default search action
Journal of Network and Computer Applications, Volume 110
Volume 110, May 2018
- Mostafa Noshy, Abdelhameed Ibrahim, Hesham Arafat Ali:
Optimization of live virtual machine migration in cloud computing: A survey and future directions. 1-10 - Umber Sheikh, Abid Khan, Bilal Ahmed, Abdul Waheed, Abdul Hameed:
Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges. 11-26 - Arsany Guirguis, Mohammed Karmoose, Karim Habak, Mustafa El-Nainay, Moustafa Youssef:
Cooperation-based multi-hop routing protocol for cognitive radio networks. 27-42 - Qiang Yang, Wei Li, José Neuman de Souza, Albert Y. Zomaya:
Resilient virtual communication networks using multi-commodity flow based local optimal mapping. 43-51 - Vahideh Hayyolalam, Ali Asghar Pourhaji Kazem:
A systematic literature review on QoS-aware service composition and selection in cloud environment. 52-74 - Choon Beng Tan, Mohd. Hanafi Ahmad Hijazi, Yuto Lim, Abdullah Gani:
A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends. 75-86
- Fahri Wisnu Murti, Rahmat Faddli Siregar, Soo Young Shin:
SU-MIMO based uplink non-orthogonal multiple access for 5G. 87-96
- Jin Li, Aniello Castiglione, Changyu Dong:
Special issue on security in cloud computing. 97-98 - Agnieszka Jakobik, Francesco Palmieri, Joanna Kolodziej:
Stackelberg games for modeling defense scenarios against cloud security threats. 99-107 - Dan Liao, Hui Li, Gang Sun, Ming Zhang, Victor Chang:
Location and trajectory privacy preservation in 5G-Enabled vehicle social network services. 108-118
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.