callback( { "result":{ "query":":facetid:toc:\"db/journals/ijahuc/ijahuc28.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"404.37" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"21", "@dc":"21", "@oc":"21", "@id":"43341221", "text":":facetid:toc:db/journals/ijahuc/ijahuc28.bht" } }, "hits":{ "@total":"21", "@computed":"21", "@sent":"21", "@first":"0", "hit":[{ "@score":"1", "@id":"2389780", "info":{"authors":{"author":[{"@pid":"120/8326","text":"Muhammad Khalil Afzal"},{"@pid":"94/3058","text":"Seung Yeob Nam"},{"@pid":"79/2310","text":"Byung-Seo Kim"},{"@pid":"41/3038","text":"Sung Won Kim"}]},"title":"SNR-based relay selection in cooperative wireless ad hoc networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"1","pages":"45-54","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/AfzalNKK18","doi":"10.1504/IJAHUC.2016.10001910","ee":"https://doi.org/10.1504/IJAHUC.2016.10001910","url":"https://dblp.org/rec/journals/ijahuc/AfzalNKK18"}, "url":"URL#2389780" }, { "@score":"1", "@id":"2389782", "info":{"authors":{"author":[{"@pid":"42/2821","text":"Seyed Vahid Azhari"},{"@pid":"219/2469","text":"Niloofar Afshari"},{"@pid":"55/6792","text":"Mohammad Nassiri"}]},"title":"Novel lifetime routing metric for IEEE 802.11 wireless mesh networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"1","pages":"1-12","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/AzhariAN18","doi":"10.1504/IJAHUC.2016.10001856","ee":"https://doi.org/10.1504/IJAHUC.2016.10001856","url":"https://dblp.org/rec/journals/ijahuc/AzhariAN18"}, "url":"URL#2389782" }, { "@score":"1", "@id":"2389784", "info":{"authors":{"author":[{"@pid":"156/9623","text":"Gaurav Bansod"},{"@pid":"156/9613","text":"Narayan Pisharoty"},{"@pid":"154/8853","text":"Abhijit Patil"}]},"title":"MANTRA: an ultra lightweight cipher design for ubiquitous computing.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"1","pages":"13-26","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/BansodPP18","doi":"10.1504/IJAHUC.2016.10001153","ee":"https://doi.org/10.1504/IJAHUC.2016.10001153","url":"https://dblp.org/rec/journals/ijahuc/BansodPP18"}, "url":"URL#2389784" }, { "@score":"1", "@id":"2389786", "info":{"authors":{"author":[{"@pid":"219/2495","text":"Diwakar Bhardwaj"},{"@pid":"25/2574","text":"Krishna Kant"},{"@pid":"84/2308","text":"Durg Singh Chauhan"}]},"title":"QoS-aware routing protocol using adaptive retransmission of distorted descriptions in MDC for MANETs.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"1","pages":"55-67","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/BhardwajKC18","doi":"10.1504/IJAHUC.2016.10001968","ee":"https://doi.org/10.1504/IJAHUC.2016.10001968","url":"https://dblp.org/rec/journals/ijahuc/BhardwajKC18"}, "url":"URL#2389786" }, { "@score":"1", "@id":"2389790", "info":{"authors":{"author":[{"@pid":"143/1211","text":"Slaheddine Chelbi"},{"@pid":"85/45","text":"Habib Dhahri"},{"@pid":"21/5180","text":"Majed Abdouli"},{"@pid":"09/5930","text":"Claude Duvallet"},{"@pid":"49/3001","text":"Rafik Bouaziz"}]},"title":"A new hybrid routing protocol for wireless sensor networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"4","pages":"247-257","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ChelbiDADB18","doi":"10.1504/IJAHUC.2016.10001982","ee":"https://doi.org/10.1504/IJAHUC.2016.10001982","url":"https://dblp.org/rec/journals/ijahuc/ChelbiDADB18"}, "url":"URL#2389790" }, { "@score":"1", "@id":"2389793", "info":{"authors":{"author":[{"@pid":"67/9976","text":"Hiten Choudhury"},{"@pid":"91/2016","text":"Basav Roychoudhury"},{"@pid":"125/2048","text":"Dilip Kr. Saikia"}]},"title":"Enhanced identity privacy in UMTS.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"4","pages":"203-219","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ChoudhuryRS18","doi":"10.1504/IJAHUC.2016.10001918","ee":"https://doi.org/10.1504/IJAHUC.2016.10001918","url":"https://dblp.org/rec/journals/ijahuc/ChoudhuryRS18"}, "url":"URL#2389793" }, { "@score":"1", "@id":"2389795", "info":{"authors":{"author":[{"@pid":"25/1873","text":"Mario Collotta"},{"@pid":"87/6423-2","text":"Giovanni Pau 0002"}]},"title":"A novel approach to improve power management in wireless local area networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"1","pages":"27-34","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/CollottaP18","doi":"10.1504/IJAHUC.2016.10001366","ee":"https://doi.org/10.1504/IJAHUC.2016.10001366","url":"https://dblp.org/rec/journals/ijahuc/CollottaP18"}, "url":"URL#2389795" }, { "@score":"1", "@id":"2389796", "info":{"authors":{"author":[{"@pid":"85/5464","text":"Chyi-Ren Dow"},{"@pid":"66/8784","text":"Yu-Hong Lee"},{"@pid":"13/6673","text":"Shiow-Fen Hwang"},{"@pid":"224/7839","text":"Van-Tung Bui"}]},"title":"An efficient mobile grid scheme for service tracking in VANETs.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"4","pages":"220-229","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/DowLHB18","doi":"10.1504/IJAHUC.2016.10001948","ee":"https://doi.org/10.1504/IJAHUC.2016.10001948","url":"https://dblp.org/rec/journals/ijahuc/DowLHB18"}, "url":"URL#2389796" }, { "@score":"1", "@id":"2389797", "info":{"authors":{"author":[{"@pid":"117/8203","text":"Rabia Noor Enam"},{"@pid":"61/7825","text":"Rehan Qureshi"}]},"title":"ADiDA: adaptive differential data aggregation for cluster based wireless sensor networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"2","pages":"103-119","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/EnamQ18","doi":"10.1504/IJAHUC.2016.10001914","ee":"https://doi.org/10.1504/IJAHUC.2016.10001914","url":"https://dblp.org/rec/journals/ijahuc/EnamQ18"}, "url":"URL#2389797" }, { "@score":"1", "@id":"2389808", "info":{"authors":{"author":[{"@pid":"222/8848","text":"Gui-Sen Li"},{"@pid":"61/5383","text":"Xuhui Chen"},{"@pid":"02/7606","text":"Keshou Wu"},{"@pid":"87/2517","text":"Ren Chen"}]},"title":"Direction-based urban broadcast protocol for vehicular ad hoc networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"3","pages":"180-192","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/LiCWC18","doi":"10.1504/IJAHUC.2016.10001978","ee":"https://doi.org/10.1504/IJAHUC.2016.10001978","url":"https://dblp.org/rec/journals/ijahuc/LiCWC18"}, "url":"URL#2389808" }, { "@score":"1", "@id":"2389810", "info":{"authors":{"author":[{"@pid":"07/8546","text":"Tundong Liu"},{"@pid":"77/1513","text":"Yun Lin"},{"@pid":"222/8768","text":"Zhuobin Xu"},{"@pid":"51/4462-4","text":"Yi Xie 0004"},{"@pid":"179/9521","text":"Fufeng Chen"},{"@pid":"222/8762","text":"Guozhi Xue"}]},"title":"An energy model of 4G smartphone oriented towards typical network applications.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"2","pages":"94-102","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/LiuLXXCX18","doi":"10.1504/IJAHUC.2016.10001912","ee":"https://doi.org/10.1504/IJAHUC.2016.10001912","url":"https://dblp.org/rec/journals/ijahuc/LiuLXXCX18"}, "url":"URL#2389810" }, { "@score":"1", "@id":"2389812", "info":{"authors":{"author":[{"@pid":"31/9529","text":"Weizhong Luo"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"},{"@pid":"14/7667-1","text":"Zhaoquan Cai 0001"},{"@pid":"84/1415","text":"Gang Peng"},{"@pid":"g/JiongGuo","text":"Jiong Guo"},{"@pid":"94/689","text":"Shigeng Zhang"}]},"title":"An optimal algorithm for small group multicast in wireless sensor networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"3","pages":"168-179","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/LuoWCPGZ18","doi":"10.1504/IJAHUC.2016.10001916","ee":"https://doi.org/10.1504/IJAHUC.2016.10001916","url":"https://dblp.org/rec/journals/ijahuc/LuoWCPGZ18"}, "url":"URL#2389812" }, { "@score":"1", "@id":"2389813", "info":{"authors":{"author":[{"@pid":"156/6957","text":"Audace Manirabona"},{"@pid":"47/3479","text":"Saadi Boudjit"},{"@pid":"08/8038","text":"Lamia Chaari Fourati"}]},"title":"NetBAN, a concept of network of BANs for cooperative communication: energy awareness routing solution.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"2","pages":"120-130","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ManirabonaBF18","doi":"10.1504/IJAHUC.2016.10001913","ee":"https://doi.org/10.1504/IJAHUC.2016.10001913","url":"https://dblp.org/rec/journals/ijahuc/ManirabonaBF18"}, "url":"URL#2389813" }, { "@score":"1", "@id":"2389817", "info":{"authors":{"author":[{"@pid":"195/1921","text":"Tri Gia Nguyen"},{"@pid":"49/6689","text":"Chakchai So-In"}]},"title":"An energy-efficient point-coverage-aware clustering protocol in wireless sensor networks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"3","pages":"148-167","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/NguyenS18","doi":"10.1504/IJAHUC.2016.10001976","ee":"https://doi.org/10.1504/IJAHUC.2016.10001976","url":"https://dblp.org/rec/journals/ijahuc/NguyenS18"}, "url":"URL#2389817" }, { "@score":"1", "@id":"2389818", "info":{"authors":{"author":[{"@pid":"34/8431","text":"Pelayo Nuño"},{"@pid":"73/4556","text":"Juan C. Granda"},{"@pid":"93/5777","text":"Francisco J. Suárez"}]},"title":"Assessment of heuristics for self-stabilisation in real-time interactive communication overlays.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"2","pages":"69-76","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/NunoGS18","doi":"10.1504/IJAHUC.2016.10001909","ee":"https://doi.org/10.1504/IJAHUC.2016.10001909","url":"https://dblp.org/rec/journals/ijahuc/NunoGS18"}, "url":"URL#2389818" }, { "@score":"1", "@id":"2389823", "info":{"authors":{"author":[{"@pid":"168/3287","text":"Roshni Rajkumari"},{"@pid":"71/4974","text":"Ningrinla Marchang"}]},"title":"Modelling and mitigating spectrum sensing non-cooperation attack in cognitive radio network.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"3","pages":"193-202","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/RajkumariM18","doi":"10.1504/IJAHUC.2016.10001917","ee":"https://doi.org/10.1504/IJAHUC.2016.10001917","url":"https://dblp.org/rec/journals/ijahuc/RajkumariM18"}, "url":"URL#2389823" }, { "@score":"1", "@id":"2389827", "info":{"authors":{"author":[{"@pid":"55/5087","text":"Vijender Busi Reddy"},{"@pid":"99/2653","text":"S. Venkataraman"},{"@pid":"73/4368","text":"Atul Negi"}]},"title":"A dynamic trust evolution model for MANETs based on mobility.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"4","pages":"230-246","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ReddyVN18","doi":"10.1504/IJAHUC.2016.10001919","ee":"https://doi.org/10.1504/IJAHUC.2016.10001919","url":"https://dblp.org/rec/journals/ijahuc/ReddyVN18"}, "url":"URL#2389827" }, { "@score":"1", "@id":"2389832", "info":{"authors":{"author":[{"@pid":"127/1101","text":"Dinesh Singh"},{"@pid":"96/256","text":"Ranvijay"},{"@pid":"41/5604","text":"Rama Shankar Yadav"}]},"title":"A state-of-art approach to misbehaviour detection and revocation in VANET: survey.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"2","pages":"77-93","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/SinghRY18","doi":"10.1504/IJAHUC.2016.10001911","ee":"https://doi.org/10.1504/IJAHUC.2016.10001911","url":"https://dblp.org/rec/journals/ijahuc/SinghRY18"}, "url":"URL#2389832" }, { "@score":"1", "@id":"2389837", "info":{"authors":{"author":[{"@pid":"180/6077","text":"Zakir Ullah"},{"@pid":"180/6040","text":"Muhammad Hasan Islam"},{"@pid":"59/1569","text":"Adnan Ahmed Khan"},{"@pid":"61/2979","text":"Imran Shafi"}]},"title":"MT-SECURER: multi-factors trust for secure and reliable routing in MANETs.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"3","pages":"131-147","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/UllahIKS18","doi":"10.1504/IJAHUC.2016.10001915","ee":"https://doi.org/10.1504/IJAHUC.2016.10001915","url":"https://dblp.org/rec/journals/ijahuc/UllahIKS18"}, "url":"URL#2389837" }, { "@score":"1", "@id":"2389838", "info":{"authors":{"author":[{"@pid":"43/901","text":"Chu-Fu Wang"},{"@pid":"224/7772","text":"Yang-Chih Chiu"}]},"title":"Routing problems for vehicle ad-hoc networks using the virtual message ferry routing scheme.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"4","pages":"258-273","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/WangC18","doi":"10.1504/IJAHUC.2016.10001983","ee":"https://doi.org/10.1504/IJAHUC.2016.10001983","url":"https://dblp.org/rec/journals/ijahuc/WangC18"}, "url":"URL#2389838" }, { "@score":"1", "@id":"2389841", "info":{"authors":{"author":[{"@pid":"69/2490","text":"Jumin Zhao"},{"@pid":"79/8473","text":"Qingming Tang"},{"@pid":"271/6940","text":"Deng-ao Li"},{"@pid":"199/3998","text":"Biaokai Zhu"},{"@pid":"79/5858","text":"Yikun Li"}]},"title":"An efficient data gathering algorithm for large-scale wireless sensor networks with mobile sinks.","venue":"Int. J. Ad Hoc Ubiquitous Comput.","volume":"28","number":"1","pages":"35-44","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijahuc/ZhaoTLZL18","doi":"10.1504/IJAHUC.2016.10001883","ee":"https://doi.org/10.1504/IJAHUC.2016.10001883","url":"https://dblp.org/rec/journals/ijahuc/ZhaoTLZL18"}, "url":"URL#2389841" } ] } } } )