default search action
Journal of Network and Computer Applications, Volume 59
Volume 59, January 2016
- Zhang Bing Zhou, Wendong Xiao, Jucheng Yang, Faming Gong:
Special issue on green networking, computing, and software systems. 1-3 - Jinfang Jiang, Guangjie Han, Hui Guo, Lei Shu, Joel J. P. C. Rodrigues:
Geographic multipath routing based on geospatial division in duty-cycled underwater wireless sensor networks. 4-13 - Qing Zhao, Congcong Xiong, Ce Yu, Chuanlei Zhang, Xi Zhao:
A new energy-aware task scheduling method for data-intensive applications in the cloud. 14-27 - Xue Xiao, Shufang Wang, Bao-Yun Lu:
Manufacturing service composition method based on networked collaboration mode. 28-38 - Yanwen Wang, Hainan Chen, Xiaoling Wu, Lei Shu:
An energy-efficient SDN based sleep scheduling algorithm for WSNs. 39-45 - Keke Gai, Meikang Qiu, Hui Zhao, Lixin Tao, Ziliang Zong:
Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. 46-54 - Chao Tong, Yu Lian, Jianwei Niu, Zhongyu Xie, Yang Zhang:
A novel green algorithm for sampling complex networks. 55-62 - Yonghua Xiong, Shao-Yun Wan, Jin-Hua She, Min Wu, Yong He, Keyuan Jiang:
An energy-optimization-based method of task scheduling for a cloud video surveillance center. 63-73 - Ana C. Riekstin, Guilherme C. Januario, Bruno Bastos Rodrigues, Viviane T. Nascimento, Tereza Cristina M. B. Carvalho, Catalin Meirosu:
Orchestration of energy efficiency capabilities in networks. 74-87 - Weidong Fang, Chuanlei Zhang, Zhidong Shi, Qing Zhao, Lianhai Shan:
BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks. 88-94 - Martina Marjanovic, Lea Skorin-Kapov, Kresimir Pripuzic, Aleksandar Antonic, Ivana Podnar Zarko:
Energy-aware and quality-driven sensor management for green mobile crowd sensing. 95-108 - Teng Long, Wenhui Zhang:
Termination analysis with recursive calling graphs. 109-116 - Chen Xiao, Lifeng Wang, Mengjiao Zhu, Wendong Wang:
A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft. 117-125 - Liping Zhang, Shanyu Tang, Shaohui Zhu:
An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. 126-133 - Piotr Cholda, Piotr Jaglarz:
Optimization/simulation-based risk mitigation in resilient green communication networks. 134-157 - Mingfu Li, Jingping Bi, Zhongcheng Li:
Improving consolidation of virtual machine based on virtual switching overhead estimation. 158-167 - Karn Yongsiriwit, Nour Assy, Walid Gaaloul:
A semantic framework for configurable business process as a service in the cloud. 168-184 - Debdeep Paul, Wen-De Zhong, Sanjay K. Bose:
Energy efficiency aware load distribution and electricity cost volatility control for cloud service providers. 185-197
- Zheli Liu, Xiaofeng Chen, Jun Yang, Chunfu Jia, Ilsun You:
New order preserving encryption model for outsourced databases in cloud environments. 198-207 - Antonio Celesti, Maria Fazio, Massimo Villari, Antonio Puliafito:
Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. 208-218 - Yunchuan Sun, Cheng Lu, Rongfang Bie, Junsheng Zhang:
Semantic relation computing theory and its application. 219-229 - Miguel Castro, Antonio J. Jara, Antonio F. Skarmeta:
Enabling end-to-end CoAP-based communications for the Web of Things. 230-236 - Juan López-de-Armentia, Diego Casado Mansilla, Diego López-de-Ipiña:
Making social networks a means to save energy. 237-246
- Ming Yu, Nirwan Ansari:
Smart grid communications: Modeling and validation. 247-249 - Danilo Antonio Sbordone, Luigi Martirano, Maria Carmen Falvo, L. Chiavaroli, Biagio Di Pietra, Ilaria Bertini, A. Genovese:
Reactive power control for an energy storage system: A real implementation in a Micro-Grid. 250-263 - Ziyuan Cai, Ming Yu, Michael Steurer, Hui Li, Yizhou Dong:
A network model for the real-time communications of a smart grid prototype. 264-273 - Dhananjay Bhor, Kavinkadhirselvan Angappan, Krishna M. Sivalingam:
Network and power-grid co-simulation framework for Smart Grid wide-area monitoring networks. 274-284 - Martin Wolkerstorfer, Bernhard Schweighofer, Hannes Wegleiter, Driton Statovci, Herbert Schwaiger, Walter Lackner:
Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids. 285-300 - Cristina Alcaraz, Javier López, Stephen D. Wolthusen:
Policy enforcement system for secure interoperable control in distributed Smart Grid systems. 301-314 - Yuan Zhang, Navid Rahbari Asr, Mo-Yuen Chow:
A robust distributed system incremental cost estimation algorithm for smart grid economic dispatch with communications information losses. 315-324 - Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Li Pan:
Puppet attack: A denial of service attack in advanced metering infrastructure network. 325-332 - Mungyu Bae, Kangho Kim, Hwangnam Kim:
Preserving privacy and efficiency in data communication and aggregation for AMI network. 333-344 - Raphael Amoah, Seyit Ahmet Çamtepe, Ernest Foo:
Formal modelling and analysis of DNP3 secure authentication. 345-360
- Jemal H. Abawajy, Albert Y. Zomaya, Ivan Stojmenovic:
Network computing and applications for Big Data analytics. 361 - Wei Xu, Jianshan Sun, Jian Ma, Wei Du:
A personalized information recommendation system for R&D project opportunity finding in big data contexts. 362-369 - Amineh Amini, Hadi Saboohi, Tutut Herawan, Teh Ying Wah:
MuDi-Stream: A multi density clustering algorithm for evolving data stream. 370-385 - Rodolfo da Silva Villaça, Rafael Pasquini, Luciano Bernardes de Paula, Maurício F. Magalhães:
HCube: Routing and similarity search in Data Centers. 386-398 - Khaleel W. Mershad, Hassan Artail, Mazen A. R. Saghir, Hazem M. Hajj, Mariette Awad:
A mathematical model to analyze the utilization of a cloud datacenter middleware. 399-415 - Maumita Bhattacharya, Md. Rafiqul Islam, Jemal H. Abawajy:
Evolutionary optimization: A big data perspective. 416-426
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.