


default search action
Journal of Networks, Volume 8
Volume 8, Number 1, 2013
- Mohammad S. Obaidat
, Daniel Cascado Caballero, José Luis Sevillano
, Joaquim Filipe
:
Guest Editorial. 1-3 - Wouter van Kleunen, Nirvana Meratnia, Paul J. M. Havinga:
Simplified Scheduling for Underwater Acoustic Networks. 4-14 - Christos Bouras, Savvas Charalambides, Kostas Stamos
, Stamatis Stroumpis, Giannis Zaoudis:
Power Management Mechanism Exploiting Network and Video Information over Wireless Links. 15-25 - Muath A. Obaidat, Mohamed A. Ali, Ihsan Shahwan, Mohammad S. Obaidat
, Suhaib Obeidat:
QoS-Aware Multipath Communications over MANETs. 26-36 - José Antonio Gómez Martin, Ana Verónica Medina Rodríguez, Enrique Dorronzoro Zubiete, Octavio Rivera Romero
, Sergio Martín Guillén
:
Fingerprint Indoor Position System Based. 37-44 - Diego Francisco Larios
, Julio Barbancho, Francisco Javier Molina, Carlos León:
Localization method for low-power wireless sensor networks. 45-58 - Ran Zhao, Kirusnapillai Selvarajah, Neil A. Speirs:
Development Tools for Context Aware and Secure Pervasive Computing in Embedded Systems (PECES) Middleware. 59-70 - Jawad Khalife, Amjad Hajjar, Jesús Esteban Díaz Verdejo:
Performance of OpenDPI in Identifying Sampled Network Traffic. 71-81 - Mario H. A. C. Adaniya, Taufik Abrão
, Mario Lemes Proença Jr.
:
Anomaly Detection Using Metaheuristic Firefly Harmonic Clustering. 82-91
- Daochao Huang, Dong Yang, Hongke Zhang, Fuhong Lin
:
Efficient DoS-limiting Support by Indirect Mapping in Networks with Locator/Identifier Separation. 92-99 - Gang Nie, Xiuhua Qing:
Comparison and Handover Performance Evaluation of the Macro-mobility Protocol. 100-107 - Haina Rong, Jixiang Cheng, Yuquan Li:
Radar Emitter Signal Analysis with Estimation of Distribution Algorithms. 108-115 - Ying Guo, Yutao Liu:
Time Synchronization for Mobile Underwater Sensor Networks. 116-123 - Xiaoting Han
, Li Niu:
On Charactering of Information Propagation in Online Social Networks. 124-131 - Shouzhi Xu, Pengfei Guo, Bo Xu, Huan Zhou:
QoS Evaluation of VANET Routing Protocols. 132-139 - Jin Yang, Cilin Wang, Caiming Liu, Le Yu:
Cloud Computing for Network Security Intrusion Detection System. 140-147 - Ding Wang
, Chunguang Ma, Qi-Ming Zhang, Sendong Zhao:
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach. 148-155 - Dan Feng, Chuanhe Huang, Bo Wang, Junyu Zhu, Liya Xu:
Mutihop-enabled Trusted Handoff Algorithm in Heterogeneous Wireless Networks. 156-164 - Haipeng Qu, Lili Wen, Yanfei Xu, Ning Wang:
LCCWS: Lightweight Copyfree Cross-layer Web Server. 165-173 - Xin Hou, Xingfeng Wei, Ertian Hua, Yujing Kong:
Self-Adaptive and Energy-Efficient MAC Protocol Based on Event-Driven. 174-181 - Jiangtao Zhai
, Guangjie Liu, Yuewei Dai:
An Improved Retransmission-based Network Steganography: Design and Detection. 182-188 - Wei Kuang Lai, Kai-Ting Yang:
Cross-Layer Dual Domain Scheduler for 3GPP-Long Term Evolution. 189-196 - Guangsong Yang, Mingbo Xiao, Shuqin Zhang:
Data Aggregation Scheme based on Compressed Sensing in Wireless Sensor Network. 197-204 - Yunlu Ni, Hang Chen:
Detection of Underwater Carrier-Free Pulse based on Time-Frequency Analysis. 205-212 - Wei Gao, Zhirong Guo:
Speed Sensorless Control of PMSM using Model Reference Adaptive System and RBFN. 213-220 - Xiancun Zhou, Yan Xiong, Mingxi Li:
Detection System of Clone Attacks based on RSSI in Wireless Sensor Networks. 221-228 - Yuan Wang, Liang Hu, Jian Feng Chu, Xiao Bo Xu:
Analysis and Improvement for SPINS. 229-236 - Wen Xiong, Yaohong Jin:
Semantic MMT Model Based on Hierarchical Network of Concepts in Chinese-English MT. 237-244 - Weiming Tong, Xianji Jin, Lei Lu:
Optimized Information Transmission Scheduling Strategy Oriented to Advanced Metering Infrastructure. 245-252 - Lu Han
