Search dblp for Publications

export results for "toc:db/journals/jnw/jnw8.bht:"

 download as .bib file

@article{DBLP:journals/jnw/AdaniyaAP13,
  author       = {Mario H. A. C. Adaniya and
                  Taufik Abr{\~{a}}o and
                  Mario Lemes Proen{\c{c}}a Jr.},
  title        = {Anomaly Detection Using Metaheuristic Firefly Harmonic Clustering},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {82--91},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.82-91},
  doi          = {10.4304/JNW.8.1.82-91},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AdaniyaAP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AhmadY13,
  author       = {Khalid S. Ahmad and
                  A. Z. Yonis},
  title        = {Miniaturized Hybrid Rat-Race Coupler of a 2.5 GHz Loaded by Resistors},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1465--1469},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1465-1469},
  doi          = {10.4304/JNW.8.7.1465-1469},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AhmadY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Al-DuwairiAG13,
  author       = {Basheer Al{-}Duwairi and
                  Zakaria Al{-}Qudah and
                  Manimaran Govindarasu},
  title        = {A Novel Scheme for Mitigating Botnet-Based DDoS Attacks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {297--306},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.297-306},
  doi          = {10.4304/JNW.8.2.297-306},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Al-DuwairiAG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AliM13,
  author       = {Zahid Ali and
                  Qurban A. Memon},
  title        = {Time Delay Tracking for Multiuser Synchronization in {CDMA} Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1929--1935},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1929-1935},
  doi          = {10.4304/JNW.8.9.1929-1935},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/AliM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BourasCSSZ13,
  author       = {Christos Bouras and
                  Savvas Charalambides and
                  Kostas Stamos and
                  Stamatis Stroumpis and
                  Giannis Zaoudis},
  title        = {Power Management Mechanism Exploiting Network and Video Information
                  over Wireless Links},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {15--25},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.15-25},
  doi          = {10.4304/JNW.8.1.15-25},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/BourasCSSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BuLLY13,
  author       = {Yahui Bu and
                  Aifen Li and
                  Junrong Liu and
                  Weiqiang Yu},
  title        = {Multisensor Acquirement System of Electrokinetic in Multiphase Flow},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1975--1981},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1975-1981},
  doi          = {10.4304/JNW.8.9.1975-1981},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BuLLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiW13,
  author       = {Jinbao Cai and
                  Yalin Wu},
  title        = {An Enhanced Rate Control Initialization Method for {H.264} based on
                  Image Quality Balance of {GOP} Using Support Vector Machines},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2155--2162},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2155-2162},
  doi          = {10.4304/JNW.8.9.2155-2162},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaiW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiY13,
  author       = {Chuan Cai and
                  Liang Yuan},
  title        = {Intrusion Detection System based on Ant Colony System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {888--894},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.888-894},
  doi          = {10.4304/JNW.8.4.888-894},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaiY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiY13a,
  author       = {Chuan Cai and
                  Liang Yuan},
  title        = {Research on Energy-Saving-Based Cloud Computing Scheduling Strategy},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1153--1159},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1153-1159},
  doi          = {10.4304/JNW.8.5.1153-1159},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaiY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoLWZ13,
  author       = {Lijun Cao and
                  Xiyin Liu and
                  Yubin Wang and
                  Zhongping Zhang},
  title        = {WSO-based Spatial Outlier Detection Algorithms},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1582--1588},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1582-1588},
  doi          = {10.4304/JNW.8.7.1582-1588},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaoLWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoLZ13,
  author       = {Lijun Cao and
                  Xiyin Liu and
                  Zhongping Zhang},
  title        = {Resource Discovery Algorithm Based on Multilayer Overlay Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1357--1363},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1357-1363},
  doi          = {10.4304/JNW.8.6.1357-1363},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaoLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chen13,
  author       = {Yuanqiang Chen},
  title        = {Stability of Impulsive Cellular Neural Networks with Time-varying
                  Delays},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {704--711},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.704-711},
  doi          = {10.4304/JNW.8.3.704-711},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Chen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chen13a,
  author       = {Kaibing Chen},
  title        = {Unequal Cluster-Based Routing Protocol in Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2656--2662},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2656-2662},
  doi          = {10.4304/JNW.8.11.2656-2662},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Chen13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenCS13,
  author       = {Jingyu Chen and
                  Ping Chen and
                  Xian'gang Sheng},
  title        = {A Sketch-based Clustering Algorithm for Uncertain Data Streams},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1536--1542},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1536-1542},
  doi          = {10.4304/JNW.8.7.1536-1542},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenDW13,
  author       = {Jinxiu Chen and
                  Chao Dong and
                  Youzheng Wang},
  title        = {Performance Evaluation of Adaptive Modulation System over Mobile Satellite
                  Channels},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1262--1269},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1262-1269},
  doi          = {10.4304/JNW.8.6.1262-1269},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenH13,
  author       = {Jia Chen and
                  Xian Huang},
  title        = {A Data-reversible Hiding Algorithm in WSNs},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2037--2042},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2037-2042},
  doi          = {10.4304/JNW.8.9.2037-2042},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenLF13,
  author       = {Qinghua Chen and
                  Yan Liu and
                  Jianwei Feng},
  title        = {Quantitative Fracture Modeling on Low-permeability Sandstone Reservoirs
                  by Stress Field},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1890--1898},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1890-1898},
  doi          = {10.4304/JNW.8.8.1890-1898},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenMLJRW13,
  author       = {Meilian Chen and
                  Yan Ma and
                  Yikun Liu and
                  Fan Jia and
                  Yanhui Ran and
                  Jie Wang},
  title        = {Mobile Learning System based on Cloud Computing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2572--2577},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2572-2577},
  doi          = {10.4304/JNW.8.11.2572-2577},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenMLJRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenMN13,
  author       = {Feixiang Chen and
                  Xiao Ma and
                  Shaoliang Ni},
  title        = {Organization and Correction of Spatial Data in Mobile {GIS}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1514--1520},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1514-1520},
  doi          = {10.4304/JNW.8.7.1514-1520},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenMR13,
  author       = {Feixiang Chen and
                  Xiao Ma and
                  Haiyan Ren},
  title        = {Progressive Transmission of Vector Spatial Data},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1065--1072},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1065-1072},
  doi          = {10.4304/JNW.8.5.1065-1072},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenPJ13,
  author       = {Anhua Chen and
                  Yang Pan and
                  Lingli Jiang},
  title        = {Improving K-means Clustering Method in Fault Diagnosis based on {SOM}
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {680--687},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.680-687},
  doi          = {10.4304/JNW.8.3.680-687},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenPJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenQX13,
  author       = {Peng Chen and
                  Lede Qiu and
                  Feng Xu},
  title        = {Downlink Power Control for {CDMA} Satellite Cognitive Radio},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {598--606},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.598-606},
  doi          = {10.4304/JNW.8.3.598-606},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenQX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenT13,
  author       = {Yuanqiang Chen and
                  Renbi Tian},
  title        = {Impulsive Tracking Control for Non-measurable State with Time-delay},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {851--857},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.851-857},
  doi          = {10.4304/JNW.8.4.851-857},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenT13a,
  author       = {Yuanqiang Chen and
                  Renbi Tian},
  title        = {Exponential Stability of Impulsive Discrete Systems with Multiple
                  Delays},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2564--2571},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2564-2571},
  doi          = {10.4304/JNW.8.11.2564-2571},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenT13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenWYG13,
  author       = {Shi{-}Wen Chen and
                  Jiang{-}xing Wu and
                  Xiao{-}long Ye and
                  Tong Guo},
  title        = {Distributed Denial of Service Attacks Detection Method Based on Conditional
                  Random Fields},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {858--865},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.858-865},
  doi          = {10.4304/JNW.8.4.858-865},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenWYG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenX13,
  author       = {Yangrong Chen and
                  Guanglin Xing},
  title        = {A Key Issuing Scheme in IBE-based Distributed Online Social Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2213--2219},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2213-2219},
  doi          = {10.4304/JNW.8.10.2213-2219},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenXGML13,
  author       = {Feng Chen and
                  Wenjun Xu and
                  Yuchen Guo and
                  Hongyu Ma and
                  Jiaru Lin},
  title        = {Joint Traffic Splitting and Spectrum Resource Allocation in Heterogeneous
                  Cognitive Wireless Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2429--2435},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2429-2435},
  doi          = {10.4304/JNW.8.10.2429-2435},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenXGML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenY13,
  author       = {Dan{-}ye Chen and
                  Qi{-}zhi Yu},
  title        = {Research of Computer Intelligent Control System and data processing
                  of Welding Inverter Power Based on {DSP}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1521--1528},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1521-1528},
  doi          = {10.4304/JNW.8.7.1521-1528},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenYW13,
  author       = {Bin Chen and
                  Hong{-}zhen Yang and
                  Li{-}wen Wang},
  title        = {Single Neuron {PID} Control of Aircraft Deicing Fluids Rapid Heating
                  System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {405--412},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.405-412},
  doi          = {10.4304/JNW.8.2.405-412},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenZ13,
  author       = {Ying Chen and
                  Shaobai Zhang},
  title        = {Notice of Violation of Academy Publisher Publication Principles "Learning
                  Tract Variables with Distal Supervised Learning Model"},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {397--404},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.397-404},
  doi          = {10.4304/JNW.8.2.397-404},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenZ13a,
  author       = {Gang Chen and
                  Dawei Zhao},
  title        = {Model of Information Security Risk Assessment based on Improved Wavelet
                  Neural Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2093--2100},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2093-2100},
  doi          = {10.4304/JNW.8.9.2093-2100},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenZ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenZC13,
  author       = {Yange Chen and
                  Zhili Zhang and
                  Qingfang Cui},
  title        = {Design of Three-dimensional Interchange Network Based on IPv4/IPv6
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {650--657},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.650-657},
  doi          = {10.4304/JNW.8.3.650-657},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChengHH13,
  author       = {Ching{-}Ching Cheng and
                  Pei{-}Li Huang and
                  Kuo{-}Hung Huang},
  title        = {Cooperative Learning in Lego Robotics Projects: Exploring the Impacts
                  of Group Formation on Interaction and Achievement},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1529--1535},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1529-1535},
  doi          = {10.4304/JNW.8.7.1529-1535},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChengHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChengNZY13,
  author       = {Wei{-}Min Cheng and
                  Wen Nie and
                  Gang Zhou and
                  Jun{-}lei Yang},
  title        = {Research on Eddy Air-Curtain Dust Controlled Flow Field in Hard Rock
                  Mechanized Driving Face},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {453--460},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.453-460},
  doi          = {10.4304/JNW.8.2.453-460},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChengNZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chu13,
  author       = {Jian Chu},
  title        = {Improved Shadowed Sets Data Selection Method in Extension Neural Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2728--2735},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2728-2735},
  doi          = {10.4304/JNW.8.12.2728-2735},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Chu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChuangLL13,
  author       = {Kai{-}Wayne Chuang and
                  Chien{-}Nan Lin and
                  Chun{-}Hsiung Lan},
  title        = {Order Policy Analysis for Deteriorating Inventory Model with Trapezoidal
                  Type Demand Rate},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1838--1844},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1838-1844},
  doi          = {10.4304/JNW.8.8.1838-1844},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChuangLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiZXZ13,
  author       = {Zhong{-}wei Cui and
                  Yong Zhao and
                  Dao{-}yun Xu and
                  Yu Zuo},
  title        = {A Dynamic Routing Based on Bayes Estimation for Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1403--1410},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1403-1410},
  doi          = {10.4304/JNW.8.6.1403-1410},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CuiZXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DengLLY13,
  author       = {Yongliang Deng and
                  Qiming Li and
                  Ying Lu and
                  Jingfeng Yuan},
  title        = {Topology Vulnerability Analysis and Measure of Urban Metro Network:
                  The case of Nanjing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1350--1356},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1350-1356},
  doi          = {10.4304/JNW.8.6.1350-1356},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DengLLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DingMW13,
  author       = {Bin Ding and
                  Yan Ma and
                  Yiwei Wu},
  title        = {Playfield Detection Algorithm Based on {AGMM} in Sports Video},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1774--1780},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1774-1780},
  doi          = {10.4304/JNW.8.8.1774-1780},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DingMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DingYYY13,
  author       = {Lei Ding and
                  Fei Yu and
                  Zhenghua Yang and
                  Guangxue Yue},
  title        = {The System Design of a Node of {P2P} Networks for Intrusion Detection},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1920--1927},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1920-1927},
  doi          = {10.4304/JNW.8.8.1920-1927},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DingYYY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Dong13,
  author       = {Peiyi Dong},
  title        = {User Equilibrium Exchange Allocation Algorithm Based on Super Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2743--2748},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2743-2748},
  doi          = {10.4304/JNW.8.12.2743-2748},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Dong13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DongLM13,
  author       = {Fang Dong and
                  Mengchi Liu and
                  Kun Ma},
  title        = {Web Entities Extraction Based on Semi-Structured Semantic Database},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1640--1646},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1640-1646},
  doi          = {10.4304/JNW.8.7.1640-1646},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DongLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DuC13,
  author       = {Juan Du and
                  Su{-}li Chen},
  title        = {Research of Improved Network Malicious Information Filtering Model
                  Based on {SVM}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1012--1018},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1012-1018},
  doi          = {10.4304/JNW.8.5.1012-1018},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DuC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/EndoWOA13,
  author       = {Keiichi Endo and
                  Kentaro Watanabe and
                  Dai Okano and
                  Kaname Amano},
  title        = {An Efficient Position-based Broadcasting Method Considering Node Density
                  in MANETs},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {804--811},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.804-811},
  doi          = {10.4304/JNW.8.4.804-811},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/EndoWOA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Fan13,
  author       = {Xiulin Fan},
  title        = {Efficient Data Fusion Algorithm in WSNs},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2642--2648},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2642-2648},
  doi          = {10.4304/JNW.8.11.2642-2648},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/Fan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FanZ13,
  author       = {Juan Fan and
                  Wuyang Zhou},
  title        = {Joint Uplink Resource Allocation Algorithm with Proportional-Fair
                  in Heterogeneous Wireless Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2247--2254},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2247-2254},
  doi          = {10.4304/JNW.8.10.2247-2254},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FanZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FangZWY13,
  author       = {Jie Fang and
                  Qingbiao Zhou and
                  Xide Wu and
                  Shijie Yang},
  title        = {Network Traffic Prediction Model Based on Catfish-PSO-SVM},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2534--2540},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2534-2540},
  doi          = {10.4304/JNW.8.11.2534-2540},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FangZWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Feng13,
  author       = {Xiangrong Feng},
  title        = {Traffic Prediction Scheme based on Chaotic Models in Wireless Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2101--2106},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2101-2106},
  doi          = {10.4304/JNW.8.9.2101-2106},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Feng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengHWZX13,
  author       = {Dan Feng and
                  Chuanhe Huang and
                  Bo Wang and
                  Junyu Zhu and
                  Liya Xu},
  title        = {Mutihop-enabled Trusted Handoff Algorithm in Heterogeneous Wireless
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {156--164},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.156-164},
  doi          = {10.4304/JNW.8.1.156-164},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FengHWZX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FraiwanG13,
  author       = {Mohammad Fraiwan and
                  Manimaran Govindarasu},
  title        = {Empowering PlanetLab: {A} Method for {TCP} Evaluation Over the Planetary-scale
                  Testbed},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {307--316},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.307-316},
  doi          = {10.4304/JNW.8.2.307-316},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FraiwanG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FuZ13,
  author       = {Hongliang Fu and
                  Beibei Zhang},
  title        = {Compressed Sensing Precoding with Limited Feedback in Multi-carrier
                  {MIMO} System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1425--1431},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1425-1431},
  doi          = {10.4304/JNW.8.6.1425-1431},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gao13,
  author       = {Xiaoyan Gao},
  title        = {Optimality and Duality for Non-smooth Multiple Objective Semi-infinite
                  Programming},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {413--420},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.413-420},
  doi          = {10.4304/JNW.8.2.413-420},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Gao13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gao13a,
  author       = {Xiaoyan Gao},
  title        = {Optimality and Duality for Minimax Fractional Semi-Infinite Programming},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {739--746},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.739-746},
  doi          = {10.4304/JNW.8.3.739-746},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Gao13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gao13b,
  author       = {Hui{-}Ying Gao},
  title        = {Performance Evaluation of Management Environment in Microelectronics
                  Enterprise},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1073--1079},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1073-1079},
  doi          = {10.4304/JNW.8.5.1073-1079},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Gao13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoG13,
  author       = {Wei Gao and
                  Zhirong Guo},
  title        = {Speed Sensorless Control of {PMSM} using Model Reference Adaptive
                  System and {RBFN}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {213--220},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.213-220},
  doi          = {10.4304/JNW.8.1.213-220},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaoG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoM13,
  author       = {Cong Gao and
                  Jianfeng Ma},
  title        = {A Collaborative QoS-Aware Service Evaluation Method for Service Selection},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1370--1379},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1370-1379},
  doi          = {10.4304/JNW.8.6.1370-1379},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaoM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoZC13,
  author       = {Liai Gao and
                  Meng Zhang and
                  Geng Chen},
  title        = {An Intelligent Irrigation System Based on Wireless Sensor Network
                  and Fuzzy Control},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1080--1087},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1080-1087},
  doi          = {10.4304/JNW.8.5.1080-1087},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaoZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GeDY13,
  author       = {Xingchen Ge and
                  Ning Deng and
                  Jian Yin},
  title        = {Application for Data De-duplication Algorithm Based on Mobile Devices},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2498--2505},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2498-2505},
  doi          = {10.4304/JNW.8.11.2498-2505},
  timestamp    = {Mon, 20 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/GeDY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Gong13,
  author       = {Lixiong Gong},
  title        = {Research on Evaluating and Choosing Logistics Service Providers for
                  Manufacturing Enterprise},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2935--2941},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2935-2941},
  doi          = {10.4304/JNW.8.12.2935-2941},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Gong13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GongY13,
  author       = {Jun Gong and
                  Miao Yu},
  title        = {A Multi-objective Cross-training Plan Based on {NSGA-II}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2310--2316},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2310-2316},
  doi          = {10.4304/JNW.8.10.2310-2316},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GongY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuZ13,
  author       = {Lichuan Gu and
                  Jinqin Zhong},
  title        = {An Improved Anti-collision Algorithm Based on {JDS}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2578--2584},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2578-2584},
  doi          = {10.4304/JNW.8.11.2578-2584},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuangZGFH13,
  author       = {Yan Guang and
                  Yue{-}Fei Zhu and
                  Chun{-}Xiang Gu and
                  Jinlong Fei and
                  Xin{-}Zheng He},
  title        = {A Framework for Automated Security Proof and its Application to {OAEP}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {552--558},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.552-558},
  doi          = {10.4304/JNW.8.3.552-558},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/GuangZGFH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuangZGZF13,
  author       = {Yan Guang and
                  Yue{-}Fei Zhu and
                  Chun{-}Xiang Gu and
                  Yonghui Zheng and
                  Jinlong Fei},
  title        = {An Efficient Proof of Retrievability Scheme for Fully Homomorphic
                  Encrypted Data},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {339--344},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.339-344},
  doi          = {10.4304/JNW.8.2.339-344},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/GuangZGZF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoL13,
  author       = {Ying Guo and
                  Yutao Liu},
  title        = {Time Synchronization for Mobile Underwater Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {116--123},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.116-123},
  doi          = {10.4304/JNW.8.1.116-123},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoZRZ13,
  author       = {Xiaohui Guo and
                  Xinmin Zhang and
                  Haiyan Ren and
                  Xiao Zhang},
  title        = {Research on Context Aware Network Security Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1852--1858},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1852-1858},
  doi          = {10.4304/JNW.8.8.1852-1858},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuoZRZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HaiWX13,
  author       = {Linpeng Hai and
                  Rui Wang and
                  Liying Xiao},
  title        = {A Novel {RFID} Anti-Collision Algorithm based on Binary Tree},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2885--2892},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2885-2892},
  doi          = {10.4304/JNW.8.12.2885-2892},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HaiWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HalloushD13,
  author       = {Mohammed D. Halloush and
                  Tasneem Dawahdeh},
  title        = {On Varying Network Coding Forwarding Ratio in Vector Based Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {530--536},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.530-536},
  doi          = {10.4304/JNW.8.3.530-536},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HalloushD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanHZ13,
  author       = {Lu Han and
                  Liyan Han and
                  Hongwei Zhao},
  title        = {Credit Scoring Model Hybridizing Artificial Intelligence with Logistic
                  Regression},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {253--261},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.253-261},
  doi          = {10.4304/JNW.8.1.253-261},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HanHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanLCWW13,
  author       = {Yanyan Han and
                  Deshi Li and
                  Jian Chen and
                  Tianyu Wang and
                  Xiaoliang Wang},
  title        = {Carrying Network Accessing Architecture and Strategy Based on Business
                  Differentiation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1470--1475},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1470-1475},
  doi          = {10.4304/JNW.8.7.1470-1475},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HanLCWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanN13,
  author       = {Xiaoting Han and
                  Li Niu},
  title        = {On Charactering of Information Propagation in Online Social Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {124--131},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.124-131},
  doi          = {10.4304/JNW.8.1.124-131},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HanN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HaoYZ13,
  author       = {Xiaowen Hao and
                  Jianguo Yang and
                  Yi'e Zhao},
  title        = {Optimization of Integrated Pollutants Control Equipment by Computer
                  Information Processing Technology},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2927--2934},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2927-2934},
  doi          = {10.4304/JNW.8.12.2927-2934},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HaoYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HassounaKK13,
  author       = {Asma Ben Hassouna and
                  Hend Koubaa and
                  Farouk Kamoun},
  title        = {Conflict-Aware Relay Selection for Multicast in {MUD} based Wireless
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {787--795},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.787-795},
  doi          = {10.4304/JNW.8.4.787-795},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HassounaKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeCWL13,
  author       = {Jun He and
                  Liang Chen and
                  Xiaolong Wang and
                  Yonggang Li},
  title        = {Web Service Composition Optimization Based on Improved Artificial
                  Bee Colony Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2143--2149},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2143-2149},
  doi          = {10.4304/JNW.8.9.2143-2149},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HeCWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeQ13,
  author       = {Lei He and
                  Jiaxin Qi},
  title        = {Enterprise Human Resources Information Mining Based on Improved Apriori
                  Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1138--1145},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1138-1145},
  doi          = {10.4304/JNW.8.5.1138-1145},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HeQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hou13,
  author       = {Chuanyan Hou},
  title        = {Study of Combinatorial Operator on Poisson Manifolds},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {932--938},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.932-938},
  doi          = {10.4304/JNW.8.4.932-938},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Hou13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HouW13,
  author       = {Jinkui Hou and
                  Lei Wang},
  title        = {Formal Description for Component-based Architecture Model Transformation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {874--881},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.874-881},
  doi          = {10.4304/JNW.8.4.874-881},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HouW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HouWHK13,
  author       = {Xin Hou and
                  Xingfeng Wei and
                  Ertian Hua and
                  Yujing Kong},
  title        = {Self-Adaptive and Energy-Efficient {MAC} Protocol Based on Event-Driven},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {174--181},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.174-181},
  doi          = {10.4304/JNW.8.1.174-181},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HouWHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HouZ13,
  author       = {Jinkui Hou and
                  Yuyan Zhang},
  title        = {Model Mapping Approach Based on Ontology Semantics},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1967--1974},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1967-1974},
  doi          = {10.4304/JNW.8.9.1967-1974},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HouZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hu13,
  author       = {Yong Hu},
  title        = {Minimal K-Covering Set Algorithm based on Particle Swarm Optimizer},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2872--2877},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2872-2877},
  doi          = {10.4304/JNW.8.12.2872-2877},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Hu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuJZZCL13,
  author       = {Liang Hu and
                  Jingyan Jiang and
                  Jin Zhou and
                  Kuo Zhao and
                  Liang Chen and
                  Huimin Lu},
  title        = {Environment Observation System based on Semantics in the Internet
                  of Things},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2721--2727},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2721-2727},
  doi          = {10.4304/JNW.8.12.2721-2727},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuJZZCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuSZXMZ13,
  author       = {Liang Hu and
                  Shinan Song and
                  Xiaolu Zhang and
                  Zhenzhen Xie and
                  Xiangyu Meng and
                  Kuo Zhao},
  title        = {Analyzing Malware Based on Volatile Memory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2512--2519},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2512-2519},
  doi          = {10.4304/JNW.8.11.2512-2519},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuSZXMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuWS13,
  author       = {Haiyan Hu and
                  Pengfei Wang and
                  Lining Sun},
  title        = {Simulation Platform of Monitoring and Tracking Micro System for Dangerous
                  Chemicals Transportation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {477--484},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.477-484},
  doi          = {10.4304/JNW.8.2.477-484},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangC13,
  author       = {Xian Huang and
                  Jia Chen},
  title        = {Efficient Node Coverage Scheme of Wireless Sensor Network under Multi-Constraint
                  Conditions},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2277--2284},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2277-2284},
  doi          = {10.4304/JNW.8.10.2277-2284},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangH13,
  author       = {Wei Huang and
                  Bo Huang},
  title        = {R{\&}D Outsourcing Policy with Input Spillovers Based on Multi-Outsourcer
                  and Multi-Supplier},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2324--2331},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2324-2331},
  doi          = {10.4304/JNW.8.10.2324-2331},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLFX13,
  author       = {Zhongsheng Huang and
                  Wensheng Li and
                  Zhifang Feng and
                  Huaming Xing},
  title        = {On Nonnegative Signed Domination in Graphs and its Algorithmic Complexity},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {365--372},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.365-372},
  doi          = {10.4304/JNW.8.2.365-372},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangLFX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangLLG13,
  author       = {Xiaomao Huang and
                  Xuan Li and
                  Changjiang Long and
                  Yun Gao},
  title        = {Guaranteed Cost Fault-tolerant Control of Networked Control Systems
                  with Short Output Delay and Short Control Delay Based on State Observer},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {836--842},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.836-842},
  doi          = {10.4304/JNW.8.4.836-842},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangLLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangW13,
  author       = {Kuo{-}Feng Huang and
                  Shih{-}Jung Wu},
  title        = {Real-time-service-based Distributed Scheduling Scheme for {IEEE} 802.16j
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {513--517},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.513-517},
  doi          = {10.4304/JNW.8.3.513-517},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangXYW13,
  author       = {Bo Huang and
                  Yong Xu and
                  Mengting Yuan and
                  Guoqing Wu},
  title        = {Formal Behavior Modeling: Business Processes Based on Cloud Platform},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1417--1424},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1417-1424},
  doi          = {10.4304/JNW.8.6.1417-1424},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangXYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangY13,
  author       = {Jian Huang and
                  Hongmei Yan},
  title        = {Indoor Localization Algorithm Based on Cooperative of State Matrix
                  and Kalman Filter},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1197--1203},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1197-1203},
  doi          = {10.4304/JNW.8.5.1197-1203},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangY13a,
  author       = {Hao Huang and
                  Fei Yang},
  title        = {An Interpretation of Erlang into Value-passing Calculus},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1504--1513},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1504-1513},
  doi          = {10.4304/JNW.8.7.1504-1513},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangYZL13,
  author       = {Daochao Huang and
                  Dong Yang and
                  Hongke Zhang and
                  Fuhong Lin},
  title        = {Efficient DoS-limiting Support by Indirect Mapping in Networks with
                  Locator/Identifier Separation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {92--99},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.92-99},
  doi          = {10.4304/JNW.8.1.92-99},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangYZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JangH13,
  author       = {Hung{-}Chin Jang and
                  Tzu{-}Yao Hsu},
  title        = {Infrastructure Based Chord Structure for {P2P} File Sharing over Vehicular
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {588--597},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.588-597},
  doi          = {10.4304/JNW.8.3.588-597},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JangH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JawharMU13,
  author       = {Imad Jawhar and
                  Nader Mohamed and
                  Hafsa Usmani},
  title        = {An Overview of Inter-Vehicular Communication Systems, Protocols and
                  Middleware},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2749--2761},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2749-2761},
  doi          = {10.4304/JNW.8.12.2749-2761},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JawharMU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiWC13,
  author       = {Mingyu Ji and
                  Di Wu and
                  Zhiyuan Chen},
  title        = {Verification Method of Conditional Probability Based on Automaton},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1329--1335},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1329-1335},
  doi          = {10.4304/JNW.8.6.1329-1335},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiaK13,
  author       = {Guozhu Jia and
                  Wen Kong},
  title        = {Dynamic Cell Formation based on Multi-objective Optimization Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1742--1749},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1742-1749},
  doi          = {10.4304/JNW.8.8.1742-1749},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiaK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiaXL13,
  author       = {Zhenhua Jia and
                  Haohan Xie and
                  Ye Liang},
  title        = {Interval Similarity-Based Quantization Method for Continuous Data},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2614--2619},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2614-2619},
  doi          = {10.4304/JNW.8.11.2614-2619},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiaXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangH13,
  author       = {Shaohua Jiang and
                  Xia Hua},
  title        = {Construction Site Environment Temperature Monitoring System Based
                  on ZigBee and Virtual Instrument},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {963--970},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.963-970},
  doi          = {10.4304/JNW.8.4.963-970},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangW13,
  author       = {Wei Jiang and
                  Kefu Wang},
  title        = {An Improved {PAPR} Suppression Algorithm based on Channel Coding in
                  {OFDM} System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2620--2626},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2620-2626},
  doi          = {10.4304/JNW.8.11.2620-2626},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangW13a,
  author       = {Xiao{-}Yun Jiang and
                  Horng{-}Huei Wu},
  title        = {Optimization of Setup Frequency for {TOC} Supply Chain Replenishment
                  Systems Based on Pareto Particle Swarm Optimization},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2964--2971},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2964-2971},
  doi          = {10.4304/JNW.8.12.2964-2971},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangW13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangWWZW13,
  author       = {Hai{-}Yan Jiang and
                  Xing{-}ce Wang and
                  Zhongke Wu and
                  Mingquan Zhou and
                  Xuesong Wang},
  title        = {Topic Information Collection based on the Hidden Markov Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {485--492},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.485-492},
  doi          = {10.4304/JNW.8.2.485-492},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangWWZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangZJC13,
  author       = {Lingli Jiang and
                  Bo Zeng and
                  Francis R. Jordan and
                  Anhua Chen},
  title        = {Kernel Function and Parameters Optimization in {KICA} for Rolling
                  Bearing Fault Diagnosis},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1913--1919},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1913-1919},
  doi          = {10.4304/JNW.8.8.1913-1919},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangZJC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangZZ13,
  author       = {Shaohua Jiang and
                  Jian Zhang and
                  Haiyan Zhang},
  title        = {Ontology-based Semantic Retrieval for Risk Management of Construction
                  Project},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1212--1220},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1212-1220},
  doi          = {10.4304/JNW.8.5.1212-1220},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangZZ13a,
  author       = {Shaohua Jiang and
                  Haiyan Zhang and
                  Jian Zhang},
  title        = {Research on BIM-based Construction Domain Text Information Management},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1455--1464},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1455-1464},
  doi          = {10.4304/JNW.8.6.1455-1464},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangZZ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Jiao13,
  author       = {Yabing Jiao},
  title        = {Electronic Commerce Logistics Network Optimization Based on Swarm
                  Intelligent Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2163--2170},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2163-2170},
  doi          = {10.4304/JNW.8.9.2163-2170},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Jiao13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiaoWZY13,
  author       = {Wenzhe Jiao and
                  Guoqing Wang and
                  Zhengjun Zhai and
                  Xiaoxue Ye},
  title        = {Dynamic Data Possession Checking for Secure Cloud Storage Service},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2713--2720},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2713-2720},
  doi          = {10.4304/JNW.8.12.2713-2720},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiaoWZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinL13,
  author       = {Hongying Jin and
                  Linhao Li},
  title        = {Dynamic Network Traffic Flow Prediction Model based on Modified Quantum-Behaved
                  Particle Swarm Optimization},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2332--2339},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2332-2339},
  doi          = {10.4304/JNW.8.10.2332-2339},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JinL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinQZW13,
  author       = {Hui{-}long Jin and
                  Shu{-}li Qi and
                  Miao Zhang and
                  Zhiyuan Wang},
  title        = {Punctured Difference Set Pair and Perfect Punctured Binary Sequence
                  Pair},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1982--1989},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1982-1989},
  doi          = {10.4304/JNW.8.9.1982-1989},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JinQZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinSWF13,
  author       = {Zhaoyan Jin and
                  Dianxi Shi and
                  Quanyuan Wu and
                  Hua Fan},
  title        = {{MCHITS:} Monte Carlo based Method for Hyperlink Induced Topic Search
                  on Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2376--2382},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2376-2382},
  doi          = {10.4304/JNW.8.10.2376-2382},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/JinSWF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JinW13,
  author       = {Xin Jin and
                  Yaohua Wang},
  title        = {Research on Social Network Structure and Public Opinions Dissemination
                  of Micro-blog Based on Complex Network Analysis},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1543--1550},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1543-1550},
  doi          = {10.4304/JNW.8.7.1543-1550},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JinW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KachrisT13,
  author       = {Christoforos Kachris and
                  Ioannis Tomkos},
  title        = {Optical OFDM-based Data Center Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1488--1496},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1488-1496},
  doi          = {10.4304/JNW.8.7.1488-1496},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KachrisT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KangYX13,
  author       = {Zhiping Kang and
                  Honglin Yu and
                  Qingyu Xiong},
  title        = {Detection and Recovery of Coverage Holes in Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {822--828},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.822-828},
  doi          = {10.4304/JNW.8.4.822-828},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KangYX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KhalifeHD13,
  author       = {Jawad Khalife and
                  Amjad Hajjar and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo},
  title        = {Performance of OpenDPI in Identifying Sampled Network Traffic},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {71--81},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.71-81},
  doi          = {10.4304/JNW.8.1.71-81},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KhalifeHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KleunenMH13,
  author       = {Wouter van Kleunen and
                  Nirvana Meratnia and
                  Paul J. M. Havinga},
  title        = {Simplified Scheduling for Underwater Acoustic Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {4--14},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.4-14},
  doi          = {10.4304/JNW.8.1.4-14},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KleunenMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KuangHZ13,
  author       = {Zhejun Kuang and
                  Liang Hu and
                  Chen Zhang},
  title        = {Research on Human Sensory Architecture for Cyber Physical Systems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1936--1942},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1936-1942},
  doi          = {10.4304/JNW.8.9.1936-1942},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KuangHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KuangHZ13a,
  author       = {Zhejun Kuang and
                  Liang Hu and
                  Chen Zhang},
  title        = {Research on Human Sensory Architecture for Cyber Physical Systems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2692--2698},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2692-2698},
  doi          = {10.4304/JNW.8.11.2692-2698},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KuangHZ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LahbyCA13,
  author       = {Mohamed Lahby and
                  Leghris Cherkaoui and
                  Abdellah Adib},
  title        = {A Novel Ranking Algorithm Based Network Selection For Heterogeneous
                  Wireless Access},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {263--272},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.263-272},
  doi          = {10.4304/JNW.8.2.263-272},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LahbyCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LaiY13,
  author       = {Wei Kuang Lai and
                  Kai{-}Ting Yang},
  title        = {Cross-Layer Dual Domain Scheduler for 3GPP-Long Term Evolution},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {189--196},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.189-196},
  doi          = {10.4304/JNW.8.1.189-196},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LaiY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LanTG13,
  author       = {Jianyu Lan and
                  Houjun Tang and
                  Xin Geng},
  title        = {Finite Element Analysis of a Contactless Transformer},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2302--2309},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2302-2309},
  doi          = {10.4304/JNW.8.10.2302-2309},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LanTG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LariosBML13,
  author       = {Diego Francisco Larios and
                  Julio Barbancho and
                  Francisco Javier Molina and
                  Carlos Le{\'{o}}n},
  title        = {Localization method for low-power wireless sensor networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {45--58},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.45-58},
  doi          = {10.4304/JNW.8.1.45-58},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LariosBML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LeeKXKH13,
  author       = {Kanghee Lee and
                  Hyuck M. Kwon and
                  Wenhao Xiong and
                  Hyunggi Kim and
                  Inha Hyun},
  title        = {Relay Selection Scheme for {AF} Relay Network based on Cost Function
                  Criterion},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2187--2194},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2187-2194},
  doi          = {10.4304/JNW.8.10.2187-2194},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/LeeKXKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lei13,
  author       = {Jianyun Lei},
  title        = {Weighted Directed Graph-Based Authorization Delegation Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2812--2815},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2812-2815},
  doi          = {10.4304/JNW.8.12.2812-2815},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Lei13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13,
  author       = {Jin Li},
  title        = {Model and Simulation for Collaborative {VRPSPD}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {331--338},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.331-338},
  doi          = {10.4304/JNW.8.2.331-338},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Li13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13a,
  author       = {Jing Li},
  title        = {A Fast Semantic Web Services Matchmaker for {OWL-S} Services},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1104--1111},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1104-1111},
  doi          = {10.4304/JNW.8.5.1104-1111},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Li13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13b,
  author       = {Bowen Li},
  title        = {Research on Portable Fatigue Signal Detection System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1660--1666},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1660-1666},
  doi          = {10.4304/JNW.8.7.1660-1666},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Li13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13c,
  author       = {Linhao Li},
  title        = {An Improved Congestion Control Strategy Algorithm for Heterogeneous
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2107--2113},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2107-2113},
  doi          = {10.4304/JNW.8.9.2107-2113},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Li13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Li13d,
  author       = {Liangming Li},
  title        = {An Integration Testing Approach Based on Composition of Unit Test
                  Cases},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2769--2775},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2769-2775},
  doi          = {10.4304/JNW.8.12.2769-2775},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Li13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiBLK13,
  author       = {Yang Li and
                  Zhisong Bie and
                  Jiaru Lin and
                  Hyok Hui Kim},
  title        = {Low-Density Lattice Codes for Inter-Symbol Interference Channels},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1899--1905},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1899-1905},
  doi          = {10.4304/JNW.8.8.1899-1905},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiBLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiFLD13,
  author       = {Xu Li and
                  Qijing Feng and
                  Shijie Li and
                  Haiyang Ding},
  title        = {{RE-AODV:} Improved {AODV} Routing Protocol for Repairing Efficiency},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2467--2472},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2467-2472},
  doi          = {10.4304/JNW.8.11.2467-2472},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiFLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiH13,
  author       = {Yuyu Li and
                  Bo Huang},
  title        = {Multiple Principal-Agent Model of SMEs Pollution Regulation under
                  Centralized Treatment},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2063--2070},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2063-2070},
  doi          = {10.4304/JNW.8.9.2063-2070},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLBH13,
  author       = {Yang Li and
                  Xichuan Lin and
                  Zhisong Bie and
                  Hyok Hui Kim},
  title        = {Power- and Bandwidth-Efficient Euclidean Code with Sparse Generator
                  Matrix},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1440--1447},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1440-1447},
  doi          = {10.4304/JNW.8.6.1440-1447},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiLBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLQ13,
  author       = {Jianjun Li and
                  Xibing Li and
                  Xilong Qu},
  title        = {Signature Analysis Based on Improved {EMD} with High-order Spline
                  Interpolation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {882--887},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.882-887},
  doi          = {10.4304/JNW.8.4.882-887},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiLQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLSSY13,
  author       = {Xuhui Li and
                  Gangyan Li and
                  Guowen Sun and
                  Huiping Shi and
                  Baoan Yang},
  title        = {Research on Layout Optimization of Urban Circle Solid Waste Transfer
                  and Disposal Stations},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1803--1809},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1803-1809},
  doi          = {10.4304/JNW.8.8.1803-1809},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiLSSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiM13,
  author       = {Jing Li and
                  Dianfu Ma},
  title        = {Suffix Tree Based Incremental Web Services Clustering Method},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1566--1573},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1566-1573},
  doi          = {10.4304/JNW.8.7.1566-1573},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiTZ13,
  author       = {Fangwei Li and
                  Yongchuan Tang and
                  Jiang Zhu},
  title        = {Dynamic Resource Access Using Graphical Game in Asymmetric Wireless
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1845--1851},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1845-1851},
  doi          = {10.4304/JNW.8.8.1845-1851},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiW13,
  author       = {Hehua Li and
                  Chunling Wu},
  title        = {Study on the Application of Digital Certificates in the Protection
                  of Network Information Security and Data Integrity},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2592--2598},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2592-2598},
  doi          = {10.4304/JNW.8.11.2592-2598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWLBLK13,
  author       = {Song Li and
                  Yuhao Wang and
                  Henry Leung and
                  Dakun Bao and
                  Boyuan Li and
                  Bo Kong},
  title        = {The Inversion-based Coverage Prediction Tool for Cellular Networks
                  - Real City Experiments},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1700--1707},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1700-1707},
  doi          = {10.4304/JNW.8.8.1700-1707},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiWLBLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWP13,
  author       = {Jiyun Li and
                  Junping Wang and
                  Hongxing Pei},
  title        = {Data Cleaning of Medical Data for Knowledge Mining},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2663--2670},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2663-2670},
  doi          = {10.4304/JNW.8.11.2663-2670},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWWK13,
  author       = {Hehua Li and
                  Chunling Wu and
                  Wei Wei and
                  Buddha Khoukhi},
  title        = {Decentralized Distribution Update Algorithm Based on Compressibility-controlled
                  Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2078--2084},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2078-2084},
  doi          = {10.4304/JNW.8.9.2078-2084},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiWWK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWYRG13,
  author       = {Yuxiang Li and
                  Haiming Wang and
                  Hongkui Yu and
                  Changquan Ren and
                  Qingjia Geng},
  title        = {Network Intrusion Detection based on {GMKL} Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1322--1328},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1322-1328},
  doi          = {10.4304/JNW.8.6.1322-1328},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiWYRG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiZRS13,
  author       = {Hui Li and
                  Jingxiao Zhang and
                  Lieyan Ren and
                  Zhen Shi},
  title        = {Scheduling Optimization of Construction Engineering based on Ant Colony
                  Optimized Hybrid Genetic Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1411--1416},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1411-1416},
  doi          = {10.4304/JNW.8.6.1411-1416},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiZRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiZY13,
  author       = {Haihong Li and
                  Luo Zhong and
                  Huaxiong Yao},
  title        = {Detecting Protein Complexes through Micro-Network Comparison in Protein-Protein
                  Interaction Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {696--703},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.696-703},
  doi          = {10.4304/JNW.8.3.696-703},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liang13,
  author       = {Ping Liang},
  title        = {A Bisimulation-based Hierarchical Framework for Software Development
                  Models},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1720--1725},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1720-1725},
  doi          = {10.4304/JNW.8.8.1720-1725},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liang13a,
  author       = {Bao{-}juan Liang},
  title        = {Traffic Flow Detection Based on Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1859--1865},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1859-1865},
  doi          = {10.4304/JNW.8.8.1859-1865},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liang13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiaoB13,
  author       = {Wenjing Liao and
                  Z. Balzen},
  title        = {{LSSVM} Network Flow Prediction Based on the Self-adaptive Genetic
