default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca36.bht:"
@article{DBLP:journals/jnca/0002YZ13, author = {Bing Hu and Kwan L. Yeung and Zhaoyang Zhang}, title = {An efficient single-iteration single-bit request scheduling algorithm for input-queued switches}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {187--194}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.006}, doi = {10.1016/J.JNCA.2012.09.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/0002YZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AdabiMRB13, author = {Sepideh Adabi and Ali Movaghar and Amir Masoud Rahmani and Hamid Beigy}, title = {Market{\_}based grid resource allocation using new negotiation model}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {543--565}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.02.008}, doi = {10.1016/J.JNCA.2012.02.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AdabiMRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AkkayaSV13, author = {Kemal Akkaya and Izzet F. Senturk and Shanthi Vemulapalli}, title = {Handling large-scale node failures in mobile sensor/robot networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {195--210}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.005}, doi = {10.1016/J.JNCA.2012.09.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AkkayaSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Al-TurjmanHI13, author = {Fadi M. Al{-}Turjman and Hossam S. Hassanein and Mohamed Ibnkahla}, title = {Quantifying connectivity in wireless sensor networks with grid-based deployments}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {368--377}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.006}, doi = {10.1016/J.JNCA.2012.05.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Al-TurjmanHI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Al-shugranGHNA13, author = {Mahmoud Al{-}shugran and Osman Ghazali and Suhaidi Hassan and Kashif Nisar and A. Suki M. Arif}, title = {A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {887--897}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.008}, doi = {10.1016/J.JNCA.2012.10.008}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Al-shugranGHNA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlizaiWKW13, author = {Muhammad Hamad Alizai and Hanno Wirtz and Bernhard Kirchen and Klaus Wehrle}, title = {Portable wireless-networking protocol evaluation}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1230--1242}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.022}, doi = {10.1016/J.JNCA.2013.02.022}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AlizaiWKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlvaroB13, author = {Jes{\'{u}}s L. Alvaro and Beatriz Barros}, title = {A new cloud computing architecture for music composition}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {429--443}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.015}, doi = {10.1016/J.JNCA.2012.04.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AlvaroB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AnGZJY13, author = {Jian An and Xiaolin Gui and Wendong Zhang and Jinghua Jiang and Jianwei Yang}, title = {Research on social relations cognitive model of mobile nodes in Internet of Things}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {799--810}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.004}, doi = {10.1016/J.JNCA.2012.12.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AnGZJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AntonopoulosSV13, author = {Angelos Antonopoulos and Charalabos Skianis and Christos V. Verikoukis}, title = {Network coding-based cooperative {ARQ} scheme for VANETs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1001--1007}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.03.012}, doi = {10.1016/J.JNCA.2012.03.012}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AntonopoulosSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AntunesSCP13, author = {Pedro Antunes and David Sim{\~{o}}es and Lu{\'{\i}}s Carri{\c{c}}o and Jos{\'{e}} A. Pino}, title = {An end-user approach to business process modeling}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1466--1479}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.03.014}, doi = {10.1016/J.JNCA.2013.03.014}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AntunesSCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AstorgaATH13, author = {Jasone Astorga and Marina Aguado and Nerea Toledo and Marivi Higuero}, title = {A high performance link layer mobility management strategy for professional private broadband networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1152--1163}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.005}, doi = {10.1016/J.JNCA.2013.01.005}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AstorgaATH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BahGD13, author = {Slimane Bah and Roch H. Glitho and Rachida Dssouli}, title = {A {SIP} servlets-based framework for service provisioning in stand-alone MANETs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {147--155}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.005}, doi = {10.1016/J.JNCA.2012.10.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BahGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BaigAJ13, author = {Imran Baig and Muhammad Ayaz and Varun Jeoti}, title = {On the peak-to-average power ratio reduction in mobile WiMAX: {A} discrete cosine transform matrix precoding based random-interleaved orthogonal frequency division multiple access uplink system}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {466--475}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.012}, doi = {10.1016/J.JNCA.2012.04.012}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BaigAJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BakshiTR13, author = {Aishwarya Bakshi and Amir Talaei{-}Khoei and Pradeep Ray}, title = {Adaptive policy framework: {A} systematic review}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1261--1271}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.007}, doi = {10.1016/J.JNCA.2012.12.007}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BakshiTR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BaskaranCLW13, author = {Vishnu Monn Baskaran and Yoong Choon Chang and Jonathan Loo and KokSheik Wong}, title = {Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {336--352}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.008}, doi = {10.1016/J.JNCA.2012.05.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BaskaranCLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BauzaG13, author = {Ramon Bauza and Javier Goz{\'{a}}lvez}, title = {Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1295--1307}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.02.007}, doi = {10.1016/J.JNCA.2012.02.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BauzaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BelmonteDPR13, author = {Mar{\'{\i}}a{-}Victoria Belmonte and Manuel D{\'{\i}}az and Jos{\'{e}}{-}Luis P{\'{e}}rez{-}de{-}la{-}Cruz and Ana Reyna}, title = {{COINS:} COalitions and INcentiveS for effective Peer-to-Peer downloads}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {484--497}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.010}, doi = {10.1016/J.JNCA.2012.04.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BelmonteDPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BernardinoBSPV13, author = {Eug{\'{e}}nia Moreira Bernardino and Anabela Moreira Bernardino and Juan Manuel S{\'{a}}nchez{-}P{\'{e}}rez and Juan Antonio G{\'{o}}mez Pulido and Miguel A. Vega{-}Rodr{\'{\i}}guez}, title = {Swarm optimisation algorithms applied to large balanced communication networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {504--522}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.005}, doi = {10.1016/J.JNCA.2012.04.