


default search action
Peer-to-Peer Networking and Applications, Volume 12
Volume 12, Number 1, January 2019
- Xiaoheng Deng, Jie Luo, Lifang He, Qiang Liu, Xu Li, Lin Cai

:
Cooperative channel allocation and scheduling in multi-interface wireless mesh networks. 1-12 - Paulo Henrique Cazarotto, Cristiano André da Costa

, Rodrigo da Rosa Righi, Jorge Luis Victória Barbosa
:
GTTracker: Location-aware hierarchical model for identifying M-commerce business opportunities. 13-31 - Haijiang Wang

, Xiaolei Dong, Zhenfu Cao
:
Secure and efficient encrypted keyword search for multi-user setting in cloud computing. 32-42 - AmirHosein Adavoudi-Jolfaei, Maede Ashouri-Talouki

, Seyed Farhad Aghili
:
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. 43-59 - Michael Lescisin, Qusay H. Mahmoud:

Ad-hoc messaging infrastructure for peer-to-peer communication. 60-73 - Guangyuan Wu, Zhigang Chen, Deyu Zhang, Jiaqi Liu:

Resource allocation algorithm with worst case delay guarantees in energy harvesting body area networks. 74-87 - Saeideh Rahimi, Mohammad Ali Jabraeil Jamali

:
A hybrid geographic-DTN routing protocol based on fuzzy logic in vehicular ad hoc networks. 88-101 - Santosh Kumar Das

, Sachin Tripathi
:
Energy efficient routing formation algorithm for hybrid ad-hoc network: A geometric programming approach. 102-128 - Saied Asghari, Nima Jafari Navimipour

:
Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm. 129-142 - Avinash Srinivasan

, Hatoon Aldharrab:
XTRA - eXtended bit-Torrent pRotocol for Authenticated covert peer communication - Authenticated covert P2P communication. 143-157 - Jia Wu

, Zhigang Chen, Ming Zhao:
Weight distribution and community reconstitution based on communities communications in social opportunistic networks. 158-166 - Abdulhamid Zahedi

, Faryad Parma:
An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. 167-176 - Junjie Su

, Qian Deng, Dongyang Long:
PCLNC: A low-cost intra-generation network coding strategy for P2P content distribution. 177-188 - Xu Qin, Baoxian Zhang, Cheng Li

:
Localized topology control and on-demand power-efficient routing for wireless ad hoc and sensor networks. 189-208 - Mohammad Nikravan

, Ali Movaghar, Mehdi Hosseinzadeh
:
A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. 209-226 - Mohammad Nikravan

, Ali Movaghar, Mehdi Hosseinzadeh
:
Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. 227 - Lei Wang, Siran Liu, Mingkai Chen, Guan Gui

, Hikmet Sari:
Sidelobe interference reduced scheduling algorithm for mmWave device-to-device communication networks. 228-240 - Robabeh Ghafouri

, Ali Movaghar, Mehran Mohsenzadeh
:
A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds. 241-268 - Desheng Wang, Wenting Ding, Xiaoqiang Ma

, Hongbo Jiang, Feng Wang, Jiangchuan Liu:
MiFo: A novel edge network integration framework for fog computing. 269-279 - Zhiwei Zhao, Zhixin Liu

, Panpan Wang, Xinping Guan:
An approach of robust power control for cognitive radio networks based on chance constraints. 280-290
Volume 12, Number 2, March 2019
- Ahmed E. Kamal, Liangxiu Han

, Lu Liu, Sohail Jabbar
:
Guest editorial: Special issue on software defined networking: Trends, challenges, and prospective smart solutions. 291-294 - Zhijie Fan, Ya Xiao

, Amiya Nayak
, Chengxiang Tan:
An improved network security situation assessment approach in software defined networks. 295-309 - Xing Yin, Liangmin Wang

, Shunrong Jiang:
A hierarchical mobility management scheme based on software defined networking. 310-325 - Tong Bai, Jinzhao Lin, Guoquan Li, Huiqian Wang, Peng Ran, Zhangyong Li, Yu Pang

, Wei Wu, Gwanggil Jeon:
An optimized protocol for QoS and energy efficiency on wireless body area networks. 326-336 - Xiaojun Xu, Shuliang Wang

, Ying Li:
Identification and predication of network attack patterns in software-defined networking. 337-347 - (Withdrawn) Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network. 348-356

- Zahid Ullah

, Imran Ahmed
, Kaleem Razzaq Malik, Muhammad Kashif Naseer, Naveed Ahmed:
DSCB: Dual sink approach using clustering in body area network. 357-370 - Syed Bilal Hussian Shah, Zhe Chen, Fuliang Yin, Awais Ahmad

:
Water rippling shaped clustering strategy for efficient performance of software define wireless sensor networks. 371-380 - Chenxi Li, Xiaofei Liao, Hai Jin:

Enhancing application performance via DAG-driven scheduling in task parallelism for cloud center. 381-391 - Kaleem Razzaq Malik, Tauqir Ahmad, Muhammad Farhan

, Mai Alfawair:
Enhancing SDN performance by enabling reasoning abilities in data traffic control. 392-404 - Bo Yi, Xingwei Wang, Min Huang, Lianbo Ma:

SDN and NFV enabled service function multicast mechanisms over hybrid infrastructure. 405-421 - Zhuo Li, Xin Chen, Lulu Li, Xiangkun Wang:

Joint routing and scheduling for transmission service in software-defined full-duplex wireless networks. 422-429 - Junbi Xiao

, Song Chen, Mengmeng Sui:
The strategy of path determination and traffic scheduling in private campus networks based on SDN. 430-439 - Hong Zhong, Jianqiao Sheng, Yan Xu, Jie Cui

:
SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers. 440-451 - Tao Hu

, Julong Lan, Jianhui Zhang, Wei Zhao:
EASM: Efficiency-aware switch migration for balancing controller loads in software-defined networking. 452-464 - Dongyang Li

, Chang-you Xing, Ningyun Dai, Fei Dai, Guomin Zhang:
Estimating SDN traffic matrix based on online adaptive information gain maximization method. 465-480 - Peiying Zhang

, Haipeng Yao, Maozhen Li, Yunjie Liu:
Virtual network embedding based on modified genetic algorithm. 481-492 - Nasrin Sultana, Naveen K. Chilamkurti, Wei Peng

, Rabei Alhadad
:
Survey on SDN based network intrusion detection system using machine learning approaches. 493-501 - Zhaohui Zhang

, Lina Ge, Pengwei Wang
, Xinxin Zhou:
Behavior Reconstruction Models for Large-scale Network Service Systems. 502-513 - Sahrish Khan Tayyaba

, Munam Ali Shah
:
Resource allocation in SDN based 5G cellular networks. 514-538
Volume 12, Number 3, May 2019
- Shibo He, Dong-Hoon Shin, Yuanchao Shu

:
Editorial: Network coverage: From theory to practice. 539-540 - Chakchai So-In

, Tri Gia Nguyen
, Gia Nhu Nguyen
:
An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks. 541-552 - Mingfeng Huang, Anfeng Liu

, Ming Zhao, Tian Wang
:
Multi working sets alternate covering scheme for continuous partial coverage in WSNs. 553-567 - Xu Hui, Bailing Wang, Song Jia

, Haohan Hong, Xiaolei Zhang:
An algorithm for calculating coverage rate of WSNs based on geometry decomposition approach. 568-576 - Jia Xu, Wei Lu, Lijie Xu, Dejun Yang, Tao Li:

Incentive mechanisms for mobile crowd sensing based on supply-demand relationship. 577-588 - Yanjun Li

, Chung Shue Chen, Kaikai Chi, Jianhui Zhang:
Two-tiered relay node placement for WSN-based home health monitoring system. 589-603 - Margarita Vitoropoulou, Vasileios Karyotis

, Symeon Papavassiliou:
Sensing and monitoring of information diffusion in complex online social networks. 604-619 - Hassan Harb

, Abdallah Makhoul
:
Energy-efficient scheduling strategies for minimizing big data collection in cluster-based sensor networks. 620-634 - Wei Li

, Jianhui Zhang, Feilong Jiang, Zhi Li, Chong Xu:
Asynchronous neighbor discovery with unreliable link in wireless mobile networks. 635-646 - Md Yeakub Hassan

, Faisal Hussain, Salimur Choudhury
:
Connectivity preserving obstacle avoidance localized motion planning algorithms for mobile wireless sensor networks. 647-659 - Yushun Tan

, Menghui Xiong, Dongsheng Du, Shumin Fei:
Hybrid-triggered state feedback H ∞ control for networked control systems with stochastic nonlinearity and quantization. 660-676 - Daxing Xu, Yan Qin

, Heng Zhang, Li Yu, Hailun Wang:
Set-valued Kalman filtering: Event triggered communication with quantized measurements. 677-688
Volume 12, Number 4, July 2019
- Somaieh Zakariayi, Shahram Babaie

:
DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks. 689-704 - Chandrima Chakrabarti, Siuli Roy, Souvik Basu

:
Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN. 705-723 - Rogelio Hasimoto-Beltrán

, Francisco de Asís López-Fuentes
, Misael Vera-Lopez:
Hierarchical P2P architecture for efficient content distribution. 724-739 - Rui Hou, Lang Zhang, Yong Zheng, Yuzhou Chang, Bing Li, Tao Huang

, Jiangtao Luo:
Service-differentiated QoS routing based on ant colony optimisation for named data networking. 740-750 - Marco Antonio D'Alessandro Costa, Marcelo Gonçalves Rubinstein

:
Performance analysis of a locality-aware BitTorrent protocol in enterprise networks. 751-762 - Pelayo Nuño

, Juan C. Granda, Francisco J. Suárez
, Daniel F. García:
Using self-regulation to increase resilience in overlay networks for interactive multimedia communications. 763-776 - Ghofrane Fersi

, Maher Ben Jemaa:
An analytical study of the main characteristics of Cluster-based Energy-aware Virtual Ring Routing (CLEVER): Number of clusters, number of hops and cluster diameter. 777-788 - Fan Wu

, Wang Yang, Guochao He:
FDCP: cache placement model for information-centric networking using fluid dynamics theory. 789-808 - André Sampaio, Pedro Sousa

:
An adaptable and ISP-friendly multicast overlay network. 809-829 - Ahsan Hussain

, Bettahally N. Keshavamurthy:
A multi-dimensional routing based approach for efficient communication inside partitioned social networks. 830-849 - Hyunsoo Kwon

, Changhee Hahn
, Kyungtae Kang, Junbeom Hur
:
Secure deduplication with reliable and revocable key management in fog computing. 850-864 - Ricardo Guedes, Vasco Furtado

, Tarcisio H. C. Pequeno, Joel J. P. C. Rodrigues:
Pareto set as a model for dispatching resources in emergency Centres. 865-880 - V. Kavidha

, S. Ananthakumaran
:
Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. 881-892 - Jinguo Li

, Mi Wen, Kui Wu, Kejie Lu, Fengyong Li, Hongjiao Li:
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. 893-911 - Anil Thomas

, Gunasekaran Raja
:
FINDER: A D2D based critical communications framework for disaster management in 5G. 912-923 - Jian Shen

, Huijie Yang, Anxi Wang
, Tianqi Zhou, Chen Wang
:
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. 924-933 - Xiaoqin Feng

, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang
, Hui Li:
Pruneable sharding-based blockchain protocol. 934-950 - Francis N. Nwebonyi

, Rolando Martins
, Manuel Eduardo Correia
:
Reputation based approach for improved fairness and robustness in P2P protocols. 951-968 - Abdessamed Derder

, Samira Moussaoui, Zouina Doukha, Abdelwahab Boualouache
:
An online target tracking protocol for vehicular Ad Hoc networks. 969-988 - Shubham Gupta

, Balu L. Parne, Narendra S. Chaudhari:
PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network. 989-1011
Volume 12, Number 5, September 2019
- Xianfu Meng

, Yu Deng:
A time-aware resource search strategy with the ant colony optimization in MANETs. 1013-1027 - Tongrang Fan, Shixun Xiong, Wenbin Zhao, Tao Yu:

Information spread link prediction through multi-layer of social network based on trusted central nodes. 1028-1040 - Chao Sha, Lian-hua Zhong, Yao Bian, Dandan Song, Chunhui Ren:

A type of energy-efficient target tracking approach based on grids in sensor networks. 1041-1060 - Yesudhas Harold Robinson

, Eanoch Golden Julie, Raghvendra Kumar, Le Hoang Son:
Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. 1061-1075 - Alagan Ramasamy Rajeswari, Kanagasabai Kulothungan

, Sannasi Ganapathy
, Arputharaj Kannan
:
A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. 1076-1096 - Jian Wang

, Yanli Wang, Guosheng Zhao, Zhong-Nan Zhao:
Location protection method for mobile crowd sensing based on local differential privacy preference. 1097-1109 - Sandeep Verma

, Neetu Sood, Ajay Kumar Sharma:
A novelistic approach for energy efficient routing using single and multiple data sinks in heterogeneous wireless sensor network. 1110-1136 - Khaled Hamouid, Kamel Adi

:
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. 1137-1155 - Balu L. Parne

, Shubham Gupta
, Narendra S. Chaudhari:
PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks. 1156-1177 - Hui Li, Lishuang Pei, Dan Liao, Gang Sun

, Du Xu:
Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET. 1178-1193 - D. Dhanya

, D. Arivudainambi
:
Dolphin partner optimization based secure and qualified virtual machine for resource allocation with streamline security analysis. 1194-1213 - Ki-Il Kim

, Sana Ullah, Christos V. Verikoukis, Han-Chieh Chao
:
Editorial on "Special issue on fog computing for healthcare". 1214-1215 - Yannis Nikoloudakis

, Evangelos Pallis
, George Mastorakis, Constandinos X. Mavromoustakis, Charalabos Skianis, Evangelos K. Markakis:
Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case. 1216-1224 - Iván García-Magariño, José Varela Aldás

, Guillermo Palacios Navarro
, Jaime Lloret
:
Fog computing for assisting and tracking elder patients with neurodegenerative diseases. 1225-1235 - Rida Zojaj Naeem, Saman Bashir, Muhammad Faisal Amjad, Haider Abbas

, Hammad Afzal
:
Fog computing in internet of things: Practical applications and future directions. 1236-1262 - Fouzia Jabeen, Muazzam Maqsood

, Mustansar Ali Ghazanfar, Farhan Aadil
, Salabat Khan, Muhammad Fahad Khan
, Irfan Mehmood:
An IoT based efficient hybrid recommender system for cardiovascular disease. 1263-1276 - Shiyuan Tong, Yun Liu, Hsin-Hung Cho, Hua-Pei Chiang, Zhenjiang Zhang:

Joint radio resource allocation in fog radio access network for healthcare. 1277-1288 - Thaier Hayajneh

, Kristen N. Griggs, Muhammad Imran, Bassam Jamil Mohd:
Secure and efficient data delivery for fog-assisted wireless body area networks. 1289-1307 - Jiming Chen, Kaoru Ota

, Lu Wang
, Jianping He:
Big data and smart computing in network systems. 1308-1310 - Wenbin Yu

, Cailian Chen, Zhe Liu, Bo Yang, Xinping Guan:
DSESP: Dual sparsity estimation subspace pursuit for the compressive sensing based close-loop ecg monitoring structure. 1311-1322 - Alberto Aguilar, Camilo Lozoya

, Luis Orona:
A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks. 1323-1335 - Huajun Zhang, Erdong Deng, Haojin Zhu

, Zhenfu Cao
:
Smart contract for secure billing in ride-hailing service via blockchain. 1346-1357 - Zhun Li

, ByungSoo Ko, Ho-Jin Choi:
Naive semi-supervised deep learning using pseudo-label. 1358-1368 - Yazhou Yuan, Yuefeng Li, Zhixin Liu

, Kit Yan Chan, Shanying Zhu
, Xinping Guan:
A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment. 1369-1384 - Xinyang Jiang, Qiang Li

, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo:
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. 1385-1402 - Lei Shi

, Junping Du, MeiYu Liang, Feifei Kou:
Dynamic topic modeling via self-aggregation for short text streams. 1403-1417 - Minghui Zhao, Wei Wang

, Yitu Wang
, Zhaoyang Zhang
:
Load scheduling for distributed edge computing: A communication-computation tradeoff. 1418-1432 - Danfeng Yan, Xuan Zhao

, Rongheng Lin, Demeng Bai:
PPQAR: Parallel PSO for quantitative association rule mining. 1433-1444 - Bo Qiao

, Hao Yin:
A data-driven and the deep learning based CDN recommendation framework for ICPs. 1445-1453 - Guangsheng Feng

, Haibin Lv, Bingyang Li, Chengbo Wang, Hongwu Lv, Huiqiang Wang:
A near-optimal cloud offloading under multi-user multi-radio environments. 1454-1465 - Masoud Tahmasebi

, Mohammad Reza Khayyambashi:
An efficient model for vehicular cloud computing with prioritizing computing resources. 1466-1475
Volume 12, Number 6, November 2019
- Yong Jin, Hang Shen, Daniele D'Agostino, Nadjib Achir, James Nightingale:

Guest editorials: Special issue on fog/edge networking for multimedia applications. 1477-1479 - Yan Chen, Yu Wang, Daofu Gong:

Fog computing support scheme based on fusion of location service and privacy preservation for QoS enhancement. 1480-1488 - Feng Wang, Shaojiang Liu, Weichuan Ni, Zhiming Xu

, Zhiping Wan:
Heterogeneous mobile network access control technology based on mutual trust mechanism. 1489-1498 - Lu Liu:

Multimedia intelligent fog computing scheme based on robust perception for complex networks. 1499-1510 - Yuan Shu, Fuxi Zhu:

Green communication mobile convergence mechanism for computing self-offloading in 5G networks. 1511-1518 - Di Fan, Chunwei Zhu, Changzhi Lv:

Time delay estimation algorithm based on virtual Array and MUSIC for single sensor system. 1519-1527 - Zengzhen Shao

, Shulei Liu, Yanyu Zhao, Yanxiu Liu:
Identifying influential nodes in complex networks based on Neighbours and edges. 1528-1537 - Zengzhen Shao

, Shulei Liu, Yanyu Zhao, Yanxiu Liu:
Correction to: Identifying influential nodes in complex networks based on Neighbours and edges. 1538 - Yonggang Xu, Haohao Qi

, Tianyi Xu, Qianqian Hua, Hongsheng Yin, Gang Hua:
Queue models for wireless sensor networks based on random early detection. 1539-1549 - Lang Hu, Anfeng Liu, Mande Xie, Tian Wang

:
UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City. 1550-1574 - Wenjuan Zhang:

A data fusion privacy protection strategy with low energy consumption based on time slot allocation and relay in WBAN. 1575-1584 - Zijia Yu, Biao Lu:

A multipath routing protocol using congestion control in wireless multimedia sensor networks. 1585-1593 - Rongyu Tian, Hui Zhu:

Complex application identification and private network mining algorithm based on traffic-aware model in large-scale networks. 1594-1605 - Chunguang Zhang, Guangping Zeng

, Hongbo Wang, Xuyan Tu:
Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things. 1606-1614 - Suqin Wu:

Communication modulation recognition algorithm based on STFT mechanism in combination with unsupervised feature-learning network. 1615-1623 - Heng Zhang, Zhiguo Shi, Mohammed Chadli

, Yanzheng Zhu, Zhaojian Li:
Guest editorial: Networked cyber-physical systems: Optimization theory and applications. 1624-1626 - Jinlong Ma, Zhichao Ju

:
Cascading failure model of scale-free networks for avoiding edge failure. 1627-1637 - Qingshan Wang, Haoen Yang

, Qi Wang, Wei Huang, Bin Deng:
A deep learning based data forwarding algorithm in mobile social networks. 1638-1650 - Wei Shen, Jiehao Wang:

A robust controller design for networked hydraulic pressure control system based on CPR. 1651-1661 - Mengni Ruan, Xin Chen, Huan Zhou:

Centrality prediction based on K-order Markov chain in Mobile Social Networks. 1662-1672 - Qiaoyan Li, Anfeng Liu, Tian Wang

, Mande Xie, Neal N. Xiong
:
Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications. 1673-1704 - Yulian Jiang

, Yuhang Zhang, Shenquan Wang:
Distributed adaptive consensus control for networked robotic manipulators with time-varying delays under directed switching topologies. 1705-1715 - Kaili Sun, Song Zhu:

The express decay effect of time delays for globally exponentially stable nonlinear stochastic systems. 1716-1725 - Lei Mo

, Angeliki Kritikakou
:
Mapping imprecise computation tasks on cyber-physical systems. 1726-1740 - Hui Peng, Junzheng Wang, Wei Shen

, Dawei Shi:
Cooperative attitude control for a wheel-legged robot. 1741-1752 - Chao Ma

, Erlong Kang:
Distributed consensus of networked markov jump multi-agent systems with mode-dependent event-triggered communications and switching topologies. 1753-1760 - Xiaolei Ji, Yang Wang:

Quantized control for nonhomogeneous Markovian jump T-S fuzzy systems with missing measurements. 1761-1773 - Jinhui Wu, Xu Chen, Andong Liu

, Li Yu:
Predictive control for visual servoing control of cyber physical systems with packet loss. 1774-1784 - Jian Zhao, Chengzhuo Han, Zhengqi Cui, Rui Wang, Tingting Yang:

Cyber-physical battlefield perception systems based on machine learning technology for data delivery. 1785-1798 - Fei Xiang, Daofu Gong, Jie Li, Fenlin Liu:

A code protection method against function call analysis in P2P network. 1799-1809 - Dongzhe Wang, Shuyuan Wang, Shuai Yuan, Bo Cai, Lixian Zhang:

Guaranteed performance control of switched linear systems: A differential-Riccati-equation-based approach. 1810-1819 - Guangsheng Feng

, Chengbo Wang, Bingyang Li, Haibin Lv, Xiaoxiao Zhuang, Hongwu Lv, Huiqiang Wang, Xianlang Hu:
UAV-assisted wireless relay networks for mobile offloading and trajectory optimization. 1820-1834

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














