Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnw/jnw4.bht:"
@article{DBLP:journals/jnw/AbdelkaderHB09, author = {Manel Abdelkader and Mohamed Hamdi and Noureddine Boudriga}, title = {Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {589--597}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.589-597}, doi = {10.4304/JNW.4.7.589-597}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AbdelkaderHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AghaCGLMMMRVB09, author = {Khaldoun Al Agha and G{\'{e}}rard Chalhoub and Alexandre Guitton and Erwan Livolant and Saoucene Mahfoudh and Pascale Minet and Michel Misson and Joseph Rahm{\'{e}} and Thierry Val and Adrien van den Bossche}, title = {Cross-layering in an Industrial Wireless Sensor Network: Case Study of {OCARI}}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {411--420}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.411-420}, doi = {10.4304/JNW.4.6.411-420}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AghaCGLMMMRVB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AngrishiK09, author = {Kishore Angrishi and Ulrich Killat}, title = {On the Observance of Approximate Invariance of Effective Bandwidth with Finite Number of Sources}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {805--818}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.805-818}, doi = {10.4304/JNW.4.9.805-818}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AngrishiK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AslamPR09, author = {Nauman Aslam and William J. Phillips and William Robertson}, title = {Effective Location Management of Mobile Actors in Wireless Sensor and Actor Networks}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {1--8}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.1-8}, doi = {10.4304/JNW.4.1.1-8}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AslamPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BelhajT09, author = {Salem Belhaj and Moncef Tagina}, title = {Modeling and Prediction of the Internet End-to-end Delay using Recurrent Neural Networks}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {528--535}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.528-535}, doi = {10.4304/JNW.4.6.528-535}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BelhajT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BezerraM09, author = {Romildo Martins da Silva Bezerra and Joberto S{\'{e}}rgio Barbosa Martins}, title = {A Policy-Based Autonomic Model Suitable for Quality of Service Management}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {495--504}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.495-504}, doi = {10.4304/JNW.4.6.495-504}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BezerraM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BhattiB09, author = {Saleem N. Bhatti and Martin Bateman}, title = {Transport Protocol Throughput Fairness}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {881--894}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.881-894}, doi = {10.4304/JNW.4.9.881-894}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BhattiB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BiYW09, author = {Jun Bi and Guang Yao and Jianping Wu}, title = {An IPv6 Source Address Validation Testbed and Prototype Implementation}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {100--107}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.2.100-107}, doi = {10.4304/JNW.4.2.100-107}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BiYW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BiaoL09, author = {Cai Biao and Zhishu Li}, title = {Computing and Routing for Trust in Structured {P2P} Network}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {667--674}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.667-674}, doi = {10.4304/JNW.4.7.667-674}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BiaoL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BoudrigaA09, author = {Noureddine Boudriga and Habtamu Abie}, title = {Guest Editorial}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {537--538}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.537-538}, doi = {10.4304/JNW.4.7.537-538}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BoudrigaA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/BreitbartDG09, author = {Yuri Breitbart and Feodor F. Dragan and Hassan Gobjuka}, title = {Effective Monitor Placement in Internet Networks}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {657--666}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.657-666}, doi = {10.4304/JNW.4.7.657-666}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/BreitbartDG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaiYL09, author = {Jun Cai and Shun{-}Zheng Yu and Jing{-}li Liu}, title = {The Design of a Wireless Data Acquisition and Transmission System}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1042--1049}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1042-1049}, doi = {10.4304/JNW.4.10.1042-1049}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaiYL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CaoQZ09, author = {Tianjie Cao and Tao Quan and Bo Zhang}, title = {Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {263--270}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.263-270}, doi = {10.4304/JNW.4.4.263-270}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CaoQZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChabaSA09, author = {Yogesh Chaba and Yudhvir Singh and Preeti Aneja}, title = {Performance Analysis of Disable {IP} Broadcast Technique for Prevention of Flooding-Based DDoS Attack in {MANET}}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {178--183}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.178-183}, doi = {10.4304/JNW.4.3.178-183}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChabaSA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenSW09, author = {Ling Chen and Hai{-}Ying Sun and Su Wang}, title = {First Order Deceptive Problem of {ACO} and Its Performance Analysis}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {993--1000}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.993-1000}, doi = {10.4304/JNW.4.10.993-1000}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChiangD09, author = {Ling{-}Feng Chiang and Jiang{-}Whai Dai}, title = {A New Method to Detect Abnormal {IP} Address on {DHCP}}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {458--464}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.458-464}, doi = {10.4304/JNW.4.6.458-464}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChiangD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CremonesiTA09, author = {Paolo Cremonesi and Roberto Turrin and Vassil N. Alexandrov}, title = {Modeling the Effects of Node Heterogeneity on the Performance of Grid Applications}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {837--854}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.837-854}, doi = {10.4304/JNW.4.9.837-854}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/CremonesiTA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/CuiC09, author = {Hui Cui and Tianjie Cao}, title = {An Novel Anonymous Authenticated and Key Exchange Protocol}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {985--992}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.985-992}, doi = {10.4304/JNW.4.10.985-992}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/CuiC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DAcquistoCA09, author = {Giuseppe D'Acquisto and Pietro Cassar{\`{a}} and Luigi Alcuri}, title = {An Innovative Pricing Method for Telecommunication Services Pricing through American Options}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {65--74}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.65-74}, doi = {10.4304/JNW.4.1.65-74}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DAcquistoCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DaiLY09, author = {Weihui Dai and Shuyi Liang and Wei Yan}, title = {Research on Real-Time Mobile 3D Topography System}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {307--314}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.307-314}, doi = {10.4304/JNW.4.5.307-314}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DaiLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/DiaoKLHZJ09, author = {Xunxing Diao and Messaoud Kara and Jian{-}Jin Li and Kun Mean Hou and Haiying Zhou and Aur{\'{e}}lien Jacquot}, title = {Cooperative Inter-vehicle Communication Protocol With Low Cost Differential {GPS}}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {445--457}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.445-457}, doi = {10.4304/JNW.4.6.445-457}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/DiaoKLHZJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/EklerKDBK09, author = {P{\'{e}}ter Ekler and Imre Kel{\'{e}}nyi and Istv{\'{a}}n D{\'{e}}vai and Bal{\'{a}}zs Bakos and Attila Kiss}, title = {Hybrid Peer-to-Peer Content Sharing in Mobile Networks}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {119--132}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.2.119-132}, doi = {10.4304/JNW.4.2.119-132}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/EklerKDBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FuXW09, author = {Xiu Fu and Qiuliang Xu and Hao Wang}, title = {A Provably-Secure Password-Authenticated Group Key Agreement in the Standard Model}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {763--770}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.763-770}, doi = {10.4304/JNW.4.8.763-770}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FuXW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/GaniSR09, author = {Md. Osman Gani and Hasan Sarwar and Chowdhury Mofizur Rahman}, title = {Prediction of State of Wireless Network Using Markov and Hidden Markov Model}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {976--984}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.976-984}, doi = {10.4304/JNW.4.10.976-984}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/GaniSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HOU09, author = {Kun Mean Hou}, title = {Guest Editorial}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {379--381}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.379-381}, doi = {10.4304/JNW.4.6.379-381}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HOU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HabibJO09, author = {Sheikh Mahbub Habib and Cyril Jacob and Tomas Olovsson}, title = {An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {968--975}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.968-975}, doi = {10.4304/JNW.4.10.968-975}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/HabibJO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HanWXJL09, author = {Ruo{-}Fei Han and Hou{-}Xiang Wang and Qian Xiao and Xiao{-}Pei Jing and Hui Li}, title = {A United Access Control Model for Systems in Collaborative Commerce}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {279--289}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.279-289}, doi = {10.4304/JNW.4.4.279-289}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HanWXJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HeG09, author = {Xin He and Xiaolin Gui}, title = {The Localized Area Coverage algorithm Based on Game-Theory for {WSN}}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1001--1008}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1001-1008}, doi = {10.4304/JNW.4.10.1001-1008}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HeG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HeH09, author = {Yong{-}Zhong He and Zhen Han}, title = {User Authentication with Provable Security against Online Dictionary Attacks}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {200--207}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.200-207}, doi = {10.4304/JNW.4.3.200-207}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HeH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HeQ09, author = {Ping He and Zengtang Qu}, title = {Comparison Computing Based on Sub-optimum Analysis: {A} Guide System of Network Security}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {779--786}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.779-786}, doi = {10.4304/JNW.4.8.779-786}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HeQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HongH09, author = {Liurong Hong and Jianqiang Hu}, title = {A Multi-dimension Qos based Local Service Selection Model for Service Composition}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {351--358}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.351-358}, doi = {10.4304/JNW.4.5.351-358}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HongH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HouCY09, author = {Chunyan Hou and Gang Cui and Xiaozong Yang}, title = {Reliability Analysis of Component Software in Wireless Sensor Networks Based on Transformation of Testing Data}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {392--402}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.392-402}, doi = {10.4304/JNW.4.6.392-402}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HouCY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuLZ09, author = {Jianqiang Hu and Juanzi Li and Zhiyong Zeng}, title = {{SWSCF:} {A} Semantic-based Web Service Composition Framework}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {290--297}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.290-297}, doi = {10.4304/JNW.4.4.290-297}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuQS09, author = {Zhen Hu and Robert C. Qiu and Dalwinder Singh}, title = {Spectral Efficiency for {MIMO} {UWB} Channel in Rectangular Metal Cavity}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {42--52}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.42-52}, doi = {10.4304/JNW.4.1.42-52}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuQS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuWL09, author = {Su Hu and Gang Wu and Shaoqian Li}, title = {Preamble Design and Iterative Channel Estimation for OFDM/Offset {QAM} System}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1050--1057}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1050-1057}, doi = {10.4304/JNW.4.10.1050-1057}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuangHB09, author = {Yangcheng Huang and Sidath Handurukande and Saleem N. Bhatti}, title = {Autonomic {MANET} Routing Protocols}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {743--753}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.743-753}, doi = {10.4304/JNW.4.8.743-753}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuangHB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/HuoZHF09, author = {Zhihong Huo and Yuan Zheng and Da Huang and Huajing Fang}, title = {Robust Integrity Design for Nonlinear Networked Control Systems}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {520--527}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.520-527}, doi = {10.4304/JNW.4.6.520-527}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HuoZHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Inaba09, author = {Tatsuya Inaba}, title = {Realization of {SCM} and {CRM} by Using RFID-captured Consumer Behavior Information}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {92--99}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.2.92-99}, doi = {10.4304/JNW.4.2.92-99}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Inaba09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/IsratCH09, author = {Presila Israt and Namvi Chakma and M. M. A. Hashem}, title = {A Fuzzy Logic-Based Adaptive Handoff Management Protocol for Next-Generation Wireless Systems}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {931--940}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.931-940}, doi = {10.4304/JNW.4.10.931-940}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/IsratCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JafariSL09, author = {Amir M. Jafari and Adam Sklorz and Walter Lang}, title = {Target-Oriented Routing Algorithm Based on Sequential Coordinates for Autonomous Wireless Sensor Network}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {421--427}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.421-427}, doi = {10.4304/JNW.4.6.421-427}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JafariSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangR09, author = {Hua Jiang and Junhu Ruan}, title = {Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation -M(1, 2, 3)}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {324--331}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.324-331}, doi = {10.4304/JNW.4.5.324-331}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/JiangS09, author = {Jehn{-}Ruey Jiang and Tzu{-}Ming Sung}, title = {Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {403--410}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.403-410}, doi = {10.4304/JNW.4.6.403-410}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/JiangS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KaushikFC09, author = {Neena R. Kaushik and Silvia M. Figueira and Stephen A. Chiappari}, title = {A Hybrid Algorithm for Lightpath Assignment}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {19--29}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.19-29}, doi = {10.4304/JNW.4.1.19-29}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KaushikFC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Khandker09, author = {Md. Mamun{-}ur{-}Rashid Khandker}, title = {Distributed Control Routing Algorithms for Rearrangeably Nonblocking Optical Banyan Networks}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {952--959}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.952-959}, doi = {10.4304/JNW.4.10.952-959}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Khandker09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KhoukhiC09, author = {Lyes Khoukhi and Soumaya Cherkaoui}, title = {Toward Neural Networks Solution for Multimedia Support in Mobile Ad hoc Networks}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {148--161}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.2.148-161}, doi = {10.4304/JNW.4.2.148-161}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KhoukhiC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KittiperacholSC09, author = {Songrith Kittiperachol and Zhili Sun and Haitham S. Cruickshank}, title = {Integration of Linux {TCP} and Simulation: Verification, Validation and Application}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {819--836}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.819-836}, doi = {10.4304/JNW.4.9.819-836}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KittiperacholSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/KuzuuHMW09, author = {Kazuto Kuzuu and Yasushi Hirano and Kenji Mase and Toyohide Watanabe}, title = {Construction of a Shared Terminal System by LDAP-Smart Card Authentication Cooperation}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {711--719}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.711-719}, doi = {10.4304/JNW.4.8.711-719}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/KuzuuHMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LaurendeauB09, author = {Christine Laurendeau and Michel Barbeau}, title = {Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {9--18}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.9-18}, doi = {10.4304/JNW.4.1.9-18}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LaurendeauB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LeeSLS09, author = {TaeHoon Lee and Sunghoon Seo and UiTaek Lee and JooSeok Song}, title = {A New Soft Handover Mechanism using DCHs in 3GPP {HSDPA} Networks}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {184--191}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.184-191}, doi = {10.4304/JNW.4.3.184-191}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LeeSLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LeeUN09, author = {Peter Hyun{-}Jeen Lee and Parampalli Udaya and Shivaramakrishnan Narayan}, title = {Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption,}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {687--697}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.687-697}, doi = {10.4304/JNW.4.8.687-697}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LeeUN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiT09, author = {Kewen Li and Jing Tian}, title = {The Multicast Routing QoS Based on the Improved {ACO} Algorithm}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {505--510}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.505-510}, doi = {10.4304/JNW.4.6.505-510}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuYXX09, author = {Yuhua Liu and Chun Yang and Kaihua Xu and Naixue Xiong}, title = {Model of Controlling the Hubs in {P2P} Networks}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {236--243}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.236-243}, doi = {10.4304/JNW.4.4.236-243}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuYXX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LloretGBT09, author = {Jaime Lloret and Miguel Garcia and Fernando Boronat and Jes{\'{u}}s Tom{\'{a}}s}, title = {A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {473--486}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.473-486}, doi = {10.4304/JNW.4.6.473-486}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LloretGBT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MbarekON09, author = {Rachid Mbarek and Mohamed Tahar Ben Othman and Salem Nasri}, title = {Fairness of High-Speed {TCP} Protocols with Different Flow Capacities}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {163--169}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.163-169}, doi = {10.4304/JNW.4.3.163-169}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MbarekON09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Memon09, author = {Qurban A. Memon}, title = {Implementing Role Based Access in Healthcare Ad Hoc Networks}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {192--199}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.192-199}, doi = {10.4304/JNW.4.3.192-199}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/Memon09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Meng09, author = {Bo Meng}, title = {A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {370--377}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.370-377}, doi = {10.4304/JNW.4.5.370-377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Meng09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MirjalilyBA09, author = {Ghasem Mirjalily and Parisa Bastani and Seyed Mohammad T. Almodarresi}, title = {Performance Evaluation of Different QoS Models for Connecting Telephone Exchange Centers over Metro Ethernet Networks}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {960--967}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.960-967}, doi = {10.4304/JNW.4.10.960-967}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MirjalilyBA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MiuraITSK09, author = {Motoki Miura and Sadanori Ito and Ryozo Takatsuka and Taro Sugihara and Susumu Kunifuji}, title = {An Empirical Study of an {RFID} Mat Sensor System in a Group Home}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {133--139}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.2.133-139}, doi = {10.4304/JNW.4.2.133-139}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MiuraITSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MoutairouADH09, author = {Manani M. Moutairou and Hasna{\^{a}} Aniss and Gilles Y. Delisle and Nadir Hakem}, title = {Global Optimization of Multi Radio Mesh Access Point Location in Underground Area}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {630--640}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.630-640}, doi = {10.4304/JNW.4.7.630-640}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MoutairouADH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MozumdarNGLV09, author = {Mohammad Mostafizur Rahman Mozumdar and Guofang Nan and Francesco Gregoretti and Luciano Lavagno and Laura Vanzago}, title = {An Efficient Data Aggregation Algorithm for Cluster-based Sensor Network}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {598--606}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.598-606}, doi = {10.4304/JNW.4.7.598-606}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MozumdarNGLV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NilssonL09, author = {Dennis K. Nilsson and Ulf Larson}, title = {A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {552--564}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.552-564}, doi = {10.4304/JNW.4.7.552-564}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NilssonL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NogueiraSCV09, author = {Ant{\'{o}}nio Nogueira and Paulo Salvador and Andre Couto and Rui Valadas}, title = {Towards the On-line Identification of Peer-to-peer Flow Patterns}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {108--118}, year = {2009}, url = {http://www.academypublisher.com/jnw/vol04/no02/jnw0402108118.html}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NogueiraSCV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Obaidat09, author = {Mohammad S. Obaidat}, title = {Guest Editorial}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {803--804}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.803-804}, doi = {10.4304/JNW.4.9.803-804}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Obaidat09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ObaidatF09, author = {Mohammad S. Obaidat and Joaquim Filipe}, title = {Guest Editorial}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {675--676}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.675-676}, doi = {10.4304/JNW.4.8.675-676}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ObaidatF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/OteroKO09, author = {Carlos E. Otero and Ivica Kostanic and Luis Daniel Otero}, title = {Development of a Simulator for Stochastic Deployment of Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {754--762}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.754-762}, doi = {10.4304/JNW.4.8.754-762}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/OteroKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/OuniBK09, author = {Sofiane Ouni and Jihen Bokri and Farouk Kamoun}, title = {{DSR} based Routing Algorithm with Delay Guarantee for Ad Hoc Networks}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {359--369}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.359-369}, doi = {10.4304/JNW.4.5.359-369}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/OuniBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PaladinaBSP09, author = {Luca Paladina and Antonino Biundo and Marco Scarpa and Antonio Puliafito}, title = {Artificial Intelligence and Synchronization in Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {382--391}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.382-391}, doi = {10.4304/JNW.4.6.382-391}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PaladinaBSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Palmieri09, author = {Francesco Palmieri}, title = {A Converged Charging Framework for Mobile Voice and Data Applications}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {580--588}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.580-588}, doi = {10.4304/JNW.4.7.580-588}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/Palmieri09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PanYWHXZ09, author = {Wei Pan and Lean Yu and Shouyang Wang and Guowei Hua and Gang Xie and Jinlong Zhang}, title = {Dynamic Pricing Strategy of Provider with Different QoS Levels in Web Service}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {228--235}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.228-235}, doi = {10.4304/JNW.4.4.228-235}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/PanYWHXZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PozoCG09, author = {Sergio Pozo and Rafael Ceballos and Rafael M. Gasca}, title = {A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {698--710}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.698-710}, doi = {10.4304/JNW.4.8.698-710}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PozoCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PrasadSKR09, author = {R. V. V. S. V. Prasad and Vegi Srinivas and V. Valli Kumari and K. V. S. V. N. Raju}, title = {An Effective Calculation of Reputation in {P2P} Networks}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {332--342}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.332-342}, doi = {10.4304/JNW.4.5.332-342}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PrasadSKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/QinL09, author = {Fujian Qin and Youyuan Liu}, title = {Multipath Based QoS Routing in {MANET}}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {771--778}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.771-778}, doi = {10.4304/JNW.4.8.771-778}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/QinL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RagabY09, author = {Khaled Ragab and Akinori Yonezawa}, title = {A Self-organized Clustering-based Overlay Network for Application Level Multicast}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {85--91}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.2.85-91}, doi = {10.4304/JNW.4.2.85-91}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RagabY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RahmanHRKG09, author = {Ashikur Rahman and Md. Endadul Hoque and Farzana Rahman and Sabuj Kumar Kundu and Pawel Gburzynski}, title = {Enhanced Partial Dominant Pruning {(EPDP)} Based Broadcasting in Ad hoc Wireless Networks}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {895--904}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.895-904}, doi = {10.4304/JNW.4.9.895-904}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/RahmanHRKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RahmanISMH09, author = {M. M. Hafizur Rahman and Yasushi Inoguchi and Yukinori Sato and Yasuyuki Miura and Susumu Horiguchi}, title = {Dynamic Communication Performance of the {TESH} Network under Nonuniform Traffic Patterns}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {941--951}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.941-951}, doi = {10.4304/JNW.4.10.941-951}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RahmanISMH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RaiVT09, author = {Mritunjay Rai and Shekhar Verma and Shashikala Tapaswi}, title = {A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {511--519}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.511-519}, doi = {10.4304/JNW.4.6.511-519}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RaiVT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RangoVFM09, author = {Floriano De Rango and Fiore Veltri and Peppino Fazio and Salvatore Marano}, title = {Two-level Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks in Freeway and Manhattan Environments}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {866--880}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.866-880}, doi = {10.4304/JNW.4.9.866-880}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RangoVFM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RekhisB09, author = {Slim Rekhis and Noureddine Boudriga}, title = {Investigating Attack Scenarios in Multihop Wireless Systems}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {539--551}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.539-551}, doi = {10.4304/JNW.4.7.539-551}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RekhisB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SaadFKS09, author = {Mohammad Al Saad and Elfriede Fehr and Nicolai Kamenzky and Jochen H. Schiller}, title = {Model-Driven Visual Testing and Debugging of {WSN} Applications}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {607--621}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.607-621}, doi = {10.4304/JNW.4.7.607-621}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SaadFKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SantosBMDH09, author = {Andr{\'{e}}a C. Santos and Fatiha Bendali and Jean Mailfert and Christophe Duhamel and Kean Mean Hou}, title = {Heuristics for Designing Energy-efficient Wireless Sensor Network Topologies}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {436--444}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.436-444}, doi = {10.4304/JNW.4.6.436-444}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SantosBMDH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SavolaA09, author = {Reijo Savola and Habtamu Abie}, title = {On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {565--579}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.565-579}, doi = {10.4304/JNW.4.7.565-579}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SavolaA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShaoCC09, author = {Huagang Shao and Haiying Cheng and Xiao Chen}, title = {Performing Admission Control Concurrently in Core-stateless Networks}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1034--1041}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1034-1041}, doi = {10.4304/JNW.4.10.1034-1041}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShaoCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShenYYY09, author = {Shigen Shen and Lihua Ye and Guangxue Yue and Fei Yu}, title = {Research of Secure Intranet/Internet Access Platform Based on Ontology}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1009--1016}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1009-1016}, doi = {10.4304/JNW.4.10.1009-1016}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShenYYY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShengZH09, author = {Tao Sheng and Jingli Zhou and Zhengbing Hu}, title = {Error Resilient Video Transmission over Wireless Networks Based on Wyner-Ziv Coding of Motion Regions}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {905--912}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.905-912}, doi = {10.4304/JNW.4.9.905-912}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShengZH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShuGCL09, author = {Jian Shu and Jiajie Gong and Yubin Chen and Linlan Liu}, title = {{BR2OM:} RSSI-based Refinement and Optimization Mechanism for Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1017--1025}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1017-1025}, doi = {10.4304/JNW.4.10.1017-1025}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShuGCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ShuYCSY09, author = {Jian Shu and Fei Yu and Chin{-}Chen Chang and Limin Sun and Guangxue Yue}, title = {Editorial}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {225--227}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.225-227}, doi = {10.4304/JNW.4.4.225-227}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ShuYCSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Stulman09, author = {Ariel Stulman}, title = {Searching for Optimal Homing Sequences for Testing Timed Communication Protocols}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {315--323}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.315-323}, doi = {10.4304/JNW.4.5.315-323}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Stulman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Sun09, author = {Jun{-}Zhao Sun}, title = {Multi-Threshold Based Data Gathering Algorithms for Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {30--41}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.30-41}, doi = {10.4304/JNW.4.1.30-41}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Sun09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/VenkateswaranSGDHN09, author = {Palaniandavar Venkateswaran and Pritam Som and Rahul Ghosh and Aritra Das and Subananda Hansda and Rabindranath Nandi}, title = {SmartGate: {A} {MAC} Protocol for Gateway Discovery in Clustered Ad-Hoc Networks}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {208--215}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.208-215}, doi = {10.4304/JNW.4.3.208-215}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/VenkateswaranSGDHN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/VergaraVMDL09, author = {Jorge E. L{\'{o}}pez de Vergara and Enrique V{\'{a}}zquez and Antony Martin and Samuel Dubus and Marie{-}No{\"{e}}lle Lepareux}, title = {Use of Ontologies for the Definition of Alerts and Policies in a Network Security Platform}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {720--733}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.720-733}, doi = {10.4304/JNW.4.8.720-733}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/VergaraVMDL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangL09, author = {Dong Wang and Chen Liu}, title = {Model-based Vulnerability Analysis of {IMS} Network}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {254--262}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.254-262}, doi = {10.4304/JNW.4.4.254-262}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangWW09, author = {Xiaohui Wang and Ai{-}Ling Wang and LingYan Wang}, title = {Efficient ID-based Secure Encryption Scheme for Anonymous Receivers}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {641--648}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.641-648}, doi = {10.4304/JNW.4.7.641-648}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangXF09, author = {Hao Wang and Qiuliang Xu and Xiu Fu}, title = {Revocable Attribute-based Key Agreement Protocol without Random Oracles}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {787--794}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.787-794}, doi = {10.4304/JNW.4.8.787-794}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangXF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangY09, author = {Yu Wang and Shun{-}Zheng Yu}, title = {Supervised Learning Real-time Traffic Classifiers}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {622--629}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.622-629}, doi = {10.4304/JNW.4.7.622-629}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WangY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WenYHD09, author = {Jian Wen and Min Yu and Wenwen Huang and Mingxing Deng}, title = {A Moving Control Strategy Based on {RSSI} Real-time Localization in Multi-tier Mobile Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {1026--1033}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.1026-1033}, doi = {10.4304/JNW.4.10.1026-1033}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WenYHD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuZ09, author = {Shuhua Wu and Yuefei Zhu}, title = {Efficient Solution to Password-based Key Exchange for Large Groups}, journal = {J. Networks}, volume = {4}, number = {2}, pages = {140--147}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.2.140-147}, doi = {10.4304/JNW.4.2.140-147}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WuZ09a, author = {Shuhua Wu and Yuefei Zhu}, title = {Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting}, journal = {J. Networks}, volume = {4}, number = {7}, pages = {649--656}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.7.649-656}, doi = {10.4304/JNW.4.7.649-656}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/WuZ09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongT09, author = {Kaiqi Xiong and David J. Thuente}, title = {Dynamic Localization Schemes in Malicious Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {677--686}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.677-686}, doi = {10.4304/JNW.4.8.677-686}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongWJ09, author = {Yonghua Xiong and Min Wu and Weijia Jia}, title = {Efficient Frame Schedule Scheme for Real-time Video Transmission Across the Internet Using {TCP}}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {216--223}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.216-223}, doi = {10.4304/JNW.4.3.216-223}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/XiongWJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XiongZQSQ09, author = {Ke Xiong and Yu Zhang and Zhengding Qiu and Dongmei Sun and Ya{-}juan Qin}, title = {QoS-enhanced {TNPOSS} Network Model and its {E2E} Delay Bound for Multimedia Flows}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {795--802}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.795-802}, doi = {10.4304/JNW.4.8.795-802}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XiongZQSQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuZCZ09, author = {Xiaorong Xu and Baoyu Zheng and Jingwu Cui and Wei{-}Ping Zhu}, title = {Performance Analysis of Diversity and Multiplexing Tradeoff and Distributed Space-Time Block Code in Cooperative {MIMO} Networks}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {465--472}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.465-472}, doi = {10.4304/JNW.4.6.465-472}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuZCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuZDHP09, author = {Guangming Xu and Weikang Zhu and Min Dai and Jianwei He and Chengkang Pan}, title = {Hybrid Transmission Scheme for {MIMO} Relay Channels}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {913--920}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.913-920}, doi = {10.4304/JNW.4.9.913-920}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/XuZDHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YaoC09, author = {Ye Yao and Wandong Cai}, title = {Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear Analysis Model of Delay}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {244--253}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.244-253}, doi = {10.4304/JNW.4.4.244-253}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YaoC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZabirAAK09, author = {Salim Zabir and Jemal H. Abawajy and Farid Ahmed and Mohammad A. Karim}, title = {Guest Editorial}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {929--930}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.929-930}, doi = {10.4304/JNW.4.10.929-930}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZabirAAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaiWYRS09, author = {Yujia Zhai and Yue Wang and Jian Yuan and Yong Ren and Xiuming Shan}, title = {An Index Structure Framework to Analyze Host Mobility Supports for Integrated Networks}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {53--64}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.53-64}, doi = {10.4304/JNW.4.1.53-64}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhaiWYRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangC09, author = {Zhi Zhang and Guohua Cui}, title = {A Secure Hierarchical Identify Authentication Scheme Combining Trust Mechanism in Mobile IPv6 Networks}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {343--350}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.343-350}, doi = {10.4304/JNW.4.5.343-350}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangCJMY09, author = {Hui Zhang and Haifeng Chen and Guofei Jiang and Xiaoqiao Meng and Kenji Yoshihira}, title = {Fast Indexing for Large-scale Networked System Modeling}, journal = {J. Networks}, volume = {4}, number = {8}, pages = {734--742}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.8.734-742}, doi = {10.4304/JNW.4.8.734-742}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangCJMY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangGCL09, author = {Shukui Zhang and Sheng{-}Rong Gong and Zhiming Cui and Quan Liu}, title = {An Efficient Strategy for Enhancing Robustness and Immunization in Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {170--177}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.170-177}, doi = {10.4304/JNW.4.3.170-177}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangGCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangLL09, author = {Liyi Zhang and Qihua Liu and Xinjian Li}, title = {Ubiquitous Commerce: Theories, Technologies, and Applications}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {271--278}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.271-278}, doi = {10.4304/JNW.4.4.271-278}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhangLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhangZF09, author = {Yi Zhang and Lina Zhu and Li Feng}, title = {Key Management and Authentication in Ad Hoc Network based on Mobile Agent}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {487--494}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.487-494}, doi = {10.4304/JNW.4.6.487-494}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZhangZF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhaniEK09, author = {Mohamed Faten Zhani and Halima Elbiaze and Farouk Kamoun}, title = {Analysis and Prediction of Real Network Traffic}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {855--865}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.855-865}, doi = {10.4304/JNW.4.9.855-865}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhaniEK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouDWCC09, author = {Lixin Zhou and Jichang Ding and Yi Wang and Bowen Cheng and Fei Cao}, title = {The Social Network Mining of {BBS}}, journal = {J. Networks}, volume = {4}, number = {4}, pages = {298--305}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.4.298-305}, doi = {10.4304/JNW.4.4.298-305}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouDWCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouHVZ09, author = {Haiying Zhou and Kun Mean Hou and Christophe de Vaulx and De{-}Cheng Zuo}, title = {A Hybrid Embedded Real-time Operating System for Wireless Sensor Networks}, journal = {J. Networks}, volume = {4}, number = {6}, pages = {428--435}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.6.428-435}, doi = {10.4304/JNW.4.6.428-435}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouHVZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouLK09, author = {Chenfeng Vincent Zhou and Christopher Leckie and Shanika Karunasekera}, title = {Collaborative Detection of Fast Flux Phishing Domains}, journal = {J. Networks}, volume = {4}, number = {1}, pages = {75--84}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.1.75-84}, doi = {10.4304/JNW.4.1.75-84}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouXX09, author = {Zaihong Zhou and Dongqing Xie and Wei Xiong}, title = {A Novel Distributed Detection Scheme against DDoS Attack}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {921--928}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.921-928}, doi = {10.4304/JNW.4.9.921-928}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouXX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.