, Liyan Han, Hongwei Zhao:
Credit Scoring Model Hybridizing Artificial Intelligence with Logistic Regression. 253-261
Volume 8, Number 2, 2013
- Mohamed Lahby
, Leghris Cherkaoui
, Abdellah Adib
:
A Novel Ranking Algorithm Based Network Selection For Heterogeneous Wireless Access. 263-272 - Zhizhong Wu, Xuehai Zhou, Jun Xu:
A Result Fusion based Distributed Anomaly Detection System for Android Smartphones. 273-282 - Ming Zhao, Tao Luo, Changchuan Yin, Guangxin Yue, Xiaojun Wang
:
Dynamic Spectrum Management with Competitive Market Equilibrium. 283-289 - Saber Zrelli, Nobuo Okabe, Yoichi Shinoda:
XKDCP: An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations. 290-296 - Basheer Al-Duwairi, Zakaria Al-Qudah, Manimaran Govindarasu:
A Novel Scheme for Mitigating Botnet-Based DDoS Attacks. 297-306 - Mohammad Fraiwan, Manimaran Govindarasu:
Empowering PlanetLab: A Method for TCP Evaluation Over the Planetary-scale Testbed. 307-316 - Rony Hasinur Rahman, Craig R. Benson, Frank Jiang, Michael R. Frater:
LOARP: A Low Overhead Routing Protocol for Underwater Acoustic Sensor Networks. 317-330 - Jin Li:
Model and Simulation for Collaborative VRPSPD. 331-338 - Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu
, Yonghui Zheng, Jinlong Fei:
An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data. 339-344 - Mehrnaz Moudi, Mohamed Othman:
A Cost-Effective Architecture For Optical Multistage Interconnection Network. 345-350 - Pasquale Pace
, Gianluca Aloi
:
Managing and Deploying Pervasive Wireless Internet Access through Attractive Connection Sharing and Reselling Mechanisms. 351-364 - Zhongsheng Huang, Wensheng Li, Zhifang Feng, Huaming Xing:
On Nonnegative Signed Domination in Graphs and its Algorithmic Complexity. 365-372 - Hongwei Liu, Peng Zhang, Jun Liu:
Public Data Integrity Verification for Secure Cloud Storage. 373-380 - Xiaomin Wang, Yangyang Lu:
Algorithm of Solutions for Solving Generalized Mixed Implicit Equilibrium Problems. 381-388 - Peng Yang, Jin Qin, Wenliang Zhou
:
Multi-Commodity Flow and Multi-Period Equilibrium Model of Supply Chain Network with Postponement Strategy. 389-396 - Ying Chen, Shaobai Zhang:
Notice of Violation of Academy Publisher Publication Principles "Learning Tract Variables with Distal Supervised Learning Model". 397-404 - Bin Chen, Hong-zhen Yang, Li-wen Wang:
Single Neuron PID Control of Aircraft Deicing Fluids Rapid Heating System. 405-412 - Xiaoyan Gao:
Optimality and Duality for Non-smooth Multiple Objective Semi-infinite Programming. 413-420 - Yong Ma, Yanguang Sun, Yujiao Zeng:
Parameter Identification for Iron and Steel Enterprise Steam Network Model. 421-428 - Haijing Zhu:
Estimates of Weighted Hardy-Littlewood Inequality for Differential Forms. 429-436 - Li Guo Zhang, Hua Zuo
:
Pareto Optimal Solution Analysis of Convex Multi-Objective Programming Problem. 437-444 - Jingmin Wang, Yanmei Li:
Research on EPC Project Risk Evaluation based on FAHP and TOPSIS. 445-452 - Wei-Min Cheng, Wen Nie, Gang Zhou
, Jun-lei Yang:
Research on Eddy Air-Curtain Dust Controlled Flow Field in Hard Rock Mechanized Driving Face. 453-460 - Shaowei Shen, Zuiyi Shen, Bing Xu:
Analysis of Fishery Production Efficiency based on the Three-Stage DEA. 461-468 - Min Zhao, Tao Zhang, Jinshuang Wang, Zhijian Yuan:
A Smartphone Malware Detection Framework Based on Artificial Immunology. 469-476 - Haiyan Hu, Pengfei Wang, Lining Sun:
Simulation Platform of Monitoring and Tracking Micro System for Dangerous Chemicals Transportation. 477-484 - Hai-Yan Jiang, Xing-ce Wang, Zhongke Wu, Mingquan Zhou, Xuesong Wang:
Topic Information Collection based on the Hidden Markov Model. 485-492 - Fei Pu:
Modular Reversibility Analysis in Self-loops Connections of Petri Net Systems. 493-500 - Zuwei Yu, Gan Wang, Hongwei Hu:
Intertemporal Dynamics: Convergence Speed of Current Account across Countries. 501-506 - Wenjing Liao, Z. Balzen:
LSSVM Network Flow Prediction Based on the Self-adaptive Genetic Algorithm Optimization. 507-512
Volume 8, Number 3, 2013
- Kuo-Feng Huang, Shih-Jung Wu:
Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks. 513-517 - Kasman Suhairi, Ford Lumban Gaol:
The Measurement of Optimization Performance of Managed Service Division with ITIL Framework using Statistical Process Control. 518-529 - Mohammed D. Halloush
, Tasneem Dawahdeh:
On Varying Network Coding Forwarding Ratio in Vector Based Wireless Sensor Networks. 530-536 - Vinod Mirchandani, Peter Bertók
:
Optimized Energy Management for Mixed Uplink Traffic in LTE UE. 537-551 - Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu
, Jinlong Fei, Xin-Zheng He:
A Framework for Automated Security Proof and its Application to OAEP. 552-558 - Samaneh Movassaghi, Mehran Abolhasan
, Justin Lipman
:
A Review of Routing Protocols in Wireless Body Area Networks. 559-575 - Diego Mendez
, Miguel A. Labrador:
On Sensor Data Verification for Participatory Sensing Systems. 576-587 - Hung-Chin Jang
, Tzu-Yao Hsu:
Infrastructure Based Chord Structure for P2P File Sharing over Vehicular Network. 588-597 - Peng Chen, Lede Qiu, Feng Xu:
Downlink Power Control for CDMA Satellite Cognitive Radio. 598-606 - Yulong Wang, Jiakun Shen:
CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing. 607-615 - Luqiao Zhang, Qinxin Zhu, Juan Wang:
Adaptive Clustering for Maximizing Network Lifetime and Maintaining Coverage. 616-622 - Feng Zhao
, Xuezhi Lv, Hongbin Chen:
A Leakage-Based Beamforming Algorithm for Cognitive MIMO Systems via Game Theory. 623-627 - Ting T. Liu, Wei Yang, Chang L. Xu, Young-Il Kim:
A SNR-based Multi-channel Multicast Scheme for Popular Video in Wireless Networks. 628-635 - Xufei Zheng, Yonghui Fang, Yanhui Zhou, Jing Zhang:
A Novel Multi-layered Immune Network Intrusion Detection Defense Model: MINID. 636-644 - S. Kami Makki, Keenan B. Bonds:
Enhancing Node Cooperation in Mobile Ad Hoc Network. 645-649 - Yange Chen, Zhili Zhang, Qingfang Cui:
Design of Three-dimensional Interchange Network Based on IPv4/IPv6 Network. 650-657 - Baishun Su, Baoding Zhang:
Wireless Position Scheme based on ZigBee Network in the Freeway ETC System. 658-664 - Yang Ou, Yi-Ming Wang:
Multiple Antennas Spectrum Sensing for Cognitive Radio Networks. 665-671 - Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu:
An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering. 672-679 - Anhua Chen, Yang Pan, Lingli Jiang:
Improving K-means Clustering Method in Fault Diagnosis based on SOM Network. 680-687 - Zhang Ji Bo Ning:
Research on Web Information Retrieval based on Vector Space Model. 688-695 - Haihong Li, Luo Zhong, Huaxiong Yao:
Detecting Protein Complexes through Micro-Network Comparison in Protein-Protein Interaction Networks. 696-703 - Yuanqiang Chen:
Stability of Impulsive Cellular Neural Networks with Time-varying Delays. 704-711 - Qiufen Ni, Rongbo Zhu, Zhenguo Wu, Yongli Sun, Lingyun Zhou, Bin Zhou:
Spectrum Allocation Based on Game Theory in Cognitive Radio Networks. 712-722 - Zhenwu Wang, Xuejun Zhao, Benting Wan, Jun Xie, Pengfei Bai:
A Workflow-based RBAC Model for Web Services in Multiple Autonomous Domains. 723-730 - Jianqiang Tang, Ying Liu, Ming Wan, Hongke Zhang:
Blocking DoS Attack Traffic in Network with Locator/Identifier Separation. 731-738 - Xiaoyan Gao:
Optimality and Duality for Minimax Fractional Semi-Infinite Programming. 739-746
Volume 8, Number 4, 2013
- Mahdi Pirmoradian, Olayinka Adigun, Christos Politis
:
Adaptive Spectrum Opportunity Access in Cognitive Radio Networks. 747-754 - Jianjian Wang, Rongbo Zhu, Chenliang Qian:
Efficient Disengaging Hooks System Based on Constant-Power Speed Regulation of Frequency Converter. 755-760 - Hao Zhang, Wei Shi, Tingting Lu, Jingjing Wang, Xinjie Wang:
Performance Analysis of Multiple Access 60 GHz System Using Frequency-shifted Gaussian Pulse and Non-carrier PSWF Pulse. 761-768 - K. V. Krishnam Raju, V. Valli Kumari
:
Formal Verification of IEEE 802.11 Authentication Protocols. 769-778 - Yan Luo, Xuzhou Chen, Jie Wang:
A Virtual Network Embedding Algorithm for Providing Stronger Connectivity in the Residual Networks. 779-786 - Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun
:
Conflict-Aware Relay Selection for Multicast in MUD based Wireless Networks. 787-795 - Xiaolin Tan, Zhongyang Xiong, Yun He:
Signal Attenuation-aware Clustering in Wireless Mobile Ad Hoc Networks. 796-803 - Keiichi Endo, Kentaro Watanabe, Dai Okano, Kaname Amano:
An Efficient Position-based Broadcasting Method Considering Node Density in MANETs. 804-811 - Yulong Wang, Dong Wang, Lei Wang:
A Parsing Mode based Method for Malformed SIP Messages Testing for IMS Network. 812-821 - Zhiping Kang
, Honglin Yu, Qingyu Xiong:
Detection and Recovery of Coverage Holes in Wireless Sensor Networks. 822-828 - Hongyu Yang, Sen Wang, Yang Zhang:
Web Service Replacement Algorithm based on Complex Network. 829-835 - Xiaomao Huang, Xuan Li, Changjiang Long, Yun Gao:
Guaranteed Cost Fault-tolerant Control of Networked Control Systems with Short Output Delay and Short Control Delay Based on State Observer. 836-842 - Chun-Ying Liu:
Adaptive Search Protocol Based on Optimized Ant Colony Algorithm in Peer-to-Peer Network. 843-850 - Yuanqiang Chen, Renbi Tian:
Impulsive Tracking Control for Non-measurable State with Time-delay. 851-857 - Shi-Wen Chen, Jiang-xing Wu, Xiao-long Ye, Tong Guo:
Distributed Denial of Service Attacks Detection Method Based on Conditional Random Fields. 858-865 - Jianchang Lu, Leping Pei:
Security Evaluation of Power Network Information System Based on Analytic Network Process. 866-873 - Jinkui Hou, Lei Wang:
Formal Description for Component-based Architecture Model Transformation. 874-881 - Jianjun Li, Xibing Li, Xilong Qu:
Signature Analysis Based on Improved EMD with High-order Spline Interpolation. 882-887 - Chuan Cai, Liang Yuan:
Intrusion Detection System based on Ant Colony System. 888-894 - Kexin Xing, Qi Xu, Yegui Lin:
Identification Scheme of Surface Electromyography of Upper Limb Movement. 895-902 - Kai-Sheng Lu, Xiao-Bing Yi:
On Some Separability, Reducibility and Controllability Criteria of RLCM Networks over F(Z). 903-909 - Yuan Sun, Qian Wang:
Demand Analysis of Water Resources Based on Pulse Process of Complex System. 910-916 - Xia Yan, Hua Zhao:
Chinese Microblog Topic Detection Based on the Latent Semantic Analysis and Structural Property. 917-923 - Jun Zhu, Wankui Li, Lili Han:
PMSM Control System Based on Digital Signal Processor. 924-931 - Chuanyan Hou:
Study of Combinatorial Operator on Poisson Manifolds. 932-938 - Jianbin Xue, Ting Zhang, Yan Yan, Wenhua Wang, Songbai Li:
Cooperation-based Ant Colony Algorithm in WSN. 939-946 - Zhenwu Wang, Xuejun Zhao, Benting Wan, Jun Xie:
Research of BP Neural Network based on Improved Particle Swarm Optimization Algorithm. 947-954 - Weiping Zhang
, Regina Stoll
, Norbert Stoll, Kerstin Thurow:
An mHealth Monitoring System for Telemedicine Based on WebSocket Wireless Communication. 955-962 - Shaohua Jiang, Xia Hua:
Construction Site Environment Temperature Monitoring System Based on ZigBee and Virtual Instrument. 963-970 - Keqing Wang, Jianzhong Chen, Yingtao Niu, Yonggang Zhu:
A novel Spectrum Estimation Algorithm Based on Compressed Sensing and Multi-taper Method. 971-976