-251 - Song Fu, Cheng-Zhong Xu, Haiying Shen:
Randomized load balancing strategies with churn resilience in peer-to-peer networks. 252-261 - Bo Zhang, Fangguo Zhang:
An efficient public key encryption with conjunctive-subset keywords search. 262-267 - Jesús Ibáñez, Carlos Delgado-Mata:
Lessons from research on interaction with virtual environments. 268-281 - Fahim K. Sufi, Ibrahim Khalil:
Faster person identification using compressed ECG in time critical wireless telecardiology applications. 282-293 - Antonio Ruiz-Martínez, Juan Sánchez-Montesinos, Daniel Sánchez-Martínez:
A mobile network operator-independent mobile signature service. 294-311 - Wenjia Niu, Gang Li, Zhijun Zhao, Hui Tang, Zhongzhi Shi:
Multi-granularity context model for dynamic Web service composition. 312-326 - Hadi Goudarzi, Amir Hesam Salavati, Mohammad Reza Pakravan:
An ant-based rate allocation algorithm for media streaming in peer to peer networks: Extension to multiple sessions and dynamic networks. 327-340 - Marc Liberatore, Bikas Gurung, Brian Neil Levine, Matthew K. Wright:
Empirical tests of anonymous voice over IP. 341-350 - Patrik Moravek, Dan Komosny, Radim Burget, Jaroslav Sveda, Tomas Handl, Lucie Jarosova:
Study and performance of localization methods in IP based networks: Vivaldi algorithm. 351-367 - Enrique Costa-Montenegro, Juan C. Burguillo-Rial, Felipe J. Gil-Castiñeira, Francisco J. González-Castaño:
Implementation and analysis of the BitTorrent protocol with a multi-agent model. 368-383 - Elisavet Konstantinou:
Efficient cluster-based group key agreement protocols for wireless ad hoc networks. 384-393 - Jung Yul Choi, Shin Jung Woo, Byoung Kwon Shim:
Reliable service provisioning in converged multimedia network environment. 394-401 - Prajakta Kulkarni, Yusuf Öztürk:
mPHASiS: Mobile patient healthcare and sensor information system. 402-417 - William R. Claycomb, Dongwan Shin:
A novel node level security policy framework for wireless sensor networks. 418-428
Volume 34, Number 2, March 2011
- Jonathan Loo:
Special issue on: Efficient and robust security and services of wireless mesh networks. 429-431 - Frank A. Zdarsky, Sebastian Robitzsch, Albert Banchs:
Security analysis of wireless mesh backhauls for mobile networks. 432-442 - Shanshan Jiang, Yuan Xue:
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. 443-454 - Zorana Bankovic, David Fraga, José Manuel Moya, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, Juan-Mariano de Goyeneche, Elena Romero, Javier Blesa, Daniel Villanueva, Octavio Nieto-Taladriz:
Improving security in WMNs with reputation systems and self-organizing maps. 455-463 - Ching-Fang Hsu, Guohua Cui, Qi Cheng, Jing Chen:
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks. 464-468 - Yiliang Han, Xiaolin Gui, Xuguang Wu, Xiaoyuan Yang:
Proxy encryption based secure multicast in wireless mesh networks. 469-477 - Okechukwu E. Muogilim, Kok-Keong Loo, Richard Comley:
Wireless mesh network security: A traffic engineering management approach. 478-491 - Raquel Lacuesta Gilaberte, Jaime Lloret, Miguel Garcia, Lourdes Peñalver Herrero:
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks. 492-505 - Rafael Lopes Gomes, Waldir Aranha Moreira Junior, Eduardo Cerqueira, Antônio Jorge Gomes Abelém:
Using fuzzy link cost and dynamic choice of link quality metrics to achieve QoS and QoE in wireless mesh networks. 506-516
- Altaf Mukati:
A survey of memory error correcting techniques for improved reliability. 517-522 - Lucas D. P. Mendes, Joel J. P. C. Rodrigues:
A survey on cross-layer solutions for wireless sensor networks. 523-534
- Tingting Chen, Ankur Bansal, Sheng Zhong:
A reputation system for wireless mesh networks using network coding. 535-541 - Pere Montolio-Aranda, Joaquín García-Alfaro, David Megías:
Improved flooding of broadcast messages using extended multipoint relaying. 542-550 - Ta Nguyen Binh Duong, Suiping Zhou, Wentong Cai, Xueyan Tang, Rassul Ayani:
Multi-objective zone mapping in large-scale distributed virtual environments. 551-561 - Niels Sluijs, Frédéric Iterbeke, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester:
Cooperative caching versus proactive replication for location dependent request patterns. 562-574 - Mohammad Bsoul, Ahmad Al-Khasawneh, Emad Eddien Abdallah, Yousef Kilani:
Enhanced Fast Spread Replication strategy for Data Grid. 575-580 - Xiaohong Huang, Maode Ma:
A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks. 581-588 - Cynthia Villalba, Franco Zambonelli:
Towards nature-inspired pervasive service ecosystems: Concepts and simulation experiences. 589-602 - Jianyong Chen, Huawang Zeng, Cunying Hu, Zhen Ji:
Optimization between security and delay of quality-of-service. 603-608 - Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh:
A secure dynamic identity based authentication protocol for multi-server architecture. 609-618 - Hai Dong, Farookh Khadeer Hussain, Elizabeth Chang:
A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment. 619-631 - Fang-Yie Leu, Ilsun You, Yao-Tian Huang:
A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks. 632-643 - Mohamed Saad:
Joint admission and power control for quality-of-service in the wireless downlink. 644-652 - Qi Shi, Ning Zhang, Madjid Merabti, Robert Askwith:
Achieving autonomous fair exchange in ubiquitous network settings. 653-667 - Anabela Moreira Bernardino, Eugénia Moreira Bernardino, Juan Manuel Sánchez-Pérez, Juan Antonio Gómez Pulido, Miguel Ángel Vega Rodríguez:
Solving ring loading problems using bio-inspired algorithms. 668-685 - Zoran Milicevic, Zoran S. Bojkovic:
H.264/AVC standard: A proposal for selective intra- and optimized inter-prediction. 686-691 - Yebin Chen, Ying Li, Jiankun Wang:
On the wide diameter of directed double-loop networks. 692-696 - Fatna Belqasmi, Roch H. Glitho, Rachida Dssouli:
An overlay network for autonomous information discovery in the post-composition registries of ambient networks. 697-707 - Huo Zhihong, Zheng Yuan, Xu Chang:
A robust fault-tolerant control strategy for networked control systems. 708-714 - Yusuf Sani, Mohamed Othman:
A provision-aware fair bandwidth distribution marker algorithm for DiffServ networks. 715-721 - Ming-Yang Su:
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification. 722-730 - Naser Movahhedinia, Behrouz Shahgholi Ghahfarokhi:
Performance analysis of Bluetooth asynchronous connection-less service. 731-738 - Chunlin Li, Layuan Li:
Two-level market solution for services composition optimization in mobile grid. 739-749 - Li Yu, Maode Ma, Weidong Hu, Zibo Shi, Yantai Shu:
Design of parameter tunable robust controller for active queue management based on H∞ control theory. 750-764 - Jinchang Lu, Maode Ma:
Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system. 765-773 - Chunlin Li, Layuan Li:
Context aware service provisioning in mobile grid. 774-782 - CongDuc Pham, Abdallah Makhoul, Rachid Saadi:
Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications. 783-795
Volume 34, Number 3, May 2011
- Quan Z. Sheng, Sherali Zeadally, Aikaterini Mitrokotsa, Zakaria Maamar:
RFID technology, systems, and applications. 797-798 - Wen Yao, Chao-Hsien Chu, Zang Li:
Leveraging complex event processing for smart hospitals using RFID. 799-810 - Yi-Wei Ma, Han-Chieh Chao, Jiann-Liang Chen, Cheng-Yen Wu:
Load-balancing mechanism for the RFID middleware applications over grid networking. 811-820 - Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo:
Probabilistic DCS: An RFID reader-to-reader anti-collision protocol. 821-832 - Pedro Peris-Lopez, Agustín Orfila, Julio C. Hernandez-Castro, Jan C. A. van der Lubbe:
Flaws on RFID grouping-proofs. Guidelines for future sound protocols. 833-845 - Francesco Rizzo, Marcello Barboni, Lorenzo Faggion, Graziano Azzalin, Marco Sironi:
Improved security for commercial container transports using an innovative active RFID system. 846-852 - Roberto Di Pietro, Refik Molva:
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems. 853-863 - M. Victoria Bueno-Delgado, Javier Vales-Alonso:
On the optimal frame-length configuration on real passive RFID systems. 864-876 - Gerhard P. Hancke:
Design of a secure distance-bounding channel for RFID. 877-887 - Hanning Chen, Yunlong Zhu, Kunyuan Hu, Tao Ku:
RFID network planning using a multi-swarm optimizer. 888-901 - Apostolia Papapostolou, Hakima Chaouchi:
RFID-assisted indoor localization and the impact of interference on its performance. 902-913 - Wei-Shinn Ku, Kazuya Sakai, Min-Te Sun:
The optimal k-covering tag deployment for RFID-based localization. 914-924 - Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Juan Carlos Sánchez-Aarnoutse:
An efficient distributed discovery service for EPCglobal network in nested package scenarios. 925-937 - Huanjia Yang, Lili Yang, Shuang-Hua Yang:
Hybrid Zigbee RFID sensor network for humanitarian logistics centre management. 938-948 - Worapot Jakkhupan, Somjit Arch-int, Yuefeng Li:
Business process analysis and simulation for the RFID and EPCglobal Network enabled supply chain: A proof-of-concept approach. 949-957 - Taewoo Nam, Keunhyuk Yeom:
Business-aware framework for supporting RFID-enabled applications in EPC Network. 958-971 - Leonardo A. Amaral, Fabiano Hessel, Eduardo A. Bezerra, Jerônimo C. Corrêa, Oliver B. Longhi, Thiago F. O. Dias:
eCloudRFID - A mobile software framework architecture for pervasive RFID-based applications. 972-979 - Pablo Najera, Javier López, Rodrigo Roman:
Real-time location and inpatient care systems based on passive RFID. 980-989 - Chuong Cong Vo, Naveen K. Chilamkurti, Seng Wai Loke, Torab Torabi:
Radio-Mama: An RFID based business process framework for asset management. 990-997 - Maria Chaudhry, Ali Hammad Akbar, Qanita Ahmad, Imran Sarwar:
SOARware: Treading through the crossroads of RFID middleware and SOA paradigm. 998-1014 - Damith Chinthana Ranasinghe, Mark Harrison, Kary Främling, Duncan C. McFarlane:
Enabling through life product-instance management: Solutions and challenges. 1015-1031
Volume 34, Number 4, July 2011
- Keqiu Li, Laurence Tianruo Yang, Xuemin Lin:
Advanced topics in cloud computing. 1033-1034 - Gang Chen, Yongwei Wu, Jia Liu, Guangwen Yang, Weimin Zheng:
Optimization of sub-query processing in distributed data integration systems. 1035-1042 - ZhangBing Zhou, Laurence Tianruo Yang, Sami Bhiri, Lei Shu, Naixue Xiong, Manfred Hauswirth:
Verifying mediated service interactions considering expected behaviours. 1043-1053 - Yuqing Zhu, Jianmin Wang, Chaokun Wang:
Ripple: A publish/subscribe service for multidata item updates propagation in the cloud. 1054-1067 - Xiangzhen Kong, Chuang Lin, Yixin Jiang, Wei Yan, Xiaowen Chu:
Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction. 1068-1077 - Weidong Shi, Yang Lu, Zhu Li, Jonathan Engelsma:
SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud. 1078-1087 - Hai Jin, Wei Gao, Song Wu, Xuanhua Shi, Xiaoxin Wu, Fan Zhou:
Optimizing the live migration of virtual machine by CPU scheduling. 1088-1096 - Ashley Chonka, Yang Xiang, Wanlei Zhou, Alessio Bonti:
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. 1097-1107 - Yanming Shen, Keqiu Li, Junfeng Xu, Lu Li:
Layered video multicast with a P2P cooperation approach. 1108-1112 - Flavio Lombardi, Roberto Di Pietro:
Secure virtualization for cloud computing. 1113-1122
- Fouzi Semchedine, Louiza Bouallouche-Medjkoune, Djamil Aïssani:
Task assignment policies in distributed server systems: A survey. 1123-1130
- Tien-Ho Chen, Yen-Chiu Chen, Wei-Kuan Shih, Hsin-Wen Wei:
An efficient anonymous authentication protocol for mobile pay-TV. 1131-1137 - Jian Wang, Yanheng Liu, Yu Jiao:
Building a trusted route in a mobile ad hoc network considering communication reliability and path length. 1138-1149 - Jiankun Hu, Ibrahim Khalil, Song Han, Abdun Naser Mahmood:
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy. 1150-1159 - Hyun Sung Kim:
Location-based authentication protocol for first cognitive radio networking standard. 1160-1167 - David Garcia Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini:
Systematic design of secure Mobile Grid systems. 1168-1183 - Fatemeh Amiri, Mohammad Mahdi Rezaei Yousefi, Caro Lucas, Azadeh Shakery, Nasser Yazdani:
Mutual information-based feature selection for intrusion detection systems. 1184-1199 - Rafael Duque, Crescencio Bravo, Manuel Ortega:
A model-based framework to automate the analysis of users' activity in collaborative systems. 1200-1209 - Meirong Liu, Timo Koskela, Zhonghong Ou, Jiehan Zhou, Jukka Riekki, Mika Ylianttila:
Super-peer-based coordinated service provision. 1210-1224 - Jaime Chen, Manuel Díaz, Luis Llopis, Bartolomé Rubio, José M. Troya:
A survey on quality of service support in wireless sensor and actor networks: Requirements and challenges in the context of critical infrastructure protection. 1225-1239 - Mahmut Tenruh:
Message scheduling with reduced matrix cycle and evenly distributed sparse allocation for time-triggered CAN. 1240-1251 - Sheikh Tahir Bakhsh, Halabi Hasbullah, Sabeen Tahir:
Dynamic Congestion Control through backup relay in Bluetooth scatternet. 1252-1262 - Xingwei Liu, Xuming Fang, Xu Chen, Xuesong Peng:
A bidding model and cooperative game-based vertical handoff decision algorithm. 1263-1271 - Qi Lu, Maode Ma:
Group mobility support in mobile WiMAX networks. 1272-1282 - Jesús Ibáñez:
Minimalist approach to show emotions via a flock of smileys. 1283-1291 - Chun-Ying Huang, Shang-Pin Ma, Kuan-Ta Chen:
Using one-time passwords to prevent password phishing attacks. 1292-1301 - Miao Xie, Song Han, Biming Tian, Sazia Parvin:
Anomaly detection in wireless sensor networks: A survey. 1302-1325 - Sinan Senol, Kemal Leblebicioglu, Ece Guran Schmidt:
INtERCEDE: An algorithmic approach to networked control system design. 1326-1341 - Rafael Teigao, Carlos Maziero, Altair Olivo Santin:
Applying a usage control model in an operating system kernel. 1342-1352 - Songtao Guo, Chuangyin Dang, Xiaofeng Liao:
Joint opportunistic power and rate allocation for wireless ad hoc networks: An adaptive particle swarm optimization approach. 1353-1365 - Justin Dean, Andrew Harrison, Robert N. Lass, Joseph P. Macker, David W. Millar, Ian J. Taylor:
Client/server messaging protocols in serverless environments. 1366-1379 - Yacine Challal, Abdelraouf Ouadjaout, Noureddine Lasla, Miloud Bagaa, Abdelkrim Hadjidj:
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. 1380-1397 - Wenfeng Li, Weiming Shen:
Swarm behavior control of mobile multi-robots with wireless sensor networks. 1398-1407 - Richard Opio Ocaya:
A framework for collaborative remote experimentation for a physical laboratory using a low cost embedded web server. 1408-1415 - Wenjun Xu, Zude Zhou, Duc Truong Pham, Chunqian Ji, Ming Yang, Quan Liu:
Hybrid congestion control for high-speed networks. 1416-1428 - Javad Akbari Torkestani, Mohammad Reza Meybodi:
A link stability-based multicast routing protocol for wireless mobile ad hoc networks. 1429-1440 - André Vicente Calvinho, Rui Gustavo Crespo:
Email FI identification and resolution with model checking. 1441-1446
Volume 34, Number 5, September 2011
- Han-Chieh Chao, Jean-Pierre Seifert, Shiguo Lian, Liang Zhou:
Dependable multimedia communications: Systems, services, and applications. 1447-1448 - Rongbo Zhu:
Intelligent rate control for supporting real-time traffic in WLAN mesh networks. 1449-1458 - Po-Yi Shih, Po-Chuan Lin, Jhing-Fa Wang, Yuan-Ning Lin:
Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification. 1459-1467 - Der-Jiunn Deng:
PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks. 1468-1473 - Philip Leroux, Steven Latré, Nicolas Staelens, Piet Demeester, Filip De Turck:
Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service. 1474-1488 - Wen Ji, Min Chen, Xiaohu Ge, Peng Li, Yiqiang Chen:
A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle. 1489-1497 - Sanjay K. Dhurandher, Sudip Misra, Puneet Pruthi, Shubham Singhal, Saurabh Aggarwal, Isaac Woungang:
Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks. 1498-1508 - I-Ju Liao, Tin Yu Wu, Jen-Wen Ding, Wei-Tsong Lee:
A novel 3D streaming protocol supported multi-mode display. 1509-1517 - Rashid Mehmood, Raad Alturki, Sherali Zeadally:
Multimedia applications over metropolitan area networks (MANs). 1518-1529 - Sudip Misra, Ankur Jain:
Policy controlled self-configuration in unattended wireless sensor networks. 1530-1544 - Chia-Hui Wang, Yu-Shun Liu:
A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. 1545-1556 - Guangjie Liu, Junwen Wang, Shiguo Lian, Zhiquan Wang:
A passive image authentication scheme for detecting region-duplication forgery with rotation. 1557-1565 - Yeong-Sheng Chen, Yuan-Wei Lee, Jong Hyuk Park:
Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks. 1566-1571
- Kevin J. Ma, Radim Bartos, Swapnil Bhatia:
A survey of schemes for Internet-based video delivery. 1572-1586 - Neyre Tekbiyik, Elif Uysal-Biyikoglu:
Energy efficient wireless unicast routing alternatives for machine-to-machine networks. 1587-1614
- Ching-Hao Mao, Hahn-Ming Lee, Che-Fu Yeh:
Adaptive e-mails intention finding system based on words social networks. 1615-1622 - Jun Yang, Bin Dai, Benxiong Huang, Shui Yu:
Orthogonal feedback scheme for network coding. 1623-1633 - Jordán Pascual Espada, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle, B. Cristina Pelayo García-Bustelo, Manuel Álvarez Álvarez, Alejandro González García:
Modeling architecture for collaborative virtual objects based on services. 1634-1647 - Ting Chen, Xiaosong Zhang, Hua Li, Xiong-da Li, Yue Wu:
Fast quarantining of proactive worms in unstructured P2P networks. 1648-1659 - Anindya Tahsin Prodhan, Rajkumar Das, Md. Humayun Kabir, Gholamali C. Shoja:
TTL based routing in opportunistic networks. 1660-1670 - Imad Jawhar, Nader Mohamed, Dharma P. Agrawal:
Linear wireless sensor networks: Classification and applications. 1671-1682 - Stenio F. L. Fernandes, Judith Kelner, Djamel Sadok:
An adaptive-predictive architecture for video streaming servers. 1683-1694 - Liqiang Zhang, Yu-Jen Cheng, Xiaobo Zhou:
Enhanced statistics-based rate adaptation for 802.11 wireless networks. 1695-1706 - Martin Kuehnhausen, Victor S. Frost:
Application of the Java Message Service in mobile monitoring environments. 1707-1716 - Zac Sadan, David G. Schwartz:
Social network analysis of web links to eliminate false positives in collaborative anti-spam systems. 1717-1723 - Chien-Lung Hsu, Han-Yu Lin:
New identity-based key-insulated convertible multi-authenticated encryption scheme. 1724-1731 - Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang, Qiuzhen Huang:
Monitoring abnormal network traffic based on blind source separation approach. 1732-1742 - Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen:
Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks. 1743-1756 - Wenjia Niu, Gang Li, Hui Tang, Xu Zhou, Zhongzhi Shi:
CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition. 1757-1770
Volume 34, Number 6, November 2011
- Jiming Chen, David K. Y. Yau:
Control and optimization over wireless networks. 1771-1772 - Ning Weng, I-Hung Li, Lucas Vespa:
Information quality model and optimization for 802.15.4-based wireless sensor networks. 1773-1783 - Rabun Kosar, Ilir Bojaxhiu, Ertan Onur, Cem Ersoy:
Lifetime extension for surveillance wireless sensor networks with intelligent redeployment. 1784-1793 - Wahabou Abdou, Adrien Henriet, Christelle Bloch, Dominique Dhoutaut, Damien Charlet, François Spies:
Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks. 1794-1804 - Dang Tu Nguyen, Wook Choi, Minh Thiep Ha, Hyunseung Choo:
Design and analysis of a multi-candidate selection scheme for greedy routing in wireless sensor networks. 1805-1817 - Wenjia Liu, Bo Chen:
Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks. 1818-1826 - Qing Chen, Zubair Md. Fadlullah, Xiaodong Lin, Nei Kato:
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs). 1827-1835 - Bader Al-Manthari, Nidal Nasser, Najah A. Abu Ali, Hossam S. Hassanein:
Congestion prevention in broadband wireless access systems: An economic approach. 1836-1847 - Jihoon Ryoo, Hwangnam Kim:
Multi-sector multi-range control for self-organizing wireless networks. 1848-1860 - Zhaoming Lu, Yan Yang, Xiangming Wen, Ying Ju, Wei Zheng:
A cross-layer resource allocation scheme for ICIC in LTE-Advanced. 1861-1868 - Mohsen Jahanshahi, Mehdi Dehghan, Mohammad Reza Meybodi:
A mathematical formulation for joint channel assignment and multicast routing in multi-channel multi-radio wireless mesh networks. 1869-1882 - Juan Rodríguez-Covili, Sergio F. Ochoa, José A. Pino, Roc Messeguer, Esunly Medina, Dolors Royo:
A communication infrastructure to ease the development of mobile collaborative applications. 1883-1893 - Bin Li, Zheng Zhou, Dejian Li, Weixia Zou:
A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors. 1894-1902 - Kyusuk Han, Youngjoon Seo, Sungjune Yoon, James J. Park, Taeshik Shon:
Providing security vertical handoff in SARAH for heterogeneous networks. 1903-1907
- Muhammad Ayaz, Imran Baig, Azween B. Abdullah, Ibrahima Faye:
A survey on routing techniques in underwater wireless sensor networks. 1908-1927 - Sarogini Grace Pease, Lin Guan, Iain W. Phillips, Alan Grigg:
Cross-layer signalling and middleware: A survey for inelastic soft real-time applications in MANETs. 1928-1941 - David Antolino Rivas, José M. Barceló-Ordinas, Manel Guerrero Zapata, Julián David Morillo-Pozo:
Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation. 1942-1955 - Muhammad Azhar Iqbal, Bin Dai, Benxiong Huang, A. Hassan, Shui Yu:
Survey of network coding-aware routing protocols in wireless networks. 1956-1970
- Mohamed Bakhouya, Jaafar Gaber, Pascal Lorenz:
An adaptive approach for information dissemination in Vehicular Ad hoc Networks. 1971-1978 - Lu Leng, Jiashu Zhang:
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. 1979-1989 - Jeremiah D. Deng, Martin K. Purvis:
Multi-core application performance optimization using a constrained tandem queueing model. 1990-1996 - Pedro M. Wightman, Miguel A. Labrador:
A family of simple distributed minimum connected dominating set-based topology construction algorithms. 1997-2010 - Sanjay Kumar Biswash, Chiranjeev Kumar:
An efficient metric-based (EM-B) location management scheme for wireless cellular networks. 2011-2026 - Tzu-Chi Huang, Kuo-Chih Chu:
Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network. 2027-2041 - Maziar Ahmad Sharbafi, Mohammad Javad Yazdanpanah:
IDFC: A new approach to control bifurcation in TCP/RED. 2042-2050
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.