- Wenjing Jia, Huaifeng Zhang, Xiangjian He:
Region-based license plate detection. J. Netw. Comput. Appl. 30(4): 1324-1333 (2007) - Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimitrios Gunopulos, Alex Delis:
Distributed middleware architectures for scalable media services. J. Netw. Comput. Appl. 30(1): 209-243 (2007) - Ali El Kateeb:
High-speed routers design using data stream distributor unit. J. Netw. Comput. Appl. 30(1): 133-144 (2007) - Suneuy Kim, Chita R. Das:
An analytical model for interval caching in interactive video servers. J. Netw. Comput. Appl. 30(1): 384-413 (2007) - Jung-San Lee, Chin-Chen Chang:
Secure communications for cluster-based ad hoc networks using node identities. J. Netw. Comput. Appl. 30(4): 1377-1396 (2007) - Jenq-Shiou Leu, Yuan-Po Chi, Wei-Kuan Shih:
Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS). J. Netw. Comput. Appl. 30(1): 296-307 (2007) - Celia Li, Cungang Yang, Richard Cheung:
Key management for role hierarchy in distributed systems. J. Netw. Comput. Appl. 30(3): 920-936 (2007) - Liang Wang, Yiping Guo, Ming Fang:
Web search engine based on DNS. J. Netw. Comput. Appl. 30(2): 466-478 (2007) - Yihua Liao, V. Rao Vemuri, Alejandro Pasos:
Adaptive anomaly detection with evolving connectionist systems. J. Netw. Comput. Appl. 30(1): 60-80 (2007) - Rongping Lin, Sheng Wang, Lemin Li:
Protections for multicast session in WDM optical networks under reliability constraints. J. Netw. Comput. Appl. 30(2): 695-705 (2007) - Tainchi Lu, Chinghao Hsu:
Mobile agents for information retrieval in hybrid simulation environment. J. Netw. Comput. Appl. 30(1): 244-264 (2007) - George D. Magoulas, George Ghinea:
Intelligence-based adaptation for ubiquitous multimedia communications. J. Netw. Comput. Appl. 30(3): 955-957 (2007) - Christopher J. Martinez, Wei-Ming Lin, Parimal Patel:
Optimal XOR hashing for non-uniformly distributed address lookup in computer networks. J. Netw. Comput. Appl. 30(4): 1397-1427 (2007) - Carolyn McGregor, Bruce Kneale, Mark B. Tracy:
On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband. J. Netw. Comput. Appl. 30(4): 1309-1323 (2007) - Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Jesús D. Jiménez Re, Rafael Marín López:
A network access control approach based on the AAA architecture and authorization attributes. J. Netw. Comput. Appl. 30(3): 900-919 (2007) - Chan-Ho Min, Sehun Kim:
On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks. J. Netw. Comput. Appl. 30(2): 706-727 (2007) - Donn Morrison, Liyanage C. De Silva:
Voting ensembles for spoken affect classification. J. Netw. Comput. Appl. 30(4): 1356-1365 (2007) - Michael J. O'Grady, Gregory M. P. O'Hare, C. Donaghey:
Delivering adaptivity through context-awareness. J. Netw. Comput. Appl. 30(3): 1007-1033 (2007) - Abdelhamid Ouardani, Samuel Pierre, Hanifa Boucheneb:
A security protocol for mobile agents based upon the cooperation of sedentary agents. J. Netw. Comput. Appl. 30(3): 1228-1243 (2007) - Ibrahim Özçelik, Hüseyin Ekiz:
Building an interconnection between PROFIBUS and ATM networks. J. Netw. Comput. Appl. 30(2): 800-817 (2007) - Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. J. Netw. Comput. Appl. 30(1): 99-113 (2007) - Lin Padgham, Wei Liu:
Internet collaboration and service composition as a loose form of teamwork. J. Netw. Comput. Appl. 30(3): 1116-1135 (2007) - Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson P. Thomas:
Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1): 114-132 (2007) - Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Information sharing for distributed intrusion detection systems. J. Netw. Comput. Appl. 30(3): 877-899 (2007) - Gloria E. Phillips-Wren, Anders I. Mørch, Jeffrey Tweedale, Nikhil Ichalkaranje:
Innovations in agent collaboration, cooperation and Teaming, Part 2. J. Netw. Comput. Appl. 30(3): 1085-1088 (2007) - Lijun Qian, Ning Song, Xiangfang Li:
Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach. J. Netw. Comput. Appl. 30(1): 308-330 (2007) - Alejandro Quintero, Da Yu Li, Harold Castro:
A location routing protocol based on smart antennas for ad hoc networks. J. Netw. Comput. Appl. 30(2): 614-636 (2007) - Kwang-Sik Shin, Jin-Ha Jung, Jin Young Cheon, Sang-Bang Choi:
Real-time network monitoring scheme based on SNMP for dynamic information. J. Netw. Comput. Appl. 30(1): 331-353 (2007) - Kwang-Sik Shin, Jin-Ha Jung, Wan-Oh Yoon, Sang-Bang Choi:
P2P transfer of partial stream in multimedia multicast. J. Netw. Comput. Appl. 30(2): 750-774 (2007) - Vasilios A. Siris, Ilias Stavrakis:
Provider-based deterministic packet marking against distributed DoS attacks. J. Netw. Comput. Appl. 30(3): 858-876 (2007)