


default search action
Journal of Networks, Volume 4
Volume 4, Numbers 1, February 2009
- Nauman Aslam, William J. Phillips, William Robertson:

Effective Location Management of Mobile Actors in Wireless Sensor and Actor Networks. 1-8 - Christine Laurendeau, Michel Barbeau:

Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks. 9-18 - Neena R. Kaushik, Silvia M. Figueira, Stephen A. Chiappari:

A Hybrid Algorithm for Lightpath Assignment. 19-29 - Jun-Zhao Sun:

Multi-Threshold Based Data Gathering Algorithms for Wireless Sensor Networks. 30-41 - Zhen Hu, Robert C. Qiu, Dalwinder Singh:

Spectral Efficiency for MIMO UWB Channel in Rectangular Metal Cavity. 42-52 - Yujia Zhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan:

An Index Structure Framework to Analyze Host Mobility Supports for Integrated Networks. 53-64 - Giuseppe D'Acquisto, Pietro Cassarà

, Luigi Alcuri:
An Innovative Pricing Method for Telecommunication Services Pricing through American Options. 65-74 - Chenfeng Vincent Zhou, Christopher Leckie

, Shanika Karunasekera:
Collaborative Detection of Fast Flux Phishing Domains. 75-84
Volume 4, Numbers 2, April 2009
- Khaled Ragab, Akinori Yonezawa:

A Self-organized Clustering-based Overlay Network for Application Level Multicast. 85-91 - Tatsuya Inaba:

Realization of SCM and CRM by Using RFID-captured Consumer Behavior Information. 92-99 - Jun Bi

, Guang Yao, Jianping Wu:
An IPv6 Source Address Validation Testbed and Prototype Implementation. 100-107 - António Nogueira, Paulo Salvador, Andre Couto, Rui Valadas:

Towards the On-line Identification of Peer-to-peer Flow Patterns. 108-118 - Péter Ekler, Imre Kelényi, István Dévai, Balázs Bakos, Attila Kiss:

Hybrid Peer-to-Peer Content Sharing in Mobile Networks. 119-132 - Motoki Miura

, Sadanori Ito, Ryozo Takatsuka, Taro Sugihara, Susumu Kunifuji:
An Empirical Study of an RFID Mat Sensor System in a Group Home. 133-139 - Shuhua Wu, Yuefei Zhu:

Efficient Solution to Password-based Key Exchange for Large Groups. 140-147 - Lyes Khoukhi, Soumaya Cherkaoui

:
Toward Neural Networks Solution for Multimedia Support in Mobile Ad hoc Networks. 148-161
Volume 4, Number 3, May 2009
- Rachid Mbarek, Mohamed Tahar Ben Othman, Salem Nasri:

Fairness of High-Speed TCP Protocols with Different Flow Capacities. 163-169 - Shukui Zhang, Sheng-Rong Gong, Zhiming Cui, Quan Liu:

An Efficient Strategy for Enhancing Robustness and Immunization in Wireless Sensor Networks. 170-177 - Yogesh Chaba, Yudhvir Singh

, Preeti Aneja
:
Performance Analysis of Disable IP Broadcast Technique for Prevention of Flooding-Based DDoS Attack in MANET. 178-183 - TaeHoon Lee, Sunghoon Seo, UiTaek Lee, JooSeok Song:

A New Soft Handover Mechanism using DCHs in 3GPP HSDPA Networks. 184-191 - Qurban A. Memon

:
Implementing Role Based Access in Healthcare Ad Hoc Networks. 192-199 - Yong-Zhong He, Zhen Han:

User Authentication with Provable Security against Online Dictionary Attacks. 200-207 - Palaniandavar Venkateswaran, Pritam Som, Rahul Ghosh, Aritra Das, Subananda Hansda, Rabindranath Nandi:

SmartGate: A MAC Protocol for Gateway Discovery in Clustered Ad-Hoc Networks. 208-215 - Yonghua Xiong, Min Wu, Weijia Jia

:
Efficient Frame Schedule Scheme for Real-time Video Transmission Across the Internet Using TCP. 216-223
Volume 4, Number 4, June 2009
- Jian Shu, Fei Yu, Chin-Chen Chang, Limin Sun, Guangxue Yue:

Editorial. 225-227 - Wei Pan, Lean Yu, Shouyang Wang

, Guowei Hua, Gang Xie, Jinlong Zhang:
Dynamic Pricing Strategy of Provider with Different QoS Levels in Web Service. 228-235 - Yuhua Liu, Chun Yang, Kaihua Xu, Naixue Xiong:

Model of Controlling the Hubs in P2P Networks. 236-243 - Ye Yao, Wandong Cai:

Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear Analysis Model of Delay. 244-253 - Dong Wang, Chen Liu:

Model-based Vulnerability Analysis of IMS Network. 254-262 - Tianjie Cao, Tao Quan, Bo Zhang:

Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols. 263-270 - Liyi Zhang, Qihua Liu, Xinjian Li:

Ubiquitous Commerce: Theories, Technologies, and Applications. 271-278 - Ruo-Fei Han, Hou-Xiang Wang, Qian Xiao, Xiao-Pei Jing, Hui Li:

A United Access Control Model for Systems in Collaborative Commerce. 279-289 - Jianqiang Hu, Juanzi Li, Zhiyong Zeng:

SWSCF: A Semantic-based Web Service Composition Framework. 290-297 - Lixin Zhou, Jichang Ding, Yi Wang, Bowen Cheng, Fei Cao:

The Social Network Mining of BBS. 298-305
Volume 4, Number 5, July 2009
- Weihui Dai, Shuyi Liang, Wei Yan:

Research on Real-Time Mobile 3D Topography System. 307-314 - Ariel Stulman

:
Searching for Optimal Homing Sequences for Testing Timed Communication Protocols. 315-323 - Hua Jiang, Junhu Ruan:

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation -M(1, 2, 3). 324-331 - R. V. V. S. V. Prasad, Vegi Srinivas, V. Valli Kumari

, K. V. S. V. N. Raju:
An Effective Calculation of Reputation in P2P Networks. 332-342 - Zhi Zhang, Guohua Cui:

A Secure Hierarchical Identify Authentication Scheme Combining Trust Mechanism in Mobile IPv6 Networks. 343-350 - Liurong Hong, Jianqiang Hu:

A Multi-dimension Qos based Local Service Selection Model for Service Composition. 351-358 - Sofiane Ouni

, Jihen Bokri, Farouk Kamoun
:
DSR based Routing Algorithm with Delay Guarantee for Ad Hoc Networks. 359-369 - Bo Meng:

A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext. 370-377
Volume 4, Number 6, August 2009
- Kun Mean Hou:

Guest Editorial. 379-381 - Luca Paladina, Antonino Biundo, Marco Scarpa, Antonio Puliafito:

Artificial Intelligence and Synchronization in Wireless Sensor Networks. 382-391 - Chunyan Hou, Gang Cui, Xiaozong Yang:

Reliability Analysis of Component Software in Wireless Sensor Networks Based on Transformation of Testing Data. 392-402 - Jehn-Ruey Jiang, Tzu-Ming Sung:

Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks. 403-410 - Khaldoun Al Agha, Gérard Chalhoub, Alexandre Guitton, Erwan Livolant, Saoucene Mahfoudh, Pascale Minet, Michel Misson, Joseph Rahmé, Thierry Val, Adrien van den Bossche:

Cross-layering in an Industrial Wireless Sensor Network: Case Study of OCARI. 411-420 - Amir M. Jafari, Adam Sklorz, Walter Lang:

Target-Oriented Routing Algorithm Based on Sequential Coordinates for Autonomous Wireless Sensor Network. 421-427 - Haiying Zhou, Kun Mean Hou, Christophe de Vaulx

, De-Cheng Zuo:
A Hybrid Embedded Real-time Operating System for Wireless Sensor Networks. 428-435 - Andréa C. Santos, Fatiha Bendali, Jean Mailfert, Christophe Duhamel

, Kean Mean Hou:
Heuristics for Designing Energy-efficient Wireless Sensor Network Topologies. 436-444 - Xunxing Diao, Messaoud Kara, Jian-Jin Li, Kun Mean Hou, Haiying Zhou, Aurélien Jacquot:

Cooperative Inter-vehicle Communication Protocol With Low Cost Differential GPS. 445-457
- Ling-Feng Chiang, Jiang-Whai Dai:

A New Method to Detect Abnormal IP Address on DHCP. 458-464 - Xiaorong Xu, Baoyu Zheng, Jingwu Cui, Wei-Ping Zhu

:
Performance Analysis of Diversity and Multiplexing Tradeoff and Distributed Space-Time Block Code in Cooperative MIMO Networks. 465-472 - Jaime Lloret, Miguel Garcia

, Fernando Boronat, Jesús Tomás:
A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks. 473-486 - Yi Zhang, Lina Zhu, Li Feng:

Key Management and Authentication in Ad Hoc Network based on Mobile Agent. 487-494 - Romildo Martins da Silva Bezerra, Joberto Sérgio Barbosa Martins

:
A Policy-Based Autonomic Model Suitable for Quality of Service Management. 495-504 - Kewen Li, Jing Tian:

The Multicast Routing QoS Based on the Improved ACO Algorithm. 505-510 - Mritunjay Rai, Shekhar Verma

, Shashikala Tapaswi:
A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks. 511-519 - Zhihong Huo, Yuan Zheng, Da Huang, Huajing Fang:

Robust Integrity Design for Nonlinear Networked Control Systems. 520-527 - Salem Belhaj, Moncef Tagina:

Modeling and Prediction of the Internet End-to-end Delay using Recurrent Neural Networks. 528-535
Volume 4, Number 7, September 2009
- Noureddine Boudriga, Habtamu Abie:

Guest Editorial. 537-538 - Slim Rekhis

, Noureddine Boudriga:
Investigating Attack Scenarios in Multihop Wireless Systems. 539-551 - Dennis K. Nilsson, Ulf Larson:

A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure. 552-564 - Reijo Savola, Habtamu Abie:

On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks. 565-579 - Francesco Palmieri

:
A Converged Charging Framework for Mobile Voice and Data Applications. 580-588 - Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:

Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams. 589-597 - Mohammad Mostafizur Rahman Mozumdar, Guofang Nan, Francesco Gregoretti, Luciano Lavagno, Laura Vanzago:

An Efficient Data Aggregation Algorithm for Cluster-based Sensor Network. 598-606 - Mohammad Al Saad, Elfriede Fehr, Nicolai Kamenzky, Jochen H. Schiller

:
Model-Driven Visual Testing and Debugging of WSN Applications. 607-621
- Yu Wang

, Shun-Zheng Yu:
Supervised Learning Real-time Traffic Classifiers. 622-629 - Manani M. Moutairou, Hasnaâ Aniss, Gilles Y. Delisle, Nadir Hakem:

Global Optimization of Multi Radio Mesh Access Point Location in Underground Area. 630-640 - Xiaohui Wang, Ai-Ling Wang, LingYan Wang:

Efficient ID-based Secure Encryption Scheme for Anonymous Receivers. 641-648 - Shuhua Wu, Yuefei Zhu:

Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting. 649-656 - Yuri Breitbart, Feodor F. Dragan, Hassan Gobjuka:

Effective Monitor Placement in Internet Networks. 657-666 - Cai Biao, Zhishu Li:

Computing and Routing for Trust in Structured P2P Network. 667-674
Volume 4, Number 8, October 2009
- Mohammad S. Obaidat

, Joaquim Filipe
:
Guest Editorial. 675-676 - Kaiqi Xiong, David J. Thuente:

Dynamic Localization Schemes in Malicious Sensor Networks. 677-686 - Peter Hyun-Jeen Lee, Parampalli Udaya

, Shivaramakrishnan Narayan:
Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption, . 687-697 - Sergio Pozo

, Rafael Ceballos
, Rafael M. Gasca
:
A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. 698-710 - Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe:

Construction of a Shared Terminal System by LDAP-Smart Card Authentication Cooperation. 711-719 - Jorge E. López de Vergara

, Enrique Vázquez
, Antony Martin, Samuel Dubus, Marie-Noëlle Lepareux:
Use of Ontologies for the Definition of Alerts and Policies in a Network Security Platform. 720-733
- Hui Zhang, Haifeng Chen, Guofei Jiang, Xiaoqiao Meng, Kenji Yoshihira:

Fast Indexing for Large-scale Networked System Modeling. 734-742 - Yangcheng Huang, Sidath Handurukande, Saleem N. Bhatti

:
Autonomic MANET Routing Protocols. 743-753 - Carlos E. Otero

, Ivica Kostanic, Luis Daniel Otero
:
Development of a Simulator for Stochastic Deployment of Wireless Sensor Networks. 754-762 - Xiu Fu, Qiuliang Xu, Hao Wang:

A Provably-Secure Password-Authenticated Group Key Agreement in the Standard Model. 763-770 - Fujian Qin, Youyuan Liu:

Multipath Based QoS Routing in MANET. 771-778 - Ping He, Zengtang Qu:

Comparison Computing Based on Sub-optimum Analysis: A Guide System of Network Security. 779-786 - Hao Wang, Qiuliang Xu, Xiu Fu:

Revocable Attribute-based Key Agreement Protocol without Random Oracles. 787-794 - Ke Xiong, Yu Zhang, Zhengding Qiu, Dongmei Sun, Ya-juan Qin:

QoS-enhanced TNPOSS Network Model and its E2E Delay Bound for Multimedia Flows. 795-802
Volume 4, Number 9, November 2009
- Mohammad S. Obaidat

:
Guest Editorial. 803-804 - Kishore Angrishi, Ulrich Killat:

On the Observance of Approximate Invariance of Effective Bandwidth with Finite Number of Sources. 805-818 - Songrith Kittiperachol, Zhili Sun

, Haitham S. Cruickshank:
Integration of Linux TCP and Simulation: Verification, Validation and Application. 819-836 - Paolo Cremonesi

, Roberto Turrin, Vassil N. Alexandrov
:
Modeling the Effects of Node Heterogeneity on the Performance of Grid Applications. 837-854 - Mohamed Faten Zhani

, Halima Elbiaze, Farouk Kamoun
:
Analysis and Prediction of Real Network Traffic. 855-865 - Floriano De Rango, Fiore Veltri, Peppino Fazio

, Salvatore Marano:
Two-level Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks in Freeway and Manhattan Environments. 866-880 - Saleem N. Bhatti

, Martin Bateman:
Transport Protocol Throughput Fairness. 881-894 - Ashikur Rahman

, Md. Endadul Hoque, Farzana Rahman, Sabuj Kumar Kundu, Pawel Gburzynski:
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks. 895-904
- Tao Sheng, Jingli Zhou, Zhengbing Hu

:
Error Resilient Video Transmission over Wireless Networks Based on Wyner-Ziv Coding of Motion Regions. 905-912 - Guangming Xu, Weikang Zhu, Min Dai, Jianwei He, Chengkang Pan:

Hybrid Transmission Scheme for MIMO Relay Channels. 913-920 - Zaihong Zhou, Dongqing Xie, Wei Xiong:

A Novel Distributed Detection Scheme against DDoS Attack. 921-928
Volume 4, Number 10, December 2009
- Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Mohammad A. Karim

:
Guest Editorial. 929-930 - Presila Israt, Namvi Chakma, M. M. A. Hashem

:
A Fuzzy Logic-Based Adaptive Handoff Management Protocol for Next-Generation Wireless Systems. 931-940 - M. M. Hafizur Rahman, Yasushi Inoguchi, Yukinori Sato

, Yasuyuki Miura, Susumu Horiguchi:
Dynamic Communication Performance of the TESH Network under Nonuniform Traffic Patterns. 941-951 - Md. Mamun-ur-Rashid Khandker:

Distributed Control Routing Algorithms for Rearrangeably Nonblocking Optical Banyan Networks. 952-959 - Ghasem Mirjalily

, Parisa Bastani, Seyed Mohammad T. Almodarresi:
Performance Evaluation of Different QoS Models for Connecting Telephone Exchange Centers over Metro Ethernet Networks. 960-967 - Sheikh Mahbub Habib

, Cyril Jacob, Tomas Olovsson:
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones. 968-975 - Md. Osman Gani, Hasan Sarwar, Chowdhury Mofizur Rahman:

Prediction of State of Wireless Network Using Markov and Hidden Markov Model. 976-984
- Hui Cui

, Tianjie Cao:
An Novel Anonymous Authenticated and Key Exchange Protocol. 985-992 - Ling Chen, Hai-Ying Sun, Su Wang:

First Order Deceptive Problem of ACO and Its Performance Analysis. 993-1000 - Xin He, Xiaolin Gui:

The Localized Area Coverage algorithm Based on Game-Theory for WSN. 1001-1008 - Shigen Shen

, Lihua Ye, Guangxue Yue, Fei Yu:
Research of Secure Intranet/Internet Access Platform Based on Ontology. 1009-1016 - Jian Shu, Jiajie Gong, Yubin Chen, Linlan Liu:

BR2OM: RSSI-based Refinement and Optimization Mechanism for Wireless Sensor Networks. 1017-1025 - Jian Wen, Min Yu, Wenwen Huang, Mingxing Deng:

A Moving Control Strategy Based on RSSI Real-time Localization in Multi-tier Mobile Sensor Networks. 1026-1033 - Huagang Shao, Haiying Cheng, Xiao Chen:

Performing Admission Control Concurrently in Core-stateless Networks. 1034-1041 - Jun Cai, Shun-Zheng Yu, Jing-li Liu:

The Design of a Wireless Data Acquisition and Transmission System. 1042-1049 - Su Hu, Gang Wu, Shaoqian Li:

Preamble Design and Iterative Channel Estimation for OFDM/Offset QAM System. 1050-1057

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














