Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnw/jnw8.bht:"
@article{DBLP:journals/jnw/AdaniyaAP13, author = {Mario H. A. C. Adaniya and Taufik Abr{\~{a}}o and Mario Lemes Proen{\c{c}}a Jr.}, title = {Anomaly Detection Using Metaheuristic Firefly Harmonic Clustering}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {82--91}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.82-91}, doi = {10.4304/JNW.8.1.82-91}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AdaniyaAP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AhmadY13, author = {Khalid S. Ahmad and A. Z. Yonis}, title = {Miniaturized Hybrid Rat-Race Coupler of a 2.5 GHz Loaded by Resistors}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1465--1469}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1465-1469}, doi = {10.4304/JNW.8.7.1465-1469}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AhmadY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Al-DuwairiAG13, author = {Basheer Al{-}Duwairi and Zakaria Al{-}Qudah and Manimaran Govindarasu}, title = {A Novel Scheme for Mitigating Botnet-Based DDoS Attacks}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {297--306}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.297-306}, doi = {10.4304/JNW.8.2.297-306}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Al-DuwairiAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AliM13, author = {Zahid Ali and Qurban A. Memon}, title = {Time Delay Tracking for Multiuser Synchronization in {CDMA} Networks}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1929--1935}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1929-1935}, doi = {10.4304/JNW.8.9.1929-1935}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/AliM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BourasCSSZ13, author = {Christos Bouras and Savvas Charalambides and Kostas Stamos and Stamatis Stroumpis and Giannis Zaoudis}, title = {Power Management Mechanism Exploiting Network and Video Information over Wireless Links}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {15--25}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.15-25}, doi = {10.4304/JNW.8.1.15-25}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/BourasCSSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BuLLY13, author = {Yahui Bu and Aifen Li and Junrong Liu and Weiqiang Yu}, title = {Multisensor Acquirement System of Electrokinetic in Multiphase Flow}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1975--1981}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1975-1981}, doi = {10.4304/JNW.8.9.1975-1981}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BuLLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaiW13, author = {Jinbao Cai and Yalin Wu}, title = {An Enhanced Rate Control Initialization Method for {H.264} based on Image Quality Balance of {GOP} Using Support Vector Machines}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2155--2162}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2155-2162}, doi = {10.4304/JNW.8.9.2155-2162}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaiY13, author = {Chuan Cai and Liang Yuan}, title = {Intrusion Detection System based on Ant Colony System}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {888--894}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.888-894}, doi = {10.4304/JNW.8.4.888-894}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaiY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaiY13a, author = {Chuan Cai and Liang Yuan}, title = {Research on Energy-Saving-Based Cloud Computing Scheduling Strategy}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1153--1159}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1153-1159}, doi = {10.4304/JNW.8.5.1153-1159}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaiY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaoLWZ13, author = {Lijun Cao and Xiyin Liu and Yubin Wang and Zhongping Zhang}, title = {WSO-based Spatial Outlier Detection Algorithms}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1582--1588}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1582-1588}, doi = {10.4304/JNW.8.7.1582-1588}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaoLWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaoLZ13, author = {Lijun Cao and Xiyin Liu and Zhongping Zhang}, title = {Resource Discovery Algorithm Based on Multilayer Overlay Network}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1357--1363}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1357-1363}, doi = {10.4304/JNW.8.6.1357-1363}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaoLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Chen13, author = {Yuanqiang Chen}, title = {Stability of Impulsive Cellular Neural Networks with Time-varying Delays}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {704--711}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.704-711}, doi = {10.4304/JNW.8.3.704-711}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Chen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Chen13a, author = {Kaibing Chen}, title = {Unequal Cluster-Based Routing Protocol in Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2656--2662}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2656-2662}, doi = {10.4304/JNW.8.11.2656-2662}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Chen13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenCS13, author = {Jingyu Chen and Ping Chen and Xian'gang Sheng}, title = {A Sketch-based Clustering Algorithm for Uncertain Data Streams}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1536--1542}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1536-1542}, doi = {10.4304/JNW.8.7.1536-1542}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenDW13, author = {Jinxiu Chen and Chao Dong and Youzheng Wang}, title = {Performance Evaluation of Adaptive Modulation System over Mobile Satellite Channels}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1262--1269}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1262-1269}, doi = {10.4304/JNW.8.6.1262-1269}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenH13, author = {Jia Chen and Xian Huang}, title = {A Data-reversible Hiding Algorithm in WSNs}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2037--2042}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2037-2042}, doi = {10.4304/JNW.8.9.2037-2042}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenLF13, author = {Qinghua Chen and Yan Liu and Jianwei Feng}, title = {Quantitative Fracture Modeling on Low-permeability Sandstone Reservoirs by Stress Field}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1890--1898}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1890-1898}, doi = {10.4304/JNW.8.8.1890-1898}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenMLJRW13, author = {Meilian Chen and Yan Ma and Yikun Liu and Fan Jia and Yanhui Ran and Jie Wang}, title = {Mobile Learning System based on Cloud Computing}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2572--2577}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2572-2577}, doi = {10.4304/JNW.8.11.2572-2577}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenMLJRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenMN13, author = {Feixiang Chen and Xiao Ma and Shaoliang Ni}, title = {Organization and Correction of Spatial Data in Mobile {GIS}}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1514--1520}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1514-1520}, doi = {10.4304/JNW.8.7.1514-1520}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenMR13, author = {Feixiang Chen and Xiao Ma and Haiyan Ren}, title = {Progressive Transmission of Vector Spatial Data}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1065--1072}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1065-1072}, doi = {10.4304/JNW.8.5.1065-1072}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenPJ13, author = {Anhua Chen and Yang Pan and Lingli Jiang}, title = {Improving K-means Clustering Method in Fault Diagnosis based on {SOM} Network}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {680--687}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.680-687}, doi = {10.4304/JNW.8.3.680-687}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenQX13, author = {Peng Chen and Lede Qiu and Feng Xu}, title = {Downlink Power Control for {CDMA} Satellite Cognitive Radio}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {598--606}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.598-606}, doi = {10.4304/JNW.8.3.598-606}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenQX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenT13, author = {Yuanqiang Chen and Renbi Tian}, title = {Impulsive Tracking Control for Non-measurable State with Time-delay}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {851--857}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.851-857}, doi = {10.4304/JNW.8.4.851-857}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenT13a, author = {Yuanqiang Chen and Renbi Tian}, title = {Exponential Stability of Impulsive Discrete Systems with Multiple Delays}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2564--2571}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2564-2571}, doi = {10.4304/JNW.8.11.2564-2571}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenT13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenWYG13, author = {Shi{-}Wen Chen and Jiang{-}xing Wu and Xiao{-}long Ye and Tong Guo}, title = {Distributed Denial of Service Attacks Detection Method Based on Conditional Random Fields}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {858--865}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.858-865}, doi = {10.4304/JNW.8.4.858-865}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenWYG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenX13, author = {Yangrong Chen and Guanglin Xing}, title = {A Key Issuing Scheme in IBE-based Distributed Online Social Networks}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2213--2219}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2213-2219}, doi = {10.4304/JNW.8.10.2213-2219}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ChenX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenXGML13, author = {Feng Chen and Wenjun Xu and Yuchen Guo and Hongyu Ma and Jiaru Lin}, title = {Joint Traffic Splitting and Spectrum Resource Allocation in Heterogeneous Cognitive Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2429--2435}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2429-2435}, doi = {10.4304/JNW.8.10.2429-2435}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenXGML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenY13, author = {Dan{-}ye Chen and Qi{-}zhi Yu}, title = {Research of Computer Intelligent Control System and data processing of Welding Inverter Power Based on {DSP}}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1521--1528}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1521-1528}, doi = {10.4304/JNW.8.7.1521-1528}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenYW13, author = {Bin Chen and Hong{-}zhen Yang and Li{-}wen Wang}, title = {Single Neuron {PID} Control of Aircraft Deicing Fluids Rapid Heating System}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {405--412}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.405-412}, doi = {10.4304/JNW.8.2.405-412}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenZ13, author = {Ying Chen and Shaobai Zhang}, title = {Notice of Violation of Academy Publisher Publication Principles "Learning Tract Variables with Distal Supervised Learning Model"}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {397--404}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.397-404}, doi = {10.4304/JNW.8.2.397-404}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenZ13a, author = {Gang Chen and Dawei Zhao}, title = {Model of Information Security Risk Assessment based on Improved Wavelet Neural Network}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2093--2100}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2093-2100}, doi = {10.4304/JNW.8.9.2093-2100}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenZ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenZC13, author = {Yange Chen and Zhili Zhang and Qingfang Cui}, title = {Design of Three-dimensional Interchange Network Based on IPv4/IPv6 Network}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {650--657}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.650-657}, doi = {10.4304/JNW.8.3.650-657}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChengHH13, author = {Ching{-}Ching Cheng and Pei{-}Li Huang and Kuo{-}Hung Huang}, title = {Cooperative Learning in Lego Robotics Projects: Exploring the Impacts of Group Formation on Interaction and Achievement}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1529--1535}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1529-1535}, doi = {10.4304/JNW.8.7.1529-1535}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChengHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChengNZY13, author = {Wei{-}Min Cheng and Wen Nie and Gang Zhou and Jun{-}lei Yang}, title = {Research on Eddy Air-Curtain Dust Controlled Flow Field in Hard Rock Mechanized Driving Face}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {453--460}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.453-460}, doi = {10.4304/JNW.8.2.453-460}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChengNZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Chu13, author = {Jian Chu}, title = {Improved Shadowed Sets Data Selection Method in Extension Neural Network}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2728--2735}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2728-2735}, doi = {10.4304/JNW.8.12.2728-2735}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Chu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChuangLL13, author = {Kai{-}Wayne Chuang and Chien{-}Nan Lin and Chun{-}Hsiung Lan}, title = {Order Policy Analysis for Deteriorating Inventory Model with Trapezoidal Type Demand Rate}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1838--1844}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1838-1844}, doi = {10.4304/JNW.8.8.1838-1844}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChuangLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CuiZXZ13, author = {Zhong{-}wei Cui and Yong Zhao and Dao{-}yun Xu and Yu Zuo}, title = {A Dynamic Routing Based on Bayes Estimation for Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1403--1410}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1403-1410}, doi = {10.4304/JNW.8.6.1403-1410}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CuiZXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DengLLY13, author = {Yongliang Deng and Qiming Li and Ying Lu and Jingfeng Yuan}, title = {Topology Vulnerability Analysis and Measure of Urban Metro Network: The case of Nanjing}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1350--1356}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1350-1356}, doi = {10.4304/JNW.8.6.1350-1356}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DengLLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DingMW13, author = {Bin Ding and Yan Ma and Yiwei Wu}, title = {Playfield Detection Algorithm Based on {AGMM} in Sports Video}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1774--1780}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1774-1780}, doi = {10.4304/JNW.8.8.1774-1780}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DingMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DingYYY13, author = {Lei Ding and Fei Yu and Zhenghua Yang and Guangxue Yue}, title = {The System Design of a Node of {P2P} Networks for Intrusion Detection}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1920--1927}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1920-1927}, doi = {10.4304/JNW.8.8.1920-1927}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DingYYY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Dong13, author = {Peiyi Dong}, title = {User Equilibrium Exchange Allocation Algorithm Based on Super Network}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2743--2748}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2743-2748}, doi = {10.4304/JNW.8.12.2743-2748}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Dong13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DongLM13, author = {Fang Dong and Mengchi Liu and Kun Ma}, title = {Web Entities Extraction Based on Semi-Structured Semantic Database}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1640--1646}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1640-1646}, doi = {10.4304/JNW.8.7.1640-1646}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DongLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DuC13, author = {Juan Du and Su{-}li Chen}, title = {Research of Improved Network Malicious Information Filtering Model Based on {SVM}}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1012--1018}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1012-1018}, doi = {10.4304/JNW.8.5.1012-1018}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DuC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/EndoWOA13, author = {Keiichi Endo and Kentaro Watanabe and Dai Okano and Kaname Amano}, title = {An Efficient Position-based Broadcasting Method Considering Node Density in MANETs}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {804--811}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.804-811}, doi = {10.4304/JNW.8.4.804-811}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/EndoWOA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Fan13, author = {Xiulin Fan}, title = {Efficient Data Fusion Algorithm in WSNs}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2642--2648}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2642-2648}, doi = {10.4304/JNW.8.11.2642-2648}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/Fan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FanZ13, author = {Juan Fan and Wuyang Zhou}, title = {Joint Uplink Resource Allocation Algorithm with Proportional-Fair in Heterogeneous Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2247--2254}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2247-2254}, doi = {10.4304/JNW.8.10.2247-2254}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FanZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FangZWY13, author = {Jie Fang and Qingbiao Zhou and Xide Wu and Shijie Yang}, title = {Network Traffic Prediction Model Based on Catfish-PSO-SVM}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2534--2540}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2534-2540}, doi = {10.4304/JNW.8.11.2534-2540}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FangZWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Feng13, author = {Xiangrong Feng}, title = {Traffic Prediction Scheme based on Chaotic Models in Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2101--2106}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2101-2106}, doi = {10.4304/JNW.8.9.2101-2106}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Feng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FengHWZX13, author = {Dan Feng and Chuanhe Huang and Bo Wang and Junyu Zhu and Liya Xu}, title = {Mutihop-enabled Trusted Handoff Algorithm in Heterogeneous Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {156--164}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.156-164}, doi = {10.4304/JNW.8.1.156-164}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FengHWZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FraiwanG13, author = {Mohammad Fraiwan and Manimaran Govindarasu}, title = {Empowering PlanetLab: {A} Method for {TCP} Evaluation Over the Planetary-scale Testbed}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {307--316}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.307-316}, doi = {10.4304/JNW.8.2.307-316}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FraiwanG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FuZ13, author = {Hongliang Fu and Beibei Zhang}, title = {Compressed Sensing Precoding with Limited Feedback in Multi-carrier {MIMO} System}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1425--1431}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1425-1431}, doi = {10.4304/JNW.8.6.1425-1431}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Gao13, author = {Xiaoyan Gao}, title = {Optimality and Duality for Non-smooth Multiple Objective Semi-infinite Programming}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {413--420}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.413-420}, doi = {10.4304/JNW.8.2.413-420}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Gao13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Gao13a, author = {Xiaoyan Gao}, title = {Optimality and Duality for Minimax Fractional Semi-Infinite Programming}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {739--746}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.739-746}, doi = {10.4304/JNW.8.3.739-746}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Gao13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Gao13b, author = {Hui{-}Ying Gao}, title = {Performance Evaluation of Management Environment in Microelectronics Enterprise}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1073--1079}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1073-1079}, doi = {10.4304/JNW.8.5.1073-1079}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Gao13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaoG13, author = {Wei Gao and Zhirong Guo}, title = {Speed Sensorless Control of {PMSM} using Model Reference Adaptive System and {RBFN}}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {213--220}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.213-220}, doi = {10.4304/JNW.8.1.213-220}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaoG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaoM13, author = {Cong Gao and Jianfeng Ma}, title = {A Collaborative QoS-Aware Service Evaluation Method for Service Selection}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1370--1379}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1370-1379}, doi = {10.4304/JNW.8.6.1370-1379}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaoM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaoZC13, author = {Liai Gao and Meng Zhang and Geng Chen}, title = {An Intelligent Irrigation System Based on Wireless Sensor Network and Fuzzy Control}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1080--1087}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1080-1087}, doi = {10.4304/JNW.8.5.1080-1087}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaoZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GeDY13, author = {Xingchen Ge and Ning Deng and Jian Yin}, title = {Application for Data De-duplication Algorithm Based on Mobile Devices}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2498--2505}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2498-2505}, doi = {10.4304/JNW.8.11.2498-2505}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/GeDY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Gong13, author = {Lixiong Gong}, title = {Research on Evaluating and Choosing Logistics Service Providers for Manufacturing Enterprise}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2935--2941}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2935-2941}, doi = {10.4304/JNW.8.12.2935-2941}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Gong13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GongY13, author = {Jun Gong and Miao Yu}, title = {A Multi-objective Cross-training Plan Based on {NSGA-II}}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2310--2316}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2310-2316}, doi = {10.4304/JNW.8.10.2310-2316}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GongY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuZ13, author = {Lichuan Gu and Jinqin Zhong}, title = {An Improved Anti-collision Algorithm Based on {JDS}}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2578--2584}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2578-2584}, doi = {10.4304/JNW.8.11.2578-2584}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuangZGFH13, author = {Yan Guang and Yue{-}Fei Zhu and Chun{-}Xiang Gu and Jinlong Fei and Xin{-}Zheng He}, title = {A Framework for Automated Security Proof and its Application to {OAEP}}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {552--558}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.552-558}, doi = {10.4304/JNW.8.3.552-558}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/GuangZGFH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuangZGZF13, author = {Yan Guang and Yue{-}Fei Zhu and Chun{-}Xiang Gu and Yonghui Zheng and Jinlong Fei}, title = {An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {339--344}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.339-344}, doi = {10.4304/JNW.8.2.339-344}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/GuangZGZF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuoL13, author = {Ying Guo and Yutao Liu}, title = {Time Synchronization for Mobile Underwater Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {116--123}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.116-123}, doi = {10.4304/JNW.8.1.116-123}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuoZRZ13, author = {Xiaohui Guo and Xinmin Zhang and Haiyan Ren and Xiao Zhang}, title = {Research on Context Aware Network Security Model}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1852--1858}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1852-1858}, doi = {10.4304/JNW.8.8.1852-1858}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuoZRZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HaiWX13, author = {Linpeng Hai and Rui Wang and Liying Xiao}, title = {A Novel {RFID} Anti-Collision Algorithm based on Binary Tree}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2885--2892}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2885-2892}, doi = {10.4304/JNW.8.12.2885-2892}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HaiWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HalloushD13, author = {Mohammed D. Halloush and Tasneem Dawahdeh}, title = {On Varying Network Coding Forwarding Ratio in Vector Based Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {530--536}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.530-536}, doi = {10.4304/JNW.8.3.530-536}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HalloushD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HanHZ13, author = {Lu Han and Liyan Han and Hongwei Zhao}, title = {Credit Scoring Model Hybridizing Artificial Intelligence with Logistic Regression}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {253--261}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.253-261}, doi = {10.4304/JNW.8.1.253-261}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HanHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HanLCWW13, author = {Yanyan Han and Deshi Li and Jian Chen and Tianyu Wang and Xiaoliang Wang}, title = {Carrying Network Accessing Architecture and Strategy Based on Business Differentiation}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1470--1475}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1470-1475}, doi = {10.4304/JNW.8.7.1470-1475}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HanLCWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HanN13, author = {Xiaoting Han and Li Niu}, title = {On Charactering of Information Propagation in Online Social Networks}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {124--131}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.124-131}, doi = {10.4304/JNW.8.1.124-131}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HanN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HaoYZ13, author = {Xiaowen Hao and Jianguo Yang and Yi'e Zhao}, title = {Optimization of Integrated Pollutants Control Equipment by Computer Information Processing Technology}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2927--2934}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2927-2934}, doi = {10.4304/JNW.8.12.2927-2934}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HaoYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HassounaKK13, author = {Asma Ben Hassouna and Hend Koubaa and Farouk Kamoun}, title = {Conflict-Aware Relay Selection for Multicast in {MUD} based Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {787--795}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.787-795}, doi = {10.4304/JNW.8.4.787-795}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HassounaKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HeCWL13, author = {Jun He and Liang Chen and Xiaolong Wang and Yonggang Li}, title = {Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2143--2149}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2143-2149}, doi = {10.4304/JNW.8.9.2143-2149}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HeCWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HeQ13, author = {Lei He and Jiaxin Qi}, title = {Enterprise Human Resources Information Mining Based on Improved Apriori Algorithm}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1138--1145}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1138-1145}, doi = {10.4304/JNW.8.5.1138-1145}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HeQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Hou13, author = {Chuanyan Hou}, title = {Study of Combinatorial Operator on Poisson Manifolds}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {932--938}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.932-938}, doi = {10.4304/JNW.8.4.932-938}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Hou13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HouW13, author = {Jinkui Hou and Lei Wang}, title = {Formal Description for Component-based Architecture Model Transformation}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {874--881}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.874-881}, doi = {10.4304/JNW.8.4.874-881}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HouW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HouWHK13, author = {Xin Hou and Xingfeng Wei and Ertian Hua and Yujing Kong}, title = {Self-Adaptive and Energy-Efficient {MAC} Protocol Based on Event-Driven}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {174--181}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.174-181}, doi = {10.4304/JNW.8.1.174-181}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HouWHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HouZ13, author = {Jinkui Hou and Yuyan Zhang}, title = {Model Mapping Approach Based on Ontology Semantics}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1967--1974}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1967-1974}, doi = {10.4304/JNW.8.9.1967-1974}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HouZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Hu13, author = {Yong Hu}, title = {Minimal K-Covering Set Algorithm based on Particle Swarm Optimizer}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2872--2877}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2872-2877}, doi = {10.4304/JNW.8.12.2872-2877}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Hu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuJZZCL13, author = {Liang Hu and Jingyan Jiang and Jin Zhou and Kuo Zhao and Liang Chen and Huimin Lu}, title = {Environment Observation System based on Semantics in the Internet of Things}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2721--2727}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2721-2727}, doi = {10.4304/JNW.8.12.2721-2727}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuJZZCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuSZXMZ13, author = {Liang Hu and Shinan Song and Xiaolu Zhang and Zhenzhen Xie and Xiangyu Meng and Kuo Zhao}, title = {Analyzing Malware Based on Volatile Memory}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2512--2519}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2512-2519}, doi = {10.4304/JNW.8.11.2512-2519}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuSZXMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuWS13, author = {Haiyan Hu and Pengfei Wang and Lining Sun}, title = {Simulation Platform of Monitoring and Tracking Micro System for Dangerous Chemicals Transportation}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {477--484}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.477-484}, doi = {10.4304/JNW.8.2.477-484}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangC13, author = {Xian Huang and Jia Chen}, title = {Efficient Node Coverage Scheme of Wireless Sensor Network under Multi-Constraint Conditions}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2277--2284}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2277-2284}, doi = {10.4304/JNW.8.10.2277-2284}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangH13, author = {Wei Huang and Bo Huang}, title = {R{\&}D Outsourcing Policy with Input Spillovers Based on Multi-Outsourcer and Multi-Supplier}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2324--2331}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2324-2331}, doi = {10.4304/JNW.8.10.2324-2331}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangLFX13, author = {Zhongsheng Huang and Wensheng Li and Zhifang Feng and Huaming Xing}, title = {On Nonnegative Signed Domination in Graphs and its Algorithmic Complexity}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {365--372}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.365-372}, doi = {10.4304/JNW.8.2.365-372}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangLFX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangLLG13, author = {Xiaomao Huang and Xuan Li and Changjiang Long and Yun Gao}, title = {Guaranteed Cost Fault-tolerant Control of Networked Control Systems with Short Output Delay and Short Control Delay Based on State Observer}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {836--842}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.836-842}, doi = {10.4304/JNW.8.4.836-842}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangLLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangW13, author = {Kuo{-}Feng Huang and Shih{-}Jung Wu}, title = {Real-time-service-based Distributed Scheduling Scheme for {IEEE} 802.16j Networks}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {513--517}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.513-517}, doi = {10.4304/JNW.8.3.513-517}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangXYW13, author = {Bo Huang and Yong Xu and Mengting Yuan and Guoqing Wu}, title = {Formal Behavior Modeling: Business Processes Based on Cloud Platform}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1417--1424}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1417-1424}, doi = {10.4304/JNW.8.6.1417-1424}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangXYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangY13, author = {Jian Huang and Hongmei Yan}, title = {Indoor Localization Algorithm Based on Cooperative of State Matrix and Kalman Filter}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1197--1203}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1197-1203}, doi = {10.4304/JNW.8.5.1197-1203}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangY13a, author = {Hao Huang and Fei Yang}, title = {An Interpretation of Erlang into Value-passing Calculus}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1504--1513}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1504-1513}, doi = {10.4304/JNW.8.7.1504-1513}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangYZL13, author = {Daochao Huang and Dong Yang and Hongke Zhang and Fuhong Lin}, title = {Efficient DoS-limiting Support by Indirect Mapping in Networks with Locator/Identifier Separation}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {92--99}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.92-99}, doi = {10.4304/JNW.8.1.92-99}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangYZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JangH13, author = {Hung{-}Chin Jang and Tzu{-}Yao Hsu}, title = {Infrastructure Based Chord Structure for {P2P} File Sharing over Vehicular Network}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {588--597}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.588-597}, doi = {10.4304/JNW.8.3.588-597}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JangH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JawharMU13, author = {Imad Jawhar and Nader Mohamed and Hafsa Usmani}, title = {An Overview of Inter-Vehicular Communication Systems, Protocols and Middleware}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2749--2761}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2749-2761}, doi = {10.4304/JNW.8.12.2749-2761}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JawharMU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiWC13, author = {Mingyu Ji and Di Wu and Zhiyuan Chen}, title = {Verification Method of Conditional Probability Based on Automaton}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1329--1335}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1329-1335}, doi = {10.4304/JNW.8.6.1329-1335}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiaK13, author = {Guozhu Jia and Wen Kong}, title = {Dynamic Cell Formation based on Multi-objective Optimization Model}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1742--1749}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1742-1749}, doi = {10.4304/JNW.8.8.1742-1749}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiaK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiaXL13, author = {Zhenhua Jia and Haohan Xie and Ye Liang}, title = {Interval Similarity-Based Quantization Method for Continuous Data}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2614--2619}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2614-2619}, doi = {10.4304/JNW.8.11.2614-2619}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiaXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangH13, author = {Shaohua Jiang and Xia Hua}, title = {Construction Site Environment Temperature Monitoring System Based on ZigBee and Virtual Instrument}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {963--970}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.963-970}, doi = {10.4304/JNW.8.4.963-970}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangW13, author = {Wei Jiang and Kefu Wang}, title = {An Improved {PAPR} Suppression Algorithm based on Channel Coding in {OFDM} System}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2620--2626}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2620-2626}, doi = {10.4304/JNW.8.11.2620-2626}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangW13a, author = {Xiao{-}Yun Jiang and Horng{-}Huei Wu}, title = {Optimization of Setup Frequency for {TOC} Supply Chain Replenishment Systems Based on Pareto Particle Swarm Optimization}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2964--2971}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2964-2971}, doi = {10.4304/JNW.8.12.2964-2971}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangW13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangWWZW13, author = {Hai{-}Yan Jiang and Xing{-}ce Wang and Zhongke Wu and Mingquan Zhou and Xuesong Wang}, title = {Topic Information Collection based on the Hidden Markov Model}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {485--492}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.485-492}, doi = {10.4304/JNW.8.2.485-492}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/JiangWWZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangZJC13, author = {Lingli Jiang and Bo Zeng and Francis R. Jordan and Anhua Chen}, title = {Kernel Function and Parameters Optimization in {KICA} for Rolling Bearing Fault Diagnosis}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1913--1919}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1913-1919}, doi = {10.4304/JNW.8.8.1913-1919}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangZJC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangZZ13, author = {Shaohua Jiang and Jian Zhang and Haiyan Zhang}, title = {Ontology-based Semantic Retrieval for Risk Management of Construction Project}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1212--1220}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1212-1220}, doi = {10.4304/JNW.8.5.1212-1220}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangZZ13a, author = {Shaohua Jiang and Haiyan Zhang and Jian Zhang}, title = {Research on BIM-based Construction Domain Text Information Management}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1455--1464}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1455-1464}, doi = {10.4304/JNW.8.6.1455-1464}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangZZ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Jiao13, author = {Yabing Jiao}, title = {Electronic Commerce Logistics Network Optimization Based on Swarm Intelligent Algorithm}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2163--2170}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2163-2170}, doi = {10.4304/JNW.8.9.2163-2170}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Jiao13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiaoWZY13, author = {Wenzhe Jiao and Guoqing Wang and Zhengjun Zhai and Xiaoxue Ye}, title = {Dynamic Data Possession Checking for Secure Cloud Storage Service}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2713--2720}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2713-2720}, doi = {10.4304/JNW.8.12.2713-2720}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiaoWZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JinL13, author = {Hongying Jin and Linhao Li}, title = {Dynamic Network Traffic Flow Prediction Model based on Modified Quantum-Behaved Particle Swarm Optimization}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2332--2339}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2332-2339}, doi = {10.4304/JNW.8.10.2332-2339}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JinL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JinQZW13, author = {Hui{-}long Jin and Shu{-}li Qi and Miao Zhang and Zhiyuan Wang}, title = {Punctured Difference Set Pair and Perfect Punctured Binary Sequence Pair}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1982--1989}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1982-1989}, doi = {10.4304/JNW.8.9.1982-1989}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JinQZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JinSWF13, author = {Zhaoyan Jin and Dianxi Shi and Quanyuan Wu and Hua Fan}, title = {{MCHITS:} Monte Carlo based Method for Hyperlink Induced Topic Search on Networks}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2376--2382}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2376-2382}, doi = {10.4304/JNW.8.10.2376-2382}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/JinSWF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JinW13, author = {Xin Jin and Yaohua Wang}, title = {Research on Social Network Structure and Public Opinions Dissemination of Micro-blog Based on Complex Network Analysis}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1543--1550}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1543-1550}, doi = {10.4304/JNW.8.7.1543-1550}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JinW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KachrisT13, author = {Christoforos Kachris and Ioannis Tomkos}, title = {Optical OFDM-based Data Center Networks}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1488--1496}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1488-1496}, doi = {10.4304/JNW.8.7.1488-1496}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KachrisT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KangYX13, author = {Zhiping Kang and Honglin Yu and Qingyu Xiong}, title = {Detection and Recovery of Coverage Holes in Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {822--828}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.822-828}, doi = {10.4304/JNW.8.4.822-828}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KangYX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KhalifeHD13, author = {Jawad Khalife and Amjad Hajjar and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, title = {Performance of OpenDPI in Identifying Sampled Network Traffic}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {71--81}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.71-81}, doi = {10.4304/JNW.8.1.71-81}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KhalifeHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KleunenMH13, author = {Wouter van Kleunen and Nirvana Meratnia and Paul J. M. Havinga}, title = {Simplified Scheduling for Underwater Acoustic Networks}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {4--14}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.4-14}, doi = {10.4304/JNW.8.1.4-14}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KleunenMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KuangHZ13, author = {Zhejun Kuang and Liang Hu and Chen Zhang}, title = {Research on Human Sensory Architecture for Cyber Physical Systems}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1936--1942}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1936-1942}, doi = {10.4304/JNW.8.9.1936-1942}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KuangHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KuangHZ13a, author = {Zhejun Kuang and Liang Hu and Chen Zhang}, title = {Research on Human Sensory Architecture for Cyber Physical Systems}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2692--2698}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2692-2698}, doi = {10.4304/JNW.8.11.2692-2698}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KuangHZ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LahbyCA13, author = {Mohamed Lahby and Leghris Cherkaoui and Abdellah Adib}, title = {A Novel Ranking Algorithm Based Network Selection For Heterogeneous Wireless Access}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {263--272}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.263-272}, doi = {10.4304/JNW.8.2.263-272}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LahbyCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LaiY13, author = {Wei Kuang Lai and Kai{-}Ting Yang}, title = {Cross-Layer Dual Domain Scheduler for 3GPP-Long Term Evolution}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {189--196}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.189-196}, doi = {10.4304/JNW.8.1.189-196}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LaiY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LanTG13, author = {Jianyu Lan and Houjun Tang and Xin Geng}, title = {Finite Element Analysis of a Contactless Transformer}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2302--2309}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2302-2309}, doi = {10.4304/JNW.8.10.2302-2309}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LanTG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LariosBML13, author = {Diego Francisco Larios and Julio Barbancho and Francisco Javier Molina and Carlos Le{\'{o}}n}, title = {Localization method for low-power wireless sensor networks}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {45--58}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.45-58}, doi = {10.4304/JNW.8.1.45-58}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LariosBML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LeeKXKH13, author = {Kanghee Lee and Hyuck M. Kwon and Wenhao Xiong and Hyunggi Kim and Inha Hyun}, title = {Relay Selection Scheme for {AF} Relay Network based on Cost Function Criterion}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2187--2194}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2187-2194}, doi = {10.4304/JNW.8.10.2187-2194}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/LeeKXKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Lei13, author = {Jianyun Lei}, title = {Weighted Directed Graph-Based Authorization Delegation Model}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2812--2815}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2812-2815}, doi = {10.4304/JNW.8.12.2812-2815}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Lei13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Li13, author = {Jin Li}, title = {Model and Simulation for Collaborative {VRPSPD}}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {331--338}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.331-338}, doi = {10.4304/JNW.8.2.331-338}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Li13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Li13a, author = {Jing Li}, title = {A Fast Semantic Web Services Matchmaker for {OWL-S} Services}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1104--1111}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1104-1111}, doi = {10.4304/JNW.8.5.1104-1111}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Li13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Li13b, author = {Bowen Li}, title = {Research on Portable Fatigue Signal Detection System}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1660--1666}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1660-1666}, doi = {10.4304/JNW.8.7.1660-1666}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Li13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Li13c, author = {Linhao Li}, title = {An Improved Congestion Control Strategy Algorithm for Heterogeneous Network}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2107--2113}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2107-2113}, doi = {10.4304/JNW.8.9.2107-2113}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Li13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Li13d, author = {Liangming Li}, title = {An Integration Testing Approach Based on Composition of Unit Test Cases}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2769--2775}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2769-2775}, doi = {10.4304/JNW.8.12.2769-2775}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Li13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiBLK13, author = {Yang Li and Zhisong Bie and Jiaru Lin and Hyok Hui Kim}, title = {Low-Density Lattice Codes for Inter-Symbol Interference Channels}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1899--1905}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1899-1905}, doi = {10.4304/JNW.8.8.1899-1905}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiBLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiFLD13, author = {Xu Li and Qijing Feng and Shijie Li and Haiyang Ding}, title = {{RE-AODV:} Improved {AODV} Routing Protocol for Repairing Efficiency}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2467--2472}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2467-2472}, doi = {10.4304/JNW.8.11.2467-2472}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiFLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiH13, author = {Yuyu Li and Bo Huang}, title = {Multiple Principal-Agent Model of SMEs Pollution Regulation under Centralized Treatment}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2063--2070}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2063-2070}, doi = {10.4304/JNW.8.9.2063-2070}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiLBH13, author = {Yang Li and Xichuan Lin and Zhisong Bie and Hyok Hui Kim}, title = {Power- and Bandwidth-Efficient Euclidean Code with Sparse Generator Matrix}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1440--1447}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1440-1447}, doi = {10.4304/JNW.8.6.1440-1447}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiLBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiLQ13, author = {Jianjun Li and Xibing Li and Xilong Qu}, title = {Signature Analysis Based on Improved {EMD} with High-order Spline Interpolation}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {882--887}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.882-887}, doi = {10.4304/JNW.8.4.882-887}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiLQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiLSSY13, author = {Xuhui Li and Gangyan Li and Guowen Sun and Huiping Shi and Baoan Yang}, title = {Research on Layout Optimization of Urban Circle Solid Waste Transfer and Disposal Stations}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1803--1809}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1803-1809}, doi = {10.4304/JNW.8.8.1803-1809}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiLSSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiM13, author = {Jing Li and Dianfu Ma}, title = {Suffix Tree Based Incremental Web Services Clustering Method}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1566--1573}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1566-1573}, doi = {10.4304/JNW.8.7.1566-1573}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiTZ13, author = {Fangwei Li and Yongchuan Tang and Jiang Zhu}, title = {Dynamic Resource Access Using Graphical Game in Asymmetric Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1845--1851}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1845-1851}, doi = {10.4304/JNW.8.8.1845-1851}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiW13, author = {Hehua Li and Chunling Wu}, title = {Study on the Application of Digital Certificates in the Protection of Network Information Security and Data Integrity}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2592--2598}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2592-2598}, doi = {10.4304/JNW.8.11.2592-2598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiWLBLK13, author = {Song Li and Yuhao Wang and Henry Leung and Dakun Bao and Boyuan Li and Bo Kong}, title = {The Inversion-based Coverage Prediction Tool for Cellular Networks - Real City Experiments}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1700--1707}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1700-1707}, doi = {10.4304/JNW.8.8.1700-1707}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiWLBLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiWP13, author = {Jiyun Li and Junping Wang and Hongxing Pei}, title = {Data Cleaning of Medical Data for Knowledge Mining}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2663--2670}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2663-2670}, doi = {10.4304/JNW.8.11.2663-2670}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiWWK13, author = {Hehua Li and Chunling Wu and Wei Wei and Buddha Khoukhi}, title = {Decentralized Distribution Update Algorithm Based on Compressibility-controlled Wireless Sensor Network}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2078--2084}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2078-2084}, doi = {10.4304/JNW.8.9.2078-2084}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiWWK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiWYRG13, author = {Yuxiang Li and Haiming Wang and Hongkui Yu and Changquan Ren and Qingjia Geng}, title = {Network Intrusion Detection based on {GMKL} Algorithm}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1322--1328}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1322-1328}, doi = {10.4304/JNW.8.6.1322-1328}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiWYRG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiZRS13, author = {Hui Li and Jingxiao Zhang and Lieyan Ren and Zhen Shi}, title = {Scheduling Optimization of Construction Engineering based on Ant Colony Optimized Hybrid Genetic Algorithm}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1411--1416}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1411-1416}, doi = {10.4304/JNW.8.6.1411-1416}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiZRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiZY13, author = {Haihong Li and Luo Zhong and Huaxiong Yao}, title = {Detecting Protein Complexes through Micro-Network Comparison in Protein-Protein Interaction Networks}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {696--703}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.696-703}, doi = {10.4304/JNW.8.3.696-703}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liang13, author = {Ping Liang}, title = {A Bisimulation-based Hierarchical Framework for Software Development Models}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1720--1725}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1720-1725}, doi = {10.4304/JNW.8.8.1720-1725}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liang13a, author = {Bao{-}juan Liang}, title = {Traffic Flow Detection Based on Wireless Sensor Network}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1859--1865}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1859-1865}, doi = {10.4304/JNW.8.8.1859-1865}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liang13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiaoB13, author = {Wenjing Liao and Z. Balzen}, title = {{LSSVM} Network Flow Prediction Based on the Self-adaptive Genetic Algorithm Optimization}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {507--512}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.507-512}, doi = {10.4304/JNW.8.2.507-512}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiaoB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiaoYZ13, author = {Zhuhua Liao and Aiping Yi and Guoqing Zhang}, title = {Distributed Data Integration in Content-centric Networks}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1950--1959}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1950-1959}, doi = {10.4304/JNW.8.9.1950-1959}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiaoYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LinL13, author = {Wenhui Lin and Jun Liu}, title = {Performance Analysis of MapReduce Program in Heterogeneous Cloud Computing}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1734--1741}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1734-1741}, doi = {10.4304/JNW.8.8.1734-1741}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LinL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liu13, author = {Chun{-}Ying Liu}, title = {Adaptive Search Protocol Based on Optimized Ant Colony Algorithm in Peer-to-Peer Network}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {843--850}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.843-850}, doi = {10.4304/JNW.8.4.843-850}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liu13a, author = {Chun{-}Ying Liu}, title = {An Improved Adaptive Genetic Algorithm for the Multi-depot Vehicle Routing Problem with Time Window}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1035--1042}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1035-1042}, doi = {10.4304/JNW.8.5.1035-1042}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liu13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuC13, author = {Hao Liu and Zhigang Chen}, title = {Research on {P2P} Overlay Network Model with Small-world Features}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2043--2049}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2043-2049}, doi = {10.4304/JNW.8.9.2043-2049}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuCLH13, author = {Xiyin Liu and Lijun Cao and Min Liu and Kun Han}, title = {Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1380--1386}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1380-1386}, doi = {10.4304/JNW.8.6.1380-1386}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuCLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuCZS13, author = {Qi Liu and Jun Cui and HongDong Zhao and Hong Shen}, title = {A Soft Fault-concept Diagnosis Method of Analog Circuits Based on Cloud Model Theory}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1497--1503}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1497-1503}, doi = {10.4304/JNW.8.7.1497-1503}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuCZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuGZHL13, author = {Ying Liu and Wenxiang Gu and Tingting Zou and Qingtao Huang and Qiao Li}, title = {Incremental Knowledge Compilation Using the Extension Rule}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2241--2246}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2241-2246}, doi = {10.4304/JNW.8.10.2241-2246}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuGZHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuH13, author = {Daojian Liu and Tianmin Huang}, title = {A Reduced-Order Correction Algorithm for the Linear Programming Problem by Non-negative Constraints with the Most-Obtuse Angle}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2361--2367}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2361-2367}, doi = {10.4304/JNW.8.10.2361-2367}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/LiuH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuKZY13, author = {Hean Liu and Zhike Kuang and Cizhen Zhang and Goodson A. Yilly}, title = {Research on Spectrum Allocation Based on the Network Weights of Internet of Things}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2804--2811}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2804-2811}, doi = {10.4304/JNW.8.12.2804-2811}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuKZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuLHRR13, author = {Mingyang Liu and Shufen Liu and Changhong Hu and Y. V. Ramana Reddy and Sumitra Reddy}, title = {Personalized Search Based on Context-Centric Model}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1551--1557}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1551-1557}, doi = {10.4304/JNW.8.7.1551-1557}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuLHRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuLQ13, author = {Yao Liu and Qiao Liu and Zhiguang Qin}, title = {Community Detecting and Feature Analysis in Real Directed Weighted Social Networks}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1432--1439}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1432-1439}, doi = {10.4304/JNW.8.6.1432-1439}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuLQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuPHT13, author = {Xiaozhu Liu and Yuwei Peng and Yuanhua He and Zukai Tang}, title = {Uniform Storage Model-based Update Scheme of On-line Information Retrieval System}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2179--2185}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2179-2185}, doi = {10.4304/JNW.8.9.2179-2185}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuPHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuS13, author = {Wenxue Liu and Guanying Sun}, title = {A Trust-based Information Propagation Model in Online Social Networks}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1767--1773}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1767-1773}, doi = {10.4304/JNW.8.8.1767-1773}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuS13a, author = {Wenxue Liu and Guanying Sun}, title = {An advanced Data Mining Strategy for Multi-Target Tracking in Adverse Environments}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1997--2004}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1997-2004}, doi = {10.4304/JNW.8.9.1997-2004}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuXY13, author = {Kun Liu and Gaochao Xu and Jun'e Yuan}, title = {An Improved Hadoop Data Load Balancing Algorithm}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2816--2822}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2816-2822}, doi = {10.4304/JNW.8.12.2816-2822}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuYXK13, author = {Ting T. Liu and Wei Yang and Chang L. Xu and Young{-}Il Kim}, title = {A SNR-based Multi-channel Multicast Scheme for Popular Video in Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {628--635}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.628-635}, doi = {10.4304/JNW.8.3.628-635}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuYXK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuZL13, author = {Hongwei Liu and Peng Zhang and Jun Liu}, title = {Public Data Integrity Verification for Secure Cloud Storage}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {373--380}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.373-380}, doi = {10.4304/JNW.8.2.373-380}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuZZ13, author = {Qiuyan Liu and Peng Zhang and Yuping Zhao}, title = {Energy Efficient Deployment of Heterogeneous Networks}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2422--2428}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2422-2428}, doi = {10.4304/JNW.8.10.2422-2428}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LongO13, author = {Yanjun Long and Jianquan Ouyang}, title = {Research on Multicast Reliability in Distributed Virtual Environment}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1130--1137}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1130-1137}, doi = {10.4304/JNW.8.5.1130-1137}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LongO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LongOS13, author = {Yanjun Long and Jianquan Ouyang and Xinwen Sun}, title = {Network Intrusion Detection Model based on Fuzzy Support Vector Machine}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1387--1394}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1387-1394}, doi = {10.4304/JNW.8.6.1387-1394}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LongOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LongX13, author = {Yue Long and Qiang Xian}, title = {Logistics Optimization of Auto Parts Supplier Embedded by Service Alliance}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2444--2451}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2444-2451}, doi = {10.4304/JNW.8.10.2444-2451}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LongX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Lu13, author = {Biao Lu}, title = {Credibility Control Method Based on Error Transfer Model}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2029--2036}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2029-2036}, doi = {10.4304/JNW.8.9.2029-2036}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Lu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Lu13a, author = {Jiuyuan Lu}, title = {Bit Loading Algorithm Based on Channel Detection in {VSF-OFCDM} Wireless Communication System}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2135--2142}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2135-2142}, doi = {10.4304/JNW.8.9.2135-2142}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Lu13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuJ13, author = {Ying Lu and Peng Jing}, title = {The Combination of Postponement Operations in a Supply Chain Network with Multi-level Product Differentiations}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2900--2907}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2900-2907}, doi = {10.4304/JNW.8.12.2900-2907}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuP13, author = {Jianchang Lu and Leping Pei}, title = {Security Evaluation of Power Network Information System Based on Analytic Network Process}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {866--873}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.866-873}, doi = {10.4304/JNW.8.4.866-873}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuY13, author = {Kai{-}Sheng Lu and Xiao{-}Bing Yi}, title = {On Some Separability, Reducibility and Controllability Criteria of {RLCM} Networks over {F(Z)}}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {903--909}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.903-909}, doi = {10.4304/JNW.8.4.903-909}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuoCW13, author = {Yan Luo and Xuzhou Chen and Jie Wang}, title = {A Virtual Network Embedding Algorithm for Providing Stronger Connectivity in the Residual Networks}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {779--786}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.779-786}, doi = {10.4304/JNW.8.4.779-786}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuoCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LvZ13, author = {Lei Lv and Zhongpei Zhang}, title = {A Selfish Linear Precoding Strategy for Downlink Two-User {MIMO} Systems Using Limited Rate Feedback}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1476--1479}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1476-1479}, doi = {10.4304/JNW.8.7.1476-1479}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LvZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MaSZ13, author = {Yong Ma and Yanguang Sun and Yujiao Zeng}, title = {Parameter Identification for Iron and Steel Enterprise Steam Network Model}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {421--428}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.421-428}, doi = {10.4304/JNW.8.2.421-428}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MaSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MaZM13, author = {Wenming Ma and Yujie Zhang and Xiangwu Meng}, title = {Distribution Aware Collaborative Spread Replication for Rare Objects in Unstructured Peer-to-Peer Networks}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {991--998}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.991-998}, doi = {10.4304/JNW.8.5.991-998}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MaZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MakkiB13, author = {S. Kami Makki and Keenan B. Bonds}, title = {Enhancing Node Cooperation in Mobile Ad Hoc Network}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {645--649}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.645-649}, doi = {10.4304/JNW.8.3.645-649}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MakkiB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MaoX13, author = {Tengyue Mao and Zhengquan Xu}, title = {An Effective QoS Integrated Weighted Cost Model for {LEO/MEO} Satellite {IP} Networks}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2706--2711}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2706-2711}, doi = {10.4304/JNW.8.11.2706-2711}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MaoX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MaoX13a, author = {Tengyue Mao and Zhengquan Xu}, title = {An Effective Mechanism for Improving Performance of {TCP} over {LEO/MEO} Satellite {IP} Networks}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2942--2947}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2942-2947}, doi = {10.4304/JNW.8.12.2942-2947}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MaoX13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MartinRZRG13, author = {Jos{\'{e}} Antonio G{\'{o}}mez Martin and Ana Ver{\'{o}}nica Medina Rodr{\'{\i}}guez and Enrique Dorronzoro Zubiete and Octavio Rivera Romero and Sergio Mart{\'{\i}}n Guill{\'{e}}n}, title = {Fingerprint Indoor Position System Based}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {37--44}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.37-44}, doi = {10.4304/JNW.8.1.37-44}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MartinRZRG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MasihpourFA13, author = {Mehrnoush Masihpour and Daniel Robert Franklin and Mehran Abolhasan}, title = {Multihop Relay Techniques for Communication Range Extension in Near-Field Magnetic Induction Communication Systems}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {999--1011}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.999-1011}, doi = {10.4304/JNW.8.5.999-1011}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MasihpourFA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MassnerRH13, author = {Stephan Massner and Chris Richter and Uwe Hautzendorfer}, title = {{SIP} Trunking - General Requirements for Interconnecting Enterprise Networks}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2195--2212}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2195-2212}, doi = {10.4304/JNW.8.10.2195-2212}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MassnerRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MendezL13, author = {Diego Mendez and Miguel A. Labrador}, title = {On Sensor Data Verification for Participatory Sensing Systems}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {576--587}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.576-587}, doi = {10.4304/JNW.8.3.576-587}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MendezL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MiaoLW13, author = {Xuna Miao and Ran Liu and Yingfeng Wang}, title = {A Network Evaluation Algorithm in Heterogeneous Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2473--2477}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2473-2477}, doi = {10.4304/JNW.8.11.2473-2477}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MiaoLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MingZLM13, author = {Dexiang Ming and Xiaopeng Zhong and Lili Liu and Xiandong Ma}, title = {Design of a Reconfigurable Platform for Navigation Signal Simulation}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1019--1026}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1019-1026}, doi = {10.4304/JNW.8.5.1019-1026}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MingZLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MirchandaniB13, author = {Vinod Mirchandani and Peter Bert{\'{o}}k}, title = {Optimized Energy Management for Mixed Uplink Traffic in {LTE} {UE}}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {537--551}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.537-551}, doi = {10.4304/JNW.8.3.537-551}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MirchandaniB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MokhtarSAA13, author = {Rania A. Mokhtar and Rashid A. Saeed and Raed A. Alsaqour and Yahia Abdallah}, title = {Study on Energy Detection-based Cooperative Sensing in Cognitive Radio Networks}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1255--1261}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1255-1261}, doi = {10.4304/JNW.8.6.1255-1261}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/MokhtarSAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MoudiO13, author = {Mehrnaz Moudi and Mohamed Othman}, title = {A Cost-Effective Architecture For Optical Multistage Interconnection Network}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {345--350}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.345-350}, doi = {10.4304/JNW.8.2.345-350}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MoudiO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MovassaghiAL13, author = {Samaneh Movassaghi and Mehran Abolhasan and Justin Lipman}, title = {A Review of Routing Protocols in Wireless Body Area Networks}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {559--575}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.559-575}, doi = {10.4304/JNW.8.3.559-575}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MovassaghiAL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MuZ13, author = {Ruihui Mu and Wuqiang Zhang}, title = {{QAODV:} Improved Security Routing Protocol of {AODV}}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2400--2405}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2400-2405}, doi = {10.4304/JNW.8.10.2400-2405}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NiC13, author = {Yunlu Ni and Hang Chen}, title = {Detection of Underwater Carrier-Free Pulse based on Time-Frequency Analysis}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {205--212}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.205-212}, doi = {10.4304/JNW.8.1.205-212}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NiC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NiZWSZZ13, author = {Qiufen Ni and Rongbo Zhu and Zhenguo Wu and Yongli Sun and Lingyun Zhou and Bin Zhou}, title = {Spectrum Allocation Based on Game Theory in Cognitive Radio Networks}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {712--722}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.712-722}, doi = {10.4304/JNW.8.3.712-722}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NiZWSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NieQ13, author = {Gang Nie and Xiuhua Qing}, title = {Comparison and Handover Performance Evaluation of the Macro-mobility Protocol}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {100--107}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.100-107}, doi = {10.4304/JNW.8.1.100-107}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NieQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Ning13, author = {Zhang Ji Bo Ning}, title = {Research on Web Information Retrieval based on Vector Space Model}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {688--695}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.688-695}, doi = {10.4304/JNW.8.3.688-695}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Ning13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NingFS13, author = {Lianju Ning and Xin Feng and Lichi Sun}, title = {A Secure Protocol for Efficient {SMS} Transmission and Management}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2171--2178}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2171-2178}, doi = {10.4304/JNW.8.9.2171-2178}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NingFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NiuC13, author = {Huiqing Niu and Hong Chen}, title = {An Improved Recommendation Algorithm in Knowledge Network}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1336--1342}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1336-1342}, doi = {10.4304/JNW.8.6.1336-1342}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NiuC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NiuWZGZ13, author = {Xiaoxia Niu and Yanxia Wu and Bowei Zhang and Guochang Gu and Guoyin Zhang}, title = {Rapid FPGA-based Delay Estimation for the Hardware/Software Partitioning}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1183--1190}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1183-1190}, doi = {10.4304/JNW.8.5.1183-1190}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NiuWZGZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ObaidatASOO13, author = {Muath A. Obaidat and Mohamed A. Ali and Ihsan Shahwan and Mohammad S. Obaidat and Suhaib Obeidat}, title = {QoS-Aware Multipath Communications over MANETs}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {26--36}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.26-36}, doi = {10.4304/JNW.8.1.26-36}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ObaidatASOO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ObaidatCSF13, author = {Mohammad S. Obaidat and Daniel Cascado Caballero and Jos{\'{e}} Luis Sevillano and Joaquim Filipe}, title = {Guest Editorial}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {1--3}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.1-3}, doi = {10.4304/JNW.8.1.1-3}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ObaidatCSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/OuW13, author = {Yang Ou and Yi{-}Ming Wang}, title = {Multiple Antennas Spectrum Sensing for Cognitive Radio Networks}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {665--671}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.665-671}, doi = {10.4304/JNW.8.3.665-671}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/OuW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Ouyang13, author = {Jiankun Ouyang}, title = {Energy-Efficient Data Processing Scheme in Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1667--1672}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1667-1672}, doi = {10.4304/JNW.8.7.1667-1672}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Ouyang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/OuyangC13, author = {Guang Ouyang and Xiang Chen}, title = {Trust Model Based on {P2P} Network}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2013--2020}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2013-2020}, doi = {10.4304/JNW.8.9.2013-2020}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/OuyangC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PaceA13, author = {Pasquale Pace and Gianluca Aloi}, title = {Managing and Deploying Pervasive Wireless Internet Access through Attractive Connection Sharing and Reselling Mechanisms}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {351--364}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.351-364}, doi = {10.4304/JNW.8.2.351-364}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PaceA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Peng13, author = {Hui Peng}, title = {Research of Collaborative Filtering Recommendation Algorithm based on Network Structure}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2383--2391}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2383-2391}, doi = {10.4304/JNW.8.10.2383-2391}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Peng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PengLHZY13, author = {Kai Peng and Rongheng Lin and Binbin Huang and Hua Zou and Fangchun Yang}, title = {Node Importance of Data Center Network Based on Contribution Matrix of Information Entropy}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1248--1254}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1248-1254}, doi = {10.4304/JNW.8.6.1248-1254}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PengLHZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PirmoradianAP13, author = {Mahdi Pirmoradian and Olayinka Adigun and Christos Politis}, title = {Adaptive Spectrum Opportunity Access in Cognitive Radio Networks}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {747--754}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.747-754}, doi = {10.4304/JNW.8.4.747-754}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PirmoradianAP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Pu13, author = {Fei Pu}, title = {Modular Reversibility Analysis in Self-loops Connections of Petri Net Systems}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {493--500}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.493-500}, doi = {10.4304/JNW.8.2.493-500}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Pu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/QiLCH13, author = {Yanbo Qi and Zhong Liu and Huadong Chen and Jieying Han}, title = {Distributed Combat System of Systems Network Modeling}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1906--1912}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1906-1912}, doi = {10.4304/JNW.8.8.1906-1912}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/QiLCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/QiuL13, author = {Yinghui Qiu and Chao Liu}, title = {Security and Stability Analysis for Yunnan Power Grid with Wind Power Integration}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2893--2899}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2893-2899}, doi = {10.4304/JNW.8.12.2893-2899}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/QiuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/QuWXW13, author = {Haipeng Qu and Lili Wen and Yanfei Xu and Ning Wang}, title = {{LCCWS:} Lightweight Copyfree Cross-layer Web Server}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {165--173}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.165-173}, doi = {10.4304/JNW.8.1.165-173}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/QuWXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RahmanBJF13, author = {Rony Hasinur Rahman and Craig R. Benson and Frank Jiang and Michael R. Frater}, title = {{LOARP:} {A} Low Overhead Routing Protocol for Underwater Acoustic Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {317--330}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.317-330}, doi = {10.4304/JNW.8.2.317-330}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RahmanBJF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RajuK13, author = {K. V. Krishnam Raju and V. Valli Kumari}, title = {Formal Verification of {IEEE} 802.11 Authentication Protocols}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {769--778}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.769-778}, doi = {10.4304/JNW.8.4.769-778}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RajuK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RanSL13, author = {Wenxue Ran and Xinling Shi and Li Liu}, title = {Combination of the Sorting Line Priority Polling Control Mechanism}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2234--2240}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2234-2240}, doi = {10.4304/JNW.8.10.2234-2240}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/RanSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RongCL13, author = {Haina Rong and Jixiang Cheng and Yuquan Li}, title = {Radar Emitter Signal Analysis with Estimation of Distribution Algorithms}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {108--115}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.108-115}, doi = {10.4304/JNW.8.1.108-115}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RongCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RuanZL13, author = {Dian{-}xu Ruan and Xiaoguang Zhang and Li{-}Jun Li}, title = {Safety Data Fusion Algorithm in Wireless Sensor Network}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1121--1129}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1121-1129}, doi = {10.4304/JNW.8.5.1121-1129}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/RuanZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SalamL13, author = {Md. Iftekhar Salam and Hoon{-}Jae Lee}, title = {Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {977--984}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.977-984}, doi = {10.4304/JNW.8.5.977-984}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/SalamL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShenSX13, author = {Shaowei Shen and Zuiyi Shen and Bing Xu}, title = {Analysis of Fishery Production Efficiency based on the Three-Stage {DEA}}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {461--468}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.461-468}, doi = {10.4304/JNW.8.2.461-468}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShenSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShenXLQ13, author = {Xiaoyan Shen and Chenjiang Xie and Haoxue Liu and Zhaowen Qiu}, title = {Model and Algorithm for Routing and Scheduling Problem in Hazardous Materials Transportation Network}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1027--1034}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1027-1034}, doi = {10.4304/JNW.8.5.1027-1034}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShenXLQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShuaiH13, author = {Jun Shuai and Xuli Han}, title = {Constructing Low-Dimensional Dynamical Systems of Nonlinear Partial Differential Equations Using Optimization}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2520--2526}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2520-2526}, doi = {10.4304/JNW.8.11.2520-2526}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShuaiH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShuaibKA13, author = {Khaled Shuaib and Issa Khalil and Mohammed Abdel{-}Hafez}, title = {Communications in Smart Grid: {A} Review with Performance, Reliability and Security Consideration}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1229--1240}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1229-1240}, doi = {10.4304/JNW.8.6.1229-1240}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ShuaibKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Song13, author = {Di Song}, title = {Research on Information Propagation Model for Microblogging}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1647--1653}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1647-1653}, doi = {10.4304/JNW.8.7.1647-1653}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Song13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SongZ13, author = {Limin Song and Junli Zhang}, title = {Load Balancing Method Based on Servers and Reverse Proxy}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1609--1616}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1609-1616}, doi = {10.4304/JNW.8.7.1609-1616}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SongZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Su13, author = {Rui Su}, title = {Identification Method of Sports Throwing Force Based on Fuzzy Neural Network}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1574--1581}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1574-1581}, doi = {10.4304/JNW.8.7.1574-1581}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Su13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SuZ13, author = {Baishun Su and Baoding Zhang}, title = {Wireless Position Scheme based on ZigBee Network in the Freeway {ETC} System}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {658--664}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.658-664}, doi = {10.4304/JNW.8.3.658-664}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SuhairiG13, author = {Kasman Suhairi and Ford Lumban Gaol}, title = {The Measurement of Optimization Performance of Managed Service Division with {ITIL} Framework using Statistical Process Control}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {518--529}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.518-529}, doi = {10.4304/JNW.8.3.518-529}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SuhairiG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunHS13, author = {Zheng Sun and Xuezheng Han and Zhufeng Shao}, title = {A Hierarchical Routing Protocol Based on Energy Efficiency and Chain Structure for One-Way Aerial Ropeways for Underground Mine}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2491--2497}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2491-2497}, doi = {10.4304/JNW.8.11.2491-2497}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunJJ13, author = {Chengshuang Sun and Fan Jiang and Shaohua Jiang}, title = {Research on {RFID} Applications in Construction Industry}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1221--1228}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1221-1228}, doi = {10.4304/JNW.8.5.1221-1228}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunS13, author = {Hailing Sun and Tianbao Su}, title = {Project Cost Prediction Model Based on Fuzzy Theory}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1595--1600}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1595-1600}, doi = {10.4304/JNW.8.7.1595-1600}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunS13a, author = {Zheng Sun and Zhufeng Shao}, title = {Greedy Forwarding Routing Strategy Based on Energy Efficiency in Wireless Sensor Network}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2317--2323}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2317-2323}, doi = {10.4304/JNW.8.10.2317-2323}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunW13, author = {Yuan Sun and Qian Wang}, title = {Demand Analysis of Water Resources Based on Pulse Process of Complex System}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {910--916}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.910-916}, doi = {10.4304/JNW.8.4.910-916}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunWSW13, author = {Jian Sun and Chenghua Wang and Jing Sun and Lei Wang}, title = {Analog Circuit Soft Fault Diagnosis based on {PCA} and {PSO-SVM}}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2791--2796}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2791-2796}, doi = {10.4304/JNW.8.12.2791-2796}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunWSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunZWNZ13, author = {Yongli Sun and Bin Zhou and Zhenguo Wu and Qiufen Ni and Rongbo Zhu}, title = {Multi-channel {MAC} Protocol in Cognitive Radio Networks}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2478--2490}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2478-2490}, doi = {10.4304/JNW.8.11.2478-2490}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunZWNZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TanL13, author = {Jinsheng Tan and Peng Liu}, title = {Efficient Flow Control Scheme in Multimedia Cloud Computing}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2285--2292}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2285-2292}, doi = {10.4304/JNW.8.10.2285-2292}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TanL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TanPNLL13, author = {Guoping Tan and Xinhua Peng and Xinyang Ni and Betene A. Francis Lin and Xiuquan Liu}, title = {{PNCRM:} {A} Novel Real-time Multicast Scheme in MANETs Based on Partial Network Coding}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2414--2421}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2414-2421}, doi = {10.4304/JNW.8.10.2414-2421}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TanPNLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TanXH13, author = {Xiaolin Tan and Zhongyang Xiong and Yun He}, title = {Signal Attenuation-aware Clustering in Wireless Mobile Ad Hoc Networks}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {796--803}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.796-803}, doi = {10.4304/JNW.8.4.796-803}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TanXH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TanZ13, author = {Jianwei Tan and Yiqing Zhang}, title = {Research on Multi-Sensor Multi-Target Tracking Algorithm}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2527--2533}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2527-2533}, doi = {10.4304/JNW.8.11.2527-2533}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TanZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TangLWZ13, author = {Jianqiang Tang and Ying Liu and Ming Wan and Hongke Zhang}, title = {Blocking DoS Attack Traffic in Network with Locator/Identifier Separation}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {731--738}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.731-738}, doi = {10.4304/JNW.8.3.731-738}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TangLWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TaoC13, author = {Jinlong Tao and Lirong Chen}, title = {Software Test Case Automated Generation Algorithm with Extended {EDPN} Model}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1825--1830}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1825-1830}, doi = {10.4304/JNW.8.8.1825-1830}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TaoC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TaoX13, author = {Tao Tao and Hongze Xu}, title = {Adaptive Fault-Tolerant Control for Time-Varying Failure in High-Speed Train Computer Systems}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2823--2828}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2823-2828}, doi = {10.4304/JNW.8.12.2823-2828}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TaoX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Tian13, author = {Xiaoyong Tian}, title = {Chaos Encryption Algorithm to Deal with Security Threat to Internet of Things {RFID}}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1168--1174}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1168-1174}, doi = {10.4304/JNW.8.5.1168-1174}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Tian13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TongJL13, author = {Weiming Tong and Xianji Jin and Lei Lu}, title = {Optimized Information Transmission Scheduling Strategy Oriented to Advanced Metering Infrastructure}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {245--252}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.245-252}, doi = {10.4304/JNW.8.1.245-252}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TongJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TsaiZJ13, author = {Chung{-}Hung Tsai and Dauw{-}Song Zhu and Yueh{-}Meei Jang}, title = {A Study on the Consumer Adoption Behaviors of Internet Bank}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2956--2963}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2956-2963}, doi = {10.4304/JNW.8.12.2956-2963}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TsaiZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TuGHY13, author = {Guangyou Tu and Songtao Guo and Hongyu Huang and Yuanyuan Yang}, title = {Optimal Resource Allocation for Cross-layer Utility Maximization in Ad Hoc Networks}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1757--1766}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1757-1766}, doi = {10.4304/JNW.8.8.1757-1766}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TuGHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WanHSFL13, author = {Qingsheng Wan and Shaobin Huang and Kai Sun and Lifu Feng and Ya Li}, title = {A Domain Information Retrieval Method based on Pension Insurance Ontology Concept Similarity}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2908--2914}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2908-2914}, doi = {10.4304/JNW.8.12.2908-2914}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WanHSFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WanHW13, author = {Qingsheng Wan and Shaobin Huang and Mengxi Wei}, title = {Research on Pretreatment of Questions Based on Large-scale Real Questions Set}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1810--1816}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1810-1816}, doi = {10.4304/JNW.8.8.1810-1816}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WanHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WanJ13, author = {Li Wan and Yang Jie}, title = {Context-aware Greedy Scheduling Algorithm in Wireless Network}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1788--1795}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1788-1795}, doi = {10.4304/JNW.8.8.1788-1795}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WanJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WanY13, author = {Li Wan and Jie Yang}, title = {Advanced Split {BIRCH} Algorithm in Reconfigurable Network}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2050--2056}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2050-2056}, doi = {10.4304/JNW.8.9.2050-2056}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WanY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Wang13, author = {Shaolin Wang}, title = {Cascading Model of Infrastructure Networks based on Complex Network}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1448--1454}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1448-1454}, doi = {10.4304/JNW.8.6.1448-1454}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Wang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Wang13a, author = {Yanjun Wang}, title = {Network Intrusion Detection Technology based on Improved C-means Clustering Algorithm}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2541--2547}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2541-2547}, doi = {10.4304/JNW.8.11.2541-2547}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Wang13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Wang13b, author = {Feichao Wang}, title = {Energy Consumption Oriented Network-on-Chip Mapping Method}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2857--2863}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2857-2863}, doi = {10.4304/JNW.8.12.2857-2863}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Wang13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangC13, author = {Yan Wang and Xiufeng Cao}, title = {Process of Assembling Component Based on Domain Ontology}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2347--2352}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2347-2352}, doi = {10.4304/JNW.8.10.2347-2352}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangCNZ13, author = {Keqing Wang and Jianzhong Chen and Yingtao Niu and Yonggang Zhu}, title = {A novel Spectrum Estimation Algorithm Based on Compressed Sensing and Multi-taper Method}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {971--976}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.971-976}, doi = {10.4304/JNW.8.4.971-976}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangCNZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangDX13, author = {Zhongwen Wang and Ruizhen Duan and Xiaoqiu Xu}, title = {Model Identification of Hydrostatic Center Frame Control System based on {MATLAB}}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1315--1321}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1315-1321}, doi = {10.4304/JNW.8.6.1315-1321}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangDX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangH13, author = {Jing Wang and Yourui Huang}, title = {Improved Artificial Fish Algorithm for Parameters Optimization of {PID} Neural Network}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1726--1733}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1726-1733}, doi = {10.4304/JNW.8.8.1726-1733}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangH13a, author = {Jing Wang and Yourui Huang}, title = {Decimal Integer Multiplication based on Molecular Beacons}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2762--2768}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2762-2768}, doi = {10.4304/JNW.8.12.2762-2768}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangH13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangHCX13, author = {Yuan Wang and Liang Hu and Jian Feng Chu and Xiao Bo Xu}, title = {Analysis and Improvement for {SPINS}}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {229--236}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.229-236}, doi = {10.4304/JNW.8.1.229-236}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangHCX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangJ13, author = {Bin Wang and Zhigang Jin}, title = {Distributed Randomized Algorithm based on Buffer Utility for Control Channel Scheduling in {IEEE} 802.16 Mesh Networks}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1270--1277}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1270-1277}, doi = {10.4304/JNW.8.6.1270-1277}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangL13, author = {Xiaomin Wang and Yangyang Lu}, title = {Algorithm of Solutions for Solving Generalized Mixed Implicit Equilibrium Problems}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {381--388}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.381-388}, doi = {10.4304/JNW.8.2.381-388}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangL13a, author = {Jingmin Wang and Yanmei Li}, title = {Research on {EPC} Project Risk Evaluation based on {FAHP} and {TOPSIS}}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {445--452}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.445-452}, doi = {10.4304/JNW.8.2.445-452}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangL13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangLTM13, author = {Wei Wang and Ying Li and Hui Tao and Xiao{-}Ping Ma}, title = {Determining Reconstruction Variables and Parameters on Improved Multi-Objective Immune Algorithm}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2829--2838}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2829-2838}, doi = {10.4304/JNW.8.12.2829-2838}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangLTM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangM13, author = {Ying Wang and Dianfu Ma}, title = {An Automatic Development Process for Integrated Modular Avionics Software}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1088--1095}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1088-1095}, doi = {10.4304/JNW.8.5.1088-1095}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangMJ13, author = {Dejun Wang and Bo Meng and Shaomin Jin}, title = {Improved Clustered Routing Algorithm Based on Distance and Energy in Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2922--2926}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2922-2926}, doi = {10.4304/JNW.8.12.2922-2926}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangMZZ13, author = {Ding Wang and Chunguang Ma and Qi{-}Ming Zhang and Sendong Zhao}, title = {Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {148--155}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.148-155}, doi = {10.4304/JNW.8.1.148-155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangMZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangPLWC13, author = {Li Wang and Yanyan Pei and Biao Lian and Weili Wu and Xueqi Cheng}, title = {A Routing Protocol based on Temporal-awareness Ordered-MPR for Dynamic Wireless Multi-hop Mobile Networks}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {985--990}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.985-990}, doi = {10.4304/JNW.8.5.985-990}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangPLWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangS13, author = {Yulong Wang and Jiakun Shen}, title = {CloudProxy: {A} {NAPT} Proxy for Vulnerability Scanners based on Cloud Computing}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {607--615}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.607-615}, doi = {10.4304/JNW.8.3.607-615}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangSL13, author = {Dan Wang and Weiping Shi and Xiaowen Li}, title = {Low-Complexity Carrier Frequency Offset Estimation Algorithm in {TD-LTE}}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2220--2226}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2220-2226}, doi = {10.4304/JNW.8.10.2220-2226}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangWT13, author = {Zhengcai Wang and Xiaofeng Wang and Zhengyi Tang}, title = {Analysis and Improvement of {AC-BM} Algorithm in Intrusion Detection System}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1191--1196}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1191-1196}, doi = {10.4304/JNW.8.5.1191-1196}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangWW13, author = {Yulong Wang and Dong Wang and Lei Wang}, title = {A Parsing Mode based Method for Malformed {SIP} Messages Testing for {IMS} Network}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {812--821}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.812-821}, doi = {10.4304/JNW.8.4.812-821}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangWW13a, author = {Lixin Wang and Lianggang Wu and Kelly Wang}, title = {Customer Recognition of Network Finance Based on {MKL} Algorithm}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2452--2458}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2452-2458}, doi = {10.4304/JNW.8.10.2452-2458}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangWW13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangYN13, author = {Jian{-}Hua Wang and Yan Yu and Madukasi Charles Nnaemeka}, title = {Data Storage Algorithms Based on Clustering in Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1796--1802}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1796-1802}, doi = {10.4304/JNW.8.8.1796-1802}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangYN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangYN13a, author = {Jian{-}Hua Wang and Yan Yu and Madukasi Charles Nnaemeka}, title = {A High Throughput {MAC} Protocol for Wireless Sensor Networks in Surveillance Applications}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2005--2012}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2005-2012}, doi = {10.4304/JNW.8.9.2005-2012}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangYN13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZ13, author = {Xinyan Wang and Ruixin Zhang}, title = {Parallel Processing for Large-scale Fault Tree in Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1160--1167}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1160-1167}, doi = {10.4304/JNW.8.5.1160-1167}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZJ13, author = {Qiu{-}Yan Wang and Bin Zhang and Chen{-}Hui Jin}, title = {Practical Security against Differential and Linear Cryptanalysis for SMS4-like Cipher}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1689--1693}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1689-1693}, doi = {10.4304/JNW.8.8.1689-1693}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZLWY13, author = {Lifang Wang and Shuhai Zhang and Yurong Li and Ruijuan Wu and Yi Yu}, title = {An Attribute-weighted Clustering Intrusion Detection Method}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1278--1284}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1278-1284}, doi = {10.4304/JNW.8.6.1278-1284}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZLWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZQ13, author = {Jianjian Wang and Rongbo Zhu and Chenliang Qian}, title = {Efficient Disengaging Hooks System Based on Constant-Power Speed Regulation of Frequency Converter}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {755--760}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.755-760}, doi = {10.4304/JNW.8.4.755-760}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZWX13, author = {Zhenwu Wang and Xuejun Zhao and Benting Wan and Jun Xie}, title = {Research of {BP} Neural Network based on Improved Particle Swarm Optimization Algorithm}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {947--954}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.947-954}, doi = {10.4304/JNW.8.4.947-954}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZWXB13, author = {Zhenwu Wang and Xuejun Zhao and Benting Wan and Jun Xie and Pengfei Bai}, title = {A Workflow-based {RBAC} Model for Web Services in Multiple Autonomous Domains}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {723--730}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.723-730}, doi = {10.4304/JNW.8.3.723-730}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZWXB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Wei-wuLKJ13, author = {Weiwu Ren and Liang Hu and Kuo Zhao and Jianfeng Chu}, title = {An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {672--679}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.672-679}, doi = {10.4304/JNW.8.3.672-679}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/Wei-wuLKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WeiF13, author = {Jia Wei and Huajing Fang}, title = {State Feedback Consensus for Multi-Agent System with Multiple Time-Delays}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1960--1966}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1960-1966}, doi = {10.4304/JNW.8.9.1960-1966}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WeiF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WeiZ13, author = {Li Wei and Chunjian Zhao}, title = {An Optimized and Improved Network Trust Model Based on {P2P}}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2293--2301}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2293-2301}, doi = {10.4304/JNW.8.10.2293-2301}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WeiZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Wu13, author = {Dafei Wu}, title = {Research on Patient Privacy Protection for Medical Data in Cloud Computing}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2678--2684}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2678-2684}, doi = {10.4304/JNW.8.11.2678-2684}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Wu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuL13, author = {Shuyan Wu and Kelin Lv}, title = {Research on the Content Networking Sensor}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1589--1594}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1589-1594}, doi = {10.4304/JNW.8.7.1589-1594}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuLL13, author = {Wen{-}Tie Wu and Min Li and Bo Liu}, title = {Intrusion Detection Scheme based on {IPSO-RBF}}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2269--2276}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2269-2276}, doi = {10.4304/JNW.8.10.2269-2276}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuTWC13, author = {Qingshuang Wu and Chunya Tong and Qiang Wang and Xiangfu Cheng}, title = {All-pairs Shortest Path Algorithm based on {MPI+CUDA} Distributed Parallel Programming Model}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2797--2803}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2797-2803}, doi = {10.4304/JNW.8.12.2797-2803}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuTWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuWC13, author = {Guifeng Wu and Xuan Wang and Donglei Chen}, title = {Based on Low-power Wireless Sensor Network Node Data Storage Method}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2736--2742}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2736-2742}, doi = {10.4304/JNW.8.12.2736-2742}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuZSN13, author = {Zhenguo Wu and Rongbo Zhu and Yongli Sun and Qiufen Ni}, title = {Routing Protocol Design and Performance Optimization in Cognitive Radio Networks}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2406--2413}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2406-2413}, doi = {10.4304/JNW.8.10.2406-2413}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuZSN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuZX13, author = {Zhizhong Wu and Xuehai Zhou and Jun Xu}, title = {A Result Fusion based Distributed Anomaly Detection System for Android Smartphones}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {273--282}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.273-282}, doi = {10.4304/JNW.8.2.273-282}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiaWRJ13, author = {Kaijian Xia and Yue Wu and Xiaogang Ren and Yong Jin}, title = {Research in Clustering Algorithm for Diseases Analysis}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1632--1639}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1632-1639}, doi = {10.4304/JNW.8.7.1632-1639}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiaWRJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiaoZZW13, author = {Chunjing Xiao and Yuhong Zhang and Xue Zeng and Yue Wu}, title = {Predicting User Influence in Social Media}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2649--2655}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2649-2655}, doi = {10.4304/JNW.8.11.2649-2655}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiaoZZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Xiaolan13, author = {He Xiaolan}, title = {Prediction Model of Network Information Dissemination}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1112--1120}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1112-1120}, doi = {10.4304/JNW.8.5.1112-1120}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Xiaolan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XieL13, author = {Jianli Xie and Cuiran Li}, title = {Hybrid Weighted-based Clustering Routing Protocol for Railway Communications}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2849--2856}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2849-2856}, doi = {10.4304/JNW.8.12.2849-2856}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XieL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XingXL13, author = {Kexin Xing and Qi Xu and Yegui Lin}, title = {Identification Scheme of Surface Electromyography of Upper Limb Movement}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {895--902}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.895-902}, doi = {10.4304/JNW.8.4.895-902}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XingXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongG13, author = {Lu Xiong and Shen{-}guang Gong}, title = {Reliability Allocation of Underwater Experiment System Based on Particle Swarm Optimization}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1292--1299}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1292-1299}, doi = {10.4304/JNW.8.6.1292-1299}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongJ13, author = {Wen Xiong and Yaohong Jin}, title = {Semantic {MMT} Model Based on Hierarchical Network of Concepts in Chinese-English {MT}}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {237--244}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.237-244}, doi = {10.4304/JNW.8.1.237-244}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Xu13, author = {Bao Xu}, title = {Time Synchronization for Heterogeneous WSNs Based on Cluster}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2915--2921}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2915-2921}, doi = {10.4304/JNW.8.12.2915-2921}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Xu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuBF13, author = {Huafeng Xu and Yongli Bai and Zhigeng Fang}, title = {Solution of Grey Chance Constrained Programming and Convexity of its Feasible Set}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1601--1608}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1601-1608}, doi = {10.4304/JNW.8.7.1601-1608}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuGXZ13, author = {Shouzhi Xu and Pengfei Guo and Bo Xu and Huan Zhou}, title = {QoS Evaluation of {VANET} Routing Protocols}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {132--139}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.132-139}, doi = {10.4304/JNW.8.1.132-139}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuGXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuHL13, author = {Yuanping Xu and Jian Huang and Jun Lu}, title = {A Categorical Knowledge Management Software Platform for Advanced Areal Surface Texture Specification and Verification}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1395--1402}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1395-1402}, doi = {10.4304/JNW.8.6.1395-1402}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuTWT13, author = {Yang Xu and Ruochen Tan and Shuai Wu and Qilin Tang}, title = {Connect Internet with Sensors by 6LoWPAN}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1480--1487}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1480-1487}, doi = {10.4304/JNW.8.7.1480-1487}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuTWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuY13, author = {Wen{-}jie Xu and Jin Yao}, title = {Integrated Quality Diagnosis Algorithm Method based on Neural Network and Sensitivity Analysis to Input Parameters}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1307--1314}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1307-1314}, doi = {10.4304/JNW.8.6.1307-1314}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuYL13, author = {Dayu Xu and Shanlin Yang and He Luo}, title = {A Fusion Model for {CPU} Load Prediction in Cloud Computing}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2506--2511}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2506-2511}, doi = {10.4304/JNW.8.11.2506-2511}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuZM13, author = {Zhe Xu and Ping Zhu and Jie Mei}, title = {Notice of Violation of Academy Publisher Publication Principles "Research on Backward Cloud Model with Uncertainty"}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2556--2563}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2556-2563}, doi = {10.4304/JNW.8.11.2556-2563}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuZT13, author = {Bin Xu and Li{-}Hui Zhang and Xiao{-}Pin Tan}, title = {Research of {RFID} Certification Security Protocol based on Hash Function and {DES} Algorithm}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2368--2375}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2368-2375}, doi = {10.4304/JNW.8.10.2368-2375}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Xue13, author = {Wu Xue}, title = {Study on Digital Image Scrambling Algorithm}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1673--1679}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1673-1679}, doi = {10.4304/JNW.8.7.1673-1679}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Xue13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XueZYWL13, author = {Jianbin Xue and Ting Zhang and Yan Yan and Wenhua Wang and Songbai Li}, title = {Cooperation-based Ant Colony Algorithm in {WSN}}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {939--946}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.939-946}, doi = {10.4304/JNW.8.4.939-946}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XueZYWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YanF13, author = {Jinghua Yan and Xiaohui Fan}, title = {{HFBP:} Identifying {P2P} Traffic by Host Level and Flow Level Behavior Profiles}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1866--1873}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1866-1873}, doi = {10.4304/JNW.8.8.1866-1873}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YanF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YanZ13, author = {Xia Yan and Hua Zhao}, title = {Chinese Microblog Topic Detection Based on the Latent Semantic Analysis and Structural Property}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {917--923}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.917-923}, doi = {10.4304/JNW.8.4.917-923}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YanZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Yang13, author = {Chaoyu Yang}, title = {{LDH} Control Algorithm in Wireless Sensor Network}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1617--1623}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1617-1623}, doi = {10.4304/JNW.8.7.1617-1623}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Yang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangQZ13, author = {Peng Yang and Jin Qin and Wenliang Zhou}, title = {Multi-Commodity Flow and Multi-Period Equilibrium Model of Supply Chain Network with Postponement Strategy}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {389--396}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.389-396}, doi = {10.4304/JNW.8.2.389-396}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangQZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangSJL13, author = {Yang Yang and Biaobiao Shi and Bo Jiang and Xiang Long}, title = {Data-Replicas Scheduler for Heterogeneous MapReduce Cluster}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1096--1103}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1096-1103}, doi = {10.4304/JNW.8.5.1096-1103}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangSJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangTZ13, author = {Juqiong Yang and Chu{-}Ho Ting and Xudong Zhang}, title = {{\(\lnot\)}Network Traffic Prediction Using the Combination of Chaos Theory and Simple-MKL}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1750--1756}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1750-1756}, doi = {10.4304/JNW.8.8.1750-1756}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/YangTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangWL13, author = {Zhongzhen Yang and Jinlin Wang and Jun Lin}, title = {Utility-Based Online Bandwidth Allocation for Bonded Channels}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2436--2443}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2436-2443}, doi = {10.4304/JNW.8.10.2436-2443}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangWLY13, author = {Jin Yang and Cilin Wang and Caiming Liu and Le Yu}, title = {Cloud Computing for Network Security Intrusion Detection System}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {140--147}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.140-147}, doi = {10.4304/JNW.8.1.140-147}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangWLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangWQS13, author = {Jie Yang and Li Wan and Changqing Qu and John Savaria}, title = {A New Load-balancing Algorithm in Wireless Networks}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1781--1787}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1781-1787}, doi = {10.4304/JNW.8.8.1781-1787}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangWQS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangWZ13, author = {Hongyu Yang and Sen Wang and Yang Zhang}, title = {Web Service Replacement Algorithm based on Complex Network}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {829--835}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.829-835}, doi = {10.4304/JNW.8.4.829-835}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangXWL13, author = {Dingcheng Yang and Lin Xiao and Fei Wang and An Li}, title = {A Multi-Cell Coordinated Scheduling Algorithm Based on Delta-CQI for CoMP Network Systems}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2121--2127}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2121-2127}, doi = {10.4304/JNW.8.9.2121-2127}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangXWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangXZ13, author = {Guangsong Yang and Mingbo Xiao and Shuqin Zhang}, title = {Data Aggregation Scheme based on Compressed Sensing in Wireless Sensor Network}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {197--204}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.197-204}, doi = {10.4304/JNW.8.1.197-204}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangZ13, author = {Yifei Yang and Huangqiu Zhu}, title = {Optimal Control and H{\(\infty\)} Output Feedback Design Options for Active Magnetic Bearing Spindle Position Regulation}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1624--1631}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1624-1631}, doi = {10.4304/JNW.8.7.1624-1631}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YaoG13, author = {Junge Yao and Ming Gu}, title = {Conceptology: Using Concept Map for Knowledge Representation and Ontology Construction}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1708--1712}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1708-1712}, doi = {10.4304/JNW.8.8.1708-1712}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YaoG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YaoPSL13, author = {Chunlong Yao and Wei Pan and Lan Shen and Xu Li}, title = {Research of Multi-sensor Images Based on Color Fusion Methods}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2635--2641}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2635-2641}, doi = {10.4304/JNW.8.11.2635-2641}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YaoPSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YaoYH13, author = {Guoxiang Yao and Saizhi Ye and Caiting Huang}, title = {A Key Management Algorithm Based on Two-tier Architecture in Wireless Ad Hoc Network}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1241--1247}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1241-1247}, doi = {10.4304/JNW.8.6.1241-1247}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YaoYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YaoYLF13, author = {Chunlong Yao and Fengjiao Yin and Xu Li and Fenglong Fan}, title = {Security Analysis of {PHP} Encoder}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2353--2360}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2353-2360}, doi = {10.4304/JNW.8.10.2353-2360}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YaoYLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YinYT13, author = {Xiangdong Yin and Jie Yang and Andreas Tiee{-}Girl}, title = {Optimal Energy Routing Protocol Algorithm in Wireless Network}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2783--2790}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2783-2790}, doi = {10.4304/JNW.8.12.2783-2790}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YinYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YinYXZLL13, author = {Yong Yin and Tao Yuan and Yu Xiao and Chaoyong Zhang and Ping Lou and Yu Li}, title = {An Improved Search Strategy for Even Degree Distribution Networks}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1558--1565}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1558-1565}, doi = {10.4304/JNW.8.7.1558-1565}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YinYXZLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Yu13, author = {Xiehua Yu}, title = {Security Key Management Scheme in Heterogeneous Wireless Sensor Networks Based on Clustering Strategy}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2114--2120}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2114-2120}, doi = {10.4304/JNW.8.9.2114-2120}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Yu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuC13, author = {Yang Yu and Xiaomin Chen}, title = {Research on Custody Transfer Service in Delay Tolerant Network}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1713--1719}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1713-1719}, doi = {10.4304/JNW.8.8.1713-1719}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuLS13, author = {Shuijuan Yu and Zhenbi Li and Xia Sun}, title = {Design of Adaptive Grid Type Filter Based on {FPGA}}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2150--2154}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2150-2154}, doi = {10.4304/JNW.8.9.2150-2154}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuWH13, author = {Zuwei Yu and Gan Wang and Hongwei Hu}, title = {Intertemporal Dynamics: Convergence Speed of Current Account across Countries}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {501--506}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.501-506}, doi = {10.4304/JNW.8.2.501-506}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuZP13, author = {Tingfang Yu and Hongzhen Zhu and Chunhua Peng}, title = {Multi-objective Optimization of Coal-fired Boiler Combustion Based on {NSGA-II}}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1300--1306}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1300-1306}, doi = {10.4304/JNW.8.6.1300-1306}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/YuZP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaL13, author = {Song Zha and Peiguo Liu}, title = {An Efficient Non-sparsity Protection Scheme for Collaborative Compressed Spectrum Sensing}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1694--1699}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1694-1699}, doi = {10.4304/JNW.8.8.1694-1699}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaiLD13, author = {Jiangtao Zhai and Guangjie Liu and Yuewei Dai}, title = {An Improved Retransmission-based Network Steganography: Design and Detection}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {182--188}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.182-188}, doi = {10.4304/JNW.8.1.182-188}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaiLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhang13, author = {Qunhui Zhang}, title = {Online Network Traffic Classification Algorithm Based on {RVM}}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1364--1369}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1364-1369}, doi = {10.4304/JNW.8.6.1364-1369}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhang13a, author = {Zhaoyin Zhang}, title = {Neural Network Control Optimization based on Improved Genetic Algorithm}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1831--1837}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1831-1837}, doi = {10.4304/JNW.8.8.1831-1837}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhang13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhang13b, author = {Hui Zhang}, title = {A Scheme of Certificateless Multilevel Proxy Digital Signature in Electronic Commerce}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2548--2555}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2548-2555}, doi = {10.4304/JNW.8.11.2548-2555}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhang13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangCL13, author = {Xin Zhang and Meng Cai and Jia Liu}, title = {Fast Approximate Matching Algorithm for Phone-based Keyword Spotting}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2227--2233}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2227-2233}, doi = {10.4304/JNW.8.10.2227-2233}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangG13, author = {Yong Zhang and Lin Guo}, title = {Network Percolation Based on Complex Network}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1874--1881}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1874-1881}, doi = {10.4304/JNW.8.8.1874-1881}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangHSXMZ13, author = {Xiaolu Zhang and Liang Hu and Shinan Song and Zhenzhen Xie and Xiangyu Meng and Kuo Zhao}, title = {An Intelligent Analysis Model for Multisource Volatile Memory}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1943--1949}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1943-1949}, doi = {10.4304/JNW.8.9.1943-1949}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangHSXMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangHSXMZ13a, author = {Xiaolu Zhang and Liang Hu and Shinan Song and Zhenzhen Xie and Xiangyu Meng and Kuo Zhao}, title = {An Intelligent Analysis Model for Multisource Volatile Memory}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2699--2705}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2699-2705}, doi = {10.4304/JNW.8.11.2699-2705}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangHSXMZ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangML13, author = {Yan Zhang and Wenxing Ma and Xuesong Li}, title = {Shift Control System of Heavy-duty Vehicle Automatic Transmission}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2948--2955}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2948-2955}, doi = {10.4304/JNW.8.12.2948-2955}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangQT13, author = {Yu Zhang and Meixing Qi and Min{-}Ming Tong}, title = {Composite Taste Recognition Method Based on Fuzzy Neural Network}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2021--2028}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2021-2028}, doi = {10.4304/JNW.8.9.2021-2028}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangQT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangS13, author = {Yuan Zhang and Qing{-}wei Shen}, title = {Data Flow Control Algorithm based on Feature Matching in Mobile {P2P} Network}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1146--1152}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1146-1152}, doi = {10.4304/JNW.8.5.1146-1152}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangSL13, author = {Junli Zhang and Limin Song and Linhao Li}, title = {Research on Object-oriented Software Testing Cases of Automatic Generation}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2627--2634}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2627-2634}, doi = {10.4304/JNW.8.11.2627-2634}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangSLWW13, author = {Hao Zhang and Wei Shi and Tingting Lu and Jingjing Wang and Xinjie Wang}, title = {Performance Analysis of Multiple Access 60 GHz System Using Frequency-shifted Gaussian Pulse and Non-carrier {PSWF} Pulse}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {761--768}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.761-768}, doi = {10.4304/JNW.8.4.761-768}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangSLWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangSST13, author = {Weiping Zhang and Regina Stoll and Norbert Stoll and Kerstin Thurow}, title = {An mHealth Monitoring System for Telemedicine Based on WebSocket Wireless Communication}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {955--962}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.955-962}, doi = {10.4304/JNW.8.4.955-962}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhangSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangSZZ13, author = {Yinghui Zhang and Muhammad Saeed and Tiankui Zhang and Zhimin Zeng}, title = {Tensor-Based Channel Estimation for Cooperative Diversity Scheme in the Presence of Timing and Frequency Offsets}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2057--2062}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2057-2062}, doi = {10.4304/JNW.8.9.2057-2062}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangT13, author = {Yiqing Zhang and Jianwei Tan}, title = {Improved MDS-based Sensor Localization Algorithm in Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2085--2092}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2085-2092}, doi = {10.4304/JNW.8.9.2085-2092}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangW13, author = {Xiaoyong Zhang and Huafeng Wu}, title = {Mixed Hermite-Legendre Spectral Method}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2839--2848}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2839-2848}, doi = {10.4304/JNW.8.12.2839-2848}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangWGSW13, author = {Hao Zhang and Xinjie Wang and T. Aaron Gulliver and Wei Shi and Jingjing Wang}, title = {Performance of Incremental {AF} Relaying Cooperative Networks with the nth Best Relay over Rayleigh Fading Channels}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1681--1688}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1681-1688}, doi = {10.4304/JNW.8.8.1681-1688}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangWGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangWW13, author = {Zhiying Zhang and Peng Wang and Weize Wang}, title = {Optimization and Operation Scheduling for a Steel Plate yard Based on Greedy Algorithm}, journal = {J. Networks}, volume = {8}, number = {7}, pages = {1654--1659}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.7.1654-1659}, doi = {10.4304/JNW.8.7.1654-1659}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangXJ13, author = {Hannv Zhang and Jiang Xu and Qigang Jiang}, title = {Extraction and Network Sharing of Forest Vegetation Information based on {SVM}}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1043--1049}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1043-1049}, doi = {10.4304/JNW.8.5.1043-1049}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangXJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangXL13, author = {Pengyi Zhang and Jiannan Xia and Ruiji Li}, title = {Personalized Multimedia Information Retrieval based on User Profile Mining}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2340--2346}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2340-2346}, doi = {10.4304/JNW.8.10.2340-2346}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZ13, author = {Li Guo Zhang and Hua Zuo}, title = {Pareto Optimal Solution Analysis of Convex Multi-Objective Programming Problem}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {437--444}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.437-444}, doi = {10.4304/JNW.8.2.437-444}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZ13a, author = {Cui{-}fang Zhang and Gui{-}Gen Zeng}, title = {A novel {HARQ} Scheme based on Frequency Diversity and Energy-MRC}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2671--2677}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2671-2677}, doi = {10.4304/JNW.8.11.2671-2677}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZ13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZ13b, author = {Shanliang Zhang and Lihua Zhu}, title = {A Packet Classification Algorithm based on Improved Decision Tree}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2864--2871}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2864-2871}, doi = {10.4304/JNW.8.12.2864-2871}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZ13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZW13, author = {Luqiao Zhang and Qinxin Zhu and Juan Wang}, title = {Adaptive Clustering for Maximizing Network Lifetime and Maintaining Coverage}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {616--622}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.616-622}, doi = {10.4304/JNW.8.3.616-622}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhao13, author = {Zhonghua Zhao}, title = {Clustering Algorithm in Data Mining Based on Web Log}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2392--2399}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2392-2399}, doi = {10.4304/JNW.8.10.2392-2399}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhao13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhao13a, author = {Kai Zhao}, title = {Multiple-Agent Task Allocation Algorithm Utilizing Ant Colony Optimization}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2599--2606}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2599-2606}, doi = {10.4304/JNW.8.11.2599-2606}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhao13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoHHJ13, author = {Liang Zhao and Liyuan He and Wong Harry and Xing Jin}, title = {Intelligent Agricultural Forecasting System Based on Wireless Sensor}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1817--1824}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1817-1824}, doi = {10.4304/JNW.8.8.1817-1824}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoHHJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoHSZ13, author = {Weifeng Zhao and Xin Huang and Kai Shi and Lei Zhang}, title = {{TSBCC:} Time Series-Based Congestion Control Algorithm for Wireless Network}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1058--1064}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1058-1064}, doi = {10.4304/JNW.8.5.1058-1064}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoHSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoLC13, author = {Feng Zhao and Xuezhi Lv and Hongbin Chen}, title = {A Leakage-Based Beamforming Algorithm for Cognitive {MIMO} Systems via Game Theory}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {623--627}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.623-627}, doi = {10.4304/JNW.8.3.623-627}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoLYYW13, author = {Ming Zhao and Tao Luo and Changchuan Yin and Guangxin Yue and Xiaojun Wang}, title = {Dynamic Spectrum Management with Competitive Market Equilibrium}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {283--289}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.283-289}, doi = {10.4304/JNW.8.2.283-289}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoLYYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoQL13, author = {Tong Zhao and Bingbing Qian and Yimin Li}, title = {Hybrid Adaptive Fuzzy Control Based on the Biological Adaptation Strategies}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2255--2262}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2255-2262}, doi = {10.4304/JNW.8.10.2255-2262}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoQL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoSS13, author = {Ran Zhao and Kirusnapillai Selvarajah and Neil A. Speirs}, title = {Development Tools for Context Aware and Secure Pervasive Computing in Embedded Systems {(PECES)} Middleware}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {59--70}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.59-70}, doi = {10.4304/JNW.8.1.59-70}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoTZL13, author = {Shupeng Zhao and Miao Tian and Shifang Zhang and Jiuxi Li}, title = {Control Information and Data Processing of Vehicle based on Global Position System}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1175--1182}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1175-1182}, doi = {10.4304/JNW.8.5.1175-1182}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoTZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoTZL13a, author = {Shupeng Zhao and Miao Tian and Shifang Zhang and Jiuxi Li}, title = {Information Processing of Chassis Dynamometer based on Controller Area Network}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1343--1349}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1343-1349}, doi = {10.4304/JNW.8.6.1343-1349}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoTZL13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoTZLDW13, author = {Shupeng Zhao and Miao Tian and Shifang Zhang and Jiuxi Li and Lijuan Du and Ye Wang}, title = {Data Process of Diagnose Expert System based on Neural Network}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2878--2884}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2878-2884}, doi = {10.4304/JNW.8.12.2878-2884}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoTZLDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoXG13, author = {Shuanfeng Zhao and Guanghua Xu and Wei Guo}, title = {Parallel Diagnosis Model of Fatigue Driving Based on Vehicle Running Status}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2585--2591}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2585-2591}, doi = {10.4304/JNW.8.11.2585-2591}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoZL13, author = {Liang Zhao and Jili Zhang and Ruobing Liang}, title = {Remote Ethernet Data Transmission System based on Hardware Protocol Stack Chip}, journal = {J. Networks}, volume = {8}, number = {6}, pages = {1285--1291}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.6.1285-1291}, doi = {10.4304/JNW.8.6.1285-1291}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoZWY13, author = {Min Zhao and Tao Zhang and Jinshuang Wang and Zhijian Yuan}, title = {A Smartphone Malware Detection Framework Based on Artificial Immunology}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {469--476}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.469-476}, doi = {10.4304/JNW.8.2.469-476}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoZWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zheng13, author = {Bi{-}geng Zheng}, title = {Research on Fiber Optic Sensor based on Fuzzy Control Theory}, journal = {J. Networks}, volume = {8}, number = {8}, pages = {1882--1889}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.8.1882-1889}, doi = {10.4304/JNW.8.8.1882-1889}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zheng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhengFZZ13, author = {Xufei Zheng and Yonghui Fang and Yanhui Zhou and Jing Zhang}, title = {A Novel Multi-layered Immune Network Intrusion Detection Defense Model: {MINID}}, journal = {J. Networks}, volume = {8}, number = {3}, pages = {636--644}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.3.636-644}, doi = {10.4304/JNW.8.3.636-644}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhengFZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhengLZH13, author = {Yanhua Zheng and Gaoyong Luo and Bingzhi Zhang and Yongling He}, title = {Research on Power Line as Communication Channel with Multi-Tap and Multi-Branch Configuration}, journal = {J. Networks}, volume = {8}, number = {12}, pages = {2776--2782}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.12.2776-2782}, doi = {10.4304/JNW.8.12.2776-2782}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhengLZH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouLW13, author = {Luping Zhou and Bingrong Li and Fucai Wang}, title = {Particle Swarm Optimization Model of Distributed Network Planning}, journal = {J. Networks}, volume = {8}, number = {10}, pages = {2263--2268}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.10.2263-2268}, doi = {10.4304/JNW.8.10.2263-2268}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouS13, author = {Guangping Zhou and Anup Shrestha}, title = {Efficient Intrusion Detection Scheme based on {SVM}}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2128--2134}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2128-2134}, doi = {10.4304/JNW.8.9.2128-2134}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouXGC13, author = {Junping Zhou and Jingming Xia and Yixian Ge and Eric Chernoff}, title = {Internal and External Optical Feedback Effect in Fiber Linear Lasers}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {1990--1996}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.1990-1996}, doi = {10.4304/JNW.8.9.1990-1996}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouXGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouXL13, author = {Xiancun Zhou and Yan Xiong and Mingxi Li}, title = {Detection System of Clone Attacks based on {RSSI} in Wireless Sensor Networks}, journal = {J. Networks}, volume = {8}, number = {1}, pages = {221--228}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.1.221-228}, doi = {10.4304/JNW.8.1.221-228}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhu13, author = {Haijing Zhu}, title = {Estimates of Weighted Hardy-Littlewood Inequality for Differential Forms}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {429--436}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.429-436}, doi = {10.4304/JNW.8.2.429-436}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuFZ13, author = {Ying Zhu and Zhiyong Feng and Ping Zhang}, title = {Analysis of Improved Cyclostationary Detector with Multiple Antennas over Fading Channels}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2459--2466}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2459-2466}, doi = {10.4304/JNW.8.11.2459-2466}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhuFZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuHCL13, author = {Jun Zhu and Lili Han and Likuan Chang and Yongbiao Li}, title = {Vector Control Based on {SVPWM} for {ACIM}}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1204--1211}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1204-1211}, doi = {10.4304/JNW.8.5.1204-1211}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuHCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuLH13, author = {Jun Zhu and Wankui Li and Lili Han}, title = {{PMSM} Control System Based on Digital Signal Processor}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {924--931}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.924-931}, doi = {10.4304/JNW.8.4.924-931}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuZQ13, author = {Yan Zhu and Guanghua Zhang and Jing Qiu}, title = {Network Traffic Prediction based on Particle Swarm {BP} Neural Network}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2685--2691}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2685-2691}, doi = {10.4304/JNW.8.11.2685-2691}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuZQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuangWWZ13, author = {Yonglong Zhuang and Xiaolan Weng and Yuwu Wang and Haiyang Zhuang}, title = {Improvement and Analysis of Encryption and Decryption Performance in Cloud Document}, journal = {J. Networks}, volume = {8}, number = {9}, pages = {2071--2077}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.9.2071-2077}, doi = {10.4304/JNW.8.9.2071-2077}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuangWWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zou13, author = {Pinghui Zou}, title = {A Novel Data Detection Method for Data Aggregation Security in {WSN}}, journal = {J. Networks}, volume = {8}, number = {11}, pages = {2607--2613}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.11.2607-2613}, doi = {10.4304/JNW.8.11.2607-2613}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zou13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZrelliOS13, author = {Saber Zrelli and Nobuo Okabe and Yoichi Shinoda}, title = {{XKDCP:} An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations}, journal = {J. Networks}, volume = {8}, number = {2}, pages = {290--296}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.2.290-296}, doi = {10.4304/JNW.8.2.290-296}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZrelliOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZuoXW13, author = {Zhengkang Zuo and Jinyun Xue and Changjing Wang}, title = {Constraint Verification of Generic Algorithmic Program for Solving General Network Path Problems}, journal = {J. Networks}, volume = {8}, number = {5}, pages = {1050--1057}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.5.1050-1057}, doi = {10.4304/JNW.8.5.1050-1057}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZuoXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.