default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca74.bht:"
@article{DBLP:journals/jnca/EmmanuelR16, author = {Michael Emmanuel and Ramesh Kumar Rayudu}, title = {Communication technologies for smart grid applications: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {133--148}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.012}, doi = {10.1016/J.JNCA.2016.08.012}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/EmmanuelR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IqbalKDHKKC16, author = {Salman Iqbal and Miss Laiha Mat Kiah and Babak Dhaghighi and Muzammil Hussain and Suleman Khan and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {On cloud security attacks: {A} taxonomy and intrusion detection and prevention as a service}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {98--120}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.016}, doi = {10.1016/J.JNCA.2016.08.016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IqbalKDHKKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhatuaM16, author = {Manas Khatua and Sudip Misra}, title = {Exploiting anomalous slots for multiple channel access in {IEEE} 802.11 networks}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {56--65}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.001}, doi = {10.1016/J.JNCA.2016.08.001}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KhatuaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KoganLNSS16, author = {Kirill Kogan and Alejandro L{\'{o}}pez{-}Ortiz and Sergey I. Nikolenko and Gabriel Scalosub and Michael Segal}, title = {Large profits or fast gains: {A} dilemma in maximizing throughput with applications to network processors}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {31--43}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.07.010}, doi = {10.1016/J.JNCA.2016.07.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KoganLNSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinCC16, author = {Chun{-}Cheng Lin and Teng{-}Huei Chen and Hui{-}Hsin Chin}, title = {Adaptive router node placement with gateway positions and QoS constraints in dynamic wireless mesh networks}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {149--164}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.05.005}, doi = {10.1016/J.JNCA.2016.05.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinWZZY16, author = {Feng Lin and Gang Wang and Junhai Zhou and Shiwen Zhang and Xin Yao}, title = {High-performance IPv6 address lookup in GPU-accelerated software routers}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {1--10}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.004}, doi = {10.1016/J.JNCA.2016.08.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinWZZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LyuSZPLG16, author = {Chen Lyu and Shifeng Sun and Yuanyuan Zhang and Amit Pande and Haining Lu and Dawu Gu}, title = {Privacy-preserving data sharing scheme over cloud for social applications}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {44--55}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.006}, doi = {10.1016/J.JNCA.2016.08.006}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LyuSZPLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SantosMSWW16, author = {Daniel Ricardo dos Santos and Roberto Marinho and Gustavo Roecker Schmitt and Carla Merkle Westphall and Carlos Becker Westphall}, title = {A framework and risk assessment approaches for risk-based access control in the cloud}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {86--97}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.013}, doi = {10.1016/J.JNCA.2016.08.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SantosMSWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SepulcreGC16, author = {Miguel Sepulcre and Javier Goz{\'{a}}lvez and Baldomero Coll{-}Perales}, title = {Multipath QoS-driven routing protocol for industrial wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {121--132}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.008}, doi = {10.1016/J.JNCA.2016.08.008}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SepulcreGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SharmaJSS16, author = {Yogesh Sharma and Bahman Javadi and Weisheng Si and Daniel Sun}, title = {Reliability and energy efficiency in cloud computing systems: Survey and taxonomy}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {66--85}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.010}, doi = {10.1016/J.JNCA.2016.08.010}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SharmaJSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TangCZH16, author = {Lin Tang and Hui Cao and Li Zheng and Ningjian Huang}, title = {Uncertainty-aware {RFID} network planning for target detection and target location}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {21--30}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.003}, doi = {10.1016/J.JNCA.2016.08.003}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TangCZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhaoLL16, author = {Yanchao Zhao and Wenzhong Li and Sanglu Lu}, title = {Navigation-driven handoff minimization in wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {74}, pages = {11--20}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.005}, doi = {10.1016/J.JNCA.2016.08.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhaoLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.