default search action
Journal of Network and Computer Applications, Volume 39
Volume 39, March 2014
- Helder Pereira Borges, José Neuman de Souza, Bruno Schulze, Antonio Roberto Mury:
Automatic services instantiation based on a process specification. 1-16 - Ali Mohammed Alsahag, Borhanuddin Mohd Ali, Nor Kamariah Noordin, Hafizal Mohamad:
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin. 17-25 - Ding-Jie Huang, Wei-Chung Teng:
A defense against clock skew replication attacks in wireless sensor networks. 26-37 - Endong Tong, Wenjia Niu, Gang Li, Ding Tang, Liang Chang, Zhongzhi Shi, Song Ci:
Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks. 38-51 - Feng-Ming Yang, Wei-Mei Chen, Jean-Lien C. Wu:
A dynamic strategy for packet scheduling and bandwidth allocation based on channel quality in IEEE 802.16e OFDMA system. 52-60 - Zhaolong Ning, Qingyang Song, Yang Huang, Lei Guo:
A channel estimation based opportunistic scheduling scheme in wireless bidirectional networks. 61-69 - Haïdar Safa, Wassim El-Hajj, Hanan Zoubian:
A robust topology control solution for the sink placement problem in WSNs. 70-82 - Yuxin Meng, Lam-for Kwok:
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection. 83-92 - Smitha Shivshankar, Abbas Jamalipour:
Spatio-temporal multicast grouping for content-based routing in vehicular networks: A distributed approach. 93-103 - Huailiang Tan, Lianjun Huang, Zaihong He, Youyou Lu, Xubin He:
DMVL: An I/O bandwidth dynamic allocation method for virtual networks. 104-116 - Ali Moussaoui, Fouzi Semchedine, Abdallah Boukerram:
A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks. 117-125 - Abderrahim Benslimane, Abderrezak Rachedi:
Rate adaptation scheme for IEEE 802.11-based MANETs. 126-139 - Vijayashree Budyal, Sunilkumar S. Manvi:
ANFIS and agent based bandwidth and delay aware anycast routing in mobile ad hoc networks. 140-151 - Wiem Tounsi, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Yannick Chevalier, Frédéric Cuppens:
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. 152-166 - Aukrit Chadagorn, Ibrahim Khalil, Conor Cameron, Zahir Tari:
PileCast: Multiple bit rate live video streaming over BitTorrent. 167-178 - Osama Al-Haj Hassan, Thamer Al-Rousan, Anas Abu Taleb, Adi Maaita:
An efficient and scalable ranking technique for mashups involving RSS data sources. 179-190 - Ousmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene, Jaime Lloret:
Simulation framework for real-time database on WSNs. 191-201 - Tien-Wen Sung, Chu-Sing Yang:
Voronoi-based coverage improvement approach for wireless directional sensor networks. 202-213 - Carlo Mastroianni, Giuseppe Papuzzo:
A self-organizing P2P framework for collective service discovery. 214-222 - Younghyun Kim, Haneul Ko, Sangheon Pack, Jong-Hyouk Lee, Seok Joo Koh, Heeyoung Jung:
Performance analysis of distributed mapping system in ID/locator separation architectures. 223-232 - Jose Ramon Gisbert, Carlos Enrique Palau, Mikel Uriarte, Gonzalo Prieto, Jose Antonio Palazon, Manuel Esteve, Oscar López, J. Correas, M. Carmen Lucas-Estan, Pablo Giménez, Agustín Moyano, Luis Collantes, Javier Gozálvez, Benjamín Molina, Óscar Lázaro, Ainara González:
Integrated system for control and monitoring industrial wireless networks for labor risk prevention. 233-252 - Alper Rifat Ulucinar, Ibrahim Korpeoglu, Ezhan Karasan:
Effects of physical channel separation on application flows in a multi-radio multi-hop wireless mesh network: An experimental study on BilMesh testbed. 253-265 - Mahantesh N. Birje, Sunilkumar S. Manvi, Sajal K. Das:
Reliable resources brokering scheme in wireless grids based on non-cooperative bargaining game. 266-279 - Shilei Lv, Shunzheng Yu:
A fuzzy k-coverage approach for RFID network planning using plant growth simulation algorithm. 280-291 - Jenn Tang:
Designing an Anti-swindle Mahjong Leisure Prototype System using RFID and ontology theory. 292-301 - Qaisar Ayub, Sulma Rashid, Mohd Soperi Mohd Zahid, Abdul Hanan Abdullah:
Contact quality based forwarding strategy for delay tolerant network. 302-309 - Xuxun Liu, Desi He:
Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks. 310-318
- Damianos Gavalas, Charalampos Konstantopoulos, Konstantinos Mastakas, Grammati E. Pantziou:
Mobile recommender systems in tourism. 319-333 - M. S. Kakkasageri, Sunilkumar S. Manvi:
Information management in vehicular ad hoc networks: A review. 334-350 - Hero Modares, Amirhosein Moravejosharieh, Jaime Lloret, Rosli Salleh:
A survey of secure protocols in Mobile IPv6. 351-368 - Muhammad Nouman Durrani, Jawwad A. Shamsi:
Volunteer computing: requirements, challenges, and solutions. 369-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.