Search dblp for Publications

export results for "toc:db/journals/jnw/jnw4.bht:"

 download as .bib file

@article{DBLP:journals/jnw/AbdelkaderHB09,
  author       = {Manel Abdelkader and
                  Mohamed Hamdi and
                  Noureddine Boudriga},
  title        = {Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order
                  Voronoi Diagrams},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {589--597},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.589-597},
  doi          = {10.4304/JNW.4.7.589-597},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AbdelkaderHB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AghaCGLMMMRVB09,
  author       = {Khaldoun Al Agha and
                  G{\'{e}}rard Chalhoub and
                  Alexandre Guitton and
                  Erwan Livolant and
                  Saoucene Mahfoudh and
                  Pascale Minet and
                  Michel Misson and
                  Joseph Rahm{\'{e}} and
                  Thierry Val and
                  Adrien van den Bossche},
  title        = {Cross-layering in an Industrial Wireless Sensor Network: Case Study
                  of {OCARI}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {411--420},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.411-420},
  doi          = {10.4304/JNW.4.6.411-420},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AghaCGLMMMRVB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AngrishiK09,
  author       = {Kishore Angrishi and
                  Ulrich Killat},
  title        = {On the Observance of Approximate Invariance of Effective Bandwidth
                  with Finite Number of Sources},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {805--818},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.805-818},
  doi          = {10.4304/JNW.4.9.805-818},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AngrishiK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AslamPR09,
  author       = {Nauman Aslam and
                  William J. Phillips and
                  William Robertson},
  title        = {Effective Location Management of Mobile Actors in Wireless Sensor
                  and Actor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {1--8},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.1-8},
  doi          = {10.4304/JNW.4.1.1-8},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AslamPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BelhajT09,
  author       = {Salem Belhaj and
                  Moncef Tagina},
  title        = {Modeling and Prediction of the Internet End-to-end Delay using Recurrent
                  Neural Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {528--535},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.528-535},
  doi          = {10.4304/JNW.4.6.528-535},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BelhajT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BezerraM09,
  author       = {Romildo Martins da Silva Bezerra and
                  Joberto S{\'{e}}rgio Barbosa Martins},
  title        = {A Policy-Based Autonomic Model Suitable for Quality of Service Management},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {495--504},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.495-504},
  doi          = {10.4304/JNW.4.6.495-504},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BezerraM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BhattiB09,
  author       = {Saleem N. Bhatti and
                  Martin Bateman},
  title        = {Transport Protocol Throughput Fairness},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {881--894},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.881-894},
  doi          = {10.4304/JNW.4.9.881-894},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BhattiB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BiYW09,
  author       = {Jun Bi and
                  Guang Yao and
                  Jianping Wu},
  title        = {An IPv6 Source Address Validation Testbed and Prototype Implementation},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {100--107},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.2.100-107},
  doi          = {10.4304/JNW.4.2.100-107},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BiYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BiaoL09,
  author       = {Cai Biao and
                  Zhishu Li},
  title        = {Computing and Routing for Trust in Structured {P2P} Network},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {667--674},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.667-674},
  doi          = {10.4304/JNW.4.7.667-674},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BiaoL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BoudrigaA09,
  author       = {Noureddine Boudriga and
                  Habtamu Abie},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {537--538},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.537-538},
  doi          = {10.4304/JNW.4.7.537-538},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BoudrigaA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BreitbartDG09,
  author       = {Yuri Breitbart and
                  Feodor F. Dragan and
                  Hassan Gobjuka},
  title        = {Effective Monitor Placement in Internet Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {657--666},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.657-666},
  doi          = {10.4304/JNW.4.7.657-666},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BreitbartDG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiYL09,
  author       = {Jun Cai and
                  Shun{-}Zheng Yu and
                  Jing{-}li Liu},
  title        = {The Design of a Wireless Data Acquisition and Transmission System},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {1042--1049},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.1042-1049},
  doi          = {10.4304/JNW.4.10.1042-1049},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaiYL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaoQZ09,
  author       = {Tianjie Cao and
                  Tao Quan and
                  Bo Zhang},
  title        = {Cryptanalysis of Some Client-to-Client Password-Authenticated Key
                  Exchange Protocols},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {263--270},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.263-270},
  doi          = {10.4304/JNW.4.4.263-270},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaoQZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChabaSA09,
  author       = {Yogesh Chaba and
                  Yudhvir Singh and
                  Preeti Aneja},
  title        = {Performance Analysis of Disable {IP} Broadcast Technique for Prevention
                  of Flooding-Based DDoS Attack in {MANET}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {178--183},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.178-183},
  doi          = {10.4304/JNW.4.3.178-183},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChabaSA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenSW09,
  author       = {Ling Chen and
                  Hai{-}Ying Sun and
                  Su Wang},
  title        = {First Order Deceptive Problem of {ACO} and Its Performance Analysis},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {993--1000},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.993-1000},
  doi          = {10.4304/JNW.4.10.993-1000},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChiangD09,
  author       = {Ling{-}Feng Chiang and
                  Jiang{-}Whai Dai},
  title        = {A New Method to Detect Abnormal {IP} Address on {DHCP}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {458--464},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.458-464},
  doi          = {10.4304/JNW.4.6.458-464},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChiangD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CremonesiTA09,
  author       = {Paolo Cremonesi and
                  Roberto Turrin and
                  Vassil N. Alexandrov},
  title        = {Modeling the Effects of Node Heterogeneity on the Performance of Grid
                  Applications},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {837--854},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.837-854},
  doi          = {10.4304/JNW.4.9.837-854},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CremonesiTA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiC09,
  author       = {Hui Cui and
                  Tianjie Cao},
  title        = {An Novel Anonymous Authenticated and Key Exchange Protocol},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {985--992},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.985-992},
  doi          = {10.4304/JNW.4.10.985-992},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/CuiC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DAcquistoCA09,
  author       = {Giuseppe D'Acquisto and
                  Pietro Cassar{\`{a}} and
                  Luigi Alcuri},
  title        = {An Innovative Pricing Method for Telecommunication Services Pricing
                  through American Options},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {65--74},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.65-74},
  doi          = {10.4304/JNW.4.1.65-74},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DAcquistoCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DaiLY09,
  author       = {Weihui Dai and
                  Shuyi Liang and
                  Wei Yan},
  title        = {Research on Real-Time Mobile 3D Topography System},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {307--314},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.307-314},
  doi          = {10.4304/JNW.4.5.307-314},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DaiLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DiaoKLHZJ09,
  author       = {Xunxing Diao and
                  Messaoud Kara and
                  Jian{-}Jin Li and
                  Kun Mean Hou and
                  Haiying Zhou and
                  Aur{\'{e}}lien Jacquot},
  title        = {Cooperative Inter-vehicle Communication Protocol With Low Cost Differential
                  {GPS}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {445--457},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.445-457},
  doi          = {10.4304/JNW.4.6.445-457},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DiaoKLHZJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/EklerKDBK09,
  author       = {P{\'{e}}ter Ekler and
                  Imre Kel{\'{e}}nyi and
                  Istv{\'{a}}n D{\'{e}}vai and
                  Bal{\'{a}}zs Bakos and
                  Attila Kiss},
  title        = {Hybrid Peer-to-Peer Content Sharing in Mobile Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {119--132},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.2.119-132},
  doi          = {10.4304/JNW.4.2.119-132},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/EklerKDBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FuXW09,
  author       = {Xiu Fu and
                  Qiuliang Xu and
                  Hao Wang},
  title        = {A Provably-Secure Password-Authenticated Group Key Agreement in the
                  Standard Model},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {763--770},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.763-770},
  doi          = {10.4304/JNW.4.8.763-770},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FuXW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaniSR09,
  author       = {Md. Osman Gani and
                  Hasan Sarwar and
                  Chowdhury Mofizur Rahman},
  title        = {Prediction of State of Wireless Network Using Markov and Hidden Markov
                  Model},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {976--984},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.976-984},
  doi          = {10.4304/JNW.4.10.976-984},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaniSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HOU09,
  author       = {Kun Mean Hou},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {379--381},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.379-381},
  doi          = {10.4304/JNW.4.6.379-381},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HOU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HabibJO09,
  author       = {Sheikh Mahbub Habib and
                  Cyril Jacob and
                  Tomas Olovsson},
  title        = {An Analysis of the Robustness and Stability of the Network Stack in
                  Symbian-based Smartphones},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {968--975},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.968-975},
  doi          = {10.4304/JNW.4.10.968-975},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/HabibJO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HanWXJL09,
  author       = {Ruo{-}Fei Han and
                  Hou{-}Xiang Wang and
                  Qian Xiao and
                  Xiao{-}Pei Jing and
                  Hui Li},
  title        = {A United Access Control Model for Systems in Collaborative Commerce},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {279--289},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.279-289},
  doi          = {10.4304/JNW.4.4.279-289},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HanWXJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeG09,
  author       = {Xin He and
                  Xiaolin Gui},
  title        = {The Localized Area Coverage algorithm Based on Game-Theory for {WSN}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {1001--1008},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.1001-1008},
  doi          = {10.4304/JNW.4.10.1001-1008},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HeG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeH09,
  author       = {Yong{-}Zhong He and
                  Zhen Han},
  title        = {User Authentication with Provable Security against Online Dictionary
