


Остановите войну!
for scientists:


default search action
Journal of Networks, Volume 7
Volume 7, Number 1, 2012
- Mohammad S. Obaidat
, José Luis Sevillano:
Guest Editorial. 1-3
- Issa Traoré, Isaac Woungang, Ahmed Awad El Sayed Ahmed, Mohammad S. Obaidat
:
Software Performance Modeling using the UML: a Case Study. 4-20 - Raffaele Bolla
, Riccardo Rapuzzi, Matteo Repetto
:
User-Centric Mobility for Multimedia Communication: Experience and Evaluation from a Live Demo. 21-36 - Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch:
Tracking Per-Flow State - Binned Duration Flow Tracking. 37-51 - Yang Hong, Changcheng Huang, James Yan:
Impact of Retransmission Mechanism on SIP Overload: Stability Condition and Overload Control. 52-62 - Juan Segovia, Pere Vilà
, Eusebi Calle
, José-Luis Marzo
:
Improving the Resilience of Transport Networks to Large-scale Failures. 63-72
- Alia Bellabas, Samer Lahoud
, Miklós Molnár
:
Performance Evaluation of Efficient Solutions for the QoS Unicast Routing. 73-80 - Lingxi Li, Dongsoo S. Kim:
Bounded Length Least-Cost Path Estimation in Wireless Sensor Networks Using Petri Nets. 81-87 - Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. 88-100 - Hao Chen, Tong Yang, Jianfu Teng, Hong He:
Interference Analysis of TD-SCDMA System and CDMA2000 System. 101-109 - Xiaohui Chen, Jing He, Bangjun Lei, Tingyao Jiang:
An Improved Localization Algorithm of Nodes in Wireless Sensor Network. 110-115 - Yaser M. Khamayseh
, Ruba Al-Salah, Muneer O. Bani Yassein
:
Malicious Nodes Detection in MANETs: Behavioral Analysis Approach. 116-125 - Matthias Vodel, Mirko Caspar, Wolfram Hardt:
Wake-Up-Receiver Concepts - Capabilities and Limitations. 126-134 - Jian Wang, Xingshu Chen, Dengqi Yang:
An Improved Adaptive Routing Algorithm Based on Link Analysis. 135-140 - Ya-qin Fan, Chi Li, Chao Sun:
Based on combination of L2TP and IPSec VPN security technology research. 141-148 - Yulong Huang, Zhihao Chen, Jianqing Xi:
A New RFID Tag Code Transformation Approach in Internet of Things. 149-156 - Xu Wu:
A Distributed Trust Evaluation Model for Mobile P2P Systems. 157-164 - Zhigang Liang, Yuhai Chen:
The Design and Implementation of Single Sign-on Based on Hybrid Architecture. 165-172 - Shunan Ma, Jingsha He
, Feng Gao:
An Access Control Model based on Multi-factors Trust. 173-178 - Gengxin Sun
, Fengjing Shao, Sheng Bin
:
A Private Data Transfer Protocol Based On A New High Secure Computer Architecture. 179-186 - Yanchao Niu, Deyun Gao, Shuai Gao, Ping Chen:
A Robust Localization in Wireless Sensor Networks against Wormhole Attack. 187-194 - Jian Shu, Ming Hong, Linlan Liu, Yebin Chen:
A Water Quality Monitoring Method Based on Fuzzy Comprehensive Evaluation in Wireless Sensor Networks. 195-202 - Jingjing Wang, Hao Zhang, Tingting Lv, T. Aaron Gulliver:
Capacity of 60 GHz Wireless Communication Systems over Fading Channels. 203-209 - Guoqiong Liao:
Data Synchronization and Resynchronization for Heterogeneous Databases Replication in Middleware-based Architecture. 210-217
Volume 7, Number 2, 2012
- Xi Chen, Shiguo Lian, Chu-Sing Yang, Stefanos Gritzalis
:
Guest Editorial. 219-221 - Hui Xu, Xiang Gu:
Extensive Design for Attack's Recognition and Resistance of Survivable Network. 222-228 - Lei Huang, Jiabing Wang, Xing He:
A Graph Clustering Algorithm Providing Scalability. 229-235 - Qian Mao, Chuan Qin
:
A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism. 236-242 - Peng Liu, Chuang Xu, Xiaoxuan Wang, Xiaoying Wang, Gonghua Xu:
A Statistical Amalgamation Approach for Ontologies. 243-248 - Yan Liu, Lian Liu, Junyong Luo:
Adaptive Ant Colony Clustering Method Applied to Finding Closely Communicating Community. 249-258 - Jianwen Sun, Zongkai Yang, Sanya Liu, Pei Wang
:
Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace. 259-266 - Peng Xiao, Jingsha He
, Yingfang Fu:
A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks. 267-274 - Yubo Song, Kan Zhou, Xi Chen:
Fake BTS Attacks of GSM System on Software Radio Platform. 275-281 - Ting Cui, Chenhui Jin:
Lower Bounds of Differential and Linear Active S-boxes for Generalized Feistel Network with SP Type F-function. 282-287 - Grant P. Millar, Emmanouil A. Panaousis, Christos Politis
:
Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions. 288-299 - Lansheng Han, Xiao Qu, Yuan Li, Tao Yin:
The Probability of Trojan Attacks on Multi-level Security Strategy based Network. 300-304 - Sugang Ma:
A Review on Cloud Computing Development. 305-310
- Alireza Shameli-Sendi, Michel R. Dagenais, Masoume Jabbarifar, Mario Couture:
Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model. 311-321 - Feng Gao, Jingsha He
, Shunan Ma:
Trust Based Privacy Protection Method in Pervasive Computing. 322-328 - Yang Lu:
Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System. 329-336 - Nan Feng, Jing Xie:
A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment. 337-344 - Hui Chen:
The Impact of Comments and Recommendation System on Online Shopper Buying Behaviour. 345-350 - Zhuoqun Xia, Zhigang Chen, Xiaoheng Deng, Ming Zhao:
An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game. 351-356 - Yong Xu, Tingting Yan:
Design and Analysis on Error Handing and Controlling Protocol in Mobile Payment. 357-364 - Yinghua Xue, Hongpeng Liu:
Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse. 365-369 - Peiyi Zhu, Weili Xiong, Ningning Qin, Baoguo Xu:
D-S Theory Based on an Improved PSO for Data Fusion. 370-376 - Chuiwei Lu, Zhengbing Hu
:
A Fuzzy Search Algorithm for Structured P2P Network Based on Multi-dimensional Semantic Matrix. 377-384 - Hongwei Chen, Hui Xu, Li Chen:
Incentive Mechanisms for P2P Network Nodes based on Repeated Game. 385-392 - Jun Tu, De-hua Li, Yingjiang Zhang, Zhiwei Ye, Wangyu Tong:
QoS Study Based On IEEE 802.16 Bandwidth Scheduling Strategy. 393-399 - Tongying Li, Zhenchao Zhang:
Vibration Data Processing Based on Petri Network in Wireless Sensor Networks. 400-407
Volume 7, Number 3, 2012
- Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman
, Mohammad A. Karim, Nurul I. Sarkar
:
Guest Editorial. 409-411 - Md. Motaharul Islam
, Eui-nam Huh:
Virtualization in Wireless Sensor Network: Challenges and Opportunities. 412-418 - Md. Jahedul Islam
, Md. Rafiqul Islam:
Effect of Polarization Mode Dispersion on the BER Performance of Optical CDMA. 419-426 - Md. Shohrab Hossain
, Mohammed Atiquzzaman
, William D. Ivancic:
Cost and Efficiency Analysis of NEMO Protocol Entities. 427-440 - Vikram Arkalgud Chandrasetty, Syed Mahfuzul Aziz
:
A Highly Flexible LDPC Decoder using Hierarchical Quasi-Cyclic Matrix with Layered Permutation. 441-449 - Md. Mahiuddin
, Md. Saiful Islam:
Analysis of Performance Limitations in Fiber Bragg Grating Based Optical Add-Drop Multiplexer due to Crosstalk. 450-455 - M. M. Hafizur Rahman, Yukinori Sato
, Yasushi Inoguchi:
High Performance Hierarchical Torus Network Under Adverse Traffic Patterns. 456-467 - M. M. Hafizur Rahman, Yukinori Sato
, Yasushi Inoguchi:
Dynamic Communication Performance Enhancement in Hierarchical Torus Network by Selection Algorithm. 468-479 - Tamal Chakraborty, Atri Mukhopadhyay
, Suman Bhunia
, Iti Saha Misra, Salil Kumar Sanyal:
An Optimization Technique for Improved VoIP Performance over Wireless LAN. 480-493
- Hongzeng He, Jingbo Sun, Yue Wang, Qi Liu, Jian Yuan:
Cluster Analysis Based Switching-off Scheme of Base Stations for Energy Saving. 494-501 - Yingying Qin, Rongbo Zhu:
Efficient Routing Algorithm Based on Decision-making Sequence in Wireless Mesh Networks. 502-509 - Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games. 510-516 - Tengyue Mao, Zhengquan Xu, Rui Hou, Min Peng:
