


default search action
Journal of Networks, Volume 7
Volume 7, Number 1, 2012
- Mohammad S. Obaidat

, José Luis Sevillano:
Guest Editorial. 1-3
- Issa Traoré, Isaac Woungang, Ahmed Awad El Sayed Ahmed, Mohammad S. Obaidat

:
Software Performance Modeling using the UML: a Case Study. 4-20 - Raffaele Bolla

, Riccardo Rapuzzi
, Matteo Repetto
:
User-Centric Mobility for Multimedia Communication: Experience and Evaluation from a Live Demo. 21-36 - Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch:

Tracking Per-Flow State - Binned Duration Flow Tracking. 37-51 - Yang Hong, Changcheng Huang, James Yan:

Impact of Retransmission Mechanism on SIP Overload: Stability Condition and Overload Control. 52-62 - Juan Segovia, Pere Vilà

, Eusebi Calle
, José-Luis Marzo
:
Improving the Resilience of Transport Networks to Large-scale Failures. 63-72
- Alia Bellabas, Samer Lahoud

, Miklós Molnár
:
Performance Evaluation of Efficient Solutions for the QoS Unicast Routing. 73-80 - Lingxi Li

, Dongsoo S. Kim:
Bounded Length Least-Cost Path Estimation in Wireless Sensor Networks Using Petri Nets. 81-87 - Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. 88-100 - Hao Chen, Tong Yang, Jianfu Teng, Hong He:

Interference Analysis of TD-SCDMA System and CDMA2000 System. 101-109 - Xiaohui Chen, Jing He, Bangjun Lei, Tingyao Jiang:

An Improved Localization Algorithm of Nodes in Wireless Sensor Network. 110-115 - Yaser M. Khamayseh

, Ruba Al-Salah, Muneer O. Bani Yassein
:
Malicious Nodes Detection in MANETs: Behavioral Analysis Approach. 116-125 - Matthias Vodel, Mirko Caspar, Wolfram Hardt:

Wake-Up-Receiver Concepts - Capabilities and Limitations. 126-134 - Jian Wang, Xingshu Chen, Dengqi Yang:

An Improved Adaptive Routing Algorithm Based on Link Analysis. 135-140 - Ya-qin Fan, Chi Li, Chao Sun:

Based on combination of L2TP and IPSec VPN security technology research. 141-148 - Yulong Huang, Zhihao Chen, Jianqing Xi:

A New RFID Tag Code Transformation Approach in Internet of Things. 149-156 - Xu Wu:

A Distributed Trust Evaluation Model for Mobile P2P Systems. 157-164 - Zhigang Liang, Yuhai Chen:

The Design and Implementation of Single Sign-on Based on Hybrid Architecture. 165-172 - Shunan Ma, Jingsha He

, Feng Gao:
An Access Control Model based on Multi-factors Trust. 173-178 - Gengxin Sun

, Fengjing Shao, Sheng Bin
:
A Private Data Transfer Protocol Based On A New High Secure Computer Architecture. 179-186 - Yanchao Niu, Deyun Gao, Shuai Gao, Ping Chen:

A Robust Localization in Wireless Sensor Networks against Wormhole Attack. 187-194 - Jian Shu, Ming Hong, Linlan Liu, Yebin Chen:

A Water Quality Monitoring Method Based on Fuzzy Comprehensive Evaluation in Wireless Sensor Networks. 195-202 - Jingjing Wang, Hao Zhang, Tingting Lv, T. Aaron Gulliver:

Capacity of 60 GHz Wireless Communication Systems over Fading Channels. 203-209 - Guoqiong Liao:

Data Synchronization and Resynchronization for Heterogeneous Databases Replication in Middleware-based Architecture. 210-217
Volume 7, Number 2, 2012
- Xi Chen, Shiguo Lian, Chu-Sing Yang, Stefanos Gritzalis

:
Guest Editorial. 219-221 - Hui Xu, Xiang Gu:

Extensive Design for Attack's Recognition and Resistance of Survivable Network. 222-228 - Lei Huang, Jiabing Wang, Xing He:

A Graph Clustering Algorithm Providing Scalability. 229-235 - Qian Mao, Chuan Qin

:
A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism. 236-242 - Peng Liu, Chuang Xu, Xiaoxuan Wang, Xiaoying Wang, Gonghua Xu:

A Statistical Amalgamation Approach for Ontologies. 243-248 - Yan Liu, Lian Liu, Junyong Luo:

Adaptive Ant Colony Clustering Method Applied to Finding Closely Communicating Community. 249-258 - Jianwen Sun, Zongkai Yang, Sanya Liu, Pei Wang

:
Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace. 259-266 - Peng Xiao, Jingsha He

, Yingfang Fu:
A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks. 267-274 - Yubo Song

, Kan Zhou, Xi Chen:
Fake BTS Attacks of GSM System on Software Radio Platform. 275-281 - Ting Cui, Chenhui Jin:

Lower Bounds of Differential and Linear Active S-boxes for Generalized Feistel Network with SP Type F-function. 282-287 - Grant P. Millar, Emmanouil A. Panaousis, Christos Politis

:
Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions. 288-299 - Lansheng Han, Xiao Qu, Yuan Li, Tao Yin:

The Probability of Trojan Attacks on Multi-level Security Strategy based Network. 300-304 - Sugang Ma:

A Review on Cloud Computing Development. 305-310
- Alireza Shameli-Sendi, Michel R. Dagenais, Masoume Jabbarifar, Mario Couture:

Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model. 311-321 - Feng Gao, Jingsha He

, Shunan Ma:
Trust Based Privacy Protection Method in Pervasive Computing. 322-328 - Yang Lu:

Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System. 329-336 - Nan Feng, Jing Xie:

A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment. 337-344 - Hui Chen:

The Impact of Comments and Recommendation System on Online Shopper Buying Behaviour. 345-350 - Zhuoqun Xia, Zhigang Chen, Xiaoheng Deng, Ming Zhao:

An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game. 351-356 - Yong Xu, Tingting Yan:

Design and Analysis on Error Handing and Controlling Protocol in Mobile Payment. 357-364 - Yinghua Xue, Hongpeng Liu:

Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse. 365-369 - Peiyi Zhu, Weili Xiong, Ningning Qin, Baoguo Xu:

D-S Theory Based on an Improved PSO for Data Fusion. 370-376 - Chuiwei Lu, Zhengbing Hu

:
A Fuzzy Search Algorithm for Structured P2P Network Based on Multi-dimensional Semantic Matrix. 377-384 - Hongwei Chen, Hui Xu, Li Chen:

Incentive Mechanisms for P2P Network Nodes based on Repeated Game. 385-392 - Jun Tu, De-hua Li, Yingjiang Zhang, Zhiwei Ye

, Wangyu Tong:
QoS Study Based On IEEE 802.16 Bandwidth Scheduling Strategy. 393-399 - Tongying Li, Zhenchao Zhang:

Vibration Data Processing Based on Petri Network in Wireless Sensor Networks. 400-407
Volume 7, Number 3, 2012
- Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman

, Mohammad A. Karim
, Nurul I. Sarkar
:
Guest Editorial. 409-411 - Md. Motaharul Islam

, Eui-nam Huh:
Virtualization in Wireless Sensor Network: Challenges and Opportunities. 412-418 - Md. Jahedul Islam

, Md. Rafiqul Islam:
Effect of Polarization Mode Dispersion on the BER Performance of Optical CDMA. 419-426 - Md. Shohrab Hossain

, Mohammed Atiquzzaman
, William D. Ivancic:
Cost and Efficiency Analysis of NEMO Protocol Entities. 427-440 - Vikram Arkalgud Chandrasetty, Syed Mahfuzul Aziz

:
A Highly Flexible LDPC Decoder using Hierarchical Quasi-Cyclic Matrix with Layered Permutation. 441-449 - Md. Mahiuddin

, Md. Saiful Islam:
Analysis of Performance Limitations in Fiber Bragg Grating Based Optical Add-Drop Multiplexer due to Crosstalk. 450-455 - M. M. Hafizur Rahman, Yukinori Sato

, Yasushi Inoguchi:
High Performance Hierarchical Torus Network Under Adverse Traffic Patterns. 456-467 - M. M. Hafizur Rahman, Yukinori Sato

, Yasushi Inoguchi:
Dynamic Communication Performance Enhancement in Hierarchical Torus Network by Selection Algorithm. 468-479 - Tamal Chakraborty, Atri Mukhopadhyay

, Suman Bhunia
, Iti Saha Misra, Salil Kumar Sanyal:
An Optimization Technique for Improved VoIP Performance over Wireless LAN. 480-493
- Hongzeng He, Jingbo Sun, Yue Wang, Qi Liu, Jian Yuan:

Cluster Analysis Based Switching-off Scheme of Base Stations for Energy Saving. 494-501 - Yingying Qin, Rongbo Zhu:

Efficient Routing Algorithm Based on Decision-making Sequence in Wireless Mesh Networks. 502-509 - Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:

Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games. 510-516 - Tengyue Mao, Zhengquan Xu, Rui Hou, Min Peng:

Efficient Satellite Scheduling Based on Improved Vector Evaluated Genetic Algorithm. 517-523 - Feng Liang, Haoming Guo, Shengwei Yi, Shilong Ma:

A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems. 524-531 - Yongsheng Huang, Huamei Du, Genglu Zhang:

Clustering Model of P2P CDN Based on The Prediction of User Requirements. 532-539 - Liyun Su

, Qian Yang, Yuli Zhang, Jiaojun Li:
Noise Immunity of Duffing Oscillator And Its Applications in Weak UWB Signal Detection. 540-546 - Lizheng Guo

, Shuguang Zhao, Shigen Shen
, Changyuan Jiang:
Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm. 547-553 - Fangfeng Zhang, Jun Liu, Chunling Zuo:

Evolution Modeling of Complex Network Dynamics. 554-561 - Yuan Zhang, Shexiang Ma:

Power Allocation for Tri-node Cooperative Communication of Gaussian Channel Gains. 562-567 - Kaijian Liang, Linfeng Bai, Quan Liang, Xilong Qu:

Efficient Resource Reservation Scheme in Service-Oriented Network Environment. 568-575 - Zhitong Huang, Yuefeng Ji:

Future Unified Communication Based on Ubiquitous Hierarchical Generalized-Sensor Network Architecture. 576-583 - Li Yang, DaiYun Weng:

Research of Wireless Sensor Routing Algorithm Based on Uneven Clustering. 584-590 - Hui-Huang Chen, Ai-Min Lin:

Complex Network Characteristics and Invulnerability Simulating Analysis of Supply Chain. 591-597 - Hongzhe Xu, Jun Huang, Yaoming Zhou:

Reliability Modeling and Analysis of SCI Topological Network. 598-604
Volume 7, Number 4, 2012
- Xianzhong Chen, Yanchun Shen:

Research of RA Coding Algorithm Based on AWGN Channel. 605-612 - Min Huang, Qinpei Liang, Jianqing Xi:

A Parallel Disjointed Multi-path Routing Algorithm based on OLSR and Energy in Ad Hoc Networks. 613-620 - Xinlian Zhou, Bin Xiao:

A Clustering-Based K-Coverage Algorithm for Mobile Wireless Sensor Networks. 621-627 - Yanchun Shen, Dongmei Li, Yinpu Zhang:

Study on Channel Estimate and Joint Detection in 3G Network. 628-635 - Jun Zheng, Jiantao Gu, Jiansheng Gao:

Research of Financial Informationization Construction system based on VPN Technology. 636-643 - Jiantao Gu, Jun Zheng, Shufen Zhang:

A Graphical User Interface in WLAN Monitoring and Management System. 644-651 - Ming Lu:

Study on Secret Key Management Project of WSN Based on ECC. 652-659 - Zhihong Qian, Xue Wang, Shuang Zhu:

A Preamble Pattern Identification based Synchronization System for UWB-based Wireless Networks. 660-666 - Lina Lan, Jingli Mao, Xuerong Gou:

A Novel Lightweight Main Memory Database for Telecom Network Performance Management System. 667-674 - Yi-li Tan, Ye Zhao, Yourong Wang:

Power Network Voronoi Diagram and Dynamic Construction. 675-682 - Haoming Guo, Feng Liang, Yunzhen Liu:

Research on Sensor Cooperation for Distributed Emergency Response System. 683-690 - Sihai Zheng, Layuan Li, Yong Li:

A QoS Routing Protocol for Mobile Ad Hoc Networks Based on Multipath. 691-698 - Lu Lou, Xin Xu, Zhili Chen:

Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks. 699-706 - Jun Chen, Yuesheng Gu, Yanpei Liu:

Grid Service Concurrency Control Protocol. 707-714 - Min Zhao, Tao Zhang, Fangbin Ge, Zhijian Yuan:

RobotDroid: A Lightweight Malware Detection Framework On Smartphones. 715-722 - Xiaobo Wang, Xianwei Zhou, Junde Song:

Hypergraph based Model and Architecture for Planet Surface Networks and Orbit Access. 723-729 - Yinpu Zhang:

Study on Airspace Covert Communication Algorithm of Covert Communication System. 730-737 - Yongquan Cai, Zhanhai Luo, Yi Yang:

Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol. 738-745 - Yan-Pei Liu, Yuesheng Gu, Jun Chen:

A New Control Structure Model Based on Object-oriented Petri Nets. 746-753
Volume 7, Number 5, 2012
- Carmen Mas Machuca

, Norbert Hanik:
Guest Editorial. 755-756
- Abdulamir Ali, Jochen Leibrich, Werner Rosenkranz:

Design Considerations and Performance Comparison of High-Order Modulation Formats using OFDM. 757-763 - Vincenzo Eramo

, Lorenzo Piazzo
, Angelo Germoni, Antonio Cianfrani
, Marco Listanti
:
Dimensioning of Optical Codes in OCDM/WDM Optical Packet Switches. 764-769 - Oscar Gaete, Leonardo D. Coelho

, Bernhard Spinnler:
Performance of Stereo Multiplexing in Single Channel and DWDM Systems Using Direct Detection with Optimum Dispersion Maps. 770-775 - Brian Thomas Teipen, Michael H. Eiselt, Klaus Grobe, Jörg-Peter Elbers:

Adaptive Data Rates for Flexible Transceivers in Optical Networks. 776-782 - João Santos, João Pedro, Paulo P. Monteiro

, João Pires:
Optimization Framework for Supporting 40 Gb/s and 100 Gb/s Services over Heterogeneous Optical Transport Networks. 783-790 - Slavisa Aleksic

, Naida Fehratovic:
Scalability Analysis of Optical Intrasystem Interconnects. 791-799 - Ramon Aparicio-Pardo, Belen Garcia-Manrubia

, Nina Skorin-Kapov, Pablo Pavón-Mariño:
Heuristic Approaches for Periodic Reconfiguration of Lightpath-based Networks under Multi-hour Traffic. 800-811 - Burak Kantarci, Hussein T. Mouftah:

Delay-Constrained Admission and Bandwidth Allocation for Long-Reach EPON. 812-820 - Xiaowen Dong, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani

:
Energy Efficient Optical Networks with Minimized Non-Renewable Power Consumption. 821-831
- Xiang Gao, Yintang Yang, Duan Zhou, Jianxian Zhang, Changchun Chai:

Target Tracking Approximation Algorithms with Particle Filter Optimization and Fault-Tolerant Analysis in Wireless Sensor Networks. 832-837 - Yongxian Song, Juanli Ma, Xianjin Zhang, Yuan Feng:

Design of Wireless Sensor Network-Based Greenhouse Environment Monitoring and Automatic Control System. 838-844 - Hua Liang, Feng Zeng:

A Research on HCCA Mechanism of Wireless LAN Access. 845-849 - Fei Shao, Guoping Jiang:

Traffic Driven Epidemic Spreading in Homogeneous Networks with Community Structure. 850-855 - Zhiwen Wang, Lu Liu:

Co-occurrence Relation of DNS Queries Based Research on Botnet Activities. 856-862 - Qin Qia, Zhiwen Wang:

A New Attack Detection in Large Scale Network based on Entropy. 863-868 - Jun Wang, Weiru Chen:

A Dynamic Length Mechanism for Unite Frame on MAC Layer of FCS Based on UWB. 869-875 - Jin Qi, Shunyi Zhang, Lu Cao, Yanfei Sun, Ling Tan:

Cognitive Networks Autonomic Decision-making Approach Based on Influence Diagram. 876-883 - Xiangbin Yu

, Xiaomin Chen, Yuyu Xin, Qiuming Zhu
, Dazhuan Xu:
Multi-amplitude Differential Space-time Block Coding Scheme for Square/Non-Square Code Matrix in MIMO Systems. 884-892
Volume 7, Number 6, 2012
- Wenjia Niu, Gang Li

:
Guest Editorial. 893-894 - Nicholas Charles Patterson

, Michael Hobbs
:
Virtual World Security Inspection. 895-907 - Huy Quan Vu, Shaowu Liu

, Xinghua Yang, Zhi Li, Yongli Ren
:
Identifying Microphone from Noisy Recordings by Using Representative Instance One Class-Classification Approach. 908-917 - Haibo Li, Yang Li, Zhijun Zhao, Tao Lin, Hui Tang, Song Ci:

A SIP-based Real-time Traffic Mobility Support Scheme in Named Data Networking. 918-925 - Jun Lei, Xinghua Yang, Yinlong Liu, Yifang Qin, Hui Tang, Zhijun Zhao:

Using Physical-level Context Awareness to Improve Service Ranking in Wireless Sensor Network. 926-934 - Gleb Beliakov

, John Yearwood, Andrei V. Kelarev:
Application of Rank Correlation, Clustering and Classification in Information Security. 935-945 - Md. Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy, Lynn Margaret Batten:

A Comparison of the Classification of Disparate Malware Collected in Different Time Periods. 946-955
- Cui-Qin Dai, Fang-Lan Liao, Zu-Fan Zhang:

Packet Scheduling for Downlink OFDMA Wireless Systems with Heterogeneous Traffic. 956-961 - Nancy El Rachkidy, Alexandre Guitton, Michel Misson:

Pivot Routing Improves Wireless Sensor Networks Performance. 962-971 - Weizheng Ren, Yansong Cui:

A Parallel Rough Set Tracking Algorithm for Wireless Sensor Networks. 972-979 - Ciro D'Apice

, Rosanna Manzo
, Benedetto Piccoli
:
On the Validity of Fluid-dynamic Models for Data Networks. 980-990 - Xiaohui Chen

, Jinpeng Chen, Jing He, Bangjun Lei:
An Improved Localization Algorithm for Wireless Sensor Network Based on the Selection of Benchmark Anchor Node. 991-996 - Qian He, Yong Wang, Bang Zhao, Linlin Yao, Hong-Bin Chen:

FRPWPS: A Filter Driver and Reverse Proxy Based Web Protection System. 997-1005
Volume 7, Number 7, 2012
- Shifei Ding:

Guest Editorial. 1007-1008 - Haiping Huang, Hao Chen, Ruchuan Wang, Qian Mao, Renyuan Cheng:

(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks. 1009-1016 - Liang Ma, Qi Zhu:

A New Algorithm of Spectrum Allocation Based on the Balance between Supply and Demand in Cognitive Radio Networks. 1017-1023 - Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang:

Long-lived Self-healing Group Key Distribution Scheme in Wireless Sensor Networks. 1024-1030 - Zhenxin Liu, Xiaohong Yu, Qing Yang:

Research on Evolution and Synchronization of Space Information Support Power Networks. 1031-1037 - Hao Zhang, Xue-rong Cui

, T. Aaron Gulliver
:
Threshold Selection for TOA Estimation based on Skewness and Slope in Ultra-wideband Sensor Networks. 1038-1045 - Wenzhu Sun, Hongyu Wang, Daxing Qian:

A Novel Error Resilient Scheme for Wavelet-based Image Coding Over Packet Networks. 1046-1053 - Xiaoxiao Liu, Jun Steed Huang, Zujue Chen:

The Research of Ranging with Timing over Packet Network for the Mine Safety Application. 1054-1062 - Luliang Tang

, Fangzhen Huang, Xueyan Zhang, Hong Xu:
Road Network Change Detection Based on Floating Car Data. 1063-1070 - Xiangli Wang, Layuan Li:

Research of an Adaptive Aggregation Routing Algorithm in Wireless Sensor Networks. 1071-1077 - Qiang Li:

Applying Stochastic Integer Programming to Optimization of Resource Scheduling in Cloud Computing. 1078-1084 - Yueheng Li, Meiyan Ju, Huibin Wang, Xiaomin Sun:

A Novel Sensor Node Management Approach Based on Particle Filtering Prediction. 1085-1091 - Yongquan Cai, Jiong Tian, Hui Xu:

An Identification System of Original Painting Artworks Based on Smart Card. 1092-1098 - Jingjun Miao, Liangmin Wang:

Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection. 1099-1105 - Di Wu, Jing Cao, Yan Ling, Jiangchuan Liu, Limin Sun:

Routing Algorithm Based on Multi-Community Evolutionary Game for VANET. 1106-1115 - Guanghui Li, Hong Li, Hailin Feng, Zhi Wang, Ziwei Xuan:

The Effect of Wireless Sensor Nodes Deployment Density in Forest Fire Monitoring Quality Evaluation. 1116-1122 - Ruining Huang, Lei Li, Yunjiang Lou:

Research and Construction the Net Monitor System. 1123-1130
- Bing Chen, Chengxiang Tan, Bo Jin, Xiang Zou, Yuebo Dai:

RFID-based Electronic Identity Security Cloud Platform in Cyberspace. 1131-1138 - Jingyang Wang, Yu Hua, Min Huang, Liwei Guo, Wanzhen Zhou:

Reach on Policy-based Transmition Control Technology in MPLS Communication Network. 1139-1146
Volume 7, Number 8, 2012
- Yixian Yang, Xiaojun Wang

:
Guest Editorial. 1147-1149 - Weiwei Zhang, Ru Zhang, Xianyi Liu, Chunhua Wu, Xinxin Niu:

A Video Watermarking Algorithm of H.264/AVC for Content Authentication. 1150-1154 - Bin Sheng:

A Novel Pilot Cancellation Scheme for OFDM Systems in Time-Varying Channels. 1155-1159 - Bin Sheng:

Pilot Power Allocation for OFDM in DAS. 1160-1163 - Yongli An, Xiaohong Huang, Kaiyu Zhu, Yang Xiao:

Multi-users Cooperative Transmitting Algorithm in Cognitive WLAN. 1164-1169 - Xi Liu, Wenquan Feng, Chunsheng Li, Chao Ma:

A Carrier Estimation Method for MF-TDMA Signal Monitoring. 1170-1175 - Lei Xu, Xiaolong Xu, Yue Zhuo:

P2P Botnet Detection Using Min-Vertex Cover. 1176-1181 - Zhihua Huang, Songnian Lu, Aixin Zhang, Jie Gu:

Impact of Feedback on Trust in P2P Networks. 1182-1188 - Rui Zhang, Guoliang Ding:

Network Coding Scheme of Wireless Node with Unequal Data Arriving Rates. 1189-1194 - Huisheng Liu, Zhenxing Wang, Yu Wang

:
Semi-supervised Encrypted Traffic Classification Using Composite Features Set. 1195-1200 - Jianyi Zhang, Yangxi Ou, Dan Li, Yang Xin:

A Prior-based Transfer Learning Method for the Phishing Detection. 1201-1207 - Hongjiang Lei

, Chao Gao, Yongcai Guo, Zhi Ren, Jun Huang:
Wait-Time-based Multi-channel MAC Protocol for Wireless Mesh Networks. 1208-1213 - Rongrong Fu, Kangfeng Zheng, Tianliang Lu, Dongmei Zhang, Yixian Yang:

Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks. 1214-1219 - Jiayin Wang, Yubin Xu, Lin Ma, Liang Chen:

Call Admission Control in CDMA2000/WLAN Network Based on User Position Information. 1220-1226 - Tianliang Lu, Kangfeng Zheng, Rongrong Fu, Yingqing Liu, Bin Wu, Shize Guo:

A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus. 1227-1232 - Hongguang Lan, Yilei Sun, Xiaohan Xia, Ming Ma, Jianjun Wu:

A Seamless Media Stream Delivery Scheme between MSS and UMTS with SIP-based Soft Handover. 1233-1238 - Min Li, Zheli Liu, Jingwei Li, Chunfu Jia:

Format-Preserving Encryption for Character Data. 1239-1244 - Tingting Fu, Peng Liu, Y. Fun Hu:

Enable Energy Efficiency of Object Tracking using Sentinel based Multisensor Sleep Scheduling. 1245-1250 - Wei Gao, Tianwei Xu:

Characteristics of Optimal Function for Ontology Similarity Measure via Multi-dividing. 1251-1259 - Qingli Zhao, Weiqiang Pan:

An Improved Penalty-SA Based Resource Allocation Algorithm for OFDMA Cellular Systems. 1260-1265 - Li Li, Degong Duan, Hongan Li, Zhao Dong:

Research on Downstream Encryption Scheme Based on Timestamp in GEPON Network. 1266-1271 - Min Zhang, Jie Zhang, Zhengping Jin, Hua Zhang, Qiao-Yan Wen:

A Light-Weight Rainbow Signature Scheme for WSN. 1272-1279 - Wenjing Kang, Gongliang Liu:

Super-Resolution Information Collection in Underwater Sensor Networks with Random Node Deployment: A Compressed Sensing Approach. 1280-1287 - Wei Li, Dawu Gu, Xiaoling Xia, Ya Liu, Zhiqiang Liu:

Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher. 1288-1294 - Youhua Ma, Zhiyong Liu, Gongliang Liu, Xingpeng Mao:

Joint Relay Selection and Power Allocation for Cooperative Communication over Frequency Selective Fading Channels. 1295-1300 - Gongliang Liu, Wenjing Kang, Hongdan Wang, Xin Ge:

Power Allocation Algorithm for IDMA-based Multi-Beam Satellite Communication Systems. 1301-1307
Volume 7, Number 9, 2012
- Zhengtao Yu, Binghai Zhou:

Guest Editorial. 1309-1310 - Xue-rong Cui

, Hao Zhang, T. Aaron Gulliver
:
Threshold Selection for Ultra-Wideband TOA Estimation based on Neural Networks. 1311-1318 - Zhangfeng Hu, Shanzhi Chen, Bo Hu:

Reconsidering Architecture for Future Ubiquitous Internet. 1319-1326 - Ziqian Wan, Gang Liang, Tao Li:

Multi-core Processors based Network Intrusion Detection Method. 1327-1333 - Jian Guo, Lijuan Sun, Ruchuan Wang:

A Cross-layer and Multipath based Video Transmission Scheme for Wireless Multimedia Sensor Networks. 1334-1340 - Jun-jun Wu, Ming-wei Fang, Xinfang Zhang, Tongyang Wang:

Trusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment. 1341-1348 - Dengyuan Xu, Benniu Zhang, Zhongwei Hou:

Novel PIT Localization Algorithm based on Coverage of Anchors in WSN. 1349-1354 - Qiang Fan, Jing Fan, Jie Li, Xiaofang Wang:

A Multi-hop Energy-efficient Sleeping MAC Protocol based on TDMA Scheduling for Wireless Mesh Sensor Networks. 1355-1361 - Yourui Huang, Liguo Qu, Chaoli Tang:

Optimal Coverage Scheme based on QPSO in Wireless Sensor Networks. 1362-1368 - Xin Song, Rongcui Wang, Ying Yuan:

Local Mapping Based Modeling Sensor Network Data Algorithm for Query Processing. 1369-1375 - Hongjun Dai, Yu Liu, Fenghua Guo, Zhiping Jia:

A Malicious Node Detection Algorithm Based on Principle of Maximum Entropy in WSNs. 1376-1383 - Chang Liu

, Hong Jiang, De-Long Zeng:
Unitary Matrix Pencil Algorithm for Range-Based 3D Localization of Wireless Sensor Network Nodes. 1384-1390 - Yu Song, Hongwei Liu, Ming Hao, Xiaozong Yang:

Multi-Channel Contention Estimate (MCCE): An Approach to Assign Channels for Multiple Rendezvous MAC Protocols in Ad hoc Networks. 1391-1399 - Xin Huang, Xiao Ma, Bangdao Chen, Andrew Markham

, Qinghua Wang
, Andrew William Roscoe:
Human Interactive Secure ID Management in Body Sensor Networks. 1400-1406 - Fengjun Shang, Jianbo Liu:

Multi-hop Topology Control Algorithm for Wireless Sensor Networks. 1407-1414 - Mei-Wen Huang, Hsu-Jung Liu, Min-Rui Lin, Wen-Shyong Hsieh:

A Novel Mobile Sink Nodes Protocol for Grid Sensor Networks. 1415-1422
- Nafei Zhu, Jingsha He

:
Experimental Study of the Similarity of Network Nodes based on RTT. 1423-1430 - Mehrnoush Masihpour, Mehran Abolhasan

, Daniel Robert Franklin
:
NFMIC Cooperative Communication Methods for Body Area Networks. 1431-1440 - Dewiani, Kouji Hirata, Khamisi Kalegele

, Yoshinobu Higami, Shin-ya Kobayashi:
Dynamic Routing and Wavelength Assignment with Backward Reservation in Wavelength-routed Multifiber WDM Networks. 1441-1448 - Liangli Ma, Jingchun Sun, Yongjie Li:

Comparing General Paradigms on Data Secrecy Protection for Outsourced Files in Mobile Cloud Computing. 1449-1455 - Ning Du, Huijing Yang, Chunying Wang:

An Optimized OSPF Routing Protocol for Mobile Ad-hoc Networks. 1456-1463 - Dandan Han, Jing Zhang:

An Optimized Gnutella-like P2P Protocol in Mobile Networks. 1464-1471 - Jinxin Zhang, Mangui Liang, Zhaowei Wang:

Multi-Priority Frame Forwarding in Tree-Based Routing Ethernet. 1472-1478 - Yingan Cui, Xue Li, Xiaogang Chen:

The Research of Polarization Phenomenon in Blogosphere. 1479-1485 - Daru Pan, Mu Lin, Liangjie Chen, Jiaping Sun:

An Improved Spray and Wait with Probability Choice Routing for Opportunistic Networks. 1486-1492
Volume 7, Number 10, 2012
- Rudy Deca, Omar Cherkaoui, Yvon Savaria:

Rule-Based Network Service Provisioning. 1493-1504 - Mohamed K. Watfa

:
A 4-Node Coverage Approach to the Localization Problem in UWSNs. 1505-1514 - Arockia Xavier Annie Rayan

, Yogesh Palanichamy:
Enhanced Link based Congestion Control (ELCC) in Peer-to-Peer (P2P) based Video on Demand (VoD) System. 1515-1522 - Jiping Xiong, Lifeng Xuan, Tao Huang, Jian Zhao:

Novel Covert Data Channel in Wireless Sensor Networks Using Compressive Sensing. 1523-1529 - Jie Zeng, Meng Zhang, Hu Sheng, Jinxiu Luo:

The Intelligent Video Playback System Based on RFID Technology. 1530-1537 - Jing Ma, Shuli Sun:

Centralized Fusion Estimators for Multi-sensor Systems with Multiplicative Noises and Missing Measurements. 1538-1545 - Hao Wang, Guozhen Tan, Ji-xiang Yang:

An Improved VANET Intelligent Forward Decision-making Routing Algorithm. 1546-1553 - Ziyi Fu, Juanjuan Bai, Qiang Wang:

A Novel Dynamic Bandwidth Allocation Algorithm with Correction-based the Multiple Traffic Prediction in EPON. 1554-1560 - Zi'ao Zhan, Qixing Xu:

A Stochastic Push Scheme of Streaming Media Partial Content based on P2P. 1561-1567 - Qilie Liu, Xiang Pang, Yong Wang, Yingjun Pan, Leilei Li:

An Improved Path Management Policy for the Ferry in Opportunistic Networks. 1568-1575 - Min Xiang, Ling Luo, Changjiang Jiang, Zhiyong Luo:

A Novel Polymorphic Ant Colony -Based Clustering Mechanism for Wireless Sensor Networks. 1576-1583 - Ke Xu, Wen Cui, Jun Tie, Xinfang Zhang:

An Algorithm for Detecting Group in Mobile Social Network. 1584-1591 - William W. Guo, Mark Looi:

A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection in Wireless Sensor Networks. 1592-1599 - Zhenjing Yao, Tao Gao, Guo Li

:
The Optimized Pseudorandom Digital Modulation Excitation Sequences for Multichannel Ultrasonic Ranging system. 1600-1608 - Qingliang Wang, LiFang Zhai, Zheng-Tao Jiang, Yunbing Hou:

Progress and Research of Network System Survivability Scheme with Cooperative Information Management. 1609-1615 - Qi Xie:

Provably Secure Self-certified Multi-proxy Signature with Message Recovery. 1616-1623 - Wenxian Wang

, Xingshu Chen, Haizhou Wang:
IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems. 1624-1630 - Qinwen Han, Lingqiu Zeng:

FPGA Implementation for Low-Rank Channel Estimation of OFDM. 1631-1638 - Xiaoqing Zuo

, Yongchuan Zhang
, Chong Feng:
A Compute Method of Road Travel Speed based on Mobile Phone Handover Location. 1639-1645 - Youjun Bu, Wei He, Kunpeng Jiang, Liang Zhao:

A Novel Multi-Next Hop Routing Algorithm based on Node Potential. 1646-1653 - Lei Yu, Yang Lu, Xiaojuan Zhu:

Smart Hospital based on Internet of Things. 1654-1661 - Li Yi, Huachun Zhou, Fei Ren, Hongke Zhang:

Analysis of Route Optimization Mechanism for Distributed Mobility Management. 1662-1669 - Xiaoting Han

, Li Niu:
Word of Mouth Propagation in Online Social Networks. 1670-1676 - Bin Zhuge, Guo-Wei Dai, Lei Wan, Huan-Huan Song, Hua Wang, Weiming Wang:

The Design and Research of Cluster Router Based on ForCES Protocol. 1677-1686 - Yiran Wang, Bo Zhang, Shujian Li:

Differential Coherent Algorithm for Interferometric Acquisition of GNSS-R Software Receiver. 1687-1695
Volume 7, Number 11, 2012
- Mohammad S. Obaidat

, José Luis Sevillano
:
Guest Editorial. 1697-1699 - Scott Fowler

, Katrin Hameseder, Anders Peterson:
An Empirical Evaluation of Web System Access for Smartphone Clients. 1700-1713 - Junyu Lai, Bernd E. Wolfinger, Stephan Heckmüller:

Decreasing the Call Blocking Probability of Broadband IPTV Services in Stationary and Peak-hour Scenarios. 1714-1727 - Peppino Fazio

, Floriano De Rango, Cesare Sottile
:
An On Demand Interference Aware Routing Protocol for VANETS. 1728-1738 - Kishore Angrishi, Ulrich Killat:

A Node Operating Point Approach for Stochastic Analysis with Network Calculus. 1739-1748 - Paul Davern, Noor Nashid, Cormac J. Sreenan, Ahmed H. Zahran

:
Client-Side Framework for Automated Evaluation of Mechanisms to Improve HTTP Performance. 1749-1759 - Alireza Abdollahpouri

, Bernd E. Wolfinger:
Multicast Gain for IPTV Transmission in WiMAX Multi-hop Relay Networks. 1760-1772 - Antonio Bueno, Pere Vilà

, Ramón Fabregat:
Charging Multicast Services: A Cost Distribution Scheme Comparative Study. 1773-1781
- Zi Yin, Xiaoyan Tang, Qian Ma:

Research on Emergence Mechanism of College Instant Messaging Community Network. 1782-1789 - Dongxiao Niu, Ling Ji, Mian Xing, Jianjun Wang

:
Multi-variable Echo State Network Optimized by Bayesian Regulation for Daily Peak Load Forecasting. 1790-1795 - Bin Lu

, Yongjuan Chang:
SPA Comprehensive Evaluation Model and its Application in the Risk Assessment of Electric Power Information Network. 1796-1802 - Jun Zhang:

Arbitrated Quantum Signature protocol using EPR pairs. 1803-1810 - Hu Zhang, Zhuohua Fan, Jia-heng Zheng, Quanming Liu:

An Improving Deception Detection Method in Computer-Mediated Communication. 1811-1816 - Feng Wang, Weihong Bi, Kuan Wang, Wenqiu Feng:

Study on High-order Polarization Mode Dispersion and its Compensation Method in High-speed Optical Communication Systems. 1817-1823 - Feng Wang, Xueying Zhang, Maofeng Wang, Guijun Chen:

Energy-Efficient Routing Algorithm for WSNs in Underground mining. 1824-1829 - Hongtao Liu, Lianglun Cheng:

A Novel Cross-layer Congestion Control Strategy for Wireless Sensor Networks. 1830-1836 - Shengquan Liao, Chunming Wu, Qiang Yang, Ming Jiang:

An Efficient Name Resolving Mechanism for Inter-domain Policy in Content-Centric Networks. 1837-1844 - Zhimin Li, Xin Xu, Cunhua Li:

Provably Secure Certificate-based Signature Scheme for Ad Hoc Networks. 1845-1851 - Xiaoyan Yu, Zhenyu Yu:

A Distributed Architecture of Video Conference Using P2P Technology. 1852-1859 - Xiaohui Chen, Canfeng Gong, Jiangbo Min:

A Node Localization Algorithm for Wireless Sensor Networks based on Particle Swarm Algorithm. 1860-1867 - Feng Wang, Xuande Ji, Yuyan Wang:

UWB Autocorrelation Receiver Based on Average Differential Transmitted Reference. 1868-1875 - Zheng Wan:

Priority based Dynamic Packet Assignment for Multipath Routing in Multihop Networks. 1876-1883 - Jindong Zhao, Shuanhu Wu, Chunxiao Mu, Baode Fan, Yunhong Lu:

Study and Prediction of Wireless Link Quality for Adaptive Channel Hopping. 1884-1891 - Bencan Gong, Shouzhi Xu:

Unequal Density-based Node Deployment and Clustering Routing Protocol in Wireless Sensor Networks. 1892-1899 - Lizhong Xu, Jiahua Zhang, Hua Harry Li, Pengfei Ye, Xijun Yan, Xiaofang Li:

An Improved MAC Protocal for Marine-Environment Monitoring WSN System. 1900-1907
Volume 7, Number 12, 2012
- Salahuddin Muhammad Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman

, Mohammad Ataul Karim
, Nurul I. Sarkar
:
Guest Editorial. 1909-1911
- Md. Humayun Kabir

, Md. Al-Farabi Khan:
A Probabilistic Scheme for Reducing the Packet Loss in Mobile IPv6. 1912-1924 - Tamal Chakraborty, Iti Saha Misra, Salil Kumar Sanyal:

Proactive QoS Enhancement Technique for Efficient VoIP Performance over Wireless LAN and Cognitive Radio Network. 1925-1942 - Mahdi N. Al-Ameen, Charles Gatz, Matthew K. Wright

:
SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure. 1943-1951 - Budhaditya Bhattacharyya

, Iti Saha Misra, Salil Kumar Sanyal:
Analysis and Optimization of Error Performance of a WiMAX Transceiver using Novel Adaptive Cyclic Prefix Strategy under AWGN and Rayleigh Fading Scenario. 1952-1966 - Fariha Tasmin Jaigirdar, Mohammad Mahfuzul Islam:

Assurance of the Maximum Destruction in Battlefield using Cost-Effective Approximation Techniques. 1967-1977 - Debasmita Mukherjee, Sriyankar Acharyya:

New Variants of Ant Colony Optimization for Network Routing. 1978-1989
- Jiandong Li, Xuelian Cai, Jin Yang, Lina Zhu:

Scalable Cluster-based Routing in Large Wireless Sensor Networks. 1990-1995 - Xuelian Cai, Jiandong Li, Lina Zhu:

Performance of Routing Protocols in Very Large Scale Wireless Sensor Networks. 1996-2002 - Yongxian Song, Ting Chen, Juanli Ma, Yuan Feng, Xianjin Zhang:

Design and Analysis for Reliability of Wireless Sensor Network. 2003-2010 - Yongxian Song, Rongbiao Zhang, Zhuo Shen:

Analysis of Energy Consumption of Virtual MIMO Wireless Sensor Network. 2011-2018 - Jing Wang, Zhijing Liu, Hui Zhao:

Group Recommendation Based on the PageRank. 2019-2024 - Zhiming Zhang, Changgen Jiang:

False Data Injection-Resilient Security Routing Protocol for Wireless Sensor Networks. 2025-2030 - Shunyuan Sun, Xiaoying Bin, Zhiyong Wang, Baoguo Xu:

Using WPSO in Clustering Protocol of the WSN. 2031-2036 - Yuanbin Mo, Jizhong Liu, Baolei Wang, Q. M. Jonathan Wu:

A Novel Swarm Intelligence Algorithm and Its Application in Solving Wireless Sensor Networks Coverage Problems. 2037-2043 - Rongbiao Zhang, Yongxian Song, Fuhuan Chu, Biqi Sheng:

Study of Wireless Sensor Networks Routing Metric for High Reliable Transmission. 2044-2050 - Jun Li, Shuang Hong, Sha Xia, Shengmei Luo:

Neural Network Based Popularity Prediction For IPTV System. 2051-2056 - Zheng Wan:

Evaluation on Multiple Video Streaming in IEEE 802.11e Multihop Networks. 2057-2062 - Haiping Huang, Yi Dou, Jiutian Chen, Juan Feng, Xiaolin Qin:

Secure Query in Wireless Sensor Network Using Underground Parties. 2063-2069 - Shengbo Hu, Heng Shu, Yali Liu, Bing Si, Fuyu Yan:

Strategies for Sensor Node Deployment Based on Spatial Correlation for Methane Sensor Network. 2070-2075 - Xiong Luo, Yuechao Ni, Xue Bai:

Cluster Head Optimization Strategy for Wireless Sensor Network Based on Univariate Marginal Distribution Algorithm. 2076-2081 - Mingxiang Guan, Le Wang, Yunfeng Xing:

A Novel Method of High Dynamic Carrier Acquisition and Track for HAPS Communication Networks. 2082-2088 - Hongtao Liu, Lianglun Cheng:

Available Bandwidth Estimation Strategy Based on the Network Allocation Vector. 2089-2095 - Linlan Liu, Haili Zhang, Jian Shu, Yubin Chen, Yebin Chen:

An Improved Three-dimensional Localization Scheme based on APIT. 2096-2103 - Mingchuan Zhang, Ruijuan Zheng, Qingtao Wu, Wangyang Wei:

A Novel Multi-x Cooperative Decision-making Mechanism for Cognitive Internet of Things. 2104-2111

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














