default search action
Journal of Network and Computer Applications, Volume 84
Volume 84, April 2017
- Neenu Garg, Seema Bawa:
RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. 1-13 - Ingrid Nunes, Frederico Schardong, Alberto E. Schaeffer Filho:
BDI2DoS: An application using collaborating BDI agents to combat DDoS attacks. 14-24 - Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, Sean Carlisto de Alvarenga:
A survey of intrusion detection in Internet of Things. 25-37 - Muhammad Baqer Mollah, Md. Abul Kalam Azad, Athanasios V. Vasilakos:
Security and privacy challenges in mobile cloud computing: Survey and way ahead. 38-54 - Gürkan Solmaz, Damla Turgut:
Tracking pedestrians and emergent events in disaster areas. 55-67 - Md. Mahfuzur Rahman, Peter Graham:
Compatibility-based static VM placement minimizing interference. 68-81 - Babak Pourpeighambar, Mehdi Dehghan, Masoud Sabaei:
Multi-agent learning based routing for delay minimization in Cognitive Radio Networks. 82-92 - Imad Jawhar, Nader Mohamed, Jameela Al-Jaroodi, Dharma P. Agrawal, Sheng Zhang:
Communication and networking of UAV-based systems: Classification and associated architectures. 93-108 - Mohammed I. Alghamdi, Xunfei Jiang, Ji Zhang, Jifu Zhang, Minghua Jiang, Xiao Qin:
Towards two-phase scheduling of real-time applications in distributed systems. 109-117 - Binglei Guo, Jiong Yu, Bin Liao, Dexian Yang, Liang Lu:
A green framework for DBMS based on energy-aware query optimization and energy-efficient query processing. 118-130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.