Search dblp for Publications

export results for "toc:db/journals/jnca/jnca36.bht:"

 download as .bib file

@article{DBLP:journals/jnca/0002YZ13,
  author       = {Bing Hu and
                  Kwan L. Yeung and
                  Zhaoyang Zhang},
  title        = {An efficient single-iteration single-bit request scheduling algorithm
                  for input-queued switches},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {187--194},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.006},
  doi          = {10.1016/J.JNCA.2012.09.006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/0002YZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AdabiMRB13,
  author       = {Sepideh Adabi and
                  Ali Movaghar and
                  Amir Masoud Rahmani and
                  Hamid Beigy},
  title        = {Market{\_}based grid resource allocation using new negotiation model},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {543--565},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.02.008},
  doi          = {10.1016/J.JNCA.2012.02.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AdabiMRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AkkayaSV13,
  author       = {Kemal Akkaya and
                  Izzet F. Senturk and
                  Shanthi Vemulapalli},
  title        = {Handling large-scale node failures in mobile sensor/robot networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {195--210},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.005},
  doi          = {10.1016/J.JNCA.2012.09.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AkkayaSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Al-TurjmanHI13,
  author       = {Fadi M. Al{-}Turjman and
                  Hossam S. Hassanein and
                  Mohamed Ibnkahla},
  title        = {Quantifying connectivity in wireless sensor networks with grid-based
                  deployments},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {368--377},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.006},
  doi          = {10.1016/J.JNCA.2012.05.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Al-TurjmanHI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Al-shugranGHNA13,
  author       = {Mahmoud Al{-}shugran and
                  Osman Ghazali and
                  Suhaidi Hassan and
                  Kashif Nisar and
                  A. Suki M. Arif},
  title        = {A qualitative comparison evaluation of the greedy forwarding strategies
                  in Mobile Ad Hoc Network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {887--897},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.008},
  doi          = {10.1016/J.JNCA.2012.10.008},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Al-shugranGHNA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AlizaiWKW13,
  author       = {Muhammad Hamad Alizai and
                  Hanno Wirtz and
                  Bernhard Kirchen and
                  Klaus Wehrle},
  title        = {Portable wireless-networking protocol evaluation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1230--1242},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.022},
  doi          = {10.1016/J.JNCA.2013.02.022},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AlizaiWKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AlvaroB13,
  author       = {Jes{\'{u}}s L. Alvaro and
                  Beatriz Barros},
  title        = {A new cloud computing architecture for music composition},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {429--443},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.015},
  doi          = {10.1016/J.JNCA.2012.04.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AlvaroB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AnGZJY13,
  author       = {Jian An and
                  Xiaolin Gui and
                  Wendong Zhang and
                  Jinghua Jiang and
                  Jianwei Yang},
  title        = {Research on social relations cognitive model of mobile nodes in Internet
                  of Things},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {799--810},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.004},
  doi          = {10.1016/J.JNCA.2012.12.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AnGZJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AntonopoulosSV13,
  author       = {Angelos Antonopoulos and
                  Charalabos Skianis and
                  Christos V. Verikoukis},
  title        = {Network coding-based cooperative {ARQ} scheme for VANETs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1001--1007},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.03.012},
  doi          = {10.1016/J.JNCA.2012.03.012},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AntonopoulosSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AntunesSCP13,
  author       = {Pedro Antunes and
                  David Sim{\~{o}}es and
                  Lu{\'{\i}}s Carri{\c{c}}o and
                  Jos{\'{e}} A. Pino},
  title        = {An end-user approach to business process modeling},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1466--1479},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.03.014},
  doi          = {10.1016/J.JNCA.2013.03.014},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AntunesSCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AstorgaATH13,
  author       = {Jasone Astorga and
                  Marina Aguado and
                  Nerea Toledo and
                  Marivi Higuero},
  title        = {A high performance link layer mobility management strategy for professional
                  private broadband networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1152--1163},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.005},
  doi          = {10.1016/J.JNCA.2013.01.005},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AstorgaATH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BahGD13,
  author       = {Slimane Bah and
                  Roch H. Glitho and
                  Rachida Dssouli},
  title        = {A {SIP} servlets-based framework for service provisioning in stand-alone
                  MANETs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {147--155},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.005},
  doi          = {10.1016/J.JNCA.2012.10.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BahGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BaigAJ13,
  author       = {Imran Baig and
                  Muhammad Ayaz and
                  Varun Jeoti},
  title        = {On the peak-to-average power ratio reduction in mobile WiMAX: {A}
                  discrete cosine transform matrix precoding based random-interleaved
                  orthogonal frequency division multiple access uplink system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {466--475},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.012},
  doi          = {10.1016/J.JNCA.2012.04.012},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BaigAJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BakshiTR13,
  author       = {Aishwarya Bakshi and
                  Amir Talaei{-}Khoei and
                  Pradeep Ray},
  title        = {Adaptive policy framework: {A} systematic review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1261--1271},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.007},
  doi          = {10.1016/J.JNCA.2012.12.007},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BakshiTR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BaskaranCLW13,
  author       = {Vishnu Monn Baskaran and
                  Yoong Choon Chang and
                  Jonathan Loo and
                  KokSheik Wong},
  title        = {Software-based serverless endpoint video combiner architecture for
                  high-definition multiparty video conferencing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {336--352},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.008},
  doi          = {10.1016/J.JNCA.2012.05.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BaskaranCLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BauzaG13,
  author       = {Ramon Bauza and
                  Javier Goz{\'{a}}lvez},
  title        = {Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle
                  communications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1295--1307},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.02.007},
  doi          = {10.1016/J.JNCA.2012.02.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BauzaG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BelmonteDPR13,
  author       = {Mar{\'{\i}}a{-}Victoria Belmonte and
                  Manuel D{\'{\i}}az and
                  Jos{\'{e}}{-}Luis P{\'{e}}rez{-}de{-}la{-}Cruz and
                  Ana Reyna},
  title        = {{COINS:} COalitions and INcentiveS for effective Peer-to-Peer downloads},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {484--497},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.010},
  doi          = {10.1016/J.JNCA.2012.04.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BelmonteDPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BernardinoBSPV13,
  author       = {Eug{\'{e}}nia Moreira Bernardino and
                  Anabela Moreira Bernardino and
                  Juan Manuel S{\'{a}}nchez{-}P{\'{e}}rez and
                  Juan Antonio G{\'{o}}mez Pulido and
                  Miguel A. Vega{-}Rodr{\'{\i}}guez},
  title        = {Swarm optimisation algorithms applied to large balanced communication
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {504--522},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.005},
  doi          = {10.1016/J.JNCA.2012.04.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BernardinoBSPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BilalBG13,
  author       = {Sardar Muhammad Bilal and
                  Carlos Jesus Bernardos and
                  Carmen Guerrero},
  title        = {Position-based routing in vehicular networks: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {685--697},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.023},
  doi          = {10.1016/J.JNCA.2012.12.023},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BilalBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BitamM13,
  author       = {Salim Bitam and
                  Abdelhamid Mellouk},
  title        = {Bee life-based multi constraints multicast routing optimization for
                  vehicular ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {981--991},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.01.023},
  doi          = {10.1016/J.JNCA.2012.01.023},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BitamM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BoteroMHA13,
  author       = {Juan Felipe Botero and
                  Miguel Molina and
                  Xavier Hesselbach{-}Serra and
                  Jos{\'{e}} Roberto Amazonas},
  title        = {A novel paths algebra-based strategy to flexibly solve the link mapping
                  stage of {VNE} problems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1735--1752},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.029},
  doi          = {10.1016/J.JNCA.2013.02.029},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BoteroMHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BragaCOASMS13,
  author       = {Reinaldo Bezerra Braga and
                  Igor A. Chaves and
                  Carina Teixeira de Oliveira and
                  Rossana M. C. Andrade and
                  Jos{\'{e}} Neuman de Souza and
                  Herv{\'{e}} Martin and
                  Bruno Schulze},
  title        = {{RETENTION:} {A} reactive trust-based mechanism to detect and punish
                  malicious nodes in ad hoc grid environments},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {274--283},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.06.002},
  doi          = {10.1016/J.JNCA.2012.06.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BragaCOASMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CampoloCMS13,
  author       = {Claudia Campolo and
                  Hector Agustin Cozzetti and
                  Antonella Molinaro and
                  Riccardo Scopigno},
  title        = {Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular
                  Ad Hoc Networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1275--1286},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.001},
  doi          = {10.1016/J.JNCA.2012.04.001},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/CampoloCMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CanlarCCP13,
  author       = {Ey{\"{u}}p S. Canlar and
                  Mauro Conti and
                  Bruno Crispo and
                  Roberto Di Pietro},
  title        = {Windows Mobile LiveSD Forensics},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {677--684},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.024},
  doi          = {10.1016/J.JNCA.2012.12.024},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CanlarCCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CerveraBGK13,
  author       = {Gimer Cervera and
                  Michel Barbeau and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Evangelos Kranakis},
  title        = {A multipath routing strategy to prevent flooding disruption attacks
                  in link state routing protocols for MANETs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {744--755},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.013},
  doi          = {10.1016/J.JNCA.2012.12.013},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CerveraBGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChanLH13,
  author       = {Gaik{-}Yee Chan and
                  Chien{-}Sing Lee and
                  Swee{-}Huay Heng},
  title        = {Discovering fuzzy association rule patterns and increasing sensitivity
                  analysis of XML-related attacks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {829--842},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.11.006},
  doi          = {10.1016/J.JNCA.2012.11.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChanLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChangK13,
  author       = {Ting{-}Yi Chang and
                  Yan{-}Ru Ke},
  title        = {A personalized e-course composition based on a genetic algorithm with
                  forcing legality in an adaptive learning system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {533--542},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.002},
  doi          = {10.1016/J.JNCA.2012.04.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChangK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChenZLWW13,
  author       = {Ting Chen and
                  Xiaosong Zhang and
                  Hong{-}yuan Li and
                  Dong Wang and
                  Yue Wu},
  title        = {Propagation modeling of active {P2P} worms based on ternary matrix},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1387--1394},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.032},
  doi          = {10.1016/J.JNCA.2013.02.032},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ChenZLWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChengHCZ13,
  author       = {Yuan Cheng and
                  Fazhi He and
                  Xiantao Cai and
                  Dejun Zhang},
  title        = {A group Undo/Redo method in 3D collaborative modeling systems with
                  performance evaluation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1512--1522},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.04.012},
  doi          = {10.1016/J.JNCA.2013.04.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChengHCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/DaiZG13,
  author       = {Huan Dai and
                  Zhaomin Zhu and
                  Xiaofeng Gu},
  title        = {Multi-target indoor localization and tracking on video monitoring
                  system in a wireless sensor network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {228--234},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.08.013},
  doi          = {10.1016/J.JNCA.2012.08.013},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/DaiZG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/DiezACR13,
  author       = {Isabel de la Torre D{\'{\i}}ez and
                  Sa{\'{u}}l {\'{A}}lvaro{-}Mu{\~{n}}oz and
                  Miguel L{\'{o}}pez Coronado and
                  Joel J. P. C. Rodrigues},
  title        = {Development and performance evaluation of a new {RSS} tool for a Web-based
                  system: RSS{\_}PROYECT},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {255--261},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.06.004},
  doi          = {10.1016/J.JNCA.2012.06.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/DiezACR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/DumezBGWL13,
  author       = {Christophe Dumez and
                  Mohamed Bakhouya and
                  Jaafar Gaber and
                  Maxime Wack and
                  Pascal Lorenz},
  title        = {Model-driven approach supporting formal verification for web service
                  composition protocols},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1102--1115},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.009},
  doi          = {10.1016/J.JNCA.2013.01.009},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/DumezBGWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/El-AlfyMS13,
  author       = {El{-}Sayed M. El{-}Alfy and
                  Mujahid N. Syed and
                  Shokri Z. Selim},
  title        = {A Pareto-based hybrid multiobjective evolutionary approach for constrained
                  multipath traffic engineering optimization in {MPLS/GMPLS} networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1196--1207},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.008},
  doi          = {10.1016/J.JNCA.2013.02.008},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/El-AlfyMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/EmmanouilidisKT13,
  author       = {Christos Emmanouilidis and
                  Remous{-}Aris Koutsiamanis and
                  Aimilia Tasidou},
  title        = {Mobile guides: Taxonomy of architectures, context awareness, technologies
                  and applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {103--125},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.007},
  doi          = {10.1016/J.JNCA.2012.04.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/EmmanouilidisKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/EverGKG13,
  author       = {Enver Ever and
                  Orhan Gemikonakli and
                  Altan Ko{\c{c}}yigit and
                  Eser Gemikonakli},
  title        = {A hybrid approach to minimize state space explosion problem for the
                  solution of two stage tandem queues},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {908--926},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.006},
  doi          = {10.1016/J.JNCA.2012.10.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/EverGKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/FamaeyIWT13,
  author       = {Jeroen Famaey and
                  Fr{\'{e}}d{\'{e}}ric Iterbeke and
                  Tim Wauters and
                  Filip De Turck},
  title        = {Towards a predictive cache replacement strategy for multimedia content},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {219--227},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.08.014},
  doi          = {10.1016/J.JNCA.2012.08.014},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/FamaeyIWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/FonsecaV13,
  author       = {Ant{\'{o}}nio Fonseca and
                  Teresa Maria Vaz{\~{a}}o},
  title        = {Applicability of position-based routing for {VANET} in highways and
                  urban environment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {961--973},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.03.009},
  doi          = {10.1016/J.JNCA.2012.03.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/FonsecaV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/FuJC13,
  author       = {Leijie Fu and
                  Pingyu Jiang and
                  Wei Cao},
  title        = {Modeling and performance analysis of product development process network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1489--1502},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.006},
  doi          = {10.1016/J.JNCA.2013.02.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/FuJC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GallardoMBR13,
  author       = {Jes{\'{u}}s Gallardo and
                  Ana I. Molina and
                  Crescencio Bravo and
                  Miguel A. Redondo},
  title        = {A model-driven and task-oriented method for the development of collaborative
                  systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1551--1565},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.03.016},
  doi          = {10.1016/J.JNCA.2013.03.016},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/GallardoMBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GananMEMHA13,
  author       = {Carlos Ga{\~{n}}{\'{a}}n and
                  Jose L. Mu{\~{n}}oz and
                  Oscar Esparza and
                  Jorge Mata{-}D{\'{\i}}az and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Juanjo Alins},
  title        = {{COACH:} COllaborative certificate stAtus CHecking mechanism for VANETs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1337--1351},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.02.006},
  doi          = {10.1016/J.JNCA.2012.02.006},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/GananMEMHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GeetaNB13,
  author       = {Geetha Dundesh Devanagavi and
                  N. Nalini and
                  Rajashekhar C. Biradar},
  title        = {Fault tolerance in wireless sensor network using hand-off and dynamic
                  power adjustment approach},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1174--1185},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.005},
  doi          = {10.1016/J.JNCA.2013.02.005},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/GeetaNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GuLQYLY13,
  author       = {Dujuan Gu and
                  Xiaohan Liu and
                  Gang Qin and
                  Shuangjian Yan and
                  Ze Luo and
                  Baoping Yan},
  title        = {{VNET6:} IPv6 virtual network for the collaboration between applications
                  and networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1579--1588},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.011},
  doi          = {10.1016/J.JNCA.2013.02.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GuLQYLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GuoZWYZ13,
  author       = {Bin Guo and
                  Daqing Zhang and
                  Zhu Wang and
                  Zhiwen Yu and
                  Xingshe Zhou},
  title        = {Opportunistic IoT: Exploring the harmonious interaction between human
                  and the internet of things},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1531--1539},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.028},
  doi          = {10.1016/J.JNCA.2012.12.028},
  timestamp    = {Wed, 11 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GuoZWYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HadjidjSBCO13,
  author       = {Abdelkrim Hadjidj and
                  Marion Souil and
                  Abdelmadjid Bouabdallah and
                  Yacine Challal and
                  Henry L. Owen},
  title        = {Wireless sensor networks for rehabilitation applications: Challenges
                  and opportunities},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {1--15},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.002},
  doi          = {10.1016/J.JNCA.2012.10.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HadjidjSBCO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HaiderGK13,
  author       = {Ammar Haider and
                  Iqbal Gondal and
                  Joarder Kamruzzaman},
  title        = {Social-connectivity-aware vertical handover for heterogeneous wireless
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1131--1139},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.010},
  doi          = {10.1016/J.JNCA.2013.01.010},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/HaiderGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HanJK13,
  author       = {Seung{-}Wan Han and
                  In{-}Seon Jeong and
                  Seung{-}Ho Kang},
  title        = {Low latency and energy efficient routing tree for wireless sensor
                  networks with multiple mobile sinks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {156--166},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.003},
  doi          = {10.1016/J.JNCA.2012.10.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HanJK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HassanH13,
  author       = {Md. Mahedi Hassan and
                  Poo Kuan Hoong},
  title        = {Seamless handover integrated solution for video transmission over
                  proxy mobile IPv6 in a micro mobility domain},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {66--76},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.020},
  doi          = {10.1016/J.JNCA.2012.04.020},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HassanH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HeNM13,
  author       = {Xiaobing He and
                  Michael Niedermeier and
                  Hermann de Meer},
  title        = {Dynamic key management in wireless sensor networks: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {611--622},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.010},
  doi          = {10.1016/J.JNCA.2012.12.010},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HeNM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HooshmandSKSS13,
  author       = {Mohsen Hooshmand and
                  S. Mohamad R. Soroushmehr and
                  Pejman Khadivi and
                  Shadrokh Samavi and
                  Shahram Shirani},
  title        = {Visual sensor network lifetime maximization by prioritized scheduling
                  of nodes},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {409--419},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.017},
  doi          = {10.1016/J.JNCA.2012.04.017},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HooshmandSKSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HouGG13,
  author       = {Weigang Hou and
                  Lei Guo and
                  Xiaoxue Gong},
  title        = {Survivable power efficiency oriented integrated grooming in green
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {420--428},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.016},
  doi          = {10.1016/J.JNCA.2012.04.016},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HouGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HsuS13,
  author       = {Wu{-}Hsiao Hsu and
                  Yuh{-}Pyng Shieh},
  title        = {Virtual network mapping algorithm in the cloud infrastructure},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1724--1734},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.028},
  doi          = {10.1016/J.JNCA.2013.02.028},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HsuS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HuangXLX13,
  author       = {Kun Huang and
                  Gaogang Xie and
                  Rui Li and
                  Shuai Xiong},
  title        = {Fast and deterministic hash table lookup using discriminative bloom
                  filters},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {657--666},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.031},
  doi          = {10.1016/J.JNCA.2012.12.031},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HuangXLX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/IbanezRMK13,
  author       = {Mar{\'{\i}}a{-}Blanca Ib{\'{a}}{\~{n}}ez{-}Espiga and
                  Jos{\'{e}} Jes{\'{u}}s Garc{\'{\i}}a Rueda and
                  David Maroto and
                  Carlos Delgado Kloos},
  title        = {Collaborative learning in multi-user virtual environments},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1566--1576},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.027},
  doi          = {10.1016/J.JNCA.2012.12.027},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/IbanezRMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/IqbalSJC13,
  author       = {Rahat Iqbal and
                  Nazaraf Shah and
                  Anne E. James and
                  Tomasz Cichowicz},
  title        = {Integration, optimization and usability of enterprise applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1480--1488},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.009},
  doi          = {10.1016/J.JNCA.2013.02.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/IqbalSJC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/IslamA13,
  author       = {Md. Rafiqul Islam and
                  Jemal H. Abawajy},
  title        = {A multi-tier phishing detection and filtering approach},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {324--335},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.009},
  doi          = {10.1016/J.JNCA.2012.05.009},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/IslamA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/IslamTBV13,
  author       = {Md. Rafiqul Islam and
                  Ronghua Tian and
                  Lynn Margaret Batten and
                  Steven Versteeg},
  title        = {Classification of malware based on integrated static and dynamic features},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {646--656},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.004},
  doi          = {10.1016/J.JNCA.2012.10.004},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/IslamTBV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JamaliHE13,
  author       = {Shahram Jamali and
                  Seyyed Nasser Seyyed Hashemi and
                  Amir{-}Masoud Eftekhari{-}Moghadam},
  title        = {On the use of a full information feedback to stabilize {RED}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {858--869},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.11.002},
  doi          = {10.1016/J.JNCA.2012.11.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JamaliHE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JappinenGC13,
  author       = {Pekka J{\"{a}}ppinen and
                  Renata Guarneri and
                  Lu{\'{\i}}s M. Correia},
  title        = {An applications perspective into the Future Internet},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {249--254},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.08.009},
  doi          = {10.1016/J.JNCA.2012.08.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/JappinenGC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiangLLT13,
  author       = {Jian Jiang and
                  Wei Li and
                  Junzhou Luo and
                  Jing Tan},
  title        = {A network accountability based verification mechanism for detecting
                  inter-domain routing path inconsistency},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1671--1683},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.029},
  doi          = {10.1016/J.JNCA.2012.12.029},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JiangLLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KabirMA13,
  author       = {Md. Humayun Kabir and
                  Mohammad Mukhtaruzzaman and
                  Mohammed Atiquzzaman},
  title        = {Efficient route optimization scheme for nested-NEMO},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1039--1049},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.026},
  doi          = {10.1016/J.JNCA.2012.12.026},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KabirMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KimPR13,
  author       = {Minwoo Kim and
                  Karam Park and
                  Won Woo Ro},
  title        = {Benefits of using parallelized non-progressive network coding},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {293--305},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.014},
  doi          = {10.1016/J.JNCA.2012.05.014},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KimPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KretschmerBG13,
  author       = {Mathias Kretschmer and
                  Philipp Batroff and
                  George Ghinea},
  title        = {Topology forming and optimization framework for heterogeneous wireless
                  back-haul networks supporting unidirectional technologies},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {698--710},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.022},
  doi          = {10.1016/J.JNCA.2012.12.022},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KretschmerBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KumarK13,
  author       = {Mahesh Kumar and
                  Shishir Kumar},
  title        = {{AGRIB-BHF:} {A} sustainable and fault tolerant aggregation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {881--886},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.009},
  doi          = {10.1016/J.JNCA.2012.10.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KumarK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LarL13,
  author       = {Saleem{-}Ullah Lar and
                  Xiaofeng Liao},
  title        = {An initiative for a classified bibliography on {TCP/IP} congestion
                  control},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {126--133},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.003},
  doi          = {10.1016/J.JNCA.2012.04.003},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LarL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LatreFST13,
  author       = {Steven Latr{\'{e}} and
                  Jeroen Famaey and
                  John Strassner and
                  Filip De Turck},
  title        = {Automated context dissemination for autonomic collaborative networks
                  through semantic subscription filter generation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1405--1417},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.011},
  doi          = {10.1016/J.JNCA.2013.01.011},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LatreFST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LeeSLY13,
  author       = {Chao{-}Yang Lee and
                  Liang{-}Cheng Shiu and
                  Fu{-}Tian Lin and
                  Chu{-}Sing Yang},
  title        = {Distributed topology control algorithm on broadcasting in wireless
                  sensor network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1186--1195},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.010},
  doi          = {10.1016/J.JNCA.2013.02.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LeeSLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiN13,
  author       = {Li Ho Leung and
                  Vincent T. Y. Ng},
  title        = {Discovering associations between news and contents in social network
                  sites with the D-Miner service framework},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1651--1659},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.04.013},
  doi          = {10.1016/J.JNCA.2013.04.013},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiNKL13,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Muhammad Khurram Khan and
                  Junguo Liao},
  title        = {An enhanced smart card based remote user password authentication scheme},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1365--1371},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.034},
  doi          = {10.1016/J.JNCA.2013.02.034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiNKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiSBG13,
  author       = {Bingdong Li and
                  Jeff Springer and
                  George Bebis and
                  Mehmet Hadi Gunes},
  title        = {A survey of network flow applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {567--581},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.020},
  doi          = {10.1016/J.JNCA.2012.12.020},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiSBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiWC13,
  author       = {Mingfu Li and
                  Yueh{-}Lin Wu and
                  Chia{-}Rong Chang},
  title        = {Available bandwidth estimation for the network paths with multiple
                  tight links and bursty traffic},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {353--367},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.007},
  doi          = {10.1016/J.JNCA.2012.05.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiZWC13,
  author       = {Wenfeng Li and
                  Ye Zhong and
                  Xun Wang and
                  Yulian Cao},
  title        = {Resource virtualization and service selection in cloud logistics},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1696--1704},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.019},
  doi          = {10.1016/J.JNCA.2013.02.019},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiZWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LianHS13,
  author       = {Kuang{-}Yow Lian and
                  Sung{-}Jung Hsiao and
                  Wen{-}Tsai Sung},
  title        = {Intelligent multi-sensor control system based on innovative technology
                  integration via ZigBee and Wi-Fi networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {756--767},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.012},
  doi          = {10.1016/J.JNCA.2012.12.012},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LianHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiaoLLT13,
  author       = {Hung{-}Jen Liao and
                  Chun{-}Hung Richard Lin and
                  Ying{-}Chih Lin and
                  Kuang{-}Yuan Tung},
  title        = {Intrusion detection system: {A} comprehensive review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {16--24},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.004},
  doi          = {10.1016/J.JNCA.2012.09.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiaoLLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Lin13,
  author       = {Kai Lin},
  title        = {Research on adaptive target tracking in vehicle sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1316--1323},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.01.001},
  doi          = {10.1016/J.JNCA.2012.01.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Lin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LinHLDC13,
  author       = {Ying{-}Dar Lin and
                  Cheng{-}Yuan Ho and
                  Yuan{-}Cheng Lai and
                  Tzu{-}Hsiung Du and
                  Shun{-}Lee Chang},
  title        = {Booting, browsing and streaming time profiling, and bottleneck analysis
                  on android-based systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1208--1218},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.024},
  doi          = {10.1016/J.JNCA.2013.02.024},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LinHLDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LinL13,
  author       = {Po{-}Ching Lin and
                  Jia{-}Hau Lee},
  title        = {Re-examining the performance bottleneck in a {NIDS} with detailed
                  profiling},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {768--780},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.009},
  doi          = {10.1016/J.JNCA.2012.12.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LinL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuNMSHW13,
  author       = {Yazhi Liu and
                  Jianwei Niu and
                  Jian Ma and
                  Lei Shu and
                  Takahiro Hara and
                  Wendong Wang},
  title        = {The insights of message delivery delay in VANETs with a bidirectional
                  traffic model},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1287--1294},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.01.010},
  doi          = {10.1016/J.JNCA.2012.01.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuNMSHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuSMLG13,
  author       = {Yejun Liu and
                  Qingyang Song and
                  Rui Ma and
                  Bing Li and
                  Bo Gong},
  title        = {Protection based on backup radios and backup fibers for survivable
                  Fiber-Wireless (FiWi) access network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1057--1069},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.014},
  doi          = {10.1016/J.JNCA.2013.01.014},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuSMLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuSSW13,
  author       = {Yanheng Liu and
                  Longxiang Suo and
                  Dayang Sun and
                  Aimin Wang},
  title        = {A virtual square grid-based coverage algorithm of redundant node for
                  wireless sensor network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {811--817},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.003},
  doi          = {10.1016/J.JNCA.2012.12.003},
  timestamp    = {Wed, 26 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuSSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LloretCCG13,
  author       = {Jaime Lloret and
                  Alejandro Canovas and
                  Angel Catala and
                  Miguel Garcia},
  title        = {Group-based protocol and mobility model for VANETs to offer internet
                  access},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1027--1038},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.02.009},
  doi          = {10.1016/J.JNCA.2012.02.009},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LloretCCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LooneyG13,
  author       = {Mary Looney and
                  Oliver Gough},
  title        = {A provision aware proportional fair sharing three colour marker},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {476--483},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.011},
  doi          = {10.1016/J.JNCA.2012.04.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LooneyG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LuTCC13,
  author       = {Ta{-}Ping Lu and
                  Amy J. C. Trappey and
                  Yi{-}Kuang Chen and
                  Yu{-}Da Chang},
  title        = {Collaborative design and analysis of supply chain network management
                  key processes model},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1503--1511},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.03.015},
  doi          = {10.1016/J.JNCA.2013.03.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LuTCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LuoLC13,
  author       = {Shiliang Luo and
                  Xu Lu and
                  Lianglun Cheng},
  title        = {{TSOIA:} An efficient node selection algorithm facing the uncertain
                  process for Internet of Things},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {738--743},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.015},
  doi          = {10.1016/J.JNCA.2012.12.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LuoLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LuoY13,
  author       = {Jian{-}Zhen Luo and
                  Shun{-}Zheng Yu},
  title        = {Position-based automatic reverse engineering of network protocols},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1070--1077},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.013},
  doi          = {10.1016/J.JNCA.2013.01.013},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LuoY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LuuT13,
  author       = {Hai Van Luu and
                  Xueyan Tang},
  title        = {Constructing rings overlay for robust data collection in wireless
                  sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1372--1386},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.033},
  doi          = {10.1016/J.JNCA.2013.02.033},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LuuT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LvMLMZ13,
  author       = {Chao Lv and
                  Maode Ma and
                  Hui Li and
                  Jianfeng Ma and
                  Yaoyu Zhang},
  title        = {An novel three-party authenticated key exchange protocol using one-time
                  key},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {498--503},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.006},
  doi          = {10.1016/J.JNCA.2012.04.006},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LvMLMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MahdipourRS13,
  author       = {Ebrahim Mahdipour and
                  Amir Masoud Rahmani and
                  Saeed Setayeshi},
  title        = {Importance sampling for Jackson networks with customer impatience
                  until the end of service},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1091--1101},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.016},
  doi          = {10.1016/J.JNCA.2013.01.016},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MahdipourRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MansouriDM13,
  author       = {Najme Mansouri and
                  Gholamhosein Dastghaibyfard and
                  Ehsan Mansouri},
  title        = {Combination of data replication and scheduling algorithm for improving
                  data availability in Data Grids},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {711--722},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.021},
  doi          = {10.1016/J.JNCA.2012.12.021},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MansouriDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Martin-CampilloCYM13,
  author       = {Abraham Mart{\'{\i}}n{-}Campillo and
                  Jon Crowcroft and
                  Eiko Yoneki and
                  Ramon Mart{\'{\i}}},
  title        = {Evaluating opportunistic networks in disaster scenarios},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {870--880},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.11.001},
  doi          = {10.1016/J.JNCA.2012.11.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Martin-CampilloCYM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MartinezGSL13,
  author       = {Dami{\`{a}} Castell{\`{a}} Mart{\'{\i}}nez and
                  Francesc Gin{\'{e}} and
                  Francesc Solsona and
                  Josep L. L{\'{e}}rida},
  title        = {Analyzing locality over a {P2P} computing architecture},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1610--1619},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.032},
  doi          = {10.1016/J.JNCA.2012.12.032},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MartinezGSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MasdariBB13,
  author       = {Mohammad Masdari and
                  Sadegh Mohammadzadeh Bazarchi and
                  Moazam Bidaki},
  title        = {Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor
                  Networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1243--1260},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.017},
  doi          = {10.1016/J.JNCA.2012.12.017},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/MasdariBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MaslekarMBL13,
  author       = {Nitin Maslekar and
                  Joseph Mouzna and
                  Mounir Boussedjra and
                  Houda Labiod},
  title        = {{CATS:} An adaptive traffic signal system based on car-to-car communication},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1308--1315},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.011},
  doi          = {10.1016/J.JNCA.2012.05.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MaslekarMBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MhiriSB13,
  author       = {Fadoua Mhiri and
                  Kaouthar Sethom and
                  Ridha Bouallegue},
  title        = {A survey on interference management techniques in femtocell self-organizing
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {58--65},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.021},
  doi          = {10.1016/J.JNCA.2012.04.021},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MhiriSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ModiPBPPR13,
  author       = {Chirag Modi and
                  Dhiren R. Patel and
                  Bhavesh Borisaniya and
                  Hiren Patel and
                  Avi Patel and
                  Muttukrishnan Rajarajan},
  title        = {A survey of intrusion detection techniques in Cloud},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {42--57},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.003},
  doi          = {10.1016/J.JNCA.2012.05.003},
  timestamp    = {Sun, 22 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ModiPBPPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MohamedAE13,
  author       = {Nader Mohamed and
                  Jameela Al{-}Jaroodi and
                  Abdulla Eid},
  title        = {A dual-direction technique for fast file downloads with dynamic load
                  balancing in the Cloud},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1116--1130},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.006},
  doi          = {10.1016/J.JNCA.2013.01.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MohamedAE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MohammedDHIXQY13,
  author       = {Ahmed Hassan Mohammed and
                  Bin Dai and
                  Benxiong Huang and
                  Muhammad Azhar Iqbal and
                  Guan Xu and
                  Peng Qin and
                  Shui Yu},
  title        = {A survey and tutorial of wireless relay network protocols based on
                  network coding},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {593--610},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.018},
  doi          = {10.1016/J.JNCA.2012.12.018},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MohammedDHIXQY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NairSCP13,
  author       = {Rajashree Nair and
                  Ben Soh and
                  Naveen K. Chilamkurti and
                  Jong Hyuk Park},
  title        = {Structure-free message aggregation and routing in traffic information
                  system {(SMART)}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {974--980},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.008},
  doi          = {10.1016/J.JNCA.2012.04.008},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/NairSCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NieJG13,
  author       = {Laisen Nie and
                  Dingde Jiang and
                  Lei Guo},
  title        = {A power laws-based reconstruction approach to end-to-end network traffic},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {898--907},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.007},
  doi          = {10.1016/J.JNCA.2012.10.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/NieJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NisarAHS13,
  author       = {Kashif Nisar and
                  Angela Amphawan and
                  Suhaidi Hassan and
                  Nurul I. Sarkar},
  title        = {A comprehensive survey on scheduler for VoIP over {WLAN}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {933--948},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.07.019},
  doi          = {10.1016/J.JNCA.2012.07.019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/NisarAHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PanL13,
  author       = {Yuanyuan Pan and
                  Jianqing Li},
  title        = {Cooperative pseudonym change scheme based on the number of neighbors
                  in VANETs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1599--1609},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.003},
  doi          = {10.1016/J.JNCA.2013.02.003},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/PanL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PantoniB13,
  author       = {Rodrigo Palucci Pantoni and
                  Dennis Brand{\~{a}}o},
  title        = {A gradient based routing scheme for street lighting wireless sensor
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {77--90},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.019},
  doi          = {10.1016/J.JNCA.2012.04.019},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PantoniB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PatelTBJ13,
  author       = {Ahmed Patel and
                  Mona Taghavi and
                  Kaveh Bakhtiyari and
                  Joaquim Celestino J{\'{u}}nior},
  title        = {An intrusion detection and prevention system in cloud computing: {A}
                  systematic review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {25--41},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.08.007},
  doi          = {10.1016/J.JNCA.2012.08.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PatelTBJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PengC13,
  author       = {I{-}Hsuan Peng and
                  Yen{-}Wen Chen},
  title        = {Energy consumption bounds analysis and its applications for grid based
                  wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {444--451},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.014},
  doi          = {10.1016/J.JNCA.2012.04.014},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PengC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PengYGJG13,
  author       = {Yuhuai Peng and
                  Yao Yu and
                  Lei Guo and
                  Dingde Jiang and
                  Qiming Gai},
  title        = {An efficient joint channel assignment and QoS routing protocol for
                  {IEEE} 802.11 multi-radio multi-channel wireless mesh networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {843--857},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.11.003},
  doi          = {10.1016/J.JNCA.2012.11.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PengYGJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/QaziRMS13,
  author       = {Shams Qazi and
                  Raad Raad and
                  Yi Mu and
                  Willy Susilo},
  title        = {Securing {DSR} against wormhole attacks in multirate ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {582--592},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.019},
  doi          = {10.1016/J.JNCA.2012.12.019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/QaziRMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RajeshN13,
  author       = {Anbazhagan Rajesh and
                  Rangaswamy Nakkeeran},
  title        = {Investigation on uplink collaborative contention-based bandwidth request
                  for WiMAX three hop relay networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1589--1598},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.001},
  doi          = {10.1016/J.JNCA.2013.01.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/RajeshN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RashidAAZ13,
  author       = {Sulma Rashid and
                  Abdul Hanan Abdullah and
                  Qaisar Ayub and
                  Mohd Soperi Mohd Zahid},
  title        = {Dynamic Prediction based Multi Queue {(DPMQ)} drop policy for probabilistic
                  routing protocols of delay tolerant network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1395--1402},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.030},
  doi          = {10.1016/J.JNCA.2013.02.030},
  timestamp    = {Sat, 23 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/RashidAAZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RathnayakaP13,
  author       = {A. J. Dinusha Rathnayaka and
                  Vidyasagar M. Potdar},
  title        = {Wireless Sensor Network transport protocol: {A} critical review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {134--146},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2011.10.001},
  doi          = {10.1016/J.JNCA.2011.10.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/RathnayakaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RodriguesHCJV13,
  author       = {Joel J. P. C. Rodrigues and
                  Russell Hsing and
                  Min Chen and
                  Bingli Jiao and
                  Binod Vaidya},
  title        = {Guest Editorial on Vehicular Networking Protocols},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {959--960},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.03.006},
  doi          = {10.1016/J.JNCA.2013.03.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/RodriguesHCJV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RodriguesHCJV13a,
  author       = {Joel J. P. C. Rodrigues and
                  Russell Hsing and
                  Min Chen and
                  Bingli Jiao and
                  Binod Vaidya},
  title        = {Guest editorial on vehicular communications and applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1273--1274},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.07.004},
  doi          = {10.1016/J.JNCA.2013.07.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/RodriguesHCJV13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RosaciS13,
  author       = {Domenico Rosaci and
                  Giuseppe M. L. Sarn{\`{e}}},
  title        = {Cloning mechanisms to improve agent performances},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {402--408},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.018},
  doi          = {10.1016/J.JNCA.2012.04.018},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/RosaciS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SaifO13,
  author       = {Anwar Saif and
                  Mohamed Othman},
  title        = {{SRA-MSDU:} Enhanced {A-MSDU} frame aggregation with selective retransmission
                  in 802.11n wireless networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1219--1229},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.023},
  doi          = {10.1016/J.JNCA.2013.02.023},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SaifO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SalahH13,
  author       = {Khaled Salah and
                  Mohamed Hamawi},
  title        = {Performance of IP-forwarding of Linux hosts with multiple network
                  interfaces},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {452--465},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.013},
  doi          = {10.1016/J.JNCA.2012.04.013},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SalahH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SalamehB13,
  author       = {Haythem Bany Salameh and
                  Osamah S. Badarneh},
  title        = {Opportunistic medium access control for maximizing packet delivery
                  rate in dynamic access networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {523--532},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.004},
  doi          = {10.1016/J.JNCA.2012.04.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SalamehB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SeyedzadeganOAS13,
  author       = {Mojtaba Seyedzadegan and
                  Mohamed Othman and
                  Borhanuddin Mohd Ali and
                  Shamala Subramaniam},
  title        = {Zero-Degree algorithm for Internet GateWay placement in backbone wireless
                  mesh networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1705--1723},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.031},
  doi          = {10.1016/J.JNCA.2013.02.031},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SeyedzadeganOAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShenL13,
  author       = {Weiming Shen and
                  Weidong Li},
  title        = {Collaboration technologies and applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1403--1404},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.10.012},
  doi          = {10.1016/J.JNCA.2013.10.012},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ShenL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShenL13a,
  author       = {Weiming Shen and
                  Weidong Li},
  title        = {Collaboration computing technologies and applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1577--1578},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.10.013},
  doi          = {10.1016/J.JNCA.2013.10.013},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ShenL13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShiLNH13,
  author       = {Jiancheng Shi and
                  Jianhua Liu and
                  Ruxin Ning and
                  Weiwei Hou},
  title        = {A collisions evaluation method in virtual environment for collaborativeassembly},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1523--1530},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.003},
  doi          = {10.1016/J.JNCA.2013.01.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ShiLNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SoaresSB13,
  author       = {Diego Carvalho Soares and
                  Fl{\'{a}}via Maria Santoro and
                  Fernanda Ara{\'{u}}jo Bai{\~{a}}o},
  title        = {Discovering collaborative knowledge-intensive processes through e-mail
                  mining},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1451--1465},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.007},
  doi          = {10.1016/J.JNCA.2013.02.007},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SoaresSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TadayonKAWM13,
  author       = {Navid Tadayon and
                  Sasan Khoshroo and
                  Elaheh Askari and
                  Honggang Wang and
                  Howard Michel},
  title        = {Power management in SMAC-based energy-harvesting wireless sensor networks
                  using queuing analysis},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1008--1017},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.01.009},
  doi          = {10.1016/J.JNCA.2012.01.009},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/TadayonKAWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TahanDP13,
  author       = {Marjan Naderan Tahan and
                  Mehdi Dehghan and
                  Hossein Pedram},
  title        = {Sensing task assignment via sensor selection for maximum target coverage
                  in WSNs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {262--273},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.06.003},
  doi          = {10.1016/J.JNCA.2012.06.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/TahanDP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TalayA13,
  author       = {A. Cagatay Talay and
                  D. Turgay Altilar},
  title        = {Self adaptive routing for dynamic spectrum access in cognitive radio
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1140--1151},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.007},
  doi          = {10.1016/J.JNCA.2013.01.007},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/TalayA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ToledoBH13,
  author       = {Nerea Toledo and
                  Jean{-}Marie Bonnin and
                  Marivi Higuero},
  title        = {Performance evaluation of user applications in the {ITS} scenario:
                  An analytical assessment of the NeMHIP},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1324--1336},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.02.005},
  doi          = {10.1016/J.JNCA.2012.02.005},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ToledoBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TorrentoCS13,
  author       = {Josep Rius and
                  Fernando Cores and
                  Francesc Solsona},
  title        = {Cooperative scheduling mechanism for large-scale peer-to-peer computing
                  systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1620--1631},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.002},
  doi          = {10.1016/J.JNCA.2013.01.002},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/TorrentoCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TrappeyTWFL13,
  author       = {Amy J. C. Trappey and
                  Charles V. Trappey and
                  Squall Chun{-}Yi Wu and
                  Chin{-}Yuan Fan and
                  Yi{-}Liang Lin},
  title        = {Intelligent patent recommendation system for innovative design collaboration},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1441--1450},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.035},
  doi          = {10.1016/J.JNCA.2013.02.035},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/TrappeyTWFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TsengLYLH13,
  author       = {Chien{-}Chao Tseng and
                  Chia{-}Liang Lin and
                  Li{-}Hsing Yen and
                  Jyun{-}Yan Liu and
                  Cheng{-}Yuan Ho},
  title        = {Can: {A} context-aware {NAT} traversal scheme},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {4},
  pages        = {1164--1173},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.001},
  doi          = {10.1016/J.JNCA.2013.02.001},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/TsengLYLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TyagiK13,
  author       = {Sudhanshu Tyagi and
                  Neeraj Kumar},
  title        = {A systematic review on clustering and routing techniques based upon
                  {LEACH} protocol for wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {623--645},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.001},
  doi          = {10.1016/J.JNCA.2012.12.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/TyagiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/VasiliadisRV13,
  author       = {Dimitris C. Vasiliadis and
                  George E. Rizos and
                  Costas Vassilakis},
  title        = {Modelling and performance study of finite-buffered blocking multistage
                  interconnection networks supporting natively 2-class priority routing
                  traffic},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {723--737},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.016},
  doi          = {10.1016/J.JNCA.2012.12.016},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/VasiliadisRV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Wang13,
  author       = {Chiapin Wang},
  title        = {Dynamic {ARF} for throughput improvement in 802.11 {WLAN} via a machine-learning
                  approach},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {667--676},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.025},
  doi          = {10.1016/J.JNCA.2012.12.025},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Wang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangCXFWB13,
  author       = {Zhanfeng Wang and
                  Ming Chen and
                  Chang{-}you Xing and
                  Jing Feng and
                  Xianglin Wei and
                  Huali Bai},
  title        = {Multi-manifold model of the Internet delay space},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {211--218},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.003},
  doi          = {10.1016/J.JNCA.2012.09.003},
  timestamp    = {Tue, 02 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WangCXFWB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangWLL13,
  author       = {Youxiang Wang and
                  Jianquan Wang and
                  Zhaobiao Lu and
                  Xingang Liu},
  title        = {Performance improvement of {QO-STBC} over time-selective channel for
                  wireless network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1018--1026},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.01.005},
  doi          = {10.1016/J.JNCA.2012.01.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WangWLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangYL13,
  author       = {Xiaogang Wang and
                  Ming Yang and
                  Junzhou Luo},
  title        = {A novel sequential watermark detection model for efficient traceback
                  of secret network attack flows},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1660--1670},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.015},
  doi          = {10.1016/J.JNCA.2013.01.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WangYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangZLW13,
  author       = {Yuehua Wang and
                  Zhong Zhou and
                  Ling Liu and
                  Wei Wu},
  title        = {Replica-aided load balancing in overlay networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {388--401},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.001},
  doi          = {10.1016/J.JNCA.2012.05.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WangZLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangZM13,
  author       = {Junping Wang and
                  Qiliang Zhu and
                  Yan Ma},
  title        = {An agent-based hybrid service delivery for coordinating internet of
                  things and 3rd party service providers},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1684--1695},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.04.014},
  doi          = {10.1016/J.JNCA.2013.04.014},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WangZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WaqarRAK13,
  author       = {Adeela Waqar and
                  Asad Raza and
                  Haider Abbas and
                  Muhammad Khurram Khan},
  title        = {A framework for preservation of cloud users' data privacy using dynamic
                  reconstruction of metadata},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {235--248},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.001},
  doi          = {10.1016/J.JNCA.2012.09.001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WaqarRAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WatfaAS13,
  author       = {Mohamed K. Watfa and
                  Haitham Al{-}Hassanieh and
                  Samir Salmen},
  title        = {A novel solution to the energy hole problem in sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {949--958},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.07.011},
  doi          = {10.1016/J.JNCA.2012.07.011},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WatfaAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WuPLCG13,
  author       = {Tao Wu and
                  Xiaobing Pei and
                  Yongzhong Lu and
                  Changqing Chen and
                  Liang Gao},
  title        = {A distributed collaborative product design environment based on semantic
                  norm model and role-based access control},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1431--1440},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.018},
  doi          = {10.1016/J.JNCA.2013.02.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WuPLCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WuWPL13,
  author       = {Hongchen Wu and
                  Xinjun Wang and
                  Zhaohui Peng and
                  Qingzhong Li},
  title        = {Div-clustering: Exploring active users for social collaborative recommendation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1642--1650},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.016},
  doi          = {10.1016/J.JNCA.2013.02.016},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WuWPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XiaoHLYQ13,
  author       = {Peng Xiao and
                  Zhigang Hu and
                  Dongbo Liu and
                  Guofeng Yan and
                  Xilong Qu},
  title        = {Virtual machine power measuring technique with bounded error in cloud
                  environments},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {818--828},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.002},
  doi          = {10.1016/J.JNCA.2012.12.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XiaoHLYQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XiongCL13,
  author       = {Hu Xiong and
                  Zhong Chen and
                  Fagen Li},
  title        = {New identity-based three-party authenticated key agreement protocol
                  with provable security},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {927--932},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.10.001},
  doi          = {10.1016/J.JNCA.2012.10.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XiongCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XiongZLY13,
  author       = {Junjie Xiong and
                  Yangfan Zhou and
                  Michael R. Lyu and
                  Evan F. Y. Young},
  title        = {MDiag: Mobility-assisted diagnosis for wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {167--177},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.008},
  doi          = {10.1016/J.JNCA.2012.09.008},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XiongZLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XuDZY13,
  author       = {Chuan Xu and
                  C. Du and
                  Guofeng Zhao and
                  Shui Yu},
  title        = {A novel model for user clicks identification based on hidden semi-Markov},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {791--798},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.005},
  doi          = {10.1016/J.JNCA.2012.12.005},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/XuDZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XuYNHD13,
  author       = {Yuanhao Xu and
                  Guofu Yin and
                  Yong Nie and
                  Zhengwei He and
                  Xiaolin Dai},
  title        = {Research on an active knowledge push service based on collaborative
                  intent capture},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1418--1430},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.04.010},
  doi          = {10.1016/J.JNCA.2013.04.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XuYNHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XueMHD13,
  author       = {Kaiping Xue and
                  Changsha Ma and
                  Peilin Hong and
                  Rong Ding},
  title        = {A temporal-credential-based mutual authentication and key agreement
                  scheme for wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {316--323},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.010},
  doi          = {10.1016/J.JNCA.2012.05.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XueMHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YangLGS13,
  author       = {Yang Yang and
                  Xinyu Li and
                  Liang Gao and
                  Xinyu Shao},
  title        = {A new approach for predicting and collaborative evaluating the cutting
                  force in face milling based on gene expression programming},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1540--1550},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.02.004},
  doi          = {10.1016/J.JNCA.2013.02.004},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YangLGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YangSTZ13,
  author       = {Ting Yang and
                  Yugeng Sun and
                  Javid Taheri and
                  Albert Y. Zomaya},
  title        = {{DLS:} {A} dynamic local stitching mechanism to rectify transmitting
                  path fragments in wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {306--315},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.012},
  doi          = {10.1016/J.JNCA.2012.05.012},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YangSTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YangZWYZLJ13,
  author       = {Yan Yang and
                  Yulong Zhang and
                  Alex Hai Wang and
                  Meng Yu and
                  Wanyu Zang and
                  Peng Liu and
                  Sushil Jajodia},
  title        = {Quantitative survivability evaluation of three virtual machine-based
                  server architectures},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {781--790},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.006},
  doi          = {10.1016/J.JNCA.2012.12.006},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/YangZWYZLJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YehSCL13,
  author       = {Sheng{-}Cheng Yeh and
                  Ming{-}Yang Su and
                  Hui{-}Hui Chen and
                  Chun{-}Yuen Lin},
  title        = {An efficient and secure approach for a cloud collaborative editing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {6},
  pages        = {1632--1641},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.05.012},
  doi          = {10.1016/J.JNCA.2013.05.012},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YehSCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YehYCT13,
  author       = {Lo{-}Yao Yeh and
                  Chun{-}Chuan Yang and
                  Jee{-}Gong Chang and
                  Yi{-}Lang Tsai},
  title        = {A secure and efficient batch binding update scheme for route optimization
                  of nested NEtwork MObility {(NEMO)} in VANETs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {284--292},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.06.001},
  doi          = {10.1016/J.JNCA.2012.06.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YehYCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YiO13,
  author       = {Xun Yi and
                  Eiji Okamoto},
  title        = {Practical Internet voting system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {378--387},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.005},
  doi          = {10.1016/J.JNCA.2012.05.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YiO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YingMM13,
  author       = {Bidi Ying and
                  Dimitrios Makrakis and
                  Hussein T. Mouftah},
  title        = {Privacy preserving broadcast message authentication protocol for VANETs},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {5},
  pages        = {1352--1364},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.013},
  doi          = {10.1016/J.JNCA.2012.05.013},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YingMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZarifneshatK13,
  author       = {Masoud Zarifneshat and
                  Pejman Khadivi},
  title        = {Using mobile node speed changes for movement direction change prediction
                  in a realistic category of mobility models},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1078--1090},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2013.01.012},
  doi          = {10.1016/J.JNCA.2013.01.012},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZarifneshatK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangBR13,
  author       = {Zhenxia Zhang and
                  Azzedine Boukerche and
                  Hussam M. Soliman Ramadan},
  title        = {Design and evaluation of a fast {MAC} layer handoff management scheme
                  for WiFi-based multichannel Vehicular Mesh Networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {992--1000},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.01.024},
  doi          = {10.1016/J.JNCA.2012.01.024},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangLEB13,
  author       = {Liren Zhang and
                  Abderrahmane Lakas and
                  Hesham El{-}Sayed and
                  Ezedin Barka},
  title        = {Mobility analysis in vehicular ad hoc network {(VANET)}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {1050--1056},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.008},
  doi          = {10.1016/J.JNCA.2012.12.008},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangLEB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Zhu13,
  author       = {Wen Tao Zhu},
  title        = {Towards secure and communication-efficient broadcast encryption systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {178--186},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.09.007},
  doi          = {10.1016/J.JNCA.2012.09.007},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/Zhu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/kumarN13,
  author       = {D. Satish Kumar and
                  N. Nagarajan},
  title        = {Relay technologies and technical issues in {IEEE} 802.16j Mobile Multi-hop
                  Relay {(MMR)} networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {91--102},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.04.009},
  doi          = {10.1016/J.JNCA.2012.04.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/kumarN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}