default search action
Journal of Networks, Volume 4
Volume 4, Numbers 1, February 2009
- Nauman Aslam, William J. Phillips, William Robertson:
Effective Location Management of Mobile Actors in Wireless Sensor and Actor Networks. 1-8 - Christine Laurendeau, Michel Barbeau:
Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks. 9-18 - Neena R. Kaushik, Silvia M. Figueira, Stephen A. Chiappari:
A Hybrid Algorithm for Lightpath Assignment. 19-29 - Jun-Zhao Sun:
Multi-Threshold Based Data Gathering Algorithms for Wireless Sensor Networks. 30-41 - Zhen Hu, Robert C. Qiu, Dalwinder Singh:
Spectral Efficiency for MIMO UWB Channel in Rectangular Metal Cavity. 42-52 - Yujia Zhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan:
An Index Structure Framework to Analyze Host Mobility Supports for Integrated Networks. 53-64 - Giuseppe D'Acquisto, Pietro Cassarà, Luigi Alcuri:
An Innovative Pricing Method for Telecommunication Services Pricing through American Options. 65-74 - Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera:
Collaborative Detection of Fast Flux Phishing Domains. 75-84
Volume 4, Numbers 2, April 2009
- Khaled Ragab, Akinori Yonezawa:
A Self-organized Clustering-based Overlay Network for Application Level Multicast. 85-91 - Tatsuya Inaba:
Realization of SCM and CRM by Using RFID-captured Consumer Behavior Information. 92-99 - Jun Bi, Guang Yao, Jianping Wu:
An IPv6 Source Address Validation Testbed and Prototype Implementation. 100-107 - António Nogueira, Paulo Salvador, Andre Couto, Rui Valadas:
Towards the On-line Identification of Peer-to-peer Flow Patterns. 108-118 - Péter Ekler, Imre Kelényi, István Dévai, Balázs Bakos, Attila Kiss:
Hybrid Peer-to-Peer Content Sharing in Mobile Networks. 119-132 - Motoki Miura, Sadanori Ito, Ryozo Takatsuka, Taro Sugihara, Susumu Kunifuji:
An Empirical Study of an RFID Mat Sensor System in a Group Home. 133-139 - Shuhua Wu, Yuefei Zhu:
Efficient Solution to Password-based Key Exchange for Large Groups. 140-147 - Lyes Khoukhi, Soumaya Cherkaoui:
Toward Neural Networks Solution for Multimedia Support in Mobile Ad hoc Networks. 148-161
Volume 4, Number 3, May 2009
- Rachid Mbarek, Mohamed Tahar Ben Othman, Salem Nasri:
Fairness of High-Speed TCP Protocols with Different Flow Capacities. 163-169 - Shukui Zhang, Sheng-Rong Gong, Zhiming Cui, Quan Liu:
An Efficient Strategy for Enhancing Robustness and Immunization in Wireless Sensor Networks. 170-177 - Yogesh Chaba, Yudhvir Singh, Preeti Aneja:
Performance Analysis of Disable IP Broadcast Technique for Prevention of Flooding-Based DDoS Attack in MANET. 178-183 - TaeHoon Lee, Sunghoon Seo, UiTaek Lee, JooSeok Song:
A New Soft Handover Mechanism using DCHs in 3GPP HSDPA Networks. 184-191 - Qurban A. Memon:
Implementing Role Based Access in Healthcare Ad Hoc Networks. 192-199 - Yong-Zhong He, Zhen Han:
User Authentication with Provable Security against Online Dictionary Attacks. 200-207 - Palaniandavar Venkateswaran, Pritam Som, Rahul Ghosh, Aritra Das, Subananda Hansda, Rabindranath Nandi:
SmartGate: A MAC Protocol for Gateway Discovery in Clustered Ad-Hoc Networks. 208-215 - Yonghua Xiong, Min Wu, Weijia Jia:
Efficient Frame Schedule Scheme for Real-time Video Transmission Across the Internet Using TCP. 216-223
Volume 4, Number 4, June 2009
- Jian Shu, Fei Yu, Chin-Chen Chang, Limin Sun, Guangxue Yue:
Editorial. 225-227 - Wei Pan, Lean Yu, Shouyang Wang, Guowei Hua, Gang Xie, Jinlong Zhang:
Dynamic Pricing Strategy of Provider with Different QoS Levels in Web Service. 228-235 - Yuhua Liu, Chun Yang, Kaihua Xu, Naixue Xiong:
Model of Controlling the Hubs in P2P Networks. 236-243 - Ye Yao, Wandong Cai:
Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear Analysis Model of Delay. 244-253 - Dong Wang, Chen Liu:
Model-based Vulnerability Analysis of IMS Network. 254-262 - Tianjie Cao, Tao Quan, Bo Zhang:
Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols. 263-270 - Liyi Zhang, Qihua Liu, Xinjian Li:
Ubiquitous Commerce: Theories, Technologies, and Applications. 271-278 - Ruo-Fei Han, Hou-Xiang Wang, Qian Xiao, Xiao-Pei Jing, Hui Li:
A United Access Control Model for Systems in Collaborative Commerce. 279-289 - Jianqiang Hu, Juanzi Li, Zhiyong Zeng:
SWSCF: A Semantic-based Web Service Composition Framework. 290-297 - Lixin Zhou, Jichang Ding, Yi Wang, Bowen Cheng, Fei Cao:
The Social Network Mining of BBS. 298-305
Volume 4, Number 5, July 2009
- Weihui Dai, Shuyi Liang, Wei Yan:
Research on Real-Time Mobile 3D Topography System. 307-314 - Ariel Stulman:
Searching for Optimal Homing Sequences for Testing Timed Communication Protocols. 315-323 - Hua Jiang, Junhu Ruan:
Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation -M(1, 2, 3). 324-331 - R. V. V. S. V. Prasad, Vegi Srinivas, V. Valli Kumari, K. V. S. V. N. Raju:
An Effective Calculation of Reputation in P2P Networks. 332-342 - Zhi Zhang, Guohua Cui:
A Secure Hierarchical Identify Authentication Scheme Combining Trust Mechanism in Mobile IPv6 Networks. 343-350 - Liurong Hong, Jianqiang Hu:
A Multi-dimension Qos based Local Service Selection Model for Service Composition. 351-358 - Sofiane Ouni, Jihen Bokri, Farouk Kamoun:
DSR based Routing Algorithm with Delay Guarantee for Ad Hoc Networks. 359-369 - Bo Meng:
A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext. 370-377
Volume 4, Number 6, August 2009
- Kun Mean Hou:
Guest Editorial. 379-381 - Luca Paladina, Antonino Biundo, Marco Scarpa, Antonio Puliafito:
Artificial Intelligence and Synchronization in Wireless Sensor Networks. 382-391 - Chunyan Hou, Gang Cui, Xiaozong Yang:
Reliability Analysis of Component Software in Wireless Sensor Networks Based on Transformation of Testing Data. 392-402 - Jehn-Ruey Jiang, Tzu-Ming Sung:
Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks. 403-410 - Khaldoun Al Agha, Gérard Chalhoub, Alexandre Guitton, Erwan Livolant, Saoucene Mahfoudh, Pascale Minet, Michel Misson, Joseph Rahmé, Thierry Val, Adrien van den Bossche:
Cross-layering in an Industrial Wireless Sensor Network: Case Study of OCARI. 411-420 - Amir M. Jafari, Adam Sklorz, Walter Lang:
Target-Oriented Routing Algorithm Based on Sequential Coordinates for Autonomous Wireless Sensor Network. 421-427 - Haiying Zhou, Kun Mean Hou, Christophe de Vaulx, De-Cheng Zuo:
A Hybrid Embedded Real-time Operating System for Wireless Sensor Networks. 428-435 - Andréa C. Santos, Fatiha Bendali, Jean Mailfert, Christophe Duhamel, Kean Mean Hou:
Heuristics for Designing Energy-efficient Wireless Sensor Network Topologies. 436-444 - Xunxing Diao, Messaoud Kara, Jian-Jin Li, Kun Mean Hou, Haiying Zhou, Aurélien Jacquot:
Cooperative Inter-vehicle Communication Protocol With Low Cost Differential GPS. 445-457
- Ling-Feng Chiang, Jiang-Whai Dai:
A New Method to Detect Abnormal IP Address on DHCP. 458-464 - Xiaorong Xu, Baoyu Zheng, Jingwu Cui, Wei-Ping Zhu:
Performance Analysis of Diversity and Multiplexing Tradeoff and Distributed Space-Time Block Code in Cooperative MIMO Networks. 465-472 - Jaime Lloret, Miguel Garcia, Fernando Boronat, Jesús Tomás:
A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks. 473-486 - Yi Zhang, Lina Zhu, Li Feng:
Key Management and Authentication in Ad Hoc Network based on Mobile Agent. 487-494 - Romildo Martins da Silva Bezerra, Joberto Sérgio Barbosa Martins:
A Policy-Based Autonomic Model Suitable for Quality of Service Management. 495-504 - Kewen Li, Jing Tian:
The Multicast Routing QoS Based on the Improved ACO Algorithm. 505-510 - Mritunjay Rai, Shekhar Verma, Shashikala Tapaswi:
A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks. 511-519 - Zhihong Huo, Yuan Zheng, Da Huang, Huajing Fang:
Robust Integrity Design for Nonlinear Networked Control Systems. 520-527 - Salem Belhaj, Moncef Tagina:
Modeling and Prediction of the Internet End-to-end Delay using Recurrent Neural Networks. 528-535
Volume 4, Number 7, September 2009
- Noureddine Boudriga, Habtamu Abie:
Guest Editorial. 537-538 - Slim Rekhis, Noureddine Boudriga:
Investigating Attack Scenarios in Multihop Wireless Systems. 539-551 - Dennis K. Nilsson, Ulf Larson:
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure. 552-564 - Reijo Savola, Habtamu Abie:
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks. 565-579 - Francesco Palmieri:
A Converged Charging Framework for Mobile Voice and Data Applications. 580-588 - Manel Abdelkader, Mohamed Hamdi, Noureddine Boudriga:
Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams. 589-597 - Mohammad Mostafizur Rahman Mozumdar, Guofang Nan, Francesco Gregoretti, Luciano Lavagno, Laura Vanzago:
An Efficient Data Aggregation Algorithm for Cluster-based Sensor Network. 598-606 - Mohammad Al Saad, Elfriede Fehr, Nicolai Kamenzky, Jochen H. Schiller:
Model-Driven Visual Testing and Debugging of WSN Applications. 607-621
- Yu Wang, Shun-Zheng Yu:
Supervised Learning Real-time Traffic Classifiers. 622-629 - Manani M. Moutairou, Hasnaâ Aniss, Gilles Y. Delisle, Nadir Hakem:
Global Optimization of Multi Radio Mesh Access Point Location in Underground Area. 630-640 - Xiaohui Wang, Ai-Ling Wang, LingYan Wang:
Efficient ID-based Secure Encryption Scheme for Anonymous Receivers. 641-648 - Shuhua Wu, Yuefei Zhu:
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting. 649-656 - Yuri Breitbart, Feodor F. Dragan, Hassan Gobjuka:
Effective Monitor Placement in Internet Networks. 657-666 - Cai Biao, Zhishu Li:
Computing and Routing for Trust in Structured P2P Network. 667-674
Volume 4, Number 8, October 2009
- Mohammad S. Obaidat, Joaquim Filipe:
Guest Editorial. 675-676 - Kaiqi Xiong, David J. Thuente:
Dynamic Localization Schemes in Malicious Sensor Networks. 677-686 - Peter Hyun-Jeen Lee, Parampalli Udaya, Shivaramakrishnan Narayan:
Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption, . 687-697 - Sergio Pozo, Rafael Ceballos, Rafael M. Gasca:
A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. 698-710 - Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe:
Construction of a Shared Terminal System by LDAP-Smart Card Authentication Cooperation. 711-719 - Jorge E. López de Vergara, Enrique Vázquez, Antony Martin, Samuel Dubus, Marie-Noëlle Lepareux:
Use of Ontologies for the Definition of Alerts and Policies in a Network Security Platform. 720-733
- Hui Zhang, Haifeng Chen, Guofei Jiang, Xiaoqiao Meng, Kenji Yoshihira:
Fast Indexing for Large-scale Networked System Modeling. 734-742 - Yangcheng Huang, Sidath Handurukande, Saleem N. Bhatti:
Autonomic MANET Routing Protocols. 743-753 - Carlos E. Otero, Ivica Kostanic, Luis Daniel Otero:
Development of a Simulator for Stochastic Deployment of Wireless Sensor Networks. 754-762 - Xiu Fu, Qiuliang Xu, Hao Wang:
A Provably-Secure Password-Authenticated Group Key Agreement in the Standard Model. 763-770 - Fujian Qin, Youyuan Liu:
Multipath Based QoS Routing in MANET. 771-778 - Ping He, Zengtang Qu:
Comparison Computing Based on Sub-optimum Analysis: A Guide System of Network Security. 779-786 - Hao Wang, Qiuliang Xu, Xiu Fu:
Revocable Attribute-based Key Agreement Protocol without Random Oracles. 787-794 - Ke Xiong, Yu Zhang, Zhengding Qiu, Dongmei Sun, Ya-juan Qin:
QoS-enhanced TNPOSS Network Model and its E2E Delay Bound for Multimedia Flows. 795-802
Volume 4, Number 9, November 2009
- Mohammad S. Obaidat:
Guest Editorial. 803-804 - Kishore Angrishi, Ulrich Killat:
On the Observance of Approximate Invariance of Effective Bandwidth with Finite Number of Sources. 805-818 - Songrith Kittiperachol, Zhili Sun, Haitham S. Cruickshank:
Integration of Linux TCP and Simulation: Verification, Validation and Application. 819-836 - Paolo Cremonesi, Roberto Turrin, Vassil N. Alexandrov:
Modeling the Effects of Node Heterogeneity on the Performance of Grid Applications. 837-854 - Mohamed Faten Zhani, Halima Elbiaze, Farouk Kamoun:
Analysis and Prediction of Real Network Traffic. 855-865 - Floriano De Rango, Fiore Veltri, Peppino Fazio, Salvatore Marano:
Two-level Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks in Freeway and Manhattan Environments. 866-880 - Saleem N. Bhatti, Martin Bateman:
Transport Protocol Throughput Fairness. 881-894 - Ashikur Rahman, Md. Endadul Hoque, Farzana Rahman, Sabuj Kumar Kundu, Pawel Gburzynski:
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks. 895-904
- Tao Sheng, Jingli Zhou, Zhengbing Hu:
Error Resilient Video Transmission over Wireless Networks Based on Wyner-Ziv Coding of Motion Regions. 905-912 - Guangming Xu, Weikang Zhu, Min Dai, Jianwei He, Chengkang Pan:
Hybrid Transmission Scheme for MIMO Relay Channels. 913-920 - Zaihong Zhou, Dongqing Xie, Wei Xiong:
A Novel Distributed Detection Scheme against DDoS Attack. 921-928
Volume 4, Number 10, December 2009
- Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Mohammad A. Karim:
Guest Editorial. 929-930 - Presila Israt, Namvi Chakma, M. M. A. Hashem:
A Fuzzy Logic-Based Adaptive Handoff Management Protocol for Next-Generation Wireless Systems. 931-940 - M. M. Hafizur Rahman, Yasushi Inoguchi, Yukinori Sato, Yasuyuki Miura, Susumu Horiguchi:
Dynamic Communication Performance of the TESH Network under Nonuniform Traffic Patterns. 941-951 - Md. Mamun-ur-Rashid Khandker:
Distributed Control Routing Algorithms for Rearrangeably Nonblocking Optical Banyan Networks. 952-959 - Ghasem Mirjalily, Parisa Bastani, Seyed Mohammad T. Almodarresi:
Performance Evaluation of Different QoS Models for Connecting Telephone Exchange Centers over Metro Ethernet Networks. 960-967 - Sheikh Mahbub Habib, Cyril Jacob, Tomas Olovsson:
An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones. 968-975 - Md. Osman Gani, Hasan Sarwar, Chowdhury Mofizur Rahman:
Prediction of State of Wireless Network Using Markov and Hidden Markov Model. 976-984
- Hui Cui, Tianjie Cao:
An Novel Anonymous Authenticated and Key Exchange Protocol. 985-992 - Ling Chen, Hai-Ying Sun, Su Wang:
First Order Deceptive Problem of ACO and Its Performance Analysis. 993-1000 - Xin He, Xiaolin Gui:
The Localized Area Coverage algorithm Based on Game-Theory for WSN. 1001-1008 - Shigen Shen, Lihua Ye, Guangxue Yue, Fei Yu:
Research of Secure Intranet/Internet Access Platform Based on Ontology. 1009-1016 - Jian Shu, Jiajie Gong, Yubin Chen, Linlan Liu:
BR2OM: RSSI-based Refinement and Optimization Mechanism for Wireless Sensor Networks. 1017-1025 - Jian Wen, Min Yu, Wenwen Huang, Mingxing Deng:
A Moving Control Strategy Based on RSSI Real-time Localization in Multi-tier Mobile Sensor Networks. 1026-1033 - Huagang Shao, Haiying Cheng, Xiao Chen:
Performing Admission Control Concurrently in Core-stateless Networks. 1034-1041 - Jun Cai, Shun-Zheng Yu, Jing-li Liu:
The Design of a Wireless Data Acquisition and Transmission System. 1042-1049 - Su Hu, Gang Wu, Shaoqian Li:
Preamble Design and Iterative Channel Estimation for OFDM/Offset QAM System. 1050-1057
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.