default search action
Journal of Network and Computer Applications, Volume 32
Volume 32, Number 1, January 2009
- Tzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao:
Bottleneck Active Node Detouring for capsule-based active network. 1-30 - Xiaohong Guan, Wei Wang, Xiangliang Zhang:
Fast intrusion detection based on a non-negative matrix factorization model. 31-44 - Di Wu, Ye Tian, Kam-Wing Ng:
Resilient and efficient load balancing in distributed hash tables. 45-60 - JungYul Choi, Jaebong Lee, ShinJung Woo, ByoungKwon Shim:
An engineering approach to the design of a BcN control network. 61-77 - Pete Davies, Theodore Tryfonas:
A lightweight web-based vulnerability scanner for small-scale computer network security assessment. 78-95 - Hassan Artail, Manal Shihab, Haïdar Safa:
A distributed mobile database implementation on Pocket PC mobile devices communicating over Bluetooth. 96-115 - Konstantinos P. Demestichas, Evgenia F. Adamopoulou, John G. Markoulidakis, Michael E. Theologou:
Towards Anonymous Mobile Community services. 116-134 - Giancarlo Fortino, Carlo Mastroianni, Wilma Russo:
A hierarchical control protocol for group-oriented playbacks supported by content distribution networks. 135-157 - Meng Yu, Peng Liu, Wanyu Zang:
The implementation and evaluation of a recovery system for workflows. 158-183 - Wade A. Fagen, João W. Cangussu, Ram Dantu:
A virtual environment for network testing. 184-214 - Chryssa A. Papagianni, Nikolaos D. Tselikas, Evangelos A. Kosmatos, Stavros Papapanagiotou, Iakovos S. Venieris:
Performance evaluation study for QoS-aware triple play services over entry-level xDSL connections. 215-225 - Chin-Chen Chang, Jung-San Lee:
Robust t-out-of-n oblivious transfer mechanism based on CRT. 226-235 - Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali:
A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification. 236-257 - Hua Wang, Zhao Shi, Shuai Li:
Multicast routing for delay variation bound using a modified ant colony algorithm. 258-272 - Yuh-Shyan Chen, Yun-Wei Lin, Chih-Yung Chang:
An overlapping communication protocol using improved time-slot leasing for Bluetooth WPANs. 273-292 - Francisco Almeida, Vicente Blanco Pérez, Carlos Delgado, Francisco de Sande, Adrián Santos:
IDEWEP: Web service for astronomical parallel image deconvolution. 293-313 - Dario Di Sorte, Mauro Femminella, Gianluca Reali:
QoS-enabled multicast for delivering live events in a Digital Cinema scenario. 314-344
Volume 32, Number 2, March 2009
- Wanlei Zhou, Yang Xiang:
Network and system security. 345-346 - Chuan Yue, Haining Wang:
Profit-aware overload protection in E-commerce Web sites. 347-356 - Md. Rafiqul Islam, Wanlei Zhou, Minyi Guo, Yang Xiang:
An innovative analyser for multi-classifier e-mail classification based on grey list analysis. 357-366 - Wei-Zhou Lu, Wei-Xuan Gu, Shun-Zheng Yu:
One-way queuing delay measurement and its application on detecting DDoS attack. 367-376 - Bai Li, Lynn Margaret Batten:
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. 377-387 - Suriadi Suriadi, Ernest Foo, Audun Jøsang:
A user-centric federated single sign-on system. 388-401 - Deqing Zou, Ligang He, Hai Jin, Xueguang Chen:
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment. 402-411 - Jian Cao, Jinjun Chen, Haiyan Zhao, Minglu Li:
A policy-based authorization model for workflow-enabled dynamic process management. 412-422 - Wenyu Qu, Masaru Kitsuregawa, Hong Shen, Zhiguang Shan:
A novel fault-tolerant execution model by using of mobile agents. 423-432
- Muhammad Younas, Irfan Awan, Laurence Tianruo Yang:
Special issue on service oriented computing and advanced network applications. 433 - Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Mobile service oriented architectures for NN-queries. 434-447 - Arjan Durresi, Vamsi Paruchuri, Leonard Barolli:
Fast autonomous system traceback. 448-454 - D. R. W. Holton, Ibtehal Talal Nafea, Muhammad Younas, Irfan-Ullah Awan:
A class-based scheme for E-commerce web servers: Formal specification and performance evaluation. 455-460 - Ibrahim Al-Oqily, Ahmed Karmouch:
Towards automating overlay network management. 461-473 - Miguel Lozano, Pedro Morillo, Juan M. Orduña, Vicente Cavero, Guillermo Vigueras:
A new system architecture for crowd simulation. 474-482 - Yan Zhang, Laurence Tianruo Yang, Jianhua Ma, Jun Zheng:
Quantitative analysis of location management and QoS in wireless networks. 483-489 - Mieso K. Denko, Elhadi M. Shakshuki, Haroon Malik:
Enhanced cross-layer based middleware for mobile ad hoc networks. 490-499
Volume 32, Number 3, May 2009
- Mostafa I. H. Abd-El-Barr:
Topological network design: A survey. 501-509
- Byoung-Dai Lee, Jon B. Weissman, Young-Kwang Nam:
Adaptive middleware supporting scalable performance for high-end network services. 510-524 - Chunlin Li, Layuan Li:
Three-layer control policy for grid resource management. 525-537 - Yuh-Jzer Joung, Chu-Jui Yang:
Email licensing. 538-549 - Selim Ciraci, Ibrahim Korpeoglu, Özgür Ulusoy:
Reducing query overhead through route learning in unstructured peer-to-peer network. 550-567 - Songtao Guo, Gang Feng, Xiaofeng Liao, Qun Liu:
Novel delay-range-dependent stability analysis of the second-order congestion control algorithm with heterogonous communication delays. 568-577 - Eric Jui-Lin Lu, Yung-Fa Huang, Shu-Chiu Lu:
ML-Chord: A multi-layered P2P resource sharing model. 578-588 - Shi-Jen Lin, Ding-Chyu Liu:
An incentive-based electronic payment scheme for digital content transactions over the Internet. 589-598 - Thomas E. Carroll, Daniel Grosu:
A secure and anonymous voter-controlled election scheme. 599-606 - Yahia Tachwali, W. Justin Barnes, Hazem H. Refai:
Configurable symbol synchronizers for software-defined radio applications. 607-615 - I-Ching Hsu, Li-Pin Chi, Sheau-Shong Bor:
A platform for transcoding heterogeneous markup documents using ontology-based metadata. 616-629 - Konstantinos Samdanis, Vasilis Friderikos, A. Hamid Aghvami:
Autonomic hierarchical reconfiguration for wireless access networks. 630-641 - Li Ou, Xubin He, Jizhong Han:
An efficient design for fast memory registration in RDMA. 642-651 - Jenn-Hwan Tarng, Bing-Wen Chuang, Pei-Chen Liu:
A relay node deployment method for disconnected wireless sensor networks: Applied in indoor environments. 652-659 - Satish Chand, Bijendra Kumar, Hari Om:
Video Data Delivery using Slotted Patching. 660-665 - Öznur Özkasap, Mine Çaglar, Ali Alagoz:
Principles and performance analysis of SeCond: A system for epidemic peer-to-peer content distribution. 666-683 - Lambros Boukas, Georgios Kambourakis, Stefanos Gritzalis:
Pandora: An SMS-oriented m-informational system for educational realms. 684-702 - Babek Abbasov, Serdar Korukoglu:
Effective RED: An algorithm to improve RED's performance by reducing packet loss rate. 703-709 - Zonghua Zhang, Pin-Han Ho:
Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks. 710-720 - Li Feng, Wei Wang, Lina Zhu, Yi Zhang:
Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation. 721-732 - Mohammad Hamed Firooz, Alireza Nasiri Avanaki, Mohammad Reza Pakravan, Keivan Ronasi:
A fast and reliable multi-sender algorithm for peer-to-peer networks. 733-740 - Tzu-Chi Huang, Sherali Zeadally, Naveen K. Chilamkurti, Ce-Kuen Shieh:
Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks. 741-759 - Chunlin Li, Jin Xiu Zhong, Layuan Li:
Resource scheduling with conflicting objectives in grid environments: Model and evaluation. 760-769 - Jemal H. Abawajy:
Adaptive hierarchical scheduling policy for enterprise grid computing systems. 770-779
Volume 32, Number 4, July 2009
- Li Feng, Zili Li, Yi Zhang:
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network. 781-787 - Jiankun Hu, Fengling Han:
A pixel-based scrambling scheme for digital medical images protection. 788-794 - Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiatsos:
Identifying best practices for supporting broadband growth: Methodology and analysis. 795-807 - Manuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:
Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure. 808-823 - Mouhammd Al-Kasassbeh, Mo Adda:
Network fault detection with Wiener filter-based agent. 824-833 - Chao-Tung Yang, Ming-Feng Yang, Wen-Chung Chiang:
Enhancement of anticipative recursively adjusting mechanism for redundant parallel file transfer in data grids. 834-845 - Sergio Ilarri, Eduardo Mena, Arantza Illarramendi:
A system based on mobile agents to test mobile computing applications. 846-865 - Kuei-Ping Shih, Hung-Chang Chen, Chien-Min Chou, Bo-Jun Liu:
On target coverage in wireless heterogeneous sensor networks with multiple sensing units. 866-877 - Prasan Kumar Sahoo, Jang-Ping Sheu, Yu-Chia Chang:
Performance evaluation of wireless sensor network with hybrid channel access mechanism. 878-888 - Dan Wu, Chi Hong Cheong, Man Hon Wong:
Supporting asynchronous update for distributed data cubes. 889-900 - Jiaming Li, Chai Kiat Yeo:
Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks. 901-912 - Javed I. Khan, Sajid S. Shaikh:
A phenotype reputation estimation function and its study of resilience to social attacks. 913-924 - Robert L. R. Mattson, Somnath Ghosh:
HTTP-MPLEX: An enhanced hypertext transfer protocol and its performance evaluation. 925-939
Volume 32, Number 5, September 2009
- Giancarlo Fortino, Carlo Mastroianni:
Next generation content networks. 941-942 - Jayashree Ravi, Zhifeng Yu, Weisong Shi:
A survey on dynamic Web content generation and delivery techniques. 943-960 - Gilles Fedak, Haiwu He, Franck Cappello:
BitDew: A data management and distribution service with multi-protocol file transfer and metadata abstraction. 961-975 - Mukaddim Pathan, Rajkumar Buyya:
Resource discovery and request-redirection for dynamic load sharing in multi-provider peering content delivery networks. 976-990 - Jaime Lloret, Miguel Garcia, Diana Bri, Juan R. Diaz:
Study and performance of a group-based Content Delivery Network. 991-999 - Benjamín Molina, Salvatore F. Pileggi, Manuel Esteve, Carlos Enrique Palau:
A negotiation framework for content distribution in mobile transient networks. 1000-1011 - James Broberg, Rajkumar Buyya, Zahir Tari:
MetaCDN: Harnessing 'Storage Clouds' for high performance content delivery. 1012-1022
- Ying-Dar Lin, Chun-Nan Lu, Yuan-Cheng Lai, Wei-Hao Peng, Po-Ching Lin:
Application classification using packet size distribution and port association. 1023-1030
- Ling Wang, Yahia Tachwali, Pramode K. Verma, Anjan K. Ghosh:
Impact of bounded delay on throughput in multi-hop networks. 1031-1038 - Khaled Salah, Mohamed Hamawi:
Comparative packet-forwarding measurement of three popular operating systems. 1039-1048 - Behnoosh Hariri, Shervin Shirmohammadi, Mohammad Reza Pakravan, Mohammad Hossein Alavi:
An adaptive latency mitigation scheme for massively multiuser virtual environments. 1049-1063 - Yuhui Deng:
Deconstructing Network Attached Storage systems. 1064-1072 - Fang-Yie Leu:
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications. 1073-1091 - Iván Martínez-Ortiz, José Luis Sierra, Baltasar Fernández-Manjón, Alfredo Fernández-Valmayor:
Language engineering techniques for the development of e-learning applications. 1092-1105 - Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera:
Decentralized multi-dimensional alert correlation for collaborative intrusion detection. 1106-1123
Volume 32, Number 6, November 2009
- Mohammed Tarique, Kemal E. Tepe, Sasan Adibi, Shervin Erfani:
Survey of multipath routing protocols for mobile ad hoc networks. 1125-1143
- Wen-Hwa Liao, Wen-Ming Yen:
Power-saving scheduling with a QoS guarantee in a mobile WiMAX system. 1144-1152 - Neng-Chung Wang, Chao-Yang Lee:
A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks. 1153-1166 - Ramon Martí, Sergi Robles, Abraham Martín-Campillo, Jordi Cucurull-Juan:
Providing early resource allocation during emergencies: The mobile triage tag. 1167-1182 - Mohamed Khalil Watfa, Omar Mirza, Jad Kawtharani:
BARC: A Battery Aware Reliable Clustering algorithm for sensor networks. 1183-1193 - Martín López Nores, Jorge García Duque, José Juan Pazos-Arias, Yolanda Blanco-Fernández, Manuel Ramos Cabrer, Alberto Gil-Solla, Rebeca P. Díaz Redondo, Ana Fernández Vilas:
KEPPAN: Knowledge exploitation for proactively-planned ad-hoc networks. 1194-1209 - Cüneyt Bayilmis, Ersoy Kelebekler, Ismail Erturk, Celal Ceken, Ibrahim Özçelik:
Integration of a speech activated control system and a wireless interworking unit for a CAN-based distributed application. 1210-1218 - Xuan Dau Hoang, Jiankun Hu, Peter Bertók:
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. 1219-1228 - Chien-Chih Lai, Ren-Guey Lee, Chun-Chieh Hsiao, Hsin-Sheng Liu, Chun-Chang Chen:
A H-QoS-demand personalized home physiological monitoring system over a wireless multi-hop relay network for mobile home healthcare applications. 1229-1241 - Bruno Van Den Bossche, Bart De Vleeschauwer, Tom Verdickt, Filip De Turck, Bart Dhoedt, Piet Demeester:
Autonomic microcell assignment in massively distributed online virtual environments. 1242-1256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.