default search action
Journal of Network and Computer Applications, Volume 35
Volume 35, Number 1, January 2012
- Weiming Shen, Yinsheng Li, Anne E. James:
Collaborative computing and applications. 1-2 - Hugo Paredes, Fernando Mário Martins:
Social interaction regulation in virtual web environments using the Social Theatres model. 3-19 - Weizhan Zhang, Qinghua Zheng, Haifei Li, Feng Tian:
An overlay multicast protocol for live streaming and delay-guaranteed interactive media. 20-28 - Min Liu, Shijun Xu, Siyi Sun:
An agent-assisted QoS-based routing algorithm for wireless sensor networks. 29-36 - Tossaporn Srisooksai, Kamol Keamarungsi, Poonlap Lamsrichan, Kiyomichi Araki:
Practical data compression in wireless sensor networks: A survey. 37-59 - Junzhou Luo, Xiaogang Wang, Ming Yang:
An interval centroid based spread spectrum watermarking scheme for multi-flow traceback. 60-71 - Kyuyong Shin, Douglas S. Reeves:
Winnowing: Protecting P2P systems against pollution through cooperative index filtering. 72-84 - Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu:
Proactive replication for rare objects in unstructured peer-to-peer networks. 85-96 - Kwanghoon Pio Kim:
A model-driven workflow fragmentation framework for collaborative workflow architectures and systems. 97-110 - Junpeng Du, Shikai Jing, Jihong Liu:
Creating shared design thinking process for collaborative design. 111-120 - Yunjiao Xue, Hamada H. Ghenniwa, Weiming Shen:
Frame-based ontological view for semantic integration. 121-131 - Hongbo Sun, Wenhui Fan, Weiming Shen, Tianyuan Xiao:
Ontology-based interoperation model of collaborative product development. 132-144 - Juan Rodríguez-Covili, Sergio F. Ochoa, José A. Pino:
High level MANET protocol: Enhancing the communication support for mobile collaborative work. 145-155 - Yuqing Sun, Dickson K. W. Chiu, Bin Gong, Xiangxu Meng, Peng Zhang:
Scheduling mobile collaborating workforce for multiple urgent events. 156-163 - Fabrício Enembreck, Jean-Paul André Barthès:
Distributed constraint optimization with MULBS: A case study on collaborative meeting scheduling. 164-175 - Mar Pérez-Sanagustín, Gustavo Ramírez-González, Davinia Hernández Leo, Mario Muñoz Organero, Patricia Santos, Josep Blat, Carlos Delgado Kloos:
Discovering the campus together: A mobile and computer-based learning experience. 176-188 - Adriana S. Vivacqua, Marcos R. S. Borges:
Taking advantage of collective knowledge in emergency response systems. 189-198
- Amir Talaei-Khoei, Pradeep Ray, Nandan Parameswaran, Lundy Lewis:
A framework for awareness maintenance. 199-210 - Jameela Al-Jaroodi, Nader Mohamed:
Service-oriented middleware: A survey. 211-220 - Rajashekhar C. Biradar, Sunilkumar S. Manvi:
Review of multicast routing mechanisms in mobile ad hoc networks. 221-239 - Xianhui Che, Barry Ip:
Packet-level traffic analysis of online games from the genre characteristics perspective. 240-252 - Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues. 253-267 - Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. 268-286 - Eleftherios Stergiou, John D. Garofalakis:
Performance estimation of banyan semi layer networks with drop resolution mechanism. 287-294 - Ibrahim Al-Surmi, Mohamed Othman, Borhanuddin Mohd Ali:
Mobility management for IP-based next generation mobile networks: Review, challenge and perspective. 295-315
- Feng Zhong, Chai Kiat Yeo, Bu-Sung Lee:
Adaptive load balancing algorithm for multiple homing mobile nodes. 316-327 - Marinho P. Barcellos, Rodolfo Stoffel Antunes, Hisham H. Muhammad, Ruthiano S. Munaretti:
