


default search action
Journal of Network and Computer Applications, Volume 40
Volume 40, April 2014
- Jine Tang, ZhangBing Zhou, Jianwei Niu, Qun Wang:
An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of Things. 1-11 - Francisco Fraile
, Juan Carlos Guerri
:
Simple models of the content duration and the popularity of television content. 12-20 - Haiyang Hu, Yizhi Ren, Xu Xu, Liguo Huang
, Hua Hu:
Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments. 21-30 - Vijay Varadharajan
, Udaya Kiran Tupakula:
Counteracting security attacks in virtual machines in the cloud using property based attestation. 31-45 - Leili Farzinvash, Mehdi Dehghan
:
Multi-rate multicast routing in multi-gateway multi-channel multi-radio wireless mesh networks. 46-60 - Peng-Yeng Yin, Ray-I Chang
, Chih-Chiang Chao, Yen-Ting Chu:
Niched ant colony optimization with colony guides for QoS multicast routing. 61-72 - Mohsen Arab, Mohsen Afsharchi:
Community detection in social networks using hybrid merging of sub-communities. 73-84 - Mohamed Ahmed Elfaki, Hamidah Ibrahim, Ali Mamat, Mohamed Othman, Haïdar Safa:
Collaborative caching priority for processing requests in MANETs. 85-96 - Jianwei Wang, Chen Jiang, Jianfei Qian:
Robustness of Internet under targeted attack: A cascading failure perspective. 97-104 - Sehoon Park, Qichen Chen, Hyuck Han, Heon Y. Yeom:
Design and evaluation of mobile offloading system for web-centric devices. 105-115 - Peng Zhao, Xinyu Yang, Wei Yu
, Chiyong Dong, Shusen Yang, Sulabh Bhattarai:
Toward efficient estimation of available bandwidth for IEEE 802.11-based wireless networks. 116-125 - Yang Xia, Chai Kiat Yeo
:
Mobile Internet access over intermittent network connectivity. 126-138 - Zhen Yu Wu, Ju-Chuan Wu, Sung-Chiang Lin, Charlotte Wang:
An electronic voting mechanism for fighting bribery and coercion. 139-150 - Samar Abdelaziz, Mustafa ElNainay
:
Metric-based taxonomy of routing protocols for cognitive radio ad hoc networks. 151-163 - Onur Yilmaz, Orhan Dagdeviren
, Kayhan Erciyes:
Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks. 164-178 - Darren Quick, Kim-Kwang Raymond Choo
:
Google Drive: Forensic analysis of data remnants. 179-193 - Laleh Arshadi, Amir-Hossein Jahangir
:
Benford's law behavior of Internet traffic. 194-205 - Lingfang Zeng
, Yang Wang:
Optimization on content service with local search in cloud of clouds. 206-215 - Ke Li, Sheng Wang, Shizhong Xu, Xiong Wang, Haojun Huang, Jin Ren, Bo Zhai:
Evaluating the benefit of the core-edge separation on intradomain traffic engineering under uncertain traffic demand. 216-226 - Hyun-Ho Choi, Ki-Ho Lee, Jung-Ryun Lee:
Energy-delay tradeoff analysis of user state transition mechanism for mobile web services. 227-233 - Xinjie Guan, Baek-Young Choi
:
Push or pull? Toward optimal content delivery using cloud storage. 234-243 - Ronghui Hou, King-Shan Lui, Ka-Cheong Leung, Fred Baker:
Performance analysis of quantization-based approximation algorithms for precomputing the supported QoS. 244-254 - Francisco Maciá Pérez
, Iren Lorenzo-Fonseca
, José Vicente Berná-Martínez:
A formal framework for modelling complex network management systems. 255-269 - Carlos Abreu
, Manuel Ricardo
, Paulo M. Mendes
:
Energy-aware routing for biomedical wireless sensor networks. 270-278 - Radu-Ioan Ciobanu
, Daniel Gutiérrez-Reina, Ciprian Dobre
, Sergio L. Toral Marín, Princy Johnson
:
JDER: A history-based forwarding scheme for delay tolerant networks using Jaccard distance and encountered ration. 279-291 - Dingde Jiang, Zhengzheng Xu, Peng Zhang, Ting Zhu:
A transform domain-based anomaly detection approach to network-wide traffic. 292-306
- Nazrul Hoque
, Monowar H. Bhuyan, Ram Charan Baishya, D. K. Bhattacharyya
, Jugal K. Kalita:
Network attacks: Taxonomy, tools and systems. 307-324 - Md Whaiduzzaman
, Mehdi Sookhak
, Abdullah Gani
, Rajkumar Buyya:
A survey on vehicular cloud computing. 325-344 - Saeid Abolfazli, Zohreh Sanaei, Abdullah Gani
, Feng Xia
, Laurence T. Yang:
Rich Mobile Applications: Genesis, taxonomy, and open issues. 345-362

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.