default search action
Journal of Network and Computer Applications, Volume 48
Volume 48, February 2015
- Massimo Vecchio, Roberto López-Valcarce:
Improving area coverage of wireless sensor networks via controllable mobile nodes: A greedy approach. 1-13 - Ruiying Li, Jingfu Wang, Haitao Liao, Ning Huang:
A new method for reliability allocation of avionics connected via an airborne network. 14-21 - Alejandro Ruiz-Rivera, Kwan-Wu Chin, Sieteng Soh:
A novel framework to mitigate the negative impacts of green techniques on BGP. 22-34 - Wei Li, Wei Zhang:
Coverage hole and boundary nodes detection in wireless sensor networks. 35-43 - Adnan Akhunzada, Mehdi Sookhak, Nor Badrul Anuar, Abdullah Gani, Ejaz Ahmed, Muhammad Shiraz, Steven Furnell, Amir Hayat, Muhammad Khurram Khan:
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. 44-57 - Muhammad Ashad Kabir, Jun Han, Bonghee Hong:
Reader level filtering for efficient query processing in RFID middleware. 58-70 - Bin Liao, Jiong Yu, Tao Zhang, Binglei Guo, Sun Hua, Changtian Ying:
Energy-efficient algorithms for distributed storage system based on block storage structure reconfiguration. 71-86 - Chien-Fu Cheng, Kuo-Tang Tsai:
A recursive Byzantine-resilient protocol. 87-98 - Jie-yao Liu, Ejaz Ahmed, Muhammad Shiraz, Abdullah Gani, Rajkumar Buyya, Ahsan Qureshi:
Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions. 99-117
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.