Search dblp for Publications

export results for "toc:db/journals/jnca/jnca30.bht:"

 download as .bib file

@article{DBLP:journals/jnca/AbadehHL07,
  author       = {Mohammad Saniee Abadeh and
                  Jafar Habibi and
                  Caro Lucas},
  title        = {Intrusion detection using a fuzzy genetics-based learning algorithm},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {414--428},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.05.002},
  doi          = {10.1016/J.JNCA.2005.05.002},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AbadehHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AbidinCG07,
  author       = {Siti Z. Z. Abidin and
                  Min Chen and
                  Phil W. Grant},
  title        = {Designing interaction protocols using noughts and crosses type games},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {586--613},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.01.002},
  doi          = {10.1016/J.JNCA.2006.01.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AbidinCG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AbrahamJTH07,
  author       = {Ajith Abraham and
                  Ravi Jain and
                  Johnson P. Thomas and
                  Sang{-}Yong Han},
  title        = {{D-SCIDS:} Distributed soft computing intrusion detection system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {81--98},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.06.001},
  doi          = {10.1016/J.JNCA.2005.06.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AbrahamJTH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AbrahamSJJ07,
  author       = {Ajith Abraham and
                  Kate A. Smith and
                  Ravi Jain and
                  Lakhmi C. Jain},
  title        = {Network and information security: {A} computational intelligence approach:
                  Special Issue of Journal of Network and Computer Applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {1--3},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.06.004},
  doi          = {10.1016/J.JNCA.2005.06.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AbrahamSJJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Aguilar-PonceKTB07,
  author       = {Ruth Aguilar{-}Ponce and
                  Ashok Kumar and
                  J. Luis Tecpanecatl{-}Xihuitl and
                  Magdy A. Bayoumi},
  title        = {A network of sensor-based framework for automated visual surveillance},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1244--1271},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.011},
  doi          = {10.1016/J.JNCA.2006.04.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/Aguilar-PonceKTB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhnMH07,
  author       = {Gail{-}Joon Ahn and
                  Badrinath Mohan and
                  Seng{-}Phil Hong},
  title        = {Towards secure information sharing using role-based delegation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {42--59},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.004},
  doi          = {10.1016/J.JNCA.2005.08.004},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AhnMH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Al-TalibAKS07,
  author       = {Sahar A. Al{-}Talib and
                  Borhanuddin Mohd Ali and
                  Sabira Khatun and
                  Subramaniam Shamala},
  title        = {Improving the multicast state scalability in internet routers by integrating
                  hash algorithm with recursive unicast},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1445--1454},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.06.002},
  doi          = {10.1016/J.JNCA.2006.06.002},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/Al-TalibAKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BaiI07,
  author       = {Yan Bai and
                  Mabo Robert Ito},
  title        = {A new technique for minimizing network loss from users' perspective},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {637--649},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.01.003},
  doi          = {10.1016/J.JNCA.2006.01.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BaiI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BollenNGA07,
  author       = {Johan Bollen and
                  Michael L. Nelson and
                  Gary Geisler and
                  Raquel Araujo},
  title        = {Usage derived recommendations for a video digital library},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1059--1083},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.009},
  doi          = {10.1016/J.JNCA.2005.12.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BollenNGA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BossardtDP07,
  author       = {Matthias Bossardt and
                  Thomas D{\"{u}}bendorfer and
                  Bernhard Plattner},
  title        = {Enhanced Internet security by a distributed traffic control service
                  based on traffic ownership},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {841--857},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.006},
  doi          = {10.1016/J.JNCA.2005.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BossardtDP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BourasKM07,
  author       = {Christos Bouras and
                  Giorgos Kounenis and
                  Ioannis Misedakis},
  title        = {A web content manipulation technique based on page Fragmentation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {563--585},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.01.005},
  doi          = {10.1016/J.JNCA.2006.01.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BourasKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CallaghanHMMM07,
  author       = {Michael J. Callaghan and
                  Jim Harkin and
                  E. McColgan and
                  T. Martin McGinnity and
                  Liam P. Maguire},
  title        = {Client-server architecture for collaborative remote experimentation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1295--1308},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.006},
  doi          = {10.1016/J.JNCA.2006.09.006},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CallaghanHMMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CaoGYL07,
  author       = {Jin Cao and
                  Lei Guo and
                  Hongfang Yu and
                  Lemin Li},
  title        = {A novel recursive shared segment protection algorithm in survivable
                  {WDM} networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {677--694},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.003},
  doi          = {10.1016/J.JNCA.2005.12.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CaoGYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChangLL07,
  author       = {Chin{-}Chen Chang and
                  Chih{-}Yang Lin and
                  Keng{-}Chu Lin},
  title        = {Simple efficient mutual anonymity protocols for peer-to-peer network
                  based on primitive roots},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {662--676},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.004},
  doi          = {10.1016/J.JNCA.2005.12.004},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChangLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CharvillatG07,
  author       = {Vincent Charvillat and
                  Romulus Grigoras},
  title        = {Reinforcement learning for dynamic multimedia adaptation},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1034--1058},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.010},
  doi          = {10.1016/J.JNCA.2005.12.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CharvillatG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChenJHZR07,
  author       = {Hongsong Chen and
                  Zhenzhou Ji and
                  Mingzeng Hu and
                  Zhongchuan Fu and
                  Ruixiang Jiang},
  title        = {Design and performance evaluation of a multi-agent-based dynamic lifetime
                  security scheme for {AODV} routing protocol},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {145--166},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.09.006},
  doi          = {10.1016/J.JNCA.2005.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ChenJHZR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChenTD07,
  author       = {Shigang Chen and
                  Yong Tang and
                  Wenliang Du},
  title        = {Stateful DDoS attacks and targeted filtering},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {823--840},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.007},
  doi          = {10.1016/J.JNCA.2005.07.007},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChenTD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChoongAPY07,
  author       = {Khong Neng Choong and
                  Borhanuddin Mohd Ali and
                  Veeraraghavan Prakash and
                  Yoke Chek Yee},
  title        = {The case for a dynamic proxy framework with voluntary/incentive-based
                  client hosting scheme},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {167--185},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.09.004},
  doi          = {10.1016/J.JNCA.2005.09.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChoongAPY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CranleyPM07,
  author       = {Nicola Cranley and
                  Philip Perry and
                  Liam Murphy},
  title        = {Dynamic content-based adaptation of streamed multimedia},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {983--1006},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.006},
  doi          = {10.1016/J.JNCA.2005.12.006},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/CranleyPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/DuysburghLTDD07,
  author       = {Bart Duysburgh and
                  Thijs Lambrecht and
                  Filip De Turck and
                  Bart Dhoedt and
                  Piet Demeester},
  title        = {Design and analysis of a stable set-up protocol for transcoding multicast
                  trees in active networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1428--1444},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.06.003},
  doi          = {10.1016/J.JNCA.2006.06.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/DuysburghLTDD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/EstevePMM07,
  author       = {Manuel Esteve and
                  Carlos Enrique Palau and
                  J. Mart{\'{\i}}nez{-}Nohales and
                  Benjam{\'{\i}}n Molina},
  title        = {A video streaming application for urban traffic management},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {479--498},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.06.001},
  doi          = {10.1016/J.JNCA.2006.06.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/EstevePMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/FilibeliOC07,
  author       = {M. Can Filibeli and
                  {\"{O}}znur {\"{O}}zkasap and
                  M. Reha Civanlar},
  title        = {Embedded web server-based home appliance networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {499--514},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.001},
  doi          = {10.1016/J.JNCA.2006.04.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/FilibeliOC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GunesP07,
  author       = {Hatice Gunes and
                  Massimo Piccardi},
  title        = {Bi-modal emotion recognition from expressive face and body gestures},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1334--1345},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.007},
  doi          = {10.1016/J.JNCA.2006.09.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GunesP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GuoCYL07,
  author       = {Lei Guo and
                  Jin Cao and
                  Hongfang Yu and
                  Lemin Li},
  title        = {A new shared-risk link groups (SRLG)-disjoint path provisioning with
                  shared protection in {WDM} optical networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {650--661},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.005},
  doi          = {10.1016/J.JNCA.2005.12.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GuoCYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GuoSWL07,
  author       = {Hui Guo and
                  Guobin Shen and
                  Zhiguang Wang and
                  Shipeng Li},
  title        = {Optimized streaming media proxy and its applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {265--281},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.008},
  doi          = {10.1016/J.JNCA.2005.08.008},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GuoSWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GuoYL07,
  author       = {Lei Guo and
                  Hongfang Yu and
                  Lemin Li},
  title        = {Dynamic survivable algorithm for meshed {WDM} optical networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {282--295},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.006},
  doi          = {10.1016/J.JNCA.2005.08.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GuoYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/He07,
  author       = {Xiangjian He},
  title        = {Editorial},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1273--1274},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.001},
  doi          = {10.1016/J.JNCA.2006.09.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/He07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HeLL07,
  author       = {Rongxi He and
                  Bin Lin and
                  Lemin Li},
  title        = {Dynamic service-level-agreement aware shared-path protection in {WDM}
                  mesh networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {429--444},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.06.005},
  doi          = {10.1016/J.JNCA.2006.06.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HeLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JafarpourYB07,
  author       = {Hojjat Jafarpour and
                  Nasser Yazdani and
                  Navid Bazzazzadeh},
  title        = {A scalable group communication mechanism for mobile agents},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {186--208},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.09.002},
  doi          = {10.1016/J.JNCA.2005.09.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JafarpourYB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JannachL07,
  author       = {Dietmar Jannach and
                  Klaus Leopold},
  title        = {Knowledge-based multimedia adaptation for ubiquitous multimedia consumption},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {958--982},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.007},
  doi          = {10.1016/J.JNCA.2005.12.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JannachL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiaZH07,
  author       = {Wenjing Jia and
                  Huaifeng Zhang and
                  Xiangjian He},
  title        = {Region-based license plate detection},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1324--1333},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.010},
  doi          = {10.1016/J.JNCA.2006.09.010},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/JiaZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KalogerakiZGD07,
  author       = {Vana Kalogeraki and
                  Demetrios Zeinalipour{-}Yazti and
                  Dimitrios Gunopulos and
                  Alex Delis},
  title        = {Distributed middleware architectures for scalable media services},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {209--243},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.09.001},
  doi          = {10.1016/J.JNCA.2005.09.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KalogerakiZGD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Kateeb07,
  author       = {Ali El Kateeb},
  title        = {High-speed routers design using data stream distributor unit},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {133--144},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.09.005},
  doi          = {10.1016/J.JNCA.2005.09.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Kateeb07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KimD07,
  author       = {Suneuy Kim and
                  Chita R. Das},
  title        = {An analytical model for interval caching in interactive video servers},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {384--413},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.06.005},
  doi          = {10.1016/J.JNCA.2005.06.005},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KimD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LeeC07,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Secure communications for cluster-based ad hoc networks using node
                  identities},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1377--1396},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.10.003},
  doi          = {10.1016/J.JNCA.2006.10.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LeeC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LeuCS07,
  author       = {Jenq{-}Shiou Leu and
                  Yuan{-}Po Chi and
                  Wei{-}Kuan Shih},
  title        = {Design and implementation of Blog Rendering and Accessing INstantly
                  system {(BRAINS)}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {296--307},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.001},
  doi          = {10.1016/J.JNCA.2005.08.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LeuCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiYC07,
  author       = {Celia Li and
                  Cungang Yang and
                  Richard Cheung},
  title        = {Key management for role hierarchy in distributed systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {920--936},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.009},
  doi          = {10.1016/J.JNCA.2005.07.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiYC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiangYM07,
  author       = {Liang Wang and
                  Yiping Guo and
                  Ming Fang},
  title        = {Web search engine based on {DNS}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {466--478},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.06.006},
  doi          = {10.1016/J.JNCA.2006.06.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiangYM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiaoVP07,
  author       = {Yihua Liao and
                  V. Rao Vemuri and
                  Alejandro Pasos},
  title        = {Adaptive anomaly detection with evolving connectionist systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {60--80},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.005},
  doi          = {10.1016/J.JNCA.2005.08.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiaoVP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LinWL07,
  author       = {Rongping Lin and
                  Sheng Wang and
                  Lemin Li},
  title        = {Protections for multicast session in {WDM} optical networks under
                  reliability constraints},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {695--705},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.002},
  doi          = {10.1016/J.JNCA.2005.12.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LinWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LuH07,
  author       = {Tainchi Lu and
                  Chinghao Hsu},
  title        = {Mobile agents for information retrieval in hybrid simulation environment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {244--264},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.007},
  doi          = {10.1016/J.JNCA.2005.08.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LuH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MagoulasG07,
  author       = {George D. Magoulas and
                  George Ghinea},
  title        = {Intelligence-based adaptation for ubiquitous multimedia communications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {955--957},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.01.001},
  doi          = {10.1016/J.JNCA.2006.01.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MagoulasG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MartinezLP07,
  author       = {Christopher J. Martinez and
                  Wei{-}Ming Lin and
                  Parimal Patel},
  title        = {Optimal {XOR} hashing for non-uniformly distributed address lookup
                  in computer networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1397--1427},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.10.002},
  doi          = {10.1016/J.JNCA.2006.10.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MartinezLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/McGregorKT07,
  author       = {Carolyn McGregor and
                  Bruce Kneale and
                  Mark B. Tracy},
  title        = {On-demand Virtual Neonatal Intensive Care units supporting rural,
                  remote and urban healthcare with Bush Babies Broadband},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1309--1323},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.008},
  doi          = {10.1016/J.JNCA.2006.09.008},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/McGregorKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MillanRGJM07,
  author       = {Gabriel L{\'{o}}pez Mill{\'{a}}n and
                  {\'{O}}scar C{\'{a}}novas Reverte and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
                  Jes{\'{u}}s D. Jim{\'{e}}nez Re and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez},
  title        = {A network access control approach based on the {AAA} architecture
                  and authorization attributes},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {900--919},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.010},
  doi          = {10.1016/J.JNCA.2005.07.010},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MillanRGJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MinK07,
  author       = {Chan{-}Ho Min and
                  Sehun Kim},
  title        = {On-demand utility-based power control routing for energy-aware optimization
                  in mobile ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {706--727},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.001},
  doi          = {10.1016/J.JNCA.2005.12.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MinK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MorrisonS07,
  author       = {Donn Morrison and
                  Liyanage C. De Silva},
  title        = {Voting ensembles for spoken affect classification},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1356--1365},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.005},
  doi          = {10.1016/J.JNCA.2006.09.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MorrisonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/OGradyOD07,
  author       = {Michael J. O'Grady and
                  Gregory M. P. O'Hare and
                  C. Donaghey},
  title        = {Delivering adaptivity through context-awareness},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1007--1033},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.12.008},
  doi          = {10.1016/J.JNCA.2005.12.008},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/OGradyOD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/OuardaniPB07,
  author       = {Abdelhamid Ouardani and
                  Samuel Pierre and
                  Hanifa Boucheneb},
  title        = {A security protocol for mobile agents based upon the cooperation of
                  sedentary agents},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1228--1243},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.008},
  doi          = {10.1016/J.JNCA.2006.04.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/OuardaniPB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/OzcelikE07,
  author       = {Ibrahim {\"{O}}z{\c{c}}elik and
                  H{\"{u}}seyin Ekiz},
  title        = {Building an interconnection between {PROFIBUS} and {ATM} networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {800--817},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.09.003},
  doi          = {10.1016/J.JNCA.2005.09.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/OzcelikE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/OzyerAB07,
  author       = {Tansel {\"{O}}zyer and
                  Reda Alhajj and
                  Ken Barker},
  title        = {Intrusion detection by integrating boosting genetic fuzzy classifier
                  and data mining criteria for rule pre-screening},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {99--113},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.06.002},
  doi          = {10.1016/J.JNCA.2005.06.002},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/OzyerAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PadghamL07,
  author       = {Lin Padgham and
                  Wei Liu},
  title        = {Internet collaboration and service composition as a loose form of
                  teamwork},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1116--1135},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.006},
  doi          = {10.1016/J.JNCA.2006.04.006},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/PadghamL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PeddabachigariAGT07,
  author       = {Sandhya Peddabachigari and
                  Ajith Abraham and
                  Crina Grosan and
                  Johnson P. Thomas},
  title        = {Modeling intrusion detection system using hybrid intelligent systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {114--132},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.06.003},
  doi          = {10.1016/J.JNCA.2005.06.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/PeddabachigariAGT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PengLR07,
  author       = {Tao Peng and
                  Christopher Leckie and
                  Kotagiri Ramamohanarao},
  title        = {Information sharing for distributed intrusion detection systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {877--899},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.004},
  doi          = {10.1016/J.JNCA.2005.07.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PengLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Phillips-WrenMTI07,
  author       = {Gloria E. Phillips{-}Wren and
                  Anders I. M{\o}rch and
                  Jeffrey Tweedale and
                  Nikhil Ichalkaranje},
  title        = {Innovations in agent collaboration, cooperation and Teaming, Part
                  2},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1085--1088},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.002},
  doi          = {10.1016/J.JNCA.2006.04.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Phillips-WrenMTI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/QianSL07,
  author       = {Lijun Qian and
                  Ning Song and
                  Xiangfang Li},
  title        = {Detection of wormhole attacks in multi-path routed wireless ad hoc
                  networks: {A} statistical analysis approach},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {308--330},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.003},
  doi          = {10.1016/J.JNCA.2005.07.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/QianSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/QuinteroLC07,
  author       = {Alejandro Quintero and
                  Da Yu Li and
                  Harold Castro},
  title        = {A location routing protocol based on smart antennas for ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {614--636},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.01.004},
  doi          = {10.1016/J.JNCA.2006.01.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/QuinteroLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShinJCC07,
  author       = {Kwang{-}Sik Shin and
                  Jin{-}Ha Jung and
                  Jin Young Cheon and
                  Sang{-}Bang Choi},
  title        = {Real-time network monitoring scheme based on {SNMP} for dynamic information},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {331--353},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.002},
  doi          = {10.1016/J.JNCA.2005.07.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ShinJCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShinJYC07,
  author       = {Kwang{-}Sik Shin and
                  Jin{-}Ha Jung and
                  Wan{-}Oh Yoon and
                  Sang{-}Bang Choi},
  title        = {{P2P} transfer of partial stream in multimedia multicast},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {750--774},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.10.002},
  doi          = {10.1016/J.JNCA.2005.10.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ShinJYC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SirisS07,
  author       = {Vasilios A. Siris and
                  Ilias Stavrakis},
  title        = {Provider-based deterministic packet marking against distributed DoS
                  attacks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {858--876},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.005},
  doi          = {10.1016/J.JNCA.2005.07.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SirisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/StefanoPST07,
  author       = {Antonella Di Stefano and
                  Giuseppe Pappalardo and
                  Corrado Santoro and
                  Emiliano Tramontana},
  title        = {A framework for the design and automated implementation of communication
                  aspects in multi-agent systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1136--1152},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.007},
  doi          = {10.1016/J.JNCA.2006.04.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/StefanoPST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/StephenP07,
  author       = {Bruce Stephen and
                  Lykourgos Petropoulakis},
  title        = {The design and implementation of an agent-based framework for acceptable
                  usage policy monitoring and enforcement},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {445--465},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.06.004},
  doi          = {10.1016/J.JNCA.2006.06.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/StephenP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SuzukiSHIK07,
  author       = {Shinichi Suzuki and
                  Yasushi Shinjo and
                  Toshio Hirotsu and
                  Kozo Itano and
                  Kazuhiko Kato},
  title        = {Capability-based egress network access control by using {DNS} server},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1275--1282},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.009},
  doi          = {10.1016/J.JNCA.2006.09.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SuzukiSHIK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Turner07,
  author       = {Kenneth J. Turner},
  title        = {Representing and analysing composed web services using Cress},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {541--562},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.02.001},
  doi          = {10.1016/J.JNCA.2006.02.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Turner07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TweedaleISJCP07,
  author       = {Jeffrey Tweedale and
                  Nikhil Ichalkaranje and
                  Christos Sioutis and
                  B. Jarvis and
                  Angela Consoli and
                  Gloria E. Phillips{-}Wren},
  title        = {Innovations in multi-agent systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1089--1115},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.005},
  doi          = {10.1016/J.JNCA.2006.04.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/TweedaleISJCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangGCXC07,
  author       = {Ben{-}Nian Wang and
                  Yang Gao and
                  Zhaoqian Chen and
                  Jun{-}Yuan Xie and
                  Shifu Chen},
  title        = {A two-layered multi-agent reinforcement learning model and algorithm},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1366--1376},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.004},
  doi          = {10.1016/J.JNCA.2006.09.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WangGCXC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangJP07,
  author       = {Feng{-}Hsing Wang and
                  Lakhmi C. Jain and
                  Jeng{-}Shyang Pan},
  title        = {VQ-based watermarking scheme with genetic codebook partition},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {4--23},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.002},
  doi          = {10.1016/J.JNCA.2005.08.002},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WangJP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WanyamaF07,
  author       = {Tom Wanyama and
                  Behrouz Homayoun Far},
  title        = {A protocol for multi-agent negotiation in a group-choice decision
                  making process},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1173--1195},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.009},
  doi          = {10.1016/J.JNCA.2006.04.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WanyamaF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WeissNRF07,
  author       = {Gerhard Wei{\ss} and
                  Matthias Nickles and
                  Michael Rovatsos and
                  Felix A. Fischer},
  title        = {Specifying the intertwining of cooperation and autonomy in agent-based
                  systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1196--1215},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.004},
  doi          = {10.1016/J.JNCA.2006.04.004},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/WeissNRF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WuWFIM07,
  author       = {Bing Wu and
                  Jie Wu and
                  Eduardo B. Fern{\'{a}}ndez and
                  Mohammad Ilyas and
                  Spyros S. Magliveras},
  title        = {Secure and efficient key management in mobile ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {937--954},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.008},
  doi          = {10.1016/J.JNCA.2005.07.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WuWFIM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WuZWT07,
  author       = {Yanni Wu and
                  Kuo Zhang and
                  Xiaoge Wang and
                  Jinlan Tian},
  title        = {Extending metadata with scenarios in adaptive distributed system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1283--1294},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.003},
  doi          = {10.1016/J.JNCA.2006.09.003},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WuZWT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XiaNM07,
  author       = {Junjun Xia and
                  Lin Ni and
                  Yuan Miao},
  title        = {A new digital implementation of ridgelet transform for images of dyadic
                  length},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1346--1355},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.09.002},
  doi          = {10.1016/J.JNCA.2006.09.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XiaNM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XuCJLZ07,
  author       = {Wei Xu and
                  Jiannong Cao and
                  Beihong Jin and
                  Jing Li and
                  Liang Zhang},
  title        = {{GCS-MA:} {A} group communication system for mobile agents},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1153--1172},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.003},
  doi          = {10.1016/J.JNCA.2006.04.003},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/XuCJLZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XuLS07,
  author       = {Yiqun Xu and
                  Luigi Logrippo and
                  Jacques Sincennes},
  title        = {Detecting feature interactions in {CPL}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {775--799},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.10.001},
  doi          = {10.1016/J.JNCA.2005.10.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XuLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YuCSL07,
  author       = {Gwo{-}Jong Yu and
                  Chih{-}Yung Chang and
                  Kuei{-}Ping Shih and
                  Shih{-}Chieh Lee},
  title        = {Relay reduction and disjoint routes construction for scatternet over
                  Bluetooth radio system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {728--749},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.11.001},
  doi          = {10.1016/J.JNCA.2005.11.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YuCSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YueC07,
  author       = {Tai{-}Wen Yue and
                  Suchen Chiang},
  title        = {The semipublic encryption for visual cryptography using Q'tron neural
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {24--41},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.08.003},
  doi          = {10.1016/J.JNCA.2005.08.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/YueC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhanMC07,
  author       = {Justin Zhijun Zhan and
                  Stan Matwin and
                  LiWu Chang},
  title        = {Privacy-preserving collaborative association rule mining},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {1216--1227},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.04.010},
  doi          = {10.1016/J.JNCA.2006.04.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhanMC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhouWX07,
  author       = {Xiaobo Zhou and
                  Jianbin Wei and
                  Cheng{-}Zhong Xu},
  title        = {Quality-of-service differentiation on the Internet: {A} taxonomy},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {1},
  pages        = {354--383},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.001},
  doi          = {10.1016/J.JNCA.2005.07.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhouWX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhouX07,
  author       = {Xiaobo Zhou and
                  Cheng{-}Zhong Xu},
  title        = {Efficient algorithms of video replication and placement on a cluster
                  of streaming servers},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {2},
  pages        = {515--540},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.03.001},
  doi          = {10.1016/J.JNCA.2006.03.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhouX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhouX07a,
  author       = {Xiaobo Zhou and
                  Cheng{-}Zhong Xu},
  title        = {Distributed denial-of-service and intrusion detection},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {3},
  pages        = {819--822},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2005.07.011},
  doi          = {10.1016/J.JNCA.2005.07.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhouX07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics