Search dblp for Publications

export results for "stream:streams/journals/jnw:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/jnw/AliG16,
  author    = {Hamida Qumber Ali and
               Sayeed Ghani},
  title     = {A Comparative Analysis of Protocols for Integrating {IP} and Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {11},
  number    = {01},
  pages     = {1--10},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.01.1-10},
  doi       = {10.4304/jnw.11.01.1-10},
  timestamp = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AliG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChalhoubBM16,
  author    = {G{\'{e}}rard Chalhoub and
               Eric Perrier de La Bathie and
               Michel Misson},
  title     = {Overhead caused by WiFi on ZigBee Networks using Slotted {CSMA/CA}},
  journal   = {J. Networks},
  volume    = {11},
  number    = {2},
  pages     = {39--45},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.2.39-45},
  doi       = {10.4304/jnw.11.2.39-45},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChalhoubBM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JadidiMSS16,
  author    = {Zahra Jadidi and
               Vallipuram Muthukkumarasamy and
               Elankayer Sithirasenan and
               Kalvinder Singh},
  title     = {Intelligent Sampling Using an Optimized Neural Network},
  journal   = {J. Networks},
  volume    = {11},
  number    = {01},
  pages     = {16--27},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.01.16-27},
  doi       = {10.4304/jnw.11.01.16-27},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JadidiMSS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MunadiPM16,
  author    = {Rendy Munadi and
               Doan Perdana and
               Asep Mulyana},
  title     = {Adaptive Control Channel Interval in {VANET} Based on Mobility Model
               and Queuing Network Analysis},
  journal   = {J. Networks},
  volume    = {11},
  number    = {2},
  pages     = {62--68},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.2.62-68},
  doi       = {10.4304/jnw.11.2.62-68},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MunadiPM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RamezaniSS16,
  author    = {Khosrow Ramezani and
               Elankayer Sithirasenan and
               Kaile Su},
  title     = {Functional Analysis of {EAP-CRA}},
  journal   = {J. Networks},
  volume    = {11},
  number    = {01},
  pages     = {28--38},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.01.28-38},
  doi       = {10.4304/jnw.11.01.28-38},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RamezaniSS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RanjanaG16,
  author    = {P. Ranjana and
               A. George},
  title     = {Hybrid Edge Capacity Routing in Complex Networks},
  journal   = {J. Networks},
  volume    = {11},
  number    = {01},
  pages     = {11--15},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.01.11-15},
  doi       = {10.4304/jnw.11.01.11-15},
  timestamp = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RanjanaG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Sandrasegaran16,
  author    = {Sinh Cong Lam and
               Kumbesan Sandrasegaran},
  title     = {Analytical Coverage Probability of a Typical User In Heterogeneous
               Cellular Networks},
  journal   = {J. Networks},
  volume    = {11},
  number    = {2},
  pages     = {56--61},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.2.56-61},
  doi       = {10.4304/jnw.11.2.56-61},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Sandrasegaran16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWLB16,
  author    = {Qiuhua Wang and
               Xiaojun Wang and
               Qiuyun Lv and
               Jianrong Bao},
  title     = {Methods for Improving the Rate of Secret Key Generation based on Wireless
               Channel Characteristics},
  journal   = {J. Networks},
  volume    = {11},
  number    = {2},
  pages     = {46--55},
  year      = {2016},
  url       = {https://doi.org/10.4304/jnw.11.2.46-55},
  doi       = {10.4304/jnw.11.2.46-55},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWLB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Al-MamooriJBV15,
  author    = {Saja Al{-}Mamoori and
               Arunita Jaekel and
               Subir Bandyopadhyay and
               Sriharsha Varanasi},
  title     = {Security-Aware Dynamic {RWA} for Reducing In-band and Out-of-band
               Jamming Attacks in {WDM} Optical Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {11},
  pages     = {587--596},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.11.587-596},
  doi       = {10.4304/jnw.10.11.587-596},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Al-MamooriJBV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Al-MaqriOAH15,
  author    = {Mohammed A. Al{-}Maqri and
               Mohamed Othman and
               Borhanuddin Mohd Ali and
               Zurina Mohd Hanapi},
  title     = {Providing Dynamic {TXOP} for QoS Support of Video Transmission in
               {IEEE} 802.11e WLANs},
  journal   = {J. Networks},
  volume    = {10},
  number    = {9},
  pages     = {501--511},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.9.501-511},
  doi       = {10.4304/jnw.10.9.501-511},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Al-MaqriOAH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AlamAA15,
  author    = {Muhammad Morshed Alam and
               Muhammad Yeasir Arafat and
               Feroz Ahmed},
  title     = {Study on Auto Detecting Defence Mechanisms against Application Layer
               Ddos Attacks in {SIP} Server},
  journal   = {J. Networks},
  volume    = {10},
  number    = {6},
  pages     = {344--352},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.6.344-352},
  doi       = {10.4304/jnw.10.6.344-352},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AlamAA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Alhmiedat15,
  author    = {Tareq Alhmiedat},
  title     = {A Survey on Environmental Monitoring Systems using Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {11},
  pages     = {606--615},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.11.606-615},
  doi       = {10.4304/jnw.10.11.606-615},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Alhmiedat15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AlkandariP15,
  author    = {Bader Alkandari and
               Kaveh Pahlavan},
  title     = {A Novel Approach for Performance Analysis of Multi-Rate Relay Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {12},
  pages     = {627--632},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.12.627-632},
  doi       = {10.4304/jnw.10.12.627-632},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AlkandariP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AlshayejiDS15,
  author    = {Mohammad Alshayeji and
               Desiree Noela Dias and
               M. D. Samrajesh},
  title     = {Enhanced Chunk Regulation Algorithm for Superior QoS in Heterogeneous
               {P2P} Video on Demand},
  journal   = {J. Networks},
  volume    = {10},
  number    = {10},
  pages     = {567--578},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.10.567-578},
  doi       = {10.4304/jnw.10.10.567-578},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AlshayejiDS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AnC15,
  author    = {Min Kyung An and
               Hyuk Cho},
  title     = {Efficient Data Collection in Interference-Aware Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {12},
  pages     = {658--667},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.12.658-667},
  doi       = {10.4304/jnw.10.12.658-667},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AnC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AnsharHOB15,
  author    = {Khairul Anshar and
               Nanna Suryana Herman and
               Zahriah Othman and
               Safiza Suhana Kamal Baharin},
  title     = {Different Geospatial Data on Hybrid Map Application},
  journal   = {J. Networks},
  volume    = {10},
  number    = {7},
  pages     = {413--419},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.7.413-419},
  doi       = {10.4304/jnw.10.7.413-419},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AnsharHOB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AulakhV15,
  author    = {Inderdeep Kaur Aulakh and
               Renu Vig},
  title     = {Secondary User Aggressiveness Optimization in Sensing-Transmission
               Scheduling for Cognitive Radio Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {10},
  pages     = {543--550},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.10.543-550},
  doi       = {10.4304/jnw.10.10.543-550},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AulakhV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BakarT15,
  author    = {Asmidar Abu Bakar and
               Elmunzir Hassan El Talib},
  title     = {Formulating Heterogeneous Access Control model for {MANET} Emergency
               Services},
  journal   = {J. Networks},
  volume    = {10},
  number    = {7},
  pages     = {407--412},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.7.407-412},
  doi       = {10.4304/jnw.10.7.407-412},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BakarT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BenabbouBZBOO15,
  author    = {Adil Benabbou and
               Abdelali Boushaba and
               Azeddine Zahi and
               Rachid Benabbou and
               Mohammed Oumsis and
               Sa{\"{\i}}d El Alaoui Ouatik},
  title     = {{NCA:} New Cooperative Algorithm for Reducing Topology Control Packets
               in {OLSR}},
  journal   = {J. Networks},
  volume    = {10},
  number    = {3},
  pages     = {125--133},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.3.125-133},
  doi       = {10.4304/jnw.10.3.125-133},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BenabbouBZBOO15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BenamraneMB15,
  author    = {Fouad Benamrane and
               Mouad Ben Mamoun and
               R{\'{e}}douane Benaini},
  title     = {Performances of OpenFlow-Based Software-Defined Networks: An overview},
  journal   = {J. Networks},
  volume    = {10},
  number    = {6},
  pages     = {329--337},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.6.329-337},
  doi       = {10.4304/jnw.10.6.329-337},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BenamraneMB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BijalwanWPJ15,
  author    = {Anchit Bijalwan and
               Mohammad Wazid and
               Emmanuel S. Pilli and
               Ramesh Chandra Joshi},
  title     = {Forensics of Random-UDP Flooding Attacks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {5},
  pages     = {287--293},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.5.287-293},
  doi       = {10.4304/jnw.10.5.287-293},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BijalwanWPJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BisioDDLMPZ15,
  author    = {Igor Bisio and
               Alessandro Delfino and
               Stefano Delucchi and
               Fabio Lavagetto and
               Mario Marchese and
               Giancarlo Portomauro and
               Sandro Zappatore},
  title     = {Hybrid Simulated-Emulated Platform for Heterogeneous Access Networks
               Performance Investigations},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {265--272},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.265-272},
  doi       = {10.4304/jnw.10.4.265-272},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BisioDDLMPZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BisioDLM15,
  author    = {Igor Bisio and
               Stefano Delucchi and
               Fabio Lavagetto and
               Mario Marchese},
  title     = {Performance Comparison of Network Selection Algorithms in the Framework
               of the 802.21 Standard},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {51--59},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.51-59},
  doi       = {10.4304/jnw.10.01.51-59},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BisioDLM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BiswasMWS15,
  author    = {Kamanashis Biswas and
               Vallipuram Muthukkumarasamy and
               Xin{-}Wen Wu and
               Kalvinder Singh},
  title     = {An Interference Aware Heuristic Routing Protocol for Wireless Home
               Automation Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {11},
  pages     = {616--624},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.11.616-624},
  doi       = {10.4304/jnw.10.11.616-624},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BiswasMWS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BrocardoTSW15,
  author    = {Marcelo Luiz Brocardo and
               Issa Traor{\'{e}} and
               Sherif Saad and
               Isaac Woungang},
  title     = {Verifying Online User Identity using Stylometric Analysis for Short
               Messages},
  journal   = {J. Networks},
  volume    = {10},
  number    = {12},
  pages     = {675--683},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.12.675-683},
  doi       = {10.4304/jnw.10.12.675-683},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BrocardoTSW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Cetinkaya15,
  author    = {Coskun Cetinkaya},
  title     = {Asynchronous Multi-Channel {MAC} Protocol},
  journal   = {J. Networks},
  volume    = {10},
  number    = {9},
  pages     = {530--542},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.9.530-542},
  doi       = {10.4304/jnw.10.9.530-542},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Cetinkaya15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChaczkoSS15,
  author    = {Zenon Chaczko and
               Shaher Suleman Slehat and
               Alex Salmon},
  title     = {Application of Predictive Analytics in Telecommunications Project
               Management},
  journal   = {J. Networks},
  volume    = {10},
  number    = {10},
  pages     = {551--566},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.10.551-566},
  doi       = {10.4304/jnw.10.10.551-566},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChaczkoSS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenHC15,
  author    = {Zhixiang Chen and
               Jinjie Hu and
               Feilong Cao},
  title     = {Learning Algorithm of Neural Networks on Spherical Cap},
  journal   = {J. Networks},
  volume    = {10},
  number    = {3},
  pages     = {152--158},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.3.152-158},
  doi       = {10.4304/jnw.10.3.152-158},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenHC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenJ15,
  author    = {Shiwei Chen and
               Chenhui Jin},
  title     = {An Improved Way to Construct the Parity-check Equations in Fast Correlation
               Attacks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {8},
  pages     = {443--447},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.8.443-447},
  doi       = {10.4304/jnw.10.8.443-447},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChuangL15,
  author    = {Kai{-}Wayne Chuang and
               Chien{-}Nan Lin},
  title     = {Replenishment Policies for Deteriorating Items with Ramp Type Demand
               and a Fixed Shelf-Life under Shortage},
  journal   = {J. Networks},
  volume    = {10},
  number    = {8},
  pages     = {470--476},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.8.470-476},
  doi       = {10.4304/jnw.10.8.470-476},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChuangL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CyprianiDH15,
  author    = {Matteo Cypriani and
               Gilles Y. Delisle and
               Nadir Hakem},
  title     = {Wi-Fi-based Positioning in a Complex Underground Environment},
  journal   = {J. Networks},
  volume    = {10},
  number    = {3},
  pages     = {141--151},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.3.141-151},
  doi       = {10.4304/jnw.10.3.141-151},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CyprianiDH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DhurandherSGWO15,
  author    = {Sanjay Kumar Dhurandher and
               Deepak Kr. Sharma and
               Sahil Gupta and
               Isaac Woungang and
               Mohammad S. Obaidat},
  title     = {Integration of Fixed and Mobile Infrastructure for Message Passing
               in Opportunistic Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {12},
  pages     = {642--657},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.12.642-657},
  doi       = {10.4304/jnw.10.12.642-657},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DhurandherSGWO15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/EskolaH15,
  author    = {Marina Eskola and
               Tapio Heikkil{\"{a}}},
  title     = {Detection of Short-Term Radio Signal Disturbances in Industrial Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {201--208},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.201-208},
  doi       = {10.4304/jnw.10.4.201-208},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/EskolaH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FrndaVSF15,
  author    = {Jaroslav Frnda and
               Miroslav Vozn{\'{a}}k and
               Lukas Sevcik and
               Peppino Fazio},
  title     = {Prediction Model of Triple play services for QoS Assessment in {IP}
               Based Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {232--239},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.232-239},
  doi       = {10.4304/jnw.10.4.232-239},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FrndaVSF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaiAR15,
  author    = {Mengmeng Gai and
               Azad Azadmanesh and
               Ali Rezaeian},
  title     = {A Hybrid Approach to Indoor Sensor Area Localization and Coverage},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {209--221},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.209-221},
  doi       = {10.4304/jnw.10.4.209-221},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaiAR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gaol15,
  author    = {Ford Lumban Gaol},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {10},
  number    = {7},
  pages     = {395--396},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.7.395-396},
  doi       = {10.4304/jnw.10.7.395-396},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Gaol15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GharsallahOZOH15,
  author    = {Amina Gharsallah and
               Nouri Omheni and
               Faouzi Zarai and
               Mohammad S. Obaidat and
               Kuei{-}Fang Hsiao},
  title     = {Network Selection in Heterogeneous Wireless System Environments},
  journal   = {J. Networks},
  volume    = {10},
  number    = {12},
  pages     = {633--641},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.12.633-641},
  doi       = {10.4304/jnw.10.12.633-641},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GharsallahOZOH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HasanIHIH15,
  author    = {Mohammad Kamrul Hasan and
               Ahmad Fadzil Ismail and
               Aisha{-}Hassan A. Hashim and
               Shayla Islam and
               Wahidah Hashim},
  title     = {Design and Development of Hybrid Time Synchronization Scheme to Mitigate
               the Phase and Frequency error for Asynchronous Link in Heterogeneous
               Network},
  journal   = {J. Networks},
  volume    = {10},
  number    = {11},
  pages     = {597--605},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.11.597-605},
  doi       = {10.4304/jnw.10.11.597-605},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HasanIHIH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JadidiMSS15,
  author    = {Zahra Jadidi and
               Vallipuram Muthukkumarasamy and
               Elankayer Sithirasenan and
               Kalvinder Singh},
  title     = {Performance of Flow-based Anomaly Detection in Sampled Traffic},
  journal   = {J. Networks},
  volume    = {10},
  number    = {9},
  pages     = {512--520},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.9.512-520},
  doi       = {10.4304/jnw.10.9.512-520},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JadidiMSS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JakalanJZQ15,
  author    = {Ahmad Jakalan and
               Gong Jian and
               Weiwei Zhang and
               Su Qi},
  title     = {Clustering and Profiling {IP} Hosts Based on Traffic Behavior},
  journal   = {J. Networks},
  volume    = {10},
  number    = {2},
  pages     = {99--107},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.2.99-107},
  doi       = {10.4304/jnw.10.2.99-107},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JakalanJZQ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JararwehAAT15,
  author    = {Yaser Jararweh and
               Huda Ababneh and
               Mohammad Alhammouri and
               Lo'ai Ali Tawalbeh},
  title     = {Energy Efficient Multi-Level Network Resources Management in Cloud
               Computing Data Centers},
  journal   = {J. Networks},
  volume    = {10},
  number    = {5},
  pages     = {273--280},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.5.273-280},
  doi       = {10.4304/jnw.10.5.273-280},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JararwehAAT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Jaroenrat15,
  author    = {Kairat Jaroenrat},
  title     = {A Design Algorithm for QoS Network with Flow Delay Control},
  journal   = {J. Networks},
  volume    = {10},
  number    = {2},
  pages     = {85--90},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.2.85-90},
  doi       = {10.4304/jnw.10.2.85-90},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Jaroenrat15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JungKMS15,
  author    = {J{\"{o}}rg Jung and
               Simon Kiertscher and
               Sebastian Menski and
               Bettina Schnor},
  title     = {Self-Adapting Load Balancing for {DNS}},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {222--231},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.222-231},
  doi       = {10.4304/jnw.10.4.222-231},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JungKMS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KapoorMN15,
  author    = {Navdeep Kaur Kapoor and
               Shikharesh Majumdar and
               Biswajit Nandy},
  title     = {Techniques for Allocation of Sensors in Shared Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {15--28},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.15-28},
  doi       = {10.4304/jnw.10.01.15-28},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KapoorMN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiDYF15,
  author    = {Lin Li and
               Yi{-}na Deng and
               Yang Yuan and
               Wenjiang Feng},
  title     = {Research on Channel Selection Algorithms in Cognitive Radio Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {3},
  pages     = {159--163},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.3.159-163},
  doi       = {10.4304/jnw.10.3.159-163},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiDYF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWY15,
  author    = {Liang Li and
               Gaoxia Wang and
               Man Yu},
  title     = {Pairwise Co-betweenness for Several Types of Network},
  journal   = {J. Networks},
  volume    = {10},
  number    = {2},
  pages     = {91--98},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.2.91-98},
  doi       = {10.4304/jnw.10.2.91-98},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lozano-GarzonCV15,
  author    = {Carlos Andres Lozano{-}Garzon and
               Miguel Camelo and
               Pere Vil{\`{a}} and
               Yezid Donoso},
  title     = {A Multi-objective Routing Algorithm for Wireless Mesh Network in a
               Smart Cities Environment},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {60--69},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.60-69},
  doi       = {10.4304/jnw.10.01.60-69},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Lozano-GarzonCV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LupiaR15,
  author    = {Andrea Lupia and
               Floriano De Rango},
  title     = {Evaluation of the Energy Consumption Introduced by a Trust Management
               Scheme on Mobile Ad-hoc Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {240--251},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.240-251},
  doi       = {10.4304/jnw.10.4.240-251},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LupiaR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MansouriMZOK15,
  author    = {Wahida Mansouri and
               Kais Mnif and
               Faouzi Zarai and
               Mohammad S. Obaidat and
               Lotfi Kamoun},
  title     = {Capacity Analysis in the Next Generation Wireless Networks Based on
               {SINR} Constraints},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {29--38},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.29-38},
  doi       = {10.4304/jnw.10.01.29-38},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MansouriMZOK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Meghanathan15,
  author    = {Natarajan Meghanathan},
  title     = {A Stable Path Routing Protocol for Cognitive Radio Ad hoc Networks
               based on the Maximum Number of Common Primary User Channels},
  journal   = {J. Networks},
  volume    = {10},
  number    = {2},
  pages     = {117--124},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.2.117-124},
  doi       = {10.4304/jnw.10.2.117-124},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Meghanathan15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Meghanathan15a,
  author    = {Natarajan Meghanathan},
  title     = {Time-Dependent Variation of the Centrality Measures of the Nodes during
               the Evolution of a Scale-Free Network},
  journal   = {J. Networks},
  volume    = {10},
  number    = {7},
  pages     = {431--442},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.7.431-442},
  doi       = {10.4304/jnw.10.7.431-442},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Meghanathan15a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NguyenNNS15,
  author    = {Van{-}Toan Nguyen and
               Kien Duc Nguyen and
               Hoang Nam Nguyen and
               Keattisak Sripimanwat},
  title     = {Downlink Channel Allocation Scheme deploying Cooperative Channel Monitoring
               for Cognitive Cellular-FemtocellNetworks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {6},
  pages     = {338--343},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.6.338-343},
  doi       = {10.4304/jnw.10.6.338-343},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NguyenNNS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatMB15,
  author    = {Mohammad S. Obaidat and
               Mario Marchese and
               Igor Bisio},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {173--175},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.173-175},
  doi       = {10.4304/jnw.10.4.173-175},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ObaidatMB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatNC15,
  author    = {Mohammad S. Obaidat and
               Petros Nicopolitidis and
               Daniel Cascado Caballero},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {10},
  number    = {12},
  pages     = {625--626},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.12.625-626},
  doi       = {10.4304/jnw.10.12.625-626},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ObaidatNC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatV15,
  author    = {Mohammad S. Obaidat and
               Pere Vil{\`{a}}},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {1--3},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.1-3},
  doi       = {10.4304/jnw.10.01.1-3},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ObaidatV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Oida15,
  author    = {Kazumasa Oida},
  title     = {Propagation of Low Variability in Video Traffic},
  journal   = {J. Networks},
  volume    = {10},
  number    = {8},
  pages     = {448--461},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.8.448-461},
  doi       = {10.4304/jnw.10.8.448-461},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Oida15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PupatwibulBSB15,
  author    = {Pakawat Pupatwibul and
               Ameen Banjar and
               Abdallah Al Sabbagh and
               Robin Braun},
  title     = {A Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping},
  journal   = {J. Networks},
  volume    = {10},
  number    = {5},
  pages     = {322--327},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.5.322-327},
  doi       = {10.4304/jnw.10.5.322-327},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PupatwibulBSB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QinWZ15,
  author    = {Yuanqing Qin and
               Fang Wang and
               Chunjie Zhou},
  title     = {A Distributed UWB-based Localization System in Underground Mines},
  journal   = {J. Networks},
  volume    = {10},
  number    = {3},
  pages     = {134--140},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.3.134-140},
  doi       = {10.4304/jnw.10.3.134-140},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QinWZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RahmanMW15,
  author    = {Anisur Rahman and
               Vallipuram Muthukkumarasamy and
               Xin{-}Wen Wu},
  title     = {Coordinates and Bearing of Submerged Sensors Using a Single Mobile
               Beacon {(CSMB)}},
  journal   = {J. Networks},
  volume    = {10},
  number    = {8},
  pages     = {462--469},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.8.462-469},
  doi       = {10.4304/jnw.10.8.462-469},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RahmanMW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RangoAF15,
  author    = {Floriano De Rango and
               Salvatore Amelio and
               Peppino Fazio},
  title     = {Epidemic Strategies in Delay Tolerant Networks from an Energetic Point
               of View: Main Issues and Performance Evaluation},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {4--14},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.4-14},
  doi       = {10.4304/jnw.10.01.4-14},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RangoAF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RungeRWWC15,
  author    = {Torsten M. Runge and
               Daniel Raumer and
               Florian Wohlfart and
               Bernd E. Wolfinger and
               Georg Carle},
  title     = {Towards Low Latency Software Routers},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {188--200},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.188-200},
  doi       = {10.4304/jnw.10.4.188-200},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RungeRWWC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RungeWHA15,
  author    = {Torsten M. Runge and
               Bernd E. Wolfinger and
               Stephan Heckm{\"{u}}ller and
               Alireza Abdollahpouri},
  title     = {A Modeling Approach for Resource Management in Resource-Constrained
               Nodes},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {39--50},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.39-50},
  doi       = {10.4304/jnw.10.01.39-50},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RungeWHA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SaldanaHFRPLFCN15,
  author    = {Jose Saldana and
               David de Hoz and
               Juli{\'{a}}n Fern{\'{a}}ndez{-}Navajas and
               Jos{\'{e}} Ru{\'{\i}}z{-}Mas and
               Fernando Pascual and
               Diego R. L{\'{o}}pez and
               David Florez and
               Juan A. Castell and
               Manuel Nunez},
  title     = {Small-Packet Flows in Software Defined Networks: Traffic Profile Optimization},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {176--187},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.176-187},
  doi       = {10.4304/jnw.10.4.176-187},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SaldanaHFRPLFCN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SastraWH15,
  author    = {Nyoman Putra Sastra and
               Wirawan and
               Gamantyo Hendrantoro},
  title     = {Energy Efficiency of Image Compression for Virtual View Image over
               Wireless Visual Sensor Network},
  journal   = {J. Networks},
  volume    = {10},
  number    = {6},
  pages     = {385--393},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.6.385-393},
  doi       = {10.4304/jnw.10.6.385-393},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SastraWH15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShengSY15,
  author    = {Lijie Sheng and
               Zhikun Song and
               Jianhua Yang},
  title     = {A Multi-Constrained Routing Algorithm for Software Defined Network
               Based on Nonlinear Annealing},
  journal   = {J. Networks},
  volume    = {10},
  number    = {6},
  pages     = {376--384},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.6.376-384},
  doi       = {10.4304/jnw.10.6.376-384},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShengSY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShiWXWDW15,
  author    = {Zhicai Shi and
               Fei Wu and
               Yongxiang Xia and
               Yihan Wang and
               Jian Dai and
               Changzhi Wang},
  title     = {A Lightweight Authentication Protocol Based on Partial Identifier
               for EPCglobal Class-1 Gen-2 Tags},
  journal   = {J. Networks},
  volume    = {10},
  number    = {6},
  pages     = {369--375},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.6.369-375},
  doi       = {10.4304/jnw.10.6.369-375},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShiWXWDW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShidikAM15,
  author    = {Guruh Fajar Shidik and
               Azhari and
               Khabib Mustofa},
  title     = {Evaluation of Selection Policy with Various Virtual Machine Instances
               in Dynamic {VM} Consolidation for Energy Efficient at Cloud Data Centers},
  journal   = {J. Networks},
  volume    = {10},
  number    = {7},
  pages     = {397--406},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.7.397-406},
  doi       = {10.4304/jnw.10.7.397-406},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShidikAM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SiddiquiZS15,
  author    = {Farhan Siddiqui and
               Sherali Zeadally and
               Khaled Salah},
  title     = {Gigabit Wireless Networking with {IEEE} 802.11ac: Technical Overview
               and Challenges},
  journal   = {J. Networks},
  volume    = {10},
  number    = {3},
  pages     = {164--171},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.3.164-171},
  doi       = {10.4304/jnw.10.3.164-171},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SiddiquiZS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SivarajP15,
  author    = {Nirmala Sivaraj and
               Padmaloshani Palanisamy},
  title     = {Downlink Interference Analysis in LTE-Femtocell Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {5},
  pages     = {294--301},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.5.294-301},
  doi       = {10.4304/jnw.10.5.294-301},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SivarajP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SlehatC15,
  author    = {Shaher Suleman Slehat and
               Zenon Chaczko},
  title     = {Mitigating Nat Holes Vulnerability in Teredo Clients},
  journal   = {J. Networks},
  volume    = {10},
  number    = {9},
  pages     = {521--529},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.9.521-529},
  doi       = {10.4304/jnw.10.9.521-529},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SlehatC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SonnenbergS15,
  author    = {Christian Sonnenberg and
               Jerome Sonnenberg},
  title     = {Cognitive Network Factors as an Impact on Mobile Device Usability},
  journal   = {J. Networks},
  volume    = {10},
  number    = {11},
  pages     = {579--586},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.11.579-586},
  doi       = {10.4304/jnw.10.11.579-586},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SonnenbergS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SuT15,
  author    = {Ming{-}Yang Su and
               Chen{-}Han Tsai},
  title     = {An Approach to Resisting Malformed and Flooding Attacks on {SIP} Servers},
  journal   = {J. Networks},
  volume    = {10},
  number    = {2},
  pages     = {77--84},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.2.77-84},
  doi       = {10.4304/jnw.10.2.77-84},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SuT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TaamHOOR15,
  author    = {Abdelkarim Taam and
               Hassane Hjiaj and
               Sa{\"{\i}}d El Alaoui Ouatik and
               Mohammed Oumsis and
               Brahim Raouyane},
  title     = {Advance procedure for resource reservation QoSNSLP Signaling based},
  journal   = {J. Networks},
  volume    = {10},
  number    = {5},
  pages     = {281--286},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.5.281-286},
  doi       = {10.4304/jnw.10.5.281-286},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TaamHOOR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TariqLACA15,
  author    = {Moeenuddin Tariq and
               Muhammad Shafie Abdul Latif and
               Muhammad Ayaz and
               Yahaya Coulibaly and
               Nadera Al{-}Areqi},
  title     = {Distance based Reliable and Energy Efficient {(DREE)} Routing Protocol
               for Underwater Acoustic Sensor Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {5},
  pages     = {311--321},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.5.311-321},
  doi       = {10.4304/jnw.10.5.311-321},
  timestamp = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TariqLACA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TavanpourMMWBC15,
  author    = {Misagh Tavanpour and
               Jan Mikhail and
               Mohammad Moallemi and
               Gabriel A. Wainer and
               Gary Boudreau and
               Ronald Casselman},
  title     = {Data Upload in {LTE-A} Mobile Networks by Using Shared Segmented Upload},
  journal   = {J. Networks},
  volume    = {10},
  number    = {4},
  pages     = {252--264},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.4.252-264},
  doi       = {10.4304/jnw.10.4.252-264},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/TavanpourMMWBC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TawalbehJAD15,
  author    = {Lo'ai Ali Tawalbeh and
               Yaser Jararweh and
               Fadi Ababneh and
               Fahd Dosari},
  title     = {Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing},
  journal   = {J. Networks},
  volume    = {10},
  number    = {01},
  pages     = {70--76},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.01.70-76},
  doi       = {10.4304/jnw.10.01.70-76},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TawalbehJAD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TroussasVE15,
  author    = {Christos Troussas and
               Maria Virvou and
               Kurt Junshean Espinosa},
  title     = {Using Visualization Algorithms for Discovering Patterns in Groups
               of Users for Tutoring Multiple Languages through Social Networking},
  journal   = {J. Networks},
  volume    = {10},
  number    = {12},
  pages     = {668--674},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.12.668-674},
  doi       = {10.4304/jnw.10.12.668-674},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TroussasVE15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/UsmanMW15,
  author    = {Muhammad Usman and
               Vallipuram Muthukkumarasamy and
               Xin{-}Wen Wu},
  title     = {Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly
               Detection and Verification in Resource Constrained Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {6},
  pages     = {353--368},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.6.353-368},
  doi       = {10.4304/jnw.10.6.353-368},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/UsmanMW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/VictorUM15,
  author    = {Victor Kardeby and
               Ulf Jennehag and
               Mikael Gidlund},
  title     = {Overlay Enhanced Mobility for the Internet of Things},
  journal   = {J. Networks},
  volume    = {10},
  number    = {7},
  pages     = {420--430},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.7.420-430},
  doi       = {10.4304/jnw.10.7.420-430},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/VictorUM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WatfaMAS15,
  author    = {Mohamed K. Watfa and
               Sami Miniaoui and
               Haitham Al{-}Hassanieh and
               Samir Selman},
  title     = {A Wireless Charging Infrastructure for Future Electrical Vehicular
               Adhoc Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {9},
  pages     = {487--500},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.9.487-500},
  doi       = {10.4304/jnw.10.9.487-500},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WatfaMAS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WaziraliC15,
  author    = {Raniyah Wazirali and
               Zenon Chaczko},
  title     = {Data Hiding Based on Intelligent Optimized Edges for Secure Multimedia
               Communication},
  journal   = {J. Networks},
  volume    = {10},
  number    = {8},
  pages     = {477--485},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.8.477-485},
  doi       = {10.4304/jnw.10.8.477-485},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WaziraliC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoQTLD15,
  author    = {Kun Xiao and
               Cailing Qin and
               Chen Tan and
               Lili Liao and
               Chong Dang},
  title     = {A Fair Relay Selection Based on Mapping Functions in the Dual Hop
               {DF} Cooperative Networks},
  journal   = {J. Networks},
  volume    = {10},
  number    = {5},
  pages     = {302--310},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.5.302-310},
  doi       = {10.4304/jnw.10.5.302-310},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiaoQTLD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouGNS15,
  author    = {Jing Zhou and
               Aihuang Guo and
               Hung T. Nguyen and
               Steven W. Su},
  title     = {Intelligent Management of Multiple Access Schemes in Wireless Body
               Area Network},
  journal   = {J. Networks},
  volume    = {10},
  number    = {2},
  pages     = {108--116},
  year      = {2015},
  url       = {https://doi.org/10.4304/jnw.10.2.108-116},
  doi       = {10.4304/jnw.10.2.108-116},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouGNS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AbawajyBKC14,
  author    = {Jemal H. Abawajy and
               Gleb Beliakov and
               Andrei V. Kelarev and
               Morshed U. Chowdhury},
  title     = {Iterative Construction of Hierarchical Classifiers for Phishing Website
               Detection},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2089--2098},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2089-2098},
  doi       = {10.4304/jnw.9.8.2089-2098},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AbawajyBKC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AbawajyI14,
  author    = {Jemal H. Abawajy and
               Md. Rafiqul Islam},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2875--2877},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2875-2877},
  doi       = {10.4304/jnw.9.11.2875-2877},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AbawajyI14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AbawajyKC14,
  author    = {Jemal H. Abawajy and
               Andrei V. Kelarev and
               Morshed U. Chowdhury},
  title     = {Automatic Generation of Meta Classifiers with Large Levels for Distributed
               Computing and Networking},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2259--2268},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2259-2268},
  doi       = {10.4304/jnw.9.9.2259-2268},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AbawajyKC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AdamBGKK14,
  author    = {George Adam and
               Christos Bouras and
               Apostolos Gkamas and
               Vaggelis Kapoulas and
               Georgios Kioumourtzis},
  title     = {Cross Layer Design for Video Streaming in MANETs},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {328--338},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.328-338},
  doi       = {10.4304/jnw.9.2.328-338},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AdamBGKK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AdamBKSZ14,
  author    = {Giorgos Adam and
               Christos Bouras and
               Ioannis Kalligeros and
               Kostas Stamos and
               Giannis Zaoudis},
  title     = {Multi-domain Information Exchange in a Bandwidth on Demand Tool},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1075--1085},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1075-1085},
  doi       = {10.4304/jnw.9.5.1075-1085},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/AdamBKSZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AdinehniaO14,
  author    = {Reza Adinehnia and
               Mohamed Othman},
  title     = {Direction-based {TCP} Fairness Enhancement in High speed {IEEE} 802.11n},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2013--2020},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2013-2020},
  doi       = {10.4304/jnw.9.8.2013-2020},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AdinehniaO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AhmadAKAY14,
  author    = {Nazrul Muhaimin Ahmad and
               Anang Hudaya Muhamad Amin and
               Subarmaniam Kannan and
               Mohd Faizal Abdollah and
               Robiah Yusof},
  title     = {Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3470--3477},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3470-3477},
  doi       = {10.4304/jnw.9.12.3470-3477},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AhmadAKAY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AhmadiniaAA14,
  author    = {Mohammad Ahmadinia and
               Hamid Alinejad{-}Rokny and
               Hojjatollah Ahangarikiasari},
  title     = {Data Aggregation in Wireless Sensor Networks Based on Environmental
               Similarity: {A} Learning Automata Approach},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2567--2573},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2567-2573},
  doi       = {10.4304/jnw.9.10.2567-2573},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AhmadiniaAA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AlazabHAIYVB14,
  author    = {Mamoun Alazab and
               Md. Shamsul Huda and
               Jemal H. Abawajy and
               Md. Rafiqul Islam and
               John Yearwood and
               Sitalakshmi Venkatraman and
               Roderic Broadhurst},
  title     = {A Hybrid Wrapper-Filter Approach for Malware Detection},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2878--2891},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2878-2891},
  doi       = {10.4304/jnw.9.11.2878-2891},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AlazabHAIYVB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AliWLC14,
  author    = {Amjad Ali and
               Huiqiang Wang and
               Hongwu Lv and
               Xiaoming Chen},
  title     = {Asynchronous Session Reservation Multi-Channel {MAC} for Ad Hoc Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {259--268},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.259-268},
  doi       = {10.4304/jnw.9.2.259-268},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AliWLC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AlmobaideenA14,
  author    = {Wesam A. Almobaideen and
               Njoud O. Al{-}maitah},
  title     = {{TTAF:} {TCP} Timeout Adaptivity Based on Fast Retransmit over {MANET}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3321--3326},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3321-3326},
  doi       = {10.4304/jnw.9.12.3321-3326},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AlmobaideenA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ArafatAA14,
  author    = {Muhammad Yeasir Arafat and
               Muhammad Morshed Alam and
               Feroz Ahmed},
  title     = {SIP-Based QoS in {IP} Telephony},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3415--3426},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3415-3426},
  doi       = {10.4304/jnw.9.12.3415-3426},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ArafatAA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BaiHW14,
  author    = {Zhi Bai and
               Yigang He and
               Sainan Wang},
  title     = {Research of {RFID} Tag Anti-collision Algorithm based on Binary Tree},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2543--2548},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2543-2548},
  doi       = {10.4304/jnw.9.9.2543-2548},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BaiHW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BakiK14,
  author    = {A. K. M. Baki and
               Nemai Chandra Karmakar},
  title     = {Performance Comparison of {RFID} Tag at {UHF} Band and Millimeter-Wave
               Band},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3215--3220},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3215-3220},
  doi       = {10.4304/jnw.9.12.3215-3220},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BakiK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BanjarPB14,
  author    = {Ameen Banjar and
               Pakawat Pupatwibul and
               Robin Braun},
  title     = {{DAIM:} a Mechanism to Distribute Control Functions within OpenFlow
               Switches},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {1--9},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.1-9},
  doi       = {10.4304/jnw.9.01.1-9},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BanjarPB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BianMYZM14,
  author    = {Zhicheng Bian and
               Weijian Mi and
               Xiaoming Yang and
               Ning Zhao and
               Chao Mi},
  title     = {Modified Hungarian Algorithm for Real-Time {ALV} Dispatching Problem
               in Huge Container Terminals},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {123--130},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.123-130},
  doi       = {10.4304/jnw.9.01.123-130},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BianMYZM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BrocardoTSW14,
  author    = {Marcelo Luiz Brocardo and
               Issa Traor{\'{e}} and
               Sherif Saad and
               Isaac Woungang},
  title     = {Verifying Online User Identity using Stylometric Analysis for Short
               Messages},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3347--3355},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3347-3355},
  doi       = {10.4304/jnw.9.12.3347-3355},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BrocardoTSW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiXYZ14,
  author    = {Ligang Cai and
               Bo Xu and
               Jianwu Yang and
               Sen Zhang},
  title     = {Parameters Tracking Differentiator based on the Fuzzy Control and
               Varied Sliding Mode},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {78--84},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.78-84},
  doi       = {10.4304/jnw.9.01.78-84},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiXYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiZY14,
  author    = {QingLing Cai and
               YiJu Zhan and
               Jian Yang},
  title     = {The Improvement of {RFID} Authentication Protocols Based on {R-RAPSE}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {28--35},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.28-35},
  doi       = {10.4304/jnw.9.01.28-35},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiZY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiZZL14,
  author    = {Linqin Cai and
               Youdong Zhang and
               Jianrong Zhang and
               Binbin Liu},
  title     = {Controller Design for Nonlinear Networked Control Systems with Time-varying
               Delay Based on {T-S} Fuzzy Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2549--2555},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2549-2555},
  doi       = {10.4304/jnw.9.9.2549-2555},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiZZL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Cao14,
  author    = {Gang Cao},
  title     = {Secure and Efficient Electronic Auction Scheme with Strong Anonymity},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2189--2194},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2189-2194},
  doi       = {10.4304/jnw.9.8.2189-2194},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Cao14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoGDL14,
  author    = {Jianhui Cao and
               Yanlin Guo and
               Chunxiang Dong and
               Pengru Liu},
  title     = {Personalized Recommendation for Digital Library using Gaussian Mixture
               Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2775--2781},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2775-2781},
  doi       = {10.4304/jnw.9.10.2775-2781},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaoGDL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoWYY14,
  author    = {Shihua Cao and
               Qihui Wang and
               Yaping Yuan and
               Junyang Yu},
  title     = {Anomaly Event Detection Method Based on Compressive Sensing and Iteration
               in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {711--718},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.711-718},
  doi       = {10.4304/jnw.9.3.711-718},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaoWYY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Cetinkaya14,
  author    = {Coskun Cetinkaya},
  title     = {Achieving per Node Throughput Fairness in a Single-Branch of Mesh
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1388--1398},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1388-1398},
  doi       = {10.4304/jnw.9.6.1388-1398},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Cetinkaya14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChaiYCYC14,
  author    = {Rong Chai and
               Bin Yang and
               Li Cai and
               Xizhe Yang and
               Qianbin Chen},
  title     = {Multi-Object Optimization Based {RV} Selection Algorithm for {VCN}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {882--888},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.882-888},
  doi       = {10.4304/jnw.9.4.882-888},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChaiYCYC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChandraH14,
  author    = {I. Chandra and
               K. Helenprabha},
  title     = {Efficient Resource Allocation with QoS Guarantee on {LTE-A} Downlink
               Network Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2365--2370},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2365-2370},
  doi       = {10.4304/jnw.9.9.2365-2370},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChandraH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chang14,
  author    = {Xu Chang},
  title     = {Compressible Data Fusion Based on Minimum Energy Consumption in Wireless
               Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {400--408},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.400-408},
  doi       = {10.4304/jnw.9.2.400-408},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Chang14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chen14,
  author    = {Xi Chen},
  title     = {Semi-Supervised Classification Method Based on Spectral Clustering},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {384--392},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.384-392},
  doi       = {10.4304/jnw.9.2.384-392},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Chen14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenC14,
  author    = {Jingyu Chen and
               Ping Chen},
  title     = {Sequential Pattern Mining for Uncertain Data Streams using Sequential
               Sketch},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {252--258},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.252-258},
  doi       = {10.4304/jnw.9.2.252-258},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenF14,
  author    = {Xiaohong Chen and
               Xueli Fang},
  title     = {The Micro Individual Characteristics in Non-motorized Traffic Mixed
               of Bicycles and Mopeds},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2782--2787},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2782-2787},
  doi       = {10.4304/jnw.9.10.2782-2787},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenGP14,
  author    = {Xiao{-}yong Chen and
               Hui Gu and
               Zhi{-}juan Peng},
  title     = {Iterative Detecting and Decoding Based on {VBLAST} of {LDPC} in Coded
               Cooperation System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {409--414},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.409-414},
  doi       = {10.4304/jnw.9.2.409-414},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenGP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenGX14,
  author    = {Xiaoli Chen and
               Xiang Gu and
               Jinfeng Xu},
  title     = {The Analysis of Information Architecture in Mobile Web Design},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2734--2742},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2734-2742},
  doi       = {10.4304/jnw.9.10.2734-2742},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenGX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenH14,
  author    = {Jia Chen and
               Xian Huang},
  title     = {Fault Detection of Remote Multimedia in Wireless Network Based on
               Fuzzy Neural Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2851--2857},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2851-2857},
  doi       = {10.4304/jnw.9.10.2851-2857},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenJ14,
  author    = {Nan Chen and
               Rui Jiang},
  title     = {Security Analysis and Improvement of User Authentication Framework
               for Cloud Computing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {198--203},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.198-203},
  doi       = {10.4304/jnw.9.01.198-203},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenZZ14,
  author    = {Meijuan Chen and
               Xiaorong Zhu and
               Hongbo Zhu},
  title     = {Service Adaptively Medium Access Control Algorithm Based on Fuzzy
               Logical for Energy Harvesting Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2336--2341},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2336-2341},
  doi       = {10.4304/jnw.9.9.2336-2341},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenZZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Cheng14,
  author    = {Bing Cheng},
  title     = {Modified Particle Swarm Optimization for Hybrid Wireless Sensor Networks
               Coverage},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {56--62},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.56-62},
  doi       = {10.4304/jnw.9.01.56-62},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Cheng14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Cheng14a,
  author    = {Cui Cheng},
  title     = {Heterogeneous Web Data Extraction Algorithm Based On Modified Hidden
               Conditional Random Fields},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {993--999},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.993-999},
  doi       = {10.4304/jnw.9.4.993-999},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Cheng14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChengLLX14,
  author    = {Anyu Cheng and
               Xiaoyu Lin and
               Yongfu Li and
               Wei Xu},
  title     = {Design and application of {SAE} {J1939} communication protocol in
               electric vehicle},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2805--2812},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2805-2812},
  doi       = {10.4304/jnw.9.10.2805-2812},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChengLLX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChengYZW14,
  author    = {Dandan Cheng and
               Qingwei Ye and
               Yu Zhou and
               Xiaodong Wang},
  title     = {A Compression Sampling System based on Sparse {AR} Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2536--2542},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2536-2542},
  doi       = {10.4304/jnw.9.9.2536-2542},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChengYZW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChowdhuryCA14,
  author    = {Belal Chowdhury and
               Morshed U. Chowdhury and
               Jemal H. Abawajy},
  title     = {Securing a Smart Anti-counterfeit Web Application},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2925--2933},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2925-2933},
  doi       = {10.4304/jnw.9.11.2925-2933},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChowdhuryCA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CorenaO14,
  author    = {Juan Camilo Corena and
               Tomoaki Ohtsuki},
  title     = {Pollution-Free Regenerating Codes With Fast Reconstruction Verification
               for Verifiable Cloud Storage},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2892--2904},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2892-2904},
  doi       = {10.4304/jnw.9.11.2892-2904},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CorenaO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiQSYP14,
  author    = {Yuhuan Cui and
               Jingguo Qu and
               Hongbo Shao and
               Aimin Yang and
               Yamian Peng},
  title     = {Research on Elasto-plastic Contact with Friction Multipole {BEM} and
               Rolling Process},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {423--429},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.423-429},
  doi       = {10.4304/jnw.9.2.423-429},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiQSYP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiQYP14,
  author    = {Yuhuan Cui and
               Jingguo Qu and
               Aimin Yang and
               Yamian Peng},
  title     = {Fast Multipole Boundary Element Method of Potential Problems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {108--114},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.108-114},
  doi       = {10.4304/jnw.9.01.108-114},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiQYP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiQZ14,
  author    = {Yuhuan Cui and
               Jingguo Qu and
               Huancheng Zhang},
  title     = {Modeling and Numerical Simulation of Cellular Automation Traffic Flow
               Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3077--3083},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3077-3083},
  doi       = {10.4304/jnw.9.11.3077-3083},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiQZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiQZ14a,
  author    = {Yuhuan Cui and
               Jingguo Qu and
               Weiliang Zhu},
  title     = {The Study and Improvement of Unidimensional Search about Nonlinear
               Optimization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3494--3501},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3494-3501},
  doi       = {10.4304/jnw.9.12.3494-3501},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiQZ14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Culmone14,
  author    = {Rosario Culmone},
  title     = {Light Routing Algorithm for Utility Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1361--1367},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1361-1367},
  doi       = {10.4304/jnw.9.6.1361-1367},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Culmone14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DaiZW14,
  author    = {Xuebing Dai and
               Yan Zhang and
               Chaojing Wang},
  title     = {An Reliable Transmission Scheme Based on Opportunistic Cooperation
               for Wireless Body Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1927--1934},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1927-1934},
  doi       = {10.4304/jnw.9.7.1927-1934},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DaiZW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DanielLLWH14,
  author    = {Li Daniel and
               Xi Li and
               Ming{-}Jie Li and
               Jun Wang and
               Zheng{-}yu Huang},
  title     = {Application of the Grey System Theory to Predict the Strength Retrogression
               of Concrete with Gangue Subjected to Corrosion by Sulphate},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2411--2416},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2411-2416},
  doi       = {10.4304/jnw.9.9.2411-2416},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DanielLLWH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DashtiR14,
  author    = {Yousef Dashti and
               Martin Reisslein},
  title     = {CluLoR: Clustered Localized Routing for FiWi Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {828--839},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.828-839},
  doi       = {10.4304/jnw.9.4.828-839},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DashtiR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DemmelLGLR14,
  author    = {S{\'{e}}bastien Demmel and
               Alain Lambert and
               Dominique Gruyer and
               Gr{\'{e}}goire S. Larue and
               Andry Rakotonirainy},
  title     = {{IEEE} 802.11p Empirical Performance Model from Evaluations on Test
               Tracks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1485--1495},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1485-1495},
  doi       = {10.4304/jnw.9.6.1485-1495},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DemmelLGLR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Deng14,
  author    = {Liwei Deng},
  title     = {Traffic Load Constrained Routing Algorithm for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1281--1286},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1281-1286},
  doi       = {10.4304/jnw.9.5.1281-1286},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Deng14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DengL14,
  author    = {Changchun Deng and
               Yongxia Li},
  title     = {A New Optimization Model with Bee Colony Algorithm on Land-Use Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1610--1616},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1610-1616},
  doi       = {10.4304/jnw.9.6.1610-1616},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DengL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DengT14,
  author    = {Zuojie Deng and
               Xiaolan Tan},
  title     = {Overload Control for the Wireless Intelligent Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {353--359},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.353-359},
  doi       = {10.4304/jnw.9.2.353-359},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DengT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Ding14,
  author    = {Yi Ding},
  title     = {Joint Optimization of Asymmetry and Diversity of Bit-Interleaved Space-Time
               code},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {323--327},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.323-327},
  doi       = {10.4304/jnw.9.2.323-327},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Ding14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DingYH14,
  author    = {Yingqiang Ding and
               Dongsheng Yang and
               Gangtao Han},
  title     = {Multidimensional Scaling-Based Localization Algorithm for Wireless
               Sensor Network with Geometric Correction},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {582--587},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.582-587},
  doi       = {10.4304/jnw.9.3.582-587},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DingYH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DongWGP14,
  author    = {Lijun Dong and
               Jinxia Wu and
               Cheng Gong and
               Benjie Pi},
  title     = {A Network-Cliques Based Role Mining Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2079--2088},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2079-2088},
  doi       = {10.4304/jnw.9.8.2079-2088},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DongWGP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DuLYT14,
  author    = {Juan Du and
               Yang Liu and
               Zhi{-}an Yi and
               E. P. Tracy},
  title     = {Research on {SVM} Classification Algorithm Based on {RS} Attribute
               Reduction},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3061--3069},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3061-3069},
  doi       = {10.4304/jnw.9.11.3061-3069},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DuLYT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DuQ14,
  author    = {Shiyu Du and
               Jiayin Qi},
  title     = {Multi-agent Modeling and Simulation on Group Polarization Behavior
               in Web 2.0},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2003--2012},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2003-2012},
  doi       = {10.4304/jnw.9.8.2003-2012},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DuQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DuanYW14,
  author    = {Mingyi Duan and
               Yajun Yang and
               Wei Wang},
  title     = {An {RFID} Data and Location Parameter Joint Estimation Based on an
               Improved {MCMC} Method},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2392--2401},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2392-2401},
  doi       = {10.4304/jnw.9.9.2392-2401},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DuanYW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DuttaMPG14,
  author    = {Nitul Dutta and
               Iti Saha Misra and
               Kushal Pokhrel and
               Mrinal Kanti Ghose},
  title     = {Performance Analysis of Multilayer MIPv6 Architecture through Experimental
               Testbed},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1682--1691},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1682-1691},
  doi       = {10.4304/jnw.9.7.1682-1691},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/DuttaMPG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ElsherifTZ14,
  author    = {Ahmed K. Elsherif and
               Chunming Tang and
               Lei Zhang},
  title     = {Radar Detection Based on Fuzzy Hypotheses with Fuzzy Data},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2309--2318},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2309-2318},
  doi       = {10.4304/jnw.9.9.2309-2318},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ElsherifTZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/EndoIOA14,
  author    = {Keiichi Endo and
               Akinobu Imaoka and
               Dai Okano and
               Kaname Amano},
  title     = {A Search Method Using Temporary Links for Unstructured {P2P} Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1665--1673},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1665-1673},
  doi       = {10.4304/jnw.9.7.1665-1673},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/EndoIOA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FanLA14,
  author    = {Wenqing Fan and
               Xue Lei and
               Jing An},
  title     = {Obfuscated Malicious Code Detection with Path Condition Analysis},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1208--1214},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1208-1214},
  doi       = {10.4304/jnw.9.5.1208-1214},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FanLA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FangZL14,
  author    = {Hai Fang and
               Quan Zhou and
               Xiaojun Li},
  title     = {Robust Reversible Data Hiding for Multispectral Images},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1454--1463},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1454-1463},
  doi       = {10.4304/jnw.9.6.1454-1463},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FangZL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengW14,
  author    = {Wei Feng and
               Haixia Wu},
  title     = {Stability of Genetic Regulatory Networks with Interval Time-Varying
               Delays via Convex Combination Method},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2645--2654},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2645-2654},
  doi       = {10.4304/jnw.9.10.2645-2654},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FengW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengXZY14,
  author    = {Chao Feng and
               Yang Xin and
               Hongliang Zhu and
               Yixian Yang},
  title     = {A Weakly Homomorphic Encryption with {LDN}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1464--1470},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1464-1470},
  doi       = {10.4304/jnw.9.6.1464-1470},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FengXZY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gao14,
  author    = {Yang Gao},
  title     = {Wireless Sensor Network Adaptive Energy Optimization Clustering Algorithm
               based on Routing Rules},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1935--1940},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1935-1940},
  doi       = {10.4304/jnw.9.7.1935-1940},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Gao14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoAZ14,
  author    = {Xuefei Gao and
               Yongli An and
               Kaiyu Zhu},
  title     = {2FSK Modem Based on the Microcontroller {AT89C51}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2252--2258},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2252-2258},
  doi       = {10.4304/jnw.9.8.2252-2258},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoAZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoL14,
  author    = {Weiting Gao and
               Hui Li},
  title     = {A Blind Adaptive Kalman-PIC {MUD} Algorithm for the Multiple Access
               Communication Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2328--2335},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2328-2335},
  doi       = {10.4304/jnw.9.9.2328-2335},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoR14,
  author    = {Jinfeng Gao and
               Nannan Ruan},
  title     = {Study on Reliable Control of Time-delay Switched Singular Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2866--2873},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2866-2873},
  doi       = {10.4304/jnw.9.10.2866-2873},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoSQ14,
  author    = {Yangyang Gao and
               Fei Song and
               Yajuan Qin},
  title     = {{IDDTL:} {A} Novel Identified Internet Data Transport Layer Mechanism},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {18--27},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.18-27},
  doi       = {10.4304/jnw.9.01.18-27},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoSQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoZHL14,
  author    = {Yuan Gao and
               Na Zhen and
               Nan Hao and
               Yuanqing Liu},
  title     = {Impulsive Neural Networks Algorithm Based on the Artificial Genome
               Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1260--1267},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1260-1267},
  doi       = {10.4304/jnw.9.5.1260-1267},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoZHL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GeZLS14,
  author    = {Wenqing Ge and
               Yanjun Zhao and
               Bo Li and
               Binbin Sun},
  title     = {Numerical Simulation of Electric Controlled Injection Device Equipped
               on Gas Fuel Engine},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1948--1954},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1948-1954},
  doi       = {10.4304/jnw.9.7.1948-1954},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GeZLS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GengXMMCL14,
  author    = {Teng Geng and
               Fu Xu and
               Han Mei and
               Wei Meng and
               Zhibo Chen and
               Changqing Lai},
  title     = {A Practical {GLR} Parser Generator for Software Reverse Engineering},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {769--776},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.769-776},
  doi       = {10.4304/jnw.9.3.769-776},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GengXMMCL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GhanmyFK14,
  author    = {Nabil Ghanmy and
               Lamia Chaari Fourati and
               Lotfi Kamoun},
  title     = {Elliptic curve cryptography for {WSN} and {SPA} attacks method for
               energy evaluation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2943--2950},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2943-2950},
  doi       = {10.4304/jnw.9.11.2943-2950},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GhanmyFK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GongH14,
  author    = {Lin Gong and
               Dingjun Hu},
  title     = {Visual Simulation of Explosion Effects Based on Mathematical Model
               and Particle System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1020--1026},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1020-1026},
  doi       = {10.4304/jnw.9.4.1020-1026},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GongH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GongL14,
  author    = {Jun Gong and
               Manru Li},
  title     = {Queuing Time Decision Model with the Consideration on Call Center
               Customer Abandonment Behavior},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2441--2447},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2441-2447},
  doi       = {10.4304/jnw.9.9.2441-2447},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GongL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gu14,
  author    = {Daming Gu},
  title     = {Uncertain Networks Optimization Based on Random {ADD} Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1193--1200},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1193-1200},
  doi       = {10.4304/jnw.9.5.1193-1200},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Gu14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuanDQ14,
  author    = {Zheng Guan and
               Hongwei Ding and
               Wenhua Qian},
  title     = {Delay Analysis of an Enhancing {IEEE} 802.11 Point Coordination Function
               {MAC} Protocol},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1223--1228},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1223-1228},
  doi       = {10.4304/jnw.9.5.1223-1228},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuanDQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuanYW14,
  author    = {Hua Guan and
               Shi Ying and
               Chunwei Wang},
  title     = {A Correctness Verification Approach of the {BPEL} Exception Handling
               {CPN} Model Based on Temporal Property},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2743--2750},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2743-2750},
  doi       = {10.4304/jnw.9.10.2743-2750},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuanYW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoL14,
  author    = {Jinmin Guo and
               Congshuang Luo},
  title     = {Study on Application of Electromagnetic Tomography Advanced Geological
               Prediction in Tunnel Construction},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2106--2113},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2106-2113},
  doi       = {10.4304/jnw.9.8.2106-2113},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoYL14,
  author    = {Hua Guo and
               Sheng{-}Wen Yu and
               Douglas J. Leith},
  title     = {Opportunistic Cooperative Reliable Transmission Protocol for Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1040--1046},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1040-1046},
  doi       = {10.4304/jnw.9.4.1040-1046},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoYL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoYZ14,
  author    = {Ye{-}cai Guo and
               Tao Yuan and
               Xiuzai Zhang},
  title     = {Satellite Channel Markov Model of Ka-band based on Principal Component},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1701--1706},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1701-1706},
  doi       = {10.4304/jnw.9.7.1701-1706},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoZYW14,
  author    = {Chunhong Guo and
               Yu Zhou and
               Qingwei Ye and
               Xiaodong Wang},
  title     = {A Zigbee and Bluetooth Protocol Converter Based on Multi-sinks Wireless
               Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1854--1860},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1854-1860},
  doi       = {10.4304/jnw.9.7.1854-1860},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoZYW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Han14,
  author    = {Xiaoxiang Han},
  title     = {Mobile Node Deployment based on Improved Probability Model and Dynamic
               Particle Swarm Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {131--137},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.131-137},
  doi       = {10.4304/jnw.9.01.131-137},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Han14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanYL14,
  author    = {Yi Han and
               Yuan Yao and
               Haiyang Liu},
  title     = {Design and Implementation of Driving Behavior Analysis System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2114--2120},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2114-2120},
  doi       = {10.4304/jnw.9.8.2114-2120},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanYL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/He14,
  author    = {Liang He},
  title     = {An Improved Intrusion Detection based on Neural Network and Fuzzy
               Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1274--1280},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1274-1280},
  doi       = {10.4304/jnw.9.5.1274-1280},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/He14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeL14,
  author    = {Ping He and
               Shuli Luan},
  title     = {On-line Data Retrieval Algorithm with Restart Strategy in Wireless
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3327--3335},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3327-3335},
  doi       = {10.4304/jnw.9.12.3327-3335},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeXT14,
  author    = {Yun He and
               Zhongyang Xiong and
               Xiaolin Tan},
  title     = {Optimal Rate Allocation for ISP-friendly {P2P} VoD Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1721--1731},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1721-1731},
  doi       = {10.4304/jnw.9.7.1721-1731},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeXT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeZ14,
  author    = {Zongjian He and
               Huijuan Zhang},
  title     = {Density Adaptive Urban Data Collection in Vehicular Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {1993--2002},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.1993-2002},
  doi       = {10.4304/jnw.9.8.1993-2002},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeZZLZ14,
  author    = {Fu{-}gui He and
               Yanping Zhang and
               Xiancun Zhou and
               Renjin Liu and
               Ling Zhang},
  title     = {Multi-granularity-based Routing Algorithm for Dynamic Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1333--1338},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1333-1338},
  doi       = {10.4304/jnw.9.5.1333-1338},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeZZLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hou14,
  author    = {Yanli Hou},
  title     = {Multiple-sensor Fusion Tracking Based on Square-root Cubature Kalman
               Filtering},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1955--1961},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1955-1961},
  doi       = {10.4304/jnw.9.7.1955-1961},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Hou14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hou14a,
  author    = {Yajun Hou},
  title     = {{P2P} Network Traffic Identification Based on Random Forest Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2456--2461},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2456-2461},
  doi       = {10.4304/jnw.9.9.2456-2461},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Hou14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hu14,
  author    = {Ling Hu},
  title     = {Research on the Application of Regression Analysis Method in Data
               Classification},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3151--3157},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3151-3157},
  doi       = {10.4304/jnw.9.11.3151-3157},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Hu14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuHGQ14,
  author    = {Hui Hu and
               Zhongxiao Hao and
               Peng Guo and
               Xilong Qu},
  title     = {Output Feedback Tracking Control Based on Neural Network for a Class
               of {SISO} Strict Feedback Nonlinear Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2521--2528},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2521-2528},
  doi       = {10.4304/jnw.9.9.2521-2528},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuHGQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuLZMW14,
  author    = {Liang Hu and
               Bofeng Liu and
               Kuo Zhao and
               Xiangyu Meng and
               Feng Wang},
  title     = {Research and Implementation of the Localization Algorithm Based on
               {RSSI} Technology},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3135--3142},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3135-3142},
  doi       = {10.4304/jnw.9.11.3135-3142},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuLZMW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuQYD14,
  author    = {Manjiang Hu and
               Hongmao Qing and
               Long Ying and
               Renkai Ding},
  title     = {Diesel Engine Fault Diagnosis Method Based on {GA-PNN}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3106--3112},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3106-3112},
  doi       = {10.4304/jnw.9.11.3106-3112},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuQYD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuWZ14,
  author    = {Zhijun Hu and
               Hongbin Wang and
               Huibin Zhang},
  title     = {Bandwidth Allocation Algorithm of Heterogeneous Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {703--710},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.703-710},
  doi       = {10.4304/jnw.9.3.703-710},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuWZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Huang14,
  author    = {Xiaolong Huang},
  title     = {Target Localization Based on Improved DV-Hop Algorithm in Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {168--175},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.168-175},
  doi       = {10.4304/jnw.9.01.168-175},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Huang14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Huang14a,
  author    = {Ning Huang},
  title     = {An Enhanced Hill Cipher and Its Application in Software Copy Protection},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2582--2590},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2582-2590},
  doi       = {10.4304/jnw.9.10.2582-2590},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Huang14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Huang14b,
  author    = {Xin Huang},
  title     = {Construction Research of Computer Network System Security based on
               Distributed Intrusion Detection Technology},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2813--2820},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2813-2820},
  doi       = {10.4304/jnw.9.10.2813-2820},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Huang14b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangG14,
  author    = {Wenhua Huang and
               Yishuang Geng},
  title     = {Identification Method of Attack Path Based on Immune Intrusion Detection},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {964--971},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.964-971},
  doi       = {10.4304/jnw.9.4.964-971},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangJ14,
  author    = {Kai Huang and
               Fujiang Jin},
  title     = {An Improved Signal Detection Algorithm of {LTE} System in Interference
               Environment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {793--798},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.793-798},
  doi       = {10.4304/jnw.9.3.793-798},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLX14,
  author    = {Yila Huang and
               Qiwei Lu and
               Yan Xiong},
  title     = {Collaborative Outsourced Data Mining for Secure Cloud Computing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2655--2664},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2655-2664},
  doi       = {10.4304/jnw.9.10.2655-2664},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangLX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangS14,
  author    = {Xiuchang Huang and
               Wei Su},
  title     = {An Improved K-means Clustering Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {161--167},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.161-167},
  doi       = {10.4304/jnw.9.01.161-167},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangS14a,
  author    = {Xuan Huang and
               Zhijun Song},
  title     = {Clustering Analysis on E-commerce Transaction Based on K-means Clustering},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {443--450},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.443-450},
  doi       = {10.4304/jnw.9.2.443-450},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangS14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangSXLLS14,
  author    = {Qingjia Huang and
               Kai Shuang and
               Peng Xu and
               Jian Li and
               Xu Liu and
               Sen Su},
  title     = {Prediction-based Dynamic Resource Scheduling for Virtualized Cloud
               Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {375--383},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.375-383},
  doi       = {10.4304/jnw.9.2.375-383},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangSXLLS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangWQ14,
  author    = {Yourui Huang and
               Jing Wang and
               Liguo Qu},
  title     = {{FPGA} Implementation of Temperature Controller for {PCR} Based on
               Microfluidic Chip},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2203--2210},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2203-2210},
  doi       = {10.4304/jnw.9.8.2203-2210},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangWQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangXZ14,
  author    = {Jincheng Huang and
               Huihui Xiang and
               Yaheng Zhang},
  title     = {Stable {AODV} Routing Protocol with Energy-aware in Mobile Ad Hoc
               Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2433--2440},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2433-2440},
  doi       = {10.4304/jnw.9.9.2433-2440},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangXZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuremovicH14,
  author    = {Adnan Huremovic and
               Mesud Hadzialic},
  title     = {Delay and Jitter in Networks with {IPP} Traffic: Theoretical Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3392--3399},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3392-3399},
  doi       = {10.4304/jnw.9.12.3392-3399},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuremovicH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiJGW14,
  author    = {Chang{-}Peng Ji and
               Hong{-}Hong Ji and
               Wei{-}Ping Guo and
               Jun Wang},
  title     = {{APA} with Evolving Order and Variable Regularization for Echo Cancellation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {210--215},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.210-215},
  doi       = {10.4304/jnw.9.01.210-215},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiJGW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangGH14,
  author    = {Nan Jiang and
               Yan Guo and
               Yueshun He},
  title     = {A Local-world Evolving Model for WSNs with the Self-regulating Attractiveness},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1790--1797},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1790-1797},
  doi       = {10.4304/jnw.9.7.1790-1797},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangGH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangYF14,
  author    = {Kun Jiang and
               Li Yao and
               Juan Feng},
  title     = {Wireless Sensor Networks Target Localization Based on Least Square
               Method and DV-Hop Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {176--182},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.176-182},
  doi       = {10.4304/jnw.9.01.176-182},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangYF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinR14,
  author    = {Yong Jin and
               Peng Ruan},
  title     = {Adaptive Cooperative {FEC} Based on Combination of Network Coding
               and Channel Coding for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {481--487},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.481-487},
  doi       = {10.4304/jnw.9.2.481-487},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JinR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinWJ14,
  author    = {Guang Jin and
               Qian Wang and
               Xianliang Jiang},
  title     = {A New Stateless Packet Classification and Filter against DoS Attacks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {291--296},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.291-296},
  doi       = {10.4304/jnw.9.2.291-296},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JinWJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KajiwaraMNHS14,
  author    = {Naoya Kajiwara and
               Shinichi Matsumoto and
               Yuuki Nishimoto and
               Yoshiaki Hori and
               Kouichi Sakurai},
  title     = {Detection of Privacy Sensitive Information Retrieval Using {API} Call
               Logging Mechanism within Android Framework},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2905--2913},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2905-2913},
  doi       = {10.4304/jnw.9.11.2905-2913},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KajiwaraMNHS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Kamruzzaman14,
  author    = {M. M. Kamruzzaman},
  title     = {Performance of Decode and Forward {MIMO} Relaying using {STBC} for
               Wireless Uplink},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3200--3206},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3200-3206},
  doi       = {10.4304/jnw.9.12.3200-3206},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Kamruzzaman14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KanigoroGJR14,
  author    = {Bayu Kanigoro and
               Andreas Calvin Gotandra and
               Yansen Jayawinata and
               Ricky},
  title     = {Mobile Ad-Hoc Network Based Child Monitoring with {DSDV} Routing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {629--634},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.629-634},
  doi       = {10.4304/jnw.9.3.629-634},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KanigoroGJR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KhanA14,
  author    = {Md. Nazmul Islam Khan and
               Md. Jobayer Alam},
  title     = {Efficient Scheme for Channel Estimation in {OFDM} System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3192--3199},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3192-3199},
  doi       = {10.4304/jnw.9.12.3192-3199},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KhanA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Khemapech14,
  author    = {Ittipong Khemapech},
  title     = {Power Preservation Friendly Congestion Control},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {530--540},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.530-540},
  doi       = {10.4304/jnw.9.3.530-540},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Khemapech14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KouG14,
  author    = {Xueqin Kou and
               Lichen Gu},
  title     = {Research of Long Range Accurate Ranging Technology Based on Ultrasonic
               Sensor Measurement},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2161--2167},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2161-2167},
  doi       = {10.4304/jnw.9.8.2161-2167},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KouG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LaiCZC14,
  author    = {Jianhui Lai and
               Yanyan Chen and
               Weiwei Zhang and
               Zhihong Chen},
  title     = {Identification Method of Residence and Employment Locations Based
               on Cellular Phone Data},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2183--2188},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2183-2188},
  doi       = {10.4304/jnw.9.8.2183-2188},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LaiCZC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LanZC14,
  author    = {Yong Lan and
               Bo Zhang and
               Zhicheng Chen},
  title     = {QoS Performance Analysis for Slotted {CSMA/CA} in {IEEE802.15.4}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1764--1769},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1764-1769},
  doi       = {10.4304/jnw.9.7.1764-1769},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LanZC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LangJ14,
  author    = {Jianjun Lang and
               Qigang Jiang},
  title     = {Artificial Intelligence based Profit-Sharing Algorithm in Multi-Agent
               Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {48--55},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.48-55},
  doi       = {10.4304/jnw.9.01.48-55},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LangJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LangJ14a,
  author    = {Jianjun Lang and
               Qigang Jiang},
  title     = {Update Strategies of Global Statistics in Distributed Information
               Retrieval System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2751--2757},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2751-2757},
  doi       = {10.4304/jnw.9.10.2751-2757},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LangJ14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lee14,
  author    = {Chuan{-}Min Lee},
  title     = {Remarks on the Complexity of Non-negative Signed Domination},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2051--2058},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2051-2058},
  doi       = {10.4304/jnw.9.8.2051-2058},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Lee14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LeiL14,
  author    = {Jianyun Lei and
               Yanhong Li},
  title     = {Vector-Based Sensitive Information Protecting Scheme in Automatic
               Trust Negotiation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {927--931},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.927-931},
  doi       = {10.4304/jnw.9.4.927-931},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LeiL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LeiLYK14,
  author    = {Guo H. Lei and
               Ting T. Liu and
               Wei Yang and
               Young{-}Il Kim},
  title     = {A Peer-To-Peer Membership Management Protocol for Wireless Mesh Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3015--3024},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3015-3024},
  doi       = {10.4304/jnw.9.11.3015-3024},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LeiLYK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li14,
  author    = {Jin Li},
  title     = {Blow-up in the Parablic Problems under Nonlinear Boundary Conditions},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {92--99},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.92-99},
  doi       = {10.4304/jnw.9.01.92-99},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li14a,
  author    = {Jin Li},
  title     = {Blow-up in the Parabolic Problems under Nonlinear Boundary Conditions},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {733--738},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.733-738},
  doi       = {10.4304/jnw.9.3.733-738},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li14b,
  author    = {Yongxia Li},
  title     = {Networked Analysis Approach of Supply Chain Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {777--784},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.777-784},
  doi       = {10.4304/jnw.9.3.777-784},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li14b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li14c,
  author    = {Dali Li},
  title     = {Complexity Measurement of Large-Scale Software System Based on Complex
               Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1317--1324},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1317-1324},
  doi       = {10.4304/jnw.9.5.1317-1324},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li14c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li14d,
  author    = {Xinlei Li},
  title     = {Improved Joint Probabilistic Data Association Method based on Interacting
               Multiple Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1572--1579},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1572-1579},
  doi       = {10.4304/jnw.9.6.1572-1579},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li14d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li14e,
  author    = {Lufeng Li},
  title     = {Research on the Computer Recovery Technology based on the Motion Blurred
               Image},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3046--3052},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3046-3052},
  doi       = {10.4304/jnw.9.11.3046-3052},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li14e.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li14f,
  author    = {Yamei Li},
  title     = {An Improved DV-Hop Localization Algorithm Based on Energy-saving Non-ranging
               Optimization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3182--3187},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3182-3187},
  doi       = {10.4304/jnw.9.11.3182-3187},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li14f.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiBWY14,
  author    = {Jinfeng Li and
               Jilong Bian and
               Limei Wang and
               Liu Yang},
  title     = {Small Baseline Stereo Matching Method based on Maximum Likelihood
               Estimation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2066--2071},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2066-2071},
  doi       = {10.4304/jnw.9.8.2066-2071},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiBWY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiC14,
  author    = {Ye Li and
               Yan Chen},
  title     = {An improved Genetic Algorithm of Bi-level Coding for Flexible Job
               Shop Scheduling Problems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1783--1789},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1783-1789},
  doi       = {10.4304/jnw.9.7.1783-1789},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiCH14,
  author    = {Xue Li and
               Yingan Cui and
               Xia Hui},
  title     = {Research on Structure Ontology Characteristic of Blogosphere},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3242--3250},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3242-3250},
  doi       = {10.4304/jnw.9.12.3242-3250},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiCH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiCWCL14,
  author    = {Xiaofeng Li and
               Liangfeng Chen and
               Jianping Wang and
               Zhong Chu and
               Bing Liu},
  title     = {A Novel Method to Improve the Accuracy of the {RSSI} Techniques Based
               on {RSSI-D}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3400--3406},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3400-3406},
  doi       = {10.4304/jnw.9.12.3400-3406},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiCWCL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiF14,
  author    = {Xiaolong Li and
               Donglei Feng},
  title     = {Markov Chain Based Trust Management Scheme for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3263--3267},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3263-3267},
  doi       = {10.4304/jnw.9.12.3263-3267},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiL14,
  author    = {Xinlei Li and
               Di Li},
  title     = {A Network Attack Model based on Colored Petri Net},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1883--1891},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1883-1891},
  doi       = {10.4304/jnw.9.7.1883-1891},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLK14,
  author    = {Wen{-}Li Li and
               Chun{-}Hung Richard Lin and
               Chih{-}Heng Ke},
  title     = {Achieving VoIP Guarantee in Wireless Local Area Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3230--3236},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3230-3236},
  doi       = {10.4304/jnw.9.12.3230-3236},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiLK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLWXZ14,
  author    = {Zhihua Li and
               Bin Lian and
               Zhongcheng Wei and
               Liang Xue and
               Jijun Zhao},
  title     = {The Effect of {MAC} Parameters on Energy Efficiency and Delay in Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {889--895},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.889-895},
  doi       = {10.4304/jnw.9.4.889-895},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiLWXZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiRBCD14,
  author    = {Yuxiang Li and
               Changquan Ren and
               Jingyi Bo and
               Qianying Cai and
               Yanrong Dong},
  title     = {The Application of {GMKL} Algorithm to Fault Diagnosis of Local Area
               Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {747--753},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.747-753},
  doi       = {10.4304/jnw.9.3.747-753},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiRBCD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiSC14,
  author    = {Li Li and
               Hui Song and
               Jianya Chen},
  title     = {Self-Adaptive Genetic Algorithm for {LTE} Backhaul Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {682--688},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.682-688},
  doi       = {10.4304/jnw.9.3.682-688},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiSC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiSSJW14,
  author    = {Yang Li and
               Ying Sha and
               Jixi Shan and
               Bo Jiang and
               Jianjun Wu},
  title     = {An Improved Community Partition Algorithm Integrating Mutual Information},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2289--2298},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2289-2298},
  doi       = {10.4304/jnw.9.9.2289-2298},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiSSJW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiSYC14,
  author    = {Xianwang Li and
               Yuchuan Song and
               Ping Yan and
               Xuehai Chen},
  title     = {Framework and Modeling Method for Heterogeneous Systems Information
               Integration Base on Semantic Gateway},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {979--985},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.979-985},
  doi       = {10.4304/jnw.9.4.979-985},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiSYC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiSYC14a,
  author    = {Xianwang Li and
               Yuchuan Song and
               Ping Yan and
               Xuehai Chen},
  title     = {Network Topology Connection Optimization Control Algorithm Based on
               Network Efficiency and Average Connectivity},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1252--1259},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1252-1259},
  doi       = {10.4304/jnw.9.5.1252-1259},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiSYC14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiW14,
  author    = {Wei Li and
               Yan Wang},
  title     = {Design and Implementation of Distance Learning Platform Based on Information
               Technology and Cloud Computing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2059--2065},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2059-2065},
  doi       = {10.4304/jnw.9.8.2059-2065},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWLCT14,
  author    = {Jianqi Li and
               Fuwen Wang and
               Xiaofeng Li and
               Binfang Cao and
               Zhen Tan},
  title     = {Wireless Monitoring System Based on the Non-uniform Stratified {WSN}
               in Viticulture},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {244--251},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.244-251},
  doi       = {10.4304/jnw.9.2.244-251},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWLCT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWLL14,
  author    = {Jianqing Li and
               Weiming Wang and
               Chuanhuang Li and
               Julong Lan},
  title     = {Research on the Function Consistency of the Network Element based
               on Atomic Capability Architecture},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2682--2689},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2682-2689},
  doi       = {10.4304/jnw.9.10.2682-2689},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWY14,
  author    = {Hongyu Li and
               Yuxin Wang and
               Jiazheng Yuan},
  title     = {The Calculation of QoS Aggregation Functions for Composite Web Services},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {620--628},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.620-628},
  doi       = {10.4304/jnw.9.3.620-628},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWZL14,
  author    = {Hua Li and
               Zhenkui Wu and
               Jihong Zhang and
               Hanshan Li},
  title     = {Wind-Solar-Storage Hybrid Micro grid Control Strategy Based on {SVPWM}
               Converter},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1596--1602},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1596-1602},
  doi       = {10.4304/jnw.9.6.1596-1602},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWZL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiX14,
  author    = {Zimao Li and
               Wenying Xiao},
  title     = {Nearly Optimal Solution for Restricted Euclidean Bottleneck Steiner
               Tree Problem},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1000--1004},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1000-1004},
  doi       = {10.4304/jnw.9.4.1000-1004},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiYH14,
  author    = {Boqi Li and
               Chao Yang and
               Song Huang},
  title     = {Study on Supply Chain Disruption Management under Service Level Dependent
               Demand},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1432--1439},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1432-1439},
  doi       = {10.4304/jnw.9.6.1432-1439},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiYH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiZSW14,
  author    = {Yan Li and
               Zhiyong Zhang and
               Xiaohua Sun and
               Fushun Wang},
  title     = {A Curvature-based Manifold Learning Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {85--91},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.85-91},
  doi       = {10.4304/jnw.9.01.85-91},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiZSW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiZZ14,
  author    = {Zhangbing Li and
               Zilan Zhu and
               Shaobo Zhang},
  title     = {A Locking Mechanism for Distributed Database Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2211--2217},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2211-2217},
  doi       = {10.4304/jnw.9.8.2211-2217},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiZZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiZZ14a,
  author    = {Ji'an Li and
               Jianzhong Zhou and
               Yongchuan Zhang},
  title     = {Cluster Head Selection Based on an Information Factor for Wireless
               Sensor Network Protocol},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2384--2391},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2384-2391},
  doi       = {10.4304/jnw.9.9.2384-2391},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiZZ14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiangLL14,
  author    = {Shyi{-}Ching Liang and
               LunHao Liao and
               Yen{-}Chun Lee},
  title     = {Localization Algorithm based on Improved Weighted Centroid in Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {183--189},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.183-189},
  doi       = {10.4304/jnw.9.01.183-189},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiangLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiangLZ14,
  author    = {Quan Liang and
               Jiu{-}mei Liang and
               Fumin Zou},
  title     = {The Resource Configuration Method with Lower Energy Consumption Based
               on Prediction in Cloud Data Center},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1692--1700},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1692-1700},
  doi       = {10.4304/jnw.9.7.1692-1700},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiangLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liao14,
  author    = {Lijuan Liao},
  title     = {Incremental Subspace Data-mining Algorithm Based on Data-flow Density
               of Complex Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3175--3181},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3175-3181},
  doi       = {10.4304/jnw.9.11.3175-3181},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Liao14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiaoHW14,
  author    = {Cong Liao and
               Hongwu Huang and
               Xinye Wu},
  title     = {Weighing Technology for High-Speed Moving Vehicle Based on Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2821--2827},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2821-2827},
  doi       = {10.4304/jnw.9.10.2821-2827},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiaoHW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LinWWX14,
  author    = {Jinzhi Lin and
               Ying Wu and
               Gongyi Wu and
               Jingdong Xu},
  title     = {An Adaptive Approach for Multi-Agent Formation Control in {MANET}
               Based on {CPS} Perspective},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1169--1177},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1169-1177},
  doi       = {10.4304/jnw.9.5.1169-1177},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LinWWX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LingWLX14,
  author    = {Dongyi Ling and
               Shihai Wang and
               Bin Liu and
               Xiaoqi Xing},
  title     = {Reliability Evaluation based on the {AADL} Architecture Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2721--2727},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2721-2727},
  doi       = {10.4304/jnw.9.10.2721-2727},
  timestamp = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LingWLX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuCW14,
  author    = {Yu Liu and
               Shihong Chen and
               Yunhua Wang},
  title     = {{SOFERS:} Scenario Ontology for Emergency Response System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2529--2535},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2529-2535},
  doi       = {10.4304/jnw.9.9.2529-2535},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuCW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuG14,
  author    = {Feng Liu and
               Xiaoxing Gao},
  title     = {A New Construction of Pseudorandom Number Generator},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2176--2182},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2176-2182},
  doi       = {10.4304/jnw.9.8.2176-2182},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuHDW14,
  author    = {Yu Liu and
               You He and
               Kai Dong and
               Haipeng Wang},
  title     = {Fuzzy Binary Track Correlation Algorithms for Multisensor Information
               Fusion},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {672--681},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.672-681},
  doi       = {10.4304/jnw.9.3.672-681},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuHDW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuHVG14,
  author    = {Xing Liu and
               Kun Mean Hou and
               Christophe de Vaulx and
               Khalid El Gholami},
  title     = {Real-time Embedded Java Virtual Machine for Application Development
               in Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1828--1837},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1828-1837},
  doi       = {10.4304/jnw.9.7.1828-1837},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuHVG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuJ14,
  author    = {Xingguang Liu and
               Zi John},
  title     = {Active Mechanism Network Coding Algorithm based on Multi-channel Sensing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2498--2503},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2498-2503},
  doi       = {10.4304/jnw.9.9.2498-2503},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuJQSC14,
  author    = {ChengGang Liu and
               Zhenhong Jia and
               Xizhong Qin and
               Lei Sheng and
               Li Chen},
  title     = {Improvement Priority Handoff Scheme for Multi-Service Wireless Mobile
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {204--209},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.204-209},
  doi       = {10.4304/jnw.9.01.204-209},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuJQSC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuJRHJ14,
  author    = {Kai Liu and
               Guang Jin and
               Daheng Rao and
               Jiaming He and
               Xianliang Jiang},
  title     = {A Participation-Based Trust Model for Mobile {P2P} Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1738--1746},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1738-1746},
  doi       = {10.4304/jnw.9.7.1738-1746},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuJRHJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuL14,
  author    = {Min Liu and
               Ying Li},
  title     = {Global Trust Value Grading Calculation Method in {P2P} Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {216--222},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.216-222},
  doi       = {10.4304/jnw.9.01.216-222},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuL14a,
  author    = {Guikai Liu and
               Qing Li},
  title     = {Fair and Efficient Packet Scheduling Using Resilient Quantum Round-Robin},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {269--276},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.269-276},
  doi       = {10.4304/jnw.9.2.269-276},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuL14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuLX14,
  author    = {Quan Liu and
               Huachen Liu and
               Wenjun Xu},
  title     = {TCP-Adaptive in High Speed Long Distance Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {315--322},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.315-322},
  doi       = {10.4304/jnw.9.2.315-322},
  timestamp = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuLX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuQCY14,
  author    = {Chunfeng Liu and
               Jingguo Qu and
               Yuhuan Cui and
               Aimin Yang},
  title     = {Research on Potential Problem based on Singular Decomposition and
               Boundary {FM-BEM} Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {115--122},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.115-122},
  doi       = {10.4304/jnw.9.01.115-122},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuQCY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuWTLWS14,
  author    = {Peipeng Liu and
               Lihong Wang and
               Qingfeng Tan and
               Quangang Li and
               Xuebin Wang and
               Jinqiao Shi},
  title     = {Empirical Measurement and Analysis of {I2P} Routers},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2269--2278},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2269-2278},
  doi       = {10.4304/jnw.9.9.2269-2278},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuWTLWS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuWY14,
  author    = {Yi Liu and
               Tianri Wang and
               Mingzhong Yang},
  title     = {Research on Concept Clustering of Order Task Ontology based on Modified
               {PART}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2099--2105},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2099-2105},
  doi       = {10.4304/jnw.9.8.2099-2105},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuWY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuY14,
  author    = {Wei Liu and
               Shumei Yang},
  title     = {Research on the Distribution of Attention in the Course of Maintenance
               Training},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2195--2202},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2195-2202},
  doi       = {10.4304/jnw.9.8.2195-2202},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZCX14,
  author    = {Jinping Liu and
               Gang Zhu and
               Bo Cheng and
               Shengfeng Xu},
  title     = {Optimal-sampling Active Interference Cancellation under the Minimax
               Criterion},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1178--1182},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1178-1182},
  doi       = {10.4304/jnw.9.5.1178-1182},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuZCX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZL14,
  author    = {Wanni Liu and
               Long Zhang and
               Yanping Li},
  title     = {A Noise-Correlated Cancellation Transmission Scheme for Cooperative
               {MIMO} Ad Hoc Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {822--827},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.822-827},
  doi       = {10.4304/jnw.9.4.822-827},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuZL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZLC14,
  author    = {Meihong Liu and
               Xingqun Zhan and
               Wei Li and
               Maolin Chen},
  title     = {{MSK-BCS} Modulation for {GNSS} Radio Frequency Compatibility in {C}
               Band},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2713--2720},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2713-2720},
  doi       = {10.4304/jnw.9.10.2713-2720},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuZLC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZX14,
  author    = {Baobao Liu and
               Junying Zhang and
               Cong Xu},
  title     = {{DOA} Estimation for Coherent Sources in Impulsive Noise Environments},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3237--3241},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3237-3241},
  doi       = {10.4304/jnw.9.12.3237-3241},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuZX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lu14,
  author    = {Weijia Lu},
  title     = {Parameters of Network Traffic Prediction Model Jointly Optimized by
               Genetic Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {695--702},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.695-702},
  doi       = {10.4304/jnw.9.3.695-702},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Lu14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuDWCWSW14,
  author    = {Dongqi Lu and
               Zhonghao Dongye and
               Zichuan Wu and
               Lin Chen and
               Zheng Wei and
               Xinyu Si and
               Chao Wang},
  title     = {Global Network Model based on Earth Grid and Cellular},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1580--1587},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1580-1587},
  doi       = {10.4304/jnw.9.6.1580-1587},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuDWCWSW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuLYG14,
  author    = {Na Lu and
               Caiwu Lu and
               Zhen Yang and
               Yishuang Geng},
  title     = {Modeling Framework for Mining Lifecycle Management},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {719--725},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.719-725},
  doi       = {10.4304/jnw.9.3.719-725},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuLYG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuW14,
  author    = {Yuting Lu and
               Weiyang Wang},
  title     = {Energy Hole Solution Algorithm in Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {956--963},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.956-963},
  doi       = {10.4304/jnw.9.4.956-963},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuanFX14,
  author    = {Liangyu Luan and
               Yingfang Fu and
               Peng Xiao},
  title     = {Access Authentication Scheme Based on Authorized Certificate in Wireless
               Mesh Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {231--237},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.231-237},
  doi       = {10.4304/jnw.9.01.231-237},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuanFX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoWL14,
  author    = {Kan Luo and
               Hua Wang and
               Shyi{-}Ching Liang},
  title     = {Reliable Transmission Protocol based on Network Coding in Delay Tolerant
               Mobile Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1027--1032},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1027-1032},
  doi       = {10.4304/jnw.9.4.1027-1032},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuoWL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoY14,
  author    = {Jia{-}Ning Luo and
               Ming{-}Hour Yang},
  title     = {An Efficient Offline Delegation Protocol in Mobile {RFID} Environment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1114--1120},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1114-1120},
  doi       = {10.4304/jnw.9.5.1114-1120},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuoY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoYHLW14,
  author    = {Xiangyang Luo and
               Lin Yang and
               Dai Hao and
               Fenlin Liu and
               Daoshun Wang},
  title     = {On Data and Virtualization Security Risks and Solutions of Cloud Computing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {571--581},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.571-581},
  doi       = {10.4304/jnw.9.3.571-581},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuoYHLW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoZ14,
  author    = {Jiayou Luo and
               Xingqun Zhan},
  title     = {Characterization of Smart Phone Received Signal Strength Indication
               for {WLAN} Indoor Positioning Accuracy Improvement},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {739--746},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.739-746},
  doi       = {10.4304/jnw.9.3.739-746},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuoZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lv14,
  author    = {Junya Lv},
  title     = {An Improved Clustering Algorithm based on Intelligent Computing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1565--1571},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1565-1571},
  doi       = {10.4304/jnw.9.6.1565-1571},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Lv14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LvHLDHZY14,
  author    = {Baoqiang Lv and
               Yiwen Huang and
               Taihua Li and
               Xuewu Dai and
               Muxi He and
               Wuxiong Zhang and
               Yang Yang},
  title     = {Simulation and Performance Analysis of the {IEEE1588} {PTP} with Kalman
               Filtering in Multi-hop Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3445--3453},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3445-3453},
  doi       = {10.4304/jnw.9.12.3445-3453},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LvHLDHZY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Ma14,
  author    = {Xiao Ma},
  title     = {Adaptive Distributed Load Balancing Routing Mechanism for {LEO} Satellite
               {IP} Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {816--821},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.816-821},
  doi       = {10.4304/jnw.9.4.816-821},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Ma14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaE14,
  author    = {Jie Ma and
               Jinlong E},
  title     = {An NFC-based Scenic Service System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {850--858},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.850-858},
  doi       = {10.4304/jnw.9.4.850-858},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaE14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaLL14,
  author    = {Lujuan Ma and
               Henry Leung and
               Deshi Li},
  title     = {Hybrid {TDMA/CDMA} {MAC} Protocol for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2665--2673},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2665-2673},
  doi       = {10.4304/jnw.9.10.2665-2673},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaLZ14,
  author    = {Limei Ma and
               Guoxiu Li and
               Lixing Zhao},
  title     = {Multi-Objective Optimal Configuration of Reconfigurable Test Platform:
               {A} Modified Discrete Particle Swarm Optimization Approach},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3502--3509},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3502-3509},
  doi       = {10.4304/jnw.9.12.3502-3509},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaWSWYZ14,
  author    = {Yanpeng Ma and
               Xiaofeng Wang and
               Jinshu Su and
               Chunqing Wu and
               Wanrong Yu and
               Baokang Zhao},
  title     = {A Multicast Routing Algorithm for Datagram Service in Delta {LEO}
               Satellite Constellation Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {896--907},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.896-907},
  doi       = {10.4304/jnw.9.4.896-907},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaWSWYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MamunIK14,
  author    = {Quazi Mamun and
               Md. Rafiqul Islam and
               Mohammed Kaosar},
  title     = {Anomaly Detection in Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2914--2924},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2914-2924},
  doi       = {10.4304/jnw.9.11.2914-2924},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MamunIK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MamunR14,
  author    = {Quazi Mamun and
               Ashfaqur Rahman},
  title     = {A Robust Data Gathering Technique for Large Scaled Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2342--2352},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2342-2352},
  doi       = {10.4304/jnw.9.9.2342-2352},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MamunR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MasudHI14,
  author    = {Anwar Hossain Masud and
               Xiaodi Huang and
               Md. Rafiqul Islam},
  title     = {A Novel Approach for the Security Remedial in a Cloud-based E-learning
               Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2934--2942},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2934-2942},
  doi       = {10.4304/jnw.9.11.2934-2942},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MasudHI14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MatejkaSSPS14,
  author    = {Lubos Matejka and
               Jindrich Skupa and
               Radek Strejc and
               Ladislav Pesicka and
               Jir{\'{\i}} Safar{\'{\i}}k},
  title     = {Dynamic Routing in Distributed File System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2591--2597},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2591-259},
  doi       = {10.4304/jnw.9.10.2591-259},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MatejkaSSPS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MendezL14,
  author    = {Diego Mendez and
               Miguel A. Labrador},
  title     = {A General Framework for Participatory Sensing Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2994--3004},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2994-3004},
  doi       = {10.4304/jnw.9.11.2994-3004},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MendezL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MengDX14,
  author    = {Fannian Meng and
               Quanlin Dong and
               Xintao Xia},
  title     = {True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion
               Method},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {558--564},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.558-564},
  doi       = {10.4304/jnw.9.3.558-564},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MengDX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MiaoC14,
  author    = {Chunyu Miao and
               Lina Chen},
  title     = {Infrastructure Communication Reliability for {WSN} on Cluster Topology
               and Tree Topology},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {63--70},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.63-70},
  doi       = {10.4304/jnw.9.01.63-70},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MiaoC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MiaoFMH14,
  author    = {Xue Miao and
               Gang Fu and
               Ruitao Ma and
               Longshe Huo},
  title     = {Source-Directed Path Diversity in the Interdomain Routing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3251--3262},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3251-3262},
  doi       = {10.4304/jnw.9.12.3251-3262},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MiaoFMH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Milanovic14,
  author    = {Stanislav Milanovic},
  title     = {Case Study for a {GPON} Deployment in the Enterprise Environment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {42--47},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.42-47},
  doi       = {10.4304/jnw.9.01.42-47},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Milanovic14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MoFLW14,
  author    = {Shangfeng Mo and
               Yongjian Fan and
               Yinglong Li and
               Xiaoliang Wang},
  title     = {Multi-Attribute Join Query Processing in Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2702--2712},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2702-2712},
  doi       = {10.4304/jnw.9.10.2702-2712},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MoFLW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Mu14,
  author    = {Rui{-}hui Mu},
  title     = {Node-Based Resource Optimization Algorithm of Wireless Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2424--2432},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2424-2432},
  doi       = {10.4304/jnw.9.9.2424-2432},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Mu14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MuL14,
  author    = {Kun Mu and
               Li Li},
  title     = {An Efficient Pairwise Key Predistribution Scheme for Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {277--282},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.277-282},
  doi       = {10.4304/jnw.9.2.277-282},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MuL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NatouriLS14,
  author    = {Somia Natouri and
               Chidung Lac and
               Ahmed Serhrouchni},
  title     = {A Model-Based Resilience Analysis for {IMS}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {588--603},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.588-603},
  doi       = {10.4304/jnw.9.3.588-603},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NatouriLS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiLH14,
  author    = {P. Ni and
               Y. L. Liu and
               Z. H. He},
  title     = {A New Estimation Method for Burnout Point Parameters of Ballistic
               Missile Based on Closest Distance Method},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2504--2513},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2504-2513},
  doi       = {10.4304/jnw.9.9.2504-2513},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NiLH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiZW14,
  author    = {Gang Ni and
               Bixi Zhang and
               Pangpang Wu},
  title     = {Layered Workflow Process Model Based on Extended Synchronizer},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1892--1899},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1892-1899},
  doi       = {10.4304/jnw.9.7.1892-1899},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NiZW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NieLXLY14,
  author    = {Hui Nie and
               Bo Liu and
               Pumo Xie and
               Zhenbing Liu and
               Huihua Yang},
  title     = {A Cuckoo Search Algorithm for Scheduling Multiskilled Workforce},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1346--1353},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1346-1353},
  doi       = {10.4304/jnw.9.5.1346-1353},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NieLXLY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NieSL14,
  author    = {Huabei Nie and
               Jianqiao Shen and
               Xiaoping Li},
  title     = {Research on Glowworm Swarm Optimization with Ethnic Division},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {458--465},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.458-465},
  doi       = {10.4304/jnw.9.2.458-465},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NieSL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OuyangZ14,
  author    = {Rui Ouyang and
               Miaochan Zhao},
  title     = {Study on Signal Intersection Traffic Flow Characteristics in Ice Conditions},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1962--1969},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1962-1969},
  doi       = {10.4304/jnw.9.7.1962-1969},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/OuyangZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PanO14,
  author    = {Guo Pan and
               Aijia Ouyang},
  title     = {Medium and Long Term Power Load Forecasting using {CPSO-GM} Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2121--2128},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2121-2128},
  doi       = {10.4304/jnw.9.8.2121-2128},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PanO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PeiCLZ14,
  author    = {Tingrui Pei and
               Yuxin Cao and
               Zhetao Li and
               Gengming Zhu},
  title     = {Overlapping Community Detection by Local Community Gravitation in
               Social Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2360--2364},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2360-2364},
  doi       = {10.4304/jnw.9.9.2360-2364},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PeiCLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Peng14,
  author    = {Jing Peng},
  title     = {A New Model of Data Protection on Cloud Storage},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {666--671},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.666-671},
  doi       = {10.4304/jnw.9.3.666-671},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Peng14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PengM14,
  author    = {Mei Peng and
               Huajian Mou},
  title     = {A Novel Computer Virus Model and Its Stability},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {367--374},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.367-374},
  doi       = {10.4304/jnw.9.2.367-374},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PengM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PengS14,
  author    = {Junjie Peng and
               Rong Shen},
  title     = {An Optical Tri-valued Computing System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {660--665},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.660-665},
  doi       = {10.4304/jnw.9.3.660-665},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PengS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PerdanaS14,
  author    = {Doan Perdana and
               Riri Fitri Sari},
  title     = {Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami
               Signal and Mobility Models on the {IEEE} 1609.4 Standard},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3454--3461},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3454-3461},
  doi       = {10.4304/jnw.9.12.3454-3461},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PerdanaS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PhamA14,
  author    = {Duc Minh Pham and
               Syed Mahfuzul Aziz},
  title     = {On Efficient Design of {LDPC} Decoders for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3207--3214},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3207-3214},
  doi       = {10.4304/jnw.9.12.3207-3214},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PhamA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QiCG14,
  author    = {Jiamin Qi and
               Jiapin Chen and
               Yu Geng},
  title     = {Unambiguous Synchronization Scheme for {GNSS} BOC(n, n) Signals},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2224--2231},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2224-2231},
  doi       = {10.4304/jnw.9.8.2224-2231},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QiCG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QuCLY14,
  author    = {Jingguo Qu and
               Yuhuan Cui and
               Chunfeng Liu and
               Aimin Yang},
  title     = {Adaptive Boundary Elements and Error Estimation for Elastic Problems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {430--436},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.430-436},
  doi       = {10.4304/jnw.9.2.430-436},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QuCLY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QuCZ14,
  author    = {Jingguo Qu and
               Yuhuan Cui and
               Xin Zhou},
  title     = {Application of Infinitesimal Method in Determining the Best Shape
               of a Cake Pan},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3070--3076},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3070-3076},
  doi       = {10.4304/jnw.9.11.3070-3076},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QuCZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QuCZ14a,
  author    = {Jingguo Qu and
               Yuhuan Cui and
               Weiliang Zhu},
  title     = {Algorithm and Its Implementation of Vehicle Safety Distance Control
               Based on the Numerical Simulation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3486--3493},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3486-3493},
  doi       = {10.4304/jnw.9.12.3486-3493},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QuCZ14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RaoK14,
  author    = {G. Sanjiv Rao and
               V. Valli Kumari},
  title     = {Trail Coverage : {A} Coverage Model for Efficient Intruder Detection
               near Geographical Obstacles in WSNs},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3336--3346},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3336-3346},
  doi       = {10.4304/jnw.9.12.3336-3346},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RaoK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RufaiMO14,
  author    = {Kazeem I. Rufai and
               Ravie Chandren Muniyandi and
               Zulaiha Ali Othman},
  title     = {Improving Bee Algorithm Based Feature Selection in Intrusion Detection
               System Using Membrane Computing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {523--529},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.523-529},
  doi       = {10.4304/jnw.9.3.523-529},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RufaiMO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SabbaghBA14,
  author    = {Abdallah Al Sabbagh and
               Robin Braun and
               Mehran Abolhasan},
  title     = {Intelligent Hybrid Cheapest Cost and Mobility Optimization {RAT} Selection
               Approaches for Heterogeneous Wireless Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {297--305},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.297-305},
  doi       = {10.4304/jnw.9.2.297-305},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/SabbaghBA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SabbaghBA14a,
  author    = {Abdallah Al Sabbagh and
               Robin Braun and
               Mehran Abolhasan},
  title     = {Performance Analysis of the Intelligent Mobility Optimization {CRRM}
               Approach Using a Markovian Chain Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {635--644},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.635-644},
  doi       = {10.4304/jnw.9.3.635-644},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/SabbaghBA14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SahaVSPN14,
  author    = {Sujoy Saha and
               Rohit Verma and
               Somir Saika and
               Partha Sarathi Paul and
               Subrata Nandi},
  title     = {e-ONE: Enhanced {ONE} for Simulating Challenged Network Scenarios},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3290--3304},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3290-3304},
  doi       = {10.4304/jnw.9.12.3290-3304},
  timestamp = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/SahaVSPN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShaoL14,
  author    = {Heng Shao and
               Juan Li},
  title     = {Research on Resource Sharing and Concurrency Access Based on E-learning
               Platform},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2021--2025},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2021-2025},
  doi       = {10.4304/jnw.9.8.2021-2025},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShaoL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenT14,
  author    = {Tian Shen and
               Zairong Tian},
  title     = {Utility-based joint Power and Rate Control Game with Interference
               Threshold Elasticity for Cooperative Cognitive Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1426--1431},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1426-1431},
  doi       = {10.4304/jnw.9.6.1426-1431},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShenT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenZ14,
  author    = {Hai Shen and
               Yunlong Zhu},
  title     = {Adaptive Bacterial Foraging Optimization Algorithm Based on Social
               Foraging Strategy},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {799--806},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.799-806},
  doi       = {10.4304/jnw.9.3.799-806},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShenZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenZSXQWZLZ14,
  author    = {Peiyi Shen and
               Liang Zhang and
               Juan Song and
               Hu Xu and
               Lianjie Qin and
               Wei Wei and
               Wenzheng Zhang and
               Bin Leng and
               Mengqi Zeng},
  title     = {A Near-Infrared Face Detection and Recognition System Using {ASM}
               and {PCA+LDA}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2728--2733},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2728-2733},
  doi       = {10.4304/jnw.9.10.2728-2733},
  timestamp = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShenZSXQWZLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Shi14,
  author    = {Hongxia Shi},
  title     = {Adaptive Packet Context-Constrained KL-Divergence Model for Intrusion
               Detection},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2045--2050},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2045-2050},
  doi       = {10.4304/jnw.9.8.2045-2050},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Shi14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShiX14,
  author    = {Xingjun Shi and
               Huibin Xu},
  title     = {An Effective Scheme for Location Privacy in VANETs},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2239--2244},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2239-2244},
  doi       = {10.4304/jnw.9.8.2239-2244},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShiX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShiXWD14,
  author    = {Zhicai Shi and
               Yongxiang Xia and
               Fei Wu and
               Jian Dai},
  title     = {The Discretization Algorithm for Rough Data and Its Application to
               Intrusion Detection},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1380--1387},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1380-1387},
  doi       = {10.4304/jnw.9.6.1380-1387},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShiXWD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuCZZ14,
  author    = {Li Shu and
               Ke{-}wei Cheng and
               Xiaowen Zhang and
               Jiliu Zhou},
  title     = {Periodic Sweep Coverage Scheme Based on Periodic Vehicle Routing Problem},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {726--732},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.726-732},
  doi       = {10.4304/jnw.9.3.726-732},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShuCZZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuWZ14,
  author    = {Zhenyu Shu and
               Dianhong Wang and
               Cheng Zhou},
  title     = {Road Geometric Features Extraction based on Self-Organizing Map {(SOM)}
               Neural Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {190--197},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.190-197},
  doi       = {10.4304/jnw.9.01.190-197},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShuWZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuaiH14,
  author    = {Jun Shuai and
               Xuli Han},
  title     = {New Basis Functions for Model Reduction of Nonlinear PDEs},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1518--1525},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1518-1525},
  doi       = {10.4304/jnw.9.6.1518-1525},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShuaiH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuklaM14,
  author    = {Shailendra Shukla and
               Rajiv Misra},
  title     = {Angle Based Double Boundary Detection in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {612--619},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.612-619},
  doi       = {10.4304/jnw.9.3.612-619},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShuklaM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SimbeyeY14,
  author    = {Daudi S. Simbeye and
               Shi{-}Feng Yang},
  title     = {Water Quality Monitoring and Control for Aquaculture Based on Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {840--849},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.840-849},
  doi       = {10.4304/jnw.9.4.840-849},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SimbeyeY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SinghT14,
  author    = {Anil Singh and
               Shashikala Tapaswi},
  title     = {An Adaptative Energy Efficient Routing Protocol for {MANET}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3407--3414},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3407-3414},
  doi       = {10.4304/jnw.9.12.3407-3414},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SinghT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Sochi14,
  author    = {Taha Sochi},
  title     = {Testing the Connectivity of Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {239--243},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.239-243},
  doi       = {10.4304/jnw.9.2.239-243},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Sochi14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SongC14,
  author    = {Rongrong Song and
               Zili Chen},
  title     = {Design of {PID} Controller for Maglev System Based on an Improved
               {PSO} with Mixed Inertia Weight},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1509--1517},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1509-1517},
  doi       = {10.4304/jnw.9.6.1509-1517},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SongC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SongG14,
  author    = {Xinchao Song and
               Yishuang Geng},
  title     = {Distributed Community Detection Optimization Algorithm for Complex
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2758--2765},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2758-2765},
  doi       = {10.4304/jnw.9.10.2758-2765},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SongG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SongLMZA14,
  author    = {Qi Song and
               Shan Li and
               Ming{-}xiao Ma and
               Yan Zhu and
               Jun{-}she An},
  title     = {System Design and Fault Tolerance Analysis of the Distributed Storage
               System with Solid State Recorder on Spacecraft},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3053--3060},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3053-3060},
  doi       = {10.4304/jnw.9.11.3053-3060},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SongLMZA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SuH14,
  author    = {Xiaohui Su and
               Tongxin Hu},
  title     = {Flue Gas Analysis Based on Recursive Iteration Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2514--2520},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2514-2520},
  doi       = {10.4304/jnw.9.9.2514-2520},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SuH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SuiQ14,
  author    = {Geng Sui and
               Hong Qiao},
  title     = {Emotional Tendency Contrast Recommendation Algorithm Based on Cloud
               Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {437--442},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.437-442},
  doi       = {10.4304/jnw.9.2.437-442},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SuiQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SulthanaN14,
  author    = {S. Fouziya Sulthana and
               Rangaswamy Nakkeeran},
  title     = {Study of Downlink Scheduling Algorithms in {LTE} Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3381--3391},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3381-3391},
  doi       = {10.4304/jnw.9.12.3381-3391},
  timestamp = {Tue, 14 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SulthanaN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Sun14,
  author    = {Hua Sun},
  title     = {Congestion Control Based on Reliable Transmission in Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {762--768},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.762-768},
  doi       = {10.4304/jnw.9.3.762-768},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Sun14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Sun14a,
  author    = {Yuan Sun},
  title     = {Optimal Scheduling Algorithm in Vehicular Real Time System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {785--792},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.785-792},
  doi       = {10.4304/jnw.9.3.785-792},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Sun14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunC14,
  author    = {Yangguang Sun and
               Zhihua Cai},
  title     = {An Improved Character Segmentation Algorithm Based on Local Adaptive
               Thresholding Technique for Chinese NvShu Documents},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1496--1501},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1496-1501},
  doi       = {10.4304/jnw.9.6.1496-1501},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunLLZ14,
  author    = {Shanhui Sun and
               Hong Li and
               Zhuangzhuang Li and
               Bingqiu Zhang},
  title     = {Mathematical Modeling and Fractal Clustering Algorithm in Online Shopping},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3158--3165},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3158-3165},
  doi       = {10.4304/jnw.9.11.3158-3165},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunLLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunZFDXC14,
  author    = {Fangmin Sun and
               Zhan Zhao and
               Zhen Fang and
               Lidong Du and
               Zhihong Xu and
               Diliang Chen},
  title     = {A Review of Attacks and Security Protocols for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1103--1113},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1103-1113},
  doi       = {10.4304/jnw.9.5.1103-1113},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunZFDXC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Tang14,
  author    = {Yonglong Tang},
  title     = {A User Authentication Protocol based on Multiple Factors},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2796--2804},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2796-2804},
  doi       = {10.4304/jnw.9.10.2796-2804},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Tang14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TangCCLL14,
  author    = {Dan Tang and
               Kai Chen and
               Xiaosu Chen and
               Huiyu Liu and
               Xinhua Li},
  title     = {A New Collaborative Detection Method for LDoS Attacks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2674--2681},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2674-2681},
  doi       = {10.4304/jnw.9.10.2674-2681},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TangCCLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TangCCLL14a,
  author    = {Dan Tang and
               Kai Chen and
               Xiaosu Chen and
               Huiyu Liu and
               Xinhua Li},
  title     = {A New Detection Method based on {AEWMA} Algorithm for LDoS attacks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2981--2986},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2981-2986},
  doi       = {10.4304/jnw.9.11.2981-2986},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TangCCLL14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TangHM14,
  author    = {Junyong Tang and
               Haiyan Hao and
               Woundlss Y. Marden},
  title     = {Aware Ant Routing Algorithm in Mobile Peer-To-Peer Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1534--1541},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1534-1541},
  doi       = {10.4304/jnw.9.6.1534-1541},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TangHM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Tian14,
  author    = {Yi Tian},
  title     = {An Improved Byzantine Fault-tolerant Program for WSNs},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {932--940},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.932-940},
  doi       = {10.4304/jnw.9.4.932-940},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Tian14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Tian14a,
  author    = {Jun Tian},
  title     = {Game-theory Model based on Carrier Sense Multiple Access Protocol
               in Wireless Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1603--1609},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1603-1609},
  doi       = {10.4304/jnw.9.6.1603-1609},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Tian14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TianYW14,
  author    = {Xuequan Tian and
               Yi Yang and
               Hongke Wang},
  title     = {Oscillation Criteria for Damping Quasi-Linear Neutral Differential
               Equations with Distributed Deviating Arguments},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1908--1913},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1908-1913},
  doi       = {10.4304/jnw.9.7.1908-1913},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TianYW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TsaiKL14,
  author    = {Yao{-}Hsu Tsai and
               Chieh{-}Heng Ko and
               Kuo{-}Chung Lin},
  title     = {Using CommonKADS Method to Build Prototype System in Medical Insurance
               Fraud Detection},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1798--1802},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1798-1802},
  doi       = {10.4304/jnw.9.7.1798-1802},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TsaiKL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TsukamotoOKOHM14,
  author    = {Keiichiro Tsukamoto and
               Masato Ohtani and
               Yuki Koizumi and
               Hiroyuki Ohsaki and
               Kunio Hato and
               Junichi Murayama},
  title     = {Virtual Content-Centric Networking},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {807--815},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.807-815},
  doi       = {10.4304/jnw.9.4.807-815},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TsukamotoOKOHM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/UsmanMW14,
  author    = {Muhammad Usman and
               Vallipuram Muthukkumarasamy and
               Xin{-}Wen Wu},
  title     = {A Resource-Efficient System for Detection and Verification of Anomalies
               Using Mobile Agents in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3427--3444},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3427-3444},
  doi       = {10.4304/jnw.9.12.3427-3444},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/UsmanMW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/VeceMC14,
  author    = {Giovanni B. Vece and
               Eros Mazza and
               Massimo Conti},
  title     = {A System-Level Protocol-Based Methodology for Noise Analysis of Digital
               Networked Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2633--2644},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2633-2644},
  doi       = {10.4304/jnw.9.10.2633-2644},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/VeceMC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WahjuniRR14,
  author    = {Sri Wahjuni and
               Anak Agung Putri Ratna and
               Kalamullah Ramli},
  title     = {Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical
               Peer-To-Peer},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {908--913},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.908-913},
  doi       = {10.4304/jnw.9.4.908-913},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WahjuniRR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WaleedLH14,
  author    = {AL{-}Museelem Waleed and
               Chunlin Li and
               Naji Hasan. A. H},
  title     = {The faults of Data Security and Privacy in the Cloud Computing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3313--3320},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3313-3320},
  doi       = {10.4304/jnw.9.12.3313-3320},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WaleedLH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang14,
  author    = {Liping Wang},
  title     = {Channel Estimation and Combining Orthogonal Pilot Design in {MIMO-OFDM}
               System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {451--457},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.451-457},
  doi       = {10.4304/jnw.9.2.451-457},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wang14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang14a,
  author    = {Cai{-}xia Wang},
  title     = {Clustering Model Based on Improved {LEACH} Algorithm in Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {474--480},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.474-480},
  doi       = {10.4304/jnw.9.2.474-480},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wang14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangCLB14,
  author    = {Xiaoying Wang and
               Danqi Chen and
               Qingjie Liu and
               Ling Bai},
  title     = {An Improvement Crypton Protocol with Higher Security Margin},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2788--2795},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2788-2795},
  doi       = {10.4304/jnw.9.10.2788-2795},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangCLB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangF14,
  author    = {Zhanjie Wang and
               Ting Fang},
  title     = {Task Scheduling Model Based on Multi-Agent and Multi-Objective Dynamical
               Scheduling Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1588--1595},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1588-1595},
  doi       = {10.4304/jnw.9.6.1588-1595},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangFY14,
  author    = {Pu Wang and
               Liying Fang and
               Lei Yu},
  title     = {Research on Application of Improved Smart Data Aggregation Algorithm
               in Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1875--1882},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1875-1882},
  doi       = {10.4304/jnw.9.7.1875-1882},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangFY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangGL14,
  author    = {Hailiang Wang and
               Zhihui Ge and
               Taoshen Li},
  title     = {{E2-DLNA:} An Improved Energy-Efficiency Mechanism for {DLNA}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2072--2078},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2072-2078},
  doi       = {10.4304/jnw.9.8.2072-2078},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangGL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangHXH14,
  author    = {Wei Wang and
               Hao Huang and
               Changsheng Xie and
               Lin Han},
  title     = {{CBSNTS:} {A} Chaotic Based Security Network Transmission System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {1985--1992},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.1985-1992},
  doi       = {10.4304/jnw.9.8.1985-1992},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangHXH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangJQG14,
  author    = {Guifeng Wang and
               Jianguo Jiang and
               Shutong Qiao and
               Lifeng Guo},
  title     = {Research on the Multilevel {STATCOM} based on the H-bridge Cascaded},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {147--152},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.147-152},
  doi       = {10.4304/jnw.9.01.147-152},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangJQG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangJX14,
  author    = {Guowei Wang and
               Zongpu Jia and
               Manjun Xue},
  title     = {Data Migration Model and Algorithm between Heterogeneous Databases
               based on Web Service},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3127--3134},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3127-3134},
  doi       = {10.4304/jnw.9.11.3127-3134},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangJX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangJZ14,
  author    = {Yuhuai Wang and
               Hong Jia and
               Xiaojing Zhu},
  title     = {A Method of Case Retrieval for Web-based Remote Customization Platform},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {914--920},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.914-920},
  doi       = {10.4304/jnw.9.4.914-920},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangJZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangL14,
  author    = {Cheng Wang and
               Zhicong Liang},
  title     = {Android-based Vehicular Distributed Intelligent Video Collection System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2615--2621},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2615-2621},
  doi       = {10.4304/jnw.9.10.2615-2621},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangLG14,
  author    = {Fei Wang and
               Xiaofeng Liao and
               Songtao Guo},
  title     = {A Newton-Like Optimal Resource Allocation Algorithm and its Convergence
               for Wireless Ad Hoc Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1770--1782},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1770-1782},
  doi       = {10.4304/jnw.9.7.1770-1782},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangLG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangLZ14,
  author    = {Fucai Wang and
               Bingrong Li and
               Luping Zhou},
  title     = {Routing Strategy Based on Local Density Sensing in Delay Tolerant
               Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {393--399},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.393-399},
  doi       = {10.4304/jnw.9.2.393-399},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMWZ14,
  author    = {Nianyi Wang and
               Yide Ma and
               Weilan Wang and
               Shijie Zhou},
  title     = {An Image Fusion Method Based on {NSCT} and Dual-channel {PCNN} Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {501--506},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.501-506},
  doi       = {10.4304/jnw.9.2.501-506},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangMWZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangPB14,
  author    = {Ying Wang and
               Xinguang Peng and
               Jing Bian},
  title     = {Computer Crime Forensics Based on Improved Decision Tree Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1005--1011},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1005-1011},
  doi       = {10.4304/jnw.9.4.1005-1011},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangPB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangQDJL14,
  author    = {Na Wang and
               Xiaogang Qi and
               Li Duan and
               Hua Jiang and
               Xiaofei Liu},
  title     = {Clustering-based Routing Algorithm in Wireless Sensor Networks with
               Mobile Sink},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2376--2383},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2376-2383},
  doi       = {10.4304/jnw.9.9.2376-2383},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangQDJL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangQQZ14,
  author    = {Fang Wang and
               Yuanqing Qin and
               Tonghui Qian and
               Qi Zhang},
  title     = {A Newton Iteration Based {WSN} Localization System in Underground
               Tunnels},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2971--2980},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2971-298},
  doi       = {10.4304/jnw.9.11.2971-298},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangQQZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangS14,
  author    = {Yulong Wang and
               Rui Sun},
  title     = {An IP-Traceback-based Packet Filtering Scheme for Eliminating DDoS
               Attacks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {874--881},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.874-881},
  doi       = {10.4304/jnw.9.4.874-881},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangS14a,
  author    = {Huqing Wang and
               Zhixin Sun},
  title     = {Study on the Improvement of ELGamal Cryptosystem Based on Elliptic
               Curve},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3025--3029},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3025-3029},
  doi       = {10.4304/jnw.9.11.3025-3029},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangS14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangTC14,
  author    = {Zhibo Wang and
               Hui Tian and
               Nannan Chen},
  title     = {Reliability Improvement Using Power Control in Device-to-Device Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {495--500},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.495-500},
  doi       = {10.4304/jnw.9.2.495-500},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangTC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangTL14,
  author    = {Meng Wang and
               Jianfeng Teng and
               Erlin Liu},
  title     = {Global Exponential Synchronization of Delayed {BAM} Neural Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1354--1360},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1354-1360},
  doi       = {10.4304/jnw.9.5.1354-1360},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangTL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangW14,
  author    = {Hao Wang and
               Lei Wu},
  title     = {Adaptively Anonymous Public-Key Broadcast Encryption Scheme without
               Random Oracle},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1656--1663},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1656-1663},
  doi       = {10.4304/jnw.9.6.1656-1663},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangW14a,
  author    = {Hao Wang and
               Lei Wu},
  title     = {Unbounded Anonymous Hierarchical Identity-Based Encryption in the
               Standard Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1846--1853},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1846-1853},
  doi       = {10.4304/jnw.9.7.1846-1853},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangW14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWASZ14,
  author    = {Qihui Wang and
               Lidong Wang and
               Kang An and
               Zhouxiang Shou and
               Huixi Zhang},
  title     = {{DOA} Estimation of Smart Antenna Signal Based on {MUSIC} Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1309--1316},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1309-1316},
  doi       = {10.4304/jnw.9.5.1309-1316},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWASZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWCZ14,
  author    = {Zhenduo Wang and
               Jing Wang and
               Weigang Cheng and
               Qi Zhang},
  title     = {Local Linear Embedding Algorithm with Adaptively Determining Neighborhood},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1550--1557},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1550-1557},
  doi       = {10.4304/jnw.9.6.1550-1557},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWCZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWHYZ14,
  author    = {Wei Wang and
               Wei Wei and
               Jie Hu and
               Junting Ye and
               Qinghua Zheng},
  title     = {Knowledge Unit Relation Recognition Based on Markov Logic Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2417--2423},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2417-2423},
  doi       = {10.4304/jnw.9.9.2417-2423},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWHYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWLA14,
  author    = {Kete Wang and
               Lisheng Wang and
               Xinkao Liao and
               George Albert},
  title     = {An Auto-Matching Model with Pattern Recognition Using Bayesian Classifier
               for Parallel Programming on {A} Multi-Core Processor},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2556--2566},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2556-2566},
  doi       = {10.4304/jnw.9.9.2556-2566},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWLA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWSC14,
  author    = {Fushun Wang and
               Bin Wang and
               Xiaohua Sun and
               Zhenjiang Cai},
  title     = {Data Merging Method by Protecting Energy in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1558--1564},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1558-1564},
  doi       = {10.4304/jnw.9.6.1558-1564},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWSC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWSC14a,
  author    = {Fushun Wang and
               Bin Wang and
               Xiaohua Sun and
               Zhenjiang Cai},
  title     = {Data Merging Method by Protecting Energy in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2245--2251},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2245-2251},
  doi       = {10.4304/jnw.9.8.2245-2251},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWSC14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWZ14,
  author    = {Yu Wang and
               Zhiqiang Wu and
               Xin{-}hua Zhu},
  title     = {Satellite Formation based on {SDDF} Method},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {986--992},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.986-992},
  doi       = {10.4304/jnw.9.4.986-992},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangXS14,
  author    = {Huiqiang Wang and
               Yanqiu Xing and
               Weilian Sun},
  title     = {Study on Measuring System of Casing Machine Based on {PLC}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1287--1294},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1287-1294},
  doi       = {10.4304/jnw.9.5.1287-1294},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangXS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangXX14,
  author    = {Guowei Wang and
               Guangming Xu and
               Manjun Xue},
  title     = {Unified Identity Authentication between Heterogeneous Systems Based
               on {LDAP} and {RBAC}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2858--2865},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2858-2865},
  doi       = {10.4304/jnw.9.10.2858-2865},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangXX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYLL14,
  author    = {Lei Wang and
               Jui{-}Yu Yang and
               Yu{-}Yun Lin and
               Wei{-}Jun Lin},
  title     = {Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based
               Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3221--3229},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3221-3229},
  doi       = {10.4304/jnw.9.12.3221-3229},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangYLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYY14,
  author    = {Ying Wang and
               Fenfen Yang and
               Zhuolin Yan},
  title     = {Design and Development of Decision Support System for Equipping Farm
               Machines},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1648--1655},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1648-1655},
  doi       = {10.4304/jnw.9.6.1648-1655},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangYY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYZFZ14,
  author    = {Xiaomei Wang and
               Peng Yu and
               Xiaoyi Zhang and
               Liang Fan and
               Qiao Zhang},
  title     = {A Forward Error-Tolerant Reassembly Method for Receiving Network Data},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2835--2842},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2835-2842},
  doi       = {10.4304/jnw.9.10.2835-2842},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangYZFZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ14,
  author    = {Anbao Wang and
               Bin Zhu},
  title     = {An Improved Algorithm of the Node Localization in Ad Hoc Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {549--557},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.549-557},
  doi       = {10.4304/jnw.9.3.549-557},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ14a,
  author    = {Wei Wang and
               Zi{-}Jing Zhang},
  title     = {Design of Digital Synthesis Filters for Hybrid Filter Bank {A/D} Converters
               Using Semidefinite Programming},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1325--1332},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1325-1332},
  doi       = {10.4304/jnw.9.5.1325-1332},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZ14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ14b,
  author    = {Anbao Wang and
               Bin Zhu},
  title     = {Improving {MPR} Selection Algorithm in {OLSR} Protocol Based on Node
               Localization Technology},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1674--1681},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1674-1681},
  doi       = {10.4304/jnw.9.7.1674-1681},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZ14b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ14c,
  author    = {Jiali Wang and
               Qingnian Zhang},
  title     = {Model and Algorithm Design for Cargo Shipping Safety Based on Fuzzy-
               Precise Bayesian Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2137--2144},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2137-2144},
  doi       = {10.4304/jnw.9.8.2137-2144},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZ14c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZYH14,
  author    = {Tianshu Wang and
               Gongxuan Zhang and
               Xichen Yang and
               Longxia Huang},
  title     = {A New Architecture in Greenhouse Soil Solution Monitoring System Based
               on ZigBee Protocol},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2622--2628},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2622-2628},
  doi       = {10.4304/jnw.9.10.2622-2628},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZYH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WatfaM14,
  author    = {Mohamed K. Watfa and
               Mohamed Moubarak},
  title     = {A Benchmarking Tool for Wireless Sensor Network Embedded Operating
               Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {1971--1984},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.1971-1984},
  doi       = {10.4304/jnw.9.8.1971-1984},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/WatfaM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WenZYH14,
  author    = {Shaojie Wen and
               Zhenyu Zhang and
               Wenzhong Yang and
               Siquan Hou},
  title     = {An Energy-efficient Opportunistic Multicast Routing Protocol in Mobile
               Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1819--1827},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1819-1827},
  doi       = {10.4304/jnw.9.7.1819-1827},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WenZYH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WidanapathiranaALIFS14,
  author    = {Chathuranga Widanapathirana and
               X. Ang and
               Jonathan C. Li and
               Milosh V. Ivanovich and
               Paul G. Fitzpatrick and
               Y. Ahmet Sekercioglu},
  title     = {A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure
               Diagnosis in Network End-User Devices},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3275--3289},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3275-3289},
  doi       = {10.4304/jnw.9.12.3275-3289},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WidanapathiranaALIFS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wu14,
  author    = {Mingxin Wu},
  title     = {Inter-cell Interference Mitigation in Multi-cell Cooperating System
               Based on {SLNR} Method},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {153--160},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.153-160},
  doi       = {10.4304/jnw.9.01.153-160},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wu14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wu14a,
  author    = {Fengxiang Wu},
  title     = {A Novel Opportunistic Relay and Energy Efficient Power Allocation
               Algorithm in Cooperative Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2448--2455},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2448-2455},
  doi       = {10.4304/jnw.9.9.2448-2455},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wu14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuCW14,
  author    = {Xiaosong Wu and
               Xingshu Chen and
               Haizhou Wang},
  title     = {An Effective Scheme for Performance Improvement of {P2P} Live Streaming
               Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1067--1073},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1067-1073},
  doi       = {10.4304/jnw.9.4.1067-1073},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuCW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuCYMW14,
  author    = {Zhijun Wu and
               Yi Cui and
               Meng Yue and
               Lan Ma and
               Lu Wang},
  title     = {Cross-correlation Based Synchronization Mechanism of LDDoS Attacks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {604--611},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.604-611},
  doi       = {10.4304/jnw.9.3.604-611},
  timestamp = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuCYMW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuCZZL14,
  author    = {Qingtao Wu and
               Min Cui and
               Mingchuan Zhang and
               Ruijuan Zheng and
               Ying Lou},
  title     = {A Cloud Service Resource Classification Strategy Based on Feature
               Similarity},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2987--2993},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2987-2993},
  doi       = {10.4304/jnw.9.11.2987-2993},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuCZZL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuL14,
  author    = {Yan Wu and
               Gang Li},
  title     = {Solution of Evidence Distance in Multi-Source Information Fusion},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3166--3174},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3166-3174},
  doi       = {10.4304/jnw.9.11.3166-3174},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuLC14,
  author    = {Hong Wu and
               Peng Lin and
               Kun Chen},
  title     = {A Novel Frequency Offset Estimation Algorithm with Wide Range and
               High Accuracy for {OFDM} System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2218--2223},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2218-2223},
  doi       = {10.4304/jnw.9.8.2218-2223},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuLC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuLL14,
  author    = {Chun{-}Hui Wu and
               Qin Li and
               Chuan Lin},
  title     = {New Identity-based Key-exposure Free Chameleon Hash from Bilinear
               Pairings},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1756--1763},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1756-1763},
  doi       = {10.4304/jnw.9.7.1756-1763},
  timestamp = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/WuLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuNL14,
  author    = {Huafeng Wu and
               Su Nie and
               Junjun Li},
  title     = {{EA-COR:} An Environment Adaptive Clustering Opportunistic Routing
               Protocol of {WSN}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2964--2970},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2964-2970},
  doi       = {10.4304/jnw.9.11.2964-2970},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuNL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuS14,
  author    = {Weiwei Wu and
               Hua Sun},
  title     = {Network Topology Algorithm Based on Energy-consumption Optimization
               of Multi-hop Wireless Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2828--2834},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2828-2834},
  doi       = {10.4304/jnw.9.10.2828-2834},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuWW14,
  author    = {Fang Wu and
               Dianhong Wang and
               Yong Wang},
  title     = {Collaborative Nodes Strategy for Target Tracking in Two-tier Wireless
               Multimedia Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1803--1810},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1803-1810},
  doi       = {10.4304/jnw.9.7.1803-1810},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuWW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuWZ14,
  author    = {Huazhu Wu and
               Changyou Wang and
               Chunguang Zhang},
  title     = {Design of Servo Controller for Flying Shear Machine Based on {ARM}
               and {FPGA}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3038--3045},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3038-3045},
  doi       = {10.4304/jnw.9.11.3038-3045},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuWZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuXZ14,
  author    = {Xianwen Wu and
               Zhiliang Xue and
               Jingwen Zuo},
  title     = {The PeerBehavior Model based on Continuous Behavioral Observation
               {P2P} Network Neighbors},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {223--230},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.223-230},
  doi       = {10.4304/jnw.9.01.223-230},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuXZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuYHZ14,
  author    = {Jiagao Wu and
               Hang Yuan and
               Ying He and
               Zhiqiang Zou},
  title     = {ChordMR: {A} P2P-based Job Management Scheme in Cloud},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {541--548},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.541-548},
  doi       = {10.4304/jnw.9.3.541-548},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuYHZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaCLT14,
  author    = {Jikang Xia and
               Lan Chen and
               Ying Li and
               Endong Tong},
  title     = {A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2299--2308},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2299-2308},
  doi       = {10.4304/jnw.9.9.2299-2308},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiaCLT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XianZ14,
  author    = {Qiang Xian and
               Wanting Zhang},
  title     = {Adaptive Localization Algorithm Based on Distributed Compressed Sensing
               in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1900--1907},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1900-1907},
  doi       = {10.4304/jnw.9.7.1900-1907},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XianZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xiao14,
  author    = {Yufeng Xiao},
  title     = {An Efficient Network Reliability Computation Method Based on Isomorphism
               Judgment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2037--2044},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2037-2044},
  doi       = {10.4304/jnw.9.8.2037-2044},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xiao14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoJL14,
  author    = {Ke Xiao and
               Haiying Jiang and
               Yuanyao Lu},
  title     = {A Physical Layer Scheme in Two-Way Relay Networks with Soft Network
               Coding},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1861--1867},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1861-1867},
  doi       = {10.4304/jnw.9.7.1861-1867},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiaoJL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoWP14,
  author    = {Qiuyun Xiao and
               Zhihai Wu and
               Li Peng},
  title     = {Fast Finite-Time Consensus Tracking of Second-Order Multi-Agent Systems
               with a Virtual Leader},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2957--2963},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2957-2963},
  doi       = {10.4304/jnw.9.11.2957-2963},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiaoWP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoWP14a,
  author    = {Qiuyun Xiao and
               Zhihai Wu and
               Li Peng},
  title     = {Fast Finite-Time Consensus Tracking of Second-Order Multi-Agent Systems
               with a Virtual Leader},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3268--3274},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3268-3274},
  doi       = {10.4304/jnw.9.12.3268-3274},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiaoWP14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xie14,
  author    = {Mande Xie},
  title     = {The Optimal Partition Algorithm for Multiple Video Sequences in Streaming
               Media System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1157--1162},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1157-1162},
  doi       = {10.4304/jnw.9.5.1157-1162},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xie14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XieL14,
  author    = {Fu Xie and
               Fangai Liu},
  title     = {Dynamic Effective Resource Allocation Based on Cloud Computing Learning
               Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3092--3097},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3092-3097},
  doi       = {10.4304/jnw.9.11.3092-3097},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XieL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XieWW14,
  author    = {Weimin Xie and
               Liejun Wang and
               Mingwei Wang},
  title     = {A Bloom Filter and Matrix-based Protocol for Detecting Node Replication
               Attack},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1471--1476},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1471-1476},
  doi       = {10.4304/jnw.9.6.1471-1476},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XieWW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XinCZ14,
  author    = {Huamei Xin and
               Fangzhen Cheng and
               Dapeng Zhang},
  title     = {{MPSK} Symbol-based Soft-Information-Forwarding Scheme in Rayleigh
               Fading Channels},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1368--1373},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1368-1373},
  doi       = {10.4304/jnw.9.6.1368-1373},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XinCZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XinS14,
  author    = {Yuanfang Xin and
               Xia Sun},
  title     = {System Design for Real-time Image Processing Based on Multi-core {DSP}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3143--3150},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3143-3150},
  doi       = {10.4304/jnw.9.11.3143-3150},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XinS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xing14,
  author    = {Ningzhe Xing},
  title     = {Optimization Algorithm of Power Communication Network Based on the
               Equivalent Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2474--2481},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2474-2481},
  doi       = {10.4304/jnw.9.9.2474-2481},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xing14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XingJ14,
  author    = {Ningzhe Xing and
               Yutong Ji},
  title     = {Research on Service Controlling Algorithm of Electric Power Communication
               Network based on QoS Traffic Recognition and Routing Optimization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3084--3091},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3084-3091},
  doi       = {10.4304/jnw.9.11.3084-3091},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XingJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XingJYW14,
  author    = {Ling Xing and
               Ling Jiang and
               Guohai Yang and
               Bin Wen},
  title     = {A Novel Trusted Computing Model for Network Security Authentication},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {339--343},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.339-343},
  doi       = {10.4304/jnw.9.2.339-343},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XingJYW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongZSPL14,
  author    = {Jianbin Xiong and
               Qinhua Zhang and
               Guoxi Sun and
               Zhiping Peng and
               Qiong Liang},
  title     = {Fusion of the Dimensionless Parameters and Filtering Methods in Rotating
               Machinery Fault Diagnosis},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1201--1207},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1201-1207},
  doi       = {10.4304/jnw.9.5.1201-1207},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiongZSPL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xu14,
  author    = {Zhenhua Xu},
  title     = {Demand-oriented Traffic Measuring Method for Network Security Situation
               Assessment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1012--1019},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1012-1019},
  doi       = {10.4304/jnw.9.4.1012-1019},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xu14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xu14a,
  author    = {Dongfeng Xu},
  title     = {Dynamic Routing Algorithm Based on the Channel Quality Control for
               Farmland Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1055--1060},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1055-1060},
  doi       = {10.4304/jnw.9.4.1055-1060},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xu14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xu14b,
  author    = {Jian Xu},
  title     = {{KSC} Centralized Index Model in Complex Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1245--1251},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1245-1251},
  doi       = {10.4304/jnw.9.5.1245-1251},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xu14b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xu14c,
  author    = {Wenjing Xu},
  title     = {Vehicle Travel Time Predication based on Multiple Kernel Regression},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1921--1926},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1921-1926},
  doi       = {10.4304/jnw.9.7.1921-1926},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xu14c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuCYZ14,
  author    = {Bo Xu and
               Ligang Cai and
               Jianwu Yang and
               Sen Zhang},
  title     = {Application of Self-optimization Closed-Loop Input-shaping with Parameter
               of Chaotic Particle Swarm in Coaxial Drive Printing System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1632--1639},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1632-1639},
  doi       = {10.4304/jnw.9.6.1632-1639},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuCYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuGDQZZ14,
  author    = {Xianfan Xu and
               Fan Guo and
               Dawei Ding and
               Sen Qiu and
               Kun Zhang and
               Haixu Zhang},
  title     = {Nonlinear Dynamics in High-speed Wireless Networks Congestion Control
               Model with {TCP} LogWestwood+ under {RED}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1714--1720},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1714-1720},
  doi       = {10.4304/jnw.9.7.1714-1720},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuGDQZZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuHWZZ14,
  author    = {Liya Xu and
               Chuanhe Huang and
               Jinhai Wang and
               Junyu Zhu and
               Lianzhen Zhang},
  title     = {An Efficient Traffic Geographic Static-Node-Assisted Routing in {VANET}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1096--1102},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1096-1102},
  doi       = {10.4304/jnw.9.5.1096-1102},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuHWZZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuLCW14,
  author    = {Huanliang Xu and
               Duo Li and
               Jianhua Che and
               Haoyun Wang},
  title     = {Cooperative Localization Algorithm based on Coverage Optimization
               of Actors for Wireless Sensor and Actor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1145--1156},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1145-1156},
  doi       = {10.4304/jnw.9.5.1145-1156},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuLCW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuLGY14,
  author    = {Jun Xu and
               Yann{-}Hang Lee and
               Chengcheng Guo and
               Jianfeng Yang},
  title     = {Resource Allocation in City-wide Real-Time Wireless Mesh Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2026--2036},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2026-2036},
  doi       = {10.4304/jnw.9.8.2026-2036},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuLGY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuLL14,
  author    = {Guangxia Xu and
               Fuyi Lin and
               Yu Liu},
  title     = {An Improved Mix Transmission Algorithm for Privacy-Preserving},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3373--3380},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3373-3380},
  doi       = {10.4304/jnw.9.12.3373-3380},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuW14,
  author    = {Guangxia Xu and
               Manman Wang},
  title     = {An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony
               Algorithm for Wireless Body Area Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3366--3372},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3366-3372},
  doi       = {10.4304/jnw.9.12.3366-3372},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuWYHT14,
  author    = {Ke Xu and
               Cui Wen and
               Qiong Yuan and
               Xiangzhu He and
               Jun Tie},
  title     = {A MapReduce based Parallel {SVM} for Email Classification},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1640--1647},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1640-1647},
  doi       = {10.4304/jnw.9.6.1640-1647},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuWYHT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuYXZ14,
  author    = {Yi Xu and
               Yixian Yang and
               Yang Xin and
               Hongliang Zhu},
  title     = {An Improved Directed Diffusion Protocol based on Opportunistic Routing},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1163--1168},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1163-1168},
  doi       = {10.4304/jnw.9.5.1163-1168},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuYXZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuZ14,
  author    = {Shuona Xu and
               Biqing Zeng},
  title     = {Network Traffic Prediction Model Based on Auto-regressive Moving Average},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {653--659},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.653-659},
  doi       = {10.4304/jnw.9.3.653-659},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XueCKP14,
  author    = {Lin Xue and
               Cheng Cui and
               Suman Kumar and
               Seung{-}Jong Park},
  title     = {Impact of Queue Management Schemes and {TCP} Variants on the Performance
               of 10Gbps High Speed Networks: An Experimental Study},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1183--1192},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1183-1192},
  doi       = {10.4304/jnw.9.5.1183-1192},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XueCKP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XueLW14,
  author    = {Yanru Xue and
               Min Liu and
               Feng Wang},
  title     = {An Optimized Frequent Item Query Algorithm for Uncertain Streaming
               Data},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3030--3037},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3030-3037},
  doi       = {10.4304/jnw.9.11.3030-3037},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XueLW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XueZWY14,
  author    = {Hongquan Xue and
               Peng Zhang and
               Shengmin Wei and
               Lin Yang},
  title     = {An Improved Immune Algorithm for Multi-objective Flexible Job-shop
               Scheduling},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2843--2850},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2843-2850},
  doi       = {10.4304/jnw.9.10.2843-2850},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XueZWY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanLWG14,
  author    = {Gan Yan and
               Yuxiang Lv and
               Qiyin Wang and
               Yishuang Geng},
  title     = {Routing Algorithm Based on Delay Rate in Wireless Cognitive Radio
               Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {948--955},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.948-955},
  doi       = {10.4304/jnw.9.4.948-955},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YanLWG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanPHL14,
  author    = {Guofeng Yan and
               Yuxing Peng and
               Ying Hu and
               Junyi Liu},
  title     = {Effective Hierarchical Routing Algorithm for Large-scale Wireless
               Mobile Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {344--352},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.344-352},
  doi       = {10.4304/jnw.9.2.344-352},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YanPHL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanZ14,
  author    = {Han Yan and
               Zhihong Zou},
  title     = {Water Quality Evaluation Based on Entropy Coefficient and Blind Number
               Theory Measure Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1868--1874},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1868-1874},
  doi       = {10.4304/jnw.9.7.1868-1874},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YanZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Yang14,
  author    = {Bo Yang},
  title     = {A Scheme for Securing Traffic Transport among Autonomous Systems},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1447--1453},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1447-1453},
  doi       = {10.4304/jnw.9.6.1447-1453},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Yang14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Yang14a,
  author    = {Bo Yang},
  title     = {A Lightweight Scheme for Protecting {AS-PATH} Attributes of Update
               Messages},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1707--1713},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1707-1713},
  doi       = {10.4304/jnw.9.7.1707-1713},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Yang14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Yang14b,
  author    = {Chao Yang},
  title     = {Research and Implementation of Low Cost Arc Fault Circuit Interrupter},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3098--3105},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3098-3105},
  doi       = {10.4304/jnw.9.11.3098-3105},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Yang14b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangBZJLY14,
  author    = {Dingli Yang and
               Qiuchan Bai and
               Yulin Zhang and
               Rendong Ji and
               Yazhou Li and
               Yudong Yang},
  title     = {Error Performance Analysis of Multiuser {CDMA} Systems with Space-time
               Coding in Rician Fading Channel},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3462--3469},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3462-3469},
  doi       = {10.4304/jnw.9.12.3462-3469},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangBZJLY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangC14,
  author    = {Qi Yang and
               Yuebo Cao},
  title     = {The value distribution of fm + a(f(k))n and normal families of meromorphic
               functions},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2371--2375},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2371-2375},
  doi       = {10.4304/jnw.9.9.2371-2375},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangHC14,
  author    = {Song Yang and
               Feng Hu and
               Chaoshi Cai},
  title     = {An Improved Tone Reservation Scheme Based Nearly Optimal Peak Reduction
               for Adaptive Amplitude Clipping},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2629--2632},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2629-2632},
  doi       = {10.4304/jnw.9.10.2629-2632},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangHC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangJ14,
  author    = {Yunfeng Yang and
               Hao Jin},
  title     = {Ratio Tests for Persistence Change with Heavy Tailed Observations},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1409--1415},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1409-1415},
  doi       = {10.4304/jnw.9.6.1409-1415},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangJH14,
  author    = {Qiuling Yang and
               Zhigang Jin and
               Xiangdang Huang},
  title     = {Research on Delay and Packet Loss Control Mechanism in Wireless Mesh
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {859--865},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.859-865},
  doi       = {10.4304/jnw.9.4.859-865},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangJH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangLZ14,
  author    = {Jianning Yang and
               Kun Lin and
               Xie Zhao},
  title     = {An Improved Channel Estimation Method based on Jointly Preprocessing
               of Time-frequency Domain in {TD-LTE} System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1047--1054},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1047-1054},
  doi       = {10.4304/jnw.9.4.1047-1054},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangQZLCT14,
  author    = {Lei Yang and
               Yifang Qin and
               Xu Zhou and
               Hongjia Li and
               Song Ci and
               Hui Tang},
  title     = {Social Relation Based Cache Distribution Policy in Wireless Mobile
               Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2279--2288},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2279-2288},
  doi       = {10.4304/jnw.9.9.2279-2288},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangQZLCT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangS14,
  author    = {Chaoyu Yang and
               Minli Song},
  title     = {Access Path Planning of Mobile Agent in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {507--514},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.507-514},
  doi       = {10.4304/jnw.9.2.507-514},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangSSW14,
  author    = {Xiaoping Yang and
               Chunfeng Song and
               Jiwei Sun and
               Xiaojing Wang},
  title     = {Simulation and Implementation of Adaptive Fuzzy {PID}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2574--2581},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2574-2581},
  doi       = {10.4304/jnw.9.10.2574-2581},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangSSW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangSY14,
  author    = {Tingting Yang and
               Zhonghua Sun and
               Chengming Yang},
  title     = {Towards Resource Allocation Algorithm in Opportunistic Relaying Cooperative
               {UWB} Communication System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {360--366},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.360-366},
  doi       = {10.4304/jnw.9.2.360-366},
  timestamp = {Tue, 16 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/YangSY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangW14,
  author    = {Liu Yang and
               Wei Wang},
  title     = {{FLAP:} Flash-aware Prefetching for Improving SSD-based Disk Cache},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2766--2774},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2766-2774},
  doi       = {10.4304/jnw.9.10.2766-2774},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangX14,
  author    = {Hongxue Yang and
               Lingling Xuan},
  title     = {Routing Optimization Based on Taboo Search Algorithm for Logistic
               Distribution},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1033--1039},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1033-1039},
  doi       = {10.4304/jnw.9.4.1033-1039},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangZW14,
  author    = {Chao{-}Shan Yang and
               Ling Zhou and
               Gao{-}Sheng Wang},
  title     = {A Flexibility-based Method for Damage Identification of Cantilever-type
               Structures},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3120--3126},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3120-3126},
  doi       = {10.4304/jnw.9.11.3120-3126},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangZW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YinLZ14,
  author    = {Aihan Yin and
               Hongchao Liang and
               Ming Zhu},
  title     = {Authentication Protocol using MYK-NTRUSign Signature Algorithm in
               Wireless Network Environment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1139--1144},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1139-1144},
  doi       = {10.4304/jnw.9.5.1139-1144},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YinLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuLZ14,
  author    = {Biqiang Yu and
               Wei Li and
               Ming Zhang},
  title     = {Redundancy Transmission System Based on Multidisciplinary Object Compatibility
               Design Optimization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {754--761},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.754-761},
  doi       = {10.4304/jnw.9.3.754-761},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuYYQ14,
  author    = {Yannan Yu and
               Rongfeng Yang and
               Jichi Yan and
               Chang Qu},
  title     = {Research on Cascaded H-bridge {SVG}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1941--1947},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1941-1947},
  doi       = {10.4304/jnw.9.7.1941-1947},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuYYQ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuanC14,
  author    = {Liang Yuan and
               Chuan Cai},
  title     = {An Improved Clustering Routing Algorithm in Wireless Sensor Network
               Based on ZigBee},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2468--2473},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2468-2473},
  doi       = {10.4304/jnw.9.9.2468-2473},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuanC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuanCLL14,
  author    = {Jingjing Yuan and
               Peiying Chen and
               Qinghua Liu and
               Heng Li},
  title     = {A Load-Balanced On-Demand Routing for {LEO} Satellite Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3305--3312},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3305-3312},
  doi       = {10.4304/jnw.9.12.3305-3312},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuanCLL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuanWXMM14,
  author    = {Cheng Yuan and
               Xiaodong Wang and
               Shu{-}ming Xiong and
               Lijing Ma and
               Qishi Miu},
  title     = {A Fair Data Transmission Strategy in Underwater Acoustic Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2606--2614},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2606-2614},
  doi       = {10.4304/jnw.9.10.2606-2614},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuanWXMM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YueSYZ14,
  author    = {Keqiang Yue and
               Lingling Sun and
               Bin You and
               Shengzhou Zhang},
  title     = {{DCSK} Multi-Access Scheme for {UHF} {RFID} System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {1061--1066},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.1061-1066},
  doi       = {10.4304/jnw.9.4.1061-1066},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YueSYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YunusO14,
  author    = {Nur Arzilawati Md Yunus and
               Mohamed Othman},
  title     = {Reliability Evaluation and Routing Integration in Shuffle Exchange
               Omega Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1732--1737},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1732-1737},
  doi       = {10.4304/jnw.9.7.1732-1737},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YunusO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAKKS14,
  author    = {Salahuddin Muhammad Salim Zabir and
               Jemal H. Abawajy and
               Farid Ahmed and
               Joarder Kamruzzaman and
               Mohammad A. Karim and
               Nurul I. Sarkar},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3189--3191},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3189-3191},
  doi       = {10.4304/jnw.9.12.3189-3191},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZabirAAKKS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZengD14,
  author    = {Bo Zeng and
               Yabo Dong},
  title     = {A Collaboration-based Distributed {TDMA} Scheduling Algorithm for
               Data Collection in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2319--2327},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2319-2327},
  doi       = {10.4304/jnw.9.9.2319-2327},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZengD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZengG14,
  author    = {Degui Zeng and
               Yishuang Geng},
  title     = {Content Distribution Mechanism in Mobile {P2P} Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1229--1236},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1229-1236},
  doi       = {10.4304/jnw.9.5.1229-1236},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZengG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaHL14,
  author    = {Song Zha and
               Jijun Huang and
               Ning Li},
  title     = {Compressed Wideband Spectrum Sensing with Partially Known Occupancy
               Status by Weighted l1 Minimization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {866--873},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.866-873},
  doi       = {10.4304/jnw.9.4.866-873},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaHL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang14,
  author    = {Tongguang Zhang},
  title     = {QoS-aware Web Service Selection based on Particle Swarm Optimization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {565--570},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.565-570},
  doi       = {10.4304/jnw.9.3.565-570},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhang14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang14a,
  author    = {Mu Zhang},
  title     = {Optimization of Inter-network Bandwidth Resources for Large-Scale
               Data Transmission},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {689--694},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.689-694},
  doi       = {10.4304/jnw.9.3.689-694},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhang14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang14b,
  author    = {Jian Zhang},
  title     = {Adaptive Fault Diagnosis Method Based on {FNN}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2145--2152},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2145-2152},
  doi       = {10.4304/jnw.9.8.2145-2152},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhang14b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangCLHT14,
  author    = {Weiwei Zhang and
               Yongyu Chang and
               Yitong Liu and
               Atif Hameed and
               Yuan Tian},
  title     = {Study on the QoE for VoIP Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {515--522},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.515-522},
  doi       = {10.4304/jnw.9.2.515-522},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangCLHT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangD14,
  author    = {Xiaoguo Zhang and
               Wei Ding},
  title     = {Flow-aggregation Accelerating Strategy for {TCP} Traffic},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1416--1425},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1416-1425},
  doi       = {10.4304/jnw.9.6.1416-1425},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangDF14,
  author    = {Lihua Zhang and
               Xichang Dai and
               Haiquan Fan},
  title     = {Broadcast Encryption Based on Bidirectional Remote Authentication
               Scheme},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3113--3119},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3113-3119},
  doi       = {10.4304/jnw.9.11.3113-3119},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangDF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangF14,
  author    = {Pei Zhang and
               Lu Feng},
  title     = {{EESA} Algorithm in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {941--947},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.941-947},
  doi       = {10.4304/jnw.9.4.941-947},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangH14,
  author    = {Chunhong Zhang and
               Yaxi He},
  title     = {Network Coordination Algorithm Based on Distributed Probability Matrix
               Factorization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1399--1408},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1399-1408},
  doi       = {10.4304/jnw.9.6.1399-1408},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangHSXMZ14,
  author    = {Xiaolu Zhang and
               Liang Hu and
               Shinan Song and
               Zhenzhen Xie and
               Xiangyu Meng and
               Kuo Zhao},
  title     = {Windows Volatile Memory Forensics Based on Correlation Analysis},
  journal   = {J. Networks},
  volume    = {9},
  number    = {3},
  pages     = {645--652},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.3.645-652},
  doi       = {10.4304/jnw.9.3.645-652},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangHSXMZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangL14,
  author    = {Jun Zhang and
               Da{-}Yong Luo},
  title     = {Analysis of Time Delay and Packet Dropouts Based on State Observer
               for a Kind of Networked Control System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {466--473},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.466-473},
  doi       = {10.4304/jnw.9.2.466-473},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangLD14,
  author    = {Lihua Zhang and
               Guangjie Liu and
               Yuewei Dai},
  title     = {Network Packet Length Covert Channel Based on Empirical Distribution
               Function},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1440--1446},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1440-1446},
  doi       = {10.4304/jnw.9.6.1440-1446},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangLD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangLM14,
  author    = {Pengfei Zhang and
               Xiang{-}Yang Li and
               Lei Ma},
  title     = {Grid Computing based on Game Optimization Theory for Networks Scheduling},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1295--1300},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1295-1300},
  doi       = {10.4304/jnw.9.5.1295-1300},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangLM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangLZWY14,
  author    = {Hongli Zhang and
               Panpan Li and
               Zhigang Zhou and
               Junchao Wu and
               Xiang{-}Zhan Yu},
  title     = {A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1086--1095},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1086-1095},
  doi       = {10.4304/jnw.9.5.1086-1095},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangLZWY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangMY14,
  author    = {Wenjing Zhang and
               Donglai Ma and
               Wei Yao},
  title     = {Medical Diagnosis Data Mining Based on Improved Apriori Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1339--1345},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1339-1345},
  doi       = {10.4304/jnw.9.5.1339-1345},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangMY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangS14,
  author    = {Hongdong Zhang and
               Yuli Song},
  title     = {Study on the Survival of Wireless Sensor Networks Based on Hierarchical
               Topology Control Method},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2482--2489},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2482-2489},
  doi       = {10.4304/jnw.9.9.2482-2489},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangW14,
  author    = {Zhaoning Zhang and
               Ping Wang},
  title     = {Computing Model of Airspace Utilization Rate Based on Airspace Load},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {71--77},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.71-77},
  doi       = {10.4304/jnw.9.01.71-77},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangW14a,
  author    = {Xin Zhang and
               Zhanwen Wu},
  title     = {Optimization Planning based on Improved Ant Colony Algorithm for Robot},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1542--1549},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1542-1549},
  doi       = {10.4304/jnw.9.6.1542-1549},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangW14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangWYZ14,
  author    = {Zhuo Zhang and
               Qinruo Wang and
               Qiyu Yang and
               Cheng Zhang},
  title     = {Study on Network Remote Controlling Huge-Power Chopping Cascade Speed
               Regulation System Based on State-Space Averaging Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1914--1920},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1914-1920},
  doi       = {10.4304/jnw.9.7.1914-1920},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangWYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangXWL14,
  author    = {Jianwei Zhang and
               Wei Xing and
               Yongchao Wang and
               Dongming Lu},
  title     = {{LR2:} Improving Push-Based Live Streaming and File Sharing in Peer-to-Peer
               Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {306--314},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.306-314},
  doi       = {10.4304/jnw.9.2.306-314},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangXWL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangXWWG14,
  author    = {Hao Zhang and
               Lingwei Xu and
               Chunlei Wu and
               Jingjing Wang and
               T. Aaron Gulliver},
  title     = {On the Capacity of Spatially Correlated {MIMO} Channels in a 60 GHz
               Indoor Environment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1374--1379},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1374-1379},
  doi       = {10.4304/jnw.9.6.1374-1379},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangXWWG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangYC14,
  author    = {Dengyin Zhang and
               Min Yang and
               Lei Cui},
  title     = {Congestion Control Strategy for Opportunistic Network Based on Message
               Values},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1132--1138},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1132-1138},
  doi       = {10.4304/jnw.9.5.1132-1138},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangYC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangYH14,
  author    = {Yan Zhang and
               Fengfan Yang and
               Guobing Hu},
  title     = {{LDPC} Coded Combined with Space-Time Codes in Cooperative {MIMO}
               System},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1268--1273},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1268-1273},
  doi       = {10.4304/jnw.9.5.1268-1273},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangYH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangYW14,
  author    = {Yi Zhang and
               Li Yu and
               Liyue Wang},
  title     = {High Access Performance Strategy for Next Generation Healthcare Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1477--1484},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1477-1484},
  doi       = {10.4304/jnw.9.6.1477-1484},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangYW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZD14,
  author    = {Wentao Zhang and
               Wenhua Zhao and
               Xinhui Du},
  title     = {Short-term Forecast Technology in Load of Electrified Railway based
               on Wavelet-extreme Learning Machine},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1502--1508},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1502-1508},
  doi       = {10.4304/jnw.9.6.1502-1508},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangZD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhao14,
  author    = {Jing Zhao},
  title     = {Self-adaptive Particle Swarm Optimization Algorithm based on Directed-weighted
               Complex Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2232--2238},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2232-2238},
  doi       = {10.4304/jnw.9.8.2232-2238},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhao14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoC14,
  author    = {Yuanyuan Zhao and
               Qian Chen},
  title     = {Online Order Priority Evaluation Based on Hybrid Harmony Search Algorithm
               of Optimized Support Vector Machines},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {972--978},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.972-978},
  doi       = {10.4304/jnw.9.4.972-978},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoCS14,
  author    = {Lin Zhao and
               Zhibo Chen and
               Guodong Sun},
  title     = {Dynamic Cluster-based Routing for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {2951--2956},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.2951-2956},
  doi       = {10.4304/jnw.9.11.2951-2956},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoCS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoF14,
  author    = {Hongbo Zhao and
               Lina Feng},
  title     = {An Improved Adaptive Dynamic Particle Swarm Optimization Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {488--494},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.488-494},
  doi       = {10.4304/jnw.9.2.488-494},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoL14,
  author    = {Fan Zhao and
               Jin Li},
  title     = {Pedestrian Motion Tracking and Crowd Abnormal Behavior Detection Based
               on Intelligent Video Surveillance},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2598--2605},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2598-2605},
  doi       = {10.4304/jnw.9.10.2598-2605},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoLX14,
  author    = {Changxiao Zhao and
               Zheng Li and
               Ying Xiong},
  title     = {An Energy-efficient {MAC} Protocol with Delay-bounded Downlink Traffic
               Scheduling Strategy for 802.11 Wireless LANs},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1747--1755},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1747-1755},
  doi       = {10.4304/jnw.9.7.1747-1755},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoLX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoS14,
  author    = {Xuehua Zhao and
               Liping Shi},
  title     = {{DC} Voltage Balance Control Strategy for Medium Voltage Cascaded
               {STATCOM} Based on Distributed Control},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {138--146},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.138-146},
  doi       = {10.4304/jnw.9.01.138-146},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoWW14,
  author    = {Yu Zhao and
               Yazi Wang and
               Gang Wang},
  title     = {Network Anti-interference Technology Based on Hybrid Optimization
               Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1624--1631},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1624-1631},
  doi       = {10.4304/jnw.9.6.1624-1631},
  timestamp = {Tue, 25 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoWW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoZX14,
  author    = {Dong Zhao and
               Ming Zhu and
               Ming Xu},
  title     = {Leveraging {SDN} and OpenFlow to Mitigate Interference in Enterprise
               {WLAN}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1526--1533},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1526-1533},
  doi       = {10.4304/jnw.9.6.1526-1533},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoZX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zheng14,
  author    = {Zhiqing Zheng},
  title     = {Cooperative Networks Power Allocation Scheme for Two-Way Opportunistic
               Relaying},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2153--2160},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2153-2160},
  doi       = {10.4304/jnw.9.8.2153-2160},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zheng14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengL14,
  author    = {Yiping Zheng and
               F. Liu},
  title     = {Filtering Network Spam Message using Approximated Logistic Regression},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2462--2467},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2462-2467},
  doi       = {10.4304/jnw.9.9.2462-2467},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhengL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengWSL14,
  author    = {Shaoxiong Zheng and
               Weixing Wang and
               Baoxia Sun and
               Gang Lei},
  title     = {Design of a Gateway Based on Directional Antenna {WSN} in Paddy Field},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2168--2175},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2168-2175},
  doi       = {10.4304/jnw.9.8.2168-2175},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhengWSL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengWZWZ14,
  author    = {Ruijuan Zheng and
               Wangyang Wei and
               Mingchuan Zhang and
               Qingtao Wu and
               Dan Zhang},
  title     = {Network Security Situation Evaluation Strategy Based on Cloud Gravity
               Center Judgment},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {283--290},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.283-290},
  doi       = {10.4304/jnw.9.2.283-290},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhengWZWZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhongTWWH14,
  author    = {Wen Zhong and
               Zhuoying Tan and
               Xiaojun Wang and
               Jin Wang and
               Tianshou Hu},
  title     = {Numerical Simulation of Stability Analyzing for Unsaturated Slope
               with Rainfall Infiltration},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1215--1222},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1215-1222},
  doi       = {10.4304/jnw.9.5.1215-1222},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhongTWWH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhongYZ14,
  author    = {Sheng Zhong and
               Chun Yang and
               Jian Zhang},
  title     = {Symbol Timing Estimation with Multi-h {CPM} Signals},
  journal   = {J. Networks},
  volume    = {9},
  number    = {4},
  pages     = {921--926},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.4.921-926},
  doi       = {10.4304/jnw.9.4.921-926},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhongYZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhongZYK14,
  author    = {Dong Zhong and
               Yian Zhu and
               Tao You and
               Jie Kong},
  title     = {Topology Control Mechanism Based on Link Available Probability in
               Aeronautical Ad Hoc Network},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3356--3365},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3356-3365},
  doi       = {10.4304/jnw.9.12.3356-3365},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhongZYK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhou14,
  author    = {Hang Zhou},
  title     = {An Upper Bound on the Coding Capacity of Matroidal Network Associated
               with {R8}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {36--41},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.36-41},
  doi       = {10.4304/jnw.9.01.36-41},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhou14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouA14,
  author    = {Li Zhou and
               Junshe An},
  title     = {Research on Wireless {MIL-STD-1553B} Bus Based on Infrared Technology},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2690--2696},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2690-2696},
  doi       = {10.4304/jnw.9.10.2690-2696},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouC14,
  author    = {Shenghan Zhou and
               Wenbing Chang},
  title     = {Research of Network System Reconfigurable Model Based on the Finite
               State Automation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1237--1244},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1237-1244},
  doi       = {10.4304/jnw.9.5.1237-1244},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouL14,
  author    = {Xiang Zhou and
               Xiaoqiang Liu},
  title     = {Multiple Computing Task Scheduling Method Based on Dynamic Data Replication
               and Hierarchical Strategy},
  journal   = {J. Networks},
  volume    = {9},
  number    = {2},
  pages     = {415--422},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.2.415-422},
  doi       = {10.4304/jnw.9.2.415-422},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouLZ14,
  author    = {Jianzhong Zhou and
               Ji'an Li and
               Yongchuan Zhang},
  title     = {Efficient Deployment Scheme Selection Based On {TOPSIS} for Clustering
               Protocols of {WSN}},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1838--1845},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1838-1845},
  doi       = {10.4304/jnw.9.7.1838-1845},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouLZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouTH14,
  author    = {Yichao Zhou and
               Zhenmin Tang and
               Xiyuan Hu},
  title     = {Fast Single Image Super Resolution Reconstruction via Image Separation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {7},
  pages     = {1811--1818},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.7.1811-1818},
  doi       = {10.4304/jnw.9.7.1811-1818},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouTH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouWWL14,
  author    = {Rui Zhou and
               Jinghan Wang and
               Guowei Wang and
               Jing Li},
  title     = {Customized Interface Generation Model Based on Knowledge and Template
               for Web Service},
  journal   = {J. Networks},
  volume    = {9},
  number    = {12},
  pages     = {3478--3485},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.12.3478-3485},
  doi       = {10.4304/jnw.9.12.3478-3485},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouWWL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouX14,
  author    = {Yunlong Zhou and
               Chao Xu},
  title     = {Hopf Bifurcation in a Dual Model of Internet Congestion Control System
               Using Dynamic Delayed Feedback},
  journal   = {J. Networks},
  volume    = {9},
  number    = {11},
  pages     = {3005--3014},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.11.3005-3014},
  doi       = {10.4304/jnw.9.11.3005-3014},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouX14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouYLJ14,
  author    = {Xueyan Zhou and
               Jing Yang and
               Zehong Lin and
               Yali Ji},
  title     = {Research on the Spread Control of Unconfirmed Information after the
               Emergency Occurs based on the Topic Model},
  journal   = {J. Networks},
  volume    = {9},
  number    = {10},
  pages     = {2697--2701},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.10.2697-2701},
  doi       = {10.4304/jnw.9.10.2697-2701},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouYLJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouYW14,
  author    = {Jian Zhou and
               Fan Yang and
               Ke Wang},
  title     = {An Inverse Shortest Path Problem on an Uncertain Graph},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2353--2359},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2353-2359},
  doi       = {10.4304/jnw.9.9.2353-2359},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouYW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhu14,
  author    = {Xiubin Zhu},
  title     = {Face Representation with Local Gabor Phase Quantization},
  journal   = {J. Networks},
  volume    = {9},
  number    = {6},
  pages     = {1617--1623},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.6.1617-1623},
  doi       = {10.4304/jnw.9.6.1617-1623},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhu14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuC14,
  author    = {Jian{-}xin Zhu and
               Gihwan Cho},
  title     = {Broadcast Networks based on the Virus Evolutionary Algorithm},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1301--1308},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1301-1308},
  doi       = {10.4304/jnw.9.5.1301-1308},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhuC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuWCXZZA14,
  author    = {Nanli Zhu and
               Yibo Wang and
               Cheng Cheng and
               Wei Xu and
               Yongping Zhang and
               Ping Zou and
               M. S. K. Awan},
  title     = {Regression-Based Microblogging Influence Detection Framework for Stock
               Market},
  journal   = {J. Networks},
  volume    = {9},
  number    = {8},
  pages     = {2129--2136},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.8.2129-2136},
  doi       = {10.4304/jnw.9.8.2129-2136},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhuWCXZZA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZongJJK14,
  author    = {Hengshan Zong and
               Guozhu Jia and
               Feng Jin and
               Jili Kong},
  title     = {Evolutionary Game Analysis of Knowledge Sharing in Asymmetric Upstream
               and Downstream Enterprises of Supply Chain},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2490--2497},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2490-2497},
  doi       = {10.4304/jnw.9.9.2490-2497},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZongJJK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zou14,
  author    = {Donglan Zou},
  title     = {Research on the New Algorithm using Multi-Array Computation Signal
               Direction},
  journal   = {J. Networks},
  volume    = {9},
  number    = {9},
  pages     = {2402--2410},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.9.2402-2410},
  doi       = {10.4304/jnw.9.9.2402-2410},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zou14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZouL14,
  author    = {Pinghui Zou and
               Yun Liu},
  title     = {A Data-aggregation Scheme for {WSN} based on Optimal Weight Allocation},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {100--107},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.100-107},
  doi       = {10.4304/jnw.9.01.100-107},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZouL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZubairKM14,
  author    = {Muhammad Zubair and
               Xiangwei Kong and
               Saeed Mahfooz},
  title     = {Secure Session Mobility using Hierarchical Authentication Key Management
               in Next Generation Networks},
  journal   = {J. Networks},
  volume    = {9},
  number    = {5},
  pages     = {1121--1131},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.5.1121-1131},
  doi       = {10.4304/jnw.9.5.1121-1131},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZubairKM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZuoZ14,
  author    = {Fang Zuo and
               Wei Zhang},
  title     = {An Evolutionary Game-Based Mechanism for Routing {P2P} Network Flow
               among Selfish Peers},
  journal   = {J. Networks},
  volume    = {9},
  number    = {1},
  pages     = {10--17},
  year      = {2014},
  url       = {https://doi.org/10.4304/jnw.9.01.10-17},
  doi       = {10.4304/jnw.9.01.10-17},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZuoZ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AdaniyaAP13,
  author    = {Mario H. A. C. Adaniya and
               Taufik Abr{\~{a}}o and
               Mario Lemes Proen{\c{c}}a Jr.},
  title     = {Anomaly Detection Using Metaheuristic Firefly Harmonic Clustering},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {82--91},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.82-91},
  doi       = {10.4304/jnw.8.1.82-91},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AdaniyaAP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AhmadY13,
  author    = {Khalid S. Ahmad and
               A. Z. Yonis},
  title     = {Miniaturized Hybrid Rat-Race Coupler of a 2.5 GHz Loaded by Resistors},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1465--1469},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1465-1469},
  doi       = {10.4304/jnw.8.7.1465-1469},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AhmadY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Al-DuwairiAG13,
  author    = {Basheer Al{-}Duwairi and
               Zakaria Al{-}Qudah and
               Manimaran Govindarasu},
  title     = {A Novel Scheme for Mitigating Botnet-Based DDoS Attacks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {297--306},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.297-306},
  doi       = {10.4304/jnw.8.2.297-306},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Al-DuwairiAG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AliM13,
  author    = {Zahid Ali and
               Qurban A. Memon},
  title     = {Time Delay Tracking for Multiuser Synchronization in {CDMA} Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1929--1935},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1929-1935},
  doi       = {10.4304/jnw.8.9.1929-1935},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/AliM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BourasCSSZ13,
  author    = {Christos Bouras and
               Savvas Charalambides and
               Kostas Stamos and
               Stamatis Stroumpis and
               Giannis Zaoudis},
  title     = {Power Management Mechanism Exploiting Network and Video Information
               over Wireless Links},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {15--25},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.15-25},
  doi       = {10.4304/jnw.8.1.15-25},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/BourasCSSZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BuLLY13,
  author    = {Yahui Bu and
               Aifen Li and
               Junrong Liu and
               Weiqiang Yu},
  title     = {Multisensor Acquirement System of Electrokinetic in Multiphase Flow},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1975--1981},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1975-1981},
  doi       = {10.4304/jnw.8.9.1975-1981},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BuLLY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiW13,
  author    = {Jinbao Cai and
               Yalin Wu},
  title     = {An Enhanced Rate Control Initialization Method for {H.264} based on
               Image Quality Balance of {GOP} Using Support Vector Machines},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2155--2162},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2155-2162},
  doi       = {10.4304/jnw.8.9.2155-2162},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiY13,
  author    = {Chuan Cai and
               Liang Yuan},
  title     = {Intrusion Detection System based on Ant Colony System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {888--894},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.888-894},
  doi       = {10.4304/jnw.8.4.888-894},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiY13a,
  author    = {Chuan Cai and
               Liang Yuan},
  title     = {Research on Energy-Saving-Based Cloud Computing Scheduling Strategy},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1153--1159},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1153-1159},
  doi       = {10.4304/jnw.8.5.1153-1159},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiY13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoLWZ13,
  author    = {Lijun Cao and
               Xiyin Liu and
               Yubin Wang and
               Zhongping Zhang},
  title     = {WSO-based Spatial Outlier Detection Algorithms},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1582--1588},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1582-1588},
  doi       = {10.4304/jnw.8.7.1582-1588},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaoLWZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoLZ13,
  author    = {Lijun Cao and
               Xiyin Liu and
               Zhongping Zhang},
  title     = {Resource Discovery Algorithm Based on Multilayer Overlay Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1357--1363},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1357-1363},
  doi       = {10.4304/jnw.8.6.1357-1363},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaoLZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chen13,
  author    = {Yuanqiang Chen},
  title     = {Stability of Impulsive Cellular Neural Networks with Time-varying
               Delays},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {704--711},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.704-711},
  doi       = {10.4304/jnw.8.3.704-711},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Chen13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chen13a,
  author    = {Kaibing Chen},
  title     = {Unequal Cluster-Based Routing Protocol in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2656--2662},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2656-2662},
  doi       = {10.4304/jnw.8.11.2656-2662},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Chen13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenCS13,
  author    = {Jingyu Chen and
               Ping Chen and
               Xian'gang Sheng},
  title     = {A Sketch-based Clustering Algorithm for Uncertain Data Streams},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1536--1542},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1536-1542},
  doi       = {10.4304/jnw.8.7.1536-1542},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenCS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenDW13,
  author    = {Jinxiu Chen and
               Chao Dong and
               Youzheng Wang},
  title     = {Performance Evaluation of Adaptive Modulation System over Mobile Satellite
               Channels},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1262--1269},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1262-1269},
  doi       = {10.4304/jnw.8.6.1262-1269},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenDW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenH13,
  author    = {Jia Chen and
               Xian Huang},
  title     = {A Data-reversible Hiding Algorithm in WSNs},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2037--2042},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2037-2042},
  doi       = {10.4304/jnw.8.9.2037-2042},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenLF13,
  author    = {Qinghua Chen and
               Yan Liu and
               Jianwei Feng},
  title     = {Quantitative Fracture Modeling on Low-permeability Sandstone Reservoirs
               by Stress Field},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1890--1898},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1890-1898},
  doi       = {10.4304/jnw.8.8.1890-1898},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenLF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenMLJRW13,
  author    = {Meilian Chen and
               Yan Ma and
               Yikun Liu and
               Fan Jia and
               Yanhui Ran and
               Jie Wang},
  title     = {Mobile Learning System based on Cloud Computing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2572--2577},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2572-2577},
  doi       = {10.4304/jnw.8.11.2572-2577},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenMLJRW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenMN13,
  author    = {Feixiang Chen and
               Xiao Ma and
               Shaoliang Ni},
  title     = {Organization and Correction of Spatial Data in Mobile {GIS}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1514--1520},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1514-1520},
  doi       = {10.4304/jnw.8.7.1514-1520},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenMN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenMR13,
  author    = {Feixiang Chen and
               Xiao Ma and
               Haiyan Ren},
  title     = {Progressive Transmission of Vector Spatial Data},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1065--1072},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1065-1072},
  doi       = {10.4304/jnw.8.5.1065-1072},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenMR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenPJ13,
  author    = {Anhua Chen and
               Yang Pan and
               Lingli Jiang},
  title     = {Improving K-means Clustering Method in Fault Diagnosis based on {SOM}
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {680--687},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.680-687},
  doi       = {10.4304/jnw.8.3.680-687},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenPJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenQX13,
  author    = {Peng Chen and
               Lede Qiu and
               Feng Xu},
  title     = {Downlink Power Control for {CDMA} Satellite Cognitive Radio},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {598--606},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.598-606},
  doi       = {10.4304/jnw.8.3.598-606},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenQX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenT13,
  author    = {Yuanqiang Chen and
               Renbi Tian},
  title     = {Impulsive Tracking Control for Non-measurable State with Time-delay},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {851--857},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.851-857},
  doi       = {10.4304/jnw.8.4.851-857},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenT13a,
  author    = {Yuanqiang Chen and
               Renbi Tian},
  title     = {Exponential Stability of Impulsive Discrete Systems with Multiple
               Delays},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2564--2571},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2564-2571},
  doi       = {10.4304/jnw.8.11.2564-2571},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenT13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenWYG13,
  author    = {Shi{-}Wen Chen and
               Jiang{-}xing Wu and
               Xiao{-}long Ye and
               Tong Guo},
  title     = {Distributed Denial of Service Attacks Detection Method Based on Conditional
               Random Fields},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {858--865},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.858-865},
  doi       = {10.4304/jnw.8.4.858-865},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenWYG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenX13,
  author    = {Yangrong Chen and
               Guanglin Xing},
  title     = {A Key Issuing Scheme in IBE-based Distributed Online Social Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2213--2219},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2213-2219},
  doi       = {10.4304/jnw.8.10.2213-2219},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenXGML13,
  author    = {Feng Chen and
               Wenjun Xu and
               Yuchen Guo and
               Hongyu Ma and
               Jiaru Lin},
  title     = {Joint Traffic Splitting and Spectrum Resource Allocation in Heterogeneous
               Cognitive Wireless Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2429--2435},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2429-2435},
  doi       = {10.4304/jnw.8.10.2429-2435},
  timestamp = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenXGML13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenY13,
  author    = {Dan{-}ye Chen and
               Qi{-}zhi Yu},
  title     = {Research of Computer Intelligent Control System and data processing
               of Welding Inverter Power Based on {DSP}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1521--1528},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1521-1528},
  doi       = {10.4304/jnw.8.7.1521-1528},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenYW13,
  author    = {Bin Chen and
               Hong{-}zhen Yang and
               Li{-}wen Wang},
  title     = {Single Neuron {PID} Control of Aircraft Deicing Fluids Rapid Heating
               System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {405--412},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.405-412},
  doi       = {10.4304/jnw.8.2.405-412},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenYW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenZ13,
  author    = {Ying Chen and
               Shaobai Zhang},
  title     = {Notice of Violation of Academy Publisher Publication Principles "Learning
               Tract Variables with Distal Supervised Learning Model"},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {397--404},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.397-404},
  doi       = {10.4304/jnw.8.2.397-404},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenZ13a,
  author    = {Gang Chen and
               Dawei Zhao},
  title     = {Model of Information Security Risk Assessment based on Improved Wavelet
               Neural Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2093--2100},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2093-2100},
  doi       = {10.4304/jnw.8.9.2093-2100},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenZ13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenZC13,
  author    = {Yange Chen and
               Zhili Zhang and
               Qingfang Cui},
  title     = {Design of Three-dimensional Interchange Network Based on IPv4/IPv6
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {650--657},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.650-657},
  doi       = {10.4304/jnw.8.3.650-657},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenZC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChengHH13,
  author    = {Ching{-}Ching Cheng and
               Pei{-}Li Huang and
               Kuo{-}Hung Huang},
  title     = {Cooperative Learning in Lego Robotics Projects: Exploring the Impacts
               of Group Formation on Interaction and Achievement},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1529--1535},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1529-1535},
  doi       = {10.4304/jnw.8.7.1529-1535},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChengHH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChengNZY13,
  author    = {Wei{-}Min Cheng and
               Wen Nie and
               Gang Zhou and
               Jun{-}lei Yang},
  title     = {Research on Eddy Air-Curtain Dust Controlled Flow Field in Hard Rock
               Mechanized Driving Face},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {453--460},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.453-460},
  doi       = {10.4304/jnw.8.2.453-460},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChengNZY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chu13,
  author    = {Jian Chu},
  title     = {Improved Shadowed Sets Data Selection Method in Extension Neural Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2728--2735},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2728-2735},
  doi       = {10.4304/jnw.8.12.2728-2735},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Chu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChuangLL13,
  author    = {Kai{-}Wayne Chuang and
               Chien{-}Nan Lin and
               Chun{-}Hsiung Lan},
  title     = {Order Policy Analysis for Deteriorating Inventory Model with Trapezoidal
               Type Demand Rate},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1838--1844},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1838-1844},
  doi       = {10.4304/jnw.8.8.1838-1844},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChuangLL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiZXZ13,
  author    = {Zhong{-}wei Cui and
               Yong Zhao and
               Dao{-}yun Xu and
               Yu Zuo},
  title     = {A Dynamic Routing Based on Bayes Estimation for Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1403--1410},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1403-1410},
  doi       = {10.4304/jnw.8.6.1403-1410},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiZXZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DengLLY13,
  author    = {Yongliang Deng and
               Qiming Li and
               Ying Lu and
               Jingfeng Yuan},
  title     = {Topology Vulnerability Analysis and Measure of Urban Metro Network:
               The case of Nanjing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1350--1356},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1350-1356},
  doi       = {10.4304/jnw.8.6.1350-1356},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DengLLY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DingMW13,
  author    = {Bin Ding and
               Yan Ma and
               Yiwei Wu},
  title     = {Playfield Detection Algorithm Based on {AGMM} in Sports Video},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1774--1780},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1774-1780},
  doi       = {10.4304/jnw.8.8.1774-1780},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DingMW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DingYYY13,
  author    = {Lei Ding and
               Fei Yu and
               Zhenghua Yang and
               Guangxue Yue},
  title     = {The System Design of a Node of {P2P} Networks for Intrusion Detection},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1920--1927},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1920-1927},
  doi       = {10.4304/jnw.8.8.1920-1927},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DingYYY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Dong13,
  author    = {Peiyi Dong},
  title     = {User Equilibrium Exchange Allocation Algorithm Based on Super Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2743--2748},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2743-2748},
  doi       = {10.4304/jnw.8.12.2743-2748},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Dong13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DongLM13,
  author    = {Fang Dong and
               Mengchi Liu and
               Kun Ma},
  title     = {Web Entities Extraction Based on Semi-Structured Semantic Database},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1640--1646},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1640-1646},
  doi       = {10.4304/jnw.8.7.1640-1646},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DongLM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DuC13,
  author    = {Juan Du and
               Su{-}li Chen},
  title     = {Research of Improved Network Malicious Information Filtering Model
               Based on {SVM}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1012--1018},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1012-1018},
  doi       = {10.4304/jnw.8.5.1012-1018},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DuC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/EndoWOA13,
  author    = {Keiichi Endo and
               Kentaro Watanabe and
               Dai Okano and
               Kaname Amano},
  title     = {An Efficient Position-based Broadcasting Method Considering Node Density
               in MANETs},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {804--811},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.804-811},
  doi       = {10.4304/jnw.8.4.804-811},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/EndoWOA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Fan13,
  author    = {Xiulin Fan},
  title     = {Efficient Data Fusion Algorithm in WSNs},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2642--2648},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2642-2648},
  doi       = {10.4304/jnw.8.11.2642-2648},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/Fan13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FanZ13,
  author    = {Juan Fan and
               Wuyang Zhou},
  title     = {Joint Uplink Resource Allocation Algorithm with Proportional-Fair
               in Heterogeneous Wireless Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2247--2254},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2247-2254},
  doi       = {10.4304/jnw.8.10.2247-2254},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FanZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FangZWY13,
  author    = {Jie Fang and
               Qingbiao Zhou and
               Xide Wu and
               Shijie Yang},
  title     = {Network Traffic Prediction Model Based on Catfish-PSO-SVM},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2534--2540},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2534-2540},
  doi       = {10.4304/jnw.8.11.2534-2540},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FangZWY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Feng13,
  author    = {Xiangrong Feng},
  title     = {Traffic Prediction Scheme based on Chaotic Models in Wireless Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2101--2106},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2101-2106},
  doi       = {10.4304/jnw.8.9.2101-2106},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Feng13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengHWZX13,
  author    = {Dan Feng and
               Chuanhe Huang and
               Bo Wang and
               Junyu Zhu and
               Liya Xu},
  title     = {Mutihop-enabled Trusted Handoff Algorithm in Heterogeneous Wireless
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {156--164},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.156-164},
  doi       = {10.4304/jnw.8.1.156-164},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FengHWZX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FraiwanG13,
  author    = {Mohammad Fraiwan and
               Manimaran Govindarasu},
  title     = {Empowering PlanetLab: {A} Method for {TCP} Evaluation Over the Planetary-scale
               Testbed},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {307--316},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.307-316},
  doi       = {10.4304/jnw.8.2.307-316},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FraiwanG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FuZ13,
  author    = {Hongliang Fu and
               Beibei Zhang},
  title     = {Compressed Sensing Precoding with Limited Feedback in Multi-carrier
               {MIMO} System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1425--1431},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1425-1431},
  doi       = {10.4304/jnw.8.6.1425-1431},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FuZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gao13,
  author    = {Xiaoyan Gao},
  title     = {Optimality and Duality for Non-smooth Multiple Objective Semi-infinite
               Programming},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {413--420},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.413-420},
  doi       = {10.4304/jnw.8.2.413-420},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Gao13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gao13a,
  author    = {Xiaoyan Gao},
  title     = {Optimality and Duality for Minimax Fractional Semi-Infinite Programming},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {739--746},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.739-746},
  doi       = {10.4304/jnw.8.3.739-746},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Gao13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gao13b,
  author    = {Hui{-}Ying Gao},
  title     = {Performance Evaluation of Management Environment in Microelectronics
               Enterprise},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1073--1079},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1073-1079},
  doi       = {10.4304/jnw.8.5.1073-1079},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Gao13b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoG13,
  author    = {Wei Gao and
               Zhirong Guo},
  title     = {Speed Sensorless Control of {PMSM} using Model Reference Adaptive
               System and {RBFN}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {213--220},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.213-220},
  doi       = {10.4304/jnw.8.1.213-220},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoM13,
  author    = {Cong Gao and
               Jianfeng Ma},
  title     = {A Collaborative QoS-Aware Service Evaluation Method for Service Selection},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1370--1379},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1370-1379},
  doi       = {10.4304/jnw.8.6.1370-1379},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoZC13,
  author    = {Liai Gao and
               Meng Zhang and
               Geng Chen},
  title     = {An Intelligent Irrigation System Based on Wireless Sensor Network
               and Fuzzy Control},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1080--1087},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1080-1087},
  doi       = {10.4304/jnw.8.5.1080-1087},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoZC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GeDY13,
  author    = {Xingchen Ge and
               Ning Deng and
               Jian Yin},
  title     = {Application for Data De-duplication Algorithm Based on Mobile Devices},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2498--2505},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2498-2505},
  doi       = {10.4304/jnw.8.11.2498-2505},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GeDY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gong13,
  author    = {Lixiong Gong},
  title     = {Research on Evaluating and Choosing Logistics Service Providers for
               Manufacturing Enterprise},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2935--2941},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2935-2941},
  doi       = {10.4304/jnw.8.12.2935-2941},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Gong13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GongY13,
  author    = {Jun Gong and
               Miao Yu},
  title     = {A Multi-objective Cross-training Plan Based on {NSGA-II}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2310--2316},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2310-2316},
  doi       = {10.4304/jnw.8.10.2310-2316},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GongY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuZ13,
  author    = {Lichuan Gu and
               Jinqin Zhong},
  title     = {An Improved Anti-collision Algorithm Based on {JDS}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2578--2584},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2578-2584},
  doi       = {10.4304/jnw.8.11.2578-2584},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuangZGFH13,
  author    = {Yan Guang and
               Yue{-}Fei Zhu and
               Chun{-}Xiang Gu and
               Jinlong Fei and
               Xin{-}Zheng He},
  title     = {A Framework for Automated Security Proof and its Application to {OAEP}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {552--558},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.552-558},
  doi       = {10.4304/jnw.8.3.552-558},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuangZGFH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuangZGZF13,
  author    = {Yan Guang and
               Yue{-}Fei Zhu and
               Chun{-}Xiang Gu and
               Yonghui Zheng and
               Jinlong Fei},
  title     = {An Efficient Proof of Retrievability Scheme for Fully Homomorphic
               Encrypted Data},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {339--344},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.339-344},
  doi       = {10.4304/jnw.8.2.339-344},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuangZGZF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoL13,
  author    = {Ying Guo and
               Yutao Liu},
  title     = {Time Synchronization for Mobile Underwater Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {116--123},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.116-123},
  doi       = {10.4304/jnw.8.1.116-123},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoZRZ13,
  author    = {Xiaohui Guo and
               Xinmin Zhang and
               Haiyan Ren and
               Xiao Zhang},
  title     = {Research on Context Aware Network Security Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1852--1858},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1852-1858},
  doi       = {10.4304/jnw.8.8.1852-1858},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoZRZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HaiWX13,
  author    = {Linpeng Hai and
               Rui Wang and
               Liying Xiao},
  title     = {A Novel {RFID} Anti-Collision Algorithm based on Binary Tree},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2885--2892},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2885-2892},
  doi       = {10.4304/jnw.8.12.2885-2892},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HaiWX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HalloushD13,
  author    = {Mohammed D. Halloush and
               Tasneem Dawahdeh},
  title     = {On Varying Network Coding Forwarding Ratio in Vector Based Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {530--536},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.530-536},
  doi       = {10.4304/jnw.8.3.530-536},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HalloushD13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanHZ13,
  author    = {Lu Han and
               Liyan Han and
               Hongwei Zhao},
  title     = {Credit Scoring Model Hybridizing Artificial Intelligence with Logistic
               Regression},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {253--261},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.253-261},
  doi       = {10.4304/jnw.8.1.253-261},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanHZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanLCWW13,
  author    = {Yanyan Han and
               Deshi Li and
               Jian Chen and
               Tianyu Wang and
               Xiaoliang Wang},
  title     = {Carrying Network Accessing Architecture and Strategy Based on Business
               Differentiation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1470--1475},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1470-1475},
  doi       = {10.4304/jnw.8.7.1470-1475},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanLCWW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanN13,
  author    = {Xiaoting Han and
               Li Niu},
  title     = {On Charactering of Information Propagation in Online Social Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {124--131},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.124-131},
  doi       = {10.4304/jnw.8.1.124-131},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HaoYZ13,
  author    = {Xiaowen Hao and
               Jianguo Yang and
               Yi'e Zhao},
  title     = {Optimization of Integrated Pollutants Control Equipment by Computer
               Information Processing Technology},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2927--2934},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2927-2934},
  doi       = {10.4304/jnw.8.12.2927-2934},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HaoYZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HassounaKK13,
  author    = {Asma Ben Hassouna and
               Hend Koubaa and
               Farouk Kamoun},
  title     = {Conflict-Aware Relay Selection for Multicast in {MUD} based Wireless
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {787--795},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.787-795},
  doi       = {10.4304/jnw.8.4.787-795},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HassounaKK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeCWL13,
  author    = {Jun He and
               Liang Chen and
               Xiaolong Wang and
               Yonggang Li},
  title     = {Web Service Composition Optimization Based on Improved Artificial
               Bee Colony Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2143--2149},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2143-2149},
  doi       = {10.4304/jnw.8.9.2143-2149},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeCWL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeQ13,
  author    = {Lei He and
               Jiaxin Qi},
  title     = {Enterprise Human Resources Information Mining Based on Improved Apriori
               Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1138--1145},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1138-1145},
  doi       = {10.4304/jnw.8.5.1138-1145},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hou13,
  author    = {Chuanyan Hou},
  title     = {Study of Combinatorial Operator on Poisson Manifolds},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {932--938},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.932-938},
  doi       = {10.4304/jnw.8.4.932-938},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Hou13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HouW13,
  author    = {Jinkui Hou and
               Lei Wang},
  title     = {Formal Description for Component-based Architecture Model Transformation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {874--881},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.874-881},
  doi       = {10.4304/jnw.8.4.874-881},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HouW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HouWHK13,
  author    = {Xin Hou and
               Xingfeng Wei and
               Ertian Hua and
               Yujing Kong},
  title     = {Self-Adaptive and Energy-Efficient {MAC} Protocol Based on Event-Driven},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {174--181},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.174-181},
  doi       = {10.4304/jnw.8.1.174-181},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HouWHK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HouZ13,
  author    = {Jinkui Hou and
               Yuyan Zhang},
  title     = {Model Mapping Approach Based on Ontology Semantics},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1967--1974},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1967-1974},
  doi       = {10.4304/jnw.8.9.1967-1974},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HouZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hu13,
  author    = {Yong Hu},
  title     = {Minimal K-Covering Set Algorithm based on Particle Swarm Optimizer},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2872--2877},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2872-2877},
  doi       = {10.4304/jnw.8.12.2872-2877},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Hu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuJZZCL13,
  author    = {Liang Hu and
               Jingyan Jiang and
               Jin Zhou and
               Kuo Zhao and
               Liang Chen and
               Huimin Lu},
  title     = {Environment Observation System based on Semantics in the Internet
               of Things},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2721--2727},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2721-2727},
  doi       = {10.4304/jnw.8.12.2721-2727},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuJZZCL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuSZXMZ13,
  author    = {Liang Hu and
               Shinan Song and
               Xiaolu Zhang and
               Zhenzhen Xie and
               Xiangyu Meng and
               Kuo Zhao},
  title     = {Analyzing Malware Based on Volatile Memory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2512--2519},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2512-2519},
  doi       = {10.4304/jnw.8.11.2512-2519},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuSZXMZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuWS13,
  author    = {Haiyan Hu and
               Pengfei Wang and
               Lining Sun},
  title     = {Simulation Platform of Monitoring and Tracking Micro System for Dangerous
               Chemicals Transportation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {477--484},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.477-484},
  doi       = {10.4304/jnw.8.2.477-484},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuWS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangC13,
  author    = {Xian Huang and
               Jia Chen},
  title     = {Efficient Node Coverage Scheme of Wireless Sensor Network under Multi-Constraint
               Conditions},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2277--2284},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2277-2284},
  doi       = {10.4304/jnw.8.10.2277-2284},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangH13,
  author    = {Wei Huang and
               Bo Huang},
  title     = {R{\&}D Outsourcing Policy with Input Spillovers Based on Multi-Outsourcer
               and Multi-Supplier},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2324--2331},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2324-2331},
  doi       = {10.4304/jnw.8.10.2324-2331},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLFX13,
  author    = {Zhongsheng Huang and
               Wensheng Li and
               Zhifang Feng and
               Huaming Xing},
  title     = {On Nonnegative Signed Domination in Graphs and its Algorithmic Complexity},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {365--372},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.365-372},
  doi       = {10.4304/jnw.8.2.365-372},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangLFX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLLG13,
  author    = {Xiaomao Huang and
               Xuan Li and
               Changjiang Long and
               Yun Gao},
  title     = {Guaranteed Cost Fault-tolerant Control of Networked Control Systems
               with Short Output Delay and Short Control Delay Based on State Observer},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {836--842},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.836-842},
  doi       = {10.4304/jnw.8.4.836-842},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangLLG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangW13,
  author    = {Kuo{-}Feng Huang and
               Shih{-}Jung Wu},
  title     = {Real-time-service-based Distributed Scheduling Scheme for {IEEE} 802.16j
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {513--517},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.513-517},
  doi       = {10.4304/jnw.8.3.513-517},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangXYW13,
  author    = {Bo Huang and
               Yong Xu and
               Mengting Yuan and
               Guoqing Wu},
  title     = {Formal Behavior Modeling: Business Processes Based on Cloud Platform},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1417--1424},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1417-1424},
  doi       = {10.4304/jnw.8.6.1417-1424},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangXYW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangY13,
  author    = {Jian Huang and
               Hongmei Yan},
  title     = {Indoor Localization Algorithm Based on Cooperative of State Matrix
               and Kalman Filter},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1197--1203},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1197-1203},
  doi       = {10.4304/jnw.8.5.1197-1203},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangY13a,
  author    = {Hao Huang and
               Fei Yang},
  title     = {An Interpretation of Erlang into Value-passing Calculus},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1504--1513},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1504-1513},
  doi       = {10.4304/jnw.8.7.1504-1513},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangY13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangYZL13,
  author    = {Daochao Huang and
               Dong Yang and
               Hongke Zhang and
               Fuhong Lin},
  title     = {Efficient DoS-limiting Support by Indirect Mapping in Networks with
               Locator/Identifier Separation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {92--99},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.92-99},
  doi       = {10.4304/jnw.8.1.92-99},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangYZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JangH13,
  author    = {Hung{-}Chin Jang and
               Tzu{-}Yao Hsu},
  title     = {Infrastructure Based Chord Structure for {P2P} File Sharing over Vehicular
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {588--597},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.588-597},
  doi       = {10.4304/jnw.8.3.588-597},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JangH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JawharMU13,
  author    = {Imad Jawhar and
               Nader Mohamed and
               Hafsa Usmani},
  title     = {An Overview of Inter-Vehicular Communication Systems, Protocols and
               Middleware},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2749--2761},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2749-2761},
  doi       = {10.4304/jnw.8.12.2749-2761},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JawharMU13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiWC13,
  author    = {Mingyu Ji and
               Di Wu and
               Zhiyuan Chen},
  title     = {Verification Method of Conditional Probability Based on Automaton},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1329--1335},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1329-1335},
  doi       = {10.4304/jnw.8.6.1329-1335},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiWC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiaK13,
  author    = {Guozhu Jia and
               Wen Kong},
  title     = {Dynamic Cell Formation based on Multi-objective Optimization Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1742--1749},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1742-1749},
  doi       = {10.4304/jnw.8.8.1742-1749},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiaK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiaXL13,
  author    = {Zhenhua Jia and
               Haohan Xie and
               Ye Liang},
  title     = {Interval Similarity-Based Quantization Method for Continuous Data},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2614--2619},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2614-2619},
  doi       = {10.4304/jnw.8.11.2614-2619},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiaXL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangH13,
  author    = {Shaohua Jiang and
               Xia Hua},
  title     = {Construction Site Environment Temperature Monitoring System Based
               on ZigBee and Virtual Instrument},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {963--970},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.963-970},
  doi       = {10.4304/jnw.8.4.963-970},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangW13,
  author    = {Wei Jiang and
               Kefu Wang},
  title     = {An Improved {PAPR} Suppression Algorithm based on Channel Coding in
               {OFDM} System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2620--2626},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2620-2626},
  doi       = {10.4304/jnw.8.11.2620-2626},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangW13a,
  author    = {Xiao{-}Yun Jiang and
               Horng{-}Huei Wu},
  title     = {Optimization of Setup Frequency for {TOC} Supply Chain Replenishment
               Systems Based on Pareto Particle Swarm Optimization},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2964--2971},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2964-2971},
  doi       = {10.4304/jnw.8.12.2964-2971},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangW13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangWWZW13,
  author    = {Hai{-}yan Jiang and
               Xing{-}ce Wang and
               Zhongke Wu and
               Mingquan Zhou and
               Xuesong Wang},
  title     = {Topic Information Collection based on the Hidden Markov Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {485--492},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.485-492},
  doi       = {10.4304/jnw.8.2.485-492},
  timestamp = {Thu, 08 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangWWZW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangZJC13,
  author    = {Lingli Jiang and
               Bo Zeng and
               Francis R. Jordan and
               Anhua Chen},
  title     = {Kernel Function and Parameters Optimization in {KICA} for Rolling
               Bearing Fault Diagnosis},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1913--1919},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1913-1919},
  doi       = {10.4304/jnw.8.8.1913-1919},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangZJC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangZZ13,
  author    = {Shaohua Jiang and
               Jian Zhang and
               Haiyan Zhang},
  title     = {Ontology-based Semantic Retrieval for Risk Management of Construction
               Project},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1212--1220},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1212-1220},
  doi       = {10.4304/jnw.8.5.1212-1220},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangZZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangZZ13a,
  author    = {Shaohua Jiang and
               Haiyan Zhang and
               Jian Zhang},
  title     = {Research on BIM-based Construction Domain Text Information Management},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1455--1464},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1455-1464},
  doi       = {10.4304/jnw.8.6.1455-1464},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiangZZ13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Jiao13,
  author    = {Yabing Jiao},
  title     = {Electronic Commerce Logistics Network Optimization Based on Swarm
               Intelligent Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2163--2170},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2163-2170},
  doi       = {10.4304/jnw.8.9.2163-2170},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Jiao13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiaoWZY13,
  author    = {Wenzhe Jiao and
               Guoqing Wang and
               Zhengjun Zhai and
               Xiaoxue Ye},
  title     = {Dynamic Data Possession Checking for Secure Cloud Storage Service},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2713--2720},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2713-2720},
  doi       = {10.4304/jnw.8.12.2713-2720},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JiaoWZY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinL13,
  author    = {Hongying Jin and
               Linhao Li},
  title     = {Dynamic Network Traffic Flow Prediction Model based on Modified Quantum-Behaved
               Particle Swarm Optimization},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2332--2339},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2332-2339},
  doi       = {10.4304/jnw.8.10.2332-2339},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JinL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinQZW13,
  author    = {Hui{-}long Jin and
               Shu{-}li Qi and
               Miao Zhang and
               Zhiyuan Wang},
  title     = {Punctured Difference Set Pair and Perfect Punctured Binary Sequence
               Pair},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1982--1989},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1982-1989},
  doi       = {10.4304/jnw.8.9.1982-1989},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JinQZW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinSWF13,
  author    = {Zhaoyan Jin and
               Dianxi Shi and
               Quanyuan Wu and
               Hua Fan},
  title     = {{MCHITS:} Monte Carlo based Method for Hyperlink Induced Topic Search
               on Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2376--2382},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2376-2382},
  doi       = {10.4304/jnw.8.10.2376-2382},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JinSWF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinW13,
  author    = {Xin Jin and
               Yaohua Wang},
  title     = {Research on Social Network Structure and Public Opinions Dissemination
               of Micro-blog Based on Complex Network Analysis},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1543--1550},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1543-1550},
  doi       = {10.4304/jnw.8.7.1543-1550},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/JinW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KachrisT13,
  author    = {Christoforos Kachris and
               Ioannis Tomkos},
  title     = {Optical OFDM-based Data Center Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1488--1496},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1488-1496},
  doi       = {10.4304/jnw.8.7.1488-1496},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KachrisT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KangYX13,
  author    = {Zhiping Kang and
               Honglin Yu and
               Qingyu Xiong},
  title     = {Detection and Recovery of Coverage Holes in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {822--828},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.822-828},
  doi       = {10.4304/jnw.8.4.822-828},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KangYX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KhalifeHD13,
  author    = {Jawad Khalife and
               Amjad Hajjar and
               Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo},
  title     = {Performance of OpenDPI in Identifying Sampled Network Traffic},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {71--81},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.71-81},
  doi       = {10.4304/jnw.8.1.71-81},
  timestamp = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KhalifeHD13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KleunenMH13,
  author    = {Wouter van Kleunen and
               Nirvana Meratnia and
               Paul J. M. Havinga},
  title     = {Simplified Scheduling for Underwater Acoustic Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {4--14},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.4-14},
  doi       = {10.4304/jnw.8.1.4-14},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KleunenMH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KuangHZ13,
  author    = {Zhejun Kuang and
               Liang Hu and
               Chen Zhang},
  title     = {Research on Human Sensory Architecture for Cyber Physical Systems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1936--1942},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1936-1942},
  doi       = {10.4304/jnw.8.9.1936-1942},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KuangHZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KuangHZ13a,
  author    = {Zhejun Kuang and
               Liang Hu and
               Chen Zhang},
  title     = {Research on Human Sensory Architecture for Cyber Physical Systems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2692--2698},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2692-2698},
  doi       = {10.4304/jnw.8.11.2692-2698},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/KuangHZ13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LahbyCA13,
  author    = {Mohamed Lahby and
               Leghris Cherkaoui and
               Abdellah Adib},
  title     = {A Novel Ranking Algorithm Based Network Selection For Heterogeneous
               Wireless Access},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {263--272},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.263-272},
  doi       = {10.4304/jnw.8.2.263-272},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LahbyCA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LaiY13,
  author    = {Wei Kuang Lai and
               Kai{-}Ting Yang},
  title     = {Cross-Layer Dual Domain Scheduler for 3GPP-Long Term Evolution},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {189--196},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.189-196},
  doi       = {10.4304/jnw.8.1.189-196},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LaiY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LanTG13,
  author    = {Jianyu Lan and
               Houjun Tang and
               Xin Geng},
  title     = {Finite Element Analysis of a Contactless Transformer},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2302--2309},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2302-2309},
  doi       = {10.4304/jnw.8.10.2302-2309},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LanTG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LariosBML13,
  author    = {Diego Francisco Larios and
               Julio Barbancho and
               Francisco Javier Molina and
               Carlos Le{\'{o}}n},
  title     = {Localization method for low-power wireless sensor networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {45--58},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.45-58},
  doi       = {10.4304/jnw.8.1.45-58},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LariosBML13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LeeKXKH13,
  author    = {Kanghee Lee and
               Hyuck M. Kwon and
               Wenhao Xiong and
               Hyunggi Kim and
               Inha Hyun},
  title     = {Relay Selection Scheme for {AF} Relay Network based on Cost Function
               Criterion},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2187--2194},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2187-2194},
  doi       = {10.4304/jnw.8.10.2187-2194},
  timestamp = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/LeeKXKH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lei13,
  author    = {Jianyun Lei},
  title     = {Weighted Directed Graph-Based Authorization Delegation Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2812--2815},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2812-2815},
  doi       = {10.4304/jnw.8.12.2812-2815},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Lei13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13,
  author    = {Jin Li},
  title     = {Model and Simulation for Collaborative {VRPSPD}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {331--338},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.331-338},
  doi       = {10.4304/jnw.8.2.331-338},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13a,
  author    = {Jing Li},
  title     = {A Fast Semantic Web Services Matchmaker for {OWL-S} Services},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1104--1111},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1104-1111},
  doi       = {10.4304/jnw.8.5.1104-1111},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13b,
  author    = {Bowen Li},
  title     = {Research on Portable Fatigue Signal Detection System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1660--1666},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1660-1666},
  doi       = {10.4304/jnw.8.7.1660-1666},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li13b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13c,
  author    = {Linhao Li},
  title     = {An Improved Congestion Control Strategy Algorithm for Heterogeneous
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2107--2113},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2107-2113},
  doi       = {10.4304/jnw.8.9.2107-2113},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li13c.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13d,
  author    = {Liangming Li},
  title     = {An Integration Testing Approach Based on Composition of Unit Test
               Cases},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2769--2775},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2769-2775},
  doi       = {10.4304/jnw.8.12.2769-2775},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Li13d.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiBLK13,
  author    = {Yang Li and
               Zhisong Bie and
               Jiaru Lin and
               Hyok Hui Kim},
  title     = {Low-Density Lattice Codes for Inter-Symbol Interference Channels},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1899--1905},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1899-1905},
  doi       = {10.4304/jnw.8.8.1899-1905},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiBLK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiFLD13,
  author    = {Xu Li and
               Qijing Feng and
               Shijie Li and
               Haiyang Ding},
  title     = {{RE-AODV:} Improved {AODV} Routing Protocol for Repairing Efficiency},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2467--2472},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2467-2472},
  doi       = {10.4304/jnw.8.11.2467-2472},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiFLD13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiH13,
  author    = {Yuyu Li and
               Bo Huang},
  title     = {Multiple Principal-Agent Model of SMEs Pollution Regulation under
               Centralized Treatment},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2063--2070},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2063-2070},
  doi       = {10.4304/jnw.8.9.2063-2070},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLBH13,
  author    = {Yang Li and
               Xichuan Lin and
               Zhisong Bie and
               Hyok Hui Kim},
  title     = {Power- and Bandwidth-Efficient Euclidean Code with Sparse Generator
               Matrix},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1440--1447},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1440-1447},
  doi       = {10.4304/jnw.8.6.1440-1447},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiLBH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLQ13,
  author    = {Jianjun Li and
               Xibing Li and
               Xilong Qu},
  title     = {Signature Analysis Based on Improved {EMD} with High-order Spline
               Interpolation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {882--887},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.882-887},
  doi       = {10.4304/jnw.8.4.882-887},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiLQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLSSY13,
  author    = {Xuhui Li and
               Gangyan Li and
               Guowen Sun and
               Huiping Shi and
               Baoan Yang},
  title     = {Research on Layout Optimization of Urban Circle Solid Waste Transfer
               and Disposal Stations},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1803--1809},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1803-1809},
  doi       = {10.4304/jnw.8.8.1803-1809},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiLSSY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiM13,
  author    = {Jing Li and
               Dianfu Ma},
  title     = {Suffix Tree Based Incremental Web Services Clustering Method},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1566--1573},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1566-1573},
  doi       = {10.4304/jnw.8.7.1566-1573},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiTZ13,
  author    = {Fangwei Li and
               Yongchuan Tang and
               Jiang Zhu},
  title     = {Dynamic Resource Access Using Graphical Game in Asymmetric Wireless
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1845--1851},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1845-1851},
  doi       = {10.4304/jnw.8.8.1845-1851},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiTZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiW13,
  author    = {Hehua Li and
               Chunling Wu},
  title     = {Study on the Application of Digital Certificates in the Protection
               of Network Information Security and Data Integrity},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2592--2598},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2592-2598},
  doi       = {10.4304/jnw.8.11.2592-2598},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWLBLK13,
  author    = {Song Li and
               Yuhao Wang and
               Henry Leung and
               Dakun Bao and
               Boyuan Li and
               Bo Kong},
  title     = {The Inversion-based Coverage Prediction Tool for Cellular Networks
               - Real City Experiments},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1700--1707},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1700-1707},
  doi       = {10.4304/jnw.8.8.1700-1707},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWLBLK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWP13,
  author    = {Jiyun Li and
               Junping Wang and
               Hongxing Pei},
  title     = {Data Cleaning of Medical Data for Knowledge Mining},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2663--2670},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2663-2670},
  doi       = {10.4304/jnw.8.11.2663-2670},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWWK13,
  author    = {Hehua Li and
               Chunling Wu and
               Wei Wei and
               Buddha Khoukhi},
  title     = {Decentralized Distribution Update Algorithm Based on Compressibility-controlled
               Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2078--2084},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2078-2084},
  doi       = {10.4304/jnw.8.9.2078-2084},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWWK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWYRG13,
  author    = {Yuxiang Li and
               Haiming Wang and
               Hongkui Yu and
               Changquan Ren and
               Qingjia Geng},
  title     = {Network Intrusion Detection based on {GMKL} Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1322--1328},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1322-1328},
  doi       = {10.4304/jnw.8.6.1322-1328},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiWYRG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiZRS13,
  author    = {Hui Li and
               Jingxiao Zhang and
               Lieyan Ren and
               Zhen Shi},
  title     = {Scheduling Optimization of Construction Engineering based on Ant Colony
               Optimized Hybrid Genetic Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1411--1416},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1411-1416},
  doi       = {10.4304/jnw.8.6.1411-1416},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiZRS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiZY13,
  author    = {Haihong Li and
               Luo Zhong and
               Huaxiong Yao},
  title     = {Detecting Protein Complexes through Micro-Network Comparison in Protein-Protein
               Interaction Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {696--703},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.696-703},
  doi       = {10.4304/jnw.8.3.696-703},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiZY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liang13,
  author    = {Ping Liang},
  title     = {A Bisimulation-based Hierarchical Framework for Software Development
               Models},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1720--1725},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1720-1725},
  doi       = {10.4304/jnw.8.8.1720-1725},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Liang13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liang13a,
  author    = {Bao{-}juan Liang},
  title     = {Traffic Flow Detection Based on Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1859--1865},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1859-1865},
  doi       = {10.4304/jnw.8.8.1859-1865},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Liang13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiaoB13,
  author    = {Wenjing Liao and
               Z. Balzen},
  title     = {{LSSVM} Network Flow Prediction Based on the Self-adaptive Genetic
               Algorithm Optimization},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {507--512},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.507-512},
  doi       = {10.4304/jnw.8.2.507-512},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiaoB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiaoYZ13,
  author    = {Zhuhua Liao and
               Aiping Yi and
               Guoqing Zhang},
  title     = {Distributed Data Integration in Content-centric Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1950--1959},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1950-1959},
  doi       = {10.4304/jnw.8.9.1950-1959},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiaoYZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LinL13,
  author    = {Wenhui Lin and
               Jun Liu},
  title     = {Performance Analysis of MapReduce Program in Heterogeneous Cloud Computing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1734--1741},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1734-1741},
  doi       = {10.4304/jnw.8.8.1734-1741},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LinL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu13,
  author    = {Chun{-}Ying Liu},
  title     = {Adaptive Search Protocol Based on Optimized Ant Colony Algorithm in
               Peer-to-Peer Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {843--850},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.843-850},
  doi       = {10.4304/jnw.8.4.843-850},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Liu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu13a,
  author    = {Chun{-}Ying Liu},
  title     = {An Improved Adaptive Genetic Algorithm for the Multi-depot Vehicle
               Routing Problem with Time Window},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1035--1042},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1035-1042},
  doi       = {10.4304/jnw.8.5.1035-1042},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Liu13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuC13,
  author    = {Hao Liu and
               Zhigang Chen},
  title     = {Research on {P2P} Overlay Network Model with Small-world Features},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2043--2049},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2043-2049},
  doi       = {10.4304/jnw.8.9.2043-2049},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuCLH13,
  author    = {Xiyin Liu and
               Lijun Cao and
               Min Liu and
               Kun Han},
  title     = {Process-based Security Detection Approach for Virtual Machines on
               Private Cloud Platforms},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1380--1386},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1380-1386},
  doi       = {10.4304/jnw.8.6.1380-1386},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuCLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuCZS13,
  author    = {Qi Liu and
               Jun Cui and
               HongDong Zhao and
               Hong Shen},
  title     = {A Soft Fault-concept Diagnosis Method of Analog Circuits Based on
               Cloud Model Theory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1497--1503},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1497-1503},
  doi       = {10.4304/jnw.8.7.1497-1503},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuCZS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuGZHL13,
  author    = {Ying Liu and
               Wenxiang Gu and
               Tingting Zou and
               Qingtao Huang and
               Qiao Li},
  title     = {Incremental Knowledge Compilation Using the Extension Rule},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2241--2246},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2241-2246},
  doi       = {10.4304/jnw.8.10.2241-2246},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuGZHL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuH13,
  author    = {Daojian Liu and
               Tianmin Huang},
  title     = {A Reduced-Order Correction Algorithm for the Linear Programming Problem
               by Non-negative Constraints with the Most-Obtuse Angle},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2361--2367},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2361-2367},
  doi       = {10.4304/jnw.8.10.2361-2367},
  timestamp = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuKZY13,
  author    = {Hean Liu and
               Zhike Kuang and
               Cizhen Zhang and
               Goodson A. Yilly},
  title     = {Research on Spectrum Allocation Based on the Network Weights of Internet
               of Things},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2804--2811},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2804-2811},
  doi       = {10.4304/jnw.8.12.2804-2811},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuKZY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuLHRR13,
  author    = {Mingyang Liu and
               Shufen Liu and
               Changhong Hu and
               Y. V. Ramana Reddy and
               Sumitra Reddy},
  title     = {Personalized Search Based on Context-Centric Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1551--1557},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1551-1557},
  doi       = {10.4304/jnw.8.7.1551-1557},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuLHRR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuLQ13,
  author    = {Yao Liu and
               Qiao Liu and
               Zhiguang Qin},
  title     = {Community Detecting and Feature Analysis in Real Directed Weighted
               Social Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1432--1439},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1432-1439},
  doi       = {10.4304/jnw.8.6.1432-1439},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuLQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuPHT13,
  author    = {Xiaozhu Liu and
               Yuwei Peng and
               Yuanhua He and
               Zukai Tang},
  title     = {Uniform Storage Model-based Update Scheme of On-line Information Retrieval
               System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2179--2185},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2179-2185},
  doi       = {10.4304/jnw.8.9.2179-2185},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuPHT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuS13,
  author    = {Wenxue Liu and
               Guanying Sun},
  title     = {A Trust-based Information Propagation Model in Online Social Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1767--1773},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1767-1773},
  doi       = {10.4304/jnw.8.8.1767-1773},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuS13a,
  author    = {Wenxue Liu and
               Guanying Sun},
  title     = {An advanced Data Mining Strategy for Multi-Target Tracking in Adverse
               Environments},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1997--2004},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1997-2004},
  doi       = {10.4304/jnw.8.9.1997-2004},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuS13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuXY13,
  author    = {Kun Liu and
               Gaochao Xu and
               Jun'e Yuan},
  title     = {An Improved Hadoop Data Load Balancing Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2816--2822},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2816-2822},
  doi       = {10.4304/jnw.8.12.2816-2822},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuXY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuYXK13,
  author    = {Ting T. Liu and
               Wei Yang and
               Chang L. Xu and
               Young{-}Il Kim},
  title     = {A SNR-based Multi-channel Multicast Scheme for Popular Video in Wireless
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {628--635},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.628-635},
  doi       = {10.4304/jnw.8.3.628-635},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuYXK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZL13,
  author    = {Hongwei Liu and
               Peng Zhang and
               Jun Liu},
  title     = {Public Data Integrity Verification for Secure Cloud Storage},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {373--380},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.373-380},
  doi       = {10.4304/jnw.8.2.373-380},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZZ13,
  author    = {Qiuyan Liu and
               Peng Zhang and
               Yuping Zhao},
  title     = {Energy Efficient Deployment of Heterogeneous Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2422--2428},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2422-2428},
  doi       = {10.4304/jnw.8.10.2422-2428},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LiuZZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LongO13,
  author    = {Yanjun Long and
               Jianquan Ouyang},
  title     = {Research on Multicast Reliability in Distributed Virtual Environment},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1130--1137},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1130-1137},
  doi       = {10.4304/jnw.8.5.1130-1137},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LongO13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LongOS13,
  author    = {Yanjun Long and
               Jianquan Ouyang and
               Xinwen Sun},
  title     = {Network Intrusion Detection Model based on Fuzzy Support Vector Machine},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1387--1394},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1387-1394},
  doi       = {10.4304/jnw.8.6.1387-1394},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LongOS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LongX13,
  author    = {Yue Long and
               Qiang Xian},
  title     = {Logistics Optimization of Auto Parts Supplier Embedded by Service
               Alliance},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2444--2451},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2444-2451},
  doi       = {10.4304/jnw.8.10.2444-2451},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LongX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lu13,
  author    = {Biao Lu},
  title     = {Credibility Control Method Based on Error Transfer Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2029--2036},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2029-2036},
  doi       = {10.4304/jnw.8.9.2029-2036},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Lu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lu13a,
  author    = {Jiuyuan Lu},
  title     = {Bit Loading Algorithm Based on Channel Detection in {VSF-OFCDM} Wireless
               Communication System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2135--2142},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2135-2142},
  doi       = {10.4304/jnw.8.9.2135-2142},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Lu13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuJ13,
  author    = {Ying Lu and
               Peng Jing},
  title     = {The Combination of Postponement Operations in a Supply Chain Network
               with Multi-level Product Differentiations},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2900--2907},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2900-2907},
  doi       = {10.4304/jnw.8.12.2900-2907},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuP13,
  author    = {Jianchang Lu and
               Leping Pei},
  title     = {Security Evaluation of Power Network Information System Based on Analytic
               Network Process},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {866--873},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.866-873},
  doi       = {10.4304/jnw.8.4.866-873},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuY13,
  author    = {Kai{-}Sheng Lu and
               Xiao{-}Bing Yi},
  title     = {On Some Separability, Reducibility and Controllability Criteria of
               {RLCM} Networks over {F(Z)}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {903--909},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.903-909},
  doi       = {10.4304/jnw.8.4.903-909},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoCW13,
  author    = {Yan Luo and
               Xuzhou Chen and
               Jie Wang},
  title     = {A Virtual Network Embedding Algorithm for Providing Stronger Connectivity
               in the Residual Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {779--786},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.779-786},
  doi       = {10.4304/jnw.8.4.779-786},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LuoCW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LvZ13,
  author    = {Lei Lv and
               Zhongpei Zhang},
  title     = {A Selfish Linear Precoding Strategy for Downlink Two-User {MIMO} Systems
               Using Limited Rate Feedback},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1476--1479},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1476-1479},
  doi       = {10.4304/jnw.8.7.1476-1479},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/LvZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaSZ13,
  author    = {Yong Ma and
               Yanguang Sun and
               Yujiao Zeng},
  title     = {Parameter Identification for Iron and Steel Enterprise Steam Network
               Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {421--428},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.421-428},
  doi       = {10.4304/jnw.8.2.421-428},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaSZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaZM13,
  author    = {Wenming Ma and
               Yujie Zhang and
               Xiangwu Meng},
  title     = {Distribution Aware Collaborative Spread Replication for Rare Objects
               in Unstructured Peer-to-Peer Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {991--998},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.991-998},
  doi       = {10.4304/jnw.8.5.991-998},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaZM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MakkiB13,
  author    = {S. Kami Makki and
               Keenan B. Bonds},
  title     = {Enhancing Node Cooperation in Mobile Ad Hoc Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {645--649},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.645-649},
  doi       = {10.4304/jnw.8.3.645-649},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MakkiB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaoX13,
  author    = {Tengyue Mao and
               Zhengquan Xu},
  title     = {An Effective QoS Integrated Weighted Cost Model for {LEO/MEO} Satellite
               {IP} Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2706--2711},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2706-2711},
  doi       = {10.4304/jnw.8.11.2706-2711},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaoX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaoX13a,
  author    = {Tengyue Mao and
               Zhengquan Xu},
  title     = {An Effective Mechanism for Improving Performance of {TCP} over {LEO/MEO}
               Satellite {IP} Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2942--2947},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2942-2947},
  doi       = {10.4304/jnw.8.12.2942-2947},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MaoX13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MartinRZRG13,
  author    = {Jos{\'{e}} Antonio G{\'{o}}mez Martin and
               Ana Ver{\'{o}}nica Medina Rodr{\'{\i}}guez and
               Enrique Dorronzoro Zubiete and
               Octavio Rivera Romero and
               Sergio Mart{\'{\i}}n Guill{\'{e}}n},
  title     = {Fingerprint Indoor Position System Based},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {37--44},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.37-44},
  doi       = {10.4304/jnw.8.1.37-44},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MartinRZRG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MasihpourFA13,
  author    = {Mehrnoush Masihpour and
               Daniel Robert Franklin and
               Mehran Abolhasan},
  title     = {Multihop Relay Techniques for Communication Range Extension in Near-Field
               Magnetic Induction Communication Systems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {999--1011},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.999-1011},
  doi       = {10.4304/jnw.8.5.999-1011},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MasihpourFA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MassnerRH13,
  author    = {Stephan Massner and
               Chris Richter and
               Uwe Hautzendorfer},
  title     = {{SIP} Trunking - General Requirements for Interconnecting Enterprise
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2195--2212},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2195-2212},
  doi       = {10.4304/jnw.8.10.2195-2212},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MassnerRH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MendezL13,
  author    = {Diego Mendez and
               Miguel A. Labrador},
  title     = {On Sensor Data Verification for Participatory Sensing Systems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {576--587},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.576-587},
  doi       = {10.4304/jnw.8.3.576-587},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MendezL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MiaoLW13,
  author    = {Xuna Miao and
               Ran Liu and
               Yingfeng Wang},
  title     = {A Network Evaluation Algorithm in Heterogeneous Wireless Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2473--2477},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2473-2477},
  doi       = {10.4304/jnw.8.11.2473-2477},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MiaoLW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MingZLM13,
  author    = {Dexiang Ming and
               Xiaopeng Zhong and
               Lili Liu and
               Xiandong Ma},
  title     = {Design of a Reconfigurable Platform for Navigation Signal Simulation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1019--1026},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1019-1026},
  doi       = {10.4304/jnw.8.5.1019-1026},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MingZLM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MirchandaniB13,
  author    = {Vinod Mirchandani and
               Peter Bert{\'{o}}k},
  title     = {Optimized Energy Management for Mixed Uplink Traffic in {LTE} {UE}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {537--551},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.537-551},
  doi       = {10.4304/jnw.8.3.537-551},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MirchandaniB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MokhtarSAA13,
  author    = {Rania A. Mokhtar and
               Rashid A. Saeed and
               Raed A. Alsaqour and
               Yahia Abdallah},
  title     = {Study on Energy Detection-based Cooperative Sensing in Cognitive Radio
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1255--1261},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1255-1261},
  doi       = {10.4304/jnw.8.6.1255-1261},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MokhtarSAA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MoudiO13,
  author    = {Mehrnaz Moudi and
               Mohamed Othman},
  title     = {A Cost-Effective Architecture For Optical Multistage Interconnection
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {345--350},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.345-350},
  doi       = {10.4304/jnw.8.2.345-350},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MoudiO13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MovassaghiAL13,
  author    = {Samaneh Movassaghi and
               Mehran Abolhasan and
               Justin Lipman},
  title     = {A Review of Routing Protocols in Wireless Body Area Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {559--575},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.559-575},
  doi       = {10.4304/jnw.8.3.559-575},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MovassaghiAL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MuZ13,
  author    = {Ruihui Mu and
               Wuqiang Zhang},
  title     = {{QAODV:} Improved Security Routing Protocol of {AODV}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2400--2405},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2400-2405},
  doi       = {10.4304/jnw.8.10.2400-2405},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/MuZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiC13,
  author    = {Yunlu Ni and
               Hang Chen},
  title     = {Detection of Underwater Carrier-Free Pulse based on Time-Frequency
               Analysis},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {205--212},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.205-212},
  doi       = {10.4304/jnw.8.1.205-212},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NiC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiZWSZZ13,
  author    = {Qiufen Ni and
               Rongbo Zhu and
               Zhenguo Wu and
               Yongli Sun and
               Lingyun Zhou and
               Bin Zhou},
  title     = {Spectrum Allocation Based on Game Theory in Cognitive Radio Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {712--722},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.712-722},
  doi       = {10.4304/jnw.8.3.712-722},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NiZWSZZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NieQ13,
  author    = {Gang Nie and
               Xiuhua Qing},
  title     = {Comparison and Handover Performance Evaluation of the Macro-mobility
               Protocol},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {100--107},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.100-107},
  doi       = {10.4304/jnw.8.1.100-107},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NieQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Ning13,
  author    = {Zhang Ji Bo Ning},
  title     = {Research on Web Information Retrieval based on Vector Space Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {688--695},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.688-695},
  doi       = {10.4304/jnw.8.3.688-695},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Ning13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NingFS13,
  author    = {Lianju Ning and
               Xin Feng and
               Lichi Sun},
  title     = {A Secure Protocol for Efficient {SMS} Transmission and Management},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2171--2178},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2171-2178},
  doi       = {10.4304/jnw.8.9.2171-2178},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NingFS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiuC13,
  author    = {Huiqing Niu and
               Hong Chen},
  title     = {An Improved Recommendation Algorithm in Knowledge Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1336--1342},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1336-1342},
  doi       = {10.4304/jnw.8.6.1336-1342},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NiuC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiuWZGZ13,
  author    = {Xiaoxia Niu and
               Yanxia Wu and
               Bowei Zhang and
               Guochang Gu and
               Guoyin Zhang},
  title     = {Rapid FPGA-based Delay Estimation for the Hardware/Software Partitioning},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1183--1190},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1183-1190},
  doi       = {10.4304/jnw.8.5.1183-1190},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/NiuWZGZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatASOO13,
  author    = {Muath A. Obaidat and
               Mohamed A. Ali and
               Ihsan Shahwan and
               Mohammad S. Obaidat and
               Suhaib Obeidat},
  title     = {QoS-Aware Multipath Communications over MANETs},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {26--36},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.26-36},
  doi       = {10.4304/jnw.8.1.26-36},
  timestamp = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/ObaidatASOO13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatCSF13,
  author    = {Mohammad S. Obaidat and
               Daniel Cascado Caballero and
               Jos{\'{e}} Luis Sevillano and
               Joaquim Filipe},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {1--3},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.1-3},
  doi       = {10.4304/jnw.8.1.1-3},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ObaidatCSF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OuW13,
  author    = {Yang Ou and
               Yi{-}Ming Wang},
  title     = {Multiple Antennas Spectrum Sensing for Cognitive Radio Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {665--671},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.665-671},
  doi       = {10.4304/jnw.8.3.665-671},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/OuW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Ouyang13,
  author    = {Jiankun Ouyang},
  title     = {Energy-Efficient Data Processing Scheme in Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1667--1672},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1667-1672},
  doi       = {10.4304/jnw.8.7.1667-1672},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Ouyang13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OuyangC13,
  author    = {Guang Ouyang and
               Xiang Chen},
  title     = {Trust Model Based on {P2P} Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2013--2020},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2013-2020},
  doi       = {10.4304/jnw.8.9.2013-2020},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/OuyangC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PaceA13,
  author    = {Pasquale Pace and
               Gianluca Aloi},
  title     = {Managing and Deploying Pervasive Wireless Internet Access through
               Attractive Connection Sharing and Reselling Mechanisms},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {351--364},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.351-364},
  doi       = {10.4304/jnw.8.2.351-364},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PaceA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Peng13,
  author    = {Hui Peng},
  title     = {Research of Collaborative Filtering Recommendation Algorithm based
               on Network Structure},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2383--2391},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2383-2391},
  doi       = {10.4304/jnw.8.10.2383-2391},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Peng13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PengLHZY13,
  author    = {Kai Peng and
               Rongheng Lin and
               Binbin Huang and
               Hua Zou and
               Fangchun Yang},
  title     = {Node Importance of Data Center Network Based on Contribution Matrix
               of Information Entropy},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1248--1254},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1248-1254},
  doi       = {10.4304/jnw.8.6.1248-1254},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PengLHZY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PirmoradianAP13,
  author    = {Mahdi Pirmoradian and
               Olayinka Adigun and
               Christos Politis},
  title     = {Adaptive Spectrum Opportunity Access in Cognitive Radio Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {747--754},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.747-754},
  doi       = {10.4304/jnw.8.4.747-754},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/PirmoradianAP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Pu13,
  author    = {Fei Pu},
  title     = {Modular Reversibility Analysis in Self-loops Connections of Petri
               Net Systems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {493--500},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.493-500},
  doi       = {10.4304/jnw.8.2.493-500},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Pu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QiLCH13,
  author    = {Yanbo Qi and
               Zhong Liu and
               Huadong Chen and
               Jieying Han},
  title     = {Distributed Combat System of Systems Network Modeling},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1906--1912},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1906-1912},
  doi       = {10.4304/jnw.8.8.1906-1912},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QiLCH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QiuL13,
  author    = {Yinghui Qiu and
               Chao Liu},
  title     = {Security and Stability Analysis for Yunnan Power Grid with Wind Power
               Integration},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2893--2899},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2893-2899},
  doi       = {10.4304/jnw.8.12.2893-2899},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QiuL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QuWXW13,
  author    = {Haipeng Qu and
               Lili Wen and
               Yanfei Xu and
               Ning Wang},
  title     = {{LCCWS:} Lightweight Copyfree Cross-layer Web Server},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {165--173},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.165-173},
  doi       = {10.4304/jnw.8.1.165-173},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/QuWXW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RahmanBJF13,
  author    = {Rony Hasinur Rahman and
               Craig R. Benson and
               Frank Jiang and
               Michael R. Frater},
  title     = {{LOARP:} {A} Low Overhead Routing Protocol for Underwater Acoustic
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {317--330},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.317-330},
  doi       = {10.4304/jnw.8.2.317-330},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RahmanBJF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RajuK13,
  author    = {K. V. Krishnam Raju and
               V. Valli Kumari},
  title     = {Formal Verification of {IEEE} 802.11 Authentication Protocols},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {769--778},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.769-778},
  doi       = {10.4304/jnw.8.4.769-778},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RajuK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RanSL13,
  author    = {Wenxue Ran and
               Xinling Shi and
               Li Liu},
  title     = {Combination of the Sorting Line Priority Polling Control Mechanism},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2234--2240},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2234-2240},
  doi       = {10.4304/jnw.8.10.2234-2240},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/RanSL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RongCL13,
  author    = {Haina Rong and
               Jixiang Cheng and
               Yuquan Li},
  title     = {Radar Emitter Signal Analysis with Estimation of Distribution Algorithms},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {108--115},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.108-115},
  doi       = {10.4304/jnw.8.1.108-115},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RongCL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RuanZL13,
  author    = {Dian{-}xu Ruan and
               Xiaoguang Zhang and
               Li{-}Jun Li},
  title     = {Safety Data Fusion Algorithm in Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1121--1129},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1121-1129},
  doi       = {10.4304/jnw.8.5.1121-1129},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/RuanZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SalamL13,
  author    = {Md. Iftekhar Salam and
               Hoon{-}Jae Lee},
  title     = {Algebraic Countermeasure to Enhance the Improved Summation Generator
               with 2-Bit Memory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {977--984},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.977-984},
  doi       = {10.4304/jnw.8.5.977-984},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/SalamL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenSX13,
  author    = {Shaowei Shen and
               Zuiyi Shen and
               Bing Xu},
  title     = {Analysis of Fishery Production Efficiency based on the Three-Stage
               {DEA}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {461--468},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.461-468},
  doi       = {10.4304/jnw.8.2.461-468},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShenSX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenXLQ13,
  author    = {Xiaoyan Shen and
               Chenjiang Xie and
               Haoxue Liu and
               Zhaowen Qiu},
  title     = {Model and Algorithm for Routing and Scheduling Problem in Hazardous
               Materials Transportation Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1027--1034},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1027-1034},
  doi       = {10.4304/jnw.8.5.1027-1034},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShenXLQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuaiH13,
  author    = {Jun Shuai and
               Xuli Han},
  title     = {Constructing Low-Dimensional Dynamical Systems of Nonlinear Partial
               Differential Equations Using Optimization},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2520--2526},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2520-2526},
  doi       = {10.4304/jnw.8.11.2520-2526},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ShuaiH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuaibKA13,
  author    = {Khaled Shuaib and
               Issa Khalil and
               Mohammed Abdel{-}Hafez},
  title     = {Communications in Smart Grid: {A} Review with Performance, Reliability
               and Security Consideration},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1229--1240},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1229-1240},
  doi       = {10.4304/jnw.8.6.1229-1240},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/ShuaibKA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Song13,
  author    = {Di Song},
  title     = {Research on Information Propagation Model for Microblogging},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1647--1653},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1647-1653},
  doi       = {10.4304/jnw.8.7.1647-1653},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Song13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SongZ13,
  author    = {Limin Song and
               Junli Zhang},
  title     = {Load Balancing Method Based on Servers and Reverse Proxy},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1609--1616},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1609-1616},
  doi       = {10.4304/jnw.8.7.1609-1616},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SongZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Su13,
  author    = {Rui Su},
  title     = {Identification Method of Sports Throwing Force Based on Fuzzy Neural
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1574--1581},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1574-1581},
  doi       = {10.4304/jnw.8.7.1574-1581},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Su13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SuZ13,
  author    = {Baishun Su and
               Baoding Zhang},
  title     = {Wireless Position Scheme based on ZigBee Network in the Freeway {ETC}
               System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {658--664},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.658-664},
  doi       = {10.4304/jnw.8.3.658-664},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SuZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SuhairiG13,
  author    = {Kasman Suhairi and
               Ford Lumban Gaol},
  title     = {The Measurement of Optimization Performance of Managed Service Division
               with {ITIL} Framework using Statistical Process Control},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {518--529},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.518-529},
  doi       = {10.4304/jnw.8.3.518-529},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SuhairiG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunHS13,
  author    = {Zheng Sun and
               Xuezheng Han and
               Zhufeng Shao},
  title     = {A Hierarchical Routing Protocol Based on Energy Efficiency and Chain
               Structure for One-Way Aerial Ropeways for Underground Mine},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2491--2497},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2491-2497},
  doi       = {10.4304/jnw.8.11.2491-2497},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunHS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunJJ13,
  author    = {Chengshuang Sun and
               Fan Jiang and
               Shaohua Jiang},
  title     = {Research on {RFID} Applications in Construction Industry},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1221--1228},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1221-1228},
  doi       = {10.4304/jnw.8.5.1221-1228},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunJJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunS13,
  author    = {Hailing Sun and
               Tianbao Su},
  title     = {Project Cost Prediction Model Based on Fuzzy Theory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1595--1600},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1595-1600},
  doi       = {10.4304/jnw.8.7.1595-1600},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunS13a,
  author    = {Zheng Sun and
               Zhufeng Shao},
  title     = {Greedy Forwarding Routing Strategy Based on Energy Efficiency in Wireless
               Sensor Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2317--2323},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2317-2323},
  doi       = {10.4304/jnw.8.10.2317-2323},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunS13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunW13,
  author    = {Yuan Sun and
               Qian Wang},
  title     = {Demand Analysis of Water Resources Based on Pulse Process of Complex
               System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {910--916},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.910-916},
  doi       = {10.4304/jnw.8.4.910-916},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunWSW13,
  author    = {Jian Sun and
               Chenghua Wang and
               Jing Sun and
               Lei Wang},
  title     = {Analog Circuit Soft Fault Diagnosis based on {PCA} and {PSO-SVM}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2791--2796},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2791-2796},
  doi       = {10.4304/jnw.8.12.2791-2796},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunWSW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunZWNZ13,
  author    = {Yongli Sun and
               Bin Zhou and
               Zhenguo Wu and
               Qiufen Ni and
               Rongbo Zhu},
  title     = {Multi-channel {MAC} Protocol in Cognitive Radio Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2478--2490},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2478-2490},
  doi       = {10.4304/jnw.8.11.2478-2490},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/SunZWNZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanL13,
  author    = {Jinsheng Tan and
               Peng Liu},
  title     = {Efficient Flow Control Scheme in Multimedia Cloud Computing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2285--2292},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2285-2292},
  doi       = {10.4304/jnw.8.10.2285-2292},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TanL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanPNLL13,
  author    = {Guoping Tan and
               Xinhua Peng and
               Xinyang Ni and
               Betene A. Francis Lin and
               Xiuquan Liu},
  title     = {{PNCRM:} {A} Novel Real-time Multicast Scheme in MANETs Based on Partial
               Network Coding},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2414--2421},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2414-2421},
  doi       = {10.4304/jnw.8.10.2414-2421},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TanPNLL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanXH13,
  author    = {Xiaolin Tan and
               Zhongyang Xiong and
               Yun He},
  title     = {Signal Attenuation-aware Clustering in Wireless Mobile Ad Hoc Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {796--803},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.796-803},
  doi       = {10.4304/jnw.8.4.796-803},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TanXH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanZ13,
  author    = {Jianwei Tan and
               Yiqing Zhang},
  title     = {Research on Multi-Sensor Multi-Target Tracking Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2527--2533},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2527-2533},
  doi       = {10.4304/jnw.8.11.2527-2533},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TanZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TangLWZ13,
  author    = {Jianqiang Tang and
               Ying Liu and
               Ming Wan and
               Hongke Zhang},
  title     = {Blocking DoS Attack Traffic in Network with Locator/Identifier Separation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {731--738},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.731-738},
  doi       = {10.4304/jnw.8.3.731-738},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TangLWZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TaoC13,
  author    = {Jinlong Tao and
               Lirong Chen},
  title     = {Software Test Case Automated Generation Algorithm with Extended {EDPN}
               Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1825--1830},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1825-1830},
  doi       = {10.4304/jnw.8.8.1825-1830},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TaoC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TaoX13,
  author    = {Tao Tao and
               Hongze Xu},
  title     = {Adaptive Fault-Tolerant Control for Time-Varying Failure in High-Speed
               Train Computer Systems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2823--2828},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2823-2828},
  doi       = {10.4304/jnw.8.12.2823-2828},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TaoX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Tian13,
  author    = {Xiaoyong Tian},
  title     = {Chaos Encryption Algorithm to Deal with Security Threat to Internet
               of Things {RFID}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1168--1174},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1168-1174},
  doi       = {10.4304/jnw.8.5.1168-1174},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Tian13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TongJL13,
  author    = {Weiming Tong and
               Xianji Jin and
               Lei Lu},
  title     = {Optimized Information Transmission Scheduling Strategy Oriented to
               Advanced Metering Infrastructure},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {245--252},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.245-252},
  doi       = {10.4304/jnw.8.1.245-252},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TongJL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TsaiZJ13,
  author    = {Chung{-}Hung Tsai and
               Dauw{-}Song Zhu and
               Yueh{-}Meei Jang},
  title     = {A Study on the Consumer Adoption Behaviors of Internet Bank},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2956--2963},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2956-2963},
  doi       = {10.4304/jnw.8.12.2956-2963},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TsaiZJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TuGHY13,
  author    = {Guangyou Tu and
               Songtao Guo and
               Hongyu Huang and
               Yuanyuan Yang},
  title     = {Optimal Resource Allocation for Cross-layer Utility Maximization in
               Ad Hoc Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1757--1766},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1757-1766},
  doi       = {10.4304/jnw.8.8.1757-1766},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/TuGHY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanHSFL13,
  author    = {Qingsheng Wan and
               Shaobin Huang and
               Kai Sun and
               Lifu Feng and
               Ya Li},
  title     = {A Domain Information Retrieval Method based on Pension Insurance Ontology
               Concept Similarity},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2908--2914},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2908-2914},
  doi       = {10.4304/jnw.8.12.2908-2914},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WanHSFL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanHW13,
  author    = {Qingsheng Wan and
               Shaobin Huang and
               Mengxi Wei},
  title     = {Research on Pretreatment of Questions Based on Large-scale Real Questions
               Set},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1810--1816},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1810-1816},
  doi       = {10.4304/jnw.8.8.1810-1816},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WanHW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanJ13,
  author    = {Li Wan and
               Yang Jie},
  title     = {Context-aware Greedy Scheduling Algorithm in Wireless Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1788--1795},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1788-1795},
  doi       = {10.4304/jnw.8.8.1788-1795},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WanJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanY13,
  author    = {Li Wan and
               Jie Yang},
  title     = {Advanced Split {BIRCH} Algorithm in Reconfigurable Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2050--2056},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2050-2056},
  doi       = {10.4304/jnw.8.9.2050-2056},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WanY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang13,
  author    = {Shaolin Wang},
  title     = {Cascading Model of Infrastructure Networks based on Complex Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1448--1454},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1448-1454},
  doi       = {10.4304/jnw.8.6.1448-1454},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wang13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang13a,
  author    = {Yanjun Wang},
  title     = {Network Intrusion Detection Technology based on Improved C-means Clustering
               Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2541--2547},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2541-2547},
  doi       = {10.4304/jnw.8.11.2541-2547},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wang13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang13b,
  author    = {Feichao Wang},
  title     = {Energy Consumption Oriented Network-on-Chip Mapping Method},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2857--2863},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2857-2863},
  doi       = {10.4304/jnw.8.12.2857-2863},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wang13b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangC13,
  author    = {Yan Wang and
               Xiufeng Cao},
  title     = {Process of Assembling Component Based on Domain Ontology},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2347--2352},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2347-2352},
  doi       = {10.4304/jnw.8.10.2347-2352},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangCNZ13,
  author    = {Keqing Wang and
               Jianzhong Chen and
               Yingtao Niu and
               Yonggang Zhu},
  title     = {A novel Spectrum Estimation Algorithm Based on Compressed Sensing
               and Multi-taper Method},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {971--976},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.971-976},
  doi       = {10.4304/jnw.8.4.971-976},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangCNZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangDX13,
  author    = {Zhongwen Wang and
               Ruizhen Duan and
               Xiaoqiu Xu},
  title     = {Model Identification of Hydrostatic Center Frame Control System based
               on {MATLAB}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1315--1321},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1315-1321},
  doi       = {10.4304/jnw.8.6.1315-1321},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangDX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangH13,
  author    = {Jing Wang and
               Yourui Huang},
  title     = {Improved Artificial Fish Algorithm for Parameters Optimization of
               {PID} Neural Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1726--1733},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1726-1733},
  doi       = {10.4304/jnw.8.8.1726-1733},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangH13a,
  author    = {Jing Wang and
               Yourui Huang},
  title     = {Decimal Integer Multiplication based on Molecular Beacons},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2762--2768},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2762-2768},
  doi       = {10.4304/jnw.8.12.2762-2768},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangH13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangHCX13,
  author    = {Yuan Wang and
               Liang Hu and
               Jian Feng Chu and
               Xiao Bo Xu},
  title     = {Analysis and Improvement for {SPINS}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {229--236},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.229-236},
  doi       = {10.4304/jnw.8.1.229-236},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangHCX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangJ13,
  author    = {Bin Wang and
               Zhigang Jin},
  title     = {Distributed Randomized Algorithm based on Buffer Utility for Control
               Channel Scheduling in {IEEE} 802.16 Mesh Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1270--1277},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1270-1277},
  doi       = {10.4304/jnw.8.6.1270-1277},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangL13,
  author    = {Xiaomin Wang and
               Yangyang Lu},
  title     = {Algorithm of Solutions for Solving Generalized Mixed Implicit Equilibrium
               Problems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {381--388},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.381-388},
  doi       = {10.4304/jnw.8.2.381-388},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangL13a,
  author    = {Jingmin Wang and
               Yanmei Li},
  title     = {Research on {EPC} Project Risk Evaluation based on {FAHP} and {TOPSIS}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {445--452},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.445-452},
  doi       = {10.4304/jnw.8.2.445-452},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangL13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangLTM13,
  author    = {Wei Wang and
               Ying Li and
               Hui Tao and
               Xiao{-}Ping Ma},
  title     = {Determining Reconstruction Variables and Parameters on Improved Multi-Objective
               Immune Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2829--2838},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2829-2838},
  doi       = {10.4304/jnw.8.12.2829-2838},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangLTM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangM13,
  author    = {Ying Wang and
               Dianfu Ma},
  title     = {An Automatic Development Process for Integrated Modular Avionics Software},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1088--1095},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1088-1095},
  doi       = {10.4304/jnw.8.5.1088-1095},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMJ13,
  author    = {Dejun Wang and
               Bo Meng and
               Shaomin Jin},
  title     = {Improved Clustered Routing Algorithm Based on Distance and Energy
               in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2922--2926},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2922-2926},
  doi       = {10.4304/jnw.8.12.2922-2926},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangMJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMZZ13,
  author    = {Ding Wang and
               Chunguang Ma and
               Qi{-}Ming Zhang and
               Sendong Zhao},
  title     = {Secure Password-based Remote User Authentication Scheme Against Smart
               Card Security Breach},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {148--155},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.148-155},
  doi       = {10.4304/jnw.8.1.148-155},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangMZZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangPLWC13,
  author    = {Li Wang and
               Yanyan Pei and
               Biao Lian and
               Weili Wu and
               Xueqi Cheng},
  title     = {A Routing Protocol based on Temporal-awareness Ordered-MPR for Dynamic
               Wireless Multi-hop Mobile Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {985--990},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.985-990},
  doi       = {10.4304/jnw.8.5.985-990},
  timestamp = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/WangPLWC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangS13,
  author    = {Yulong Wang and
               Jiakun Shen},
  title     = {CloudProxy: {A} {NAPT} Proxy for Vulnerability Scanners based on Cloud
               Computing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {607--615},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.607-615},
  doi       = {10.4304/jnw.8.3.607-615},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangSL13,
  author    = {Dan Wang and
               Weiping Shi and
               Xiaowen Li},
  title     = {Low-Complexity Carrier Frequency Offset Estimation Algorithm in {TD-LTE}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2220--2226},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2220-2226},
  doi       = {10.4304/jnw.8.10.2220-2226},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangSL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWT13,
  author    = {Zhengcai Wang and
               Xiaofeng Wang and
               Zhengyi Tang},
  title     = {Analysis and Improvement of {AC-BM} Algorithm in Intrusion Detection
               System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1191--1196},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1191-1196},
  doi       = {10.4304/jnw.8.5.1191-1196},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWW13,
  author    = {Yulong Wang and
               Dong Wang and
               Lei Wang},
  title     = {A Parsing Mode based Method for Malformed {SIP} Messages Testing for
               {IMS} Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {812--821},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.812-821},
  doi       = {10.4304/jnw.8.4.812-821},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWW13a,
  author    = {Lixin Wang and
               Lianggang Wu and
               Kelly Wang},
  title     = {Customer Recognition of Network Finance Based on {MKL} Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2452--2458},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2452-2458},
  doi       = {10.4304/jnw.8.10.2452-2458},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangWW13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYN13,
  author    = {Jian{-}Hua Wang and
               Yan Yu and
               Madukasi Charles Nnaemeka},
  title     = {Data Storage Algorithms Based on Clustering in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1796--1802},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1796-1802},
  doi       = {10.4304/jnw.8.8.1796-1802},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangYN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYN13a,
  author    = {Jian{-}Hua Wang and
               Yan Yu and
               Madukasi Charles Nnaemeka},
  title     = {A High Throughput {MAC} Protocol for Wireless Sensor Networks in Surveillance
               Applications},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2005--2012},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2005-2012},
  doi       = {10.4304/jnw.8.9.2005-2012},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangYN13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ13,
  author    = {Xinyan Wang and
               Ruixin Zhang},
  title     = {Parallel Processing for Large-scale Fault Tree in Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1160--1167},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1160-1167},
  doi       = {10.4304/jnw.8.5.1160-1167},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZJ13,
  author    = {Qiu{-}Yan Wang and
               Bin Zhang and
               Chen{-}Hui Jin},
  title     = {Practical Security against Differential and Linear Cryptanalysis for
               SMS4-like Cipher},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1689--1693},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1689-1693},
  doi       = {10.4304/jnw.8.8.1689-1693},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZLWY13,
  author    = {Lifang Wang and
               Shuhai Zhang and
               Yurong Li and
               Ruijuan Wu and
               Yi Yu},
  title     = {An Attribute-weighted Clustering Intrusion Detection Method},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1278--1284},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1278-1284},
  doi       = {10.4304/jnw.8.6.1278-1284},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZLWY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZQ13,
  author    = {Jianjian Wang and
               Rongbo Zhu and
               Chenliang Qian},
  title     = {Efficient Disengaging Hooks System Based on Constant-Power Speed Regulation
               of Frequency Converter},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {755--760},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.755-760},
  doi       = {10.4304/jnw.8.4.755-760},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZWX13,
  author    = {Zhenwu Wang and
               Xuejun Zhao and
               Benting Wan and
               Jun Xie},
  title     = {Research of {BP} Neural Network based on Improved Particle Swarm Optimization
               Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {947--954},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.947-954},
  doi       = {10.4304/jnw.8.4.947-954},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZWX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZWXB13,
  author    = {Zhenwu Wang and
               Xuejun Zhao and
               Benting Wan and
               Jun Xie and
               Pengfei Bai},
  title     = {A Workflow-based {RBAC} Model for Web Services in Multiple Autonomous
               Domains},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {723--730},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.723-730},
  doi       = {10.4304/jnw.8.3.723-730},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WangZWXB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wei-wuLKJ13,
  author    = {Ren Wei{-}wu and
               Hu Liang and
               Zhao Kuo and
               Chu Jianfeng},
  title     = {An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical
               Clustering},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {672--679},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.672-679},
  doi       = {10.4304/jnw.8.3.672-679},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wei-wuLKJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WeiF13,
  author    = {Jia Wei and
               Huajing Fang},
  title     = {State Feedback Consensus for Multi-Agent System with Multiple Time-Delays},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1960--1966},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1960-1966},
  doi       = {10.4304/jnw.8.9.1960-1966},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WeiF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WeiZ13,
  author    = {Li Wei and
               Chunjian Zhao},
  title     = {An Optimized and Improved Network Trust Model Based on {P2P}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2293--2301},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2293-2301},
  doi       = {10.4304/jnw.8.10.2293-2301},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WeiZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wu13,
  author    = {Dafei Wu},
  title     = {Research on Patient Privacy Protection for Medical Data in Cloud Computing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2678--2684},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2678-2684},
  doi       = {10.4304/jnw.8.11.2678-2684},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Wu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuL13,
  author    = {Shuyan Wu and
               Kelin Lv},
  title     = {Research on the Content Networking Sensor},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1589--1594},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1589-1594},
  doi       = {10.4304/jnw.8.7.1589-1594},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuLL13,
  author    = {Wen{-}Tie Wu and
               Min Li and
               Bo Liu},
  title     = {Intrusion Detection Scheme based on {IPSO-RBF}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2269--2276},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2269-2276},
  doi       = {10.4304/jnw.8.10.2269-2276},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuLL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuTWC13,
  author    = {Qingshuang Wu and
               Chunya Tong and
               Qiang Wang and
               Xiangfu Cheng},
  title     = {All-pairs Shortest Path Algorithm based on {MPI+CUDA} Distributed
               Parallel Programming Model},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2797--2803},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2797-2803},
  doi       = {10.4304/jnw.8.12.2797-2803},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuTWC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuWC13,
  author    = {Guifeng Wu and
               Xuan Wang and
               Donglei Chen},
  title     = {Based on Low-power Wireless Sensor Network Node Data Storage Method},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2736--2742},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2736-2742},
  doi       = {10.4304/jnw.8.12.2736-2742},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuWC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuZSN13,
  author    = {Zhenguo Wu and
               Rongbo Zhu and
               Yongli Sun and
               Qiufen Ni},
  title     = {Routing Protocol Design and Performance Optimization in Cognitive
               Radio Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2406--2413},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2406-2413},
  doi       = {10.4304/jnw.8.10.2406-2413},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuZSN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuZX13,
  author    = {Zhizhong Wu and
               Xuehai Zhou and
               Jun Xu},
  title     = {A Result Fusion based Distributed Anomaly Detection System for Android
               Smartphones},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {273--282},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.273-282},
  doi       = {10.4304/jnw.8.2.273-282},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/WuZX13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaWRJ13,
  author    = {Kaijian Xia and
               Yue Wu and
               Xiaogang Ren and
               Yong Jin},
  title     = {Research in Clustering Algorithm for Diseases Analysis},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1632--1639},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1632-1639},
  doi       = {10.4304/jnw.8.7.1632-1639},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiaWRJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoZZW13,
  author    = {Chunjing Xiao and
               Yuhong Zhang and
               Xue Zeng and
               Yue Wu},
  title     = {Predicting User Influence in Social Media},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2649--2655},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2649-2655},
  doi       = {10.4304/jnw.8.11.2649-2655},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiaoZZW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xiaolan13,
  author    = {He Xiaolan},
  title     = {Prediction Model of Network Information Dissemination},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1112--1120},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1112-1120},
  doi       = {10.4304/jnw.8.5.1112-1120},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xiaolan13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XieL13,
  author    = {Jianli Xie and
               Cuiran Li},
  title     = {Hybrid Weighted-based Clustering Routing Protocol for Railway Communications},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2849--2856},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2849-2856},
  doi       = {10.4304/jnw.8.12.2849-2856},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XieL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XingXL13,
  author    = {Kexin Xing and
               Qi Xu and
               Yegui Lin},
  title     = {Identification Scheme of Surface Electromyography of Upper Limb Movement},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {895--902},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.895-902},
  doi       = {10.4304/jnw.8.4.895-902},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XingXL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongG13,
  author    = {Lu Xiong and
               Shen{-}guang Gong},
  title     = {Reliability Allocation of Underwater Experiment System Based on Particle
               Swarm Optimization},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1292--1299},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1292-1299},
  doi       = {10.4304/jnw.8.6.1292-1299},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiongG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongJ13,
  author    = {Wen Xiong and
               Yaohong Jin},
  title     = {Semantic {MMT} Model Based on Hierarchical Network of Concepts in
               Chinese-English {MT}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {237--244},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.237-244},
  doi       = {10.4304/jnw.8.1.237-244},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XiongJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xu13,
  author    = {Bao Xu},
  title     = {Time Synchronization for Heterogeneous WSNs Based on Cluster},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2915--2921},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2915-2921},
  doi       = {10.4304/jnw.8.12.2915-2921},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuBF13,
  author    = {Huafeng Xu and
               Yongli Bai and
               Zhigeng Fang},
  title     = {Solution of Grey Chance Constrained Programming and Convexity of its
               Feasible Set},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1601--1608},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1601-1608},
  doi       = {10.4304/jnw.8.7.1601-1608},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuBF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuGXZ13,
  author    = {Shouzhi Xu and
               Pengfei Guo and
               Bo Xu and
               Huan Zhou},
  title     = {QoS Evaluation of {VANET} Routing Protocols},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {132--139},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.132-139},
  doi       = {10.4304/jnw.8.1.132-139},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuGXZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuHL13,
  author    = {Yuanping Xu and
               Jian Huang and
               Jun Lu},
  title     = {A Categorical Knowledge Management Software Platform for Advanced
               Areal Surface Texture Specification and Verification},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1395--1402},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1395-1402},
  doi       = {10.4304/jnw.8.6.1395-1402},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuHL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuTWT13,
  author    = {Yang Xu and
               Ruochen Tan and
               Shuai Wu and
               Qilin Tang},
  title     = {Connect Internet with Sensors by 6LoWPAN},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1480--1487},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1480-1487},
  doi       = {10.4304/jnw.8.7.1480-1487},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuTWT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuY13,
  author    = {Wen{-}jie Xu and
               Jin Yao},
  title     = {Integrated Quality Diagnosis Algorithm Method based on Neural Network
               and Sensitivity Analysis to Input Parameters},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1307--1314},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1307-1314},
  doi       = {10.4304/jnw.8.6.1307-1314},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuYL13,
  author    = {Dayu Xu and
               Shanlin Yang and
               He Luo},
  title     = {A Fusion Model for {CPU} Load Prediction in Cloud Computing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2506--2511},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2506-2511},
  doi       = {10.4304/jnw.8.11.2506-2511},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuYL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuZM13,
  author    = {Zhe Xu and
               Ping Zhu and
               Jie Mei},
  title     = {Notice of Violation of Academy Publisher Publication Principles "Research
               on Backward Cloud Model with Uncertainty"},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2556--2563},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2556-2563},
  doi       = {10.4304/jnw.8.11.2556-2563},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuZM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuZT13,
  author    = {Bin Xu and
               Li{-}Hui Zhang and
               Xiao{-}Pin Tan},
  title     = {Research of {RFID} Certification Security Protocol based on Hash Function
               and {DES} Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2368--2375},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2368-2375},
  doi       = {10.4304/jnw.8.10.2368-2375},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XuZT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xue13,
  author    = {Wu Xue},
  title     = {Study on Digital Image Scrambling Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1673--1679},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1673-1679},
  doi       = {10.4304/jnw.8.7.1673-1679},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Xue13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XueZYWL13,
  author    = {Jianbin Xue and
               Ting Zhang and
               Yan Yan and
               Wenhua Wang and
               Songbai Li},
  title     = {Cooperation-based Ant Colony Algorithm in {WSN}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {939--946},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.939-946},
  doi       = {10.4304/jnw.8.4.939-946},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/XueZYWL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanF13,
  author    = {Jinghua Yan and
               Xiaohui Fan},
  title     = {{HFBP:} Identifying {P2P} Traffic by Host Level and Flow Level Behavior
               Profiles},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1866--1873},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1866-1873},
  doi       = {10.4304/jnw.8.8.1866-1873},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YanF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanZ13,
  author    = {Xia Yan and
               Hua Zhao},
  title     = {Chinese Microblog Topic Detection Based on the Latent Semantic Analysis
               and Structural Property},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {917--923},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.917-923},
  doi       = {10.4304/jnw.8.4.917-923},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YanZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Yang13,
  author    = {Chaoyu Yang},
  title     = {{LDH} Control Algorithm in Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1617--1623},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1617-1623},
  doi       = {10.4304/jnw.8.7.1617-1623},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Yang13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangQZ13,
  author    = {Peng Yang and
               Jin Qin and
               Wenliang Zhou},
  title     = {Multi-Commodity Flow and Multi-Period Equilibrium Model of Supply
               Chain Network with Postponement Strategy},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {389--396},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.389-396},
  doi       = {10.4304/jnw.8.2.389-396},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangQZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangSJL13,
  author    = {Yang Yang and
               Biaobiao Shi and
               Bo Jiang and
               Xiang Long},
  title     = {Data-Replicas Scheduler for Heterogeneous MapReduce Cluster},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1096--1103},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1096-1103},
  doi       = {10.4304/jnw.8.5.1096-1103},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangSJL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangTZ13,
  author    = {Juqiong Yang and
               Chu{-}Ho Ting and
               Xudong Zhang},
  title     = {{\(\lnot\)}Network Traffic Prediction Using the Combination of Chaos
               Theory and Simple-MKL},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1750--1756},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1750-1756},
  doi       = {10.4304/jnw.8.8.1750-1756},
  timestamp = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/YangTZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWL13,
  author    = {Zhongzhen Yang and
               Jinlin Wang and
               Jun Lin},
  title     = {Utility-Based Online Bandwidth Allocation for Bonded Channels},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2436--2443},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2436-2443},
  doi       = {10.4304/jnw.8.10.2436-2443},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangWL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWLY13,
  author    = {Jin Yang and
               Cilin Wang and
               Caiming Liu and
               Le Yu},
  title     = {Cloud Computing for Network Security Intrusion Detection System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {140--147},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.140-147},
  doi       = {10.4304/jnw.8.1.140-147},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangWLY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWQS13,
  author    = {Jie Yang and
               Li Wan and
               Changqing Qu and
               John Savaria},
  title     = {A New Load-balancing Algorithm in Wireless Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1781--1787},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1781-1787},
  doi       = {10.4304/jnw.8.8.1781-1787},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangWQS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWZ13,
  author    = {Hongyu Yang and
               Sen Wang and
               Yang Zhang},
  title     = {Web Service Replacement Algorithm based on Complex Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {829--835},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.829-835},
  doi       = {10.4304/jnw.8.4.829-835},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangWZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangXWL13,
  author    = {Dingcheng Yang and
               Lin Xiao and
               Fei Wang and
               An Li},
  title     = {A Multi-Cell Coordinated Scheduling Algorithm Based on Delta-CQI for
               CoMP Network Systems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2121--2127},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2121-2127},
  doi       = {10.4304/jnw.8.9.2121-2127},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangXWL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangXZ13,
  author    = {Guangsong Yang and
               Mingbo Xiao and
               Shuqin Zhang},
  title     = {Data Aggregation Scheme based on Compressed Sensing in Wireless Sensor
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {197--204},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.197-204},
  doi       = {10.4304/jnw.8.1.197-204},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangXZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangZ13,
  author    = {Yifei Yang and
               Huangqiu Zhu},
  title     = {Optimal Control and H{\(\infty\)} Output Feedback Design Options for
               Active Magnetic Bearing Spindle Position Regulation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1624--1631},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1624-1631},
  doi       = {10.4304/jnw.8.7.1624-1631},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YangZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoG13,
  author    = {Junge Yao and
               Ming Gu},
  title     = {Conceptology: Using Concept Map for Knowledge Representation and Ontology
               Construction},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1708--1712},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1708-1712},
  doi       = {10.4304/jnw.8.8.1708-1712},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YaoG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoPSL13,
  author    = {Chunlong Yao and
               Wei Pan and
               Lan Shen and
               Xu Li},
  title     = {Research of Multi-sensor Images Based on Color Fusion Methods},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2635--2641},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2635-2641},
  doi       = {10.4304/jnw.8.11.2635-2641},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YaoPSL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoYH13,
  author    = {Guoxiang Yao and
               Saizhi Ye and
               Caiting Huang},
  title     = {A Key Management Algorithm Based on Two-tier Architecture in Wireless
               Ad Hoc Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1241--1247},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1241-1247},
  doi       = {10.4304/jnw.8.6.1241-1247},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YaoYH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoYLF13,
  author    = {Chunlong Yao and
               Fengjiao Yin and
               Xu Li and
               Fenglong Fan},
  title     = {Security Analysis of {PHP} Encoder},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2353--2360},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2353-2360},
  doi       = {10.4304/jnw.8.10.2353-2360},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YaoYLF13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YinYT13,
  author    = {Xiangdong Yin and
               Jie Yang and
               Andreas Tiee{-}Girl},
  title     = {Optimal Energy Routing Protocol Algorithm in Wireless Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2783--2790},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2783-2790},
  doi       = {10.4304/jnw.8.12.2783-2790},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YinYT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YinYXZLL13,
  author    = {Yong Yin and
               Tao Yuan and
               Yu Xiao and
               Chaoyong Zhang and
               Ping Lou and
               Yu Li},
  title     = {An Improved Search Strategy for Even Degree Distribution Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1558--1565},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1558-1565},
  doi       = {10.4304/jnw.8.7.1558-1565},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YinYXZLL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Yu13,
  author    = {Xiehua Yu},
  title     = {Security Key Management Scheme in Heterogeneous Wireless Sensor Networks
               Based on Clustering Strategy},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2114--2120},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2114-2120},
  doi       = {10.4304/jnw.8.9.2114-2120},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Yu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuC13,
  author    = {Yang Yu and
               Xiaomin Chen},
  title     = {Research on Custody Transfer Service in Delay Tolerant Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1713--1719},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1713-1719},
  doi       = {10.4304/jnw.8.8.1713-1719},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuLS13,
  author    = {Shuijuan Yu and
               Zhenbi Li and
               Xia Sun},
  title     = {Design of Adaptive Grid Type Filter Based on {FPGA}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2150--2154},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2150-2154},
  doi       = {10.4304/jnw.8.9.2150-2154},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuLS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuWH13,
  author    = {Zuwei Yu and
               Gan Wang and
               Hongwei Hu},
  title     = {Intertemporal Dynamics: Convergence Speed of Current Account across
               Countries},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {501--506},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.501-506},
  doi       = {10.4304/jnw.8.2.501-506},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/YuWH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuZP13,
  author    = {Tingfang Yu and
               Hongzhen Zhu and
               Chunhua Peng},
  title     = {Multi-objective Optimization of Coal-fired Boiler Combustion Based
               on {NSGA-II}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1300--1306},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1300-1306},
  doi       = {10.4304/jnw.8.6.1300-1306},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/YuZP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaL13,
  author    = {Song Zha and
               Peiguo Liu},
  title     = {An Efficient Non-sparsity Protection Scheme for Collaborative Compressed
               Spectrum Sensing},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1694--1699},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1694-1699},
  doi       = {10.4304/jnw.8.8.1694-1699},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaiLD13,
  author    = {Jiangtao Zhai and
               Guangjie Liu and
               Yuewei Dai},
  title     = {An Improved Retransmission-based Network Steganography: Design and
               Detection},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {182--188},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.182-188},
  doi       = {10.4304/jnw.8.1.182-188},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaiLD13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang13,
  author    = {Qunhui Zhang},
  title     = {Online Network Traffic Classification Algorithm Based on {RVM}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1364--1369},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1364-1369},
  doi       = {10.4304/jnw.8.6.1364-1369},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhang13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang13a,
  author    = {Zhaoyin Zhang},
  title     = {Neural Network Control Optimization based on Improved Genetic Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1831--1837},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1831-1837},
  doi       = {10.4304/jnw.8.8.1831-1837},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhang13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang13b,
  author    = {Hui Zhang},
  title     = {A Scheme of Certificateless Multilevel Proxy Digital Signature in
               Electronic Commerce},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2548--2555},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2548-2555},
  doi       = {10.4304/jnw.8.11.2548-2555},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhang13b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangCL13,
  author    = {Xin Zhang and
               Meng Cai and
               Jia Liu},
  title     = {Fast Approximate Matching Algorithm for Phone-based Keyword Spotting},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2227--2233},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2227-2233},
  doi       = {10.4304/jnw.8.10.2227-2233},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangCL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangG13,
  author    = {Yong Zhang and
               Lin Guo},
  title     = {Network Percolation Based on Complex Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1874--1881},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1874-1881},
  doi       = {10.4304/jnw.8.8.1874-1881},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangHSXMZ13,
  author    = {Xiaolu Zhang and
               Liang Hu and
               Shinan Song and
               Zhenzhen Xie and
               Xiangyu Meng and
               Kuo Zhao},
  title     = {An Intelligent Analysis Model for Multisource Volatile Memory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1943--1949},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1943-1949},
  doi       = {10.4304/jnw.8.9.1943-1949},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangHSXMZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangHSXMZ13a,
  author    = {Xiaolu Zhang and
               Liang Hu and
               Shinan Song and
               Zhenzhen Xie and
               Xiangyu Meng and
               Kuo Zhao},
  title     = {An Intelligent Analysis Model for Multisource Volatile Memory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2699--2705},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2699-2705},
  doi       = {10.4304/jnw.8.11.2699-2705},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangHSXMZ13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangML13,
  author    = {Yan Zhang and
               Wenxing Ma and
               Xuesong Li},
  title     = {Shift Control System of Heavy-duty Vehicle Automatic Transmission},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2948--2955},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2948-2955},
  doi       = {10.4304/jnw.8.12.2948-2955},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangML13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangQT13,
  author    = {Yu Zhang and
               Meixing Qi and
               Min{-}Ming Tong},
  title     = {Composite Taste Recognition Method Based on Fuzzy Neural Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2021--2028},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2021-2028},
  doi       = {10.4304/jnw.8.9.2021-2028},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangQT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangS13,
  author    = {Yuan Zhang and
               Qing{-}wei Shen},
  title     = {Data Flow Control Algorithm based on Feature Matching in Mobile {P2P}
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1146--1152},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1146-1152},
  doi       = {10.4304/jnw.8.5.1146-1152},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSL13,
  author    = {Junli Zhang and
               Limin Song and
               Linhao Li},
  title     = {Research on Object-oriented Software Testing Cases of Automatic Generation},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2627--2634},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2627-2634},
  doi       = {10.4304/jnw.8.11.2627-2634},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangSL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSLWW13,
  author    = {Hao Zhang and
               Wei Shi and
               Tingting Lu and
               Jingjing Wang and
               Xinjie Wang},
  title     = {Performance Analysis of Multiple Access 60 GHz System Using Frequency-shifted
               Gaussian Pulse and Non-carrier {PSWF} Pulse},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {761--768},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.761-768},
  doi       = {10.4304/jnw.8.4.761-768},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangSLWW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSST13,
  author    = {Weiping Zhang and
               Regina Stoll and
               Norbert Stoll and
               Kerstin Thurow},
  title     = {An mHealth Monitoring System for Telemedicine Based on WebSocket Wireless
               Communication},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {955--962},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.955-962},
  doi       = {10.4304/jnw.8.4.955-962},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangSST13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSZZ13,
  author    = {Yinghui Zhang and
               Muhammad Saeed and
               Tiankui Zhang and
               Zhimin Zeng},
  title     = {Tensor-Based Channel Estimation for Cooperative Diversity Scheme in
               the Presence of Timing and Frequency Offsets},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2057--2062},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2057-2062},
  doi       = {10.4304/jnw.8.9.2057-2062},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangSZZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangT13,
  author    = {Yiqing Zhang and
               Jianwei Tan},
  title     = {Improved MDS-based Sensor Localization Algorithm in Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2085--2092},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2085-2092},
  doi       = {10.4304/jnw.8.9.2085-2092},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangW13,
  author    = {Xiaoyong Zhang and
               Huafeng Wu},
  title     = {Mixed Hermite-Legendre Spectral Method},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2839--2848},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2839-2848},
  doi       = {10.4304/jnw.8.12.2839-2848},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangWGSW13,
  author    = {Hao Zhang and
               Xinjie Wang and
               T. Aaron Gulliver and
               Wei Shi and
               Jingjing Wang},
  title     = {Performance of Incremental {AF} Relaying Cooperative Networks with
               the nth Best Relay over Rayleigh Fading Channels},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1681--1688},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1681-1688},
  doi       = {10.4304/jnw.8.8.1681-1688},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangWGSW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangWW13,
  author    = {Zhiying Zhang and
               Peng Wang and
               Weize Wang},
  title     = {Optimization and Operation Scheduling for a Steel Plate yard Based
               on Greedy Algorithm},
  journal   = {J. Networks},
  volume    = {8},
  number    = {7},
  pages     = {1654--1659},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.7.1654-1659},
  doi       = {10.4304/jnw.8.7.1654-1659},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangWW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangXJ13,
  author    = {Hannv Zhang and
               Jiang Xu and
               Qigang Jiang},
  title     = {Extraction and Network Sharing of Forest Vegetation Information based
               on {SVM}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1043--1049},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1043-1049},
  doi       = {10.4304/jnw.8.5.1043-1049},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangXJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangXL13,
  author    = {Pengyi Zhang and
               Jiannan Xia and
               Ruiji Li},
  title     = {Personalized Multimedia Information Retrieval based on User Profile
               Mining},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2340--2346},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2340-2346},
  doi       = {10.4304/jnw.8.10.2340-2346},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangXL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ13,
  author    = {Li Guo Zhang and
               Hua Zuo},
  title     = {Pareto Optimal Solution Analysis of Convex Multi-Objective Programming
               Problem},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {437--444},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.437-444},
  doi       = {10.4304/jnw.8.2.437-444},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ13a,
  author    = {Cui{-}fang Zhang and
               Gui{-}Gen Zeng},
  title     = {A novel {HARQ} Scheme based on Frequency Diversity and Energy-MRC},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2671--2677},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2671-2677},
  doi       = {10.4304/jnw.8.11.2671-2677},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangZ13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ13b,
  author    = {Shanliang Zhang and
               Lihua Zhu},
  title     = {A Packet Classification Algorithm based on Improved Decision Tree},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2864--2871},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2864-2871},
  doi       = {10.4304/jnw.8.12.2864-2871},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangZ13b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZW13,
  author    = {Luqiao Zhang and
               Qinxin Zhu and
               Juan Wang},
  title     = {Adaptive Clustering for Maximizing Network Lifetime and Maintaining
               Coverage},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {616--622},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.616-622},
  doi       = {10.4304/jnw.8.3.616-622},
  timestamp = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhangZW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhao13,
  author    = {Zhonghua Zhao},
  title     = {Clustering Algorithm in Data Mining Based on Web Log},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2392--2399},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2392-2399},
  doi       = {10.4304/jnw.8.10.2392-2399},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhao13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhao13a,
  author    = {Kai Zhao},
  title     = {Multiple-Agent Task Allocation Algorithm Utilizing Ant Colony Optimization},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2599--2606},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2599-2606},
  doi       = {10.4304/jnw.8.11.2599-2606},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhao13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoHHJ13,
  author    = {Liang Zhao and
               Liyuan He and
               Wong Harry and
               Xing Jin},
  title     = {Intelligent Agricultural Forecasting System Based on Wireless Sensor},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1817--1824},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1817-1824},
  doi       = {10.4304/jnw.8.8.1817-1824},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoHHJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoHSZ13,
  author    = {Weifeng Zhao and
               Xin Huang and
               Kai Shi and
               Lei Zhang},
  title     = {{TSBCC:} Time Series-Based Congestion Control Algorithm for Wireless
               Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1058--1064},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1058-1064},
  doi       = {10.4304/jnw.8.5.1058-1064},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoHSZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoLC13,
  author    = {Feng Zhao and
               Xuezhi Lv and
               Hongbin Chen},
  title     = {A Leakage-Based Beamforming Algorithm for Cognitive {MIMO} Systems
               via Game Theory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {623--627},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.623-627},
  doi       = {10.4304/jnw.8.3.623-627},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoLC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoLYYW13,
  author    = {Ming Zhao and
               Tao Luo and
               Changchuan Yin and
               Guangxin Yue and
               Xiaojun Wang},
  title     = {Dynamic Spectrum Management with Competitive Market Equilibrium},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {283--289},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.283-289},
  doi       = {10.4304/jnw.8.2.283-289},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoLYYW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoQL13,
  author    = {Tong Zhao and
               Bingbing Qian and
               Yimin Li},
  title     = {Hybrid Adaptive Fuzzy Control Based on the Biological Adaptation Strategies},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2255--2262},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2255-2262},
  doi       = {10.4304/jnw.8.10.2255-2262},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoQL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoSS13,
  author    = {Ran Zhao and
               Kirusnapillai Selvarajah and
               Neil A. Speirs},
  title     = {Development Tools for Context Aware and Secure Pervasive Computing
               in Embedded Systems {(PECES)} Middleware},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {59--70},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.59-70},
  doi       = {10.4304/jnw.8.1.59-70},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoSS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoTZL13,
  author    = {Shupeng Zhao and
               Miao Tian and
               Shifang Zhang and
               Jiuxi Li},
  title     = {Control Information and Data Processing of Vehicle based on Global
               Position System},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1175--1182},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1175-1182},
  doi       = {10.4304/jnw.8.5.1175-1182},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoTZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoTZL13a,
  author    = {Shupeng Zhao and
               Miao Tian and
               Shifang Zhang and
               Jiuxi Li},
  title     = {Information Processing of Chassis Dynamometer based on Controller
               Area Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1343--1349},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1343-1349},
  doi       = {10.4304/jnw.8.6.1343-1349},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoTZL13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoTZLDW13,
  author    = {Shupeng Zhao and
               Miao Tian and
               Shifang Zhang and
               Jiuxi Li and
               Lijuan Du and
               Ye Wang},
  title     = {Data Process of Diagnose Expert System based on Neural Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2878--2884},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2878-2884},
  doi       = {10.4304/jnw.8.12.2878-2884},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoTZLDW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoXG13,
  author    = {Shuanfeng Zhao and
               Guanghua Xu and
               Wei Guo},
  title     = {Parallel Diagnosis Model of Fatigue Driving Based on Vehicle Running
               Status},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2585--2591},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2585-2591},
  doi       = {10.4304/jnw.8.11.2585-2591},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoXG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoZL13,
  author    = {Liang Zhao and
               Jili Zhang and
               Ruobing Liang},
  title     = {Remote Ethernet Data Transmission System based on Hardware Protocol
               Stack Chip},
  journal   = {J. Networks},
  volume    = {8},
  number    = {6},
  pages     = {1285--1291},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.6.1285-1291},
  doi       = {10.4304/jnw.8.6.1285-1291},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoZL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoZWY13,
  author    = {Min Zhao and
               Tao Zhang and
               Jinshuang Wang and
               Zhijian Yuan},
  title     = {A Smartphone Malware Detection Framework Based on Artificial Immunology},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {469--476},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.469-476},
  doi       = {10.4304/jnw.8.2.469-476},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhaoZWY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zheng13,
  author    = {Bi{-}geng Zheng},
  title     = {Research on Fiber Optic Sensor based on Fuzzy Control Theory},
  journal   = {J. Networks},
  volume    = {8},
  number    = {8},
  pages     = {1882--1889},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.8.1882-1889},
  doi       = {10.4304/jnw.8.8.1882-1889},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zheng13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengFZZ13,
  author    = {Xufei Zheng and
               Yonghui Fang and
               Yanhui Zhou and
               Jing Zhang},
  title     = {A Novel Multi-layered Immune Network Intrusion Detection Defense Model:
               {MINID}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {3},
  pages     = {636--644},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.3.636-644},
  doi       = {10.4304/jnw.8.3.636-644},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhengFZZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengLZH13,
  author    = {Yanhua Zheng and
               Gaoyong Luo and
               Bingzhi Zhang and
               Yongling He},
  title     = {Research on Power Line as Communication Channel with Multi-Tap and
               Multi-Branch Configuration},
  journal   = {J. Networks},
  volume    = {8},
  number    = {12},
  pages     = {2776--2782},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.12.2776-2782},
  doi       = {10.4304/jnw.8.12.2776-2782},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhengLZH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouLW13,
  author    = {Luping Zhou and
               Bingrong Li and
               Fucai Wang},
  title     = {Particle Swarm Optimization Model of Distributed Network Planning},
  journal   = {J. Networks},
  volume    = {8},
  number    = {10},
  pages     = {2263--2268},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.10.2263-2268},
  doi       = {10.4304/jnw.8.10.2263-2268},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouLW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouS13,
  author    = {Guangping Zhou and
               Anup Shrestha},
  title     = {Efficient Intrusion Detection Scheme based on {SVM}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2128--2134},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2128-2134},
  doi       = {10.4304/jnw.8.9.2128-2134},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouXGC13,
  author    = {Junping Zhou and
               Jingming Xia and
               Yixian Ge and
               Eric Chernoff},
  title     = {Internal and External Optical Feedback Effect in Fiber Linear Lasers},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {1990--1996},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.1990-1996},
  doi       = {10.4304/jnw.8.9.1990-1996},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouXGC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouXL13,
  author    = {Xiancun Zhou and
               Yan Xiong and
               Mingxi Li},
  title     = {Detection System of Clone Attacks based on {RSSI} in Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {8},
  number    = {1},
  pages     = {221--228},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.1.221-228},
  doi       = {10.4304/jnw.8.1.221-228},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhouXL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhu13,
  author    = {Haijing Zhu},
  title     = {Estimates of Weighted Hardy-Littlewood Inequality for Differential
               Forms},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {429--436},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.429-436},
  doi       = {10.4304/jnw.8.2.429-436},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zhu13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuFZ13,
  author    = {Ying Zhu and
               Zhiyong Feng and
               Ping Zhang},
  title     = {Analysis of Improved Cyclostationary Detector with Multiple Antennas
               over Fading Channels},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2459--2466},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2459-2466},
  doi       = {10.4304/jnw.8.11.2459-2466},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhuFZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuHCL13,
  author    = {Jun Zhu and
               Lili Han and
               Likuan Chang and
               Yongbiao Li},
  title     = {Vector Control Based on {SVPWM} for {ACIM}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1204--1211},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1204-1211},
  doi       = {10.4304/jnw.8.5.1204-1211},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhuHCL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuLH13,
  author    = {Jun Zhu and
               Wankui Li and
               Lili Han},
  title     = {{PMSM} Control System Based on Digital Signal Processor},
  journal   = {J. Networks},
  volume    = {8},
  number    = {4},
  pages     = {924--931},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.4.924-931},
  doi       = {10.4304/jnw.8.4.924-931},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhuLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuZQ13,
  author    = {Yan Zhu and
               Guanghua Zhang and
               Jing Qiu},
  title     = {Network Traffic Prediction based on Particle Swarm {BP} Neural Network},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2685--2691},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2685-2691},
  doi       = {10.4304/jnw.8.11.2685-2691},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhuZQ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuangWWZ13,
  author    = {Yonglong Zhuang and
               Xiaolan Weng and
               Yuwu Wang and
               Haiyang Zhuang},
  title     = {Improvement and Analysis of Encryption and Decryption Performance
               in Cloud Document},
  journal   = {J. Networks},
  volume    = {8},
  number    = {9},
  pages     = {2071--2077},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.9.2071-2077},
  doi       = {10.4304/jnw.8.9.2071-2077},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZhuangWWZ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zou13,
  author    = {Pinghui Zou},
  title     = {A Novel Data Detection Method for Data Aggregation Security in {WSN}},
  journal   = {J. Networks},
  volume    = {8},
  number    = {11},
  pages     = {2607--2613},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.11.2607-2613},
  doi       = {10.4304/jnw.8.11.2607-2613},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Zou13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZrelliOS13,
  author    = {Saber Zrelli and
               Nobuo Okabe and
               Yoichi Shinoda},
  title     = {{XKDCP:} An Inter-KDC Protocol for Dependable Kerberos Cross-Realm
               Operations},
  journal   = {J. Networks},
  volume    = {8},
  number    = {2},
  pages     = {290--296},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.2.290-296},
  doi       = {10.4304/jnw.8.2.290-296},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZrelliOS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZuoXW13,
  author    = {Zhengkang Zuo and
               Jinyun Xue and
               Changjing Wang},
  title     = {Constraint Verification of Generic Algorithmic Program for Solving
               General Network Path Problems},
  journal   = {J. Networks},
  volume    = {8},
  number    = {5},
  pages     = {1050--1057},
  year      = {2013},
  url       = {https://doi.org/10.4304/jnw.8.5.1050-1057},
  doi       = {10.4304/jnw.8.5.1050-1057},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ZuoXW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AbdollahpouriW12,
  author    = {Alireza Abdollahpouri and
               Bernd E. Wolfinger},
  title     = {Multicast Gain for {IPTV} Transmission in WiMAX Multi-hop Relay Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1760--1772},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1760-1772},
  doi       = {10.4304/jnw.7.11.1760-1772},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AbdollahpouriW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Al-AmeenGW12,
  author    = {Mahdi N. Al{-}Ameen and
               Charles Gatz and
               Matthew K. Wright},
  title     = {{SDA-2H:} Understanding the Value of Background Cover Against Statistical
               Disclosure},
  journal   = {J. Networks},
  volume    = {7},
  number    = {12},
  pages     = {1943--1951},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.12.1943-1951},
  doi       = {10.4304/jnw.7.12.1943-1951},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Al-AmeenGW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AleksicF12,
  author    = {Slavisa Aleksic and
               Naida Fehratovic},
  title     = {Scalability Analysis of Optical Intrasystem Interconnects},
  journal   = {J. Networks},
  volume    = {7},
  number    = {5},
  pages     = {791--799},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.5.791-799},
  doi       = {10.4304/jnw.7.5.791-799},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AleksicF12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AliLR12,
  author    = {Abdulamir Ali and
               Jochen Leibrich and
               Werner Rosenkranz},
  title     = {Design Considerations and Performance Comparison of High-Order Modulation
               Formats using {OFDM}},
  journal   = {J. Networks},
  volume    = {7},
  number    = {5},
  pages     = {757--763},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.5.757-763},
  doi       = {10.4304/jnw.7.5.757-763},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AliLR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AnHZX12,
  author    = {Yongli An and
               Xiaohong Huang and
               Kaiyu Zhu and
               Yang Xiao},
  title     = {Multi-users Cooperative Transmitting Algorithm in Cognitive {WLAN}},
  journal   = {J. Networks},
  volume    = {7},
  number    = {8},
  pages     = {1164--1169},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.8.1164-1169},
  doi       = {10.4304/jnw.7.8.1164-1169},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AnHZX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AngrishiK12,
  author    = {Kishore Angrishi and
               Ulrich Killat},
  title     = {A Node Operating Point Approach for Stochastic Analysis with Network
               Calculus},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1739--1748},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1739-1748},
  doi       = {10.4304/jnw.7.11.1739-1748},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/AngrishiK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Aparicio-PardoGSP12,
  author    = {Ramon Aparicio{-}Pardo and
               Belen Garcia{-}Manrubia and
               Nina Skorin{-}Kapov and
               Pablo Pav{\'{o}}n{-}Mari{\~{n}}o},
  title     = {Heuristic Approaches for Periodic Reconfiguration of Lightpath-based
               Networks under Multi-hour Traffic},
  journal   = {J. Networks},
  volume    = {7},
  number    = {5},
  pages     = {800--811},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.5.800-811},
  doi       = {10.4304/jnw.7.5.800-811},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Aparicio-PardoGSP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BeliakovYK12,
  author    = {Gleb Beliakov and
               John Yearwood and
               Andrei V. Kelarev},
  title     = {Application of Rank Correlation, Clustering and Classification in
               Information Security},
  journal   = {J. Networks},
  volume    = {7},
  number    = {6},
  pages     = {935--945},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.6.935-945},
  doi       = {10.4304/jnw.7.6.935-945},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BeliakovYK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BellabasLM12,
  author    = {Alia Bellabas and
               Samer Lahoud and
               Mikl{\'{o}}s Moln{\'{a}}r},
  title     = {Performance Evaluation of Efficient Solutions for the QoS Unicast
               Routing},
  journal   = {J. Networks},
  volume    = {7},
  number    = {1},
  pages     = {73--80},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.1.73-80},
  doi       = {10.4304/jnw.7.1.73-80},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BellabasLM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BhattacharyyaMS12,
  author    = {Budhaditya Bhattacharyya and
               Iti Saha Misra and
               Salil Kumar Sanyal},
  title     = {Analysis and Optimization of Error Performance of a WiMAX Transceiver
               using Novel Adaptive Cyclic Prefix Strategy under {AWGN} and Rayleigh
               Fading Scenario},
  journal   = {J. Networks},
  volume    = {7},
  number    = {12},
  pages     = {1952--1966},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.12.1952-1966},
  doi       = {10.4304/jnw.7.12.1952-1966},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BhattacharyyaMS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BollaRR12,
  author    = {Raffaele Bolla and
               Riccardo Rapuzzi and
               Matteo Repetto},
  title     = {User-Centric Mobility for Multimedia Communication: Experience and
               Evaluation from a Live Demo},
  journal   = {J. Networks},
  volume    = {7},
  number    = {1},
  pages     = {21--36},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.1.21-36},
  doi       = {10.4304/jnw.7.1.21-36},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BollaRR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BuHJZ12,
  author    = {Youjun Bu and
               Wei He and
               Kunpeng Jiang and
               Liang Zhao},
  title     = {A Novel Multi-Next Hop Routing Algorithm based on Node Potential},
  journal   = {J. Networks},
  volume    = {7},
  number    = {10},
  pages     = {1646--1653},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.10.1646-1653},
  doi       = {10.4304/jnw.7.10.1646-1653},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BuHJZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BuenoVF12,
  author    = {Antonio Bueno and
               Pere Vil{\`{a}} and
               Ram{\'{o}}n Fabregat},
  title     = {Charging Multicast Services: {A} Cost Distribution Scheme Comparative
               Study},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1773--1781},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1773-1781},
  doi       = {10.4304/jnw.7.11.1773-1781},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/BuenoVF12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiLY12,
  author    = {Yongquan Cai and
               Zhanhai Luo and
               Yi Yang},
  title     = {Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol},
  journal   = {J. Networks},
  volume    = {7},
  number    = {4},
  pages     = {738--745},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.4.738-745},
  doi       = {10.4304/jnw.7.4.738-745},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiLY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiLZ12,
  author    = {Xuelian Cai and
               Jiandong Li and
               Lina Zhu},
  title     = {Performance of Routing Protocols in Very Large Scale Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {12},
  pages     = {1996--2002},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.12.1996-2002},
  doi       = {10.4304/jnw.7.12.1996-2002},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiLZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiTX12,
  author    = {Yongquan Cai and
               Jiong Tian and
               Hui Xu},
  title     = {An Identification System of Original Painting Artworks Based on Smart
               Card},
  journal   = {J. Networks},
  volume    = {7},
  number    = {7},
  pages     = {1092--1098},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.7.1092-1098},
  doi       = {10.4304/jnw.7.7.1092-1098},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CaiTX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChakrabortyMBMS12,
  author    = {Tamal Chakraborty and
               Atri Mukhopadhyay and
               Suman Bhunia and
               Iti Saha Misra and
               Salil Kumar Sanyal},
  title     = {An Optimization Technique for Improved VoIP Performance over Wireless
               {LAN}},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {480--493},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.480-493},
  doi       = {10.4304/jnw.7.3.480-493},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChakrabortyMBMS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChakrabortyMS12,
  author    = {Tamal Chakraborty and
               Iti Saha Misra and
               Salil Kumar Sanyal},
  title     = {Proactive QoS Enhancement Technique for Efficient VoIP Performance
               over Wireless {LAN} and Cognitive Radio Network},
  journal   = {J. Networks},
  volume    = {7},
  number    = {12},
  pages     = {1925--1942},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.12.1925-1942},
  doi       = {10.4304/jnw.7.12.1925-1942},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChakrabortyMS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChandrasettyA12,
  author    = {Vikram Arkalgud Chandrasetty and
               Syed Mahfuzul Aziz},
  title     = {A Highly Flexible {LDPC} Decoder using Hierarchical Quasi-Cyclic Matrix
               with Layered Permutation},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {441--449},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.441-449},
  doi       = {10.4304/jnw.7.3.441-449},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChandrasettyA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chen12,
  author    = {Hui Chen},
  title     = {The Impact of Comments and Recommendation System on Online Shopper
               Buying Behaviour},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {345--350},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.345-350},
  doi       = {10.4304/jnw.7.2.345-350},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Chen12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenCHL12,
  author    = {Xiaohui Chen and
               Jinpeng Chen and
               Jing He and
               Bangjun Lei},
  title     = {An Improved Localization Algorithm for Wireless Sensor Network Based
               on the Selection of Benchmark Anchor Node},
  journal   = {J. Networks},
  volume    = {7},
  number    = {6},
  pages     = {991--996},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.6.991-996},
  doi       = {10.4304/jnw.7.6.991-996},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenCHL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenGL12,
  author    = {Jun Chen and
               Yuesheng Gu and
               Yanpei Liu},
  title     = {Grid Service Concurrency Control Protocol},
  journal   = {J. Networks},
  volume    = {7},
  number    = {4},
  pages     = {707--714},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.4.707-714},
  doi       = {10.4304/jnw.7.4.707-714},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenGL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenGM12,
  author    = {Xiaohui Chen and
               Canfeng Gong and
               Jiangbo Min},
  title     = {A Node Localization Algorithm for Wireless Sensor Networks based on
               Particle Swarm Algorithm},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1860--1867},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1860-1867},
  doi       = {10.4304/jnw.7.11.1860-1867},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenGM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenHLJ12,
  author    = {Xiaohui Chen and
               Jing He and
               Bangjun Lei and
               Tingyao Jiang},
  title     = {An Improved Localization Algorithm of Nodes in Wireless Sensor Network},
  journal   = {J. Networks},
  volume    = {7},
  number    = {1},
  pages     = {110--115},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.1.110-115},
  doi       = {10.4304/jnw.7.1.110-115},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenHLJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenL12,
  author    = {Hui{-}Huang Chen and
               Ai{-}Min Lin},
  title     = {Complex Network Characteristics and Invulnerability Simulating Analysis
               of Supply Chain},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {591--597},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.591-597},
  doi       = {10.4304/jnw.7.3.591-597},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenLYG12,
  author    = {Xi Chen and
               Shiguo Lian and
               Chu{-}Sing Yang and
               Stefanos Gritzalis},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {219--221},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.219-221},
  doi       = {10.4304/jnw.7.2.219-221},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenLYG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenS12,
  author    = {Xianzhong Chen and
               Yanchun Shen},
  title     = {Research of {RA} Coding Algorithm Based on {AWGN} Channel},
  journal   = {J. Networks},
  volume    = {7},
  number    = {4},
  pages     = {605--612},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.4.605-612},
  doi       = {10.4304/jnw.7.4.605-612},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenTJZD12,
  author    = {Bing Chen and
               Chengxiang Tan and
               Bo Jin and
               Xiang Zou and
               Yuebo Dai},
  title     = {RFID-based Electronic Identity Security Cloud Platform in Cyberspace},
  journal   = {J. Networks},
  volume    = {7},
  number    = {7},
  pages     = {1131--1138},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.7.1131-1138},
  doi       = {10.4304/jnw.7.7.1131-1138},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenTJZD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenXC12,
  author    = {Hongwei Chen and
               Hui Xu and
               Li Chen},
  title     = {Incentive Mechanisms for {P2P} Network Nodes based on Repeated Game},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {385--392},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.385-392},
  doi       = {10.4304/jnw.7.2.385-392},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenXC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenYTH12,
  author    = {Hao Chen and
               Tong Yang and
               Jianfu Teng and
               Hong He},
  title     = {Interference Analysis of {TD-SCDMA} System and {CDMA2000} System},
  journal   = {J. Networks},
  volume    = {7},
  number    = {1},
  pages     = {101--109},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.1.101-109},
  doi       = {10.4304/jnw.7.1.101-109},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/ChenYTH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiJ12,
  author    = {Ting Cui and
               Chenhui Jin},
  title     = {Lower Bounds of Differential and Linear Active S-boxes for Generalized
               Feistel Network with {SP} Type F-function},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {282--287},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.282-287},
  doi       = {10.4304/jnw.7.2.282-287},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiLC12,
  author    = {Yingan Cui and
               Xue Li and
               Xiaogang Chen},
  title     = {The Research of Polarization Phenomenon in Blogosphere},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1479--1485},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1479-1485},
  doi       = {10.4304/jnw.7.9.1479-1485},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiLC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiZG12,
  author    = {Xue{-}rong Cui and
               Hao Zhang and
               T. Aaron Gulliver},
  title     = {Threshold Selection for Ultra-Wideband {TOA} Estimation based on Neural
               Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1311--1318},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1311-1318},
  doi       = {10.4304/jnw.7.9.1311-1318},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/CuiZG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DApiceMP12,
  author    = {Ciro D'Apice and
               Rosanna Manzo and
               Benedetto Piccoli},
  title     = {On the Validity of Fluid-dynamic Models for Data Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {6},
  pages     = {980--990},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.6.980-990},
  doi       = {10.4304/jnw.7.6.980-990},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/DApiceMP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DaiLGJ12,
  author    = {Hongjun Dai and
               Yu Liu and
               Fenghua Guo and
               Zhiping Jia},
  title     = {A Malicious Node Detection Algorithm Based on Principle of Maximum
               Entropy in WSNs},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1376--1383},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1376-1383},
  doi       = {10.4304/jnw.7.9.1376-1383},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DaiLGJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DaiLZ12,
  author    = {Cui{-}Qin Dai and
               Fang{-}Lan Liao and
               Zu{-}Fan Zhang},
  title     = {Packet Scheduling for Downlink {OFDMA} Wireless Systems with Heterogeneous
               Traffic},
  journal   = {J. Networks},
  volume    = {7},
  number    = {6},
  pages     = {956--961},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.6.956-961},
  doi       = {10.4304/jnw.7.6.956-961},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DaiLZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DavernNSZ12,
  author    = {Paul Davern and
               Noor Nashid and
               Cormac J. Sreenan and
               Ahmed H. Zahran},
  title     = {Client-Side Framework for Automated Evaluation of Mechanisms to Improve
               {HTTP} Performance},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1749--1759},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1749-1759},
  doi       = {10.4304/jnw.7.11.1749-1759},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DavernNSZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DecaCS12,
  author    = {Rudy Deca and
               Omar Cherkaoui and
               Yvon Savaria},
  title     = {Rule-Based Network Service Provisioning},
  journal   = {J. Networks},
  volume    = {7},
  number    = {10},
  pages     = {1493--1504},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.10.1493-1504},
  doi       = {10.4304/jnw.7.10.1493-1504},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DecaCS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DewianiHKHK12,
  author    = {Dewiani and
               Kouji Hirata and
               Khamisi Kalegele and
               Yoshinobu Higami and
               Shin{-}ya Kobayashi},
  title     = {Dynamic Routing and Wavelength Assignment with Backward Reservation
               in Wavelength-routed Multifiber {WDM} Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1441--1448},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1441-1448},
  doi       = {10.4304/jnw.7.9.1441-1448},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DewianiHKHK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Ding12,
  author    = {Shifei Ding},
  title     = {Guest Editorial},
  journal   = {J. Networks},
  volume    = {7},
  number    = {7},
  pages     = {1007--1008},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.7.1007-1008},
  doi       = {10.4304/jnw.7.7.1007-1008},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/Ding12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DongEE12,
  author    = {Xiaowen Dong and
               Taisir E. H. El{-}Gorashi and
               Jaafar M. H. Elmirghani},
  title     = {Energy Efficient Optical Networks with Minimized Non-Renewable Power
               Consumption},
  journal   = {J. Networks},
  volume    = {7},
  number    = {5},
  pages     = {821--831},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.5.821-831},
  doi       = {10.4304/jnw.7.5.821-831},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/DongEE12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DuYW12,
  author    = {Ning Du and
               Huijing Yang and
               Chunying Wang},
  title     = {An Optimized {OSPF} Routing Protocol for Mobile Ad-hoc Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1456--1463},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1456-1463},
  doi       = {10.4304/jnw.7.9.1456-1463},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/DuYW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/EramoPGCL12,
  author    = {Vincenzo Eramo and
               Lorenzo Piazzo and
               Angelo Germoni and
               Antonio Cianfrani and
               Marco Listanti},
  title     = {Dimensioning of Optical Codes in {OCDM/WDM} Optical Packet Switches},
  journal   = {J. Networks},
  volume    = {7},
  number    = {5},
  pages     = {764--769},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.5.764-769},
  doi       = {10.4304/jnw.7.5.764-769},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/EramoPGCL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FanFLW12,
  author    = {Qiang Fan and
               Jing Fan and
               Jie Li and
               Xiaofang Wang},
  title     = {A Multi-hop Energy-efficient Sleeping {MAC} Protocol based on {TDMA}
               Scheduling for Wireless Mesh Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1355--1361},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1355-1361},
  doi       = {10.4304/jnw.7.9.1355-1361},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FanFLW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FanLS12,
  author    = {Ya{-}qin Fan and
               Chi Li and
               Chao Sun},
  title     = {Based on combination of {L2TP} and IPSec {VPN} security technology
               research},
  journal   = {J. Networks},
  volume    = {7},
  number    = {1},
  pages     = {141--148},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.1.141-148},
  doi       = {10.4304/jnw.7.1.141-148},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FanLS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FazioRS12,
  author    = {Peppino Fazio and
               Floriano De Rango and
               Cesare Sottile},
  title     = {An On Demand Interference Aware Routing Protocol for {VANETS}},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1728--1738},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1728-1738},
  doi       = {10.4304/jnw.7.11.1728-1738},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FazioRS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengX12,
  author    = {Nan Feng and
               Jing Xie},
  title     = {A Hybrid Approach of Evidence Theory and Rough Sets for {ISS} Risk
               Assessment},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {337--344},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.337-344},
  doi       = {10.4304/jnw.7.2.337-344},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FengX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FowlerHP12,
  author    = {Scott Fowler and
               Katrin Hameseder and
               Anders Peterson},
  title     = {An Empirical Evaluation of Web System Access for Smartphone Clients},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1700--1713},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1700-1713},
  doi       = {10.4304/jnw.7.11.1700-1713},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/FowlerHP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FuBW12,
  author    = {Ziyi Fu and
               Juanjuan Bai and
               Qiang Wang},
  title     = {A Novel Dynamic Bandwidth Allocation Algorithm with Correction-based
               the Multiple Traffic Prediction in {EPON}},
  journal   = {J. Networks},
  volume    = {7},
  number    = {10},
  pages     = {1554--1560},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.10.1554-1560},
  doi       = {10.4304/jnw.7.10.1554-1560},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FuBW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FuLH12,
  author    = {Tingting Fu and
               Peng Liu and
               Y. Fun Hu},
  title     = {Enable Energy Efficiency of Object Tracking using Sentinel based Multisensor
               Sleep Scheduling},
  journal   = {J. Networks},
  volume    = {7},
  number    = {8},
  pages     = {1245--1250},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.8.1245-1250},
  doi       = {10.4304/jnw.7.8.1245-1250},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FuLH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FuZLZY12,
  author    = {Rongrong Fu and
               Kangfeng Zheng and
               Tianliang Lu and
               Dongmei Zhang and
               Yixian Yang},
  title     = {Biologically Inspired Anomaly Detection for Hierarchical Wireless
               Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {8},
  pages     = {1214--1219},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.8.1214-1219},
  doi       = {10.4304/jnw.7.8.1214-1219},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/FuZLZY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaeteCS12,
  author    = {Oscar Gaete and
               Leonardo D. Coelho and
               Bernhard Spinnler},
  title     = {Performance of Stereo Multiplexing in Single Channel and {DWDM} Systems
               Using Direct Detection with Optimum Dispersion Maps},
  journal   = {J. Networks},
  volume    = {7},
  number    = {5},
  pages     = {770--775},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.5.770-775},
  doi       = {10.4304/jnw.7.5.770-775},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaeteCS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoHM12,
  author    = {Feng Gao and
               Jingsha He and
               Shunan Ma},
  title     = {Trust Based Privacy Protection Method in Pervasive Computing},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {322--328},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.322-328},
  doi       = {10.4304/jnw.7.2.322-328},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoHM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoX12,
  author    = {Wei Gao and
               Tianwei Xu},
  title     = {Characteristics of Optimal Function for Ontology Similarity Measure
               via Multi-dividing},
  journal   = {J. Networks},
  volume    = {7},
  number    = {8},
  pages     = {1251--1259},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.8.1251-1259},
  doi       = {10.4304/jnw.7.8.1251-1259},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoYZZC12,
  author    = {Xiang Gao and
               Yintang Yang and
               Duan Zhou and
               Jianxian Zhang and
               Changchun Chai},
  title     = {Target Tracking Approximation Algorithms with Particle Filter Optimization
               and Fault-Tolerant Analysis in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {5},
  pages     = {832--837},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.5.832-837},
  doi       = {10.4304/jnw.7.5.832-837},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GaoYZZC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GongX12,
  author    = {Bencan Gong and
               Shouzhi Xu},
  title     = {Unequal Density-based Node Deployment and Clustering Routing Protocol
               in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {11},
  pages     = {1892--1899},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.11.1892-1899},
  doi       = {10.4304/jnw.7.11.1892-1899},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GongX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuZZ12,
  author    = {Jiantao Gu and
               Jun Zheng and
               Shufen Zhang},
  title     = {A Graphical User Interface in {WLAN} Monitoring and Management System},
  journal   = {J. Networks},
  volume    = {7},
  number    = {4},
  pages     = {644--651},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.4.644-651},
  doi       = {10.4304/jnw.7.4.644-651},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuZZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuanWX12,
  author    = {Mingxiang Guan and
               Le Wang and
               Yunfeng Xing},
  title     = {A Novel Method of High Dynamic Carrier Acquisition and Track for {HAPS}
               Communication Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {12},
  pages     = {2082--2088},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.12.2082-2088},
  doi       = {10.4304/jnw.7.12.2082-2088},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuanWX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoL12,
  author    = {William W. Guo and
               Mark Looi},
  title     = {A Framework of Trust-Energy Balanced Procedure for Cluster Head Selection
               in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {10},
  pages     = {1592--1599},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.10.1592-1599},
  doi       = {10.4304/jnw.7.10.1592-1599},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoLL12,
  author    = {Haoming Guo and
               Feng Liang and
               Yunzhen Liu},
  title     = {Research on Sensor Cooperation for Distributed Emergency Response
               System},
  journal   = {J. Networks},
  volume    = {7},
  number    = {4},
  pages     = {683--690},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.4.683-690},
  doi       = {10.4304/jnw.7.4.683-690},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoLL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoSW12,
  author    = {Jian Guo and
               Lijuan Sun and
               Ruchuan Wang},
  title     = {A Cross-layer and Multipath based Video Transmission Scheme for Wireless
               Multimedia Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1334--1340},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1334-1340},
  doi       = {10.4304/jnw.7.9.1334-1340},
  timestamp = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoSW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoZSJ12,
  author    = {Lizheng Guo and
               Shuguang Zhao and
               Shigen Shen and
               Changyuan Jiang},
  title     = {Task Scheduling Optimization in Cloud Computing Based on Heuristic
               Algorithm},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {547--553},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.547-553},
  doi       = {10.4304/jnw.7.3.547-553},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/GuoZSJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanN12,
  author    = {Xiaoting Han and
               Li Niu},
  title     = {Word of Mouth Propagation in Online Social Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {10},
  pages     = {1670--1676},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.10.1670-1676},
  doi       = {10.4304/jnw.7.10.1670-1676},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanQLY12,
  author    = {Lansheng Han and
               Xiao Qu and
               Yuan Li and
               Tao Yin},
  title     = {The Probability of Trojan Attacks on Multi-level Security Strategy
               based Network},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {300--304},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.300-304},
  doi       = {10.4304/jnw.7.2.300-304},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanQLY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanZ12,
  author    = {Dandan Han and
               Jing Zhang},
  title     = {An Optimized Gnutella-like {P2P} Protocol in Mobile Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1464--1471},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1464-1471},
  doi       = {10.4304/jnw.7.9.1464-1471},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanZ12a,
  author    = {Qinwen Han and
               Lingqiu Zeng},
  title     = {{FPGA} Implementation for Low-Rank Channel Estimation of {OFDM}},
  journal   = {J. Networks},
  volume    = {7},
  number    = {10},
  pages     = {1631--1638},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.10.1631-1638},
  doi       = {10.4304/jnw.7.10.1631-1638},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HanZ12a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeSWLY12,
  author    = {Hongzeng He and
               Jingbo Sun and
               Yue Wang and
               Qi Liu and
               Jian Yuan},
  title     = {Cluster Analysis Based Switching-off Scheme of Base Stations for Energy
               Saving},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {494--501},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.494-501},
  doi       = {10.4304/jnw.7.3.494-501},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeSWLY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeWZYC12,
  author    = {Qian He and
               Yong Wang and
               Bang Zhao and
               Linlin Yao and
               Hong{-}Bin Chen},
  title     = {{FRPWPS:} {A} Filter Driver and Reverse Proxy Based Web Protection
               System},
  journal   = {J. Networks},
  volume    = {7},
  number    = {6},
  pages     = {997--1005},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.6.997-1005},
  doi       = {10.4304/jnw.7.6.997-1005},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HeWZYC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HongHY12,
  author    = {Yang Hong and
               Changcheng Huang and
               James Yan},
  title     = {Impact of Retransmission Mechanism on {SIP} Overload: Stability Condition
               and Overload Control},
  journal   = {J. Networks},
  volume    = {7},
  number    = {1},
  pages     = {52--62},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.1.52-62},
  doi       = {10.4304/jnw.7.1.52-62},
  timestamp = {Thu, 14 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/HongHY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HossainAI12,
  author    = {Md. Shohrab Hossain and
               Mohammed Atiquzzaman and
               William D. Ivancic},
  title     = {Cost and Efficiency Analysis of {NEMO} Protocol Entities},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {427--440},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.427-440},
  doi       = {10.4304/jnw.7.3.427-440},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HossainAI12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuCH12,
  author    = {Zhangfeng Hu and
               Shanzhi Chen and
               Bo Hu},
  title     = {Reconsidering Architecture for Future Ubiquitous Internet},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1319--1326},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1319-1326},
  doi       = {10.4304/jnw.7.9.1319-1326},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuCH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuSLSY12,
  author    = {Shengbo Hu and
               Heng Shu and
               Yali Liu and
               Bing Si and
               Fuyu Yan},
  title     = {Strategies for Sensor Node Deployment Based on Spatial Correlation
               for Methane Sensor Network},
  journal   = {J. Networks},
  volume    = {7},
  number    = {12},
  pages     = {2070--2075},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.12.2070-2075},
  doi       = {10.4304/jnw.7.12.2070-2075},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuSLSY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangCWMC12,
  author    = {Haiping Huang and
               Hao Chen and
               Ruchuan Wang and
               Qian Mao and
               Renyuan Cheng},
  title     = {(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor
               Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {7},
  pages     = {1009--1016},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.7.1009-1016},
  doi       = {10.4304/jnw.7.7.1009-1016},
  timestamp = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangCWMC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangCX12,
  author    = {Yulong Huang and
               Zhihao Chen and
               Jianqing Xi},
  title     = {A New {RFID} Tag Code Transformation Approach in Internet of Things},
  journal   = {J. Networks},
  volume    = {7},
  number    = {1},
  pages     = {149--156},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.1.149-156},
  doi       = {10.4304/jnw.7.1.149-156},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangCX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangDCFQ12,
  author    = {Haiping Huang and
               Yi Dou and
               Jiutian Chen and
               Juan Feng and
               Xiaolin Qin},
  title     = {Secure Query in Wireless Sensor Network Using Underground Parties},
  journal   = {J. Networks},
  volume    = {7},
  number    = {12},
  pages     = {2063--2069},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.12.2063-2069},
  doi       = {10.4304/jnw.7.12.2063-2069},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangDCFQ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangDZ12,
  author    = {Yongsheng Huang and
               Huamei Du and
               Genglu Zhang},
  title     = {Clustering Model of {P2P} {CDN} Based on The Prediction of User Requirements},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {532--539},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.532-539},
  doi       = {10.4304/jnw.7.3.532-539},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangDZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangJ12,
  author    = {Zhitong Huang and
               Yuefeng Ji},
  title     = {Future Unified Communication Based on Ubiquitous Hierarchical Generalized-Sensor
               Network Architecture},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {576--583},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.576-583},
  doi       = {10.4304/jnw.7.3.576-583},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLL12,
  author    = {Ruining Huang and
               Lei Li and
               Yunjiang Lou},
  title     = {Research and Construction the Net Monitor System},
  journal   = {J. Networks},
  volume    = {7},
  number    = {7},
  pages     = {1123--1130},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.7.1123-1130},
  doi       = {10.4304/jnw.7.7.1123-1130},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangLL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLLH12,
  author    = {Mei{-}Wen Huang and
               Hsu{-}Jung Liu and
               Min{-}Rui Lin and
               Wen{-}Shyong Hsieh},
  title     = {A Novel Mobile Sink Nodes Protocol for Grid Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1415--1422},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1415-1422},
  doi       = {10.4304/jnw.7.9.1415-1422},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangLLH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLX12,
  author    = {Min Huang and
               Qinpei Liang and
               Jianqing Xi},
  title     = {A Parallel Disjointed Multi-path Routing Algorithm based on {OLSR}
               and Energy in Ad Hoc Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {4},
  pages     = {613--620},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.4.613-620},
  doi       = {10.4304/jnw.7.4.613-620},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangLX12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLZG12,
  author    = {Zhihua Huang and
               Songnian Lu and
               Aixin Zhang and
               Jie Gu},
  title     = {Impact of Feedback on Trust in {P2P} Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {8},
  pages     = {1182--1188},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.8.1182-1188},
  doi       = {10.4304/jnw.7.8.1182-1188},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangLZG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangMCMWR12,
  author    = {Xin Huang and
               Xiao Ma and
               Bangdao Chen and
               Andrew Markham and
               Qinghua Wang and
               Andrew William Roscoe},
  title     = {Human Interactive Secure {ID} Management in Body Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1400--1406},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1400-1406},
  doi       = {10.4304/jnw.7.9.1400-1406},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangMCMWR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangQT12,
  author    = {Yourui Huang and
               Liguo Qu and
               Chaoli Tang},
  title     = {Optimal Coverage Scheme based on {QPSO} in Wireless Sensor Networks},
  journal   = {J. Networks},
  volume    = {7},
  number    = {9},
  pages     = {1362--1368},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.9.1362-1368},
  doi       = {10.4304/jnw.7.9.1362-1368},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangQT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangWH12,
  author    = {Lei Huang and
               Jiabing Wang and
               Xing He},
  title     = {A Graph Clustering Algorithm Providing Scalability},
  journal   = {J. Networks},
  volume    = {7},
  number    = {2},
  pages     = {229--235},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.2.229-235},
  doi       = {10.4304/jnw.7.2.229-235},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/HuangWH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/IslamH12,
  author    = {Md. Motaharul Islam and
               Eui{-}nam Huh},
  title     = {Virtualization in Wireless Sensor Network: Challenges and Opportunities},
  journal   = {J. Networks},
  volume    = {7},
  number    = {3},
  pages     = {412--418},
  year      = {2012},
  url       = {https://doi.org/10.4304/jnw.7.3.412-418},
  doi       = {10.4304/jnw.7.3.412-418},
  timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jnw/IslamH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics