


default search action
Journal of Network and Computer Applications, Volume 36
Volume 36, Number 1, January 2013
- Abdelkrim Hadjidj, Marion Souil, Abdelmadjid Bouabdallah, Yacine Challal

, Henry L. Owen:
Wireless sensor networks for rehabilitation applications: Challenges and opportunities. 1-15 - Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung:

Intrusion detection system: A comprehensive review. 16-24 - Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari

, Joaquim Celestino Júnior:
An intrusion detection and prevention system in cloud computing: A systematic review. 25-41 - Chirag Modi

, Dhiren R. Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan:
A survey of intrusion detection techniques in Cloud. 42-57 - Fadoua Mhiri, Kaouthar Sethom, Ridha Bouallegue

:
A survey on interference management techniques in femtocell self-organizing networks. 58-65 - Md. Mahedi Hassan

, Poo Kuan Hoong
:
Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain. 66-76 - Rodrigo Palucci Pantoni, Dennis Brandão

:
A gradient based routing scheme for street lighting wireless sensor networks. 77-90 - D. Satish Kumar, N. Nagarajan:

Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks. 91-102 - Christos Emmanouilidis

, Remous-Aris Koutsiamanis, Aimilia Tasidou:
Mobile guides: Taxonomy of architectures, context awareness, technologies and applications. 103-125 - Saleem-Ullah Lar, Xiaofeng Liao:

An initiative for a classified bibliography on TCP/IP congestion control. 126-133 - A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar

:
Wireless Sensor Network transport protocol: A critical review. 134-146
- Slimane Bah, Roch H. Glitho

, Rachida Dssouli:
A SIP servlets-based framework for service provisioning in stand-alone MANETs. 147-155 - Seung-Wan Han, In-Seon Jeong, Seung-Ho Kang:

Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks. 156-166 - Junjie Xiong, Yangfan Zhou, Michael R. Lyu, Evan F. Y. Young:

MDiag: Mobility-assisted diagnosis for wireless sensor networks. 167-177 - Wen Tao Zhu:

Towards secure and communication-efficient broadcast encryption systems. 178-186 - Bing Hu, Kwan L. Yeung, Zhaoyang Zhang

:
An efficient single-iteration single-bit request scheduling algorithm for input-queued switches. 187-194 - Kemal Akkaya, Izzet F. Senturk

, Shanthi Vemulapalli:
Handling large-scale node failures in mobile sensor/robot networks. 195-210 - Zhanfeng Wang, Ming Chen, Chang-you Xing, Jing Feng, Xianglin Wei, Huali Bai:

Multi-manifold model of the Internet delay space. 211-218 - Jeroen Famaey

, Frédéric Iterbeke, Tim Wauters, Filip De Turck
:
Towards a predictive cache replacement strategy for multimedia content. 219-227 - Huan Dai, Zhaomin Zhu, Xiao-Feng Gu

:
Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network. 228-234 - Adeela Waqar

, Asad Raza, Haider Abbas
, Muhammad Khurram Khan
:
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata. 235-248 - Pekka Jäppinen, Renata Guarneri

, Luís M. Correia:
An applications perspective into the Future Internet. 249-254 - Isabel de la Torre Díez

, Saúl Álvaro-Muñoz, Miguel López Coronado, Joel J. P. C. Rodrigues:
Development and performance evaluation of a new RSS tool for a Web-based system: RSS_PROYECT. 255-261 - Marjan Naderan Tahan, Mehdi Dehghan

, Hossein Pedram:
Sensing task assignment via sensor selection for maximum target coverage in WSNs. 262-273 - Reinaldo Bezerra Braga

, Igor A. Chaves, Carina Teixeira de Oliveira
, Rossana M. C. Andrade
, José Neuman de Souza
, Hervé Martin, Bruno Schulze
:
RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments. 274-283 - Lo-Yao Yeh, Chun-Chuan Yang, Jee-Gong Chang, Yi-Lang Tsai:

A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs. 284-292 - Minwoo Kim, Karam Park, Won Woo Ro:

Benefits of using parallelized non-progressive network coding. 293-305 - Ting Yang, Yugeng Sun, Javid Taheri

, Albert Y. Zomaya
:
DLS: A dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks. 306-315 - Kaiping Xue

, Changsha Ma, Peilin Hong, Rong Ding:
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. 316-323 - Md. Rafiqul Islam

, Jemal H. Abawajy:
A multi-tier phishing detection and filtering approach. 324-335 - Vishnu Monn Baskaran, Yoong Choon Chang

, Jonathan Loo
, KokSheik Wong
:
Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing. 336-352 - Mingfu Li

, Yueh-Lin Wu, Chia-Rong Chang:
Available bandwidth estimation for the network paths with multiple tight links and bursty traffic. 353-367 - Fadi M. Al-Turjman, Hossam S. Hassanein

, Mohamed Ibnkahla:
Quantifying connectivity in wireless sensor networks with grid-based deployments. 368-377 - Xun Yi, Eiji Okamoto:

Practical Internet voting system. 378-387 - Yuehua Wang, Zhong Zhou

, Ling Liu, Wei Wu:
Replica-aided load balancing in overlay networks. 388-401 - Domenico Rosaci

, Giuseppe M. L. Sarnè:
Cloning mechanisms to improve agent performances. 402-408 - Mohsen Hooshmand, S. Mohamad R. Soroushmehr, Pejman Khadivi, Shadrokh Samavi, Shahram Shirani:

Visual sensor network lifetime maximization by prioritized scheduling of nodes. 409-419 - Weigang Hou, Lei Guo

, Xiaoxue Gong:
Survivable power efficiency oriented integrated grooming in green networks. 420-428 - Jesús L. Alvaro, Beatriz Barros

:
A new cloud computing architecture for music composition. 429-443 - I-Hsuan Peng, Yen-Wen Chen:

Energy consumption bounds analysis and its applications for grid based wireless sensor networks. 444-451 - Khaled Salah

, Mohamed Hamawi:
Performance of IP-forwarding of Linux hosts with multiple network interfaces. 452-465 - Imran Baig

, Muhammad Ayaz
, Varun Jeoti:
On the peak-to-average power ratio reduction in mobile WiMAX: A discrete cosine transform matrix precoding based random-interleaved orthogonal frequency division multiple access uplink system. 466-475 - Mary Looney, Oliver Gough:

A provision aware proportional fair sharing three colour marker. 476-483 - María-Victoria Belmonte

, Manuel Díaz
, José-Luis Pérez-de-la-Cruz, Ana Reyna:
COINS: COalitions and INcentiveS for effective Peer-to-Peer downloads. 484-497 - Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Yaoyu Zhang:

An novel three-party authenticated key exchange protocol using one-time key. 498-503 - Eugénia Moreira Bernardino, Anabela Moreira Bernardino, Juan Manuel Sánchez-Pérez, Juan Antonio Gómez Pulido

, Miguel A. Vega-Rodríguez
:
Swarm optimisation algorithms applied to large balanced communication networks. 504-522 - Haythem Bany Salameh

, Osamah S. Badarneh:
Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks. 523-532 - Ting-Yi Chang, Yan-Ru Ke:

A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system. 533-542 - Sepideh Adabi

, Ali Movaghar
, Amir Masoud Rahmani
, Hamid Beigy
:
Market_based grid resource allocation using new negotiation model. 543-565
Volume 36, Number 2, March 2013
- Bingdong Li, Jeff Springer, George Bebis, Mehmet Hadi Gunes:

A survey of network flow applications. 567-581 - Shams Qazi, Raad Raad, Yi Mu, Willy Susilo

:
Securing DSR against wormhole attacks in multirate ad hoc networks. 582-592 - Ahmed Hassan Mohammed, Bin Dai, Benxiong Huang, Muhammad Azhar Iqbal, Guan Xu, Peng Qin, Shui Yu

:
A survey and tutorial of wireless relay network protocols based on network coding. 593-610 - Xiaobing He, Michael Niedermeier

, Hermann de Meer:
Dynamic key management in wireless sensor networks: A survey. 611-622 - Sudhanshu Tyagi

, Neeraj Kumar
:
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. 623-645 - Md. Rafiqul Islam

, Ronghua Tian, Lynn Margaret Batten, Steven Versteeg:
Classification of malware based on integrated static and dynamic features. 646-656
- Kun Huang, Gaogang Xie, Rui Li, Shuai Xiong:

Fast and deterministic hash table lookup using discriminative bloom filters. 657-666 - Chiapin Wang:

Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approach. 667-676 - Eyüp S. Canlar, Mauro Conti

, Bruno Crispo, Roberto Di Pietro
:
Windows Mobile LiveSD Forensics. 677-684 - Sardar Muhammad Bilal, Carlos Jesus Bernardos

, Carmen Guerrero
:
Position-based routing in vehicular networks: A survey. 685-697 - Mathias Kretschmer, Philipp Batroff, George Ghinea

:
Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies. 698-710 - Najme Mansouri, Gholamhosein Dastghaibyfard, Ehsan Mansouri

:
Combination of data replication and scheduling algorithm for improving data availability in Data Grids. 711-722 - Dimitris C. Vasiliadis

, George E. Rizos, Costas Vassilakis
:
Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively 2-class priority routing traffic. 723-737 - Shiliang Luo, Xu Lu, Lianglun Cheng:

TSOIA: An efficient node selection algorithm facing the uncertain process for Internet of Things. 738-743 - Gimer Cervera, Michel Barbeau

, Joaquín García-Alfaro
, Evangelos Kranakis
:
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs. 744-755 - Kuang-Yow Lian

, Sung-Jung Hsiao, Wen-Tsai Sung
:
Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks. 756-767 - Po-Ching Lin, Jia-Hau Lee:

Re-examining the performance bottleneck in a NIDS with detailed profiling. 768-780 - Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia

:
Quantitative survivability evaluation of three virtual machine-based server architectures. 781-790 - Chuan Xu, C. Du, Guofeng Zhao, Shui Yu

:
A novel model for user clicks identification based on hidden semi-Markov. 791-798 - Jian An, Xiaolin Gui, Wendong Zhang, Jinghua Jiang, Jianwei Yang:

Research on social relations cognitive model of mobile nodes in Internet of Things. 799-810 - Yanheng Liu, Longxiang Suo, Dayang Sun, Aimin Wang:

A virtual square grid-based coverage algorithm of redundant node for wireless sensor network. 811-817 - Peng Xiao, Zhigang Hu, Dongbo Liu, Guofeng Yan, Xilong Qu:

Virtual machine power measuring technique with bounded error in cloud environments. 818-828 - Gaik-Yee Chan, Chien-Sing Lee

, Swee-Huay Heng
:
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. 829-842 - Yuhuai Peng, Yao Yu, Lei Guo, Dingde Jiang, Qiming Gai:

An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks. 843-857 - Shahram Jamali, Seyyed Naser Seyyed Hashemi

, Amir-Masoud Eftekhari-Moghadam
:
On the use of a full information feedback to stabilize RED. 858-869 - Abraham Martín-Campillo, Jon Crowcroft, Eiko Yoneki, Ramon Martí

:
Evaluating opportunistic networks in disaster scenarios. 870-880 - Mahesh Kumar, Shishir Kumar:

AGRIB-BHF: A sustainable and fault tolerant aggregation. 881-886 - Mahmoud Al-shugran, Osman Ghazali, Suhaidi Hassan

, Kashif Nisar
, A. Suki M. Arif:
A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network. 887-897 - Laisen Nie, Dingde Jiang, Lei Guo:

A power laws-based reconstruction approach to end-to-end network traffic. 898-907 - Enver Ever

, Orhan Gemikonakli
, Altan Koçyigit
, Eser Gemikonakli:
A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues. 908-926 - Hu Xiong, Zhong Chen, Fagen Li:

New identity-based three-party authenticated key agreement protocol with provable security. 927-932 - Kashif Nisar

, Angela Amphawan, Suhaidi Hassan
, Nurul I. Sarkar
:
A comprehensive survey on scheduler for VoIP over WLAN. 933-948 - Mohamed K. Watfa

, Haitham Al-Hassanieh
, Samir Salmen:
A novel solution to the energy hole problem in sensor networks. 949-958
Volume 36, Number 3, May 2013
- Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:

Guest Editorial on Vehicular Networking Protocols. 959-960 - António Fonseca, Teresa Maria Vazão

:
Applicability of position-based routing for VANET in highways and urban environment. 961-973 - Rajashree Nair, Ben Soh, Naveen K. Chilamkurti, Jong Hyuk Park:

Structure-free message aggregation and routing in traffic information system (SMART). 974-980 - Salim Bitam

, Abdelhamid Mellouk:
Bee life-based multi constraints multicast routing optimization for vehicular ad hoc networks. 981-991 - Zhenxia Zhang, Azzedine Boukerche, Hussam M. Soliman Ramadan:

Design and evaluation of a fast MAC layer handoff management scheme for WiFi-based multichannel Vehicular Mesh Networks. 992-1000 - Angelos Antonopoulos

, Charalabos Skianis, Christos V. Verikoukis:
Network coding-based cooperative ARQ scheme for VANETs. 1001-1007 - Navid Tadayon, Sasan Khoshroo, Elaheh Askari, Honggang Wang

, Howard Michel:
Power management in SMAC-based energy-harvesting wireless sensor networks using queuing analysis. 1008-1017 - Youxiang Wang, Jianquan Wang, Zhaobiao Lu, Xingang Liu:

Performance improvement of QO-STBC over time-selective channel for wireless network. 1018-1026 - Jaime Lloret, Alejandro Canovas

, Angel Catala, Miguel Garcia
:
Group-based protocol and mobility model for VANETs to offer internet access. 1027-1038
- Md. Humayun Kabir, Mohammad Mukhtaruzzaman, Mohammed Atiquzzaman

:
Efficient route optimization scheme for nested-NEMO. 1039-1049 - Liren Zhang, Abderrahmane Lakas

, Hesham El-Sayed, Ezedin Barka:
Mobility analysis in vehicular ad hoc network (VANET). 1050-1056 - Yejun Liu, Qingyang Song, Rui Ma, Bing Li, Bo Gong:

Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network. 1057-1069 - Jian-Zhen Luo, Shun-Zheng Yu:

Position-based automatic reverse engineering of network protocols. 1070-1077 - Masoud Zarifneshat, Pejman Khadivi:

Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models. 1078-1090
Volume 36, Number 4, July 2013
- Ebrahim Mahdipour, Amir Masoud Rahmani

, Saeed Setayeshi
:
Importance sampling for Jackson networks with customer impatience until the end of service. 1091-1101 - Christophe Dumez, Mohamed Bakhouya

, Jaafar Gaber
, Maxime Wack, Pascal Lorenz
:
Model-driven approach supporting formal verification for web service composition protocols. 1102-1115 - Nader Mohamed, Jameela Al-Jaroodi, Abdulla Eid:

A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud. 1116-1130 - Ammar Haider, Iqbal Gondal

, Joarder Kamruzzaman
:
Social-connectivity-aware vertical handover for heterogeneous wireless networks. 1131-1139 - A. Cagatay Talay, D. Turgay Altilar

:
Self adaptive routing for dynamic spectrum access in cognitive radio networks. 1140-1151 - Jasone Astorga

, Marina Aguado
, Nerea Toledo
, Marivi Higuero
:
A high performance link layer mobility management strategy for professional private broadband networks. 1152-1163 - Chien-Chao Tseng

, Chia-Liang Lin, Li-Hsing Yen
, Jyun-Yan Liu, Cheng-Yuan Ho:
Can: A context-aware NAT traversal scheme. 1164-1173 - Geetha Dundesh Devanagavi

, N. Nalini
, Rajashekhar C. Biradar
:
Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach. 1174-1185 - Chao-Yang Lee

, Liang-Cheng Shiu, Fu-Tian Lin, Chu-Sing Yang:
Distributed topology control algorithm on broadcasting in wireless sensor network. 1186-1195 - El-Sayed M. El-Alfy

, Mujahid N. Syed
, Shokri Z. Selim
:
A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks. 1196-1207 - Ying-Dar Lin, Cheng-Yuan Ho, Yuan-Cheng Lai, Tzu-Hsiung Du, Shun-Lee Chang:

Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems. 1208-1218 - Anwar Saif, Mohamed Othman:

SRA-MSDU: Enhanced A-MSDU frame aggregation with selective retransmission in 802.11n wireless networks. 1219-1229 - Muhammad Hamad Alizai, Hanno Wirtz, Bernhard Kirchen, Klaus Wehrle

:
Portable wireless-networking protocol evaluation. 1230-1242
- Mohammad Masdari, Sadegh Mohammadzadeh Bazarchi, Moazam Bidaki

:
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks. 1243-1260 - Aishwarya Bakshi, Amir Talaei-Khoei, Pradeep Ray

:
Adaptive policy framework: A systematic review. 1261-1271
Volume 36, Number 5, September 2013
- Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:

Guest editorial on vehicular communications and applications. 1273-1274 - Claudia Campolo

, Hector Agustin Cozzetti, Antonella Molinaro, Riccardo Scopigno:
Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks. 1275-1286 - Yazhi Liu, Jianwei Niu

, Jian Ma, Lei Shu
, Takahiro Hara, Wendong Wang:
The insights of message delivery delay in VANETs with a bidirectional traffic model. 1287-1294 - Ramon Bauza, Javier Gozálvez

:
Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications. 1295-1307 - Nitin Maslekar, Joseph Mouzna, Mounir Boussedjra, Houda Labiod:

CATS: An adaptive traffic signal system based on car-to-car communication. 1308-1315 - Kai Lin:

Research on adaptive target tracking in vehicle sensor networks. 1316-1323 - Nerea Toledo

, Jean-Marie Bonnin, Marivi Higuero
:
Performance evaluation of user applications in the ITS scenario: An analytical assessment of the NeMHIP. 1324-1336 - Carlos Gañán

, Jose L. Muñoz
, Oscar Esparza
, Jorge Mata-Díaz, Juan Hernández-Serrano
, Juanjo Alins:
COACH: COllaborative certificate stAtus CHecking mechanism for VANETs. 1337-1351 - Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:

Privacy preserving broadcast message authentication protocol for VANETs. 1352-1364
- Xiong Li

, Jianwei Niu
, Muhammad Khurram Khan
, Junguo Liao:
An enhanced smart card based remote user password authentication scheme. 1365-1371 - Hai Van Luu, Xueyan Tang:

Constructing rings overlay for robust data collection in wireless sensor networks. 1372-1386 - Ting Chen, Xiaosong Zhang, Hong-yuan Li, Dong Wang, Yue Wu:

Propagation modeling of active P2P worms based on ternary matrix. 1387-1394 - Sulma Rashid, Abdul Hanan Abdullah, Qaisar Ayub, Mohd Soperi Mohd Zahid

:
Dynamic Prediction based Multi Queue (DPMQ) drop policy for probabilistic routing protocols of delay tolerant network. 1395-1402
Volume 36, Number 6, November 2013
- Weiming Shen

, Weidong Li:
Collaboration technologies and applications. 1403-1404 - Steven Latré

, Jeroen Famaey
, John Strassner, Filip De Turck
:
Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation. 1405-1417 - Yuanhao Xu, Guofu Yin, Yong Nie, Zhengwei He, Xiaolin Dai:

Research on an active knowledge push service based on collaborative intent capture. 1418-1430 - Tao Wu

, Xiaobing Pei, Yongzhong Lu, Changqing Chen, Liang Gao
:
A distributed collaborative product design environment based on semantic norm model and role-based access control. 1431-1440 - Amy J. C. Trappey, Charles V. Trappey

, Chun-Yi Wu
, Chin-Yuan Fan
, Yi-Liang Lin:
Intelligent patent recommendation system for innovative design collaboration. 1441-1450 - Diego Carvalho Soares, Flávia Maria Santoro, Fernanda Araújo Baião

:
Discovering collaborative knowledge-intensive processes through e-mail mining. 1451-1465 - Pedro Antunes

, David Simões
, Luís Carriço
, José A. Pino:
An end-user approach to business process modeling. 1466-1479 - Rahat Iqbal

, Nazaraf Shah
, Anne E. James
, Tomasz Cichowicz:
Integration, optimization and usability of enterprise applications. 1480-1488 - Leijie Fu, Pingyu Jiang, Wei Cao:

Modeling and performance analysis of product development process network. 1489-1502 - Ta-Ping Lu, Amy J. C. Trappey, Yi-Kuang Chen, Yu-Da Chang:

Collaborative design and analysis of supply chain network management key processes model. 1503-1511 - Yuan Cheng, Fazhi He, Xiantao Cai, Dejun Zhang:

A group Undo/Redo method in 3D collaborative modeling systems with performance evaluation. 1512-1522 - Jiancheng Shi, Jianhua Liu, Ruxin Ning, Weiwei Hou:

A collisions evaluation method in virtual environment for collaborativeassembly. 1523-1530 - Bin Guo, Daqing Zhang, Zhu Wang

, Zhiwen Yu, Xingshe Zhou:
Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things. 1531-1539 - Yang Yang, Xinyu Li, Liang Gao

, Xinyu Shao:
A new approach for predicting and collaborative evaluating the cutting force in face milling based on gene expression programming. 1540-1550 - Jesús Gallardo

, Ana I. Molina
, Crescencio Bravo
, Miguel A. Redondo
:
A model-driven and task-oriented method for the development of collaborative systems. 1551-1565 - María-Blanca Ibáñez-Espiga, José Jesús García Rueda, David Maroto, Carlos Delgado Kloos

:
Collaborative learning in multi-user virtual environments. 1566-1576
- Weiming Shen

, Weidong Li:
Collaboration computing technologies and applications. 1577-1578 - Dujuan Gu, Xiaohan Liu, Gang Qin, Shuangjian Yan, Ze Luo, Baoping Yan:

VNET6: IPv6 virtual network for the collaboration between applications and networks. 1579-1588 - Anbazhagan Rajesh, Rangaswamy Nakkeeran:

Investigation on uplink collaborative contention-based bandwidth request for WiMAX three hop relay networks. 1589-1598 - Yuanyuan Pan, Jianqing Li

:
Cooperative pseudonym change scheme based on the number of neighbors in VANETs. 1599-1609 - Damià Castellà Martínez, Francesc Giné

, Francesc Solsona
, Josep L. Lérida
:
Analyzing locality over a P2P computing architecture. 1610-1619 - Josep Rius

, Fernando Cores
, Francesc Solsona
:
Cooperative scheduling mechanism for large-scale peer-to-peer computing systems. 1620-1631 - Sheng-Cheng Yeh, Ming-Yang Su, Hui-Hui Chen, Chun-Yuen Lin:

An efficient and secure approach for a cloud collaborative editing. 1632-1641 - Hongchen Wu, Xinjun Wang, Zhaohui Peng, Qingzhong Li:

Div-clustering: Exploring active users for social collaborative recommendation. 1642-1650 - Li Ho Leung, Vincent T. Y. Ng

:
Discovering associations between news and contents in social network sites with the D-Miner service framework. 1651-1659 - Xiaogang Wang, Ming Yang, Junzhou Luo:

A novel sequential watermark detection model for efficient traceback of secret network attack flows. 1660-1670 - Jian Jiang, Wei Li, Junzhou Luo, Jing Tan:

A network accountability based verification mechanism for detecting inter-domain routing path inconsistency. 1671-1683 - Junping Wang, Qiliang Zhu, Yan Ma:

An agent-based hybrid service delivery for coordinating internet of things and 3rd party service providers. 1684-1695 - Wenfeng Li

, Ye Zhong, Xun Wang, Yulian Cao
:
Resource virtualization and service selection in cloud logistics. 1696-1704
- Mojtaba Seyedzadegan, Mohamed Othman, Borhanuddin Mohd Ali, Shamala Subramaniam:

Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks. 1705-1723 - Wu-Hsiao Hsu, Yuh-Pyng Shieh:

Virtual network mapping algorithm in the cloud infrastructure. 1724-1734 - Juan Felipe Botero

, Miguel Molina, Xavier Hesselbach-Serra
, José Roberto Amazonas:
A novel paths algebra-based strategy to flexibly solve the link mapping stage of VNE problems. 1735-1752

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














