


default search action
Journal of Network and Computer Applications, Volume 35
Volume 35, Number 1, January 2012
- Weiming Shen
, Yinsheng Li, Anne E. James
:
Collaborative computing and applications. 1-2 - Hugo Paredes
, Fernando Mário Martins:
Social interaction regulation in virtual web environments using the Social Theatres model. 3-19 - Weizhan Zhang, Qinghua Zheng, Haifei Li, Feng Tian:
An overlay multicast protocol for live streaming and delay-guaranteed interactive media. 20-28 - Min Liu, Shijun Xu, Siyi Sun:
An agent-assisted QoS-based routing algorithm for wireless sensor networks. 29-36 - Tossaporn Srisooksai
, Kamol Keamarungsi, Poonlap Lamsrichan, Kiyomichi Araki:
Practical data compression in wireless sensor networks: A survey. 37-59 - Junzhou Luo, Xiaogang Wang, Ming Yang:
An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. 60-71 - Kyuyong Shin, Douglas S. Reeves:
Winnowing: Protecting P2P systems against pollution through cooperative index filtering. 72-84 - Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu:
Proactive replication for rare objects in unstructured peer-to-peer networks. 85-96 - Kwanghoon Pio Kim
:
A model-driven workflow fragmentation framework for collaborative workflow architectures and systems. 97-110 - Junpeng Du, Shikai Jing, Jihong Liu:
Creating shared design thinking process for collaborative design. 111-120 - Yunjiao Xue, Hamada H. Ghenniwa, Weiming Shen
:
Frame-based ontological view for semantic integration. 121-131 - Hongbo Sun, Wenhui Fan, Weiming Shen
, Tianyuan Xiao:
Ontology-based interoperation model of collaborative product development. 132-144 - Juan Rodríguez-Covili, Sergio F. Ochoa, José A. Pino:
High level MANET protocol: Enhancing the communication support for mobile collaborative work. 145-155 - Yuqing Sun
, Dickson K. W. Chiu
, Bin Gong, Xiangxu Meng, Peng Zhang:
Scheduling mobile collaborating workforce for multiple urgent events. 156-163 - Fabrício Enembreck
, Jean-Paul André Barthès:
Distributed constraint optimization with MULBS: A case study on collaborative meeting scheduling. 164-175 - Mar Pérez-Sanagustín
, Gustavo Ramírez-González
, Davinia Hernández Leo
, Mario Muñoz Organero
, Patricia Santos
, Josep Blat
, Carlos Delgado Kloos
:
Discovering the campus together: A mobile and computer-based learning experience. 176-188 - Adriana S. Vivacqua, Marcos R. S. Borges
:
Taking advantage of collective knowledge in emergency response systems. 189-198
- Amir Talaei-Khoei, Pradeep Ray
, Nandan Parameswaran, Lundy Lewis:
A framework for awareness maintenance. 199-210 - Jameela Al-Jaroodi, Nader Mohamed:
Service-oriented middleware: A survey. 211-220 - Rajashekhar C. Biradar
, Sunilkumar S. Manvi:
Review of multicast routing mechanisms in mobile ad hoc networks. 221-239 - Xianhui Che
, Barry Ip
:
Packet-level traffic analysis of online games from the genre characteristics perspective. 240-252 - Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal
:
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues. 253-267 - Mawloud Omar, Yacine Challal
, Abdelmadjid Bouabdallah:
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. 268-286 - Eleftherios Stergiou, John D. Garofalakis:
Performance estimation of banyan semi layer networks with drop resolution mechanism. 287-294 - Ibrahim Al-Surmi, Mohamed Othman, Borhanuddin Mohd Ali:
Mobility management for IP-based next generation mobile networks: Review, challenge and perspective. 295-315
- Feng Zhong, Chai Kiat Yeo
, Bu-Sung Lee
:
Adaptive load balancing algorithm for multiple homing mobile nodes. 316-327 - Marinho P. Barcellos, Rodolfo Stoffel Antunes
, Hisham H. Muhammad, Ruthiano S. Munaretti:
Beyond network simulators: Fostering novel distributed applications and protocols through extendible design. 328-339 - Fagen Li
, Muhammad Khurram Khan
, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. 340-347 - Walid Saad, Zaher Dawy, Sanaa Sharafeddine
:
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks. 348-356 - Jing Nie:
IPv6 based relay gateway protocol in hybrid networks. 357-364 - Dhiah Al-Shammary
, Ibrahim Khalil
:
Redundancy-aware SOAP messages compression and aggregation for enhanced performance. 365-381 - Eduardo Cañete
, Jaime Chen, Rafael Marcos Luque
, Bartolomé Rubio
:
NeuralSens: A neural network based framework to allow dynamic adaptation in wireless sensor and actor networks. 382-393 - Mohammad Javad Rostami, Azadeh Alsadat Emrani Zarandi, Seyed Mohamad Hoseininasab:
MSDP with ACO: A maximal SRLG disjoint routing algorithm based on ant colony optimization. 394-402 - Ronald Beaubrun, Jhon-Fredy Llano-Ruiz, Benoit Poirier, Alejandro Quintero:
A middleware architecture for disseminating delay-constrained information in wireless sensor networks. 403-411 - Jasma Balasangameshwara
, Nedunchezhian Raju
:
A hybrid policy for fault tolerant load balancing in grid computing environments. 412-422 - Tzu-Chi Huang:
Program Ultra-Dispatcher for launching applications in a customization manner on cloud computing. 423-446 - Chao-Tsun Chang:
Hash caching mechanism in source-based routing for wireless ad hoc networks. 447-458 - Sajjad Zare
, Akbar Ghaffarpour Rahbar
:
An FEC scheme combined with weighted scheduling to reduce multicast packet loss in IPTV over PON. 459-468 - Jun Huang, Xiaohong Huang, Yan Ma:
Routing with multiple quality-of-services constraints: An approximation perspective. 469-479 - Serif Bahtiyar
, Mehmet Ufuk Çaglayan
:
Extracting trust information from security system of a service. 480-490 - Jorge Blasco Alís
, Julio César Hernández Castro
, José María de Fuentes
, Benjamín Ramos:
A framework for avoiding steganography usage over HTTP. 491-501 - Bing Hu, Kwan L. Yeung, Zhaoyang Zhang
:
Load-balanced three-stage switch. 502-509 - Ioannis Krikidis
, John S. Thompson:
MIMO two-way relay channel with superposition coding and imperfect channel estimation. 510-516
Volume 35, Number 2, March 2012
- Mesut Günes
, Yan Zhang:
In memory of Mieso Denko. 517 - Ming-Tuo Zhou, Hiroshi Harada
:
Cognitive maritime wireless mesh/ad hoc networks. 518-526 - Theofanis P. Lambrou, Christos G. Panayiotou
:
A testbed for coverage control using mixed wireless sensor networks. 527-537 - Joachim Fischer, Jens-Peter Redlich, Jochen Zschau, Claus Milkereit, Matteo Picozzi
, Kevin Fleming, Mihal Brumbulli, Björn Lichtblau, Ingmar Eveslage:
A wireless mesh sensing network for early warning. 538-547 - Evangelos Theodoridis, Ioannis Chatzigiannakis
, Stefan Dulman:
Post-processing in wireless sensor networks: Benchmarking sensor trace files for in-network data aggregation. 548-561 - Iván Corredor, José F. Martínez, Miguel S. Familiar
, Lourdes López-Santidrián
:
Knowledge-Aware and Service-Oriented Middleware for deploying pervasive services. 562-576 - Bo Yang, Mareboyana Manohar:
Similarity search in sensor networks using semantic-based caching. 577-583
- Mari Carmen Domingo
:
An overview of the Internet of Things for people with disabilities. 584-596 - Sajjad Rizvi, Hassaan Khaliq Qureshi, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. 597-605 - Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha
:
A comparison of wavelength reservation protocols for WDM optical networks. 606-618 - Chuan Zhu, Chunlin Zheng, Lei Shu
, Guangjie Han:
A survey on coverage and connectivity issues in wireless sensor networks. 619-632
- Jingyu Wang
, Jianxin Liao, Tonghong Li
:
OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer. 633-643 - Sanaa Sharafeddine
, Ibrahim Al-Kassem, Zaher Dawy:
A scatternet formation algorithm for Bluetooth networks with a non-uniform distribution of devices. 644-656 - Wenjie Zhang, Chai Kiat Yeo
:
Throughput and delay scaling laws for mobile overlaid wireless networks. 657-667 - Hoda Hassan, Mohamed Eltoweissy:
CORM: A reference model for future computer networks. 668-680 - Nicola Cordeschi
, Tatiana Patriarca, Enzo Baccarelli
:
Stochastic traffic engineering for real-time applications over wireless networks. 681-694 - Francisco Jurado
, Miguel A. Redondo
, Manuel Ortega
:
Using fuzzy logic applied to software metrics and test cases to assess programming assignments and give advice. 695-712 - Golnaz Vakili, Siavash Khorsandi:
Coordination of cooperation policies in a peer-to-peer system using swarm-based RL. 713-722 - Radim Burget, Dan Komosny
, Kathiravelu Ganeshan:
Topology aware feedback transmission for real-time control protocol. 723-730 - Mahboobeh Sedighizad, Babak Seyfe, Keivan Navaie
:
MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time. 731-742 - Yi-hua Zhu, Hui Xu, Kaikai Chi, Hua Hu:
Accumulating error-free frame blocks to improve throughput for IEEE 802.11-based WLAN. 743-752 - Carlos Miguel Tavares Calafate
, Giancarlo Fortino
, Sascha Fritsch, Jânio M. Monteiro
, Juan-Carlos Cano
, Pietro Manzoni
:
An efficient and robust content delivery solution for IEEE 802.11p vehicular environments. 753-762 - Xiong Li
, Yongping Xiong, Jian Ma, Wendong Wang:
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. 763-769 - Min-Feng Wang, Meng-Feng Tsai, Sie-Long Jheng, Cheng-Hsien Tang:
Social feature-based enterprise email classification without examining email contents. 770-777 - Waltenegus Dargie
:
A medium access control protocol that supports a seamless handover in wireless sensor networks. 778-786 - Rajesh Karunamurthy, Ferhat Khendek
, Roch H. Glitho
:
A novel architecture for Web service composition. 787-802 - George Kastaniotis, Elias K. Maragos, Christos Douligeris, Dimitris K. Despotis
:
Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies. 803-817 - Wen-Hwa Liao
, Hung-Chun Yang:
A power-saving data storage scheme for wireless sensor networks. 818-825 - Gildas Avoine, Xavier Carpent
, Benjamin Martin:
Privacy-friendly synchronized ultralightweight authentication protocols in the storm. 826-843 - Muhammad Imran, Mohamed F. Younis
, Abas Md Said, Halabi Hasbullah:
Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks. 844-856 - Mohit P. Tahiliani, K. C. Shet, T. G. Basavaraju:
CARED: Cautious Adaptive RED gateways for TCP/IP networks. 857-864
Volume 35, Number 3, May 2012
- Laurence Tianruo Yang, Guojun Wang:
Special issue on trusted computing and communications. 865-866 - Yanli Yu, Keqiu Li, Wanlei Zhou
, Ping Li:
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. 867-880 - Lei Jiang
, Lixin Ding, Jianxun Liu, Jinjun Chen:
Reputation rating modeling for open environment lack of communication by using online social cognition. 881-891 - Weizhong Qiang, Aleksandr Konstantinov, Deqing Zou, Laurence Tianruo Yang:
A standards-based interoperable single sign-on framework in ARC Grid middleware. 892-904 - Zhongtian Jia, Xiaodong Lin, Seng-Hua Tan, Lixiang Li
, Yixian Yang:
Public key distribution scheme for delay tolerant networks based on two-channel cryptography. 905-913 - Fei Wang, Furong Wang, Benxiong Huang, Laurence Tianruo Yang:
SONR: A reliable reputation system of self-organized network. 914-926 - Qin Liu, Guojun Wang, Jie Wu:
Secure and privacy preserving keyword searching for cloud storage services. 927-933 - Félix Gómez Mármol
, Gregorio Martínez Pérez
:
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. 934-941 - Mohammad-Amin Kharraz
, Hamid Sarbazi-Azad, Albert Y. Zomaya
:
On-demand multicast routing protocol with efficient route discovery. 942-950 - Huanyu Zhao, Xin Yang, Xiaolin Andy Li:
An incentive mechanism to reinforce truthful reports in reputation systems. 951-961 - Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Flexible service selection with user-specific QoS support in service-oriented architecture. 962-973 - Liang Gu, Guangdong Bai, Yao Guo
, Xiangqun Chen, Hong Mei:
Security model oriented attestation on dynamically reconfigurable component-based systems. 974-981 - Min Choi, Jong Hyuk Park, Seungho Lim, Young-Sik Jeong:
Achieving reliable system performance by fast recovery of branch miss prediction. 982-991 - Yu Wang
, Yang Xiang
, Wanlei Zhou
, Shunzheng Yu:
Generating regular expression signatures for network traffic classification in trusted network management. 992-1000 - Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. 1001-1012
- Ousmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene:
Real-time data management on wireless sensor networks: A survey. 1013-1021 - Wen Tao Zhu, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Detecting node replication attacks in wireless sensor networks: A survey. 1022-1034
- Jihao Yin, Yifei Wang
, Jiankun Hu
:
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration. 1035-1051 - Panho Lee, Anura P. Jayasumana, H. M. N. Dilum Bandara
, Sanghun Lim
, V. Chandrasekar:
A peer-to-peer collaboration framework for multi-sensor data fusion. 1052-1066 - Chao-Yang Lee
, Shou-Jen Lin, Chen-Wei Lee, Chu-Sing Yang:
An efficient continuous tracking system in real-time surveillance application. 1067-1073 - Rajashekhar C. Biradar
, Sunilkumar S. Manvi:
Neighbor supported reliable multipath multicast routing in MANETs. 1074-1085 - Jesús Gallardo
, Crescencio Bravo
, Miguel A. Redondo
:
A model-driven development method for collaborative modeling tools. 1086-1105 - S. Suraprasert, Jittat Fakcharoenphol
:
Comparison of recovery schemes to maximize restorable throughput in multicast networks. 1106-1115 - Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar:
Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams. 1116-1129 - Abderrahmane Baadache, Ali Belmehdi:
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. 1130-1139 - Michael C. Batistatos, George V. Tsoulos
, Georgia E. Athanasiadou:
Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges. 1140-1150 - Zubair A. Baig
:
Multi-agent systems for protecting critical infrastructures: A survey. 1151-1161 - Abhik Banerjee
, Chuan Heng Foh
, Chai Kiat Yeo
, Bu-Sung Lee
:
Performance improvements for network-wide broadcast with instantaneous network information. 1162-1174
Volume 35, Number 4, July 2012
- Alfredo Cuzzocrea
:
Intelligent algorithms for data-centric sensor networks. 1175-1176 - Aris A. Papadopoulos, Alfredo Navarra
, Julie A. McCann, Maria Cristina Pinotti
:
VIBE: An energy efficient routing protocol for dense and mobile sensor networks. 1177-1190 - Mark Roantree
, Jie Shi, Paolo Cappellari, Martin F. O'Connor, Michael Whelan, Niall Moyna:
Data transformation and query management in personal health sensor networks. 1191-1202 - Paolo Bellavista
, Giuseppe Cardone, Antonio Corradi
, Luca Foschini
:
The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency. 1203-1209 - Alfredo Cuzzocrea
, Alexis Papadimitriou, Dimitrios Katsaros, Yannis Manolopoulos:
Edge betweenness centrality: A novel algorithm for QoS-based topology control over wireless sensor networks. 1210-1217 - Gianluca Moro
, Gabriele Monti:
W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks. 1218-1234
- R. Madhusudhan, R. C. Mittal:
Dynamic ID-based remote user password authentication schemes using smart cards: A review. 1235-1248 - Jan von Mulert, Ian Welch
, Winston Khoon Guan Seah
:
Security threats and solutions in MANETs: A case study using AODV and SAODV. 1249-1259
- Chien-Fu Cheng
, Kuo-Tang Tsai:
Eventual strong consensus with fault detection in the presence of dual failure mode on processors under dynamic networks. 1260-1276 - Dong Kun Noh
, Junbeom Hur:
Using a dynamic backbone for efficient data delivery in solar-powered WSNs. 1277-1284 - Longxiang Gao, Ming Li, Alessio Bonti
, Wanlei Zhou
, Shui Yu
:
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models. 1285-1296 - Najme Mansouri, Gholamhosein Dastghaibyfard:
A dynamic replica management strategy in data grid. 1297-1303 - Kenneth J. Turner, Koon Leai Larry Tan:
Rigorous development of composite grid services. 1304-1316 - Mustapha Réda Senouci
, Abdelhamid Mellouk, Hadj Senouci, Amar Aissani
:
Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols. 1317-1328 - Hassen A. Mogaibel, Mohamed Othman, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid
:
On-demand channel reservation scheme for common traffic in wireless mesh networks. 1329-1351 - Elizabeth A. Thompson
, Nathan Clem, Isaac Renninger, Timothy Loos:
Software-defined GPS receiver on USRP-platform. 1352-1360 - Ameen M. Alkharasani, Mohamed Othman:
M2I2tswTCM: A new efficient optimization marker algorithm to improve fairness bandwidth in DiffServ networks. 1361-1366 - Miao Zhou, Yi Mu, Willy Susilo
, Jun Yan
, Liju Dong:
Privacy enhanced data outsourcing in the cloud. 1367-1373
- Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar:
Corrigendum to "Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams" [J. Network Comput. Appl. 35 (3) (2012) 1116-1129]. 1374