Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca52.bht:"
@article{DBLP:journals/jnca/AhmadGHSYX15, author = {Raja Wasim Ahmad and Abdullah Gani and Siti Hafizah Ab Hamid and Muhammad Shiraz and Abdullah Yousafzai and Feng Xia}, title = {A survey on virtual machine migration and server consolidation frameworks for cloud data centers}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {11--25}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.002}, doi = {10.1016/J.JNCA.2015.02.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhmadGHSYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhmedGKBK15, author = {Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan and Rajkumar Buyya and Samee Ullah Khan}, title = {Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {154--172}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.03.001}, doi = {10.1016/J.JNCA.2015.03.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhmedGKBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhmedGSHX15, author = {Ejaz Ahmed and Abdullah Gani and Mehdi Sookhak and Siti Hafizah Ab Hamid and Feng Xia}, title = {Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {52--68}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.003}, doi = {10.1016/J.JNCA.2015.02.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhmedGSHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DoDHW15, author = {Tien Van Do and Nam H. Do and {\'{A}}d{\'{a}}m Horv{\'{a}}th and Jinting Wang}, title = {Modelling opportunistic spectrum renting in mobile cellular networks}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {129--138}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.007}, doi = {10.1016/J.JNCA.2015.02.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/DoDHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ElhabyanY15, author = {Riham S. Y. Elhabyan and Mustapha C. E. Yagoub}, title = {Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {116--128}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.004}, doi = {10.1016/J.JNCA.2015.02.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ElhabyanY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Ghaffari15, author = {Ali Ghaffari}, title = {Congestion control mechanisms in wireless sensor networks: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {101--115}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.03.002}, doi = {10.1016/J.JNCA.2015.03.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Ghaffari15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiXWYL15, author = {Hao Ji and Lei Xie and Chuyu Wang and Yafeng Yin and Sanglu Lu}, title = {CrowdSensing: {A} crowd-sourcing based indoor navigation using RFID-based delay tolerant network}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {79--89}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.010}, doi = {10.1016/J.JNCA.2015.02.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JiXWYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiangMZWS15, author = {Wei Jiang and Yue Ma and Xia Zhang and Xupeng Wang and Zili Shao}, title = {Adaptive security management of real-time storage applications over {NAND} based storage systems}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {139--153}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.009}, doi = {10.1016/J.JNCA.2015.02.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JiangMZWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanRS15, author = {Athar Ali Khan and Mubashir Husain Rehmani and Yasir Saleem}, title = {Neighbor discovery in traditional wireless networks and cognitive radio networks: Basics, taxonomy, challenges and future research directions}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {173--190}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.03.003}, doi = {10.1016/J.JNCA.2015.03.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KhanRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinTWL15, author = {Ying{-}Dar Lin and Minh{-}Tuan Thai and Chih{-}Chiang Wang and Yuan{-}Cheng Lai}, title = {Two-tier project and job scheduling for SaaS cloud service providers}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {26--36}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.008}, doi = {10.1016/J.JNCA.2015.02.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinTWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SunZCQ15, author = {Guodong Sun and Lin Zhao and Zhibo Chen and Guofu Qiao}, title = {Effective link interference model in topology control of wireless Ad hoc and sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {69--78}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.01.006}, doi = {10.1016/J.JNCA.2015.01.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SunZCQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TaoHLYZ15, author = {Ming Tao and Shuqiang Huang and Yang Li and Min Yan and Yuyu Zhou}, title = {{SA-PSO} based optimizing reader deployment in large-scale {RFID} Systems}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {90--100}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.011}, doi = {10.1016/J.JNCA.2015.02.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TaoHLYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ThompsonMIHS15, author = {Elizabeth A. Thompson and Charles McIntosh and James Isaacs and Eric Harmison and Ross Sneary}, title = {Robot communication link using 802.11n or 900 MHz {OFDM}}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {37--51}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.005}, doi = {10.1016/J.JNCA.2015.02.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ThompsonMIHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/VasilakosLSY15, author = {Athanasios V. Vasilakos and Zhe Li and Gwendal Simon and Wei You}, title = {Information centric network: Research challenges and opportunities}, journal = {J. Netw. Comput. Appl.}, volume = {52}, pages = {1--10}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.02.001}, doi = {10.1016/J.JNCA.2015.02.001}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/VasilakosLSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.