                  Attacks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {200--207},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.200-207},
  doi          = {10.4304/JNW.4.3.200-207},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HeH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeQ09,
  author       = {Ping He and
                  Zengtang Qu},
  title        = {Comparison Computing Based on Sub-optimum Analysis: {A} Guide System
                  of Network Security},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {779--786},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.779-786},
  doi          = {10.4304/JNW.4.8.779-786},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HeQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HongH09,
  author       = {Liurong Hong and
                  Jianqiang Hu},
  title        = {A Multi-dimension Qos based Local Service Selection Model for Service
                  Composition},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {351--358},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.351-358},
  doi          = {10.4304/JNW.4.5.351-358},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HongH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HouCY09,
  author       = {Chunyan Hou and
                  Gang Cui and
                  Xiaozong Yang},
  title        = {Reliability Analysis of Component Software in Wireless Sensor Networks
                  Based on Transformation of Testing Data},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {392--402},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.392-402},
  doi          = {10.4304/JNW.4.6.392-402},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HouCY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuLZ09,
  author       = {Jianqiang Hu and
                  Juanzi Li and
                  Zhiyong Zeng},
  title        = {{SWSCF:} {A} Semantic-based Web Service Composition Framework},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {290--297},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.290-297},
  doi          = {10.4304/JNW.4.4.290-297},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuQS09,
  author       = {Zhen Hu and
                  Robert C. Qiu and
                  Dalwinder Singh},
  title        = {Spectral Efficiency for {MIMO} {UWB} Channel in Rectangular Metal
                  Cavity},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {42--52},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.42-52},
  doi          = {10.4304/JNW.4.1.42-52},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuQS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuWL09,
  author       = {Su Hu and
                  Gang Wu and
                  Shaoqian Li},
  title        = {Preamble Design and Iterative Channel Estimation for OFDM/Offset {QAM}
                  System},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {1050--1057},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.1050-1057},
  doi          = {10.4304/JNW.4.10.1050-1057},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangHB09,
  author       = {Yangcheng Huang and
                  Sidath Handurukande and
                  Saleem N. Bhatti},
  title        = {Autonomic {MANET} Routing Protocols},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {743--753},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.743-753},
  doi          = {10.4304/JNW.4.8.743-753},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangHB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuoZHF09,
  author       = {Zhihong Huo and
                  Yuan Zheng and
                  Da Huang and
                  Huajing Fang},
  title        = {Robust Integrity Design for Nonlinear Networked Control Systems},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {520--527},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.520-527},
  doi          = {10.4304/JNW.4.6.520-527},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuoZHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Inaba09,
  author       = {Tatsuya Inaba},
  title        = {Realization of {SCM} and {CRM} by Using RFID-captured Consumer Behavior
                  Information},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {92--99},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.2.92-99},
  doi          = {10.4304/JNW.4.2.92-99},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Inaba09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/IsratCH09,
  author       = {Presila Israt and
                  Namvi Chakma and
                  M. M. A. Hashem},
  title        = {A Fuzzy Logic-Based Adaptive Handoff Management Protocol for Next-Generation
                  Wireless Systems},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {931--940},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.931-940},
  doi          = {10.4304/JNW.4.10.931-940},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/IsratCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JafariSL09,
  author       = {Amir M. Jafari and
                  Adam Sklorz and
                  Walter Lang},
  title        = {Target-Oriented Routing Algorithm Based on Sequential Coordinates
                  for Autonomous Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {421--427},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.421-427},
  doi          = {10.4304/JNW.4.6.421-427},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JafariSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangR09,
  author       = {Hua Jiang and
                  Junhu Ruan},
  title        = {Fuzzy Evaluation on Network Security Based on the New Algorithm of
                  Membership Degree Transformation -M(1, 2, 3)},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {324--331},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.324-331},
  doi          = {10.4304/JNW.4.5.324-331},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangS09,
  author       = {Jehn{-}Ruey Jiang and
                  Tzu{-}Ming Sung},
  title        = {Energy-Efficient Coverage and Connectivity Maintenance for Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {403--410},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.403-410},
  doi          = {10.4304/JNW.4.6.403-410},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KaushikFC09,
  author       = {Neena R. Kaushik and
                  Silvia M. Figueira and
                  Stephen A. Chiappari},
  title        = {A Hybrid Algorithm for Lightpath Assignment},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {19--29},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.19-29},
  doi          = {10.4304/JNW.4.1.19-29},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KaushikFC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Khandker09,
  author       = {Md. Mamun{-}ur{-}Rashid Khandker},
  title        = {Distributed Control Routing Algorithms for Rearrangeably Nonblocking
                  Optical Banyan Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {952--959},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.952-959},
  doi          = {10.4304/JNW.4.10.952-959},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Khandker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KhoukhiC09,
  author       = {Lyes Khoukhi and
                  Soumaya Cherkaoui},
  title        = {Toward Neural Networks Solution for Multimedia Support in Mobile Ad
                  hoc Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {148--161},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.2.148-161},
  doi          = {10.4304/JNW.4.2.148-161},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KhoukhiC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KittiperacholSC09,
  author       = {Songrith Kittiperachol and
                  Zhili Sun and
                  Haitham S. Cruickshank},
  title        = {Integration of Linux {TCP} and Simulation: Verification, Validation
                  and Application},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {819--836},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.819-836},
  doi          = {10.4304/JNW.4.9.819-836},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KittiperacholSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KuzuuHMW09,
  author       = {Kazuto Kuzuu and
                  Yasushi Hirano and
                  Kenji Mase and
                  Toyohide Watanabe},
  title        = {Construction of a Shared Terminal System by LDAP-Smart Card Authentication
                  Cooperation},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {711--719},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.711-719},
  doi          = {10.4304/JNW.4.8.711-719},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KuzuuHMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LaurendeauB09,
  author       = {Christine Laurendeau and
                  Michel Barbeau},
  title        = {Probabilistic Evidence Aggregation for Malicious Node Position Bounding
                  in Wireless Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {9--18},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.9-18},
  doi          = {10.4304/JNW.4.1.9-18},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LaurendeauB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LeeSLS09,
  author       = {TaeHoon Lee and
                  Sunghoon Seo and
                  UiTaek Lee and
                  JooSeok Song},
  title        = {A New Soft Handover Mechanism using DCHs in 3GPP {HSDPA} Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {184--191},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.184-191},
  doi          = {10.4304/JNW.4.3.184-191},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LeeSLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LeeUN09,
  author       = {Peter Hyun{-}Jeen Lee and
                  Parampalli Udaya and
                  Shivaramakrishnan Narayan},
  title        = {Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless
                  Encryption,},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {687--697},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.687-697},
  doi          = {10.4304/JNW.4.8.687-697},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LeeUN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiT09,
  author       = {Kewen Li and
                  Jing Tian},
  title        = {The Multicast Routing QoS Based on the Improved {ACO} Algorithm},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {505--510},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.505-510},
  doi          = {10.4304/JNW.4.6.505-510},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuYXX09,
  author       = {Yuhua Liu and
                  Chun Yang and
                  Kaihua Xu and
                  Naixue Xiong},
  title        = {Model of Controlling the Hubs in {P2P} Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {236--243},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.236-243},
  doi          = {10.4304/JNW.4.4.236-243},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuYXX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LloretGBT09,
  author       = {Jaime Lloret and
                  Miguel Garcia and
                  Fernando Boronat and
                  Jes{\'{u}}s Tom{\'{a}}s},
  title        = {A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {473--486},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.473-486},
  doi          = {10.4304/JNW.4.6.473-486},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LloretGBT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MbarekON09,
  author       = {Rachid Mbarek and
                  Mohamed Tahar Ben Othman and
                  Salem Nasri},
  title        = {Fairness of High-Speed {TCP} Protocols with Different Flow Capacities},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {163--169},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.163-169},
  doi          = {10.4304/JNW.4.3.163-169},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MbarekON09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Memon09,
  author       = {Qurban A. Memon},
  title        = {Implementing Role Based Access in Healthcare Ad Hoc Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {192--199},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.192-199},
  doi          = {10.4304/JNW.4.3.192-199},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/Memon09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Meng09,
  author       = {Bo Meng},
  title        = {A Secure Internet Voting Protocol Based on Non-interactive Deniable
                  Authentication Protocol and Proof Protocol that Two Ciphertexts are
                  Encryption of the Same Plaintext},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {370--377},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.370-377},
  doi          = {10.4304/JNW.4.5.370-377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Meng09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MirjalilyBA09,
  author       = {Ghasem Mirjalily and
                  Parisa Bastani and
                  Seyed Mohammad T. Almodarresi},
  title        = {Performance Evaluation of Different QoS Models for Connecting Telephone
                  Exchange Centers over Metro Ethernet Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {960--967},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.960-967},
  doi          = {10.4304/JNW.4.10.960-967},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MirjalilyBA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MiuraITSK09,
  author       = {Motoki Miura and
                  Sadanori Ito and
                  Ryozo Takatsuka and
                  Taro Sugihara and
                  Susumu Kunifuji},
  title        = {An Empirical Study of an {RFID} Mat Sensor System in a Group Home},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {133--139},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.2.133-139},
  doi          = {10.4304/JNW.4.2.133-139},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MiuraITSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MoutairouADH09,
  author       = {Manani M. Moutairou and
                  Hasna{\^{a}} Aniss and
                  Gilles Y. Delisle and
                  Nadir Hakem},
  title        = {Global Optimization of Multi Radio Mesh Access Point Location in Underground
                  Area},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {630--640},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.630-640},
  doi          = {10.4304/JNW.4.7.630-640},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MoutairouADH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MozumdarNGLV09,
  author       = {Mohammad Mostafizur Rahman Mozumdar and
                  Guofang Nan and
                  Francesco Gregoretti and
                  Luciano Lavagno and
                  Laura Vanzago},
  title        = {An Efficient Data Aggregation Algorithm for Cluster-based Sensor Network},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {598--606},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.598-606},
  doi          = {10.4304/JNW.4.7.598-606},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MozumdarNGLV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NilssonL09,
  author       = {Dennis K. Nilsson and
                  Ulf Larson},
  title        = {A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {552--564},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.552-564},
  doi          = {10.4304/JNW.4.7.552-564},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NilssonL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NogueiraSCV09,
  author       = {Ant{\'{o}}nio Nogueira and
                  Paulo Salvador and
                  Andre Couto and
                  Rui Valadas},
  title        = {Towards the On-line Identification of Peer-to-peer Flow Patterns},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {108--118},
  year         = {2009},
  url          = {http://www.academypublisher.com/jnw/vol04/no02/jnw0402108118.html},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NogueiraSCV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Obaidat09,
  author       = {Mohammad S. Obaidat},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {803--804},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.803-804},
  doi          = {10.4304/JNW.4.9.803-804},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Obaidat09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatF09,
  author       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {675--676},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.675-676},
  doi          = {10.4304/JNW.4.8.675-676},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ObaidatF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OteroKO09,
  author       = {Carlos E. Otero and
                  Ivica Kostanic and
                  Luis Daniel Otero},
  title        = {Development of a Simulator for Stochastic Deployment of Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {754--762},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.754-762},
  doi          = {10.4304/JNW.4.8.754-762},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/OteroKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OuniBK09,
  author       = {Sofiane Ouni and
                  Jihen Bokri and
                  Farouk Kamoun},
  title        = {{DSR} based Routing Algorithm with Delay Guarantee for Ad Hoc Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {359--369},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.359-369},
  doi          = {10.4304/JNW.4.5.359-369},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/OuniBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PaladinaBSP09,
  author       = {Luca Paladina and
                  Antonino Biundo and
                  Marco Scarpa and
                  Antonio Puliafito},
  title        = {Artificial Intelligence and Synchronization in Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {382--391},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.382-391},
  doi          = {10.4304/JNW.4.6.382-391},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PaladinaBSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Palmieri09,
  author       = {Francesco Palmieri},
  title        = {A Converged Charging Framework for Mobile Voice and Data Applications},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {580--588},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.580-588},
  doi          = {10.4304/JNW.4.7.580-588},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/Palmieri09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PanYWHXZ09,
  author       = {Wei Pan and
                  Lean Yu and
                  Shouyang Wang and
                  Guowei Hua and
                  Gang Xie and
                  Jinlong Zhang},
  title        = {Dynamic Pricing Strategy of Provider with Different QoS Levels in
                  Web Service},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {228--235},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.228-235},
  doi          = {10.4304/JNW.4.4.228-235},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/PanYWHXZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PozoCG09,
  author       = {Sergio Pozo and
                  Rafael Ceballos and
                  Rafael M. Gasca},
  title        = {A Heuristic Process for Local Inconsistency Diagnosis in Firewall
                  Rule Sets},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {698--710},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.698-710},
  doi          = {10.4304/JNW.4.8.698-710},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PozoCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PrasadSKR09,
  author       = {R. V. V. S. V. Prasad and
                  Vegi Srinivas and
                  V. Valli Kumari and
                  K. V. S. V. N. Raju},
  title        = {An Effective Calculation of Reputation in {P2P} Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {332--342},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.332-342},
  doi          = {10.4304/JNW.4.5.332-342},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PrasadSKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QinL09,
  author       = {Fujian Qin and
                  Youyuan Liu},
  title        = {Multipath Based QoS Routing in {MANET}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {771--778},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.771-778},
  doi          = {10.4304/JNW.4.8.771-778},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/QinL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RagabY09,
  author       = {Khaled Ragab and
                  Akinori Yonezawa},
  title        = {A Self-organized Clustering-based Overlay Network for Application
                  Level Multicast},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {85--91},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.2.85-91},
  doi          = {10.4304/JNW.4.2.85-91},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RagabY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RahmanHRKG09,
  author       = {Ashikur Rahman and
                  Md. Endadul Hoque and
                  Farzana Rahman and
                  Sabuj Kumar Kundu and
                  Pawel Gburzynski},
  title        = {Enhanced Partial Dominant Pruning {(EPDP)} Based Broadcasting in Ad
                  hoc Wireless Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {895--904},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.895-904},
  doi          = {10.4304/JNW.4.9.895-904},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/RahmanHRKG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RahmanISMH09,
  author       = {M. M. Hafizur Rahman and
                  Yasushi Inoguchi and
                  Yukinori Sato and
                  Yasuyuki Miura and
                  Susumu Horiguchi},
  title        = {Dynamic Communication Performance of the {TESH} Network under Nonuniform
                  Traffic Patterns},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {941--951},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.941-951},
  doi          = {10.4304/JNW.4.10.941-951},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RahmanISMH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RaiVT09,
  author       = {Mritunjay Rai and
                  Shekhar Verma and
                  Shashikala Tapaswi},
  title        = {A Power Aware Minimum Connected Dominating Set for Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {511--519},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.511-519},
  doi          = {10.4304/JNW.4.6.511-519},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RaiVT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RangoVFM09,
  author       = {Floriano De Rango and
                  Fiore Veltri and
                  Peppino Fazio and
                  Salvatore Marano},
  title        = {Two-level Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks
                  in Freeway and Manhattan Environments},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {866--880},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.866-880},
  doi          = {10.4304/JNW.4.9.866-880},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RangoVFM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RekhisB09,
  author       = {Slim Rekhis and
                  Noureddine Boudriga},
  title        = {Investigating Attack Scenarios in Multihop Wireless Systems},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {539--551},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.539-551},
  doi          = {10.4304/JNW.4.7.539-551},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RekhisB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SaadFKS09,
  author       = {Mohammad Al Saad and
                  Elfriede Fehr and
                  Nicolai Kamenzky and
                  Jochen H. Schiller},
  title        = {Model-Driven Visual Testing and Debugging of {WSN} Applications},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {607--621},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.607-621},
  doi          = {10.4304/JNW.4.7.607-621},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SaadFKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SantosBMDH09,
  author       = {Andr{\'{e}}a C. Santos and
                  Fatiha Bendali and
                  Jean Mailfert and
                  Christophe Duhamel and
                  Kean Mean Hou},
  title        = {Heuristics for Designing Energy-efficient Wireless Sensor Network
                  Topologies},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {436--444},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.436-444},
  doi          = {10.4304/JNW.4.6.436-444},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SantosBMDH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SavolaA09,
  author       = {Reijo Savola and
                  Habtamu Abie},
  title        = {On-Line and Off-Line Security Measurement Framework for Mobile Ad
                  Hoc Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {565--579},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.565-579},
  doi          = {10.4304/JNW.4.7.565-579},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SavolaA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShaoCC09,
  author       = {Huagang Shao and
                  Haiying Cheng and
                  Xiao Chen},
  title        = {Performing Admission Control Concurrently in Core-stateless Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {1034--1041},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.1034-1041},
  doi          = {10.4304/JNW.4.10.1034-1041},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShaoCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenYYY09,
  author       = {Shigen Shen and
                  Lihua Ye and
                  Guangxue Yue and
                  Fei Yu},
  title        = {Research of Secure Intranet/Internet Access Platform Based on Ontology},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {1009--1016},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.1009-1016},
  doi          = {10.4304/JNW.4.10.1009-1016},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShenYYY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShengZH09,
  author       = {Tao Sheng and
                  Jingli Zhou and
                  Zhengbing Hu},
  title        = {Error Resilient Video Transmission over Wireless Networks Based on
                  Wyner-Ziv Coding of Motion Regions},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {905--912},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.905-912},
  doi          = {10.4304/JNW.4.9.905-912},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShengZH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuGCL09,
  author       = {Jian Shu and
                  Jiajie Gong and
                  Yubin Chen and
                  Linlan Liu},
  title        = {{BR2OM:} RSSI-based Refinement and Optimization Mechanism for Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {1017--1025},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.1017-1025},
  doi          = {10.4304/JNW.4.10.1017-1025},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShuGCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuYCSY09,
  author       = {Jian Shu and
                  Fei Yu and
                  Chin{-}Chen Chang and
                  Limin Sun and
                  Guangxue Yue},
  title        = {Editorial},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {225--227},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.225-227},
  doi          = {10.4304/JNW.4.4.225-227},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShuYCSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Stulman09,
  author       = {Ariel Stulman},
  title        = {Searching for Optimal Homing Sequences for Testing Timed Communication
                  Protocols},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {315--323},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.315-323},
  doi          = {10.4304/JNW.4.5.315-323},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Stulman09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Sun09,
  author       = {Jun{-}Zhao Sun},
  title        = {Multi-Threshold Based Data Gathering Algorithms for Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {30--41},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.30-41},
  doi          = {10.4304/JNW.4.1.30-41},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Sun09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/VenkateswaranSGDHN09,
  author       = {Palaniandavar Venkateswaran and
                  Pritam Som and
                  Rahul Ghosh and
                  Aritra Das and
                  Subananda Hansda and
                  Rabindranath Nandi},
  title        = {SmartGate: {A} {MAC} Protocol for Gateway Discovery in Clustered Ad-Hoc
                  Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {208--215},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.208-215},
  doi          = {10.4304/JNW.4.3.208-215},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/VenkateswaranSGDHN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/VergaraVMDL09,
  author       = {Jorge E. L{\'{o}}pez de Vergara and
                  Enrique V{\'{a}}zquez and
                  Antony Martin and
                  Samuel Dubus and
                  Marie{-}No{\"{e}}lle Lepareux},
  title        = {Use of Ontologies for the Definition of Alerts and Policies in a Network
                  Security Platform},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {720--733},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.720-733},
  doi          = {10.4304/JNW.4.8.720-733},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/VergaraVMDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangL09,
  author       = {Dong Wang and
                  Chen Liu},
  title        = {Model-based Vulnerability Analysis of {IMS} Network},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {254--262},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.254-262},
  doi          = {10.4304/JNW.4.4.254-262},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWW09,
  author       = {Xiaohui Wang and
                  Ai{-}Ling Wang and
                  LingYan Wang},
  title        = {Efficient ID-based Secure Encryption Scheme for Anonymous Receivers},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {641--648},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.641-648},
  doi          = {10.4304/JNW.4.7.641-648},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangXF09,
  author       = {Hao Wang and
                  Qiuliang Xu and
                  Xiu Fu},
  title        = {Revocable Attribute-based Key Agreement Protocol without Random Oracles},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {787--794},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.787-794},
  doi          = {10.4304/JNW.4.8.787-794},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangXF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangY09,
  author       = {Yu Wang and
                  Shun{-}Zheng Yu},
  title        = {Supervised Learning Real-time Traffic Classifiers},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {622--629},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.622-629},
  doi          = {10.4304/JNW.4.7.622-629},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WenYHD09,
  author       = {Jian Wen and
                  Min Yu and
                  Wenwen Huang and
                  Mingxing Deng},
  title        = {A Moving Control Strategy Based on {RSSI} Real-time Localization in
                  Multi-tier Mobile Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {1026--1033},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.1026-1033},
  doi          = {10.4304/JNW.4.10.1026-1033},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WenYHD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuZ09,
  author       = {Shuhua Wu and
                  Yuefei Zhu},
  title        = {Efficient Solution to Password-based Key Exchange for Large Groups},
  journal      = {J. Networks},
  volume       = {4},
  number       = {2},
  pages        = {140--147},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.2.140-147},
  doi          = {10.4304/JNW.4.2.140-147},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuZ09a,
  author       = {Shuhua Wu and
                  Yuefei Zhu},
  title        = {Client-to-client Password-Based Authenticated Key Establishment in
                  a Cross-Realm Setting},
  journal      = {J. Networks},
  volume       = {4},
  number       = {7},
  pages        = {649--656},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.7.649-656},
  doi          = {10.4304/JNW.4.7.649-656},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuZ09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongT09,
  author       = {Kaiqi Xiong and
                  David J. Thuente},
  title        = {Dynamic Localization Schemes in Malicious Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {677--686},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.677-686},
  doi          = {10.4304/JNW.4.8.677-686},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongWJ09,
  author       = {Yonghua Xiong and
                  Min Wu and
                  Weijia Jia},
  title        = {Efficient Frame Schedule Scheme for Real-time Video Transmission Across
                  the Internet Using {TCP}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {216--223},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.216-223},
  doi          = {10.4304/JNW.4.3.216-223},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongWJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongZQSQ09,
  author       = {Ke Xiong and
                  Yu Zhang and
                  Zhengding Qiu and
                  Dongmei Sun and
                  Ya{-}juan Qin},
  title        = {QoS-enhanced {TNPOSS} Network Model and its {E2E} Delay Bound for
                  Multimedia Flows},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {795--802},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.795-802},
  doi          = {10.4304/JNW.4.8.795-802},
  timestamp    = {Wed, 14 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongZQSQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuZCZ09,
  author       = {Xiaorong Xu and
                  Baoyu Zheng and
                  Jingwu Cui and
                  Wei{-}Ping Zhu},
  title        = {Performance Analysis of Diversity and Multiplexing Tradeoff and Distributed
                  Space-Time Block Code in Cooperative {MIMO} Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {465--472},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.465-472},
