


Остановите войну!
for scientists:


default search action
Peer-to-Peer Networking and Applications, Volume 12
Volume 12, Number 1, January 2019
- Xiaoheng Deng, Jie Luo, Lifang He, Qiang Liu, Xu Li, Lin Cai
:
Cooperative channel allocation and scheduling in multi-interface wireless mesh networks. 1-12 - Paulo Henrique Cazarotto, Cristiano André da Costa
, Rodrigo da Rosa Righi, Jorge Luis Victória Barbosa
:
GTTracker: Location-aware hierarchical model for identifying M-commerce business opportunities. 13-31 - Haijiang Wang
, Xiaolei Dong, Zhenfu Cao
:
Secure and efficient encrypted keyword search for multi-user setting in cloud computing. 32-42 - AmirHosein Adavoudi-Jolfaei, Maede Ashouri-Talouki
, Seyed Farhad Aghili
:
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. 43-59 - Michael Lescisin, Qusay H. Mahmoud:
Ad-hoc messaging infrastructure for peer-to-peer communication. 60-73 - Guangyuan Wu, Zhigang Chen, Deyu Zhang, Jiaqi Liu:
Resource allocation algorithm with worst case delay guarantees in energy harvesting body area networks. 74-87 - Saeideh Rahimi, Mohammad Ali Jabraeil Jamali
:
A hybrid geographic-DTN routing protocol based on fuzzy logic in vehicular ad hoc networks. 88-101 - Santosh Kumar Das
, Sachin Tripathi
:
Energy efficient routing formation algorithm for hybrid ad-hoc network: A geometric programming approach. 102-128 - Saied Asghari, Nima Jafari Navimipour
:
Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm. 129-142 - Avinash Srinivasan
, Hatoon Aldharrab:
XTRA - eXtended bit-Torrent pRotocol for Authenticated covert peer communication - Authenticated covert P2P communication. 143-157 - Jia Wu
, Zhigang Chen, Ming Zhao:
Weight distribution and community reconstitution based on communities communications in social opportunistic networks. 158-166 - Abdulhamid Zahedi
, Faryad Parma:
An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. 167-176 - Junjie Su
, Qian Deng, Dongyang Long:
PCLNC: A low-cost intra-generation network coding strategy for P2P content distribution. 177-188 - Xu Qin, Baoxian Zhang, Cheng Li
:
Localized topology control and on-demand power-efficient routing for wireless ad hoc and sensor networks. 189-208 - Mohammad Nikravan
, Ali Movaghar, Mehdi Hosseinzadeh:
A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. 209-226 - Mohammad Nikravan
, Ali Movaghar, Mehdi Hosseinzadeh:
Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. 227 - Lei Wang, Siran Liu, Mingkai Chen, Guan Gui
, Hikmet Sari:
Sidelobe interference reduced scheduling algorithm for mmWave device-to-device communication networks. 228-240 - Robabeh Ghafouri
, Ali Movaghar, Mehran Mohsenzadeh
:
A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds. 241-268 - Desheng Wang, Wenting Ding, Xiaoqiang Ma
, Hongbo Jiang, Feng Wang, Jiangchuan Liu:
MiFo: A novel edge network integration framework for fog computing. 269-279 - Zhiwei Zhao, Zhixin Liu
, Panpan Wang, Xinping Guan:
An approach of robust power control for cognitive radio networks based on chance constraints. 280-290
Volume 12, Number 2, March 2019
- Ahmed E. Kamal, Liangxiu Han
, Lu Liu, Sohail Jabbar
:
Guest editorial: Special issue on software defined networking: Trends, challenges, and prospective smart solutions. 291-294 - Zhijie Fan, Ya Xiao
, Amiya Nayak
, Chengxiang Tan:
An improved network security situation assessment approach in software defined networks. 295-309 - Xing Yin, Liangmin Wang
, Shunrong Jiang:
A hierarchical mobility management scheme based on software defined networking. 310-325 - Tong Bai, Jinzhao Lin, Guoquan Li, Huiqian Wang, Peng Ran, Zhangyong Li, Yu Pang
, Wei Wu, Gwanggil Jeon:
An optimized protocol for QoS and energy efficiency on wireless body area networks. 326-336 - Xiaojun Xu, Shuliang Wang
, Ying Li:
Identification and predication of network attack patterns in software-defined networking. 337-347 - (Withdrawn) Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network. 348-356
- Zahid Ullah
, Imran Ahmed, Kaleem Razzaq Malik, Muhammad Kashif Naseer, Naveed Ahmed:
DSCB: Dual sink approach using clustering in body area network. 357-370 - Syed Bilal Hussian Shah, Zhe Chen, Fuliang Yin, Awais Ahmad
:
Water rippling shaped clustering strategy for efficient performance of software define wireless sensor networks. 371-380 - Chenxi Li, Xiaofei Liao, Hai Jin:
Enhancing application performance via DAG-driven scheduling in task parallelism for cloud center. 381-391 - Kaleem Razzaq Malik, Tauqir Ahmad, Muhammad Farhan
, Mai Alfawair:
Enhancing SDN performance by enabling reasoning abilities in data traffic control. 392-404 - Bo Yi, Xingwei Wang, Min Huang, Lianbo Ma:
SDN and NFV enabled service function multicast mechanisms over hybrid infrastructure. 405-421 - Zhuo Li, Xin Chen, Lulu Li, Xiangkun Wang:
Joint routing and scheduling for transmission service in software-defined full-duplex wireless networks. 422-429 - Junbi Xiao
, Song Chen, Mengmeng Sui:
The strategy of path determination and traffic scheduling in private campus networks based on SDN. 430-439 - Hong Zhong, Jianqiao Sheng, Yan Xu, Jie Cui
:
SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers. 440-451 - Tao Hu
, Julong Lan, Jianhui Zhang, Wei Zhao:
EASM: Efficiency-aware switch migration for balancing controller loads in software-defined networking. 452-464 - Dongyang Li
, Chang-you Xing, Ningyun Dai, Fei Dai, Guomin Zhang:
Estimating SDN traffic matrix based on online adaptive information gain maximization method. 465-480 - Peiying Zhang
, Haipeng Yao, Maozhen Li, Yunjie Liu:
Virtual network embedding based on modified genetic algorithm. 481-492 - Nasrin Sultana, Naveen K. Chilamkurti, Wei Peng, Rabei Alhadad
:
Survey on SDN based network intrusion detection system using machine learning approaches. 493-501 - Zhaohui Zhang
, Lina Ge, Pengwei Wang
, Xinxin Zhou:
Behavior Reconstruction Models for Large-scale Network Service Systems. 502-513 - Sahrish Khan Tayyaba, Munam Ali Shah
:
Resource allocation in SDN based 5G cellular networks. 514-538
Volume 12, Number 3, May 2019
- Shibo He, Dong-Hoon Shin, Yuanchao Shu:
Editorial: Network coverage: From theory to practice. 539-540 - Chakchai So-In
, Tri Gia Nguyen
, Gia Nhu Nguyen
:
An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks. 541-552 - Mingfeng Huang, Anfeng Liu
, Ming Zhao, Tian Wang
:
Multi working sets alternate covering scheme for continuous partial coverage in WSNs. 553-567 - Xu Hui, Bailing Wang, Song Jia
, Haohan Hong, Xiaolei Zhang:
An algorithm for calculating coverage rate of WSNs based on geometry decomposition approach. 568-576 - Jia Xu, Wei Lu, Lijie Xu, Dejun Yang, Tao Li:
Incentive mechanisms for mobile crowd sensing based on supply-demand relationship. 577-588 - Yanjun Li
, Chung Shue Chen, Kaikai Chi, Jianhui Zhang:
Two-tiered relay node placement for WSN-based home health monitoring system. 589-603 - Margarita Vitoropoulou, Vasileios Karyotis
, Symeon Papavassiliou:
Sensing and monitoring of information diffusion in complex online social networks. 604-619 - Hassan Harb
, Abdallah Makhoul
:
Energy-efficient scheduling strategies for minimizing big data collection in cluster-based sensor networks. 620-634 - Wei Li, Jianhui Zhang, Feilong Jiang, Zhi Li, Chong Xu:
Asynchronous neighbor discovery with unreliable link in wireless mobile networks. 635-646 - Md Yeakub Hassan
, Faisal Hussain, Salimur Choudhury
:
Connectivity preserving obstacle avoidance localized motion planning algorithms for mobile wireless sensor networks. 647-659 - Yushun Tan, Menghui Xiong, Dongsheng Du, Shumin Fei:
Hybrid-triggered state feedback H ∞ control for networked control systems with stochastic nonlinearity and quantization. 660-676 - Daxing Xu, Yan Qin
, Heng Zhang, Li Yu, Hailun Wang:
Set-valued Kalman filtering: Event triggered communication with quantized measurements. 677-688
Volume 12, Number 4, July 2019
- Somaieh Zakariayi, Shahram Babaie
:
DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks. 689-704 - Chandrima Chakrabarti, Siuli Roy, Souvik Basu
:
Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. 705-723 - Rogelio Hasimoto-Beltrán, Francisco de Asís López-Fuentes
, Misael Vera-Lopez:
Hierarchical P2P architecture for efficient content distribution. 724-739 - Rui Hou, Lang Zhang, Yong Zheng, Yuzhou Chang, Bing Li, Tao Huang, Jiangtao Luo:
Service-differentiated QoS routing based on ant colony optimisation for named data networking. 740-750 - Marco Antonio D'Alessandro Costa, Marcelo Gonçalves Rubinstein
:
Performance analysis of a locality-aware BitTorrent protocol in enterprise networks. 751-762 - Pelayo Nuño
, Juan C. Granda, Francisco J. Suárez
, Daniel F. García:
Using self-regulation to increase resilience in overlay networks for interactive multimedia communications. 763-776 - Ghofrane Fersi
, Maher Ben Jemaa:
An analytical study of the main characteristics of Cluster-based Energy-aware Virtual Ring Routing (CLEVER): Number of clusters, number of hops and cluster diameter. 777-788 - Fan Wu
, Wang Yang, Guochao He:
FDCP: cache placement model for information-centric networking using fluid dynamics theory. 789-808 - André Sampaio, Pedro Sousa
:
An adaptable and ISP-friendly multicast overlay network. 809-829 - Ahsan Hussain
, Bettahally N. Keshavamurthy:
A multi-dimensional routing based approach for efficient communication inside partitioned social networks. 830-849 - Hyunsoo Kwon
, Changhee Hahn
, Kyungtae Kang, Junbeom Hur
:
Secure deduplication with reliable and revocable key management in fog computing. 850-864 - Ricardo Guedes, Vasco Furtado
, Tarcisio H. C. Pequeno, Joel J. P. C. Rodrigues:
Pareto set as a model for dispatching resources in emergency Centres. 865-880 - V. Kavidha, S. Ananthakumaran
:
Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. 881-892 - Jinguo Li
, Mi Wen, Kui Wu, Kejie Lu, Fengyong Li, Hongjiao Li:
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. 893-911 - Anil Thomas
, Gunasekaran Raja
:
FINDER: A D2D based critical communications framework for disaster management in 5G. 912-923 - Jian Shen
, Huijie Yang, Anxi Wang
, Tianqi Zhou, Chen Wang
:
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. 924-933 - Xiaoqin Feng
, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang
, Hui Li:
Pruneable sharding-based blockchain protocol. 934-950 - Francis N. Nwebonyi
, Rolando Martins
, Manuel Eduardo Correia
:
Reputation based approach for improved fairness and robustness in P2P protocols. 951-968 - Abdessamed Derder
, Samira Moussaoui, Zouina Doukha, Abdelwahab Boualouache
:
An online target tracking protocol for vehicular Ad Hoc networks. 969-988 - Shubham Gupta
, Balu L. Parne, Narendra S. Chaudhari:
PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network. 989-1011
Volume 12, Number 5, September 2019
- Xianfu Meng
, Yu Deng:
A time-aware resource search strategy with the ant colony optimization in MANETs. 1013-1027 - Tongrang Fan, Shixun Xiong, Wenbin Zhao, Tao Yu:
Information spread link prediction through multi-layer of social network based on trusted central nodes. 1028-1040 - Chao Sha, Lian-hua Zhong, Yao Bian, Dandan Song, Chunhui Ren:
A type of energy-efficient target tracking approach based on grids in sensor networks. 1041-1060 - Yesudhas Harold Robinson
, Eanoch Golden Julie, Raghvendra Kumar, Le Hoang Son:
Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. 1061-1075 - Alagan Ramasamy Rajeswari, Kanagasabai Kulothungan
, Sannasi Ganapathy
, Arputharaj Kannan
:
A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. 1076-1096 - Jian Wang
, Yanli Wang, Guosheng Zhao, Zhong-Nan Zhao:
Location protection method for mobile crowd sensing based on local differential privacy preference. 1097-1109 - Sandeep Verma
, Neetu Sood, Ajay Kumar Sharma:
A novelistic approach for energy efficient routing using single and multiple data sinks in heterogeneous wireless sensor network. 1110-1136 - Khaled Hamouid, Kamel Adi:
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. 1137-1155 - Balu L. Parne
, Shubham Gupta, Narendra S. Chaudhari:
PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks. 1156-1177 - Hui Li, Lishuang Pei, Dan Liao, Gang Sun, Du Xu:
Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET. 1178-1193 - D. Dhanya
, D. Arivudainambi
:
Dolphin partner optimization based secure and qualified virtual machine for resource allocation with streamline security analysis. 1194-1213 - Ki-Il Kim
, Sana Ullah, Christos V. Verikoukis, Han-Chieh Chao:
Editorial on "Special issue on fog computing for healthcare". 1214-1215 - Yannis Nikoloudakis
, Evangelos Pallis
, George Mastorakis, Constandinos X. Mavromoustakis, Charalabos Skianis, Evangelos K. Markakis:
Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case. 1216-1224 - Iván García-Magariño, José Varela Aldás
, Guillermo Palacios Navarro
, Jaime Lloret
:
Fog computing for assisting and tracking elder patients with neurodegenerative diseases. 1225-1235 - Rida Zojaj Naeem, Saman Bashir, Muhammad Faisal Amjad, Haider Abbas
, Hammad Afzal
:
Fog computing in internet of things: Practical applications and future directions. 1236-1262 - Fouzia Jabeen, Muazzam Maqsood
, Mustansar Ali Ghazanfar, Farhan Aadil
, Salabat Khan, Muhammad Fahad Khan, Irfan Mehmood:
An IoT based efficient hybrid recommender system for cardiovascular disease. 1263-1276 - Shiyuan Tong, Yun Liu, Hsin-Hung Cho, Hua-Pei Chiang, Zhenjiang Zhang:
Joint radio resource allocation in fog radio access network for healthcare. 1277-1288 - Thaier Hayajneh
, Kristen N. Griggs, Muhammad Imran, Bassam Jamil Mohd:
Secure and efficient data delivery for fog-assisted wireless body area networks. 1289-1307 - Jiming Chen, Kaoru Ota
, Lu Wang
, Jianping He:
Big data and smart computing in network systems. 1308-1310 - Wenbin Yu
, Cailian Chen, Zhe Liu, Bo Yang, Xinping Guan:
DSESP: Dual sparsity estimation subspace pursuit for the compressive sensing based close-loop ecg monitoring structure. 1311-1322 - Alberto Aguilar, Camilo Lozoya
, Luis Orona:
A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks. 1323-1335 - Huajun Zhang, Erdong Deng, Haojin Zhu
, Zhenfu Cao
:
Smart contract for secure billing in ride-hailing service via blockchain. 1346-1357 - Zhun Li
, ByungSoo Ko, Ho-Jin Choi:
Naive semi-supervised deep learning using pseudo-label. 1358-1368 - Yazhou Yuan, Yuefeng Li, Zhixin Liu
, Kit Yan Chan, Shanying Zhu, Xinping Guan:
A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment. 1369-1384 - Xinyang Jiang, Qiang Li
, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo:
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. 1385-1402 - Lei Shi
, Junping Du, MeiYu Liang, Feifei Kou:
Dynamic topic modeling via self-aggregation for short text streams. 1403-1417 - Minghui Zhao, Wei Wang
, Yitu Wang
, Zhaoyang Zhang:
Load scheduling for distributed edge computing: A communication-computation tradeoff. 1418-1432 - Danfeng Yan, Xuan Zhao
, Rongheng Lin, Demeng Bai:
PPQAR: Parallel PSO for quantitative association rule mining. 1433-1444 - Bo Qiao
, Hao Yin:
A data-driven and the deep learning based CDN recommendation framework for ICPs. 1445-1453 - Guangsheng Feng
, Haibin Lv, Bingyang Li, Chengbo Wang, Hongwu Lv, Huiqiang Wang:
A near-optimal cloud offloading under multi-user multi-radio environments. 1454-1465 - Masoud Tahmasebi
, Mohammad Reza Khayyambashi:
An efficient model for vehicular cloud computing with prioritizing computing resources. 1466-1475
Volume 12, Number 6, November 2019
- Yong Jin, Hang Shen, Daniele D'Agostino, Nadjib Achir, James Nightingale:
Guest editorials: Special issue on fog/edge networking for multimedia applications. 1477-1479 - Yan Chen, Yu Wang, Daofu Gong:
Fog computing support scheme based on fusion of location service and privacy preservation for QoS enhancement. 1480-1488 - Feng Wang, Shaojiang Liu, Weichuan Ni, Zhiming Xu
, Zhiping Wan:
Heterogeneous mobile network access control technology based on mutual trust mechanism. 1489-1498 - Lu Liu:
Multimedia intelligent fog computing scheme based on robust perception for complex networks. 1499-1510 - Yuan Shu, Fuxi Zhu:
Green communication mobile convergence mechanism for computing self-offloading in 5G networks. 1511-1518 - Di Fan, Chunwei Zhu, Changzhi Lv:
Time delay estimation algorithm based on virtual Array and MUSIC for single sensor system. 1519-1527 - Zengzhen Shao
, Shulei Liu, Yanyu Zhao, Yanxiu Liu:
Identifying influential nodes in complex networks based on Neighbours and edges. 1528-1537 - Zengzhen Shao
, Shulei Liu, Yanyu Zhao, Yanxiu Liu:
Correction to: Identifying influential nodes in complex networks based on Neighbours and edges. 1538 - Yonggang Xu, Haohao Qi
, Tianyi Xu, Qianqian Hua, Hongsheng Yin, Gang Hua:
Queue models for wireless sensor networks based on random early detection. 1539-1549 - Lang Hu, Anfeng Liu,