- Giancarlo Fortino, Carlo Mastroianni, Wilma Russo:
A hierarchical control protocol for group-oriented playbacks supported by content distribution networks. J. Netw. Comput. Appl. 32(1): 135-157 (2009) - Xiaohong Guan, Wei Wang, Xiangliang Zhang:
Fast intrusion detection based on a non-negative matrix factorization model. J. Netw. Comput. Appl. 32(1): 31-44 (2009) - Songtao Guo, Gang Feng, Xiaofeng Liao, Qun Liu:
Novel delay-range-dependent stability analysis of the second-order congestion control algorithm with heterogonous communication delays. J. Netw. Comput. Appl. 32(3): 568-577 (2009) - Behnoosh Hariri, Shervin Shirmohammadi, Mohammad Reza Pakravan, Mohammad Hossein Alavi:
An adaptive latency mitigation scheme for massively multiuser virtual environments. J. Netw. Comput. Appl. 32(5): 1049-1063 (2009) - Xuan Dau Hoang, Jiankun Hu, Peter Bertók:
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. J. Netw. Comput. Appl. 32(6): 1219-1228 (2009) - D. R. W. Holton, Ibtehal Talal Nafea, Muhammad Younas, Irfan-Ullah Awan:
A class-based scheme for E-commerce web servers: Formal specification and performance evaluation. J. Netw. Comput. Appl. 32(2): 455-460 (2009) - I-Ching Hsu, Li-Pin Chi, Sheau-Shong Bor:
A platform for transcoding heterogeneous markup documents using ontology-based metadata. J. Netw. Comput. Appl. 32(3): 616-629 (2009) - Jiankun Hu, Fengling Han:
A pixel-based scrambling scheme for digital medical images protection. J. Netw. Comput. Appl. 32(4): 788-794 (2009) - Tzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao:
Bottleneck Active Node Detouring for capsule-based active network. J. Netw. Comput. Appl. 32(1): 1-30 (2009) - Tzu-Chi Huang, Sherali Zeadally, Naveen K. Chilamkurti, Ce-Kuen Shieh:
Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks. J. Netw. Comput. Appl. 32(3): 741-759 (2009) - Sergio Ilarri, Eduardo Mena, Arantza Illarramendi:
A system based on mobile agents to test mobile computing applications. J. Netw. Comput. Appl. 32(4): 846-865 (2009) - Md. Rafiqul Islam, Wanlei Zhou, Minyi Guo, Yang Xiang:
An innovative analyser for multi-classifier e-mail classification based on grey list analysis. J. Netw. Comput. Appl. 32(2): 357-366 (2009) - Yuh-Jzer Joung, Chu-Jui Yang:
Email licensing. J. Netw. Comput. Appl. 32(3): 538-549 (2009) - Javed I. Khan, Sajid S. Shaikh:
A phenotype reputation estimation function and its study of resilience to social attacks. J. Netw. Comput. Appl. 32(4): 913-924 (2009) - Chien-Chih Lai, Ren-Guey Lee, Chun-Chieh Hsiao, Hsin-Sheng Liu, Chun-Chang Chen:
A H-QoS-demand personalized home physiological monitoring system over a wireless multi-hop relay network for mobile home healthcare applications. J. Netw. Comput. Appl. 32(6): 1229-1241 (2009) - Byoung-Dai Lee, Jon B. Weissman, Young-Kwang Nam:
Adaptive middleware supporting scalable performance for high-end network services. J. Netw. Comput. Appl. 32(3): 510-524 (2009) - Fang-Yie Leu:
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications. J. Netw. Comput. Appl. 32(5): 1073-1091 (2009) - Bai Li, Lynn Margaret Batten:
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. J. Netw. Comput. Appl. 32(2): 377-387 (2009) - Chunlin Li, Layuan Li:
Three-layer control policy for grid resource management. J. Netw. Comput. Appl. 32(3): 525-537 (2009) - Jiaming Li, Chai Kiat Yeo:
Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks. J. Netw. Comput. Appl. 32(4): 901-912 (2009) - Chunlin Li, Jin Xiu Zhong, Layuan Li:
Resource scheduling with conflicting objectives in grid environments: Model and evaluation. J. Netw. Comput. Appl. 32(3): 760-769 (2009) - Wen-Hwa Liao, Wen-Ming Yen:
Power-saving scheduling with a QoS guarantee in a mobile WiMAX system. J. Netw. Comput. Appl. 32(6): 1144-1152 (2009) - Shi-Jen Lin, Ding-Chyu Liu:
An incentive-based electronic payment scheme for digital content transactions over the Internet. J. Netw. Comput. Appl. 32(3): 589-598 (2009) - Ying-Dar Lin, Chun-Nan Lu, Yuan-Cheng Lai, Wei-Hao Peng, Po-Ching Lin:
Application classification using packet size distribution and port association. J. Netw. Comput. Appl. 32(5): 1023-1030 (2009) - Jaime Lloret, Miguel Garcia, Diana Bri, Juan R. Diaz:
Study and performance of a group-based Content Delivery Network. J. Netw. Comput. Appl. 32(5): 991-999 (2009) - Miguel Lozano, Pedro Morillo, Juan M. Orduña, Vicente Cavero, Guillermo Vigueras:
A new system architecture for crowd simulation. J. Netw. Comput. Appl. 32(2): 474-482 (2009) - Wei-Zhou Lu, Wei-Xuan Gu, Shun-Zheng Yu:
One-way queuing delay measurement and its application on detecting DDoS attack. J. Netw. Comput. Appl. 32(2): 367-376 (2009) - Eric Jui-Lin Lu, Yung-Fa Huang, Shu-Chiu Lu:
ML-Chord: A multi-layered P2P resource sharing model. J. Netw. Comput. Appl. 32(3): 578-588 (2009) - Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali:
A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification. J. Netw. Comput. Appl. 32(1): 236-257 (2009) - Ramon Martí, Sergi Robles, Abraham Martín-Campillo, Jordi Cucurull-Juan:
Providing early resource allocation during emergencies: The mobile triage tag. J. Netw. Comput. Appl. 32(6): 1167-1182 (2009)