Beyond network simulators: Fostering novel distributed applications and protocols through extendible design. 328-339 - Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. 340-347 - Walid Saad, Zaher Dawy, Sanaa Sharafeddine:
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks. 348-356 - Jing Nie:
IPv6 based relay gateway protocol in hybrid networks. 357-364 - Dhiah Al-Shammary, Ibrahim Khalil:
Redundancy-aware SOAP messages compression and aggregation for enhanced performance. 365-381 - Eduardo Cañete, Jaime Chen, Rafael Marcos Luque, Bartolomé Rubio:
NeuralSens: A neural network based framework to allow dynamic adaptation in wireless sensor and actor networks. 382-393 - Mohammad Javad Rostami, Azadeh Alsadat Emrani Zarandi, Seyed Mohamad Hoseininasab:
MSDP with ACO: A maximal SRLG disjoint routing algorithm based on ant colony optimization. 394-402 - Ronald Beaubrun, Jhon-Fredy Llano-Ruiz, Benoit Poirier, Alejandro Quintero:
A middleware architecture for disseminating delay-constrained information in wireless sensor networks. 403-411 - Jasma Balasangameshwara, Nedunchezhian Raju:
A hybrid policy for fault tolerant load balancing in grid computing environments. 412-422 - Tzu-Chi Huang:
Program Ultra-Dispatcher for launching applications in a customization manner on cloud computing. 423-446 - Chao-Tsun Chang:
Hash caching mechanism in source-based routing for wireless ad hoc networks. 447-458 - Sajjad Zare, Akbar Ghaffarpour Rahbar:
An FEC scheme combined with weighted scheduling to reduce multicast packet loss in IPTV over PON. 459-468 - Jun Huang, Xiaohong Huang, Yan Ma:
Routing with multiple quality-of-services constraints: An approximation perspective. 469-479 - Serif Bahtiyar, Mehmet Ufuk Çaglayan:
Extracting trust information from security system of a service. 480-490 - Jorge Blasco Alís, Julio César Hernández Castro, José María de Fuentes, Benjamín Ramos:
A framework for avoiding steganography usage over HTTP. 491-501 - Bing Hu, Kwan L. Yeung, Zhaoyang Zhang:
Load-balanced three-stage switch. 502-509 - Ioannis Krikidis, John S. Thompson:
MIMO two-way relay channel with superposition coding and imperfect channel estimation. 510-516
Volume 35, Number 2, March 2012
- Mesut Günes, Yan Zhang:
In memory of Mieso Denko. 517 - Ming-Tuo Zhou, Hiroshi Harada:
Cognitive maritime wireless mesh/ad hoc networks. 518-526 - Theofanis P. Lambrou, Christos G. Panayiotou:
A testbed for coverage control using mixed wireless sensor networks. 527-537 - Joachim Fischer, Jens-Peter Redlich, Jochen Zschau, Claus Milkereit, Matteo Picozzi, Kevin Fleming, Mihal Brumbulli, Björn Lichtblau, Ingmar Eveslage:
A wireless mesh sensing network for early warning. 538-547 - Evangelos Theodoridis, Ioannis Chatzigiannakis, Stefan Dulman:
Post-processing in wireless sensor networks: Benchmarking sensor trace files for in-network data aggregation. 548-561 - Iván Corredor, José F. Martínez, Miguel S. Familiar, Lourdes López-Santidrián:
Knowledge-Aware and Service-Oriented Middleware for deploying pervasive services. 562-576 - Bo Yang, Mareboyana Manohar:
Similarity search in sensor networks using semantic-based caching. 577-583
- Mari Carmen Domingo:
An overview of the Internet of Things for people with disabilities. 584-596 - Sajjad Rizvi, Hassaan Khaliq Qureshi, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. 597-605 - Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha:
A comparison of wavelength reservation protocols for WDM optical networks. 606-618 - Chuan Zhu, Chunlin Zheng, Lei Shu, Guangjie Han:
A survey on coverage and connectivity issues in wireless sensor networks. 619-632
- Jingyu Wang, Jianxin Liao, Tonghong Li:
OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer. 633-643 - Sanaa Sharafeddine, Ibrahim Al-Kassem, Zaher Dawy:
A scatternet formation algorithm for Bluetooth networks with a non-uniform distribution of devices. 644-656 - Wenjie Zhang, Chai Kiat Yeo:
Throughput and delay scaling laws for mobile overlaid wireless networks. 657-667 - Hoda Hassan, Mohamed Eltoweissy:
CORM: A reference model for future computer networks. 668-680 - Nicola Cordeschi, Tatiana Patriarca, Enzo Baccarelli:
Stochastic traffic engineering for real-time applications over wireless networks. 681-694 - Francisco Jurado, Miguel A. Redondo, Manuel Ortega:
Using fuzzy logic applied to software metrics and test cases to assess programming assignments and give advice. 695-712 - Golnaz Vakili, Siavash Khorsandi:
Coordination of cooperation policies in a peer-to-peer system using swarm-based RL. 713-722 - Radim Burget, Dan Komosny, Kathiravelu Ganeshan:
Topology aware feedback transmission for real-time control protocol. 723-730 - Mahboobeh Sedighizad, Babak Seyfe, Keivan Navaie:
MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time. 731-742 - Yi-hua Zhu, Hui Xu, Kaikai Chi, Hua Hu:
Accumulating error-free frame blocks to improve throughput for IEEE 802.11-based WLAN. 743-752 - Carlos Miguel Tavares Calafate, Giancarlo Fortino, Sascha Fritsch, Jânio M. Monteiro, Juan-Carlos Cano, Pietro Manzoni:
An efficient and robust content delivery solution for IEEE 802.11p vehicular environments. 753-762 - Xiong Li, Yongping Xiong, Jian Ma, Wendong Wang:
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. 763-769 - Min-Feng Wang, Meng-Feng Tsai, Sie-Long Jheng, Cheng-Hsien Tang:
Social feature-based enterprise email classification without examining email contents. 770-777 - Waltenegus Dargie:
A medium access control protocol that supports a seamless handover in wireless sensor networks. 778-786 - Rajesh Karunamurthy, Ferhat Khendek, Roch H. Glitho:
A novel architecture for Web service composition. 787-802 - George Kastaniotis, Elias K. Maragos, Christos Douligeris, Dimitris K. Despotis:
Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies. 803-817 - Wen-Hwa Liao, Hung-Chun Yang:
A power-saving data storage scheme for wireless sensor networks. 818-825 - Gildas Avoine, Xavier Carpent, Benjamin Martin:
Privacy-friendly synchronized ultralightweight authentication protocols in the storm. 826-843 - Muhammad Imran, Mohamed F. Younis, Abas Md Said, Halabi Hasbullah:
Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks. 844-856 - Mohit P. Tahiliani, K. C. Shet, T. G. Basavaraju:
CARED: Cautious Adaptive RED gateways for TCP/IP networks. 857-864
Volume 35, Number 3, May 2012
- Laurence Tianruo Yang, Guojun Wang:
Special issue on trusted computing and communications. 865-866 - Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li:
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. 867-880 - Lei Jiang, Lixin Ding, Jianxun Liu, Jinjun Chen:
Reputation rating modeling for open environment lack of communication by using online social cognition. 881-891 - Weizhong Qiang, Aleksandr Konstantinov, Deqing Zou, Laurence Tianruo Yang:
A standards-based interoperable single sign-on framework in ARC Grid middleware. 892-904 - Zhongtian Jia, Xiaodong Lin, Seng-Hua Tan, Lixiang Li, Yixian Yang:
Public key distribution scheme for delay tolerant networks based on two-channel cryptography. 905-913 - Fei Wang, Furong Wang, Benxiong Huang, Laurence Tianruo Yang:
SONR: A reliable reputation system of self-organized network. 914-926 - Qin Liu, Guojun Wang, Jie Wu:
Secure and privacy preserving keyword searching for cloud storage services. 927-933 - Félix Gómez Mármol, Gregorio Martínez Pérez:
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. 934-941 - Mohammad-Amin Kharraz, Hamid Sarbazi-Azad, Albert Y. Zomaya:
On-demand multicast routing protocol with efficient route discovery. 942-950 - Huanyu Zhao, Xin Yang, Xiaolin Andy Li:
An incentive mechanism to reinforce truthful reports in reputation systems. 951-961 - Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai:
Flexible service selection with user-specific QoS support in service-oriented architecture. 962-973 - Liang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei:
Security model oriented attestation on dynamically reconfigurable component-based systems. 974-981 - Min Choi, Jong Hyuk Park, Seungho Lim, Young-Sik Jeong:
Achieving reliable system performance by fast recovery of branch miss prediction. 982-991 - Yu Wang, Yang Xiang, Wanlei Zhou, Shunzheng Yu:
Generating regular expression signatures for network traffic classification in trusted network management. 992-1000 - Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. 1001-1012
- Ousmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene:
Real-time data management on wireless sensor networks: A survey. 1013-1021 - Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in wireless sensor networks: A survey. 1022-1034
- Jihao Yin, Yifei Wang, Jiankun Hu:
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration. 1035-1051 - Panho Lee, Anura P. Jayasumana, H. M. N. Dilum Bandara, Sanghun Lim, V. Chandrasekar:
A peer-to-peer collaboration framework for multi-sensor data fusion. 1052-1066 - Chao-Yang Lee, Shou-Jen Lin, Chen-Wei Lee, Chu-Sing Yang:
An efficient continuous tracking system in real-time surveillance application. 1067-1073 - Rajashekhar C. Biradar, Sunilkumar S. Manvi:
Neighbor supported reliable multipath multicast routing in MANETs. 1074-1085 - Jesús Gallardo, Crescencio Bravo, Miguel A. Redondo:
A model-driven development method for collaborative modeling tools. 1086-1105 - S. Suraprasert, Jittat Fakcharoenphol:
Comparison of recovery schemes to maximize restorable throughput in multicast networks. 1106-1115 - Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar:
Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams. 1116-1129 - Abderrahmane Baadache, Ali Belmehdi:
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. 1130-1139 - Michael C. Batistatos, George V. Tsoulos, Georgia E. Athanasiadou:
Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges. 1140-1150 - Zubair A. Baig:
Multi-agent systems for protecting critical infrastructures: A survey. 1151-1161 - Abhik Banerjee, Chuan Heng Foh, Chai Kiat Yeo, Bu-Sung Lee:
Performance improvements for network-wide broadcast with instantaneous network information. 1162-1174
Volume 35, Number 4, July 2012
- Alfredo Cuzzocrea:
Intelligent algorithms for data-centric sensor networks. 1175-1176 - Aris A. Papadopoulos, Alfredo Navarra, Julie A. McCann, Maria Cristina Pinotti:
VIBE: An energy efficient routing protocol for dense and mobile sensor networks. 1177-1190 - Mark Roantree, Jie Shi, Paolo Cappellari, Martin F. O'Connor, Michael Whelan, Niall Moyna:
Data transformation and query management in personal health sensor networks. 1191-1202 - Paolo Bellavista, Giuseppe Cardone, Antonio Corradi, Luca Foschini:
The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency. 1203-1209 - Alfredo Cuzzocrea, Alexis Papadimitriou, Dimitrios Katsaros, Yannis Manolopoulos:
Edge betweenness centrality: A novel algorithm for QoS-based topology control over wireless sensor networks. 1210-1217 - Gianluca Moro, Gabriele Monti:
W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks. 1218-1234
- R. Madhusudhan, R. C. Mittal:
Dynamic ID-based remote user password authentication schemes using smart cards: A review. 1235-1248 - Jan von Mulert, Ian Welch, Winston Khoon Guan Seah:
Security threats and solutions in MANETs: A case study using AODV and SAODV. 1249-1259
- Chien-Fu Cheng, Kuo-Tang Tsai:
Eventual strong consensus with fault detection in the presence of dual failure mode on processors under dynamic networks. 1260-1276 - Dong Kun Noh, Junbeom Hur:
Using a dynamic backbone for efficient data delivery in solar-powered WSNs. 1277-1284 - Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, Shui Yu:
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models. 1285-1296 - Najme Mansouri, Gholamhosein Dastghaibyfard:
A dynamic replica management strategy in data grid. 1297-1303 - Kenneth J. Turner, Koon Leai Larry Tan:
Rigorous development of composite grid services. 1304-1316 - Mustapha Réda Senouci, Abdelhamid Mellouk, Hadj Senouci, Amar Aissani:
Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols. 1317-1328 - Hassen A. Mogaibel, Mohamed Othman, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid:
On-demand channel reservation scheme for common traffic in wireless mesh networks. 1329-1351 - Elizabeth A. Thompson, Nathan Clem, Isaac Renninger, Timothy Loos:
Software-defined GPS receiver on USRP-platform. 1352-1360 - Ameen M. Alkharasani, Mohamed Othman:
M2I2tswTCM: A new efficient optimization marker algorithm to improve fairness bandwidth in DiffServ networks. 1361-1366 - Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong:
Privacy enhanced data outsourcing in the cloud. 1367-1373
- Bettahally N. Keshavamurthy, Durga Toshniwal, Bhavani K. Eshwar:
Corrigendum to "Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams" [J. Network Comput. Appl. 35 (3) (2012) 1116-1129]. 1374
Volume 35, Number 5, September 2012
- Paolo Bellavista, Chi-Ming Chen, Hossam S. Hassanein:
Special issue on service delivery management in broadband networks. 1375-1376 - Djamal-Eddine Meddour, Alaeddine Abdallah Djamal, Toufik Ahmed, Raouf Boutaba:
A cross layer architecture for multicast and unicast video transmission in mobile broadband networks. 1377-1391 - Cristiano Bonato Both, Clarissa Cassales Marquezan, Rafael Kunst, Lisandro Zambenedetti Granville, Juergen Rochol:
A self-adapting connection admission control solution for mobile WiMAX: Enabling dynamic switching of admission control algorithms based on predominant network usage profiles. 1392-1401 - Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Maurizio D'Arienzo:
Unified architecture for network measurement: The case of available bandwidth. 1402-1414 - Werner Sandmann:
Delays in a series of queues with correlated service times. 1415-1423 - Kaouther Abrougui, Azzedine Boukerche, Hussam M. Soliman Ramadan:
Performance evaluation of an efficient fault tolerant service discovery protocol for vehicular networks. 1424-1435 - Nassima Hadid, Alexandre Guitton, Michel Misson:
Exploiting a meeting channel to interconnect mobile robots. 1436-1445 - Christos Bouras, Vassilis Poulopoulos:
Enhancing meta-portals using dynamic user context personalization techniques. 1446-1453
- Ahmed A. Mosa, Aisha H. Abdalla, Rashid A. Saeed:
Evaluation of MANEMO route optimization schemes. 1454-1472 - Antonio Ruiz-Martínez:
A survey on solutions and main free tools for privacy enhancing Web communications. 1473-1492 - Mohammad Masdari, Mehdi Maleknasab, Moazam Bidaki:
A survey and taxonomy of name systems in mobile ad hoc networks. 1493-1507 - Adamu Murtala Zungeru, Li-Minn Ang, Kah Phooi Seng:
Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison. 1508-1536 - Liang Liu, Xiaolin Qin, Guineng Zheng:
Reliable spatial window aggregation query processing algorithm in wireless sensor networks. 1537-1547
- Kranthi K. Mamidisetty, Michael J. Ferrara, Shivakumar Sastry:
Systematic selection of cluster heads for data collection. 1548-1558 - Rosen Ivanov:
Real-time GPS track simplification algorithm for outdoor navigation of visually impaired. 1559-1567 - Yun He, Zhongyang Xiong, Yufang Zhang, Xiaolin Tan, Zhixing Li:
Modeling and analysis of multi-channel P2P VoD systems. 1568-1578 - Patrick Battistello, Joaquín García-Alfaro, Cyril Delétré:
Transaction-based authentication and key agreement protocol for inter-domain VoIP. 1579-1597 - Samia A. Ali, Khaled M. Shaaban, Islam M. Alkabbany:
Distributed patching for mobile wireless sensor networks. 1598-1605 - Jipeng Zhou, Liyang Peng, Yuhui Deng, Jian-Zhu Lu:
An on-demand routing protocol for improving channel use efficiency in multichannel ad hoc networks. 1606-1614 - Seiven Leu, Ruay-Shiung Chang:
A weight-value algorithm for finding connected dominating sets in a MANET. 1615-1619 - Bert Vankeirsbilck, Dieter Verslype, Nicolas Staelens, Pieter Simoens, Chris Develder, Bart Dhoedt, Filip De Turck, Piet Demeester:
Automatic fine-grained area detection for thin client systems. 1620-1632 - Javad Akbari Torkestani:
Mobility prediction in mobile wireless networks. 1633-1645 - Ashok Kumar Das, Pranay Sharma, Santanu Chatterjee, Jamuna Kanta Sing:
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. 1646-1656
Volume 35, Number 6, November 2012
- Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Halabi Hasbullah:
Performance comparison of end-to-end mobility management protocols for TCP. 1657-1673 - Allen L. Ramaboli, Olabisi Emmanuel Falowo, H. Anthony Chan:
Bandwidth aggregation in heterogeneous wireless networks: A survey of current approaches and issues. 1674-1690 - Sazia Parvin, Farookh Khadeer Hussain, Omar Khadeer Hussain, Song Han, Biming Tian, Elizabeth Chang:
Cognitive radio network security: A survey. 1691-1708 - Shajulin Benedict:
Energy-aware performance analysis methodologies for HPC architectures - An exploratory study. 1709-1719 - Tarek Moulahi, Salem Nasri, Hervé Guyennet:
Broadcasting based on dominated connecting sets with MPR in a realistic environment for WSNs & ad hoc. 1720-1727 - JungYul Choi, Mingon Kim, Hongkyu Jeong, Hong-Shik Park:
Power-saving mechanisms for energy efficient IEEE 802.16e/m. 1728-1739
- Jihao Yin, Chongyang Fu, Jiankun Hu:
Using incremental subspace and contour template for object tracking. 1740-1748 - Hamid Shokrzadeh, Siavash Khorsandi, Abolfazl Toroghi Haghighat:
Optimized query-driven appointment routing based on Expectation-Maximization in wireless sensor networks. 1749-1761 - Kwangcheol Shin, Kyungjun Kim, Soontae Kim:
Traffic management strategy for delay-tolerant networks. 1762-1770 - M. S. Kakkasageri, Sunilkumar S. Manvi:
Multiagent driven dynamic clustering of vehicles in VANETs. 1771-1780 - Alexandre Aguiar Amaral, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Joel José Puga Coelho Rodrigues, Mario Lemes Proença Jr.:
Inference of network anomaly propagation using spatio-temporal correlation. 1781-1792 - Qi Shi, Ning Zhang, David Llewellyn-Jones:
Efficient autonomous signature exchange on ubiquitous networks. 1793-1806 - Victoria Ying Zhang, Albert Kai-Sun Wong:
Kernel-based particle filtering for indoor tracking in WLANs. 1807-1817 - Mourad Amad, Ahmed Meddahi, Djamil Aïssani, Zonghua Zhang:
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity. 1818-1830 - Sandeep K. Sood:
A combined approach to ensure data security in cloud computing. 1831-1838 - Zuowen Tan:
A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments. 1839-1846 - Bo Dong, Qinghua Zheng, Feng Tian, Kuo-Ming Chao, Rui Ma, Rachid Anane:
An optimized approach for storing and accessing small files on cloud storage. 1847-1862 - Rafael Antonello, Stenio F. L. Fernandes, Carlos Alberto Kamienski, Djamel Sadok, Judith Kelner, István Gódor, Géza Szabó, Tord Westholm:
Deep packet inspection tools and techniques in commodity platforms: Challenges and trends. 1863-1878 - Mari Carmen Domingo:
An overview of the internet of underwater things. 1879-1890 - Javier Barrachina, Piedad Garrido, Manuel Fogué, Francisco J. Martinez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni:
VEACON: A Vehicular Accident Ontology designed to improve safety on the roads. 1891-1900 - Adamu Murtala Zungeru, Li-Minn Ang, Kah Phooi Seng:
Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks. 1901-1917 - Mohamed Bakillah, Mir Abolfazl Mostafavi, Steve H. L. Liang, Alexander Zipf:
Real time query propagation strategies with Lightweight Coordination Calculus (LCC) for ad hoc networks of geospatial databases. 1918-1933 - Giancarlo Fortino, Antonio Guerrieri, Gregory M. P. O'Hare, Antonio G. Ruzzelli:
A flexible building management framework based on wireless sensor and actuator networks. 1934-1952 - Linfeng Liu, Ruchuan Wang, Fu Xiao:
Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes. 1953-1963 - Gurpreet Singh Bhamra, Neeraj Kumar, Anil K. Verma:
Ant colony algorithms in MANETs: A review. 1964-1972 - S. Sudha, N. Ammasaigounden:
An aggregate marker for bandwidth fairness in DiffServ. 1973-1978 - Li Li, Qing-Shan Jia, Hengtao Wang, Ruixi Yuan, Xiaohong Guan:
A systematic method for network topology reconfiguration with limited link additions. 1979-1989 - Chih-Lin Hu, Tzu-Han Kuo:
A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems. 1990-2002 - Miguel Franklin de Castro, Levi Bayde Ribeiro, Camila Helena Souza Oliveira:
An autonomic bio-inspired algorithm for wireless sensor network self-organization and efficient routing. 2003-2015 - Mohammad Hassan Hajiesmaili, Ahmad Khonsari, Ali Sehati, Mohammad Sadegh Talebi:
Content-aware rate allocation for efficient video streaming via dynamic network utility maximization. 2016-2027 - Javad Akbari Torkestani:
A distributed resource discovery algorithm for P2P grids. 2028-2036 - Derlis Gregor, Sergio L. Toral Marín, Maria Teresa Ariza Gómez, Federico Barrero:
An ontology-based semantic service for cooperative urban equipments. 2037-2050 - Qingyang Song, Zhaolong Ning, Shiqiang Wang, Abbas Jamalipour:
Link stability estimation based on link connectivity changes in mobile ad-hoc networks. 2051-2058 - Süleyman Kardas, Serkan Celik, Muhammet Yildiz, Albert Levi:
PUF-enhanced offline RFID security and privacy. 2059-2067 - Khalid A. Darabkh, Shereen Ismail, Mohammad Al-Shurman, Iyad F. Jafar, Eman Alkhader, Mamoun F. Al-Mistarihi:
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks. 2068-2080 - Yi Xie, Jiankun Hu, S. Tang, X. Huang:
A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network. 2081-2091 - Yuan-Cheng Lai, Yen-Hung Chen:
A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks. 2092-2104
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.