Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnw/jnw6.bht:"
@article{DBLP:journals/jnw/AdamiCGNP11, author = {Davide Adami and Christian Callegari and Stefano Giordano and Gianfranco Nencioni and Michele Pagano}, title = {Design and Performance Evaluation of Service Overlay Networks Topologies}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {556--566}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.556-566}, doi = {10.4304/JNW.6.4.556-566}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AdamiCGNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AhsanLNA11, author = {Md. Shamim Ahsan and Man Seop Lee and S. H. Shah Newaz and Syed Md. Asif}, title = {Migration to the Next Generation Optical Access Networks Using Hybrid {WDM/TDM-PON}}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {18--25}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.18-25}, doi = {10.4304/JNW.6.1.18-25}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/AhsanLNA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AkterR11, author = {Roksana Akter and M. Lutfar Rahman}, title = {A Geometric Model to Reduce Interference Computations in Simulation of Large Ad hoc Networks}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {46--53}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.46-53}, doi = {10.4304/JNW.6.1.46-53}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AkterR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Al-AdwanyA11, author = {Maan A. S. Al{-}Adwany and Amin M. Abbosh}, title = {Interference Reduction in Overlaid {WCDMA} and {TDMA} Systems}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {587--594}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.587-594}, doi = {10.4304/JNW.6.4.587-594}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Al-AdwanyA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BaiSY11, author = {Jie Bai and Kai Sun and Genke Yang}, title = {Mathematical Model and Hybrid Scatter Search for Cost Driven Job-shop Scheduling Problem}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {974--981}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.974-981}, doi = {10.4304/JNW.6.7.974-981}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BaiSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BaoZZ11, author = {Liyong Bao and Dongfeng Zhao and Yifan Zhao}, title = {A Cluster-based priority Scheduling Algorithm for {MAC} Layer in Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1507--1513}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1507-1513}, doi = {10.4304/JNW.6.10.1507-1513}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BaoZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BiZL11, author = {Hongbo Bi and Yubo Zhang and Xueming Li}, title = {Video Watermarking Robust Against Spatio-Temporal Attacks}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {932--936}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.932-936}, doi = {10.4304/JNW.6.6.932-936}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BiZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaiC11, author = {Yongquan Cai and Fulai Cheng}, title = {A Threshold Signature Scheme with a Weakened Trusted Party}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {883--886}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.883-886}, doi = {10.4304/JNW.6.6.883-886}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaiS11, author = {Yongquan Cai and Huili Shi}, title = {Rational Secret Sharing Scheme Based on Probability Encryption without Trusted Center}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {899--903}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.899-903}, doi = {10.4304/JNW.6.6.899-903}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Chan11, author = {Yu{-}Wei Chan}, title = {On the Design of {A} Contribution-based, Flexible Locality-Aware {P2P} Streaming Network}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {750--756}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.750-756}, doi = {10.4304/JNW.6.5.750-756}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Chan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChandrasettyA11, author = {Vikram Arkalgud Chandrasetty and Syed Mahfuzul Aziz}, title = {{FPGA} Implementation of a {LDPC} Decoder using a Reduced Complexity Message Passing Algorithm}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {36--45}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.36-45}, doi = {10.4304/JNW.6.1.36-45}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChandrasettyA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Chang11, author = {Rong{-}Chi Chang}, title = {Interactive E-diagnosis: An Efficient Scheme for Medical Diagnosis Support System}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {713--720}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.713-720}, doi = {10.4304/JNW.6.5.713-720}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Chang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenCSC11, author = {Chien{-}Sheng Chen and Yi{-}Jen Chiu and Ho{-}Nien Shou and Ching{-}Lung Chi}, title = {Non-line-of-sight Error Mitigation in Wireless Communication Systems}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1647--1653}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1647-1653}, doi = {10.4304/JNW.6.11.1647-1653}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenCSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenCZSLW11, author = {Dong Chen and Guiran Chang and Xiuying Zheng and Dawei Sun and Jiajia Li and Xingwei Wang}, title = {A Novel {P2P} Based Grid Resource Discovery Model}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1390--1397}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1390-1397}, doi = {10.4304/JNW.6.10.1390-1397}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenCZSLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenLH11, author = {Zujue Chen and Shaoqing Liu and Jun Huang}, title = {Multi-tier Grid Routing to Mobile Sink in Large-scale Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {765--773}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.765-773}, doi = {10.4304/JNW.6.5.765-773}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenLLC11, author = {Chien{-}Sheng Chen and Jium{-}Ming Lin and Wen{-}Hsiung Liu and Ching{-}Lung Chi}, title = {Dilution of Position Calculation for {MS} Location Improvement in Wireless Communication Systems}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1452--1458}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1452-1458}, doi = {10.4304/JNW.6.10.1452-1458}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenLLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenWZZ11, author = {Gang Chen and Xinrong Wu and Wenqiang Zhang and Xiang Zheng}, title = {A Cross-Layer Resource Allocation Algorithm with Dynamic Buffer Allocation Mechanism}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {104--111}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.104-111}, doi = {10.4304/JNW.6.1.104-111}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenWZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenYP11, author = {Wen Chen and Jinming Yu and Feng Pan}, title = {Optimal Priority-based Call Admission Control Scheme For QoS Provisioning in Heterogeneous Wireless Networks}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {319--329}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.319-329}, doi = {10.4304/JNW.6.2.319-329}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenYP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenYWTYX11, author = {Zuo Chen and Qiuwei Yang and Xin Wan and Yuanyan Tu and Fei Yu and Chen Xu}, title = {Automated Trust Negotiation with Time Behavior}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1091--1098}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1091-1098}, doi = {10.4304/JNW.6.8.1091-1098}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenYWTYX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenYWTYX11a, author = {Zuo Chen and Qiuwei Yang and Xin Wan and Yuanyan Tu and Fei Yu and Chen Xu}, title = {Privacy Preservation in Role-based Access Control Model}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1106--1113}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1106-1113}, doi = {10.4304/JNW.6.8.1106-1113}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenYWTYX11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChengJG11, author = {Kefei Cheng and Tingqiang Jia and Meng Gao}, title = {Research and Implementation of Three {HTTPS} Attacks}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {757--764}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.757-764}, doi = {10.4304/JNW.6.5.757-764}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChengJG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChiangCLS11, author = {Ding{-}Jung Chiang and Chien{-}Liang Chen and Chi{-}Yi Lin and Timothy K. Shih}, title = {Broadcasting Data Items with Time Constraints Based on On-Demand Multichannel in Ubiquitous Environments}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {689--696}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.689-696}, doi = {10.4304/JNW.6.5.689-696}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChiangCLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CuiC11, author = {Hui Cui and Tianjie Cao}, title = {A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1337--1343}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1337-1343}, doi = {10.4304/JNW.6.9.1337-1343}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/CuiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DaiCWZL11, author = {Weihui Dai and Xiang Cai and Haifeng Wu and Weidong Zhao and Xuan Li}, title = {An Integrated Mobile Phone Payment System Based on 3G Network}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1329--1336}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1329-1336}, doi = {10.4304/JNW.6.9.1329-1336}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DaiCWZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DaiWLYX11, author = {Weihui Dai and Chunshi Wang and Guoxi Li and Fei Yu and Chen Xu}, title = {Research on 3G-based Mobile Self-rescue System for Medical Emergency}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1214--1221}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1214-1221}, doi = {10.4304/JNW.6.8.1214-1221}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DaiWLYX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DaiXC11, author = {Liang Dai and Hongke Xu and Ting Chen}, title = {A Task Scheduling Strategy in Heterogeneous Multi-sinks Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1586--1593}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1586-1593}, doi = {10.4304/JNW.6.11.1586-1593}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DaiXC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DengHKLLH11, author = {Lawrence Y. Deng and Jason C. Hung and Huan{-}Chao Keh and Kun{-}Yi Lin and Yi{-}Jen Liu and Nan{-}Ching Huang}, title = {Real-time Hand Gesture Recognition by Shape Context Based Matching and Cost Matrix}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {697--704}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.697-704}, doi = {10.4304/JNW.6.5.697-704}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DengHKLLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DengS11, author = {Yuqiao Deng and Ge Song}, title = {Proxy re-signature Scheme Based on Quadratic Residues}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1459--1465}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1459-1465}, doi = {10.4304/JNW.6.10.1459-1465}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DengS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DengZ11, author = {Zhijuan Deng and Shaojun Zhong}, title = {A Ranking Method of Retrieval Results Based on Web Comprehending}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1690--1696}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1690-1696}, doi = {10.4304/JNW.6.12.1690-1696}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DengZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DhraiefB11, author = {Amine Dhraief and Abdelfettah Belghith}, title = {Mobility Impact on Session Survivability under the {SHIM6} Protocol and Enhancement of its Rehoming Procedure}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1521--1532}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1521-1532}, doi = {10.4304/JNW.6.11.1521-1532}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DhraiefB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DingHLBZS11, author = {Hao Ding and Kun Mean Hou and Jacques Lecoq and Gerard Bohner and Haiying Zhou and Hong Sun}, title = {Toward a Low Cost and Single Chip Holter: SoC-Holter}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {181--189}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.181-189}, doi = {10.4304/JNW.6.2.181-189}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DingHLBZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DingWC11, author = {Qun Ding and Lu Wang and Guanrong Chen}, title = {Correlative Peak Interval Prediction and Analysis of Chaotic Sequences}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1049--1056}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1049-1056}, doi = {10.4304/JNW.6.7.1049-1056}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/DingWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FanW11, author = {Shaosheng Fan and Hainan Wang}, title = {Multi-direction Fuzzy Morphology Algorithm for Image Edge Detection}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {895--898}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.895-898}, doi = {10.4304/JNW.6.6.895-898}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FanW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FengBHC11, author = {Tao Feng and Jun Bi and Hongyu Hu and Hui Cao}, title = {Networking as a Service: a Cloud-based Network Architecture}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1084--1090}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1084-1090}, doi = {10.4304/JNW.6.7.1084-1090}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FengBHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FengLLH11, author = {Hailin Feng and Guanghui Li and Wenwei Lu and Leijun Huang}, title = {Trust Based Secure In-network Data Processing Schema in Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {295--302}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.295-302}, doi = {10.4304/JNW.6.2.295-302}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FengLLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FontugneHF11, author = {Romain Fontugne and Toshio Hirotsu and Kensuke Fukuda}, title = {A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {577--586}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.577-586}, doi = {10.4304/JNW.6.4.577-586}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FontugneHF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaoMH11, author = {Ang Gao and Dejun Mu and Yansu Hu}, title = {A QoS Control Approach in Differentiated Web Caching Service}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {62--70}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.62-70}, doi = {10.4304/JNW.6.1.62-70}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaoMH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaoQWC11, author = {Demin Gao and Huanyan Qian and Zheng Wang and Jiguang Chen}, title = {Study and Design an Anycast Routing Protocol for Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1726--1733}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1726-1733}, doi = {10.4304/JNW.6.12.1726-1733}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaoQWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaoWD11, author = {Yan Gao and Min Wu and Weifeng Du}, title = {Performance Research of Modulation for Optical Wireless Communication System}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1099--1105}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1099-1105}, doi = {10.4304/JNW.6.8.1099-1105}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaoWD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaoXLW11, author = {Guohong Gao and Wenxian Xiao and Zhen Liu and Wenlong Wan}, title = {An Application of the Modification of Slow Start Algorithm in Campus Network}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1549--1556}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1549-1556}, doi = {10.4304/JNW.6.11.1549-1556}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaoXLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuL11, author = {Tianlong Gu and Shenghui Liu}, title = {Guest Editorial}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {937--938}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.937-938}, doi = {10.4304/JNW.6.7.937-938}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuZS11, author = {Chengjie Gu and Shunyi Zhang and Yanfei Sun}, title = {Pricing Incentive Mechanism based on Multi-stages Traffic Classification Methodology for QoS-enabled Networks}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {163--171}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.163-171}, doi = {10.4304/JNW.6.1.163-171}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuoC11, author = {Lin Guo and Qinghu Chen}, title = {A Collaborative Nonlocal-Means Super-resolution Algorithm Using Zernike Monments}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {966--973}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.966-973}, doi = {10.4304/JNW.6.7.966-973}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuoLC11, author = {Lejiang Guo and Qiang Li and Fangxin Chen}, title = {A Novel Cluster-head Selection Algorithm Based on Hybrid Genetic Optimization for Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {815--822}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.815-822}, doi = {10.4304/JNW.6.5.815-822}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuoLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GuoML11, author = {Haoming Guo and Shilong Ma and Feng Liang}, title = {Enabling Awareness Driven Differentiated data service in {IOT}}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1572--1577}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1572-1577}, doi = {10.4304/JNW.6.11.1572-1577}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GuoML11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HaddadTTY11, author = {Hazim Anas Haddad and Shinsuke Tamura and Shuji Taniguchi and Tatsuro Yanase}, title = {Development of Anonymous Networks Based on Symmetric Key Encryptions}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1533--1542}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1533-1542}, doi = {10.4304/JNW.6.11.1533-1542}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HaddadTTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HangHS11, author = {Bo Hang and Ruimin Hu and Wei Shi}, title = {An Enhanced {SYN} Cookie Defence Method for {TCP} DDoS Attack}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1206--1213}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1206-1213}, doi = {10.4304/JNW.6.8.1206-1213}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HangHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HaoCHZ11, author = {Jutao Hao and Qingkui Chen and Huan Huo and Jingjing Zhao}, title = {Energy Efficient Clustering Algorithm for Data Gathering in Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {490--497}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.490-497}, doi = {10.4304/JNW.6.3.490-497}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HaoCHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HaqueN11, author = {Md. Rakibul Haque and Mahmuda Naznin}, title = {Monitoring Cost Reduction in Sensor Networks using Proximity Queries}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {4--11}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.4-11}, doi = {10.4304/JNW.6.1.4-11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HaqueN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuDW11, author = {Juanli Hu and Jiabin Deng and Juebo Wu}, title = {Image Compression Based on Improved {FFT} Algorithm}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1041--1048}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1041-1048}, doi = {10.4304/JNW.6.7.1041-1048}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuDW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuLZ11, author = {Zhengbing Hu and Huaiqing Lin and Yonghong Zhou}, title = {A Fuzzy Reputation Management System with Punishment Mechanism for {P2P} Network}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {190--197}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.190-197}, doi = {10.4304/JNW.6.2.190-197}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuSL11, author = {Shengbo Hu and Heng Shu and Tiancheng Lin}, title = {Analysis on Stability of a Network Based on {RED} Scheme}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {654--661}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.654-661}, doi = {10.4304/JNW.6.4.654-661}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Huang11, author = {Lijuan Huang}, title = {Analysis on E-consumers' Purchasing Behavior Based on Data-driving Model}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1713--1718}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1713-1718}, doi = {10.4304/JNW.6.12.1713-1718}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Huang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangCHHY11, author = {Chun{-}Hong Huang and Su{-}Li Chin and Li{-}Hua Hsin and Jason C. Hung and Yi{-}Pei Yu}, title = {A Web-based E-learning Platform for Physical Education}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {721--727}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.721-727}, doi = {10.4304/JNW.6.5.721-727}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangCHHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Hung11, author = {Jason C. Hung}, title = {Foreword of Special Issue on "Nomadic Services and Applications"}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {687--688}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.687-688}, doi = {10.4304/JNW.6.5.687-688}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Hung11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Hung11a, author = {Jason C. Hung}, title = {Using Active {RFID} to Realize Ubi-media System}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {743--749}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.743-749}, doi = {10.4304/JNW.6.5.743-749}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Hung11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HungKSL11, author = {Le Xuan Hung and Murad Khalid and Ravi Sankar and Sungyoung Lee}, title = {An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {355--364}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.355-364}, doi = {10.4304/JNW.6.3.355-364}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HungKSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuoJW11, author = {Zhanqiang Huo and Shunfu Jin and Zhiheng Wang}, title = {Performance Analysis and Evaluation for Sleep-mode with Uplink/Downlink Traffics in {IEEE} 802.16e Network}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1145--1152}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1145-1152}, doi = {10.4304/JNW.6.8.1145-1152}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuoJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/IslamI11, author = {Md. Jahedul Islam and Md. Rafiqul Islam}, title = {Impact of {GVD} and {SPM} on the Performance of {DS-OCDMA}}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {12--17}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.12-17}, doi = {10.4304/JNW.6.1.12-17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/IslamI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiaWZ11, author = {Zongpu Jia and Gaolei Wang and Ran Zhao}, title = {A Literature Survey on Handoff for Mobile IPv6}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1137--1144}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1137-1144}, doi = {10.4304/JNW.6.8.1137-1144}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiaWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JianM11, author = {Chengfeng Jian and Haizhong Meng}, title = {{XOEM} plus OWL-based {STEP} Product Information Uniform Description and Implementation}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1662--1667}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1662-1667}, doi = {10.4304/JNW.6.12.1662-1667}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JianM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangH11, author = {Yu Jiang and Aiqun Hu}, title = {Finding the Most Vital Link with Respect to the Characteristic of Network Communication}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {462--469}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.462-469}, doi = {10.4304/JNW.6.3.462-469}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangXW11, author = {Congfeng Jiang and Xianghua Xu and Jian Wan}, title = {Security Aware Parallel and Independent Job Scheduling in Grid Computing Environments Based on Adaptive Job Replication}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1321--1328}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1321-1328}, doi = {10.4304/JNW.6.9.1321-1328}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/JiangXW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KangSZ11, author = {Jian Kang and Yuan{-}Zhang Song and Jun{-}Yao Zhang}, title = {Accurate Detection of Peer-to-Peer Botnet using Multi-Stream Fused Scheme}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {807--814}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.807-814}, doi = {10.4304/JNW.6.5.807-814}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KangSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KarjeeJ11, author = {Jyotirmoy Karjee and H. S. Jamadagni}, title = {Data Accuracy Estimation for Spatially Correlated Data in Wireless Sensor Networks under Distributed Clustering}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1072--1083}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1072-1083}, doi = {10.4304/JNW.6.7.1072-1083}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KarjeeJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiCLL11, author = {Weimin Li and Xiao{-}guang Cao and Fang Liu and Zhenming Lei}, title = {Improving {DNS} cache to alleviate the impact of {DNS} DDoS attack}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {279--286}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.279-286}, doi = {10.4304/JNW.6.2.279-286}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiCLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiJ11, author = {Jianbo Li and Shan Jiang}, title = {A Scalable Clustering Algorithm in Dense Mobile Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {505--512}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.505-512}, doi = {10.4304/JNW.6.3.505-512}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiLHW11, author = {Jianyong Li and Jianchun Li and Daoying Huang and Qiang Wei}, title = {A Novel {HAVE} Message of Peer-to-peer Protocol in BitTorrent Systems}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1747--1753}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1747-1753}, doi = {10.4304/JNW.6.12.1747-1753}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiLHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiLLYD11, author = {Xuan Li and Lixin Lin and Xin Liu and Dejian Ye and Weihui Dai}, title = {{STB} Based Multimedia Information Publication System}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1305--1312}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1305-1312}, doi = {10.4304/JNW.6.9.1305-1312}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiLLYD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiSC11, author = {Xiaofei Li and Xuanjing Shen and Haipeng Chen}, title = {ElGamal Digital Signature Algorithm of Adding a Random Number}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {774--782}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.774-782}, doi = {10.4304/JNW.6.5.774-782}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiSX11, author = {Hui Li and Yue{-}hong Shen and Kun Xu}, title = {Neural Network with Momentum for Dynamic Source Separation and its Convergence Analysis}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {791--798}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.791-798}, doi = {10.4304/JNW.6.5.791-798}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiWSG11, author = {Xiangli Li and Kaimin Wei and Xiaolin Sun and Yanhong Gao}, title = {A Performance Value Adaptive Routing for Mobile Ad Hoc Network}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1367--1372}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1367-1372}, doi = {10.4304/JNW.6.9.1367-1372}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiWSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiY11, author = {Chi Yuan Li and Zhi Qiang Yao}, title = {The Validation of Credit Card Number on the Wired and Wireless Internet}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {432--437}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.432-437}, doi = {10.4304/JNW.6.3.432-437}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiY11a, author = {Li Li and Hua Yan}, title = {Cost Aggregation Strategy with Bilateral Filter Based on Multi-scale Nonlinear Structure Tensor}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {958--965}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.958-965}, doi = {10.4304/JNW.6.7.958-965}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiY11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiangBQ11, author = {Kaijian Liang and Linfeng Bai and Xilong Qu}, title = {Expectation Value Calculation of Grid QoS Parameters Based on Algorithm Prim}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1618--1624}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1618-1624}, doi = {10.4304/JNW.6.11.1618-1624}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiangBQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LinCWZX11, author = {Fuhong Lin and Changjia Chen and Hengkui Wu and Hongke Zhang and Ke Xiong}, title = {{QHNS:} QoS-aware Hierarchical Name System}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1491--1498}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1491-1498}, doi = {10.4304/JNW.6.10.1491-1498}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LinCWZX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LinHZ11, author = {Huaiqing Lin and Zhengbing Hu and Yonghong Zhou}, title = {An Efficient Secure Multicast Communication for {P2P} Network}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {408--415}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.408-415}, doi = {10.4304/JNW.6.3.408-415}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LinHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LinWW11, author = {Kuan{-}Cheng Lin and Ting{-}Kuan Wu and Yu{-}Bin Wang}, title = {Developing a Web-based and Competition-based Quiz Game Environment to Improve Student Motivation}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {736--742}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.736-742}, doi = {10.4304/JNW.6.5.736-742}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LinWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LinZ11, author = {Huaiqing Lin and Yonghong Zhou}, title = {A Secure Protocol for Sharing Trust Data in Hybrid {P2P} Network}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {607--614}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.607-614}, doi = {10.4304/JNW.6.4.607-614}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LinZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liu11, author = {Bin Liu}, title = {A Semi-Supervised Clustering Method For {P2P} Traffic Classification}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {424--431}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.424-431}, doi = {10.4304/JNW.6.3.424-431}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liu11a, author = {Linfeng Liu}, title = {A Wireless Sensor Network Architecture for Diversiform Deployment Environments}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {482--489}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.482-489}, doi = {10.4304/JNW.6.3.482-489}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liu11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liu11b, author = {Youyuan Liu}, title = {Stable Routing Algorithm for Mobile Ad Hoc Network}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1171--1178}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1171-1178}, doi = {10.4304/JNW.6.8.1171-1178}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liu11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Liu11c, author = {Yuan Liu}, title = {Wavelet Fuzzy Neural Network based on {MQPSO} for Network Anomaly Detection}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1344--1350}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1344-1350}, doi = {10.4304/JNW.6.9.1344-1350}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Liu11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuLH11, author = {Yichun Liu and Yinghong Liang and Yuping Hu}, title = {A Fair Payment Protocol for Cascading {P2P} Transaction}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1313--1320}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1313-1320}, doi = {10.4304/JNW.6.9.1313-1320}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuMY11, author = {Weibo Liu and Wenping Ma and Yuanyuan Yang}, title = {Analysis and Improvement of the {BAN} Modified Andrew Secure {RPC} Protocol}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {662--669}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.662-669}, doi = {10.4304/JNW.6.4.662-669}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuSY11, author = {Yong Liu and Lifeng Sun and Shiqiang Yang}, title = {Wireless Video Transmission Scheme Based on Virtual {MIMO} and Network Coding Technology}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {88--95}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.88-95}, doi = {10.4304/JNW.6.1.88-95}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuSZT11, author = {Yu Liu and Qiang Shen and Zhijun Zhao and Hui Tang}, title = {Proactive Location Service in Mobility Management}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {670--677}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.670-677}, doi = {10.4304/JNW.6.4.670-677}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuSZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuWYXX11, author = {Jiansheng Liu and Jiajia Wei and Guangxue Yue and Linquan Xie and Xiaofeng Xiong}, title = {Application Layer Multicast Technology of Streaming Media}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1122--1128}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1122-1128}, doi = {10.4304/JNW.6.8.1122-1128}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuWYXX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LongSY11, author = {Fei Long and Fuchun Sun and Zhian Yang}, title = {A Novel Routing Algorithm Based on Multi-Objective Optimization for Satellite Networks}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {238--246}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.238-246}, doi = {10.4304/JNW.6.2.238-246}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/LongSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Lu11, author = {Yue Lu}, title = {A Relatively Optimal Cross-layer Routing Algorithm in Wireless Mesh Network}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1499--1506}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1499-1506}, doi = {10.4304/JNW.6.10.1499-1506}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Lu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuL11, author = {Yang Lu and Jiguo Li}, title = {A Practical Forward-Secure Public-Key Encryption Scheme}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1254--1261}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1254-1261}, doi = {10.4304/JNW.6.9.1254-1261}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LuoLC11, author = {Zhen Luo and Zhishu Li and Biao Cai}, title = {A Self-organized Public-Key Certificate System in {P2P} network}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1437--1443}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1437-1443}, doi = {10.4304/JNW.6.10.1437-1443}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuoLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LvYHCC11, author = {Zhihan Lv and Tengfei Yin and Yong Han and Yong Chen and Ge Chen}, title = {WebVR - - Web Virtual Reality Engine Based on {P2P} network}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {990--998}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.990-998}, doi = {10.4304/JNW.6.7.990-998}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LvYHCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MaWD11, author = {Xiaoxue Ma and Zixian Wang and Ruizhong Du}, title = {Trust Evaluation Model based on Multiple Service Attributes}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {842--849}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.842-849}, doi = {10.4304/JNW.6.6.842-849}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MaWD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/McArdleTB11, author = {Conor McArdle and Daniele Tafani and Liam P. Barry}, title = {Analysis of a Buffered Optical Switch with General Interarrival Times}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {536--548}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.536-548}, doi = {10.4304/JNW.6.4.536-548}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/McArdleTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MengHW11, author = {Bo Meng and Wei Huang and Dejun Wang}, title = {Automatic Verification of Remote Internet Voting Protocol in Symbolic Model}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1262--1271}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1262-1271}, doi = {10.4304/JNW.6.9.1262-1271}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MengHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MinPJKC11, author = {Young{-}il Min and Hwan Min Park and Jun{-}Hee Jang and Keun{-}dae Kim and Hyung{-}Jin Choi}, title = {The Enhanced Decoding Method for {QO-SFBC} System in Frequency Selective Fading Channel Environment}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {378--386}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.378-386}, doi = {10.4304/JNW.6.3.378-386}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MinPJKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NajjarRRO11, author = {Monia Najjar and R. Rejeb and Houria Rezig and Mohammad S. Obaidat}, title = {Comparison of the Design Characteristics of {MMI} Wavelength Demultiplexers Using Different Approaches by Computing the Effective Index}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {549--555}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.549-555}, doi = {10.4304/JNW.6.4.549-555}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NajjarRRO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NguyenCHC11, author = {Dang Tu Nguyen and Wook Choi and Minh Thiep Ha and Hyunseung Choo}, title = {An Energy-efficient Multi-candidate Greedy Routing Scheme in Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {365--377}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.365-377}, doi = {10.4304/JNW.6.3.365-377}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NguyenCHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ObaidatS11, author = {Mohammad S. Obaidat and Jos{\'{e}} Luis Sevillano}, title = {Guest Editorial}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {533--535}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.533-535}, doi = {10.4304/JNW.6.4.533-535}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ObaidatS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/OguchiCLOY11, author = {Masato Oguchi and Hyung{-}Jin Choi and Tae{-}Jin Lee and Seong Keun Oh and Kwan{-}Ho You}, title = {Guest Editorial}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {341--342}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.341-342}, doi = {10.4304/JNW.6.3.341-342}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/OguchiCLOY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PengWZ11, author = {Xuena Peng and Yingyou Wen and Hong Zhao}, title = {Security Issues and Solutions in 3G Core Network}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {823--830}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.823-830}, doi = {10.4304/JNW.6.5.823-830}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PengWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PengZHLL11, author = {Daogang Peng and Hao Zhang and Cong{-}Hua Huang and Jiajun Lin and Hui Li}, title = {Study of Immune {PID} Networked Control System Based on TrueTime}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {912--915}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.912-915}, doi = {10.4304/JNW.6.6.912-915}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PengZHLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/QassrawiZ11, author = {Mahmoud T. Qassrawi and Hongli Zhang}, title = {Detecting Malicious Web Servers with Honeyclients}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {145--152}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.145-152}, doi = {10.4304/JNW.6.1.145-152}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/QassrawiZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/QianCQ11, author = {Hong{-}yan Qian and Wei{-}Xin Cai and Xiaolin Qin}, title = {Soft-Handoff in {WLAN} Realized by Dual Link}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {678--685}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.678-685}, doi = {10.4304/JNW.6.4.678-685}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/QianCQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/QinSD11, author = {Hang Qin and Jun Su and Youfu Du}, title = {{PCDS:} Power Control with Opportunistic Scheduling for Cognitive Radio Networks Reconfiguration}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {80--87}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.80-87}, doi = {10.4304/JNW.6.1.80-87}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/QinSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RahmanIFK11, author = {M. M. Hafizur Rahman and Yasushi Inoguchi and Faiz Al Faisal and Monoz Kumar Kundu}, title = {Symmetric and Folded Tori Connected Torus Network}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {26--35}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.26-35}, doi = {10.4304/JNW.6.1.26-35}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RahmanIFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RangoMM11, author = {Floriano De Rango and Andrea Malfitano and Salvatore Marano}, title = {{GCAD:} {A} Novel Call Admission Control Algorithm in {IEEE} 802.16 based Wireless Mesh Networks}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {595--606}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.595-606}, doi = {10.4304/JNW.6.4.595-606}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RangoMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RongC11, author = {Hui{-}Gui Rong and Hao Chen}, title = {An Independent Set Packet Classification Algorithm Using Priority Sorting}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1565--1571}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1565-1571}, doi = {10.4304/JNW.6.11.1565-1571}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RongC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShaLC11, author = {Yi Sha and MingMing Li and Jiafu Chu}, title = {A Novel Timing and Frequency Synchronization Technology for {OFDM} System}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {646--653}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.646-653}, doi = {10.4304/JNW.6.4.646-653}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShaLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Shang11, author = {Fengjun Shang}, title = {An Energy-Efficient Communication Protocol for Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {999--1008}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.999-1008}, doi = {10.4304/JNW.6.7.999-1008}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Shang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShenYCY11, author = {Shigen Shen and Guangxue Yue and Qiying Cao and Fei Yu}, title = {A Survey of Game Theory in Wireless Sensor Networks Security}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {521--532}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.521-532}, doi = {10.4304/JNW.6.3.521-532}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShenYCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Shi11, author = {Huawang Shi}, title = {Integration of Unascertained Method with Neural Networks and Its Application}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1631--1638}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1631-1638}, doi = {10.4304/JNW.6.11.1631-1638}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Shi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShiLLX11, author = {Wenxiao Shi and Bin Li and Na Li and Chuanjun Xia}, title = {A Network Architecture for Load Balancing of Heterogeneous Wireless Networks}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {623--630}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.623-630}, doi = {10.4304/JNW.6.4.623-630}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShiLLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShiWYW11, author = {Lei Shi and Zhanhong Wang and Yao Yao and Lin Wei}, title = {Streaming Media Caching Model Based on Knapsack Problem}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1379--1386}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1379-1386}, doi = {10.4304/JNW.6.9.1379-1386}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShiWYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShuangWZS11, author = {Kai Shuang and Siyuan Wang and Bo Zhang and Sen Su}, title = {{IMS} Security Analysis using Multi-attribute Model}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {263--271}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.263-271}, doi = {10.4304/JNW.6.2.263-271}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShuangWZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SongGFMZ11, author = {Yongxian Song and Chenglong Gong and Yuan Feng and Juanli Ma and Xianjin Zhang}, title = {Design of Greenhouse Control System Based on Wireless Sensor Networks and {AVR} Microcontroller}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1668--1674}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1668-1674}, doi = {10.4304/JNW.6.12.1668-1674}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SongGFMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SongJ11, author = {Xiangmei Song and Shiguang Ju}, title = {Covert Flow Graph Approach to Identifying Covert Channels}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1740--1746}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1740-1746}, doi = {10.4304/JNW.6.12.1740-1746}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SongJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Sun11, author = {Feixian Sun}, title = {Artificial Immune Danger Theory Based Model for Network Security Evaluation}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {255--262}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.255-262}, doi = {10.4304/JNW.6.2.255-262}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Sun11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SunGYJ11, author = {Jing Sun and Suixiang Gao and Wenguo Yang and Zhipeng Jiang}, title = {Heuristic Replica Placement Algorithms in Content Distribution Networks}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {416--423}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.416-423}, doi = {10.4304/JNW.6.3.416-423}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SunGYJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TanCZZ11, author = {Minsheng Tan and Qiang Cui and Lingfeng Zhu and Hui Zhao}, title = {Repair Method of Complex Network Based on Matthew Effect}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1719--1725}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1719-1725}, doi = {10.4304/JNW.6.12.1719-1725}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TanCZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TangX11, author = {Chenghua Tang and Yi Xie}, title = {Implementation and Realization of Network Security Policy Based on Rule Engine}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {438--445}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.438-445}, doi = {10.4304/JNW.6.3.438-445}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TangX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TaoW11, author = {Yongcai Tao and Song Wu}, title = {Uniform Information Service Interoperation Framework among Heterogeneous Grids}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1359--1366}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1359-1366}, doi = {10.4304/JNW.6.9.1359-1366}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TaoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TezukaM11, author = {Taro Tezuka and Akira Maeda}, title = {Image Retrieval with Generative Model for Typicality}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {387--399}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.387-399}, doi = {10.4304/JNW.6.3.387-399}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TezukaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Tsai11, author = {Chung{-}Hung Tsai}, title = {The E-Commerce Model of Health Websites: An Integration of Web Quality, Perceived Interactivity, and Web Outcomes}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1017--1024}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1017-1024}, doi = {10.4304/JNW.6.7.1017-1024}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Tsai11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/TsaiKWWT11, author = {Jiung{-}yao Huang and Huan{-}Chao Keh and Shu{-}Shen Wai and Ji{-}Jen Wu and Chung{-}Hsien Tsai}, title = {Research of Place-based 3D Augmented Community-Taking The 3D Virtual Campus as an Example}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {705--712}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.705-712}, doi = {10.4304/JNW.6.5.705-712}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/TsaiKWWT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/VasiliadisRV11, author = {Dimitris C. Vasiliadis and George E. Rizos and Costas Vassilakis}, title = {Performance Analysis of Dual-Priority Multilayer Multistage Interconnection Networks under Multicast Environment}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {858--871}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.858-871}, doi = {10.4304/JNW.6.6.858-871}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/VasiliadisRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Wang11, author = {Li Wang}, title = {{KC2A2P} : {A} Knowledge-driven Content and Context-Awareness Adaptive Protocol for Intelligent Communication}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1398--1405}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1398-1405}, doi = {10.4304/JNW.6.10.1398-1405}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangCLL11, author = {Zhi{-}Hui Wang and Chin{-}Chen Chang and Mingchu Li and Tzu{-}Chuen Lu}, title = {A Simple Image Encoding Method with Data Lossless Information Hiding}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {400--407}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.400-407}, doi = {10.4304/JNW.6.3.400-407}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangCLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangHG11, author = {Hailong Wang and Jie Hou and Zhenghu Gong}, title = {Botnet Detection Architecture Based on Heterogeneous Multi-sensor Information Fusion}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1655--1661}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1655-1661}, doi = {10.4304/JNW.6.12.1655-1661}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangHG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangHLLX11, author = {Ping Wang and Jing Han and Fuqiang Liu and Yang Liu and Jing Xu}, title = {A Power Allocation Algorithm Based on Cooperative Game Theory in Multi-cell {OFDM} Systems}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1610--1617}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1610-1617}, doi = {10.4304/JNW.6.11.1610-1617}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangHLLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangL11, author = {Anbao Wang and Zhenwen Liu}, title = {Analysis and Utilizing of the Error Models in Teaching Wireless Network}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {222--229}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.222-229}, doi = {10.4304/JNW.6.2.222-229}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangLL11, author = {Junnian Wang and Deshun Liu and Chao Liu}, title = {A Modified Mountain Clustering Algorithm based on Hill Valley Function}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {916--922}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.916-922}, doi = {10.4304/JNW.6.6.916-922}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangLX11, author = {Yafeng Wang and Min Liang and Wei Xiang}, title = {Semi-Distributed Relay Selection Algorithm for Multi-User Cooperative Wireless Networks}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {907--911}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.907-911}, doi = {10.4304/JNW.6.6.907-911}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangMZL11, author = {Shang{-}Ping Wang and Qiao{-}Mei Ma and Ya{-}Ling Zhang and You{-}Sheng Li}, title = {An Authentication Protocol for {RFID} Tag and Its Simulation}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {446--453}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.446-453}, doi = {10.4304/JNW.6.3.446-453}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangMZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangMZW11, author = {Chunlei Wang and Liang Ming and Jinjing Zhao and Dongxia Wang}, title = {A General Framework for Network Survivability Testing and Evaluation}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {831--841}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.831-841}, doi = {10.4304/JNW.6.6.831-841}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangMZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangQ11, author = {LinGe Wang and YueDou Qi}, title = {Management Model Research of Low-power Wireless Sensor Network}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1734--1739}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1734-1739}, doi = {10.4304/JNW.6.12.1734-1739}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangSB11, author = {Li Wang and Bala Srinivasan and Nandita Bhattacharjee}, title = {Security Analysis and Improvements on WLANs}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {470--481}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.470-481}, doi = {10.4304/JNW.6.3.470-481}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangWMD11, author = {Erfu Wang and Zhifang Wang and Jing Ma and Qun Ding}, title = {A New Method of Time-frequency Synthesis of Harmonic Signal Extraction from Chaotic Background}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1025--1032}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1025-1032}, doi = {10.4304/JNW.6.7.1025-1032}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangWMD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangYZ11, author = {Xiaoming Wang and Guoxiang Yao and Zhen Zhang}, title = {An Encryption Scheme with Hidden Keyword Search for Outsourced Database}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1697--1704}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1697-1704}, doi = {10.4304/JNW.6.12.1697-1704}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZ11, author = {Deguang Wang and Zhigang Zhou}, title = {Application of a Collaborative Filtering Recommendation Algorithm Based on Cloud Model in Intrusion Detection}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {214--221}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.214-221}, doi = {10.4304/JNW.6.2.214-221}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZ11a, author = {Jingjing Wang and Hao Zhang}, title = {Performance of {UWB} Systems with Direct-Sequence Bipolar Pulse Amplitude Modulation and {RAKE} Reception over {IEEE} 802.15.3a Channel}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1065--1071}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1065-1071}, doi = {10.4304/JNW.6.7.1065-1071}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZB11, author = {Qinghua Wang and Tingting Zhang and Ilangko Balasingham}, title = {Characterizing the Traffic Load Distribution in Dense Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {173--180}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.173-180}, doi = {10.4304/JNW.6.2.173-180}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangZHWWL11, author = {Xingwei Wang and Huanyan Zhao and Min Huang and Zhankao Wen and Weixin Wu and Xiaofeng Liu}, title = {{ABC} Supported Handover Decision Scheme based on multi-PSO with Optimum Mutation}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1153--1162}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1153-1162}, doi = {10.4304/JNW.6.8.1153-1162}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangZHWWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WeiHZ11, author = {Qian Wei and Jingsha He and Xing Zhang}, title = {Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1351--1358}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1351-1358}, doi = {10.4304/JNW.6.9.1351-1358}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WeiHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WeiLG11, author = {Yahuan Wei and Taoshen Li and Zhihui Ge}, title = {A Channel Assignment Algorithm for Wireless Mesh Networks Using the Maximum Flow Approach}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {879--882}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.879-882}, doi = {10.4304/JNW.6.6.879-882}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WeiLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WenPCZ11, author = {Yingyou Wen and Xuena Peng and Shuyi Chen and Hong Zhao}, title = {Mobile Platform and Secure Access Approach of {UMTS} Terminal Based on Trusted Computing}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {615--622}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.615-622}, doi = {10.4304/JNW.6.4.615-622}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WenPCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuLLLXTL11, author = {Keshou Wu and Lizhao Liu and Jian Liu and Weifeng Li and Gang Xie and Xiaona Tong and Yun Lin}, title = {Researches on Grid Security Authentication Algorithm in Cloud Computing}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1639--1646}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1639-1646}, doi = {10.4304/JNW.6.11.1639-1646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuLLLXTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuLT11, author = {Xing Wu and Peihuang Lou and Dunbing Tang}, title = {Multi-objective Genetic Algorithm for System Identification and Controller Optimization of Automated Guided Vehicle}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {982--989}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.982-989}, doi = {10.4304/JNW.6.7.982-989}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuSW11, author = {Xue{-}wen Wu and Shi{-}ming Song and Hui{-}bin Wang}, title = {A Novel Position-based Multi-hop Broadcast Protocol for Vehicular Ad Hoc Networks}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {112--120}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.112-120}, doi = {10.4304/JNW.6.1.112-120}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiaZGX11, author = {Yan Xia and Yingzhi Zeng and Zhenghu Gong and Qin Xin}, title = {{GDCA:} {A} Distributed Channel Assignment Mechanism for Multi-radio Multi-Channel Wireless Mesh Networks}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {303--310}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.303-310}, doi = {10.4304/JNW.6.2.303-310}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiaZGX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiaoHL11, author = {Wenjun Xiao and Mingxin He and Huomin Liang}, title = {CayleyCCC: {A} Robust {P2P} Overlay Network with Simple Routing and Small-World Features}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1247--1253}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1247-1253}, doi = {10.4304/JNW.6.9.1247-1253}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiaoHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiaoW11, author = {Laishen Xiao and Zhengxia Wang}, title = {Internet of Things: a New Application for Intelligent Traffic Monitoring System}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {887--894}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.887-894}, doi = {10.4304/JNW.6.6.887-894}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiaoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiaoZLLC11, author = {Wenjun Xiao and Qin Zhang and Yanxia Liu and Lan Li and Weidong Chen}, title = {{CHC:} {A} Robust {P2P} Overlay Network with Simple Routing and Small-World Features}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1179--1186}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1179-1186}, doi = {10.4304/JNW.6.8.1179-1186}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/XiaoZLLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XinXL11, author = {Hua{-}Mei Xin and Lin Xue and Ju Liu}, title = {Positioning Optimization Technique in Non-Line-of-Sight Environment}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {287--294}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.287-294}, doi = {10.4304/JNW.6.2.287-294}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XinXL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongSYLX11, author = {Xiaofeng Xiong and Jiajia Song and Guangxue Yue and Jiansheng Liu and Linquan Xie}, title = {Survey: Research on QoS of {P2P} Reliable Streaming Media}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1114--1121}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1114-1121}, doi = {10.4304/JNW.6.8.1114-1121}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongSYLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongZL11, author = {Zenggang Xiong and Xuemin Zhang and Li Liu}, title = {Resource Management Model and ResourceDiscovery Algorithm for P2PGrid}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1187--1194}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1187-1194}, doi = {10.4304/JNW.6.8.1187-1194}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongZLC11, author = {Zenggang Xiong and Xuemin Zhang and Li Liu and Jianxin Chen}, title = {P2PGridSec: {A} Reputation-based Security Framework in P2PGrid System}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1406--1413}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1406-1413}, doi = {10.4304/JNW.6.10.1406-1413}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongZLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuDFZL11, author = {Lianming Xu and Zhongliang Deng and Ling Fang and Yujia Zhu and Wenlong Liu}, title = {Research on an Anti-Perturbation Kalman Filter Algorithm}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1430--1436}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1430-1436}, doi = {10.4304/JNW.6.10.1430-1436}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuDFZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuSZC11, author = {Zhao Xu and Lei Sun and Wenyan Zhai and Xicheng Chang}, title = {Wireless Ad-hoc Network Model for Video Transmission in the Tunnel of Mine}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {129--136}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.129-136}, doi = {10.4304/JNW.6.1.129-136}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuSZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuTGF11, author = {Kefu Xu and Jianlong Tan and Li Guo and Binxing Fang}, title = {Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {799--806}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.799-806}, doi = {10.4304/JNW.6.5.799-806}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuTGF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuW11, author = {Ye Xu and Zhuo Wang}, title = {On Cross-Correlation Evaluation Model of Internet Macroscopic Topology by Genetic Algorithm}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {230--237}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.230-237}, doi = {10.4304/JNW.6.2.230-237}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuW11a, author = {Ye Xu and Zhuo Wang}, title = {On Internet Topology Modeling and an Improved {BA} Model}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {454--461}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.454-461}, doi = {10.4304/JNW.6.3.454-461}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YanLA11, author = {Xin Yan and Layuan Li and F. J. An}, title = {Multi-Constrained Routing Algorithm for Multimedia Communications in Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {939--949}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.939-949}, doi = {10.4304/JNW.6.7.939-949}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YanLA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YanT11, author = {Fang Yan and Yu{-}An Tan}, title = {A Method of Object-based De-duplication}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1705--1712}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1705-1712}, doi = {10.4304/JNW.6.12.1705-1712}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/YanT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangALY11, author = {Jing (Jonas) Yang and Jianping An and Xiangming Li and Lei Yuan}, title = {An Effective Protocol for Rateless Coding aided Cooperative Communications}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {513--520}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.513-520}, doi = {10.4304/JNW.6.3.513-520}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangALY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangCCS11, author = {Shih{-}Yang Yang and Ching{-}Ming Chao and Pozung Chen and Chu{-}Hao Sun}, title = {Incremental Mining of Closed Sequential Patterns in Multiple Data Streams}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {728--735}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.728-735}, doi = {10.4304/JNW.6.5.728-735}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangCCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangCYS11, author = {Wei Yang and Guiran Chang and Yu Yao and Xiao{-}meng Shen}, title = {Stability Analysis of {P2P} Worm Propagation Model with Dynamic Quarantine Defense}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {153--162}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.153-162}, doi = {10.4304/JNW.6.1.153-162}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangCYS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangHXD11, author = {Yue Yang and Hanping Hu and Wei Xiong and Fan Ding}, title = {A Novel Network Traffic Anomaly Detection Model Based on Superstatistics Theory}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {311--318}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.311-318}, doi = {10.4304/JNW.6.2.311-318}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangHXD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangLS11, author = {Zhian Yang and Fei Long and Fuchun Sun}, title = {An Off-line Based QoS Routing Scheme for {LEO} Satellite Networks}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {247--254}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.247-254}, doi = {10.4304/JNW.6.2.247-254}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/YangLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangLWY11, author = {Ruiming Yang and Yipeng Liu and Qun Wan and Wan{-}Lin Yang}, title = {Compressive Direction Finding Based on Amplitude Comparison}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {498--504}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.498-504}, doi = {10.4304/JNW.6.3.498-504}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangLWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangMGZ11, author = {Hao Yang and Qingmin Meng and Xiong Gu and Baoyu Zheng}, title = {Image-based Position Estimation and Adaptive Modulation Coding in Vehicular Communication}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1754--1759}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1754-1759}, doi = {10.4304/JNW.6.12.1754-1759}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangMGZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangWWTY11, author = {Jian Yang and Haihang Wang and Jian Wang and Chengxiang Tan and Dingguo Yu}, title = {Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1033--1040}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1033-1040}, doi = {10.4304/JNW.6.7.1033-1040}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangWWTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangZW11, author = {Bailin Yang and Zhiyong Zhang and Xun Wang}, title = {Visual Important-Driven Interactive Rendering of 3D Geometry Model over Lossy {WLAN}}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1594--1601}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1594-1601}, doi = {10.4304/JNW.6.11.1594-1601}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YeHX11, author = {Chunxiao Ye and Haibo Hu and Hong Xiang}, title = {Towards Secure Delegation with Chinese Wall Security Policy {(CWSP)}}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1230--1237}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1230-1237}, doi = {10.4304/JNW.6.8.1230-1237}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YeHX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YoshihisaN11, author = {Tomoki Yoshihisa and Shojiro Nishio}, title = {A Communication Protocol for Sensor Database Construction by Rounding Sink}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {343--354}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.343-354}, doi = {10.4304/JNW.6.3.343-354}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YoshihisaN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YouL11, author = {Lei You and Chungui Liu}, title = {Robust Cross-layer Design of Wireless Multimedia Sensor Networks with Correlation and Uncertainty}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1009--1016}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1009-1016}, doi = {10.4304/JNW.6.7.1009-1016}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YouL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuB11, author = {Haizheng Yu and Hong Bian}, title = {Threshold-based Message Copies Control in Delay Tolerant Networks}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {96--103}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.96-103}, doi = {10.4304/JNW.6.1.96-103}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuCSL11, author = {Miao Yu and Jianzhong Chen and Lei Shen and Shiju Li}, title = {Blind Separation of {DS-CDMA} Signals with {ICA} Method}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {198--205}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.198-205}, doi = {10.4304/JNW.6.2.198-205}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuCSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuLSYC11, author = {Fei Yu and Yiqin Lu and Jian Shu and Guangxue Yue and Chin{-}Chen Chang}, title = {Guest Editorial}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1387--1389}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1387-1389}, doi = {10.4304/JNW.6.10.1387-1389}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuLSYC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuLZX11, author = {Xiangbin Yu and Yanfeng Li and Tingting Zhou and Dazhuan Xu}, title = {Performance of Adaptive Modulation with {STBC} and Imperfect Feedback Information over Rayleigh Fading Channel}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {137--144}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.137-144}, doi = {10.4304/JNW.6.1.137-144}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuLZX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuY11, author = {Dan Yu and Jian Yang}, title = {Highway Incident Detection Research Based on Lipschitz Exponent Algorithm}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {923--927}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.923-927}, doi = {10.4304/JNW.6.6.923-927}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuYFSH11, author = {Gang Yu and Hongzhi Yang and Shuqin Fan and Yong Shen and Wenbao Han}, title = {Efficient Certificateless Signcryption Scheme from Weil Pairing}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1280--1287}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1280-1287}, doi = {10.4304/JNW.6.9.1280-1287}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuYFSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuZLYL11, author = {Sheng Yu and Shijie Zhou and Leyuan Liu and Rui Yang and Jiaqing Luo}, title = {Detecting Malware Variants by Byte Frequency}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {638--645}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.638-645}, doi = {10.4304/JNW.6.4.638-645}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/YuZLYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuZS11, author = {Yike Yu and Xuefeng Zheng and Hua Sun}, title = {An Identity Based Aggregate Signature from Pairings}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {631--637}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.631-637}, doi = {10.4304/JNW.6.4.631-637}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuanHLCS11, author = {Wei Yuan and Liang Hu and Hongtu Li and Jianfeng Chu and Yuyu Sun}, title = {Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1557--1564}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1557-1564}, doi = {10.4304/JNW.6.11.1557-1564}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuanHLCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YuanHLCS11a, author = {Wei Yuan and Liang Hu and Hongtu Li and Jianfeng Chu and Yuyu Sun}, title = {Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1578--1585}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1578-1585}, doi = {10.4304/JNW.6.11.1578-1585}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YuanHLCS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YueJWCSX11, author = {Guangxue Yue and Tao Jiang and Jiajin Wang and Zhi Chen and Jiajia Song and Cheng Xu}, title = {Underlying Technology of {P2P} Media Streaming}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1195--1205}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1195-1205}, doi = {10.4304/JNW.6.8.1195-1205}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YueJWCSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YueWLXX11, author = {Guangxue Yue and Nanqing Wei and Jiansheng Liu and Xiaofeng Xiong and Linquan Xie}, title = {Survey on Scheduling Technologies of {P2P} Media Streaming}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1129--1136}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1129-1136}, doi = {10.4304/JNW.6.8.1129-1136}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YueWLXX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZabirAAKK11, author = {Salim Zabir and Jemal H. Abawajy and Farid Ahmed and Joarder Kamruzzaman and Mohammad Ataul Karim}, title = {Guest Editorial}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.1-3}, doi = {10.4304/JNW.6.1.1-3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZabirAAKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhanZTSS11, author = {Qi Zhan and Guangxi Zhu and Li Tan and Peng Shang and Gang Su}, title = {A Novel Dynamic Proportional Fair Scheduling Based on Block Diagonal Geometric Mean Decomposition}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {71--79}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.71-79}, doi = {10.4304/JNW.6.1.71-79}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhanZTSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhang11, author = {Yan Zhang}, title = {Precise Location Technology Based on Chirp Spread Spectrum}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {872--878}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.872-878}, doi = {10.4304/JNW.6.6.872-878}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhang11a, author = {Jun Zhang}, title = {An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Scheme}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1238--1245}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1238-1245}, doi = {10.4304/JNW.6.8.1238-1245}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhang11b, author = {Jun Zhang}, title = {Improvement of a Forward-Secure Multi-Proxy Signature Scheme}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1272--1279}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1272-1279}, doi = {10.4304/JNW.6.9.1272-1279}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhang11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangCWHB11, author = {Xiaosong Zhang and Ting Chen and Xiao{-}lin Wang and Yong Huang and Hou{-}bin Bao}, title = {{CRBA:} {A} Capacity Restricted Model Evolved from {BA} Model for Complex Network}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1163--1170}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1163-1170}, doi = {10.4304/JNW.6.8.1163-1170}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangCWHB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangHW11, author = {Xing Zhang and Jingsha He and Qian Wei}, title = {Secure and Energy-Efficient Routing for Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1288--1295}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1288-1295}, doi = {10.4304/JNW.6.9.1288-1295}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangHWL11, author = {De{-}gan Zhang and Yu{-}xia Hu and Dong Wang and Yan{-}pin Liang}, title = {A New Algorithm of Service Discovery Based on {DHT} for Mobile Application}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1466--1474}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1466-1474}, doi = {10.4304/JNW.6.10.1466-1474}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangHWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangKLE11, author = {Guiling Zhang and Yongzhen Ke and Zhichao Li and Mingjie E}, title = {Improvments of Payload-based Intrusion Detection Models by Using Noise Against Fuzzy {SVM}}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {330--340}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.330-340}, doi = {10.4304/JNW.6.2.330-340}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangKLE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangL11, author = {Haitao Zhang and Zhen Li}, title = {Simulation of Networked Control System based on Smith Compensator and Single Neuron Incomplete Differential Forward {PID}}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1675--1681}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1675-1681}, doi = {10.4304/JNW.6.12.1675-1681}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangLQ11, author = {Yuwei Zhang and Ye Li and Dengyu Qiao}, title = {Energy-Quality System Design for Wireless Communication}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {272--278}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.272-278}, doi = {10.4304/JNW.6.2.272-278}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhangLQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangW11, author = {Ming Zhang and Suoping Wang}, title = {An Energy Efficient Dynamic Clustering Protocol Based on Weight in Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {1057--1064}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.1057-1064}, doi = {10.4304/JNW.6.7.1057-1064}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangWH11, author = {Leyou Zhang and Qing Wu and Yupu Hu}, title = {Secure Identity-based Threshold Broadcast Encryption in the Standard Model}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1602--1609}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1602-1609}, doi = {10.4304/JNW.6.11.1602-1609}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhangWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangWYXZXR11, author = {Wei Zhang and Huan Wang and Binbin Yu and Wei Xu and Mingfa Zhu and Limin Xiao and Li Ruan}, title = {A Request Distribution Algorithm for Web Server Cluster}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1760--1766}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1760-1766}, doi = {10.4304/JNW.6.12.1760-1766}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhangWYXZXR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZ11, author = {Nan Zhang and Jianhua Zhang}, title = {A Self-adapted Anycast Routing Algorithm Based on Mobile Agent in Wireless Sensor Network}, journal = {J. Networks}, volume = {6}, number = {2}, pages = {206--213}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.2.206-213}, doi = {10.4304/JNW.6.2.206-213}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZ11a, author = {Xianfeng Zhang and Narisa Zhao}, title = {The Model and Simulation of the Invulnerability of Scale-free Networks Based on "Honeypot"}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {928--931}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.928-931}, doi = {10.4304/JNW.6.6.928-931}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZY11, author = {Longchang Zhang and Hua Zou and Fangchun Yang}, title = {A Dynamic Web Service Composition Algorithm Based on {TOPSIS}}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1296--1304}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1296-1304}, doi = {10.4304/JNW.6.9.1296-1304}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaniEK11, author = {Mohamed Faten Zhani and Halima Elbiaze and Farouk Kamoun}, title = {An Empirical Evaluation of Multi-Step Prediction Performance}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {567--576}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.567-576}, doi = {10.4304/JNW.6.4.567-576}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhaniEK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoD11, author = {Narisa Zhao and Xiaoming Dai}, title = {Research on the Evolutionary Model of {A} Kind of Vertex-splitting Network}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {904--906}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.904-906}, doi = {10.4304/JNW.6.6.904-906}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoLY11, author = {Chengli Zhao and Yanheng Liu and Zhiheng Yu}, title = {Evaluation for Survivable Networked System Based on Grey Correlation and Improved {TOPSIS}}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1514--1520}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1514-1520}, doi = {10.4304/JNW.6.10.1514-1520}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoWCC11, author = {Shenghui Zhao and Guoxin Wu and Guilin Chen and Haibao Chen}, title = {Reputation-aware Service Selection based on QoS Similarity}, journal = {J. Networks}, volume = {6}, number = {7}, pages = {950--957}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.7.950-957}, doi = {10.4304/JNW.6.7.950-957}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoWCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaoXWH11, author = {Xiufeng Zhao and Qiuliang Xu and Hao Wang and Peng He}, title = {A Scalable ID-based Constant-round {AGKE} Protocol with Logarithmic Computation Complexity}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1422--1429}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1422-1429}, doi = {10.4304/JNW.6.10.1422-1429}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaoXWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zheng11, author = {Yuhuang Zheng}, title = {Development of a Ubiquitous Industrial Data Acquisition System for Rotogravure Printing Press}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1543--1548}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1543-1548}, doi = {10.4304/JNW.6.11.1543-1548}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zheng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhengT11, author = {Guoqiang Zheng and Shengyu Tang}, title = {Spatial Correlation-Based {MAC} Protocol for Event-Driven Wireless Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {121--128}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.121-128}, doi = {10.4304/JNW.6.1.121-128}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhengT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhengZZ11, author = {Minghui Zheng and Jing Zhang and Zhi Zhang}, title = {Mediated Certificateless Signature without Random Oracles}, journal = {J. Networks}, volume = {6}, number = {8}, pages = {1222--1229}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.8.1222-1229}, doi = {10.4304/JNW.6.8.1222-1229}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhengZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhongD11, author = {Shaojun Zhong and Zhijuan Deng}, title = {A Web Crawler System Design Based on Distributed Technology}, journal = {J. Networks}, volume = {6}, number = {12}, pages = {1682--1689}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.12.1682-1689}, doi = {10.4304/JNW.6.12.1682-1689}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhongD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhongZ11, author = {Shaobo Zhong and Dongsheng Zou}, title = {Web Page Classification using an ensemble of support vector machine classifiers}, journal = {J. Networks}, volume = {6}, number = {11}, pages = {1625--1630}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.11.1625-1630}, doi = {10.4304/JNW.6.11.1625-1630}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhongZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Zhou11, author = {Peng Zhou}, title = {Implementation of Optimal Pacing Scheme in Xinjiang's Oil and Gas Pipeline Leak Monitoring Network}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {54--61}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.54-61}, doi = {10.4304/JNW.6.1.54-61}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Zhou11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouX11, author = {Xinlian Zhou and Jianbo Xu}, title = {Research of network topological control algorithm in mWSN}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1414--1421}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1414-1421}, doi = {10.4304/JNW.6.10.1414-1421}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouXM11, author = {Mu Zhou and Yubin Xu and Lin Ma}, title = {Adaptive Autocorrelation Approach for Fingerprint-based Distance Dependent Positioning Algorithms in {WLAN} Indoor Areas}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1475--1482}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1475-1482}, doi = {10.4304/JNW.6.10.1475-1482}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouXM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuDLL11, author = {Yufeng Zhu and Xiaoli Ding and Yan Luo and Zhiwei Li}, title = {Analysis on the Application of {GPS-RTK} Technology using in Yangkou man-made Island in Nantong City}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1444--1451}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1444-1451}, doi = {10.4304/JNW.6.10.1444-1451}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuDLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuGX11, author = {Xue{-}Qin Zhu and Ying Gui and Hongzhen Xu}, title = {Enhanced Differentiated Surveillance for Static and Random Mobile Sensor Networks}, journal = {J. Networks}, volume = {6}, number = {10}, pages = {1483--1490}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.10.1483-1490}, doi = {10.4304/JNW.6.10.1483-1490}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuGX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuLLJ11, author = {Wensheng Zhu and Youming Li and Yanjuan Lu and Ming Jin}, title = {Blind Channel Estimation with Lower Complexity Algorithm for {OFDM} System}, journal = {J. Networks}, volume = {6}, number = {5}, pages = {783--790}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.5.783-790}, doi = {10.4304/JNW.6.5.783-790}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuLLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuWML11, author = {Hai Zhu and Yuping Wang and Zhanxin Ma and Hecheng Li}, title = {Grid Dependent Tasks Security Scheduling Model and {DPSO} Algorithm}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {850--857}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.850-857}, doi = {10.4304/JNW.6.6.850-857}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuWML11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhuangWS11, author = {Lei Zhuang and Chao Wang and Wei Song}, title = {Research of an Optimized Mobile IPv6 Real-time Seamless Handover Technology}, journal = {J. Networks}, volume = {6}, number = {9}, pages = {1373--1378}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.9.1373-1378}, doi = {10.4304/JNW.6.9.1373-1378}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhuangWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.