Search dblp for Publications

export results for "toc:db/journals/jnw/jnw6.bht:"

 download as .bib file

@article{DBLP:journals/jnw/AdamiCGNP11,
  author       = {Davide Adami and
                  Christian Callegari and
                  Stefano Giordano and
                  Gianfranco Nencioni and
                  Michele Pagano},
  title        = {Design and Performance Evaluation of Service Overlay Networks Topologies},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {556--566},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.556-566},
  doi          = {10.4304/JNW.6.4.556-566},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AdamiCGNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AhsanLNA11,
  author       = {Md. Shamim Ahsan and
                  Man Seop Lee and
                  S. H. Shah Newaz and
                  Syed Md. Asif},
  title        = {Migration to the Next Generation Optical Access Networks Using Hybrid
                  {WDM/TDM-PON}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {18--25},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.18-25},
  doi          = {10.4304/JNW.6.1.18-25},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/AhsanLNA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AkterR11,
  author       = {Roksana Akter and
                  M. Lutfar Rahman},
  title        = {A Geometric Model to Reduce Interference Computations in Simulation
                  of Large Ad hoc Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {46--53},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.46-53},
  doi          = {10.4304/JNW.6.1.46-53},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AkterR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Al-AdwanyA11,
  author       = {Maan A. S. Al{-}Adwany and
                  Amin M. Abbosh},
  title        = {Interference Reduction in Overlaid {WCDMA} and {TDMA} Systems},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {587--594},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.587-594},
  doi          = {10.4304/JNW.6.4.587-594},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Al-AdwanyA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BaiSY11,
  author       = {Jie Bai and
                  Kai Sun and
                  Genke Yang},
  title        = {Mathematical Model and Hybrid Scatter Search for Cost Driven Job-shop
                  Scheduling Problem},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {974--981},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.974-981},
  doi          = {10.4304/JNW.6.7.974-981},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BaiSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BaoZZ11,
  author       = {Liyong Bao and
                  Dongfeng Zhao and
                  Yifan Zhao},
  title        = {A Cluster-based priority Scheduling Algorithm for {MAC} Layer in Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1507--1513},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1507-1513},
  doi          = {10.4304/JNW.6.10.1507-1513},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BaoZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/BiZL11,
  author       = {Hongbo Bi and
                  Yubo Zhang and
                  Xueming Li},
  title        = {Video Watermarking Robust Against Spatio-Temporal Attacks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {932--936},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.932-936},
  doi          = {10.4304/JNW.6.6.932-936},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/BiZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiC11,
  author       = {Yongquan Cai and
                  Fulai Cheng},
  title        = {A Threshold Signature Scheme with a Weakened Trusted Party},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {883--886},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.883-886},
  doi          = {10.4304/JNW.6.6.883-886},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CaiS11,
  author       = {Yongquan Cai and
                  Huili Shi},
  title        = {Rational Secret Sharing Scheme Based on Probability Encryption without
                  Trusted Center},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {899--903},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.899-903},
  doi          = {10.4304/JNW.6.6.899-903},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/CaiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chan11,
  author       = {Yu{-}Wei Chan},
  title        = {On the Design of {A} Contribution-based, Flexible Locality-Aware {P2P}
                  Streaming Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {750--756},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.750-756},
  doi          = {10.4304/JNW.6.5.750-756},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Chan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChandrasettyA11,
  author       = {Vikram Arkalgud Chandrasetty and
                  Syed Mahfuzul Aziz},
  title        = {{FPGA} Implementation of a {LDPC} Decoder using a Reduced Complexity
                  Message Passing Algorithm},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {36--45},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.36-45},
  doi          = {10.4304/JNW.6.1.36-45},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChandrasettyA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Chang11,
  author       = {Rong{-}Chi Chang},
  title        = {Interactive E-diagnosis: An Efficient Scheme for Medical Diagnosis
                  Support System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {713--720},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.713-720},
  doi          = {10.4304/JNW.6.5.713-720},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Chang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenCSC11,
  author       = {Chien{-}Sheng Chen and
                  Yi{-}Jen Chiu and
                  Ho{-}Nien Shou and
                  Ching{-}Lung Chi},
  title        = {Non-line-of-sight Error Mitigation in Wireless Communication Systems},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1647--1653},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1647-1653},
  doi          = {10.4304/JNW.6.11.1647-1653},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenCSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenCZSLW11,
  author       = {Dong Chen and
                  Guiran Chang and
                  Xiuying Zheng and
                  Dawei Sun and
                  Jiajia Li and
                  Xingwei Wang},
  title        = {A Novel {P2P} Based Grid Resource Discovery Model},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1390--1397},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1390-1397},
  doi          = {10.4304/JNW.6.10.1390-1397},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenCZSLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenLH11,
  author       = {Zujue Chen and
                  Shaoqing Liu and
                  Jun Huang},
  title        = {Multi-tier Grid Routing to Mobile Sink in Large-scale Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {765--773},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.765-773},
  doi          = {10.4304/JNW.6.5.765-773},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenLLC11,
  author       = {Chien{-}Sheng Chen and
                  Jium{-}Ming Lin and
                  Wen{-}Hsiung Liu and
                  Ching{-}Lung Chi},
  title        = {Dilution of Position Calculation for {MS} Location Improvement in
                  Wireless Communication Systems},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1452--1458},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1452-1458},
  doi          = {10.4304/JNW.6.10.1452-1458},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenLLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenWZZ11,
  author       = {Gang Chen and
                  Xinrong Wu and
                  Wenqiang Zhang and
                  Xiang Zheng},
  title        = {A Cross-Layer Resource Allocation Algorithm with Dynamic Buffer Allocation
                  Mechanism},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {104--111},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.104-111},
  doi          = {10.4304/JNW.6.1.104-111},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenWZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenYP11,
  author       = {Wen Chen and
                  Jinming Yu and
                  Feng Pan},
  title        = {Optimal Priority-based Call Admission Control Scheme For QoS Provisioning
                  in Heterogeneous Wireless Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {319--329},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.319-329},
  doi          = {10.4304/JNW.6.2.319-329},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenYP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenYWTYX11,
  author       = {Zuo Chen and
                  Qiuwei Yang and
                  Xin Wan and
                  Yuanyan Tu and
                  Fei Yu and
                  Chen Xu},
  title        = {Automated Trust Negotiation with Time Behavior},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1091--1098},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1091-1098},
  doi          = {10.4304/JNW.6.8.1091-1098},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenYWTYX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenYWTYX11a,
  author       = {Zuo Chen and
                  Qiuwei Yang and
                  Xin Wan and
                  Yuanyan Tu and
                  Fei Yu and
                  Chen Xu},
  title        = {Privacy Preservation in Role-based Access Control Model},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1106--1113},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1106-1113},
  doi          = {10.4304/JNW.6.8.1106-1113},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenYWTYX11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChengJG11,
  author       = {Kefei Cheng and
                  Tingqiang Jia and
                  Meng Gao},
  title        = {Research and Implementation of Three {HTTPS} Attacks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {757--764},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.757-764},
  doi          = {10.4304/JNW.6.5.757-764},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChengJG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChiangCLS11,
  author       = {Ding{-}Jung Chiang and
                  Chien{-}Liang Chen and
                  Chi{-}Yi Lin and
                  Timothy K. Shih},
  title        = {Broadcasting Data Items with Time Constraints Based on On-Demand Multichannel
                  in Ubiquitous Environments},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {689--696},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.689-696},
  doi          = {10.4304/JNW.6.5.689-696},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChiangCLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/CuiC11,
  author       = {Hui Cui and
                  Tianjie Cao},
  title        = {A Secure Anonymous Identity-based Key Agreement Protocol for Distributed
                  Computer Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1337--1343},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1337-1343},
  doi          = {10.4304/JNW.6.9.1337-1343},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/CuiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DaiCWZL11,
  author       = {Weihui Dai and
                  Xiang Cai and
                  Haifeng Wu and
                  Weidong Zhao and
                  Xuan Li},
  title        = {An Integrated Mobile Phone Payment System Based on 3G Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1329--1336},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1329-1336},
  doi          = {10.4304/JNW.6.9.1329-1336},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DaiCWZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DaiWLYX11,
  author       = {Weihui Dai and
                  Chunshi Wang and
                  Guoxi Li and
                  Fei Yu and
                  Chen Xu},
  title        = {Research on 3G-based Mobile Self-rescue System for Medical Emergency},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1214--1221},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1214-1221},
  doi          = {10.4304/JNW.6.8.1214-1221},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DaiWLYX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DaiXC11,
  author       = {Liang Dai and
                  Hongke Xu and
                  Ting Chen},
  title        = {A Task Scheduling Strategy in Heterogeneous Multi-sinks Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1586--1593},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1586-1593},
  doi          = {10.4304/JNW.6.11.1586-1593},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DaiXC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DengHKLLH11,
  author       = {Lawrence Y. Deng and
                  Jason C. Hung and
                  Huan{-}Chao Keh and
                  Kun{-}Yi Lin and
                  Yi{-}Jen Liu and
                  Nan{-}Ching Huang},
  title        = {Real-time Hand Gesture Recognition by Shape Context Based Matching
                  and Cost Matrix},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {697--704},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.697-704},
  doi          = {10.4304/JNW.6.5.697-704},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DengHKLLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DengS11,
  author       = {Yuqiao Deng and
                  Ge Song},
  title        = {Proxy re-signature Scheme Based on Quadratic Residues},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1459--1465},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1459-1465},
  doi          = {10.4304/JNW.6.10.1459-1465},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DengS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DengZ11,
  author       = {Zhijuan Deng and
                  Shaojun Zhong},
  title        = {A Ranking Method of Retrieval Results Based on Web Comprehending},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1690--1696},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1690-1696},
  doi          = {10.4304/JNW.6.12.1690-1696},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DengZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DhraiefB11,
  author       = {Amine Dhraief and
                  Abdelfettah Belghith},
  title        = {Mobility Impact on Session Survivability under the {SHIM6} Protocol
                  and Enhancement of its Rehoming Procedure},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1521--1532},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1521-1532},
  doi          = {10.4304/JNW.6.11.1521-1532},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DhraiefB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DingHLBZS11,
  author       = {Hao Ding and
                  Kun Mean Hou and
                  Jacques Lecoq and
                  Gerard Bohner and
                  Haiying Zhou and
                  Hong Sun},
  title        = {Toward a Low Cost and Single Chip Holter: SoC-Holter},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {181--189},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.181-189},
  doi          = {10.4304/JNW.6.2.181-189},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/DingHLBZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/DingWC11,
  author       = {Qun Ding and
                  Lu Wang and
                  Guanrong Chen},
  title        = {Correlative Peak Interval Prediction and Analysis of Chaotic Sequences},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1049--1056},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1049-1056},
  doi          = {10.4304/JNW.6.7.1049-1056},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/DingWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FanW11,
  author       = {Shaosheng Fan and
                  Hainan Wang},
  title        = {Multi-direction Fuzzy Morphology Algorithm for Image Edge Detection},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {895--898},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.895-898},
  doi          = {10.4304/JNW.6.6.895-898},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FanW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengBHC11,
  author       = {Tao Feng and
                  Jun Bi and
                  Hongyu Hu and
                  Hui Cao},
  title        = {Networking as a Service: a Cloud-based Network Architecture},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1084--1090},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1084-1090},
  doi          = {10.4304/JNW.6.7.1084-1090},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FengBHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengLLH11,
  author       = {Hailin Feng and
                  Guanghui Li and
                  Wenwei Lu and
                  Leijun Huang},
  title        = {Trust Based Secure In-network Data Processing Schema in Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {295--302},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.295-302},
  doi          = {10.4304/JNW.6.2.295-302},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FengLLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FontugneHF11,
  author       = {Romain Fontugne and
                  Toshio Hirotsu and
                  Kensuke Fukuda},
  title        = {A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {577--586},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.577-586},
  doi          = {10.4304/JNW.6.4.577-586},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FontugneHF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoMH11,
  author       = {Ang Gao and
                  Dejun Mu and
                  Yansu Hu},
  title        = {A QoS Control Approach in Differentiated Web Caching Service},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {62--70},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.62-70},
  doi          = {10.4304/JNW.6.1.62-70},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaoMH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoQWC11,
  author       = {Demin Gao and
                  Huanyan Qian and
                  Zheng Wang and
                  Jiguang Chen},
  title        = {Study and Design an Anycast Routing Protocol for Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1726--1733},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1726-1733},
  doi          = {10.4304/JNW.6.12.1726-1733},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaoQWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoWD11,
  author       = {Yan Gao and
                  Min Wu and
                  Weifeng Du},
  title        = {Performance Research of Modulation for Optical Wireless Communication
                  System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1099--1105},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1099-1105},
  doi          = {10.4304/JNW.6.8.1099-1105},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaoWD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GaoXLW11,
  author       = {Guohong Gao and
                  Wenxian Xiao and
                  Zhen Liu and
                  Wenlong Wan},
  title        = {An Application of the Modification of Slow Start Algorithm in Campus
                  Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1549--1556},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1549-1556},
  doi          = {10.4304/JNW.6.11.1549-1556},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GaoXLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuL11,
  author       = {Tianlong Gu and
                  Shenghui Liu},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {937--938},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.937-938},
  doi          = {10.4304/JNW.6.7.937-938},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuZS11,
  author       = {Chengjie Gu and
                  Shunyi Zhang and
                  Yanfei Sun},
  title        = {Pricing Incentive Mechanism based on Multi-stages Traffic Classification
                  Methodology for QoS-enabled Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {163--171},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.163-171},
  doi          = {10.4304/JNW.6.1.163-171},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoC11,
  author       = {Lin Guo and
                  Qinghu Chen},
  title        = {A Collaborative Nonlocal-Means Super-resolution Algorithm Using Zernike
                  Monments},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {966--973},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.966-973},
  doi          = {10.4304/JNW.6.7.966-973},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoLC11,
  author       = {Lejiang Guo and
                  Qiang Li and
                  Fangxin Chen},
  title        = {A Novel Cluster-head Selection Algorithm Based on Hybrid Genetic Optimization
                  for Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {815--822},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.815-822},
  doi          = {10.4304/JNW.6.5.815-822},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuoLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/GuoML11,
  author       = {Haoming Guo and
                  Shilong Ma and
                  Feng Liang},
  title        = {Enabling Awareness Driven Differentiated data service in {IOT}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1572--1577},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1572-1577},
  doi          = {10.4304/JNW.6.11.1572-1577},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/GuoML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HaddadTTY11,
  author       = {Hazim Anas Haddad and
                  Shinsuke Tamura and
                  Shuji Taniguchi and
                  Tatsuro Yanase},
  title        = {Development of Anonymous Networks Based on Symmetric Key Encryptions},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1533--1542},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1533-1542},
  doi          = {10.4304/JNW.6.11.1533-1542},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HaddadTTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HangHS11,
  author       = {Bo Hang and
                  Ruimin Hu and
                  Wei Shi},
  title        = {An Enhanced {SYN} Cookie Defence Method for {TCP} DDoS Attack},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1206--1213},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1206-1213},
  doi          = {10.4304/JNW.6.8.1206-1213},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HangHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HaoCHZ11,
  author       = {Jutao Hao and
                  Qingkui Chen and
                  Huan Huo and
                  Jingjing Zhao},
  title        = {Energy Efficient Clustering Algorithm for Data Gathering in Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {490--497},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.490-497},
  doi          = {10.4304/JNW.6.3.490-497},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HaoCHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HaqueN11,
  author       = {Md. Rakibul Haque and
                  Mahmuda Naznin},
  title        = {Monitoring Cost Reduction in Sensor Networks using Proximity Queries},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {4--11},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.4-11},
  doi          = {10.4304/JNW.6.1.4-11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HaqueN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuDW11,
  author       = {Juanli Hu and
                  Jiabin Deng and
                  Juebo Wu},
  title        = {Image Compression Based on Improved {FFT} Algorithm},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1041--1048},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1041-1048},
  doi          = {10.4304/JNW.6.7.1041-1048},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuDW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuLZ11,
  author       = {Zhengbing Hu and
                  Huaiqing Lin and
                  Yonghong Zhou},
  title        = {A Fuzzy Reputation Management System with Punishment Mechanism for
                  {P2P} Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {190--197},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.190-197},
  doi          = {10.4304/JNW.6.2.190-197},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuSL11,
  author       = {Shengbo Hu and
                  Heng Shu and
                  Tiancheng Lin},
  title        = {Analysis on Stability of a Network Based on {RED} Scheme},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {654--661},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.654-661},
  doi          = {10.4304/JNW.6.4.654-661},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Huang11,
  author       = {Lijuan Huang},
  title        = {Analysis on E-consumers' Purchasing Behavior Based on Data-driving
                  Model},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1713--1718},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1713-1718},
  doi          = {10.4304/JNW.6.12.1713-1718},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Huang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuangCHHY11,
  author       = {Chun{-}Hong Huang and
                  Su{-}Li Chin and
                  Li{-}Hua Hsin and
                  Jason C. Hung and
                  Yi{-}Pei Yu},
  title        = {A Web-based E-learning Platform for Physical Education},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {721--727},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.721-727},
  doi          = {10.4304/JNW.6.5.721-727},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuangCHHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hung11,
  author       = {Jason C. Hung},
  title        = {Foreword of Special Issue on "Nomadic Services and Applications"},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {687--688},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.687-688},
  doi          = {10.4304/JNW.6.5.687-688},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Hung11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Hung11a,
  author       = {Jason C. Hung},
  title        = {Using Active {RFID} to Realize Ubi-media System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {743--749},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.743-749},
  doi          = {10.4304/JNW.6.5.743-749},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Hung11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HungKSL11,
  author       = {Le Xuan Hung and
                  Murad Khalid and
                  Ravi Sankar and
                  Sungyoung Lee},
  title        = {An Efficient Mutual Authentication and Access Control Scheme for Wireless
                  Sensor Networks in Healthcare},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {355--364},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.355-364},
  doi          = {10.4304/JNW.6.3.355-364},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HungKSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HuoJW11,
  author       = {Zhanqiang Huo and
                  Shunfu Jin and
                  Zhiheng Wang},
  title        = {Performance Analysis and Evaluation for Sleep-mode with Uplink/Downlink
                  Traffics in {IEEE} 802.16e Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1145--1152},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1145-1152},
  doi          = {10.4304/JNW.6.8.1145-1152},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/HuoJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/IslamI11,
  author       = {Md. Jahedul Islam and
                  Md. Rafiqul Islam},
  title        = {Impact of {GVD} and {SPM} on the Performance of {DS-OCDMA}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {12--17},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.12-17},
  doi          = {10.4304/JNW.6.1.12-17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/IslamI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiaWZ11,
  author       = {Zongpu Jia and
                  Gaolei Wang and
                  Ran Zhao},
  title        = {A Literature Survey on Handoff for Mobile IPv6},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1137--1144},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1137-1144},
  doi          = {10.4304/JNW.6.8.1137-1144},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiaWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JianM11,
  author       = {Chengfeng Jian and
                  Haizhong Meng},
  title        = {{XOEM} plus OWL-based {STEP} Product Information Uniform Description
                  and Implementation},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1662--1667},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1662-1667},
  doi          = {10.4304/JNW.6.12.1662-1667},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JianM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangH11,
  author       = {Yu Jiang and
                  Aiqun Hu},
  title        = {Finding the Most Vital Link with Respect to the Characteristic of
                  Network Communication},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {462--469},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.462-469},
  doi          = {10.4304/JNW.6.3.462-469},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/JiangXW11,
  author       = {Congfeng Jiang and
                  Xianghua Xu and
                  Jian Wan},
  title        = {Security Aware Parallel and Independent Job Scheduling in Grid Computing
                  Environments Based on Adaptive Job Replication},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1321--1328},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1321-1328},
  doi          = {10.4304/JNW.6.9.1321-1328},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/JiangXW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KangSZ11,
  author       = {Jian Kang and
                  Yuan{-}Zhang Song and
                  Jun{-}Yao Zhang},
  title        = {Accurate Detection of Peer-to-Peer Botnet using Multi-Stream Fused
                  Scheme},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {807--814},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.807-814},
  doi          = {10.4304/JNW.6.5.807-814},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KangSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/KarjeeJ11,
  author       = {Jyotirmoy Karjee and
                  H. S. Jamadagni},
  title        = {Data Accuracy Estimation for Spatially Correlated Data in Wireless
                  Sensor Networks under Distributed Clustering},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1072--1083},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1072-1083},
  doi          = {10.4304/JNW.6.7.1072-1083},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/KarjeeJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiCLL11,
  author       = {Weimin Li and
                  Xiao{-}guang Cao and
                  Fang Liu and
                  Zhenming Lei},
  title        = {Improving {DNS} cache to alleviate the impact of {DNS} DDoS attack},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {279--286},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.279-286},
  doi          = {10.4304/JNW.6.2.279-286},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiCLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiJ11,
  author       = {Jianbo Li and
                  Shan Jiang},
  title        = {A Scalable Clustering Algorithm in Dense Mobile Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {505--512},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.505-512},
  doi          = {10.4304/JNW.6.3.505-512},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLHW11,
  author       = {Jianyong Li and
                  Jianchun Li and
                  Daoying Huang and
                  Qiang Wei},
  title        = {A Novel {HAVE} Message of Peer-to-peer Protocol in BitTorrent Systems},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1747--1753},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1747-1753},
  doi          = {10.4304/JNW.6.12.1747-1753},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiLHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiLLYD11,
  author       = {Xuan Li and
                  Lixin Lin and
                  Xin Liu and
                  Dejian Ye and
                  Weihui Dai},
  title        = {{STB} Based Multimedia Information Publication System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1305--1312},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1305-1312},
  doi          = {10.4304/JNW.6.9.1305-1312},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiLLYD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiSC11,
  author       = {Xiaofei Li and
                  Xuanjing Shen and
                  Haipeng Chen},
  title        = {ElGamal Digital Signature Algorithm of Adding a Random Number},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {774--782},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.774-782},
  doi          = {10.4304/JNW.6.5.774-782},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiSX11,
  author       = {Hui Li and
                  Yue{-}hong Shen and
                  Kun Xu},
  title        = {Neural Network with Momentum for Dynamic Source Separation and its
                  Convergence Analysis},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {791--798},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.791-798},
  doi          = {10.4304/JNW.6.5.791-798},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiSX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiWSG11,
  author       = {Xiangli Li and
                  Kaimin Wei and
                  Xiaolin Sun and
                  Yanhong Gao},
  title        = {A Performance Value Adaptive Routing for Mobile Ad Hoc Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1367--1372},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1367-1372},
  doi          = {10.4304/JNW.6.9.1367-1372},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiWSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiY11,
  author       = {Chi Yuan Li and
                  Zhi Qiang Yao},
  title        = {The Validation of Credit Card Number on the Wired and Wireless Internet},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {432--437},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.432-437},
  doi          = {10.4304/JNW.6.3.432-437},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiY11a,
  author       = {Li Li and
                  Hua Yan},
  title        = {Cost Aggregation Strategy with Bilateral Filter Based on Multi-scale
                  Nonlinear Structure Tensor},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {958--965},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.958-965},
  doi          = {10.4304/JNW.6.7.958-965},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiY11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiangBQ11,
  author       = {Kaijian Liang and
                  Linfeng Bai and
                  Xilong Qu},
  title        = {Expectation Value Calculation of Grid QoS Parameters Based on Algorithm
                  Prim},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1618--1624},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1618-1624},
  doi          = {10.4304/JNW.6.11.1618-1624},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiangBQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LinCWZX11,
  author       = {Fuhong Lin and
                  Changjia Chen and
                  Hengkui Wu and
                  Hongke Zhang and
                  Ke Xiong},
  title        = {{QHNS:} QoS-aware Hierarchical Name System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1491--1498},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1491-1498},
  doi          = {10.4304/JNW.6.10.1491-1498},
  timestamp    = {Wed, 14 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LinCWZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LinHZ11,
  author       = {Huaiqing Lin and
                  Zhengbing Hu and
                  Yonghong Zhou},
  title        = {An Efficient Secure Multicast Communication for {P2P} Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {408--415},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.408-415},
  doi          = {10.4304/JNW.6.3.408-415},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LinHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LinWW11,
  author       = {Kuan{-}Cheng Lin and
                  Ting{-}Kuan Wu and
                  Yu{-}Bin Wang},
  title        = {Developing a Web-based and Competition-based Quiz Game Environment
                  to Improve Student Motivation},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {736--742},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.736-742},
  doi          = {10.4304/JNW.6.5.736-742},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LinWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LinZ11,
  author       = {Huaiqing Lin and
                  Yonghong Zhou},
  title        = {A Secure Protocol for Sharing Trust Data in Hybrid {P2P} Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {607--614},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.607-614},
  doi          = {10.4304/JNW.6.4.607-614},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LinZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu11,
  author       = {Bin Liu},
  title        = {A Semi-Supervised Clustering Method For {P2P} Traffic Classification},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {424--431},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.424-431},
  doi          = {10.4304/JNW.6.3.424-431},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu11a,
  author       = {Linfeng Liu},
  title        = {A Wireless Sensor Network Architecture for Diversiform Deployment
                  Environments},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {482--489},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.482-489},
  doi          = {10.4304/JNW.6.3.482-489},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liu11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu11b,
  author       = {Youyuan Liu},
  title        = {Stable Routing Algorithm for Mobile Ad Hoc Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1171--1178},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1171-1178},
  doi          = {10.4304/JNW.6.8.1171-1178},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liu11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Liu11c,
  author       = {Yuan Liu},
  title        = {Wavelet Fuzzy Neural Network based on {MQPSO} for Network Anomaly
                  Detection},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1344--1350},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1344-1350},
  doi          = {10.4304/JNW.6.9.1344-1350},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Liu11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuLH11,
  author       = {Yichun Liu and
                  Yinghong Liang and
                  Yuping Hu},
  title        = {A Fair Payment Protocol for Cascading {P2P} Transaction},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1313--1320},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1313-1320},
  doi          = {10.4304/JNW.6.9.1313-1320},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuMY11,
  author       = {Weibo Liu and
                  Wenping Ma and
                  Yuanyuan Yang},
  title        = {Analysis and Improvement of the {BAN} Modified Andrew Secure {RPC}
                  Protocol},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {662--669},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.662-669},
  doi          = {10.4304/JNW.6.4.662-669},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuSY11,
  author       = {Yong Liu and
                  Lifeng Sun and
                  Shiqiang Yang},
  title        = {Wireless Video Transmission Scheme Based on Virtual {MIMO} and Network
                  Coding Technology},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {88--95},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.88-95},
  doi          = {10.4304/JNW.6.1.88-95},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuSZT11,
  author       = {Yu Liu and
                  Qiang Shen and
                  Zhijun Zhao and
                  Hui Tang},
  title        = {Proactive Location Service in Mobility Management},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {670--677},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.670-677},
  doi          = {10.4304/JNW.6.4.670-677},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuSZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuWYXX11,
  author       = {Jiansheng Liu and
                  Jiajia Wei and
                  Guangxue Yue and
                  Linquan Xie and
                  Xiaofeng Xiong},
  title        = {Application Layer Multicast Technology of Streaming Media},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1122--1128},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1122-1128},
  doi          = {10.4304/JNW.6.8.1122-1128},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuWYXX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LongSY11,
  author       = {Fei Long and
                  Fuchun Sun and
                  Zhian Yang},
  title        = {A Novel Routing Algorithm Based on Multi-Objective Optimization for
                  Satellite Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {238--246},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.238-246},
  doi          = {10.4304/JNW.6.2.238-246},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/LongSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Lu11,
  author       = {Yue Lu},
  title        = {A Relatively Optimal Cross-layer Routing Algorithm in Wireless Mesh
                  Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1499--1506},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1499-1506},
  doi          = {10.4304/JNW.6.10.1499-1506},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Lu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuL11,
  author       = {Yang Lu and
                  Jiguo Li},
  title        = {A Practical Forward-Secure Public-Key Encryption Scheme},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1254--1261},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1254-1261},
  doi          = {10.4304/JNW.6.9.1254-1261},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LuoLC11,
  author       = {Zhen Luo and
                  Zhishu Li and
                  Biao Cai},
  title        = {A Self-organized Public-Key Certificate System in {P2P} network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1437--1443},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1437-1443},
  doi          = {10.4304/JNW.6.10.1437-1443},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LuoLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LvYHCC11,
  author       = {Zhihan Lv and
                  Tengfei Yin and
                  Yong Han and
                  Yong Chen and
                  Ge Chen},
  title        = {WebVR - - Web Virtual Reality Engine Based on {P2P} network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {990--998},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.990-998},
  doi          = {10.4304/JNW.6.7.990-998},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LvYHCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaWD11,
  author       = {Xiaoxue Ma and
                  Zixian Wang and
                  Ruizhong Du},
  title        = {Trust Evaluation Model based on Multiple Service Attributes},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {842--849},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.842-849},
  doi          = {10.4304/JNW.6.6.842-849},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaWD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/McArdleTB11,
  author       = {Conor McArdle and
                  Daniele Tafani and
                  Liam P. Barry},
  title        = {Analysis of a Buffered Optical Switch with General Interarrival Times},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {536--548},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.536-548},
  doi          = {10.4304/JNW.6.4.536-548},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/McArdleTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MengHW11,
  author       = {Bo Meng and
                  Wei Huang and
                  Dejun Wang},
  title        = {Automatic Verification of Remote Internet Voting Protocol in Symbolic
                  Model},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1262--1271},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1262-1271},
  doi          = {10.4304/JNW.6.9.1262-1271},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MengHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MinPJKC11,
  author       = {Young{-}il Min and
                  Hwan Min Park and
                  Jun{-}Hee Jang and
                  Keun{-}dae Kim and
                  Hyung{-}Jin Choi},
  title        = {The Enhanced Decoding Method for {QO-SFBC} System in Frequency Selective
                  Fading Channel Environment},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {378--386},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.378-386},
  doi          = {10.4304/JNW.6.3.378-386},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MinPJKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NajjarRRO11,
  author       = {Monia Najjar and
                  R. Rejeb and
                  Houria Rezig and
                  Mohammad S. Obaidat},
  title        = {Comparison of the Design Characteristics of {MMI} Wavelength Demultiplexers
                  Using Different Approaches by Computing the Effective Index},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {549--555},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.549-555},
  doi          = {10.4304/JNW.6.4.549-555},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NajjarRRO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NguyenCHC11,
  author       = {Dang Tu Nguyen and
                  Wook Choi and
                  Minh Thiep Ha and
                  Hyunseung Choo},
  title        = {An Energy-efficient Multi-candidate Greedy Routing Scheme in Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {365--377},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.365-377},
  doi          = {10.4304/JNW.6.3.365-377},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NguyenCHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ObaidatS11,
  author       = {Mohammad S. Obaidat and
                  Jos{\'{e}} Luis Sevillano},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {533--535},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.533-535},
  doi          = {10.4304/JNW.6.4.533-535},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ObaidatS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/OguchiCLOY11,
  author       = {Masato Oguchi and
                  Hyung{-}Jin Choi and
                  Tae{-}Jin Lee and
                  Seong Keun Oh and
                  Kwan{-}Ho You},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {341--342},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.341-342},
  doi          = {10.4304/JNW.6.3.341-342},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/OguchiCLOY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PengWZ11,
  author       = {Xuena Peng and
                  Yingyou Wen and
                  Hong Zhao},
  title        = {Security Issues and Solutions in 3G Core Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {823--830},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.823-830},
  doi          = {10.4304/JNW.6.5.823-830},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PengWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/PengZHLL11,
  author       = {Daogang Peng and
                  Hao Zhang and
                  Cong{-}Hua Huang and
                  Jiajun Lin and
                  Hui Li},
  title        = {Study of Immune {PID} Networked Control System Based on TrueTime},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {912--915},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.912-915},
  doi          = {10.4304/JNW.6.6.912-915},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/PengZHLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QassrawiZ11,
  author       = {Mahmoud T. Qassrawi and
                  Hongli Zhang},
  title        = {Detecting Malicious Web Servers with Honeyclients},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {145--152},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.145-152},
  doi          = {10.4304/JNW.6.1.145-152},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/QassrawiZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QianCQ11,
  author       = {Hong{-}yan Qian and
                  Wei{-}Xin Cai and
                  Xiaolin Qin},
  title        = {Soft-Handoff in {WLAN} Realized by Dual Link},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {678--685},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.678-685},
  doi          = {10.4304/JNW.6.4.678-685},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/QianCQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/QinSD11,
  author       = {Hang Qin and
                  Jun Su and
                  Youfu Du},
  title        = {{PCDS:} Power Control with Opportunistic Scheduling for Cognitive
                  Radio Networks Reconfiguration},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {80--87},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.80-87},
  doi          = {10.4304/JNW.6.1.80-87},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/QinSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RahmanIFK11,
  author       = {M. M. Hafizur Rahman and
                  Yasushi Inoguchi and
                  Faiz Al Faisal and
                  Monoz Kumar Kundu},
  title        = {Symmetric and Folded Tori Connected Torus Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {26--35},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.26-35},
  doi          = {10.4304/JNW.6.1.26-35},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RahmanIFK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RangoMM11,
  author       = {Floriano De Rango and
                  Andrea Malfitano and
                  Salvatore Marano},
  title        = {{GCAD:} {A} Novel Call Admission Control Algorithm in {IEEE} 802.16
                  based Wireless Mesh Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {595--606},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.595-606},
  doi          = {10.4304/JNW.6.4.595-606},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RangoMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/RongC11,
  author       = {Hui{-}Gui Rong and
                  Hao Chen},
  title        = {An Independent Set Packet Classification Algorithm Using Priority
                  Sorting},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1565--1571},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1565-1571},
  doi          = {10.4304/JNW.6.11.1565-1571},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/RongC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShaLC11,
  author       = {Yi Sha and
                  MingMing Li and
                  Jiafu Chu},
  title        = {A Novel Timing and Frequency Synchronization Technology for {OFDM}
                  System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {646--653},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.646-653},
  doi          = {10.4304/JNW.6.4.646-653},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShaLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Shang11,
  author       = {Fengjun Shang},
  title        = {An Energy-Efficient Communication Protocol for Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {999--1008},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.999-1008},
  doi          = {10.4304/JNW.6.7.999-1008},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Shang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShenYCY11,
  author       = {Shigen Shen and
                  Guangxue Yue and
                  Qiying Cao and
                  Fei Yu},
  title        = {A Survey of Game Theory in Wireless Sensor Networks Security},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {521--532},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.521-532},
  doi          = {10.4304/JNW.6.3.521-532},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShenYCY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Shi11,
  author       = {Huawang Shi},
  title        = {Integration of Unascertained Method with Neural Networks and Its Application},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1631--1638},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1631-1638},
  doi          = {10.4304/JNW.6.11.1631-1638},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Shi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShiLLX11,
  author       = {Wenxiao Shi and
                  Bin Li and
                  Na Li and
                  Chuanjun Xia},
  title        = {A Network Architecture for Load Balancing of Heterogeneous Wireless
                  Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {623--630},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.623-630},
  doi          = {10.4304/JNW.6.4.623-630},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShiLLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShiWYW11,
  author       = {Lei Shi and
                  Zhanhong Wang and
                  Yao Yao and
                  Lin Wei},
  title        = {Streaming Media Caching Model Based on Knapsack Problem},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1379--1386},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1379-1386},
  doi          = {10.4304/JNW.6.9.1379-1386},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShiWYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ShuangWZS11,
  author       = {Kai Shuang and
                  Siyuan Wang and
                  Bo Zhang and
                  Sen Su},
  title        = {{IMS} Security Analysis using Multi-attribute Model},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {263--271},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.263-271},
  doi          = {10.4304/JNW.6.2.263-271},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ShuangWZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SongGFMZ11,
  author       = {Yongxian Song and
                  Chenglong Gong and
                  Yuan Feng and
                  Juanli Ma and
                  Xianjin Zhang},
  title        = {Design of Greenhouse Control System Based on Wireless Sensor Networks
                  and {AVR} Microcontroller},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1668--1674},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1668-1674},
  doi          = {10.4304/JNW.6.12.1668-1674},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SongGFMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SongJ11,
  author       = {Xiangmei Song and
                  Shiguang Ju},
  title        = {Covert Flow Graph Approach to Identifying Covert Channels},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1740--1746},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1740-1746},
  doi          = {10.4304/JNW.6.12.1740-1746},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SongJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Sun11,
  author       = {Feixian Sun},
  title        = {Artificial Immune Danger Theory Based Model for Network Security Evaluation},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {255--262},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.255-262},
  doi          = {10.4304/JNW.6.2.255-262},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Sun11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SunGYJ11,
  author       = {Jing Sun and
                  Suixiang Gao and
                  Wenguo Yang and
                  Zhipeng Jiang},
  title        = {Heuristic Replica Placement Algorithms in Content Distribution Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {416--423},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.416-423},
  doi          = {10.4304/JNW.6.3.416-423},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SunGYJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TanCZZ11,
  author       = {Minsheng Tan and
                  Qiang Cui and
                  Lingfeng Zhu and
                  Hui Zhao},
  title        = {Repair Method of Complex Network Based on Matthew Effect},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1719--1725},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1719-1725},
  doi          = {10.4304/JNW.6.12.1719-1725},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TanCZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TangX11,
  author       = {Chenghua Tang and
                  Yi Xie},
  title        = {Implementation and Realization of Network Security Policy Based on
                  Rule Engine},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {438--445},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.438-445},
  doi          = {10.4304/JNW.6.3.438-445},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TangX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TaoW11,
  author       = {Yongcai Tao and
                  Song Wu},
  title        = {Uniform Information Service Interoperation Framework among Heterogeneous
                  Grids},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1359--1366},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1359-1366},
  doi          = {10.4304/JNW.6.9.1359-1366},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TaoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TezukaM11,
  author       = {Taro Tezuka and
                  Akira Maeda},
  title        = {Image Retrieval with Generative Model for Typicality},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {387--399},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.387-399},
  doi          = {10.4304/JNW.6.3.387-399},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TezukaM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Tsai11,
  author       = {Chung{-}Hung Tsai},
  title        = {The E-Commerce Model of Health Websites: An Integration of Web Quality,
                  Perceived Interactivity, and Web Outcomes},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1017--1024},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1017-1024},
  doi          = {10.4304/JNW.6.7.1017-1024},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Tsai11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/TsaiKWWT11,
  author       = {Jiung{-}yao Huang and
                  Huan{-}Chao Keh and
                  Shu{-}Shen Wai and
                  Ji{-}Jen Wu and
                  Chung{-}Hsien Tsai},
  title        = {Research of Place-based 3D Augmented Community-Taking The 3D Virtual
                  Campus as an Example},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {705--712},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.705-712},
  doi          = {10.4304/JNW.6.5.705-712},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/TsaiKWWT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/VasiliadisRV11,
  author       = {Dimitris C. Vasiliadis and
                  George E. Rizos and
                  Costas Vassilakis},
  title        = {Performance Analysis of Dual-Priority Multilayer Multistage Interconnection
                  Networks under Multicast Environment},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {858--871},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.858-871},
  doi          = {10.4304/JNW.6.6.858-871},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/VasiliadisRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Wang11,
  author       = {Li Wang},
  title        = {{KC2A2P} : {A} Knowledge-driven Content and Context-Awareness Adaptive
                  Protocol for Intelligent Communication},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1398--1405},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1398-1405},
  doi          = {10.4304/JNW.6.10.1398-1405},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangCLL11,
  author       = {Zhi{-}Hui Wang and
                  Chin{-}Chen Chang and
                  Mingchu Li and
                  Tzu{-}Chuen Lu},
  title        = {A Simple Image Encoding Method with Data Lossless Information Hiding},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {400--407},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.400-407},
  doi          = {10.4304/JNW.6.3.400-407},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/WangCLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangHG11,
  author       = {Hailong Wang and
                  Jie Hou and
                  Zhenghu Gong},
  title        = {Botnet Detection Architecture Based on Heterogeneous Multi-sensor
                  Information Fusion},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1655--1661},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1655-1661},
  doi          = {10.4304/JNW.6.12.1655-1661},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangHG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangHLLX11,
  author       = {Ping Wang and
                  Jing Han and
                  Fuqiang Liu and
                  Yang Liu and
                  Jing Xu},
  title        = {A Power Allocation Algorithm Based on Cooperative Game Theory in Multi-cell
                  {OFDM} Systems},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1610--1617},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1610-1617},
  doi          = {10.4304/JNW.6.11.1610-1617},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/WangHLLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangL11,
  author       = {Anbao Wang and
                  Zhenwen Liu},
  title        = {Analysis and Utilizing of the Error Models in Teaching Wireless Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {222--229},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.222-229},
  doi          = {10.4304/JNW.6.2.222-229},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangLL11,
  author       = {Junnian Wang and
                  Deshun Liu and
                  Chao Liu},
  title        = {A Modified Mountain Clustering Algorithm based on Hill Valley Function},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {916--922},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.916-922},
  doi          = {10.4304/JNW.6.6.916-922},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangLX11,
  author       = {Yafeng Wang and
                  Min Liang and
                  Wei Xiang},
  title        = {Semi-Distributed Relay Selection Algorithm for Multi-User Cooperative
                  Wireless Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {907--911},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.907-911},
  doi          = {10.4304/JNW.6.6.907-911},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMZL11,
  author       = {Shang{-}Ping Wang and
                  Qiao{-}Mei Ma and
                  Ya{-}Ling Zhang and
                  You{-}Sheng Li},
  title        = {An Authentication Protocol for {RFID} Tag and Its Simulation},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {446--453},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.446-453},
  doi          = {10.4304/JNW.6.3.446-453},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/WangMZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMZW11,
  author       = {Chunlei Wang and
                  Liang Ming and
                  Jinjing Zhao and
                  Dongxia Wang},
  title        = {A General Framework for Network Survivability Testing and Evaluation},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {831--841},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.831-841},
  doi          = {10.4304/JNW.6.6.831-841},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/WangMZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangQ11,
  author       = {LinGe Wang and
                  YueDou Qi},
  title        = {Management Model Research of Low-power Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1734--1739},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1734-1739},
  doi          = {10.4304/JNW.6.12.1734-1739},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangSB11,
  author       = {Li Wang and
                  Bala Srinivasan and
                  Nandita Bhattacharjee},
  title        = {Security Analysis and Improvements on WLANs},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {470--481},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.470-481},
  doi          = {10.4304/JNW.6.3.470-481},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangWMD11,
  author       = {Erfu Wang and
                  Zhifang Wang and
                  Jing Ma and
                  Qun Ding},
  title        = {A New Method of Time-frequency Synthesis of Harmonic Signal Extraction
                  from Chaotic Background},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1025--1032},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1025-1032},
  doi          = {10.4304/JNW.6.7.1025-1032},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangWMD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangYZ11,
  author       = {Xiaoming Wang and
                  Guoxiang Yao and
                  Zhen Zhang},
  title        = {An Encryption Scheme with Hidden Keyword Search for Outsourced Database},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1697--1704},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1697-1704},
  doi          = {10.4304/JNW.6.12.1697-1704},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ11,
  author       = {Deguang Wang and
                  Zhigang Zhou},
  title        = {Application of a Collaborative Filtering Recommendation Algorithm
                  Based on Cloud Model in Intrusion Detection},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {214--221},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.214-221},
  doi          = {10.4304/JNW.6.2.214-221},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZ11a,
  author       = {Jingjing Wang and
                  Hao Zhang},
  title        = {Performance of {UWB} Systems with Direct-Sequence Bipolar Pulse Amplitude
                  Modulation and {RAKE} Reception over {IEEE} 802.15.3a Channel},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1065--1071},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1065-1071},
  doi          = {10.4304/JNW.6.7.1065-1071},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZB11,
  author       = {Qinghua Wang and
                  Tingting Zhang and
                  Ilangko Balasingham},
  title        = {Characterizing the Traffic Load Distribution in Dense Wireless Sensor
                  Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {173--180},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.173-180},
  doi          = {10.4304/JNW.6.2.173-180},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangZHWWL11,
  author       = {Xingwei Wang and
                  Huanyan Zhao and
                  Min Huang and
                  Zhankao Wen and
                  Weixin Wu and
                  Xiaofeng Liu},
  title        = {{ABC} Supported Handover Decision Scheme based on multi-PSO with Optimum
                  Mutation},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1153--1162},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1153-1162},
  doi          = {10.4304/JNW.6.8.1153-1162},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WangZHWWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WeiHZ11,
  author       = {Qian Wei and
                  Jingsha He and
                  Xing Zhang},
  title        = {Privacy Enhanced Key Agreement for Public Safety Communication in
                  Wireless Mesh Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1351--1358},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1351-1358},
  doi          = {10.4304/JNW.6.9.1351-1358},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WeiHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WeiLG11,
  author       = {Yahuan Wei and
                  Taoshen Li and
                  Zhihui Ge},
  title        = {A Channel Assignment Algorithm for Wireless Mesh Networks Using the
                  Maximum Flow Approach},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {879--882},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.879-882},
  doi          = {10.4304/JNW.6.6.879-882},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WeiLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WenPCZ11,
  author       = {Yingyou Wen and
                  Xuena Peng and
                  Shuyi Chen and
                  Hong Zhao},
  title        = {Mobile Platform and Secure Access Approach of {UMTS} Terminal Based
                  on Trusted Computing},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {615--622},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.615-622},
  doi          = {10.4304/JNW.6.4.615-622},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WenPCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuLLLXTL11,
  author       = {Keshou Wu and
                  Lizhao Liu and
                  Jian Liu and
                  Weifeng Li and
                  Gang Xie and
                  Xiaona Tong and
                  Yun Lin},
  title        = {Researches on Grid Security Authentication Algorithm in Cloud Computing},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1639--1646},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1639-1646},
  doi          = {10.4304/JNW.6.11.1639-1646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuLLLXTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuLT11,
  author       = {Xing Wu and
                  Peihuang Lou and
                  Dunbing Tang},
  title        = {Multi-objective Genetic Algorithm for System Identification and Controller
                  Optimization of Automated Guided Vehicle},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {982--989},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.982-989},
  doi          = {10.4304/JNW.6.7.982-989},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WuSW11,
  author       = {Xue{-}wen Wu and
                  Shi{-}ming Song and
                  Hui{-}bin Wang},
  title        = {A Novel Position-based Multi-hop Broadcast Protocol for Vehicular
                  Ad Hoc Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {112--120},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.112-120},
  doi          = {10.4304/JNW.6.1.112-120},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/WuSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaZGX11,
  author       = {Yan Xia and
                  Yingzhi Zeng and
                  Zhenghu Gong and
                  Qin Xin},
  title        = {{GDCA:} {A} Distributed Channel Assignment Mechanism for Multi-radio
                  Multi-Channel Wireless Mesh Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {303--310},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.303-310},
  doi          = {10.4304/JNW.6.2.303-310},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiaZGX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoHL11,
  author       = {Wenjun Xiao and
                  Mingxin He and
                  Huomin Liang},
  title        = {CayleyCCC: {A} Robust {P2P} Overlay Network with Simple Routing and
                  Small-World Features},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1247--1253},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1247-1253},
  doi          = {10.4304/JNW.6.9.1247-1253},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiaoHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoW11,
  author       = {Laishen Xiao and
                  Zhengxia Wang},
  title        = {Internet of Things: a New Application for Intelligent Traffic Monitoring
                  System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {887--894},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.887-894},
  doi          = {10.4304/JNW.6.6.887-894},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiaoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiaoZLLC11,
  author       = {Wenjun Xiao and
                  Qin Zhang and
                  Yanxia Liu and
                  Lan Li and
                  Weidong Chen},
  title        = {{CHC:} {A} Robust {P2P} Overlay Network with Simple Routing and Small-World
                  Features},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1179--1186},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1179-1186},
  doi          = {10.4304/JNW.6.8.1179-1186},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/XiaoZLLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XinXL11,
  author       = {Hua{-}Mei Xin and
                  Lin Xue and
                  Ju Liu},
  title        = {Positioning Optimization Technique in Non-Line-of-Sight Environment},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {287--294},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.287-294},
  doi          = {10.4304/JNW.6.2.287-294},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XinXL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongSYLX11,
  author       = {Xiaofeng Xiong and
                  Jiajia Song and
                  Guangxue Yue and
                  Jiansheng Liu and
                  Linquan Xie},
  title        = {Survey: Research on QoS of {P2P} Reliable Streaming Media},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1114--1121},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1114-1121},
  doi          = {10.4304/JNW.6.8.1114-1121},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongSYLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongZL11,
  author       = {Zenggang Xiong and
                  Xuemin Zhang and
                  Li Liu},
  title        = {Resource Management Model and ResourceDiscovery Algorithm for P2PGrid},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1187--1194},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1187-1194},
  doi          = {10.4304/JNW.6.8.1187-1194},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XiongZLC11,
  author       = {Zenggang Xiong and
                  Xuemin Zhang and
                  Li Liu and
                  Jianxin Chen},
  title        = {P2PGridSec: {A} Reputation-based Security Framework in P2PGrid System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1406--1413},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1406-1413},
  doi          = {10.4304/JNW.6.10.1406-1413},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XiongZLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuDFZL11,
  author       = {Lianming Xu and
                  Zhongliang Deng and
                  Ling Fang and
                  Yujia Zhu and
                  Wenlong Liu},
  title        = {Research on an Anti-Perturbation Kalman Filter Algorithm},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1430--1436},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1430-1436},
  doi          = {10.4304/JNW.6.10.1430-1436},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuDFZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuSZC11,
  author       = {Zhao Xu and
                  Lei Sun and
                  Wenyan Zhai and
                  Xicheng Chang},
  title        = {Wireless Ad-hoc Network Model for Video Transmission in the Tunnel
                  of Mine},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {129--136},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.129-136},
  doi          = {10.4304/JNW.6.1.129-136},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuSZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuTGF11,
  author       = {Kefu Xu and
                  Jianlong Tan and
                  Li Guo and
                  Binxing Fang},
  title        = {Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet
                  Inspection},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {799--806},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.799-806},
  doi          = {10.4304/JNW.6.5.799-806},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuTGF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuW11,
  author       = {Ye Xu and
                  Zhuo Wang},
  title        = {On Cross-Correlation Evaluation Model of Internet Macroscopic Topology
                  by Genetic Algorithm},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {230--237},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.230-237},
  doi          = {10.4304/JNW.6.2.230-237},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuW11a,
  author       = {Ye Xu and
                  Zhuo Wang},
  title        = {On Internet Topology Modeling and an Improved {BA} Model},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {454--461},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.454-461},
  doi          = {10.4304/JNW.6.3.454-461},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/XuW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanLA11,
  author       = {Xin Yan and
                  Layuan Li and
                  F. J. An},
  title        = {Multi-Constrained Routing Algorithm for Multimedia Communications
                  in Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {939--949},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.939-949},
  doi          = {10.4304/JNW.6.7.939-949},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YanLA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YanT11,
  author       = {Fang Yan and
                  Yu{-}An Tan},
  title        = {A Method of Object-based De-duplication},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1705--1712},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1705-1712},
  doi          = {10.4304/JNW.6.12.1705-1712},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/YanT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangALY11,
  author       = {Jing (Jonas) Yang and
                  Jianping An and
                  Xiangming Li and
                  Lei Yuan},
  title        = {An Effective Protocol for Rateless Coding aided Cooperative Communications},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {513--520},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.513-520},
  doi          = {10.4304/JNW.6.3.513-520},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangALY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangCCS11,
  author       = {Shih{-}Yang Yang and
                  Ching{-}Ming Chao and
                  Pozung Chen and
                  Chu{-}Hao Sun},
  title        = {Incremental Mining of Closed Sequential Patterns in Multiple Data
                  Streams},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {728--735},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.728-735},
  doi          = {10.4304/JNW.6.5.728-735},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangCCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangCYS11,
  author       = {Wei Yang and
                  Guiran Chang and
                  Yu Yao and
                  Xiao{-}meng Shen},
  title        = {Stability Analysis of {P2P} Worm Propagation Model with Dynamic Quarantine
                  Defense},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {153--162},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.153-162},
  doi          = {10.4304/JNW.6.1.153-162},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangCYS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangHXD11,
  author       = {Yue Yang and
                  Hanping Hu and
                  Wei Xiong and
                  Fan Ding},
  title        = {A Novel Network Traffic Anomaly Detection Model Based on Superstatistics
                  Theory},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {311--318},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.311-318},
  doi          = {10.4304/JNW.6.2.311-318},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangHXD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangLS11,
  author       = {Zhian Yang and
                  Fei Long and
                  Fuchun Sun},
  title        = {An Off-line Based QoS Routing Scheme for {LEO} Satellite Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {247--254},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.247-254},
  doi          = {10.4304/JNW.6.2.247-254},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/YangLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangLWY11,
  author       = {Ruiming Yang and
                  Yipeng Liu and
                  Qun Wan and
                  Wan{-}Lin Yang},
  title        = {Compressive Direction Finding Based on Amplitude Comparison},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {498--504},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.498-504},
  doi          = {10.4304/JNW.6.3.498-504},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangLWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangMGZ11,
  author       = {Hao Yang and
                  Qingmin Meng and
                  Xiong Gu and
                  Baoyu Zheng},
  title        = {Image-based Position Estimation and Adaptive Modulation Coding in
                  Vehicular Communication},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1754--1759},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1754-1759},
  doi          = {10.4304/JNW.6.12.1754-1759},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangMGZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangWWTY11,
  author       = {Jian Yang and
                  Haihang Wang and
                  Jian Wang and
                  Chengxiang Tan and
                  Dingguo Yu},
  title        = {Provable Data Possession of Resource-constrained Mobile Devices in
                  Cloud Computing},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1033--1040},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1033-1040},
  doi          = {10.4304/JNW.6.7.1033-1040},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangWWTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangZW11,
  author       = {Bailin Yang and
                  Zhiyong Zhang and
                  Xun Wang},
  title        = {Visual Important-Driven Interactive Rendering of 3D Geometry Model
                  over Lossy {WLAN}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1594--1601},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1594-1601},
  doi          = {10.4304/JNW.6.11.1594-1601},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YeHX11,
  author       = {Chunxiao Ye and
                  Haibo Hu and
                  Hong Xiang},
  title        = {Towards Secure Delegation with Chinese Wall Security Policy {(CWSP)}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1230--1237},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1230-1237},
  doi          = {10.4304/JNW.6.8.1230-1237},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YeHX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YoshihisaN11,
  author       = {Tomoki Yoshihisa and
                  Shojiro Nishio},
  title        = {A Communication Protocol for Sensor Database Construction by Rounding
                  Sink},
  journal      = {J. Networks},
  volume       = {6},
  number       = {3},
  pages        = {343--354},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.3.343-354},
  doi          = {10.4304/JNW.6.3.343-354},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YoshihisaN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YouL11,
  author       = {Lei You and
                  Chungui Liu},
  title        = {Robust Cross-layer Design of Wireless Multimedia Sensor Networks with
                  Correlation and Uncertainty},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1009--1016},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1009-1016},
  doi          = {10.4304/JNW.6.7.1009-1016},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YouL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuB11,
  author       = {Haizheng Yu and
                  Hong Bian},
  title        = {Threshold-based Message Copies Control in Delay Tolerant Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {96--103},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.96-103},
  doi          = {10.4304/JNW.6.1.96-103},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuCSL11,
  author       = {Miao Yu and
                  Jianzhong Chen and
                  Lei Shen and
                  Shiju Li},
  title        = {Blind Separation of {DS-CDMA} Signals with {ICA} Method},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {198--205},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.198-205},
  doi          = {10.4304/JNW.6.2.198-205},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuCSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuLSYC11,
  author       = {Fei Yu and
                  Yiqin Lu and
                  Jian Shu and
                  Guangxue Yue and
                  Chin{-}Chen Chang},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1387--1389},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1387-1389},
  doi          = {10.4304/JNW.6.10.1387-1389},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuLSYC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuLZX11,
  author       = {Xiangbin Yu and
                  Yanfeng Li and
                  Tingting Zhou and
                  Dazhuan Xu},
  title        = {Performance of Adaptive Modulation with {STBC} and Imperfect Feedback
                  Information over Rayleigh Fading Channel},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {137--144},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.137-144},
  doi          = {10.4304/JNW.6.1.137-144},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuLZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuY11,
  author       = {Dan Yu and
                  Jian Yang},
  title        = {Highway Incident Detection Research Based on Lipschitz Exponent Algorithm},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {923--927},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.923-927},
  doi          = {10.4304/JNW.6.6.923-927},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuYFSH11,
  author       = {Gang Yu and
                  Hongzhi Yang and
                  Shuqin Fan and
                  Yong Shen and
                  Wenbao Han},
  title        = {Efficient Certificateless Signcryption Scheme from Weil Pairing},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1280--1287},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1280-1287},
  doi          = {10.4304/JNW.6.9.1280-1287},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuYFSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuZLYL11,
  author       = {Sheng Yu and
                  Shijie Zhou and
                  Leyuan Liu and
                  Rui Yang and
                  Jiaqing Luo},
  title        = {Detecting Malware Variants by Byte Frequency},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {638--645},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.638-645},
  doi          = {10.4304/JNW.6.4.638-645},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/YuZLYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuZS11,
  author       = {Yike Yu and
                  Xuefeng Zheng and
                  Hua Sun},
  title        = {An Identity Based Aggregate Signature from Pairings},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {631--637},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.631-637},
  doi          = {10.4304/JNW.6.4.631-637},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuanHLCS11,
  author       = {Wei Yuan and
                  Liang Hu and
                  Hongtu Li and
                  Jianfeng Chu and
                  Yuyu Sun},
  title        = {Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold
                  Signcryption Scheme},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1557--1564},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1557-1564},
  doi          = {10.4304/JNW.6.11.1557-1564},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuanHLCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YuanHLCS11a,
  author       = {Wei Yuan and
                  Liang Hu and
                  Hongtu Li and
                  Jianfeng Chu and
                  Yuyu Sun},
  title        = {Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement
                  Protocol},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1578--1585},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1578-1585},
  doi          = {10.4304/JNW.6.11.1578-1585},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YuanHLCS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YueJWCSX11,
  author       = {Guangxue Yue and
                  Tao Jiang and
                  Jiajin Wang and
                  Zhi Chen and
                  Jiajia Song and
                  Cheng Xu},
  title        = {Underlying Technology of {P2P} Media Streaming},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1195--1205},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1195-1205},
  doi          = {10.4304/JNW.6.8.1195-1205},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YueJWCSX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YueWLXX11,
  author       = {Guangxue Yue and
                  Nanqing Wei and
                  Jiansheng Liu and
                  Xiaofeng Xiong and
                  Linquan Xie},
  title        = {Survey on Scheduling Technologies of {P2P} Media Streaming},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1129--1136},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1129-1136},
  doi          = {10.4304/JNW.6.8.1129-1136},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YueWLXX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAKK11,
  author       = {Salim Zabir and
                  Jemal H. Abawajy and
                  Farid Ahmed and
                  Joarder Kamruzzaman and
                  Mohammad Ataul Karim},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.1-3},
  doi          = {10.4304/JNW.6.1.1-3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZabirAAKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhanZTSS11,
  author       = {Qi Zhan and
                  Guangxi Zhu and
                  Li Tan and
                  Peng Shang and
                  Gang Su},
  title        = {A Novel Dynamic Proportional Fair Scheduling Based on Block Diagonal
                  Geometric Mean Decomposition},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {71--79},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.71-79},
  doi          = {10.4304/JNW.6.1.71-79},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhanZTSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang11,
  author       = {Yan Zhang},
  title        = {Precise Location Technology Based on Chirp Spread Spectrum},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {872--878},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.872-878},
  doi          = {10.4304/JNW.6.6.872-878},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang11a,
  author       = {Jun Zhang},
  title        = {An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy
                  Multi-Signature Scheme},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1238--1245},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1238-1245},
  doi          = {10.4304/JNW.6.8.1238-1245},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhang11b,
  author       = {Jun Zhang},
  title        = {Improvement of a Forward-Secure Multi-Proxy Signature Scheme},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1272--1279},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1272-1279},
  doi          = {10.4304/JNW.6.9.1272-1279},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhang11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangCWHB11,
  author       = {Xiaosong Zhang and
                  Ting Chen and
                  Xiao{-}lin Wang and
                  Yong Huang and
                  Hou{-}bin Bao},
  title        = {{CRBA:} {A} Capacity Restricted Model Evolved from {BA} Model for
                  Complex Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1163--1170},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1163-1170},
  doi          = {10.4304/JNW.6.8.1163-1170},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangCWHB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangHW11,
  author       = {Xing Zhang and
                  Jingsha He and
                  Qian Wei},
  title        = {Secure and Energy-Efficient Routing for Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1288--1295},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1288-1295},