Efficient Satellite Scheduling Based on Improved Vector Evaluated Genetic Algorithm. 517-523 - Feng Liang, Haoming Guo, Shengwei Yi, Shilong Ma:
A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems. 524-531 - Yongsheng Huang, Huamei Du, Genglu Zhang:
Clustering Model of P2P CDN Based on The Prediction of User Requirements. 532-539 - Liyun Su
, Qian Yang, Yuli Zhang, Jiaojun Li:
Noise Immunity of Duffing Oscillator And Its Applications in Weak UWB Signal Detection. 540-546 - Lizheng Guo
, Shuguang Zhao, Shigen Shen
, Changyuan Jiang:
Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm. 547-553 - Fangfeng Zhang, Jun Liu, Chunling Zuo:
Evolution Modeling of Complex Network Dynamics. 554-561 - Yuan Zhang, Shexiang Ma:
Power Allocation for Tri-node Cooperative Communication of Gaussian Channel Gains. 562-567 - Kaijian Liang, Linfeng Bai, Quan Liang, Xilong Qu:
Efficient Resource Reservation Scheme in Service-Oriented Network Environment. 568-575 - Zhitong Huang, Yuefeng Ji:
Future Unified Communication Based on Ubiquitous Hierarchical Generalized-Sensor Network Architecture. 576-583 - Li Yang, DaiYun Weng:
Research of Wireless Sensor Routing Algorithm Based on Uneven Clustering. 584-590 - Hui-Huang Chen, Ai-Min Lin:
Complex Network Characteristics and Invulnerability Simulating Analysis of Supply Chain. 591-597 - Hongzhe Xu, Jun Huang, Yaoming Zhou:
Reliability Modeling and Analysis of SCI Topological Network. 598-604
Volume 7, Number 4, 2012
- Xianzhong Chen, Yanchun Shen:
Research of RA Coding Algorithm Based on AWGN Channel. 605-612 - Min Huang, Qinpei Liang, Jianqing Xi:
A Parallel Disjointed Multi-path Routing Algorithm based on OLSR and Energy in Ad Hoc Networks. 613-620 - Xinlian Zhou, Bin Xiao:
A Clustering-Based K-Coverage Algorithm for Mobile Wireless Sensor Networks. 621-627 - Yanchun Shen, Dongmei Li, Yinpu Zhang:
Study on Channel Estimate and Joint Detection in 3G Network. 628-635 - Jun Zheng, Jiantao Gu, Jiansheng Gao:
Research of Financial Informationization Construction system based on VPN Technology. 636-643 - Jiantao Gu, Jun Zheng, Shufen Zhang:
A Graphical User Interface in WLAN Monitoring and Management System. 644-651 - Ming Lu:
Study on Secret Key Management Project of WSN Based on ECC. 652-659 - Zhihong Qian, Xue Wang, Shuang Zhu:
A Preamble Pattern Identification based Synchronization System for UWB-based Wireless Networks. 660-666 - Lina Lan, Jingli Mao, Xuerong Gou:
A Novel Lightweight Main Memory Database for Telecom Network Performance Management System. 667-674 - Yi-li Tan, Ye Zhao, Yourong Wang:
Power Network Voronoi Diagram and Dynamic Construction. 675-682 - Haoming Guo, Feng Liang, Yunzhen Liu:
Research on Sensor Cooperation for Distributed Emergency Response System. 683-690 - Sihai Zheng, Layuan Li, Yong Li:
A QoS Routing Protocol for Mobile Ad Hoc Networks Based on Multipath. 691-698 - Lu Lou, Xin Xu, Zhili Chen:
Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks. 699-706 - Jun Chen, Yuesheng Gu, Yanpei Liu:
Grid Service Concurrency Control Protocol. 707-714 - Min Zhao, Tao Zhang, Fangbin Ge, Zhijian Yuan:
RobotDroid: A Lightweight Malware Detection Framework On Smartphones. 715-722 - Xiaobo Wang, Xianwei Zhou, Junde Song:
Hypergraph based Model and Architecture for Planet Surface Networks and Orbit Access. 723-729 - Yinpu Zhang:
Study on Airspace Covert Communication Algorithm of Covert Communication System. 730-737 - Yongquan Cai, Zhanhai Luo, Yi Yang:
Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol. 738-745 - Yan-Pei Liu, Yuesheng Gu, Jun Chen:
A New Control Structure Model Based on Object-oriented Petri Nets. 746-753
Volume 7, Number 5, 2012
- Carmen Mas Machuca
, Norbert Hanik:
Guest Editorial. 755-756
- Abdulamir Ali, Jochen Leibrich, Werner Rosenkranz:
Design Considerations and Performance Comparison of High-Order Modulation Formats using OFDM. 757-763 - Vincenzo Eramo
, Lorenzo Piazzo
, Angelo Germoni, Antonio Cianfrani
, Marco Listanti
:
Dimensioning of Optical Codes in OCDM/WDM Optical Packet Switches. 764-769 - Oscar Gaete, Leonardo D. Coelho
, Bernhard Spinnler:
Performance of Stereo Multiplexing in Single Channel and DWDM Systems Using Direct Detection with Optimum Dispersion Maps. 770-775 - Brian Thomas Teipen, Michael H. Eiselt, Klaus Grobe, Jörg-Peter Elbers:
Adaptive Data Rates for Flexible Transceivers in Optical Networks. 776-782 - João Santos, João Pedro, Paulo P. Monteiro
, João Pires:
Optimization Framework for Supporting 40 Gb/s and 100 Gb/s Services over Heterogeneous Optical Transport Networks. 783-790 - Slavisa Aleksic
, Naida Fehratovic:
Scalability Analysis of Optical Intrasystem Interconnects. 791-799 - Ramon Aparicio-Pardo, Belen Garcia-Manrubia
, Nina Skorin-Kapov, Pablo Pavón-Mariño:
Heuristic Approaches for Periodic Reconfiguration of Lightpath-based Networks under Multi-hour Traffic. 800-811 - Burak Kantarci, Hussein T. Mouftah:
Delay-Constrained Admission and Bandwidth Allocation for Long-Reach EPON. 812-820 - Xiaowen Dong, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani
:
Energy Efficient Optical Networks with Minimized Non-Renewable Power Consumption. 821-831
- Xiang Gao, Yintang Yang, Duan Zhou, Jianxian Zhang, Changchun Chai:
Target Tracking Approximation Algorithms with Particle Filter Optimization and Fault-Tolerant Analysis in Wireless Sensor Networks. 832-837 - Yongxian Song, Juanli Ma, Xianjin Zhang, Yuan Feng:
Design of Wireless Sensor Network-Based Greenhouse Environment Monitoring and Automatic Control System. 838-844 - Hua Liang, Feng Zeng:
A Research on HCCA Mechanism of Wireless LAN Access. 845-849 - Fei Shao, Guoping Jiang:
Traffic Driven Epidemic Spreading in Homogeneous Networks with Community Structure. 850-855 - Zhiwen Wang, Lu Liu:
Co-occurrence Relation of DNS Queries Based Research on Botnet Activities. 856-862 - Qin Qia, Zhiwen Wang:
A New Attack Detection in Large Scale Network based on Entropy. 863-868 - Jun Wang, Weiru Chen:
A Dynamic Length Mechanism for Unite Frame on MAC Layer of FCS Based on UWB. 869-875 - Jin Qi, Shunyi Zhang, Lu Cao, Yanfei Sun, Ling Tan:
Cognitive Networks Autonomic Decision-making Approach Based on Influence Diagram. 876-883 - Xiangbin Yu, Xiaomin Chen, Yuyu Xin, Qiuming Zhu, Dazhuan Xu:
Multi-amplitude Differential Space-time Block Coding Scheme for Square/Non-Square Code Matrix in MIMO Systems. 884-892
Volume 7, Number 6, 2012
- Wenjia Niu, Gang Li
:
Guest Editorial. 893-894 - Nicholas Charles Patterson
, Michael Hobbs
:
Virtual World Security Inspection. 895-907 - Huy Quan Vu, Shaowu Liu
, Xinghua Yang, Zhi Li, Yongli Ren
:
Identifying Microphone from Noisy Recordings by Using Representative Instance One Class-Classification Approach. 908-917 - Haibo Li, Yang Li, Zhijun Zhao, Tao Lin, Hui Tang, Song Ci:
A SIP-based Real-time Traffic Mobility Support Scheme in Named Data Networking. 918-925 - Jun Lei, Xinghua Yang, Yinlong Liu, Yifang Qin, Hui Tang, Zhijun Zhao:
Using Physical-level Context Awareness to Improve Service Ranking in Wireless Sensor Network. 926-934 - Gleb Beliakov
, John Yearwood, Andrei V. Kelarev:
Application of Rank Correlation, Clustering and Classification in Information Security. 935-945 - Md. Rafiqul Islam, Ronghua Tian, Veelasha Moonsamy, Lynn Margaret Batten:
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods. 946-955
- Cui-Qin Dai, Fang-Lan Liao, Zu-Fan Zhang:
Packet Scheduling for Downlink OFDMA Wireless Systems with Heterogeneous Traffic. 956-961 - Nancy El Rachkidy, Alexandre Guitton, Michel Misson:
Pivot Routing Improves Wireless Sensor Networks Performance. 962-971