


default search action
Journal of High Speed Networks, Volume 25
Volume 25, Number 1, 2019
- Vanita Jain, Vivek Yatri, Chaitanya Kanchan Kapoor:

Software defined networking: State-of-the-art. 1-40 - Prashant Kharat, Muralidhar Kulkarni

:
Congestion controlling schemes for high-speed data networks: A survey. 41-60 - Kiyotaka Fujisaki:

Evaluation of 13.56 MHz RFID system performance considering communication distance between reader and tag. 61-71 - Yasuhiro Urayama, Takuji Tachibana:

Virtual network embedding with optimization problems in live video streaming services for regional activation. 73-85 - Hamid Reza Sharifi, Hamid Haj Seyyed Javadi

, Ali Moeini, Mehdi Hosseinzadeh
:
Residual design of sink localization algorithms for wireless sensor networks. 87-99 - Tarek S. Sobh

:
Identity management using SAML for mobile clients and Internet of Things. 101-126
Volume 25, Number 2, 2019
- Keqiang Ren, Mingkang Wu:

DV-Hop algorithm for adaptive hop-count improvement and average hop distance optimization. 127-137 - Poonam Verma, Neeta Singh:

Fuzzy assisted vehicle-ID based congestion control scheme (FUZZ-CCS) for CAM broadcast over control channel in VANETs. 139-153 - Mustapha Sadi

, Mourad Amad, Nadjib Badache:
HiCo-MoG: Hierarchical consensus-based group membership service in mobile Ad Hoc networks. 155-172 - Yanli Li, Xiaonan Wang, Zhengxiong Dou:

k-Anycast data acquisition in multi-hop IoV. 173-180 - Subramanyam Radha

, David Sundararaj Shylu, Perattur Nagabushanam
, Jisha Mathew:
Low noise amplifier with resistive and capacitive feedback for 2.4 GHz RF receiver front end. 181-203 - Sanjit Ningthoujam, Swarnendu Kumar Chakraborty:

Analysis of the adaptive three-modes for PC+MPC+APC techniques using retransmission cycle mechanism. 205-220
Volume 25, Number 3, 2019
- Syeda Farzana, Salekul Islam

:
Symmetric key-based patient controlled secured electronic health record management protocol. 221-237 - P. Sethu Lakshmi, Mangalathu Jibukumar:

Network lifetime maximization in wireless sensor network using spatial correlation based clustered opportunistic transmission. 239-252 - Sanoop Mallissery

, M. M. Manohara Pai, Milad Mehbadi, Radhika M. Pai
, Yu-Sung Wu:
Online and offline communication architecture for vehicular ad-hoc networks using NS3 and SUMO simulators. 253-271 - Kadri Sylejmani

, Admir Kadriu, Endrit Ilazi, Bujar Krasniqi
:
Genetic algorithms and greedy-randomized adaptive search procedure for router placement problem in wireless networks. 273-300 - Shohreh Monshizadeh, Gunne John Hegglid, Svein Thore Hagen:

Solving optimal power dispatch using artificial algorithm for Nordic 44 network. 301-310 - Chakib Nehnouh, Mohamed Senouci:

Fault tolerant and congestion aware routing algorithm for network on chip. 311-329
Volume 25, Number 4, 2019
- Ravindra Sadashivrao Apare

, Satish Narayanrao Gujar:
Implementing adaptive dragonfly optimization for privacy preservation in IoT. 331-348 - Marta Catillo, Massimiliano Rak

, Umberto Villano:
Discovery of DoS attacks by the ZED-IDS anomaly detector. 349-365 - Hisham M. Almasaeid, Osameh M. Al-Kofahi, Sharhabeel H. Alnabelsi

, Ramzi R. Saifan:
Tree-based multicast service provisioning with maximum immunity in cognitive radio networks. 367-384 - Heejung Byun:

A study on user-input dissemination for wireless sensor networking systems. 385-394 - Yohaan Yoon, Kyungmin Go

, Myungchul Kim:
A Temporal Synchronization Scheme to reduce and compensate for temporal asynchrony in wireless 3D video streaming. 395-411 - Mohammad Najafimehr

, Mahmood Ahmadi
:
SLCF: Single-hash lookup cuckoo filter. 413-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














