default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca30.bht:"
@article{DBLP:journals/jnca/AbadehHL07, author = {Mohammad Saniee Abadeh and Jafar Habibi and Caro Lucas}, title = {Intrusion detection using a fuzzy genetics-based learning algorithm}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {414--428}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.05.002}, doi = {10.1016/J.JNCA.2005.05.002}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AbadehHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbidinCG07, author = {Siti Z. Z. Abidin and Min Chen and Phil W. Grant}, title = {Designing interaction protocols using noughts and crosses type games}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {586--613}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.01.002}, doi = {10.1016/J.JNCA.2006.01.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AbidinCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbrahamJTH07, author = {Ajith Abraham and Ravi Jain and Johnson P. Thomas and Sang{-}Yong Han}, title = {{D-SCIDS:} Distributed soft computing intrusion detection system}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {81--98}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.06.001}, doi = {10.1016/J.JNCA.2005.06.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AbrahamJTH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbrahamSJJ07, author = {Ajith Abraham and Kate A. Smith and Ravi Jain and Lakhmi C. Jain}, title = {Network and information security: {A} computational intelligence approach: Special Issue of Journal of Network and Computer Applications}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {1--3}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.06.004}, doi = {10.1016/J.JNCA.2005.06.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AbrahamSJJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Aguilar-PonceKTB07, author = {Ruth Aguilar{-}Ponce and Ashok Kumar and J. Luis Tecpanecatl{-}Xihuitl and Magdy A. Bayoumi}, title = {A network of sensor-based framework for automated visual surveillance}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1244--1271}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.011}, doi = {10.1016/J.JNCA.2006.04.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Aguilar-PonceKTB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhnMH07, author = {Gail{-}Joon Ahn and Badrinath Mohan and Seng{-}Phil Hong}, title = {Towards secure information sharing using role-based delegation}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {42--59}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.004}, doi = {10.1016/J.JNCA.2005.08.004}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AhnMH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Al-TalibAKS07, author = {Sahar A. Al{-}Talib and Borhanuddin Mohd Ali and Sabira Khatun and Subramaniam Shamala}, title = {Improving the multicast state scalability in internet routers by integrating hash algorithm with recursive unicast}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1445--1454}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.06.002}, doi = {10.1016/J.JNCA.2006.06.002}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Al-TalibAKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BaiI07, author = {Yan Bai and Mabo Robert Ito}, title = {A new technique for minimizing network loss from users' perspective}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {637--649}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.01.003}, doi = {10.1016/J.JNCA.2006.01.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BaiI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BollenNGA07, author = {Johan Bollen and Michael L. Nelson and Gary Geisler and Raquel Araujo}, title = {Usage derived recommendations for a video digital library}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1059--1083}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.009}, doi = {10.1016/J.JNCA.2005.12.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BollenNGA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BossardtDP07, author = {Matthias Bossardt and Thomas D{\"{u}}bendorfer and Bernhard Plattner}, title = {Enhanced Internet security by a distributed traffic control service based on traffic ownership}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {841--857}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.006}, doi = {10.1016/J.JNCA.2005.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BossardtDP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BourasKM07, author = {Christos Bouras and Giorgos Kounenis and Ioannis Misedakis}, title = {A web content manipulation technique based on page Fragmentation}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {563--585}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.01.005}, doi = {10.1016/J.JNCA.2006.01.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BourasKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CallaghanHMMM07, author = {Michael J. Callaghan and Jim Harkin and E. McColgan and T. Martin McGinnity and Liam P. Maguire}, title = {Client-server architecture for collaborative remote experimentation}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1295--1308}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.006}, doi = {10.1016/J.JNCA.2006.09.006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CallaghanHMMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CaoGYL07, author = {Jin Cao and Lei Guo and Hongfang Yu and Lemin Li}, title = {A novel recursive shared segment protection algorithm in survivable {WDM} networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {677--694}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.003}, doi = {10.1016/J.JNCA.2005.12.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CaoGYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChangLL07, author = {Chin{-}Chen Chang and Chih{-}Yang Lin and Keng{-}Chu Lin}, title = {Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {662--676}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.004}, doi = {10.1016/J.JNCA.2005.12.004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChangLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CharvillatG07, author = {Vincent Charvillat and Romulus Grigoras}, title = {Reinforcement learning for dynamic multimedia adaptation}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1034--1058}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.010}, doi = {10.1016/J.JNCA.2005.12.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CharvillatG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChenJHZR07, author = {Hongsong Chen and Zhenzhou Ji and Mingzeng Hu and Zhongchuan Fu and Ruixiang Jiang}, title = {Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for {AODV} routing protocol}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {145--166}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.09.006}, doi = {10.1016/J.JNCA.2005.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ChenJHZR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChenTD07, author = {Shigang Chen and Yong Tang and Wenliang Du}, title = {Stateful DDoS attacks and targeted filtering}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {823--840}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.007}, doi = {10.1016/J.JNCA.2005.07.007}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChenTD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChoongAPY07, author = {Khong Neng Choong and Borhanuddin Mohd Ali and Veeraraghavan Prakash and Yoke Chek Yee}, title = {The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {167--185}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.09.004}, doi = {10.1016/J.JNCA.2005.09.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChoongAPY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CranleyPM07, author = {Nicola Cranley and Philip Perry and Liam Murphy}, title = {Dynamic content-based adaptation of streamed multimedia}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {983--1006}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.006}, doi = {10.1016/J.JNCA.2005.12.006}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/CranleyPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DuysburghLTDD07, author = {Bart Duysburgh and Thijs Lambrecht and Filip De Turck and Bart Dhoedt and Piet Demeester}, title = {Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1428--1444}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.06.003}, doi = {10.1016/J.JNCA.2006.06.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DuysburghLTDD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/EstevePMM07, author = {Manuel Esteve and Carlos Enrique Palau and J. Mart{\'{\i}}nez{-}Nohales and Benjam{\'{\i}}n Molina}, title = {A video streaming application for urban traffic management}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {479--498}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.06.001}, doi = {10.1016/J.JNCA.2006.06.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/EstevePMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FilibeliOC07, author = {M. Can Filibeli and {\"{O}}znur {\"{O}}zkasap and M. Reha Civanlar}, title = {Embedded web server-based home appliance networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {499--514}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.001}, doi = {10.1016/J.JNCA.2006.04.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/FilibeliOC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GunesP07, author = {Hatice Gunes and Massimo Piccardi}, title = {Bi-modal emotion recognition from expressive face and body gestures}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1334--1345}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.007}, doi = {10.1016/J.JNCA.2006.09.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GunesP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuoCYL07, author = {Lei Guo and Jin Cao and Hongfang Yu and Lemin Li}, title = {A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in {WDM} optical networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {650--661}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.005}, doi = {10.1016/J.JNCA.2005.12.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuoCYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuoSWL07, author = {Hui Guo and Guobin Shen and Zhiguang Wang and Shipeng Li}, title = {Optimized streaming media proxy and its applications}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {265--281}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.008}, doi = {10.1016/J.JNCA.2005.08.008}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuoSWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuoYL07, author = {Lei Guo and Hongfang Yu and Lemin Li}, title = {Dynamic survivable algorithm for meshed {WDM} optical networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {282--295}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.006}, doi = {10.1016/J.JNCA.2005.08.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuoYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/He07, author = {Xiangjian He}, title = {Editorial}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1273--1274}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.001}, doi = {10.1016/J.JNCA.2006.09.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/He07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HeLL07, author = {Rongxi He and Bin Lin and Lemin Li}, title = {Dynamic service-level-agreement aware shared-path protection in {WDM} mesh networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {429--444}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.06.005}, doi = {10.1016/J.JNCA.2006.06.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HeLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JafarpourYB07, author = {Hojjat Jafarpour and Nasser Yazdani and Navid Bazzazzadeh}, title = {A scalable group communication mechanism for mobile agents}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {186--208}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.09.002}, doi = {10.1016/J.JNCA.2005.09.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JafarpourYB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JannachL07, author = {Dietmar Jannach and Klaus Leopold}, title = {Knowledge-based multimedia adaptation for ubiquitous multimedia consumption}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {958--982}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.007}, doi = {10.1016/J.JNCA.2005.12.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JannachL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiaZH07, author = {Wenjing Jia and Huaifeng Zhang and Xiangjian He}, title = {Region-based license plate detection}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1324--1333}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.010}, doi = {10.1016/J.JNCA.2006.09.010}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JiaZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KalogerakiZGD07, author = {Vana Kalogeraki and Demetrios Zeinalipour{-}Yazti and Dimitrios Gunopulos and Alex Delis}, title = {Distributed middleware architectures for scalable media services}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {209--243}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.09.001}, doi = {10.1016/J.JNCA.2005.09.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KalogerakiZGD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Kateeb07, author = {Ali El Kateeb}, title = {High-speed routers design using data stream distributor unit}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {133--144}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.09.005}, doi = {10.1016/J.JNCA.2005.09.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Kateeb07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KimD07, author = {Suneuy Kim and Chita R. Das}, title = {An analytical model for interval caching in interactive video servers}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {384--413}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.06.005}, doi = {10.1016/J.JNCA.2005.06.005}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KimD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LeeC07, author = {Jung{-}San Lee and Chin{-}Chen Chang}, title = {Secure communications for cluster-based ad hoc networks using node identities}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1377--1396}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.10.003}, doi = {10.1016/J.JNCA.2006.10.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LeeC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LeuCS07, author = {Jenq{-}Shiou Leu and Yuan{-}Po Chi and Wei{-}Kuan Shih}, title = {Design and implementation of Blog Rendering and Accessing INstantly system {(BRAINS)}}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {296--307}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.001}, doi = {10.1016/J.JNCA.2005.08.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LeuCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiYC07, author = {Celia Li and Cungang Yang and Richard Cheung}, title = {Key management for role hierarchy in distributed systems}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {920--936}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.009}, doi = {10.1016/J.JNCA.2005.07.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiangYM07, author = {Liang Wang and Yiping Guo and Ming Fang}, title = {Web search engine based on {DNS}}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {466--478}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.06.006}, doi = {10.1016/J.JNCA.2006.06.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiangYM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiaoVP07, author = {Yihua Liao and V. Rao Vemuri and Alejandro Pasos}, title = {Adaptive anomaly detection with evolving connectionist systems}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {60--80}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.005}, doi = {10.1016/J.JNCA.2005.08.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiaoVP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinWL07, author = {Rongping Lin and Sheng Wang and Lemin Li}, title = {Protections for multicast session in {WDM} optical networks under reliability constraints}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {695--705}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.002}, doi = {10.1016/J.JNCA.2005.12.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LuH07, author = {Tainchi Lu and Chinghao Hsu}, title = {Mobile agents for information retrieval in hybrid simulation environment}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {244--264}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.007}, doi = {10.1016/J.JNCA.2005.08.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LuH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MagoulasG07, author = {George D. Magoulas and George Ghinea}, title = {Intelligence-based adaptation for ubiquitous multimedia communications}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {955--957}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.01.001}, doi = {10.1016/J.JNCA.2006.01.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MagoulasG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MartinezLP07, author = {Christopher J. Martinez and Wei{-}Ming Lin and Parimal Patel}, title = {Optimal {XOR} hashing for non-uniformly distributed address lookup in computer networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1397--1427}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.10.002}, doi = {10.1016/J.JNCA.2006.10.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MartinezLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/McGregorKT07, author = {Carolyn McGregor and Bruce Kneale and Mark B. Tracy}, title = {On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1309--1323}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.008}, doi = {10.1016/J.JNCA.2006.09.008}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/McGregorKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MillanRGJM07, author = {Gabriel L{\'{o}}pez Mill{\'{a}}n and {\'{O}}scar C{\'{a}}novas Reverte and Antonio Fernandez G{\'{o}}mez{-}Skarmeta and Jes{\'{u}}s D. Jim{\'{e}}nez Re and Rafael Mar{\'{\i}}n L{\'{o}}pez}, title = {A network access control approach based on the {AAA} architecture and authorization attributes}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {900--919}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.010}, doi = {10.1016/J.JNCA.2005.07.010}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MillanRGJM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MinK07, author = {Chan{-}Ho Min and Sehun Kim}, title = {On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {706--727}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.001}, doi = {10.1016/J.JNCA.2005.12.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MinK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MorrisonS07, author = {Donn Morrison and Liyanage C. De Silva}, title = {Voting ensembles for spoken affect classification}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1356--1365}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.005}, doi = {10.1016/J.JNCA.2006.09.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MorrisonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/OGradyOD07, author = {Michael J. O'Grady and Gregory M. P. O'Hare and C. Donaghey}, title = {Delivering adaptivity through context-awareness}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1007--1033}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.008}, doi = {10.1016/J.JNCA.2005.12.008}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/OGradyOD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/OuardaniPB07, author = {Abdelhamid Ouardani and Samuel Pierre and Hanifa Boucheneb}, title = {A security protocol for mobile agents based upon the cooperation of sedentary agents}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1228--1243}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.008}, doi = {10.1016/J.JNCA.2006.04.