  doi          = {10.4304/JNW.6.9.1288-1295},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangHWL11,
  author       = {De{-}gan Zhang and
                  Yu{-}xia Hu and
                  Dong Wang and
                  Yan{-}pin Liang},
  title        = {A New Algorithm of Service Discovery Based on {DHT} for Mobile Application},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1466--1474},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1466-1474},
  doi          = {10.4304/JNW.6.10.1466-1474},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangHWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangKLE11,
  author       = {Guiling Zhang and
                  Yongzhen Ke and
                  Zhichao Li and
                  Mingjie E},
  title        = {Improvments of Payload-based Intrusion Detection Models by Using Noise
                  Against Fuzzy {SVM}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {330--340},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.330-340},
  doi          = {10.4304/JNW.6.2.330-340},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangKLE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangL11,
  author       = {Haitao Zhang and
                  Zhen Li},
  title        = {Simulation of Networked Control System based on Smith Compensator
                  and Single Neuron Incomplete Differential Forward {PID}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1675--1681},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1675-1681},
  doi          = {10.4304/JNW.6.12.1675-1681},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangLQ11,
  author       = {Yuwei Zhang and
                  Ye Li and
                  Dengyu Qiao},
  title        = {Energy-Quality System Design for Wireless Communication},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {272--278},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.272-278},
  doi          = {10.4304/JNW.6.2.272-278},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangLQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangW11,
  author       = {Ming Zhang and
                  Suoping Wang},
  title        = {An Energy Efficient Dynamic Clustering Protocol Based on Weight in
                  Wireless Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {1057--1064},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.1057-1064},
  doi          = {10.4304/JNW.6.7.1057-1064},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangWH11,
  author       = {Leyou Zhang and
                  Qing Wu and
                  Yupu Hu},
  title        = {Secure Identity-based Threshold Broadcast Encryption in the Standard
                  Model},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1602--1609},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1602-1609},
  doi          = {10.4304/JNW.6.11.1602-1609},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangWYXZXR11,
  author       = {Wei Zhang and
                  Huan Wang and
                  Binbin Yu and
                  Wei Xu and
                  Mingfa Zhu and
                  Limin Xiao and
                  Li Ruan},
  title        = {A Request Distribution Algorithm for Web Server Cluster},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1760--1766},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1760-1766},
  doi          = {10.4304/JNW.6.12.1760-1766},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangWYXZXR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ11,
  author       = {Nan Zhang and
                  Jianhua Zhang},
  title        = {A Self-adapted Anycast Routing Algorithm Based on Mobile Agent in
                  Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {2},
  pages        = {206--213},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.2.206-213},
  doi          = {10.4304/JNW.6.2.206-213},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZ11a,
  author       = {Xianfeng Zhang and
                  Narisa Zhao},
  title        = {The Model and Simulation of the Invulnerability of Scale-free Networks
                  Based on "Honeypot"},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {928--931},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.928-931},
  doi          = {10.4304/JNW.6.6.928-931},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhangZY11,
  author       = {Longchang Zhang and
                  Hua Zou and
                  Fangchun Yang},
  title        = {A Dynamic Web Service Composition Algorithm Based on {TOPSIS}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1296--1304},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1296-1304},
  doi          = {10.4304/JNW.6.9.1296-1304},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhangZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaniEK11,
  author       = {Mohamed Faten Zhani and
                  Halima Elbiaze and
                  Farouk Kamoun},
  title        = {An Empirical Evaluation of Multi-Step Prediction Performance},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {567--576},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.567-576},
  doi          = {10.4304/JNW.6.4.567-576},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaniEK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoD11,
  author       = {Narisa Zhao and
                  Xiaoming Dai},
  title        = {Research on the Evolutionary Model of {A} Kind of Vertex-splitting
                  Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {904--906},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.904-906},
  doi          = {10.4304/JNW.6.6.904-906},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoLY11,
  author       = {Chengli Zhao and
                  Yanheng Liu and
                  Zhiheng Yu},
  title        = {Evaluation for Survivable Networked System Based on Grey Correlation
                  and Improved {TOPSIS}},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1514--1520},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1514-1520},
  doi          = {10.4304/JNW.6.10.1514-1520},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoWCC11,
  author       = {Shenghui Zhao and
                  Guoxin Wu and
                  Guilin Chen and
                  Haibao Chen},
  title        = {Reputation-aware Service Selection based on QoS Similarity},
  journal      = {J. Networks},
  volume       = {6},
  number       = {7},
  pages        = {950--957},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.7.950-957},
  doi          = {10.4304/JNW.6.7.950-957},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoWCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhaoXWH11,
  author       = {Xiufeng Zhao and
                  Qiuliang Xu and
                  Hao Wang and
                  Peng He},
  title        = {A Scalable ID-based Constant-round {AGKE} Protocol with Logarithmic
                  Computation Complexity},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1422--1429},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1422-1429},
  doi          = {10.4304/JNW.6.10.1422-1429},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhaoXWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zheng11,
  author       = {Yuhuang Zheng},
  title        = {Development of a Ubiquitous Industrial Data Acquisition System for
                  Rotogravure Printing Press},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1543--1548},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1543-1548},
  doi          = {10.4304/JNW.6.11.1543-1548},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zheng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengT11,
  author       = {Guoqiang Zheng and
                  Shengyu Tang},
  title        = {Spatial Correlation-Based {MAC} Protocol for Event-Driven Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {121--128},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.121-128},
  doi          = {10.4304/JNW.6.1.121-128},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhengT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhengZZ11,
  author       = {Minghui Zheng and
                  Jing Zhang and
                  Zhi Zhang},
  title        = {Mediated Certificateless Signature without Random Oracles},
  journal      = {J. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1222--1229},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.8.1222-1229},
  doi          = {10.4304/JNW.6.8.1222-1229},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhengZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhongD11,
  author       = {Shaojun Zhong and
                  Zhijuan Deng},
  title        = {A Web Crawler System Design Based on Distributed Technology},
  journal      = {J. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1682--1689},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.12.1682-1689},
  doi          = {10.4304/JNW.6.12.1682-1689},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhongD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhongZ11,
  author       = {Shaobo Zhong and
                  Dongsheng Zou},
  title        = {Web Page Classification using an ensemble of support vector machine
                  classifiers},
  journal      = {J. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1625--1630},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.11.1625-1630},
  doi          = {10.4304/JNW.6.11.1625-1630},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhongZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/Zhou11,
  author       = {Peng Zhou},
  title        = {Implementation of Optimal Pacing Scheme in Xinjiang's Oil and Gas
                  Pipeline Leak Monitoring Network},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {54--61},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.54-61},
  doi          = {10.4304/JNW.6.1.54-61},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/Zhou11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouX11,
  author       = {Xinlian Zhou and
                  Jianbo Xu},
  title        = {Research of network topological control algorithm in mWSN},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1414--1421},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1414-1421},
  doi          = {10.4304/JNW.6.10.1414-1421},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouXM11,
  author       = {Mu Zhou and
                  Yubin Xu and
                  Lin Ma},
  title        = {Adaptive Autocorrelation Approach for Fingerprint-based Distance Dependent
                  Positioning Algorithms in {WLAN} Indoor Areas},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1475--1482},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1475-1482},
  doi          = {10.4304/JNW.6.10.1475-1482},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouXM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuDLL11,
  author       = {Yufeng Zhu and
                  Xiaoli Ding and
                  Yan Luo and
                  Zhiwei Li},
  title        = {Analysis on the Application of {GPS-RTK} Technology using in Yangkou
                  man-made Island in Nantong City},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1444--1451},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1444-1451},
  doi          = {10.4304/JNW.6.10.1444-1451},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuDLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuGX11,
  author       = {Xue{-}Qin Zhu and
                  Ying Gui and
                  Hongzhen Xu},
  title        = {Enhanced Differentiated Surveillance for Static and Random Mobile
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1483--1490},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.10.1483-1490},
  doi          = {10.4304/JNW.6.10.1483-1490},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuGX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuLLJ11,
  author       = {Wensheng Zhu and
                  Youming Li and
                  Yanjuan Lu and
                  Ming Jin},
  title        = {Blind Channel Estimation with Lower Complexity Algorithm for {OFDM}
                  System},
  journal      = {J. Networks},
  volume       = {6},
  number       = {5},
  pages        = {783--790},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.5.783-790},
  doi          = {10.4304/JNW.6.5.783-790},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuLLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuWML11,
  author       = {Hai Zhu and
                  Yuping Wang and
                  Zhanxin Ma and
                  Hecheng Li},
  title        = {Grid Dependent Tasks Security Scheduling Model and {DPSO} Algorithm},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {850--857},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.850-857},
  doi          = {10.4304/JNW.6.6.850-857},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuWML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhuangWS11,
  author       = {Lei Zhuang and
                  Chao Wang and
                  Wei Song},
  title        = {Research of an Optimized Mobile IPv6 Real-time Seamless Handover Technology},
  journal      = {J. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1373--1378},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.9.1373-1378},
  doi          = {10.4304/JNW.6.9.1373-1378},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhuangWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics