default search action
International Journal of Information Technology, Communications and Convergence, Volume 2
Volume 2, Number 1, 2012
- Madhusoodan Parthasarathy, Min Sik Kim:
Routing in the presence of groups in mobile ad hoc networks. 1-24 - R. Sumathi, R. Srinivasan:
Performance analysis of the EBARR protocol for wireless sensor networks. 25-53 - Nalinrat Srirajun, Pattarasinee Bhattarakosol, Panjai Tantasanawong, Sunyoung Han:
A trustable software with a dynamic loop control mechanism. 54-70 - Dave E. Marcial, Josel Pasilan, Andrew Glovasa, Alfran Keith Consing, Carl Louie Mamhot, Aine Aira Tomada:
Developing online auction with behavioural and intuitive functions. 71-89 - Dilip Kumar:
Distributed stable cluster head election (DSCHE) protocol for heterogeneous wireless sensor networks. 90-103
Volume 2, Number 2, 2012
- Kamal Gupta, Gurpal Singh:
Optimal pricing solution for VoIP service in 802.16/802.11 combined networks. 105-119 - Brijesh Kumar Chaurasia, Shekhar Verma:
Model-based verification of privacy preserving authentication protocol for VANETs. 120-137 - Qi Li, Hong An, Wenbo Dai, Gongming Li, Bobin Deng, Yu Liu, Xiaomei Li, Shilei Wu:
Priority-based squash reducing methods in thread level speculation. 138-154 - Tao Yang, Tetsuya Oda, Leonard Barolli, Fatos Xhafa:
Impact of mobile sink nodes on performance of wireless sensor networks. 155-170 - Anushil:
Opportunities for IT developers in web accessibility/assistive technologies. 171-186 - P. Chitra, R. Sruthi:
Load balanced scheduling of independent tasks in heterogeneous computing systems. 187-203
Volume 2, Number 3, 2012
- Richard E. Overill:
Digital quantum forensics: future challenges and prospects. 205-211 - Carla Osthoff, Francieli Zanon Boito, Rodrigo Virote Kassick, Laércio Lima Pilla, Philippe Olivier Alexandre Navaux, Claudio Schepke, Jairo Panetta, Pablo Javier Grunmann, Nicolas Maillard, Pedro Leite da Silva Dias, Robert L. Walko:
Atmospheric models hybrid OpenMP/MPI implementation multicore cluster evaluation. 212-233 - Hatem Hadj Kacem, Imen Loulou, Ahmed Hadj Kacem:
A formal approach to model and verify the behaviour of publish/subscribe architectural style. 234-252 - Xinyou Zhao, Qun Jin, Toshio Okamoto:
Semantic retrieval: multiple response model for context-aware learning services. 253-267 - Guang-Ho Cha:
An effective and efficient indexing scheme for audio fingerprinting. 268-280
Volume 2, Number 4, 2013
- Ashish Seth, Himanshu Aggarwal, Ashim Raj Singla:
Framework for business values chain activities using SOA and cloud. 281-294 - Vivek Shah, Marcos Sivitanides, Mayur Mehta:
The era of digital activism. 295-307 - Brijesh Kumar Chaurasia, Shekhar Verma:
Privacy preserving mutual authentication in WiMAX. 308-320 - Omneya Issa, Filippo Speranza, Wei Li, Hong Liu:
Inference of network impairment effect on the quality of high definition IPTV distribution. 321-338 - Samah Bouamama, Ghalem Belalem:
Application of auctions club in cloud computing. 339-352 - Ashish Payal, Chandra Shekhar Rai, B. V. Ramana Reddy:
Soft computing approach towards localisation in wireless sensor networks: a survey. 353-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.