callback( { "result":{ "query":":facetid:toc:\"db/journals/ijahuc/ijahuc17.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"192.71" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"20", "@dc":"20", "@oc":"20", "@id":"43341209", "text":":facetid:toc:db/journals/ijahuc/ijahuc17.bht" } }, "hits":{ "@total":"20", "@computed":"20", "@sent":"20", "@first":"0", "hit":[{ "@score":"1", "@id":"3710160", "info":{"authors":{"author":[{"@pid":"148/2092","text":"Milosav Andelic"},{"@pid":"93/6628","text":"Stevan M. Berber"},{"@pid":"27/2469","text":"Akshya K. Swain"}]},"title":"Phase imperfect collaborative event driven energy efficient protocol.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"186-195","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/AndelicBS14","doi":"10.1504/IJAHUC.2014.065765","ee":"https://doi.org/10.1504/IJAHUC.2014.065765","url":"https://dblp.org/rec/journals/ijahuc/AndelicBS14"}, "url":"URL#3710160" }, { "@score":"1", "@id":"3710167", "info":{"authors":{"author":[{"@pid":"16/3283-63","text":"Xi Chen 0063"},{"@pid":"50/2482-1","text":"Yun Liu 0001"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"00/1114","text":"Changlu Lin"}]},"title":"The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"162-173","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ChenLCL14","doi":"10.1504/IJAHUC.2014.065763","ee":"https://doi.org/10.1504/IJAHUC.2014.065763","url":"https://dblp.org/rec/journals/ijahuc/ChenLCL14"}, "url":"URL#3710167" }, { "@score":"1", "@id":"3710169", "info":{"authors":{"author":[{"@pid":"52/9907","text":"Lajiao Chen"},{"@pid":"31/1970-1","text":"Yan Ma 0001"},{"@pid":"21/6121-24","text":"Peng Liu 0024"},{"@pid":"75/3841","text":"Wei Xue"}]},"title":"Parallelisation of a watershed distributed ecohydrological model with dynamic task scheduling.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"110-121","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ChenMLX14","doi":"10.1504/IJAHUC.2014.065774","ee":"https://doi.org/10.1504/IJAHUC.2014.065774","url":"https://dblp.org/rec/journals/ijahuc/ChenMLX14"}, "url":"URL#3710169" }, { "@score":"1", "@id":"3710172", "info":{"authors":{"author":[{"@pid":"94/2062","text":"Amir Darehshoorzadeh"},{"@pid":"27/3027","text":"Llorenç Cerdà-Alabern"}]},"title":"Multicast delivery using opportunistic routing in wireless mesh networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"4","pages":"216-233","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/DarehshoorzadehC14","doi":"10.1504/IJAHUC.2014.066421","ee":"https://doi.org/10.1504/IJAHUC.2014.066421","url":"https://dblp.org/rec/journals/ijahuc/DarehshoorzadehC14"}, "url":"URL#3710172" }, { "@score":"1", "@id":"3710176", "info":{"authors":{"author":[{"@pid":"122/1214","text":"Dilawaer Duolikun"},{"@pid":"98/3452","text":"Ailixier Aikebaier"},{"@pid":"43/2269","text":"Tomoya Enokido"},{"@pid":"t/MakotoTakizawa","text":"Makoto Takizawa 0001"}]},"title":"Design and evaluation of a quorum-based synchronisation protocol of multimedia replicas.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"100-109","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/DuolikunAET14","doi":"10.1504/IJAHUC.2014.065773","ee":"https://doi.org/10.1504/IJAHUC.2014.065773","url":"https://dblp.org/rec/journals/ijahuc/DuolikunAET14"}, "url":"URL#3710176" }, { "@score":"1", "@id":"3710178", "info":{"authors":{"author":[{"@pid":"60/6686","text":"Vanessa Frías-Martínez"},{"@pid":"77/7975","text":"Víctor Soto"},{"@pid":"37/2584","text":"Ángel Sánchez"},{"@pid":"94/1167","text":"Enrique Frías-Martínez"}]},"title":"Consensus clustering for urban land use analysis using cell phone network data.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"1","pages":"39-58","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/Frias-MartinezSSF14","doi":"10.1504/IJAHUC.2014.065157","ee":"https://doi.org/10.1504/IJAHUC.2014.065157","url":"https://dblp.org/rec/journals/ijahuc/Frias-MartinezSSF14"}, "url":"URL#3710178" }, { "@score":"1", "@id":"3710179", "info":{"authors":{"author":[{"@pid":"152/7751","text":"Kanika Grover"},{"@pid":"l/AlvinSLim","text":"Alvin S. Lim"},{"@pid":"47/3749-3","text":"Qing Yang 0003"}]},"title":"Jamming and anti-jamming techniques in wireless networks: a survey.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"4","pages":"197-215","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/GroverLY14","doi":"10.1504/IJAHUC.2014.066419","ee":"https://doi.org/10.1504/IJAHUC.2014.066419","url":"https://dblp.org/rec/journals/ijahuc/GroverLY14"}, "url":"URL#3710179" }, { "@score":"1", "@id":"3710185", "info":{"authors":{"author":[{"@pid":"40/5934","text":"Jyh-How Huang"},{"@pid":"33/6505","text":"Ying-Yu Chen"},{"@pid":"98/2587","text":"Li-Ping Tung"},{"@pid":"34/6553","text":"Ling-Jyh Chen"}]},"title":"Using known vectors to improve data dissemination in opportunistic networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"1","pages":"59-69","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/HuangCTC14","doi":"10.1504/IJAHUC.2014.065158","ee":"https://doi.org/10.1504/IJAHUC.2014.065158","url":"https://dblp.org/rec/journals/ijahuc/HuangCTC14"}, "url":"URL#3710185" }, { "@score":"1", "@id":"3710188", "info":{"authors":{"author":[{"@pid":"11/10659","text":"Santiago Iturriaga"},{"@pid":"50/7664","text":"Sergio Nesmachnow"},{"@pid":"98/5216","text":"Patricia Ruiz"},{"@pid":"b/PascalBouvry","text":"Pascal Bouvry"},{"@pid":"d/BernabeDorronsoro","text":"Bernabé Dorronsoro"}]},"title":"AEDB protocol tuning with a fast efficient parallel multi-objective local search.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"144-161","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/IturriagaNRBD14","doi":"10.1504/IJAHUC.2014.065775","ee":"https://doi.org/10.1504/IJAHUC.2014.065775","url":"https://dblp.org/rec/journals/ijahuc/IturriagaNRBD14"}, "url":"URL#3710188" }, { "@score":"1", "@id":"3710191", "info":{"authors":{"author":[{"@pid":"66/8784","text":"Yu-Hong Lee"},{"@pid":"85/5464","text":"Chyi-Ren Dow"},{"@pid":"143/6301","text":"Chih-Yu Chueh"},{"@pid":"13/6673","text":"Shiow-Fen Hwang"}]},"title":"TWIST: a tree-based web service indication scheme for service tracking in vehicular ad hoc networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"4","pages":"234-243","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/LeeDCH14","doi":"10.1504/IJAHUC.2014.066422","ee":"https://doi.org/10.1504/IJAHUC.2014.066422","url":"https://dblp.org/rec/journals/ijahuc/LeeDCH14"}, "url":"URL#3710191" }, { "@score":"1", "@id":"3710192", "info":{"authors":{"author":[{"@pid":"08/6793","text":"J. Li"},{"@pid":"88/5599","text":"X. Chen"},{"@pid":"62/8662","text":"H. Tian"},{"@pid":"99/6294","text":"Chong Gao"}]},"title":"Defending against key exposure in attribute-based encryption.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"1","pages":"31-38","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/LiCTG14","doi":"10.1504/IJAHUC.2014.065156","ee":"https://doi.org/10.1504/IJAHUC.2014.065156","url":"https://dblp.org/rec/journals/ijahuc/LiCTG14"}, "url":"URL#3710192" }, { "@score":"1", "@id":"3710193", "info":{"authors":{"author":[{"@pid":"63/6031-2","text":"Xiong Li 0002"},{"@pid":"25/4653-2","text":"Jianwei Niu 0002"},{"@pid":"70/10126","text":"Yazhi Liu"},{"@pid":"65/4395","text":"Junguo Liao"},{"@pid":"22/849-5","text":"Wei Liang 0005"}]},"title":"Robust dynamic ID-based remote user authentication scheme using smart cards.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"4","pages":"254-264","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/LiNLLL14","doi":"10.1504/IJAHUC.2014.066423","ee":"https://doi.org/10.1504/IJAHUC.2014.066423","url":"https://dblp.org/rec/journals/ijahuc/LiNLLL14"}, "url":"URL#3710193" }, { "@score":"1", "@id":"3710196", "info":{"authors":{"author":[{"@pid":"24/471","text":"Michal Marks"},{"@pid":"37/4232","text":"Ewa Niewiadomska-Szynkiewicz"},{"@pid":"08/5515","text":"Joanna Kolodziej"}]},"title":"High performance wireless sensor network localisation system.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"122-133","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/MarksNK14","doi":"10.1504/IJAHUC.2014.065776","ee":"https://doi.org/10.1504/IJAHUC.2014.065776","url":"https://dblp.org/rec/journals/ijahuc/MarksNK14"}, "url":"URL#3710196" }, { "@score":"1", "@id":"3710205", "info":{"authors":{"author":[{"@pid":"63/6304","text":"Jang-Ping Sheu"},{"@pid":"156/9479","text":"Shu-Hsun Wu"},{"@pid":"66/5244","text":"Chuang Ma"},{"@pid":"79/3864","text":"Wei-Kai Hu"}]},"title":"Design and implementation of a transmission protection protocol to improve the performance of wireless sensor networks in hybrid networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"4","pages":"244-253","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/SheuWMH14","doi":"10.1504/IJAHUC.2014.066418","ee":"https://doi.org/10.1504/IJAHUC.2014.066418","url":"https://dblp.org/rec/journals/ijahuc/SheuWMH14"}, "url":"URL#3710205" }, { "@score":"1", "@id":"3710206", "info":{"authors":{"author":[{"@pid":"48/1714","text":"Kuei-Ping Shih"},{"@pid":"54/58","text":"Chien-Min Chou"},{"@pid":"36/5525","text":"Chun-Chih Li"},{"@pid":"91/1908","text":"Li-Jie Cheng"}]},"title":"A link-adapted fragment and rate matching (FaRM) MAC protocol for wireless LANs.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"1","pages":"1-17","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ShihCLC14","doi":"10.1504/IJAHUC.2014.065155","ee":"https://doi.org/10.1504/IJAHUC.2014.065155","url":"https://dblp.org/rec/journals/ijahuc/ShihCLC14"}, "url":"URL#3710206" }, { "@score":"1", "@id":"3710210", "info":{"authors":{"author":{"@pid":"22/10687","text":"Wojciech Szynkiewicz"}},"title":"Action planning for multi-robot-based reconfigurable fixture.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"73-81","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/Szynkiewicz14","doi":"10.1504/IJAHUC.2014.065769","ee":"https://doi.org/10.1504/IJAHUC.2014.065769","url":"https://dblp.org/rec/journals/ijahuc/Szynkiewicz14"}, "url":"URL#3710210" }, { "@score":"1", "@id":"3710215", "info":{"authors":{"author":[{"@pid":"135/6278","text":"Zhong-qin Wang"},{"@pid":"49/1785","text":"Ning Ye"},{"@pid":"74/4561","text":"Reza Malekian"},{"@pid":"54/2465","text":"Tingting Zhao"},{"@pid":"85/5653-1","text":"Ruchuan Wang 0001"}]},"title":"Measuring the similarity of PML documents with RFID-based sensors.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"174-185","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/WangYMZW14","doi":"10.1504/IJAHUC.2014.065764","ee":"https://doi.org/10.1504/IJAHUC.2014.065764","url":"https://dblp.org/rec/journals/ijahuc/WangYMZW14"}, "url":"URL#3710215" }, { "@score":"1", "@id":"3710216", "info":{"authors":{"author":[{"@pid":"52/452-2","text":"Xiaoling Wu 0002"},{"@pid":"14/1789","text":"Hoon Heo"},{"@pid":"71/5171","text":"Guangcong Liu"},{"@pid":"74/1453","text":"Bangwon Lee"},{"@pid":"34/780","text":"Jianjun Li"},{"@pid":"19/2932-1","text":"Lei Shu 0001"},{"@pid":"62/4819","text":"Xiaobo Zhang"},{"@pid":"08/5736","text":"Sungyoung Lee"}]},"title":"Touchware: a software-based technique for high-resolution multi-touch sensing devices.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"1","pages":"18-30","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/WuHLLLSZL14","doi":"10.1504/IJAHUC.2014.065154","ee":"https://doi.org/10.1504/IJAHUC.2014.065154","url":"https://dblp.org/rec/journals/ijahuc/WuHLLLSZL14"}, "url":"URL#3710216" }, { "@score":"1", "@id":"3710218", "info":{"authors":{"author":[{"@pid":"146/5247","text":"Jiaqing Yan"},{"@pid":"80/1035-1","text":"Dan Chen 0001"},{"@pid":"57/3647","text":"Yinghua Wang"},{"@pid":"72/628","text":"Yao Wang"},{"@pid":"74/2443","text":"Gaoxiang Ouyang"},{"@pid":"172/6872","text":"Xiaoli Li 0002"}]},"title":"High throughput wavelet coherence analysis of neural series.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"134-143","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/YanCWWOL14","doi":"10.1504/IJAHUC.2014.065777","ee":"https://doi.org/10.1504/IJAHUC.2014.065777","url":"https://dblp.org/rec/journals/ijahuc/YanCWWOL14"}, "url":"URL#3710218" }, { "@score":"1", "@id":"3710223", "info":{"authors":{"author":[{"@pid":"27/9676-4","text":"Jiaqi Zhao 0004"},{"@pid":"06/2926-1","text":"Jie Tao 0001"},{"@pid":"08/1846","text":"Karl Fürlinger"}]},"title":"A framework for comparative performance study on virtualised machines.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"17","number":"2/3","pages":"82-99","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ZhaoTF14","doi":"10.1504/IJAHUC.2014.065772","ee":"https://doi.org/10.1504/IJAHUC.2014.065772","url":"https://dblp.org/rec/journals/ijahuc/ZhaoTF14"}, "url":"URL#3710223" } ] } } } )