Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijahuc/ijahuc32.bht:"
@article{DBLP:journals/ijahuc/AsadAYAQM19, author = {Muhammad Asad and Muhammad Aslam and Nianmin Yao and Naeem Ayoub and Khalid Ibrahim Qureshi and Ehsan Ullah Munir}, title = {IoT enabled adaptive clustering based energy efficient routing protocol for wireless sensor networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {2}, pages = {133--145}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.102453}, doi = {10.1504/IJAHUC.2019.102453}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/AsadAYAQM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/Boutekkouk19, author = {Fateh Boutekkouk}, title = {Embedded systems codesign under artificial intelligence perspective: a review}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {4}, pages = {257--269}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103265}, doi = {10.1504/IJAHUC.2019.103265}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/Boutekkouk19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/CataniaDMPVT19, author = {Vincenzo Catania and Gaetano Carmelo La Delfa and Salvatore Monteleone and Davide Patti and Daniela Ventura and Giuseppe La Torre}, title = {{GOOSE:} goal oriented orchestration for smart environments}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {3}, pages = {159--170}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103130}, doi = {10.1504/IJAHUC.2019.103130}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/CataniaDMPVT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/Cezayirli19, author = {Ahmet Cezayirli}, title = {Secure and remote firmware update of cellular IoT micro devices with limited resources}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {4}, pages = {270--280}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103267}, doi = {10.1504/IJAHUC.2019.103267}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/Cezayirli19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/FaheemBRANG19, author = {Muhammad Faheem and Rizwan Aslam Butt and Basit Raza and Muhammad Waqar Ashraf and Md. Asri Ngadi and Vehbi Cagri Gungor}, title = {A multi-channel distributed routing scheme for smart grid real-time critical event monitoring applications in the perspective of Industry 4.0}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {4}, pages = {236--256}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103264}, doi = {10.1504/IJAHUC.2019.103264}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/FaheemBRANG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/HalimaB19a, author = {Nadhir Ben Halima and Hatem Boujem{\^{a}}a}, title = {Throughput of cooperative {HARQ} protocols for underlay cognitive radio networks using adaptive and fixed transmit power}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {3}, pages = {147--158}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103129}, doi = {10.1504/IJAHUC.2019.103129}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/HalimaB19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/HanSLJWZ19, author = {Zongyuan Han and Tianyun Shi and Xiaojun Lv and Xinchun Jia and Zhongying Wang and Dong Zhou}, title = {Data gathering maximisation for wireless sensor networks with a mobile sink}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {4}, pages = {224--235}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103263}, doi = {10.1504/IJAHUC.2019.103263}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/HanSLJWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/JordaanM19, author = {Coert Jordaan and Reza Malekian}, title = {Design of a monitoring and safety system for underground mines using wireless sensor networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {1}, pages = {14--28}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.101820}, doi = {10.1504/IJAHUC.2019.101820}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/JordaanM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/KaczorekW19, author = {Jerzy Kaczorek and Bogdan Wiszniewski}, title = {Bilateral multi-issue negotiation of execution contexts by proactive document agents}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {3}, pages = {180--196}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103132}, doi = {10.1504/IJAHUC.2019.103132}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/KaczorekW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/LimbasiyaDY19, author = {Trupil Limbasiya and Debasis Das and Ram Narayan Yadav}, title = {A reputation-based truthfulness paradigm for multi-hop transmission in cognitive radio networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {2}, pages = {110--118}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.102455}, doi = {10.1504/IJAHUC.2019.102455}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/LimbasiyaDY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/NaushadAAJ19, author = {Alamgir Naushad and Ghulam Abbas and Ziaul Haq Abbas and Lei Jiao}, title = {A novel faster failure detection strategy for link connectivity using Hello messaging in mobile ad hoc networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {2}, pages = {75--98}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.102451}, doi = {10.1504/IJAHUC.2019.102451}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/NaushadAAJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/PengCSLZ19, author = {Wei Peng and Dongyan Chen and Wenhui Sun and Chengdong Li and Guiqing Zhang}, title = {Type-2 fuzzy logic based energy-efficient transceiver resource schedule in multi-radio WSNs}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {3}, pages = {197--209}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103133}, doi = {10.1504/IJAHUC.2019.103133}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/PengCSLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/RoyCAN19, author = {Moumita Roy and Chandreyee Chowdhury and Munshi Navid Anjum and Sarmistha Neogy}, title = {Designing secure and reliable mobile agent based system for reliable {MANET}}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {1}, pages = {43--58}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.101822}, doi = {10.1504/IJAHUC.2019.101822}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/RoyCAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SabirAK19, author = {Sonia Sabir and Inayat Ali and Eraj Khan}, title = {{H-LPS:} a hybrid approach for user's location privacy in location-based services}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {3}, pages = {171--179}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103142}, doi = {10.1504/IJAHUC.2019.103142}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/SabirAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SabriA19, author = {Salima Sabri and Abdelouhab Aloui}, title = {A new approach for the recognition of human activities}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {4}, pages = {211--223}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.103259}, doi = {10.1504/IJAHUC.2019.103259}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/SabriA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SabujH19, author = {Saifur Rahman Sabuj and Masanori Hamamura}, title = {Signal technique for friend or foe detection of intelligent malicious user in cognitive radio network}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {1}, pages = {29--42}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.101821}, doi = {10.1504/IJAHUC.2019.101821}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/SabujH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SinghMT19, author = {Wangjam Niranjan Singh and Ningrinla Marchang and Amar Taggu}, title = {Mitigating {SSDF} attack using distance-based outlier approach in cognitive radio networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {2}, pages = {119--132}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.102452}, doi = {10.1504/IJAHUC.2019.102452}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/SinghMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SunithaKK19, author = {G. P. Sunitha and S. M. Dilip Kumar and B. P. Vijay Kumar}, title = {Energy efficient hierarchical multi-path routing protocol to alleviate congestion in {WSN}}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {1}, pages = {59--73}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.101826}, doi = {10.1504/IJAHUC.2019.101826}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/SunithaKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/TorkyMI19, author = {Mohamed Torky and Ali Meligy and Hani Ibrahim}, title = {A challenge-response mechanism for securing online social networks against social bots}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {1}, pages = {1--13}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.101819}, doi = {10.1504/IJAHUC.2019.101819}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/TorkyMI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/XuW19, author = {Pei Xu and Jianguo Wu}, title = {A novel method for time delay prediction in networked control systems}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {32}, number = {2}, pages = {99--109}, year = {2019}, url = {https://doi.org/10.1504/IJAHUC.2019.102454}, doi = {10.1504/IJAHUC.2019.102454}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/XuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.