


default search action
Journal of Network and Computer Applications, Volume 63
Volume 63, March 2016
- Divya Saxena
, Vaskar Raychoudhury
:
Radient: Scalable, memory efficient name lookup algorithm for named data networking. 1-13 - Daniel-Ioan Curiac
:
Towards wireless sensor, actuator and robot networks: Conceptual framework, challenges and perspectives. 14-23 - Mengmeng Ge, Kim-Kwang Raymond Choo
, Huai Wu, Yong Yu
:
Survey on key revocation mechanisms in wireless sensor networks. 24-38 - Meng Han
, Mingyuan Yan, Zhipeng Cai
, Yingshu Li
:
An exploration of broader influence maximization in timeliness networks with opportunistic selection. 39-49 - Wen-Hwa Liao
, Ssu-Chi Kuai, Chen Liu:
Efficient scheduling algorithm for multiple mobile subscriber stations with unsolicited grant service in an IEEE 802.16e network. 50-55 - Hasan Abdulwahid, Bin Dai, Benxiong Huang, Zijing Chen:
Scheduled-links multicast routing protocol in MANETs. 56-67 - Wazir Zada Khan
, Md. Shohrab Hossain
, Mohammed Y. Aalsalem
, Naufal M. Saad, Mohammed Atiquzzaman
:
A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs. 68-85 - Amrita Ghosal, Subir Halder
:
Lifespan prolonging location-wise predetermined deployment strategy for visual sensor networks. 86-97 - Stefano Avallone
, Giovanni Di Stasi
:
Design and implementation of WiMesh: A tool for the performance evaluation of multi-radio wireless mesh networks. 98-109 - Hao Zhu, Xiangke Liao, Cees de Laat, Paola Grosso
:
Joint flow routing-scheduling for energy efficient software defined data center networks: A prototype of energy-aware network management platform. 110-124 - Debao Wei, Libao Deng, Peng Zhang, Liyan Qiao, Xiyuan Peng:
A page-granularity wear-leveling (PGWL) strategy for NAND flash memory-based sink nodes in wireless sensor networks. 125-139 - Álvaro López García
, Enol Fernández-del-Castillo
:
Efficient image deployment in cloud environments. 140-149 - Osamah Ibrahiem Abdullaziz, Vik Tor Goh
, Huo-Chong Ling
, KokSheik Wong
:
AIPISteg: An active IP identification based steganographic method. 150-158 - Emanuel F. Coutinho, Paulo A. L. Rego
, Danielo Goncalves Gomes
, José N. de Souza
:
Physics and microeconomics-based metrics for evaluating cloud computing elasticity. 159-172 - Diego Kreutz
, Oleksandr Malichevskyy, Eduardo Feitosa
, Hugo Cunha, Rodrigo da Rosa Righi, Douglas D. J. de Macedo
:
A cyber-resilient architecture for critical security services. 173-189 - Javier Suárez, José Quevedo
, Iván Vidal
, Daniel Corujo
, Jaime García-Reinoso
, Rui L. Aguiar
:
A secure IoT management architecture based on Information-Centric Networking. 190-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.