


default search action
Journal of Network and Computer Applications, Volume 87
Volume 87, June 2017
- Mohammed Atiquzzaman
:
Editorial: New Editors 2017. A1-A5 - Mohammad Masdari, Safiyyeh Ahmadzadeh:
A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems. 1-19 - Bing Xiong, Kun Yang, Jinyuan Zhao, Keqin Li:
Robust dynamic network traffic partitioning against malicious attacks. 20-31 - Franciscus X. A. Wibowo, Mark A. Gregory, Khandakar Ahmed
, Karina Mabell Gomez
:
Multi-domain Software Defined Networking: Research status and challenges. 32-45 - Ping Song, Yi Liu, Chi Liu, Depei Qian:
ParaFlow: Fine-grained parallel SDN controller for large-scale networks. 46-59 - Sisi Xiong, Yanjun Yao, Michael W. Berry, Hairong Qi, Qing Cao:
Frequent traffic flow identification through probabilistic bloom filter and its GPU-based acceleration. 60-72 - Rodolfo Stoffel Antunes
, Matheus B. Lehmann, Rodrigo B. Mansilha
, Luciano Paschoal Gaspary, Marinho P. Barcellos
:
NDNrel: A mechanism based on relations among objects to improve the performance of NDN. 73-86 - Bertrand Ducourthial, Stéphane Mottelet, Anthony Busson:
Improving fairness between close Wi-Fi access points. 87-99 - Chunlin Li, Jing Zhang, Youlong Luo:
Real-time scheduling based on optimized topology and communication traffic in distributed real-time computation platform of storm. 100-115 - Muhammad Faran Majeed
, Matthew N. Dailey
, Riaz Khan, Apinun Tunpan:
Pre-caching: A proactive scheme for caching video traffic in named data mesh networks. 116-130 - Reza Farrahi Moghaddam, Vahid Asghari, Fereydoun Farrahi Moghaddam, Yves Lemieux, Mohamed Cheriet:
A Monte-Carlo approach to lifespan failure performance analysis of the network fabric in modular data centers. 131-146 - Saeed Kargar
, Leili Mohammad Khanli
:
Fractal: An advanced multidimensional range query lookup protocol on nested rings for distributed systems. 147-168 - Animesh Roy
, Soumit Bose, Tamaghna Acharya, Sipra Das Bit
:
Social-based energy-aware multicasting in delay tolerant networks. 169-184 - Waqas Haider, Jiankun Hu
, Jill Slay
, Benjamin P. Turnbull
, Yi Xie:
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. 185-192 - David Nuñez, Isaac Agudo, Javier López:
Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation. 193-209 - Peng Liu, Biao Xu, Guojun Dai, Zhen Jiang, Jie Wu:
MDP: Minimum delay hot-spot parking. 210-222 - Arun I. B, T. G. Venkatesh:
Design and performance analysis of a MAC protocol for wireless LANs supporting multipacket reception. 223-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.