Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca50.bht:"
@article{DBLP:journals/jnca/AiashL15, author = {Mahdi Aiash and Jonathan Loo}, title = {An integrated authentication and authorization approach for the network of information architecture}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {73--79}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.004}, doi = {10.1016/J.JNCA.2014.06.004}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AiashL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlzahraniRRV15, author = {Bander A. Alzahrani and Martin J. Reed and Janne Riihij{\"{a}}rvi and Vassilios G. Vassilakis}, title = {Scalability of information centric networking using mediated topology management}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {126--133}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.07.002}, doi = {10.1016/J.JNCA.2014.07.002}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AlzahraniRRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AmadeoCM15, author = {Marica Amadeo and Claudia Campolo and Antonella Molinaro}, title = {Forwarding strategies in named data wireless ad hoc networks: Design and evaluation}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {148--158}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.007}, doi = {10.1016/J.JNCA.2014.06.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AmadeoCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DaghighiKSR15, author = {Babak Daghighi and Miss Laiha Mat Kiah and Shahaboddin Shamshirband and Muhammad Habib Ur Rehman}, title = {Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.001}, doi = {10.1016/J.JNCA.2014.11.001}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/DaghighiKSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/EumSMN15, author = {Suyong Eum and Yozo Shoji and Masayuki Murata and Nozomu Nishinaga}, title = {Design and implementation of ICN-enabled {IEEE} 802.11 access points as nano data centers}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {159--167}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.07.031}, doi = {10.1016/J.JNCA.2014.07.031}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/EumSMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Gonzalez-Manzano15, author = {Lorena Gonz{\'{a}}lez{-}Manzano and Agust{\'{\i}}n Orfila}, title = {An efficient confidentiality-preserving Proof of Ownership for deduplication}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {49--59}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.12.004}, doi = {10.1016/J.JNCA.2014.12.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Gonzalez-Manzano15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KimLKK15, author = {Dabin Kim and Sung{-}Won Lee and Young{-}Bae Ko and Jaehoon Kim}, title = {Cache capacity-aware content centric networking under flash crowds}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {101--113}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.008}, doi = {10.1016/J.JNCA.2014.06.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KimLKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LooA15, author = {Jonathan Loo and Mahdi Aiash}, title = {Special issue on information-centric network architecture, protocols, algorithms and applications}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {60--63}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.003}, doi = {10.1016/J.JNCA.2014.11.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LooA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LooA15a, author = {Jonathan Loo and Mahdi Aiash}, title = {Challenges and solutions for secure information centric networks: {A} case study of the NetInf architecture}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {64--72}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.003}, doi = {10.1016/J.JNCA.2014.06.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LooA15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Mendes15, author = {Paulo Mendes}, title = {Combining data naming and context awareness for pervasive networks}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {114--125}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.09.015}, doi = {10.1016/J.JNCA.2014.09.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Mendes15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NieJ015, author = {Laisen Nie and Dingde Jiang and Lei Guo}, title = {A convex optimization-based traffic matrix estimation approach in IP-over-WDM backbone networks}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {32--38}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.12.001}, doi = {10.1016/J.JNCA.2014.12.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/NieJ015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QiaoNPGCSC15, author = {Xiuquan Qiao and Guoshun Nan and Yue Peng and Lei Guo and Jingwen Chen and Yunlei Sun and Junliang Chen}, title = {NDNBrowser: An extended web browser for named data networking}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {134--147}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.009}, doi = {10.1016/J.JNCA.2014.06.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/QiaoNPGCSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SaleemRZ15, author = {Yasir Saleem and Mubashir Husain Rehmani and Sherali Zeadally}, title = {Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {15--31}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.12.002}, doi = {10.1016/J.JNCA.2014.12.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SaleemRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/StaisXV15, author = {Charilaos Stais and George Xylomenos and Alexios Voulimeneas}, title = {A reliable multicast transport protocol for information-centric networks}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {92--100}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.006}, doi = {10.1016/J.JNCA.2014.06.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/StaisXV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XuMXJLW15, author = {Mingwei Xu and Zhongxing Ming and Chunmei Xia and Jia Ji and Dan Li and Dan Wang}, title = {{SIONA:} {A} Service and Information Oriented Network Architecture}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {80--91}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.010}, doi = {10.1016/J.JNCA.2014.06.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/XuMXJLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZengVZ15, author = {Lingfang Zeng and Bharadwaj Veeravalli and Albert Y. Zomaya}, title = {An integrated task computation and data management scheduling strategy for workflow applications in cloud environments}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {39--48}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.01.001}, doi = {10.1016/J.JNCA.2015.01.001}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZengVZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangDZZW15, author = {Lingwei Zhang and Yuhui Deng and Weiheng Zhu and Jipeng Zhou and Frank Wang}, title = {Skewly replicating hot data to construct a power-efficient storage cluster}, journal = {J. Netw. Comput. Appl.}, volume = {50}, pages = {168--179}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.06.005}, doi = {10.1016/J.JNCA.2014.06.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangDZZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.