


default search action
Journal of Network and Computer Applications, Volume 68
Volume 68, June 2016
- Nauman Ahad, Junaid Qadir

, Nasir Ahsan:
Neural networks in wireless networks: Techniques, applications and guidelines. 1-27 - Maxim Claeys, Daphné Tuncer, Jeroen Famaey

, Marinos Charalambides
, Steven Latré, George Pavlou, Filip De Turck
:
Hybrid multi-tenant cache management for virtualized ISP networks. 28-41 - Anum Ali

, Ghalib A. Shah, Junaid Arshad:
Energy efficient techniques for M2M communication: A survey. 42-55 - Zhiming Wang, Xiaoping Zeng, Xue Liu, Man Xu, Ya Wen, Li Chen:

TCP congestion control algorithm for heterogeneous Internet. 56-64 - Yunhe Cui

, Lianshan Yan, Saifei Li, Huanlai Xing
, Wei Pan, Jian Zhu, Xiaoyang Zheng:
SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks. 65-79 - Han-Peng Jiang, David Chuck, Wei-Mei Chen:

Energy-aware data center networks. 80-89 - Aisha Abdallah

, Mohd Aizaini Maarof, Anazida Binti Zainal:
Fraud detection system: A survey. 90-113 - Tran The Son

, Hoa Le Minh
, Nauman Aslam:
MSAR: A metric self-adaptive routing model for Mobile Ad Hoc Networks. 114-125 - Wenjuan Li

, Weizhi Meng
, Lam-for Kwok
:
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. 126-139 - Yang Qin, Weihong Yang, Yibin Ye, Yao Shi:

Analysis for TCP in data center networks: Outcast and Incast. 140-150 - Wenbin Hu, Zhenyu Qiu, Huan Wang, Liping Yan:

A Real-time scheduling algorithm for on-demand wireless XML data broadcasting. 151-163 - Bijoy Chand Chatterjee

, Waya Fadini, Eiji Oki:
A spectrum allocation scheme based on first-last-exact fit policy for elastic optical networks. 164-172 - Syed Hamid Hussain Madni

, Muhammad Shafie Abdul Latif
, Yahaya Coulibaly, Shafii Muhammad Abdulhamid
:
Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities. 173-200 - Weizhi Meng

, Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan:
JuiceCaster: Towards automatic juice filming attacks on smartphones. 201-212 - P. V. Bindu, P. Santhi Thilagam

:
Mining social networks for anomalies: Methods and challenges. 213-229

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