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BernardinoBSPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BilalBG13, author = {Sardar Muhammad Bilal and Carlos Jesus Bernardos and Carmen Guerrero}, title = {Position-based routing in vehicular networks: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {685--697}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.023}, doi = {10.1016/J.JNCA.2012.12.023}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BilalBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BitamM13, author = {Salim Bitam and Abdelhamid Mellouk}, title = {Bee life-based multi constraints multicast routing optimization for vehicular ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {981--991}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.01.023}, doi = {10.1016/J.JNCA.2012.01.023}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BitamM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BoteroMHA13, author = {Juan Felipe Botero and Miguel Molina and Xavier Hesselbach{-}Serra and Jos{\'{e}} Roberto Amazonas}, title = {A novel paths algebra-based strategy to flexibly solve the link mapping stage of {VNE} problems}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1735--1752}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.029}, doi = {10.1016/J.JNCA.2013.02.029}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BoteroMHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BragaCOASMS13, author = {Reinaldo Bezerra Braga and Igor A. Chaves and Carina Teixeira de Oliveira and Rossana M. C. Andrade and Jos{\'{e}} Neuman de Souza and Herv{\'{e}} Martin and Bruno Schulze}, title = {{RETENTION:} {A} reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {274--283}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.06.002}, doi = {10.1016/J.JNCA.2012.06.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BragaCOASMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CampoloCMS13, author = {Claudia Campolo and Hector Agustin Cozzetti and Antonella Molinaro and Riccardo Scopigno}, title = {Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1275--1286}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.001}, doi = {10.1016/J.JNCA.2012.04.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/CampoloCMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CanlarCCP13, author = {Ey{\"{u}}p S. Canlar and Mauro Conti and Bruno Crispo and Roberto Di Pietro}, title = {Windows Mobile LiveSD Forensics}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {677--684}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.024}, doi = {10.1016/J.JNCA.2012.12.024}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CanlarCCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CerveraBGK13, author = {Gimer Cervera and Michel Barbeau and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis}, title = {A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {744--755}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.013}, doi = {10.1016/J.JNCA.2012.12.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CerveraBGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChanLH13, author = {Gaik{-}Yee Chan and Chien{-}Sing Lee and Swee{-}Huay Heng}, title = {Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {829--842}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.11.006}, doi = {10.1016/J.JNCA.2012.11.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChanLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChangK13, author = {Ting{-}Yi Chang and Yan{-}Ru Ke}, title = {A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {533--542}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.002}, doi = {10.1016/J.JNCA.2012.04.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChangK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChenZLWW13, author = {Ting Chen and Xiaosong Zhang and Hong{-}yuan Li and Dong Wang and Yue Wu}, title = {Propagation modeling of active {P2P} worms based on ternary matrix}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1387--1394}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.032}, doi = {10.1016/J.JNCA.2013.02.032}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ChenZLWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChengHCZ13, author = {Yuan Cheng and Fazhi He and Xiantao Cai and Dejun Zhang}, title = {A group Undo/Redo method in 3D collaborative modeling systems with performance evaluation}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1512--1522}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.04.012}, doi = {10.1016/J.JNCA.2013.04.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChengHCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DaiZG13, author = {Huan Dai and Zhaomin Zhu and Xiaofeng Gu}, title = {Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {228--234}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.08.013}, doi = {10.1016/J.JNCA.2012.08.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DaiZG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DiezACR13, author = {Isabel de la Torre D{\'{\i}}ez and Sa{\'{u}}l {\'{A}}lvaro{-}Mu{\~{n}}oz and Miguel L{\'{o}}pez Coronado and Joel J. P. C. Rodrigues}, title = {Development and performance evaluation of a new {RSS} tool for a Web-based system: RSS{\_}PROYECT}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {255--261}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.06.004}, doi = {10.1016/J.JNCA.2012.06.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DiezACR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DumezBGWL13, author = {Christophe Dumez and Mohamed Bakhouya and Jaafar Gaber and Maxime Wack and Pascal Lorenz}, title = {Model-driven approach supporting formal verification for web service composition protocols}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1102--1115}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.009}, doi = {10.1016/J.JNCA.2013.01.009}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DumezBGWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/El-AlfyMS13, author = {El{-}Sayed M. El{-}Alfy and Mujahid N. Syed and Shokri Z. Selim}, title = {A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in {MPLS/GMPLS} networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1196--1207}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.008}, doi = {10.1016/J.JNCA.2013.02.008}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/El-AlfyMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/EmmanouilidisKT13, author = {Christos Emmanouilidis and Remous{-}Aris Koutsiamanis and Aimilia Tasidou}, title = {Mobile guides: Taxonomy of architectures, context awareness, technologies and applications}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {103--125}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.007}, doi = {10.1016/J.JNCA.2012.04.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/EmmanouilidisKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/EverGKG13, author = {Enver Ever and Orhan Gemikonakli and Altan Ko{\c{c}}yigit and Eser Gemikonakli}, title = {A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {908--926}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.006}, doi = {10.1016/J.JNCA.2012.10.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/EverGKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FamaeyIWT13, author = {Jeroen Famaey and Fr{\'{e}}d{\'{e}}ric Iterbeke and Tim Wauters and Filip De Turck}, title = {Towards a predictive cache replacement strategy for multimedia content}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {219--227}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.08.014}, doi = {10.1016/J.JNCA.2012.08.014}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/FamaeyIWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FonsecaV13, author = {Ant{\'{o}}nio Fonseca and Teresa Maria Vaz{\~{a}}o}, title = {Applicability of position-based routing for {VANET} in highways and urban environment}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {961--973}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.03.009}, doi = {10.1016/J.JNCA.2012.03.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FonsecaV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FuJC13, author = {Leijie Fu and Pingyu Jiang and Wei Cao}, title = {Modeling and performance analysis of product development process network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1489--1502}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.006}, doi = {10.1016/J.JNCA.2013.02.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FuJC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GallardoMBR13, author = {Jes{\'{u}}s Gallardo and Ana I. Molina and Crescencio Bravo and Miguel A. Redondo}, title = {A model-driven and task-oriented method for the development of collaborative systems}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1551--1565}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.03.016}, doi = {10.1016/J.JNCA.2013.03.016}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/GallardoMBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GananMEMHA13, author = {Carlos Ga{\~{n}}{\'{a}}n and Jose L. Mu{\~{n}}oz and Oscar Esparza and Jorge Mata{-}D{\'{\i}}az and Juan Hern{\'{a}}ndez{-}Serrano and Juanjo Alins}, title = {{COACH:} COllaborative certificate stAtus CHecking mechanism for VANETs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1337--1351}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.02.006}, doi = {10.1016/J.JNCA.2012.02.006}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/GananMEMHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GeetaNB13, author = {Geetha Dundesh Devanagavi and N. Nalini and Rajashekhar C. Biradar}, title = {Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1174--1185}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.005}, doi = {10.1016/J.JNCA.2013.02.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/GeetaNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuLQYLY13, author = {Dujuan Gu and Xiaohan Liu and Gang Qin and Shuangjian Yan and Ze Luo and Baoping Yan}, title = {{VNET6:} IPv6 virtual network for the collaboration between applications and networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1579--1588}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.011}, doi = {10.1016/J.JNCA.2013.02.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuLQYLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuoZWYZ13, author = {Bin Guo and Daqing Zhang and Zhu Wang and Zhiwen Yu and Xingshe Zhou}, title = {Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1531--1539}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.028}, doi = {10.1016/J.JNCA.2012.12.028}, timestamp = {Wed, 11 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuoZWYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HadjidjSBCO13, author = {Abdelkrim Hadjidj and Marion Souil and Abdelmadjid Bouabdallah and Yacine Challal and Henry L. Owen}, title = {Wireless sensor networks for rehabilitation applications: Challenges and opportunities}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {1--15}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.002}, doi = {10.1016/J.JNCA.2012.10.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HadjidjSBCO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HaiderGK13, author = {Ammar Haider and Iqbal Gondal and Joarder Kamruzzaman}, title = {Social-connectivity-aware vertical handover for heterogeneous wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1131--1139}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.010}, doi = {10.1016/J.JNCA.2013.01.010}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HaiderGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HanJK13, author = {Seung{-}Wan Han and In{-}Seon Jeong and Seung{-}Ho Kang}, title = {Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {156--166}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.003}, doi = {10.1016/J.JNCA.2012.10.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HanJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HassanH13, author = {Md. Mahedi Hassan and Poo Kuan Hoong}, title = {Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {66--76}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.020}, doi = {10.1016/J.JNCA.2012.04.020}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HassanH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HeNM13, author = {Xiaobing He and Michael Niedermeier and Hermann de Meer}, title = {Dynamic key management in wireless sensor networks: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {611--622}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.010}, doi = {10.1016/J.JNCA.2012.12.010}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HeNM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HooshmandSKSS13, author = {Mohsen Hooshmand and S. Mohamad R. Soroushmehr and Pejman Khadivi and Shadrokh Samavi and Shahram Shirani}, title = {Visual sensor network lifetime maximization by prioritized scheduling of nodes}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {409--419}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.017}, doi = {10.1016/J.JNCA.2012.04.017}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HooshmandSKSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HouGG13, author = {Weigang Hou and Lei Guo and Xiaoxue Gong}, title = {Survivable power efficiency oriented integrated grooming in green networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {420--428}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.016}, doi = {10.1016/J.JNCA.2012.04.016}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HouGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HsuS13, author = {Wu{-}Hsiao Hsu and Yuh{-}Pyng Shieh}, title = {Virtual network mapping algorithm in the cloud infrastructure}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1724--1734}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.028}, doi = {10.1016/J.JNCA.2013.02.028}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HsuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuangXLX13, author = {Kun Huang and Gaogang Xie and Rui Li and Shuai Xiong}, title = {Fast and deterministic hash table lookup using discriminative bloom filters}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {657--666}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.031}, doi = {10.1016/J.JNCA.2012.12.031}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HuangXLX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IbanezRMK13, author = {Mar{\'{\i}}a{-}Blanca Ib{\'{a}}{\~{n}}ez{-}Espiga and Jos{\'{e}} Jes{\'{u}}s Garc{\'{\i}}a Rueda and David Maroto and Carlos Delgado Kloos}, title = {Collaborative learning in multi-user virtual environments}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1566--1576}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.027}, doi = {10.1016/J.JNCA.2012.12.027}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IbanezRMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IqbalSJC13, author = {Rahat Iqbal and Nazaraf Shah and Anne E. James and Tomasz Cichowicz}, title = {Integration, optimization and usability of enterprise applications}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1480--1488}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.009}, doi = {10.1016/J.JNCA.2013.02.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/IqbalSJC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IslamA13, author = {Md. Rafiqul Islam and Jemal H. Abawajy}, title = {A multi-tier phishing detection and filtering approach}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {324--335}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.009}, doi = {10.1016/J.JNCA.2012.05.009}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IslamA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IslamTBV13, author = {Md. Rafiqul Islam and Ronghua Tian and Lynn Margaret Batten and Steven Versteeg}, title = {Classification of malware based on integrated static and dynamic features}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {646--656}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.004}, doi = {10.1016/J.JNCA.2012.10.004}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IslamTBV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JamaliHE13, author = {Shahram Jamali and Seyyed Nasser Seyyed Hashemi and Amir{-}Masoud Eftekhari{-}Moghadam}, title = {On the use of a full information feedback to stabilize {RED}}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {858--869}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.11.002}, doi = {10.1016/J.JNCA.2012.11.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JamaliHE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JappinenGC13, author = {Pekka J{\"{a}}ppinen and Renata Guarneri and Lu{\'{\i}}s M. Correia}, title = {An applications perspective into the Future Internet}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {249--254}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.08.009}, doi = {10.1016/J.JNCA.2012.08.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JappinenGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiangLLT13, author = {Jian Jiang and Wei Li and Junzhou Luo and Jing Tan}, title = {A network accountability based verification mechanism for detecting inter-domain routing path inconsistency}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1671--1683}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.029}, doi = {10.1016/J.JNCA.2012.12.029}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JiangLLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KabirMA13, author = {Md. Humayun Kabir and Mohammad Mukhtaruzzaman and Mohammed Atiquzzaman}, title = {Efficient route optimization scheme for nested-NEMO}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1039--1049}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.026}, doi = {10.1016/J.JNCA.2012.12.026}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KabirMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KimPR13, author = {Minwoo Kim and Karam Park and Won Woo Ro}, title = {Benefits of using parallelized non-progressive network coding}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {293--305}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.014}, doi = {10.1016/J.JNCA.2012.05.014}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KimPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KretschmerBG13, author = {Mathias Kretschmer and Philipp Batroff and George Ghinea}, title = {Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {698--710}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.022}, doi = {10.1016/J.JNCA.2012.12.022}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KretschmerBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KumarK13, author = {Mahesh Kumar and Shishir Kumar}, title = {{AGRIB-BHF:} {A} sustainable and fault tolerant aggregation}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {881--886}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.009}, doi = {10.1016/J.JNCA.2012.10.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KumarK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LarL13, author = {Saleem{-}Ullah Lar and Xiaofeng Liao}, title = {An initiative for a classified bibliography on {TCP/IP} congestion control}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {126--133}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.003}, doi = {10.1016/J.JNCA.2012.04.003}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LarL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LatreFST13, author = {Steven Latr{\'{e}} and Jeroen Famaey and John Strassner and Filip De Turck}, title = {Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1405--1417}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.011}, doi = {10.1016/J.JNCA.2013.01.011}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LatreFST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LeeSLY13, author = {Chao{-}Yang Lee and Liang{-}Cheng Shiu and Fu{-}Tian Lin and Chu{-}Sing Yang}, title = {Distributed topology control algorithm on broadcasting in wireless sensor network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1186--1195}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.010}, doi = {10.1016/J.JNCA.2013.02.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LeeSLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiN13, author = {Li Ho Leung and Vincent T. Y. Ng}, title = {Discovering associations between news and contents in social network sites with the D-Miner service framework}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1651--1659}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.04.013}, doi = {10.1016/J.JNCA.2013.04.013}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiNKL13, author = {Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao}, title = {An enhanced smart card based remote user password authentication scheme}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1365--1371}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.034}, doi = {10.1016/J.JNCA.2013.02.034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiNKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiSBG13, author = {Bingdong Li and Jeff Springer and George Bebis and Mehmet Hadi Gunes}, title = {A survey of network flow applications}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {567--581}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.020}, doi = {10.1016/J.JNCA.2012.12.020}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiSBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiWC13, author = {Mingfu Li and Yueh{-}Lin Wu and Chia{-}Rong Chang}, title = {Available bandwidth estimation for the network paths with multiple tight links and bursty traffic}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {353--367}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.007}, doi = {10.1016/J.JNCA.2012.05.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiZWC13, author = {Wenfeng Li and Ye Zhong and Xun Wang and Yulian Cao}, title = {Resource virtualization and service selection in cloud logistics}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1696--1704}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.019}, doi = {10.1016/J.JNCA.2013.02.019}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiZWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LianHS13, author = {Kuang{-}Yow Lian and Sung{-}Jung Hsiao and Wen{-}Tsai Sung}, title = {Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {756--767}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.012}, doi = {10.1016/J.JNCA.2012.12.012}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LianHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiaoLLT13, author = {Hung{-}Jen Liao and Chun{-}Hung Richard Lin and Ying{-}Chih Lin and Kuang{-}Yuan Tung}, title = {Intrusion detection system: {A} comprehensive review}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {16--24}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.004}, doi = {10.1016/J.JNCA.2012.09.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiaoLLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Lin13, author = {Kai Lin}, title = {Research on adaptive target tracking in vehicle sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1316--1323}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.01.001}, doi = {10.1016/J.JNCA.2012.01.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Lin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinHLDC13, author = {Ying{-}Dar Lin and Cheng{-}Yuan Ho and Yuan{-}Cheng Lai and Tzu{-}Hsiung Du and Shun{-}Lee Chang}, title = {Booting, browsing and streaming time profiling, and bottleneck analysis on android-based systems}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1208--1218}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.024}, doi = {10.1016/J.JNCA.2013.02.024}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinHLDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinL13, author = {Po{-}Ching Lin and Jia{-}Hau Lee}, title = {Re-examining the performance bottleneck in a {NIDS} with detailed profiling}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {768--780}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.009}, doi = {10.1016/J.JNCA.2012.12.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuNMSHW13, author = {Yazhi Liu and Jianwei Niu and Jian Ma and Lei Shu and Takahiro Hara and Wendong Wang}, title = {The insights of message delivery delay in VANETs with a bidirectional traffic model}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1287--1294}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.01.010}, doi = {10.1016/J.JNCA.2012.01.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiuNMSHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuSMLG13, author = {Yejun Liu and Qingyang Song and Rui Ma and Bing Li and Bo Gong}, title = {Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1057--1069}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.014}, doi = {10.1016/J.JNCA.2013.01.014}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiuSMLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuSSW13, author = {Yanheng Liu and Longxiang Suo and Dayang Sun and Aimin Wang}, title = {A virtual square grid-based coverage algorithm of redundant node for wireless sensor network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {811--817}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.003}, doi = {10.1016/J.JNCA.2012.12.003}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiuSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LloretCCG13, author = {Jaime Lloret and Alejandro Canovas and Angel Catala and Miguel Garcia}, title = {Group-based protocol and mobility model for VANETs to offer internet access}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1027--1038}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.02.009}, doi = {10.1016/J.JNCA.2012.02.009}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LloretCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LooneyG13, author = {Mary Looney and Oliver Gough}, title = {A provision aware proportional fair sharing three colour marker}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {476--483}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.011}, doi = {10.1016/J.JNCA.2012.04.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LooneyG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LuTCC13, author = {Ta{-}Ping Lu and Amy J. C. Trappey and Yi{-}Kuang Chen and Yu{-}Da Chang}, title = {Collaborative design and analysis of supply chain network management key processes model}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1503--1511}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.03.015}, doi = {10.1016/J.JNCA.2013.03.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LuTCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LuoLC13, author = {Shiliang Luo and Xu Lu and Lianglun Cheng}, title = {{TSOIA:} An efficient node selection algorithm facing the uncertain process for Internet of Things}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {738--743}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.015}, doi = {10.1016/J.JNCA.2012.12.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LuoLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LuoY13, author = {Jian{-}Zhen Luo and Shun{-}Zheng Yu}, title = {Position-based automatic reverse engineering of network protocols}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1070--1077}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.013}, doi = {10.1016/J.JNCA.2013.01.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LuoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LuuT13, author = {Hai Van Luu and Xueyan Tang}, title = {Constructing rings overlay for robust data collection in wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1372--1386}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.033}, doi = {10.1016/J.JNCA.2013.02.033}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LuuT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LvMLMZ13, author = {Chao Lv and Maode Ma and Hui Li and Jianfeng Ma and Yaoyu Zhang}, title = {An novel three-party authenticated key exchange protocol using one-time key}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {498--503}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.006}, doi = {10.1016/J.JNCA.2012.04.006}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LvMLMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MahdipourRS13, author = {Ebrahim Mahdipour and Amir Masoud Rahmani and Saeed Setayeshi}, title = {Importance sampling for Jackson networks with customer impatience until the end of service}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1091--1101}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.016}, doi = {10.1016/J.JNCA.2013.01.016}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MahdipourRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MansouriDM13, author = {Najme Mansouri and Gholamhosein Dastghaibyfard and Ehsan Mansouri}, title = {Combination of data replication and scheduling algorithm for improving data availability in Data Grids}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {711--722}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.021}, doi = {10.1016/J.JNCA.2012.12.021}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MansouriDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Martin-CampilloCYM13, author = {Abraham Mart{\'{\i}}n{-}Campillo and Jon Crowcroft and Eiko Yoneki and Ramon Mart{\'{\i}}}, title = {Evaluating opportunistic networks in disaster scenarios}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {870--880}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.11.001}, doi = {10.1016/J.JNCA.2012.11.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Martin-CampilloCYM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MartinezGSL13, author = {Dami{\`{a}} Castell{\`{a}} Mart{\'{\i}}nez and Francesc Gin{\'{e}} and Francesc Solsona and Josep L. L{\'{e}}rida}, title = {Analyzing locality over a {P2P} computing architecture}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1610--1619}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.032}, doi = {10.1016/J.JNCA.2012.12.032}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MartinezGSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MasdariBB13, author = {Mohammad Masdari and Sadegh Mohammadzadeh Bazarchi and Moazam Bidaki}, title = {Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1243--1260}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.017}, doi = {10.1016/J.JNCA.2012.12.017}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MasdariBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MaslekarMBL13, author = {Nitin Maslekar and Joseph Mouzna and Mounir Boussedjra and Houda Labiod}, title = {{CATS:} An adaptive traffic signal system based on car-to-car communication}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1308--1315}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.011}, doi = {10.1016/J.JNCA.2012.05.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MaslekarMBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MhiriSB13, author = {Fadoua Mhiri and Kaouthar Sethom and Ridha Bouallegue}, title = {A survey on interference management techniques in femtocell self-organizing networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {58--65}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.021}, doi = {10.1016/J.JNCA.2012.04.021}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MhiriSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ModiPBPPR13, author = {Chirag Modi and Dhiren R. Patel and Bhavesh Borisaniya and Hiren Patel and Avi Patel and Muttukrishnan Rajarajan}, title = {A survey of intrusion detection techniques in Cloud}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {42--57}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.003}, doi = {10.1016/J.JNCA.2012.05.003}, timestamp = {Sun, 22 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ModiPBPPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MohamedAE13, author = {Nader Mohamed and Jameela Al{-}Jaroodi and Abdulla Eid}, title = {A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1116--1130}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.006}, doi = {10.1016/J.JNCA.2013.01.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MohamedAE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MohammedDHIXQY13, author = {Ahmed Hassan Mohammed and Bin Dai and Benxiong Huang and Muhammad Azhar Iqbal and Guan Xu and Peng Qin and Shui Yu}, title = {A survey and tutorial of wireless relay network protocols based on network coding}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {593--610}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.018}, doi = {10.1016/J.JNCA.2012.12.018}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MohammedDHIXQY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NairSCP13, author = {Rajashree Nair and Ben Soh and Naveen K. Chilamkurti and Jong Hyuk Park}, title = {Structure-free message aggregation and routing in traffic information system {(SMART)}}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {974--980}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.008}, doi = {10.1016/J.JNCA.2012.04.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/NairSCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NieJG13, author = {Laisen Nie and Dingde Jiang and Lei Guo}, title = {A power laws-based reconstruction approach to end-to-end network traffic}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {898--907}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.007}, doi = {10.1016/J.JNCA.2012.10.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/NieJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NisarAHS13, author = {Kashif Nisar and Angela Amphawan and Suhaidi Hassan and Nurul I. Sarkar}, title = {A comprehensive survey on scheduler for VoIP over {WLAN}}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {933--948}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.07.019}, doi = {10.1016/J.JNCA.2012.07.019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/NisarAHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PanL13, author = {Yuanyuan Pan and Jianqing Li}, title = {Cooperative pseudonym change scheme based on the number of neighbors in VANETs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1599--1609}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.003}, doi = {10.1016/J.JNCA.2013.02.003}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/PanL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PantoniB13, author = {Rodrigo Palucci Pantoni and Dennis Brand{\~{a}}o}, title = {A gradient based routing scheme for street lighting wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {77--90}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.019}, doi = {10.1016/J.JNCA.2012.04.019}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PantoniB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PatelTBJ13, author = {Ahmed Patel and Mona Taghavi and Kaveh Bakhtiyari and Joaquim Celestino J{\'{u}}nior}, title = {An intrusion detection and prevention system in cloud computing: {A} systematic review}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {25--41}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.08.007}, doi = {10.1016/J.JNCA.2012.08.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PatelTBJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PengC13, author = {I{-}Hsuan Peng and Yen{-}Wen Chen}, title = {Energy consumption bounds analysis and its applications for grid based wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {444--451}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.014}, doi = {10.1016/J.JNCA.2012.04.014}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PengC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PengYGJG13, author = {Yuhuai Peng and Yao Yu and Lei Guo and Dingde Jiang and Qiming Gai}, title = {An efficient joint channel assignment and QoS routing protocol for {IEEE} 802.11 multi-radio multi-channel wireless mesh networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {843--857}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.11.003}, doi = {10.1016/J.JNCA.2012.11.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PengYGJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QaziRMS13, author = {Shams Qazi and Raad Raad and Yi Mu and Willy Susilo}, title = {Securing {DSR} against wormhole attacks in multirate ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {582--592}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.019}, doi = {10.1016/J.JNCA.2012.12.019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/QaziRMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RajeshN13, author = {Anbazhagan Rajesh and Rangaswamy Nakkeeran}, title = {Investigation on uplink collaborative contention-based bandwidth request for WiMAX three hop relay networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1589--1598}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.001}, doi = {10.1016/J.JNCA.2013.01.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RajeshN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RashidAAZ13, author = {Sulma Rashid and Abdul Hanan Abdullah and Qaisar Ayub and Mohd Soperi Mohd Zahid}, title = {Dynamic Prediction based Multi Queue {(DPMQ)} drop policy for probabilistic routing protocols of delay tolerant network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1395--1402}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.030}, doi = {10.1016/J.JNCA.2013.02.030}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RashidAAZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RathnayakaP13, author = {A. J. Dinusha Rathnayaka and Vidyasagar M. Potdar}, title = {Wireless Sensor Network transport protocol: {A} critical review}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {134--146}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2011.10.001}, doi = {10.1016/J.JNCA.2011.10.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RathnayakaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RodriguesHCJV13, author = {Joel J. P. C. Rodrigues and Russell Hsing and Min Chen and Bingli Jiao and Binod Vaidya}, title = {Guest Editorial on Vehicular Networking Protocols}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {959--960}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.03.006}, doi = {10.1016/J.JNCA.2013.03.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RodriguesHCJV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RodriguesHCJV13a, author = {Joel J. P. C. Rodrigues and Russell Hsing and Min Chen and Bingli Jiao and Binod Vaidya}, title = {Guest editorial on vehicular communications and applications}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1273--1274}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.07.004}, doi = {10.1016/J.JNCA.2013.07.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RodriguesHCJV13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RosaciS13, author = {Domenico Rosaci and Giuseppe M. L. Sarn{\`{e}}}, title = {Cloning mechanisms to improve agent performances}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {402--408}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.018}, doi = {10.1016/J.JNCA.2012.04.018}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RosaciS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SaifO13, author = {Anwar Saif and Mohamed Othman}, title = {{SRA-MSDU:} Enhanced {A-MSDU} frame aggregation with selective retransmission in 802.11n wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1219--1229}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.023}, doi = {10.1016/J.JNCA.2013.02.023}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SaifO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SalahH13, author = {Khaled Salah and Mohamed Hamawi}, title = {Performance of IP-forwarding of Linux hosts with multiple network interfaces}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {452--465}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.013}, doi = {10.1016/J.JNCA.2012.04.013}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SalahH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SalamehB13, author = {Haythem Bany Salameh and Osamah S. Badarneh}, title = {Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {523--532}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.004}, doi = {10.1016/J.JNCA.2012.04.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SalamehB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SeyedzadeganOAS13, author = {Mojtaba Seyedzadegan and Mohamed Othman and Borhanuddin Mohd Ali and Shamala Subramaniam}, title = {Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1705--1723}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.031}, doi = {10.1016/J.JNCA.2013.02.031}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SeyedzadeganOAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShenL13, author = {Weiming Shen and Weidong Li}, title = {Collaboration technologies and applications}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1403--1404}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.10.012}, doi = {10.1016/J.JNCA.2013.10.012}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ShenL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShenL13a, author = {Weiming Shen and Weidong Li}, title = {Collaboration computing technologies and applications}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1577--1578}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.10.013}, doi = {10.1016/J.JNCA.2013.10.013}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ShenL13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShiLNH13, author = {Jiancheng Shi and Jianhua Liu and Ruxin Ning and Weiwei Hou}, title = {A collisions evaluation method in virtual environment for collaborativeassembly}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1523--1530}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.003}, doi = {10.1016/J.JNCA.2013.01.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ShiLNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SoaresSB13, author = {Diego Carvalho Soares and Fl{\'{a}}via Maria Santoro and Fernanda Ara{\'{u}}jo Bai{\~{a}}o}, title = {Discovering collaborative knowledge-intensive processes through e-mail mining}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1451--1465}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.007}, doi = {10.1016/J.JNCA.2013.02.007}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SoaresSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TadayonKAWM13, author = {Navid Tadayon and Sasan Khoshroo and Elaheh Askari and Honggang Wang and Howard Michel}, title = {Power management in SMAC-based energy-harvesting wireless sensor networks using queuing analysis}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1008--1017}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.01.009}, doi = {10.1016/J.JNCA.2012.01.009}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/TadayonKAWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TahanDP13, author = {Marjan Naderan Tahan and Mehdi Dehghan and Hossein Pedram}, title = {Sensing task assignment via sensor selection for maximum target coverage in WSNs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {262--273}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.06.003}, doi = {10.1016/J.JNCA.2012.06.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TahanDP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TalayA13, author = {A. Cagatay Talay and D. Turgay Altilar}, title = {Self adaptive routing for dynamic spectrum access in cognitive radio networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1140--1151}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.007}, doi = {10.1016/J.JNCA.2013.01.007}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/TalayA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ToledoBH13, author = {Nerea Toledo and Jean{-}Marie Bonnin and Marivi Higuero}, title = {Performance evaluation of user applications in the {ITS} scenario: An analytical assessment of the NeMHIP}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1324--1336}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.02.005}, doi = {10.1016/J.JNCA.2012.02.005}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ToledoBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TorrentoCS13, author = {Josep Rius and Fernando Cores and Francesc Solsona}, title = {Cooperative scheduling mechanism for large-scale peer-to-peer computing systems}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1620--1631}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.002}, doi = {10.1016/J.JNCA.2013.01.002}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/TorrentoCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TrappeyTWFL13, author = {Amy J. C. Trappey and Charles V. Trappey and Squall Chun{-}Yi Wu and Chin{-}Yuan Fan and Yi{-}Liang Lin}, title = {Intelligent patent recommendation system for innovative design collaboration}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1441--1450}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.035}, doi = {10.1016/J.JNCA.2013.02.035}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TrappeyTWFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TsengLYLH13, author = {Chien{-}Chao Tseng and Chia{-}Liang Lin and Li{-}Hsing Yen and Jyun{-}Yan Liu and Cheng{-}Yuan Ho}, title = {Can: {A} context-aware {NAT} traversal scheme}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {4}, pages = {1164--1173}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.001}, doi = {10.1016/J.JNCA.2013.02.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/TsengLYLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TyagiK13, author = {Sudhanshu Tyagi and Neeraj Kumar}, title = {A systematic review on clustering and routing techniques based upon {LEACH} protocol for wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {623--645}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.001}, doi = {10.1016/J.JNCA.2012.12.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TyagiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/VasiliadisRV13, author = {Dimitris C. Vasiliadis and George E. Rizos and Costas Vassilakis}, title = {Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively 2-class priority routing traffic}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {723--737}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.016}, doi = {10.1016/J.JNCA.2012.12.016}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/VasiliadisRV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Wang13, author = {Chiapin Wang}, title = {Dynamic {ARF} for throughput improvement in 802.11 {WLAN} via a machine-learning approach}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {667--676}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.025}, doi = {10.1016/J.JNCA.2012.12.025}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Wang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangCXFWB13, author = {Zhanfeng Wang and Ming Chen and Chang{-}you Xing and Jing Feng and Xianglin Wei and Huali Bai}, title = {Multi-manifold model of the Internet delay space}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {211--218}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.003}, doi = {10.1016/J.JNCA.2012.09.003}, timestamp = {Tue, 02 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WangCXFWB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangWLL13, author = {Youxiang Wang and Jianquan Wang and Zhaobiao Lu and Xingang Liu}, title = {Performance improvement of {QO-STBC} over time-selective channel for wireless network}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1018--1026}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.01.005}, doi = {10.1016/J.JNCA.2012.01.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangWLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangYL13, author = {Xiaogang Wang and Ming Yang and Junzhou Luo}, title = {A novel sequential watermark detection model for efficient traceback of secret network attack flows}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1660--1670}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.015}, doi = {10.1016/J.JNCA.2013.01.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangZLW13, author = {Yuehua Wang and Zhong Zhou and Ling Liu and Wei Wu}, title = {Replica-aided load balancing in overlay networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {388--401}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.001}, doi = {10.1016/J.JNCA.2012.05.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangZLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangZM13, author = {Junping Wang and Qiliang Zhu and Yan Ma}, title = {An agent-based hybrid service delivery for coordinating internet of things and 3rd party service providers}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1684--1695}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.04.014}, doi = {10.1016/J.JNCA.2013.04.014}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WaqarRAK13, author = {Adeela Waqar and Asad Raza and Haider Abbas and Muhammad Khurram Khan}, title = {A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {235--248}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.001}, doi = {10.1016/J.JNCA.2012.09.001}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WaqarRAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WatfaAS13, author = {Mohamed K. Watfa and Haitham Al{-}Hassanieh and Samir Salmen}, title = {A novel solution to the energy hole problem in sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {949--958}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.07.011}, doi = {10.1016/J.JNCA.2012.07.011}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WatfaAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuPLCG13, author = {Tao Wu and Xiaobing Pei and Yongzhong Lu and Changqing Chen and Liang Gao}, title = {A distributed collaborative product design environment based on semantic norm model and role-based access control}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1431--1440}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.018}, doi = {10.1016/J.JNCA.2013.02.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WuPLCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuWPL13, author = {Hongchen Wu and Xinjun Wang and Zhaohui Peng and Qingzhong Li}, title = {Div-clustering: Exploring active users for social collaborative recommendation}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1642--1650}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.016}, doi = {10.1016/J.JNCA.2013.02.016}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WuWPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XiaoHLYQ13, author = {Peng Xiao and Zhigang Hu and Dongbo Liu and Guofeng Yan and Xilong Qu}, title = {Virtual machine power measuring technique with bounded error in cloud environments}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {818--828}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.002}, doi = {10.1016/J.JNCA.2012.12.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XiaoHLYQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XiongCL13, author = {Hu Xiong and Zhong Chen and Fagen Li}, title = {New identity-based three-party authenticated key agreement protocol with provable security}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {927--932}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.10.001}, doi = {10.1016/J.JNCA.2012.10.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XiongCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XiongZLY13, author = {Junjie Xiong and Yangfan Zhou and Michael R. Lyu and Evan F. Y. Young}, title = {MDiag: Mobility-assisted diagnosis for wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {167--177}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.008}, doi = {10.1016/J.JNCA.2012.09.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XiongZLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XuDZY13, author = {Chuan Xu and C. Du and Guofeng Zhao and Shui Yu}, title = {A novel model for user clicks identification based on hidden semi-Markov}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {791--798}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.005}, doi = {10.1016/J.JNCA.2012.12.005}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/XuDZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XuYNHD13, author = {Yuanhao Xu and Guofu Yin and Yong Nie and Zhengwei He and Xiaolin Dai}, title = {Research on an active knowledge push service based on collaborative intent capture}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1418--1430}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.04.010}, doi = {10.1016/J.JNCA.2013.04.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XuYNHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XueMHD13, author = {Kaiping Xue and Changsha Ma and Peilin Hong and Rong Ding}, title = {A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {316--323}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.010}, doi = {10.1016/J.JNCA.2012.05.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XueMHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YangLGS13, author = {Yang Yang and Xinyu Li and Liang Gao and Xinyu Shao}, title = {A new approach for predicting and collaborative evaluating the cutting force in face milling based on gene expression programming}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1540--1550}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.02.004}, doi = {10.1016/J.JNCA.2013.02.004}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YangLGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YangSTZ13, author = {Ting Yang and Yugeng Sun and Javid Taheri and Albert Y. Zomaya}, title = {{DLS:} {A} dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {306--315}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.012}, doi = {10.1016/J.JNCA.2012.05.012}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YangSTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YangZWYZLJ13, author = {Yan Yang and Yulong Zhang and Alex Hai Wang and Meng Yu and Wanyu Zang and Peng Liu and Sushil Jajodia}, title = {Quantitative survivability evaluation of three virtual machine-based server architectures}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {781--790}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.006}, doi = {10.1016/J.JNCA.2012.12.006}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/YangZWYZLJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YehSCL13, author = {Sheng{-}Cheng Yeh and Ming{-}Yang Su and Hui{-}Hui Chen and Chun{-}Yuen Lin}, title = {An efficient and secure approach for a cloud collaborative editing}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {6}, pages = {1632--1641}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.05.012}, doi = {10.1016/J.JNCA.2013.05.012}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YehSCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YehYCT13, author = {Lo{-}Yao Yeh and Chun{-}Chuan Yang and Jee{-}Gong Chang and Yi{-}Lang Tsai}, title = {A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility {(NEMO)} in VANETs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {284--292}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.06.001}, doi = {10.1016/J.JNCA.2012.06.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YehYCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YiO13, author = {Xun Yi and Eiji Okamoto}, title = {Practical Internet voting system}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {378--387}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.005}, doi = {10.1016/J.JNCA.2012.05.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YiO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YingMM13, author = {Bidi Ying and Dimitrios Makrakis and Hussein T. Mouftah}, title = {Privacy preserving broadcast message authentication protocol for VANETs}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {5}, pages = {1352--1364}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.013}, doi = {10.1016/J.JNCA.2012.05.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YingMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZarifneshatK13, author = {Masoud Zarifneshat and Pejman Khadivi}, title = {Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1078--1090}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2013.01.012}, doi = {10.1016/J.JNCA.2013.01.012}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZarifneshatK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangBR13, author = {Zhenxia Zhang and Azzedine Boukerche and Hussam M. Soliman Ramadan}, title = {Design and evaluation of a fast {MAC} layer handoff management scheme for WiFi-based multichannel Vehicular Mesh Networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {992--1000}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.01.024}, doi = {10.1016/J.JNCA.2012.01.024}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangLEB13, author = {Liren Zhang and Abderrahmane Lakas and Hesham El{-}Sayed and Ezedin Barka}, title = {Mobility analysis in vehicular ad hoc network {(VANET)}}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {3}, pages = {1050--1056}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.008}, doi = {10.1016/J.JNCA.2012.12.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangLEB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Zhu13, author = {Wen Tao Zhu}, title = {Towards secure and communication-efficient broadcast encryption systems}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {178--186}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.09.007}, doi = {10.1016/J.JNCA.2012.09.007}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Zhu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/kumarN13, author = {D. Satish Kumar and N. Nagarajan}, title = {Relay technologies and technical issues in {IEEE} 802.16j Mobile Multi-hop Relay {(MMR)} networks}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {91--102}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.04.009}, doi = {10.1016/J.JNCA.2012.04.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/kumarN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.