Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca77.bht:"
@article{DBLP:journals/jnca/AznoliN17, author = {Fariba Aznoli and Nima Jafari Navimipour}, title = {Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {73--86}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.009}, doi = {10.1016/J.JNCA.2016.10.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AznoliN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChengNKLGHD17, author = {Long Cheng and Jianwei Niu and Linghe Kong and Chengwen Luo and Yu Gu and Wenbo He and Sajal K. Das}, title = {Compressive sensing based data quality improvement for crowd-sensing applications}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {123--134}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.004}, doi = {10.1016/J.JNCA.2016.10.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ChengNKLGHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DabaghiML17, author = {Fahimeh Dabaghi and Zeinab Movahedi and Rami Langar}, title = {A survey on green routing protocols using sleep-scheduling in wired networks}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {106--122}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.005}, doi = {10.1016/J.JNCA.2016.10.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DabaghiML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HuangYCCL17, author = {Baogui Huang and Jiguo Yu and Xiuzhen Cheng and Honglong Chen and Hang Liu}, title = {{SINR} based shortest link scheduling with oblivious power control in wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {64--72}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.012}, doi = {10.1016/J.JNCA.2016.10.012}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HuangYCCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiMKI17, author = {Wenjuan Li and Weizhi Meng and Lam{-}for Kwok and Horace Ho{-}Shing Ip}, title = {Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {135--145}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.09.014}, doi = {10.1016/J.JNCA.2016.09.014}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiMKI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiaqatCGHTSA17, author = {Misbah Liaqat and Victor Chang and Abdullah Gani and Siti Hafizah Ab Hamid and Muhammad Toseef and Umar Shoaib and Rana Liaqat Ali}, title = {Federated cloud resource management: Review and discussion}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {87--105}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.008}, doi = {10.1016/J.JNCA.2016.10.008}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiaqatCGHTSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LinSCS17, author = {Chen Lin and Zhidong Shen and Qian Chen and Frederick T. Sheldon}, title = {A data integrity verification scheme in mobile cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {146--151}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.08.017}, doi = {10.1016/J.JNCA.2016.08.017}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LinSCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MishraPVT17, author = {Preeti Mishra and Emmanuel S. Pilli and Vijay Varadharajan and Udaya Kiran Tupakula}, title = {Intrusion detection techniques in cloud environment: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {18--47}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.015}, doi = {10.1016/J.JNCA.2016.10.015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MishraPVT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TsolkasLPM17, author = {Dimitris Tsolkas and Eirini Liotou and Nikos I. Passas and Lazaros F. Merakos}, title = {A survey on parametric QoE estimation for popular services}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {1--17}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.016}, doi = {10.1016/J.JNCA.2016.10.016}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TsolkasLPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WalikarB17, author = {Gyanappa A. Walikar and Rajashekhar C. Biradar}, title = {A survey on hybrid routing mechanisms in mobile ad hoc networks}, journal = {J. Netw. Comput. Appl.}, volume = {77}, pages = {48--63}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.014}, doi = {10.1016/J.JNCA.2016.10.014}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WalikarB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.