


default search action
Journal of Networks, Volume 3
Volume 3, Number 1, January 2008
- Maarten Ditzel, Caspar Lageweg, Johan Janssen, Arne Theil:

Multi-target Data Aggregation and Tracking in Wireless Sensor Networks. 1-9 - Szabolcs Nováczki

, László Bokor
, Gábor Jeney, Sándor Imre:
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol. 10-24 - Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:

Fraudulent Internet Banking Payments Prevention using Dynamic Key. 25-34 - J. Javier Samper

, F. Javier Adell, Leo van den Berg, Juan José Martínez-Durá
:
Improving Semantic Web Service Discovery. 35-42 - Hogil Kim, Eun Jung Kim, Ki Hwan Yum:

ROAL: A Randomly Ordered Activation and Layering Protocol for Ensuring K-Coverage in Wireless Sensor Networks. 43-52 - Cholatip Yawut, Béatrice Paillassa, Riadh Dhaou:

Mobility Metrics Evaluation for Self-Adaptive Protocols. 53-64 - David Boyle, Thomas Newe

:
Securing Wireless Sensor Networks: Security Architectures. 65-77 - Donggeon Noh

, Ikjune Yoon, Heonshik Shin:
Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs. 78-85
Volume 3, Number 2, February 2008
- Wei-Kuo Chiang

, Hsin-Fu Huang:
Network-Initiated Terminal Mobility in Voice over 3GPP-WLAN. 1-8 - Fredrik Manne, Qin Xin:

Time Efficient Radio Broadcasting in Planar Graphs. 9-16 - Natarajan Meghanathan:

Exploring the Stability-Energy Consumption-Delay-Network Lifetime Tradeoff of Mobile Ad Hoc Network Routing Protocols. 17-28 - Rui Miguel Soares Silva, Nuno Sidónio Andrade Pereira, Mário Serafim Nunes:

Probabilistic Key Management Practical Concerns in Wireless Sensor Networks. 29-37 - António Luís Lopes, Luís Miguel Botelho:

Improving Multi-Agent Based Resource Coordination in Peer-to-Peer Networks. 38-47 - Sen Xu, Chin-Tser Huang, Manton M. Matthews:

Secure Multicast in WiMAX. 48-57 - Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladhake, Rajesh D. Thakare:

Micro-controller based Remote Monitoring using Mobile through Spoken Commands. 58-63 - Bent Guldbjerg Christensen, Mads Darø Kristensen, Frank Allan Hansen, Niels Olof Bouvin:

Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers. 64-71
Volume 3, Number 3, March 2008
- Vit Novotny, Dan Komosny:

Large-Scale RTCP Feedback Optimization. 1-10 - Sanjaya Gajurel, Behnam Malakooti:

Re-Configurable Antenna & Transmission Power for Location Aware MANET Routing with Multiple Objective Optimization. 11-18 - Jorge Sá Silva, Tiago Camilo, Pedro Pinto, Ricardo Ruivo, André Rodrigues, Filipa Gaudêncio, Fernando Boavida:

Multicast and IP Multicast Support in Wireless Sensor Networks. 19-26 - Homer Wu, Chong-Yen Lee, Wuu-Yee Chen, Tsang-Yean Lee:

Optimization of Job Schedule Model Based on Grid Environment. 27-33 - Fang Jing, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:

Adaptive Route Selection Policy Based on Back Propagation Neural Networks. 34-41 - J. Amutharaj, S. Radhakrishnan:

Dominating Set Theory based Semantic Overlay Networks for Efficient and Resilient Content Distribution. 42-48 - Mads Darø Kristensen, Niels Olof Bouvin:

Energy Efficient MANET Routing Using a Combination of Span and BECA/AFECA. 49-56 - Cormac Duffy, Utz Roedig, John Herbert, Cormac J. Sreenan:

A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems. 57-70
Volume 3, Number 4, April 2008
- Serena Pastore

:
The Necessity of Semantic Technologies in Grid Discovery. 1-9 - Ichiro Satoh:

A Spatial Communication Model for Ubiquitous Computing Services. 10-20 - Christine Louberry, Philippe Roose

, Marc Dalmau:
Heterogeneous Component Interactions: Sensors Integration Into Multimedia Applications. 21-30 - Shahab Kamali, Jaroslav Opatrny:

A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks. 31-41 - Glenn Platt, Joshua Wall, Philip Valencia, John K. Ward:

The Tiny Agent - Wireless Sensor Networks Controlling Energy Resources. 42-50 - Seung S. Yang, Yoon G. Kim, Hongsik Choi:

Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks. 51-63 - Sanjeeb Nanda, Narsingh Deo:

The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction. 64-71
Volume 3, Number 5, May 2008
- Stefan Lindskog, Zoltán Faigl, Anna Brunström:

