


default search action
Journal of Network and Computer Applications, Volume 64
Volume 64, April 2016
- Gilberto Fernandes Jr.
, Luiz Fernando Carvalho
, Joel J. P. C. Rodrigues, Mario Lemes Proença Jr.
:
Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization. 1-11 - Syam Kumar Pasupuleti
, Subramanian Ramalingam, Rajkumar Buyya:
An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. 12-22 - Jiangtao Zhang, Hejiao Huang, Xuan Wang:
Resource provision algorithms in cloud computing: A survey. 23-42 - Elias Chavarria Reyes
, Etimad A. Fadel
, Suleiman Almasri, Muhammad Ghulam Abbas Malik:
Reducing the energy consumption at the user equipment through multi-stream cross-carrier-aware discontinuous reception (DRX) in LTE-advanced systems. 43-61 - Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi
, Nilo Redini, Alessio Vecchio
:
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks. 62-75 - Waqar Asif
, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
Combined Banzhaf & Diversity Index (CBDI) for critical node detection. 76-88 - Lien-Wu Chen:
Cooperative energy-efficient localization with node lifetime extension in mobile long-thin networks. 89-97 - Debdeep Paul
, Wen-De Zhong, Sanjay K. Bose
:
Energy efficient cloud service pricing: A two-timescale optimization approach. 98-112 - Michel Barbeau
, Gimer Cervera, Joaquín García-Alfaro
, Evangelos Kranakis
:
Channel selection using a multiple radio model. 113-123 - Márcio Melo, Susana Sargento, Jorge Carapinha
:
Optimal virtual network migration: A step closer for seamless resource mobility. 124-136 - Yongrui Qin
, Quan Z. Sheng
, Nickolas J. G. Falkner, Schahram Dustdar
, Hua Wang
, Athanasios V. Vasilakos
:
When things matter: A survey on data-centric internet of things. 137-153 - Mustapha Réda Senouci
, Abdelhamid Mellouk, Nadjib Aitsaadi, Latifa Oukhellou
:
Fusion-based surveillance WSN deployment using Dempster-Shafer theory. 154-166 - Yan Liu, Shun-Zheng Yu:
Network coding-based multisource content delivery in Content Centric Networking. 167-175 - Atiq Ur Rahman, Abdulrahman Alharby
, Halabi Hasbullah, Khalid Almuzaini
:
Corona based deployment strategies in wireless sensor network: A survey. 176-193 - Cheng Zhan, Fuyuan Xiao:
Coding based wireless broadcast scheduling in real time applications. 194-203 - Lingzhi Li
, Zhe Yang
, Jin Wang, Shukui Zhang, Yanqin Zhu:
Network coding with crowdsourcing-based trajectory estimation for vehicular networks. 204-215 - Fabio Rafael Segundo
, Eraldo Silveira e Silva, Jean-Marie Farines:
A DTN routing strategy based on neural networks for urban bus transportation system. 216-228 - Bahareh Alami Milani, Nima Jafari Navimipour
:
A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions. 229-238 - Hashim A. Hashim
, Babajide Odunitan Ayinde, Mohammad A. Abido:
Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm. 239-248

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.