![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Next-Generation Computing, Volume 5
Volume 5, Number 1, 2014
- Farhana Kabir, Travis Hall, Scott A. Wallace, David Chiu:
Elastic Resource Allocation for a Cloud-Based Web Caching System. - Subhasis Dasgupta, Aditya Bagchi:
Controlling Access to a Digital Library Ontology - A Graph Transformation Approach. - Nawal Guermouche, Claude Godart:
Composition of Web Services based on Timed Mediation. - Djamel Benmerzoug:
Enterprise Application Integration Based on Interactive Agent in Cloud Computing Environment.
Volume 5, Number 2, 2014
- Sharma Chakravarthy, Aravind Venkatachalam, Aditya Telang, Manu Aery:
InfoSift: A Novel, Mining-Based Framework for Document Classification. - Kshama Raichura, Nilesh Padhariya:
MobCache: A Group-based Caching for Mobile Databases. - Carlos Enrique Gutierrez, Mohammad Reza Alsharif, Katsumi Yamashita, Mahdi Khosravy:
A Tweets Mining Approach to Detection of Critical Events Characteristics using Random Forest.
- D. Manivannan, Amrita Jyotiprada, Navjeet Sandhu:
A Survey of Routing Protocols for Wireless Sensor Networks. - Gurpreet Singh Bhamra, Anil Kumar Verma, Ram Bahadur Patel:
Agent Technology in Bioinformatics: A Review. - Jaspal Kumar Jindal, M. Kulkarni, Daya Gupta, S. Indu, Shashi Kumar:
Optimized Power Efficient Routing in Ad-hoc Networks.
Volume 5, Number 3, 2014
- Chaitanya Vemulapalli, Sanjay Kumar Madria, Mark Linderman:
Efficient Data Distribution and Sharing in Mobile Cloud Computing. - Biswajit Panja, David Morrison, Priyanka Meharia, Bharat Bharat, Atul Prakash:
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services. - Rui Jiang, Bharat K. Bhargava:
Formal Theory for Security Protocol Analysis of Distributed Denial of Service. - Robert Baird, Rose F. Gamble:
A Security Meta-Language for SOAP Messaging. - Lotfi Ben Othmane, Ruchith Fernando, Rohit Ranchal, Bharat K. Bhargava, Eric Bodden:
Likelihood of Threats to Connected Vehicles. - Ahmet Burak Can, Bharat K. Bhargava:
k-anonymity Chord for Anonymous Query Response. - Kevin Houzhi Xu, Yi Sun, Bharat K. Bhargava:
An Introduction to the Enterprise-Participant (EP) Data Model.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.