default search action
International Journal of Communication Networks and Distributed Systems, Volume 14
Volume 14, Number 1, 2015
- Do Duy Tan, Dong-Seong Kim:
Cooperative transmission scheme for multi-hop underwater acoustic sensor networks. 1-18 - Dheeraj Rane, Monalisa Sarma:
CSLAT: an SLA template for cloud service management. 19-39 - Santanu Chatterjee, Ashok Kumar Das, Jamuna Kanta Sing:
A secure and effective access control scheme for distributed wireless sensor networks. 40-73 - T. Sunil Kumar Reddy, P. Venkata Krishna, P. Chenna Reddy:
Power aware framework for scheduling tasks in grid-based workflows. 74-88 - Junyu Lai, Lei Jiang, Ming Lei, Alireza Abdollahpouri, Weiwei Fang:
Software-defined cellular networking: a practical path towards 5G. 89-105
Volume 14, Number 2, 2015
- Chanchal Kumar De, Sumit Kundu:
Adaptive decode-and-forward protocol-based cooperative spectrum sensing in cognitive radio. 117-133 - D. Mallikarjuna Reddy, Rajaiah Dasari, Malla Reddy Perati, M. Krishna Reddy:
Delay behaviour of internet router under self-similar traffic via rational approximations. 134-144 - Yang Wei, Dong-Seong Kim:
Enhanced network recovery scheme on real-time switched ethernet for naval combat system. 145-163 - Sumathy Subramaniam, R. Saravanan:
A swarm intelligence-based approach for addressing network partitioning constraints in mobile ad hoc networks. 164-184 - Shivangi Surati, Devesh C. Jinwala, Sanjay Garg:
Evaluating the impact of fanout and dimension on the performance of a hybrid model for multidimensional indexing in peer-to-peer m-ary tree network. 185-201 - Marwa Ahmim, Malika Babes, Nacira Ghoualmi-Zine:
Formal analysis of efficiency and safety in IPSec based on internet key exchange protocol. 202-218
Volume 14, Number 3, 2015
- Debasis Das, Rajiv Misra:
Caching algorithm for fast handoff using AP graph with multiple vehicles for VANETs. 219-236 - Fan Jiang, Benchao Wang, Guangyue Lu:
Distributed load aware relay selection algorithm for cooperative relay networks. 237-255 - Peng Xiao, Zhihang Tang:
Game theory-based resource pricing model in cloud platforms. 256-271 - Ramchandra S. Mangrulkar, Mohammad Atique:
SEDAR: secured energy efficient destination aware routing protocol in delay tolerant network. 272-296 - Wenxiu He, Xianbao Wang, Defu Chen:
DV-hop node localisation algorithm with multi-mobile beacons in wireless sensor networks. 297-307 - Mallikarjun B. Channappagoudar, Pallapa Venkataram:
Performance analysis of a node monitoring protocol for mobile ad-hoc networks: an agent-based approach. 303-338
Volume 14, Number 4, 2015
- Hamza Saouli, Okba Kazar, Aïcha-Nabila Benharkat:
SaaS-DCS: software-as-a-service discovery and composition system-based existence degree. 339-378 - Iti Sharma, C. P. Gupta:
Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys. 379-399 - Asgarali Bouyer, Abdolreza Hatamlou, Mohammad Masdari:
A new approach for decreasing energy in wireless sensor networks with hybrid LEACH protocol and fuzzy C-means algorithm. 400-412 - Pratyay Kuila, Prasanta K. Jana:
Heap and parameter-based load balanced clustering algorithms for wireless sensor networks. 413-432 - Khaled Taouil, Tarek Jellad, Zied Chtourou:
Enhanced packet loss recovery for real time PC-based GigE vision AVI systems. 433-455
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.