


default search action
International Journal of Business Data Communications and Networking, Volume 1
Volume 1, Number 1, 2005
- Hui Guo, Jingli Zhou, Yunpeng Wang, Shengsheng Yu:
Prototype Implementation of a Proxy Caching System for Streaming Media Objects. 1-16 - Mohamed Hammami
, Liming Chen:
WebGuard: An Adult Content Detection and Filtering System. 17-32 - Fernando Beltrán
, César García-Díaz
:
The Use of Efficient Cost Allocation Mechanisms for Congestion Pricing in Data Networks with Priority Service Models. 33-49 - John Goh, David Taniar
:
Mining Parallel Patterns from Mobile Users. 50-76
Volume 1, Number 2, 2005
- Varadharajan Sridhar
, June Sung Park:
An Approach to Solving the Survivable Capacitated Network Design Problem. 1-16 - James Jayaputera, David Taniar
:
Query Processing Strategies for Location-Dependent Information Systems. 17-40 - Kevin Curran
, John Stephen Honan:
Addressing Spam E-Mail Using Hashcast. 41-65 - Subhankar Dhar
:
MANET: Applications, Issues, and Challenges for the Future. 66-92
Volume 1, Number 3, 2005
- Kevin Curran
, Noel Broderick:
An Investigation into Factors Associated with Web Page Download Delay. 1-12 - Ted Chia-Han Lo, Jairo A. Gutiérrez
:
A Framework for the Provision of Network Quality of Service for Enterprise Resource Planning Systems. 13-36 - Bryan Houliston, Nurul I. Sarkar
:
Wi-Fi Development: A Survey of Large New Zealand Organizations. 37-58 - Kevin Curran
, Elaine Smyth:
Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks. 59-83
Volume 1, Number 4, 2005
- KwangJin Park, MoonBae Song, Chong-Sun Hwang:
Wireless Data Broadcast Schemes for Location-Dependent Information Services Under a Geometric Location Model. 1-14 - Agustinus Borgy Waluyo, Gabriel Goh, David Taniar
, Bala Srinivasan:
On Building a Data Broadcast System in a Wireless Environment. 15-37 - Ki-Sik Kong, Sung-Ju Roh, Chong-Sun Hwang:
A Study on the Performance of IPv6-Based Mobility Protocols: Mobile IPv6 vs. Hierarchical Mobile IPv6. 38-51 - Yuping Yang, M. Howard Williams:
Adaptation of Content in Personalized Redirection of Communication. 52-65 - Byung kwan Lee, Seung Hae Yang, Tai-Chi Lee:
A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm. 66-80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.