


default search action
Journal of Network and Computer Applications, Volume 35
Volume 35, Number 1, January 2012
- Weiming Shen

, Yinsheng Li, Anne E. James
:
Collaborative computing and applications. 1-2 - Hugo Paredes

, Fernando Mário Martins:
Social interaction regulation in virtual web environments using the Social Theatres model. 3-19 - Weizhan Zhang, Qinghua Zheng, Haifei Li, Feng Tian:

An overlay multicast protocol for live streaming and delay-guaranteed interactive media. 20-28 - Min Liu, Shijun Xu, Siyi Sun:

An agent-assisted QoS-based routing algorithm for wireless sensor networks. 29-36 - Tossaporn Srisooksai

, Kamol Keamarungsi, Poonlap Lamsrichan, Kiyomichi Araki:
Practical data compression in wireless sensor networks: A survey. 37-59 - Junzhou Luo, Xiaogang Wang, Ming Yang:

An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. 60-71 - Kyuyong Shin, Douglas S. Reeves:

Winnowing: Protecting P2P systems against pollution through cooperative index filtering. 72-84 - Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu:

Proactive replication for rare objects in unstructured peer-to-peer networks. 85-96 - Kwanghoon Pio Kim

:
A model-driven workflow fragmentation framework for collaborative workflow architectures and systems. 97-110 - Junpeng Du, Shikai Jing, Jihong Liu:

Creating shared design thinking process for collaborative design. 111-120 - Yunjiao Xue, Hamada H. Ghenniwa, Weiming Shen

:
Frame-based ontological view for semantic integration. 121-131 - Hongbo Sun, Wenhui Fan, Weiming Shen

, Tianyuan Xiao:
Ontology-based interoperation model of collaborative product development. 132-144 - Juan Rodríguez-Covili, Sergio F. Ochoa, José A. Pino:

High level MANET protocol: Enhancing the communication support for mobile collaborative work. 145-155 - Yuqing Sun

, Dickson K. W. Chiu
, Bin Gong, Xiangxu Meng, Peng Zhang:
Scheduling mobile collaborating workforce for multiple urgent events. 156-163 - Fabrício Enembreck

, Jean-Paul André Barthès:
Distributed constraint optimization with MULBS: A case study on collaborative meeting scheduling. 164-175 - Mar Pérez-Sanagustín

, Gustavo Ramírez-González
, Davinia Hernández Leo
, Mario Muñoz Organero
, Patricia Santos
, Josep Blat
, Carlos Delgado Kloos
:
Discovering the campus together: A mobile and computer-based learning experience. 176-188 - Adriana S. Vivacqua

, Marcos R. S. Borges
:
Taking advantage of collective knowledge in emergency response systems. 189-198
- Amir Talaei-Khoei, Pradeep Ray

, Nandan Parameswaran, Lundy Lewis:
A framework for awareness maintenance. 199-210 - Jameela Al-Jaroodi, Nader Mohamed:

Service-oriented middleware: A survey. 211-220 - Rajashekhar C. Biradar

, Sunilkumar S. Manvi:
Review of multicast routing mechanisms in mobile ad hoc networks. 221-239 - Xianhui Che

, Barry Ip
:
Packet-level traffic analysis of online games from the genre characteristics perspective. 240-252 - Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal

:
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues. 253-267 - Mawloud Omar, Yacine Challal

, Abdelmadjid Bouabdallah:
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. 268-286 - Eleftherios Stergiou, John D. Garofalakis:

Performance estimation of banyan semi layer networks with drop resolution mechanism. 287-294 - Ibrahim Al-Surmi, Mohamed Othman, Borhanuddin Mohd Ali:

Mobility management for IP-based next generation mobile networks: Review, challenge and perspective. 295-315
- Feng Zhong, Chai Kiat Yeo

, Bu-Sung Lee
:
Adaptive load balancing algorithm for multiple homing mobile nodes. 316-327 - Marinho P. Barcellos, Rodolfo Stoffel Antunes

, Hisham H. Muhammad, Ruthiano S. Munaretti:
Beyond network simulators: Fostering novel distributed applications and protocols through extendible design. 328-339 - Fagen Li

, Muhammad Khurram Khan
, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. 340-347 - Walid Saad, Zaher Dawy, Sanaa Sharafeddine

:
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks. 348-356 - Jing Nie:

IPv6 based relay gateway protocol in hybrid networks. 357-364 - Dhiah Al-Shammary

, Ibrahim Khalil
:
Redundancy-aware SOAP messages compression and aggregation for enhanced performance. 365-381 - Eduardo Cañete

, Jaime Chen, Rafael Marcos Luque
, Bartolomé Rubio
:
NeuralSens: A neural network based framework to allow dynamic adaptation in wireless sensor and actor networks. 382-393 - Mohammad Javad Rostami, Azadeh Alsadat Emrani Zarandi, Seyed Mohamad Hoseininasab:

MSDP with ACO: A maximal SRLG disjoint routing algorithm based on ant colony optimization. 394-402 - Ronald Beaubrun, Jhon-Fredy Llano-Ruiz, Benoit Poirier, Alejandro Quintero:

A middleware architecture for disseminating delay-constrained information in wireless sensor networks. 403-411 - Jasma Balasangameshwara

, Nedunchezhian Raju
:
A hybrid policy for fault tolerant load balancing in grid computing environments. 412-422 - Tzu-Chi Huang:

Program Ultra-Dispatcher for launching applications in a customization manner on cloud computing. 423-446 - Chao-Tsun Chang:

Hash caching mechanism in source-based routing for wireless ad hoc networks. 447-458 - Sajjad Zare

, Akbar Ghaffarpour Rahbar
:
An FEC scheme combined with weighted scheduling to reduce multicast packet loss in IPTV over PON. 459-468 - Jun Huang, Xiaohong Huang, Yan Ma:

Routing with multiple quality-of-services constraints: An approximation perspective. 469-479 - Serif Bahtiyar

, Mehmet Ufuk Çaglayan
:
Extracting trust information from security system of a service. 480-490 - Jorge Blasco Alís

, Julio César Hernández Castro
, José María de Fuentes
, Benjamín Ramos:
A framework for avoiding steganography usage over HTTP. 491-501 - Bing Hu, Kwan L. Yeung, Zhaoyang Zhang

:
Load-balanced three-stage switch. 502-509 - Ioannis Krikidis

, John S. Thompson:
MIMO two-way relay channel with superposition coding and imperfect channel estimation. 510-516
Volume 35, Number 2, March 2012
- Mesut Günes

, Yan Zhang:
In memory of Mieso Denko. 517 - Ming-Tuo Zhou, Hiroshi Harada

:
Cognitive maritime wireless mesh/ad hoc networks. 518-526 - Theofanis P. Lambrou, Christos G. Panayiotou

:
A testbed for coverage control using mixed wireless sensor networks. 527-537 - Joachim Fischer, Jens-Peter Redlich, Jochen Zschau, Claus Milkereit, Matteo Picozzi

, Kevin Fleming, Mihal Brumbulli
, Björn Lichtblau, Ingmar Eveslage:
A wireless mesh sensing network for early warning. 538-547 - Evangelos Theodoridis, Ioannis Chatzigiannakis

, Stefan Dulman:
Post-processing in wireless sensor networks: Benchmarking sensor trace files for in-network data aggregation. 548-561 - Iván Corredor, José F. Martínez, Miguel S. Familiar

, Lourdes López-Santidrián
:
Knowledge-Aware and Service-Oriented Middleware for deploying pervasive services. 562-576 - Bo Yang, Mareboyana Manohar:

Similarity search in sensor networks using semantic-based caching. 577-583
- Mari Carmen Domingo

:
An overview of the Internet of Things for people with disabilities. 584-596 - Sajjad Rizvi, Hassaan Khaliq Qureshi, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:

A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. 597-605 - Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha

:
A comparison of wavelength reservation protocols for WDM optical networks. 606-618 - Chuan Zhu, Chunlin Zheng, Lei Shu

, Guangjie Han:
A survey on coverage and connectivity issues in wireless sensor networks. 619-632
- Jingyu Wang