                  Algorithm Optimization},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {507--512},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.507-512},
  doi          = {10.4304/JNW.8.2.507-512},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiaoB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiaoYZ13,
  author       = {Zhuhua Liao and
                  Aiping Yi and
                  Guoqing Zhang},
  title        = {Distributed Data Integration in Content-centric Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1950--1959},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1950-1959},
  doi          = {10.4304/JNW.8.9.1950-1959},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiaoYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LinL13,
  author       = {Wenhui Lin and
                  Jun Liu},
  title        = {Performance Analysis of MapReduce Program in Heterogeneous Cloud Computing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1734--1741},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1734-1741},
  doi          = {10.4304/JNW.8.8.1734-1741},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LinL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu13,
  author       = {Chun{-}Ying Liu},
  title        = {Adaptive Search Protocol Based on Optimized Ant Colony Algorithm in
                  Peer-to-Peer Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {843--850},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.843-850},
  doi          = {10.4304/JNW.8.4.843-850},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu13a,
  author       = {Chun{-}Ying Liu},
  title        = {An Improved Adaptive Genetic Algorithm for the Multi-depot Vehicle
                  Routing Problem with Time Window},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1035--1042},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1035-1042},
  doi          = {10.4304/JNW.8.5.1035-1042},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liu13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuC13,
  author       = {Hao Liu and
                  Zhigang Chen},
  title        = {Research on {P2P} Overlay Network Model with Small-world Features},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2043--2049},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2043-2049},
  doi          = {10.4304/JNW.8.9.2043-2049},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuCLH13,
  author       = {Xiyin Liu and
                  Lijun Cao and
                  Min Liu and
                  Kun Han},
  title        = {Process-based Security Detection Approach for Virtual Machines on
                  Private Cloud Platforms},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1380--1386},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1380-1386},
  doi          = {10.4304/JNW.8.6.1380-1386},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuCLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuCZS13,
  author       = {Qi Liu and
                  Jun Cui and
                  HongDong Zhao and
                  Hong Shen},
  title        = {A Soft Fault-concept Diagnosis Method of Analog Circuits Based on
                  Cloud Model Theory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1497--1503},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1497-1503},
  doi          = {10.4304/JNW.8.7.1497-1503},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuCZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuGZHL13,
  author       = {Ying Liu and
                  Wenxiang Gu and
                  Tingting Zou and
                  Qingtao Huang and
                  Qiao Li},
  title        = {Incremental Knowledge Compilation Using the Extension Rule},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2241--2246},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2241-2246},
  doi          = {10.4304/JNW.8.10.2241-2246},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuGZHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuH13,
  author       = {Daojian Liu and
                  Tianmin Huang},
  title        = {A Reduced-Order Correction Algorithm for the Linear Programming Problem
                  by Non-negative Constraints with the Most-Obtuse Angle},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2361--2367},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2361-2367},
  doi          = {10.4304/JNW.8.10.2361-2367},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuKZY13,
  author       = {Hean Liu and
                  Zhike Kuang and
                  Cizhen Zhang and
                  Goodson A. Yilly},
  title        = {Research on Spectrum Allocation Based on the Network Weights of Internet
                  of Things},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2804--2811},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2804-2811},
  doi          = {10.4304/JNW.8.12.2804-2811},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuKZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuLHRR13,
  author       = {Mingyang Liu and
                  Shufen Liu and
                  Changhong Hu and
                  Y. V. Ramana Reddy and
                  Sumitra Reddy},
  title        = {Personalized Search Based on Context-Centric Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1551--1557},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1551-1557},
  doi          = {10.4304/JNW.8.7.1551-1557},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuLHRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuLQ13,
  author       = {Yao Liu and
                  Qiao Liu and
                  Zhiguang Qin},
  title        = {Community Detecting and Feature Analysis in Real Directed Weighted
                  Social Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1432--1439},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1432-1439},
  doi          = {10.4304/JNW.8.6.1432-1439},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuLQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuPHT13,
  author       = {Xiaozhu Liu and
                  Yuwei Peng and
                  Yuanhua He and
                  Zukai Tang},
  title        = {Uniform Storage Model-based Update Scheme of On-line Information Retrieval
                  System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2179--2185},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2179-2185},
  doi          = {10.4304/JNW.8.9.2179-2185},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuPHT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuS13,
  author       = {Wenxue Liu and
                  Guanying Sun},
  title        = {A Trust-based Information Propagation Model in Online Social Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1767--1773},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1767-1773},
  doi          = {10.4304/JNW.8.8.1767-1773},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuS13a,
  author       = {Wenxue Liu and
                  Guanying Sun},
  title        = {An advanced Data Mining Strategy for Multi-Target Tracking in Adverse
                  Environments},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1997--2004},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1997-2004},
  doi          = {10.4304/JNW.8.9.1997-2004},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuXY13,
  author       = {Kun Liu and
                  Gaochao Xu and
                  Jun'e Yuan},
  title        = {An Improved Hadoop Data Load Balancing Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2816--2822},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2816-2822},
  doi          = {10.4304/JNW.8.12.2816-2822},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuXY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuYXK13,
  author       = {Ting T. Liu and
                  Wei Yang and
                  Chang L. Xu and
                  Young{-}Il Kim},
  title        = {A SNR-based Multi-channel Multicast Scheme for Popular Video in Wireless
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {628--635},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.628-635},
  doi          = {10.4304/JNW.8.3.628-635},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuYXK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZL13,
  author       = {Hongwei Liu and
                  Peng Zhang and
                  Jun Liu},
  title        = {Public Data Integrity Verification for Secure Cloud Storage},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {373--380},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.373-380},
  doi          = {10.4304/JNW.8.2.373-380},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuZZ13,
  author       = {Qiuyan Liu and
                  Peng Zhang and
                  Yuping Zhao},
  title        = {Energy Efficient Deployment of Heterogeneous Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2422--2428},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2422-2428},
  doi          = {10.4304/JNW.8.10.2422-2428},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LongO13,
  author       = {Yanjun Long and
                  Jianquan Ouyang},
  title        = {Research on Multicast Reliability in Distributed Virtual Environment},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1130--1137},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1130-1137},
  doi          = {10.4304/JNW.8.5.1130-1137},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LongO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LongOS13,
  author       = {Yanjun Long and
                  Jianquan Ouyang and
                  Xinwen Sun},
  title        = {Network Intrusion Detection Model based on Fuzzy Support Vector Machine},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1387--1394},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1387-1394},
  doi          = {10.4304/JNW.8.6.1387-1394},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LongOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LongX13,
  author       = {Yue Long and
                  Qiang Xian},
  title        = {Logistics Optimization of Auto Parts Supplier Embedded by Service
                  Alliance},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2444--2451},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2444-2451},
  doi          = {10.4304/JNW.8.10.2444-2451},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LongX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lu13,
  author       = {Biao Lu},
  title        = {Credibility Control Method Based on Error Transfer Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2029--2036},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2029-2036},
  doi          = {10.4304/JNW.8.9.2029-2036},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Lu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lu13a,
  author       = {Jiuyuan Lu},
  title        = {Bit Loading Algorithm Based on Channel Detection in {VSF-OFCDM} Wireless
                  Communication System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2135--2142},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2135-2142},
  doi          = {10.4304/JNW.8.9.2135-2142},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Lu13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuJ13,
  author       = {Ying Lu and
                  Peng Jing},
  title        = {The Combination of Postponement Operations in a Supply Chain Network
                  with Multi-level Product Differentiations},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2900--2907},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2900-2907},
  doi          = {10.4304/JNW.8.12.2900-2907},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuP13,
  author       = {Jianchang Lu and
                  Leping Pei},
  title        = {Security Evaluation of Power Network Information System Based on Analytic
                  Network Process},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {866--873},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.866-873},
  doi          = {10.4304/JNW.8.4.866-873},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuY13,
  author       = {Kai{-}Sheng Lu and
                  Xiao{-}Bing Yi},
  title        = {On Some Separability, Reducibility and Controllability Criteria of
                  {RLCM} Networks over {F(Z)}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {903--909},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.903-909},
  doi          = {10.4304/JNW.8.4.903-909},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoCW13,
  author       = {Yan Luo and
                  Xuzhou Chen and
                  Jie Wang},
  title        = {A Virtual Network Embedding Algorithm for Providing Stronger Connectivity
                  in the Residual Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {779--786},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.779-786},
  doi          = {10.4304/JNW.8.4.779-786},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuoCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LvZ13,
  author       = {Lei Lv and
                  Zhongpei Zhang},
  title        = {A Selfish Linear Precoding Strategy for Downlink Two-User {MIMO} Systems
                  Using Limited Rate Feedback},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1476--1479},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1476-1479},
  doi          = {10.4304/JNW.8.7.1476-1479},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LvZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaSZ13,
  author       = {Yong Ma and
                  Yanguang Sun and
                  Yujiao Zeng},
  title        = {Parameter Identification for Iron and Steel Enterprise Steam Network
                  Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {421--428},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.421-428},
  doi          = {10.4304/JNW.8.2.421-428},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaZM13,
  author       = {Wenming Ma and
                  Yujie Zhang and
                  Xiangwu Meng},
  title        = {Distribution Aware Collaborative Spread Replication for Rare Objects
                  in Unstructured Peer-to-Peer Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {991--998},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.991-998},
  doi          = {10.4304/JNW.8.5.991-998},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MakkiB13,
  author       = {S. Kami Makki and
                  Keenan B. Bonds},
  title        = {Enhancing Node Cooperation in Mobile Ad Hoc Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {645--649},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.645-649},
  doi          = {10.4304/JNW.8.3.645-649},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MakkiB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaoX13,
  author       = {Tengyue Mao and
                  Zhengquan Xu},
  title        = {An Effective QoS Integrated Weighted Cost Model for {LEO/MEO} Satellite
                  {IP} Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2706--2711},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2706-2711},
  doi          = {10.4304/JNW.8.11.2706-2711},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaoX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaoX13a,
  author       = {Tengyue Mao and
                  Zhengquan Xu},
  title        = {An Effective Mechanism for Improving Performance of {TCP} over {LEO/MEO}
                  Satellite {IP} Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2942--2947},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2942-2947},
  doi          = {10.4304/JNW.8.12.2942-2947},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaoX13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MartinRZRG13,
  author       = {Jos{\'{e}} Antonio G{\'{o}}mez Martin and
                  Ana Ver{\'{o}}nica Medina Rodr{\'{\i}}guez and
                  Enrique Dorronzoro Zubiete and
                  Octavio Rivera Romero and
                  Sergio Mart{\'{\i}}n Guill{\'{e}}n},
  title        = {Fingerprint Indoor Position System Based},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {37--44},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.37-44},
  doi          = {10.4304/JNW.8.1.37-44},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MartinRZRG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MasihpourFA13,
  author       = {Mehrnoush Masihpour and
                  Daniel Robert Franklin and
                  Mehran Abolhasan},
  title        = {Multihop Relay Techniques for Communication Range Extension in Near-Field
                  Magnetic Induction Communication Systems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {999--1011},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.999-1011},
  doi          = {10.4304/JNW.8.5.999-1011},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MasihpourFA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MassnerRH13,
  author       = {Stephan Massner and
                  Chris Richter and
                  Uwe Hautzendorfer},
  title        = {{SIP} Trunking - General Requirements for Interconnecting Enterprise
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2195--2212},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2195-2212},
  doi          = {10.4304/JNW.8.10.2195-2212},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MassnerRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MendezL13,
  author       = {Diego Mendez and
                  Miguel A. Labrador},
  title        = {On Sensor Data Verification for Participatory Sensing Systems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {576--587},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.576-587},
  doi          = {10.4304/JNW.8.3.576-587},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MendezL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MiaoLW13,
  author       = {Xuna Miao and
                  Ran Liu and
                  Yingfeng Wang},
  title        = {A Network Evaluation Algorithm in Heterogeneous Wireless Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2473--2477},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2473-2477},
  doi          = {10.4304/JNW.8.11.2473-2477},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MiaoLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MingZLM13,
  author       = {Dexiang Ming and
                  Xiaopeng Zhong and
                  Lili Liu and
                  Xiandong Ma},
  title        = {Design of a Reconfigurable Platform for Navigation Signal Simulation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1019--1026},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1019-1026},
  doi          = {10.4304/JNW.8.5.1019-1026},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MingZLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MirchandaniB13,
  author       = {Vinod Mirchandani and
                  Peter Bert{\'{o}}k},
  title        = {Optimized Energy Management for Mixed Uplink Traffic in {LTE} {UE}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {537--551},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.537-551},
  doi          = {10.4304/JNW.8.3.537-551},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MirchandaniB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MokhtarSAA13,
  author       = {Rania A. Mokhtar and
                  Rashid A. Saeed and
                  Raed A. Alsaqour and
                  Yahia Abdallah},
  title        = {Study on Energy Detection-based Cooperative Sensing in Cognitive Radio
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1255--1261},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1255-1261},
  doi          = {10.4304/JNW.8.6.1255-1261},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/MokhtarSAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MoudiO13,
  author       = {Mehrnaz Moudi and
                  Mohamed Othman},
  title        = {A Cost-Effective Architecture For Optical Multistage Interconnection
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {345--350},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.345-350},
  doi          = {10.4304/JNW.8.2.345-350},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MoudiO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MovassaghiAL13,
  author       = {Samaneh Movassaghi and
                  Mehran Abolhasan and
                  Justin Lipman},
  title        = {A Review of Routing Protocols in Wireless Body Area Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {559--575},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.559-575},
  doi          = {10.4304/JNW.8.3.559-575},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MovassaghiAL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MuZ13,
  author       = {Ruihui Mu and
                  Wuqiang Zhang},
  title        = {{QAODV:} Improved Security Routing Protocol of {AODV}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2400--2405},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2400-2405},
  doi          = {10.4304/JNW.8.10.2400-2405},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiC13,
  author       = {Yunlu Ni and
                  Hang Chen},
  title        = {Detection of Underwater Carrier-Free Pulse based on Time-Frequency
                  Analysis},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {205--212},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.205-212},
  doi          = {10.4304/JNW.8.1.205-212},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NiC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiZWSZZ13,
  author       = {Qiufen Ni and
                  Rongbo Zhu and
                  Zhenguo Wu and
                  Yongli Sun and
                  Lingyun Zhou and
                  Bin Zhou},
  title        = {Spectrum Allocation Based on Game Theory in Cognitive Radio Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {712--722},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.712-722},
  doi          = {10.4304/JNW.8.3.712-722},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NiZWSZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NieQ13,
  author       = {Gang Nie and
                  Xiuhua Qing},
  title        = {Comparison and Handover Performance Evaluation of the Macro-mobility
                  Protocol},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {100--107},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.100-107},
  doi          = {10.4304/JNW.8.1.100-107},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NieQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Ning13,
  author       = {Zhang Ji Bo Ning},
  title        = {Research on Web Information Retrieval based on Vector Space Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {688--695},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.688-695},
  doi          = {10.4304/JNW.8.3.688-695},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Ning13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NingFS13,
  author       = {Lianju Ning and
                  Xin Feng and
                  Lichi Sun},
  title        = {A Secure Protocol for Efficient {SMS} Transmission and Management},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2171--2178},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2171-2178},
  doi          = {10.4304/JNW.8.9.2171-2178},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NingFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiuC13,
  author       = {Huiqing Niu and
                  Hong Chen},
  title        = {An Improved Recommendation Algorithm in Knowledge Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1336--1342},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1336-1342},
  doi          = {10.4304/JNW.8.6.1336-1342},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NiuC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NiuWZGZ13,
  author       = {Xiaoxia Niu and
                  Yanxia Wu and
                  Bowei Zhang and
                  Guochang Gu and
                  Guoyin Zhang},
  title        = {Rapid FPGA-based Delay Estimation for the Hardware/Software Partitioning},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1183--1190},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1183-1190},
  doi          = {10.4304/JNW.8.5.1183-1190},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NiuWZGZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatASOO13,
  author       = {Muath A. Obaidat and
                  Mohamed A. Ali and
                  Ihsan Shahwan and
                  Mohammad S. Obaidat and
                  Suhaib Obeidat},
  title        = {QoS-Aware Multipath Communications over MANETs},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {26--36},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.26-36},
  doi          = {10.4304/JNW.8.1.26-36},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ObaidatASOO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatCSF13,
  author       = {Mohammad S. Obaidat and
                  Daniel Cascado Caballero and
                  Jos{\'{e}} Luis Sevillano and
                  Joaquim Filipe},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {1--3},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.1-3},
  doi          = {10.4304/JNW.8.1.1-3},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ObaidatCSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OuW13,
  author       = {Yang Ou and
                  Yi{-}Ming Wang},
  title        = {Multiple Antennas Spectrum Sensing for Cognitive Radio Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {665--671},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.665-671},
  doi          = {10.4304/JNW.8.3.665-671},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/OuW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Ouyang13,
  author       = {Jiankun Ouyang},
  title        = {Energy-Efficient Data Processing Scheme in Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1667--1672},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1667-1672},
  doi          = {10.4304/JNW.8.7.1667-1672},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Ouyang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OuyangC13,
  author       = {Guang Ouyang and
                  Xiang Chen},
  title        = {Trust Model Based on {P2P} Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2013--2020},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2013-2020},
  doi          = {10.4304/JNW.8.9.2013-2020},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/OuyangC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PaceA13,
  author       = {Pasquale Pace and
                  Gianluca Aloi},
  title        = {Managing and Deploying Pervasive Wireless Internet Access through
                  Attractive Connection Sharing and Reselling Mechanisms},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {351--364},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.351-364},
  doi          = {10.4304/JNW.8.2.351-364},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PaceA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Peng13,
  author       = {Hui Peng},
  title        = {Research of Collaborative Filtering Recommendation Algorithm based
                  on Network Structure},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2383--2391},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2383-2391},
  doi          = {10.4304/JNW.8.10.2383-2391},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Peng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PengLHZY13,
  author       = {Kai Peng and
                  Rongheng Lin and
                  Binbin Huang and
                  Hua Zou and
                  Fangchun Yang},
  title        = {Node Importance of Data Center Network Based on Contribution Matrix
                  of Information Entropy},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1248--1254},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1248-1254},
  doi          = {10.4304/JNW.8.6.1248-1254},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PengLHZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PirmoradianAP13,
  author       = {Mahdi Pirmoradian and
                  Olayinka Adigun and
                  Christos Politis},
  title        = {Adaptive Spectrum Opportunity Access in Cognitive Radio Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {747--754},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.747-754},
  doi          = {10.4304/JNW.8.4.747-754},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PirmoradianAP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Pu13,
  author       = {Fei Pu},
  title        = {Modular Reversibility Analysis in Self-loops Connections of Petri
                  Net Systems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {493--500},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.493-500},
  doi          = {10.4304/JNW.8.2.493-500},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Pu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QiLCH13,
  author       = {Yanbo Qi and
                  Zhong Liu and
                  Huadong Chen and
                  Jieying Han},
  title        = {Distributed Combat System of Systems Network Modeling},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1906--1912},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1906-1912},
  doi          = {10.4304/JNW.8.8.1906-1912},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/QiLCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QiuL13,
  author       = {Yinghui Qiu and
                  Chao Liu},
  title        = {Security and Stability Analysis for Yunnan Power Grid with Wind Power
                  Integration},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2893--2899},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2893-2899},
  doi          = {10.4304/JNW.8.12.2893-2899},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/QiuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QuWXW13,
  author       = {Haipeng Qu and
                  Lili Wen and
                  Yanfei Xu and
                  Ning Wang},
  title        = {{LCCWS:} Lightweight Copyfree Cross-layer Web Server},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {165--173},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.165-173},
  doi          = {10.4304/JNW.8.1.165-173},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/QuWXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RahmanBJF13,
  author       = {Rony Hasinur Rahman and
                  Craig R. Benson and
                  Frank Jiang and
                  Michael R. Frater},
  title        = {{LOARP:} {A} Low Overhead Routing Protocol for Underwater Acoustic
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {317--330},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.317-330},
  doi          = {10.4304/JNW.8.2.317-330},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RahmanBJF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RajuK13,
  author       = {K. V. Krishnam Raju and
                  V. Valli Kumari},
  title        = {Formal Verification of {IEEE} 802.11 Authentication Protocols},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {769--778},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.769-778},
  doi          = {10.4304/JNW.8.4.769-778},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RajuK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RanSL13,
  author       = {Wenxue Ran and
                  Xinling Shi and
                  Li Liu},
  title        = {Combination of the Sorting Line Priority Polling Control Mechanism},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2234--2240},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2234-2240},
  doi          = {10.4304/JNW.8.10.2234-2240},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/RanSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RongCL13,
  author       = {Haina Rong and
                  Jixiang Cheng and
                  Yuquan Li},
  title        = {Radar Emitter Signal Analysis with Estimation of Distribution Algorithms},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {108--115},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.108-115},
  doi          = {10.4304/JNW.8.1.108-115},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RongCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RuanZL13,
  author       = {Dian{-}xu Ruan and
                  Xiaoguang Zhang and
                  Li{-}Jun Li},
  title        = {Safety Data Fusion Algorithm in Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1121--1129},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1121-1129},
  doi          = {10.4304/JNW.8.5.1121-1129},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/RuanZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SalamL13,
  author       = {Md. Iftekhar Salam and
                  Hoon{-}Jae Lee},
  title        = {Algebraic Countermeasure to Enhance the Improved Summation Generator
                  with 2-Bit Memory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {977--984},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.977-984},
  doi          = {10.4304/JNW.8.5.977-984},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/SalamL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenSX13,
  author       = {Shaowei Shen and
                  Zuiyi Shen and
                  Bing Xu},
  title        = {Analysis of Fishery Production Efficiency based on the Three-Stage
                  {DEA}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {461--468},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.461-468},
  doi          = {10.4304/JNW.8.2.461-468},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShenSX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenXLQ13,
  author       = {Xiaoyan Shen and
                  Chenjiang Xie and
                  Haoxue Liu and
                  Zhaowen Qiu},
  title        = {Model and Algorithm for Routing and Scheduling Problem in Hazardous
                  Materials Transportation Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1027--1034},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1027-1034},
  doi          = {10.4304/JNW.8.5.1027-1034},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShenXLQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuaiH13,
  author       = {Jun Shuai and
                  Xuli Han},
  title        = {Constructing Low-Dimensional Dynamical Systems of Nonlinear Partial
                  Differential Equations Using Optimization},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2520--2526},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2520-2526},
  doi          = {10.4304/JNW.8.11.2520-2526},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShuaiH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuaibKA13,
  author       = {Khaled Shuaib and
                  Issa Khalil and
                  Mohammed Abdel{-}Hafez},
  title        = {Communications in Smart Grid: {A} Review with Performance, Reliability
                  and Security Consideration},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1229--1240},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1229-1240},
  doi          = {10.4304/JNW.8.6.1229-1240},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ShuaibKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Song13,
  author       = {Di Song},
  title        = {Research on Information Propagation Model for Microblogging},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1647--1653},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1647-1653},
  doi          = {10.4304/JNW.8.7.1647-1653},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Song13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SongZ13,
  author       = {Limin Song and
                  Junli Zhang},
  title        = {Load Balancing Method Based on Servers and Reverse Proxy},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1609--1616},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1609-1616},
  doi          = {10.4304/JNW.8.7.1609-1616},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SongZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Su13,
  author       = {Rui Su},
  title        = {Identification Method of Sports Throwing Force Based on Fuzzy Neural
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1574--1581},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1574-1581},
  doi          = {10.4304/JNW.8.7.1574-1581},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Su13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SuZ13,
  author       = {Baishun Su and
                  Baoding Zhang},
  title        = {Wireless Position Scheme based on ZigBee Network in the Freeway {ETC}
                  System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {658--664},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.658-664},
  doi          = {10.4304/JNW.8.3.658-664},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SuhairiG13,
  author       = {Kasman Suhairi and
                  Ford Lumban Gaol},
  title        = {The Measurement of Optimization Performance of Managed Service Division
                  with {ITIL} Framework using Statistical Process Control},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {518--529},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.518-529},
  doi          = {10.4304/JNW.8.3.518-529},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SuhairiG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunHS13,
  author       = {Zheng Sun and
                  Xuezheng Han and
                  Zhufeng Shao},
  title        = {A Hierarchical Routing Protocol Based on Energy Efficiency and Chain
                  Structure for One-Way Aerial Ropeways for Underground Mine},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2491--2497},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2491-2497},
  doi          = {10.4304/JNW.8.11.2491-2497},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunJJ13,
  author       = {Chengshuang Sun and
                  Fan Jiang and
                  Shaohua Jiang},
  title        = {Research on {RFID} Applications in Construction Industry},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1221--1228},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1221-1228},
  doi          = {10.4304/JNW.8.5.1221-1228},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunS13,
  author       = {Hailing Sun and
                  Tianbao Su},
  title        = {Project Cost Prediction Model Based on Fuzzy Theory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1595--1600},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1595-1600},
  doi          = {10.4304/JNW.8.7.1595-1600},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunS13a,
  author       = {Zheng Sun and
                  Zhufeng Shao},
  title        = {Greedy Forwarding Routing Strategy Based on Energy Efficiency in Wireless
                  Sensor Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2317--2323},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2317-2323},
  doi          = {10.4304/JNW.8.10.2317-2323},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunW13,
  author       = {Yuan Sun and
                  Qian Wang},
  title        = {Demand Analysis of Water Resources Based on Pulse Process of Complex
                  System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {910--916},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.910-916},
  doi          = {10.4304/JNW.8.4.910-916},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunWSW13,
  author       = {Jian Sun and
                  Chenghua Wang and
                  Jing Sun and
                  Lei Wang},
  title        = {Analog Circuit Soft Fault Diagnosis based on {PCA} and {PSO-SVM}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2791--2796},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2791-2796},
  doi          = {10.4304/JNW.8.12.2791-2796},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunWSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunZWNZ13,
  author       = {Yongli Sun and
                  Bin Zhou and
                  Zhenguo Wu and
                  Qiufen Ni and
                  Rongbo Zhu},
  title        = {Multi-channel {MAC} Protocol in Cognitive Radio Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2478--2490},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2478-2490},
  doi          = {10.4304/JNW.8.11.2478-2490},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunZWNZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanL13,
  author       = {Jinsheng Tan and
                  Peng Liu},
  title        = {Efficient Flow Control Scheme in Multimedia Cloud Computing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2285--2292},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2285-2292},
  doi          = {10.4304/JNW.8.10.2285-2292},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TanL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanPNLL13,
  author       = {Guoping Tan and
                  Xinhua Peng and
                  Xinyang Ni and
                  Betene A. Francis Lin and
                  Xiuquan Liu},
  title        = {{PNCRM:} {A} Novel Real-time Multicast Scheme in MANETs Based on Partial
                  Network Coding},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2414--2421},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2414-2421},
  doi          = {10.4304/JNW.8.10.2414-2421},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TanPNLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanXH13,
  author       = {Xiaolin Tan and
                  Zhongyang Xiong and
                  Yun He},
  title        = {Signal Attenuation-aware Clustering in Wireless Mobile Ad Hoc Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {796--803},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.796-803},
  doi          = {10.4304/JNW.8.4.796-803},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TanXH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanZ13,
  author       = {Jianwei Tan and
                  Yiqing Zhang},
  title        = {Research on Multi-Sensor Multi-Target Tracking Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2527--2533},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2527-2533},
  doi          = {10.4304/JNW.8.11.2527-2533},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TanZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TangLWZ13,
  author       = {Jianqiang Tang and
                  Ying Liu and
                  Ming Wan and
                  Hongke Zhang},
  title        = {Blocking DoS Attack Traffic in Network with Locator/Identifier Separation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {731--738},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.731-738},
  doi          = {10.4304/JNW.8.3.731-738},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TangLWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TaoC13,
  author       = {Jinlong Tao and
                  Lirong Chen},
  title        = {Software Test Case Automated Generation Algorithm with Extended {EDPN}
                  Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1825--1830},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1825-1830},
  doi          = {10.4304/JNW.8.8.1825-1830},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TaoC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TaoX13,
  author       = {Tao Tao and
                  Hongze Xu},
  title        = {Adaptive Fault-Tolerant Control for Time-Varying Failure in High-Speed
                  Train Computer Systems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2823--2828},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2823-2828},
  doi          = {10.4304/JNW.8.12.2823-2828},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TaoX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Tian13,
  author       = {Xiaoyong Tian},
  title        = {Chaos Encryption Algorithm to Deal with Security Threat to Internet
                  of Things {RFID}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1168--1174},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1168-1174},
  doi          = {10.4304/JNW.8.5.1168-1174},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Tian13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TongJL13,
  author       = {Weiming Tong and
                  Xianji Jin and
                  Lei Lu},
  title        = {Optimized Information Transmission Scheduling Strategy Oriented to
                  Advanced Metering Infrastructure},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {245--252},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.245-252},
  doi          = {10.4304/JNW.8.1.245-252},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TongJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TsaiZJ13,
  author       = {Chung{-}Hung Tsai and
                  Dauw{-}Song Zhu and
                  Yueh{-}Meei Jang},
  title        = {A Study on the Consumer Adoption Behaviors of Internet Bank},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2956--2963},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2956-2963},
  doi          = {10.4304/JNW.8.12.2956-2963},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TsaiZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TuGHY13,
  author       = {Guangyou Tu and
                  Songtao Guo and
                  Hongyu Huang and
                  Yuanyuan Yang},
  title        = {Optimal Resource Allocation for Cross-layer Utility Maximization in
                  Ad Hoc Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1757--1766},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1757-1766},
  doi          = {10.4304/JNW.8.8.1757-1766},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TuGHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanHSFL13,
  author       = {Qingsheng Wan and
                  Shaobin Huang and
                  Kai Sun and
                  Lifu Feng and
                  Ya Li},
  title        = {A Domain Information Retrieval Method based on Pension Insurance Ontology
                  Concept Similarity},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2908--2914},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2908-2914},
  doi          = {10.4304/JNW.8.12.2908-2914},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WanHSFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanHW13,
  author       = {Qingsheng Wan and
                  Shaobin Huang and
                  Mengxi Wei},
  title        = {Research on Pretreatment of Questions Based on Large-scale Real Questions
                  Set},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1810--1816},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1810-1816},
  doi          = {10.4304/JNW.8.8.1810-1816},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WanHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanJ13,
  author       = {Li Wan and
                  Yang Jie},
  title        = {Context-aware Greedy Scheduling Algorithm in Wireless Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1788--1795},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1788-1795},
  doi          = {10.4304/JNW.8.8.1788-1795},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WanJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WanY13,
  author       = {Li Wan and
                  Jie Yang},
  title        = {Advanced Split {BIRCH} Algorithm in Reconfigurable Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2050--2056},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2050-2056},
  doi          = {10.4304/JNW.8.9.2050-2056},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WanY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang13,
  author       = {Shaolin Wang},
  title        = {Cascading Model of Infrastructure Networks based on Complex Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1448--1454},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1448-1454},
  doi          = {10.4304/JNW.8.6.1448-1454},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Wang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang13a,
  author       = {Yanjun Wang},
  title        = {Network Intrusion Detection Technology based on Improved C-means Clustering
                  Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2541--2547},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2541-2547},
  doi          = {10.4304/JNW.8.11.2541-2547},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Wang13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang13b,
  author       = {Feichao Wang},
  title        = {Energy Consumption Oriented Network-on-Chip Mapping Method},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2857--2863},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2857-2863},
  doi          = {10.4304/JNW.8.12.2857-2863},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Wang13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangC13,
  author       = {Yan Wang and
                  Xiufeng Cao},
  title        = {Process of Assembling Component Based on Domain Ontology},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2347--2352},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2347-2352},
  doi          = {10.4304/JNW.8.10.2347-2352},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangCNZ13,
  author       = {Keqing Wang and
                  Jianzhong Chen and
                  Yingtao Niu and
                  Yonggang Zhu},
  title        = {A novel Spectrum Estimation Algorithm Based on Compressed Sensing
                  and Multi-taper Method},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {971--976},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.971-976},
  doi          = {10.4304/JNW.8.4.971-976},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangCNZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangDX13,
  author       = {Zhongwen Wang and
                  Ruizhen Duan and
                  Xiaoqiu Xu},
  title        = {Model Identification of Hydrostatic Center Frame Control System based
                  on {MATLAB}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1315--1321},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1315-1321},
  doi          = {10.4304/JNW.8.6.1315-1321},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangDX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangH13,
  author       = {Jing Wang and
                  Yourui Huang},
  title        = {Improved Artificial Fish Algorithm for Parameters Optimization of
                  {PID} Neural Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1726--1733},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1726-1733},
  doi          = {10.4304/JNW.8.8.1726-1733},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangH13a,
  author       = {Jing Wang and
                  Yourui Huang},
  title        = {Decimal Integer Multiplication based on Molecular Beacons},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2762--2768},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2762-2768},
  doi          = {10.4304/JNW.8.12.2762-2768},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangH13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangHCX13,
  author       = {Yuan Wang and
                  Liang Hu and
                  Jian Feng Chu and
                  Xiao Bo Xu},
  title        = {Analysis and Improvement for {SPINS}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {229--236},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.229-236},
  doi          = {10.4304/JNW.8.1.229-236},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/WangHCX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangJ13,
  author       = {Bin Wang and
                  Zhigang Jin},
  title        = {Distributed Randomized Algorithm based on Buffer Utility for Control
                  Channel Scheduling in {IEEE} 802.16 Mesh Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1270--1277},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1270-1277},
  doi          = {10.4304/JNW.8.6.1270-1277},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangL13,
  author       = {Xiaomin Wang and
                  Yangyang Lu},
  title        = {Algorithm of Solutions for Solving Generalized Mixed Implicit Equilibrium
                  Problems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {381--388},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.381-388},
  doi          = {10.4304/JNW.8.2.381-388},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangL13a,
  author       = {Jingmin Wang and
                  Yanmei Li},
  title        = {Research on {EPC} Project Risk Evaluation based on {FAHP} and {TOPSIS}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {445--452},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.445-452},
  doi          = {10.4304/JNW.8.2.445-452},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangL13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangLTM13,
  author       = {Wei Wang and
                  Ying Li and
                  Hui Tao and
                  Xiao{-}Ping Ma},
  title        = {Determining Reconstruction Variables and Parameters on Improved Multi-Objective
                  Immune Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2829--2838},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2829-2838},
  doi          = {10.4304/JNW.8.12.2829-2838},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangLTM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangM13,
  author       = {Ying Wang and
                  Dianfu Ma},
  title        = {An Automatic Development Process for Integrated Modular Avionics Software},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1088--1095},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1088-1095},
  doi          = {10.4304/JNW.8.5.1088-1095},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMJ13,
  author       = {Dejun Wang and
                  Bo Meng and
                  Shaomin Jin},
  title        = {Improved Clustered Routing Algorithm Based on Distance and Energy
                  in Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2922--2926},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2922-2926},
  doi          = {10.4304/JNW.8.12.2922-2926},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangMJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMZZ13,
  author       = {Ding Wang and
                  Chunguang Ma and
                  Qi{-}Ming Zhang and
                  Sendong Zhao},
  title        = {Secure Password-based Remote User Authentication Scheme Against Smart
                  Card Security Breach},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {148--155},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.148-155},
  doi          = {10.4304/JNW.8.1.148-155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangMZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangPLWC13,
  author       = {Li Wang and
                  Yanyan Pei and
                  Biao Lian and
                  Weili Wu and
                  Xueqi Cheng},
  title        = {A Routing Protocol based on Temporal-awareness Ordered-MPR for Dynamic
                  Wireless Multi-hop Mobile Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {985--990},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.985-990},
  doi          = {10.4304/JNW.8.5.985-990},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangPLWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangS13,
  author       = {Yulong Wang and
                  Jiakun Shen},
  title        = {CloudProxy: {A} {NAPT} Proxy for Vulnerability Scanners based on Cloud
                  Computing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {607--615},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.607-615},
  doi          = {10.4304/JNW.8.3.607-615},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangSL13,
  author       = {Dan Wang and
                  Weiping Shi and
                  Xiaowen Li},
  title        = {Low-Complexity Carrier Frequency Offset Estimation Algorithm in {TD-LTE}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2220--2226},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2220-2226},
  doi          = {10.4304/JNW.8.10.2220-2226},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWT13,
  author       = {Zhengcai Wang and
                  Xiaofeng Wang and
                  Zhengyi Tang},
  title        = {Analysis and Improvement of {AC-BM} Algorithm in Intrusion Detection
                  System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1191--1196},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1191-1196},
  doi          = {10.4304/JNW.8.5.1191-1196},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWW13,
  author       = {Yulong Wang and
                  Dong Wang and
                  Lei Wang},
  title        = {A Parsing Mode based Method for Malformed {SIP} Messages Testing for
                  {IMS} Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {812--821},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.812-821},
  doi          = {10.4304/JNW.8.4.812-821},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWW13a,
  author       = {Lixin Wang and
                  Lianggang Wu and
                  Kelly Wang},
  title        = {Customer Recognition of Network Finance Based on {MKL} Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2452--2458},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2452-2458},
  doi          = {10.4304/JNW.8.10.2452-2458},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangWW13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYN13,
  author       = {Jian{-}Hua Wang and
                  Yan Yu and
                  Madukasi Charles Nnaemeka},
  title        = {Data Storage Algorithms Based on Clustering in Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1796--1802},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1796-1802},
  doi          = {10.4304/JNW.8.8.1796-1802},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangYN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYN13a,
  author       = {Jian{-}Hua Wang and
                  Yan Yu and
                  Madukasi Charles Nnaemeka},
  title        = {A High Throughput {MAC} Protocol for Wireless Sensor Networks in Surveillance
                  Applications},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2005--2012},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2005-2012},
  doi          = {10.4304/JNW.8.9.2005-2012},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangYN13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ13,
  author       = {Xinyan Wang and
                  Ruixin Zhang},
  title        = {Parallel Processing for Large-scale Fault Tree in Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1160--1167},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1160-1167},
  doi          = {10.4304/JNW.8.5.1160-1167},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZJ13,
  author       = {Qiu{-}Yan Wang and
                  Bin Zhang and
                  Chen{-}Hui Jin},
  title        = {Practical Security against Differential and Linear Cryptanalysis for
                  SMS4-like Cipher},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1689--1693},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1689-1693},
  doi          = {10.4304/JNW.8.8.1689-1693},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZLWY13,
  author       = {Lifang Wang and
                  Shuhai Zhang and
                  Yurong Li and
                  Ruijuan Wu and
                  Yi Yu},
  title        = {An Attribute-weighted Clustering Intrusion Detection Method},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1278--1284},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1278-1284},
  doi          = {10.4304/JNW.8.6.1278-1284},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZLWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZQ13,
  author       = {Jianjian Wang and
                  Rongbo Zhu and
                  Chenliang Qian},
  title        = {Efficient Disengaging Hooks System Based on Constant-Power Speed Regulation
                  of Frequency Converter},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {755--760},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.755-760},
  doi          = {10.4304/JNW.8.4.755-760},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZWX13,
  author       = {Zhenwu Wang and
                  Xuejun Zhao and
                  Benting Wan and
                  Jun Xie},
  title        = {Research of {BP} Neural Network based on Improved Particle Swarm Optimization
                  Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {947--954},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.947-954},
  doi          = {10.4304/JNW.8.4.947-954},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZWXB13,
  author       = {Zhenwu Wang and
                  Xuejun Zhao and
                  Benting Wan and
                  Jun Xie and
                  Pengfei Bai},
  title        = {A Workflow-based {RBAC} Model for Web Services in Multiple Autonomous
                  Domains},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {723--730},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.723-730},
  doi          = {10.4304/JNW.8.3.723-730},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZWXB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wei-wuLKJ13,
  author       = {Weiwu Ren and
                  Liang Hu and
                  Kuo Zhao and
                  Jianfeng Chu},
  title        = {An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical
                  Clustering},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {672--679},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.672-679},
  doi          = {10.4304/JNW.8.3.672-679},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/Wei-wuLKJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WeiF13,
  author       = {Jia Wei and
                  Huajing Fang},
  title        = {State Feedback Consensus for Multi-Agent System with Multiple Time-Delays},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1960--1966},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1960-1966},
  doi          = {10.4304/JNW.8.9.1960-1966},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WeiF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WeiZ13,
  author       = {Li Wei and
                  Chunjian Zhao},
  title        = {An Optimized and Improved Network Trust Model Based on {P2P}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2293--2301},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2293-2301},
  doi          = {10.4304/JNW.8.10.2293-2301},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WeiZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wu13,
  author       = {Dafei Wu},
  title        = {Research on Patient Privacy Protection for Medical Data in Cloud Computing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2678--2684},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2678-2684},
  doi          = {10.4304/JNW.8.11.2678-2684},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Wu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuL13,
  author       = {Shuyan Wu and
                  Kelin Lv},
  title        = {Research on the Content Networking Sensor},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1589--1594},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1589-1594},
  doi          = {10.4304/JNW.8.7.1589-1594},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuLL13,
  author       = {Wen{-}Tie Wu and
                  Min Li and
                  Bo Liu},
  title        = {Intrusion Detection Scheme based on {IPSO-RBF}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2269--2276},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2269-2276},
  doi          = {10.4304/JNW.8.10.2269-2276},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuTWC13,
  author       = {Qingshuang Wu and
                  Chunya Tong and
                  Qiang Wang and
                  Xiangfu Cheng},
  title        = {All-pairs Shortest Path Algorithm based on {MPI+CUDA} Distributed
                  Parallel Programming Model},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2797--2803},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2797-2803},
  doi          = {10.4304/JNW.8.12.2797-2803},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuTWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuWC13,
  author       = {Guifeng Wu and
                  Xuan Wang and
                  Donglei Chen},
  title        = {Based on Low-power Wireless Sensor Network Node Data Storage Method},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2736--2742},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2736-2742},
  doi          = {10.4304/JNW.8.12.2736-2742},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuZSN13,
  author       = {Zhenguo Wu and
                  Rongbo Zhu and
                  Yongli Sun and
                  Qiufen Ni},
  title        = {Routing Protocol Design and Performance Optimization in Cognitive
                  Radio Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2406--2413},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2406-2413},
  doi          = {10.4304/JNW.8.10.2406-2413},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuZSN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuZX13,
  author       = {Zhizhong Wu and
                  Xuehai Zhou and
                  Jun Xu},
  title        = {A Result Fusion based Distributed Anomaly Detection System for Android
                  Smartphones},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {273--282},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.273-282},
  doi          = {10.4304/JNW.8.2.273-282},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuZX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaWRJ13,
  author       = {Kaijian Xia and
                  Yue Wu and
                  Xiaogang Ren and
                  Yong Jin},
  title        = {Research in Clustering Algorithm for Diseases Analysis},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1632--1639},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1632-1639},
  doi          = {10.4304/JNW.8.7.1632-1639},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiaWRJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoZZW13,
  author       = {Chunjing Xiao and
                  Yuhong Zhang and
                  Xue Zeng and
                  Yue Wu},
  title        = {Predicting User Influence in Social Media},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2649--2655},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2649-2655},
  doi          = {10.4304/JNW.8.11.2649-2655},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiaoZZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xiaolan13,
  author       = {He Xiaolan},
  title        = {Prediction Model of Network Information Dissemination},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1112--1120},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1112-1120},
  doi          = {10.4304/JNW.8.5.1112-1120},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Xiaolan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XieL13,
  author       = {Jianli Xie and
                  Cuiran Li},
  title        = {Hybrid Weighted-based Clustering Routing Protocol for Railway Communications},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2849--2856},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2849-2856},
  doi          = {10.4304/JNW.8.12.2849-2856},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XieL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XingXL13,
  author       = {Kexin Xing and
                  Qi Xu and
                  Yegui Lin},
  title        = {Identification Scheme of Surface Electromyography of Upper Limb Movement},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {895--902},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.895-902},
  doi          = {10.4304/JNW.8.4.895-902},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XingXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongG13,
  author       = {Lu Xiong and
                  Shen{-}guang Gong},
  title        = {Reliability Allocation of Underwater Experiment System Based on Particle
                  Swarm Optimization},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1292--1299},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1292-1299},
  doi          = {10.4304/JNW.8.6.1292-1299},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongJ13,
  author       = {Wen Xiong and
                  Yaohong Jin},
  title        = {Semantic {MMT} Model Based on Hierarchical Network of Concepts in
                  Chinese-English {MT}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {237--244},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.237-244},
  doi          = {10.4304/JNW.8.1.237-244},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xu13,
  author       = {Bao Xu},
  title        = {Time Synchronization for Heterogeneous WSNs Based on Cluster},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2915--2921},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2915-2921},
  doi          = {10.4304/JNW.8.12.2915-2921},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Xu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuBF13,
  author       = {Huafeng Xu and
                  Yongli Bai and
                  Zhigeng Fang},
  title        = {Solution of Grey Chance Constrained Programming and Convexity of its
                  Feasible Set},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1601--1608},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1601-1608},
  doi          = {10.4304/JNW.8.7.1601-1608},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuGXZ13,
  author       = {Shouzhi Xu and
                  Pengfei Guo and
                  Bo Xu and
                  Huan Zhou},
  title        = {QoS Evaluation of {VANET} Routing Protocols},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {132--139},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.132-139},
  doi          = {10.4304/JNW.8.1.132-139},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuGXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuHL13,
  author       = {Yuanping Xu and
                  Jian Huang and
                  Jun Lu},
  title        = {A Categorical Knowledge Management Software Platform for Advanced
                  Areal Surface Texture Specification and Verification},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1395--1402},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1395-1402},
  doi          = {10.4304/JNW.8.6.1395-1402},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuTWT13,
  author       = {Yang Xu and
                  Ruochen Tan and
                  Shuai Wu and
                  Qilin Tang},
  title        = {Connect Internet with Sensors by 6LoWPAN},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1480--1487},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1480-1487},
  doi          = {10.4304/JNW.8.7.1480-1487},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuTWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuY13,
  author       = {Wen{-}jie Xu and
                  Jin Yao},
  title        = {Integrated Quality Diagnosis Algorithm Method based on Neural Network
                  and Sensitivity Analysis to Input Parameters},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1307--1314},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1307-1314},
  doi          = {10.4304/JNW.8.6.1307-1314},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuYL13,
  author       = {Dayu Xu and
                  Shanlin Yang and
                  He Luo},
  title        = {A Fusion Model for {CPU} Load Prediction in Cloud Computing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2506--2511},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2506-2511},
  doi          = {10.4304/JNW.8.11.2506-2511},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuZM13,
  author       = {Zhe Xu and
                  Ping Zhu and
                  Jie Mei},
  title        = {Notice of Violation of Academy Publisher Publication Principles "Research
                  on Backward Cloud Model with Uncertainty"},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2556--2563},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2556-2563},
  doi          = {10.4304/JNW.8.11.2556-2563},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuZT13,
  author       = {Bin Xu and
                  Li{-}Hui Zhang and
                  Xiao{-}Pin Tan},
  title        = {Research of {RFID} Certification Security Protocol based on Hash Function
                  and {DES} Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2368--2375},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2368-2375},
  doi          = {10.4304/JNW.8.10.2368-2375},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Xue13,
  author       = {Wu Xue},
  title        = {Study on Digital Image Scrambling Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1673--1679},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1673-1679},
  doi          = {10.4304/JNW.8.7.1673-1679},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Xue13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XueZYWL13,
  author       = {Jianbin Xue and
                  Ting Zhang and
                  Yan Yan and
                  Wenhua Wang and
                  Songbai Li},
  title        = {Cooperation-based Ant Colony Algorithm in {WSN}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {939--946},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.939-946},
  doi          = {10.4304/JNW.8.4.939-946},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XueZYWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanF13,
  author       = {Jinghua Yan and
                  Xiaohui Fan},
  title        = {{HFBP:} Identifying {P2P} Traffic by Host Level and Flow Level Behavior
                  Profiles},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1866--1873},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1866-1873},
  doi          = {10.4304/JNW.8.8.1866-1873},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YanF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanZ13,
  author       = {Xia Yan and
                  Hua Zhao},
  title        = {Chinese Microblog Topic Detection Based on the Latent Semantic Analysis
                  and Structural Property},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {917--923},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.917-923},
  doi          = {10.4304/JNW.8.4.917-923},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YanZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Yang13,
  author       = {Chaoyu Yang},
  title        = {{LDH} Control Algorithm in Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1617--1623},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1617-1623},
  doi          = {10.4304/JNW.8.7.1617-1623},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Yang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangQZ13,
  author       = {Peng Yang and
                  Jin Qin and
                  Wenliang Zhou},
  title        = {Multi-Commodity Flow and Multi-Period Equilibrium Model of Supply
                  Chain Network with Postponement Strategy},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {389--396},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.389-396},
  doi          = {10.4304/JNW.8.2.389-396},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangQZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangSJL13,
  author       = {Yang Yang and
                  Biaobiao Shi and
                  Bo Jiang and
                  Xiang Long},
  title        = {Data-Replicas Scheduler for Heterogeneous MapReduce Cluster},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1096--1103},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1096-1103},
  doi          = {10.4304/JNW.8.5.1096-1103},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangSJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangTZ13,
  author       = {Juqiong Yang and
                  Chu{-}Ho Ting and
                  Xudong Zhang},
  title        = {{\(\lnot\)}Network Traffic Prediction Using the Combination of Chaos
                  Theory and Simple-MKL},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1750--1756},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1750-1756},
  doi          = {10.4304/JNW.8.8.1750-1756},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/YangTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWL13,
  author       = {Zhongzhen Yang and
                  Jinlin Wang and
                  Jun Lin},
  title        = {Utility-Based Online Bandwidth Allocation for Bonded Channels},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2436--2443},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2436-2443},
  doi          = {10.4304/JNW.8.10.2436-2443},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWLY13,
  author       = {Jin Yang and
                  Cilin Wang and
                  Caiming Liu and
                  Le Yu},
  title        = {Cloud Computing for Network Security Intrusion Detection System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {140--147},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.140-147},
  doi          = {10.4304/JNW.8.1.140-147},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangWLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWQS13,
  author       = {Jie Yang and
                  Li Wan and
                  Changqing Qu and
                  John Savaria},
  title        = {A New Load-balancing Algorithm in Wireless Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1781--1787},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1781-1787},
  doi          = {10.4304/JNW.8.8.1781-1787},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangWQS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWZ13,
  author       = {Hongyu Yang and
                  Sen Wang and
                  Yang Zhang},
  title        = {Web Service Replacement Algorithm based on Complex Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {829--835},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.829-835},
  doi          = {10.4304/JNW.8.4.829-835},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangXWL13,
  author       = {Dingcheng Yang and
                  Lin Xiao and
                  Fei Wang and
                  An Li},
  title        = {A Multi-Cell Coordinated Scheduling Algorithm Based on Delta-CQI for
                  CoMP Network Systems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2121--2127},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2121-2127},
  doi          = {10.4304/JNW.8.9.2121-2127},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangXWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangXZ13,
  author       = {Guangsong Yang and
                  Mingbo Xiao and
                  Shuqin Zhang},
  title        = {Data Aggregation Scheme based on Compressed Sensing in Wireless Sensor
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {197--204},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.197-204},
  doi          = {10.4304/JNW.8.1.197-204},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangZ13,
  author       = {Yifei Yang and
                  Huangqiu Zhu},
  title        = {Optimal Control and H{\(\infty\)} Output Feedback Design Options for
                  Active Magnetic Bearing Spindle Position Regulation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1624--1631},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1624-1631},
  doi          = {10.4304/JNW.8.7.1624-1631},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoG13,
  author       = {Junge Yao and
                  Ming Gu},
  title        = {Conceptology: Using Concept Map for Knowledge Representation and Ontology
                  Construction},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1708--1712},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1708-1712},
  doi          = {10.4304/JNW.8.8.1708-1712},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YaoG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoPSL13,
  author       = {Chunlong Yao and
                  Wei Pan and
                  Lan Shen and
                  Xu Li},
  title        = {Research of Multi-sensor Images Based on Color Fusion Methods},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2635--2641},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2635-2641},
  doi          = {10.4304/JNW.8.11.2635-2641},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YaoPSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoYH13,
  author       = {Guoxiang Yao and
                  Saizhi Ye and
                  Caiting Huang},
  title        = {A Key Management Algorithm Based on Two-tier Architecture in Wireless
                  Ad Hoc Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1241--1247},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1241-1247},
  doi          = {10.4304/JNW.8.6.1241-1247},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YaoYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoYLF13,
  author       = {Chunlong Yao and
                  Fengjiao Yin and
                  Xu Li and
                  Fenglong Fan},
  title        = {Security Analysis of {PHP} Encoder},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2353--2360},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2353-2360},
  doi          = {10.4304/JNW.8.10.2353-2360},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YaoYLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YinYT13,
  author       = {Xiangdong Yin and
                  Jie Yang and
                  Andreas Tiee{-}Girl},
  title        = {Optimal Energy Routing Protocol Algorithm in Wireless Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2783--2790},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2783-2790},
  doi          = {10.4304/JNW.8.12.2783-2790},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YinYT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YinYXZLL13,
  author       = {Yong Yin and
                  Tao Yuan and
                  Yu Xiao and
                  Chaoyong Zhang and
                  Ping Lou and
                  Yu Li},
  title        = {An Improved Search Strategy for Even Degree Distribution Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1558--1565},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1558-1565},
  doi          = {10.4304/JNW.8.7.1558-1565},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YinYXZLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Yu13,
  author       = {Xiehua Yu},
  title        = {Security Key Management Scheme in Heterogeneous Wireless Sensor Networks
                  Based on Clustering Strategy},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2114--2120},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2114-2120},
  doi          = {10.4304/JNW.8.9.2114-2120},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Yu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuC13,
  author       = {Yang Yu and
                  Xiaomin Chen},
  title        = {Research on Custody Transfer Service in Delay Tolerant Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1713--1719},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1713-1719},
  doi          = {10.4304/JNW.8.8.1713-1719},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuLS13,
  author       = {Shuijuan Yu and
                  Zhenbi Li and
                  Xia Sun},
  title        = {Design of Adaptive Grid Type Filter Based on {FPGA}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2150--2154},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2150-2154},
  doi          = {10.4304/JNW.8.9.2150-2154},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuWH13,
  author       = {Zuwei Yu and
                  Gan Wang and
                  Hongwei Hu},
  title        = {Intertemporal Dynamics: Convergence Speed of Current Account across
                  Countries},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {501--506},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.501-506},
  doi          = {10.4304/JNW.8.2.501-506},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuZP13,
  author       = {Tingfang Yu and
                  Hongzhen Zhu and
                  Chunhua Peng},
  title        = {Multi-objective Optimization of Coal-fired Boiler Combustion Based
                  on {NSGA-II}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1300--1306},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1300-1306},
  doi          = {10.4304/JNW.8.6.1300-1306},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/YuZP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaL13,
  author       = {Song Zha and
                  Peiguo Liu},
  title        = {An Efficient Non-sparsity Protection Scheme for Collaborative Compressed
                  Spectrum Sensing},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1694--1699},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1694-1699},
  doi          = {10.4304/JNW.8.8.1694-1699},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaiLD13,
  author       = {Jiangtao Zhai and
                  Guangjie Liu and
                  Yuewei Dai},
  title        = {An Improved Retransmission-based Network Steganography: Design and
                  Detection},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {182--188},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.182-188},
  doi          = {10.4304/JNW.8.1.182-188},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaiLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang13,
  author       = {Qunhui Zhang},
  title        = {Online Network Traffic Classification Algorithm Based on {RVM}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1364--1369},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1364-1369},
  doi          = {10.4304/JNW.8.6.1364-1369},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang13a,
  author       = {Zhaoyin Zhang},
  title        = {Neural Network Control Optimization based on Improved Genetic Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1831--1837},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1831-1837},
  doi          = {10.4304/JNW.8.8.1831-1837},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhang13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang13b,
  author       = {Hui Zhang},
  title        = {A Scheme of Certificateless Multilevel Proxy Digital Signature in
                  Electronic Commerce},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2548--2555},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2548-2555},
  doi          = {10.4304/JNW.8.11.2548-2555},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhang13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangCL13,
  author       = {Xin Zhang and
                  Meng Cai and
                  Jia Liu},
  title        = {Fast Approximate Matching Algorithm for Phone-based Keyword Spotting},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2227--2233},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2227-2233},
  doi          = {10.4304/JNW.8.10.2227-2233},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangG13,
  author       = {Yong Zhang and
                  Lin Guo},
  title        = {Network Percolation Based on Complex Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1874--1881},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1874-1881},
  doi          = {10.4304/JNW.8.8.1874-1881},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangHSXMZ13,
  author       = {Xiaolu Zhang and
                  Liang Hu and
                  Shinan Song and
                  Zhenzhen Xie and
                  Xiangyu Meng and
                  Kuo Zhao},
  title        = {An Intelligent Analysis Model for Multisource Volatile Memory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1943--1949},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1943-1949},
  doi          = {10.4304/JNW.8.9.1943-1949},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangHSXMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangHSXMZ13a,
  author       = {Xiaolu Zhang and
                  Liang Hu and
                  Shinan Song and
                  Zhenzhen Xie and
                  Xiangyu Meng and
                  Kuo Zhao},
  title        = {An Intelligent Analysis Model for Multisource Volatile Memory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2699--2705},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2699-2705},
  doi          = {10.4304/JNW.8.11.2699-2705},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangHSXMZ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangML13,
  author       = {Yan Zhang and
                  Wenxing Ma and
                  Xuesong Li},
  title        = {Shift Control System of Heavy-duty Vehicle Automatic Transmission},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2948--2955},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2948-2955},
  doi          = {10.4304/JNW.8.12.2948-2955},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangQT13,
  author       = {Yu Zhang and
                  Meixing Qi and
                  Min{-}Ming Tong},
  title        = {Composite Taste Recognition Method Based on Fuzzy Neural Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2021--2028},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2021-2028},
  doi          = {10.4304/JNW.8.9.2021-2028},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangQT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangS13,
  author       = {Yuan Zhang and
                  Qing{-}wei Shen},
  title        = {Data Flow Control Algorithm based on Feature Matching in Mobile {P2P}
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1146--1152},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1146-1152},
  doi          = {10.4304/JNW.8.5.1146-1152},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSL13,
  author       = {Junli Zhang and
                  Limin Song and
                  Linhao Li},
  title        = {Research on Object-oriented Software Testing Cases of Automatic Generation},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2627--2634},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2627-2634},
  doi          = {10.4304/JNW.8.11.2627-2634},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSLWW13,
  author       = {Hao Zhang and
                  Wei Shi and
                  Tingting Lu and
                  Jingjing Wang and
                  Xinjie Wang},
  title        = {Performance Analysis of Multiple Access 60 GHz System Using Frequency-shifted
                  Gaussian Pulse and Non-carrier {PSWF} Pulse},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {761--768},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.761-768},
  doi          = {10.4304/JNW.8.4.761-768},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangSLWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSST13,
  author       = {Weiping Zhang and
                  Regina Stoll and
                  Norbert Stoll and
                  Kerstin Thurow},
  title        = {An mHealth Monitoring System for Telemedicine Based on WebSocket Wireless
                  Communication},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {955--962},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.955-962},
  doi          = {10.4304/JNW.8.4.955-962},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangSZZ13,
  author       = {Yinghui Zhang and
                  Muhammad Saeed and
                  Tiankui Zhang and
                  Zhimin Zeng},
  title        = {Tensor-Based Channel Estimation for Cooperative Diversity Scheme in
                  the Presence of Timing and Frequency Offsets},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2057--2062},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2057-2062},
  doi          = {10.4304/JNW.8.9.2057-2062},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangSZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangT13,
  author       = {Yiqing Zhang and
                  Jianwei Tan},
  title        = {Improved MDS-based Sensor Localization Algorithm in Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2085--2092},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2085-2092},
  doi          = {10.4304/JNW.8.9.2085-2092},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangW13,
  author       = {Xiaoyong Zhang and
                  Huafeng Wu},
  title        = {Mixed Hermite-Legendre Spectral Method},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2839--2848},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2839-2848},
  doi          = {10.4304/JNW.8.12.2839-2848},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangWGSW13,
  author       = {Hao Zhang and
                  Xinjie Wang and
                  T. Aaron Gulliver and
                  Wei Shi and
                  Jingjing Wang},
  title        = {Performance of Incremental {AF} Relaying Cooperative Networks with
                  the nth Best Relay over Rayleigh Fading Channels},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1681--1688},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1681-1688},
  doi          = {10.4304/JNW.8.8.1681-1688},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangWGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangWW13,
  author       = {Zhiying Zhang and
                  Peng Wang and
                  Weize Wang},
  title        = {Optimization and Operation Scheduling for a Steel Plate yard Based
                  on Greedy Algorithm},
  journal      = {J. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1654--1659},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.7.1654-1659},
  doi          = {10.4304/JNW.8.7.1654-1659},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangXJ13,
  author       = {Hannv Zhang and
                  Jiang Xu and
                  Qigang Jiang},
  title        = {Extraction and Network Sharing of Forest Vegetation Information based
                  on {SVM}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1043--1049},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1043-1049},
  doi          = {10.4304/JNW.8.5.1043-1049},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangXJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangXL13,
  author       = {Pengyi Zhang and
                  Jiannan Xia and
                  Ruiji Li},
  title        = {Personalized Multimedia Information Retrieval based on User Profile
                  Mining},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2340--2346},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2340-2346},
  doi          = {10.4304/JNW.8.10.2340-2346},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ13,
  author       = {Li Guo Zhang and
                  Hua Zuo},
  title        = {Pareto Optimal Solution Analysis of Convex Multi-Objective Programming
                  Problem},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {437--444},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.437-444},
  doi          = {10.4304/JNW.8.2.437-444},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ13a,
  author       = {Cui{-}fang Zhang and
                  Gui{-}Gen Zeng},
  title        = {A novel {HARQ} Scheme based on Frequency Diversity and Energy-MRC},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2671--2677},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2671-2677},
  doi          = {10.4304/JNW.8.11.2671-2677},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ13b,
  author       = {Shanliang Zhang and
                  Lihua Zhu},
  title        = {A Packet Classification Algorithm based on Improved Decision Tree},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2864--2871},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2864-2871},
  doi          = {10.4304/JNW.8.12.2864-2871},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZ13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZW13,
  author       = {Luqiao Zhang and
                  Qinxin Zhu and
                  Juan Wang},
  title        = {Adaptive Clustering for Maximizing Network Lifetime and Maintaining
                  Coverage},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {616--622},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.616-622},
  doi          = {10.4304/JNW.8.3.616-622},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhao13,
  author       = {Zhonghua Zhao},
  title        = {Clustering Algorithm in Data Mining Based on Web Log},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2392--2399},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2392-2399},
  doi          = {10.4304/JNW.8.10.2392-2399},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhao13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhao13a,
  author       = {Kai Zhao},
  title        = {Multiple-Agent Task Allocation Algorithm Utilizing Ant Colony Optimization},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2599--2606},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2599-2606},
  doi          = {10.4304/JNW.8.11.2599-2606},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhao13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoHHJ13,
  author       = {Liang Zhao and
                  Liyuan He and
                  Wong Harry and
                  Xing Jin},
  title        = {Intelligent Agricultural Forecasting System Based on Wireless Sensor},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1817--1824},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1817-1824},
  doi          = {10.4304/JNW.8.8.1817-1824},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoHHJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoHSZ13,
  author       = {Weifeng Zhao and
                  Xin Huang and
                  Kai Shi and
                  Lei Zhang},
  title        = {{TSBCC:} Time Series-Based Congestion Control Algorithm for Wireless
                  Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1058--1064},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1058-1064},
  doi          = {10.4304/JNW.8.5.1058-1064},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoHSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoLC13,
  author       = {Feng Zhao and
                  Xuezhi Lv and
                  Hongbin Chen},
  title        = {A Leakage-Based Beamforming Algorithm for Cognitive {MIMO} Systems
                  via Game Theory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {623--627},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.623-627},
  doi          = {10.4304/JNW.8.3.623-627},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoLYYW13,
  author       = {Ming Zhao and
                  Tao Luo and
                  Changchuan Yin and
                  Guangxin Yue and
                  Xiaojun Wang},
  title        = {Dynamic Spectrum Management with Competitive Market Equilibrium},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {283--289},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.283-289},
  doi          = {10.4304/JNW.8.2.283-289},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoLYYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoQL13,
  author       = {Tong Zhao and
                  Bingbing Qian and
                  Yimin Li},
  title        = {Hybrid Adaptive Fuzzy Control Based on the Biological Adaptation Strategies},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2255--2262},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2255-2262},
  doi          = {10.4304/JNW.8.10.2255-2262},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoQL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoSS13,
  author       = {Ran Zhao and
                  Kirusnapillai Selvarajah and
                  Neil A. Speirs},
  title        = {Development Tools for Context Aware and Secure Pervasive Computing
                  in Embedded Systems {(PECES)} Middleware},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {59--70},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.59-70},
  doi          = {10.4304/JNW.8.1.59-70},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoTZL13,
  author       = {Shupeng Zhao and
                  Miao Tian and
                  Shifang Zhang and
                  Jiuxi Li},
  title        = {Control Information and Data Processing of Vehicle based on Global
                  Position System},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1175--1182},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1175-1182},
  doi          = {10.4304/JNW.8.5.1175-1182},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoTZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoTZL13a,
  author       = {Shupeng Zhao and
                  Miao Tian and
                  Shifang Zhang and
                  Jiuxi Li},
  title        = {Information Processing of Chassis Dynamometer based on Controller
                  Area Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1343--1349},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1343-1349},
  doi          = {10.4304/JNW.8.6.1343-1349},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoTZL13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoTZLDW13,
  author       = {Shupeng Zhao and
                  Miao Tian and
                  Shifang Zhang and
                  Jiuxi Li and
                  Lijuan Du and
                  Ye Wang},
  title        = {Data Process of Diagnose Expert System based on Neural Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2878--2884},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2878-2884},
  doi          = {10.4304/JNW.8.12.2878-2884},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoTZLDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoXG13,
  author       = {Shuanfeng Zhao and
                  Guanghua Xu and
                  Wei Guo},
  title        = {Parallel Diagnosis Model of Fatigue Driving Based on Vehicle Running
                  Status},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2585--2591},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2585-2591},
  doi          = {10.4304/JNW.8.11.2585-2591},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoXG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoZL13,
  author       = {Liang Zhao and
                  Jili Zhang and
                  Ruobing Liang},
  title        = {Remote Ethernet Data Transmission System based on Hardware Protocol
                  Stack Chip},
  journal      = {J. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1285--1291},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.6.1285-1291},
  doi          = {10.4304/JNW.8.6.1285-1291},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoZWY13,
  author       = {Min Zhao and
                  Tao Zhang and
                  Jinshuang Wang and
                  Zhijian Yuan},
  title        = {A Smartphone Malware Detection Framework Based on Artificial Immunology},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {469--476},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.469-476},
  doi          = {10.4304/JNW.8.2.469-476},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoZWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zheng13,
  author       = {Bi{-}geng Zheng},
  title        = {Research on Fiber Optic Sensor based on Fuzzy Control Theory},
  journal      = {J. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1882--1889},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.8.1882-1889},
  doi          = {10.4304/JNW.8.8.1882-1889},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zheng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengFZZ13,
  author       = {Xufei Zheng and
                  Yonghui Fang and
                  Yanhui Zhou and
                  Jing Zhang},
  title        = {A Novel Multi-layered Immune Network Intrusion Detection Defense Model:
                  {MINID}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {3},
  pages        = {636--644},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.3.636-644},
  doi          = {10.4304/JNW.8.3.636-644},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhengFZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengLZH13,
  author       = {Yanhua Zheng and
                  Gaoyong Luo and
                  Bingzhi Zhang and
                  Yongling He},
  title        = {Research on Power Line as Communication Channel with Multi-Tap and
                  Multi-Branch Configuration},
  journal      = {J. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2776--2782},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.12.2776-2782},
  doi          = {10.4304/JNW.8.12.2776-2782},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhengLZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouLW13,
  author       = {Luping Zhou and
                  Bingrong Li and
                  Fucai Wang},
  title        = {Particle Swarm Optimization Model of Distributed Network Planning},
  journal      = {J. Networks},
  volume       = {8},
  number       = {10},
  pages        = {2263--2268},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.10.2263-2268},
  doi          = {10.4304/JNW.8.10.2263-2268},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouS13,
  author       = {Guangping Zhou and
                  Anup Shrestha},
  title        = {Efficient Intrusion Detection Scheme based on {SVM}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2128--2134},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2128-2134},
  doi          = {10.4304/JNW.8.9.2128-2134},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouXGC13,
  author       = {Junping Zhou and
                  Jingming Xia and
                  Yixian Ge and
                  Eric Chernoff},
  title        = {Internal and External Optical Feedback Effect in Fiber Linear Lasers},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1990--1996},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.1990-1996},
  doi          = {10.4304/JNW.8.9.1990-1996},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouXGC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouXL13,
  author       = {Xiancun Zhou and
                  Yan Xiong and
                  Mingxi Li},
  title        = {Detection System of Clone Attacks based on {RSSI} in Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {8},
  number       = {1},
  pages        = {221--228},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.1.221-228},
  doi          = {10.4304/JNW.8.1.221-228},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhu13,
  author       = {Haijing Zhu},
  title        = {Estimates of Weighted Hardy-Littlewood Inequality for Differential
                  Forms},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {429--436},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.429-436},
  doi          = {10.4304/JNW.8.2.429-436},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuFZ13,
  author       = {Ying Zhu and
                  Zhiyong Feng and
                  Ping Zhang},
  title        = {Analysis of Improved Cyclostationary Detector with Multiple Antennas
                  over Fading Channels},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2459--2466},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2459-2466},
  doi          = {10.4304/JNW.8.11.2459-2466},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuFZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuHCL13,
  author       = {Jun Zhu and
                  Lili Han and
                  Likuan Chang and
                  Yongbiao Li},
  title        = {Vector Control Based on {SVPWM} for {ACIM}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1204--1211},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1204-1211},
  doi          = {10.4304/JNW.8.5.1204-1211},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuHCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuLH13,
  author       = {Jun Zhu and
                  Wankui Li and
                  Lili Han},
  title        = {{PMSM} Control System Based on Digital Signal Processor},
  journal      = {J. Networks},
  volume       = {8},
  number       = {4},
  pages        = {924--931},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.4.924-931},
  doi          = {10.4304/JNW.8.4.924-931},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuZQ13,
  author       = {Yan Zhu and
                  Guanghua Zhang and
                  Jing Qiu},
  title        = {Network Traffic Prediction based on Particle Swarm {BP} Neural Network},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2685--2691},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2685-2691},
  doi          = {10.4304/JNW.8.11.2685-2691},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuZQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuangWWZ13,
  author       = {Yonglong Zhuang and
                  Xiaolan Weng and
                  Yuwu Wang and
                  Haiyang Zhuang},
  title        = {Improvement and Analysis of Encryption and Decryption Performance
                  in Cloud Document},
  journal      = {J. Networks},
  volume       = {8},
  number       = {9},
  pages        = {2071--2077},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.9.2071-2077},
  doi          = {10.4304/JNW.8.9.2071-2077},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuangWWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zou13,
  author       = {Pinghui Zou},
  title        = {A Novel Data Detection Method for Data Aggregation Security in {WSN}},
  journal      = {J. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2607--2613},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.11.2607-2613},
  doi          = {10.4304/JNW.8.11.2607-2613},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zou13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZrelliOS13,
  author       = {Saber Zrelli and
                  Nobuo Okabe and
                  Yoichi Shinoda},
  title        = {{XKDCP:} An Inter-KDC Protocol for Dependable Kerberos Cross-Realm
                  Operations},
  journal      = {J. Networks},
  volume       = {8},
  number       = {2},
  pages        = {290--296},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.2.290-296},
  doi          = {10.4304/JNW.8.2.290-296},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZrelliOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZuoXW13,
  author       = {Zhengkang Zuo and
                  Jinyun Xue and
                  Changjing Wang},
  title        = {Constraint Verification of Generic Algorithmic Program for Solving
                  General Network Path Problems},
  journal      = {J. Networks},
  volume       = {8},
  number       = {5},
  pages        = {1050--1057},
  year         = {2013},
  url          = {https://doi.org/10.4304/jnw.8.5.1050-1057},
  doi          = {10.4304/JNW.8.5.1050-1057},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZuoXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics