default search action
Search dblp for Publications
export results for "toc:db/journals/jhsn/jhsn26.bht:"
@article{DBLP:journals/jhsn/AbdulhassanA20, author = {Aladdin A. Abdulhassan and Mahmood Ahmadi}, title = {Many-field packet classification using CR-tree}, journal = {J. High Speed Networks}, volume = {26}, number = {2}, pages = {125--140}, year = {2020}, url = {https://doi.org/10.3233/JHS-200634}, doi = {10.3233/JHS-200634}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/AbdulhassanA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/AhmedSSBIMI20, author = {Asif Ahmed and Soumitra Saha and Sudip Saha and Md. Younus Bipul and Syad Md. Imran and Nasif Muslim and Salekul Islam}, title = {Real-time face recognition based on IoT: {A} comparative study between IoT platforms and cloud infrastructures}, journal = {J. High Speed Networks}, volume = {26}, number = {2}, pages = {155--168}, year = {2020}, url = {https://doi.org/10.3233/JHS-200636}, doi = {10.3233/JHS-200636}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/AhmedSSBIMI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/Al-OthmanAB20, author = {Zainab Al{-}Othman and Mouhammd Alkasassbeh and Sherenaz W. Al{-}Haj Baddar}, title = {An efficient approach to detect IoT botnet attacks using machine learning}, journal = {J. High Speed Networks}, volume = {26}, number = {3}, pages = {241--254}, year = {2020}, url = {https://doi.org/10.3233/JHS-200641}, doi = {10.3233/JHS-200641}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/Al-OthmanAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/AmpriritLIMBT20, author = {Phudit Ampririt and Yi Liu and Makoto Ikeda and Keita Matsuo and Leonard Barolli and Makoto Takizawa}, title = {Effect of Slice Priority for admission control in 5G Wireless Networks: {A} comparison study for two Fuzzy-based systems considering Software-Defined-Networks}, journal = {J. High Speed Networks}, volume = {26}, number = {3}, pages = {169--183}, year = {2020}, url = {https://doi.org/10.3233/JHS-200637}, doi = {10.3233/JHS-200637}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/AmpriritLIMBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/DouW20, author = {Zhengxiong Dou and Xiaonan Wang}, title = {Data delivery in {VANET} with network gaps}, journal = {J. High Speed Networks}, volume = {26}, number = {2}, pages = {111--124}, year = {2020}, url = {https://doi.org/10.3233/JHS-200633}, doi = {10.3233/JHS-200633}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/DouW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/GuoZW20, author = {Jing Guo and Xu Zhang and Jun Wu}, title = {Loop learning algorithm for distributed beamforming based on one bit feedback}, journal = {J. High Speed Networks}, volume = {26}, number = {2}, pages = {99--109}, year = {2020}, url = {https://doi.org/10.3233/JHS-200632}, doi = {10.3233/JHS-200632}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/GuoZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/HadiB20, author = {Khaled Hadi and Mahmoud A. Bennaser}, title = {Improving node positions in the presence of location errors in geographic routing protocol}, journal = {J. High Speed Networks}, volume = {26}, number = {2}, pages = {89--98}, year = {2020}, url = {https://doi.org/10.3233/JHS-200626}, doi = {10.3233/JHS-200626}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/HadiB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/KharatK20, author = {Prashant Kharat and Muralidhar Kulkarni}, title = {Congestion control performance investigation of ModQUIC protocol using JioFi network: {A} case study}, journal = {J. High Speed Networks}, volume = {26}, number = {1}, pages = {13--26}, year = {2020}, url = {https://doi.org/10.3233/JHS-200627}, doi = {10.3233/JHS-200627}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/KharatK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/KoliciLQEB20, author = {Vladi Kolici and Yi Liu and Ermioni Qafzezi and Donald Elmazi and Leonard Barolli}, title = {Improving peer coordination quality in mobile {P2P} networks considering peer awareness and group synchronization: Implementation and performance evaluation of two fuzzy-based systems}, journal = {J. High Speed Networks}, volume = {26}, number = {1}, pages = {27--39}, year = {2020}, url = {https://doi.org/10.3233/JHS-200628}, doi = {10.3233/JHS-200628}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/KoliciLQEB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/MadhiarasanTS20, author = {M. Madhiarasan and Massimo Tipaldi and Pierluigi Siano}, title = {Analysis of artificial neural network performance based on influencing factors for temperature forecasting applications}, journal = {J. High Speed Networks}, volume = {26}, number = {3}, pages = {209--223}, year = {2020}, url = {https://doi.org/10.3233/JHS-200639}, doi = {10.3233/JHS-200639}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/MadhiarasanTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/Maimour20, author = {Moufida Maimour}, title = {Interference-aware metrics impact on the performance of incremental multipath routing in WSNs}, journal = {J. High Speed Networks}, volume = {26}, number = {3}, pages = {225--240}, year = {2020}, url = {https://doi.org/10.3233/JHS-200640}, doi = {10.3233/JHS-200640}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/Maimour20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/NassarT20, author = {Badr Oulad Nassar and Takuji Tachibana}, title = {Adaptive burst reordering for burst-cluster transmission to improve fairness in {OBS} networks}, journal = {J. High Speed Networks}, volume = {26}, number = {1}, pages = {1--12}, year = {2020}, url = {https://doi.org/10.3233/JHS-200625}, doi = {10.3233/JHS-200625}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/NassarT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/Nasseralfoghara20, author = {Mehrdad Nasseralfoghara and HamidReza Hamidi}, title = {Entropy-based analyzing anomaly {WEB} traffic}, journal = {J. High Speed Networks}, volume = {26}, number = {4}, pages = {255--266}, year = {2020}, url = {https://doi.org/10.3233/JHS-200642}, doi = {10.3233/JHS-200642}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/Nasseralfoghara20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/Nehnouh20, author = {Chakib Nehnouh}, title = {A new architecture for online error detection and isolation in network on chip}, journal = {J. High Speed Networks}, volume = {26}, number = {4}, pages = {307--323}, year = {2020}, url = {https://doi.org/10.3233/JHS-200646}, doi = {10.3233/JHS-200646}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/Nehnouh20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/PrajapatiJ20, author = {Monali Prajapati and Jay M. Joshi}, title = {Cross layer design with extensive virtual {MIMO:} {FS-MUP} optimization model for wireless sensor network}, journal = {J. High Speed Networks}, volume = {26}, number = {4}, pages = {291--306}, year = {2020}, url = {https://doi.org/10.3233/JHS-200645}, doi = {10.3233/JHS-200645}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/PrajapatiJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/RadhaBKN20, author = {Subramanyam Radha and G. Josemin Bala and E. Grace Mary Kanaga and Perattur Nagabushanam}, title = {Scheduling and adaptive listening approaches in {MAC} for {WSN} applications: {A} survey}, journal = {J. High Speed Networks}, volume = {26}, number = {4}, pages = {325--338}, year = {2020}, url = {https://doi.org/10.3233/JHS-200647}, doi = {10.3233/JHS-200647}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/RadhaBKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/SataraddiK20, author = {Mamata J. Sataraddi and Mahabaleshwar S. Kakkasageri}, title = {Hybrid routing protocol for VANETs: Delay and trust based approach}, journal = {J. High Speed Networks}, volume = {26}, number = {4}, pages = {275--290}, year = {2020}, url = {https://doi.org/10.3233/JHS-200644}, doi = {10.3233/JHS-200644}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/SataraddiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/SinghG20, author = {Pooja Singh and Nasib Singh Gill}, title = {Self-observation and recommendation based trust model with defense scheme for wireless ad hoc network}, journal = {J. High Speed Networks}, volume = {26}, number = {1}, pages = {41--54}, year = {2020}, url = {https://doi.org/10.3233/JHS-200629}, doi = {10.3233/JHS-200629}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/SinghG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/SinghRY20, author = {Dinesh Singh and Ranvijay and Rama Shankar Yadav}, title = {{IBMDA:} Information based misbehavior detection algorithm for {VANET}}, journal = {J. High Speed Networks}, volume = {26}, number = {3}, pages = {185--207}, year = {2020}, url = {https://doi.org/10.3233/JHS-200638}, doi = {10.3233/JHS-200638}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/SinghRY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/SinghSS20, author = {Alok Singh and Saurabh Sharma and Rajneesh Kumar Srivastava}, title = {Investigation of random waypoint and steady state random waypoint mobility models in {NS-3} using {AODV}}, journal = {J. High Speed Networks}, volume = {26}, number = {4}, pages = {267--274}, year = {2020}, url = {https://doi.org/10.3233/JHS-200643}, doi = {10.3233/JHS-200643}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/SinghSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/SudarD20, author = {K. Muthamil Sudar and P. Deepalakshmi}, title = {A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and {C4.5} technique}, journal = {J. High Speed Networks}, volume = {26}, number = {1}, pages = {55--76}, year = {2020}, url = {https://doi.org/10.3233/JHS-200630}, doi = {10.3233/JHS-200630}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/SudarD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/YazdiYKHZSR20, author = {Kasra Majbouri Yazdi and Adel Majbouri Yazdi and Saeid Khodayi and Jingyu Hou and Wanlei Zhou and Saeed Saedy and Mehrdad Rostami}, title = {Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms}, journal = {J. High Speed Networks}, volume = {26}, number = {2}, pages = {141--153}, year = {2020}, url = {https://doi.org/10.3233/JHS-200635}, doi = {10.3233/JHS-200635}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/YazdiYKHZSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.