, Jianxin Liao, Tonghong Li
:
OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer. 633-643 - Sanaa Sharafeddine

, Ibrahim Al-Kassem, Zaher Dawy:
A scatternet formation algorithm for Bluetooth networks with a non-uniform distribution of devices. 644-656 - Wenjie Zhang, Chai Kiat Yeo

:
Throughput and delay scaling laws for mobile overlaid wireless networks. 657-667 - Hoda Hassan, Mohamed Eltoweissy:

CORM: A reference model for future computer networks. 668-680 - Nicola Cordeschi

, Tatiana Patriarca, Enzo Baccarelli
:
Stochastic traffic engineering for real-time applications over wireless networks. 681-694 - Francisco Jurado

, Miguel A. Redondo
, Manuel Ortega
:
Using fuzzy logic applied to software metrics and test cases to assess programming assignments and give advice. 695-712 - Golnaz Vakili, Siavash Khorsandi:

Coordination of cooperation policies in a peer-to-peer system using swarm-based RL. 713-722 - Radim Burget, Dan Komosny

, Kathiravelu Ganeshan:
Topology aware feedback transmission for real-time control protocol. 723-730 - Mahboobeh Sedighizad, Babak Seyfe, Keivan Navaie

:
MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time. 731-742 - Yi-hua Zhu, Hui Xu, Kaikai Chi, Hua Hu:

Accumulating error-free frame blocks to improve throughput for IEEE 802.11-based WLAN. 743-752 - Carlos Miguel Tavares Calafate

, Giancarlo Fortino
, Sascha Fritsch, Jânio M. Monteiro
, Juan-Carlos Cano
, Pietro Manzoni
:
An efficient and robust content delivery solution for IEEE 802.11p vehicular environments. 753-762 - Xiong Li

, Yongping Xiong, Jian Ma, Wendong Wang:
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. 763-769 - Min-Feng Wang, Meng-Feng Tsai, Sie-Long Jheng, Cheng-Hsien Tang:

Social feature-based enterprise email classification without examining email contents. 770-777 - Waltenegus Dargie

:
A medium access control protocol that supports a seamless handover in wireless sensor networks. 778-786 - Rajesh Karunamurthy, Ferhat Khendek

, Roch H. Glitho
:
A novel architecture for Web service composition. 787-802 - George Kastaniotis, Elias K. Maragos, Christos Douligeris, Dimitris K. Despotis

:
Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies. 803-817 - Wen-Hwa Liao

, Hung-Chun Yang:
A power-saving data storage scheme for wireless sensor networks. 818-825 - Gildas Avoine, Xavier Carpent

, Benjamin Martin:
Privacy-friendly synchronized ultralightweight authentication protocols in the storm. 826-843 - Muhammad Imran, Mohamed F. Younis

, Abas Md Said, Halabi Hasbullah:
Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks. 844-856 - Mohit P. Tahiliani, K. C. Shet, T. G. Basavaraju:

CARED: Cautious Adaptive RED gateways for TCP/IP networks. 857-864
Volume 35, Number 3, May 2012
- Laurence Tianruo Yang, Guojun Wang:

Special issue on trusted computing and communications. 865-866 - Yanli Yu, Keqiu Li, Wanlei Zhou

, Ping Li:
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. 867-880 - Lei Jiang

, Lixin Ding, Jianxun Liu, Jinjun Chen:
Reputation rating modeling for open environment lack of communication by using online social cognition. 881-891 - Weizhong Qiang, Aleksandr Konstantinov, Deqing Zou, Laurence Tianruo Yang:

A standards-based interoperable single sign-on framework in ARC Grid middleware. 892-904 - Zhongtian Jia, Xiaodong Lin, Seng-Hua Tan, Lixiang Li

, Yixian Yang:
Public key distribution scheme for delay tolerant networks based on two-channel cryptography. 905-913 - Fei Wang, Furong Wang, Benxiong Huang, Laurence Tianruo Yang:

SONR: A reliable reputation system of self-organized network. 914-926 - Qin Liu, Guojun Wang, Jie Wu:

Secure and privacy preserving keyword searching for cloud storage services. 927-933 - Félix Gómez Mármol

, Gregorio Martínez Pérez
:
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. 934-941 - Mohammad-Amin Kharraz

, Hamid Sarbazi-Azad, Albert Y. Zomaya
:
On-demand multicast routing protocol with efficient route discovery. 942-950 - Huanyu Zhao, Xin Yang, Xiaolin Andy Li:

An incentive mechanism to reinforce truthful reports in reputation systems. 951-961 - Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:

Flexible service selection with user-specific QoS support in service-oriented architecture. 962-973 - Liang Gu, Guangdong Bai

, Yao Guo
, Xiangqun Chen, Hong Mei:
Security model oriented attestation on dynamically reconfigurable component-based systems. 974-981 - Min Choi, Jong Hyuk Park, Seungho Lim, Young-Sik Jeong:

Achieving reliable system performance by fast recovery of branch miss prediction. 982-991 - Yu Wang

, Yang Xiang
, Wanlei Zhou
, Shunzheng Yu:
Generating regular expression signatures for network traffic classification in trusted network management. 992-1000 - Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:

Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. 1001-1012
- Ousmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene:

Real-time data management on wireless sensor networks: A survey. 1013-1021 - Wen Tao Zhu, Jianying Zhou

, Robert H. Deng
, Feng Bao:
Detecting node replication attacks in wireless sensor networks: A survey. 1022-1034
- Jihao Yin, Yifei Wang

, Jiankun Hu
:
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration. 1035-1051 - Panho Lee, Anura P. Jayasumana, H. M. N. Dilum Bandara

, Sanghun Lim
, V. Chandrasekar:
A peer-to-peer collaboration framework for multi-sensor data fusion. 1052-1066 - Chao-Yang Lee

, Shou-Jen Lin, Chen-Wei Lee, Chu-Sing Yang:
An efficient continuous tracking system in real-time surveillance application. 1067-1073 - Rajashekhar C. Biradar

, Sunilkumar S. Manvi:
Neighbor supported reliable multipath multicast routing in MANETs. 1074-1085 - Jesús Gallardo

, Crescencio Bravo
, Miguel A. Redondo
:
A model-driven development method for collaborative modeling tools. 1086-1105 - S. Suraprasert, Jittat Fakcharoenphol

:
Comparison of recovery schemes to maximize restorable throughput in multicast networks. 1106-1115 - Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar:

Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams. 1116-1129 - Abderrahmane Baadache, Ali Belmehdi:

Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. 1130-1139 - Michael C. Batistatos, George V. Tsoulos

, Georgia E. Athanasiadou:
Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges. 1140-1150 - Zubair A. Baig

:
Multi-agent systems for protecting critical infrastructures: A survey. 1151-1161 - Abhik Banerjee

, Chuan Heng Foh
, Chai Kiat Yeo
, Bu-Sung Lee
:
Performance improvements for network-wide broadcast with instantaneous network information. 1162-1174
Volume 35, Number 4, July 2012
- Alfredo Cuzzocrea

:
Intelligent algorithms for data-centric sensor networks. 1175-1176 - Aris A. Papadopoulos, Alfredo Navarra

, Julie A. McCann, Maria Cristina Pinotti
:
VIBE: An energy efficient routing protocol for dense and mobile sensor networks. 1177-1190 - Mark Roantree

, Jie Shi, Paolo Cappellari, Martin F. O'Connor, Michael Whelan, Niall Moyna:
Data transformation and query management in personal health sensor networks. 1191-1202 - Paolo Bellavista

, Giuseppe Cardone, Antonio Corradi
, Luca Foschini
:
The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency. 1203-1209 - Alfredo Cuzzocrea

, Alexis Papadimitriou, Dimitrios Katsaros, Yannis Manolopoulos:
Edge betweenness centrality: A novel algorithm for QoS-based topology control over wireless sensor networks. 1210-1217 - Gianluca Moro

, Gabriele Monti:
W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks. 1218-1234
- R. Madhusudhan

, R. C. Mittal:
Dynamic ID-based remote user password authentication schemes using smart cards: A review. 1235-1248 - Jan von Mulert, Ian Welch

, Winston Khoon Guan Seah
:
Security threats and solutions in MANETs: A case study using AODV and SAODV. 1249-1259
- Chien-Fu Cheng

, Kuo-Tang Tsai:
Eventual strong consensus with fault detection in the presence of dual failure mode on processors under dynamic networks. 1260-1276 - Dong Kun Noh

, Junbeom Hur:
Using a dynamic backbone for efficient data delivery in solar-powered WSNs. 1277-1284 - Longxiang Gao, Ming Li, Alessio Bonti

, Wanlei Zhou
, Shui Yu
:
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models. 1285-1296 - Najme Mansouri, Gholamhosein Dastghaibyfard:

A dynamic replica management strategy in data grid. 1297-1303 - Kenneth J. Turner, Koon Leai Larry Tan:

Rigorous development of composite grid services. 1304-1316 - Mustapha Réda Senouci

, Abdelhamid Mellouk, Hadj Senouci, Amar Aissani
:
Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols. 1317-1328 - Hassen A. Mogaibel, Mohamed Othman, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid

:
On-demand channel reservation scheme for common traffic in wireless mesh networks. 1329-1351 - Elizabeth A. Thompson

, Nathan Clem, Isaac Renninger, Timothy Loos:
Software-defined GPS receiver on USRP-platform. 1352-1360 - Ameen M. Alkharasani, Mohamed Othman:

M2I2tswTCM: A new efficient optimization marker algorithm to improve fairness bandwidth in DiffServ networks. 1361-1366 - Miao Zhou, Yi Mu, Willy Susilo

, Jun Yan
, Liju Dong:
Privacy enhanced data outsourcing in the cloud. 1367-1373
- Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar:

Corrigendum to "Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams" [J. Network Comput. Appl. 35 (3) (2012) 1116-1129]. 1374
Volume 35, Number 5, September 2012
- Paolo Bellavista

, Chi-Ming Chen, Hossam S. Hassanein
:
Special issue on service delivery management in broadband networks. 1375-1376 - Djamal-Eddine Meddour, Alaeddine Abdallah Djamal, Toufik Ahmed

, Raouf Boutaba:
A cross layer architecture for multicast and unicast video transmission in mobile broadband networks. 1377-1391 - Cristiano Bonato Both

, Clarissa Cassales Marquezan, Rafael Kunst
, Lisandro Zambenedetti Granville
, Juergen Rochol:
A self-adapting connection admission control solution for mobile WiMAX: Enabling dynamic switching of admission control algorithms based on predominant network usage profiles. 1392-1401 - Giuseppe Aceto, Alessio Botta

, Antonio Pescapè, Maurizio D'Arienzo
:
Unified architecture for network measurement: The case of available bandwidth. 1402-1414 - Werner Sandmann:

Delays in a series of queues with correlated service times. 1415-1423 - Kaouther Abrougui, Azzedine Boukerche, Hussam M. Soliman Ramadan:

Performance evaluation of an efficient fault tolerant service discovery protocol for vehicular networks. 1424-1435 - Nassima Hadid, Alexandre Guitton, Michel Misson:

Exploiting a meeting channel to interconnect mobile robots. 1436-1445 - Christos Bouras, Vassilis Poulopoulos

:
Enhancing meta-portals using dynamic user context personalization techniques. 1446-1453
- Ahmed A. Mosa, Aisha H. Abdalla, Rashid A. Saeed

:
Evaluation of MANEMO route optimization schemes. 1454-1472 - Antonio Ruiz-Martínez

:
A survey on solutions and main free tools for privacy enhancing Web communications. 1473-1492 - Mohammad Masdari, Mehdi Maleknasab

, Moazam Bidaki
:
A survey and taxonomy of name systems in mobile ad hoc networks. 1493-1507 - Adamu Murtala Zungeru

, Li-Minn Ang
, Kah Phooi Seng:
Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison. 1508-1536 - Liang Liu, Xiaolin Qin, Guineng Zheng:

Reliable spatial window aggregation query processing algorithm in wireless sensor networks. 1537-1547
- Kranthi K. Mamidisetty, Michael J. Ferrara, Shivakumar Sastry:

Systematic selection of cluster heads for data collection. 1548-1558 - Rosen Ivanov

:
Real-time GPS track simplification algorithm for outdoor navigation of visually impaired. 1559-1567 - Yun He, Zhongyang Xiong, Yufang Zhang, Xiaolin Tan, Zhixing Li:

Modeling and analysis of multi-channel P2P VoD systems. 1568-1578 - Patrick Battistello, Joaquín García-Alfaro

, Cyril Delétré:
Transaction-based authentication and key agreement protocol for inter-domain VoIP. 1579-1597 - Samia A. Ali, Khaled M. Shaaban, Islam M. Alkabbany

:
Distributed patching for mobile wireless sensor networks. 1598-1605 - Jipeng Zhou, Liyang Peng, Yuhui Deng

, Jian-Zhu Lu
:
An on-demand routing protocol for improving channel use efficiency in multichannel ad hoc networks. 1606-1614 - Seiven Leu, Ruay-Shiung Chang:

A weight-value algorithm for finding connected dominating sets in a MANET. 1615-1619 - Bert Vankeirsbilck

, Dieter Verslype, Nicolas Staelens, Pieter Simoens
, Chris Develder
, Bart Dhoedt, Filip De Turck
, Piet Demeester:
Automatic fine-grained area detection for thin client systems. 1620-1632 - Javad Akbari Torkestani:

Mobility prediction in mobile wireless networks. 1633-1645 - Ashok Kumar Das

, Pranay Sharma, Santanu Chatterjee, Jamuna Kanta Sing:
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. 1646-1656
Volume 35, Number 6, November 2012
- Peer Azmat Shah

, Muhammad Yousaf
, Amir Qayyum, Halabi Hasbullah:
Performance comparison of end-to-end mobility management protocols for TCP. 1657-1673 - Allen L. Ramaboli, Olabisi Emmanuel Falowo

, H. Anthony Chan:
Bandwidth aggregation in heterogeneous wireless networks: A survey of current approaches and issues. 1674-1690 - Sazia Parvin

, Farookh Khadeer Hussain, Omar Khadeer Hussain
, Song Han, Biming Tian, Elizabeth Chang
:
Cognitive radio network security: A survey. 1691-1708 - Shajulin Benedict

:
Energy-aware performance analysis methodologies for HPC architectures - An exploratory study. 1709-1719 - Tarek Moulahi

, Salem Nasri, Hervé Guyennet:
Broadcasting based on dominated connecting sets with MPR in a realistic environment for WSNs & ad hoc. 1720-1727 - JungYul Choi, Mingon Kim, Hongkyu Jeong, Hong-Shik Park:

Power-saving mechanisms for energy efficient IEEE 802.16e/m. 1728-1739
- Jihao Yin, Chongyang Fu, Jiankun Hu

:
Using incremental subspace and contour template for object tracking. 1740-1748 - Hamid Shokrzadeh

, Siavash Khorsandi, Abolfazl Toroghi Haghighat:
Optimized query-driven appointment routing based on Expectation-Maximization in wireless sensor networks. 1749-1761 - Kwangcheol Shin, Kyungjun Kim, Soontae Kim:

Traffic management strategy for delay-tolerant networks. 1762-1770 - M. S. Kakkasageri, Sunilkumar S. Manvi:

Multiagent driven dynamic clustering of vehicles in VANETs. 1771-1780 - Alexandre Aguiar Amaral, Bruno Bogaz Zarpelão

, Leonardo de Souza Mendes, Joel José Puga Coelho Rodrigues, Mario Lemes Proença Jr.
:
Inference of network anomaly propagation using spatio-temporal correlation. 1781-1792 - Qi Shi

, Ning Zhang
, David Llewellyn-Jones:
Efficient autonomous signature exchange on ubiquitous networks. 1793-1806 - Victoria Ying Zhang, Albert Kai-Sun Wong

:
Kernel-based particle filtering for indoor tracking in WLANs. 1807-1817 - Mourad Amad

, Ahmed Meddahi, Djamil Aïssani
, Zonghua Zhang:
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity. 1818-1830 - Sandeep K. Sood

:
A combined approach to ensure data security in cloud computing. 1831-1838 - Zuowen Tan:

A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments. 1839-1846 - Bo Dong, Qinghua Zheng, Feng Tian, Kuo-Ming Chao

, Rui Ma, Rachid Anane
:
An optimized approach for storing and accessing small files on cloud storage. 1847-1862 - Rafael Antonello, Stenio F. L. Fernandes, Carlos Alberto Kamienski

, Djamel Sadok, Judith Kelner, István Gódor, Géza Szabó, Tord Westholm:
Deep packet inspection tools and techniques in commodity platforms: Challenges and trends. 1863-1878 - Mari Carmen Domingo

:
An overview of the internet of underwater things. 1879-1890 - Javier Barrachina, Piedad Garrido

, Manuel Fogué, Francisco J. Martinez
, Juan-Carlos Cano
, Carlos Miguel Tavares Calafate
, Pietro Manzoni
:
VEACON: A Vehicular Accident Ontology designed to improve safety on the roads. 1891-1900 - Adamu Murtala Zungeru

, Li-Minn Ang
, Kah Phooi Seng:
Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks. 1901-1917 - Mohamed Bakillah, Mir Abolfazl Mostafavi

, Steve H. L. Liang, Alexander Zipf
:
Real time query propagation strategies with Lightweight Coordination Calculus (LCC) for ad hoc networks of geospatial databases. 1918-1933 - Giancarlo Fortino

, Antonio Guerrieri
, Gregory M. P. O'Hare
, Antonio G. Ruzzelli:
A flexible building management framework based on wireless sensor and actuator networks. 1934-1952 - Linfeng Liu

, Ruchuan Wang, Fu Xiao:
Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes. 1953-1963 - Gurpreet Singh Bhamra

, Neeraj Kumar
, Anil K. Verma
:
Ant colony algorithms in MANETs: A review. 1964-1972 - S. Sudha, N. Ammasaigounden:

An aggregate marker for bandwidth fairness in DiffServ. 1973-1978 - Li Li, Qing-Shan Jia

, Hengtao Wang, Ruixi Yuan, Xiaohong Guan:
A systematic method for network topology reconfiguration with limited link additions. 1979-1989 - Chih-Lin Hu

, Tzu-Han Kuo:
A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems. 1990-2002 - Miguel Franklin de Castro

, Levi Bayde Ribeiro, Camila Helena Souza Oliveira:
An autonomic bio-inspired algorithm for wireless sensor network self-organization and efficient routing. 2003-2015 - Mohammad Hassan Hajiesmaili, Ahmad Khonsari

, Ali Sehati, Mohammad Sadegh Talebi:
Content-aware rate allocation for efficient video streaming via dynamic network utility maximization. 2016-2027 - Javad Akbari Torkestani:

A distributed resource discovery algorithm for P2P grids. 2028-2036 - Derlis Gregor

, Sergio L. Toral Marín
, Maria Teresa Ariza Gómez, Federico Barrero
:
An ontology-based semantic service for cooperative urban equipments. 2037-2050 - Qingyang Song, Zhaolong Ning

, Shiqiang Wang, Abbas Jamalipour
:
Link stability estimation based on link connectivity changes in mobile ad-hoc networks. 2051-2058 - Süleyman Kardas, Serkan Celik, Muhammet Yildiz, Albert Levi

:
PUF-enhanced offline RFID security and privacy. 2059-2067 - Khalid A. Darabkh

, Shereen Ismail
, Mohammad Al-Shurman, Iyad F. Jafar, Eman Alkhader, Mamoun F. Al-Mistarihi:
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks. 2068-2080 - Yi Xie, Jiankun Hu

, S. Tang, X. Huang:
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network. 2081-2091 - Yuan-Cheng Lai, Yen-Hung Chen

:
A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks. 2092-2104

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














