Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca40.bht:"
@article{DBLP:journals/jnca/AbdelazizE14, author = {Samar Abdelaziz and Mustafa ElNainay}, title = {Metric-based taxonomy of routing protocols for cognitive radio ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {151--163}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.001}, doi = {10.1016/J.JNCA.2013.09.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AbdelazizE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbolfazliSGXY14, author = {Saeid Abolfazli and Zohreh Sanaei and Abdullah Gani and Feng Xia and Laurence T. Yang}, title = {Rich Mobile Applications: Genesis, taxonomy, and open issues}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {345--362}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.009}, doi = {10.1016/J.JNCA.2013.09.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AbolfazliSGXY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbreuRM14, author = {Carlos Abreu and Manuel Ricardo and Paulo M. Mendes}, title = {Energy-aware routing for biomedical wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {270--278}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.015}, doi = {10.1016/J.JNCA.2013.09.015}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AbreuRM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ArabA14, author = {Mohsen Arab and Mohsen Afsharchi}, title = {Community detection in social networks using hybrid merging of sub-communities}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {73--84}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.008}, doi = {10.1016/J.JNCA.2013.08.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ArabA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ArshadiJ14, author = {Laleh Arshadi and Amir{-}Hossein Jahangir}, title = {Benford's law behavior of Internet traffic}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {194--205}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.007}, doi = {10.1016/J.JNCA.2013.09.007}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ArshadiJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChoiLL14, author = {Hyun{-}Ho Choi and Ki{-}Ho Lee and Jung{-}Ryun Lee}, title = {Energy-delay tradeoff analysis of user state transition mechanism for mobile web services}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {227--233}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.004}, doi = {10.1016/J.JNCA.2013.09.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChoiLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CiobanuRDMJ14, author = {Radu{-}Ioan Ciobanu and Daniel Guti{\'{e}}rrez{-}Reina and Ciprian Dobre and Sergio L. Toral Mar{\'{\i}}n and Princy Johnson}, title = {{JDER:} {A} history-based forwarding scheme for delay tolerant networks using Jaccard distance and encountered ration}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {279--291}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.012}, doi = {10.1016/J.JNCA.2013.09.012}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CiobanuRDMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ElfakiIMOS14, author = {Mohamed Ahmed Elfaki and Hamidah Ibrahim and Ali Mamat and Mohamed Othman and Ha{\"{\i}}dar Safa}, title = {Collaborative caching priority for processing requests in MANETs}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {85--96}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.013}, doi = {10.1016/J.JNCA.2013.08.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ElfakiIMOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FarzinvashD14, author = {Leili Farzinvash and Mehdi Dehghan}, title = {Multi-rate multicast routing in multi-gateway multi-channel multi-radio wireless mesh networks}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {46--60}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.009}, doi = {10.1016/J.JNCA.2013.08.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FarzinvashD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FraileG14, author = {Francisco Fraile and Juan Carlos Guerri}, title = {Simple models of the content duration and the popularity of television content}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {12--20}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.010}, doi = {10.1016/J.JNCA.2013.08.010}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/FraileG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuanC14, author = {Xinjie Guan and Baek{-}Young Choi}, title = {Push or pull? Toward optimal content delivery using cloud storage}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {234--243}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.003}, doi = {10.1016/J.JNCA.2013.09.003}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuanC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HoqueBBBK14, author = {Nazrul Hoque and Monowar H. Bhuyan and Ram Charan Baishya and D. K. Bhattacharyya and Jugal K. Kalita}, title = {Network attacks: Taxonomy, tools and systems}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {307--324}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.001}, doi = {10.1016/J.JNCA.2013.08.001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HoqueBBBK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HouLLB14, author = {Ronghui Hou and King{-}Shan Lui and Ka{-}Cheong Leung and Fred Baker}, title = {Performance analysis of quantization-based approximation algorithms for precomputing the supported QoS}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {244--254}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.010}, doi = {10.1016/J.JNCA.2013.09.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HouLLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuRXHH14, author = {Haiyang Hu and Yizhi Ren and Xu Xu and Liguo Huang and Hua Hu}, title = {Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {21--30}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.011}, doi = {10.1016/J.JNCA.2013.08.011}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HuRXHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiangXZZ14, author = {Dingde Jiang and Zhengzheng Xu and Peng Zhang and Ting Zhu}, title = {A transform domain-based anomaly detection approach to network-wide traffic}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {292--306}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.014}, doi = {10.1016/J.JNCA.2013.09.014}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JiangXZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiWXWHRZ14, author = {Ke Li and Sheng Wang and Shizhong Xu and Xiong Wang and Haojun Huang and Jin Ren and Bo Zhai}, title = {Evaluating the benefit of the core-edge separation on intradomain traffic engineering under uncertain traffic demand}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {216--226}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.005}, doi = {10.1016/J.JNCA.2013.09.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiWXWHRZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ParkCHY14, author = {Sehoon Park and Qichen Chen and Hyuck Han and Heon Y. Yeom}, title = {Design and evaluation of mobile offloading system for web-centric devices}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {105--115}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.006}, doi = {10.1016/J.JNCA.2013.08.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ParkCHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PerezLB14, author = {Francisco Maci{\'{a}} P{\'{e}}rez and Iren Lorenzo{-}Fonseca and Jos{\'{e}} Vicente Bern{\'{a}}{-}Mart{\'{\i}}nez}, title = {A formal framework for modelling complex network management systems}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {255--269}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.017}, doi = {10.1016/J.JNCA.2013.09.017}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PerezLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QuickC14, author = {Darren Quick and Kim{-}Kwang Raymond Choo}, title = {Google Drive: Forensic analysis of data remnants}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {179--193}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.016}, doi = {10.1016/J.JNCA.2013.09.016}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/QuickC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SharefAI14, author = {Baraa T. Sharef and Raed A. Alsaqour and Mahamod Ismail}, title = {Vehicular communication ad hoc routing protocols: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {363--396}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.008}, doi = {10.1016/J.JNCA.2013.09.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SharefAI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TangZNW14, author = {Jine Tang and ZhangBing Zhou and Jianwei Niu and Qun Wang}, title = {An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of Things}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.07.009}, doi = {10.1016/J.JNCA.2013.07.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TangZNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/VaradharajanT14, author = {Vijay Varadharajan and Udaya Kiran Tupakula}, title = {Counteracting security attacks in virtual machines in the cloud using property based attestation}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {31--45}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.002}, doi = {10.1016/J.JNCA.2013.08.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/VaradharajanT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangJQ14, author = {Jianwei Wang and Chen Jiang and Jianfei Qian}, title = {Robustness of Internet under targeted attack: {A} cascading failure perspective}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {97--104}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.007}, doi = {10.1016/J.JNCA.2013.08.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangJQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WhaiduzzamanSGB14, author = {Md Whaiduzzaman and Mehdi Sookhak and Abdullah Gani and Rajkumar Buyya}, title = {A survey on vehicular cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {325--344}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.004}, doi = {10.1016/J.JNCA.2013.08.004}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WhaiduzzamanSGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuWLW14, author = {Zhen Yu Wu and Ju{-}Chuan Wu and Sung{-}Chiang Lin and Charlotte Wang}, title = {An electronic voting mechanism for fighting bribery and coercion}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {139--150}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.011}, doi = {10.1016/J.JNCA.2013.09.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WuWLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XiaY14, author = {Yang Xia and Chai Kiat Yeo}, title = {Mobile Internet access over intermittent network connectivity}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {126--138}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.012}, doi = {10.1016/J.JNCA.2013.08.012}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/XiaY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YilmazDE14, author = {Onur Yilmaz and Orhan Dagdeviren and Kayhan Erciyes}, title = {Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {164--178}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.002}, doi = {10.1016/J.JNCA.2013.09.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YilmazDE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YinCCC14, author = {Peng{-}Yeng Yin and Ray{-}I Chang and Chih{-}Chiang Chao and Yen{-}Ting Chu}, title = {Niched ant colony optimization with colony guides for QoS multicast routing}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {61--72}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.003}, doi = {10.1016/J.JNCA.2013.08.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YinCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZengW14, author = {Lingfang Zeng and Yang Wang}, title = {Optimization on content service with local search in cloud of clouds}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {206--215}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.09.006}, doi = {10.1016/J.JNCA.2013.09.006}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZengW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhaoYYDYB14, author = {Peng Zhao and Xinyu Yang and Wei Yu and Chiyong Dong and Shusen Yang and Sulabh Bhattarai}, title = {Toward efficient estimation of available bandwidth for {IEEE} 802.11-based wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {40}, pages = {116--125}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.08.005}, doi = {10.1016/J.JNCA.2013.08.005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhaoYYDYB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.