Search dblp for Publications

export results for "stream:streams/journals/nct:"

 download as .bib file

@article{DBLP:journals/nct/Ladvanszky21,
  author    = {J{\'{a}}nos Ladv{\'{a}}nszky},
  title     = {There is no Theoretical Limit for Noise Reduction in Digital Communications},
  journal   = {Netw. Commun. Technol.},
  volume    = {6},
  number    = {1},
  pages     = {34--42},
  year      = {2021},
  url       = {https://doi.org/10.5539/nct.v6n1p34},
  doi       = {10.5539/nct.v6n1p34},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Ladvanszky21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Lee21,
  author    = {Bruce Lee},
  title     = {Reviewer Acknowledgements for Network and Communication Technologies
               Vol. 6, No. 1},
  journal   = {Netw. Commun. Technol.},
  volume    = {6},
  number    = {1},
  pages     = {43},
  year      = {2021},
  url       = {https://doi.org/10.5539/nct.v6n1p43},
  doi       = {10.5539/nct.v6n1p43},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Lee21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Lin21,
  author    = {Bao{-}Shuh Paul Lin},
  title     = {Toward an AI-Enabled O-RAN-based and SDN/NFV-driven 5{\unicode{65319}}{\&}
               IoT Network Era},
  journal   = {Netw. Commun. Technol.},
  volume    = {6},
  number    = {1},
  pages     = {6},
  year      = {2021},
  url       = {https://doi.org/10.5539/nct.v6n1p6},
  doi       = {10.5539/nct.v6n1p6},
  timestamp = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Lin21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Sapaty21,
  author    = {Peter Simon Sapaty},
  title     = {Space Debris Removal under Spatial Grasp Technology},
  journal   = {Netw. Commun. Technol.},
  volume    = {6},
  number    = {1},
  pages     = {16--27},
  year      = {2021},
  url       = {https://doi.org/10.5539/nct.v6n1p16},
  doi       = {10.5539/nct.v6n1p16},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Sapaty21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Wang21,
  author    = {Jianyi Wang},
  title     = {The Performance and Future of {QUIC} Protocol in the Modern Internet},
  journal   = {Netw. Commun. Technol.},
  volume    = {6},
  number    = {1},
  pages     = {28--33},
  year      = {2021},
  url       = {https://doi.org/10.5539/nct.v6n1p28},
  doi       = {10.5539/nct.v6n1p28},
  timestamp = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Wang21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Zhao21,
  author    = {Yonghao Zhao},
  title     = {An Improved Indoor Positioning Method Based on Nearest Neighbor Interpolation},
  journal   = {Netw. Commun. Technol.},
  volume    = {6},
  number    = {1},
  pages     = {1},
  year      = {2021},
  url       = {https://doi.org/10.5539/nct.v6n1p1},
  doi       = {10.5539/nct.v6n1p1},
  timestamp = {Mon, 22 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Zhao21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AmusanTAA20,
  author    = {O. Amusan and
               Aderonke F. Thompson and
               Timilehin Aderinola and
               Boniface K. Alese},
  title     = {Modelling Malicious Attack in Social Networks},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {1},
  pages     = {37--43},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n1p37},
  doi       = {10.5539/nct.v5n1p37},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AmusanTAA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Chen20,
  author    = {Shi Chen},
  title     = {Indoor Localization Based on Fingerprint Clustering},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {2},
  pages     = {40--45},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n2p40},
  doi       = {10.5539/nct.v5n2p40},
  timestamp = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Chen20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Eddine20,
  author    = {Meftah Mohammed Charaf Eddine},
  title     = {A Comparative Study of Formal Approaches for Web Service Oriented
               Architecture},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {2},
  pages     = {15--33},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n2p15},
  doi       = {10.5539/nct.v5n2p15},
  timestamp = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Eddine20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/FuSY20,
  author    = {Guifang Fu and
               Kexin Shi and
               Kai Ye},
  title     = {The Influence of Social Support on College Students' Mobile Phone
               Dependence: The Mediating Role of Security},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {1},
  pages     = {44--50},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n1p44},
  doi       = {10.5539/nct.v5n1p44},
  timestamp = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/FuSY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/GeslinBSTKKB20,
  author    = {Erik Geslin and
               Olivier Bartheye and
               Colin T. Schmidt and
               Katy Tcha{-}Tokey and
               Teerawat Kulsuwan and
               Salah Keziz and
               Tanguy Belouin},
  title     = {Bernardo Autonomous Emotional Agents Increase Perception of {VR} Stimuli},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {1},
  pages     = {11--25},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n1p11},
  doi       = {10.5539/nct.v5n1p11},
  timestamp = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/GeslinBSTKKB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Ladvanszky20,
  author    = {J. Ladv{\'{a}}nszky},
  title     = {A Modification to the Shannon Formula},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {2},
  pages     = {1--6},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n2p1},
  doi       = {10.5539/nct.v5n2p1},
  timestamp = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Ladvanszky20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Lee20,
  author    = {Bruce Lee},
  title     = {Reviewer Acknowledgements for Network and Communication Technologies
               Vol. 5, No. 2},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {2},
  pages     = {46},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n2p46},
  doi       = {10.5539/nct.v5n2p46},
  timestamp = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Lee20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Lin20,
  author    = {Bao{-}Shuh Paul Lin},
  title     = {Toward an AI-Enabled SDN-based 5G {\&} IoT Network},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {2},
  pages     = {7--14},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n2p7},
  doi       = {10.5539/nct.v5n2p7},
  timestamp = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Lin20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Shen20,
  author    = {Neil Shen},
  title     = {The Newspaper Industry in a Changing Landscape The Shift in News Content
               of Various Newspapers as a Response to the Rise of Social Media},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {1},
  pages     = {1--10},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n1p1},
  doi       = {10.5539/nct.v5n1p1},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Shen20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/ThompsonODA20,
  author    = {Aderonke F. Thompson and
               Oghenerukevwe E. Oyinloye and
               Matthew T. David and
               Boniface K. Alese},
  title     = {A Secured System for Internet Enabled Host Devices},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {1},
  pages     = {26--36},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n1p26},
  doi       = {10.5539/nct.v5n1p26},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/ThompsonODA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Zhu20,
  author    = {Xuanyu Zhu},
  title     = {Indoor Localization Based on Optimized {KNN}},
  journal   = {Netw. Commun. Technol.},
  volume    = {5},
  number    = {2},
  pages     = {34--39},
  year      = {2020},
  url       = {https://doi.org/10.5539/nct.v5n2p34},
  doi       = {10.5539/nct.v5n2p34},
  timestamp = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Zhu20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Arslan19,
  author    = {Ayse Kok Arslan},
  title     = {Research Study: Towards a Collaborative Trust-Based Debugging Model
               for the Telecom Industry},
  journal   = {Netw. Commun. Technol.},
  volume    = {4},
  number    = {1},
  pages     = {36--51},
  year      = {2019},
  url       = {https://doi.org/10.5539/nct.v4n1p36},
  doi       = {10.5539/nct.v4n1p36},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Arslan19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/BenzidK19,
  author    = {Djedjiga Benzid and
               Michel Kadoch},
  title     = {Fountain Codes and Linear Filtring to Mitigate Pilot Contamination
               Issue in Massive MiMo},
  journal   = {Netw. Commun. Technol.},
  volume    = {4},
  number    = {1},
  pages     = {1--12},
  year      = {2019},
  url       = {https://doi.org/10.5539/nct.v4n1p1},
  doi       = {10.5539/nct.v4n1p1},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/BenzidK19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Hutaibat19,
  author    = {Areej Abed Hutaibat},
  title     = {Secure Image Steganography Algorithm Using Radial Basis Function Neural
               Network},
  journal   = {Netw. Commun. Technol.},
  volume    = {4},
  number    = {1},
  pages     = {16--25},
  year      = {2019},
  url       = {https://doi.org/10.5539/nct.v4n1p16},
  doi       = {10.5539/nct.v4n1p16},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/Hutaibat19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/IbhazeOAI19,
  author    = {Augustus Ehiremen Ibhaze and
               Ignatius K. Okakwu and
               Ayobami T. Akinrelere and
               Agbotiname Lucky Imoize},
  title     = {An Intelligent Dispatch System Operating in a Partially Closed Environment},
  journal   = {Netw. Commun. Technol.},
  volume    = {4},
  number    = {1},
  pages     = {26--35},
  year      = {2019},
  url       = {https://doi.org/10.5539/nct.v4n1p26},
  doi       = {10.5539/nct.v4n1p26},
  timestamp = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/IbhazeOAI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/JiY19,
  author    = {Yanhui Ji and
               Hao Yang},
  title     = {Comparation of LoRa and NB-IoT},
  journal   = {Netw. Commun. Technol.},
  volume    = {4},
  number    = {1},
  pages     = {13--15},
  year      = {2019},
  url       = {https://doi.org/10.5539/nct.v4n1p13},
  doi       = {10.5539/nct.v4n1p13},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/JiY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/JanQ18,
  author    = {Saeed Ullah Jan and
               Fawad Qayum},
  title     = {A Robust Authentication Scheme for Client-Server Architecture With
               Provable Security Analysis},
  journal   = {Netw. Commun. Technol.},
  volume    = {3},
  number    = {1},
  pages     = {6--25},
  year      = {2018},
  url       = {https://doi.org/10.5539/nct.v3n1p6},
  doi       = {10.5539/nct.v3n1p6},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/JanQ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/OjugoO18,
  author    = {Arnold Adimabua Ojugo and
               D. O. Otakore},
  title     = {Redesigning Academic Website for Better Visibility and Footprint:
               {A} Case of the Federal University of Petroleum Resources Effurun
               Website},
  journal   = {Netw. Commun. Technol.},
  volume    = {3},
  number    = {1},
  pages     = {33--44},
  year      = {2018},
  url       = {https://doi.org/10.5539/nct.v3n1p33},
  doi       = {10.5539/nct.v3n1p33},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/OjugoO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/OyewoleNOS18,
  author    = {Ogunsanwo Gbenga Oyewole and
               Goga Nicholas and
               Oludele Awodele and
               Okolie Samuel},
  title     = {Comparison of De-Noising Algorithms Technique},
  journal   = {Netw. Commun. Technol.},
  volume    = {3},
  number    = {1},
  pages     = {26--32},
  year      = {2018},
  url       = {https://doi.org/10.5539/nct.v3n1p26},
  doi       = {10.5539/nct.v3n1p26},
  timestamp = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/OyewoleNOS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/ZhangLZ18,
  author    = {Guohua Zhang and
               Zhen Li and
               Qiaoli Zhang},
  title     = {Controllability of Complex Power Networks},
  journal   = {Netw. Commun. Technol.},
  volume    = {3},
  number    = {1},
  pages     = {1--5},
  year      = {2018},
  url       = {https://doi.org/10.5539/nct.v3n1p1},
  doi       = {10.5539/nct.v3n1p1},
  timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/ZhangLZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AhujaM13,
  author    = {Sanjay P. Ahuja and
               Bryan Moore},
  title     = {State of Big Data Analysis in the Cloud},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {1},
  pages     = {62--68},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n1p62},
  doi       = {10.5539/nct.v2n1p62},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AhujaM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AhujaM13a,
  author    = {Sanjay P. Ahuja and
               Bryan Moore},
  title     = {A Survey of Cloud Computing and Social Networks},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {2},
  pages     = {11--16},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n2p11},
  doi       = {10.5539/nct.v2n2p11},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AhujaM13a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Benomar13,
  author    = {Ahmed Benomar},
  title     = {Cylindrical Dielectric Resonator Antenna for {SHF} Band Application},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {1},
  pages     = {28--33},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n1p28},
  doi       = {10.5539/nct.v2n1p28},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Benomar13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/FongW13,
  author    = {Ken Kin{-}Kiu Fong and
               Stanley Kam Sing Wong},
  title     = {Exploring the Weak Links of Internet Security: {A} Study of WiFi Security
               in Hong Kong},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {2},
  pages     = {17--28},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n2p17},
  doi       = {10.5539/nct.v2n2p17},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/FongW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/LarsenV13,
  author    = {Morten N. Larsen and
               Brian Vinter},
  title     = {Transparent Offloading of Computationally Demanding Operations in
               Microsoft .NET},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {1},
  pages     = {52--61},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n1p52},
  doi       = {10.5539/nct.v2n1p52},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/LarsenV13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/OgbulezieOUU13,
  author    = {Julie C. Ogbulezie and
               M. U. Onuu and
               J. O. Ushie and
               B. E. Usibe},
  title     = {Propagation Models for {GSM} 900 and 1800 MHz for Port Harcourt and
               Enugu, Nigeria},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {2},
  pages     = {1--10},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n2p1},
  doi       = {10.5539/nct.v2n2p1},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/OgbulezieOUU13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/PirovanoG13,
  author    = {Alain Pirovano and
               Fabien Garcia},
  title     = {A New Survey on Improving {TCP} Performances over Geostationary Satellite
               Link},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {1},
  pages     = {1--18},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n1p1},
  doi       = {10.5539/nct.v2n1p1},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/PirovanoG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/SanchesSBHB13,
  author    = {Pedro Sanches and
               Eric{-}Oluf Svee and
               Markus Bylund and
               Benjamin Hirsch and
               Magnus Boman},
  title     = {Knowing Your Population: Privacy-Sensitive Mining of Massive Data},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {1},
  pages     = {34--51},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n1p34},
  doi       = {10.5539/nct.v2n1p34},
  timestamp = {Mon, 02 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/nct/SanchesSBHB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/SukhovC13,
  author    = {Andrei M. Sukhov and
               D. Yu. Chemodanov},
  title     = {The Neighborhoods Method and Virtual Polar Coordinates in Wireless
               Sensor Networks},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {1},
  pages     = {19--27},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n1p19},
  doi       = {10.5539/nct.v2n1p19},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/SukhovC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/WaziriADIMA13,
  author    = {Victor O. Waziri and
               Ojeniyi J. Adebayo and
               Hakimi Danladi and
               Audu Isah and
               Abubakar S. Magaji and
               Muhammad Bashir Abdullahi},
  title     = {Network Security in Cloud Computing with Elliptic Curve Cryptography},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {2},
  pages     = {43--58},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n2p43},
  doi       = {10.5539/nct.v2n2p43},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/WaziriADIMA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/WuHSBG13,
  author    = {Yeqing Wu and
               Fei Hu and
               Qingquan Sun and
               Ke Bao and
               Mengcheng Guo},
  title     = {A Fast Raptor Codes Decoding Strategy for Real-Time Communication
               Systems},
  journal   = {Netw. Commun. Technol.},
  volume    = {2},
  number    = {2},
  pages     = {29--42},
  year      = {2013},
  url       = {https://doi.org/10.5539/nct.v2n2p29},
  doi       = {10.5539/nct.v2n2p29},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/WuHSBG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AhujaK12,
  author    = {Sanjay P. Ahuja and
               Deepa Komathukattil},
  title     = {A Survey of the State of Cloud Security},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {66--75},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p66},
  doi       = {10.5539/nct.v1n2p66},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AhujaK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AhujaM12,
  author    = {Sanjay P. Ahuja and
               Sindhu Mani},
  title     = {Availability of Services in the Era of Cloud Computing},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {2--6},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p2},
  doi       = {10.5539/nct.v1n1p2},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AhujaM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AhujaMZ12,
  author    = {Sanjay P. Ahuja and
               Sindhu Mani and
               Jesus Zambrano},
  title     = {A Survey of the State of Cloud Computing in Healthcare},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {12--19},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p12},
  doi       = {10.5539/nct.v1n2p12},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AhujaMZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AhujaR12,
  author    = {Sanjay P. Ahuja and
               Alan C. Rolli},
  title     = {Exploring the Convergence of Mobile Computing with Cloud Computing},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {97--102},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p97},
  doi       = {10.5539/nct.v1n1p97},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AhujaR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/AsllaniA12,
  author    = {Arben Asllani and
               Amjad Ali},
  title     = {Using Simulation to Investigate Virus Propagation in Computer Networks},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {76--85},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p76},
  doi       = {10.5539/nct.v1n2p76},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/AsllaniA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Bystricanova12,
  author    = {Anna Bystricanov{\'{a}}},
  title     = {Diagnostic of Fault-tolerant System {S7-400H}},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {20--27},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p20},
  doi       = {10.5539/nct.v1n2p20},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Bystricanova12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/CaballeroSZM12,
  author    = {Iker Caballero and
               Javier Vicente S{\'{a}}ez and
               Bego{\~{n}}a Garc{\'{\i}}a Zapirain and
               Amaia M{\'{e}}ndez},
  title     = {A Complete Interoperable eHealth System Based on ZigBee Pro Standard},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {79--96},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p79},
  doi       = {10.5539/nct.v1n1p79},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/CaballeroSZM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/ChenCLZ12,
  author    = {Jianwen Chen and
               Xiang Chen and
               Jing Liu and
               Ming Zhao},
  title     = {Open Wireless System Cloud: An Architecture for Future Wireless Communications
               System},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {28--35},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p28},
  doi       = {10.5539/nct.v1n2p28},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/ChenCLZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/ChowdhuryCNK12,
  author    = {Md. Samee Ullah Chowdhury and
               Shamit Chakraborty and
               Tanveer Arif Nipu and
               M. Shamim Kaiser},
  title     = {Dynamic Radio Resource Allocation for Macro-Femto Hybrid Cellular
               Network Maintaining Fairness},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {67--78},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p67},
  doi       = {10.5539/nct.v1n1p67},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/ChowdhuryCNK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/FemmamZB12,
  author    = {Smain Femmam and
               M. Faouzi Zerarka and
               Mohamed Ikbal Benakila},
  title     = {New Approach Construction for Wireless ZigBee Sensor Based on Embedding
               Pancake Graphs},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {7--25},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p7},
  doi       = {10.5539/nct.v1n1p7},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/FemmamZB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/GoonatilakeB12,
  author    = {Rohitha Goonatilake and
               Rafic Bachnak},
  title     = {Modeling Latency in a Network Distribution},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {1--11},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p1},
  doi       = {10.5539/nct.v1n2p1},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/GoonatilakeB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/HirataD12,
  author    = {Kouji Hirata and
               Dewiani},
  title     = {Dynamic Routing and Wavelength Assignment in Multifiber {WDM} Networks
               with Wavelength Conversion Capability},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {36--47},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p36},
  doi       = {10.5539/nct.v1n2p36},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/HirataD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/MostafaviMM12,
  author    = {Mohammad Ali Mostafavi and
               Ayyoub Akbari{-}Moghanjoughi and
               Hamid Mousavi},
  title     = {A Review and Performance Analysis of Reactive and Proactive Routing
               Protocols on {MANET}},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {48--58},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p48},
  doi       = {10.5539/nct.v1n2p48},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/MostafaviMM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/ParadiaKSDDGM12,
  author    = {Maria Paradia and
               Yiouli Kritikou and
               Vera Stavroulaki and
               Panagiotis Demestichas and
               George Dimitrakopoulos and
               Sotirios Glavas and
               Napoleon Mitsis},
  title     = {Introducing Cognition in Web-Based, Learning Management Systems for
               Vocabulary Teaching},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {51--66},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p51},
  doi       = {10.5539/nct.v1n1p51},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/ParadiaKSDDGM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/RahmanM12,
  author    = {Munshi Mahbubur Rahman and
               S. P. Majumder},
  title     = {Analysis of a Power Line Communication System Over a Non-white Additive
               Gaussian Noise Channel and Performance Improvement Using Diversity
               Reception},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {26--38},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p26},
  doi       = {10.5539/nct.v1n1p26},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/RahmanM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/SmritiKA12,
  author    = {Zannatul Ferdous Smriti and
               M. Shamim Kaiser and
               Kazi M. Ahmed},
  title     = {Interference Mitigation for OFDM-Based Joint Macro-Femto Cellular
               Networks},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {103--110},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p103},
  doi       = {10.5539/nct.v1n1p103},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/SmritiKA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/UtsumiZ12,
  author    = {Satoshi Utsumi and
               Salahuddin Muhammad Salim Zabir},
  title     = {Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary
               Internet},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {2},
  pages     = {59--65},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n2p59},
  doi       = {10.5539/nct.v1n2p59},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/UtsumiZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nct/Yan12,
  author    = {Bin Yan},
  title     = {Limit and Dynamics of Information Entropy in Transmission},
  journal   = {Netw. Commun. Technol.},
  volume    = {1},
  number    = {1},
  pages     = {39--50},
  year      = {2012},
  url       = {https://doi.org/10.5539/nct.v1n1p39},
  doi       = {10.5539/nct.v1n1p39},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/nct/Yan12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics