default search action
Journal of High Speed Networks, Volume 25
Volume 25, Number 1, 2019
- Vanita Jain, Vivek Yatri, Chaitanya Kanchan Kapoor:
Software defined networking: State-of-the-art. 1-40 - Prashant Kharat, Muralidhar Kulkarni:
Congestion controlling schemes for high-speed data networks: A survey. 41-60 - Kiyotaka Fujisaki:
Evaluation of 13.56 MHz RFID system performance considering communication distance between reader and tag. 61-71 - Yasuhiro Urayama, Takuji Tachibana:
Virtual network embedding with optimization problems in live video streaming services for regional activation. 73-85 - Hamid Reza Sharifi, Hamid Haj Seyyed Javadi, Ali Moeini, Mehdi Hosseinzadeh:
Residual design of sink localization algorithms for wireless sensor networks. 87-99 - Tarek S. Sobh:
Identity management using SAML for mobile clients and Internet of Things. 101-126
Volume 25, Number 2, 2019
- Keqiang Ren, Mingkang Wu:
DV-Hop algorithm for adaptive hop-count improvement and average hop distance optimization. 127-137 - Poonam Verma, Neeta Singh:
Fuzzy assisted vehicle-ID based congestion control scheme (FUZZ-CCS) for CAM broadcast over control channel in VANETs. 139-153 - Mustapha Sadi, Mourad Amad, Nadjib Badache:
HiCo-MoG: Hierarchical consensus-based group membership service in mobile Ad Hoc networks. 155-172 - Yanli Li, Xiaonan Wang, Zhengxiong Dou:
k-Anycast data acquisition in multi-hop IoV. 173-180 - Subramanyam Radha, David Sundararaj Shylu, Perattur Nagabushanam, Jisha Mathew:
Low noise amplifier with resistive and capacitive feedback for 2.4 GHz RF receiver front end. 181-203 - Sanjit Ningthoujam, Swarnendu Kumar Chakraborty:
Analysis of the adaptive three-modes for PC+MPC+APC techniques using retransmission cycle mechanism. 205-220
Volume 25, Number 3, 2019
- Syeda Farzana, Salekul Islam:
Symmetric key-based patient controlled secured electronic health record management protocol. 221-237 - P. Sethu Lakshmi, Mangalathu Jibukumar:
Network lifetime maximization in wireless sensor network using spatial correlation based clustered opportunistic transmission. 239-252 - Sanoop Mallissery, M. M. Manohara Pai, Milad Mehbadi, Radhika M. Pai, Yu-Sung Wu:
Online and offline communication architecture for vehicular ad-hoc networks using NS3 and SUMO simulators. 253-271 - Kadri Sylejmani, Admir Kadriu, Endrit Ilazi, Bujar Krasniqi:
Genetic algorithms and greedy-randomized adaptive search procedure for router placement problem in wireless networks. 273-300 - Shohreh Monshizadeh, Gunne John Hegglid, Svein Thore Hagen:
Solving optimal power dispatch using artificial algorithm for Nordic 44 network. 301-310 - Chakib Nehnouh, Mohamed Senouci:
Fault tolerant and congestion aware routing algorithm for network on chip. 311-329
Volume 25, Number 4, 2019
- Ravindra Sadashivrao Apare, Satish Narayanrao Gujar:
Implementing adaptive dragonfly optimization for privacy preservation in IoT. 331-348 - Marta Catillo, Massimiliano Rak, Umberto Villano:
Discovery of DoS attacks by the ZED-IDS anomaly detector. 349-365 - Hisham M. Almasaeid, Osameh M. Al-Kofahi, Sharhabeel H. Alnabelsi, Ramzi R. Saifan:
Tree-based multicast service provisioning with maximum immunity in cognitive radio networks. 367-384 - Heejung Byun:
A study on user-input dissemination for wireless sensor networking systems. 385-394 - Yohaan Yoon, Kyungmin Go, Myungchul Kim:
A Temporal Synchronization Scheme to reduce and compensate for temporal asynchrony in wireless 3D video streaming. 395-411 - Mohammad Najafimehr, Mahmood Ahmadi:
SLCF: Single-hash lookup cuckoo filter. 413-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.