


default search action
IET Networks, Volume 6
Volume 6, Number 1, January 2017
- Lifang Wei, Changcai Yang, Riqing Chen:

RFID-based stent-graft dynamic assessment for health cares. 1-4 - Deepa Das, Susmita Das

:
Adaptive resource allocation scheme for cognitive radio vehicular ad-hoc network in the presence of primary user emulation attack. 5-13 - Rolando Herrero, Claude St-Pierre:

Analytical model of stream transported media. 14-21
Volume 6, Number 2, March 2017
- Murat Kuzlu

, Md. Moshiur Rahman, Manisa Pipattanasomporn, Saifur Rahman:
Internet-based communication platform for residential DR programmes. 25-31 - Hossein Lolaee, Mohammad Ali Akhaee:

Analytic model for network resource management between ISPs and users. 32-38 - Fan-Hsun Tseng

, Kai-Di Chang, Shang-Chuan Liao, Han-Chieh Chao
, Victor C. M. Leung:
sPing: a user-centred debugging mechanism for software defined networks. 39-46
Volume 6, Number 3, May 2017
- Wenliang Wu, Naixue Xiong, Chunxue Wu:

Improved clustering algorithm based on energy consumption in wireless sensor networks. 47-53 - Niladri Das

, Brijesh Kumar Rai
:
On achievability of an ( r , l ) fractional linear network code. 54-61 - Sang-Il Choi, Seok Joo Koh

, Sang-Kyu Lim
, Tae Gyu Kang:
Reliable transmission of visible light communication data in lighting control networks. 62-68
Volume 6, Number 4, July 2017
- Dhanaraj Cheelu, M. Rajasekhara Babu, Chi-Yuan Chen, P. Venkata Krishna

, Sumanth Yenduri:
Intelligent vertical handoff decision strategy based on network performance prediction and consumer surplus value for next generation wireless networks. 69-74 - A. Meena Kowshalya

, M. L. Valarmathi
:
Trust management for reliable decision making among social objects in the Social Internet of Things. 75-80 - Ya Gao, Weitao Pan

, Ling Zheng:
Improved analytical model for performance evaluation of crosspoint-queued switch under uniform traffic. 81-86
Volume 6, Number 5, September 2017
- Devarajan Jinil Persis

, T. Paul Robert
:
Review of ad-hoc on-demand distance vector protocol and its swarm intelligent variants for Mobile Ad-hoc NETwork. 87-93 - Ming Zhu, Lei Wang, Zhenquan Qin, Nan Ding, Jian Fang, Tao Liu, Qi Cui:

BELIA: bandwidth estimate-based link increase algorithm for MPTCP. 94-101 - Dharani Kumari Nooji Venkatramana, Shylaja Banagiri Srikantaiah, Jayalakshmi Moodabidri:

SCGRP: SDN-enabled connectivity-aware geographical routing protocol of VANETs for urban environment. 102-111 - Hangxing Wu, Hongbin Wang, Yadong Wan, Ming Zhang:

Improving the convergence time of DCTCP to reduce the completion time of short flows: a congestion window-based method. 112-115 - Peican Zhu

, Yangming Guo, Fabrizio Lombardi, Jie Han:
Approximate reliability of multi-state two-terminal networks by stochastic analysis. 116-124 - Luca Costantini, Elena Mammi, Marco Teodori, Vincenzo Attanasio:

Polynomial regression models to explain the relationship between network and service key performance indicators. 125-132 - Brijesh Kumar Rai

, Niladri Das
:
On characteristics dependent linear coding capacity of sum-networks. 133-137
Volume 6, Number 6, November 2017
- Panagiotis G. Sarigiannidis

, Thomas Lagkas
, Stamatia Bibi, Apostolos Ampatzoglou, Paolo Bellavista
:
Hybrid 5G optical-wireless SDN-based networks, challenges and open issues. 141-148 - Shireesh Bhat, Robinson Udechukwu, Rudra Dutta

, George N. Rouskas
:
Network service orchestration in heterogeneous 5G networks using an open marketplace. 149-156 - George Tarnaras, Fanouria Athanasiou, Spyros G. Denazis:

Efficient topology discovery algorithm for software-defined networks. 157-161 - Pitchai MohanaPriya, S. Mercy Shalinie

:
Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks. 162-168 - Nikolaos Mantas

, Malamati D. Louta
, Eirini D. Karapistoli, George T. Karetsos, Stylianos Kraounakis, Mohammad S. Obaidat
:
Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey. 169-178 - Edward A. Smith, John A. Schormans:

Holistic assessment of call centre performance. 179-185 - Yusuf Sani, Musab Isah

, Christopher Edwards, Andreas Mauthe
:
Experimental evaluation of the impact of mobility management protocols on HTTP adaptive streaming. 186-192 - Ahmed Fakhrudeen

, Omar Y. K. Alani
:
Identification as a deterrent for security enhancement in cognitive radio networks. 193-202 - Labisha R. V., E. Baburaj

:
Efficient approach to maximise WSN lifetime using weighted optimum storage-node placement, efficient and energetic wireless recharging, efficient rule-based node rotation and critical-state-data-passing methods. 203-217 - Rolando Herrero, Claude St-Pierre:

Dynamic forward error correction in wireless real-time Internet of Things networks. 218-223 - Roaa Shubbar, Mahmood Ahmadi

:
Fast 2D filter with low false positive for network packet inspection. 224-231

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