A Conceptual Model for Analysis and Design of Tunable Security Services. 1-12 - Latha Tamilselvan, V. Sankaranarayanan:

Prevention of Co-operative Black Hole Attack in MANET. 13-20 - Poondi Srinivasan Pandian, Kadavath Peedikayil Safeer, Pragati Gupta, Doddamallur Thirumala Iyengar Shakunthala, B. S. Sundersheshu, Vinod Chidambar Padaki:

Wireless Sensor Network for Wearable Physiological Monitoring. 21-29 - Ivan Marsá-Maestre, Miguel A. López-Carmona, Juan R. Velasco, Andrés Navarro:

Mobile Agents for Service Personalization in Smart Environments. 30-41 - Onyeka Ezenwoye, Seyed Masoud Sadjadi:

A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services. 42-53 - Davar Pishva, G. G. D. Nishantha:

Smart Classrooms for Distance Education and their Adoption to Multiple Classroom Architecture. 54-64 - Takaaki Ishida, Keijiro Ehara, Seiichiro Toda, Yasuhiro Ohara, Masayoshi Imaike, Jun Murai:

Avoidance Mechanism of Redundant Transmissions in Content Cruising System. 65-77
Volume 3, Number 6, June 2008
- Ali E. Helvaci, Coskun Cetinkaya, Mehmet Bayram Yildirim

:
Using Rerouting to Improve Aggregate Based Resource Allocation. 1-12 - Kalvinder Singh, Vallipuram Muthukkumarasamy:

Analysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networks. 13-28 - Maria Calle

, Joseph Kabara:
MAC Protocols for GSP in Wireless Sensor Networks. 29-35 - Li Jun Zhang, Samuel Pierre:

Evaluating the Performance of Fast Handover for Hierarchical MIPv6 in Cellular Networks. 36-43 - Francesca Cuomo:

An Architectural Model to Provide QoS in a Home Network and its Evaluation in a Real Testbed. 44-53 - Gilles Guette:

Key Revocation System for DNSSEC. 54-61 - E. Baburaj, V. Vasudevan:

An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs. 62-68 - Damayanti Datta, Sukhamay Kundu:

An Application-Specific Reliable Data Transfer Protocol in Wireless Sensor Networks. 69-81 - Mona Holsve Ofigsbø, Anne Marie Hegland, Pål Spilling, Øivind Kure, Leif Nilsen:

Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme. 82-92
Volume 3, Number 7, July 2008
- Qiang Yan, Xiaoyan Huang:

User Behavior and IM Topology Analysis. 1-7 - Takashi Kunifuji, Jun Nishiyama, Hiroyuki Sugahara, Tetsuya Okada, Yamato Fukuta, Masayuki Matsumoto:

A Railway Signal Control System by Optical LAN and Design Simplification. 8-15 - Chia-Sheng Tsai, Wun-Kai Du:

Enhancement of Delivery of Warning Messages for Mobile Networks. 16-25 - Shinako Matsuyama, Takao Terano:

Analyzing the ENRON Communication Network Using Agent-Based Simulation. 26-33 - Hiraku Okada, Hitoshi Imai, Takaya Yamazato, Masaaki Katayama

, Kenichi Mase:
A Route Establishment Scheme for Multi-route Coding in Multihop Cellular Networks. 34-40 - Konstantinos Konstantinou, Muhammad Ali Imran, Costas Tzaras:

Analysing a Multi-hop UMTS over Multiple Frequency Schemes and an Urban Environment. 41-48 - Kent A. Chamberlin

, Benjamin McMahon, Scott Valcourt:
Datacasting In The Mobile Environment. 49-55 - Ariton E. Xhafa, Anuj Batra, Artur Zaks:

On the 20/40 MHz Coexistence of Overlapping BSSs in WLANs. 56-63 - Valeria Loscrì

:
On the Interaction Between Multiple Paths and Wireless Mesh Networks Scheduler Approaches. 64-77
Volume 3, Numbers 8, November 2008
- George J. Sun:

Introducing the New Editor-in-Chief of the Journal of Networks. 1 - Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:

Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL. 2-15 - Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murata:

Quality-Aware Cooperative Proxy Caching for Video Streaming Services. 16-25 - Lichun Bao, J. J. Garcia-Luna-Aceves:

Computational Time-Division and Code-Division Channel Access Scheduling in Ad Hoc Networks. 26-34 - Mohammad Hossien Yaghmaee

, Ghazale Khojasteh Tousi:
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks. 35-44 - Ayman Elnaggar, Mokhtar Aboelaze, Maan Musleh:

A Call Admission Control Protocol for Multimedia Cellular Networks. 45-54 - Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga:

Heterogeneous Security Policy Validation: From Formal to Executable Specifications. 55-69 - Lionel Reyero, Gilles Y. Delisle:

A Pervasive Indoor-Outdoor Positioning System. 70-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














