![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Network and Computer Applications, Volume 75
Volume 75, November 2016
- Hafsa Zannat, Taslima Akter, Mashrura Tasnim
, Ashikur Rahman
:
The coverage problem in visual sensor networks: A target oriented approach. 1-15 - Dimitrios Zorbas
, Luigi Di Puglia Pugliese
, Tahiry Razafindralambo
, Francesca Guerriero
:
Optimal drone placement and cost-efficient target coverage. 16-31 - Yousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed
, Raouf Boutaba:
Block Negative Acknowledgement protocol for reliable multicast in IEEE 802.11. 32-46 - Ranesh Kumar Naha
, Mohamed Othman:
Cost-aware service brokering and performance sentient load balancing algorithms in the cloud. 47-57 - Mohd Faizal Ab Razak
, Nor Badrul Anuar
, Rosli Salleh
, Ahmad Firdaus:
The rise of "malware": Bibliometric analysis of malware study. 58-76 - Pawan Kumar Verma, Rajesh Verma
, Arun Prakash
, Rajeev Tripathi
, Kshirasagar Naik:
A novel hybrid medium access control protocol for inter-M2M communications. 77-88 - Qiaoyun Zhang
, Guilin Chen, Liang Zhao, Chih-Yung Chang:
Piconet construction and restructuring mechanisms for interference avoiding in bluetooth PANs. 89-100 - Ricardo Marco Alaez
, José M. Alcaraz Calero
, Fatna Belqasmi
, May El Barachi
, Mohamad Badra, Omar Alfandi
:
Towards an open source architecture for multi-operator LTE core networks. 101-109 - Maurizio D'Arienzo
, Simon Pietro Romano
:
GOSPF: An energy efficient implementation of the OSPF routing protocol. 110-127 - Özgür Ates, Selcuk Keskin, Taskin Koçak:
High throughput graphics processing unit based Fano decoder. 128-137 - Deval Bhamare, Raj Jain
, Mohammed Samaka, Aiman Erbad
:
A survey on service function chaining. 138-155 - Jin B. Hong
, Dong Seong Kim
:
Towards scalable security analysis using multi-layered security models. 156-168 - Satoshi Utsumi, Salahuddin Muhammad Salim Zabir, Sumet Prabhavat:
A new explicit congestion notification scheme for satellite IP networks. 169-180 - Charalampos Konstantopoulos
, Grammati E. Pantziou
, Ioannis E. Venetis, Damianos Gavalas
:
Efficient event handling in Wireless Sensor and Actor Networks: An on-line computation approach. 181-199 - Saurabh Singh, Young-Sik Jeong, Jong Hyuk Park:
A survey on cloud computing security: Issues, threats, and solutions. 200-222 - Yaser Mansouri, Rajkumar Buyya:
To move or not to move: Cost optimization in a dual cloud-based storage architecture. 223-235 - Sana Habib, Junaid Qadir
, Anwaar Ali, Durdana Habib, Ming Li, Arjuna Sathiaseelan:
The past, present, and future of transport-layer multipath. 236-258 - Nor Bakiah Abd Warif
, Ainuddin Wahid Abdul Wahab
, Mohd Yamani Idna Bin Idris, Roziana Ramli
, Rosli Salleh
, Shahaboddin Shamshirband, Kim-Kwang Raymond Choo
:
Copy-move forgery detection: Survey, challenges and future directions. 259-278 - Waqar Asif
, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Optimization based spectral partitioning for node criticality assessment. 279-292 - Paulo Bartolomeu
, Muhammad Alam, Joaquim Ferreira
, José Alberto Fonseca:
Survey on low power real-time wireless MAC protocols. 293-316 - Abid Khan
, Farhana Jabeen
, Farah Naz, Sabah Suhail, Mansoor Ahmed
, Sarfraz Nawaz:
Buyer seller watermarking protocols issues and challenges - A survey. 317-334 - Junaid Shuja
, Abdullah Gani, Muhammad Habib Ur Rehman, Ejaz Ahmed, Sajjad Ahmad Madani, Muhammad Khurram Khan, Kwangman Ko:
Towards native code offloading based MCC frameworks for multimedia applications: A survey. 335-354 - Minjae Park, Hyun Ahn
, Kwanghoon Pio Kim
:
Workflow-supported social networks: Discovery, analyses, and system. 355-373 - Xun Shao, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga:
A virtual replica node-based flash crowds alleviation method for sensor overlay networks. 374-384 - Nusrat Nowsheen, Gour C. Karmakar, Joarder Kamruzzaman
:
PRADD: A path reliability-aware data delivery protocol for underwater acoustic sensor networks. 385-397
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.