default search action
International Journal of Networking and Virtual Organisations, Volume 19
Volume 19, Number 1, 2018
- Trevor Clohessy, Thomas Acton, Lorraine Morgan:
Contemporary digital business model decision making: a cloud computing supply-side perspective. 1-20 - Victoria Garwood, Damian Claydon-Platt, Nilmini Wickramasinghe, John Mackay, Philip J. Smart:
Smart phones and surgeons: privacy and legal issues in Australian healthcare. 21-33 - Mohammad M. Alnabhan:
Location-based clustering and collaborative filtering for mobile learning. 34-49 - Shweta Kaushik, Charu Gandhi:
Cloud computing security: attacks, threats, risk and solutions. 50-71 - Shanmuk Srinivas Amiripalli, Veeramallu Bobba:
Research on network design and analysis of TGO topology. 72-86 - Changsong Liu:
A multi-policy adaptive scheduling framework in virtual clouds. 87-102
Volume 19, Numbers 2/3/4, 2018
- Gatete Marcel, Arangasamy Kovalan:
A full-featured efficient clustering mechanism for improving QoS in MANETs. 105-132 - Uwizeyimana Faustin, Arangasamy Kovalan, Rajkumar Kannan:
ASD: emotions and behavioural-based interventions through social sensor networks. 133-152 - Zaid A. Abdulkader, Azizol Abdullah, Mohd Taufik Abdullah, Zuriati Ahmad Zukarnain:
Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks. 153-175 - J. Martin Sahayaraj, J. M. Ganaseakar:
Relay node selection with energy efficient routing using hidden Markov model in wireless sensor networks. 176-186 - Govindarajan Saravanan, M. J. S. Rangachar:
Network lifetime estimation of wireless sensor networks using communication protocols with non-parametric models. 187-195 - C. Padmavathy, L. S. Jayashree, A. Rosario:
Combined vibration and RF harvester technique for energy management in sensor device. 196-208 - P. Sanjeevi, P. Viswanathan:
DTCF: deadline task consolidation first for energy minimisation in cloud data centres. 209-233 - Saira Banu, K. M. Mehata:
SIP-based VoIP anomaly detection engine using DTV and ONR. 234-256 - B. P. Sreejith Vignesh, M. Rajesh Babu:
Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm. 257-269 - Munir Kolapo Yahya-Imam, Sellappan Palaniappan, Seyed Mohammadreza Ghadiri:
Hybrid model for enhancement of passenger information management system. 270-288 - M. Savithri, M. Rajesh Babu:
Energy-based efficient authenticated routing protocol for MANETs for DDOS attacks with minimised power consumption. 289-304 - K. R. Remesh Babu, Philip Samuel:
Energy aware clustered load balancing in cloud computing environment. 305-320 - R. Priyadarshini, Latha Tamilselvan:
Semantic clustering approach for documents in distributed system framework with multi-node setup. 321-340 - Chengtao Cao:
Research on the intellectual traffic flow control system based on multi-agent along with self-governing vehicle and system of wireless sensor network. 341-356 - Jie Li, Ning Sun, Jianlong Zhang:
A novel framework for very high resolution remote sensing image change detection. 357-372 - B. Suseela, D. Sivakumar:
Certain investigations on effective rate adaptation in cognitive radio with channel characteristics. 373-384 - J. Vijitha Ananthi, H. James Deva Koresh, S. Vengatesan, Y. Blessina Anet Glorita:
A secure communication over wireless sensor devices using intelligent arrival estimation algorithm. 385-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.