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/OuardaniPB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/OzcelikE07, author = {Ibrahim {\"{O}}z{\c{c}}elik and H{\"{u}}seyin Ekiz}, title = {Building an interconnection between {PROFIBUS} and {ATM} networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {800--817}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.09.003}, doi = {10.1016/J.JNCA.2005.09.003}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/OzcelikE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/OzyerAB07, author = {Tansel {\"{O}}zyer and Reda Alhajj and Ken Barker}, title = {Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {99--113}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.06.002}, doi = {10.1016/J.JNCA.2005.06.002}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/OzyerAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PadghamL07, author = {Lin Padgham and Wei Liu}, title = {Internet collaboration and service composition as a loose form of teamwork}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1116--1135}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.006}, doi = {10.1016/J.JNCA.2006.04.006}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/PadghamL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PeddabachigariAGT07, author = {Sandhya Peddabachigari and Ajith Abraham and Crina Grosan and Johnson P. Thomas}, title = {Modeling intrusion detection system using hybrid intelligent systems}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {114--132}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.06.003}, doi = {10.1016/J.JNCA.2005.06.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/PeddabachigariAGT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PengLR07, author = {Tao Peng and Christopher Leckie and Kotagiri Ramamohanarao}, title = {Information sharing for distributed intrusion detection systems}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {877--899}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.004}, doi = {10.1016/J.JNCA.2005.07.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PengLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Phillips-WrenMTI07, author = {Gloria E. Phillips{-}Wren and Anders I. M{\o}rch and Jeffrey Tweedale and Nikhil Ichalkaranje}, title = {Innovations in agent collaboration, cooperation and Teaming, Part 2}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1085--1088}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.002}, doi = {10.1016/J.JNCA.2006.04.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Phillips-WrenMTI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QianSL07, author = {Lijun Qian and Ning Song and Xiangfang Li}, title = {Detection of wormhole attacks in multi-path routed wireless ad hoc networks: {A} statistical analysis approach}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {308--330}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.003}, doi = {10.1016/J.JNCA.2005.07.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/QianSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QuinteroLC07, author = {Alejandro Quintero and Da Yu Li and Harold Castro}, title = {A location routing protocol based on smart antennas for ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {614--636}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.01.004}, doi = {10.1016/J.JNCA.2006.01.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/QuinteroLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShinJCC07, author = {Kwang{-}Sik Shin and Jin{-}Ha Jung and Jin Young Cheon and Sang{-}Bang Choi}, title = {Real-time network monitoring scheme based on {SNMP} for dynamic information}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {331--353}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.002}, doi = {10.1016/J.JNCA.2005.07.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ShinJCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShinJYC07, author = {Kwang{-}Sik Shin and Jin{-}Ha Jung and Wan{-}Oh Yoon and Sang{-}Bang Choi}, title = {{P2P} transfer of partial stream in multimedia multicast}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {750--774}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.10.002}, doi = {10.1016/J.JNCA.2005.10.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ShinJYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SirisS07, author = {Vasilios A. Siris and Ilias Stavrakis}, title = {Provider-based deterministic packet marking against distributed DoS attacks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {858--876}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.005}, doi = {10.1016/J.JNCA.2005.07.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SirisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/StefanoPST07, author = {Antonella Di Stefano and Giuseppe Pappalardo and Corrado Santoro and Emiliano Tramontana}, title = {A framework for the design and automated implementation of communication aspects in multi-agent systems}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1136--1152}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.007}, doi = {10.1016/J.JNCA.2006.04.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/StefanoPST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/StephenP07, author = {Bruce Stephen and Lykourgos Petropoulakis}, title = {The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {445--465}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.06.004}, doi = {10.1016/J.JNCA.2006.06.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/StephenP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SuzukiSHIK07, author = {Shinichi Suzuki and Yasushi Shinjo and Toshio Hirotsu and Kozo Itano and Kazuhiko Kato}, title = {Capability-based egress network access control by using {DNS} server}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1275--1282}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.009}, doi = {10.1016/J.JNCA.2006.09.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SuzukiSHIK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Turner07, author = {Kenneth J. Turner}, title = {Representing and analysing composed web services using Cress}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {541--562}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.02.001}, doi = {10.1016/J.JNCA.2006.02.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Turner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TweedaleISJCP07, author = {Jeffrey Tweedale and Nikhil Ichalkaranje and Christos Sioutis and B. Jarvis and Angela Consoli and Gloria E. Phillips{-}Wren}, title = {Innovations in multi-agent systems}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1089--1115}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.005}, doi = {10.1016/J.JNCA.2006.04.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TweedaleISJCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangGCXC07, author = {Ben{-}Nian Wang and Yang Gao and Zhaoqian Chen and Jun{-}Yuan Xie and Shifu Chen}, title = {A two-layered multi-agent reinforcement learning model and algorithm}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1366--1376}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.004}, doi = {10.1016/J.JNCA.2006.09.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangGCXC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangJP07, author = {Feng{-}Hsing Wang and Lakhmi C. Jain and Jeng{-}Shyang Pan}, title = {VQ-based watermarking scheme with genetic codebook partition}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {4--23}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.002}, doi = {10.1016/J.JNCA.2005.08.002}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangJP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WanyamaF07, author = {Tom Wanyama and Behrouz Homayoun Far}, title = {A protocol for multi-agent negotiation in a group-choice decision making process}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1173--1195}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.009}, doi = {10.1016/J.JNCA.2006.04.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WanyamaF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WeissNRF07, author = {Gerhard Wei{\ss} and Matthias Nickles and Michael Rovatsos and Felix A. Fischer}, title = {Specifying the intertwining of cooperation and autonomy in agent-based systems}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1196--1215}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.004}, doi = {10.1016/J.JNCA.2006.04.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WeissNRF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuWFIM07, author = {Bing Wu and Jie Wu and Eduardo B. Fern{\'{a}}ndez and Mohammad Ilyas and Spyros S. Magliveras}, title = {Secure and efficient key management in mobile ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {937--954}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.008}, doi = {10.1016/J.JNCA.2005.07.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WuWFIM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuZWT07, author = {Yanni Wu and Kuo Zhang and Xiaoge Wang and Jinlan Tian}, title = {Extending metadata with scenarios in adaptive distributed system}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1283--1294}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.003}, doi = {10.1016/J.JNCA.2006.09.003}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WuZWT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XiaNM07, author = {Junjun Xia and Lin Ni and Yuan Miao}, title = {A new digital implementation of ridgelet transform for images of dyadic length}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1346--1355}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.09.002}, doi = {10.1016/J.JNCA.2006.09.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XiaNM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XuCJLZ07, author = {Wei Xu and Jiannong Cao and Beihong Jin and Jing Li and Liang Zhang}, title = {{GCS-MA:} {A} group communication system for mobile agents}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1153--1172}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.003}, doi = {10.1016/J.JNCA.2006.04.003}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/XuCJLZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XuLS07, author = {Yiqun Xu and Luigi Logrippo and Jacques Sincennes}, title = {Detecting feature interactions in {CPL}}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {775--799}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.10.001}, doi = {10.1016/J.JNCA.2005.10.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XuLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YuCSL07, author = {Gwo{-}Jong Yu and Chih{-}Yung Chang and Kuei{-}Ping Shih and Shih{-}Chieh Lee}, title = {Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {728--749}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.11.001}, doi = {10.1016/J.JNCA.2005.11.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YuCSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YueC07, author = {Tai{-}Wen Yue and Suchen Chiang}, title = {The semipublic encryption for visual cryptography using Q'tron neural networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {24--41}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.08.003}, doi = {10.1016/J.JNCA.2005.08.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/YueC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhanMC07, author = {Justin Zhijun Zhan and Stan Matwin and LiWu Chang}, title = {Privacy-preserving collaborative association rule mining}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {1216--1227}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.04.010}, doi = {10.1016/J.JNCA.2006.04.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhanMC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhouWX07, author = {Xiaobo Zhou and Jianbin Wei and Cheng{-}Zhong Xu}, title = {Quality-of-service differentiation on the Internet: {A} taxonomy}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {1}, pages = {354--383}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.001}, doi = {10.1016/J.JNCA.2005.07.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhouWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhouX07, author = {Xiaobo Zhou and Cheng{-}Zhong Xu}, title = {Efficient algorithms of video replication and placement on a cluster of streaming servers}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {515--540}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.03.001}, doi = {10.1016/J.JNCA.2006.03.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhouX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhouX07a, author = {Xiaobo Zhou and Cheng{-}Zhong Xu}, title = {Distributed denial-of-service and intrusion detection}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {3}, pages = {819--822}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.07.011}, doi = {10.1016/J.JNCA.2005.07.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhouX07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.