![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca49.bht:"
@article{DBLP:journals/jnca/AshrafH15, author = {Qazi Mamoon Ashraf and Mohammed Hadi Habaebi}, title = {Autonomic schemes for threat mitigation in Internet of Things}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {112--127}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.011}, doi = {10.1016/J.JNCA.2014.11.011}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AshrafH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KongAS15, author = {Jia Hao Kong and Li{-}Minn Ang and Kah Phooi Seng}, title = {A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {15--50}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.09.006}, doi = {10.1016/J.JNCA.2014.09.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KongAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MengWG15, author = {Xianfu Meng and Yanli Wang and Yue Gong}, title = {Perspective of space and time based replica population organizing strategy in unstructured peer-to-peer networks}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.10.013}, doi = {10.1016/J.JNCA.2014.10.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MengWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MoensT15, author = {Hendrik Moens and Filip De Turck}, title = {Shared resource network-aware impact determination algorithms for service workflow deployment with partial cloud offloading}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {99--111}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.004}, doi = {10.1016/J.JNCA.2014.11.004}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MoensT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NawazJ15, author = {Faiza Nawaz and Varun Jeoti}, title = {NFRA-C, neighbor friendly reader to reader anti-collision protocol with counters for dense reader environments}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {60--67}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.006}, doi = {10.1016/J.JNCA.2014.11.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/NawazJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RahmaniFC15, author = {Amir Masoud Rahmani and Zeinab Fadaie and Anthony T. Chronopoulos}, title = {Data placement using Dewey Encoding in a hierarchical data grid}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {88--98}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.009}, doi = {10.1016/J.JNCA.2014.11.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RahmaniFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangLYX15, author = {Xiaonan Wang and Deguang Le and Yufeng Yao and Conghua Xie}, title = {Location-based mobility support for 6LoWPAN wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {68--77}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.010}, doi = {10.1016/J.JNCA.2014.11.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/WangLYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YuanL15, author = {Peiyan Yuan and Ping Liu}, title = {Data fusion prolongs the lifetime of mobile sensing networks}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {51--59}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.005}, doi = {10.1016/J.JNCA.2014.11.005}, timestamp = {Fri, 03 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/YuanL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangHHTW15, author = {Ying Zhang and Houkuan Huang and Hui He and Jing Teng and Zhuxiao Wang}, title = {Efficient distributed semantic based data and service unified discovery with one-dimensional semantic space}, journal = {J. Netw. Comput. Appl.}, volume = {49}, pages = {78--87}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.11.008}, doi = {10.1016/J.JNCA.2014.11.008}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ZhangHHTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.