default search action
International Journal of Communication Networks and Distributed Systems, Volume 13
Volume 13, Number 1, 2014
- Po-Jen Chuang, Teng-Tai Hu:
BHAR: a bidirectional hierarchy-based anycast routing protocol for wireless sensor networks. 1-24 - Mohamed Guesmia, Mustapha Guezouri, Nader Mbarek:
A new media access control layer quality of service multicast scheme for IEEE 802.11s-based wireless mesh networks. 25-42 - Nianlong Jia, Wenjiang Feng, Yuanchang Zhong:
Relay zone-based cooperative relaying in multi-user wireless networks. 43-55 - Linda Zeghache, Nadjib Badache, Michel Hurfin, Izabela Moise:
Reliable mobile agents with transactional behaviour. 56-82 - S. Nithya Rekha, C. Chandrasekar:
Energy efficient routing to reduce flooding in weighted rough set model using MANET. 83-105 - Arockia Xavier Annie Rayan, Yogesh Palanichamy:
Effective VCR operations using efficient tree mechanism and scheduling for video streams in peer to peer networks. 106-118
Volume 13, Number 2, 2014
- K. P. Krishna Kumar, G. Geethakumari:
A taxonomy for modelling and analysis of diffusion of (mis)information in social networks. 119-143 - Sotirios Kontogiannis, Alexandros Karakos:
ALBL: an adaptive load balancing algorithm for distributed web systems. 144-168 - Samant Saurabh, Sangita Roy, Ashok Singh Sairam:
Extended deterministic edge router marking. 169-186 - Anar Abdel-Hady, Hossam M. A. Fahmy, Sherine M. Abd El-Kader, Hussein Sherif Eissa, Ashraf E. Salem:
Multilevel minimised delay clustering protocol for wireless sensor networks. 187-220 - Fayçal Bachtarzi, Allaoua Chaoui:
A modelling language and a tool for web services composition. 221-240
Volume 13, Numbers 3/4, 2014
- Fang-Yie Leu, Fatos Xhafa, Aniello Castiglione, Yi-Li Huang:
Editorial. - Chundong Wang, Yu Zhang:
Situation evaluate on hierarchical network security based on D-S evidence theory. 245-256 - Rufen Huang, Qiang Nong:
Efficient certificate-based verifiable encrypted signature scheme. 257-267 - Chundong Wang, Chaoran Feng:
The application of dynamic password technology based on ECC algorithm in mobile payment. 268-276 - Fuw-Yi Yang, Ling-Ren Liang, Chun-Chin Hsu:
An improvement in strong designated verifier signatures. 277-289 - Qingxia Li, Wenhong Wei, Ming Tao, Qian Chen:
A DDOS defence scheme based on two-stage traffic flow control. 290-300 - Chijun Zhang, Tiezheng Sun, Zhanwei Du, Jialing Han:
Multi-access mixed cognitive body area network architecture. 301-313 - Chyi-Ren Dow, Yu-Hong Lee, Ruei-Yu Hu:
Adaptive SWE and SNMP-based sensor management for environmental monitoring. 314-334 - Xiaomao Chen, Shan Ouyang, Ziqiang Chen:
An energy aware resource allocation for cognitive radio OFDMA systems. 335-343 - Xiaoqing Tan, Lianxia Jiang, Junpeng Hu:
Multiparty-controlled teleportation with generalised GHZ states in quantum communication network. 344-353 - Yuan-zhi He, Shu-yi Yin, Jingchao Wang:
In-orbit test and error analysis of shaped-reflector antenna pattern via satellite's attitude offset. 354-379 - Weiguo He:
Improved local binary pattern with pyramid model and its application in face recognition. 380-390
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.