Search dblp for Publications

export results for "toc:db/journals/jnca/jnca77.bht:"

 download as .bib file

@article{DBLP:journals/jnca/AznoliN17,
  author       = {Fariba Aznoli and
                  Nima Jafari Navimipour},
  title        = {Cloud services recommendation: Reviewing the recent advances and suggesting
                  the future research directions},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {73--86},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.009},
  doi          = {10.1016/J.JNCA.2016.10.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AznoliN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChengNKLGHD17,
  author       = {Long Cheng and
                  Jianwei Niu and
                  Linghe Kong and
                  Chengwen Luo and
                  Yu Gu and
                  Wenbo He and
                  Sajal K. Das},
  title        = {Compressive sensing based data quality improvement for crowd-sensing
                  applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {123--134},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.004},
  doi          = {10.1016/J.JNCA.2016.10.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ChengNKLGHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/DabaghiML17,
  author       = {Fahimeh Dabaghi and
                  Zeinab Movahedi and
                  Rami Langar},
  title        = {A survey on green routing protocols using sleep-scheduling in wired
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {106--122},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.005},
  doi          = {10.1016/J.JNCA.2016.10.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/DabaghiML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HuangYCCL17,
  author       = {Baogui Huang and
                  Jiguo Yu and
                  Xiuzhen Cheng and
                  Honglong Chen and
                  Hang Liu},
  title        = {{SINR} based shortest link scheduling with oblivious power control
                  in wireless networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {64--72},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.012},
  doi          = {10.1016/J.JNCA.2016.10.012},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HuangYCCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiMKI17,
  author       = {Wenjuan Li and
                  Weizhi Meng and
                  Lam{-}for Kwok and
                  Horace Ho{-}Shing Ip},
  title        = {Enhancing collaborative intrusion detection networks against insider
                  attacks using supervised intrusion sensitivity-based trust management
                  model},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {135--145},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.09.014},
  doi          = {10.1016/J.JNCA.2016.09.014},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiMKI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiaqatCGHTSA17,
  author       = {Misbah Liaqat and
                  Victor Chang and
                  Abdullah Gani and
                  Siti Hafizah Ab Hamid and
                  Muhammad Toseef and
                  Umar Shoaib and
                  Rana Liaqat Ali},
  title        = {Federated cloud resource management: Review and discussion},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {87--105},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.008},
  doi          = {10.1016/J.JNCA.2016.10.008},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiaqatCGHTSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LinSCS17,
  author       = {Chen Lin and
                  Zhidong Shen and
                  Qian Chen and
                  Frederick T. Sheldon},
  title        = {A data integrity verification scheme in mobile cloud computing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {146--151},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.08.017},
  doi          = {10.1016/J.JNCA.2016.08.017},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LinSCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MishraPVT17,
  author       = {Preeti Mishra and
                  Emmanuel S. Pilli and
                  Vijay Varadharajan and
                  Udaya Kiran Tupakula},
  title        = {Intrusion detection techniques in cloud environment: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {18--47},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.015},
  doi          = {10.1016/J.JNCA.2016.10.015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MishraPVT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TsolkasLPM17,
  author       = {Dimitris Tsolkas and
                  Eirini Liotou and
                  Nikos I. Passas and
                  Lazaros F. Merakos},
  title        = {A survey on parametric QoE estimation for popular services},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {1--17},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.016},
  doi          = {10.1016/J.JNCA.2016.10.016},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/TsolkasLPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WalikarB17,
  author       = {Gyanappa A. Walikar and
                  Rajashekhar C. Biradar},
  title        = {A survey on hybrid routing mechanisms in mobile ad hoc networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {77},
  pages        = {48--63},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.014},
  doi          = {10.1016/J.JNCA.2016.10.014},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WalikarB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics