


default search action
International Journal of Communication Networks and Distributed Systems, Volume 21
Volume 21, Number 1, 2018
- Dilawaer Duolikun, Hiroki Kataoka, Tomoya Enokido, Makoto Takizawa:

Simple algorithms for selecting an energy-efficient server in a cluster of servers. 1-25 - Ansuman Bhattacharya, Sasthi C. Ghosh, Koushik Sinha, Bhabani P. Sinha:

Secure multipath routing for multimedia communication in cognitive radio networks. 26-55 - Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:

Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks. 56-79 - Donald Elmazi

, Makoto Ikeda, Leonard Barolli:
Implementation and performance evaluation of an intelligent fuzzy-based testbed for WSANs: a case study for object tracking. 80-94 - Miralda Cuka, Donald Elmazi

, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Implementation of two fuzzy-based systems for IoT device selection in opportunistic networks: effect of storage parameter on IoT device selection. 95-114 - Fatma Abdennadher, Maher Ben Jemaa:

Performance efficiency of a predictive scheme into publish/subscribe. 115-129 - Priya Chandran, Chelpa Lingam:

Adaptive jitter buffer management: a game theoretic approach. 130-146
Volume 21, Number 2, 2018
- Manish Patel

, Akshai Aggarwal, Nirbhay Chaubey:
Detection of wormhole attacks in mobility-based wireless sensor networks. 147-156 - Gautam M. Borkar, A. R. Mahajan:

Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks. 157-186 - Santar Pal Singh, Subhash Chander Sharma:

A modified DV-Hop algorithm for wireless sensor network localisation. 187-201 - Guruh Fajar Shidik, Azhari, Khabib Mustofa:

K-mMA VM selection in dynamic VM consolidation for improving energy efficiency at cloud data centre. 202-219 - Rohini Sharma, Ajay Guleria, R. K. Singla:

An overview of flow-based anomaly detection. 220-240 - Abhijit A. Rajguru, S. S. Apte:

QoS enhanced distributed load balancing and task scheduling framework for wireless networks using hybrid optimisation algorithm. 241-265 - Sukant Kishoro Bisoy, Prasant Kumar Pattnaik:

RQ-AQM: a rate and queue-based active queue management using feedback control theory. 266-295
Volume 21, Number 3, 2018
- U. Purushotham, K. Suresh:

Adaptive spectral subtraction to improve quality of speech in mobile communication. 297-314 - Jyotirmoy Sarkar, Bidisha Goswami, Snehanshu Saha, Saibal Kar:

CD-SFA: stochastic frontier analysis approach to revenue modelling in large cloud data centres. 315-345 - Trupil Limbasiya, Debasis Das:

An enhanced message verification system for vehicle-to-vehicle communication. 346-362 - John Singh K, Kunal Gagneja:

Public key cryptography using sphere and spheroid. 363-383 - Ahmed A. A. Gad-ElRab, Almohammady S. Alsharkawy

:
Multiple criteria-based efficient schemes for participants selection in mobile crowd sensing. 384-417 - Soumen Atta, Priya Ranjan Sinha Mahapatra:

Perturbation-minimising frequency assignment to address short term demand fluctuation in cellular network. 418-443
Volume 21, Number 4, 2018
- Chaganti B. N. Lakshmi, S. Krishna Mohan Rao:

Failure detection and recovery in self-healing WSN. 445-456 - Muhammad Afaq, Dong-hun Kang, Seung-Joon Seok, Wang-Cheol Song:

Service orchestration over clouds and networks. 457-474 - S. Maragathasundari, K. S. Dhanalakshmi:

Mobile ad hoc networks problem - a queueing approach. 475-495 - Mohammad Samadi Gharajeh:

A neural-MCDM-based routing protocol for packet transmission in mobile ad hoc networks. 496-527 - Hongcheng Huang, Xinran Sun, Min Hu:

Steady-state throughput discrete model of multipath TCP based on linked increase algorithm. 528-546 - Vandana Juyal, Ravish Saggar, Nitin Pandey:

Clique-based socially-aware intelligent message forwarding scheme for delay tolerant network. 547-559 - Aqeel Sahi, David Lai, Yan Li:

Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption. 560-581

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














