Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Network and Computer Applications, Volume 80
Volume 80, February 2017
- Ting Lu, Guohua Liu, Wei Li, Shan Chang, Wenjing Guo:
Distributed sampling rate allocation for data quality maximization in rechargeable sensor networks. 1-9 - Prasan Kumar Sahoo, Jang-Ping Sheu:
Design and analysis of collision free MAC for wireless sensor networks with or without data retransmission. 10-21 - L. Manunza, S. Marseglia, Simon Pietro Romano:
Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. 22-34 - Chunhong Liu, Chuanchang Liu, Yanlei Shang, Shiping Chen, Bo Cheng, Junliang Chen:
An adaptive prediction approach based on workload pattern discrimination in the cloud. 35-44 - Fan Deng, Li-Yong Zhang:
Elimination of policy conflict to improve the PDP evaluation performance. 45-57 - Núria Busom Figueres, Ronald Petrlic, Francesc Sebé, Christoph Sorge, Magda Valls:
A privacy-preserving reputation system with user rewards. 58-66 - Habib Mostafaei, Antonio Montieri, Valerio Persico, Antonio Pescapè:
A sleep scheduling approach based on learning automata for WSN partial coverage. 67-78 - Mohammad Masdari:
Markov chain-based evaluation of the certificate status validations in hybrid MANETs. 79-89 - Jihong Wang, Wenxiao Shi:
Joint multicast routing and channel assignment for multi-radio multi-channel wireless mesh networks with hybrid traffic. 90-108 - Maryam Barshan, Hendrik Moens, Bruno Volckaert, Filip De Turck:
Design and evaluation of a dual dynamic adaptive reservation approach in media production networks. 109-122 - Maicon Melo Alves, Luci Pirmez, Silvana Rossetto, Flávia Coimbra Delicato, Claudio M. de Farias, Paulo F. Pires, Igor Leão dos Santos, Albert Y. Zomaya:
Damage prediction for wind turbines using wireless sensor and actuator networks. 123-140 - Chengwen Luo, Long Cheng, Hande Hong, Kartik Sankaran, Mun Choon Chan, Jianqiang Li, Zhong Ming:
From mapping to indoor semantic queries: Enabling zero-effort indoor environmental sensing. 141-151 - Ahmed Aleroud, Izzat Alsmadi:
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach. 152-164 - Chao-Tung Yang, Jung-Chun Liu, Shuo-Tsung Chen, Kuan-Lung Huang:
Virtual machine management system based on the power saving algorithm in cloud. 165-180 - Saritha Arunkumar, Berker Soyluoglu, Murat Sensoy, Mudhakar Srivatsa, Muttukrishnan Rajarajan:
Location attestation and access control for mobile devices using GeoXACML. 181-188 - Mehdi Boulaiche, Louiza Bouallouche-Medjkoune:
HSecGR: Highly Secure Geographic Routing. 189-199 - Murat Karakus, Arjan Durresi:
Quality of Service (QoS) in Software Defined Networking (SDN): A survey. 200-218 - Mohammad Goudarzi, Mehran Zamani, Abolfazl Toroghi Haghighat:
A fast hybrid multi-site computation offloading for mobile cloud computing. 219-231 - Alessandro Morelli, Mauro Tortonesi, Cesare Stefanelli, Niranjan Suri:
Information-Centric Networking in next-generation communications scenarios. 232-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.