Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Networks

ISSN: 1796--2056
Publisher: ACADEMY PUBLISHER


ADD TO MY LIST
 
Modeling the Effects of Node Heterogeneity on the Performance of Grid Applications

Author(s): Paolo Cremonesi | Roberto Turrin | Vassil N. Alexandrov
Volume: 4
Issue: 9
Year: 2009
Analysis and Prediction of Real Network Traffic

Author(s): Mohamed Faten Zhani | Halima Elbiaze | Farouk Kamoun
Volume: 4
Issue: 9
Year: 2009
A Novel Distributed Detection Scheme against DDoS Attack

Author(s): Zaihong Zhou | Dongqing Xie | Wei Xiong
Volume: 4
Issue: 9
Year: 2009
On the Observance of Approximate Invariance of Effective Bandwidth with Finite Number of Sources

Author(s): Kishore Angrishi | Ulrich Killat
Volume: 4
Issue: 9
Year: 2009
Integration of Linux TCP and Simulation: Verification, Validation and Application

Author(s): Songrith Kittiperachol | Zhili Sun | Haitham Cruickshank
Volume: 4
Issue: 9
Year: 2009
Hybrid Transmission Scheme for MIMO Relay Channels

Author(s): Guangming Xu | Weikang Zhu | Min Dai | Jianwei He | Chengkang Pan
Volume: 4
Issue: 9
Year: 2009
Guest Editorial

Author(s): Mohammad S. Obaidat
Volume: 4
Issue: 9
Year: 2009
Two-level Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks in Freeway and Manhattan Environments

Author(s): Floriano De Rango | Fiore Veltri | Peppino Fazio | Salvatore Marano
Volume: 4
Issue: 9
Year: 2009
Transport Protocol Throughput Fairness

Author(s): Saleem Bhatti | Martin Bateman
Volume: 4
Issue: 9
Year: 2009
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks

Author(s): Ashikur Rahman | Md. Endadul Hoque | Farzana Rahman | Sabuj Kumar Kundu | Pawel Gburzynski
Volume: 4
Issue: 9
Year: 2009
Error Resilient Video Transmission over Wireless Networks Based on Wyner-Ziv Coding of Motion Regions

Author(s): Tao Sheng | Jingli Zhou | Zhengbing Hu
Volume: 4
Issue: 9
Year: 2009
CayleyCCC: A Robust P2P Overlay Network with Simple Routing and Small-World Features

Author(s): Wenjun Xiao | Mingxin He | Huomin Liang
Volume: 6
Issue: 9
Year: 2011
A Practical Forward-Secure Public-Key Encryption Scheme

Author(s): Yang Lu | Jiguo Li
Volume: 6
Issue: 9
Year: 2011
Automatic Verification of Remote Internet Voting Protocol in Symbolic Model

Author(s): Bo Meng | Wei Huang | Dejun Wang
Volume: 6
Issue: 9
Year: 2011
Improvement of a Forward-Secure Multi-Proxy Signature Scheme

Author(s): Jun Zhang
Volume: 6
Issue: 9
Year: 2011
Efficient Certificateless Signcryption Scheme from Weil Pairing

Author(s): Gang Yu | Hongzhi Yang | Shuqin Fan | Yong Shen | Wenbao Han
Volume: 6
Issue: 9
Year: 2011
Secure and Energy-Efficient Routing for Wireless Sensor Networks

Author(s): Xing Zhang | Jingsha He | Qian Wei
Volume: 6
Issue: 9
Year: 2011
A Dynamic Web Service Composition Algorithm Based on TOPSIS

Author(s): Longchang Zhang | Hua Zou | Fangchun Yang
Volume: 6
Issue: 9
Year: 2011
STB Based Multimedia Information Publication System

Author(s): Xuan Li | Lixin Lin | Xin Liu | Dejian Ye | Weihui Dai
Volume: 6
Issue: 9
Year: 2011
A Fair Payment Protocol for Cascading P2P Transaction

Author(s): Yichun Liu | Yinghong Liang | Yuping Hu
Volume: 6
Issue: 9
Year: 2011
Security Aware Parallel and Independent Job Scheduling in Grid Computing Environments Based on Adaptive Job Replication

Author(s): Congfeng Jiang | Xianghua Xu | Jian Wan
Volume: 6
Issue: 9
Year: 2011
An Integrated Mobile Phone Payment System Based on 3G Network

Author(s): Weihui Dai | Xiang Cai | Haifeng Wu | Weidong Zhao | Xuan Li
Volume: 6
Issue: 9
Year: 2011
A Secure Anonymous Identity-based Key Agreement Protocol for Distributed Computer Networks

Author(s): Hui Cui | Tianjie Cao
Volume: 6
Issue: 9
Year: 2011
Wavelet Fuzzy Neural Network based on MQPSO for Network Anomaly Detection

Author(s): Yuan Liu
Volume: 6
Issue: 9
Year: 2011
Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks

Author(s): Qian Wei | Jingsha He | Xing Zhang
Volume: 6
Issue: 9
Year: 2011
Uniform Information Service Interoperation Framework among Heterogeneous Grids

Author(s): Yongcai Tao | Song Wu
Volume: 6
Issue: 9
Year: 2011
A Performance Value Adaptive Routing for Mobile Ad Hoc Network

Author(s): Xiangli Li | Kaimin Wei | Xiaolin Sun | Yanhong Gao
Volume: 6
Issue: 9
Year: 2011
Research of an Optimized Mobile IPv6 Real-time Seamless Handover Technology

Author(s): Lei Zhuang | Chao Wang | Wei Song
Volume: 6
Issue: 9
Year: 2011
Streaming Media Caching Model Based on Knapsack Problem

Author(s): Lei Shi | Zhanhong Wang | Yao Yao | Lin Wei
Volume: 6
Issue: 9
Year: 2011
IPv6-Based Dynamic Quality of Service Control Strategy for Wireless Network

Author(s): Zhifeng Chen | Qiaoming Zhu | Peide Qian | Fengyan Chen
Volume: 5
Issue: 9
Year: 2010
Secure Authentication Scheme based on IBE

Author(s): Feng-Yu Lei | Guo-Hua Cui | Cai Fu | Peng Xu | Jing Chen
Volume: 5
Issue: 9
Year: 2010
Guest Editorial

Author(s): Dongfeng Yuan | Chin-Chen Chang | Fei Yu | Guozhu Liu | Jun Zhang
Volume: 5
Issue: 9
Year: 2010
Principle of Symmetry for Network Topology with Applications to Some Networks

Author(s): Zhaoquan Cai | Wenjun Xiao | Qin Zhang | Yanxia Liu
Volume: 5
Issue: 9
Year: 2010
An Efficient and Robust Data Dissemination Protocol in Wireless Sensor Networks

Author(s): Shu-Kui Zhang | Jian-Xi Fan | Sheng-Rong Gong | Zhi-Ming Cui
Volume: 5
Issue: 9
Year: 2010
Research Of A Small World Architecture And Frangibility For P2P Networks

Author(s): Yuhua Liu | Yongwei Meng | Kaihua Xu | Hongcai Chen
Volume: 5
Issue: 9
Year: 2010
An Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification

Author(s): Jingjun Zhu | Haiyan Wu | Guozhu Gao
Volume: 5
Issue: 9
Year: 2010
A Trust Transitivity Model Based-on Dempster-Shafer Theory

Author(s): Xiang Qiu | Li Zhang | Shouxin Wang | Guanqun Qian
Volume: 5
Issue: 9
Year: 2010
Coverage Problem in Wireless Sensor Network: A Survey

Author(s): Gaojun Fan | Shiyao Jin
Volume: 5
Issue: 9
Year: 2010
Research on Model and Algorithm of Waveform Selection in Cognitive Radar

Author(s): Bin Wang | Jinkuan Wang | Xin Song | Yinghua Han
Volume: 5
Issue: 9
Year: 2010
A Priority and SDB based Admission Control in IEEE 802.16 Systems

Author(s): Xiu-ying Sun | Xiang-xian Zhu | Li-lei Wang
Volume: 5
Issue: 9
Year: 2010
Depth Image-based Techniques for Compression, Transmission and Display of Auto-stereo Video

Author(s): Zhuoyun Zhang | Chunping Hou | Zhigang Jin
Volume: 5
Issue: 9
Year: 2010
Load-balanced Route Discovery for Wireless Sensor Networks

Author(s): Jianmin Zhang | Jian Li
Volume: 5
Issue: 9
Year: 2010
Fast-Converging Distance Vector Routing Mechanism for IP Networks

Author(s): Bin Wang | Jianhui Zhang | Yunfei Guo | Wenping Chen
Volume: 5
Issue: 9
Year: 2010
A Hybrid Intelligent Optimization Algorithm to Assess the NSS Based on FNN Trained by HPS

Author(s): Zhibin Liu | Shaomei Yang
Volume: 5
Issue: 9
Year: 2010
Robust Constrained CMA Based on a Bayesian Approach under Quadratic Constraint

Author(s): Xin Song | Jinkuan Wang | Bin Wang | Yinghua Han
Volume: 5
Issue: 9
Year: 2010
Web Services Security Based on XML Signature and XML Encryption

Author(s): Yue-sheng Gu | Meng-tao Ye | Yong Gan
Volume: 5
Issue: 9
Year: 2010
QoS-enhanced TNPOSS Network Model and its E2E Delay Bound for Multimedia Flows

Author(s): Ke Xiong | Yu Zhang | Zheng-ding Qiu | Dong-mei Sun | Ya-juan Qin
Volume: 4
Issue: 8
Year: 2009
Comparison Computing Based on Sub-optimum Analysis:A Guide System of Network Security

Author(s): Ping He | Zengtang Qu
Volume: 4
Issue: 8
Year: 2009
Computational Time-Division and Code-Division Channel Access Scheduling in Ad Hoc Networks

Author(s): Lichun Bao | J.J. Garcia-Luna-Aceves
Volume: 3
Issue: 8
Year: 2008
Fast Indexing for Large-scale Networked System Modeling

Author(s): Hui Zhang | Haifeng Chen | Guofei Jiang | Xiaoqiao Meng | Kenji Yoshihira
Volume: 4
Issue: 8
Year: 2009
A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets

Author(s): Sergio Pozo | Rafael Ceballos | Rafael M. Gasca
Volume: 4
Issue: 8
Year: 2009
Multipath Based QoS Routing in MANET

Author(s): Fujian Qin | Youyuan Liu
Volume: 4
Issue: 8
Year: 2009
Autonomic MANET Routing Protocols

Author(s): Yangcheng Huang | Sidath Handurukande | Saleem Bhatti
Volume: 4
Issue: 8
Year: 2009
Development of a Simulator for Stochastic Deployment of Wireless Sensor Networks

Author(s): Carlos E. Otero | Ivica Kostanic | Luis D. Otero
Volume: 4
Issue: 8
Year: 2009
Dynamic Localization Schemes in Malicious Sensor Networks

Author(s): Kaiqi Xiong | David Thuente
Volume: 4
Issue: 8
Year: 2009
Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption,

Author(s): Peter Hyun-Jeen Lee | Udaya Parampalli | Shivaramakrishnan Narayan
Volume: 4
Issue: 8
Year: 2009
Revocable Attribute-based Key Agreement Protocol without Random Oracles

Author(s): Hao Wang | Qiuliang Xu | Xiu Fu
Volume: 4
Issue: 8
Year: 2009
Introducing the New Editor-in-Chief of the Journal of Networks

Author(s): George J. Sun
Volume: 3
Issue: 8
Year: 2008
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL

Author(s): Elankayer Sithirasenan | Vallipuram Muthukkumarasamy
Volume: 3
Issue: 8
Year: 2008
Quality-Aware Cooperative Proxy Caching for Video Streaming Services

Author(s): Yoshiaki Taniguchi | Naoki Wakamiya | Masayuki Murata
Volume: 3
Issue: 8
Year: 2008
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks

Author(s): Mohammad Hossein Yaghmaee | Ghazale Khojasteh Tousi
Volume: 3
Issue: 8
Year: 2008
A Call Admission Control Protocol for Multimedia Cellular Networks

Author(s): Ayman Elnaggar | Mokhtar Aboelaze | Maan Musleh
Volume: 3
Issue: 8
Year: 2008
Heterogeneous Security Policy Validation: From Formal to Executable Specifications

Author(s): Jihène Krichène | Mohamed Hamdi | Noureddine Boudriga
Volume: 3
Issue: 8
Year: 2008
A Pervasive Indoor-Outdoor Positioning System

Author(s): Lionel Reyero | Gilles Delisle
Volume: 3
Issue: 8
Year: 2008
A Provably-Secure Password-Authenticated Group Key Agreement in the Standard Model

Author(s): Xiu Fu | Qiuliang Xu | Hao Wang
Volume: 4
Issue: 8
Year: 2009
Guest Editorial

Author(s): Mohammad S. Obaidat | Joaquim Filipe
Volume: 4
Issue: 8
Year: 2009
Construction of a Shared Terminal System by LDAP-Smart Card Authentication Cooperation

Author(s): Kazuto Kuzuu | Yasushi Hirano | Kenji Mase | Toyohide Watanabe
Volume: 4
Issue: 8
Year: 2009
Use of Ontologies for the Definition of Alerts and Policies in a Network Security Platform

Author(s): Jorge E. López de Vergara | Enrique Vázquez | Antony Martin | Samuel Dubus | Marie-Noëlle Lepareux
Volume: 4
Issue: 8
Year: 2009
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network

Author(s): Xiao-song Zhang | Ting Chen | Xiao-lin Wang | Yong Huang | Hou-bin Bao
Volume: 6
Issue: 8
Year: 2011
Stable Routing Algorithm for Mobile Ad Hoc Network

Author(s): Youyuan Liu
Volume: 6
Issue: 8
Year: 2011
CHC: A Robust P2P Overlay Network with Simple Routing and Small-World Features

Author(s): Wenjun Xiao | Qin Zhang | Yanxia Liu | Lan Li | Weidong Chen
Volume: 6
Issue: 8
Year: 2011
Resource Management Model and ResourceDiscovery Algorithm for P2PGrid

Author(s): Zeng-gang Xiong | Xue-min Zhang | Li Liu
Volume: 6
Issue: 8
Year: 2011
Underlying Technology of P2P Media Streaming

Author(s): Guangxue Yue | Tao Jiang | Jiajin Wang | Zhi Chen | Jiajia Song | Cheng Xu
Volume: 6
Issue: 8
Year: 2011
An Enhanced SYN Cookie Defence Method for TCP DDoS Attack

Author(s): Bo Hang | Ruimin Hu | Wei Shi
Volume: 6
Issue: 8
Year: 2011
Research on 3G-based Mobile Self-rescue System for Medical Emergency

Author(s): Weihui Dai | Chunshi Wang | Guoxi Li | Fei Yu | Chen Xu
Volume: 6
Issue: 8
Year: 2011
Mediated Certificateless Signature without Random Oracles

Author(s): Minghui Zheng | Jing Zhang | Zhi Zhang
Volume: 6
Issue: 8
Year: 2011
Towards Secure Delegation with Chinese Wall Security Policy (CWSP)

Author(s): Chunxiao Ye | Haibo Hu | Hong Xiang
Volume: 6
Issue: 8
Year: 2011
Privacy Preservation in Role-based Access Control Model

Author(s): Zuo Chen | Qiuwei Yang | Xin Wan | Yuanyan Tu | Fei Yu | Chen Xu
Volume: 6
Issue: 8
Year: 2011
Automated Trust Negotiation with Time Behavior

Author(s): Zuo Chen | Qiuwei Yang | Xin Wan | Yuanyan Tu | Fei Yu | Chen Xu
Volume: 6
Issue: 8
Year: 2011
Performance Research of Modulation for Optical Wireless Communication System

Author(s): Yan Gao | Min Wu | Weifeng Du
Volume: 6
Issue: 8
Year: 2011
Survey: Research on QoS of P2P Reliable Streaming Media

Author(s): Xiaofeng Xiong | Jiajia Song | Guangxue Yue | Jiansheng Liu | Linquan Xie
Volume: 6
Issue: 8
Year: 2011
Application Layer Multicast Technology of Streaming Media

Author(s): Jiansheng Liu | Jiajia Wei | Guangxue Yue | Linquan Xie | Xiaofeng Xiong
Volume: 6
Issue: 8
Year: 2011
Survey on Scheduling Technologies of P2P Media Streaming

Author(s): Guangxue Yue | Nanqing Wei | Jiansheng Liu | Xiaofeng Xiong | Linquan Xie
Volume: 6
Issue: 8
Year: 2011
A Literature Survey on Handoff for Mobile IPv6

Author(s): Zongpu Jia | Gaolei Wang | Ran Zhao
Volume: 6
Issue: 8
Year: 2011
Performance Analysis and Evaluation for Sleep-mode with Uplink/Downlink Traffics in IEEE 802.16e Network

Author(s): Zhanqiang Huo | Shunfu Jin | Zhiheng Wang
Volume: 6
Issue: 8
Year: 2011
ABC Supported Handover Decision Scheme based on multi-PSO with Optimum Mutation

Author(s): Xingwei Wang | Huanyan Zhao | Min Huang | Zhankao Wen | Weixin Wu | Xiaofeng Liu
Volume: 6
Issue: 8
Year: 2011
Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks

Author(s): Shen-Ho Lin | Jung-Hui Chiu | Sung-Shiou Shen
Volume: 5
Issue: 8
Year: 2010
Efficient Cluster Head Selection Methods for Wireless Sensor Networks

Author(s): Jong-Shin Chen | Zeng-Wei Hong | Neng-Chung Wang | San-Heui Jhuang
Volume: 5
Issue: 8
Year: 2010
Applications for IP Video Surveillance over the ITRI MTWAL

Author(s): Rui-Yen Chang | Hsin-Ta Chiao | Chin-Lung Lee | Yu-Cheng Chen
Volume: 5
Issue: 8
Year: 2010
Performance of Adaptive Hysteresis Vertical Handoff Scheme for Heterogeneous Mobile Communication Networks

Author(s): Yung-Fa Huang | Hsing-Chung Chen | Hung-Chi Chu | Jiun-Jian Liaw | Fu-Bin Gao
Volume: 5
Issue: 8
Year: 2010
Using Correspondent Information for Route Optimization Scheme on Proxy Mobile IPv6

Author(s): Young-Hyun Choi | Tai-Myoung Chung
Volume: 5
Issue: 8
Year: 2010
Guest Editorial

Author(s): Hsing-Chung Chen | Franz I.S. Ko | Yung-Chen Chou | Shyan-Ming Yuan | Yaw-Chung Chen | Chin-Chen Chang | Jyh-Horng Wen | Shiuh-Jeng Wang | Yuh-Ren Tsai | Keh-Ming Lu
Volume: 5
Issue: 8
Year: 2010
The Analysis of a Self-stabilizing MAC Protocol for Multi-channel Ad Hoc Networks

Author(s): Sheng-Hsuan Hsu | Ching-Chi Hsu | Shun-Shii Lin | Ferng-Ching Lin
Volume: 5
Issue: 8
Year: 2010
A Model for Managing and Discovering Services Based on Dynamic Quality of Services

Author(s): Hao-peng Chen | Can Zhang | Guang Yang
Volume: 5
Issue: 8
Year: 2010
A Cluster-Based Collaboration Framework for SIP Conference Applications

Author(s): Hui-Kai Su | Wen-Hsu Hsiao
Volume: 5
Issue: 8
Year: 2010
Adaptive and Energy Efficient Clustering Algorithm for Event-Driven Application in Wireless Sensor Networks (AEEC)

Author(s): Otgonchimeg Buyanjargal | Youngmi Kwon
Volume: 5
Issue: 8
Year: 2010
A Generalized Temporal and Spatial Role-Based Access Control Model

Author(s): Hsing-Chung Chen | Shiuh-Jeng Wang | Jyh-Horng Wen | Yung-Fa Huang | Chung-Wei Chen
Volume: 5
Issue: 8
Year: 2010
An ECC-Based Blind Signature Scheme

Author(s): Fuh-Gwo Jeng | Tzer-Long Chen | Tzer-Shyong Chen
Volume: 5
Issue: 8
Year: 2010
A FMIPv6 Based Handover Scheme for Real-Time Applications in Mobile WiMAX

Author(s): Chen-Hua Shih | Yaw-Chung Chen
Volume: 5
Issue: 8
Year: 2010
A Novel User Authentication Scheme Based on QR-Code

Author(s): Kuan-Chieh Liao | Wei-Hsun Lee
Volume: 5
Issue: 8
Year: 2010
A Secure Destination-Sequenced Distance-Vector Routing Protocol for Ad Hoc Networks

Author(s): Jyu-Wei Wang | Hsing-Chung Chen | Yi-Ping Lin
Volume: 5
Issue: 8
Year: 2010
Performance of an Energy Efficient Routing Scheme for Cluster-based Wireless Sensor Networks

Author(s): Yung-Fa Huang | Tung-Jung Chan | Tsair-Rong Chen | Young-Long Chen | Neng-Chung Wang
Volume: 5
Issue: 8
Year: 2010
Efficient ID-based Secure Encryption Scheme for Anonymous Receivers

Author(s): Xiaohui Wang | Ai-ling Wang | LingYan Wang
Volume: 4
Issue: 7
Year: 2009
User Behavior and IM Topology Analysis

Author(s): Qiang Yan | Xiaoyan Huang
Volume: 3
Issue: 7
Year: 2008
Analysing a Multi-hop UMTS over Multiple Frequency Schemes and an Urban Environment

Author(s): Konstantios Konstantinou | Muhammad A. Imran | Costas Tzaras
Volume: 3
Issue: 7
Year: 2008
A Converged Charging Framework for Mobile Voice and Data Applications

Author(s): Francesco Palmieri
Volume: 4
Issue: 7
Year: 2009
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams

Author(s): Manel Abdelkader | Mohamed Hamdi | Noureddine Boudriga
Volume: 4
Issue: 7
Year: 2009
An Efficient Data Aggregation Algorithm for Cluster-based Sensor Network

Author(s): Mohammad Mostafizur Rahman Mozumdar | Guofang Nan | Francesco Gregoretti | Luciano Lavagno | Laura Vanzago
Volume: 4
Issue: 7
Year: 2009
Computing and Routing for Trust in Structured P2P Network

Author(s): Biao Cai | Zhishu Li
Volume: 4
Issue: 7
Year: 2009
Investigating Attack Scenarios in Multihop Wireless Systems

Author(s): Slim Rekhis | Noureddine Boudriga
Volume: 4
Issue: 7
Year: 2009
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure

Author(s): Dennis K. Nilsson | Ulf E. Larson
Volume: 4
Issue: 7
Year: 2009
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks

Author(s): Reijo M. Savola | Habtamu Abie
Volume: 4
Issue: 7
Year: 2009
A Railway Signal Control System by Optical LAN and Design Simplification

Author(s): Takashi Kunifuji | Jun Nishiyama | Hiroyuki Sugahara | Tetsuya Okada | Yamato Fukuta | Masayuki Matsumoto
Volume: 3
Issue: 7
Year: 2008
Enhancement of Delivery of Warning Messages for Mobile Networks

Author(s): Chia-Sheng Tsai | Wun-Kai Du
Volume: 3
Issue: 7
Year: 2008
Analyzing the ENRON Communication Network Using Agent-Based Simulation

Author(s): Shinako Matsuyama | Takao Terano
Volume: 3
Issue: 7
Year: 2008
A Route Establishment Scheme for Multi-route Coding in Multihop Cellular Networks

Author(s): Hiraku Okada | Hitoshi Imai | Takaya Yamazato | Masaaki Katayama | Kenichi Mase
Volume: 3
Issue: 7
Year: 2008
Datacasting In The Mobile Environment

Author(s): Kent Chamberlin | Benjamin McMahon | Scott Valcourt
Volume: 3
Issue: 7
Year: 2008
On the 20/40 MHz Coexistence of Overlapping BSSs in WLANs

Author(s): Ariton E. Xhafa | Anuj Batra | Artur Zaks
Volume: 3
Issue: 7
Year: 2008
Guest Editorial

Author(s): Noureddine Boudriga | Habtamu Abie
Volume: 4
Issue: 7
Year: 2009
Model-Driven Visual Testing and Debugging of WSN Applications

Author(s): Mohammad Al Saad | Elfriede Fehr | Nicolai Kamenzky | Jochen Schiller
Volume: 4
Issue: 7
Year: 2009
Supervised Learning Real-time Traffic Classifiers

Author(s): Yu Wang | Shun-Zheng Yu
Volume: 4
Issue: 7
Year: 2009
Global Optimization of Multi Radio Mesh Access Point Location in Underground Area

Author(s): Manani M. Moutairou | Hasnaâ Aniss | Gilles Y. Delisle | Nadir Hakem
Volume: 4
Issue: 7
Year: 2009
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting

Author(s): Shuhua Wu | Yuefei Zhu
Volume: 4
Issue: 7
Year: 2009
Effective Monitor Placement in Internet Networks

Author(s): Yuri Breitbart | Feodor F. Dragan | Hassan Gobjuka
Volume: 4
Issue: 7
Year: 2009
Guest Editorial

Author(s): Tianlong Gu | Shenghui Liu
Volume: 6
Issue: 7
Year: 2011
Multi-Constrained Routing Algorithm for Multimedia Communications in Wireless Sensor Networks

Author(s): Xin Yan | Layuan Li | F. J. An
Volume: 6
Issue: 7
Year: 2011
Reputation-aware Service Selection based on QoS Similarity

Author(s): Shenghui Zhao | Guoxin Wu | Guilin Chen | Haibao Chen
Volume: 6
Issue: 7
Year: 2011
A Collaborative Nonlocal-Means Super-resolution Algorithm Using Zernike Monments

Author(s): Lin Guo | Qinghu Chen
Volume: 6
Issue: 7
Year: 2011
Mathematical Model and Hybrid Scatter Search for Cost Driven Job-shop Scheduling Problem

Author(s): Bai Jie | Sun Kai | Yang Gen Ke
Volume: 6
Issue: 7
Year: 2011
Multi-objective Genetic Algorithm for System Identification and Controller Optimization of Automated Guided Vehicle

Author(s): Xing Wu | Peihuang Lou | Dunbing Tang
Volume: 6
Issue: 7
Year: 2011
WebVR——Web Virtual Reality Engine Based on P2P network

Author(s): zhihan LV | Tengfei Yin | Yong Han | Yong Chen | Ge Chen
Volume: 6
Issue: 7
Year: 2011
An Energy-Efficient Communication Protocol for Wireless Sensor Networks

Author(s): Fengjun Shang
Volume: 6
Issue: 7
Year: 2011
A New Method of Time-frequency Synthesis of Harmonic Signal Extraction from Chaotic Background

Author(s): Er-fu WANG | Zhi-fang WANG | Jing MA | Qun DING
Volume: 6
Issue: 7
Year: 2011
Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

Author(s): Jian Yang | Haihang Wang | Jian Wang | Chengxiang Tan | Dingguo Yu
Volume: 6
Issue: 7
Year: 2011
Image Compression Based on Improved FFT Algorithm

Author(s): Juanli Hu | Jiabin Deng | Juebo Wu
Volume: 6
Issue: 7
Year: 2011
Correlative Peak Interval Prediction and Analysis of Chaotic Sequences

Author(s): Qun Ding | Lu Wang | Guanrong Chen
Volume: 6
Issue: 7
Year: 2011
An Energy Efficient Dynamic Clustering Protocol Based on Weight in Wireless Sensor Networks

Author(s): Ming Zhang | Suoping Wang
Volume: 6
Issue: 7
Year: 2011
Data Accuracy Estimation for Spatially Correlated Data in Wireless Sensor Networks under Distributed Clustering

Author(s): Jyotirmoy Karjee | H.S Jamadagni
Volume: 6
Issue: 7
Year: 2011
Networking as a Service: a Cloud-based Network Architecture

Author(s): Tao Feng | Jun Bi | Hongyu Hu | Hui Cao
Volume: 6
Issue: 7
Year: 2011
Guest Editorial

Author(s): Mohammad M. Banat
Volume: 5
Issue: 7
Year: 2010
An Improved Detection Technique for Cyclic-Prefixed OFDM

Author(s): Giovanni Garbo | Stefano Mangione
Volume: 5
Issue: 7
Year: 2010
Channel Estimation Based in Comb-Type Pilots Arrangement for OFDM System over Time Varying Channel

Author(s): Hala M. Mahmoud | Allam S. Mousa | Rashid Saleem
Volume: 5
Issue: 7
Year: 2010
Performance Enhancement due to the TNL Congestion Control on the Simultaneous Deployment of both HSDPA and HSUPA

Author(s): Yasir Zaki | Thushara Weerawardane | Andreas Timm-Giel | Carmelita Görg | Gennaro Ciro Malafronte
Volume: 5
Issue: 7
Year: 2010
Dimensioning of NGN Main Components with Improved and Guaranteed Quality of Service

Author(s): Cherif Ghazel | Leila Saïdane
Volume: 5
Issue: 7
Year: 2010
Modeling and Analysis of Resequencing Delay in Selective Repeat Automatic Repeat Request

Author(s): Jun Li | Yiqiang Q. Zhao
Volume: 5
Issue: 7
Year: 2010
Evaluation and Checkpointing of Fault Tolerant Mobile Agents Execution in Distributed Systems

Author(s): Hodjatollah Hamidi | Abbas Vafaei | Seyed Amirhassan Monadjemi
Volume: 5
Issue: 7
Year: 2010
Cross-platform Approach to Advanced IP-Telephony Services using JAIN-SIP

Author(s): Amer Al-Canaan | Ahmed Khoumsi
Volume: 5
Issue: 7
Year: 2010
Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks

Author(s): Mohammad Momani | Subhash Challa | Rami Alhmouz
Volume: 5
Issue: 7
Year: 2010
Recursive Bayesian Approaches for Auto Calibration in Drift Aware Wireless Sensor Networks

Author(s): Maen Takruri | Subhash Challa | Rajib Chakravorty
Volume: 5
Issue: 7
Year: 2010
QoS-aware Rate Control Algorithm in Long Distance Wireless Mesh Networks

Author(s): Rongbo Zhu | Yingying Qin
Volume: 5
Issue: 7
Year: 2010
The Research on Web Service based Network Management

Author(s): Wenli Dong
Volume: 5
Issue: 7
Year: 2010
Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings

Author(s): Mengbo Hou | Qiuliang Xu | Shanqing Guo | Han Jiang
Volume: 5
Issue: 7
Year: 2010
The Design of Multi-Signature Certification Algorithm Protocol in Emergency Response System

Author(s): Xu-fu Peng | Yi Ding | Xuan Huang
Volume: 5
Issue: 7
Year: 2010
Agent Communication Language for Automated Negotiation Online

Author(s): Mukun Cao
Volume: 5
Issue: 6
Year: 2010
Cross-layering in an Industrial Wireless Sensor Network: Case Study of OCARI

Author(s): Khaldoun Al Agha | Gérard Chalhoub | Alexandre Guitton | Erwan Livolant | Saoucène Mahfoudh | Pascale Minet | Michel Misson | Joseph Rahmé | Thierry Val | Adrien Van Den Bossche
Volume: 4
Issue: 6
Year: 2009
On Symmetry for Network Virtual Topology

Author(s): Wenjun Xiao | Weibing Wang
Volume: 5
Issue: 6
Year: 2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes

Author(s): Jia Yu | Fanyu Kong | Xiangguo Cheng | Rong Hao | Yangkui Chen | Xuliang Li | Guowen Li
Volume: 5
Issue: 6
Year: 2010
Availability of ARINC 629 Avionic Data Bus

Author(s): Alban Gabillon | Laurent Gallon
Volume: 1
Issue: 6
Year: 2006
Evaluation of Integrated Routing/MAC Solutions for the Diffusion of Warning Messages in VANETs

Author(s): Luca Campelli | Matteo Cesana | Roberta Fracchia
Volume: 2
Issue: 6
Year: 2007
Reliable Integrated Architecture for Heterogeneous Mobile and Wireless Networks

Author(s): Christian Makaya | Samuel Pierre
Volume: 2
Issue: 6
Year: 2007
Towards a Novel Metadata Information Service for Distributed Data Management

Author(s): Alexander Wöehrer | Peter Brezany
Volume: 2
Issue: 6
Year: 2007
A Distributed Graph Algorithm for Geometric Routing in Ad Hoc Wireless Networks

Author(s): Rashid Bin Muhammad
Volume: 2
Issue: 6
Year: 2007
Using Rerouting to Improve Aggregate Based Resource Allocation

Author(s): Ali E. Helvaci | Coskun Cetinkaya | Mehmet B. Yildirim
Volume: 3
Issue: 6
Year: 2008
Key Revocation System for DNSSEC

Author(s): Gilles Guette
Volume: 3
Issue: 6
Year: 2008
An Application-Specific Reliable Data Transfer Protocol in Wireless Sensor Networks

Author(s): Damayanti Datta | Sukhamay Kundu
Volume: 3
Issue: 6
Year: 2008
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme

Author(s): Mona Holsve Ofigsbø | Anne Marie Hegland | Pål Spilling | Øivind Kure | Leif Nilsen
Volume: 3
Issue: 6
Year: 2008
Target-Oriented Routing Algorithm Based on Sequential Coordinates for Autonomous Wireless Sensor Network

Author(s): Amir M. Jafari | Adam Sklorz | Walter Lang
Volume: 4
Issue: 6
Year: 2009
A Hybrid Embedded Real-time Operating System for Wireless Sensor Networks

Author(s): Hai-Ying Zhou | Kun-Mean Hou | Christophe DE Vaulx | De-Cheng Zuo
Volume: 4
Issue: 6
Year: 2009
Heuristics for Designing Energy-efficient Wireless Sensor Network Topologies

Author(s): Andréa C. Santos | Fatiha Bendali | Jean Mailfert | Christophe Duhamel | Kean-Mean Hou
Volume: 4
Issue: 6
Year: 2009
Cooperative Inter-vehicle Communication Protocol With Low Cost Differential GPS

Author(s): Xunxing Diao | Messaoud Kara | Jian-jin Li | Kun-Mean Hou | Haiying Zhou | Aurelien Jacquot
Volume: 4
Issue: 6
Year: 2009
Key Management and Authentication in Ad Hoc Network based on Mobile Agent

Author(s): Yi Zhang | Lina Zhu | Li Feng
Volume: 4
Issue: 6
Year: 2009
A Petri Net Synthesis Method

Author(s): Chuanliang Xia
Volume: 5
Issue: 6
Year: 2010
Energy Efficient Path-constrained Sink Navigation in Delay-guaranteed Wireless Sensor Networks

Author(s): Shuai Gao | Hongke Zhang
Volume: 5
Issue: 6
Year: 2010
The Maximum Coverage Set Calculated Algorithm for WSN Area Coverage

Author(s): Xin He | Hua Yang | Xiaolin Gui
Volume: 5
Issue: 6
Year: 2010
An Efficient Receiver Deniable Encryption Scheme and Its Applications

Author(s): Bo Meng | JiangQing Wang
Volume: 5
Issue: 6
Year: 2010
Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains

Author(s): Rong-wei Yu | Fan Yin | Jin Ke | Lina Wang
Volume: 5
Issue: 6
Year: 2010
Bit-coding Aggregation Tree for Global Network Link Quality Representation in WSN

Author(s): Zhenhua Wu | Jian Shu | Pengliu Tan
Volume: 5
Issue: 6
Year: 2010
Ad Hoc Network Measurement Based on Network Tomography:Theory, Technique, and Application

Author(s): Ye Yao | Wandong Cai
Volume: 5
Issue: 6
Year: 2010
Threats and Countermeasures in GSM Networks

Author(s): Valer Bocan | Bocan Cretu
Volume: 1
Issue: 6
Year: 2006
Reliable Actuation in Sensor Networks

Author(s): Sean Rooney | Luis Garcés-Erice
Volume: 2
Issue: 6
Year: 2007
Artificial Intelligence and Synchronization in Wireless Sensor Networks

Author(s): Luca Paladina | Antonino Biundo | Marco Scarpa | Antonio Puliafito
Volume: 4
Issue: 6
Year: 2009
Reliability Analysis of Component Software in Wireless Sensor Networks Based on Transformation of Testing Data

Author(s): Chunyan Hou | Gang Cui | Xiaozong Yang
Volume: 4
Issue: 6
Year: 2009
Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks

Author(s): Jehn-Ruey Jiang | Tzu-Ming Sung
Volume: 4
Issue: 6
Year: 2009
Fairness resource allocation and scheduling for IEEE 802.16 Mesh networks

Author(s): Limin Peng | Zhanmao Cao
Volume: 5
Issue: 6
Year: 2010
EC-PPRA: An Energy Efficient Routing Protocol for Ad Hoc Networks

Author(s): Rong-sheng Dong | Yuan-chuang Hu | Jian-ming Liu
Volume: 5
Issue: 6
Year: 2010
Model Transform Based on a Kind of Transition Subnet

Author(s): Zhijian Wang | Dingguo Wei | Cheng Xu
Volume: 5
Issue: 6
Year: 2010
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)

Author(s): Muhammad Sher | Thomas Magedanz
Volume: 1
Issue: 6
Year: 2006
Dependability Considerations in Wireless Sensor Networks Applications

Author(s): Amirhosein Taherkordi | Majid Alkaee Taleghan | Mohsen Sharifi
Volume: 1
Issue: 6
Year: 2006
A Comparison of Replication Strategies for Reliable Decentralised Storage

Author(s): Matthew Leslie | Jim Davies | Todd Huffman
Volume: 1
Issue: 6
Year: 2006
Congestion Avoidance and Energy Efficient Routing Protocol for Wireless Sensor Networks with aMobile Sink

Author(s): Majid I. Khan | Wilfried N. Gansterer | Günter Haring
Volume: 2
Issue: 6
Year: 2007
Store and Forward Applications in Telemedicine for Wireless IP Based Networks

Author(s): Poondi Srinivasan Pandian | Kadavath Peedikayil Safeer | Doddamallur Thirumala Iyengar Shakunthala | Parvati Gopal | Vinod Chidambar Padaki
Volume: 2
Issue: 6
Year: 2007
Analysis of Proposed Key Establishment Protocols in Multi–Tiered Sensor Networks

Author(s): Kalvinder Singh | Vallipuram Muthukkumarasamy
Volume: 3
Issue: 6
Year: 2008
MAC Protocols for GSP in Wireless Sensor Networks

Author(s): Maria Calle | Joseph Kabara
Volume: 3
Issue: 6
Year: 2008
Evaluating the Performance of Fast Handover for Hierarchical MIPv6 in Cellular Networks

Author(s): Li Jun Zhang | Samuel Pierre
Volume: 3
Issue: 6
Year: 2008
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs

Author(s): E. Baburaj | V. Vasudevan
Volume: 3
Issue: 6
Year: 2008
Guest Editorial

Author(s): Kun Mean HOU
Volume: 4
Issue: 6
Year: 2009
A New Method to Detect Abnormal IP Address on DHCP

Author(s): Ling-Feng Chiang | Jiang-Whai Dai
Volume: 4
Issue: 6
Year: 2009
Performance Analysis of Diversity and Multiplexing Tradeoff and Distributed Space-Time Block Code in Cooperative MIMO Networks

Author(s): Xiaorong Xu | Baoyu Zheng | Jingwu Cui | Weiping Zhu
Volume: 4
Issue: 6
Year: 2009
A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks

Author(s): Jaime Lloret | Miguel Garcia | Fernando Boronat | Jesus Tomás
Volume: 4
Issue: 6
Year: 2009
A Policy-Based Autonomic Model Suitable for Quality of Service Management

Author(s): Romildo Martins da Silva Bezerra | Joberto Sérgio Barbosa Martins
Volume: 4
Issue: 6
Year: 2009
The Multicast Routing QoS Based on the Improved ACO Algorithm

Author(s): Kewen Li | Jing Tian
Volume: 4
Issue: 6
Year: 2009
A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks

Author(s): Mritunjay Rai | Shekhar Verma | Shashikala Tapaswi
Volume: 4
Issue: 6
Year: 2009
Robust Integrity Design for Nonlinear Networked Control Systems

Author(s): Zhihong Huo | Yuan Zheng | Da Huang | Huajing Fang
Volume: 4
Issue: 6
Year: 2009
Modeling and Prediction of the Internet End-to-end Delay using Recurrent Neural Networks

Author(s): Salem Belhaj | Moncef Tagina
Volume: 4
Issue: 6
Year: 2009
Study on Energy Conservation in MANET

Author(s): Yu Wang
Volume: 5
Issue: 6
Year: 2010
A Comparison of Multimedia Conferencing Frameworks

Author(s): Junchao Li | Weimin Lei | Haiyang Si
Volume: 5
Issue: 6
Year: 2010
Guest Editorial

Author(s): Fei Yu | Chin-Chen Chang | Wen Chen | Jun Zhang | Guangxue Yue
Volume: 5
Issue: 6
Year: 2010
A General Framework for Network Survivability Testing and Evaluation

Author(s): Chunlei Wang | Liang Ming | Jinjing Zhao | Dongxia Wang
Volume: 6
Issue: 6
Year: 2011
Trust Evaluation Model based on Multiple Service Attributes

Author(s): Xiaoxue Ma | Zixian Wang | Ruizhong Du
Volume: 6
Issue: 6
Year: 2011
Grid Dependent Tasks Security Scheduling Model and DPSO Algorithm

Author(s): Hai Zhu | Yuping Wang | Zhanxin Ma | Hecheng Li
Volume: 6
Issue: 6
Year: 2011
Performance Analysis of Dual-Priority Multilayer Multistage Interconnection Networks under Multicast Environment

Author(s): Dimitris C. Vasiliadis | George E. Rizos | Costas Vassilakis
Volume: 6
Issue: 6
Year: 2011
Precise Location Technology Based on Chirp Spread Spectrum

Author(s): Yan Zhang
Volume: 6
Issue: 6
Year: 2011
A Channel Assignment Algorithm for Wireless Mesh Networks Using the Maximum Flow Approach

Author(s): Yahuan Wei | Taoshen Li | Zhihui Ge
Volume: 6
Issue: 6
Year: 2011
A Threshold Signature Scheme with a Weakened Trusted Party

Author(s): Yongquan Cai | Fulai Cheng
Volume: 6
Issue: 6
Year: 2011
Internet of Things: a New Application for Intelligent Traffic Monitoring System

Author(s): Laishen Xiao | Zhengxia Wang
Volume: 6
Issue: 6
Year: 2011
Multi-direction Fuzzy Morphology Algorithm for Image Edge Detection

Author(s): Shaosheng Fan | Hainan Wang
Volume: 6
Issue: 6
Year: 2011
Rational Secret Sharing Scheme Based on Probability Encryption without Trusted Center

Author(s): Yongquan Cai | Huili Shi
Volume: 6
Issue: 6
Year: 2011
Research on the Evolutionary Model of A Kind of Vertex-splitting Network

Author(s): Narisa Zhao | Xiaoming Dai
Volume: 6
Issue: 6
Year: 2011
Semi-Distributed Relay Selection Algorithm for Multi-User Cooperative Wireless Networks

Author(s): Yafeng Wang | Min Liang | Wei Xiang
Volume: 6
Issue: 6
Year: 2011
Study of Immune PID Networked Control System Based on TrueTime

Author(s): Daogang Peng | Hao Zhang | Conghua Huang | Jiajun Lin | Hui Li
Volume: 6
Issue: 6
Year: 2011
A Modified Mountain Clustering Algorithm based on Hill Valley Function

Author(s): Junnian Wang | Deshun Liu | Chao Liu
Volume: 6
Issue: 6
Year: 2011
Highway Incident Detection Research Based on Lipschitz Exponent Algorithm

Author(s): Dan Yu | Jian Yang
Volume: 6
Issue: 6
Year: 2011
The Model and Simulation of the Invulnerability of Scale-free Networks Based on “Honeypot”

Author(s): Xianfeng Zhang | Narisa Zhao
Volume: 6
Issue: 6
Year: 2011
Video Watermarking Robust Against Spatio-Temporal Attacks

Author(s): Hongbo BI | Yubo ZHANG | Xueming LI
Volume: 6
Issue: 6
Year: 2011
Packet Scheduling for Downlink OFDMA Wireless Systems with Heterogeneous Traffic

Author(s): Cui-Qin Dai | Fang-Lan Liao | Zu-Fan Zhang
Volume: 7
Issue: 6
Year: 2012
Pivot Routing Improves Wireless Sensor Networks Performance

Author(s): Nancy El Rachkidy | Alexandre Guitton | Michel Misson
Volume: 7
Issue: 6
Year: 2012
A Parallel Rough Set Tracking Algorithm for Wireless Sensor Networks

Author(s): Weizheng Ren | Yansong Cui
Volume: 7
Issue: 6
Year: 2012
On the Validity of Fluid-dynamic Models for Data Networks

Author(s): Ciro D'Apice | Rosanna Manzo | Benedetto Piccoli
Volume: 7
Issue: 6
Year: 2012
An Improved Localization Algorithm for Wireless Sensor Network Based on the Selection of Benchmark Anchor Node

Author(s): Xiaohui Chen | Jinpeng Chen | Jing He | Bangjun Lei
Volume: 7
Issue: 6
Year: 2012
FRPWPS: A Filter Driver and Reverse Proxy Based Web Protection System

Author(s): Qian He | Yong Wang | Bang Zhao | Linlin Yao | Hongbin Chen
Volume: 7
Issue: 6
Year: 2012
Guest Editorial

Author(s): Wenjia Niu | Gang Li
Volume: 7
Issue: 6
Year: 2012
Virtual World Security Inspection

Author(s): Nicholas Charles Patterson | Michael Hobbs
Volume: 7
Issue: 6
Year: 2012
Identifying Microphone from Noisy Recordings by Using Representative Instance One Class-Classification Approach

Author(s): Huy Quan Vu | Shaowu Liu | Xinghua Yang | Zhi Li | Yongli Ren
Volume: 7
Issue: 6
Year: 2012
A SIP-based Real-time Traffic Mobility Support Scheme in Named Data Networking

Author(s): Haibo li | Yang Li | Zhijun Zhao | Tao Lin | Hui Tang | Song Ci
Volume: 7
Issue: 6
Year: 2012
Using Physical-level Context Awareness to Improve Service Ranking in Wireless Sensor Network

Author(s): Jun Lei | XingHua Yang | YinLong Liu | YiFang Qin | Hui Tang | Zhijun Zhao
Volume: 7
Issue: 6
Year: 2012
Application of Rank Correlation, Clustering and Classification in Information Security

Author(s): Gleb Beliakov | John Yearwood | Andrei Kelarev
Volume: 7
Issue: 6
Year: 2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods

Author(s): Rafiqul Islam | Ronghua Tian | Veelasha Moonsamy | Lynn M Batten
Volume: 7
Issue: 6
Year: 2012
Forward-Secure Certificate-Based Encryption and its Generic Construction

Author(s): Yang Lu | Jiguo Li
Volume: 5
Issue: 5
Year: 2010
Efficient protocols for point-convex hull inclusion decision problems

Author(s): Yun Ye | Liusheng Huang | Wei Yang | Youwen Zhu
Volume: 5
Issue: 5
Year: 2010
Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic

Author(s): Feng Liu | Zhitang Li | Zhengbing Hu | Lijuan Zhou | Bin Liu | Junfeng Yu
Volume: 5
Issue: 5
Year: 2010
A Secure Routing Protocol and its application in Multi-sink Wireless Sensor Networks

Author(s): Nike Gui | Jianbin Hu | Zhong Chen
Volume: 5
Issue: 5
Year: 2010
The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection

Author(s): Zhitang Li | Binbin Wang | Dong Li | Hao Chen | Feng Liu | ZhengBin Hu
Volume: 5
Issue: 5
Year: 2010
The Research of Load Balancing Technology in Server Colony

Author(s): Yan Gao | Zhibin Zhang | Weifeng Du
Volume: 5
Issue: 5
Year: 2010
Trust Based Routing for Misbehavior Detection in Ad Hoc Networks

Author(s): Wei Gong | Zhiyang You | Danning Chen | Xibin Zhao | Ming Gu | Kwok-Yan Lam
Volume: 5
Issue: 5
Year: 2010
A Scalable Approach to Analyzing Network Security using Compact Attack Graphs

Author(s): Feng Chen | Dehui Liu | Yi Zhang | Jinshu Su
Volume: 5
Issue: 5
Year: 2010
Efficient 3G324M protocol Implementation for Low Bit Rate Multipoint Video Conferencing

Author(s): Weijia Jia | Fung Po Tso | Lizhou Zhang
Volume: 1
Issue: 5
Year: 2006
Genetic Algorithm for Hierarchical Wireless Sensor Networks

Author(s): Sajid Hussain | Abdul Wasey Matin | Obidul Islam
Volume: 2
Issue: 5
Year: 2007
Research on Real-Time Mobile 3D Topography System

Author(s): Weihui Dai | Shuyi Liang | Wei Yan
Volume: 4
Issue: 5
Year: 2009
Modeling and Analysis of Source Management Routing Scheme for BGP

Author(s): Shu Wang | Changjia Chen
Volume: 5
Issue: 5
Year: 2010
Online Botnet Detection Based on Incremental Discrete Fourier Transform

Author(s): Xiaocong Yu | Xiaomei Dong | Ge Yu | Yuhai Qin | Dejun Yue | Yan Zhao
Volume: 5
Issue: 5
Year: 2010
802.11i Encryption Key Distribution Using Quantum Cryptography

Author(s): Thi Mai Trang Nguyen | Mohamed Ali Sfaxi | Solange Ghernaouti-Hélie
Volume: 1
Issue: 5
Year: 2006
Mobile Agents for Service Personalization in Smart Environments

Author(s): Iván Marsá-Maestre | Miguel A. López-Carmona | Juan R. Velasco | Andrés Navarro
Volume: 3
Issue: 5
Year: 2008
Detecting Intention-Violation Feature Interaction in NGN Based on Feature Re-presentation

Author(s): Yiqin Lu | Guangxue Yue | Jiajin Wang
Volume: 5
Issue: 5
Year: 2010
A Clustering Protocol Using Multiple Chain Strategy in WSNs

Author(s): Gengsheng Zheng | Zhengbing Hu
Volume: 5
Issue: 5
Year: 2010
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security

Author(s): Yih Huang | David Arsenault | Arun Sood
Volume: 1
Issue: 5
Year: 2006
On Stochastic Modeling for Integrated Security and Dependability Evaluation

Author(s): Karin Sallhammar | Bjarne E. Helvik | Svein J. Knapskog
Volume: 1
Issue: 5
Year: 2006
System-Level Fault Diagnosis Using Comparison Models: An Artificial-Immune-Systems-Based Approach

Author(s): Mourad Elhadef | Shantanu Das | Amiya Nayak
Volume: 1
Issue: 5
Year: 2006
Enhanced Security Strategies for MPLS Signaling

Author(s): Francesco Palmieri | Ugo Fiore
Volume: 2
Issue: 5
Year: 2007
The Effect of Physical Topology on Wireless Sensor Network Lifetime

Author(s): Debdhanit Yupho | Joseph Kabara
Volume: 2
Issue: 5
Year: 2007
A Traveling Wave based Communication Mechanism for Wireless Sensor Networks

Author(s): Yoshiaki Taniguchi | Naoki Wakamiya | Masayuki Murata
Volume: 2
Issue: 5
Year: 2007
A Ubiquitous Care-Support Service based on Agent-oriented Multiple-Context Coordination

Author(s): Hideyuki Takahashi | Yoshikazu Tokairin | Kazuhiro Yamanaka | Takuo Suganuma | Tetsuo Kinoshita | Kenji Sugawara | Norio Shiratori
Volume: 2
Issue: 5
Year: 2007
AONBench: A Methodology for Benchmarking XML Based Service Oriented Applications

Author(s): Abdul Waheed | Jianxun jason Ding
Volume: 2
Issue: 5
Year: 2007
A Frequency Diverse Gen2 RFID System with Isolated Continuous Wave Emitters

Author(s): Hsin-Chin Liu | Yi-Fan Chen | Yung-Ting Chen
Volume: 2
Issue: 5
Year: 2007
Outlier Rejection in Massive Trace Element Data for Geographical Origin Identification System of Vegetables

Author(s): Nobuyoshi Sato | Minoru Uehara | Koichiro Shimomura | Hirobumi Yamamoto | Kenichi Kamijo
Volume: 2
Issue: 5
Year: 2007
Alternate Routing in Tandem Traffic-Groomed Optical Networks

Author(s): Alicia Nicki Washington | Harry G. Perros
Volume: 2
Issue: 5
Year: 2007
Resource Allocation Schemes in Integrated Heterogeneous Wireless and Mobile Networks

Author(s): Wei Shen | Qing-An Zeng
Volume: 2
Issue: 5
Year: 2007
A Conceptual Model for Analysis and Design of Tunable Security Services

Author(s): Stefan Lindskog | Zoltán Faigl | Anna Brunstrom
Volume: 3
Issue: 5
Year: 2008
Prevention of Co-operative Black Hole Attack in MANET

Author(s): Latha Tamilselvan | V. Sankaranarayanan
Volume: 3
Issue: 5
Year: 2008
Wireless Sensor Network for Wearable Physiological Monitoring

Author(s): P. S. Pandian | K. P. Safeer | Pragati Gupta | D. T. Shakunthala | B. S. Sundersheshu | V. C. Padaki
Volume: 3
Issue: 5
Year: 2008
A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services

Author(s): Onyeka Ezenwoye | S. Masoud Sadjadi
Volume: 3
Issue: 5
Year: 2008
Smart Classrooms for Distance Education and their Adoption to Multiple Classroom Architecture

Author(s): Davar Pishva | G. G. D. Nishantha
Volume: 3
Issue: 5
Year: 2008
Avoidance Mechanism of Redundant Transmissions in Content Cruising System

Author(s): Takaaki Ishida | Keijiro Ehara | Seiichiro Toda | Yasuhiro Ohara | Masayoshi Imaike | Jun Murai
Volume: 3
Issue: 5
Year: 2008
Searching for Optimal Homing Sequences for Testing Timed Communication Protocols

Author(s): Ariel Stulman
Volume: 4
Issue: 5
Year: 2009
An Effective Calculation of Reputation in P2P Networks

Author(s): RVVSV Prasad | Vegi Srinivas | V. Valli Kumari | KVSVN Raju
Volume: 4
Issue: 5
Year: 2009
A Multi-dimension Qos based Local Service Selection Model for Service Composition

Author(s): Liurong Hong | Jianqiang Hu
Volume: 4
Issue: 5
Year: 2009
DSR based Routing Algorithm with Delay Guarantee for Ad Hoc Networks

Author(s): Sofiane Ouni | Jihen Bokri | Farouk Kamoun
Volume: 4
Issue: 5
Year: 2009
Analysis and Improvement of a User Authentication Improved Protocol

Author(s): Zuowen Tan
Volume: 5
Issue: 5
Year: 2010
Blind Channel Estimation with Lower Complexity Algorithm for OFDM System

Author(s): Wensheng Zhu | Youming Li | Yanjuan Lu | Ming Jin
Volume: 6
Issue: 5
Year: 2011
Neural Network with Momentum for Dynamic Source Separation and its Convergence Analysis

Author(s): Hui Li | Yue-hong Shen | Kun Xu
Volume: 6
Issue: 5
Year: 2011
Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection

Author(s): Kefu Xu | Jianlong Tan | Li Guo | Binxing Fang
Volume: 6
Issue: 5
Year: 2011
Accurate Detection of Peer-to-Peer Botnet using Multi-Stream Fused Scheme

Author(s): Jian Kang | Yuan-Zhang Song | Jun-Yao Zhang
Volume: 6
Issue: 5
Year: 2011
Security Issues and Solutions in 3G Core Network

Author(s): Xuena Peng | Yingyou Wen | Hong Zhao
Volume: 6
Issue: 5
Year: 2011
A Novel Cluster-head Selection Algorithm Based on Hybrid Genetic Optimization for Wireless Sensor Networks

Author(s): Lejiang Guo | Qiang Li | Fangxin Chen
Volume: 6
Issue: 5
Year: 2011
Foreword of Special Issue on “Nomadic Services and Applications”

Author(s): Jason C. Hung
Volume: 6
Issue: 5
Year: 2011
Broadcasting Data Items with Time Constraints Based on On-Demand Multichannel in Ubiquitous Environments

Author(s): Ding-Jung Chiang | Chien-Liang Chen | Chi-Yi Lin | Timothy K. Shih
Volume: 6
Issue: 5
Year: 2011
Real-time Hand Gesture Recognition by Shape Context Based Matching and Cost Matrix

Author(s): Lawrence Y. Deng | Jason C. Hung | Huan-Chao Keh | Kun-Yi Lin | Yi-Jen Liu | Nan-Ching Huang
Volume: 6
Issue: 5
Year: 2011
Research of Place-based 3D Augmented Community-Taking The 3D Virtual Campus as an Example

Author(s): Chung-Hsien Tsai | Huan-Chao Keh | Shu-Shen Wai | Ji-jen Wu | Chung-Hsien Tsai
Volume: 6
Issue: 5
Year: 2011
Affiliate Program      Why do you need a reservation system?