  doi          = {10.4304/JNW.4.6.465-472},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuZCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuZDHP09,
  author       = {Guangming Xu and
                  Weikang Zhu and
                  Min Dai and
                  Jianwei He and
                  Chengkang Pan},
  title        = {Hybrid Transmission Scheme for {MIMO} Relay Channels},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {913--920},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.913-920},
  doi          = {10.4304/JNW.4.9.913-920},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuZDHP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YaoC09,
  author       = {Ye Yao and
                  Wandong Cai},
  title        = {Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End
                  Measurement: Linear Analysis Model of Delay},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {244--253},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.244-253},
  doi          = {10.4304/JNW.4.4.244-253},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YaoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAK09,
  author       = {Salim Zabir and
                  Jemal H. Abawajy and
                  Farid Ahmed and
                  Mohammad A. Karim},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {929--930},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.929-930},
  doi          = {10.4304/JNW.4.10.929-930},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZabirAAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaiWYRS09,
  author       = {Yujia Zhai and
                  Yue Wang and
                  Jian Yuan and
                  Yong Ren and
                  Xiuming Shan},
  title        = {An Index Structure Framework to Analyze Host Mobility Supports for
                  Integrated Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {53--64},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.53-64},
  doi          = {10.4304/JNW.4.1.53-64},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaiWYRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangC09,
  author       = {Zhi Zhang and
                  Guohua Cui},
  title        = {A Secure Hierarchical Identify Authentication Scheme Combining Trust
                  Mechanism in Mobile IPv6 Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {5},
  pages        = {343--350},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.5.343-350},
  doi          = {10.4304/JNW.4.5.343-350},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangCJMY09,
  author       = {Hui Zhang and
                  Haifeng Chen and
                  Guofei Jiang and
                  Xiaoqiao Meng and
                  Kenji Yoshihira},
  title        = {Fast Indexing for Large-scale Networked System Modeling},
  journal      = {J. Networks},
  volume       = {4},
  number       = {8},
  pages        = {734--742},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.8.734-742},
  doi          = {10.4304/JNW.4.8.734-742},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangCJMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangGCL09,
  author       = {Shukui Zhang and
                  Sheng{-}Rong Gong and
                  Zhiming Cui and
                  Quan Liu},
  title        = {An Efficient Strategy for Enhancing Robustness and Immunization in
                  Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {3},
  pages        = {170--177},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.3.170-177},
  doi          = {10.4304/JNW.4.3.170-177},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangGCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangLL09,
  author       = {Liyi Zhang and
                  Qihua Liu and
                  Xinjian Li},
  title        = {Ubiquitous Commerce: Theories, Technologies, and Applications},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {271--278},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.271-278},
  doi          = {10.4304/JNW.4.4.271-278},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZF09,
  author       = {Yi Zhang and
                  Lina Zhu and
                  Li Feng},
  title        = {Key Management and Authentication in Ad Hoc Network based on Mobile
                  Agent},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {487--494},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.487-494},
  doi          = {10.4304/JNW.4.6.487-494},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaniEK09,
  author       = {Mohamed Faten Zhani and
                  Halima Elbiaze and
                  Farouk Kamoun},
  title        = {Analysis and Prediction of Real Network Traffic},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {855--865},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.855-865},
  doi          = {10.4304/JNW.4.9.855-865},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaniEK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouDWCC09,
  author       = {Lixin Zhou and
                  Jichang Ding and
                  Yi Wang and
                  Bowen Cheng and
                  Fei Cao},
  title        = {The Social Network Mining of {BBS}},
  journal      = {J. Networks},
  volume       = {4},
  number       = {4},
  pages        = {298--305},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.4.298-305},
  doi          = {10.4304/JNW.4.4.298-305},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouDWCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouHVZ09,
  author       = {Haiying Zhou and
                  Kun Mean Hou and
                  Christophe de Vaulx and
                  De{-}Cheng Zuo},
  title        = {A Hybrid Embedded Real-time Operating System for Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {4},
  number       = {6},
  pages        = {428--435},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.6.428-435},
  doi          = {10.4304/JNW.4.6.428-435},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouHVZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouLK09,
  author       = {Chenfeng Vincent Zhou and
                  Christopher Leckie and
                  Shanika Karunasekera},
  title        = {Collaborative Detection of Fast Flux Phishing Domains},
  journal      = {J. Networks},
  volume       = {4},
  number       = {1},
  pages        = {75--84},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.1.75-84},
  doi          = {10.4304/JNW.4.1.75-84},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouLK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouXX09,
  author       = {Zaihong Zhou and
                  Dongqing Xie and
                  Wei Xiong},
  title        = {A Novel Distributed Detection Scheme against DDoS Attack},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {921--928},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.921-928},
  doi          = {10.4304/JNW.4.9.921-928},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouXX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics